TC 57 IEC TC57 WG15 - Security Status & Roadmap, July 2008 Frances Cleveland Convenor WG15.

Slides:



Advertisements
Similar presentations
The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Advertisements

U M T S F o r u m © UMTS 2002 UMTS Security aspects UMTS Forum ICTG Chair Bosco Fernandes Siemens AG
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Join Us Now at: Enabling Interoperability for the Utility Enterprise And TESTING.
Geneva, Switzerland, September 2014 Smart Grid cyber security within IEC TC57 WG15 Fernando Alvarez, Cyber Security Technical PM ABB Switzerland.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Protection of Information Assets I. Joko Dewanto 1.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Xanthus Consulting International Smart Grid Cyber Security: Support from Power System SCADA and EMS Frances Cleveland
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Cyber Security in Implementing Modern Grid Automation Systems Vijayan SR CIGRE SC D2 Tutorials & Colloquium on SMART GRID Mysore, 13 – 15 November 2013.
Smart The Grid Plenary Panel: Smart Grid Interim Roadmap Draft and Processes Joe Hughes, EPRI Erich Gunther, Enernex Frances Cleveland, Xanthus Consulting.
Chapter 1 – Introduction
Information Security Policies and Standards
Security+ Guide to Network Security Fundamentals
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
IS Network and Telecommunications Risks
1 An Overview of Computer Security computer security.
6/9/2015Madhumita. Chatterjee1 Overview of Computer Security.
Applied Cryptography for Network Security
E-Commerce Security and Fraud Issues and Protections
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Stephen S. Yau CSE , Fall Security Strategies.
Web services security I
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Securing Information Systems
Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 張耕瑋 黃峻亨 楊銘鴻 李昌諭 吳政穎 陳建廷.
Storage Security and Management: Security Framework
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
K E M A, I N C. NERC Cyber Security Standards and August 14 th Blackout Implications OSI PI User Group April 20, 2004 Joe Weiss
Cryptography and Network Security
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Federal Aviation Administration Federal Aviation Administration 1 Presentation to: Name: Date: Federal Aviation Administration AMHS Security Security Sub-Group.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Standard: Comparison and Security Jason Gibson TCM471 Professor Crum.
IEC TC57 WG15 - Security Status & Roadmap, TC57 Plenary, May 2007
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
CIP 2015 Smart Grid Vulnerability Assessment Using National Testbed Networks IHAB DARWISHOBINNA IGBETAREQ SAADAWI.
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
Lecture 24 Wireless Network Security
Scott Charney Cybercrime and Risk Management PwC.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
IS3220 Information Technology Infrastructure Security
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Information Security tools for records managers Frank Rankin.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
ISSeG Integrated Site Security for Grids WP2 - Methodology
Working at a Small-to-Medium Business or ISP – Chapter 8
Lecture 5. Security Threats
Chapter 17 Risks, Security and Disaster Recovery
Frances Cleveland Convenor WG15
IS4680 Security Auditing for Compliance
برنامج أمن أنظمة الحاسب
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

TC 57 IEC TC57 WG15 - Security Status & Roadmap, July 2008 Frances Cleveland Convenor WG15

TC 57 WG15 Status October Topics  Scope of WG15  Current Status  Roadmap of Future Work

TC 57 WG15 Status October Scope of WG15 on Security  Undertake the development of standards for security of the communication protocols defined by the IEC TC 57, specifically the IEC series, the IEC series, the IEC series, the IEC series, and the IEC series.  Undertake the development of standards and/or technical reports on end-to-end security issues.

TC 57 WG15 Status October Security Functions vs. Threats Unauthorized Access to Information Unauthorized Modification or Theft of Information Denial of Service or Prevention of Authorized Access Denial of Action that took place, or Claim of Action that did not take place Resource Exhaustion Integrity Violation Planted in System Virus/Worms Trojan Horse Trapdoor Service Spoofing Stolen/Altered Eavesdropping Traffic Analysis EM/RF Interception Indiscretions by Personnel Media Scavenging Listening After-the-Fact Denial of Service Interactions Masquerade Bypassing Controls Authorization Violation Physical Intrusion Man-in-the-Middle Integrity Violation Theft Replay Intercept/Alter Repudiation Modification Repudiation - Actively Being Addressed - Desired Confidentiality IntegrityAvailability Non-Repudiation

