UCAIug: Smart Grid Security OpenSG Face-to-Face (January 2010 – San Francisco, CA) SG Security Working Group AMI-SEC Task Force SG Security WG Chair: Darren Reece Highfill
SG Security Overview ChairChair –Darren Highfill, SCE Vice ChairVice Chair –Matt Carpenter, Inguardians SecretarySecretary –Bobby Brown, EnerNex Task Forces:Task Forces: –AMI-SEC
Agenda DayTimeslotSubjectGroupRoom Monday Boot CampSG Sec WGANZA I Tuesday Status updates Review of AMI Security Profile v1.0 comments SG Sec WG AMI-SEC TF ANZA I OpenHANJoint SessionANZA I Wednesday AMI SP: comment classification AMI SP: begin resolution discussion AMI-SEC TFANZA I AMI SP: comment resolution discussion (cont.) AMI SP: action items forward AMI-SEC TFANZA I OpenADE/OpenADRJoint SessionANZA II & III SG CommunicationsJoint SessionANZA I Thursday AMI-ENTJoint SessionANZA I Prioritization of needs Organizational planning SG Sec WGPORTOLA A
Status Updates CharterCharter –Review –Call for Vote Security Profile BlueprintSecurity Profile Blueprint AMI Security Profile v2.0AMI Security Profile v2.0 –Overview of Comments –Scheduling –Comment Classification –Negotiation / Discussion –Action Items Third Party Data Access (3PDA)Third Party Data Access (3PDA) –Overview –Q&A –Action Items ASAP-SGASAP-SG –Review of org / participation –Upcoming profiles New Work Areas (?)New Work Areas (?) Joint SessionsJoint Sessions –OpenHAN –OpenADE –OpenADR –AMI-ENT –SG Systems –SG Communications
UtiliSec Charter Chartered with developing detailed security and assurance requirements and security best practices guidance for organizations throughout the lifecycle of smart grid technologyChartered with developing detailed security and assurance requirements and security best practices guidance for organizations throughout the lifecycle of smart grid technology Technology-specific, but vendor-agnostic guidanceTechnology-specific, but vendor-agnostic guidance Feed and accelerate SDO work (IEC, IEEE, etc.)Feed and accelerate SDO work (IEC, IEEE, etc.) Documents/SG Security WG Charter v pdfhttp://osgug.ucaiug.org/utilisec/Shared Documents/SG Security WG Charter v pdfhttp://osgug.ucaiug.org/utilisec/Shared Documents/SG Security WG Charter v pdfhttp://osgug.ucaiug.org/utilisec/Shared Documents/SG Security WG Charter v pdf
Security Profile Blueprint StatusStatus –Mature draft posted Dec Documents/Security Profile Blueprint/Security Profile Blueprint - v0_ dochttp://osgug.ucaiug.org/utilisec/Shared Documents/Security Profile Blueprint/Security Profile Blueprint - v0_ dochttp://osgug.ucaiug.org/utilisec/Shared Documents/Security Profile Blueprint/Security Profile Blueprint - v0_ dochttp://osgug.ucaiug.org/utilisec/Shared Documents/Security Profile Blueprint/Security Profile Blueprint - v0_ doc –Revisited after completion of each profile Profile Creation MethodProfile Creation Method –Establish Profile Scope –Define Logical Architecture –Identify Security-Related Constraints –Recommend Security Controls –Validate Profile
AMI Security Profile Comments Discussion Points: 1.The use of "must", "shall", and "should" and corresponding definitions, then a group to review the consistency in the document. 2.No collaborative computing capabilities should be use in an AMI as it is a dedicated system for one function. 3.AMI is a dedicated system and should not support VoIP capabilities. 4.Should we add a glossary and acronym section - for example "reasonable", "strongly", "alert", "flaw". 5.Should "Smart Grid Application" be part of the Smart Grid components? 6.Should the security profile document be formatted to be used in RFPs?
