ABB Grid automation, Steven Kunsman, September 26, 2018

Slides:



Advertisements
Similar presentations
Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
Advertisements

Cyber Security in Implementing Modern Grid Automation Systems Vijayan SR CIGRE SC D2 Tutorials & Colloquium on SMART GRID Mysore, 13 – 15 November 2013.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Stephen S. Yau CSE , Fall Security Strategies.
Standards for Shared ICT Jeju, 13 – 16 May 2013 Gale Lightfoot Senior Staff Program Manager, Office of the CTO, SPB Cisco ATIS Cybersecurity Standards.
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
K E M A, I N C. NERC Cyber Security Standards and August 14 th Blackout Implications OSI PI User Group April 20, 2004 Joe Weiss
Lessons Learned in Smart Grid Cyber Security
Jeju, 13 – 16 May 2013Standards for Shared ICT CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION Eric Barnhart, Fellow.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
DOCUMENT #:GSC15-PLEN-53 FOR:Presentation SOURCE:ETSI AGENDA ITEM:PLEN 6.11 CONTACT(S):Emmanuel Darmois, Board Member Marylin Arndt, TC M2M chair Smart.
1 © 2003 Cisco Systems, Inc. All rights reserved. CIAG-HLS Security For Infrastructure Protection: Public-Private Partnerships KEN WATSON 15 OCT.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Doc.: IEEE /0047r1 Submission SGIP Liaison Report to IEEE Following the SGIP (2.0) Inaugural Conference Nov 5-7, 2013 Date:
Control Systems Security Working Group Report CIPC Meeting Denver, CO September 2005 Tom Flowers Public Release.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Status Report for Critical Infrastructure Protection Advisory Group
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
ISA–The Instrumentation, Systems, and Automation Society ISA SP-99 Introduction: Manufacturing and Control Systems Security -- Kickoff Meeting Call to.
ENISA efforts for securing European Internet Infrastructure
CIP 2015 Smart Grid Vulnerability Assessment Using National Testbed Networks IHAB DARWISHOBINNA IGBETAREQ SAADAWI.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
IS3220 Information Technology Infrastructure Security
Information Security tools for records managers Frank Rankin.
Standards Certification Education & Training Publishing Conferences & Exhibits ISA Standards for Automation An Overview.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
A Layered Solution to Cybersecurity Dr. Erfan Ibrahim Cyber-Physical Systems Security & Resilience Center National Renewable Energy Laboratory.
Advancing National Wireless Capability Date: March 22, 2016 Wireless Test Bed & Wireless National User Facility Paul Titus Department Manager, Communications.
Standards Certification Education & Training Publishing Conferences & Exhibits 1 Copyright © ISA, All Rights reserved ISA99 - Industrial Automation and.
Principles Identified - UK DfT -
Smart Grid cyber security within IEC TC57 WG15
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
Ken Watson 9 Sep 2003 Critical Infrastructure Assurance: Business Case for Public-Private Partnership Ken Watson 9 Sep 2003
Agenda Control systems defined
Vertical Applications TAG
Smart Grid Interoperability Standards
IS4550 Security Policies and Implementation
ABB Grid automation, Steven Kunsman, March 21, 2018
Frances Cleveland Convenor WG15
Glenn Parsons, GTSC-9 Chair, ISACC
Cyber-security and IEC International Standards
CIPC Relationships & Roles
Vertical Applications TAG
Cybersecurity at PJM Jonathon Monken
Karen Bartleson, President, IEEE Standards Association
Sukumara T, Janne S, Kishan SG, Harish G, Eashwar / Presented to CIGRE Colloquium, Mysore, Cyber Security - Secure communication design for.
Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Smart Grid Overview] Date Submitted: [13.
NERC Critical Infrastructure Protection Advisory Group (CIP AG)
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Vertical Applications TAG
Smart Grid cyber security within IEC TC57 WG15
How to Mitigate the Consequences What are the Countermeasures?
Control Systems Security Working Group Report
Enabling Interoperability for the Utility Enterprise
Group Meeting Ming Hong Tsai Date :
Larry Bugh ECAR Standard Drafting Team Chair June 1, 2005
Reinhard Scholl, GTSC-7 Chairman
Roger Marks (Huawei) capable 12 March 2019
ISA Standards for Industrial Automation An Overview
Cybersecurity at PJM Jonathon Monken
Roger Marks (Huawei) capable 15 May 2019
Roger Marks (Huawei) capable 15 July 2019
Roger Marks (Huawei) capable 18 July 2019
Glenn Parsons, GTSC-9 Chair, ISACC
Energy Storage & Cyber Security
Roger Marks (Huawei) capable 16 September 2019
OU BATTLECARD: Oracle Utilities Learning Subscription
Presentation transcript:

ABB Grid automation, Steven Kunsman, September 26, 2018 What are the current best practices in designing, implementing, and evolving our defenses and responses? Energy Policy Roundtable in the PJM Footprint Emerging Industry Best Practices on Cybersecurity in the Utility Industry Panel Session

Why Digitalize Substations Why Digitalize Substations? Replacing 1000’s copper wires with a few communications fiber Digitalization Benefits Improved safety Improved reliability Improved resiliency Reduced CAPEX Reduced OPEX Reduced footprint Information availability System self-supervised Ethernet in the switchyard Risk or benefit?

