Cyber Security in Implementing Modern Grid Automation Systems Vijayan SR CIGRE SC D2 Tutorials & Colloquium on SMART GRID Mysore, 13 – 15 November 2013.

Slides:



Advertisements
Similar presentations
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Advertisements

AMI & Grid Data Analytics & Analysis Management Platform Page  1 What does this platform offer? Our tool is a next generation grid management software.
David A. Brown Chief Information Security Officer State of Ohio
Xanthus Consulting International Smart Grid Cyber Security: Support from Power System SCADA and EMS Frances Cleveland
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Lecture 1: Overview modified from slides of Lawrie Brown.
Security Controls – What Works
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Smart Grid Cyber Security Framework
Computer Security: Principles and Practice
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Cyber Threats/Security and System Security of Power Sector Workshop on Crisis & Disaster Management of Power Sector P.K.Agarwal, AGM Power System Operation.
VULNERABILITY MANAGEMENT Moving Away from the Compliance Checkbox Towards Continuous Discovery.
Introduction to Network Defense
K E M A, I N C. Current Status of Cyber Security Issues 2004 Keynote Address Joe Weiss January 20, 2004.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
GridWise ® Architecture Council Cyber-Physical System Requirements for Transactive Energy Systems Shawn A. Chandler Maseeh College of Electrical and Computer.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
SafeZone® patent pending 1 Detect. Inform. Prevent. NERC Physical Security Standards and Guidelines SafeZone® Detect. Inform. Prevent.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Storage Security and Management: Security Framework
K E M A, I N C. NERC Cyber Security Standards and August 14 th Blackout Implications OSI PI User Group April 20, 2004 Joe Weiss
Lessons Learned in Smart Grid Cyber Security
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
FirstEnergy / Jersey Central Power & Light Integrated Distributed Energy Resources (IDER) Joseph Waligorski FirstEnergy Grid-InterOp 2009 Denver, CO November.
Common Information Model and EPRI Smart Grid Research
הקריה למחקר גרעיני - נגב Nuclear Research Center – Negev (NRCN) Society of Electrical and Electronics Engineers in Israel (SEEEI) 2012 Eran Salfati, Amir.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Control Systems Security Working Group Report CIPC Meeting Denver, CO September 2005 Tom Flowers Public Release.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
K E M A, I N C. Ten Steps To Secure Control Systems APPA 2005 Conference Session: Securing SCADA Networks from Cyber Attacks Memphis, TN April 18, 2005.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Business Convergence WS#2 Smart Grid Technologies.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
IEC TC57 WG15 - Security Status & Roadmap, TC57 Plenary, May 2007
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
CIP 2015 Smart Grid Vulnerability Assessment Using National Testbed Networks IHAB DARWISHOBINNA IGBETAREQ SAADAWI.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
© 2014 IBM Corporation Does your Cloud have a Silver Lining ? The adoption of Cloud in Grid Operations of Electric Distribution Utilities Kieran McLoughlin.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
IS3220 Information Technology Infrastructure Security
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
CS457 Introduction to Information Security Systems
OIT Security Operations
Agenda Control systems defined
NERC CIP Implementation – Lessons Learned and Path Forward
I have many checklists: how do I get started with cyber security?
Sukumara T, Janne S, Kishan SG, Harish G, Eashwar / Presented to CIGRE Colloquium, Mysore, Cyber Security - Secure communication design for.
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
How to Mitigate the Consequences What are the Countermeasures?
Control Systems Security Working Group Report
Group Meeting Ming Hong Tsai Date :
Coordinated Security Response
ABB Grid automation, Steven Kunsman, September 26, 2018
Presentation transcript:

Cyber Security in Implementing Modern Grid Automation Systems Vijayan SR CIGRE SC D2 Tutorials & Colloquium on SMART GRID Mysore, 13 – 15 November 2013

Agenda  Introduction  Why Cyber Security ?  Cyber Security Architectures, Features and Solutions  An Overview of Cyber Security Standards  Key Take Away/Summary May 16, 2015 | Slide 2 © ABB Group

Agenda  Introduction  Why Cyber Security ?  Cyber Security Architectures, Features and Solutions  An Overview of Cyber Security Standards  Key Take Away/Summary May 16, 2015 | Slide 3 © ABB Group

May 16, 2015 | Slide 4 Introduction TRADITIONAL GRID INTER-CONNECTED GRID  Hierarchical  Top to bottom approach  Inter-Connected  Injections at various points (DERs)  Customer inclusive

© ABB Group May 16, 2015 | Slide 5 Enhanced Automation  Phasor Measurement and Wide Area Monitoring  Stability Analysis  IP based communications: - IEC based SA systems - IEC 104 based communication to control systems  Demand Side Management and Demand Response  Asset Management/Asset Health Monitoring  Management Tools  Integration of different systems (OT – IT integration) – SCADA, OMS, GIS, Asset Mgmt etc.

