Date CIP Standards Update Chris Humphreys Texas RE CIP Compliance.

Slides:



Advertisements
Similar presentations
NERC Cyber Security Standards Pre-Ballot Review. Background Presidents Commission on Critical Infrastructure Protection PDD-63 SMD NOPR NERC Urgent Action.
Advertisements

Federal Energy Regulatory Commission July Cyber Security and Reliability Standards Regis F. Binder Director, Division of Logistics & Security Federal.
NERC TPL Standard Issues TSS Meeting #146 Seattle, WA August 15-17, 2007 Chifong Thomas.
Document Categorization Steve Ashbaker Director of Operations Joint Guidance Committee WECC Leadership Annual Training Session Salt Lake City, UT May 6-7,
EMS Checklist (ISO model)
STATUS OF BULK ELECTRIC SYSTEM DEFINITION PROJECT
CIP Cyber Security – Security Management Controls
PER
Recent NERC Standards Activities RSC – Jan. 5, 2011 NSRS Update Date Meeting Title (optional)
Brent Castagnetto Manager, Cyber Security Audits & Investigations Team CIP v5 Implementation Guidance CIP v5 Roadshow Salt Lake City, UT May 14-15, 2014.
1 Compliance Guidance for Initial Compliance Review Dates Lew Folkerth 2Q2010 Webinar June 22, 2010.
Gcpud1 CRITICAL INFRASTRUCTURE PROTECTION NERC 1200 CIP CRITICAL INFRASTRUCTURE PROTECTION NERC 1200 CIP
Compliance Application Notice Process Update and Discussion with NERC MRC.
Data Ownership Responsibilities & Procedures
Cyber Security Plan Implementation Presentation to CMBG Glen Frix, Duke Energy June 20,
Project Cyber Security Order 706 January 10, 2012 Most of the material presented has been compiled from NERC webinars and drafting team meetings.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
1 Ports and Services An Audit Approach ReliabilityFirst CIP Webinar Thursday, September 30, 2010 Lew Folkerth, Senior Engineer - Compliance.
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
Security Controls – What Works
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
Physical Security CIP NERC Standing Committees December 9-10, 2014.
Cyber Security Standard Workshop Status of Draft Cyber Security Standards Larry Bugh ECAR Standard Drafting Team Chair January 2005.
June 6, 2007 TAC Meeting NERC Registration Issues Andrew Gallo, Assistant General Counsel, Litigation and Business Operations ERCOT Legal Dept.
Ontario Overview Dave Short Senior Regulatory Analyst, Regulatory Affairs IESO’s ERO Workshop – June 28, 2006.
B O N N E V I L L E P O W E R A D M I N I S T R A T I O N 1 Network Operating Committee (NOC) June 12 th, 2014.
CIP 43 ReliabilityFirst Audit Observations ReliabilityFirst CIP Webinar Thursday, September 30, 2010 Tony Purgar, Sr. Consultant - Compliance.
Lisa Wood, CISA, CBRM, CBRA Compliance Auditor, Cyber Security
Ship Recycling Facility Management System IMO Guideline A.962
Commissioning of Fire Protection and Life Safety Systems Presented by: Charles Kilfoil Bechtel National Waste Treatment Plant Richland WA.
 Computer security policy ◦ Defines the goals and elements of an organization's computer systems  Definition can be ◦ Highly formal ◦ Informal  Security.
Federal Energy Regulatory Commission June Cyber Security and Reliability Standards Regis F. Binder Director, Division of Logistics & Security Federal.
Nuclear Power Plant/Electric Grid Regulatory Coordination and Cooperation - ERO Perspective David R. Nevius and Michael J. Assante 2009 NRC Regulatory.
1 Remote Access Update ReliabilityFirst CIP Webinar Thursday, September 30, 2010 Lew Folkerth, Senior Engineer - Compliance.
1 Records Inventory & Data Classification Workshop Data Classification Project Note: This is an example of one agency’s approach to meeting the state records.
Implementing the New Reliability Standards Status of Draft Cyber Security Standards CIP through CIP Larry Bugh ECAR Standard Drafting Team.
Introduction In 1992, the Committee Of Sponsoring Organizations of the Treadway Commission (COSO) published Internal Control-Integrated Framework (1992.
Procedures and Forms 2008 FRCC Compliance Workshop April 8-9, 2008.
SPP.org 1. EMS Users Group – CIP Standards The Compliance Audits Are Coming… Are You Ready?
Texas Regional Entity Update Sam Jones Interim CEO and President Board of Directors July 18, 2006.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
CIP Systems Security Management A Compliance Perspective
Federal Aviation Administration 14 CFR Part 147 Aviation Advisory Committee Working Group Training Updates Presented to: World Aviation Training Symposium.
1 Texas Regional Entity 2008 Budget Update May 16, 2007.
Overview of WECC and Regulatory Structure
Status Report for Critical Infrastructure Protection Advisory Group
July 2008 CPS2 Waiver SDT Technical Workshop for Draft BAL-001-TRE-01 Judith A. James Reliability Standards Manager TRE.
SPS policy – Information Presentation Presentation to ROS June 16, 2004.
Project (COM-001-3) Interpersonal Communications Capabilities Michael Cruz-Montes, CenterPoint Energy Senior Consultant, Policy & Compliance, SDT.
Item 5d Texas RE 2011 Budget Assumptions April 19, Texas RE Preliminary Budget Assumptions Board of Directors and Advisory Committee April 19,
Bill Lewis, Compliance Team Lead NERC Reliability Working Group May 16, 2013 Texas RE Update Talk with Texas RE April 25, 2013.
Employee Privacy at Risk? APPA Business & Financial Conference Austin, TX September 25, 2007 Scott Mix, CISSP Manager of Situation Awareness and Infrastructure.
Page 1 of 13 Texas Regional Entity ROS Presentation April 16, 2009 T EXAS RE ROS P RESENTATION A PRIL 2009.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Evaluate Phase Pertemuan Matakuliah: A0774/Information Technology Capital Budgeting Tahun: 2009.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
Business Continuity Planning 101
External Provider Control
NERC Cyber Security Standards Pre-Ballot Review
Understanding Existing Standards:
Larry Bugh ECAR Standard Drafting Team Chair January 2005
Background (history, process to date) Status of CANs
Larry Bugh ECAR Standard Drafting Team Chair January 2005
Final HIPAA Security Rule
NERC Reliability Standards Development Plan
Larry Bugh ECAR Standard Drafting Team Chair June 1, 2005
NERC Reliability Standards Development Plan
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Presentation transcript:

