+ All Categories
Home > Documents > 19Sept2016 IEEE PES NOLA Website...Nathan Wallace, PhD, CSSA [email protected]...

19Sept2016 IEEE PES NOLA Website...Nathan Wallace, PhD, CSSA [email protected]...

Date post: 09-Aug-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
18
IEEE Power and Energy Society New Orleans Chapter Lunch Tech Talk 09/19/2016 Copyright 2016, Cybirical, LLC All rights reserved. www.cybirical.com 1 19 Sept 2016 Power Systems Cybersecurity Why, what are we missing, and when is it enough? Nathan Wallace, PhD, CSSA [email protected] [email protected] @NathanSWallace Overview Why State of Affairs: Grid & Cyberspace Cybersecurity => Safety MisconcepSons & Challenges What are we missing Cyber aware devices and systems When is it enough Your thoughts? 80 – 95% of the Grid’s Cyber Assets Fall Outside NERC-CIP 80 – 90% of the Grid’s Cyber Assets are Outside NERC-CIP Most Violated: NERC-CIP & NERC-PRC 2006 2015 Licensed Engineering Firm SubstaSon Engineering Relay/SCADA/CommunicaSon T&D Line Engineering EPC/Design-Build/Turnkey Project Development Licensed Engineering Firm Cyber Design Engineering Risk Assessments Vulnerability/Patch Management Internal Cybersecurity Research Patent-Pending Efforts CreaSng a safe, secure, and reliable grid
Transcript
Page 1: 19Sept2016 IEEE PES NOLA Website...Nathan Wallace, PhD, CSSA nwallace@cybirical.com n.wallace.us@ieee.org @NathanSWallace Overview • Why State of Affairs: Grid & Cyberspace Cybersecurity

IEEEPowerandEnergySocietyNewOrleansChapterLunchTechTalk

09/19/2016

Copyright2016,Cybirical,LLCAllrightsreserved.

www.cybirical.com1

19Sept2016

Power Systems Cybersecurity Why, what are we missing, and

when is it enough?

NathanWallace,PhD,[email protected]@ieee.org@NathanSWallace

Overview

•  WhyStateofAffairs:Grid&CyberspaceCybersecurity=>SafetyMisconcepSons&Challenges

•  WhatarewemissingCyberawaredevicesandsystems

•  Whenisitenough

Yourthoughts?

80–95%oftheGrid’s

CyberAssetsFallOutsideNERC-CIP

80–90%oftheGrid’s

CyberAssetsareOutsideNERC-CIP

MostViolated:NERC-CIP

&NERC-PRC

2006 2015

•  LicensedEngineeringFirm•  SubstaSonEngineering•  Relay/SCADA/CommunicaSon•  T&DLineEngineering•  EPC/Design-Build/Turnkey•  ProjectDevelopment

•  LicensedEngineeringFirm•  CyberDesignEngineering•  RiskAssessments•  Vulnerability/PatchManagement•  InternalCybersecurityResearch•  Patent-PendingEfforts

CreaSngasafe,secure,andreliablegrid

Objective of Presentation: Power System Cybersecurity Awareness
Only 10% of the grid is federally required to have a basic level of cybersecurity in place. Of all the federally required (NERC) standards, those pertaining to cybersecurity remain the most violated. As engineers, how can we make these systems and devices more secure and therefore safer and more reliable.
With expertise across both organizations, Ampirical and Cybirical are able to provide a multitude of engineering services and solutions that help create a safe, secure, and reliable grid.
Page 2: 19Sept2016 IEEE PES NOLA Website...Nathan Wallace, PhD, CSSA nwallace@cybirical.com n.wallace.us@ieee.org @NathanSWallace Overview • Why State of Affairs: Grid & Cyberspace Cybersecurity

IEEEPowerandEnergySocietyNewOrleansChapterLunchTechTalk

09/19/2016

Copyright2016,Cybirical,LLCAllrightsreserved.

www.cybirical.com2

Threads

EngineeringServices

CyberAssetManagement

Security:“Thefacetofreliabilitythatrelatestothedegreeofcertaintythatarelayorrelaysystemwillnotoperateincorrectly.”cyberdeviceor

NaSonStates

Hackers

Vendors

IntenSonalInsider

AccidentInsider

MisconfiguraSonCyberSecurity

Cybersecurity=Physical+EMI+Digital[CompuSng&CommunicaSons]

