DER DATA Security Best Practices

Slides:



Advertisements
Similar presentations
Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
Advertisements

© 2005, QEI Inc. all characteristics subject to change. For clarity purposes, some displays may be simulated. Any trademarks mentioned remain the exclusive.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Network security policy: best practices
VULNERABILITY MANAGEMENT Moving Away from the Compliance Checkbox Towards Continuous Discovery.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
GridWise ® Architecture Council Cyber-Physical System Requirements for Transactive Energy Systems Shawn A. Chandler Maseeh College of Electrical and Computer.
Lessons Learned in Smart Grid Cyber Security
Defense-in-Depth What Is It?
Dell Connected Security Solutions Simplify & unify.
OPSWAT Presentation for XXX Month Date, Year. OPSWAT & ____________ Agenda  Overview of OPSWAT  Multi-scanning with Metascan  Controlling Data Workflow.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Sandra C Security Advisor Energy Dan B Security Advisor Water
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Business Convergence WS#2 Smart Grid Technologies.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Network security Product Group 2 McAfee Network Security Platform.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
IS3220 Information Technology Infrastructure Security
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
ORNL is managed by UT-Battelle for the US Department of Energy Cyber Security Assessment of the SNS ICS Karen S. White 10/18/15.
A Layered Solution to Cybersecurity Dr. Erfan Ibrahim Cyber-Physical Systems Security & Resilience Center National Renewable Energy Laboratory.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Eric Peirano, Ph.D., TECHNOFI, COO
Securing Information Systems
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
BruinTech Vendor Meet & Greet December 3, 2015
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Stop Those Prying Eyes Getting to Your Data
Eric Peirano, Ph.D., TECHNOFI, COO
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Cybersecurity - What’s Next? June 2017
Data Minimization Framework
JU September Stakeholder Engagement Conference Webinar #1
Security Standard: “reasonable security”
and Security Management: ISO 28000
Compliance with hardening standards
Active Cyber Security, OnDemand
^ About the.
(1888 PressRelease) Staying Ahead of Today’s Rapidly Evolving Security Landscape
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Joe, Larry, Josh, Susan, Mary, & Ken
Today’s Risk. Today’s Solutions. Cyber security and
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Industrial Control Systems Security Market to reach $7bn by 2024: Global.
I have many checklists: how do I get started with cyber security?
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Cybersecurity Framework For Cooperative Utilities
NRC Cyber Security Regulatory Overview
Advanced Services Cyber Security 101 © ABB February, | Slide 1.
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Cyber System-Centric Approach To Cyber Security and CIP
How to Mitigate the Consequences What are the Countermeasures?
Cyber Security Culture
AMI Security Roadmap April 13, 2007.
Group Meeting Ming Hong Tsai Date :
Risk Mitigation & Incident Response Week 12
Cybersecurity Framework For Energy Sector
Cyber Security in a Risk Management Framework
IT Management Services Infrastructure Services
CyberSecurity Strategy For Defendable ROI
Presentation transcript:

DER DATA Security Best Practices Energy Policy Roundtable in the PJM footprint March 21st, 2018 Dr. Erfan Ibrahim Founder & CEO The Bit Bazaar LLC erfan@tbbllc.com

Key Questions Addressed in presentation What is data security? How are data security requirements in IT and OT networks different? How do you develop a cybersecurity architecture to protect DER data? What are some steps you can take to improve your cybersecurity posture? What are the differences between systemic security and protocol security? How do you decide how much to spend on DER data security? The Bit Bazaar LLC

What is data security? – 5 Key attributes Confidentiality – Who should have access to the data? Integrity – Is the data that is received the same as the data that was sent? Availability – What percentage of time is the data available over a few minutes, hours or days? Accountability – Can every data transaction be irrefutably attributed to a particular user or system? Reliability - What percentage of time is the data available over weeks, months or years? The Bit Bazaar LLC

How are data security requirements in IT and OT networks different? IT networks have touch points to the Public Internet – OT networks typically do not IT networks protect data with firewalls, network segmentation, anti-virus software and signature based intrusion detection systems – OT networks require protocol savvy intrusion detection systems and in-line blocking tools that are context based (cyber tools require deep domain expertise in OT applications) IT networks can tolerate higher levels of false positives from IDS than OT networks – consequences of blocking OT network data are far more damaging The Bit Bazaar LLC

