+ All Categories
Home > Documents > USRP 0316 Resources 030812 v2.pdf

USRP 0316 Resources 030812 v2.pdf

Date post: 01-Dec-2015
Category:
Upload: wrxin
View: 67 times
Download: 5 times
Share this document with a friend
Description:
U.S. Resilience Project final report to the Department of Energy on supply chain security best practices. Interviews were conducted with Fortune 500 companies.
Popular Tags:
175
1 www.usresilienceproject.org Contents Section One: Article and Report Summaries Chapter 1: New Landscape of Risk 3 Chapter 2: The Cure for Anxiety Deficit Disorder 11 Chapter 3: New Strategies for Supply Chain Risk Management 19 Chapter 4: Cyber Supply Chain Risks, Strategies and Best Practices 27 Chapter 5: Anti-Counterfeiting Strategies, Processes and Best Practices 41 Chapter 6: Business Case for Supply Chain Security and Resilience 51 Chapter 7: Linking Smart Grid, Cybersecurity and Supply Chain 61 Chapter 8: National Strategies for Smart Grid, Cybersecurity and Supply Chain 71 Section Two: Case Studies Dow Chemical: Strategies for Supply Chain Security and Sustainability 79 De-Risking the Supply Chain: Cisco’s Risk Intelligence and Analytic Tools 85 Supply Chains in Crisis: Dealing with Disaster — Cisco’s Response in Japan 91 Managing for Operational Excellence: Supply Chain Leadership at DuPont 95 NASA Supply Chain: Maintaining a Vital Space Industrial Base 101 Verizon: Building Security into the Network 113 HP: Mature Business Processes for End-to-End Supply Chain Security 117 Securing Information on the Smart Grid: Telvent Supply Chain Best Practices 121 Section Three: Tools and Guides From the Utilities Appendix A: Sample Guidelines for Supplier Cyber Security 125 Appendix B: Sample Smart Grid Cyber Security and Interoperability Requirements 127 From the Supply Chain Risk Leadership Council Appendix 1: Sample Terms and Conditions for Supply Chain Security 155 Appendix 2: Sample Supply-Chain Security Contract Language for International 159 and Third Party Logistics Service Providers Appendix 3: Sample Supply-Chain Security Self-Assessment Questionnaire 163 for Suppliers or Other Supply-Chain Partners
Transcript
Page 1: USRP 0316 Resources 030812 v2.pdf

1www.usresilienceproject.org

Contents

Section One: Article and Report Summaries

Chapter 1: New Landscape of Risk 3

Chapter 2: The Cure for Anxiety Deficit Disorder 11

Chapter 3: New Strategies for Supply Chain Risk Management 19

Chapter 4: Cyber Supply Chain Risks, Strategies and Best Practices 27

Chapter 5: Anti-Counterfeiting Strategies, Processes and Best Practices 41

Chapter 6: Business Case for Supply Chain Security and Resilience 51

Chapter 7: Linking Smart Grid, Cybersecurity and Supply Chain 61

Chapter 8: National Strategies for Smart Grid, Cybersecurity and Supply Chain 71

Section Two: Case Studies

Dow Chemical: Strategies for Supply Chain Security and Sustainability 79

De-Risking the Supply Chain: Cisco’s Risk Intelligence and Analytic Tools 85

Supply Chains in Crisis: Dealing with Disaster — Cisco’s Response in Japan 91

Managing for Operational Excellence: Supply Chain Leadership at DuPont 95

NASA Supply Chain: Maintaining a Vital Space Industrial Base 101

Verizon: Building Security into the Network 113

HP: Mature Business Processes for End-to-End Supply Chain Security 117

Securing Information on the Smart Grid: Telvent Supply Chain Best Practices 121

Section Three: Tools and Guides

From the Utilities

Appendix A: Sample Guidelines for Supplier Cyber Security 125

Appendix B: Sample Smart Grid Cyber Security and Interoperability Requirements 127

From the Supply Chain Risk Leadership Council

Appendix 1: Sample Terms and Conditions for Supply Chain Security 155

Appendix 2: Sample Supply-Chain Security Contract Language for International 159 and Third Party Logistics Service Providers

Appendix 3: Sample Supply-Chain Security Self-Assessment Questionnaire 163 for Suppliers or Other Supply-Chain Partners

Page 2: USRP 0316 Resources 030812 v2.pdf

2 U.S. Resilience Project

Securing the Smart Grid Workshop

Page 3: USRP 0316 Resources 030812 v2.pdf

3www.usresilienceproject.org

CHAPTER 1: New Landscape of Risk

CHAPTER 1

New Landscape of Risk

Rapid globalization is altering the world in fundamental ways, and everyone and everything are more connected and more interdependent than ever before. Risks are magnified in an environment in which disruptions cascade across networks and borders. The only certainty is that the future will be volatile and uncertain. Here is how some leading organizations characterize challenges, priorities and coping mechanisms for the new risk landscape.

Global Risks 2011World Economic ForumJanuary 2011Kristel Van der Elst and Nicholas Davis

Three risk clusters are emerging:

Δ Macroeconomic imbalances: A cluster of economic risks including macroeconomic imbalances and currency volatility, fiscal crises and asset price collapse arise from the tension between the increasing wealth and influence of emerging economies and high levels of debt in advanced economies. Savings and trade imbalances within and between countries are increasingly unsustainable, while unfunded liabilities create extreme long-term pressure on fiscal positions.

Δ Illegal economy: This cluster of risks includes state fragility, illicit trade, organized crime and corruption. A networked world, governance failures and economic disparity create opportunities for such illegal activities to flourish. In 2009, the value of illicit trade around the globe was estimated at $1.3 trillion and growing.

Δ Water-food-energy nexus: A rapidly rising global population and growing prosperity are putting unsustainable pressures on resources. Demand for water, food and energy is expected to rise by 30 percent - 50 percent in the next two decades, while economic disparities incentivize short-term responses in production and consumption that undermine long-term sustainability. Shortages could cause social and political instability, geopolitical conflict and irreparable environmental damage.

Five risks bear watching:

1. Cyber-security issues ranging from the growing prevalence of cyber theft to the little-understood possibility of all-out cyber warfare.

2. Demographic challenges adding to fiscal pressures in advanced economies and creating severe risks to social instability in emerging economies.

3. Resource security issues causing extreme volatility and sustained increases over the long run in energy and commodity prices, if supply is no longer able to keep up with demand.

4. Retrenchment from globalization through populist responses to economic disparities, if emerging economies do not take up a leadership role.

5. Weapons of mass destruction, especially the possibility of renewed nuclear proliferation between states.

Page 4: USRP 0316 Resources 030812 v2.pdf

4 U.S. Resilience Project

Securing the Smart Grid Workshop

Global Risk Management Survey 2011Aon Risk Solutions

Top 10 Risks of 2011

Coping with ComplexityThe Upside of Down: Catastrophe, Creativity and the Renewal of CivilizationIsland Press, 2006Thomas Homer-Dixon

It is the “Flat Earth Meets the Black Swan.” Five “tectonic stresses” are accumulating deep underneath the surface of today’s global order:

1. Energy stress, especially from increasing scarcity of conventional oil;

2. Economic stress from greater global economic instability and widening income gaps between rich and poor;

3. Demographic stress from differentials in population growth rates between rich and poor societies, and from expansion of megacities in poor societies;

4. Environmental stress from worsening damage to land, water forests and fisheries; and

5. Climate stress from changes in the composition of Earth’s atmosphere.

These conditions are like tectonic plates bumping into each other, building up pressures which ultimately must be relieved. They are made worse because of global connectivity. Everything, everyplace is connected. This means a small event in one place can have an outsized impact everywhere.

0 20 40 60 80

Cash flow/liquidity risk

Technology failure/system failure

Commodity price risk

Failure to attract or retain top talent

Failure to innovate/meet customer needs

Business interruption

Damage to reputation/brand

Increasing competition

Regulatory data/legislative changes

Economic slowdown

PERCENT

64%

65%

71%

61%

69%

68%

60%

76%

76%

77%

Page 5: USRP 0316 Resources 030812 v2.pdf

5www.usresilienceproject.org

CHAPTER 1: New Landscape of Risk

The Century of DisastersSlate, May 13, 2011 Joel Achenbach

This will be the century of disasters — not because natural phenomena are more frequent, but because more people and more stuff stand in the way of calamity. There are now 7 billion people, a majority living in cities. In 1800, only Beijing could count a million inhabitants, but at last count there were 381 cities with at least one million people. Many are “megacities” in seismically hazardous places — Mexico City, Caracas, Tehran and Kathmandu being among those with a lethal combination of weak infrastructure (unreinforced masonry buildings) and a shaky foundation.

Natural disasters will increasingly be accompanied by technological crises—and the other way around. In March 2011, the Japan earthquake triggered the Fukushima Daiichi nuclear power plant meltdown. In April 2010, a technological failure on the Deepwater Horizon drilling rig in the Gulf of Mexico led to the environmental crisis of the oil spill.

Why Forecasts Fail—What to Do InsteadMIT Sloan Management Review Winter 2010, Volume 51, Number 2 Spyros Makridakis, Robin M. Hogarth and Anil Gaba

Key Findings

Δ In most areas of business, accurate forecasting is not possible. Future uncertainty is much greater than most managers acknowledge.

Δ Statistical regularity does not imply predictability.

Δ Instead of seeking predictability, managers should channel their efforts into being prepared for different contingencies.

Moving from Forecasts to Planning Strategies: Accept, Assess, Augment

Δ Accept that you are operating in an uncertain world.

Δ Assess the level of uncertainty you face. Model uncertainties and look for additional relevant data, but always consider the unpredictability of falling coconuts.

Δ Augment the range of uncertainty. Extensive empirical evidence shows that people consistently underestimate uncertainty — their powers of imagination are usually worse than their powers of mathematics. Rule of thumb: If you have a small amount of historical data that is relevant for modeling the future, double the difference between the largest and smallest observations. If you have a wealth of data, multiply it by at least 1.5.

Page 6: USRP 0316 Resources 030812 v2.pdf

6 U.S. Resilience Project

Securing the Smart Grid Workshop

Seeing Around CornersMcKinsey Quarterly, October 2009 Eric Lamarre and Martin Pergler

Most companies have some sort of process to identify and rank risks, often as part of an enterprise risk management program. While such processes can be helpful, many examine only the most direct risks, neglecting the indirect ones that can have an equal or greater impact. Executives who systematically examine the way risks propagate across the whole value chain — including competitors, suppliers, distribution channels and customers — can foresee and prepare for second-order effects more successfully.

How Risks CascadeSource: McKinsey Quarterly

Page 7: USRP 0316 Resources 030812 v2.pdf

7www.usresilienceproject.org

CHAPTER 1: New Landscape of Risk

Surviving and Thriving in Uncertainty: Creating the Risk Intelligent Enterprise John Wiley & Sons, Inc., 2010 Frederick Funston, Stephen Wagner

Essential Risk Intelligence Skills

Δ Check assumptions about the “knowns”: Black Swan is simply a metaphor for mental models. Europeans could not imagine that swans could be black until they went to Australia in 1697 and found them. In the same way, organizations often fail to challenge assumptions about their core business and operational strategies — even as the world is changing around them.

Δ Maintain constant vigilance: How can we find the unexpected before it finds us? Risk-intelligent enterprises look for evidence that their assumptions are wrong. Sometimes that means identifying weak signals that key assumptions in the environment are changing in ways that threaten your business.

Δ Make key connections and manage complexity: Survival training has three 3’s: 3 minutes without air; 3 days without water; 3 weeks without food. Risk intelligent organizations identify their critical dependencies and how long they can survive without them.

Δ Factor in velocity and momentum: Bad things happen faster than good; reputations are gained in inches per year and lost in feet per second. The speed of response has to be matched to the speed of onset.

Δ Anticipate causes of failure: Risk-intelligent enterprises legitimize a constructive discussion of triggers for failure. They do not just step outside the box, they actively attack it.

Δ Verify sources and corroborate information: In God we trust; all others bring data. Prior experience is not necessarily a good predictor for the future. Executive opinions, while important, need to be corroborated.

Δ Maintain a margin of safety: October is a particularly dangerous month. Other dangerous months are July, January, September, May, March, November and so on. No margin of safety leaves no margin for error.

Δ Set enterprise time horizons: Urgent problems are often not the most important ones. Short-term events carry a risk of over-reaction.

Δ Take enough of the right risks: The greatest risk is the failure to take risk. Traditional risk management is so focused on protecting value that it often fails to see and seize opportunities.

Δ Develop and sustain operational discipline: Ben Franklin said: “Well done is better than well said.” But too often, when all has been said and done, more has been said than done.

Page 8: USRP 0316 Resources 030812 v2.pdf

8 U.S. Resilience Project

Securing the Smart Grid Workshop

The Resilient EnterpriseMIT Press, 2005 Yossi Sheffi

Companies are now exposed to a multitude of unexpected events — from natural disasters such as earthquakes to terrorist attacks and supplier failures. They not only need to become more resilient to these shocks, but they can actually increase their everyday competitiveness and gain strength from such disruptions.

A company can become more resilient by designing its supply chain for robustness. One of the standard ways is to use redundancy, which is expensive. Other ways to make the system more resilient include the following: forging strong relationships with critical suppliers while developing alternatives for commodity suppliers; working with interchangeable parts; cross-training employees; deploying flexible manufacturing; utilizing concurrent processes of design, manufacturing and distribution; delaying product differentiation downstream in the supply chain so products remain in a fungible state as long as possible; and collaborating with trading partners. These principles create supply chains that are not only resilient, but are also flexible and that can respond to day-to-day demand changes.

Enterprise Vulnerability MapSource: Yossi Sheffi, The Resilient Enterprise, MIT Press, 2005.

Single portclosure

Transportationlink disruption

Economicrecession

Labor unrest

Loss ofkey supplier

Visible qualityproblems

Computer virus

Wind damage

Earthquake

IT systemfailure

Producttampering

Technologicalchange

Flood

Workplaceviolence

Multipleport closure

Accountingirregularity

Employeesabotage

H I G HP R O B A B I L I T Y

M I L DC O N S E Q U E N C E S

S E V E R EC O N S E Q U E N C E S

L O WP R O B A B I L I T Y

Page 9: USRP 0316 Resources 030812 v2.pdf

9www.usresilienceproject.org

CHAPTER 1: New Landscape of Risk

Bibliography

Achenbach, Joel. “The Century of Disasters.” Slate Magazine, May 13, 2011. http://www.slate.com/articles/health_and_science/science/2011/05/the_century_of_disasters_2.html.

Aon Risk Solutions. Global Risk Management Survey 2011. Chicago: Aon Corporation, 2011. http://img.en25.com/Web/AON/2011%20Global%20Risk%20Management%20Survey_20110708.pdf.

Funston, Rick and Steve Wagner. Surviving and Thriving in Uncertainty: Creating the Risk Intelligent Enterprise. Hoboken, New Jersey: John Wiley & Sons, Inc. 2010.

Lamarre, Eric and Martin Pergler. “Risk: Seeing Around the Corners.” McKinsey Quarterly, October 2009. http://www.mckinseyquarterly.com/Risk_Seeing_around_the_corners_2445.

Sheffi, Yossi. The Resilient Enterprise. Cambridge, MA: The MIT Press. October 2005. http://mitpress.mit.edu/catalog/item/default.asp?ttype=2&tid=10624&sid=1571AD3C-4816-4DBD-9E85-833E549B7437.

Van der Elst, Kristel and Nicholas Davis. Global Risks 2011 Sixth Edition. Geneva, Switzerland: World Economic Forum, Janurary 2011. HYPERLINK “http://riskreport.weforum.org/” http://riskreport.weforum.org/.

Page 10: USRP 0316 Resources 030812 v2.pdf

10 U.S. Resilience Project

Securing the Smart Grid Workshop

Page 11: USRP 0316 Resources 030812 v2.pdf

11www.usresilienceproject.org

CHAPTER 2: The Cure for Anxiety Deficit Disorder

There are clear and compelling indicators of increased climate volatility, and the impacts of climate volatility are expected to cascade into multiple risk areas, from food insecurity to water shortages to health impacts.

For the foreseeable future, supply chain managers will have to navigate the effects of climate volatility, resource constraints, infrastructure interdependencies, cyber attacks, as well as assorted Black Swans. The following indicators identify some key risk triggers.

Climate Volatility

Indicators

Δ According to Swiss Re, the number of significant events has tripled and insured losses have increased from 10 billion to 100 billion between 1970 and 2010.1

Δ An international research team of scientists has shown that the rate of sea-level rise along the U.S. Atlantic coast is greater now than at any time in the past 2,000 years.2

Δ A February 2011 special report from Reuters noted that it has been rough going for the $500 billion U.S. property insurance business, explaining that “storms are happening in places they never happened before, at intensities they have never reached before and at times of year when they did not used to happen.”3

Δ A 2010 report from Sandia National Laboratories estimates that “the climate uncertainty as it pertains to rainfall alone [puts] the U.S. economy at risk of losing between $600 billion and $2 trillion, and between four million and 13 million U.S. jobs over the next 40 years.” 4

1 Bevere, Natural Catastrophes and Man-Made Disasters.

2 “Record rise in sea level in two millennia.” Homeland Security NewsWire, June 21, 2011. http://www.homelandsecuritynewswire.com/record-rise-sea-level-two-millennia.

3 Berkowitz, “Special Report: Extreme Weather.”

4 Weiss, Vasquez, and Kaldunski, The Year of Living Dangerously.

CHAPTER 2

The Cure for Anxiety Deficit Disorder

Page 12: USRP 0316 Resources 030812 v2.pdf

12 U.S. Resilience Project

Securing the Smart Grid Workshop

Access to Critical Resources

Indicators

Δ The world’s population is projected to increase from 6 to 8 billion. Demand for food is expected to increase by 50 percent. The UN projects that rising population and demand will require a 70 percent increase in food production by 2050.5

Δ State-controlled oil companies — so-called national oil companies (NOCs) — hold about three-quarters of the world’s oil reserves, with implications for everything from gasoline prices to geopolitics.6

Δ The European Commission identified that 14 critical raw materials needed for mobile phones and emerging technologies, such as solar panels and synthetic fuels, face shortages.7

Δ China produces about 95 percent of rare earth metals and other critical minerals, such as rhenium, platinum and iridium. It also has at least 50 percent of the global production of other key raw materials, including bauxite, coke, fluorspar, magnesium, manganese, silicon carbide, silicon metal, yellow phosphorous and zinc — for which it has imposed export restrictions. A World Trade Organization ruling against China is expected to be appealed.8

5 How to Feed the World 2050, “Issue Briefs.”

6 Program on Energy and Sustainable Development, “National Oil Companies.”

7 Ad-Hoc Working Group, Critical Raw Materials for the EU.

8 “China’s Growing Role in the Production,” Strategic Metal Report.

Demand for resources is growing rapidly. The United Kingdom’s Chief Scientist warned that the world is heading for The Perfect Storm by 2030, with looming food shortages, scarce water supplies, scarcities in arable land, and insufficient energy. Competing demands, in conjunction with concentrated supplies, could also create shortages of minerals and heavy metals.

Page 13: USRP 0316 Resources 030812 v2.pdf

13www.usresilienceproject.org

CHAPTER 2: The Cure for Anxiety Deficit Disorder

Water Shortages

Companies face four types of water risks:

1. Physical risk: Freshwater shortage in their supply chain or own operations.

2. Reputational risk: Corporate image issues from public scrutiny of sustainability policies and equitable water use.

3. Regulatory risk: Governmental regulation of water use.

4. Financial risk: Based on the above risks, potential for increased costs/reduced revenues.9

Indicators

Δ The “business-as-usual” water-demand scenario will still outstrip supply by 40 percent by 2030. This has the potential to put $63 trillion of global gross domestic product at risk by 2050.10

Δ More than one-third of the world’s population — roughly 2.4 billion people — live in water-stressed countries, and by 2025, the number is expected to rise to two-thirds.11

Δ Analysis from The ERIS Foundation shows that 54 percent of companies are exposed to water risks. However, worryingly less than 1 percent can currently demonstrate that they are adequately managing these risks.12

9 Orr, Cartwright, and Tickne. Understanding Water Risks.

10 World Business Council for Sustainable Development. Water for Business.

11 Morrison et al., Water Security and Climate Change.

12 EIRS, “A drought in Your Portfolio.”

If we could compress all the water on the planet into a single gallon, four ounces would be fresh water. Of those four ounces, two drops would be accessible to humanity, of which one drop is already in use.

Page 14: USRP 0316 Resources 030812 v2.pdf

14 U.S. Resilience Project

Securing the Smart Grid Workshop

Brittle Infrastructures

Indicators

Δ In April 2011, a 75-year-old Georgian woman accidentally cut a fiberoptic cable while scavenging for copper cable, shutting off Internet service in Azerbaijan and Georgia.13

Δ Overgrown trees and a computer bug that delayed the system alarms were among the key contributors of a cascading blackout that affected 55 million people in 8 eastern states and Canada in 2003. Lack of power disrupted cell phone systems, rail and air systems, constrained the supply of gasoline, and shut down much of the industrial production in the affected area.

Δ More than 50 percent of the inland locks and dams are described by the U.S. Army Corps of Engineers as functionally obsolete, but they carry approximately 20 percent of the nation’s coal, 22 percent of U.S. petroleum, and more than 60 percent of the nation’s farm exports.14

Δ Major power outages more than doubled during the last decade, in part because about 70 percent of all transmission lines and power transformers are 25 years or older and 60 percent of circuit breakers are more than 30 years old.15

13 Parfitt, “Georgian Women Cuts Off.”

14 Water Resources Development Act of 2010: Jobs and Economic Opportunities, Before the U.S. Senate Committee on Environment and Public Works, 111th Cong. (May 6, 2010) (statement of Janet F. Kavinoky, U.S. Chamber of Commerce). http://epw.senate.gov/public/index.cfm?FuseAction=Files.View&FileStore_id=30606d5b-648f-4977-86f5-4f979f466c49.

15 “An Unprecedented Opportunity,” Rick Sergel, president and CEO, Energy Future Coalition Grid Working Group, North American Electric Reliability Corporation, Nov. 21, 2008.

Global infrastructures are now so complex that they have become inherently unstable. There is not one system, but many nested systems, each of which is interlinked and embedded in others. With more complex and integrated global transportation, communications, and information networks, the vulnerability to, impact and cost of disruptions is likely to increase exponentially.

Page 15: USRP 0316 Resources 030812 v2.pdf

15www.usresilienceproject.org

CHAPTER 2: The Cure for Anxiety Deficit Disorder

Cyber Threats

Indicators

Δ In 2011, the Privacy Rights Clearninghouse tracked 564 breaches involving 30.76 million sensitive records. This brings the total reported records breached in the United States since 2005 to 543 million.16

Δ For U.S. companies, the latest survey by the Ponemon Institute LLC and Symantec Corp. found that data-breach costs grew for the fifth consecutive year to $7.2 million per incident in 2010. The average cost per compromised record also increased to $214 from $204 in 2009.17

Δ Cybersecurity firm McAfee identifies more than 55,000 new, unique pieces of malware per day and identifies about 2,000,000 new malicious websites per month.18

Δ Cyber risks were included for the first time as a stand-alone, material risk factor Consolidated Edison of New York’s SEC filing.

16 Privacy Rights Clearinghouse, “Chronology of Data Breaches.”

17 “Ponemon Study Indicated Organizational Data Breach,” Symantec.

18 Omanoff, “Cyber Security: A New and Growing Threat.”

Cyber attacks constitute a new frontier for risk managers, with challenges ranging from cyber crime — which is estimated to cost companies billions of dollars each year in intellectual property losses — to attacks on Congress’ information technology systems, federal agencies, critical infrastructure systems, and U.S. corporations.

Page 16: USRP 0316 Resources 030812 v2.pdf

16 U.S. Resilience Project

Securing the Smart Grid Workshop

Future Risks

Top Cyber Risks for 2012 2012 Threat Predictions MacAfee Labs

Δ Industrial attacks and embedded threats: Cyber criminals will target unprepared utility systems; hackers will increasingly prove they can control hardware, such as cameras or cars, via embedded software; and countries will try cyber war posturing, if not more actual skirmishes.

Δ Resurgence of spam: In the past two years, spam levels fell in a crackdown. This time, spam is apt to test legal limits as firms with something to sell buy email lists of customers from firms going out of business.

Δ More mobile worries: Attackers increasingly target people trying to do banking on their smartphones.

Δ Risks with virtual currency: Often used in games, virtual currency is an increasing target of attackers trying to steal money or spread malware.

Δ Rogue digital certificates: These could compromise secure browsing and transactions, such as when an attack site imitates a retailer.

Δ Attacks on hardware: Malware stuck onto network cards and the like, are seen rising compared to attacks on software, as new security features guard operating systems.

