Cyber Security for Smart Grid George Gamble Cyber Security Architect Black & Veatch.

Slides:



Advertisements
Similar presentations
David A. Brown Chief Information Security Officer State of Ohio
Advertisements

WebCast 5 May 2003 NERC Cyber Security Standard Overview of Proposed Cyber Security Standard.
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
1 Telstra in Confidence Managing Security for our Mobile Technology.
Security Controls – What Works
NLRB: Information Security & FISMA Daniel Wood, Chief IT Security February 19, 2004.
Information Security Policies and Standards
Advanced Metering Infrastructure AMI Security Roadmap April 13, 2007.
Planning and Managing Information Security Randall Sutton, President Elytra Enterprises Inc. April 4, 2006.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Computer Security: Principles and Practice
Stephen S. Yau CSE , Fall Security Strategies.
Risk Assessment Frameworks
VULNERABILITY MANAGEMENT Moving Away from the Compliance Checkbox Towards Continuous Discovery.
Complying With The Federal Information Security Act (FISMA)
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Smart Grid Interoperability Standards George W. Arnold, Eng.Sc.D. National Coordinator for Smart Grid Interoperability National Institute of Standards.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
NHTSA Cyber Security Best Practices Study Tim Weisenberger December 7, 2011.
SEC835 Database and Web application security Information Security Architecture.
K E M A, I N C. NERC Cyber Security Standards and August 14 th Blackout Implications OSI PI User Group April 20, 2004 Joe Weiss
Lessons Learned in Smart Grid Cyber Security
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Confidentiality Integrity Accountability Communications Data Hardware Software Next.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Nuclear Power Plant/Electric Grid Regulatory Coordination and Cooperation - ERO Perspective David R. Nevius and Michael J. Assante 2009 NRC Regulatory.
1 Information System Security Assurance Architecture A Proposed IEEE Standard for Managing Enterprise Risk February 7, 2005 Dr. Ron Ross Computer Security.
NIST Special Publication Revision 1
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Integrated Enterprise-wide Risk Management Protecting Critical Information Assets and Records FIRM Forum.
K E M A, I N C. Ten Steps To Secure Control Systems APPA 2005 Conference Session: Securing SCADA Networks from Cyber Attacks Memphis, TN April 18, 2005.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
WebCast 5 May 2003 Proposed NERC Cyber Security Standard Presentation to IT Standing Committee Stuart Brindley, IMO May 26, 2003.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
CIP 2015 Smart Grid Vulnerability Assessment Using National Testbed Networks IHAB DARWISHOBINNA IGBETAREQ SAADAWI.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Agency Name Security Program FY 2009 John Q. Public Agency Director/CIO/ISO.
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
Critical Security Controls & Effective Cyber Defense Hasain “The Wolf”
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Information Security tools for records managers Frank Rankin.
The NIST Special Publications for Security Management By: Waylon Coulter.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
CPA Gilberto Rivera, VP Compliance and Operational Risk
Risk management.
Critical Security Controls
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Security Standard: “reasonable security”
Introduction to the Federal Defense Acquisition Regulation
Cyber Protections: First Step, Risk Assessment
NYBA 2017 Technology, Compliance &
Smart Grid Interoperability Standards
Implementing and Auditing the Critical Controls
NERC Critical Infrastructure Protection Advisory Group (CIP AG)
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
National Cyber Security
AMI Security Roadmap April 13, 2007.
Group Meeting Ming Hong Tsai Date :
Cybersecurity Threat Assessment
Presentation transcript:

Cyber Security for Smart Grid George Gamble Cyber Security Architect Black & Veatch

The boss says that security is extremely important and top priority. That is, unless it makes something inconvenient.

4 U.S. Government Impact on Cyber Security

Energy Independence and Security Act (EISA) of 2007 Title XIII, Section Smart Grid Interoperability Framework The Framework: “The framework…shall align policy, business, and technology approaches [to] enable… an efficient, reliable electricity network.” “a framework that includes protocols and… standards for information management to achieve interoperability of smart grid devices and systems.” NIST has “primary responsibility to coordinate the development of” an interoperability framework, in cooperation with DOE and other stakeholders.

What standards are being used to implement Smart Grid controls NIST SP Rev 3 - Guideline NIST SP Guideline DHS Catalog of Controls - Guideline NIST IR Guideline NERC CIP-002 through Standard SANS TOP 20 Critical Controls - Best Practices

NIST SP Risk Assessment * Task 2, 3, 4, and 6 can be conducted in parallel after Task 1 has been completed.

Develop a System Security Architecture Developing a security Architecture involves determining how each security requirement will be meet through management, operational and technical controls.

NIST IR Smart Grid Cyber Security Strategy and Requirements 1 St Draft September nd Draft February rd Draft August 2010 The NIST IR 7628 draft document contains the overall security strategy for the Smart Grid. Contents include: Development of vulnerability classes, identification of well-understood security problems that need to be addressed, selection and development of security-relevant use cases, initial privacy impact assessment, identification and analysis of interfaces identified in six functional priority areas, advanced metering infrastructure (AMI) security requirements, and selection of a suite of security documents that will be used as the base for determining and tailoring security requirements.

