Grid Security Solution Brief
Grid Security Solution Brief
Improve industrial cybersecurity The cyber security of the utility grid and the associated operational monitoring
and compliance by: and control networks have caused increasing concern and regulatory mandates
on a global level. Organizations simply cannot modernize the utility grid without
• Asset inventory & discovery
incorporating cybersecurity — it is a requirement for operating in the 21st
• Secure access at the edge century. Cybersecurity must be a key component of a grid modernization effort.
• Security incident While utilities are transforming operations infrastructure toward grid
containment modernization, cyber threats become a major concern. Significant changes in
• Threat detection & mitigation the operational model and adoption of newer more cost-effective technologies
are being driven by flat to declining revenues and grid stability issues. The
• Malware protection legacy, often proprietary, control systems are no longer efficient to operate and
• Secure data transport are virtually impossible to secure. The adage “You cannot secure what you
cannot see” has never been more applicable. Asset visibility, controls to
mitigate attacks, and the cooperation between Information Technology (IT) and
Operations Technology (OT) are required.
A comprehensive security architecture with proven integration is a more
operational and cost-effective answer. Integrating IT and OT around security
and leveraging the experience of IT with implemented systems, are the right
approaches. A well thought-out, implemented, and operationally-effective
security posture requires a partnership between IT and OT and starts at the
foundation — the network.
The Grid Security CVD provides a holistic cybersecurity architecture to protect utility networks and processes while
addressing the key security and compliance concerns of the utility grid operators.
The move from Minimal phase to Foundational is about establishing, controlling and segmenting zones and traffic
flows between those zones. Separation of IT and OT is one example and should be completed as defined in Minimal.
The idea to take it to the next level is to segment and monitor traffic across the WAN and provide segmentation in
the substations with logging. An IoT “aware” firewall is a perfect fit here.
Key requirements
The figure above depicts the key requirements as part of the journey to secure operational networks and can guide
the development of a security lifecycle process. The ability to leverage the network with device identification,
separation, and segmentation based on security levels and application criticality now enables an effective security
posture. This posture can protect, detect, and respond to advanced cybersecurity threats as part of this
comprehensive security lifecycle. Compliance standards such as NERC-CIP and others are addressed in this guide
as part of that complete security lifecycle. This security solution brief and the Cisco Grid Security CVD provide the
blueprints to meet these requirements.
Foundational security
Identify: Unknown and unpatched assets
The utility grid has gone virtually unchanged for many years with assets operating in place for decades. Asset
discovery often requires time consuming, costly, and even hazardous manual inspections that are error prone and
may easily become obsolete. This is a security risk and a compliance issue. Cisco Cyber Vision can discover these
devices automatically, providing significant levels of device detail and security posture assessments.
I
with IDS/ IPS
3
Security Operations Center (SOC)
Operations
and Control Cyber Vision FMC SecureX ISE Stealthwatch SIEM
OMS Dispatch EMS
4
DMZ Cisco NGFW
with IDS/ IPS
Cisco NGFW
with IDS/ IPS
Detection & Remediation:
Sensor
1 IE5000
SPAN
Sensor SPAN
4 Policy push to ISA3000 / IE switch
IC3000 IC3000 IE5000
SPAN
IE4010
PRP
IE4010
5 Bad actor blocked
IE4000
PRP
Compliance requirements
A well-architected and comprehensive security solution can provide a secure, compliant, and operationally efficient
OT network. A single system is easier to maintain, more reliable and trusted, with fewer integration costs and
ongoing operational costs, thus reducing both capex and opex over the life of the system. The components and
architecture described here are all part of a comprehensive NERC CIP compliant posture. Patching, asset
information, data privacy, segmentation, detection and trust are all key parts of the current NERC CIP mandates.
A matrix mapping NERC-CIP mandates to Cisco solutions is located at the end of this document.
Defense in depth
A solid security architecture leverages a defense-in-depth approach. This guide details the integration of multiple
security tools and devices to accomplish this in an OT environment, which Cisco refers to as Internet of Things (IoT)
Threat Defense. This holistic “full spectrum” security solution addresses the unique requirements of the utility
network with best practices and compliance requirements like those found in NERC CIP and IEC 62443 and the NIST
framework.
This solution is based on industry-leading innovations in Cisco IoT security and networking technologies that are built
into Cisco Cyber Vision, Cisco 3000 Series Industrial Security Appliances (ISA), Cisco IC3000 Industrial Compute
Gateway, and Cisco Industrial Ethernet IE3300, IE3400, IE4000, IE5000 Series Switches with integration with Cisco
Identity Services Engine (ISE), Cisco Stealthwatch®, and Cisco TrustSec®.
These integrated systems improve operational capabilities and protection to systems; the integration and centralized
management significantly reduce operational costs, time and exposure for the utility. This is the benefit of a one-
source system versus integrating numerous point products from multiple vendors.
Cisco
Validated
Design
Tested Implemented Proven A holistic security solution for utility industry
Cisco Security Feature
Substation Sensor
Distribution • Industrial deep packet inspection (DPI)
Security Sensor
IPSEC Sensor
Grid Industrial • Stateful firewall and intrusion
Segmentation
Perimeter IR1101 IPSEC IR1101 (ISA3000)
prevention (IPS)
#1 #2 IPSEC Sensor
NERC CIP, • Hardware bypass
IE3400
NIST, IEC62443 IR1101
#X
• Layer 2 NAT
SPAN Sensor • 802.1X
SCADA/RTU
Transformer • MAC Authentication Bypass (MAB)
IE4000 IED Secure Edge
SCADA/RTU Volt Reg • Quality of Service marking
IE2000U Services and
Merging Unit
Segmentation • Netflow (IE3x00 and IE4000 only)
• TrustSec tagging (IE3x00 and IE4000
Merging Unit IE2000U IED • Edge compute (IE3x00 only)
Volt Reg Transformer • IPSEC encryption in hardware
Cyber Vision
Cisco Cyber Vision is an asset inventory, network monitoring and threat-detection platform specifically designed to
secure industrial control systems (ICS). It enables industrial organizations to gain full visibility into their industrial
networks so they can ensure process integrity, build secure infrastructures, drive regulatory compliance, and enforce
security policies to control risks.
Port security
The Cisco IE3300, IE3400, IE4000, IE5000 Series switches deliver Gigabit connectivity to the Cisco ruggedized
switching portfolio with superior high-bandwidth switching capacity and proven Cisco IOS Software. The Cisco IE
Switching Series provides highly secure access to support resilient and scalable networks while adhering to industry
compliance requirements.
Stealthwatch
Cisco Stealthwatch improves threat defense with network visibility and security analytics. It helps gain situational
awareness of all users, devices, and traffic on the network, so threats can be responded to quickly and effectively.
Stealthwatch leverages NetFlow data from network infrastructure devices. The data is collected and analyzed to
provide a complete picture of network activity.
SecureX
Cisco SecureX integrates intelligence from Firepower Management Center, Cyber Vision, Identity Services Engine,
Stealthwatch, Advanced Malware Protection and Umbrella. This seamless integration among Cisco security products
makes deeper investigations really easy, and it also lets you take corrective action directly from its interface without
having to log into another product.