Most Dangerous Emerging RisksRisk and Insurance, May 1, 2011Paul Bomberger

Game changing risks for risk managers and insurers that may not be high on companies’ radar screens:

1. An ARk Storm closing Ports of Long Beach and Los Angeles for weeks or months: ARk stands for Atmospheric River 1,000, which is an epic system consisting of so-called “atmospheric rivers” that form in the tropics and can dump as much as 10 feet of rain over the course of weeks. An ARk Storm lasting 45 days devastated California nearly 150 years ago. The U.S. Geological Survey estimates that these storms occur once every 100 or 200 years.

2. Solar storms: Damage from electromagnetic solar disturbances could be significant, with an estimated $30 billion in satellite losses, halt to polar air traffic, power blackouts, and disruptions of GPS and cell systems.

3. Political risk emerging from left, right and center: Recent upheaval in the Middle East is likely to change the pricing for political risk insurance, which had generally been stable or declining.

4. Toxic water: Heavy rainfall and flooding could overwhelm manure and sewage storage areas. Leakage of fracking liquids into groundwater could further exacerbate fresh water shortages.

Page 17: USRP 0316 Resources 030812 v2.pdf

17www.usresilienceproject.org

CHAPTER 2: The Cure for Anxiety Deficit Disorder

5. Rising water levels: Flood risk (inland as well as coastal) is shifting, perhaps faster than risk managers can get their hands on it, because of climate change. Volatile weather is meeting aging infrastructure and insufficient public funding. Weather-related annual insured losses have risen from $5.1 billion in 1989 to $27 billion today.

6. Pervasive nanotechnology: With nanotechnology in use by almost every industry sector, the number of products using nanotechnology ballooned to around 5,000 in 2020, up from 2,000 in 2011. For the moment, the tail on the potential product liability is unknown. Experts are sobered to think of the potential environmental liability posed by the technology.

7. Cyber threats: The gap between technological innovation and the capability to protect data and IT systems is creating openings for criminals, hacktivists, terrorists and competitors to steal data and infiltrate or attack systems.

8. Social media: Risks faced by publishers every day — claims of defamation, invasion of privacy, and copyright infringement — are now shared by any company that logs on to Facebook, Twitter and other social media sites. Surveys indicate that two-thirds of companies do not have a policy on social media use.

9. Aging workers: Every month beginning in January 2012, and for the next 18 years, about 10,000 people turn 65 in the United States. Companies need the higher productivity of knowledgeable workers, but veteran workers tend to suffer more severe injuries and their recoveries are slower.

10. Distressed cities: As towns and cities are slashing funds for fire, police and other services, businesses are facing growing risks. Smaller forces translate into slower response times and smaller numbers of first responders, which can lead to higher losses from fire and theft.

Page 18: USRP 0316 Resources 030812 v2.pdf

18 U.S. Resilience Project

Securing the Smart Grid Workshop

Page 19: USRP 0316 Resources 030812 v2.pdf

19www.usresilienceproject.org

CHAPTER 3: New Strategies for Supply Chain Risk Management

CHAPTER 3

New Strategies for Supply Chain Risk Management Traditional supply chain risk management analyses often focus on cost, continuity and customer satisfaction. Newer assessments are just beginning to add cyber into the supply chain risk management equation.

Risk in 21st Century Supply ChainsA survey by Aon Limited and State of Flux LimitedJune 2008

Supply chain leaders:

Δ Integrate their internal functions — specifically supply chain management, procurement and risk management, and the external business partners that are involved in their supply chains — into an overarching framework for supply chain risk management.

Δ Scrutinize their suppliers’ practices through structured audits, requesting evidence of business continuity plans, observing their suppliers’ business continuity tests, or requiring evidence of suppliers’ business interruption insurance protections.

Δ Exchange information among risk professionals in different functions — whether supply chain, procurement, quality assurance or risk management personnel — who work together to identify trends.

Δ Integrate risk management considerations into the design of the supply chain.

Δ Use eight or more different strategies to ensure security of supply. This suggests both a flexible approach and strong organizational understanding of options open to them to manage supply chain risk exposures. These plans are backed up with practice, with 50 percent of organizations subjecting their plans to regular testing.

Δ Find their business continuity plans effective in mitigating the impact of unplanned events and have a clear understanding of how their plans — at all levels of the organizations — have been deployed.

Δ Maintain clear communication of issues and events across their organizations.

Δ Perceive threats to be primarily related to third-party suppliers through a range of causes including physical incident, quality assurance failure and breach of intellectual property rights. They perceive data security and outsourced service provisions as significant threats.

Δ Create clear benchmark metrics of key performance indicators (KPIs) — measuring the number of times plans are invoked, the percentage of suppliers with business continuity management plans in place, the total cost of loss events, or the number of supplier business continuity management audits completed.

Δ Recognize that supply chain risk management is a fast-moving area where practices are likely to need to mature further as supply chain complexity increases.

Page 20: USRP 0316 Resources 030812 v2.pdf

20 U.S. Resilience Project

Securing the Smart Grid Workshop

Supply chain laggards:

Δ Isolate procurement, supply chain and risk management.

Δ Perceive risk exposures to be different (mainly lower) than leaders.

Δ Tend to be more reactive to supply chain risk.

Δ Do not design their supply chain with risk management in mind.

Δ Perceive primary exposure to supply chain disruption to be within their own organizations, to relate to physical risk incidents or possibly data breaches.

Δ Take a narrowly focused approach to business continuity, using three or fewer techniques to implement supply chain risk management.

Δ Perform little or no testing of continuity plans.

Δ Do not recognize significant risks in their supplier base.

Δ Do not have KPIs in place.

Supply Chain and Transportation Risk InitiativeThe World Economic Forum, 2011

Top Supply Chain DisruptorsTop Supply Chain Vulnerabilities

Top Priorities for Management

1. Naturaldisasters

2. Conflictandpoliticalunrest

3. Suddendemandshifts

4. Export/importrestrictions

5. Terrorism

1. Relianceonoil

2. Information/dataavailability

3. Supplychainfragmentation

4. Extensivesubcontracting

5. Suppliervisibility

1. Collaborativetrustednetworks

2. Effectiverisklegislationandincentives

3. Appropriatedataandinformationsharing

4. Improvedquantificationmetrics

5. Enhancedscenarioplanning

Page 21: USRP 0316 Resources 030812 v2.pdf

21www.usresilienceproject.org

CHAPTER 3: New Strategies for Supply Chain Risk Management

The Smarter Supply Chain of the FutureGlobal Chief Supply Chain Officer StudyIBM, 2009

Top challenges for supply chains: more participants/partners, more geographies and more activities outsourced, as well as rapidly expanding and contracting product portfolios.

Between 1995 and 2007:

Δ The number of transnational companies more than doubled, from 38,000 to 79,000, and foreign subsidiaries nearly tripled from 265,000 to 790,000.

Δ Product introductions increased by 17 percent from 2005 to 2006. Portfolio rationalization eliminated stock keeping units (SKUs) almost as fast.

Δ R&D outsourcing increased by 65 percent between 2007 and 2010; engineering and product design by 80 percent.

Trend Example Risk Impact

Globalization Outsourcing,offshoring Localconcentratedrisksbecomegloballydiffused,involvingmultipleactors

Specialization Geographicalconcentrationofproduction

Efficientprocesscanbeeasilydisruptedbyalocalizedevent

Complexity Product/networkcomplexity Relianceonmultipleparts/playersindiverselocationsreducesvisibility

Lean Processes Singlesourcing,bufferstockreduction

Whileinitiallyefficiencyisimprovedandcostsarelowered,therearefeweralternativesincaseofdisruption

Information Availability Trackandtrace Systemsareincreasinglyreliantoninformationflow

Government Legislation Cargoscreening Measurescanimpedetheefficientflowofsupplychainsandtransportnetworks

Macro Trends and Supply Chain Impacts Source: World Economic Forum

Page 22: USRP 0316 Resources 030812 v2.pdf

22 U.S. Resilience Project

Securing the Smart Grid Workshop

Characteristics of top supply chains

Δ Build flexibility into supply chains to deal with changing market conditions and cost volatility.

Δ Improve visibility/transparency through collaborative planning with suppliers, vendor managed inventory, customer collaboration and real-time data sharing.

Δ Incorporate risk management into supply chain planning and use information technology to monitor and act on disruptive events.

Supply chains of the future will be:

Δ Instrumented: Information that was previously created by people will increasingly be machine-generated — flowing out of sensors, radio-frequency identification tags, meters, actuators, global positioning systems and more. Inventory will count itself. Containers will detect their contents. Pallets will report in if they end up in the wrong place.

Δ Interconnected: The entire supply chain will be connected — not just customers, suppliers and IT systems in general, but also parts, products and other smart objects used to monitor the supply chain. Extensive connectivity will enable worldwide networks of supply chains to plan and make decisions together.

Δ Intelligent: These supply chain decisions will also be much smarter. Advanced analytics and modeling will help decision makers evaluate alternatives against an incredibly complex and dynamic set of risks and constraints. Smarter systems will make some decisions automatically, increasing responsiveness and limiting the need for human intervention.

X–SCM: The New Science of Extreme Supply Chain ManagementLisa Harrington, Sander Boyson, Tom Corsi, Richard Douglass2010

Extreme Supply Chain Management (X-SCM) tackles the conditions of systemic volatility, continuous oscillation, and few or no rest or recovery periods. It recognizes the need for collective, rather than sequential, risk management and facilitates collaboration on the new scale that is necessary for survival.

Supply chain volatility occurs at three distinct interconnected levels: external environment, industry/firm, and supply chain. Volatility can emerge simultaneously in each of the rings and quickly spread in multiple directions across highly porous ring boundaries. The model on the following page is a simple one in which entities (e.g., subsystems) within a system interact and impact one another.

Page 23: USRP 0316 Resources 030812 v2.pdf

23www.usresilienceproject.org

CHAPTER 3: New Strategies for Supply Chain Risk Management

Supply Chain Volatility Model

The authors provide a toolkit to address the following needs:

Δ The need for a wholly new model of supply chain risk management that goes beyond a narrow, sequential identification and management of operational risks. This new model needs to account for systemic risk because of the increasing fragility of interlocked systems and networks.

Δ The need for a wholly new model of volatility management that spans the “multidimensional” supply chain, which includes end-to-end service, financial and cyber processes.

Δ The need for a wholly new model of supply chain network efficiency that replaces traditional economies of scale and scope with those that are based on “contingent scale” — the ability of the enterprise to rapidly size its assets and services up or down as required by extreme demand fluctuations. These resizing capabilities are executed through flexible contracts with external providers.

Page 24: USRP 0316 Resources 030812 v2.pdf

24 U.S. Resilience Project

Securing the Smart Grid Workshop

Managing Supply Chain Resiliency in an Increasingly Risky World Gary Lynch, Marsh Insights, April 2011

Best Practice Approaches to Supply Chain Risk Management

Δ Gain visibility upstream and downstream.

Δ Simplify complexity by looking at resources through a value (market served or product families) lens.

Δ Establish accountability for risk activities by designating ownership — not by asset (these are the custodians), but by profit and loss leader, business manager, and product family owner.

Δ Understand your suppliers’ supply chain and risk management plans; create risk management plans if needed, including incentives and penalties.

Δ Create a business case for investment by measuring impact against risk mitigation and financing options. Establish business intelligence and leverage analytics and decision modeling to support the business case.

Δ Provide holistic insurability beyond physical damage coverage. Supply chain interruptions extend to the non-physical world, including labor strikes, pandemics, regulatory change, civil order and financial failure.

Δ Maintain relevance by ensuring that vulnerabilities are relevant to the supply chains of greatest value. Avoid strategies that focus only on threats or only make use of qualitative metrics.

Black Swans and Your Supply ChainRisk LogicApril 29, 2011

Key Strategies for Supply Chain Continuity

1. Diversification of transportation systems. Supply chains need multiple carriers in addition to multiple forms of supply and distribution, because transport infrastructure is often the first to be impacted in a major disruption.

2. Development of reciprocal agreements for storage space. Shared agreements with suppliers, transport providers, customers, or competitors, established prior to a disruption, can help when facilities are inaccessible.

3. Relocation of production. Although production may be relocated to other sites, capacity levels must be carefully considered, and other product lines may need to be scaled down to accommodate the increase at an alternate facility.

4. Sourcing alternate or substitute products or components. Lead times are often critical, so establishing relationships is recommended prior to a disruption.

5. Building redundancy for enterprise resource planning/inventory management systems. Availability of redundant IT infrastructure, onsite and offsite data backup, and access to databases within business-critical time frames is essential.

Page 25: USRP 0316 Resources 030812 v2.pdf

25www.usresilienceproject.org

CHAPTER 3: New Strategies for Supply Chain Risk Management

6. Interruption insurance. Ensuring that the organization is covered for loss of revenue in the event of a disruption provides a high level of comfort to internal stakeholders.

7. Staff management and succession plans. A significantly traumatic event or disruption can render critical staff unavailable for long periods of time. Ensuring critical roles have been identified and suitable back-up personnel, multi-skilling, use of offsite resources, and outsourcing roles could be critical. On the other hand, not all roles may be critical in the first few days of a significant disruption. It is just as important to know who to send home as who to keep on.

8. Review of supplier business continuity preparations. Asking to review or receive evidence of a supplier’s business continuity plan will provide a higher degree of confidence that supply will or will not continue in a disruption.

Supply Chain ResilienceBusiness Continuity InstituteNovember 2011

An international survey of more than 550 organizations from more than 60 countries found the following:

Δ 85 percent of survey respondents experienced at least one disruption.

Δ 40 percent of analyzed disruptions originated below the tier one supplier.

Δ Adverse weather was the main cause of disruption at 51 percent, with unplanned IT and telecommunication outages in second place at 41 percent. Sources of disruption can, however, vary significantly by sector and geography.

Δ Cyber attack rose to become a top three source of disruption in the financial services sector.

Δ Only 8 percent of respondents could confirm that all of their key suppliers had business continuity programs in place to deal with disruption. Less than half of businesses check that business continuity programs are likely to be effective in practice.

Δ The ability to demonstrate resilience is starting to become a factor in purchasing decisions, with 28 percent of respondents stating that they always or often have to provide assurance to prospective clients.

Page 26: USRP 0316 Resources 030812 v2.pdf

26 U.S. Resilience Project

Securing the Smart Grid Workshop

Bibliography

Aon Limited and State of Flux Limited. Risk in 21st Century Supply Chains. Chicago, IL: Aon Corporation, June 2009. http://insight.aon.com/?elqPURLPage=4388.

Business Continuity Institute. Supply Chain Resilience 2011. Caversham, United Kingdom: Business Continuity Institute, November 2011.

Harrington, Lisa H., Sandor Boyson, and Thomas M. Corsi. X-SCM: The New Science of X-treme Supply Chain Management. New York: Routledge, 2011.

Harrington, Lisa H., Sander Boyson, Tom Corsi, and Richard Douglass. X-SCM: The New Science of Extreme Supply Chain Management. New York: Routledge, 2010.

IBM Corporation. “The Smarter Supply Chain of the Future.” Somers, NY: IBM Corporation, 2009. http://www-935.ibm.com/services/us/gbs/bus/html/gbs-csco-study.html.

Lynch, Gary. Risk Spotlight: Managing Supply Chain Resiliency in an Increasingly Risky World. New York: Marsh Inc., April 18, 2011. http://usa.marsh.com/NewsInsights/ThoughtLeadership/Articles/ID/4410/Risk-Spotlight-Managing-Supply-Chain-Resiliency-in-an-Increasingly-Risky-World.aspx.

RiskLogic’s Business Continuity Team. “‘Black Swans’ and Your Supply Chain.” Sydney, Australia: RiskLogic, April 29, 2011. http://www.risklogic.com.au/2011/04/black-swans-and-your-supply-chain/.

The World Economic Forum. “New Models for Addressing Supply Chain and Transport Risk “ Geneva, Switzerland: World Economic Forum, 2011. http://www3.weforum.org/docs/WEF_SCT_RRN_NewModelsAddressingSupplyChainTransportRisk_IndustryAgenda_2012.pdf

Page 27: USRP 0316 Resources 030812 v2.pdf

27www.usresilienceproject.org

CHAPTER 4: Cyber Supply Chain Risks, Strategies and Best Practices

CHAPTER 4

Cyber Supply Chain Risks, Strategies and Best PracticesWhy is supply chain cybersecurity a problem beyond the IT silo?

Securing Our Nation’s Cyber Supply ChainHarris International Panel, April 21, 2011The Honorable Dale Meyerrose, Internet Security Alliance President Larry Clinton, Honorable Michael Chertoff

Key Points The Tylenol crisis in 1982 revolutionized supply chain security because, at the time, company responsibility ended at the point of sale. Cyber issues raise the potential for security and quality issues well beyond the cash register. There is a tendency to look at supply chain cybersecurity as a single problem, when it is actually three separate challenges that must be disaggregated:

Δ Poor quality control, which creates accidental vulnerability;

Δ Organized criminals seek to extract assets, not degrade critical systems — and the benefits have to exceed the costs; and

Δ Nation-state actors, which are more patient, have no economic bottom line. Their goal is to attack using embedded and corrupted information technology at a time and place of their choosing.

Piloting Supply Chain Risk Management for Federal Information SystemsDraft NISTIR 7622, June 2010Marianne Swanson

Information systems and their components are at increasing risk of supply chain attacks from adversaries, enabled by growing technological sophistication and facilitated by the rapid globalization of information systems’ infrastructure, suppliers and adversaries.

The ever-broadening reliance on globally sourced information system equipment exposes information systems and networks to an enlarging risk of exploitation through counterfeit materials, malicious software or untrustworthy products. Many information system suppliers are transnational. Accelerating trends in multinational mergers and acquisitions of information system suppliers and integrators is making it almost impossible to adopt corporate ownership and control as the basis for assuring supply chain security. This is partially because these accelerating trends reduce transparency and traceability of the supply chain. Globalization and its consequences are permanent and are likely to have a greater impact over time. Even in domestically developed information system elements, intentional and unintentional weaknesses/vulnerabilities may present opportunities for supply chain-related compromises.

Page 28: USRP 0316 Resources 030812 v2.pdf

28 U.S. Resilience Project

Securing the Smart Grid Workshop

Supply chain attacks may involve manipulating computing system hardware, software or services at any point during the life cycle. Supply chain attacks are typically conducted or facilitated by individuals or organizations that have access through commercial ties, leading to stolen critical data and technology, corruption of the system/infrastructure, and/or disabling of mission-critical operations.

Long-Term Reliability AssessmentNorth American Electric Reliability Corporation, November 2011

Cybersecurity presents a unique risk to the reliability of the bulk power system. The crosscutting nature of technology development and deployment across the electric sector makes this issue key to the entire system, from “smart” meter to generator. With the new era of ever-increasing digital reliance and system complexity, there is an emergence of common vulnerabilities within the computational backbone of the power system that can result in credible, large-scale contingencies, due to common modal failures or coordinated cyber attacks. This may significantly challenge the ability to rebalance the system.

High-Impact, Low-Frequency (HILF) events, such as coordinated cyber, physical, or blended attack and extreme solar weather, have the potential to greatly impact the critical infrastructure the industry relies on to ensure reliable operation. There is also a risk from the integration of smart grid devices and other new emerging technologies reliant on communications to control operations of infrastructure components. Increasing reliance on automated devices and technologies to promote reliability can increase attack vectors—which may or may not be with malicious intent. Critical infrastructure protection needs to develop beyond regional standardization to a continental and transcontinental view; additionally, regional reliability problems can turn into interconnection-wide problems if left uncorrected. Replacing assets after a serious cyber or physical attack and/or regional natural disasters can be challenging, as these critical assets may have long lead times for production.

Page 29: USRP 0316 Resources 030812 v2.pdf

29www.usresilienceproject.org

CHAPTER 4: Cyber Supply Chain Risks, Strategies and Best Practices

Date Example

September 2006 AsmallnumberofApplevideoiPodsleftthecontractmanufacturercarryingtheWindowsRavMonE.exevirus.1

October 2006 TomTomadmitsthatabatchofdeviceswasshippedwithmalwareinstalled.2

September 2007 Seagate’sMaxtorBasicsPersonalStorageDriveswereinstalledwithavirusthathuntsforgamingpasswords.Driveswerebuiltundercontract.3

July 2008 EmailsenttoU.S.governmentemployees:“PleasebeadvisedthattwoUSBthumbdriveswerediscoveredonthe9thFlooroftheBicentennialBuilding.Onewasdiscoveredinthemen’srestroomyesterdayafternoon.Anotherwasfoundthismorningonafacsimilemachine.Thedrivescontainmaliciouscodethatautomaticallyandsilentlyexecuteswhenthedriveispluggedintoasystem.ThecodecapturescertainsysteminformationandtransmitsitoutofDOJ.”4

May 2009 Afactory-sealedM&ACompanionTouchnetbookcontainedthreepiecesofmalware,includingawormthatspreadstoUSBdevicesandstealstheonlinepasswordsofgamers.InthecaseoftheM&ACompanionTouchnetbook,themalwarewaslikelyintroducedwhenaninfectedUSBdrivewaspluggedintoacomputeratamanufacturingfacilitywheretechnicianswereinstallingdriversforthemachine.5

March 2010 EnergizerDuoUSBbatterychargersoftwareautomaticallydownloadscontaminatedfilesfromthemanufacturer’swebsiteduringtheinstallationprocess.Themalwarewasdevelopedin2007andissuspectedtohavealwaysbeenpartofthesoftware.6

May 2010 IBMhandsoutfreeUSBstoragedeviceswithautorunwormmalwareattheAustralianComputerEmergencyResponseTeamConference.7

July 2010 ReplacementpartsfortheDellPowerEdgeserverswereshippedalreadyinfectedwithmalwarethatwasembeddedintheservermanagementfirmware.8

July 2011 AldishipsanexternalharddrivewhichinstallstheConflickerviruswhenpluggedintoacomputer.9

January 2012 AppleapprovesafakenewiPhoneapp,Camera+v.4.0,whichincludesmalwarenotcreatedbytheoriginalapplicationmaker.Theappwasquicklypulledfromthestorewhentheverifieddeveloperconfirmedtheyhadonlyreleasedv.2.4.

1. Malware Shipped on Apple Video iPods, Sophos Press Release, October 17 2006, http://www.sophos.com/en-us/press-office/press-releases/2006/10/ipod-ships-with-virus.aspx.

2. Virus located in TomTom GPS Systems, Robert McMillan, Infoworld, January 29, 2007, http://www.infoworld.com/d/security-central/virus-located-in-tomtom-gps-systems-183

3. Seagate Ships virus-laden hard drives, Robert McMillan, Infoworld, November 12, 2007, http://www.infoworld.com/d/security-central/seagate-ships-virus-laden-hard-drives-119

4. Marcus Sachs, 2010

5. New Windows netbooks may harbor malware, Gregg Keizer, Infoworld, May 19 2009 http://www.infoworld.com/d/security-central/new-windows-netbooks-may-harbor-malware-979

6. Energizer Duo software suffers backdoor Trojan bother, John Leyden, The Register, March 8, 2010 http://www.theregister.co.uk/2010/03/08/energizer_trojan/

7. IBM distributed infected USB drives at conference, Angela Moscaritolo, SC Magazine, May 24, 2010 http://www.scmagazine.com/ibm-distributed-infected-usb-drives-at-conference/ar-ticle/170862/

8. Dell warns on spyware infected server motherboards, John Oates, The Register, July 21, 2010, http://www.theregister.co.uk/2010/07/21/dell_server_warning/

9. Aldi recalls Conflicker-infected hard drives, Darren Pauli, SC Magazine, July 29, 2011 http://www.scmagazine.com.au/News/265264,aldi-recalls-conficker-infected-hard-drives.aspx

What Examples Do We Have That this is a Problem?

Page 30: USRP 0316 Resources 030812 v2.pdf

30 U.S. Resilience Project

Securing the Smart Grid Workshop

What Kinds of Best Practices Are Being Deployed?

Securing the Supply Chain for Electronic Equipment: A Strategy and FrameworkInternet Security AllianceScott Borg

The key to solving the problem of malicious firmware is to make the entire global supply chain more secure so that it can cope with these and other threats. This means that any measure to protect against malicious firmware must be part of a more comprehensive security program. This emphasis, on a more comprehensive approach, also makes sense in more basic ways — security measures are, by nature, complementary and need to be applied together to be effective.

There are four types of cyber attacks that are possible at each stage of the supply chain:

1. Cyber attackers could interrupt the operation.

2. Cyber attackers could corrupt the operation (including inserting malware).

3. Cyber attackers could discredit the operation (undermining trust, damaging brand value).

4. Cyber attackers could undermine the basis for the operation (loss of control, loss of competitively important information).