TwoInfrastructures

ResidenSal IndustrialCommercial

GeneraAon Transmission

DistribuAon

•  Physical•  Cyber

ControlCenter

DistribuSonControlCenter

RTOs/ISO

All of Cybirical’s services and solutions can be divided up into these two main threads. Asset Mgmt. include monitoring for vulnerabilities and vendor patches. Shown on the right is a mobile simulatedsubstation environment used for training, research, and demonstration purposes.
Power Systems Cybersecurity: using the security definition from relay protection reveals that the security challenge requires more than justIT solutions. Threats to the grid can be divided up into those with intent (right) and those without (left). All six can negatively impact the grid and may pose a risk to life and property.
As we continue to evolve towards the smart grid, there is a growing reliance on the cyber infrastructure. We have automation, systems, and devices to monitor and protect the flow of power, but we DO NOT currentlyengineer the system to monitor and protect the grid’s supporting cyber infrastructure; even though the technology exists to make this a reality.
Page 3: 19Sept2016 IEEE PES NOLA Website...Nathan Wallace, PhD, CSSA nwallace@cybirical.com n.wallace.us@ieee.org @NathanSWallace Overview • Why State of Affairs: Grid & Cyberspace Cybersecurity

IEEEPowerandEnergySocietyNewOrleansChapterLunchTechTalk

09/19/2016

Copyright2016,Cybirical,LLCAllrightsreserved.

www.cybirical.com3

StateofAffairs:TheGrid

MonitoringPoints ControlPoint

Markets OperaAons ServiceProvider

GeneraAon

Transmission DistribuAon

Customer

StateofAffairs:TheGrid

CommunicaSon

CYBER

NortheastOutage2003

ArizonaOutage2007

FPLOutage2008

UkraineANack2016

LoadLost 61,800MW 400MW 4,300MW 230,000Customers

Intent UnintenSonal UnintenSonal UnintenSonal IntenSonal

Cyber Yes Yes Yes Yes

ComputaSonal

StateofAffairsCyberspace&Cyberwarhlp://hp.ipviking.com/

•  Avgpriceper0-Day:•  Avgnumberofdays0-dayremainsprivate:

•  AvgnumberofdaysSllpatchisissued:

•  Avgofnewlycreatedmalwareperday:•  AvgdwellSmeSlldetecSon:

USD$40,000-$160,000

151days

300,000

205days

120days

The website listed shows live signature-basedcyber attacks. Statistics are pulled from various sources and reflect the state of cyber threats for 2014/2015. A 0-day is a vulnerability the manufacturer is not aware of, and no patch exists. Dwell time is the length of time from breach till detection.
Shown is a representation of the smart gridincluding each domain and communication channel. Each point marked provides an avenue for malicious actors to perform a man-in-the-middleattack. Protective security measures should be implemented on all channels even if that channel is only used for monitoring.
Each asset that has either computational and/or communication capability is classified as cyber. Shown is a list of four power system outages. All four have been determined to be the result of cyber.
Page 4: 19Sept2016 IEEE PES NOLA Website...Nathan Wallace, PhD, CSSA nwallace@cybirical.com n.wallace.us@ieee.org @NathanSWallace Overview • Why State of Affairs: Grid & Cyberspace Cybersecurity

IEEEPowerandEnergySocietyNewOrleansChapterLunchTechTalk

09/19/2016

Copyright2016,Cybirical,LLCAllrightsreserved.

www.cybirical.com4

StateofAffairsCyberspace&Cyberwar

“Global Cyber Weapon Market Expected to Reach USD 522 billion in 2021.”

-GlobalNewswire,2015TransparencyMarketResearchReport

Cybersecurity=>Safety

21LinesofCodeAuroraGeneratorTest

DistribuSonSystemOperator

VirtualPowerPlant

Cybersecurity=>Safety

With the legal and illegal buying, selling, and trading of malicious software, attacks against control system environments are increasing.Unlike a physical attacks, cyber attacks canimpact devices and systems outside the original scope and intent of the attack.
Using 21 lines of code, this experiment showed how a malicious cyber event can result in the physical destruction of assets and poses a dangerto life. By opening and closing the connected breaker out of sync, the generator was completely destroyed.
With the increase in distributed energy resources, the grid now has to support the bi-directional flow ofpower. This posses a risk, as technicians working on lines may not be able to ensure all switches are and remain open. To handle DER, ‘Distribution System Operators’ and ‘Virtual power plants’ are being introduced and increases the dependence on cyber.
Cybersecurity => Safety Example #1
Cybersecurity => Safety Example #2
Page 5: 19Sept2016 IEEE PES NOLA Website...Nathan Wallace, PhD, CSSA nwallace@cybirical.com n.wallace.us@ieee.org @NathanSWallace Overview • Why State of Affairs: Grid & Cyberspace Cybersecurity

IEEEPowerandEnergySocietyNewOrleansChapterLunchTechTalk

09/19/2016

Copyright2016,Cybirical,LLCAllrightsreserved.

www.cybirical.com5

CommonMisconcepAons

•  Wearenotatarget.

