Cyber Security A Program to Meet NERC CIP Requirements May 17, 2010 Rick Dakin Coalfire systems CEO and Co-founder.

Slides:



Advertisements
Similar presentations
Federal Energy Regulatory Commission July Cyber Security and Reliability Standards Regis F. Binder Director, Division of Logistics & Security Federal.
Advertisements

HIPAA Security Rule Overview and Compliance Program Presented by: Lennox Ramkissoon, CISSP The People’s Hospital HIPAA Security Manager The Hospital June.
David A. Brown Chief Information Security Officer State of Ohio
WebCast 5 May 2003 NERC Cyber Security Standard Overview of Proposed Cyber Security Standard.
Cyber Security 2005 ERCOT COMPLIANCE ROLLOUT Lane Robinson Reliability Analyst.
Cyber Security Plan Implementation Presentation to CMBG Glen Frix, Duke Energy June 20,
© 2005, QEI Inc. all characteristics subject to change. For clarity purposes, some displays may be simulated. Any trademarks mentioned remain the exclusive.
Colorado Cyber Security Program (CCSP) Risk Based Gap Analysis (RBGA) and Statewide Security Planning Update Rick Dakin, Security Strategist September.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
BS Information Systems – University of Redlands BS Information Systems – University of Redlands AS Electronic Technology AS Electronic Technology Project.
Security Controls – What Works
Information Security Policies and Standards
University of Alaska System and UAF Information Technology Security Review 2007.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
Jeffery J. Gust IOWA INDUSTRIAL ENERGY GROUP FALL CONFERENCE Tuesday, October 14, 2014 MidAmerican Energy Company.
Patch Management Strategy
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
INFORMATION SECURITY REGULATION COMPLIANCE By Insert name dd/mm/yyyy senior leadership training on the primary regulatory requirements,
K E M A, I N C. NERC Cyber Security Standards and August 14 th Blackout Implications OSI PI User Group April 20, 2004 Joe Weiss
Lisa Wood, CISA, CBRM, CBRA Compliance Auditor, Cyber Security
Lessons Learned in Smart Grid Cyber Security
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Federal Energy Regulatory Commission June Cyber Security and Reliability Standards Regis F. Binder Director, Division of Logistics & Security Federal.
Nuclear Power Plant/Electric Grid Regulatory Coordination and Cooperation - ERO Perspective David R. Nevius and Michael J. Assante 2009 NRC Regulatory.
Frankfurt (Germany), 6-9 June 2011 IT COMPLIANCE IN SMART GRIDS Martin Schaefer – Sweden – Session 6 – 0210.
Implementing the New Reliability Standards Status of Draft Cyber Security Standards CIP through CIP Larry Bugh ECAR Standard Drafting Team.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Chapter 6 of the Executive Guide manual Technology.
Roadmap to Maturity FISMA and ISO 2700x. Technical Controls Data IntegritySDLC & Change Management Operations Management Authentication, Authorization.
Overview of WECC and Regulatory Structure
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Business Convergence WS#2 Smart Grid Technologies.
WebCast 5 May 2003 Proposed NERC Cyber Security Standard Presentation to IT Standing Committee Stuart Brindley, IMO May 26, 2003.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
1 National Audioconference Sponsored by the HIPAA Summit June 6, 2002 Chris Apgar, CISSP Data Security & HIPAA Compliance Officer Providence Health Plan.
Date CIP Standards Update Chris Humphreys Texas RE CIP Compliance.
Standing Up The New Electric Reliability Organization Ellen P. Vancko North American Electric Reliability Council.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Frontline Enterprise Security
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Chapter 8 Auditing in an E-commerce Environment
Information Security Framework Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory,
Case Study: Applying Authentication Technologies as Part of a HIPAA Compliance Strategy.
The Art of Information Security: A Strategy Brief Uday Ali Pabrai, CISSP, CHSS.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
CSC4003: Computer and Information Security Professor Mark Early, M.B.A., CISSP, CISM, PMP, ITILFv3, ISO/IEC 27002, CNSS/NSA 4011.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Information Security in Laurier Grant Li Wilfrid Laurier University.
Information Security Program
Cybersecurity - What’s Next? June 2017
Team 1 – Incident Response
ERCOT Technical Advisory Committee June 2, 2005
IS4680 Security Auditing for Compliance
NERC Cyber Security Standards Pre-Ballot Review
NRC Cyber Security Regulatory Overview
Understanding Existing Standards:
National Cyber Security
Cyber System-Centric Approach To Cyber Security and CIP
NERC Cyber Security Standard
Group Meeting Ming Hong Tsai Date :
Security week 1 Introductions Class website Syllabus review
Energy Storage & Cyber Security
Presentation transcript:

Cyber Security A Program to Meet NERC CIP Requirements May 17, 2010 Rick Dakin Coalfire systems CEO and Co-founder

Agenda The fastest 30 minutes in cyber security history Introductions The Threat NERC CIP Requirements CIP Program Rollout Cyber Security Program Strategy Questions

Coalfire Overview 3 Clients include Fortune 100, retail, government, education, financial, healthcare, and utilities Offices in Denver, Seattle, NYC, Dallas and San Diego) with over 40 full-time IT auditors Security, governance, compliance management, Audit – GLBA, SOX, PCI, HIPAA, SAS 70 & NERC CIP Application security: PA-DSS certification, code audits, penetration testing, SDL development Solutions: policy development, data classification, control management, incident response, etc. Practice areas: risk and vulnerability assessment, e-discovery and forensic analysis IT Audit and Compliance Management

