Group Meeting Ming Hong Tsai Date : 2011.5.30.

Slides:



Advertisements
Similar presentations
Minnesota Port and Waterway Security Working Group Meeting April 12, 2012.
Advertisements

NERC Critical Infrastructure Protection Advisory Group (CIP AG) Electric Industry Initiatives Reducing Vulnerability To Terrorism.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholde r to insert your own image. Cybersecurity.
15June’061 NASA PKI and the Federal Environment 13th Fed-Ed PKI Meeting 15 June ‘06 Presenter: Tice DeYoung.
1 NIST, FIPS, and you... Bob Grill Medi-Cal ISO July 16, 2009.
Proposed Maturity Model for
National Infrastructure Protection Plan
Cyber Security and the Smart Grid George W. Arnold, Eng.Sc.D. National Institute of Standards and Technology (NIST) U.S. Department of Commerce
Cyber Security Working Group March 17, Smart Grid Cyber Security Strategy Establishment of a Cyber Security Coordination Task Group (CSCTG) Established.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
National Institute of Standards and Technology 1 NIST Guidance and Standards on System Level Information Security Management Dr. Alicia Clay Deputy Chief.
Security Controls – What Works
Advanced Metering Infrastructure AMI Security Roadmap April 13, 2007.
Dr. Ron Ross Computer Security Division
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
Complying With The Federal Information Security Act (FISMA)
Cyber Security for Smart Grid George Gamble Cyber Security Architect Black & Veatch.
Don Von Dollen Senior Program Manager, Data Integration & Communications Grid Interop December 4, 2012 A Utility Standards and Technology Adoption Framework.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
IT Security Requirements Under the HITECH Act RA for MU and Continuous Monitoring Lisa Broome, RPMS ISSO.
Nuclear Power Plant/Electric Grid Regulatory Coordination and Cooperation - ERO Perspective David R. Nevius and Michael J. Assante 2009 NRC Regulatory.
1 Information System Security Assurance Architecture A Proposed IEEE Standard for Managing Enterprise Risk February 7, 2005 Dr. Ron Ross Computer Security.
NIST Special Publication Revision 1
Frankfurt (Germany), 6-9 June 2011 IT COMPLIANCE IN SMART GRIDS Martin Schaefer – Sweden – Session 6 – 0210.
Doc.: IEEE /0047r1 Submission SGIP Liaison Report to IEEE Following the SGIP (2.0) Inaugural Conference Nov 5-7, 2013 Date:
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Integrated Enterprise-wide Risk Management Protecting Critical Information Assets and Records FIRM Forum.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
The Value of Common Criteria Evaluations Stuart Katzke, Ph.D. Senior Research Scientist National Institute of Standards & Technology 100 Bureau Drive;
Lecture 31 Risk Management. Introduction Information security departments are created primarily to manage IT risk Managing risk is one of the key responsibilities.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
Project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Business Convergence WS#2 Smart Grid Technologies.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
NIST / URAC / WEDi Health Care Security Workgroup Presented by: Andrew Melczer, Ph.D. Illinois State Medical Society.
CIP 2015 Smart Grid Vulnerability Assessment Using National Testbed Networks IHAB DARWISHOBINNA IGBETAREQ SAADAWI.
ISPE Cyber Security S99 Update December 08, 2009.
International Speedway Boulevard Stakeholders Task Force (STF) Meeting 1 Wednesday, May 19, 2010.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
The NIST Special Publications for Security Management By: Waylon Coulter.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
© ITT Educational Services, Inc. All rights reserved. IS4680 Security Auditing for Compliance Unit 1 Information Security Compliance.
Security and resilience for Smart Hospitals Key findings
Aaron Clark-Ginsberg and Rebecca Slayton
Computer Security Division Information Technology Laboratory
Iowa Communications Alliance
JU September Stakeholder Engagement Conference Webinar #1
Monitoring and Evaluation Systems for NARS organizations in Papua New Guinea Day 4. Session 12. Risk Management.
SG Security – Key Accomplishments
UK Link Programme Update to PNUNC August 13th, 2013
TIA M2M Standards Update TR-50 Smart Device Communications
NIST Cybersecurity Framework
The Open Group Architecture Framework (TOGAF)
Smart Grid Interoperability Standards
Matthew Christian Dave Maddox Tim Toennies
Cyber Security Fingerprint Secure systems, protect production
America’s First National Critical Infrastructure Exercise
Understanding Existing Standards:
CIPC Relationships & Roles
David Sayago EU Research Funding Team Valorisation Centre.
NERC Critical Infrastructure Protection Advisory Group (CIP AG)
Continuity Guidance Circular Webinar
Final Conference in Paris WP6 – Protection Profiles Specification
Cybersecurity ATD technical
AMI Security Roadmap April 13, 2007.
Vijay Rachamadugu and David Snyder September 7, 2006
UPDATE: Physical Security Guideline
WEQ-012 PKI Overview March 19, 2019
TIA TR-50 M2M-Smart Device Communications
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Energy Storage & Cyber Security
Presentation transcript:

Group Meeting Ming Hong Tsai Date : 2011.5.30

Guidelines for Smart Grid Cyber Security

Guidelines for Smart Grid Cyber Security: Vol Guidelines for Smart Grid Cyber Security: Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements The risk assessment process used by the CSWG to identify the high-level security requirements. High-level architecture followed by a sample logical interface reference model used to identify and define 22 logical interface categories within and across 7 commonly accepted Smart Grid domains. High-level security requirements for each of these 22 logical interface categories are then described. The first volume concludes with a discussion of technical cryptographic and key management issues across the scope of Smart Grid systems and devices.