Project Description:Project Description: –Utility-driven, public-private collaborative project to develop system-level security requirements for smart grid technology Needs Addressed:Needs Addressed: –Utilities: specification in RFP –Vendors: reference in build process –Government: assurance of infrastructure security –Commissions: protection of public interests Approach:Approach: –Architectural team produce material –Usability Analysis team assess effectiveness –NIST, UtiliSec review, approve Deliverables:Deliverables: –Strategy & Guiding Principles white paper –Security Profile Blueprint –3 Security Profiles: AMI, ADE, Communications –Usability Analysis ASAP-SG: Summary Schedule: Jun09 – Dec09 Budget: $3M ( $1.5M Utilities + $1.5M DOE) Performers: Utilities, EnerNex, Inguardians, SEI, ORNL Partners: DOE Release Path: NIST, UCAIug Contacts: Bobby Brown Darren Highfill Schedule: Jun09 – Dec09 Budget: $3M ( $1.5M Utilities + $1.5M DOE) Performers: Utilities, EnerNex, Inguardians, SEI, ORNL Partners: DOE Release Path: NIST, UCAIug Contacts: Bobby Brown Darren Highfill
Public-private collaborative projectPublic-private collaborative project –DOE, NIST, & utilities Purposes:Purposes: –Support the activities of the NIST CSCTG –Accelerate the work of the UtiliSec WG Participants:Participants: –Utilities, regulators, vendors, consultants, national laboratories, & academia ASAP-SG
Technical Coordination with NIST
ASAP-SG: Upcoming Profiles Distribution AutomationDistribution Automation Wide Area Situational Awareness (i.e. Synchrophasors)Wide Area Situational Awareness (i.e. Synchrophasors) Home Area NetworksHome Area Networks Substation AutomationSubstation Automation
Joint Session SG Security & SG Systems SG Security WG Chair: Darren Reece Highfill
Template Summary of SG Systems group security requirementsSummary of SG Systems group security requirements Relevant Technological IssuesRelevant Technological Issues Artifacts related to above issuesArtifacts related to above issues –SG Security artifacts: existing and/or needed –Business artifacts from requesting group (e.g. use cases) Q&AQ&A Collaboration between SG Security and SG Systems groupCollaboration between SG Security and SG Systems group –Statement of Need –Task assignments
SG-Systems Summary of SG-Systems security requirements (Greg Robinson)Summary of SG-Systems security requirements (Greg Robinson) Outstanding Issues (Greg Robinson)Outstanding Issues (Greg Robinson) SG Security artifacts related to above issuesSG Security artifacts related to above issues –Existing –Needed Q&AQ&A Collaboration between SG Security and SG-SystemsCollaboration between SG Security and SG-Systems –SG-Systems Statement of Need –Task assignments
OpenHAN Summary of OpenHAN security requirements (Mary Zientara)Summary of OpenHAN security requirements (Mary Zientara) Issues (Robby Simpson)Issues (Robby Simpson) –Privacy –Securing one way communications –HAN network admissions –Application level security –Digital Certificate authority (technology, business, security credentials) SG Security artifacts related to above issuesSG Security artifacts related to above issues –Existing –Needed Q&AQ&A Collaboration between SG Security and OpenHANCollaboration between SG Security and OpenHAN –OpenHAN Statement of Need –Task assignments
Joint Session SG Security / OpenADE / OpenADR SG Security WG Chair: Darren Reece Highfill
OpenADE Summary of OpenADE security requirements (Steve Van Ausdall / Dave Mollerstuen)Summary of OpenADE security requirements (Steve Van Ausdall / Dave Mollerstuen) Third Party Data Access Security Profile (Darren Highfill)Third Party Data Access Security Profile (Darren Highfill) Outstanding Issues (Steve Van Ausdall / Dave Mollerstuen)Outstanding Issues (Steve Van Ausdall / Dave Mollerstuen) SG Security artifacts related to above issuesSG Security artifacts related to above issues –Existing –Needed Q&AQ&A Collaboration between SG Security and OpenADECollaboration between SG Security and OpenADE –OpenADE Statement of Need –Task assignments
OpenADR Summary of OpenADR security requirements (Albert Chiu)Summary of OpenADR security requirements (Albert Chiu) Third Party Data Access Security Profile (Darren Highfill)Third Party Data Access Security Profile (Darren Highfill) Outstanding Issues (Albert Chiu)Outstanding Issues (Albert Chiu) –Use of public networks such as the internet –NERC CIP –Voluntary DR programs with pricing, weather, special days, etc. over different communications channels –Security lessons learned in current OpenADR deployments SG Security artifacts related to above issuesSG Security artifacts related to above issues –Existing –Needed Q&AQ&A Collaboration between SG Security and OpenADRCollaboration between SG Security and OpenADR –OpenADR Statement of Need –Task assignments
Joint Session SG Security / SG Communications SG Security WG Chair: Darren Reece Highfill
SG Communications Summary of SG Communications group security requirementsSummary of SG Communications group security requirements Relevant Technological IssuesRelevant Technological Issues Artifacts related to above issuesArtifacts related to above issues –SG Security artifacts: existing and/or needed –Business artifacts from requesting group (e.g. use cases) Q&AQ&A Collaboration between SG Security and SG Communications groupCollaboration between SG Security and SG Communications group –Statement of Need –Task assignments
Joint Session SG Security / AMI-ENT SG Security WG Chair: Darren Reece Highfill