There are four types of remedies to cyber attacks:

1. Protection against interruption

Δ Continual, mandatory sharing of production across supply chain

Δ Maintaining alternative sources

2. Protection against insertion of malware

Δ Strict control of environments where key intellectual property is being applied

Δ Logical tamper-proof seals

Δ Physical tamper-proof seals

Δ Effective sealing and tracking of containers

3. Protection against undermining trust

Δ Logging every operation and who is responsible for each action

4. Protection against loss of control of information

Δ Versioning as a tool for protecting intellectual properties

Five Stages of Supply Chain to which the remedies need to be applied:

1. The Design Phase

2. The Fabrication Phase

3. The Assembly Phase

4. The Distribution Phase

5. The Maintenance Phase

Page 31: USRP 0316 Resources 030812 v2.pdf

31www.usresilienceproject.org

CHAPTER 4: Cyber Supply Chain Risks, Strategies and Best Practices

Building a Cyber Supply Chain Assurance Reference ModelScientific Application International Corporation and University of Maryland School of Business Supply Chain Management Center, June 2009Sandor Boyson, Thomas Corsi and Hart Rossman

Like a physical supply chain, a cyber supply chain for information technology systems is an end-to-end process. It begins with software developers whose roles are similar to that of suppliers in the physical supply chain. The roles of purchasing agents and production and distribution managers in the physical supply chain closely parallel the roles of policy makers and system integrators, hardware/component developers, and network providers in the cyber supply chain. Finally, physical supply chain customers equate to operators/end users in the cyber supply chain.

Four ways to de-risk the cyber supply chainIn managing cyber supply chain, it is critical that platforms and networks are designed to accommodate volatility in an ongoing, ever-changing manner. As such, cyber supply chain networks must be as flexible as their physical or financial counterparts; that is, they must be able to adapt and respond to events that are within normal tolerances and to those that are outside of normal tolerances.

To this end, there are four key cyber supply chain imperatives for manufacturers and other supply chain participants to consider adopting in order to minimize the downside of supply chain volatility and maximize its upside:

1. Provide a global integration platform for dynamic business collaboration networks.

2. Deploy an integrated supply chain visibility and business intelligence platform.

3. Create global trade and order management hubs.

4. Streamline and automate multi-tiered, cross-channel selling. Collaborative supply chain information platforms today can provide a single view of the customer and their orders, regardless of the channel.

Open Trusted Technology Provider Framework: Industry Best Practices for Manufacturing Technology Products that Facilitate Customer Technology Acquisition Risk Management Practices and Options for Promoting Industry AdoptionThe Open Group Trusted Technology Forum, February 2011

Commercial enterprise and government customers share an interest in understanding the factors that contribute to product integrity and how to identify a trustworthy commercial product. Determination of trustworthiness is impeded in part due to the lack of the following:

1. Consistent terms;

2. Uniform supply chain standards, practices and approaches; and

3. Comprehensive common ways of providing evidence of a product’s trustworthiness and integrity in a way that keeps pace with innovation, accommodates the need to integrate diversely sourced components, and is applicable globally.

Page 32: USRP 0316 Resources 030812 v2.pdf

32 U.S. Resilience Project

Securing the Smart Grid Workshop

The categories of commercial best practices listed below are considered most effective in protecting customers from unacceptable levels of product security risk.

Category Best Practice

Product Engineering/ Product Development

Δ Trustedtechnologyprovidersutilizeandinternalizetheapplicationofawell-formedanddocumenteddevelopment(ormanufacturing)methodorprocess.

Δ Productengineeringmethodsarespecifiedandrefinedtobestfittheengineering/developmentcharacteristicsofthetargetproduct.

Secure Engineering/ Product Development

Δ Trustedtechnologyprovidersadoptandapplyadevelopment/engineeringmethodorprocessthatcontributestothemanufacturingofamoresecureproduct.

Δ Trustedtechnologyprovidersadoptandapply(whereapplicable)threatandriskmodelsinthedesignoftheirproductfunctionsandattributes.

Δ Trustedtechnologyprovidersselectsupplierswhofollowequivalentsecuredevelopment/engineeringpracticesforsuppliedcomponentsandfollowhardeningpracticestosecuretheirconfiguration.

Supply Chain Integrity Method

Δ Theorganization’ssupplychainmanagementisawareofandactivelyparticipatesintheevolutionandoptimizationofindustrypracticesandmethods.

Δ Atrustedtechnologyprovidermanagessuppliersthroughaframeworkthatmeasuressupplierperformanceagainstmetricssuchasquality,efficiency,innovation,adherencetothevendor’sspecifications,socialresponsibility,andtheirabilitytomanagetheirworkforceandtheirinternalsupplychain.

Δ Supplychainsecurityandintegrityistreatedasakeyelementoftheend-to-enddevelopment/manufacturingprocess.

Δ Validationtechnologyand/orprocessesareembeddedintothetrustedsupplychain.

Δ Trustedtechnologyprovidersrequiretheirsupplierstofollowsimilarsecuredevelopment/engineeringpracticesforsuppliedcomponents.

Δ Trustedtechnologyprovidersemployastructuredapproachtoinclusionofopensourceascomponentsintheirofferings.

Product Evaluation Method Δ Theorganization’sproductevaluationmethodfollowsinternationallyacceptedindustryandgovernmentbestpractices.

Δ Atrustedtechnologyprovidermanagesitsproductevaluationsappropriatetocustomerrequirementsatdefinedassurancelevels,providingproductsandsupportingdocumentationtocertifiedthird-partylaboratoriesasrequired.

Δ Productevaluationsareperformedaspartofproductassurance.

Page 33: USRP 0316 Resources 030812 v2.pdf

33www.usresilienceproject.org

CHAPTER 4: Cyber Supply Chain Risks, Strategies and Best Practices

Software Integrity Controls: An Assurance-Based Approach to Minimizing Risks in the Software Supply ChainSAFECode, June 14, 2010Stacy Simpson

There is a growing recognition that:

1. There is no way to defend every potential vector a motivated attacker may seek to exploit.

2. Focusing on the place where software is developed is less useful for improving security than focusing on the process by which the software is developed and tested.

3. There are circumstances in which the insertion of malicious code would be almost impossible to detect.

To be effective in today’s complex global supply chains, software integrity processes and controls must be designed to be independent of geography, accommodate diverse sources of software components, and extend from a vendor’s suppliers to its customers. Achieving software assurance requires software vendors to apply practices and controls to meet three key goals:

Δ Security: Threats are anticipated and addressed during the software’s design, development and testing.

Δ Integrity: Threats are addressed in the processes used to source software components, create software components, and deliver software to customers.

Δ Authenticity: The software is not counterfeit and the software supplier provides customers with ways to differentiate genuine from counterfeit software.

Principles for Designing Software Integrity Controls

Chain of Custody Theconfidencethateachchangeandhandoffmadeduringthesourcecode’slifetimeisauthorized,transparent,andverifiable.

Least Privilege Access Personnelcanaccesscriticaldatawithonlytheprivilegesneededtodotheirjobs.

Separation of Duties Personnelcannotunilaterallychangedata,norunilaterallycontrolthedevelopmentprocess.

Tamper Resistance and Evidence

Attemptstotamperareobstructed,andwhentheyoccurtheyareevidentandreversible.

Persistent Protection Criticaldataisprotectedinwaysthatremaineffectiveevenifremovedfromthedevelopmentlocation.

Compliance Management Thesuccessoftheprotectionscanbecontinuallyandindependentlyconfirmed.

Code Testing and Verification

Methodsforcodeinspectionareimplementedandsuspiciouscodeisdetected.

Page 34: USRP 0316 Resources 030812 v2.pdf

34 U.S. Resilience Project

Securing the Smart Grid Workshop

Evaluating and Mitigating Software Supply Chain Security RisksSoftware Engineering Institute, May 2010Robert Ellison

Because software systems can be configured and used in ways that increase security risk, the end user of a software system has more responsibility to ensure against unauthorized product modification than is usually the case for end users of hardware systems. For software systems, the supply chain security risk management process must consider the potential introduction of security risks during deployment, configuration, and system operation, as well as during design and development.

An assurance case reference model can be developed by verifying the available evidence down through the supplier tiers to support the overall claim that supply chain security risks for a certain product have been reduced as low as is reasonably practicable (ALARP). The reference model emphasizes two key strategies for controlling security risk: (1) identifying and monitoring a system’s attack surface and (2) developing and maintaining a threat model. Evidence of supply chain security risk mitigation needs to be gathered at every phase of an acquisition’s life cycle: initiation, development, configuration/deployment, operations/maintenance, and disposal.

Reduction of supply chain security risk requires paying attention to all of the following steps within the acquisition life cycle:

Δ Acquirer capabilities: Policies and practices for defining the required security properties of a particular product or system

Δ Supplier capability: Ensuring that a supplier has good security development and management practices in place throughout the life cycle

Δ Product security: Assessing a completed product’s potential for security compromises and determining critical risk mitigation requirements

Δ Product logistics: The methods for delivering the product to its user and determining how these methods guard against the introduction of malware while in transit

Δ Operational product control: Ensuring that configuration and monitoring controls remain active as the product and its use evolve over time

Δ Disposal: Ensuring software data and modules are effectively purged from hardware, locations, libraries, etc., when removal is needed

Software vulnerabilities, in general, are a major contributor to software security risk. It is impossible, as well as impractical, to eliminate all software vulnerabilities, many of which can lead to supply chain security risk. However, there are key strategies for reducing and managing such risks.

Page 35: USRP 0316 Resources 030812 v2.pdf

35www.usresilienceproject.org

CHAPTER 4: Cyber Supply Chain Risks, Strategies and Best Practices

Toward a Trusted Supply Chain: A Risk-Based Approach to Managing Software IntegrityMicrosoft, July 26, 2011Tyson Storch

Software Integrity is a program within Microsoft that is designed to address the risk of intentional tampering with our products or services. At Microsoft, we use either a “Standards Correlation” or “Business Process Modeling” approach to perform a risk assessment.

The Standards Correlation is the preferred option when relevant, mature standards exist that may also mitigate Software Integrity threats. This approach tends to be less resource intensive because it identifies predefined standard controls. It is particularly useful if an organization already conducts relevant standards compliance work that could also be used to assess and address Software Integrity threats. An example where the Standards Correlation approach is particularly effective is in the analysis of operational environments for online services. The reason the Standards Correlation approach is effective in this case is that operational security has many relevant standards.

The Business Process Modeling approach requires first creating a graphical representation of the workflow that defines the products group’s actual development process. This approach is useful to analyze software integrity attack scenarios in order to define areas of risk and to develop or strengthen corresponding controls to mitigate these risks. The Business Process Model approach is particularly effective in software development because there are few

Emerging Secure Development Practices

Attack Surface Analysis

Measuretheattackopportunities,aweightedsumoftheexploitablefeatures.Theanalysisincludesthefollowingdimensions:

Δ Targets–dataresourcesorprocessesdesiredbytheattacker.

Δ Enablers–theotherprocessesanddataresourcesusedbyanattacker.

Δ ChannelsandProtocols–theseareusedbyanattackertoobtaincontrolovertargets.

Δ AccessRights–controlissubjecttoconstraintsimposedbyaccessrights.

Threat Modeling Δ Providesabusinessjustificationforsecuritybymappingthreatstobusinessassets.

Δ Enablesathoughtfuldiscussionaroundriskandtrade-offsduringsoftwaredevelopmentinanobjective,quantifiableway.

Δ Encouragesalogicalthoughtprocessindetermininganapplication’ssecuritymodel.

Fuzz Testing Δ Createsmalformeddataandobservesapplicationbehaviorwhensuchdataisconsumed.Anunexpectedfailure,duetomalformedinput,isareliabilitybugandpossiblyasecuritybug.

Page 36: USRP 0316 Resources 030812 v2.pdf

36 U.S. Resilience Project

Securing the Smart Grid Workshop

relevant standards that can be leveraged and because developing an in-depth “step-by-step” understanding of actual, current processes contributes significantly to increasing a product’s software integrity.

Step Standards Correlation Approach Business Process Modeling

1. Plan Defineobjectives,scopeandapproach Defineobjectives,scopeandapproach

2. Discover Identifybroadclassesofsoftwareintegritythreats,relevantstandards,andexistinginternalpoliciesandprocedures

Identifybusinessprocessesthatrelatetodevelopingandoperatingproductsthroughabusinessprocessdiagram

3. Assess Definecontrolcategorieswithinstandardsrelevanttosoftwareintegritythreatsandratetheeffectivenessoftheselectedcontrolactivities(1-5)

Analyzeattackscenariosandclassesofthreats;identifyweaknesseswithinmodelandexistingcontrols;ratetheresultingrisk(1-5)—inherentrisk(impactXlikelihood)andcontroleffectiveness.

4. Develop Createguidanceonhowtocomplywithoverallobjectiveandrelatedrequirements

Designcontrolpracticestoaddresstheriskareasidentifiedintheassessphaseasrequiringmitigation

5. Validate Determinewhichcontrolrequirementsaparticularproductgroupcurrentlymeets(baseline)andthosethatshouldbeimplemented.

Determinewhichcontrolrequirementsaparticularproductgroupcurrentlymeets(baseline)andthosethatshouldbeimplemented.

6. Implement Gainapprovalfornewpoliciesandproceduresandcommunicatetoallstakeholders

Gainapprovalfornewpoliciesandproceduresandcommunicatetoallstakeholders

Page 37: USRP 0316 Resources 030812 v2.pdf

37www.usresilienceproject.org

CHAPTER 4: Cyber Supply Chain Risks, Strategies and Best Practices

How Many Firms Are Using Best Practices?

Assessing Cyber Supply Chain Security Vulnerabilities within the U.S. Critical InfrastructureEnterprise Strategy Group (ESG), November 2010Jon Oltsik

In a survey of 285 U.S.-based critical infrastructure organizations, ESG focused on the current cybersecurity processes in general, and cyber supply chain awareness and safeguards. The following conclusions were found:

Δ Critical infrastructure organizations face constant cyber attacks: 68 percent suffered at least one security breach in the last 24 months.

Δ Threats continue to escalate: 71 percent of respondents believe the threat landscape will worsen dramatically over the next two years.

Δ Some organizations are not prepared: 20 percent rated their organizations’ security policies, procedures and technology safeguards as “poor.” In addition, 23 percent rated their management’s support for and investment in cybersecurity as “poor” or “fair.”

With regard to cyber supply chain security issues specifically, the following conclusions were reported:

Δ Information technology vendor security audits are performed inconsistently and are rarely thorough: Only 10 percent of critical infrastructure organizations follow industry best practice for information technology vendor audits.

Δ Software assurance is a work in progress: 33 percent of critical infrastructure organizations provide secure software development training, and 30 percent of critical infrastructure organizations experienced a security incident directly related to internally developed software in the last two years.

Δ External information technology relationships lack appropriate security: Most critical infrastructure organizations have opened internal information technology systems to third parties, but have not standardized the governance, oversight or executive support to mitigate risks.

Δ Critical infrastructure organizations want help from the federal government: 71 percent of respondents believe the federal government should be a more active participant in cybersecurity strategies and defenses.

Page 38: USRP 0316 Resources 030812 v2.pdf

38 U.S. Resilience Project

Securing the Smart Grid Workshop

Bibliography

Borg, Scott. Securing the Supply Chain for Electronic Equipment: A Strategy and Framework. Arlington, Virginia: Internet Security Alliance. http://www.whitehouse.gov/files/documents/cyber/ISA%20-%20Securing%20the%20Supply%20Chain%20for%20Electronic%20Equipment.pdf.

Boyson, Sandor, Thomas Corsi, and Hart Rossman. Building a Cyber Supply Chain Assurance Reference Model. College Park, MD: Science Applications International Corporation and University of Maryland School of Business Supply Chain Management Center, June 2009. www.saic.com/news/resources/Cyber_Supply_Chain.pdf.

Ellison, Robert. Evaluating and Mitigating software Supply Chain Security Risks, Technical Note CMU/SEI-2010-TN-016. Pittsburgh, PA: Carnegie Mellon University Software Engineering Institute, May 2010. http://www.sei.cmu.edu/library/abstracts/reports/10tn016.cfm.

Keizer, Gregg. “Apple approves fake iPhone app for App Store.” Computerworld. January 23, 2012. http://www.computerworld.com/s/article/9223630/Apple_approves_fake_iPhone_app_for_App_Store.

Keizer, Gregg. “New Windows netbooks may harbor malware.” InfoWorld. May 19, 2009. http://www.infoworld.com/d/security-central/new-windows-netbooks-may-harbor-malware-979.

Leyden, John. “Energizer Duo software suffers backdoor Trojan bother.” The Register. March 8, 2010. http://www.theregister.co.uk/2010/03/08/energizer_trojan/.

McMillan, Robert. “Seagate Ships virus-laden hard drives.” InfoWorld. November 12, 2007. http://www.infoworld.com/d/security-central/seagate-ships-virus-laden-hard-drives-119.

McMillan, Robert. “Virus located in TomTom GPS Systems.” InfoWorld. January 29, 2007. http://www.infoworld.com/d/security-central/virus-located-in-tomtom-gps-systems-183.

Meyerrose, Dale, Larry Clinton, and Michael Chertoff. “Securing Our Nation’s Cyber Supply Chain.” National Press Club event, Washington, DC, April 21, 2011.

Moscaritolo, Angela. “IBM distributed infected USB drives at conference.” SC Magazine. May 24, 2010. http://www.scmagazine.com/ibm-distributed-infected-usb-drives-at-conference/article/170862/.

North American Electric Reliability Corporation. “Long-Term Reliability Assessment 2011.” Washington, DC: North American Electric Reliability Corporation, November 2011. www.nerc.com/files/2011LTRA_Final.pdf.

Oates, John. “Dell warns on spyware infected server motherboards.” The Register. July 21, 2010. http://theregister.co.uk/2010/07/21/dell_server_warning/.

Page 39: USRP 0316 Resources 030812 v2.pdf

39www.usresilienceproject.org

CHAPTER 4: Cyber Supply Chain Risks, Strategies and Best Practices

Olstik, Jon. Assessing Cyber Supply Chain Security Vulnerabilities within the U.S. Critical Infrastructure. Milford, MA: Enterprise Strategy Group, November 2010. http://www.enterprisestrategygroup.com/2010/11/cyber-supply-chain-security-research-report/.

Pauli, Darren. “Aldi recalls Conflicker-infected hard drives.” SC Magazine. July 29, 2011. http://www.scmagazine.com/au/News/265264,aldi-recalls-conflicker-infected-hard-drives.aspx.

Simpson, Stacy. Software Integrity Controls: An Assurance-Based approach to Minimizing Risks in the Software Supply Chain. Arlington, VA: SAFECode, June 14, 2010. http://www.safecode.org/publications/SAFECode_Software_Integrity_Controls0610.pdf.

Sophos. “Malware Shipped on Apple Video iPods.” October 17, 2006. http://www.sophos.com/en-us/press-office/press-releases/2006/10/ipod-ships-with-virus.aspx.

Storch, Tyson. Toward a Trusted Supply Chain: A Risk Based Approach to Managing Software. Redmond, WA: Microsoft, July 26, 2011. http://www.microsoft.com/download/en/details.aspx?id=26828.

Swanson, Marianne. Piloting Supply Chain Risk Management for Federal Information Systems, Draft NISTIR 7622. Washington, DC: National Institute of Standards and Technology, June 2010. http://csrc.nist.gov/publications/drafts/nistir-7622/draft-nistir-7622.pdf.

The Open Group Trusted Technology Forum. “Open Trusted Technololgy Provider Framework: Industry Best Practices for Manufacturing Technology Products that Facilitate Customer Technology Acquisition Risk management Practices and Options for Promoting Industry Adoption.” February 2011.

Page 40: USRP 0316 Resources 030812 v2.pdf

40 U.S. Resilience Project

Securing the Smart Grid Workshop

Page 41: USRP 0316 Resources 030812 v2.pdf

41www.usresilienceproject.org

CHAPTER 5: Anti-Counterfeiting Strategies, Processes and Best Practices

Counterfeiting problems have grown dramatically in the past two decades, becoming an enormous drain on the global economy. With numerous high-profile examples of counterfeit parts undermining the integrity, functionality and longevity of critical systems, counterfeiting has come into the spotlight as a serious risk to national security. Recognizing the depth, extent and potential consequences of counterfeiting, the private sector and government have developed new supply chain security and integrity standards and best practices to mitigate the growing risk.

Scope and Impact of Counterfeiting

Estimating the Global Economic and Social Impacts of Counterfeiting and PiracyBusiness Action to Stop Counterfeiting and Piracy, February 2011

Counterfeiting and piracy have increased substantially during the last two decades. Today, counterfeit and pirated products can be found in almost every country in the world and in virtually all sectors of the global economy.

While estimates of the incidence of counterfeiting vary, it is clear that hundreds of billions of dollars of counterfeit products are produced every year. In fact, the global economic value of counterfeit and pirated products totals as much as $650 billion every year, and that value is projected to double (or potentially triple) by 2015.

Beyond the value of counterfeit and pirated products themselves, counterfeiting has broad, economy-wide effects. These include the impact of counterfeiting and piracy on government tax revenues, legitimate employment, increased costs of crime, economic costs on consumer health and safety, and downward pressures on foreign direct investment (FDI) flows.

CHAPTER 5

Anti-Counterfeiting Strategies, Processes and Best Practices

Page 42: USRP 0316 Resources 030812 v2.pdf

42 U.S. Resilience Project

Securing the Smart Grid Workshop

Estimate of the Total Value of Counterfeit and Pirated Products in 2008 and 2015, and Impacts on the Broader Economy and Employment

Defense Industrial Base Assessment: Counterfeit ElectronicsDepartment of Commerce, January 2010

This study provides statistics on the extent of the infiltration of counterfeits into U.S. defense and industrial supply chains. A survey of original component manufacturers revealed that counterfeit electronics incidents doubled from 3,369 in 2005 to 8,644 in 2008. The total counterfeit incident reports by prime/subcontractors during the same time period rose from 25 to 76.

Based on survey responses, independent research and field interviews, the study reports the following:

Δ All elements of the supply chain have been directly impacted by counterfeit electronics.

Δ There is a lack of dialogue between all organizations in the U.S. supply chain.

Δ Companies and organizations assume that others in the supply chain are testing parts.

Δ Lack of traceability in the supply chain is commonplace.

Δ There is an insufficient chain of accountability within organizations.

Δ Recordkeeping on counterfeit incidents by organizations is very limited.

Organization for Economic Cooperation and Development Category

Estimate in Dollars Billions (2008)

Estimate in Dollars Billions (2015)

Internationally traded counterfeit and pirated products $285–$360 $770–$960

Domestically produced and consumed counterfeit and pirated products

$140–$215 $370–$570

Digitally pirated products $30–$75 $80–$240

Subtotal $455–$650 $1,220–$1,770

Broader economy-wide effects (tax revenue, costs of crime, FDI flows)

$125 $125+

Employment losses (G20 Economies) 2.5million 2.5million+

Page 43: USRP 0316 Resources 030812 v2.pdf

43www.usresilienceproject.org

CHAPTER 5: Anti-Counterfeiting Strategies, Processes and Best Practices

Part Description

Seatbelt clasps Seatbelt parts were made from a grade of aluminum that was inferior to specified DOD requirements. The parts were found to be deficient when the seatbelts were accidentally dropped, and they broke.

Routers The Navy, as well as other DoD and government agencies, purchased counterfeit network components — including routers — that had high failure rates and the potential to shut down entire networks.

Body armor The Defense Logistics Agency (DLA) procured non-Kevlar material that was misrepresented as Kevlar. The DLA discovered the discrepancy during testing.

Microprocessor The Air Force needed microprocessors that were no longer produced by the original manufacturer for its F-15 flight-control computer. These microprocessors were procured from a broker, and F- 15 technicians noticed additional markings on the microprocessor and character spacing inconsistent with the original part.

Packaging and small parts

During a two-year period, a supplier and three co-conspirators packaged hundreds of commercial items from hardware and consumer electronics stores and labeled them as military-grade items. For example, the supplier placed a rubber washer from a local hardware store in a package labeled as a brass washer for use on a submarine. The supplier also labeled the package containing a circuit from a personal computer as a $7,000 circuit for a missile guidance system. The suppliers avoided detection by labeling packages to appear authentic, even though they contained the wrong part.

Examples of DoD Counterfeit Parts Entering the Supply Chain

Δ Most organizations do not know who to contact in the U.S. government regarding counterfeit parts.

Δ Stricter testing protocols and quality control practices for inventories are required.

Δ Most U.S. Department of Defense (DoD) organizations do not have policies in place to prevent counterfeit parts from infiltrating their supply chain.

Counterfeiting: Specific Examples

Defense Supplier Base: DoD Should Leverage Ongoing Initiatives in Developing Its Program to Mitigate Risk of Counterfeit Parts (GAO-10-389)U.S. Government Accountability Office, March 2010

This U.S. Government Accountability Office (GAO) study reports on DoD’s knowledge of counterfeit parts discovered in its supply chain. The table below provides a few examples of known or suspected counterfeit parts that the DoD has encountered.