•  Minimumsecurityneeded,wearelowimpact.

•  WearenotconnectedtotheInternet.

Ipviking,Shodan,ICS-CERT,ForeignFTPservers

Ukraine,ChangingStandards,StateRegulaSons

Stuxnet,ReporSngcapacitytoRTO,Firewalls

Challenges

MisconcepAon:Wearenotatarget. Ipviking,

MisconcepAon:Wearenotatarget. Ipviking,Shodan,

Based on the evolving threats and conversations with asset owners and engineers, these are the top three misconceptions & concerns regarding power systems cyber security.
Ipviking is a website showing live cyber attacks.After a few minutes, the attacks against the US skyrocket. Just by being in the US, assetsacross multiple industries are an attractivetarget.
Shodan is an ongoing research project for scanning and profiling Internet-facing assets. By continuously scanning, researchers found thousands of control system devices. The results are searchable online and reveal information like: protocol (Modbus, DNP) andvendor (ABB, SEL, Siemens).
Page 6: 19Sept2016 IEEE PES NOLA Website...Nathan Wallace, PhD, CSSA nwallace@cybirical.com n.wallace.us@ieee.org @NathanSWallace Overview • Why State of Affairs: Grid & Cyberspace Cybersecurity

IEEEPowerandEnergySocietyNewOrleansChapterLunchTechTalk

09/19/2016

Copyright2016,Cybirical,LLCAllrightsreserved.

www.cybirical.com6

MisconcepAon:Wearenotatarget. Ipviking,Shodan,ICS-CERT,

0

50

100

150

200

250

300

350

2012 2013 2014 2015

Incide

nts

MisconcepAon:Wearenotatarget. Ipviking,Shodan,ICS-CERT,

•  Passwords,electricaldrawings,communicaSondrawings(IP,Protocols),etc•  Fileserverscontainedmaliciouscode

71GeneraSonPlants

~20,000FilesGeneraSon,Transmission,

DistribuSonSystems“FromNewYorktoCalifornia”

Source:APInvesSgaSon:USPowerGridVulnerabletoForeignHacks.Dec.21,2015

“Digitalcluespointedtoforeignhackers.”

Sevenfile(FTP)serverswithnoauthorizaSon

FTPservers

MisconcepAon:Minimumsecurityneeded,wearelowimpact. Ukraine,

30StaSonsDe-energized

•  7110kVstaSons•  2335kVstaSons•  ~3to6hrstore-energize•  230,000customersimpacted•  Telephonedenialofservice•  Breached6monthsprior•  AlteredfirmwareatsubstaSons

“Wewereblinded”

Dec232015

ControlCenterOperatorSSlloperaSnginrecoverymode.

Source:E-ISAC.AnalysisoftheCyberAlackontheUkrainianPowerGrid.March18,2016

Successful control system attacks are on the rise. Over the past four years, ICS-CERT responded to more than 900 incidents. These events only include incidents where malicious actors gained access to critical infrastructurenetworks.
The grid is a target. Researchers found multipleforeign file servers containing engineering drawings of generation, transmission, anddistribution systems. The servers were also housing malicious code.
First cyber attack resulting in the physical lossof power to a load. The Ukraine event showed that systems considered out of scope byNERC-CIP should still have protective cybermeasures in place. During this event, attackers were able to remotely rewrite firmware on assetsafter de-energizing 30 stations.
Page 7: 19Sept2016 IEEE PES NOLA Website...Nathan Wallace, PhD, CSSA nwallace@cybirical.com n.wallace.us@ieee.org @NathanSWallace Overview • Why State of Affairs: Grid & Cyberspace Cybersecurity

IEEEPowerandEnergySocietyNewOrleansChapterLunchTechTalk

09/19/2016

Copyright2016,Cybirical,LLCAllrightsreserved.

www.cybirical.com7

MisconcepAon:Minimumsecurityneeded,wearelowimpact. Ukraine,ChangingStandards,

NERCPhysical

Securityv3

Voluntary Mandatory

2000MetcalfAlack

Ukraine

2015Dec

2013Apr

StuxnetDiscovered

20101stIEEE

SubstaSonSecStandard

NERCPhysicalSecurityGuidance

2002

EnergyPolicyAct

2005

2005

NERCupdatesAssetID

CIP-002v4

2010

FERCdesignates

NERCasERO

2007

FERCApprovesAssetID

CIP-002v4

2012 2015

NERCEffecSveAssetID

CIP-002v5.1

2017

FERCtoApprove

NERCCIPv7

MisconcepAon:Minimumsecurityneeded,wearelowimpact. Ukraine,ChangingStandards,StateRegulaSons

MisconcepAon:WearenotconnectedtotheInternet.