NIST IR Figure 2.1 Unified Logical Architecture for the Smart Grid

NERC/NIST Direction What does this mean? 11

NIST Security Risk Management Framework NIST

Government’s Push to Secure the Grid North American Electric Reliability Corporation Risk Based Methodology Review of Critical Assets and Critical Cyber Assets: – April 7, Michael Assante Vice President and Chief Security Officer of NERC expressed concerns with data submitted regarding Critical Asset and Critical Cyber Assets identification. NERC developed a set of Security Guidelines for the Electricity Sector to assist in the review process of: – Categorizing Cyber Systems – July 2009 – Identifying Critical Assets – Sept 2009 – Identifying Critical Cyber assets – Nov 2009 NERC is advising all registered entities about the sufficiency of evidence supporting Critical Asset identifications where all substations and generating facilities are excluded. They believe that a finding of non-compliance is highly probable absent such evidence to the NIST Risk Assessment. 13 Ultimately, self regulation has lead to increased definition and accountability from FERC.

Smart Grid is coming into Scope with changes in CIP-002 v1-3 and CIP-002 V4

CIP Electronic Boundary A boundary protection device – is “(a) device with appropriate mechanisms that: (i) facilitates the adjudication of different interconnected system security policies (e.g., controlling the flow of information into or out of an interconnected system0; and/or (II) monitors and controls communication at the external boundary of the information system to prevent and detect malicious and other unauthorized communications. A boundary protection device include such components as proxies, gateways, routers, firewalls, guards, and encryption tunnels Proxy Server – Computer system or an application that acts as and intermediary. Gateways is an interface providing a capability between networks by converting transmission speeds, protocols, codes or security measures Router is a hardware device or software program that forwards network traffic between computer networks Firewall is a network device or system running special software that controls the flow of network traffic between networks or between a host and a network Encryption Tunnel To encrypt information means to transform the information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.

SANS TOP 20 Controls Critical Control 1: Inventory of Authorized and Unauthorized Devices Critical Control 2: Inventory of Authorized and Unauthorized Software Critical Control 3: Secure Configurations for Hardware and Software on Laptops, Workstations, and Servers Critical Control 4: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches Critical Control 5: Boundary Defense Critical Control 6: Maintenance, Monitoring, and Analysis of Audit Logs Critical Control 7: Application Software Security Critical Control 8: Controlled Use of Administrative Privileges Critical Control 9: Controlled Access Based on Need to Know Critical Control 10: Continuous Vulnerability Assessment and Remediation Critical Control 11: Account Monitoring and Control Critical Control 12: Malware Defenses Critical Control 13: Limitation and Control of Network Ports, Protocols, and Services Critical Control 14: Wireless Device Control Critical Control 15: Data Loss Prevention Critical Control 16: Secure Network Engineering Critical Control 17: Penetration Tests and Red Team Exercises Critical Control 18: Incident Response Capability Critical Control 19: Data Recovery Capability Critical Control 20: Security Skills Assessment and Appropriate Training to Fill Gaps

Appendix

Department of Homeland Security (DHS) Catalog of Control Systems Security: Recommendations for Standards Developers 1 St Draft September nd Draft June 2010 The DHS catalog presents a compilation of practices that various industry bodies have recommended to increase the security of control systems from both physical and cyber attacks. The recommendations in the catalog are grouped into 19 families, or categories. The catalog is not limited for use by a specific industry sector but can be used by all sectors to develop a framework needed to produce a sound cyber security program. The DHS catalog should be viewed as a collection of recommendations to be considered and judiciously employed, as appropriate, when reviewing and developing cyber security standards for control systems. The recommendations in the catalog are intended to be broad enough to provide any industry using control systems the flexibility needed to develop sound cyber security standards specific to their individual security needs.

NIST SP Risk Assessment The purpose of this risk assessment is to evaluate the adequacy of the system security. This risk assessment provides a structured qualitative assessment of the operational environment. It addresses sensitivity, threats, vulnerabilities, risks and safeguards. The assessment recommends cost-effective safeguards to mitigate threats and associated exploitable vulnerabilities. The objective of performing risk management is to enable the organization to accomplish its mission(s): (1) by better securing the IT systems that store, process, or transmit organizational information; (2) by enabling management to make well-informed risk management decisions to justify the expenditures that are part of an IT budget; and (3) by assisting management in authorizing (or accrediting) the IT systems on the basis of the supporting documentation resulting from the performance of risk management.

NIST SP Initial public draft released September 2007 NIST SP Guide to Industrial Control Systems (ICS) Security provides guidance on securing Industrial Control Systems (ICS), including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations while addressing the performance, reliability, and safety requirements of each. The document provides an overview of ICS and typical system topologies, identifies typical threats and vulnerabilities to these systems, and provides recommended security countermeasures to mitigate the associated risks.

CIP Boundary Protection (R20-R22) NERC CIP 2 unchanged, 9 new, 4 changes requirements

SANS TOP 20 Controls Twenty Critical Security Controls for Effective Cyber Defense: Consensus Audit Guidelines The Twenty Critical Security Controls have already begun to transform security in government agencies and other large enterprises by focusing their spending on the key controls that block known attacks and find the ones that get through. These controls allow those responsible for compliance and those responsible for security to agree, for the first time, on what needs to be done to make systems safer. No development in security is having a more profound and far reaching impact. These Top 20 Controls were agreed upon by a powerful consortium brought together by John Gilligan (previously CIO of the US Department of Energy and the US Air Force) under the auspices of the Center for Strategic and International Studies. Members of the Consortium include NSA, US Cert, DoD JTF-GNO, the Department of Energy Nuclear Laboratories, Department of State, DoD Cyber Crime Center plus the top commercial forensics experts and pen testers that serve the banking and critical infrastructure communities. The automation of these Top 20 Controls will radically lower the cost of security while improving its effectiveness. The US State Department, under CISO John Streufert, has already demonstrated more than 80% reduction in "measured" security risk through the rigorous automation and measurement of the Top 20 Controls.