Date CIP Standards Update Chris Humphreys Texas RE CIP Compliance

2 RSC May 7, 2009 Phase I Revision Details ●As directed in Order 706  Purpose Section: Removed the term “reasonable business judgment”  Where applicable, removed the phrase “acceptance of risk” ●To comply with ERO Rules of Procedure  Applicability: Added Regional Entity, in place of Regional Reliability Organization ●Versioning  Phase I changes to the existing version will be reflected as CIP through CIP 009–2.

3 Phase I Revision Details ●Effective Date section updated to integrate the implementation timeframe for CIP through CIP ●Administrative edits to reflect changes in numbering references RSC May 7, 2009

4 Phase I Revision Details ●Requirements  Modifications to remove some extraneous information from the requirements, improve readability, and to bring the compliance elements into conformance with the latest guidelines for developing compliance elements of standards.  Where there were sub-requirements that were numbered, but were not all required, the numbers were replaced with “bullets”. ●Measures  The format of the measures was modified to conform to the format used in other standards. RSC May 7, 2009

5 Phase I Revision Details ●Compliance Elements  The compliance elements of the standard were updated to reflect the language used in the ERO Rules of Procedure.  The term, “Compliance Monitor” was replaced with “Compliance Enforcement Authority”.  The term, “Regional Reliability Organization” was replaced with “Regional Entity”.  The Compliance Monitoring and Enforcement Processes were added. RSC May 7, 2009

6 Phase I Revision Details ●Compliance Elements  The Monitoring Time Period and Reset Periods were marked as “not applicable”.  The Data Retention section was updated. RSC May 7, 2009

