Critical Infrastructure Protection Updates (CIP Compliance)

Slides:



Advertisements
Similar presentations
Federal Energy Regulatory Commission July Cyber Security and Reliability Standards Regis F. Binder Director, Division of Logistics & Security Federal.
Advertisements

Critical Infrastructure Protection THE ELECTRICITY SECTOR Presented to EMERGENCY POWER CONFERENCE November 2004.
Protective Security Advisors Securing the Nations critical infrastructure one community at a time.
Lesson 3 Responding to Emergency Events. For additional information or questions please contact Toledo-Lucas County Health Department APC:
NERC Critical Infrastructure Protection Advisory Group (CIP AG) Electric Industry Initiatives Reducing Vulnerability To Terrorism.
Homeland Security at the FCC July 10, FCCs Homeland Security Focus Interagency Partnerships Industry Partnerships Infrastructure Protection Communications.
Idaho Critical Infrastructure and Key Resources Protection Program and Fusion Center Brief.
Facilitating a Dialog between the NSDI and Utility Companies J. Peter Gomez Manager, Information Requirements, Xcel Energy.
National Infrastructure Protection Plan
WebCast 5 May 2003 NERC Cyber Security Standard Overview of Proposed Cyber Security Standard.
DHS, National Cyber Security Division Overview
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
Jeffery J. Gust IOWA INDUSTRIAL ENERGY GROUP FALL CONFERENCE Tuesday, October 14, 2014 MidAmerican Energy Company.
FSIS’ Innovative Food Security Initiatives Carol Maczka, Ph.D. Assistant Administrator USDA Food Safety and Inspection Service Office of Food Security.
K E M A, I N C. Current Status of Cyber Security Issues 2004 Keynote Address Joe Weiss January 20, 2004.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Homeland Security Conference Symposium on Homeland Security & Defense Christopher Newport University May 18,
Critical Infrastructure Protection Update Christine Hasha CIP Compliance Lead Advisor, ERCOT TAC March 27, 2014.
SafeZone® patent pending 1 Detect. Inform. Prevent. NERC Physical Security Standards and Guidelines SafeZone® Detect. Inform. Prevent.
ELECTRICAL CRITICAL INFRASTRUCTURE SECURITY Charles Hookham, P.E., M.ASCE, VP, Utility Projects HDR Engineering 1.
K E M A, I N C. NERC Cyber Security Standards and August 14 th Blackout Implications OSI PI User Group April 20, 2004 Joe Weiss
Lisa Wood, CISA, CBRM, CBRA Compliance Auditor, Cyber Security
Federal Energy Regulatory Commission June Cyber Security and Reliability Standards Regis F. Binder Director, Division of Logistics & Security Federal.
Nuclear Power Plant/Electric Grid Regulatory Coordination and Cooperation - ERO Perspective David R. Nevius and Michael J. Assante 2009 NRC Regulatory.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
1 Information System Security Assurance Architecture A Proposed IEEE Standard for Managing Enterprise Risk February 7, 2005 Dr. Ron Ross Computer Security.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
1 Crisis Management / Emergency Management Overview.
The NIGF CONFERENCE © 2013 ADDRESSING THE VULNERABILITY OF CRITICAL ICT INFRASTRUCTURE by Ernest Ndukwe, OFR Chairman Openmedia Communications Ltd 18 th.
Catastrophe Readiness and Response Session 7b 1 Session 7b Critical Infrastructure Drew Bumbak.
Actions Affecting ERCOT Resulting From The Northeast Blackout ERCOT Board Of Directors Meeting April 20, 2004 Sam Jones, COO.
Overview of WECC and Regulatory Structure
Critical Infrastructure Protection Update Christine Hasha CIP Compliance Lead Advisor, ERCOT TAC March 27, 2014.
Securing Critical Chemical Assets: The Responsible Care ® Security Code Protection of Hazardous Installations from Intentional Adversary Acts European.
Status Report for Critical Infrastructure Protection Advisory Group
Phoenix Convention Center Phoenix, Arizona When Prevention and Preparation May Not be Enough: Resilience and Recovery for the Electricity Sub-Sector Operational.
Standardized Awareness Authorized Training, Train-the-Trainer Prevention and Deterrence.
WebCast 5 May 2003 Proposed NERC Cyber Security Standard Presentation to IT Standing Committee Stuart Brindley, IMO May 26, 2003.
U.S. Department of Homeland Security Brief to the Inter Agency Board Incident Management and Communications Subgroup Oct 22, 2010 Pete Owen, PSA San Diego.
1 Session 7, Section 2 Critical Infrastructure Drew Bumbak.
1 RIC 2009 Nuclear Power Plant/Electric Grid Regulatory Coordination and Cooperation George Wilson NRR/ADES/DE/EEEB March 11, 2009.
CIP 2015 Smart Grid Vulnerability Assessment Using National Testbed Networks IHAB DARWISHOBINNA IGBETAREQ SAADAWI.
The Challenging Landscape of Critical Information Infrastructure: Are We Ready? Leonard Bailey Senior Counsel Computer Crime & Intellectual Property Section.
1 Washington State Critical Infrastructure Program “No security, No infrastructure” Infrastructure Protection Office Emergency Management Division Washington.
Governor’s Office of Homeland Security & Emergency Preparedness LOUISIANA BANKERS ASSOCIATION 2010 Louisiana Emergency Preparedness Coalition Meetings.
Cyber Attacks Threaten: privacy reliability safety resiliency 2.
NERC and ESISAC Electricity Sector Information Sharing and Analysis Center Update March 2006 CIPC Confidentiality: Public Release.
North American Energy Infrastructure Policy Philip Gonda Steven Mays Robert Floyd Josh Kapp.
Security at FERC Energy Projects Energy Bar Association Mid-Year Meeting Robert J. Cupina, Deputy Director Office of Energy Projects Federal Energy Regulatory.
November 2, 2006 LESSONS FROM CIPAG 1 Lessons from Critical Infrastructure Group Bill Bojorquez November 2, 2006.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
1 DOE Office of Electricity Delivery and Energy Reliability David Meyer – May 2005 Developing Policy Options To Enhance Security of Energy Supply for Electricity.
LESSONS LEARNED FROM RECENT PIPELINE INCIDENTS FLORIDA NATURAL GAS ASSOCIATION (FNGA) OPERATING & MARKETING CONFERENCE ROD WALKER PRINCIPAL CONSULTANT.
November 19, 2002 – Congress passed the Homeland Security Act of 2002, creating a new cabinet-level agency DHS activated in early 2003 Original Mission.
March 23, 2015 Missouri Public Service Commission | Jefferson City, MO.
April 19 th, 2016 Governors Homeland Security and All-Hazards Cyber Security Sub-Committee.
Aaron Clark-Ginsberg and Rebecca Slayton
Agenda Control systems defined
USA Final Project Report
Understanding Existing Standards:
Cybersecurity at PJM Jonathon Monken
NERC Critical Infrastructure Protection Advisory Group (CIP AG)
NERC Cyber Security Standard
The U.S. Department of Homeland Security
Securing Critical Chemical Assets: The Responsible Care® Security Code
Cybersecurity at PJM Jonathon Monken
Deborah Housen-Couriel, ADV.
Adding security to your ICS environment? Fine! But how?!
Civil Air Patrol Critical Infrastructure Austin Worcester 15 Jul 2019.
Presentation transcript:

