Presentation is loading. Please wait.

Presentation is loading. Please wait.

Group Meeting Ming Hong Tsai Date : 2011.5.30.

Similar presentations


Presentation on theme: "Group Meeting Ming Hong Tsai Date : 2011.5.30."— Presentation transcript:

1 Group Meeting Ming Hong Tsai Date :

2 Guidelines for Smart Grid Cyber Security

3 Guidelines for Smart Grid Cyber Security: Vol
Guidelines for Smart Grid Cyber Security: Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements The risk assessment process used by the CSWG to identify the high-level security requirements. High-level architecture followed by a sample logical interface reference model used to identify and define 22 logical interface categories within and across 7 commonly accepted Smart Grid domains. High-level security requirements for each of these 22 logical interface categories are then described. The first volume concludes with a discussion of technical cryptographic and key management issues across the scope of Smart Grid systems and devices.

4 Guidelines for Smart Grid Cyber Security:
Vol. 2, Privacy and the Smart Grid Focuses on privacy issues within personal dwellings Recommendations Develop privacy use cases that track data flows containing personal information in order to address and mitigate common privacy risks that exist within business processes Educate consumers and other individuals about the potential privacy risks and what they can do to mitigate these risks

5 Guidelines for Smart Grid Cyber Security:
Vol. 3, Supportive Analyses and References A compilation of supporting analyses and references used to develop the high-level security requirements and other tools and resources presented in the first two volumes. Categories of vulnerabilities defined by the working group Discussion of the bottom-up security analysis that it conducted while developing the guidelines

6 Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements
Volume 1 – Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements – Chapter 1 – Cyber Security Strategy includes background information on the Smart Grid and the importance of cyber security in ensuring the reliability of the grid and the confidentiality of specific information. It also discusses the cyber security strategy for the Smart Grid and the specific tasks within this strategy. – Chapter 2 – Logical Architecture includes a high level diagram that depicts a composite high level view of the actors within each of the Smart Grid domains and includes an overall logical reference model of the Smart Grid, including all the major domains. The chapter also includes individual diagrams for each of the 22 logical interface categories. This architecture focuses on a short-term view (1–3 years) of the Smart Grid. – Chapter 3 – High Level Security Requirements specifies the high level security requirements for the Smart Grid for each of the 22 logical interface categories included in Chapter 2. – Chapter 4 – Cryptography and Key Management identifies technical cryptographic and key management issues across the scope of systems and devices found in the Smart Grid along with potential alternatives. – Appendix A – Crosswalk of Cyber Security Documents – Appendix B – Example Security Technologies and Procedures to Meet the High Level Security Requirements

7 Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements
The Smart Grid risk assessment process is based on existing risk assessment approaches developed by both the private and public sectors Includes identifying assets, vulnerabilities, and threats and specifying impacts to produce an assessment of risk to the Smart Grid and to its domains and subdomains, such as homes and businesses NIST is not prescribing particular solutions through the guidance contained in this report. Each organization must develop its own detailed cyber security approach (including a risk assessment methodology) for the Smart Grid.

8 Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements
The following documents were used in developing the risk assessment methodology for the Smart Grid: SP , DRAFT Managing Risk from Information Systems: An Organizational Perspective, NIST, April 2008; SP , Risk Management Guide for Information Technology Systems, NIST, July 2002; Federal Information Processing Standard (FIPS) 200, Minimum Security Requirements for Federal Information and Information Systems, NIST, March 2006; FIPS 199, Standards for Security Categorization of Federal Information and Information Systems, NIST, February 2004; Security Guidelines for the Electricity Sector: Vulnerability and Risk Assessment, North American Electric Reliability Corporation (NERC), 2002; The National Infrastructure Protection Plan, Partnering to enhance protection and resiliency, Department of Homeland Security, 2009; The IT, telecommunications, and energy sector-specific plans (SSPs), initially publishedin 2007 and updated annually; ANSI/ISA , Security for Industrial Automation and Control Systems: Concepts, Terminology and Models, International Society of Automation (ISA), 2007; and ANSI/ISA , Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program, ISA, January 2009.

9 Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements

10 Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements
Task 2. Performance of a risk assessment Vulnerability classes Overall Analysis Bottom-up analysis Top-down analysis

11 Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements
Task 3. Specification of high-level security requirements. The CSWG used three source documents for the cyber security requirements in this report: NIST SP , Revision 3, Recommended Security Controls for Federal Information Systems and Organizations, August 2009; NERC CIP 002, , version 3; and Catalog of Control Systems Security: Recommendations for Standards Developers, Department of Homeland Security, March 2010. These security requirements were then modified for the Smart Grid. To assist in assessing and selecting the requirements, a cross-reference matrix was developed. This matrix, Appendix B, maps the Smart Grid security requirements in this report to the security requirements in SP , The DHS Catalog, and the NERC CIPs.

12 Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements
1.4 OUTSTANDING ISSUES AND REMAINING TASKS Additional Cyber Security Strategy Areas Combined cyber-physical attacks Future Research and Development (R&D) Topics Synchrophasor Security / NASPInet; Anonymization; Use of IPv6 in large scale real time control systems; Behavioral Economics/Privacy; Cross-Domain security involving IT, Power, and Transportation systems; and Remote Disablement/Switch of Energy Sources. Future Cryptography and Key Management Areas Smart Grid adapted PKI: exploration of how to adapt PKI systems for the grid and its various operational and device/system requirements. Secure and trusted device profiles: development of a roadmap of different levels of hardware based security functionality that is appropriate for various types of Smart Grid devices. Applicable standards: identification and discussion of existing standards that can be used or adapted to meet the cryptography and key management requirements or solve the problems that have been identified. Certificate Lifetime: future work should be done to ensure that appropriate guidelines and best practices are established for the Smart Grid community. Future Privacy Areas Roadmap for Vulnerability Classes

13 Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements
THE SEVEN DOMAINS TO THE LOGICAL REFERENCE MODEL

14 Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements
THE SEVEN DOMAINS TO THE LOGICAL REFERENCE MODEL

15 Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements
THE SEVEN DOMAINS TO THE LOGICAL REFERENCE MODEL


Download ppt "Group Meeting Ming Hong Tsai Date : 2011.5.30."

Similar presentations


Ads by Google