Digitalization Enables Asset Performance Management Real time information flow for continuous risk-based optimization Expert models Statistical models Continuous optimization and improvement Advanced operational business intelligence Enterprise asset and work management

Business Challenge: The Ultimate Goal Balancing Reliability and Cybersecurity Critical Infrastructure Protection (CIP) Power System Reliability Reliability Cybersecurity Digitalization Infrastructure Safe & Secure delivery of Reliable Power Air gap is not a solution Information flow critical for today / tomorrow’s successful grid management Let’s not forget: The “R” in NERC stands for Reliability!

Growing Cybersecurity Threats Maintenance Center Network Control Center Network disturbance, malware, Cyber attacks Unauthorized access and attacks Attacks on utilities Ukraine I – Dec 2015 (Sandworm) Spear phishing, BlackEnergy, KillDisk Ukraine II – Dec 2016 (Electrum) Industroyer/CrashOverride Challenge: Information Sharing Incident response / forensics Collaboration between agencies, utilities and manufacturers essential Computer HMI GPS Time Server Engineering Workstation Router Unauthorized Person Firewall VPN Gateway SYS600C SYS600C Infected Mobile data storage USB Station LAN Data storm by a Faulty Device IEC 61850 / Station bus Infected Notebook Unauthorized Person Electronic Security perimeter Physical Security perimeter E-ISAC-SANS Report on Ukraine I E-ISAC-SANS Report on Ukraine II

Understanding cybersecurity standards and regulations The most relevant technical standards NISTIR 7628 - Smart Grid Cyber Security Strategy and Requirements IEEE C37.240 - Cybersecurity Requirements for Power System Automation, Protection and Control Systems IEEE 1686 - Standard for Intelligent Electronic Devices (IEDs)Cybersecurity Capabilities IEEE 1711.2 - Trial-Use Standard for Secure SCADA Communications Protocol (SSCP) IEC 62351 – Power systems management and associated information exchange - Data and communication security NERC CIP – Security regulation for North American power utilities ISO/IEC 27001 – information security management processes ISA S99/IEC 62443 – Industrial Automation and Control System Security Critical Infrastructure Cyber Community (aka “C Cubed”) Voluntary Program – based on Executive Order (EO) 13636: Improving Critical Infrastructure Cybersecurity and released Presidential Policy Directive (PPD)-21: Critical Infrastructure Security and Resilience https://www.dhs.gov/ccubedvp 6

Applicability of cybersecurity standards and regulations Building Cybersecurity Defense-in-Depth IEEE C37.240 IEC 62443 NERC CIP IEEE 1711.2 IEC 62351 IEEE 1686 Performance based Standard Technical Standards

Improving cybersecurity posture Holistic and collaborative approach Cybersecurity is an integral part of every: Product lifecycle from early design and development, validation to maintenance and support services Project lifecycle ensuring delivery of solutions with the appropriate security measures as well as secure execution including in sensitive project information System/Solution lifecycle supporting efforts to operate and maintain solutions’ security including vulnerability response and patch management Vendor-Utility-Government strong collaborations: Working closely on awareness “Replacing Fear with Knowledge” Partnerships with government organizations, industry partners and academia Actively engaging industry standards e.g. IEEE 1686 & IEEE C37.240 Incident response information sharing and expert engagement Cybersecurity must be “baked in” not “bolted on”!

IEEE PES Power Systems Communication and Cybersecurity (PSCC) Cybersecurity Subcommittee (S0) Scope – Newly formed in 2017 Studying and reviewing engineering (including information technology and operation technology), operational, and testing aspects of cybersecurity related to the Electric Power System. Scope includes IEEE cyber security for the entire electric power system Developing and maintaining related standards, recommended practices and guides for such aspects Coordinating with other technical committees, groups, societies and associations as required Preparing and arranging for publication technical reports related to the Subcommittee’s scope Subcommittee Officers Chair: Steven Kunsman Vice-chair: James Bougie Secretary: Farel Becker For additional information contact: steven.a.kunsman@us.abb.com Webpage: http://sites.ieee.org/pes-pscc/cybersecurity-subcommittee-s0/