© ABB Group May 16, 2015 | Slide 6 Evolution of Substation Automation Systems

© ABB Group May 16, 2015 | Slide 7 Conventional v/s Modern SCADA systems Conventional SCADA SystemsModern SCADA Systems High Sophisticated System (Touch Me Not !!!)Every utility feels the necessity (No more a Luxury) No Remote OperationsPossibilities for Remote operations Closed networkRemote Monitoring, including corporate and external networks Minimal / No external integrationsIncreasing integration between various systems within and outside the organization Communications based on Serial InterfacesIP based communications including the field sub-devices Hierarchical communication between control center, field devices Data / Information exchanges at different levels Hierarchical Grid Connectivity to Inter Connected Grid

Agenda  Introduction  Why Cyber Security ?  Cyber Security Architectures, Features and Solutions  An Overview of Cyber Security Standards  Key Take Away/Summary May 16, 2015 | Slide 8 © ABB Group

May 16, 2015 | Slide 9 Why is Cyber Security an issue?  Cyber security has become an issue by introducing Ethernet (TCP/IP) based communication protocols to industrial automation and control systems. e.g. IEC , DNP 3.0 via TCP/IP or IEC61850  Connections to and from external networks (e.g. office intranet) to industrial automation and control systems have opened systems and can be misused for cyber attacks…….  ……..the interface sometimes is not in utilities control  Implementing Smart Grid Technologies to improve operational efficiencies  Cyber attacks on industrial automation and control systems are real and increasing, leading to large financial losses

© ABB Group May 16, 2015 | Slide 10 Why is Cyber Security an issue? Threats & Vulnerabilities Grid Security Operation Sabotages Data Security (Database & Communication) Communication Interference

© ABB Group May 16, 2015 | Slide 11 Cyber Security Cyber Security - Main Objectives Preventing the unauthorized access to information Preventing the unauthorized modification or theft of information Preventing the denial of service Preventing the denial of an action that took place or the claim of an action that did not take place

Agenda  Introduction  Why Cyber Security ?  Cyber Security Architectures, Features and Solutions  An Overview of Cyber Security Standards  Key Take Away/Summary May 16, 2015 | Slide 12 © ABB Group

May 16, 2015 | Slide 13 © ABB Group Cyber Security – Solution Overview People and Identity Data and Information Application and Process Network, Server and End-Point Physical Infrastructure

May 16, 2015 | Slide 14 © ABB Group Cyber Security – Solution Overview

May 16, 2015 | Slide 15 © ABB Group Cyber Security – Mitigation Techniques  Hardening Insure all hosts run at a minimum level. Only mission critical software, services, ports and devices are allowed.  Access Control Strong authentication and Role Based Access Control (RBAC) is a natural requirement in any security architecture, but is never stronger than the implementation.  Intrusion Detection/Prevention Deploy sensors or agents on all hosts, perform log management of all devices, and use security information and event management (SIEM) to detect and possibly respond to anomalies in the system.  Patch Management Processes and technology to insure that all available security updates that are verified not to interfere with system operation are installed in all hosts.

May 16, 2015 | Slide 16 © ABB Group Cyber Security – Mitigation Techniques (Cont’d)  Anti-Virus Employs blacklist, heuristic, and behavioral detection and prevention of malware.  Application Whitelisting Only allows pre-approved software to execute. Less intrusive than Anti-Virus.  Traffic Whitelisting Only accepts pre-approved traffic through stateful and deep packet inspection.

May 16, 2015 | Slide 17 © ABB Group Cyber Security – Mitigation Techniques Network Partitioning Example  Network Partitioning: Insure cyber assets are isolated, categorized by criticality, external interfaces and physical location.