Security Functions, Threats, and WG15 Work Pattern Unauthorized Modification or Theft of Information Integrity Unauthorized Access to Information Confidentiality Denial of Service or Prevention of Authorized Access Availability Denial of Action that took place, or Claim of Action that did not take place Non-Repudiation Corporate Security Policy and Management Cigre, Utilities Security Management Security Testing, Monitoring, Change Control, and Updating Security Compliance Reporting Security Risk Assessment of Assets Security Policy Exchange Security Attack Litigation During-Attack Coping and Post-Attack Recovery Security Incident and Vulnerability Reporting Firewalls with Access Control Lists (ACL) Intrusion Detection Systems (IDS) Audit Logging Anti-Virus/ Spy-ware IEC62351 Security for TASE.2, DNP, Public Key Infrastructure (PKI) Transport Level Security (TLS) Virtual Private Network (VPN) AGA 12-1 “bump- in-the-wire” WPA2/80211.i for wireless Digital Signatures CRC Symmetric and Asymmetric Encryption (AES, DES) Network and System Management (NSM) Credential Establishment, Conversion, and Renewal CertificatesPasswords Authentication Data Backup Identity Establishment, Quality, and Mapping Role-Based Access Control Certificate and Key Management Tele- comm Being Addressed by many other bodies New Work

TC 57 WG15 Status October IEC Part 1: Introduction Mapping of TC57 Communication Standards to IEC Security Standards IEC Part 2: Glossary IEC Part 3: Profiles Including TCP/IP IEC Part 4: Profiles Including MMS IEC Part 5: IEC & Derivatives IEC Part 6: IEC IEC TASE.2 IEC & DNP3 IEC & Serial DNP IEC GOOSE, GSE, SMV IEC over MMS IEC Part 7: MIBs for Network Management

TC 57 WG15 Status October  IEC 62351: Data and Communications Security  Part 1:Introduction  Part 2:Glossary  Part 3:Security for profiles including TCP/IP  Part 4:Security for profiles including MMS  Part 5:Security for IEC and derivatives  Part 6:Security for IEC profiles  Part 7:Objects for Network Management Status of Security Documents, May 2007 Submitted as Technical Specifications in Dec 2006, being finalized by IEC Submitted as DTS ver 2 January Comments being awaited Issued as CD, (NWIP)

TC 57 WG15 Status October For increased power system reliability and security in the future, the two closely intertwined infrastructures must be designed, implemented, and managed as a whole … Central Generating Plant Step-Up Transformer Distribution Substation Transmission Substation Distribution Substation Distribution Substation Commercial Industrial Commercial Gas Turbine Diesel Engine Cogeneration Diesel Engine Fuel cell Micro- turbine Wind Residential Photo voltaics Batteries Data Concentrator Control Center Operators, Engineers, & Other Users 2. Information Infrastructure 1.Power System Infrastructure

TC 57 WG15 Status October Security Monitoring Architecture Using NSM

TC 57 WG15 Status October NERC’s Top Ten Vulnerabilities for Control Systems 1. Inadequate policies, procedures, and culture that govern control system security. 2. Inadequately designed control system networks that lack sufficient defense-in-depth mechanisms. 3. Remote access to the control system without appropriate access control. 4. System administration mechanisms and software used in control systems are not adequately scrutinized or maintained. 5. Use of inadequately secured WiFi wireless communication for control. 6. Use of a non-dedicated communications channel for command and control and/or inappropriate use of control system network bandwidth for non-control purposes. 7. Insufficient application of tools to detect and report on anomalous or inappropriate activity. 8. Unauthorized or inappropriate applications or devices on control system networks. 9. Control systems command and control data not authenticated. 10. Inadequately managed, designed, or implemented critical support infrastructure

TC 57 WG15 Status October Format of Normative Clauses of Part 7 – Using Naming and Style

TC 57 WG15 Status October TC57 Security (62351) Roadmap As of July 2008 Current WorkNWIPs to be IssuedOn-Going Coordination Parts 1, 3, 4, 6 – Finalized as TS Standards Party 2: Glossary – CDV Part 5: Security for IEC Protocols – CDV Part 7: Network and System Management /MIBs as CD Part 8: Role-Based Access Control Activities by 2008To be issued 2008Current and Future Remote Changing of Update Keys for IEC Implementation Specification for IEC Conformance testing and interoperability testing Security for Access to CIM (Interfaces and RBAC) Security Architecture IEC TC65C WG10 ISA, CIGRE D2.22 EPRI,NERC, PCSF National Labs IEEE PSRC IEEE Security P1711, P1686, P1689 TC57 WG03 TC57 WG07?

TC 57 WG15 Status October Role-Based Access Control  The scope of the proposed work is to define a specification for the use of Role Based Access Control not only in field devices but also for a whole system, consisting of field devices, station control and network control – the complete pyramid, in order to support end to end security. The specification will refer to the standards IEC CIM, IEC and IEC and also to ANSI INCITS