Page 44: USRP 0316 Resources 030812 v2.pdf

44 U.S. Resilience Project

Securing the Smart Grid Workshop

Counterfeiting UpdateNAVAIR Diminishing Manufacturing Sources and Material Shortages (DMSMS) Presentation, 2007

The Chinese city of Shantou is a global hub for counterfeiting, and the counterfeiting process has been documented.

E-waste delivered for processing. Components are washed in the river and dried.

Markings are removed. Components are then inserted into counterfeit products.

Page 45: USRP 0316 Resources 030812 v2.pdf

45www.usresilienceproject.org

CHAPTER 5: Anti-Counterfeiting Strategies, Processes and Best Practices

Best Practices

Defense Industrial Base Assessment: Counterfeit ElectronicsDepartment of Commerce, January 2010

In addition to providing statistics on the extent of the infiltration of counterfeits into U.S. defense and industrial supply chains (see previous “Scope and Impact of Counterfeiting” section), this study recommends best practices to curtail the flow of counterfeit parts into U.S. defense and industrial supply chains.

Category Best Practices

Supply Chain Δ Institutionalized policies and procedures: Employees need clear direction from management on combating counterfeits, as well as written (and regularly updated) guidance on how to avoid purchasing counterfeit parts; test, handle and track incoming and outgoing parts; and manage and dispose of suspected counterfeit components.

Δ Counterfeit part training programs: This training should be given to all employees who handle electronic parts. Refresher training should be given regularly to update employees on new threats, identification techniques and communication strategies.

Δ Internal and external communication: Employees involved need to be made aware of counterfeits and their implications, and be encouraged to report occurrences to management. Organizations also need to communicate with external entities such as industry associations and the Government-Industry Data Exchange Program database.

Original Component Manufacturers

Original component manufacturers (OCMs) require tailored counterfeit avoidance practices to meet their distinctive needs and experiences, which include the following:

Δ Using authentication or encryption codes

Δ Embedding security markings in parts

Δ Using unique, harder-to-copy labels and markings

Δ Identifying distinctive lot and serial codes on external packaging

Δ Embedding radio frequency identification into high-value parts

Δ Physical destruction of all defective, damaged and substandard parts

Δ Secure facilities to prevent unauthorized access to proprietary information

Δ Addressing product return, buy back, and inventory control practices to ensure that counterfeit parts do not enter inventories, and thus are not resold as legitimate products

Δ Communicating more with companies (including unauthorized distributers and customers) to share authenticity information

Best Practices for Organizations Dealing with Electronic Components

Page 46: USRP 0316 Resources 030812 v2.pdf

46 U.S. Resilience Project

Securing the Smart Grid Workshop

Category Best Practices

Procurement of Parts

Purchase from OCMs and authorized distributors; however, when it is not possible to do so, these best practices will help ensure counterfeit parts do not enter the supply chain.

Δ Traceability: The most common way to map a part’s traceability is through a certificate of conformance. Organizations can also require suppliers to provide a testing certification. Traceability documentation is only effective if reviewed and verified to be consistent with the received parts.

Δ Trusted and untrusted supplier lists: Establishing a list with defined criteria that is regularly audited can help to avoid purchasing counterfeit components. Organizations should also have a list of unapproved suppliers and not use these suppliers unless there are extenuating circumstances. If using an unapproved supplier, orgaizations should require extensive proof of authenticity.

Δ Supply chain requirements: Organizations should confirm suppliers are using desired counterfeiting avoidance policies and practices. One practice growing in popularity is using an escrow service to hold payment until the buyer has tested a product’s authenticity.

Receiving and Storing Parts

Δ Visual inspection: This should include checking that part numbers, lot codes, dates of manufacturing, and logos on the parts and documentation are the same. After verifying the documentation, employees should conduct visual inspections of parts to look for evidence of counterfeiting.

Δ Component testing:

– Surface testing: For components that visually have differences in their surface texture or coating

– X-ray analysis: Another recommended non-invasive testing method

– Destructive physical analysis: A step beyond x-ray analysis, destructive analysis can include de-lidding or de-capping

– Electrical testing: Can be used to detect counterfeits by plugging a part into a circuit board in order to determine its performance

– Temperature or thermal cycling: Tests a part’s resistance to extreme high and low temperatures

– Burn-in testing: A more intense test that stresses microcircuits at or above maximum-rated operating conditions

Δ Testing facilities and inventory storage: If an organization chooses to use external, third-party testing facilities, it should put those facilities through the same level of scrutiny recommended earlier for suppliers.

Managing Counterfeits

Organizations should remove suspected and confirmed counterfeit parts from regular inventory and quarantine them. All organizations should maintain an internal database to track all suspected and confirmed counterfeit components. Organizations should report all information on suspected and confirmed counterfeit parts to industry associations and databases.

Best Practices for Organizations Dealing with Electronic Components (continued)

Page 47: USRP 0316 Resources 030812 v2.pdf

47www.usresilienceproject.org

CHAPTER 5: Anti-Counterfeiting Strategies, Processes and Best Practices

Counterfeit Parts: Increasing Awareness and Developing CountermeasuresAerospace Industries Association, March 2011

The report sets forth the recommendations developed by the Aerospace Industries Association (AIA) Counterfeit Parts-Integrated Project Team (CP-IPT) relating to counterfeit parts in the aerospace and defense industry supply chains. The following table summarizes the recommendations.

Category Recommendations

Procurement/Supplier Selection

Δ Industry members should adopt SAE International standard AS5553: Counterfeit Electronic Parts; Avoidance, Detection, Mitigation, and Disposition, to mirror DOD and National Aeronautics and Space Administration adoption.

Δ Industry and government should develop a Qualified Suppliers List for Distributors.

Suspected Counterfeit Part Reporting

Δ Companies and the government should report in the Government-Industry Data Exchange Program (GIDEP), a free database managed by the government, to help protect sensitive information and detection methods.

Δ Companies should review databases, such as GIDEP, before purchasing from a potential new supplier.

Δ Government should ensure proper funding to keep GIDEP up to date and provide training and education to contractors and industry.

Counterfeit Part Disposition

Δ Companies should develop their internal disposition plans with the assistance of their procurement, legal and quality personnel. The plans should address supplier payment conditions when counterfeit material is discovered.

Δ Government should develop guidance on disposition that may be used by industry. The government should identify the appropriate department/agency to act as a single point of contact for counterfeit parts and materials.

Component Obsolescence

Δ Industry should be proactive and use component life cycle analysis tools based on EIA-724 life cycle prediction curves. This tool will help forecast when components are in the last phase of their life cycle and may become difficult to obtain. In addition, this tool can help prevent new designs from using parts in the mature phase of their life cycle.

Δ Government should require each contract to have a definitive plan for component obsolescence.

Δ Government should develop a process that establishes intellectual property vaults, administered by a third party, and contains the data required to produce those components that have become obsolete.

Δ Government should establish requirements in defense contracts to consign and/or sell all surplus material with original equipment manufacturer/original component manufacturer traceability to a trusted source that would make it available to U.S. manufacturers when needed.

AIA CP-IPT Recommendations

Page 48: USRP 0316 Resources 030812 v2.pdf

48 U.S. Resilience Project

Securing the Smart Grid Workshop

Best Practices in the Fight Against Global CounterfeitingAmerican National Standards Institute, 2011

This report details the conclusions of a meeting in which members of the international standards-setting community spoke to the global nature of counterfeiting and to the vulnerabilities endemic to global industry supply chains. While national regulatory, oversight and law enforcement agencies will often cooperate across borders, as well as through international agreements and investigative agencies such as INTERPOL, the statutory authority ends at national borders.

The group arrived at four consensus conclusions:

1. Public-private partnerships: Counterfeiting is a global problem that cannot be handled or resolved by just one agency or group with limited jurisdiction. Public- and private-sector stakeholders throughout and across industries must work together, including national and international law enforcement agencies, government officials, and private-sector participants from all industry sectors and all points in the supply chain.

Category Recommendations

Counterfeit Parts Plan Δ Industry should develop a counterfeit parts plan that documents the processes used for avoidance, detection, risk mitigation, disposition, and reporting of counterfeit parts.

Δ Government and industry should review SAE International standard AS6081: Counterfeit Electronic Parts; Avoidance Protocol, Distributors, for adoption, which suggests ways to mitigate the risks of purchasing counterfeit parts.

Standards for Mechanical Parts and Materials

Δ Industry and government should assist various groups creating standards in the area of mechanical parts and materials.

Δ Organizations that have attained a robust and effective Quality Management System (such as AS9100: Quality Systems-Aerospace-Model for Quality Assurance in Design, Development, Production, Installation and Servicing) are more likely to successfully mitigate the threat of counterfeit parts.

Training Δ Companies should develop and conduct training for employees in the areas of procurement, detection, reporting, and disposition of counterfeit parts.

Δ Companies should take advantage of industry symposiums and standards organizations to learn of best practices.

AIA CP-IPT Recommendations (continued)

Page 49: USRP 0316 Resources 030812 v2.pdf

49www.usresilienceproject.org

CHAPTER 5: Anti-Counterfeiting Strategies, Processes and Best Practices

2. Education: Many people affected by counterfeiting, including both manufacturers and consumers, are unaware of the true scope and impact of this issue. Consumers must be educated on the true impact of purchasing counterfeit goods, as well as how to avoid making such purchases. Manufacturers should be given case studies and statistics on the effects that counterfeit goods have in their industry, and simple steps to reduce the presence of counterfeit parts and products.

3. Enforcement: Policies and laws that fight counterfeiting must be supported on every level by refusing to use, pay for or return counterfeit parts. Sales of counterfeit parts and products must be reported to the proper legal authorities; continual testing of critical components must be conducted to assure the quality of parts that appear legitimate; and, finally, an effective security assurance program must be in place, coupled with the use of effective authentication technologies. Many of the existing public and private initiatives begin and end with enforcement and prosecution — other tools may be needed because “we can not incarcerate our way to safety.”

4. Standards: While no standards can completely stop counterfeiting, they can bring awareness to industries — encouraging them to institute checks and balances throughout their supply chains. However, universal access to standards must be considered during quality assurance processes, because counterfeiters could also potentially refer to them as a resource when creating parts and products.

Page 50: USRP 0316 Resources 030812 v2.pdf

50 U.S. Resilience Project

Securing the Smart Grid Workshop

Bibliography

Aerospace Industries Association. Counterfeit Parts: Increasing Awareness and Developing Countermeasures. Arlington, VA: Aerospace Industries Association, March 2011.http://www.aia-aerospace.org/assets/counterfeit-web11.pdf.

American National Standards Institute. Best Practices in the Fight against Global Counterfeiting: An Action Guide to Strengthen Cooperation and Collaboration across Industry Sectors and among Global Supply Chains. Washington, DC: American National Standards Institute, 2011.http://publicaa.ansi.org/sites/apdl/Documents/Meetings%20and%20Events/2010%20World%20Standards%20Week/Anti-counterfeiting%20Conference/Anti-Counterfeiting_Best_Practices.pdf.

Business Action to Stop Counterfeiting and Piracy (BASCAP). Estimating the global economic and social impacts of counterfeiting and piracy. Produced by Frontier Economics Ltd., London. Paris: International Chamber of Commerce, February 2011. http://www.iccwbo.org/uploadedFiles/BASCAP/Pages/Global%20Impacts%20-%20Final.pdf.

U.S. Department of Commerce. Defense Industrial Base Assessment: Counterfeit Electronics. Washington, DC: U.S. Department of Commerce, January 2010. http://www.bis.doc.gov/defenseindustrialbaseprograms/osies/defmarketresearchrpts/final_counterfeit_electronics_report.pdf.

U.S. Government Accountability Office. Defense Supplier Base: DoD Should Leverage Ongoing Initiatives in Developing Its Program to Mitigate Risk of Counterfeit Parts, GAO-10-389. Washington, DC: U.S. Government Accountability Office, March 2010. http://www.gao.gov/assets/310/302313.pdf

“Counterfeiting Update: NAVAIR Diminishing Manufacturing Sources and Material Shortages (DMSMS).” Presentation given to Defense Logistics Agency Parts Standardization & Management Committee, April 2010.

Page 51: USRP 0316 Resources 030812 v2.pdf

51www.usresilienceproject.org

CHAPTER 6: Business Case for Supply Chain Security and Resilience

A number of authors have shown that the benefits of investment in supply chain risk management can extend across the enterprise — increasing productivity, revenue, reputation and shareholder value.

This is similar to the experience of integrated safety management, implemented by the chemical industry after the 1984 gas leak disaster in Bhopal, India. The industry realized significant savings from reduced medical costs, wages and claims administration fees. What it did not anticipate was that the indirect savings from integrated safety management would increase savings by a factor of five — including the costs of lost production, process interruptions, equipment replacement, litigation, employee morale, customer relations and public image. Safety was not just the right thing to do; it became a competitiveness driver.

Impact of Supply Chain Disruptions

The Effect of Supply Chain Disruptions on Long-term Shareholder Value, Profitability and Share Price VolatilityThe Logistics Institute, 2005Vinod Singhal and Kevin Hendricks

Researchers looking at the impact of supply chain disruptions on corporate performance found that such events can be catastrophic for businesses and their shareholders. Singhal and Hendricks’ research showed that the symptoms of an impending disruption were evident in advance of a public announcement. Based on a sample of 885 disruptions announced by publicly traded firms, they found that, in the year leading up to the announcement, firms on average experienced a 107 percent drop in their operating income, 114 percent drop in return on sales and 93 percent drop in return on assets. During this time period, the level of return on sales dropped by 13.78 percent and return on assets by 2.32 percent.

Firms that experienced disruptions faced on average 6.92 percent lower sales growth, 10.66 percent growth in cost, and 13.88 percent growth in inventories. Changes in operating income, sales, total costs and inventories remained negative in the two years after the problems were disclosed.

CHAPTER 6

Business Case for Supply Chain Security and Resilience

Page 52: USRP 0316 Resources 030812 v2.pdf

52 U.S. Resilience Project

Securing the Smart Grid Workshop

Supply Chain Resilience 2011Business Continuity Institute, United Kingdom, 2011

The UK Business Continuity Institute survey considers the causes and consequences of disruption, the techniques and approaches to identify key supply chains, and methods to gain assurance of resilience capability. It reports the following key findings from respondents from 35 countries across 15 industry sectors:

Δ 85 percent of survey respondents experienced at least one disruption.

Δ 40 percent of analyzed disruptions originated below the immediate tier-one supplier.

Δ Supply chain incidents led to a loss of productivity for almost half of businesses, along with an increased cost of working (38 percent) and loss of revenue (32 percent).

Δ The longer-term consequences of disruption in the supply chain included shareholder concern (19 percent), damage to reputation (17 percent), and expected increases in regulatory scrutiny (11 percent).

Δ For 17 percent of respondents, the financial costs of the largest single incident totaled a million or more euros. For those with weaker supply chains, the number experiencing higher financial costs almost doubled, to 32 percent.

Δ The ability to demonstrate resilience is starting to become a factor in purchasing decisions, with 28 percent of respondents stating that they always or often have to provide assurance to prospective clients.

Benefits of Supply Chain Security

Innovators in Supply Chain Security: Better Security Drives Business ValueStanford University and The Manufacturing Institute, June 2006Barchi Peleg-Gillai, Gauri Bhat and Lesley Sept

International trade is no longer just about moving goods quickly and cheaply. In this age of global terrorism, there is a third element: moving goods securely. There are costs to supply chain security. After 9/11, firms experienced an increase of 15 percent in airfreight costs and 20 percent in commercial insurance premiums. New security measures following 9/11 were estimated to cost the U.S. economy alone more than $150 billion, including $65 billion for changes in supply chains.

Through case studies of eleven major manufacturers and three logistics providers, the study quantifies benefits that may potentially offset or exceed the costs of security. These benefits include the following:

Δ Improved product safety: a 38 percent reduction in theft or loss, and a 37 percent reduction in tampering.

Δ Improved inventory management: a 14 percent reduction in excess inventory and a 12 percent increase in reported on-time delivery.

Page 53: USRP 0316 Resources 030812 v2.pdf

53www.usresilienceproject.org

CHAPTER 6: Business Case for Supply Chain Security and Resilience

Δ Improved supply chain visibility: a 50 percent increase in access to supply chain data and a 30 percent increase in the timeliness of shipping information.

Δ Improved product handling: a 43 percent increase in automated handling of goods.

Δ Process improvements: a 30 percent reduction in process deviations.

Δ More efficient customs clearance processes: a 49 percent reduction in cargo delays and a 48 percent reduction in cargo inspections/examinations.

Δ Speed improvements: a 29 percent reduction in transit time and a 28 percent reduction in the delivery time window.

Δ Resilience: close to a 30 percent time reduction in problem identification, response and resolution.

Δ Higher customer satisfaction: a 26 percent reduction in customer attrition and a 20 percent increase in the number of new customers.

Average Percentage Improvement from Supply Chain Security Investments Reported by Manufacturers

0 25 50PERCENT

48%Reduced inspections

43%Increased automatedhandling

30%Less process deviation

29%Shorter transit time

EFFICIENCY

50%Improved asset visibility

30%More timely shippinginformation

9%Reduced inaccurateshipping data

VISIBILITY

45%

37%

26%

14%

31%Shorter problemresolution time

23%Quicker response toa problem

21%Reduced time to identify a problem

Reduced theft, loss,pilferage

Decreased tampering

Less customer attrition

Reduced excess inventory

0 25 50PERCENT

RESILIENCY

INVENTORY MANAGEMENT AND CUSTOMER RELATIONS

Page 54: USRP 0316 Resources 030812 v2.pdf

54 U.S. Resilience Project

Securing the Smart Grid Workshop

Dow Chemical: Strategies for Supply Chain Security and SustainabilityThe U.S. Resilience Project, 2011

Dow was one of the companies that participated in the Innovators in Supply Chain Security study. It documented the following savings that were realized due to security investments:

Δ More than 20 percent cost reductions in excess inventory and container fleet requirements.

Δ A 100 percent reduction in theft/loss/pilferage.

Δ A 100 percent reduction in tampering.

Δ Up to a 90 percent reduction in transit time.

Δ Anywhere from 25 percent to 50 percent improvements in on-time delivery.

Δ A 50 percent reduction in response time to identify and resolve in-transit problems.

Investing in Supply Chain Security: Collateral BenefitsIBM Center for the Business of Government, May 2005James B. Rice, Jr., Philip W. Spayd

Security Investment Direct Benefits Collateral Benefits

Asset Visibility and Tracking

Δ Provides positive location status, preventing excursions

Δ Provides time-definite and controlled chain of custody

Δ Lower theft and losses

Δ Faster recalls

Δ Fewer delayed shipments

Δ Better planning, enabling lower working capital for inventory

Δ Fewer overages, shortages, and damages (OS&D)

Δ Protection of brand name

Personnel Security Δ Thorough background check eliminates “bad actors” from hiring pool

Δ Regular background checks provide early warning for employees operating under the influence

Δ Customer loyalty, increased sales revenues, higher market share

Δ Employee commitment and belief in company’s concern for employee

Physical Security Δ Controlled access keeps out unauthorized personnel

Δ Protection of intellectual property

Δ Protection of capital equipment and personnel

Δ Customer recognition of firm’s safe and secure environment as an expertise, increasing customer loyalty

Δ Fewer thefts and OS&D by virtue of having a more secure facility

Page 55: USRP 0316 Resources 030812 v2.pdf

55www.usresilienceproject.org

CHAPTER 6: Business Case for Supply Chain Security and Resilience

Security Investment Direct Benefits Collateral Benefits

Physical Security (continued)

Δ Controlled access keeps out unauthorized personnel

Δ Protection of intellectual property

Δ Protection of capital equipment and personnel

Δ Customer recognition of firm’s safe and secure environment as an expertise, increasing customer loyalty

Δ Fewer thefts and OS&D by virtue of having a more secure facility

Standards Development Δ Facilitates coordination of multi-company security activities (initiatives, sting operations, and incident investigations)

Δ Security breaches are easier to spot with standard systems

Δ Higher levels of security with common procedures

Δ System-level and supplier security improvement

Δ Improved efficiency of ship, train, truck, and terminal operations; reduced international shipping times

Δ Platform for collaboration within an industry, leading to standards that raise the level of performance

Δ Process discipline enables compliance (quality, safety, and process) and higher performance

Δ Common processes reduce confusion, raise predictability, and improve staff backup

Δ Reduced non-security losses

Supplier Selection and Investment

Δ Ensures a secure supply of materials

Δ Early warning of upstream security issues

Δ Reduced upstream and inbound losses

Δ Lower inspection costs and faster throughput

Δ Enhanced communication via collaboration

Δ Increased efficiency through joint planning

Δ Utilizes internal security resources to assist suppliers, ultimately making for improved relationships

Transportation and Conveyance Security

Δ Reduces theft losses

Δ Reduces adulteration of product

Δ Reduces chance of cargo vessel misuse (weapon delivery system)

Δ Protect conveyance equipment and vessels

Δ Avoidance of non-product-related costs (indirect costs)

Δ Lower crime and vandalism rates

Δ Fewer disruptions to the supply chain, and more cost savings compared with avoided losses

Δ Less capital required for inventory

Δ Reduced transportation cycle time

Page 56: USRP 0316 Resources 030812 v2.pdf

56 U.S. Resilience Project

Securing the Smart Grid Workshop

Security Investment Direct Benefits Collateral Benefits

Building Organizational Infrastructure Awareness and Capabilities

Δ Builds awareness of security concerns

Δ Increased role of security in daily operations and every assignment

Δ Increases problem prevention through recognition by employees

Δ Increases early intervention, reducing the impact of a disruption

Δ Improves the ability to respond with early awareness

Collaboration Among Supply Chain Parties

Δ Improved coordination along supply chain increases security

Δ Platform for broader alignment

Δ Enables the creation of a secure supply chain network for common problem solving, resource sharing

Δ Improves communication among supply chain partners, potentially reducing coordination costs

Proactive Technology Investments

Δ Increased ability to track, monitor, and observe material flows, preventing excursions

Δ Ability to customize the application to the benefit of the firm

Δ Increased process efficiency through technology

Δ Visibility investments give real-time awareness of supply chain delays, location, and status

TQM Investments Δ More consistent security procedure execution

Δ Application of Six Sigma may lead to disciplined loss reduction efforts

Δ Lower losses

Δ Higher-performance employees emphasize security

Δ Process design standardizes security processes

Δ Design supply chain with fewer hand-offs, keeping product moving

Δ Discipline increases, enabling compliance (quality, safety and process)

Δ Reduction in safety stock, lead-time variance, and OS&D

Δ Better process knowledge and management from additional data, and greater visibility to discern bottlenecks and congestion

Δ Safety stock reduction as a result of advance lead-time information

Δ Investment in quality processes results in quality security

Δ Consistent process operation leads to fewer disruptions, faster and more reliable operation

Δ Process discipline leads to higher levels of performance and efficiency

Page 57: USRP 0316 Resources 030812 v2.pdf

57www.usresilienceproject.org

CHAPTER 6: Business Case for Supply Chain Security and Resilience

Security Investment Direct Benefits Collateral Benefits

Voluntary Security Compliance

Δ European Union’s Authorized Economic Operator program ensures a base level of supply chain security assessment

Δ Customs specialists working in specialized security programs may observe the risk of a security breach before a breach can occur

Δ Customs–Trade Partnership Against Terrorism (C-TPAT) membership provides member companies with information about industry best practices in supply chain security

Δ Sweden’s StairSec program leads to higher inspection rates of uncertified cargo, increasing the likelihood of early warning and prevention

Δ Establishes a “mandatory” fundamental standard across industry for supply chain security via a “voluntary” program

Δ A platform for collaboration and alignment within an industry that leads to industry standards, raising the overall level of quality, service, and cost performance C-TPAT supply chain specialist assists firm as Customs and Border Patrol liaison for validation, security issues, procedural updates, communication, and training

Δ Faster border throughput times from fewer inspections and “green lane” flow, which may raise service levels, enabling lower working capital

Δ Process discipline enables compliance (quality, safety, and process) and higher levels of process performance

The Value of Visibility

Smart BoxesA.T. Kearney, 2005Mike Tower, Sean Ryan, and Todd Huseby

A.T. Kearney conducted interviews with supply chain executives from the United States’ top 100 import companies and top 100 export companies, discussing the value proposition of greater supply chain visibility through radio frequency identification (RFID) technology. Respondents estimated a total benefit per container of $1,150, not including any benefit they received from expedited passage at the border.