Critical Infrastructure Protection Updates (CIP Compliance) Christine Hasha Matt Mereness April 2015

At the end of this presentation you will be able to: Objectives At the end of this presentation you will be able to: Explain why the electricity industry is under federal regulation for physical and cyber protection Describe some of the physical and cyber risks to the electric grid Identify why the regulations are continuing to change

CIP Background and Policy Physical Security Cyber Security Wrap-Up Agenda CIP Background and Policy Physical Security Cyber Security Wrap-Up

CIP Background & Policy

What is Critical Infrastructure? “Critical infrastructure is the backbone of our nation's economy, security and health. We know it as the power we use in our homes, the water we drink, the transportation that moves us, and the communication systems we rely on to stay in touch with friends and family.” “Critical infrastructure are the assets, systems, and networks, whether physical or virtual, so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof.” - Department of Homeland Security

Critical Infrastructure Sectors Chemical Communications Commercial Critical Manufacturing Dams Defense Industrial Base Emergency Services Energy (power, oil, natural gas) Financial Services Food & Agriculture Government Facilities Healthcare & Public Health Information Technology Nuclear Reactors, Materials & Waste Transportation Systems Water & Wastewater Systems These are the 16sectors defined as critical infrastructure by the National Infrastructure Protection Plan. Each of these sectors is monitored daily by the Department of Homeland Security. There is a daily Infrastructure Report that summarizes information concerning significant critical infrastructure issues. You can get this by subscribing at the DHS website.