7 Phase I Revision Details ●CIP 002 Modifications  As directed in Order 706: R4 Annual Approvals: Adds that senior manager shall annually review and approve the risk-based assessment methodology in addition to the list of Critical Assets and Critical Cyber Assets as required in prior version. RSC May 7, 2009

8 Phase I Revision Details ●CIP 003 Modifications  Simplification: R2.1 Leader Identification: Removes the need for business phone and business address designation. RSC May 7, 2009

9 Phase I Revision Details ●CIP 003 Modifications  As directed in Order 706: Applicability 4.2.3: Requires Responsible Entities having no Critical Cyber Assets to comply with CIP R2. R2 Leadership: Require the designation of a single manager, with overall responsibility and authority for leading and managing the entity’s implementation of CIP. The word “authority” is an addition. R2.3: Permits the assigned senior manager to delegate authority in writing for specific actions, where allowed, throughout the CIP standards. RSC May 7, 2009

10 Phase I Revision Details ●CIP 004 Modifications  Clarification to assure that requirement must be implemented: R1. Awareness: Explicitly require implementation of Awareness Program. R2. Training: Explicitly require implementation of the Training Program. RSC May 7, 2009

11 Phase I Revision Details ●CIP 004 Modifications  As directed in Order 706: R2.1 Training: Personnel having access to Critical Cyber Assets must be trained prior to their being granted such access, except in specified circumstances, such as an emergency. This replaces allowance for ninety days to complete the training and adds provision for emergency situations. R3 Personnel Risk Assessment: Personnel risk assessment shall be conducted prior to granting personnel access to Critical Cyber Assets except in specified circumstances such as an emergency. This replaces allowance for thirty days to complete personnel risk assessment and adds provision for emergency situation. RSC May 7, 2009

12 Phase I Revision Details ●CIP 005 Modifications  Clarification: Clarifies the scope of this requirement to include Cyber Assets used in either access control and/or monitoring to the Electronic Security Perimeter.  Clarification to assure that requirement must be implemented: R2.3 Electronic Access Controls: Explicitly requires the implementation of the procedure to secure dial up access to the Electronic Security Perimeter. RSC May 7, 2009

13 Phase I Revision Details ●CIP 006 Modifications  Restructuring of Requirements: Former requirement R1.8 moved and incorporated into new Requirement R2 (Protection of Physical Access Control Systems) as Requirement R2.2. Other modifications to Requirements R1.1 through R1.8 for readability.  Clarifications to assure that requirement must be implemented: R1. – R1.8 Physical Security Plan: All requirements of the Physical Security Plan must be implemented. RSC May 7, 2009

14 Phase I Revision Details ●CIP 006 Modifications  As directed in Order 706: R1 Physical Security Plan: Changes the term “a senior manager” to “the senior manager.”  For consistency R1.7 Updates to the Physical Security Plan: Shortens the time for updates to the Physical Security Plan to thirty calendar days rather than ninety days and adds the word “completion” to the requirement. RSC May 7, 2009

15 Phase I Revision Details ●CIP 006 Modifications  Additional Clarifications: R1.6 Escorted Access: Clarified that the escort within a Physical Security Perimeter shall continually remain with the escorted person. R1.8 Annual Review: Formerly Requirement R1.9. R2.2: Formerly R1.8. Changed references to requirement numbers as appropriate. R4 Physical Access Controls: Formerly Requirement R2. Changes enumeration of sub requirements to bulleted list. R5 Monitoring Physical Access: Formerly Requirement R3. Changes enumeration of sub requirements to bulleted list. Changes references to other requirements as appropriate. RSC May 7, 2009

16 Phase I Revision Details ●CIP 006 Modifications  Additional Clarifications: R6 Logging Physical Access: Formerly Requirement R4. Changes enumeration of sub requirements to bulleted list. Changes references to other requirements as appropriate. R7: Formerly Requirement R5. R8 Maintenance and Testing: Formerly Requirement R6. Changes references to other requirements as appropriate. RSC May 7, 2009