Page 58: USRP 0316 Resources 030812 v2.pdf

58 U.S. Resilience Project

Securing the Smart Grid Workshop

Perceived Benefits Per Container

17% Reduced leadtime variance

16%Increasedmanufacturinguptime

30% Reducedout of stocks

31% Reducedinventory

3% Reduced labor costs and fees

1% Prevention of lost containers

2% Increased container security

The Defense Driver for RFID

The A.T. Kearney report noted that the benefits of radio frequency identification (RFID) technology were first demonstrated during the first Gulf War in 1991.

The U.S. military had a shipping problem: nearly one third of the containers shipped to the Middle East were lost or unaccounted for when needed. And when containers did arrive — in the hot desert, in the middle of a war zone — soldiers had to open almost two thirds of them to see what was inside.

Not knowing what was in the containers, commanders frequently made redundant requisitions, in a practice they called “just-in-case” logistics. Just in case the boots, bullets or other material so essential to their success had not actually arrived, they placed multiple back orders. The result? “Iron mountains” of containers on docks and in the desert. And a lesson for the U.S. Department of Defense (DoD) — when it comes to the rapid deployment of forces, logistical support requires real-time tracking of critical supplies as they move through the global supply chain.

Enter RFID technology. Through seed grants from the Defense Advanced Research Projects Agency — the same agency that fostered the development of the Internet — military officials tested and validated RFID solutions. An RFID chip attached to a logistic unit of any size can be read at key checkpoints — such as distribution centers, seaports and trucking terminals — to beam information into a global computer network. The DoD now deploys its In-Transit Visibility (ITV) network to track military supplies from factory to foxhole. ITV spans more than 1,600 locations in more than 45 countries. Used in both Afghanistan and Iraq, ITV has reduced overall losses to less than 8 percent. The military deployed 90 percent fewer containers in Operation Iraqi Freedom than it did during Operation Desert Storm, and military personnel attribute more than $300 million USD of efficiency savings to RFID. The military had the financial strength to invest in developing new technology; then, as happened with the Internet, adoption costs eventually decreased to the point where the solution also became commercially viable.

Page 59: USRP 0316 Resources 030812 v2.pdf

59www.usresilienceproject.org

CHAPTER 6: Business Case for Supply Chain Security and Resilience

Bibliography

Business Continuity Institute. Supply Chain Resilience 2011. Caversham, United Kingdom: Business Continuity Institute, 2011.

Peleg-Gillai, Barchi, Gauri Bhat, and Lesley Sept. Innovators in Supply Chain Security: Better Security Drives Business Value. Produced by Stanford University, Stanford, CA. Washington, DC: The Manufacturing Institute, 2006. http://www.gsb.stanford.edu/scforum/documents/Innovators_in_SC_Security.pdf.

Rick, James B., Jr. and Philip W. Spayd. Investing in Supply Chain Security: Collateral Benefits. Washington, DC: IBM Center for the Business of Government, May 2005. http://www.ncapec.org/docs/supply_chain_investment.pdf.

Singhal, Vinod, and Kevin Hendricks. The Effect of Supply Chain Disruptions on Long-term Shareholder Value, Profitability, and Share Price Volatility. Toronto, Canada: The Logistics Institute, 2005. http://www.loginstitute.ca/pdf/singhal_scm_report.pdf.

U.S. Resilience Project. Dow Chemical: Strategies for Supply Chain Security and Sustainability. Washington, DC: The U.S. Resilience Project, October 2011. http://www.usresilienceproject.org/workshop/participants/pdfs/USRP_Dow_CS_012312.pdf.

Tower, Mike, Sean Ryan, and Todd Huseby. Smart Boxes: RFID Can Improve Efficiency, Visibility and Security in the Global Supply Chain. Chicago, IL: A.T. Kearney, 2005. http://www.atkearney.com/index.php/Publications/smart-boxes.html.

Page 60: USRP 0316 Resources 030812 v2.pdf

60 U.S. Resilience Project

Securing the Smart Grid Workshop

Page 61: USRP 0316 Resources 030812 v2.pdf

61www.usresilienceproject.org

CHAPTER 7: Linking Smart Grid, Cybersecurity and Supply Chain

Supply chain and cybersecurity are inextricably linked. Recognizing this, a number of new studies include supply chain as part of an overall cybersecurity risk management structure. Issues that are now part of the cybersecurity landscape include trusted vendor networks, reliability, integrity of commercial off-the-shelf components, resilience of supply chains, and safeguards against malicious insertion of compromised or counterfeit components. The mature processes in supply chain security and resilience within businesses can help inform the challenge of securing the smart grid supply chain from cyber threats.

Protecting Hardware in the Supply Chain

Ensuring Hardware Cybersecurity Issues in Technology Innovation, Brookings, May 2011John D. Villasenor

Insertion of malicious hardware during manufacturing is very difficult because of the likelihood that the insertion process itself will lead to impairments that would be detected during post-manufacturing testing. For an attacker, the low-hanging fruit lies in the design process, where there is the potential to create malicious circuits and bury them within the much larger set of healthy circuits in a nondisruptive manner.

Chip design today relies heavily on outsourcing. Although a complex chip is a single, physically small device, it contains many different functional areas, called “blocks,” that perform different tasks. A chip used in a smartphone, for example, may have a set of functional blocks devoted to receiving a wireless signal, processing that signal to extract the data it contains, decoding that data to produce audio and video signals, and sending those signals to a speaker and display screen. A company overseeing the design of a complex chip typically designs some portions in-house but obtains designs for other portions from third parties. While outsourced chip manufacturing has been common for several decades, the use of outsourcing in chip design has accelerated dramatically in the last half-decade, largely for economic reasons.

The following steps could go a long way toward reducing the likelihood and impact of hardware attacks.

A change in design practices within the semiconductor industry: Companies engaged in chip design should adopt a need-to-know partitioning of information. A designer working on a portion of a chip devoted to receiving wireless data does not need access to the internal details of a portion of the chip that processes video for display on a screen.

Establishment of a national-level capability to coordinate a quick response to an attack: Currently, the United States does not have any national-level capability to respond to an attack. In the event of an attack, it would also be critically important to be able to rapidly identify the other chips containing designs received from a known supplier of corrupted hardware.

CHAPTER 7

Linking Smart Grid, Cybersecurity and Supply Chain

Page 62: USRP 0316 Resources 030812 v2.pdf

62 U.S. Resilience Project

Securing the Smart Grid Workshop

Improved testing procedures to detect corrupted chips before they are placed into products: Today’s commercial chip-testing procedures are designed to identify accidental design flaws, not to discover intentionally hidden attacks. New testing procedures specifically designed to look for attacks, such as those in research today by the Defense Advanced Research Projects Agency, lower the odds that corrupted hardware could escape pre-deployment testing.

Inclusion of defenses built into chips to identify and thwart attacks as they occur: While pre-deployment testing is extremely important, it cannot be relied on to find all instances of malicious hardware. Given the inevitability that some number of compromised chips will slip past the testing process, it is important to build defenses into chips that can identify and respond to attacks within milliseconds. When an attack is discovered, the offending portion of the chip could be identified and quarantined, and a notification sent to other devices containing similar circuits.

Protecting Software in the Supply Chain

Evaluating and Mitigating Software Supply Chain Security RisksMay 2010 Robert J. Ellison, John B. Goodenough, Charles B. Weinstock, Carol Woody

Software Supply Chain Security Risks

Δ Poor security requirements that lead to ineffective security considerations in all acquisition steps.

Δ Coding and design defects incorporated during development that allow the introduction of code by unauthorized parties when the product or system is fielded. In addition, there are those defects that compromise security directly by allowing unauthorized access and execution of protected functionality.

Δ Improper control of access to a product or system when it is transferred between organizations (failures in logistics), allowing the introduction of code by unauthorized parties.

Δ Insecure deployed configuration (e.g., a deployed configuration that uses default passwords).

Δ Operational changes in the use of the fielded product or system that introduce security risks or configuration changes that allow security compromises (configuration control and patch management).

Δ Mishandling of information during product or system disposal that compromises the security of current operations and future products or systems.

Page 63: USRP 0316 Resources 030812 v2.pdf

63www.usresilienceproject.org

CHAPTER 7: Linking Smart Grid, Cybersecurity and Supply Chain

Supply Chain Security Risk Management in Each Acquisition Phase

Initiation Δ Perform an initial software supply chain security risk assessment and establish required security properties.

Δ Include supply chain security risk management as part of the RFP.

Δ Develop plans for monitoring suppliers.

Δ Select suppliers that address supply chain security risk.

Development Δ Monitor practices for supply chain security risk.

Management Δ Maintain awareness of supplier’s sub-tier relationships.

Configuration/Deployment Δ Assess delivered products/systems.

Δ Configure/integrate with consideration of supply chain security risks.

Δ Develop user guidance to help mitigate supply chain security risk.

Operations/Maintenance Δ Manage security incidents.

Δ Review operational readiness.

Δ Monitor component/supplier.

Disposal Δ Mitigate risks of information disclosure during disposal.

Supply Chain Risk Analysis webinarCarnegie Mellon, 2010

Information that acquirers should be asking suppliers:

Δ What are their development practices?

Δ How do they design code and test?

Δ How do they deal with their own suppliers?

Δ How do they deal with their own events (changes in requirements, personnel changes, upgrades and business disruptions)?

Requests for proposals (RFPs) should ask for evidence of the following:

Δ Development staff training (biggest risks continue to be known common weaknesses).

Δ Documentation of potential attacks and mitigations.

Δ Supplier capabilities as demonstrated with development of other systems.

Δ For contracted development, require application of threat modeling to analyze risks associated with architecture and design decisions.

Page 64: USRP 0316 Resources 030812 v2.pdf

64 U.S. Resilience Project

Securing the Smart Grid Workshop

Supply Chain Risk Management

Electricity Sector Cybersecurity Risk Management Process GuidelineU.S. Department of Energy, September 2011

The Department of Energy issued a draft guideline for comment that provided suggestions on how to incorporate cybersecurity into enterprise risk management processes. It noted: “Although the electricity delivery system has not yet experienced widespread debilitating cyber attacks, its reliance on the previous strategies of physical separation between the ICS [industrial control systems] environment and the business and administrative networks is no longer adequate to satisfy today’s mission and business needs.” The model offers a continuous process of framing, assessing, responding to, and monitoring risk at each of the three tiers to ensure “risk-based decision-making is integrated into every aspect of the organization.“

The risk management plan described three tiers of cyber risk management:

Δ Add cyber risk as enterprise-level risk with appropriate leadership involvement, management strategies and resourcing;

Δ Implement cybersecurity risk management goals and strategies into mission and business processes; and

Δ Deploy cybersecurity safeguards, controls and countermeasures at the system level.

Risk Management Framework

Page 65: USRP 0316 Resources 030812 v2.pdf

65www.usresilienceproject.org

CHAPTER 7: Linking Smart Grid, Cybersecurity and Supply Chain

Supply chain issues: With respect to supply chain, the report noted: “In today’s world, the efficiencies of commercial off-the-shelf (COTS) hardware and software platforms, interconnected public and private networks, and remote support are moving organizations from an isolated environment into a global, interconnected environment. Thus, electricity sector organizations recognize these efficiencies represent new cybersecurity risks that were not present in their isolated environment. The evolution of ICS from proprietary to COTS platforms has also introduced electricity sector organizations to new cybersecurity risks as illustrated by targeted malware against COTS platforms in the IT [information technology] sector. Consequently, ICS deployed to support mission critical operations in the electricity sector can potentially be compromised and result in significant negative impact on operations.”

Trust relationships: The ever-broadening reliance on globally sourced equipment exposes IT, ICS and networks to an enlarging risk of exploitation through counterfeit materials, malicious software or untrustworthy products. The Risk Framework described five models for trusted relationships that could help minimize supply chain cyber risks.

Δ Validated trust occurs when one organization develops an IT and ICS application and provides evidence (e.g., security plan, assessment results) that the application meets certain security requirements.

Δ Historical trust is established by the track record exhibited by an organization in the past, particularly in its risk and cybersecurity-related activities and decisions.

Δ Third-party trust occurs when an organization establishes a level of trust with another organization on the basis of assurances provided by a mutually trusted third party.

Δ Mandated trust is established on the basis of a specific mandate issued by a third party in a position of authority, such as an organization charged with issuing public key infrastructure (PKI) certificates.

Δ Hybrid trust models represent some combination of the models above.

Supply Chain Risk Management Practices for Federal Information SystemsNISTIR 7622, June 2010Marianne Swanson, Nadya Bartol, Rama Moorthy

This report provides a tool set for supply chain security. In addition, it provides the following general and technical requirements that an organization can place in contractual documents to achieve a measure of supply chain assurance. These requirements should be explicitly defined in the statement of work.

Δ Determine the appropriate level of risk distribution among the acquirer, integrator and supplier. Define the integrator’s and supplier’s level of responsibility for supplying trustworthy systems and elements in contracts.

Page 66: USRP 0316 Resources 030812 v2.pdf

66 U.S. Resilience Project

Securing the Smart Grid Workshop

Δ Use past performance of the integrator/supplier for indications of security consciousness in their processes and the resulting systems, elements and services as a gauge for their supply chain assurance practices. Indicators include available information about systems, elements and services; evidence of attempts by the supplier to reduce vulnerabilities; and what past vulnerabilities indicate about product/service strength, supplier pattern of addressing identified vulnerabilities, current known yet unfixed vulnerabilities, and recent changes in the organization that might invalidate past performance.

Δ Establish requirements for processes (including test and evaluation processes) and include them in contract documents.

Δ Examine how integrators select/manage their suppliers and whether or not the integrator/supplier imposes similar requirements on their suppliers.

Δ Require respondents to provide a supply chain risk management plan that addresses, in detail, their internal and external practices and controls employed to minimize the risk posed by counterfeits, and known and unknown vulnerabilities in systems, elements and services.

The report identifies best practices and guidelines for acquirers, suppliers and integrators across the spectrum of supply chain risks, including the following:

Δ Maximize acquirer’s visibility into integrators and suppliers

Δ Protect confidentiality of element uses

Δ Incorporate supply chain assurance in requirements

Δ Select trustworthy elements

Δ Enable diversity

Δ Identify and protect critical processes and elements

Δ Use defensive design

Δ Protect the supply chain environment

Δ Configure elements to limit access and exposure

Δ Formalize service/maintenance

Δ Test throughout the system development life cycle

Δ Manage configuration

Δ Consider personnel in the supply chain

Δ Promote awareness, educate and train personnel on supply chain risk

Δ Harden supply chain delivery mechanisms

Δ Protect/monitor/audit operational system

Δ Negotiate requirements changes

Δ Manage supply chain vulnerabilities

Δ Reduce supply chain risks during software updates and patches

Δ Respond to supply chain incidents

Δ Reduce supply chain risks during disposal

Page 67: USRP 0316 Resources 030812 v2.pdf

67www.usresilienceproject.org

CHAPTER 7: Linking Smart Grid, Cybersecurity and Supply Chain

Governing the Tangible Risk: The SCOR modelX-SCM: The New Science of X-treme Supply Chain Management, 2011Taylor Wilkerson

The supply chain operations reference (SCOR) model has been used by supply chain managers since 1996 to structure and guide supply chain analysis. Its proven utility as an analytical framework for evaluating, improving and managing supply chain performance has been demonstrated across almost every industry. The SCOR model integrates process definitions with performance and diagnostic metrics and leading practices for improving operational efficiency and customer service.

Recently, the Supply Chain Council, which owns the SCOR model, formed a project team to investigate the intersection between the SCOR model and supply chain risk management.

Phase 1: Define the supply chain. Different product categories — star performers, cash cows, poor performers — may have different risk management objectives, so it is critical to clearly define the supply chain that will be evaluated. The next step is to map the supply chain and depict the material flow between the nodes. For each node, there should be an associated SCOR process — source, make, deliver, return — reflecting the activity occurring at that node.

Phase 2: Analyze the supply chain. The SCOR model uses “value at risk” (VAR) to quantify supply chain risks. The VAR for a specific risk is simply the probability of the risk event occurring, multiplied by the financial impact that would result if the event should occur. The VAR for an entire supply chain, then, is the sum of the VAR for each risk in the supply chain. The result is an assessment of the likely financial impacts of all risks in the supply chain. This information can be used to develop return on investment calculations to guide mitigation efforts. Although VAR is the preferred metric in the SCOR model, time to recover — the measure of the expected lapsed time between an event and supply chain recovery — is the metric that Cisco uses to quantify the risks in its supply chains.

Phase 3: Assess the supply chain risks. The SCOR model provides a structure for a brainstorming exercise to identify potential risks linked to the geographic assessment and process maps developed earlier. Suggested areas for consideration include disaster preparedness, political and labor stability, critical failure point for supply chain, security and quality controls at the site, supplier financial stability, and so on. Validate the list of potential risks with respect to probability and impact and document the risk register in a format that makes it usable in future analyses.

Phase 4: Mitigate the supply chain risks. Mitigation involves taking action to reduce either the likelihood that a risk will occur or the impact of the event when it does occur. How much risk you mitigate will depend on both the risk tolerance of the supply chain and the resources available to implement mitigation actions. Because it is difficult to mitigate every risk, the Risk Prioritization table on the following page provides a way of prioritizing which risks to mitigate.

Phase 5: Implement mitigation measures. Once the mitigation plan has been defined and funded, a critically important aspect of implementation is risk monitoring to allow managers to proactively respond to events as they happen or even take preventive action before they occur.

Page 68: USRP 0316 Resources 030812 v2.pdf

68 U.S. Resilience Project

Securing the Smart Grid Workshop

Continuous risk managementIn today’s economic environment, there is no such thing as a static supply chain — and that means there is no such thing as a static risk profile. As suppliers, customers and partners are added and removed from your supply chain, the impact of changes must be regularly reassessed. Here is an example of a typical schedule:

Δ Monthly — Revisit mitigation plans to ensure that they are being properly implemented and accurately reflect operational needs.

Δ Quarterly — Revisit risk assessments, especially those that are subject to market or political conditions, to verify that the VAR for each risk is accurate.

Δ Annually — Revisit the supply chain to ensure the supply chain definition and risk priorities accurately reflect the current supply chain configuration.

Δ Biannually — Revisit the supply chain definition to ensure that the risk management program reflects both the organizations that are currently involved in the supply chain and the role the supply chain plays in your company’s corporate strategy.

Risk PrioritizationSource: Logistics Management Institute 2008

Low riskLow priority for mitigation

Moderate risk Medium priority for mitigation

Critical risk High priority for mitigation

LIKELIHOOD OF OCCURRENCE

Moderate riskMedium priority for mitigation

POTE

NTI

AL IM

PACT

Page 69: USRP 0316 Resources 030812 v2.pdf

69www.usresilienceproject.org

CHAPTER 7: Linking Smart Grid, Cybersecurity and Supply Chain

The ICT SCRM Community Framework Development ProjectUniversity of Maryland, 2011Sandor Boyson

This study reviewed more than 60 policy and practice documents of key initiatives in the supply chain cybersecurity and found areas of emerging congruence, but also fragmentation of approach. The core finding is a compelling need for the information communications technology (ICT) supply chain industry to reach across the hardware, software, network and physical distribution divides to gain greater strategic command and control; to better leverage the lessons learned from other supply chain disciplines; and to more effectively navigate the serious opportunities and risks associated with the rapid globalization of ICT systems.

Key Findings

Δ The cyber supply chain discipline is currently in an early emerging state characterized by a deficient evidence-based body of knowledge; a proliferation and fragmentation of industry best practices and standards groups, generally led by the largest firms; and a profound under-usage of supply-chain-wide risk governance mechanisms inside IT vendors.

Δ No readily identifiable, large-scale, end-to-end risk management model exists that cuts across the various functional areas of the ICT supply chain.

Δ Anchoring ICT Supply Chain Risk Management (SCRM) to the more mature supply chain industry will help accelerate consensus building and overall development.

This study recommends combining defense in depth and breath. Defense in breath is extensive, covering the end-to-end ecosystem of customers/acquirers, integrators, suppliers and key processes between them. Defense in depth is intensive, covering risk governance; systems life cycle management, including design, risk assessment and supply base modeling/auditing; and operations management. Together, they provide comprehensive ICT SCRM controls.

Page 70: USRP 0316 Resources 030812 v2.pdf

70 U.S. Resilience Project

Securing the Smart Grid Workshop

Bibliography

Allan, Danny, Tim Hahn, Andreas Szakal, Jim Whitmore, and Axel Buecker. Security in Development: The IBM Secure Engineering Framework. Armonk, New York: IBM Corp., 2010. http://www.redbooks.ibm.com/redpapers/pdfs/redp4641.pdf.

Boyson, Sandor. THE ICT SCRM Community Framework Development Project. College Park, MD: University of Maryland, 2011. http://csrc.nist.gov/scrm/documents/umd_ict_scrm_initiatives-report2-1.pdf.

Ellison, Robert J., John B. Goodenough, Charles B. Weinstock, and Carol Woody. Evaluating and Mitigating Software Supply Chain Security Risks. Pittsburgh, PA: Carnegie Mellon Software Engineering Institute , May 2010. http://www.sei.cmu.edu/library/abstracts/reports/10tn016.cfm.

Harrington, Lisa H., Sandor Boyson, and Thomas M. Corsi. X-SCM: The New Science of X-treme Supply Chain Management. New York: Routledge, 2011.

Lipner, Steve, and Michael Howard. “Microsoft The Trustworthy Computing Security Development Lifecycle.” MSDN Library Web site. March 2005. http://msdn.microsoft.com/en-us/library/ms995349.aspx (accessed February 29, 2012).

Swanson, Marianne, Nadya Bartol, and Rama Moorthy. Supply Chain Risk Management Practices for Federal Information Systems. Gaithersburg, MD: National Institute of Standards and Technology, June 2010. http://csrc.nist.gov/publications/drafts/nistir-7622/draft-nistir-7622.pdf.

U.S. Department of Energy. Electricity Sector Cybersecurity Risk Management Process Guideline. Washington, DC: U.S. Department of Energy, September 2011. https://public.commentworks.com/CW_DOE_WF/InitiativeDocFiles/46/RMP_Guideline_Draft_for_Public_Comment_08312011-1.pdf.

Villasensor, John D. Ensuring Hardware Cybersecurity. Washington, DC: Brookings Institution, May 2011. http://www.brookings.edu/papers/2011/05_hardware_cybersecurity.aspx.

Page 71: USRP 0316 Resources 030812 v2.pdf

71www.usresilienceproject.org

CHAPTER 8: National Strategies for Smart Grid, Cybersecurity and Supply Chain

National policy documents are beginning to reflect the overlaps between cybersecurity and supply chain risk management. The organizational silos between physical and cybersecurity are beginning to break down, leading to a more integrated approach — one that capitalizes on the synergies of solution and the opportunities to strengthen public-private partnerships.

U.S. Policy Documents

Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications InfrastructureWhite House, May 2009

A team of government cybersecurity experts conducted a comprehensive review to assess U.S. policies and structures for cybersecurity, identifying initial areas of action to help the United States achieve a more reliable, resilient and trustworthy digital infrastructure for the future.

Key Findings

Anchor leadership in the White House

Δ Create a cybersecurity coordinator to work across agencies.

Δ Review policies and laws to clarify authorities, roles and responsibilities.

Δ Strengthen federal leadership and accountability.

Δ Elevate cybersecurity at state, local and tribal levels to ensure effective coordination.

Build capacity for a digital nation

Δ Promote cybersecurity risk awareness for all citizens.

Δ Build an education system that will enhance understanding of cybersecurity and allow the United States to retain and expand upon its scientific, engineering and market leadership in information technology.

Δ Expand and train the workforce to protect the nation’s competitive advantage.

Δ Help organizations and individuals make smart choices as they manage risk.

Share responsibility for cybersecurity

Δ Improve partnership between the private sector and government.

Δ Evaluate barriers to public-private partnership.

Δ Partner effectively with the international community.

CHAPTER 8

National Strategies for Smart Grid, Cybersecurity and Supply Chain

Page 72: USRP 0316 Resources 030812 v2.pdf

72 U.S. Resilience Project

Securing the Smart Grid Workshop

Create effective information sharing and incident response

Δ Build a framework for cyber incident response.

Δ Enhance information sharing to improve incident response capabilities.

Δ Improve cybersecurity across all infrastructures.

Encourage innovation

Δ Link research and development (R&D) frameworks to infrastructure development.

Δ Build a cybersecurity-based identity management vision and strategy for the nation.

Inclusion of supply chain considerationsThe report noted that: One of the results of the information technology revolution and free trade policies is a global environment for research, design, manufacturing, and servicing of information and communications products by corporations with facilities spread across the globe. This global marketplace has created tremendous benefits for U.S. industry by opening markets worldwide for high-tech U.S. goods and services. However, the emergence of new centers for manufacturing, design and research across the globe raises concerns about the potential for easier subversion of computers and networks through subtle hardware or software manipulations. Counterfeit products have created the most visible supply problems, but few documented examples exist of unambiguous, deliberate subversions.

