Www.safezonesystems.com SafeZone® patent pending 1 Detect. Inform. Prevent. NERC Physical Security Standards and Guidelines SafeZone® Detect. Inform. Prevent.

Slides:



Advertisements
Similar presentations
Nishidh, CISSP. To comply with Sarbanes oxley and other legislations To comply with industry standards and business partner requirements To protect.
Advertisements

Configuration Management
Incident Response Managing Security at Microsoft Published: April 2004.
NERC New Approved Standards
Allan Wick, CFE, CPP, PSP, PCI, CBCP Chief Security Officer WECC Joint Meeting October 8, 2014.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
EECE499 Computers and Nuclear Energy Electrical and Computer Eng Howard University Dr. Charles Kim Fall 2013 Webpage:
City of Leesburg Electric Department City of Leesburg Electric Department CIP-001 Sabotage Reporting.
Lecture 1: Overview modified from slides of Lawrie Brown.
1. 11/26/2012: NERC Board of Trustees adopted CIP v5 CIP thru CIP CIP and CIP Version 5 Filing FERC requested filing by 3/31/2013.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Brett Wangen, Director of Engineering James O’Brien, Senior Engineer Peak Reliability CIP Guideline and Study Verification Service.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Stephen S. Yau CSE , Fall Security Strategies.
Proposed Rule to Protect Food Against Intentional Adulteration 1.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
Homeland Security Conference Symposium on Homeland Security & Defense Christopher Newport University May 18,
Critical Infrastructure Protection Update Christine Hasha CIP Compliance Lead Advisor, ERCOT TAC March 27, 2014.
Determine Facility Ratings, SOLs and Transfer Capabilities Paul Johnson Chair of the Determine Facility Ratings Standard Drafting Team An Overview of the.
Technician Module 2 Unit 8 Slide 1 MODULE 2 UNIT 8 Prevention, Intelligence & Deterrence.
K E M A, I N C. NERC Cyber Security Standards and August 14 th Blackout Implications OSI PI User Group April 20, 2004 Joe Weiss
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Smart Grid Technologies Damon Dougherty – Industry Manager.
Applying the Distribution System in Grid Restoration/NERC CIP-014 Risk Assessment Srijib Mukherjee, Ph.D., P.E. UC Synergetic.
Thursday, January 23, :00 am – 11:30 am. Agenda  Cyber Security Center of Excellence  Project Phase  Implementation  Next Steps 2.
Cryptography and Network Security
SafeZone® patent pending 1 Detect. Inform. Prevent. Metcalf Attack #2 August 27, 2014 SafeZone® Detect. Inform. Prevent.
 Protect customers with more secure software  Reduce the number of vulnerabilities  Reduce the severity of vulnerabilities  Address compliance requirements.
Implementing the New Reliability Standards Status of Draft Cyber Security Standards CIP through CIP Larry Bugh ECAR Standard Drafting Team.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
CIP Program Highlights Member Representatives Committee October 28, 2008 Michael Assante, CSO
Security Mark A. Magumba. Definitions Security implies the minimization of threats and vulnerabilities A security threat is a harmful event or object.
Critical Infrastructure Protection Update Christine Hasha CIP Compliance Lead Advisor, ERCOT TAC March 27, 2014.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Role for Electric Sector in Critical Infrastructure Protection R&D Presented to NERC CIPC Washington D.C. June 9, 2005 Bill Muston Public Release.
CSCE 522 Secure Software Development Best Practices.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
CIP 2015 Smart Grid Vulnerability Assessment Using National Testbed Networks IHAB DARWISHOBINNA IGBETAREQ SAADAWI.
Infrastructure Protection
Visual 1. 1 Lesson 1 Overview and and Risk Management Terminology.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Grid Reliability Metrics by Jim Dyer Electric Power Group, LLC January 29, 2004 Washington, DC Transmission Reliability Research Review.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
PJM©2014www.pjm.com A System Operator’s Resilience Wish List Tom Bowe Executive Director Reliability and Compliance PJM Interconnection
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
GRC: Aligning Policy, Risk and Compliance
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
March 23, 2015 Missouri Public Service Commission | Jefferson City, MO.
Unit 1: Protecting the Facility (Virtual Machines)
Security and resilience for Smart Hospitals Key findings
Information Systems Security
CS457 Introduction to Information Security Systems
CSCE 548 Secure Software Development Risk-Based Security Testing
Team 1 – Incident Response
Design for Security Pepper.
Information Technology Controls
I have many checklists: how do I get started with cyber security?
Role for Electric Sector in Critical Infrastructure Protection R&D
NERC Critical Infrastructure Protection Advisory Group (CIP AG)
Operations Security (OPSEC)
IS4680 Security Auditing for Compliance
Cyber Security For Civil Engineering
Cryptography and Network Security
Presentation transcript:

SafeZone® patent pending 1 Detect. Inform. Prevent. NERC Physical Security Standards and Guidelines SafeZone® Detect. Inform. Prevent.

NERC Standards, References and Guidelines and SafeZone® CIP — Physical Security, New 2014 Standard – The standard: – A summation of the standard: PhysicalSecurityStandard_21july14#_ftn1 NERC Physical Security Guidelines – ical%20Security%20Guideline% Final.pdf ical%20Security%20Guideline% Final.pdf In the following slides, SafeZone® Risk Management of Physical Security Vulnerabilities exploited in the Metcalf attacks will be described to illustrate compliance with CIP and NERC Physical Security Guidelines. 2 SafeZone® Detect. Inform. Prevent.