Stuxnet,

Assets considered low-impact today may be classified as medium tomorrow. Standards evolve over time but not at the rate to keep up with the evolving threats. By focusing first on developing adequate security, asset owners will economically be able to meet current and future compliance standards.
With a growing number of states recognizing NERC’s jurisdictional boundaries, states are starting to enact their own cyber standards and requirements. The order shown requires all Water and Electric utilities in NJ to implementcyber security for all assets. Similar orders are underway in WA and TX.
Do you have to be connected to be attacked?As revealed by Stuxnet, the ‘air-gap’ should not be considered an end-all cybersecurity approach.Discovered in 2010, Stuxnet used multiple 0-day vulnerabilities to cause physical damage to the control system environment. The controllers attacked are also used in generation plants.
Page 8: 19Sept2016 IEEE PES NOLA Website...Nathan Wallace, PhD, CSSA nwallace@cybirical.com n.wallace.us@ieee.org @NathanSWallace Overview • Why State of Affairs: Grid & Cyberspace Cybersecurity

IEEEPowerandEnergySocietyNewOrleansChapterLunchTechTalk

09/19/2016

Copyright2016,Cybirical,LLCAllrightsreserved.

www.cybirical.com8

MisconcepAon:WearenotconnectedtotheInternet.

Stuxnet,ReporSngCapacitytoRTO,

MisconcepAon:WearenotconnectedtotheInternet.

Stuxnet,ReporSngCapacitytoRTO,Firewall

Aug13th,releaseof0-dayvulnerabiliSeskeptbyGovt.Agency.(Cisco,Juniper,etc.)

Challenges NoLongerCanSetItandForgetIt

HMI

LeasedLinePhone,Fiber,DSL,Cable

AreaNetwork

EngineeringWorkstaSons

EMSServers

SCADAHistorian

Sub/Swtyd1Sub/Swtyd2Sub/SwtydN

LDAP/RADIUSServers

Some generation asset owners and operators claim they are not connected to the Internet. However, in order to take part in the energy markets, systems have to be connected to the Internet.
The primary challenge is that we must move away from the ‘Set It and Forget It’ mentality. Devices and systems are increasingly becoming dependent on computational and communication technologies. These devices require continuous security monitoring and updates.
Some view firewalls as devices that create a physical barrier separating untrusted systems from trusted ones. However, firewalls can be misconfigured and have their own set of vulnerabilities. Aug 13th 2016, gov. servers housing vulnerabilities and offensive cyber tools was compromised and information publicly realized.
Page 9: 19Sept2016 IEEE PES NOLA Website...Nathan Wallace, PhD, CSSA nwallace@cybirical.com n.wallace.us@ieee.org @NathanSWallace Overview • Why State of Affairs: Grid & Cyberspace Cybersecurity

IEEEPowerandEnergySocietyNewOrleansChapterLunchTechTalk

09/19/2016

Copyright2016,Cybirical,LLCAllrightsreserved.

www.cybirical.com9

Challenges Complexity

PowerGridSpaceStaSon

VS

TVIntegratedCircuit

Challenges Complexity

***

GDB Server http_server bzip2 openldap openssh openssl openvpn postgresql proftpd ntp sssdd-bus libevent libcapker

beros e2fs progs expat fcgi systemd glib glibc iproute2 libarchive curl libpng linux-pam wireshark util-linux Tcpdump jplayer

udevs trace samba pypam pyopenssl pygresql pycryptomako beaker paramikonet-snmpm getty nano bash Python Cracklib