How do you develop a cybersecurity architecture to protect DER data? Apply sound network hygiene principles Enforce strict role based access control on all utility firewalls facing DER assets Use 255.255.255.252 subnet masking to logically isolate each DER asset in its own subnet Quiet down the network with granular access control lists on routers/switches attached to DER assets Place signature based malware Intrusion Detection Systems fed by taps on critical segments networks where DER technologies are attached Place in-line blocking tools in front of critical DER assets to protect against DoS attacks and insider threats Virtualize DER nodes with firewalled hypervisors, firewalled OS in VM instances and strong username/password security on DER applications The Bit Bazaar LLC

What are some steps you can take to improve your DER security posture What are some steps you can take to improve your DER security posture? – 10 Sequential Tasks Perform a 1-day integrated DoE C2 M2 / NIST CSF cyber governance assessment for your DER infrastructure Implement the missing business process security controls from the assessment using the prioritized action item list that is generated from the assessment tool Perform due diligence on the DER related technologies that are needed to realize certain missing business process security controls from the assessment Author procurement language informed by the technology due diligence The Bit Bazaar LLC

What are some steps you can take to improve your DER security posture What are some steps you can take to improve your DER security posture? – 10 Sequential tasks Ensure that all the DER related technologies selected fit into the overall cybersecurity architecture established for your DER network Check software binaries and source codes of selected DER related technologies for malware, backdoors, call back routines, poor coding techniques and implement appropriate mitigations (commercial tools available) Test the resilience of any DER related software applications selected to data fuzzing and implement appropriate mitigations (commercial tools available) The Bit Bazaar LLC

What are some steps you can take to improve your cybersecurity posture What are some steps you can take to improve your cybersecurity posture? – 10 sequential tasks Perform cyber penetration tests of selected DER related technologies in experimental platforms with actual DER use cases running to identify and mitigate unknown risks Build incremental resilience in DER networks by developing mitigations for the industry documented failure scenarios (from DoE NESCOR study) Train the technical and corporate staff on the moves, adds and changes made to the DER infrastructure in Steps 2-8 The Bit Bazaar LLC

What are the Key differences between systemic security and protocol security to protect ot networks? Protocol security is IT centric and embedded in the OT technologies (i.e. DNP3 – Secure Authentication, Secure ICCP (TASE-2), IEC 62351-3, IEC 62351-4, Smart Energy Profile V2.0) – does not protect against insider threats Systemic Security relies on sound network hygiene principles, intrusion detection systems and in-line blocking tools regardless of the maturity of endpoint security or protocol security – can protect against insider threats Protocol security requirements drive legacy systems to obsolescence rapidly Systemic security protects investments in legacy systems while allowing modern systems to operate seamlessly with a consistent cybersecurity layer across the entire IT/OT infrastructure The Bit Bazaar LLC

How do you decide how much to spend on DER data security? Spending should be commensurate with the risk to corporate and DER infrastructure from data breaches Quantify risk with periodic cyber pen testing of critical DER related applications by third party testers – don’t drink your own Kool Aid when it comes to cyber protection Spend until the vulnerabilities identified in the cyber pen testing have been mitigated Repeat the cyber pen testing process at least annually (every 6 months highly recommended to keep pace with fast emerging cyber threats) The Bit Bazaar LLC

Concluding Remarks DER data security matters because of the growing contribution of electricity from DER There are good ways and ineffective ways to protect DER related data Don’t fall for the security hype of cyber or DER related technology vendors DER data security starts with sound business process security controls, documented business use cases to support operations and a comprehensive cybersecurity architecture to harden systems against known risks and monitor in real time for unknown risks Technology is part of the fulfillment, not the essence of DER data security DER data security is a lot like fishing or agriculture – you can spend tons of money on bait and fertilizer and not catch any fish or grow crops – learn good fishing and farming techniques first before expecting positive results in either endeavor The Bit Bazaar LLC

Q&A Contact: Erfan Ibrahim Founder & CEO The Bit Bazaar LLC erfan@tbbllc.com 925-785-5967 The Bit Bazaar LLC (TBB) is a full-service consulting firm established by Dr. Erfan Ibrahim in San Francisco CA in August 2001 to address the critical needs in digital technology, cybersecurity and resilience for clients in enterprise, technology vendor, service provider, academia, government agencies and not-for-profit organization sectors. Over the past 16 years TBB has served clients such as Wells Fargo, Visa International, Electric Power Research Institute, Echelon, BC Hydro, Scitor Corporation (part of SAIC), Penn State University and DC Systems in a variety of consulting engagements providing advisory services, technology demonstrations and implementations in networking, network management, communications, Smart Grid, cybersecurity and resilience. TBB has a team of 15 seasoned experts in high tech, marketing, finance, networking and security. TBB is based in San Francisco CA with offices in Denver CO and Washington DC.