A broad, holistic approach to risk management is required rather than a wholesale condemnation of foreign products and services. The challenge with supply chain attacks is that a sophisticated adversary might narrowly focus on particular systems and make manipulation virtually impossible to discover. Foreign manufacturing does present easier opportunities for nation-state adversaries to subvert products; however, the same goals could be achieved through the recruitment of key insiders or other espionage activities.

The best defense may be to ensure U.S. market leadership through continued innovation that enhances U.S. market leadership and the application of best practices in maintaining diverse, resilient supply chains and infrastructures. The president’s cybersecurity policy official, working with departments and agencies, should:

Δ Define procurement strategies through the General Services Administration, building on work by the National Security Agency for the Department of Defense, for commercial products and services in order to create market incentives for security to be part of hardware and software product designs, new security technologies, and secure managed services;

Δ Expand partnerships with state, local, and tribal governments and international partners to maximize the market influence of these procurements;

Δ Work with Congress to identify mechanisms that would enable departments and agencies — under appropriate, limited situations — to incorporate threat information into acquisition decisions; and

Δ Work with industry to provide threat information and identify best practices for managing supply chain and insider risks, both from economic and threat perspectives.

Page 73: USRP 0316 Resources 030812 v2.pdf

73www.usresilienceproject.org

CHAPTER 8: National Strategies for Smart Grid, Cybersecurity and Supply Chain

The Comprehensive National Cybersecurity Initiative (CNCI)White House, May 2009

In May 2009, the president accepted the recommendations of the Cyberspace Policy Review. The CNCI is implementing the recommendations of the Cyberspace Policy Review to strengthen the capabilities of the federal government to meet a more sophisticated cyber threat. This effort is built on the George W. Bush administration’s cybersecurity plan, but it extends beyond the Bush-era CNCI by adding cybersecurity initiatives in two key areas: supply chain and critical infrastructure.

Initiative No. 11: Develop a multipronged approach for global supply chain risk management. Globalization of the commercial information and communications technology marketplace provides increased opportunities for those intent on harming the United States by penetrating the supply chain to gain unauthorized access to data, alter data, or interrupt communications. Risks stemming from both the domestic and globalized supply chain must be managed in a strategic and comprehensive way over the entire life cycle of products, systems and services. Managing this risk will require a greater awareness of the threats, vulnerabilities and consequences associated with acquisition decisions; the development and employment of tools and resources to technically and operationally mitigate risk across the life cycle of products (from design through retirement); the development of new acquisition policies and practices that reflect the complex global marketplace; and partnership with industry to develop and adopt supply chain and risk management standards and best practices. This initiative will enhance federal government skills, policies and processes to provide departments and agencies with a robust tool set to better manage and mitigate supply chain risk at levels commensurate with the criticality of, and risks to, their systems and networks.

Initiative No. 12: Define the federal role for extending cybersecurity into critical infrastructure domains. The U.S. government depends on a variety of privately owned and operated critical infrastructures to carry out the public’s business. In turn, these critical infrastructures rely on the efficient operation of information systems and networks that are vulnerable to malicious cyber threats. This initiative builds on the existing and ongoing partnership between the federal government and the public and private sector owners and operators of critical infrastructure and key resources (CIKR). The Department of Homeland Security and its private-sector partners have developed a plan of shared action with an aggressive series of milestones and activities. It includes both short-term and long-term recommendations, specifically incorporating and leveraging previous accomplishments and activities that are already underway. It addresses security and information assurance efforts across the cyber infrastructure to increase resiliency and operational capabilities throughout the CIKR sectors. It includes a focus on public-private sharing of information regarding cyber threats and incidents in both government and CIKR.

Page 74: USRP 0316 Resources 030812 v2.pdf

74 U.S. Resilience Project

Securing the Smart Grid Workshop

National Strategy for Global Supply Chain SecurityThe White House, January 2012

International trade has been, and continues to be, a powerful engine of U.S. and global economic growth. The global supply chain system that supports this trade is essential to the United States’ economy and is a critical global asset.

The National Strategy for Global Supply Chain Security (the Strategy) articulates the United States government’s policy to strengthen the global supply chain in order to protect the welfare and interests of the American people and secure our nation’s economic prosperity. The Strategy focuses on the worldwide network of transportation, postal, and shipping pathways, assets, and infrastructures by which goods are moved from the point of manufacture until they reach an end consumer, as well as supporting communications infrastructure and systems.

The document recognizes the interdependencies between cybersecurity and supply chain security, noting: The global system relies upon an interconnected web of transportation infrastructure and pathways, information technology, and cyber and energy networks. While these interdependencies promote economic activity, they also serve to propagate risk that arises from a local or regional disruption across a wide geographic area or industry. The Strategy stresses two primary goals:

Goal 1: Promote the efficient and secure movement of goods

Δ Resolve threats early to expedite the flow of legitimate commerce by integrating security into supply chain operations.

Δ Improve verification and detection capabilities to identify those goods that are not what they are represented to be, are contaminated, are not declared, or are prohibited; and to prevent cargo from being compromised or misdirected as it moves through the system.

Δ Enhance the security of infrastructure and conveyances by limiting access to cargo, infrastructure, conveyances and information to those with legitimate roles and responsibilities.

Δ Maximize the flow of legitimate trade by modernizing supply chain infrastructure and processes, developing new mechanisms to facilitate low-risk cargo, simplifying trade compliance processes, and refining incentives to encourage enhanced stakeholder collaboration.

Goal 2: Foster a resilient supply chain

Δ Mitigate systemic vulnerability to a supply chain disruption prior to a potential event by using risk management principles to identify and protect key assets, infrastructure, and support systems; and by promoting the implementation of sustainable operational processes and appropriate redundancy for those assets.

Δ Promote trade resumption policies and practices that will provide for a coordinated restoration of the movement of goods following a potential disruption by developing and implementing national and global guidelines, standards, policies and programs.

Page 75: USRP 0316 Resources 030812 v2.pdf

75www.usresilienceproject.org

CHAPTER 8: National Strategies for Smart Grid, Cybersecurity and Supply Chain

Priority Action AreasImplementation of the Strategy will focus on the following priority action areas:

Δ Align federal activities across the United States government to the goals of the Strategy.

Δ Refine understanding of the threats and risks associated with the global supply chain through updated assessments.

Δ Advance technology research, development, testing, and evaluation efforts aimed at improving the ability to secure cargo in air, land and sea environments.

Δ Identify infrastructure projects to serve as models for the development of critical infrastructure resiliency best practices.

Δ Seek opportunities to incorporate global supply chain resiliency goals and objectives into the federal infrastructure investment programs and project assessment process.

Δ Promote necessary legislation that supports implementation of the Strategy by federal departments and agencies.

Δ Develop, in concert with industry and foreign governments, customized solutions to speed the flow of legitimate commerce in specific supply chains that meet designated criteria and can be considered low-risk.

Δ Align trusted trader program requirements across federal agencies with the potential for standardized application procedures, enhanced information-sharing agreements, and security audits conducted by joint or cross-designated federal teams.

European Policy Documents

Priorities for Research on Current and Emerging Network Technologies: Supply Chain IntegrityEuropean Network and Information Security Agency, April 2010

Supply chain integrity in information communication and technology (ICT) is addressed separately in different industries. A common framework for supply chain integrity would help identify common linkages across various industries, including technologies, best practices, and innovative business models. The problem is complicated because of the following:

1. Complex nature of globally distributed supply chains (people, processes, and technologies).

2. Lack of common guidelines for ICT supply chain integrity.

3. Absence of tools, processes, and controls to help measure statistical confidence levels and verify integrity.

4. Ineffective methodologies and technologies for end-user verification of products.

5. Lack of broadly applicable tools, techniques, and processes to detect or defeat counterfeiting and tampering in systems.

Page 76: USRP 0316 Resources 030812 v2.pdf

76 U.S. Resilience Project

Securing the Smart Grid Workshop

6. Lack of coordinated approaches to preserving integrity for different types of products from production through purchasing, and into operations and use.

7. Absence of common business models that could drive the harmonization of integrity requirements across various ICT segments.

Recommendations for Research The study identifies several key areas for research that can lead to the emergence of a common framework that will strengthen insights into the integrity of the supply chain:

1. Improved and innovative trust models. Currently, most commercial systems operate with implicit trust from their operators only. Moreover, hierarchical trust models in systems lead to numerous dependencies (e.g., software packages need to trust each other and the operating system, from the bottom to the top of the stack). These trust models need to be augmented to enable end-to-end verifiable trustworthiness of ICT systems. Innovative approaches need to be defined to create a new generation of trust models with better-defined constraints. Trust (defined as the expected behavior of a product) and integrity need to be verifiable in solutions that cut across the development and production process. Another interesting area of research is recovery of trust and integrity, a set of approaches and techniques to use if an ICT product has been compromised in order to recover some integrity.

2. Improvement in evaluation and integrity-checking techniques. Evaluation approaches as currently used, while very useful in many contexts, provide no assurance under operational conditions (at run time) and rely on the evaluation of the general design rather than an instance of a product. New dynamic evaluation mechanisms for integrity or an extension of the existing approaches are required to enhance the role of evaluation.

3. Study of good practices currently used in various industry segments and in government procurement. Good practices in supply chain management can provide important insights into technology and process developments that will increase the efficiency and integrity of ICT supply chains. Government procurement practices can be of interest, as can their comparison with other best practices.

4. Improved technology solutions to detect and prevent counterfeiting or overproduction. Non-authentic components (e.g., networks or endpoints) are more likely to fail or be breached. New technologies to determine the provenance of ICT systems are needed to protect the infrastructure.

5. New approaches to security assurance. Auditable, transparent and uniform supply chain integrity practices and tools are needed to achieve higher levels of assurance in critical systems without significantly increasing their cost. New technologies to define inherently trustable complex systems are also necessary. There are two aspects of improving security assurance: greater assurance in supply chains for existing products and designing new architectures that can provide better assurance in new ICT products. Finally, currently available evaluation and assurance frameworks, such as Common Criteria, need to be studied.

Page 77: USRP 0316 Resources 030812 v2.pdf

77www.usresilienceproject.org

CHAPTER 8: National Strategies for Smart Grid, Cybersecurity and Supply Chain

6. Better approaches to inventory and configuration control and maintenance. The resilience of a system is dependent on the ability of the operator to verify the integrity of the hardware, software and configuration after any updates, repairs or patching. Introducing compromised elements into the solution can severely impair a system’s resilience. New technologies are needed to manage deployed complex systems in order to ensure integrity after modifications. Furthermore, tools and techniques to define, track and measure the integrity of ICT systems will allow real-time verification of their integrity.

7. Study of approaches for assessing policy needs on a global scale. There is an opportunity for industry and academia to study balanced approaches for addressing policy needs in the area of ICT supply chains on a global scale, based on the examples of good practices available from a range of use cases, such as highly global ICT supply chains, supply chains in regulated industries or examples of organizational good practices. Relevant study ideas can be gleaned in technology and process innovations in ICT supply chains, as well as in the deployment of environments with high levels of assurance.

Cybersecurity Aspects in the Maritime SectorEuropean Network and Information Security Agency, December 2011

Key FindingsMaritime cyber security awareness is currently low or non-existent. Member states are thus highly recommended to undertake targeted maritime sector awareness-raising campaigns and cybersecurity training of shipping companies, port authorities, national cybersecurity offices and other key stakeholders.

Due to the high ICT complexity, it is a major challenge to ensure adequate maritime cybersecurity. A common strategy, and the establishing of good practices for technology development and implementation of ICT systems, would therefore ensure “security by design” for all critical maritime ICT components.

As current maritime regulations and policies consider only physical aspects of security and safety, policy makers should add cybersecurity aspects to them.

The study strongly recommends a holistic, risk-based approach; assessment of maritime-specific cyber risks; and identification of all critical assets within this sector.

As maritime governance is fragmented between different levels (i.e., international, European, and national), the International Maritime Organization, together with the EU Commission and the member states, should align international and European Union policies in this sector.

Better information exchange and statistics on cybersecurity can help insurers to improve their actuarial models, reduce their own risks, and thus offer better contractual insurance conditions for the maritime sector. Information exchange platforms, such as CPNI.NL, should be also considered by member states to better communications.

Page 78: USRP 0316 Resources 030812 v2.pdf

78 U.S. Resilience Project

Securing the Smart Grid Workshop

Bibliography

European Network and Information Security Agency. Analysis of Cyber Security Aspects in the Maritime Sector. Heraklion, Greece: European Network and Information Security Agency, November 2011. http://www.enisa.europa.eu/act/res/other-areas/cyber-security-aspects-in-the-maritime-sector/cyber-security-aspects-in-the-maritime-sector-1/at_download/fullReport.

European Network and Information Security Agency. Priorities for Research on Current and Emerging Network Technologies. Heraklion, Greece: European Network and Information Security Agency, November 2011. http://www.enisa.europa.eu/act/res/other-areas/cyber-security-aspects-in-the-maritime-sector/cyber-security-aspects-in-the-maritime-sector-1/at_download/fullReport.

“The Comprehensive National Cybersecurity Initiative.” The White House. http://www.whitehouse.gov/cybersecurity/comprehensive-national-cybersecurity-initiative.

The White House. Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure. Washington, DC: The White House, May 2009. http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf.

The White House. National Strategy for Global Supply Chain Security. Washington, DC: The White House, January 2012. http://www.whitehouse.gov/sites/default/files/national_strategy_for_global_supply_chain_security.pdf.

Page 79: USRP 0316 Resources 030812 v2.pdf

79www.usresilienceproject.org

CASE STUDY: Dow Chemical

The Changing Landscape for Supply Chain Risk ManagementHistorically, the issues that cause the greatest impact on the supply chain included natural disasters, severe weather, labor disputes and work stoppages, and social and political unrest. Since The Dow Chemical Company operates on a global scale, these conventional risks continue to have the greatest enterprise-wide impact. But, the risk landscape has changed dramatically since 9/11. Increased terrorism risks, coupled with pandemics, cargo theft, chemical diversion, growing public concerns about hazardous material incidents, product counterfeiting, and smuggling and maritime piracy convinced the company to develop a long-term strategy for supply chain sustainability and risk management that included:

Δ A supply chain redesign to reduce the number of shipments and container miles;

Δ Risk-based global supply chain security measures and regional service event management centers;

Δ Chain of custody controls implemented through asset visibility, vendor/service provider risk assessments and continuing technological innovation; and

Δ Enhanced collaboration with industry coalitions and the government to share best practices and promote the adoption of practical, proven industry best practices as the basis for government policy.

Supply Chain RedesignDow operates an extensive, integrated global supply chain. The company procures more than 100 billion pounds of raw material and hydrocarbon feedstock from more than 1,000 suppliers worldwide, and manages about three million product shipments to external customers and other Dow locations each year. Dow’s products are staged in 300 warehouses and 100 terminals around the world, and shipped via highway, rail, marine, pipeline and air. About 20 percent of those shipments involve international border crossings where custom’s clearance is required.

Dow believes that a sustainable supply chain is a key enabler and an ongoing necessity for sustainable business growth. The company’s vision for a sustainable supply chain goes well beyond the boundaries of “greening” the supply chain. It addresses the fundamental attributes of sustainability, including safety and security, profitability, reliability and resilience, and social and environmental responsibility.

Based on an interview with Henry Ward, Global Supply Chain Director, Security, Sustainability & Public Policy, Dow Chemical

October 12, 2011

CASE STUDY

Dow Chemical: Strategies for Supply Chain Security and Sustainability

Page 80: USRP 0316 Resources 030812 v2.pdf

80 U.S. Resilience Project

Securing the Smart Grid Workshop

In order to achieve its vision of a sustainable supply chain, Dow has continued to evaluate and implement new ways to improve the efficiency and effectiveness of its supply chain. The greatest gains have been accomplished through supply chain redesign. For example, during the past three years, Dow completed more than 300 supply chain sustainability projects that contributed $85 million to the company’s bottom line. The drivers for those projects were primarily economic, but they also yielded significant service, safety, security, energy and environmental benefits. As a result of the company’s efforts to reduce transportation distances, improve asset utilization, optimize distribution networks and improve productivity, Dow was able to achieve energy savings equivalent to 2.5 million gallons of diesel fuel per year, greenhouse gas reductions of nearly 400,000 metric tons per year, and relative transportation safety risk reductions of about five percent.

The supply chain was an important area of focus for Dow after 9/11. Dow sought to reduce chemical product transportation risks by reducing highly hazardous chemical shipments, while still meeting the needs of the marketplace. Its supply chain redesign efforts had two major components:

Δ Reduce the number of existing shipments though alternative sourcing, alternate modes of delivery and greater producer/user process integration; and

Δ Avoid new long-term shipments of highly hazardous materials.

Those supply chain redesign efforts reduced Dow’s global footprint for highly hazardous materials by 40 percent and lowered its inventory handling and shipping costs.

Risk-Based Global Supply Chain Security MeasuresDow has developed a comprehensive risk management system for the safe and secure distribution of raw materials, intermediates and products worldwide. The program includes an assessment of potential safety and security risks across its chemical supply chain, including an evaluation of the safety and security practices of its raw material suppliers, the hazards of the materials shipped, the safety and security practices of its logistics service providers, the downstream uses of its products and the qualifications of customers to whom the products are shipped. This supply chain risk assessment and management program enables Dow to identify and implement appropriate, consistent, minimum safety and security measures for product, intermediate and raw material shipments worldwide.

5%

Page 81: USRP 0316 Resources 030812 v2.pdf

81www.usresilienceproject.org

CASE STUDY: Dow Chemical

Dow has prepared and implemented a supply chain security plan, which establishes a tiered system of risk-based security measures that increase with rising threat levels. Dow also has established transportation safety and security standards in those areas where additional risk reduction measures are desired above and beyond those required by government regulations. And, in those areas representing the greatest safety and security concern, Dow is pursuing industry-leading state-of-the-art security initiatives.

Regional Service Event Management CentersWithin the last two years, Dow has created regional supply chain service event management centers to proactively monitor events that could adversely impact its global supply chain — from adverse weather conditions to anticipated labor disputes to social and political unrest, cargo theft and piracy — and manage those events to minimize any potential disruptions for customers. Covering the Americas, Asia, Europe/Middle East, Latin America and Africa, the regional centers draw on multiple intelligence streams to gather information and assess the potential impact of events on Dow shipments. For example, in a recent month, Dow’s regional centers have managed potential disruptions associated with rail and port strikes in Europe and North America, typhoons in the South China Sea, hurricanes and tropical storms in the Gulf Coast, Houston ship channel closures due to a barge accident, political unrest in the Middle East, maritime piracy in the Gulf of Aden, and dangerous goods routing restrictions in China and other world areas associated with high-profile public events. The regional centers are building a strong library of lessons learned — i.e. what worked, what did not, and how the company could approach the problem differently in the future.

Once it becomes clear that an event could affect the company’s product shipments or customers, the regional centers become the focus for risk management efforts. Depending on the potential severity of the event, the regional teams can put together a “war room” to monitor the situation, assess the potential impact, develop options and work directly with the affected business units, which in turn engage customers to determine ways to mitigate the impact of the disruption. The goal is to anticipate and adjust before a disruption can cascade into a major crisis for the company and its customers.

Chain of Custody ControlsDow’s supply chain security is rooted in chain of custody controls. For highly valuable, highly regulated or highly hazardous products, the company has established the capability for 24-7 monitoring of the cargo’s location — e.g. who has responsibility for its handling and whether there has been unauthorized entry into the containers in transit or at the points of hand-off from one party to another.

Three areas of focus include:

Δ Asset Visibility

Δ Supplier/Service Provider Evaluations

Δ Technology Innovation

Page 82: USRP 0316 Resources 030812 v2.pdf

82 U.S. Resilience Project

Securing the Smart Grid Workshop

Asset Visibility: Dow began implementing a strategy for asset visibility through a combination of RFID tagging, GPS and sensor technologies about six years ago. Although RFID had long been used to track chemical shipments by rail, the communication was one way — the container had to pass an RFID reader to signal its location — and did not cover other modes of transportation. By combining RFID and GPS technology, the company got real-time location information. Today, Dow’s web-based “DowTrak” container tracking portal gives the company and customers the ability to track shipments no matter what mode of transportation or area of the world.

GPS and RFID technologies are coupled with sensors which allow supply chain managers to monitor the condition of the material and the integrity of the container. Electronic seals can monitor whether the door has been opened; whether the sensors detect light. There are shock detectors, which also can enable the company to detect where rough handling may be damaging the transportation equipment or products in the container, and humidity sensors to monitor for the presence of water vapor, previously detectable only after drums deteriorated as a result of adverse conditions during ocean transits. These types of asset visibility measures serve both product quality as well as security needs.

Given the volume of shipments, it is not practical to track every shipment. Dow’s focus is on cargo that is:

Δ High value: for example, catalyst materials and agriculture chemicals which could bring a high price on the black market;

Δ High hazard: for example, materials that are toxic to inhale which could be used as weapons of mass effect by terrorists; and

Δ Highly regulated: for example, chemicals that could be repurposed to manufacture illegal drugs or chemical weapons, or products sold into sensitive end-use markets such as direct food and pharmaceutical applications.

As the need is determined by risk assessments on products in these categories, Dow has the ability to maintain 100 percent visibility on a shipment from the time it leaves the shipping location until it arrives at its destination.

Risk Assessments of Raw Material Suppliers & Logistics Service Providers: Dow’s suppliers are evaluated initially and periodically thereafter, based on the potential risks they present to the company. All suppliers are screened against specific criteria in eight risk areas, including safety and security, product stewardship, social and environmental responsibility, product quality, trade compliance, business continuity, financial stability and information protection. The criteria include attributes related to the supplier, industry sector, commodity, geographic area and markets served. Based on the screening results, all suppliers are ranked in one of three risk tiers — high, medium or low.

Suppliers that are ranked in a medium or high-risk tier are further assessed using industry-developed protocols and internationally recognized certification standards, where available. Examples include marine and terminal assessment protocols developed and administered

Page 83: USRP 0316 Resources 030812 v2.pdf

83www.usresilienceproject.org

CASE STUDY: Dow Chemical

by the Chemical Distribution Institute; CEFIC SQAS assessment protocols for road and rail carriers and warehouse operators; international border security program certifications under the C-TPAT (USA), AEO (Europe) and PIP (Canada) government programs; ISO 9000 quality standards; and ISO, ASIS and NFPA business continuity standards. Where industry protocols or government programs are not available, Dow-specific assessment protocols are used. Further, for suppliers ranked in a high-risk tier, Dow puts boots on the ground to validate that minimum risk management requirements are being implemented.

Most Effective Technology: Technology solutions are driven by Dow’s MET (most effective technology) programs which provide a range of solutions for supply chain safety and security, including the integrity of the shipment container, tracking devices and anti-counterfeiting technologies.

One of Dow’s emerging challenges is counterfeit products — either counterfeit Dow labels or real Dow labels with counterfeit product. For several high-risk businesses operating in high-risk geographies, Dow has implemented anti-counterfeiting approaches. For example, Dow places tamper-evidence seals on containers to lower the probability of undetected entry. Second, the company has employed the use of holographs and 3D bar codes linked to a database of shipments, so distributors and customers can scan and verify the bar code through a link to Dow’s secure database that the label is a legitimate Dow label and a legitimate Dow shipment. The link also provides information on when the product was manufactured and shipped.

Cyber Security: IT has become an emerging supply chain risk for Dow. Criminal elements around the world are beginning to use shipping information to target specific cargoes. For example, criminals in Mexico recently gained access to a logistics company’s shipping records and used that information to target specific shipments in transit. In another example, there is evidence that Somali pirates have gained insider information from ports in Europe about container ship cargoes, which they have used for targeting purposes when those vessels pass through the Gulf of Aden. The challenge is to prevent the basic information that shippers, customs authorities, carriers and customers need from falling into the wrong hands. Cyber security is the responsibility of Dow’s information security professionals. They use standard industry protocols to assess the IT security of high-risk suppliers and service providers.

Collaboration for Improved Security & ResilienceDow partners with both the public and private sectors for information sharing about best practices. It partners with a wide range of industry consortia and associations to develop best practices and is proactive in proposing practical, proven industry standards for adoption by policy-makers and regulators.

For example, Dow and the eight highway carriers that account for about 90 percent of Dow’s North American truck shipments formed a highway security network to share security intelligence information, discuss best practices and develop common security programs. When the Transportation Security Administration (TSA) was looking for guidelines to secure hazardous materials, the highway security network shared their practices for safe and secure transportation

Page 84: USRP 0316 Resources 030812 v2.pdf

84 U.S. Resilience Project

Securing the Smart Grid Workshop

of toxic inhalation materials. These became the basis for TSA’s voluntary Highway Security-Sensitive Materials Security Action Items for hazardous materials transportation for the entire industry.