45ofthe~120third-partysovwaremodulesfoundtobevulnerable

AuthorizaAon

Accountability

IncidentResponsePlanning

VulnerabilityManagement

Patch/FirmwareManagement

CyberEngineering

SecurityMonitoring

CyberRiskManagement

WhatarewemissingCyberRiskManagement

There is a growing level of complexity as the grid becomes an interconnected system of systems.Items shown with increasing complexity left to right.Another primary challenge is the idea of abstraction. Looking at the two service transformers, the differences and age is obvious. With IEDs*, ageand differences are revealed via internal code.*IED Intelligent Electronic Device
We are currently examining an automation device that uses over 120 3rd party software libraries. Of those examined we’ve determined 45 had known vulnerabilities.
Effective cyber risk management requires a multi-disciplinary engineering approach. This is because no single device or software package can satisfy all the cybersecurity concerns and requirements. The device and system has to be designed and integrated for security.
Page 10: 19Sept2016 IEEE PES NOLA Website...Nathan Wallace, PhD, CSSA nwallace@cybirical.com n.wallace.us@ieee.org @NathanSWallace Overview • Why State of Affairs: Grid & Cyberspace Cybersecurity

IEEEPowerandEnergySocietyNewOrleansChapterLunchTechTalk

09/19/2016

Copyright2016,Cybirical,LLCAllrightsreserved.

www.cybirical.com10

CyberRiskManagementAuthorizaAon

Whatarewemissing

Devices

People

•  Robust&SecureNetworkDesign•  DeviceConfiguraSon•  DeviceandSystemCheckout/Commissioning

•  Who(Operators,vendors,contractors…)•  What(Devices,rolesandresponsibiliSes)•  When(Date,Sme,duraSon)•  How(FTP,Telnet,Web,Serial,TCP/IP)

CyberRiskManagementAccountability

Whatarewemissing

Devices

People

Vendors

•  Configuredtorecordandreport(via:HMIs,Syslog,DCcontacts,Email)

•  AcSvevulnerabilitydiscoveryandpatchingprocess•  Securedesignandcode•  Builtinsecurityfeatures

•  Uniqueusers•  Appointedsecuritypersonnel

VulnerabilityManagement

CVE-2016-4524Summary:ABBPCM600andbefore2.7improperlystoresIEC61850passwordsallowinguserstogainaccesstocontrolledIEDs.Published:06/09/2016 CriAcality:6.5

CVE-2016-5814Summary:RockwellautomaSonRSLogix500andRSLogixMicroPLCsovwareallowsforabufferoverflowcondiSonallowingforcodeexecuSonwhenopeningmalformedsezngs.Published:09/15/2016 CriAcality:8.6

CVE-2016-2310Summary:GEML800,ML1200,ML2400,ML810,ML3000,ML3100switcheshavehardcodedcredenSals,whichallowsalackerstoremotelymodifyconfiguraSonsezngs.Published:06/10/2016 CriAcality:9.8

WhatarewemissingCyberRiskManagement

Authorization of devices and people helps ensureevents remain isolated and prevents malware fromspreading. Additionally, these key pieces of information can be used in intrusion detection systems (IDSs) to detect, log, and report suspicious activity.
Example of three vulnerabilities that were published in 2016. Criticality ranges from 1-10 and describes the severity of the vulnerability, 10 being the worst. CVE-2016-2310 revealed that GE used hardcoded passwords on 6 network switches. Vulnerability tracking is essential to reducing risk and should beperformed in the context of the system.
Accountability should include: devices, people, and vendors. Devices can be configured to recordevents and securely transmit logs. One primary way to hold people accountable is to useunique credentials. Lastly, vendors should be heldaccountable for the security of the products theyproduce.
Page 11: 19Sept2016 IEEE PES NOLA Website...Nathan Wallace, PhD, CSSA nwallace@cybirical.com n.wallace.us@ieee.org @NathanSWallace Overview • Why State of Affairs: Grid & Cyberspace Cybersecurity

IEEEPowerandEnergySocietyNewOrleansChapterLunchTechTalk

09/19/2016

Copyright2016,Cybirical,LLCAllrightsreserved.

www.cybirical.com11

Patch/FirmwareManagement

SEL-2241-R133-V0-Z001001-D20141103Summary:ResolvedavulnerabilityinOpenSSLthatcouldallowunauthorizedaccess.

SEL-735-R115-V0-Z008005-D20150519Summary:CorrectedanissuewherethemeterrestartedorstoppedoperaSngduringfiletransfersinthepresenceofasaturatednetwork.

SEL-3530-R136-V0-Z001001-D20160624Summary:UpdatedSSHclientandservertoaddressCVE-2013-4421andCVE-2013-4434CVE-2013-4421:AllowsremotealackerstocauseaDoS.