CP Core Requirements The CP standard is defined in terms of 6 core requirements: – R1 requires Transmission Owners of certain categories of transmission facilities to perform risk assessments to identify the substations that “if rendered inoperable or damaged could result in widespread instability, uncontrolled separation, or cascading within an Interconnection.” Transmission Owners must also identify the control centers for those critical facilities. – R2 requires that the risk assessments be verified by unaffiliated and qualified third parties. – R3 directs Transmission Owners to notify the Transmission Operators of the identified critical control centers that their control centers are responsible for critical transmission facilities. – R4 requires Transmission Owners and Transmission Operators of critical facilities to perform threat assessments to identify the physical threats to their facilities and any vulnerabilities. – R5 directs Transmission Owners and Transmission Operators of critical facilities to develop and implement physical security plans to address the threats and vulnerabilities they have identified. – R6 requires that an unaffiliated, qualified third party review the threat assessments and physical security plans. These core requirements comprise a set of Risk Management steps to be performed to identify and mitigate the Risk of Physical Security Vulnerabilities being exploited to cause harm to the ES. SafeZone® is an automated Risk Management System, compliant with the Standard, that uses real time video analysis and notifications to detect and mitigate Threats to Physical Security. 3 SafeZone® Detect. Inform. Prevent.

SafeZone®, Metcalf, and CIP Risk Management (R1, R4, R5, R6) R1: Critical Facilities – In this analysis, the Metcalf Transmission Substation is assumed to be a Critical Facility. R4: These Threats and Vulnerabilities at Metcalf are known (have been exploited): – Destruction of Critical Communications – Destruction of Critical Components – Unauthorized Critical Facilities Access – Theft of Assets – Destruction of Assets – Intrusion – Ineffective Threat Responses R5: SafeZone® provides Mitigations to these Threats – Unauthorized persons presence detection and response – Intrusion detection and response – Physical attack on communications detection and response – Physical attack on assets detection and response – Gun attack detection and response – SafeZone® informed response will eliminate ineffective response errors. R6: In addition to static auditing of mitigations, SafeZone® provides continuous monitoring, testing, and reporting for quantifying all capabilities in operating systems. – Validate all mitigations are fully operational at all times. 4 SafeZone® Detect. Inform. Prevent.

SafeZone® and Enhancing Metcalf Physical Security SafeZone® deployment will mitigate Physical Security Threats and Vulnerabilities present in the Metcalf Transmission Substation. SafeZone® can be configured and deployed in a manner consistent with the CIP core requirements, particularly, proven effective mitigations and operational auditing. 5 SafeZone® Detect. Inform. Prevent.

SafeZone® : NERC 8 concepts The NERC Guidelines specify 8 important concepts regarding physical security, here is how SafeZone maps to these concepts : – Deter – Label presence of SafeZone ® video threat protection Low deterrence at Metcalf – Detect – Extensible, configurable threat detectors including interior and exterior settings; guns, intrusion, unauthorized presence, etc. Early warning Low light capable Metcalf detection capabilities are inadequate – Delay – Activate time barriers upon threat detection. Controllable time barrier elements can be activated upon threat detection – Assess – Cascaded response mechanisms Ask the question of responsible parties: “Is this a problem?” supported with Video and Mapping. Automated “See Something, Say Something” – Communicate – Configurable, automated, robust, redundant, multi-channel notification and status communications Early warning Real time status Multi-agency distribution Support for redundant communications – have to be able get information out to responders – Respond – Informed response What is the threat (or threats), where is it (or are they), what is happening now. Where are responders, where are bystanders. How many are out there? Remove attacker advantage Incomplete information has led to inadequate response at Metcalf – Intelligence – Threat visualization tools, efficient user interfaces Real time video cueing and mapping – Audit – Automatically test, assess, and report capabilities in working systems, at all times. Comply with standards: are the mitigations working right now ? 6 SafeZone® Detect. Inform. Prevent.

NERC Guidelines: Protection in Depth SafeZone ® implements Protection in Depth Video coverage can be layered in depth SafeZone ® implements redundancy another form of Protection in Depth Metcalf has inadequate defense in depth and an attackable perimeter 7 SafeZone® Detect. Inform. Prevent.

SafeZone ® Compliant Physical Security Risk Management SafeZone ® can directly mitigate existing threats to Physical Security in the Electric System in compliance with CIP SafeZone ® implements elements recommended in the NERC Physical Security Guidelines. Harden your Critical Facilities today, Prevent Reliability impacts and loss costs SafeZone ® is available today to harden your parts of the Electric System To see more: 8 SafeZone® Detect. Inform. Prevent.

Appendix 9 SafeZone® Detect. Inform. Prevent.

DHS Information 90 percent of consumed power passes through extra-high voltage (EHV) transformers at some point on the transmission grid. If these transformers fail— especially in large numbers—the nation could face a major, potentially long term, blackout. With more than 60 percent of the Gross Domestic Product tied to electricity, annual losses due to power failures throughout the nation are estimated at more than $100 billion. extra high-voltage (EHV) transformers are the most vulnerable components in the electric grid. Three high-consequence TTPs are most commonly found in the available data; targeted shootings, intentional downing of power lines, and bombings. 10 SafeZone® Detect. Inform. Prevent.