AMI-ENT Summary of AMI-ENT security requirements (Mark Ortiz)Summary of AMI-ENT security requirements (Mark Ortiz) Outstanding Issues (Mark Ortiz)Outstanding Issues (Mark Ortiz) –Application level security –XML security considerations & messaging SG Security artifacts related to above issuesSG Security artifacts related to above issues –Existing –Needed Q&AQ&A Collaboration between SG Security and AMI-ENTCollaboration between SG Security and AMI-ENT –AMI-ENT Statement of Need –Task assignments Interested? Send an to Send an to
Wrap-up Session AMI Security Profile commentsAMI Security Profile comments Interest Areas / Lists to be FormedInterest Areas / Lists to be Formed Prioritization / Action Items / AssignmentsPrioritization / Action Items / Assignments Call for Presenters / TopicsCall for Presenters / Topics
AMI Security Profile The intent of the document is to provide prescriptive, actionable guidance for how to build-in, procure and implement security for AMI smart grid functionalityThe intent of the document is to provide prescriptive, actionable guidance for how to build-in, procure and implement security for AMI smart grid functionality This guidance is neutral to vendor specific implementations and architecturesThis guidance is neutral to vendor specific implementations and architectures Work extends from the meter data management system (MDMS) up to and including the home area network (HAN) interface of the smart meterWork extends from the meter data management system (MDMS) up to and including the home area network (HAN) interface of the smart meter
What Should Be Logged? Is there a definition for Security Events, Control Events, System/Device Confirmation changes? (DHS )Is there a definition for Security Events, Control Events, System/Device Confirmation changes? (DHS ) Log all success / all unsuccessful? (DHS , DHS )Log all success / all unsuccessful? (DHS , DHS ) Message details – (date, time, source, destination, message details)Message details – (date, time, source, destination, message details) Do we need a definition for security events, control events, system/device confirmation changes? (DHS , DHS )Do we need a definition for security events, control events, system/device confirmation changes? (DHS , DHS ) Do we need to define levels of auditing? (DHS )Do we need to define levels of auditing? (DHS )
AMI SP Comments - Summary Use IEEE definitions for shall, should, etc.Use IEEE definitions for shall, should, etc. Encryption – for supplemental guidance, level of protection needs to be applied to the dataEncryption – for supplemental guidance, level of protection needs to be applied to the data Malicious code protection – use due diligence / care, remove the implementation guidance, general updatesMalicious code protection – use due diligence / care, remove the implementation guidance, general updates Update document for “reasonable period of time”, “strongly authenticated”, “alert”, “alarm”, “flaw”Update document for “reasonable period of time”, “strongly authenticated”, “alert”, “alarm”, “flaw”
AMI SP Comments – Summary (cont) Review definition of Grid Control Center (4.3.9)Review definition of Grid Control Center (4.3.9) DHS – Collaborative Computing requirements and verbiageDHS – Collaborative Computing requirements and verbiage DHS – VoIP requirement enhancementsDHS – VoIP requirement enhancements DHS – Flaw remediation – better definitionDHS – Flaw remediation – better definition DHS – Identification and authentication – more clarificationsDHS – Identification and authentication – more clarifications Comment resolution team to send an to the group about why the document is not suitable for an RFP document.Comment resolution team to send an to the group about why the document is not suitable for an RFP document.
AMI SP Comments Thank you everyone for the comments and contributions, they are greatly appreciated
OpenSG Group Mappings – Comm View
Closing Plenary SG Security SG Security WG Chair: Darren Reece Highfill
Progress This Week Key accomplishmentsKey accomplishments –Approved Charter –Strong technical debate/review of AMI SP comments –Introduction of 3PDA SP Collaborative sessionsCollaborative sessions –OpenHAN, OpenADR: Generate Statement of Need –SG Network, AMI-ENT: Action items defined –OpenADE: Delivered 3PDA SP
Interest Areas / New Lists Third Party Data AccessThird Party Data Access –Usability Analysis –General Interest (Future Task Force?) OpenHAN SupportOpenHAN Support SG Communications SupportSG Communications Support AMI-ENT SupportAMI-ENT Support Lemnos (Configuration Profiles)Lemnos (Configuration Profiles) Risk AssessmentRisk Assessment Application Security RequirementsApplication Security Requirements
Moving Forward Define agendas and action plans for next collaborative sessionsDefine agendas and action plans for next collaborative sessions Facilitate sub-group formation & activityFacilitate sub-group formation & activity Changes to AMI Security ProfileChanges to AMI Security Profile –Resolution of comments –Mapping use cases and/or security domains to control requirements Review / comment / revision of 3PDA SPReview / comment / revision of 3PDA SP
SG Communications reflector: reflector: Webinar information:Webinar information: –Provided via UtiliSec-Announce list Webinar times:Webinar times: MeetingDayPSTESTUKCET SG-SecurityEvery other Monday11:0014:0019:0020:00
Questions? UtiliSec Collaboration Site