Agenda  Introduction  Why Cyber Security ?  Cyber Security Architectures, Features and Solutions  An Overview of Cyber Security Standards  Key Take Away/Summary May 16, 2015 | Slide 18 © ABB Group

May 16, 2015 | Slide 19 Cyber Security for Substation Automation Key Cyber-Security initiatives StandardMain FocusStatus NIST SGIP-CSWGSmart Grid Interoperability Panel – Cyber Security Working Group On-going * NERC CIPNERC CIP Cyber Security regulation for North American power utilities Released, On-going * IEC 62351Data and Communications SecurityPartly released, On-going * IEEE PSRC/H13 & SUB/C10 Cyber Security Requirements for Substation Automation, Protection and Control Systems On-going* IEEE 1686IEEE Standard for Substation Intelligent Electronic Devices (IEDs) Cyber Security Capabilities Finalized ISA S99Industrial Automation and Control System SecurityPartly released, On-going *

© ABB Group May 16, 2015 | Slide 20  Graphical representation of scope and completeness of selected standards *) source DTS IEC : Security architecture guidelines Cyber Security for Substation Automation Standards and their scope

© ABB Group May 16, 2015 | Slide 21 Cyber Security for Substation Automation Relevant standards – NERC-CIP CIP Critical Cyber Asset Identification CIP Security Management Controls CIP Personnel and Training CIP Electronic Security Perimeter(s) CIP Physical Security of Critical Cyber Assets CIP Systems Security Management CIP Incident Reporting and Response Planning CIP Recovery Plans for Critical Cyber Asset The North American Electric Reliability Corporation (NERC), provides for critical infrastructure protection (NERC CIP).

© ABB Group May 16, 2015 | Slide 22 Cyber Security for Substation Automation Relevant standards – IEC62351  Explanation  Information security for power system control operations.  Security standards for IEC TC 57 defined protocols, specifically the IEC series, the IEC series, the IEC series, the IEC series, and the IEC series.  Status  Some part approved as Ed1 but not compatible with new draft of Ed2  Recommendation  Wait until standard is fully approved

© ABB Group May 16, 2015 | Slide 23 Cyber Security for Substation Automation Relevant standards – IEEE1686  Explanation  IEEE Standard for Substation Intelligent Electronic Devices (IEDs) Cyber Security Capabilities  The standard defines the functions and features to be provided in substation intelligent electronic devices (IEDs) to accommodate critical infrastructure protection (CIP) programs. The standard addresses security regarding the access, operation, configuration, firmware revision, and data retrieval from an IED.  Status  Approved since 2008

Agenda  Introduction  Why Cyber Security ?  Cyber Security Architectures, Features and Solutions  An Overview of Cyber Security Standards  Key Take Away/Summary May 16, 2015 | Slide 24 © ABB Group

May 16, 2015 | Slide 25 © ABB Group Key Take Away Protect, Detect and Respond The implementation should be able to minimize the attack surface, detect possible attacks and respond in an appropriate manner to minimize the impacts Defense in Depth No single security measure itself is foolproof as vulnerabilities and weaknesses could be identified at any time. In order to reduce these risks, implementing multiple protections in series avoids single point of failure. Technical, Procedural and Managerial measures Technology is insufficient on its own to provide robust protection. Cyber security policies and processes must be implemented in the organization to best be able to assess and mitigate the risks and respond to incidents. Implementing solutions around cyber security has to be a continuous process. It’s not only important to protect a system from the current vulnerabilities, but is also equally important to have mechanisms (technical and process) in place to quickly detect and effectively react to any incidents and isolate security breaches.

© ABB Group May 16, 2015 | Slide 27 Enterprise Application and Data Integration Communication Infrastructure Bidding & Scheduling Planning & Forecasting Trading & Contracts Resource Dispatch Settlements Power Procurement & Market Ops. SCADA EMSDMS DSM Ops.Planning T&D Operations OMS GIS Dist. Mgmt. MDMS CIS Call Center Billing Customer Services System Planning Maint. Mgmt. Asset Mgmt. T&D Planning & Engineering Executive Dashboard Substation Automation Feeder Automation Advanced Metering Infrastructure Inter-Connected Systems

© ABB Group May 16, 2015 | Slide 28 Smart Grid Systems