4 Regulatory Backdrop Computer Security Act of EU Data Protection HIPAA FDA 21CFR Part 11 C6-Canada GLBA 2000 to Present COPPA USA Patriot Act 2001 EC Data Privacy Directive CLERP 9 CAN-SPAM Act FISMA Sarbanes Oxley (SOX) CIPA 2002 Basel II NERC CIP HITECH Payment Card Industry (PCI) California Individual Privacy SB1386 Other State Privacy Laws Regulatory Environment is a New Challenge for IT Professionals

Why Protect Infrastructure? 5

Strategic Barriers 'Smart Grid' may be vulnerable to hackers By Jeanne Meserve CNN Homeland Security Correspondent UPDATED: 08:44 PM EDT WASHINGTON (CNN) Is it really so smart to forge ahead with the high technology, digitally based electricity distribution and transmission system known as the "Smart Grid"? Tests have shown that a hacker can break into the system, and cyber security experts said a massive blackout could result. Until the United States eliminates the Smart Grid's vulnerabilities, some experts said, deployment should proceed slowly. "I think we are putting the cart before the horse here to get this stuff rolled out very fast," said Ed Skoudis, a co-founder of InGuardians, a network security research and consulting firm.

Trends – The Risk is Growing Cyber attacks are increasing The deployment of IP networks in critical infrastructure is growing Legacy systems deployed in critical systems only change every 5 – 12 years ….. and, were never designed to be secure The workforce is aging and will require re-training to modify processes and controls Control vendors are late contributors to cyber security plans. There are not industry standards for secure systems development for Critical Infrastructure

CIP Overview The North American Reliability Corporation (NERC) Standards CIP- 002 through CIP-009 provide a cyber security framework for the identification and protection of Critical Cyber Assets to support reliable operation of the Bulk Electric System. Effective December 2009, most operators must comply with the following requirements. CIP RequirementControls CIP 002Cyber Asset Identification CIP 003Security Management Controls CIP 004Personnel Security and Training CIP 005Electronic Security Perimeter CIP 006Physical Security CIP 007Systems Security Management CIP 008Incident Reporting and Response Planning CIP 009Recovery Plans for Critical Cyber Assets

9 CIP Updates  Oversight of cyber security at U.S. commercial nuclear power plants will be divided between the NRC and the NERC  CIP version 2 takes force in April 2010 and increases “strictness” Removal of the terms “reasonable business judgment” and “acceptance of risk” Training and Personnel Risk Assessments must be performed prior to granting access to authorized personnel Delegations must be specifically documented with areas of responsibility and approved by the designated Senior Manager Levels of Non-Compliance replaced with Violation Severity Levels and Violation Risk Factors  Future CIP versions look to introduce more alignment with best practice standards such as NIST

Slow Adoption

11 FERC – Bringing down the Hammer  Budget increase of over $17M to make reliability of the electric transmission grid—and enforcement of NERC Standards—a priority in 2011  Planning for an average of 100 violations each month in 2011  Strong response to NERC Technical Feasibility Exception (TFE) rules including mandate that all mitigating controls are equivalent to strict original control intent  Severely limited any safe harbor absent exceptional circumstances  May 4 th, 2010 – Michael Assante resigns as CSO of NERC

12 Growing the Grid  The Energy Independence and Security Act of 2007 established the Smart Grid program which mandates two-way flow of electricity and information with the end user  NIST IR-7628: Smart Grid Cyber Security Strategy and Requirements drafted addresses: Bottom-up Risk Based Assessment Privacy Concerns Vulnerability Class Analysis  Takes the threat to the end user: what’s the difference between shutting down the plant or conducting an Energy Denial of Service Attack against the consumer?

Measure and Report Program Design Establish Metrics Control testing Develop Compliance Portal Online Support Deploy and Operate Guidelines Control deployment Control Operation Operations Monitoring and Reporting Training Control Design Define system boundaries Control Design Documentation User Testing Policies, Plans Risk Assessment Asset Inventory Risk Assessment Control Selection Gap Analysis Remediation Roadmap CIP Program Approach Compliance Management Program

21 Steps to Improve Cyber Security 1.Identify all connections to SCADA 2.Disconnect unnecessary connections 3.Strengthen the security of remaining connections 4.Harden SCADA Networks 5.Do not rely of proprietary protocols 6.Implement the security features provided by vendors 7.Establish strong controls over media 8.Implement internal and external intrusion detection systems 9.Perform technical audits of SCADA devices and networks 10.Assess remote sites connected to the SCADA network – Access Controls 11. Identify and evaluate possible attack scenarios 12. Clearly define cyber security roles and responsibilities 13. Document network Architecture 14. Establish a risk management process 15. Establish a “defense–in-depth” security program 16. Clearly identify cyber security requirements 17. Establish configuration management processes 18. Conduct routine self-assessments 19. Establish a disaster recovery plan 20. Establish program accountability 21. Establish policies and provide Training Source: The President’s Critical Infrastructure Protection Board

Segment SCADA Network

Top 5 Risk Mitigation Steps 1.Segment SCADA systems (Diagram system boundaries) 2.Test Segmentation of SCADA Systems (Do not rely on proprietary protocols) 3.Restrict Remote Access 4.Contact your System Vendor for Secure Configurations and Operations Guides 5.Develop a good Incident Response Plan

References  Idaho National Labs – Vulnerabilities Report  NIST SP  NERC - Top 10 Vulnerabilities of Control Systems  GAO Report on Continuing Security Weakness  21 Steps to Improve SCADA System Security

Thank You 18 Rick Dakin ext 7001 Questions?