© 2011 EnerNex. All Rights Reserved. www.enernex.com Lemnos Interoperable Security Project Background and Benefits 8/11/2011.

Slides:



Advertisements
Similar presentations
Migration Considerations and Techniques to MPLS-TP based Networks and Services Nurit Sprecher / Nokia Siemens Networks Yaacov Weingarten / Nokia Siemens.
Advertisements

Join Us Now at: Enabling Interoperability for the Utility Enterprise And TESTING.
SYSTEM-WIDE PROCESS CONTROLS UPGRADE Detroit Water & Sewerage Department.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
(c) 2003, SOHOware, Inc. Proprietary and Confidential Your OEM Partner for Intel XScale based Networking Appliances Targeting Small and Medium Business.
UCAIug HAN SRS v2.0 Summary August 12, Scope of HAN SRS in the NIST conceptual model.
NERC CIPC March 16, 2006 Roadmap to Secure Control Systems in the Energy Sector U.S. Department of Energy Office of Electricity Delivery and Energy Reliability.
© 2006 San Diego Gas & Electric Company. All copyright and trademark rights reserved. Microgrid – A Smart Grid Alternative Service Delivery Model? Thomas.
SmartGridCity™: A blueprint for a connected, intelligent grid community Presented to the Utah Public Service Commission May 13, 2009.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
September 20, 2002G2E 2002 GSA Technical Forum1 Best Of Breed (BOB) Standard.
Continuous Value Enhancement Process
Levetidsforlengelse av Existerende felt Oppgradering av kontrollsystemer subsea Erfaringer og losninger fra Tordis og Vigdis February 8 th 2012.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Security Benefits of Energy R&D Presented to the Conference on Estimating the Benefits of Government-Sponsored Energy Technology R&D March 4, 2002 Margie.
By Lauren Felton. The electric grid delivers electricity from points of generation to consumers, and the electricity delivery network functions via two.
Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S
Michael S. Zachowski, Robert D. Walla Astrix Technology Group 1090 King Georges Post Rd Edison, NJ A Successful Approach to a LIMS Upgrade In A Public.
Advanced Metering Infrastructure
Join Us Now at: Enabling Interoperability for the Utility Enterprise And TESTING.
K E M A, I N C. Current Status of Cyber Security Issues 2004 Keynote Address Joe Weiss January 20, 2004.
The LOGIIC Consortium Zachary Tudor, CISSP, CISM, CCP Program Director SRI International.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
Profile Series v.S1 Intelligent Power over Ethernet Access Control Solution With the power of iCLASS.
Don Von Dollen Senior Program Manager, Data Integration & Communications Grid Interop December 4, 2012 A Utility Standards and Technology Adoption Framework.
Lessons Learned in Smart Grid Cyber Security
Confidential and proprietary material for authorized Verizon Wireless personnel only. Use, disclosure or distribution of this material is not permitted.
Summary Device protocols tied intimately to applications. A need to significantly reduce critical data update times. Current network bandwidth consumption.
FirstEnergy / Jersey Central Power & Light Integrated Distributed Energy Resources (IDER) Joseph Waligorski FirstEnergy Grid-InterOp 2009 Denver, CO November.
1 © 2003 Cisco Systems, Inc. All rights reserved. CIAG-HLS Security For Infrastructure Protection: Public-Private Partnerships KEN WATSON 15 OCT.
September, 2005What IHE Delivers 1 G. Claeys, Agfa Healthcare Audit Trail and Node Authentication.
IPv4 TO IPv6 TRANSITION AND INTEROPERABILITY FOR TELECOM SERVICE PROVIDER Business Problem In today’s environment of growing connectivity where almost.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Mercosur Customs Workshop Public & Private Sector Collaboration Denise Coutinho.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
CONFIDENTIAL 1. 2 Designing the Intelligent Energy Gateway 2009 CONFIDENTIAL.
About Sandia National Laboratories Our Business: National Security Core Purpose: To help our nation secure a peaceful and free world through technology.
Secure Connections for a Smarter World Dr. Shuyuan Mary Ho Assistant Professor School of Information Florida State University.
Northern States Power Company ICCP Real-Time Data Access for Distribution, Transmission, and Generation George Clemmer Cycle Software, Inc.
Cyber Security for Energy Delivery Systems NSTB What’s an ICP ? And why is it Useful for Utilities ? Dave Teumim, CISSP Teumim Technical, LLC.
DOCUMENT #:GSC15-PLEN-62 FOR:Presentation SOURCE:ISACC AGENDA ITEM:Opening Plenary (6.14) CONTACT(S):Jim MacFie Cloud Computing Jim MacFie Chairman, ISACC.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
Cyber Security for Energy Delivery Systems NSTB Cyber Security Interoperability Task Force UCA Iug/OpenSG/SG Security Working Group.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
Smart Grid Energy Generation Renewable Energy Distributed Generation Transmission & Distribution Load Management Demand Response Electrical Vehicles Charging.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
Configuring AAA requires four basic steps: 1.Enable AAA (new-model). 2.Configure security server network parameters. 3.Define one or more method lists.
B O N N E V I L L E P O W E R A D M I N I S T R A T I O N Page 1 Pacific Northwest Smart Grid Demonstration Project  Largest Smart Grid Demonstration.
© 2014 IBM Corporation Does your Cloud have a Silver Lining ? The adoption of Cloud in Grid Operations of Electric Distribution Utilities Kieran McLoughlin.
Role of Router. The Router as a Perimeter Device  Usually the main function of a router is considered as the forwarding of packets between two network.
Industry Perspective of Section 508 John Godfrey (202) Information Technology Industry Council NIST Accessibility May.
1 IEEE interim, Orlando, Florida, March, 2008new-nfinn-fast-chains-rings-par5c-0308-v1 Fast Recovery for Chains and Rings Proposal for PAR and 5.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Vasanth Matamudra, Patricia Costa October 2012.
Rohde & Schwarz Topex TOPEX IP Radio Gateway July 2011.
The Obermeier Software OPC-SNMP Enterprise Agent 3.0 Obermeier Software SNMP OPC Gateway Features and The S4 Group, Inc. Services Presented by Steve Jones.
Findings from the DOE-OE Smart Grid Communications Program Meeting Validating the need for enhanced focus on smart grid communications research.
© 2013 TM Forum | 1 V Catalysts and Innovation Projects Rapid Technology Innovation Projects The Hub at Management World 2013.
Kevin Watson and Ammar Ammar IT Asset Visibility.
Cisco Collaboration Compatibility (IVT) Pricing April 2015.
Advancing National Wireless Capability Date: March 22, 2016 Wireless Test Bed & Wireless National User Facility Paul Titus Department Manager, Communications.
The Device Networking Company
Case Study: Real Life Unified Architecture Value
CASH MANAGEMENT SERVICES
Information Security Professionals
ATIS Cybersecurity DOCUMENT #: GSC13-GTSC6-12 FOR: Presentation
NERC CIP Implementation – Lessons Learned and Path Forward
2018 Real Cisco Dumps IT-Dumps
The Obermeier Software SNMP OPC Server 3.0
Iserve – Bulk Cash Deposit Kiosk
Presentation transcript:

© 2011 EnerNex. All Rights Reserved. Lemnos Interoperable Security Project Background and Benefits 8/11/2011

© 2011 EnerNex. All Rights Reserved. Energy Sector Challenges  Security of the control systems utilized in the energy sector is more IMPORTANT than ever before as control system are evolving rapidly – Increasing use of Ethernet and IP communications Increased attack surface – Connections to external systems Supports changing operational and business needs – New and emerging regulatory requirements 2

© 2011 EnerNex. All Rights Reserved. Energy Sector Challenges  Implementing Security is more COMPLICATED than before – End Users are faced with limited security expertise It shouldn’t take a security expert to configure a device properly! – Vendors need alternatives to proprietary solutions – End Users and Vendors need a straight forward method to communicate user needs, product features, and configuration parameters relating to cyber security functions 3

© 2011 EnerNex. All Rights Reserved. Lemnos Project Background  Funded by DOE under the Cybersecurity for Energy Delivery Systems (CEDS) Research and Development Program  Ultimate goal is to make interoperability of devices supporting cyber security functions less difficult to the end users – Often labor intensive and requiring extensive security expertise by the end user – Installed configurations often different for various vendor pairs  Lemnos emphasizes the development and use of a common set of configuration parameters

© 2011 EnerNex. All Rights Reserved. 5 Define functional requirements based on asset owner needs STEP 1 Select open source specifications (IETF RFCs) to meet the identified functional requirements STEP 2 Develop Interoperable Configuration Profiles for these specifications tailored for the energy sector control systems environment Test and validate the interoperable configuration profiles STEP 3 STEP 4 Lemnos Process

© 2011 EnerNex. All Rights Reserved. Lemnos Project Partners  EnerNex (Prime Contractor to DOE)  Sandia National Laboratories (FFRDC) – Directly funded by DOE  Tennessee Valley Authority (Utility/End User)  Schweitzer Engineering Laboratories – Sub contractor to EnerNex 6

© 2011 EnerNex. All Rights Reserved. Participating Vendors and R&D  Participating Vendors To Date – Cisco – Encore Networks – GarrettCom – Industrial Defender – N-Dimension – Phoenix Contact – Ruggedcom – Siemens  Participating R&D Organizations – Electric Power Research Institute (EPRI)

© 2011 EnerNex. All Rights Reserved. Current Lemnos Project Status  Security functions and protocols identified to date – Messaging (Syslog) – Centralized Authentication (LDAP) – Secure channel (IPsec) – Secure remote access (SSH)  Lab testing and field testing continues  DOE funding ending this year – Potential private sector sponsorship in the future – Looking for utility input to identify priorities 8

© 2011 EnerNex. All Rights Reserved. End User Perspective  Enables End Users to choose BEST IN CLASS solutions for various facilities (versus a “one size fits all”) – For example, an electric utility may have unique needs for: -Communications Hub/Control Center -Generating Plant DCS -Substation LAN -Outdoor and Pole top  Reduction in setup/deployment time and effort – Lower Total Cost of Ownership  Reduction in configuration errors  Communicates equipment requirements 9 Lemnos Benefits

© 2011 EnerNex. All Rights Reserved. Vendor Perspective  Permits shortened development cycle by providing reference design – OPSAID reference design available to public  Uses configurations proven in lab and field to secure control system communications in a way that doesn’t trade off reliability  Enhances the vendor’s ability to meet the customer’s needs – Provides a common understanding between customer and vendor 10 Lemnos Benefits

© 2011 EnerNex. All Rights Reserved. Moving Forward  Challenges for Cybersec-Interop TF after handoff from Lemnos – Versioning of the ICPs Moving forward, options in the IETF RFC’s will become deprecated to maintain alignment with NISTIR 7628 and other industry guidance Difficult to maintain backwards compatibility Interoperability may be at the ICP version level – Certification and Conformance Additional details needed in ICPs? 11