IEEE PSCC CYBERSECURITY SUBCOMMITTEE S0 Study Group Activity for May 2018 Meeting SG S9: Utility IT-OT Cybersecurity challenges in roles and terminology A core theme from the IEEE Cybersecurity workshop was the utility need for IT and OT collaboration to address cybersecurity differences (culture, application, perspective and terminology) Assess the IT-OT challenge in Utility Cybersecurity roles and create a report to assist in building organizational understanding and collaboration SG S10: Utility & municipality challenges on understanding cybersecurity standards Assess the challenge in utilities & municipalities with limited resources on the applicability and relevance of the cybersecurity standards and create a report to assist summarizing the relevant cybersecurity standards

Director of Product Management and Applications ABB Power Grids Steven A. Kunsman steven.a.kunsman@us.abb.com Director of Product Management and Applications ABB Power Grids Grid Automation, North America   Steve joined ABB Inc. in 1984 and has over 34 years of experience in substation automation, protection and control. He is a graduate of Lafayette College with a BS in electrical engineering and Lehigh University with an MBA concentrated in management of technology. Steve holds 5 patents in the protection and control application area. Industry Involvement IEEE Senior Member IEEE PES PSCC Cybersecurity Subcommittee Chairperson UCA International User Group Executive committee co-chairperson IEC TC57 WG10 member developing IEC 61850 Member of CIGRE US National Committee

IEEE PSCC CYBERSECURITY SUBCOMMITTEE S0 Standard Activity WG S1: 1686 Standard for Intelligent Electronic Devices Cybersecurity Capabilities Scope: The standard defines the functions and features to be provided in intelligent electronic devices (IEDs) to accommodate cybersecurity programs. The standard addresses security regarding the access, operation, configuration, firmware revision and data retrieval from an IED. Confidentiality, integrity and availability of external interfaces of the IED is also addressed. Status: PAR was approved and the WG started the revision of IEEE 1686. WG S2: P1711.1 Serial SCADA Protection Protocol (SSPP) Scope: This standard defines the Substation Serial Protection Protocol (SSPP), a cryptographic protocol to provide integrity, and optional confidentiality, for cyber security of substation serial links. It does not address specific applications or hardware implementations, and is independent of the underlying communications protocol. Status: Draft standard is being finalized and proceed to MEC review. WG vote and proceed to ballot. Proceeding to ballot resolution. WG PAR was extended to Dec 2018. WG S3: P2030.102.1 Standard for Interoperability of IPSEC Utilized within Utility Control Systems Scope: This standard specifies requirements for interoperability of devices utilized within utility control systems which implement the Internet Protocol Security (IPsec) protocol suite within an IPv4 environment. Status: Group reviewing open comments. WG PAR was extended to Dec 2018. WG S4: P1711.2 Trial-Use Standard for Secure SCADA Communications Protocol (SSCP) Scope: This trial use standard defines a cryptographic protocol to provide integrity with optional confidentiality for cyber security of substation serial links. It does not address specific applications or hardware implementations and is independent of the underlying communications protocol. Status: Draft standard is being finalized to proceed for MEC review. WG PAR was extended to Dec 2018.

IEEE PSCC CYBERSECURITY SUBCOMMITTEE S0 Standard/Task Force Activity WG S5: C37.240 Cybersecurity Requirements for Power System Automation, Protection and Control Systems Scope: Revision of IEEE C37.240 to included new technical requirements for power system cyber security. Based on sound engineering practices, requirements can be applied to achieve high levels of cyber security of automation, protection and control systems independent of voltage level or criticality of cyber assets. Status: WG PAR was approved allowing the group to commence. The identified gaps were discussed and assignments made to begin drafting work. TF S6: IoT for connected home - Communication and cybersecurity requirements Scope: To produce a report that describes the different use cases that make use of the Connected Homes concept, presents a security risk analysis and propose requirements for telecommunication (Volume, frequency, speed) and cybersecurity. Guidelines for utilities experts will be listed. Status: Task Force has started work on producing the report. TF S7: Electrical Power System Cyber Device Function Numbers, Acronyms, and Designations Scope: This task force explores the need for and creation of cyber device function numbers, acronyms, and designations for cyber devices and functions used in electrical power systems. This work focuses on identifying and providing a means for documenting enabled cyber related services and cybersecurity functions and measures. Status: TF discussed the concept and creation of the report or standard. TF S8: Testing Power System Cybersecurity Controls Scope: This task force explores the need for and creation of policies and procedures for the testing and commissioning of cybersecurity controls and measures used in electrical power systems. Status: TF discussed the scope and PAR and vote to move to a WG to develop a standard.