Dow’s position is that, rather than wait for the government to propose a security standard, a proactive approach ensures that practical and proven industry best practices are built into the national strategy for homeland security and resilience. For public-private collaboration, Dow emphasizes two principles:

1. Holistic Approaches: Supply chain security strategies need to be based on the selection of those risk mitigation techniques and approaches that achieve the desired result in the most cost-effective way. The strategies also need to balance commercial and security needs.

2. Collaboration Imperative: Neither the public nor private sector can secure supply chain systems without the support and partnership of the other. The level of complexity is increased by the fact that, for manufacturers, supply chain security requires the engagement of suppliers, customers and carriers. Traditional, punitive regulatory frameworks do not represent the best approach for securing the supply chain.

The Business Case for Supply Chain Security In the final analysis, Dow can document that supply chain security investments have saved the company millions in annual operating costs from reduced inventory requirements and shipping costs, greater efficiency, minimized losses from theft and greater resilience. Estimates of savings for the supply chains where those investments have been made include:

Δ More than 20 percent cost reductions in excess inventory and container fleet requirements;

Δ 100 percent reduction in theft/loss/pilferage;

Δ 100 percent reduction in tampering;

Δ Up to 90 percent reduction in transit time;

Δ 25-50 percent improvements in on-time delivery; and

Δ 50 percent reduction in response time to identify and resolve in-transit problems.

Page 85: USRP 0316 Resources 030812 v2.pdf

85www.usresilienceproject.org

CASE STUDY: De-Risking the Supply Chain

In a Nutshell Supply chain risk management is critical for Cisco Systems because it relies on outsourced manufacturing for more than 99 percent of the products it delivers, most of which are configure-to-order. According to James Steele, Cisco’s program director for supply chain risk management: “In the past, supply chain operations was “care-about” only when things went wrong. The focus was not on growing the business, but on keeping the trains running on time. Over the past 15 years, there has been a sea change in supply chain management. It has become a strategic capability for many companies, and it continues to get the resources, visibility and focus needed to manage it as a platform for growth. Supply chain risk management is a key element in this evolution.”

Cisco has built a risk management program focused on anticipating and mitigating any event or circumstance that could disrupt its global supply chain. The goal: to incorporate risk intelligence, agility and resiliency into the supply chain so that it is prepared to respond to any threat Examples of the program in action include:

Δ When Bangkok’s airport was shut down by protestors in 2008, Cisco had truck convoys ready to move from their partner’s nearby factory to an airport in Malaysia, sparing customers any disruption.

Δ Within 48 hours after the 2008 Chengdu earthquake in China, Cisco was able to conduct a full impact analysis, gain complete visibility into the supplier footprint in the area and initiate a crisis survey targeted at the suppliers emergency contacts.

Δ When the economic downturn worsened at the end of 2008, Cisco quickly launched a financial risk assessment (FRA) initiative to identify suppliers with single sourced parts that have high revenue implications for Cisco. Once the financial assessment was complete, the team separated suppliers into three categories: “Green,” requiring no action; “Yellow,” needing to be monitored; and “Red,” needing mitigation. When two of the suppliers filed for bankruptcy protection, Cisco already had put in place “last time buys” and established second sources for their parts.

Δ When reports of an H1N1 outbreak in Mexico City surfaced in 2009, it took Cisco three days to put together detailed risk assessments of potential impact on orders, revenues and available contingency plans.

Based on an interview with James Steele, Program Director, Supply Chain Risk Management, Cisco

August 8 2011

CASE STUDY

De-Risking the Supply Chain: Cisco’s Risk Intelligence and Analytic Tools

Page 86: USRP 0316 Resources 030812 v2.pdf

86 U.S. Resilience Project

Securing the Smart Grid Workshop

Δ Within 24 hours of the 2011 earthquake/tsunami in Japan, Cisco understood the key impacts to its extensive supplier base in the impacted area and formed a 100+ person war room that launched an intensive 70-day effort to mitigate the impacts.

Δ Cisco anticipated the escalating risk of the recent Thailand floods in October 2011 and formed a proactive war room that allowed the company to adjust its supply chain to minimize the impact to key suppliers in the region.

Cisco’s supply chain risk management process pairs risk intelligence — knowing where their vulnerabilities are — with risk analytics — knowing where the highest probabilities for disruption are.

Key Tools for Supply Chain Risk Intelligence

Business Continuity Planning (BCP) The BCP program collects information on key suppliers and key nodes in the supply chain. Although BCP has become a standard tool for many companies, the challenge for Cisco is simply its scope and scale — managing a global network of more than 900 suppliers, six EMS partners, multi-traffic lanes, hubs and carriers that the company uses — and that information is continually changing. Business continuity data gives Cisco insight into the impact of a disruption, creating an ability to identify which suppliers are affected by an event and its overall impact on the supply chain.

Cisco’s BCP program gathers a variety of information from its key supply chain partners through a survey process that occurs several times per year. The survey collects information on partners’ business continuity practices, time to recover (TTR) in the event of a disruption and key emergency contact information, as well as financial information. With this data, Cisco can define the recovery profile of a product as characterized by the resilience of all component supplier factories, inventory hubs, partner (or internal) production facilities and logistics centers within that product’s value chain.

BCP Visualization: Cisco’s BCP Visualization capability provides a way to quickly assess the impact of an event — identifying which supply chain nodes are in the affected region, what parts and/or products are made there and what alternate sites can/should be engaged. This visualization and the underlying data becomes the starting point for any incident mitigation effort and allows Cisco to quickly qualify the potential impact an incident could have or is having on its supply chain operations.

Major Elements of Cisco’s BCP Program

Collect, manage and utilize BCP information on all key supply chain nodes:

Δ Map critical components to supplier sites;

Δ Identify Time-to-Recover at the part and site levels;

Δ Evaluate preparedness based on an objective format;

Δ Validate Business Continuity Plans through audits and drills; and

Δ Utilize BCP data as the starting point for any incident response

Page 87: USRP 0316 Resources 030812 v2.pdf

87www.usresilienceproject.org

CASE STUDY: De-Risking the Supply Chain

Crisis Monitoring: Cisco contracts with the National Center for Crisis and Continuity Coordination (NC4) to provide round-the-clock global monitoring to achieve its goal of “sense and respond” situational readiness. Alert profiles are constructed to capture the information on global incidents and events that Cisco monitors generally and in specific regions. Cisco has worked with NC4 to map all of its critical supply chain nodes worldwide and has set criteria for when alarms need to be sounded (for example, when an earthquake occurs within 200 miles of a site). The Cisco Supply Chain Risk Management Team is responsible for utilizing these alerts, as well as open source information to anticipate, sense and identify a potential risk to operations and to initiate the appropriate response.

Playbooks: Cisco has developed a set of response playbooks that provide a framework for organizing an incident response team, as well as a process for assessing the ground-level impact of a disruption, translating that into an actionable set of mitigation actions and

Cisco Presentation Slide

Page 88: USRP 0316 Resources 030812 v2.pdf

88 U.S. Resilience Project

Securing the Smart Grid Workshop

identifying potential impacts to specific products, customer orders and ultimately to customer operations. Cisco maintains a “risk agnostic” master playbook that is applicable to any type of supply chain disruption regardless of its location and nature, as well as risk-specific playbooks that focus on recurring events such as hurricanes and typhoons.

Resiliency Index: Cisco invented the Resiliency Index and the TTR metric because it was not able to find any pre-existing standards or metrics to meet its needs. The Resiliency Index is a composite of resiliency attributes for the key “care-abouts” at Cisco — these include product resiliency, supplier resiliency, manufacturing resiliency and test equipment resiliency, which is a key control point given the globally outsourced supply chain. Each of these four elements of the Resiliency Index is in turn measured by an additional level of resiliency criteria. At the component level, for instance, the criteria includes the number of alternative sources, component suppliers’ TTR and end of life plans and processes. At the supplier level, resiliency is linked to the financial health of suppliers and partners. Manufacturing resiliency is similar to component resiliency in that it is correlated with the availability of back-up or secondary sourcing and the manufacturers TTR following an event. Test resiliency is measured by the availability of inventories for long-lead test equipment parts.

The Resiliency Index is applied automatically to Cisco’s top 100 products that, in aggregate, account for about 50 percent of Cisco’s revenue. This version of the Resiliency Index is updated quarterly and is a key item on the overall Cisco Supply Chain Operations Executive Dashboard. However, the Index can be applied to a single product, a product line or a group of related products. The Index is tracked not only to illustrate the impact of Cisco’s investments in supply chain resiliency, but also can be utilized to identify opportunities to improve resiliency in existing and new products.

New Product Resiliency: Going forward, Cisco is moving the resiliency metrics upstream to new product introductions, each of which now has a risk and resiliency target. While design teams traditionally concentrated on cost and schedule, they now focus on risk and resiliency targets concerning choices about partners, components and sourcing choices. This allows Cisco to build supply chain resilience into the design of the product, rather than trying to de-risk the supply chain after the product launch.

New Tools/Next StepsNew Business Software Tools: The recent Japan earthquake/tsunami in March 2011 was a key test for Cisco’s supply chain risk management capability. Overall, Cisco had a very successful mitigation response and was able to ensure no downstream impact to customers or revenue despite the fact that more than 100 of Cisco’s suppliers were impacted by the event. The enormous scale and scope of the incident, however, was a key learning opportunity to improve Cisco’s supply chain risk management capability and processes. Based on key lessons from its Japan response, Cisco is continuing to invest in increasing the automation of its crisis management workflow process — essentially the process of identifying all impacted components and translating these impacts into actionable mitigation plans and proactive visibility into downstream customer impacts.

Page 89: USRP 0316 Resources 030812 v2.pdf

89www.usresilienceproject.org

CASE STUDY: De-Risking the Supply Chain

Sub-Tier Resiliency Visibility: A key for additional risk management is to increase risk intelligence on supply chain resilience capabilities deeper into the supplier sub-tiers. This opportunity was identified clearly by Cisco during their Japan response in that, while impacts to their first tier of suppliers were highly visible, it was more challenging to identify impacts on the supplier sub-tiers. Such information is particularly important for highly engineered components in critical commodity areas such as semiconductors and optical components. Cisco is continuing to expand its supply chain risk management efforts into BCP coverage for select portions of its supply chain sub-tiers in order to be even more prepared for the inevitable next crisis.

Cisco Presentation Slide

Page 90: USRP 0316 Resources 030812 v2.pdf

90 U.S. Resilience Project

Securing the Smart Grid Workshop

Page 91: USRP 0316 Resources 030812 v2.pdf

91www.usresilienceproject.org

CASE STUDY: Supply Chains in Crisis

Evolution of Cisco’s Value Chain Resiliency ManagementCisco has moved from a position of reactive supply chain risk management (2004-2007) to proactive risk management (2008-2009) to innovative risk management (2010). (See Chart 1.) In the same way, supply chain resilience has become a core business challenge across the enterprise, not just a logistics problem. New tools, processes and technologies were developed during the last decade to preserve the resilience of the supply chain — and the effectiveness and value of these tools were demonstrated during the crisis in Japan.

Background on the 2011 Japan EarthquakeThe 9.0 magnitude earthquake that struck the Northeastern coast of Japan on March 11, 2011, was the most significant disruption that the global supply chain has experienced in modern times. This was based on the scope, scale and velocity of the evolution of the risk exposure and circumstances. What started as an extremely powerful earthquake quickly became a deadly tsunami that triggered an unprecedented nuclear facility disaster. This, in turn, further compromised key elements of Japan’s infrastructure, such as roadways, power transmission and electrical capacity for large portions of the impacted region. The crisis was a key test of the Cisco’s Supply Chain Risk Management (SCRM) team and capabilities, as well as the overall end-to-end resiliency that the team and the Supply Chain Operations organization drives.

Cisco’s Supply Chain Risk Management: Leading Practices Applied to the Japan ResponseSupply Chain Incident Management Activation: Within 30 minutes of the initial NC4 alert of the 9.0 magnitude earthquake (NC4 is a third-party notification service that sends alerts based on a mapping of all critical supply chain nodes), the supply chain incident manager (on the SCRM team) was made aware of the event, alerted both the SCRM team lead, team members and the Supply Chain Operations senior leadership team. Within 12 hours, the primary supply chain incident management team was activated. This team consists of an extended group of operations functional leaders that represent their functional organizations during an incident.

Based on an interview with John O’Connor, Senior Director, Value Chain, Cisco Systems

CASE STUDY

Supply Chains in Crisis: Dealing with Disaster — Cisco’s Response in Japan

Page 92: USRP 0316 Resources 030812 v2.pdf

92 U.S. Resilience Project

Securing the Smart Grid Workshop

Business Continuity Planning (BCP) Leverage: Utilizing SCRM’s BCP data and processes, the SCRM BCP program manager was able to identify all direct suppliers, their associated sites and components (manufacturing parts numbers) and other critical supply chain nodes in the impacted area within 12 hours of the initial earthquake. The manager was also able to profile each supplier site from various resiliency perspectives. These included the expected time-to-recover (TTR) for the site, back-up power generation capabilities, and whether the supplier’s components were single sourced or had alternate sites available.

Leveraging the BCP emergency contact information at the supplier site level, the incident management team was able to quickly establish (over the course of the first few days of the incident) contact with suppliers to assess the impact of the incident on site capacity, prognosis of their ability to continue to produce and distribute components. Utilizing Cisco’s BCP Resiliency Visualization capability, the incident management team was able to develop a snapshot of the supplier impact and status over the entire region.

Innovating Risk Management (2010+)

Δ Resiliencyembeddedinprocesses

Δ Designforresiliency

Reactive Risk Management (2004-2007)

Δ Businesscontinuityplanning

Δ Crisismanagement

Δ Somelevelofmitigation

Proactive Risk Management (2008-2009)

Δ Businesscontinuityplanningasanassessmentframework

Δ Mitigationgovernanceandmetrics

Δ Crisismonitoringandplaybooks

ORGA

NIZ

ATIO

NAL

EN

GAGE

MEN

T

EFFECTIVELY MANAGING

Chart 1. Evolution of Value Chain Risk Management at Cisco

Page 93: USRP 0316 Resources 030812 v2.pdf

93www.usresilienceproject.org

CASE STUDY: Supply Chains in Crisis

This snapshot was refreshed on a daily basis based on the evolution of the crisis circumstances (e.g. addition of the nuclear exclusion zone around the Fukushima nuclear facility, changing electrical power capacity projections, etc.) and facilitated faster, more informed executive decision making on mitigation activities and prioritization.

Supply Chain Incident Management Team War Room: Within 2 days of the initial earthquake, a formal war room was established to provide a central management point and decision making forum for all Supply Chain Operations personnel involved in the mitigation effort. The war room approach, structure and operations were based on the SCRM Incident Management playbooks.

These playbooks create a predefined reference for bringing together the Customer Value Chain Management (CVCM) organizational leaders to assess, mitigate and resolve a disruptive supply chain incident. The playbooks define a functional track structure, key contacts related to various types of incidents, templates and other collateral to assist in running and managing an incident response. Through these playbooks and the overall SCRM incident management process, CVCM was able to very quickly mobilize and get out ahead of the crisis from a mitigation and customer communication standpoint.

Bottom Line: In a very short period, the crisis management system was able to assess more than 300 Tier 1–Tier 5 suppliers — including site inspections and more than 7,000 part numbers — and complete a risk rating and mitigation plan. And, the largest supply chain disruption in modern times created virtually no revenue impact for the company.

Key Lessons Learned Δ Information and visibility is the backbone of a major incident response. When a crisis

hits, it is extremely important to have the systems and processes in place that can assist with understanding and assessing the situation. In Cisco’s case, this included quickly understanding who has been impacted (supply chain nodes), how this impact affects Cisco (components/products/customers/revenue), and what recovery path to pursue (2nd and alternative source availability, TTR). Each of these questions were addressed through the BCP capability and data. Utilizing the output of this program allowed Cisco to focus on mitigation rather than scrambling for visibility in the early stages of the incident and accelerated overall time to results.

Δ Incident preparation and process are non-negotiable for success. Given the scale of the impact and the velocity of the evolution of the threat, Cisco’s response involved every part of the Supply Chain Organization across 100+ people. Without a structured response process and an extended team that is trained in how this process is utilized, Cisco would have spent valuable time in the early stages of the incident just to form a functional response team. Anecdotal evidence from discussions across a wide variety of industries indicated that Cisco, from a response standpoint, was functioning at a level within 2 days that took

Page 94: USRP 0316 Resources 030812 v2.pdf

94 U.S. Resilience Project

Securing the Smart Grid Workshop

many companies over 2 weeks to accomplish. The SCRM Incident Management Playbooks, in conjunction with drills, training sessions and incident postmortems, creates a level of preparedness that allows Cisco to get out in front of any type of supply chain disruption quickly and effectively regardless of its nature and scale.

Δ It is important to quickly identify and manage your “unknowns” during an incident. There is really no way to have infinite information and visibility into impacts from a crisis, nor is it possible to anticipate and prepare for every potential threat situation. Information and preparedness are investments, and at a certain point a balance must be found. It is possible, however, to at least identify and recognize key gaps. Proactive knowledge of these key gaps is important such that resources can be prioritized early in a response. For Cisco, the key gap was visibility into sub-tier supply chain (suppliers that supply Tier 1 component manufacturers). Having this as a “known unknown” was critical to quickly resourcing a team to investigate key impacts and ramifications in this area and to mitigate where possible.

Δ Communication is crucial. A structured communications plan is, in many ways, just as important as the actual incident response management program. For Cisco, communications is the key interface with customers who need to have information regarding the status of their orders and an incident’s overall impact to the continuity of their order pipeline. Internal stakeholders, including sales, marketing, engineering and the business units that own the P&L need answers as well. A successful communications program will provide consistent and appropriate messaging in a timely fashion based on what is known from the incident response. Having a dedicated communications team embedded in an incident response program is a necessary element of making communications successful.

Page 95: USRP 0316 Resources 030812 v2.pdf

95www.usresilienceproject.org

CASE STUDY: Managing for Operational Excellence

The processes that guide supply chain resilience are the same ones that guide operational excellence and productivity across the DuPont Production System. They are built on business integration, superior execution and centers for operational competency, which provide best practices, technologies and tools that are standardized and leveraged across DuPont’s 13 businesses.

The goal is to create core processes that are simplified, standardized and sustainable. The supply chain operational centers of competency deploy practices and processes, technologies and models to drive continuous process improvement across regions and business platforms. In the supply chain area, the centers’ focus cover both efficiency and risk management. They create standards and processes to execute those standards — which are then deployed collaboratively with the business units.

Integrated Operations

BusinessIntegration

Δ Strongsupplychainintegrationwithinbusinessteamsandbusinessstrategies

Execution

Δ Driveeffectivenessandefficiencyinexecutioninplantsandsupplychainsacrossbusinessesandregions

OperationsCenterofCompetency

Δ Ensureorganizationalcapabilityisinplace

Δ Standardizeandleverage

Deliverables

Δ Integratedstrategiesandoperationalplans

Δ Advancingcorevalues

Δ Productivityandasseteffectivenessamongsupplychains

Δ Capabilitybuilding:peopleandorganizationaldevelopment

Δ Technologyownershipandintegrationalongsupplychains

Δ Mindsetsandbehaviorsthatfosterengagementandsuperiorexecution

Based on an interview with Donald Wirth, Vice President, Global Operations, Corporate Supply Chains, DuPont

CASE STUDY

Managing for Operational Excellence: Supply Chain Leadership at DuPont

Page 96: USRP 0316 Resources 030812 v2.pdf

96 U.S. Resilience Project

Securing the Smart Grid Workshop

Change Management: Talent as an Enterprise Asset A more than 200-year-old business, DuPont has focuses on creating mindsets and behaviors among its workers and managers that enable change. A core insight is that people are simultaneously the key barriers and key enablers of a new culture of excellence needed to cope with increased global competition and operational risks.

When confronted with change, people have a choice. They can either be receptive to alternative solutions, or they can protect the status quo. The challenge that the company is tackling is how to create an environment that encourages a learning choice rather than engenders a defensive response. Half the battle is to create a body of evidence that makes a compelling case for change. Only people who believe that change is necessary are open to learning. If they have not reached that conclusion, they are likely to defend the status quo indefinitely because it is human nature to resist change. The goal for the company is to create learning and communications opportunities that shift mindsets — from unconscious incompetence to mastery.

Principles and Processes for Risk and Crisis ManagementScenarios provide useful tools to test risk readiness and resilience. But, it is impossible to accurately predict every possible risk trigger. What matters at the end of the day is not whether you have correctly forecast the right risk scenario, but whether you have a set of processes and skilled people with the capability to respond to whatever comes along. What you should be scoring is not resilience per se, but your processes to manage for resilience.

DuPont’s crisis decision making is governed by standing teams which are charged with handling most aspects of a crisis. For foreseeable events, like a Hurricane Irene, the process is very robust. There was a five day countdown — with meetings every day as the path of the hurricane became more certain. Early deployment of satellite phones to key staff at each of the sites, staging of the mobile command trailers and recovery capabilities all happened before the storm approached.

Mindsets and Behaviors that Foster Engagement and Superior Execution

Unconscious incompetence

Donotknow,donotwanttoknow,resistchange

Conscious incompetence

Recognizethatthingsareworkingwell,opentochangeandalternativesolutions

Conscious competence

Engageinformallearningprocessestoacquirenewcompetencies

Mastery Integratenewcompetenciessothattheybecomeunconsciouscompetencies

Page 97: USRP 0316 Resources 030812 v2.pdf

97www.usresilienceproject.org

CASE STUDY: Managing for Operational Excellence

But, a similar collaborative and coordinated decision making process would occur whether the event was foreseeable or not. The crisis decision making process brings together the key stakeholders: plant managers, regional directors, operational excellence, supply chain leaders, sourcing leaders, public affairs, IT and human resources, among others. Each participant has an area or activity for which they are responsible. For example, IT staff lead information and communications continuity planning. Human resources coordinates outreach to DuPont employees to assess their situation. Supply chain manages mitigation plans in the event plants are out of commission. The plant managers focus on mitigation and response plans.

This process is used irrespective of the nature of the crisis. The team of crisis managers comes together, each with specific accountabilities and responsibilities, to discuss options — whether preemptive or responsive.

Assuring Supply Chain ResilienceMany people see resilience as belonging to the disaster recovery silo. But, supply chain resilience is always a combination of prevention, mitigation and recovery. Prevention is about setting standards to preclude damage or consequences for a specified set of circumstances. Mitigation requires understanding of the range of possibilities, and that choices must be made to lessen the impact of an event. Response becomes a mindful activity — adapting to the situation as events unfold.

From a prevention point of view, a company does as much as it can economically afford. Since it is impossible to protect against everything, the first step in risk management is a consequence analysis that helps define the potential impact. Risk managers need to understand potential consequences in order to determine whether the risks mandate a focus on prevention, mitigation or recovery. In general, when a strategy becomes overly focused on prevention, rather than consequence management, the challenge becomes infinite, and the cost unaffordable.

A first step is to decide the level of protection desired. Will the bar be set by Hurricane Camille or Hurricane Katrina? If the flood surge exceeds that level, mitigation protocols are needed to reduce the impact. Mitigation plans can be implemented pre-emptively — shut down the plant to avoid damage — or they may be executed in the disaster response stage — move pre-positioned mobile command and control trailers into the area to provide power and communications. One of the key tools for supply chain resilience is a communications infrastructure that lets managers locate their human and material assets with precision. Like everything else, it is a process.

Learning from Katrina: When Prevention Fails

WhathappenedatFukushimaearlierthisyearwassimilartowhathappenedattheDeLisleplantduringHurricaneKatrinain2005.AttheDeLisleplant,everypieceofwiringandcablethatcameintocontactwithseawaterhadtobereplaced—effectivelyalmostalloftheequipmentintheplant—atacostofonehundredmilliondollarsoverfivemonths.Thelevelofprotectionhadbeensetat1969HurricaneCamillelevelsandwereinadequatetopreventthedamagefromaKatrinalevelstorm.

Some key differences:TheDeLisleplanthadbeenshutdownduringthehurricane,whichhelpedtocontaintheenvironmentalimpact,whiletheFukushimaplantwasrunningonfulloperationswhenthedisasterhit.

AtFukushima,thebackuppowergeneratorswereco-locatedonthegroundlevelwiththeprimarypowersystemsandweredestroyedatthesametime.

Page 98: USRP 0316 Resources 030812 v2.pdf

98 U.S. Resilience Project

Securing the Smart Grid Workshop

Tools for IP Protection, Supply Chain Security and Integrity Quality Assurance/IP Protection: As part of its supply chain risk management, DuPont is careful to perform technology risk assessments. From a trusted source, a manufacturer that lives by the rule of law, DuPont would accept a confidentiality of information/invention agreement. In other parts of the world, that level of trust would not be deemed appropriate. The company may continue to manufacture there, but would be careful about what technology is shared — does DuPont own analysis of the materials provided and visually observe the loading of the containers? In other areas, there is no trust at all, and DuPont does not source from those areas.