Guidelines for Smart Grid Cyber Security: Vol. 2, Privacy and the Smart Grid Focuses on privacy issues within personal dwellings Recommendations Develop privacy use cases that track data flows containing personal information in order to address and mitigate common privacy risks that exist within business processes Educate consumers and other individuals about the potential privacy risks and what they can do to mitigate these risks

Guidelines for Smart Grid Cyber Security: Vol. 3, Supportive Analyses and References A compilation of supporting analyses and references used to develop the high-level security requirements and other tools and resources presented in the first two volumes. Categories of vulnerabilities defined by the working group Discussion of the bottom-up security analysis that it conducted while developing the guidelines

Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements Volume 1 – Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements – Chapter 1 – Cyber Security Strategy includes background information on the Smart Grid and the importance of cyber security in ensuring the reliability of the grid and the confidentiality of specific information. It also discusses the cyber security strategy for the Smart Grid and the specific tasks within this strategy. – Chapter 2 – Logical Architecture includes a high level diagram that depicts a composite high level view of the actors within each of the Smart Grid domains and includes an overall logical reference model of the Smart Grid, including all the major domains. The chapter also includes individual diagrams for each of the 22 logical interface categories. This architecture focuses on a short-term view (1–3 years) of the Smart Grid. – Chapter 3 – High Level Security Requirements specifies the high level security requirements for the Smart Grid for each of the 22 logical interface categories included in Chapter 2. – Chapter 4 – Cryptography and Key Management identifies technical cryptographic and key management issues across the scope of systems and devices found in the Smart Grid along with potential alternatives. – Appendix A – Crosswalk of Cyber Security Documents – Appendix B – Example Security Technologies and Procedures to Meet the High Level Security Requirements

Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements The Smart Grid risk assessment process is based on existing risk assessment approaches developed by both the private and public sectors Includes identifying assets, vulnerabilities, and threats and specifying impacts to produce an assessment of risk to the Smart Grid and to its domains and subdomains, such as homes and businesses NIST is not prescribing particular solutions through the guidance contained in this report. Each organization must develop its own detailed cyber security approach (including a risk assessment methodology) for the Smart Grid.

Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements The following documents were used in developing the risk assessment methodology for the Smart Grid: SP 800-39, DRAFT Managing Risk from Information Systems: An Organizational Perspective, NIST, April 2008; SP 800-30, Risk Management Guide for Information Technology Systems, NIST, July 2002; Federal Information Processing Standard (FIPS) 200, Minimum Security Requirements for Federal Information and Information Systems, NIST, March 2006; FIPS 199, Standards for Security Categorization of Federal Information and Information Systems, NIST, February 2004; Security Guidelines for the Electricity Sector: Vulnerability and Risk Assessment, North American Electric Reliability Corporation (NERC), 2002; The National Infrastructure Protection Plan, Partnering to enhance protection and resiliency, Department of Homeland Security, 2009; The IT, telecommunications, and energy sector-specific plans (SSPs), initially publishedin 2007 and updated annually; ANSI/ISA-99.00.01-2007, Security for Industrial Automation and Control Systems: Concepts, Terminology and Models, International Society of Automation (ISA), 2007; and ANSI/ISA-99.02.01-2009, Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program, ISA, January 2009.

Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements

Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements Task 2. Performance of a risk assessment Vulnerability classes Overall Analysis Bottom-up analysis Top-down analysis

Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements Task 3. Specification of high-level security requirements. The CSWG used three source documents for the cyber security requirements in this report: NIST SP 800-53, Revision 3, Recommended Security Controls for Federal Information Systems and Organizations, August 2009; NERC CIP 002, 003-009, version 3; and Catalog of Control Systems Security: Recommendations for Standards Developers, Department of Homeland Security, March 2010. These security requirements were then modified for the Smart Grid. To assist in assessing and selecting the requirements, a cross-reference matrix was developed. This matrix, Appendix B, maps the Smart Grid security requirements in this report to the security requirements in SP 800-53, The DHS Catalog, and the NERC CIPs.

Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements 1.4 OUTSTANDING ISSUES AND REMAINING TASKS 1.4.1 Additional Cyber Security Strategy Areas Combined cyber-physical attacks 1.4.2 Future Research and Development (R&D) Topics Synchrophasor Security / NASPInet; Anonymization; Use of IPv6 in large scale real time control systems; Behavioral Economics/Privacy; Cross-Domain security involving IT, Power, and Transportation systems; and Remote Disablement/Switch of Energy Sources. 1.4.3 Future Cryptography and Key Management Areas Smart Grid adapted PKI: exploration of how to adapt PKI systems for the grid and its various operational and device/system requirements. Secure and trusted device profiles: development of a roadmap of different levels of hardware based security functionality that is appropriate for various types of Smart Grid devices. Applicable standards: identification and discussion of existing standards that can be used or adapted to meet the cryptography and key management requirements or solve the problems that have been identified. Certificate Lifetime: future work should be done to ensure that appropriate guidelines and best practices are established for the Smart Grid community. 1.4.4 Future Privacy Areas 1.4.5 Roadmap for Vulnerability Classes

Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements 2.1 THE SEVEN DOMAINS TO THE LOGICAL REFERENCE MODEL

Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements 2.1 THE SEVEN DOMAINS TO THE LOGICAL REFERENCE MODEL

Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements 2.1 THE SEVEN DOMAINS TO THE LOGICAL REFERENCE MODEL