WhatarewemissingCyberRiskManagement

SecurityMonitoring

WhatarewemissingCyberRiskManagement

HMIExample

CyberEvent

PhyEntryAlarmRiverRoadSub.091920161230

CyberAwareDevicesandSystems

Vendors now have to be tracked in order to determine if a patch/update has been issued. Example: The SEL-3530 R136 firmware patch issued in 2016 corrected a vulnerability publicly announced in 2013.
Security monitoring includes the active monitoring, detection, logging, and reporting of potentially malicious cyber events. This can be performed in a number of ways and at ranging levels of sophistication. With modern substation IEDs, basic security monitoring can be economicallyimplemented, if engineered.
HMI Example: Here is a generic HMI screendepicting a one-line an operator may use to control the power flowing through a station. The industry has been doing this for a number of years.
Page 12: 19Sept2016 IEEE PES NOLA Website...Nathan Wallace, PhD, CSSA nwallace@cybirical.com n.wallace.us@ieee.org @NathanSWallace Overview • Why State of Affairs: Grid & Cyberspace Cybersecurity

IEEEPowerandEnergySocietyNewOrleansChapterLunchTechTalk

09/19/2016

Copyright2016,Cybirical,LLCAllrightsreserved.

www.cybirical.com12

HMI Example: Leveraging the same communicationinfrastructure and IEDs used to create the one-line shown previously, the system can be engineered insuch a way that operators can also monitor the supporting cyber infrastructure.
HMI Example: Here is an example of a cyber one-line HMI screen that can be used to monitor and control the cyber infrastructure. Information related to: if the device is online,temperature, number of active users, and warningmessages can be directly viewed.
HMI Example: In this example, the HMI screenhas been programmed with additional buttons allowing an operator to click ‘DETAILS’ in order toview more information related to the asset. This information is reported to the operator in real-time. Note: This is just an example of what’s possible.
Page 13: 19Sept2016 IEEE PES NOLA Website...Nathan Wallace, PhD, CSSA nwallace@cybirical.com n.wallace.us@ieee.org @NathanSWallace Overview • Why State of Affairs: Grid & Cyberspace Cybersecurity

IEEEPowerandEnergySocietyNewOrleansChapterLunchTechTalk

09/19/2016

Copyright2016,Cybirical,LLCAllrightsreserved.

www.cybirical.com13

IncidentResponsePlanning

WhatarewemissingCyberRiskManagement

Devices

People

•  Backups•  Configuredandeventreadydevicesandsystems•  CyberLockoutExample

•  Training•  Policies&Procedures•  DigitalForensicsAnalysis•  Wheretolook…

CyberEngineering

WhatarewemissingCyberRiskManagement

Design

Analysis

•  n-1conSngencyforcyber•  ImpactdrivenunderstandingandprioriSzaSonofprotecSvemeasures•  IncidentResponse

•  IntegratedsecurityandconfiguraSons•  Enabledandcontextdrivenmonitoring,logging,andalarming•  Incidentreadydevicesandsystems•  $$$Reducescompliancecosts$$$

Incident response planning should include a rangeof scenarios that outline how people and devices should respond to a cyber event.
HMI Example: Shown in the cyber one-linein the blue boxes is a ‘Cyber-Lockout’. If an operatorsees something suspicious in the control room, he can use this to send a signal to all connected IEDsinstructing them to take corrective actions. This is an example of active incident response technique used to decrease the impact to operations. Note: This is just an example of what’s possible.
The primary enabling factor for effective cyber riskmanagement is sound cyber engineering. As in other disciplines of engineering, this includes a design element and an analysis element. By bakingsecurity into the design, the system can be engineeredfor security and increased situational awareness.
Page 14: 19Sept2016 IEEE PES NOLA Website...Nathan Wallace, PhD, CSSA nwallace@cybirical.com n.wallace.us@ieee.org @NathanSWallace Overview • Why State of Affairs: Grid & Cyberspace Cybersecurity

IEEEPowerandEnergySocietyNewOrleansChapterLunchTechTalk

09/19/2016

Copyright2016,Cybirical,LLCAllrightsreserved.

www.cybirical.com14

AuthorizaAon

Accountability

IncidentResponsePlanning

VulnerabilityManagement

Patch/FirmwareManagement

CyberEngineering

SecurityMonitoring

CyberRiskManagement

WhatarewemissingCyberRiskManagement

Whatarewemissing

Exhibit 4.1.1 Strategies for Achieving Energy Delivery Systems Cybersecurity

Vision: By2020,resilientenergydeliverysystemsaredesigned,installed,operated,andmaintainedtosurviveacyberincidentwhilesustainingcriScalfuncSons.