17 Phase I Revision Details ●CIP 006 Modifications  Requirements Added: R2 Protection of Physical Access Control Systems: Moves requirement to protect Physical Access Control Systems out of Requirement R1 into its own requirement and excludes hardware at the Physical Security Perimeter access point such as electronic lock control mechanisms and badge readers from the requirement. R2.1 Protection of Physical Access Control Systems: Adds requirement that Physical Access Control Systems be protected from unauthorized access. R3 Protection of Electronic Access Control Systems: Adds that cyber assets used in access control and/or monitoring of the Electronic Security Perimeter shall reside within an identified Physical Security Perimeter. RSC May 7, 2009

18 Phase I Revision Details ●CIP 007 Systems Security Management Modifications  As directed in Order 706: R2.3 Ports and Services: Removal of the term “or an acceptance of risk.” R3.2 Security Patch Mgt.: Removal of the term “or an acceptance of risk.” R4.1 Malicious Software Prevention: Removal of the term “or an acceptance of risk.” R9 Documentation Review and Maintenance: Shortens the time frame to update documentation in response to a system or control change from ninety to thirty calendar days and further clarifies this timeframe to begin after such change is complete. RSC May 7, 2009

19 Phase I Revision Details ●CIP 007 Systems Security Management Modifications  Clarifications to assure that requirements must be implemented: R2 Ports and Services: Explicitly requires the implementation of process to ensure only required ports and services are enabled. R3 Security Patch Mgt.: Explicitly requires the implementation of Security Patch Management program. R7 Disposal and Redeployment: Explicitly requires the implementation of Cyber Asset disposal and redeployment procedures. RSC May 7, 2009

20 Phase I Revision Details ●CIP 008 Incident Response & Reporting Modifications  As directed in Order 706: R1.4 Updating the Cyber security Incident Response Plan: Shortens the timeframe to update the Incident Response Plan from ninety to thirty calendar days. R1.6 Testing of the Incident Response Plan: Adds language to clarify that testing need not require a responsible entity to remove any systems from service.  Clarifications to assure that requirements must be implemented  R1 Incident Response Plan: Explicitly requires implementation. RSC May 7, 2009

21 Phase I Revision Details ●CIP 009 Recovery Plan Modifications  As directed in Order 706: R3 Change Control: Shortens the timeframe for communicating updates to Critical Cyber Asset recovery plans from within ninety to thirty calendar days of the change being completed. RSC May 7, 2009

22 Phase I Revision Details ●Implementation Plan Details:  The implementation plan was integrated into the Effective Date section rather than having a separate plan for CIP through CIP The Effective Date was revised to allow Responsible Entities at least 180 days to become compliant with the CIP standard requirements, based on the later of: the first day of the third quarter after applicable regulatory approvals have been received (or the Reliability Standard otherwise becomes effective in those jurisdictions where regulatory approval is not required); or “Compliant” (C) dates identified in the compliance schedule of the Implementation Plan for Cyber Security Standards CIP through CIP RSC May 7, 2009

23 Newly Identified Critical Cyber Assets ●Current gap in the CIP standards is compliance of newly identified Critical Cyber Assets.  Once “compliant” date reached in Version 1 implementation plan, newly identified Critical Cyber Asset is expected to be immediately fully compliant.  The SAR recognizes that the industry may need some time to apply certain CIP standards requirements to newly identified Critical Cyber Asset. ●New plan addresses the issue and allows time to come into compliance. RSC May 7, 2009

24 Newly Indentified Critical Cyber Assets ●Three classification categories identified: 1.Previously registered Responsible Entity identifies its first Critical Cyber Asset under CIP standards. To this point, the entity does not have a compliance program in place and needs time to build the program. 2.A compliance program is in place and an existing Cyber Asset becomes subject to the CIP standards, not as a result of a planned change to the Cyber Asset or network environment. 3.A compliance program is in place and an existing Cyber Asset becomes subject to the CIP standards as a result of a planned change. RSC May 7, 2009

25 Newly Indentified Critical Cyber Assets ●First Critical Cyber Asset (Category 1).  Responsible Entity currently required to comply with all requirements of CIP-002. Version 1 implementation plan may still be in effect ♦Table 3 requires full compliance by December 31, 2009). ♦May be coincident with Responsible Entity registration, invoking Table 4 of the Version 1 implementation plan.  Identification starts the 24 month clock to build a compliance program for CIP-003 through CIP Compliance date is later of Version 1 implementation plan or 24 months from identification of first Critical Cyber Asset. RSC May 7, 2009