Automated and interlinked computers and communications The Concern Automated and interlinked computers and communications More efficient economy and perhaps stronger economy More vulnerable The infrastructure is now a target Vulnerable to threats from potential terrorism Traditional Nontraditional In the past, the systems and networks of the infrastructure elements were physically and logically independent and separate. With advances in technology, the systems within each sector became automated, and interlinked through computers and communications facilities. While this increased reliance on interlinked capabilities helps make the economy and nation more efficient and perhaps stronger, it also makes the country more vulnerable to disruption and attack. Now, the elements of the infrastructure themselves are also considered possible targets of terrorism. The elements of the infrastructure are also increasingly vulnerable to a dangerous mix of traditional and nontraditional types of threats.

Agencies Protecting Critical Infrastructure Federal Department of Homeland Security (DHS) Federal Bureau of Investigation (FBI) Department of Energy (DoE) Federal Energy Regulatory Commission (FERC) North American Electric Reliability Corporation (NERC) Electricity Sector Information Sharing and Analysis Center (ES-ISAC) State Public Utility Commission of Texas (PUCT) Department of Public Safety (DPS) ERCOT There are many agencies and groups that work together to address critical infrastructure protection from the state and federal levels. DoE: Provides us with direction in the protection of energy critical infrastructure. We provide reports of incidents within the region DHS & FBI: Provides us with information on threats and vulnerabilities. A number of ERCOT staff and other utility company staff have SECRET clearances to get the most detailed threat, vulnerability, and exploit information. PUCT: Oversees initiatives to improve reliability and security in Texas. Reviews cyber security threats state-wide. In the event of a disaster, ERCOT provides critical grid information and restoration to promote public safety. DPS: Reviews cyber security threats state-wide through the Fusion Center. Electricity Sector Information Sharing and Analysis Center: Receives incident data from private and public entities. Coordinates with other sectors. Disseminates threat alerts, warnings, advisories, notices, and vulnerability assessments to the electric sector. ERCOT: In the event of a disaster, ERCOT provides critical grid information and restoration to promote public safety. Annually, ERCOT performs blackstart training for the electric utility industry in Texas. We simulate a blackout and conduct an exercise to restore power to the communities. This is observed by some of the agencies listed. How many of you heard about GridEx? GridEx is conducted every two years. It is an international grid security exercise that simulates cyber and physical attacks to the power system. It is used for participants to validate their plans and readiness to address a real attack.

Critical Infrastructure Protection Regulation The government policy requires industry in each critical sector to: Assess its vulnerabilities to attacks Physical Cyber Plan to eliminate significant vulnerabilities Develop systems to identify and prevent attempted attacks Alert, contain, and rebuff attacks Rebuild in the aftermath Prevent/Contain/Recover Physical Attacks Prevent/Contain/Recover Cyber Attacks

CIP Standards Emerge 13 of the 46 Blackout Report Recommendations relate to cyber security (in response to 2003 Northeast Blackout). Development of cyber security policies and procedures Strict control of physical and electronic access Assessment of cyber security risks and vulnerability Capability to detect wireless and remote wireline intrusion and surveillance Guidance on employee background checks Procedures to prevent or mitigate inappropriate disclosure of information Improvement and maintenance of cyber forensic and diagnostic capabilities 13 of the 46 2003 Blackout Report Recommendations relate to these areas of cyber security. Development of cyber security policies and procedures to determine how an organization will protect their computer assets Strict control of physical and electronic access to their critical systems Assessment of cyber security risks and vulnerability Capability to detect wireless and remote wireline intrusion and surveillance Guidance on employee background checks Procedures to prevent or mitigate inappropriate disclosure of information Improvement and maintenance of cyber forensic and diagnostic capabilities

Physical Security

CIP-014-1 Physical Security “The attack was "the most significant incident of domestic terrorism involving the grid that has ever occurred" in the U.S.” -- Jon Wellinghoff, former Chairman of FERC

California Metcalf Attack – April 16, 2013

CIP-014-1 Physical Security The attack began when someone slipped into an underground vault and cut telephone cables. Within half an hour, sniper(s) opened fire on the substation. Shooting lasted for 19 minutes, knocking out 17 transformers. A minute before a police car arrived, the shooter(s) disappeared into the night. To avoid an area-wide blackout, electric-grid officials rerouted power around the site and asked power plants in Silicon Valley to produce more electricity. It took utility workers 27 days to make repairs. Nobody has been arrested or charged in the attack.