Strategies: BuildCultureofSecurity

AssesandMonitorRisk

ProtecSveMeasurestoReduceRisk

ManageIncidents

SustainSecurityImprovements

Near-term (0–3 years) By 2013

Mid-term (4–7 years) By 2017

Long-term (8–10 years) By 2020

This publication by the Dept. of Energy in 2011provided an analysis of industry shortcomings related to cybersecurity. The report optimistically identified key goals for near-, mid-, and long-term that should be implemented to achieve energy sector cybersecurity across all levels of generation, transmission, and distribution.
Overall, we have to do a better job of cyber riskmanagement. The traditional silos between design, operations, and maintenance will have to be bridged. This includes the IT/OT divide.
The 2020 vision is somewhat optimistic provided, the rate of change and life span of assets. However,overall this report offers multiple benchmark assetowners and engineers can use to help judge the cybersecurity posture and capabilities.
Page 15: 19Sept2016 IEEE PES NOLA Website...Nathan Wallace, PhD, CSSA nwallace@cybirical.com n.wallace.us@ieee.org @NathanSWallace Overview • Why State of Affairs: Grid & Cyberspace Cybersecurity

IEEEPowerandEnergySocietyNewOrleansChapterLunchTechTalk

09/19/2016

Copyright2016,Cybirical,LLCAllrightsreserved.

www.cybirical.com15

Exhibit 4.1.1 Strategies for Achieving Energy Delivery Systems Cybersecurity

Vision: By2020,resilientenergydeliverysystemsaredesigned,installed,operated,andmaintainedtosurviveacyberincidentwhilesustainingcriScalfuncSons.

Near-term (0–3 years) By 2013

3.1 Capabilities to evaluate the robustness and survivability of platforms, systems, networks, and systems

Strategies: BuildCultureofSecurity

AssesandMonitorRisk

ProtecSveMeasurestoReduceRisk

ManageIncidents

SustainSecurityImprovements

Exhibit 4.1.1 Strategies for Achieving Energy Delivery Systems Cybersecurity

Vision: By2020,resilientenergydeliverysystemsaredesigned,installed,operated,andmaintainedtosurviveacyberincidentwhilesustainingcriScalfuncSons.

Near-term (0–3 years) By 2013

4.1 Tools to identify cyber events across all levels of energy delivery system networks 4.2 Tools to support and implement cyber attack response decision making for the human operator

Strategies: BuildCultureofSecurity

AssesandMonitorRisk

ProtecSveMeasurestoReduceRisk

ManageIncidents

SustainSecurityImprovements

Exhibit 4.1.1 Strategies for Achieving Energy Delivery Systems Cybersecurity

Vision: By2020,resilientenergydeliverysystemsaredesigned,installed,operated,andmaintainedtosurviveacyberincidentwhilesustainingcriScalfuncSons.

4.4Real-SmeforensicscapabiliSes4.5CybereventdetecSontoolsthatevolvewiththedynamicthreatlandscape

Strategies: BuildCultureofSecurity

AssesandMonitorRisk

ProtecSveMeasurestoReduceRisk

ManageIncidents

SustainSecurityImprovements

Mid-term (4–7 years) By 2017

Though this can be manually performed, the industry lacks commercial software capable ofperforming this type of evaluation. To adequately perform this type of analysis requires an individual or team to have expertise across multiple disciplines including: power systems engineering, computer science, communications, and information technology.
Real-time forensics capability does exists via contextdriven monitoring, logging, and reporting. However, this ability is currently not being integrated into the systems.
This is still not a reality for most asset owners. However, as demonstrated with the HMI example previously described, this capability can be engineered into the system.
Page 16: 19Sept2016 IEEE PES NOLA Website...Nathan Wallace, PhD, CSSA nwallace@cybirical.com n.wallace.us@ieee.org @NathanSWallace Overview • Why State of Affairs: Grid & Cyberspace Cybersecurity

IEEEPowerandEnergySocietyNewOrleansChapterLunchTechTalk

09/19/2016

Copyright2016,Cybirical,LLCAllrightsreserved.

www.cybirical.com16

Exhibit 4.1.1 Strategies for Achieving Energy Delivery Systems Cybersecurity

Vision: By2020,resilientenergydeliverysystemsaredesigned,installed,operated,andmaintainedtosurviveacyberincidentwhilesustainingcriScalfuncSons.

Strategies: BuildCultureofSecurity

AssesandMonitorRisk

ProtecSveMeasurestoReduceRisk

ManageIncidents

SustainSecurityImprovements

2.3Toolsforreal-Smesecuritystatemonitoringandriskassessmentofallenergydeliverysystemarchitecturelevelsandacrosscyber-physicaldomains.