26 Newly Indentified Critical Cyber Assets ●New Critical Cyber Asset, not as a result of a planned change (Category 2).  Examples of unplanned change include existing asset, such as generation or transmission, identified as Critical Asset due to change in system conditions or risk assessment methodology. ●Responsible Entity already subject to requirements of CIP-003 through CIP-009.  Later of in-effect initial implementation plan or zero to 18 months to comply with identified standards requirements following identification of Critical Cyber Asset or other Cyber Asset within the ESP. RSC May 7, 2009

27 Newly Indentified Critical Cyber Assets ●New Critical Cyber Asset, as a result of a planned change (Category 3).  Examples of planned change include deployment of new Cyber Asset, reconfiguration of existing Cyber Asset, hardware or software upgrade, or network reconfiguration. ●Responsible Entity already subject to requirements of CIP-003 through CIP-009.  Later of in-effect initial implementation plan or immediate compliance with all standards requirements upon deployment of the Critical Cyber Asset or other Cyber Asset within the ESP. RSC May 7, 2009

28 Newly Identified Critical Cyber Assets ●Other Considerations  Construction of new Critical Asset or upgrade/replacement of existing Critical Asset. Identification of asset as Critical Asset is part of the planning process. This is normally considered a planned change once a CIP standards compliance program is in place. ♦A change of system conditions or risk assessment methodology could cause an asset to be determined to be a Critical Asset after construction has commenced. Identification of Critical Asset invokes appropriate schedule for CIP standards compliance as previously described. RSC May 7, 2009

29 Newly Indentified Critical Cyber Assets ●Other Considerations  Mergers and Acquisitions First Critical Cyber Asset category is applicable if neither party already has Critical Cyber Assets identified. Otherwise, entities have: ♦One year from closing to evaluate merging of programs. ♦Followed by invocation of Category 2 (zero to 12 months to comply with identified Standards requirements). RSC May 7, 2009

30 Newly Indentified Critical Cyber Assets ●Other Considerations  Restoration as part of a disaster recovery situation shall follow the emergency provisions of the Responsible Entity’s CIP standards compliance policy (CIP-003, Requirement R1). ●Key Expectation  Documentation is critical to this process. The Responsible Entity must be able to demonstrate which implementation schedule and corresponding compliance set of dates is applicable on a per-Cyber Asset basis. RSC May 7, 2009

31 Newly Indentified Critical Cyber Assets ●The Standards Drafting Team sought input:  Should the New Critical Cyber Asset implementation pan be incorporated into the CIP standards or retained as a separate document?  To incorporate into the CIP standards: New requirement in CIP-002 to classify newly identified Critical Cyber Assets and other Cyber Assets within the ESP. Milestone timeframes for each standard requirement incorporated into the Compliance section of each standard. Table 4 of the Version 1 Implementation Plan would also be incorporated into the standards. RSC May 7, 2009

32 Technical Feasibility ●Determined to be a compliance issue. ●Based on existing “Self-report of non-compliance with mitigation plan” process in existing compliance program ●Will be incorporated into the NERC Rules of Procedure. ●An “exception” not an “exemption” ●Will be posted for industry comment ●White paper will likely not be posted as originally planned. RSC May 7, 2009

33 Technical Feasibility ●Requires an explanation / justification for claiming a technical feasibility exception, along with mitigations ●Only allowed where specifically allowed in the standards – currently under discussion. May need to issue additional quick revisions to standards to clarify. ●Requires Regional and ERO approval ●ERO must file an annual report to FERC assessing the combined effects of all technical feasibility exceptions taken to the standards RSC May 7, 2009

34 Standards Development Activity ●Phase 1 (Version 2 standards) approved April by a quorum of 94.37% with 88.32% voting to approve. ●Remaining Phase I dates (tentative):  BoT Review: April 28 – May 28, 2009  BoT Approval: around May 29, 2009  Submit to Regulators: by June 30, 2009 ●Phase II  Considering Risk Management Framework. RSC May 7, 2009

Date RSC May 7, 2009 Questions?