C PER
NERC CIP Overview Center for Advanced Power Engineering Research
Chip Moore Clemson University October 30th 2015
Topics of Discussion
Overview
Scope
History of CIP
Past Attacks
NERC-CIP
Standards Review
2
NERC-CIP Overview
The North American Electric Reliability Corporation (NERC) has adopted standards for the
protection and security of Critical Cyber Assets supporting the Bulk Electric System (i.e., the
power grid). This set of standards is known as the Critical Infrastructure Protection (CIP)
standards CIP-002 – CIP-011.
These standards for cyber security are mandatory and enforceable. Failure to comply with
any NERC CIP Standard may result in penalties or fines of up to $1,000,000 per day/per
incident.
Critical Infrastructure Protection (CIP) continues to be a prominent issue in the utility
industry and a significant area of focus for the energy sector. ”Critical Infrastructure,” for
Duke Energy includes our energy delivery system (Generation, Transmission, Distribution)
as well as the information systems and processes that support all businesses.
3
NERC-CIP Scope
What is NERC protecting?
Bulk Electric System
Generation Plants
Transmission Stations
Transmission Lines
Transmission towers
Critical Assets
Generation Plants
Transmission Stations
Control Centers
Cyber Assets
Supervisory Control And Data Acquisition
Systems (SCADA)
Energy Management Systems (EMS)
Plant Distributed Control Systems (DCS)
4
NERC-CIP History
Aurora Generator Test
2007
Idaho National Labs
Department of Homeland Security
Independent power/SCADA
engineers
Open and close generator's circuit
breakers out of phase from the
rest of the grid
https://youtu.be/fJyWngDco3g
5
NERC-CIP History
2008: CIP Version 1
First enforceable cybersecurity standards for the BES
RBAM (Risk-Based Assessment Methodology) to define Critical Assets
2009: CIP Version 2
Added annual review of additional processes
Enforced requirements rather than except risk
2010: CIP Version 3
Visitor escort updates
2012: CIP Version 4
Bright-Line Criteria
Never enforced due to timing of Version 5
2013: CIP Version 5
Impact Ratings (High, Medium, Low)
Include all communication devices (IP & Serial)
6
Past Cyber Attacks
STUXNET
2010
Attack Siemens PLCs
Iranian Uranium Factory
State sponsored
SHAMOON
2012
Attack Windows NT
Saudi Aramco
30,000 Computers
No Control/Process Systems
"Cutting Sword of Justice"
7
Past Physical Attacks
Pacific Gas & Electric Entergy
April 16th 2013 August – October 2013
Metcalf 500/230kV Substation Arkansas
2 Auto Banks 3 Separate attacks
Fiber communication cut Transmission line cut
Transformers shot from Substation fire
outside of fence Transmission tower tied
10,000 – 17,000 Gallon Spill across railroad tracks
(71 Trip) Actual outage
No extended outages FBI Investigation
Grid Reliability Alert 15 years
FBI Investigation $4.8 million in fines
No arrest to date
8
NERC-CIP Standards
CIP-002: BES Cyber System Categorization
CIP-003: Security Management Controls
CIP-004: Personnel and Training
CIP-005: Electronic Security Perimeter(s) (ESP)
CIP-006: Physical Security Perimeter (PSP) of BES Cyber Systems
CIP-007: Systems Security Management
CIP-008: Incident Reporting and Response Planning
CIP-009: Recovery Plans for BES Cyber Systems
CIP-010: Configuration Change Management and Vulnerability
CIP-011: Information Protection
CIP-014: Physical Security
9
NERC-CIP Standards
CIP-002: BES Cyber System Categorization
Identify BES Facilities
High Impact (Control Centers)
Medium Impact (large Generation plants, larger Transmission stations)
Low Impact (everything else in the BES >100kV)
Identify Cyber Assets
Programmable with a communication interface (IP/Serial)
Identify BES Cyber Assets
Negative impact within 15 minutes
Degraded, Misused, Unavailable
10
NERC-CIP Standards
CIP-003: Security Management Controls
Document Cyber Security Policy & Program
Identify CIP Senior Manager
CIP-004: Personnel and Training
Personnel Training on Cyber Security Program
Background Checks
Access Controls for Physical and Electronic
11
NERC-CIP Standards
CIP-005: Electronic
Security Perimeter(s)
(ESP)
Firewall rules and
policies
Electronic Access Point
Protect all BES Cyber
Assets
12
NERC-CIP Standards
CIP-006: Physical Security
Perimeter (PSP) of BES Cyber
Systems
Restrict access
Monitor access
Log activity
Escort visitors
Alarm
Built around all BES Cyber
Assets
13
NERC-CIP Standards
CIP-007: Systems Security Management
Restrict IP ports & services
Security patch/firmware management
Intrusion detection/prevention
Antivirus/Malware
Alarm on cyber events
Account/Password management
14
NERC-CIP Standards
CIP-008: Incident Reporting and Response Planning
Cyber Incident Response Team
Program to track and report
CIP-009: Recovery Plans for BES Cyber Systems
Recovery plan for failed/damaged assets
Storage of spares and associated data/configuration
15
NERC-CIP Standards
CIP-010: Configuration Change
Management and Vulnerability
Maintain baseline
configuration/settings
Track any changes
Verify configuration every year
Cyber Vulnerability Assessment
CIP-011: Information Protection
Access control to repositories
Protect data in transit
16
NERC-CIP Standards
CIP-014: Physical Security
Identify most critical facilities on system
Assess potential physical attack vectors
Install protections
Fencing
Barriers
Cameras
Security
Alarms
3rd party review
17
Questions?
As cyberattack campaigns continue to
multiply, our Critical Infrastructure,
such as Generation and Transmission
assets and our information and
technology systems, must be
prepared to protect against cyber
threats and intrusions that could occur
anytime, anywhere. The NERC-CIP
requirements are the first step to
insuring the safe and reliable
operation of the Bulk Electric System.
18
19