CIP-014-1 Physical Security FERC Directive Mar 7, 2014 Approved by Industry Final Ballot May 5, 2014 Adopted by NERC Board of Trustees May 13, 2014 Approved by FERC Nov 20, 2014 Effective Oct 1, 2015

CIP-014-1 Physical Security FERC directed creation of the Standard Gave a 90-day time limit to complete Applies to Transmission Owners of Substations with BES elements 200 kV and above and those Control Centers that they operate Requires risk assessment, physical security plan, third-party verification of these Purposefully not prescriptive

Cyber Security

21st Century Cyber Attacker

2009- Hacked road signs in Texas This occurred in Austin in January 2009. Again, someone forgot to change the default administrator password. This was reported on KXAN, FOX, and in Wired.

CryptoLocker Ransomware Advanced Persistent Threat Current Cyber Threats Heartbleed Shellshock CryptoLocker Ransomware Advanced Persistent Threat BlackEnergy Crimeware

2013 GridEx II Conducted by NERC every 2 years Last conducted November 2013 Over 234 organizations with more than 2,000 individuals Key bulk power system functions Department of Homeland Security (DHS) Federal Bureau of Investigation (FBI) Department of Energy (DOE) The exercise simulated: Cyber attacks on corporate and control networks Concurrent simulated physical attack degrading reliability and threatened public health and safety

2013 GridEx II GridEx II’s Objectives Exercise the readiness of the industry to respond to a security incident Review existing command, control, and communication plans and tools for NERC and its stakeholders Identify potential improvements in physical security and cybersecurity plans, programs, and responder skills Lessons Learned & Recommendations Enhance information sharing and coordination Challenges of simultaneous attacks Continue improvement of incident response Continue improvement of situational awareness Continue to improve the Grid Exercise Program

CIP Standards Emerge and Evolve 2003 – NERC Urgent Action 1200 2008 – CIP Version 1 2009 – CIP Version 2 2010 – CIP Version 3 2016 – CIP Version 5 (High & Medium Impact) 2017– CIP Version 5 (Low Impact) Cyber standards change rapidly, driven by: Actual events Technology changes Directives from national level security Lessons learned in what-if scenarios In August 2003, NERC approved the Urgent Action 1200 standard, which was the first comprehensive cyber security standard for the electric industry. This was voluntary and applied to control areas, transmission owners and operators, and generation owners and operators that perform defined functions. CIP Version 1 had a 3 year phased implementation period. The earliest enforcement was 6/30/2008.

Current changes coming in CIP Versions 5 The NERC CIP Standards Version 5 is the first major change in requirements and approach in a decade, representing significant progress in mitigating cyber risks to the bulk power system. CIP v6 is on horizon already (based on FERC Order 791) Identify, Assess, Correct (IAC) Low Impact Assets Communication Networks Transient Devices

Wrap-Up

Wrap-Up Why we do this: Electricity sector is part of national critical infrastructure National interest and standards for securing critical infrastructure Securing the infrastructure includes plans to not only prevent problems, but also to detect, contain, and recover Cyber protection requirements are changing rapidly with technologies How we go about it: Physical protection is changing with new CIP-014-1 CIP begins moving from Version 3 to Version 5 on April 1, 2016

Questions?

Questions? Which industries are identified as Critical Infrastructure Sectors? Energy (power, oil, natural gas) Communications Information Technology All of the above

Questions? Which of the following agencies are responsible for protecting Critical Infrastructures within ERCOT. DOE PUCT DPS All of the above

Questions? What Electric Industry exercise is conducted by NERC every two years? Winter Storm Drill GridEx Blackstart Wildfire Response

Questions? What criteria drives changes in the NERC cyber security standards? Actual events Technology changes Directives from national level security All of the above