Presentation is loading. Please wait.

Presentation is loading. Please wait.

NERC CIP Implementation – Lessons Learned and Path Forward

Similar presentations


Presentation on theme: "NERC CIP Implementation – Lessons Learned and Path Forward"— Presentation transcript:

1 NERC CIP Implementation – Lessons Learned and Path Forward
Anfield Summit August 5-6, 2015 By Jeremy Anderson Manager, Sales Engineering NovaTech, LLC

2 NERC CIP Implementation – Lessons Learned and Path Forward
NERC CIP Version 5: Quick Overview The “Intermediate System” – Why Needed, and Design Suggestions Reliable Broadband-based Networking System – Not an Option The Importance of a Standards-based approach Manual, Semi-Automatic or Fully Automatic Design?

3 Current NERC CIP Documents
16-Sep-18 Current NERC CIP Documents CIP–002–3 — Cyber Security— Critical Cyber Asset Identification CIP–003–3 — Cyber Security — Security Management Controls  CIP–004–3 — Cyber Security — Personnel and Training  CIP–005–3 — Cyber Security — Electronic Security Perimeter(s)  CIP–006–3 — Cyber Security — Physical Security   CIP–007–3 — Cyber Security — Systems Security Management  CIP–008–3 — Cyber Security — Incident Reporting and Response Planning  CIP–009–3 — Cyber Security — Recovery Plans for Critical Cyber Assets

4 NERC CIP Documents “Version 5”
16-Sep-18 NERC CIP Documents “Version 5” CIP–002–5 — Cyber Security — BES Cyber System Categorization  CIP–003–5 — Cyber Security — Security Management Controls  CIP–004–5 — Cyber Security — Personnel and Training  CIP–005–5 — Cyber Security — Electronic Security Perimeter(s)  CIP–006–5 — Cyber Security — Physical Security of BES Cyber Systems  CIP–007–5 — Cyber Security — Systems Security Management  CIP–008–5 — Cyber Security — Incident Reporting and Response Planning  CIP–009–5 — Cyber Security — Recovery Plans for BES Cyber Systems  (new) CIP–010–1 — Cyber Security — Configuration Change Mgmt. and Vulnerability Assessments  (new) CIP–011–1 — Cyber Security — Information Protection (new) CIP–014–1 — Cyber Security — Physical Security

5 Version 5 Introduces New Definitions
Cyber Asset Programmable electronic devices, including the hardware, software, and data in those devices. BES Cyber Asset A Cyber Asset that if rendered unavailable, degraded, or misused would affect the reliable operation of the Bulk Electric System. BES Cyber System One or more BES Cyber Assets logically grouped to perform one or more reliability tasks. “Bulk Electric System” …generally 100kV or higher. September 16, 2018 Presentation title

6 Improved Definition of Criticality
V3/V4 V5 High Critical Medium Other Low Non-Critical Non-Critical

7 Version 5 Expands Definition of “Applicable Systems”
Electronic Access Control or Monitoring Systems (EACMS) – Applies to each Electronic Access Control or Monitoring System associated with a referenced high impact BES Cyber System or medium impact BES Cyber System. Examples may include, but are not limited to, firewalls, authentication servers, and log monitoring and alerting systems. Physical Access Control Systems (PACS) – Applies to each Physical Access Control System associated with a referenced high impact BES Cyber System or medium impact BES Cyber System with External Routable Connectivity. Protected Cyber Assets (PCA)– Applies to each Protected Cyber Asset associated with a referenced high impact BES Cyber System or medium impact BES Cyber System

8 Other Significant Changes V3/4 to V5
Must now use an “intermediate device” between User and Critical Asset The complete exemption of Cyber Assets from applicability to the NERC CIP standards based on communication characteristics no longer applies. Must remove/disable both unused “software ports” and unused “hardware points” Improved definition for patching Defines the source of the “patches” (also “hot fixes” and “updates”) Provides better definition of “release date” and “availability date” If installing the patch introduces more risk than the vulnerability represents, an alternate process is defined Does not mandate anti-virus software Requires security monitoring …and more. No longer can a large utility with hundreds of transmission substations claim they do not need to meet the CIP requirements because they unplugged.

9 The “Intermediate System” is stipulated in CIP-005-5
Mostly Control Centers Mostly Substations

10 What is Interactive Remote Access?
user-initiated access by a person employing a remote access client or other remote access technology using a routable protocol. Remote access originates from a Cyber Asset that is not an Intermediate System and not located within any of the Responsible Entity's Electronic Security Perimeter(s) or at a defined Electronic Access Point (EAP). Remote access may be initiated from: 1) Cyber Assets used or owned by the Responsible Entity, 2) Cyber Assets used or owned by employees, and 3) Cyber Assets used or owned by vendors, contractors, or consultants. Interactive remote access does not include system-to-system process communications.

11 Access Without Intermediate System
No Longer Permitted System User Broadband Connection Electronic Security Perimeter Critical Cyber Assets

12 Why Not? Intermediate system acts as a proxy. No need to have wide open rules in firewalls. Also protects from vulnerabilities on the host computer.

13 Access with Intermediate System
Networked Servers Server(s) for Connection Management and Password Management System User Restricts access to only authorized users Broadband Connection Electronic Security Perimeter Critical Cyber Assets A basic system could be a simple as a desktop PC that the users access via RDC. The intermediate system can do more!! It can manage user access to IEDs It can manage IED passwords. It can contain all the software that will need to be used in one location. This simplifies software management.

14 Summary of Intermediate System Functions
Networked Servers All users who interact with substation assets login to the system. System manages all user passwords and permission. System manages the details of all connections to substation assets. System manages passwords in the substation assets. System User Encrypted Broadband Connection Electronic Security Perimeter Critical Cyber Assets

15 Reliable Broadband-based Networking System – Not an Option
Broadband is the solution for… …securely transferring files (e.g. for NERC CIP-10) …efficiently accessing syslog events …implementing LDAP and Active Directory for remote, centralized authentication …simplifying access and management of substation assets Serial approaches are highly compromised for the above tasks and not a sustainable approach. 99.999% broadband uptime can be achieved

16 The Importance of a Standards-based Approach
The standards have been developed already, and they work: Secure Protocols: SSH, SSL, TLS, HTTPS, SFTP Security Event Access: Syslog System Management: SNMP Identity Management: Active Directory, LDAP, IPA No need for Utility-specific, homegrown or proprietary approaches

17 Manual, Semi-Automatic or Fully Automatic Design?
Not all IEDs were designed to support automatic access of configurations Only a few IEDs were designed to support automatic password changes Semi-automatic approach may be best Simpler can be better

18 Manual System Very time and paperwork intensive
Very easy to forget something

19 Example of Semi-Automatic System for Access Management
User logs on to Connection Manager server Connection Manager lists all relay assets. User selects relay. Encrypted connection established Password entered manually Networked Servers System User Broadband Connection Critical Cyber Assets Encrypted connection is automatic Password entry is manual Electronic Security Perimeter

20 Example of Semi Automatic Systems for Configuration Management
System User Networked Servers Substation appliance retrieves relay configuration files Substation appliance calculates checksum on all relay configuration files Substation appliance sends configurations/checksum to server System user compares configurations/checksum for relays to previous. Broadband Connection Critical Cyber Assets Electronic Security Perimeter

21 Contact Information Jeremy Anderson Manager, Sales Engineering NovaTech, LLC


Download ppt "NERC CIP Implementation – Lessons Learned and Path Forward"

Similar presentations


Ads by Google