Long-term (8–10 years) By 2020

Exhibit 4.1.1 Strategies for Achieving Energy Delivery Systems Cybersecurity

Vision: By2020,resilientenergydeliverysystemsaredesigned,installed,operated,andmaintainedtosurviveacyberincidentwhilesustainingcriScalfuncSons.

Strategies: BuildCultureofSecurity

AssesandMonitorRisk

ProtecSveMeasurestoReduceRisk

ManageIncidents

SustainSecurityImprovements

3.5CapabiliSesthatenablesecuritysoluSonstoconSnueoperaSonduringacyberalack

Long-term (8–10 years) By 2020

Exhibit 4.1.1 Strategies for Achieving Energy Delivery Systems Cybersecurity

Vision: By2020,resilientenergydeliverysystemsaredesigned,installed,operated,andmaintainedtosurviveacyberincidentwhilesustainingcriScalfuncSons.

Strategies: BuildCultureofSecurity

AssesandMonitorRisk

ProtecSveMeasurestoReduceRisk

ManageIncidents

SustainSecurityImprovements

4.7CapabiliSesforautomatedresponsetocyberincidents.

Long-term (8–10 years) By 2020

This type of capability depends on the level ofsophistication of the cyber attack. In most cases, this can be achieved via proper techniques in network segmentation and integrated engineering.
As demonstrated by the cyber lockout example, the capability exists to make this a reality. However,any cyber automation needs to be integrated andengineered into the system. Also, this type of responsewill have to be tested to ensure little to no unexpectedimpact to the operational environment.
The real-time security state monitoring and riskassessments across all levels and cyber-physicaldomains is possible and will involve incorporatingcutting-edge research that is currently being performed at various universities and DOE labs.
Page 17: 19Sept2016 IEEE PES NOLA Website...Nathan Wallace, PhD, CSSA nwallace@cybirical.com n.wallace.us@ieee.org @NathanSWallace Overview • Why State of Affairs: Grid & Cyberspace Cybersecurity

IEEEPowerandEnergySocietyNewOrleansChapterLunchTechTalk

09/19/2016

Copyright2016,Cybirical,LLCAllrightsreserved.

www.cybirical.com17

BusinessLayer

Life-CycleManagementLayer

OperaAonsLayer

PhysicalLayer

Cyber-PhysicalLayer

Requirements RegulaSons IncenSves

Design Upgrades Ops Disposal

Design

Sensors

CompuSngPla{orm

Models

PowerSystemState

Controller

Monitor ControlDisposal

Current New

Models

Cyber Phys.

CPS

Phys.Econ.

Whatarewemissing

CyberInfrastructure(ComputaAon&CommunicaAon)

ProtecAonandControl

DetecSon,Processing,ManipulaSon

PhysicalInfrastructure(FlowofPower)

Inputs:Currents,Voltages,Impedance,Status(open,close,lockout)

Output:Open/CloseBkr,+/-Vars,

Inputs:Topology,trafficflows,deeppacketinspecSon,communicaSonstate,stateofphysicalpowersystem

Output:NOTHING!

Whatarewemissing

Whenisitenough?

Safety?

hlp://hp.ipviking.com/

Taking into account the six threats on the bottom left and how the grid and cyberspace are both evolving, as engineers we need to ask: is a new security approach needed and when is it enough?
There are a number of similarities between the protection and control of the flow of power and the protection and control of the grids supporting cyber infrastructure.
The modern grid is classified as a Cyber-Physical System due to the fact that today’s grid could not operate without the supporting cyber infrastructure.However, as an industry we do not currently have universal models and standards to monitor and protect the system at this layer.
Page 18: 19Sept2016 IEEE PES NOLA Website...Nathan Wallace, PhD, CSSA nwallace@cybirical.com n.wallace.us@ieee.org @NathanSWallace Overview • Why State of Affairs: Grid & Cyberspace Cybersecurity

IEEEPowerandEnergySocietyNewOrleansChapterLunchTechTalk

09/19/2016

Copyright2016,Cybirical,LLCAllrightsreserved.

www.cybirical.com18

QuesSons?

NathanWallace,PhD,[email protected]@ieee.org@NathanSWallace

We appreciate your interest and feedback. If you have any questions or comments please feel free to contact us at:
Cybirical, LLC 5 Sanctuary Blvd., Suite 200 Mandeville, LA 70471-2939
[email protected] 985.231.0190 www.cybirical.com
If you have any questions, you can reach me at: (o) 985-292-5502 Thank you for your time and interest as we strive to create a more secure and reliable grid.

Recommended