The key piece of intellectual property that is never shared with any supplier is the impurity profile. A supplier may be asked to test materials to a certain point, but will not know exactly what standard DuPont has set.

Security in Transit: When a box is locked, sealed and tracked with RFID tags, supply chain managers raise the level of confidence that the material received is the intended shipment. Active defenses of every shipment would be prohibitively expensive. Instead, the mitigation protocol is to reduce the risk that the container could be accessed and the material contaminated without knowledge of the intrusion.

Counterfeiting: Counterfeiting is a fraud issue, rather than a supply chain security problem. In most cases, buyers are purchasing from unauthorized distributors in pursuit of steep discounts. For example, Romanian counterfeiters put a product into the marketplace that looked like a DuPont product and sold it to farmers in northern Italy, who bought it from an unauthorized dealer at deep discounts. The product not only did not work as advertised, it killed their fields. DuPont works with government law enforcement authorities to prevent counterfeiting and to manage the integrity of its authorized network of dealers and retail outlets.

Mitigation Protocols During Hurricane Irene

WhenHurricaneIrenemadelandfallinNorthCarolina,DuPonthad1940-footmobiletrailersstagedalongthecoast—assuringanabilitytorespondnomatterwhatpaththehurricanetook.

Disastermitigationprocessesandplansaregovernedbyverycleargoals.TheNo.1goalistoassurethesafetyandwelfareofemployeesandtheirfamilies.HurricaneIrenecamethroughonaSaturdaynight.BySundaynight,DuPont’s“I’mOK”systemhadaccountedforthestatusofall18,000employeesintheaffectedregion.Thecompanyalsoknewwheretheirpeoplewerestrugglingwithpoweroutages.

Afterpeople,DuPont’sprioritiesare:2)protecttheenvironment,3)restoreorderlyplantoperations,and4)restorecustomerdeliveries.Theseprinciplesprovideaguidepostforactionsineverycrisisanddisasterresponse.AtDuPont,webelievethatifyoudonothaveacohesivesetofprinciples,itisimpossibletomakeinformedchoices.Inourcase,meetingourgoalsdependsonourpeople.Withoutthem,noneoftheotherprioritiescanbeimplemented.

Itiscriticaltobeveryclearaboutprinciplesthatsetpriorities—andeveryonemanagingthedisasterneedstobeclearaboutthatframework.Oneofthegoalsofthenationalpreparednesssystemshouldbetoclearlyarticulatethoseprinciplesandprioritiesforthegovernment.

Page 99: USRP 0316 Resources 030812 v2.pdf

99www.usresilienceproject.org

CASE STUDY: Managing for Operational Excellence

Proscriptive Versus Prescriptive National Approaches: The U.S. government works differently than governments in other countries. In other parts of the world, the focus is on guidelines with an expectation that companies will find ways to achieve them most efficiently and effectively. In the United States, the focus is on prevention and regulation. How does this play out in practice? In the quality arena, for example, Europeans embrace processes to manage for quality assurance, similar to ISO 9000. In the United States, the standard is a specified failure rate and complex rules on how to achieve it.

A standard that focuses on preventing every risk is different than a standard that describes processes for responding to crises. If you are protecting against everything, you have set an impossible task. If you are managing outcomes, you can focus on specific measures that would prevent or mitigate that outcome.

Page 100: USRP 0316 Resources 030812 v2.pdf

100 U.S. Resilience Project

Securing the Smart Grid Workshop

Page 101: USRP 0316 Resources 030812 v2.pdf

101www.usresilienceproject.org

CASE STUDY: NASA Supply Chain

In a Nutshell The National Aeronautics and Space Administration (NASA) faces a significant challenge: not just assuring the security and integrity of the components in the supply chain but, given the hiatus in space operations, assuring that there is a viable industrial base at all. NASA’s focus has been on creating new tools to assess how program changes impact the financial liquidity of the supplier base and map the multi-functional relationships of the lower-tier suppliers in the supply chain. This approach helps catalyze a regional innovation cluster approach to encourage virtual collaboration, advanced manufacturing, and shared infrastructure in order to sustain the industrial base for multiple NASA missions. The big picture approach simultaneously advances manufacturing competitiveness, commonality, inter-agency interoperability, supply chain readiness, technology innovation, and security.

NASA’s Supply Chain ChallengeFrom a historical perspective, the last several decades have seen relatively few human space flight programs, with an average of 4.5 shuttle flights per year, and a handful of unmanned missions. That was barely sufficient to keep the industrial base viable. The recent cancellation of shuttle programs and the Constellation program, coupled with the economic crisis, creates the risk of a major disruption to the U.S. domestic space industrial base — not just the primes, but the lower tiers as well.

NASA’s challenges include the following:

Δ In the years between the retirement of the shuttle and the beginning of flight operations for new programs, how will the space program’s industrial base survive?

Δ What will happen when the next human space flight program needs parts, subsystems and critical spares, but many of the qualified suppliers of space hardware are long gone or have discontinued their product offering? How can NASA avoid the cost of building and certifying a supplier base?

Δ With such stress on the suppliers, how can quality be maintained? A study of the airline industry demonstrated a direct link between financial health and quality — declines in bond prices shortly began to manifest in quality problems.

Based on an interview with Michael Galluzzi, Supply Chain Manager, NASA

CASE STUDY

NASA Supply Chain: Maintaining a Vital Space Industrial Base

Page 102: USRP 0316 Resources 030812 v2.pdf

102 U.S. Resilience Project

Securing the Smart Grid Workshop

NASA supply chain challenges are not limited to the space mission. Initial findings from a 2010 Department of Commerce survey of the NASA human space flight supply chain network indicated that many other government agencies and missions are affected by a decline in the viability of NASA’s supplier base.

Definition of Supply Chain ManagementFor NASA, supply chain management is an integrated, information-driven approach to all aspects of a product’s lifecycle at various planetary and interplanetary regions. The approach — which comprises people, processes and technology — is the integration of both information and material between agency organizations that share common support approaches and data architectures. The philosophy is focused on perfect order fulfillment, virtual 3D computer-aided design (CAD) modeling and simulation, agile operations, flexible manufacturing, design-to-order production, and vendor-managed inventories at strategic locations.

Previously, NASA employed two more conventional approaches: integrated logistics support (ILS) and performance-based logistics (PBL). ILS was implemented by the U.S. Army in the early 1970s under Military Standard 1388 and served, for the most part, as the foundation for shuttle logistics. This paradigm takes an inventory-centric approach, using such metrics as mean time between failures, mean time to repair, probability of sufficiency and repair generation rate forecasts, and reliance on the prime contractor. However, there is a problem with this approach. In a dynamic engineering environment that realizes frequent design changes and low product demand, chances are good that there will be some obsolete inventory on the shelves, and no visibility beyond the Tier 1 supplier level, which increases the risk of counterfeit parts entering the supply chain.

PBL provided a more evolved process, relying on the prime contractor to support operations and sustainment on a fixed-cost basis. PBL was introduced around 1994, at roughly the same time that the commercial off-the-shelf initiative was introduced at the Department of Defense (DoD). Today, without the proper contract language in place, this approach is also dated. But more importantly, it offers limited government oversight. The problem with the PBL approach is that it assumes that the industrial base would remain constant and available. Newer supply chain management approaches offer a way to share information sources, master data files, CAD systems, materials requirements planning, and supplier relationship management applications to provide a secure information sharing environment — within the supply chain and across programs and agencies — that protects the intellectual property rights of the supplier.

New Tools/ApproachesPrimeSupplier™: The primary function of PrimeSupplier is to identify suppliers that may be negatively impacted from program changes and the resulting viability impact to a supplier or product line. The model identifies a number of risk indicators and creates a risk value for each. These indicators are then integrated into a framework that creates a meaningful and consistent risk value for each supplier. The model captures financial risk indicators (including profit margin and debt-to-equity ratios), operational risk indicators (including perfect order fulfillment, schedule achievement and defects per million opportunities), and supply chain risk indicators (including upstream/downstream information flow and supply chain readiness levels).

Page 103: USRP 0316 Resources 030812 v2.pdf

103www.usresilienceproject.org

CASE STUDY: NASA Supply Chain

The tool was developed to manage the additional risks of manufacturing source and material shortages, and identify cross-program commonality, potential supplier procurement/contract gaps, and areas for potential pooling of non-recurring program funds required for obsolescence mitigation. See Appendix 1 (page 106) for an in-depth discussion of the tool and its capabilities.

NASA’s PrimeMap–VSAAM: Initially designed for the Missile Defense Agency, PrimeMap–VSAAM (Visual Supplier Analysis and Assessment Modules) is a supplier mapping software application acquired for the purpose of identifying cross-element and cross-program utility and impacts. The application includes:

Δ A geographic and tabular view of the programs’ supplier base;

Δ A visual representation of supplier relationships based on program and element; information from a NASA database;

Δ Congressional district mapping;

Δ Supplier demographics;

Δ Supplier customer diversification; and

Δ Natural disaster visualization.

PrimeMap provides the agency with an industrial base big picture. The application is based on work that was conducted at the Massachusetts Institute of Technology and is currently being applied commercially by Advanced Core Concepts. The tool, which is hosted on a NASA internal server with a secure firewall, identifies and maps cross-element suppliers and their multi-functional capabilities to support the agency supply chain. The intent for PrimeMap is to eliminate the search lead time for secondary sources while improving the environment for collaborative interagency demand planning, interoperability, product commonality, and product line viability through strategically planned procurements. Ultimately, the visibility of critical processes and critical vendors to allow for a configurable supply chain will reduce indirect, non-recurring costs associated with product discontinuance and obsolescence.

Currently, the software provides the following benefits:

Δ The ability to compare supplier quality, performance, and risk across programs and elements;

Δ A mechanism for members of the supply chain to comply with the requirements of ISO 9001:2000 to evaluate supplier performance;

Δ A standardized approach to supplier management and rating that would contribute to the “interagency” approach by improving communication between the government, prime contractors and lower-tier suppliers;

Δ Uniform supplier performance and utility data to be provided to the Defense Contractors Management Administration;

Δ Resource allocation based on supplier performance; and

Δ The tracking and evaluation of supplier performance trends (this will include sorting by commodities).

Page 104: USRP 0316 Resources 030812 v2.pdf

104 U.S. Resilience Project

Securing the Smart Grid Workshop

See Appendix 2 (page 110) for a discussion of the anticipated capabilities for a second generation of PrimeMap–VSAAM.

Virtual Design and Manufacturing ClusterFinally, the implementation of a Space Commerce Network known as a Virtual Design and Manufacturing Cluster (VDMC) could provide an opportunity to “rescue” industrial resources in danger of being terminated. The concept is that the burden on the U.S. manufacturing base can be reduced substantially by developing standardized processes for collaborative forecast demand planning, by standardizing agencies’ hardware requirements and processes, and by allowing for better visibility of hardware demands.

A VDMC is a new manufacturing business model that uses a shared physical and virtual infrastructure (hardware, software, facilities and services) to reduce costs and uses network-centric technologies and product- and service-oriented architectures to facilitate the smart design, rapid assembly, and seamless coordination of dynamic supply chains to accelerate production, reduce costs, and mitigate risk.

A VDMC is much like traditional company-focused “supplier cities” created by Toyota and other large companies to reduce inventory costs and increase efficiencies. A VDMC does the same. However, a VDMC is different from the traditional supplier city in three fundamental ways:

1. Demand aggregation. A VDMC is not driven by the purchasing volume commitments of a single large company. Instead, the demand is aggregated from different buyers, ranging from commercial companies to government agencies. Because the demand is aggregated, buyers that may not have been able to generate enough demand on their own can support the vitality of the industrial base.

2. Infrastructure. VDMC infrastructure is not dedicated to a particular customer’s systems. Instead, VDMC infrastructure is a combination of technologies, standards, and processes that allow both buyers and suppliers to connect their existing systems to a common backbone. This allows for the sharing of information throughout the supply chain, regardless of disparate software technologies. The potential impact from this type of manufacturing coordination infrastructure is significant. In addition to reducing the cost for buyers and suppliers to connect, VDMC infrastructure opens the door for new efficiencies: linking suppliers; enabling buyers and suppliers to collaborate on manufacturability issues; and providing visibility into the manufacturing process throughout the supply chain while also providing visibility to previously unknown sources and capabilities, including gaps in production capability of critical technologies.

Page 105: USRP 0316 Resources 030812 v2.pdf

105www.usresilienceproject.org

CASE STUDY: NASA Supply Chain

3. Shared facilities. Traditional supplier cities typically require suppliers to invest in buildings, equipment, and so on. The large customer behind a supplier city will sometimes contribute land or shared utilities, but most of the cost is borne by the suppliers. A VDMC differs in that it typically has, at its core, buildings already equipped with advanced and expensive manufacturing equipment. These buildings are often made available to regional groups, such as economic development organizations, by large companies or by government agencies that no longer need the facilities. In many cases, economic development organizations have obtained government monies to update these facilities and outfit them with new equipment. These facilities, such as NASA’s Michaud Assembly Facility in Louisiana which is managed by NASA’s National Center for Advanced Manufacturing, may already have large, expensive equipment that small- to medium-size manufacturers could not afford on their own. By sharing facilities, many suppliers can capture business opportunities they might not otherwise. Whether available on a time-and-materials basis or as part of a permanent residency, suppliers can leverage this capital-intensive equipment, along with their own, to expand their offerings.

The intent is that manufacturers will have access to shared tooling, an associated workforce, manufacturing training, commercial financing, foreign trade zone benefits, a lower corporate tax base and an advanced-skill labor pool at no upfront direct cost to the small-to-medium enterprises. This approach is intended to strengthen the U.S. aerospace and defense industrial base.

From an economic competitiveness point of view, the VDMC model is a tool to revitalize America’s manufacturing competitiveness. From a security point of view, the model enables shorter supply chains, more domestic sourcing, and an information-sharing environment with stronger intellectual property protections. See Appendix 3 (page 112) for a more in-depth look at the VDMC roll-out strategy.

Page 106: USRP 0316 Resources 030812 v2.pdf

106 U.S. Resilience Project

Securing the Smart Grid Workshop

Appendix I: PrimeSupplier™This model, also known as the Galluzzi-SIB Index, determines the economic stability of a program’s industrial base as a whole using the programmatic influences on the individual supplier’s economic stability and liquidity posture.

Structure of the Enhanced Model: Overview of ConceptThe primary function of PrimeSupplier is to identify suppliers that pose a risk to a program/supply chain. To accomplish this objective, the model must utilize the data for each risk indicator, converting it into a meaningful risk value. In doing so, the model should consider the relative utility function associated with each risk indicator. Finally, these risk indicators should be integrated in a consistent fashion to generate a meaningful and consistent risk value for each supplier.

Financial Risk IndicatorsThe model includes financial risk indicators for profit margin, debt-to-equity ratio, current ratio, percent NASA revenue, and percent DoD revenue.

Profit Margin. Profit margin is defined as the ratio of net income to total revenue. This metric reflects how much profit is derived from every dollar of total revenue. Profit margins indicate how well a business has managed its operating expenses and can be an indication of whether a business is generating enough revenue to cover minimum fixed costs and still preserve an acceptable profit.

Figure 1: Risk Indicators

Page 107: USRP 0316 Resources 030812 v2.pdf

107www.usresilienceproject.org

CASE STUDY: NASA Supply Chain

Debt-to-Equity Ratio. Debt-to-equity ratio is another financial risk indicator. It measures the number of dollars in borrowed funds a company has received for each dollar of invested funds. The metric is calculated by dividing the company’s total liabilities by the total equity. In general, most U.S. companies will have a debt ratio between 0.40 and 0.60. The debt-to-equity risk indicator utility function would have a curve showing the risk component value as increasing as the debt-to-equity ratio approaches 1.0.

Comparing PrimeSupplier Financial Risk Indicators to Publicly Reported Metrics. The U.S. Census Bureau collects financial data on industry sectors and reports the results on a quarterly basis in the Quarterly Financial Report.

Operational Risk IndicatorsOperational performance risk indicators include indicators for perfect order fulfillment (POF), order fulfillment cycle time (OFCT), schedule achievement, first-pass yield (FPY), and defects per million opportunities (DPMO).

Perfect Order Fulfillment. POF is defined in the supply chain operations reference (SCOR) model as the percentage of orders meeting delivery performance with complete and accurate documentation and no delivery damage. The SCOR is a process reference model that has been developed and endorsed by the Supply Chain Council as the cross-industry standard diagnostic tool for supply chain management. SCOR enables users to address, improve and communicate supply chain management practices within and between all interested parties. The POF is calculated by dividing the total number of perfect orders by the total number of orders. A supply chain is considered perfect when original commitment made to the customer is met. As the measured historical order fulfillment decreases, the risk of future orders not being fulfilled as committed increases.

Order Fulfillment Cycle Time. According to the SCOR model, OFCT is the average actual cycle time consistently achieved to fulfill customer orders. In the PrimeSupplier model, the OFCT is evaluated by comparing the actual total OFCT to the required total OFCT.

Schedule Achievement. Another operational risk performance indicator is schedule achievement, which measures, as a percentage, how well a company adheres to its targeted production schedule. Schedule achievement is calculated by dividing the number of scheduled end items produced to schedule by the total number of end items produced.

First-Pass Yield. An additional operational metric that measures quality production performance is FPY, which measures the ability of the company to manufacture a product correctly the first time. A low FPY is an indication of poor quality, which increases the probability of defective products and creates diversions from the nominal process flow. These off-nominal activities usually result in longer lead times, increased costs and late deliveries. As one might expect, as the FPY value decreases, the risk component value increases.

Defects Per Million Opportunities. A final operational risk indicator is DPMO, which is the number of defective parts divided by the total number of opportunities, multiplied by 1,000,000.

Page 108: USRP 0316 Resources 030812 v2.pdf

108 U.S. Resilience Project

Securing the Smart Grid Workshop

Supply Chain Risk IndicatorsSupplier-Specific Supply Chain Management Assessments. Supply chain management risk indicators gauge a supplier’s ability to effectively function with other suppliers and customers within a program or supply chain. The PrimeSupplier model considers risk indicators computed from supplier-specific assessments that evaluate the supply chain management capabilities in two areas:

1. Intercompany information flow (CCC=communication, collaboration, coordination): Supply chain intercompany information flow capability as measured by utilizing a modified CCC assessment

2. Supply chain management practices (SCRL): Assessment of supply chain practices as measured with a modified SCRL qualification assessment

CCC Model Assessment. In the case of the intercompany information flow, the CCC assessment evaluates the supplier’s practices and capabilities related to upstream and downstream information flow and collaboration. There are four primary categories of information (see Figure 2) that must be shared between suppliers and customers. In addition, the assessment considers types of information that flow both from supplier to customer and also from customer to the supplier.

Figure 2: Intercompany Information Flow Model

Page 109: USRP 0316 Resources 030812 v2.pdf

109www.usresilienceproject.org

CASE STUDY: NASA Supply Chain

The assessment evaluates the practices related to the information flow for each of the categories resulting in a composite CCC score that reflects the potential for the supplier to perform at a high level in communication, collaboration and coordination.

An additional method of evaluating risk associated with supply chain practices, the SCRL model can be used to assess supply chain management practices. The SCRL model allows any supply chain to be assessed based on proven characteristics required for flexibility, agility, viability and sustainability.

Risk Measurement Calculation. Figure 3 illustrates how the model is used to calculate the total risk measurement value. Total Risk Measurement Value = Financial Risk Category + Operational Risk Category + Supply Chain Risk Category.

Figure 3: Risk Score Components

Page 110: USRP 0316 Resources 030812 v2.pdf

110 U.S. Resilience Project

Securing the Smart Grid Workshop

Appendix 2. PrimeMap–VSAAM Version 2.0: Anticipated Capabilities

PrimeMap–VSAAM v2.0 will include extended user drill down of supply chain data such as:

Δ Total employees

Δ Contract dates

Δ Cross-agency utilization/identification

Δ Capabilities

Δ Manufacturing capacities

Δ Performance data

Δ Qualification data

Δ Government Industry Data Exchange Program alerts

Supplier Performance and QualificationPrimeMap–VSAAM v2.0 will:

Δ Allow personnel across the enterprise to see the impact of breakdowns in supplier performance or qualification on individual products, product lines, and the enterprise.

Δ Provide an accessible area to conduct performance and qualification reviews, pulling information from various locations within the enterprise into a single location with consistent displays.

Δ Provide the capability to host current internal assessment tools with the ability to create and archive information that will be available enterprise-wide.

Δ Give access to supplier performance and qualification information as stand-alone information or in context with other assessments such as program, product line, and enterprise affiliation.

Δ Combined with other optional data sets, support capabilities such as supply chain flow paths and contract relationship assessment to provide insight into the potential disruption that can take place if a supplier underperforms or loses a critical qualification.

Δ Allow users to view the performance data for a supplier, a supplier sector, a product, a product line, or the entire enterprise.

Δ Enable drilldown to identify the root cause for performance issues.

Δ Generate reports for use in preparation of decision support materials.

Page 111: USRP 0316 Resources 030812 v2.pdf

111www.usresilienceproject.org

CASE STUDY: NASA Supply Chain

Supplier Capabilities Search A Supplier Capabilities Search allows users to identify suppliers based on capabilities and business classifications. To initiate a search, users will enter relevant search terms reflecting desired capabilities. The application will return a list of suppliers with those capabilities. The rank-ordered list will contain suppliers based on relevancy of search terms to the capability of the supplier. The application will also allow users to limit the list of suppliers by classification, e.g., Service Disabled Veteran-Owned Business, 8(a), Small Disadvantaged Business, etc. The application will also provide:

Δ Links to the supplier’s website

Δ Available supplier contact information (email, phone number, address)

Δ Supplier’s Small Business Administration (SBA) status (both self-identified and SBA validated)

Δ Supplier’s Veterans’ Affairs (VA) status (both self-identified and VA validated)

Page 112: USRP 0316 Resources 030812 v2.pdf

112 U.S. Resilience Project

Securing the Smart Grid Workshop

Appendix 3. VDMC Development: A Commercial Approach to Organically Develop a Regional Innovative Manufacturing Cluster

The U.S. government market consists of many departments and agencies purchasing billions of dollars worth of various types and quantities of hardware and services. During FY 2011, the following were the top five agencies by U.S. dollars obligated for system components (per Federal Procurement Data Systems):

1. Department of Defense, $366 billion;

2. Department of Energy, $25 billion;

3. Department of Health and Human Services, $18 billion;

4. Department of Veteran Affairs, $15 billion; and

5. National Aeronautics and Space Administration, $15 billion.

The Department of Commerce’s Economic Development Administration and the Washington-based non-profit Council on Competitiveness, in conjunction with private industry, is considering expanding current National Digital Engineering and Manufacturing Consortium project activity to the southeast region of the United States by coalescing a small- and medium-sized manufacturing cluster, or Virtual Design and Manufacturing Cluster (VDMC), dedicated to:

Δ Stimulating the U.S. manufacturing industry of all USG system hardware with commercial application.

Δ Providing a resilient, traceable and viable supply chain for active or obsolete product still required for USG systems.

Δ Ensuring emerging technologies and research with multiple applications, e.g., smart grid.

Δ Certifying manufacturing sources as viable sources of products or services to the U.S. government.

Δ Establishing 3D modeling and simulation capabilities and standards within the aerospace and defense industrial base.

Page 113: USRP 0316 Resources 030812 v2.pdf

113www.usresilienceproject.org

CASE STUDY: Verizon

Verizon is more than just a phone company. Operating in more than 150 countries, it is a network owner and operator, systems integrator, and global purchaser. Its supply chain runs the gamut from wireless testing equipment to mobile devices to the purchase of millions of miles of fiber-optic cable. One of Verizon’s many supply chain security priorities is to assure the security of the network and the devices connected to it, while also maintaining the integrity of the services required to maintain the network and the revenue-generating services riding on it.

The Business Case for Supply Chain Security and ResilienceSupply chain resilience is one of Verizon’s many business objectives. Cutting back on supplier assessments or failing to perform independent verification and validation would certainly cut costs; however, Verizon understands that cutting corners also cuts reliability, which is the cornerstone of its competitiveness. Verizon maintains a private and public infrastructure, and customers have choices about which communications infrastructure to use. Verizon’s network must be resilient in order to retain the company’s customer base — failure of the network is not an option.

Verizon prioritizes network resilience, rather than price alone, in managing its supply chain. For example, given a choice between paying $1,000 or $10,000 for a piece of network equipment, Verizon will not always choose the cheaper option. The $1,000 piece of equipment might use stolen intellectual property — essentially a copy of a $10,000 piece of equipment patented in the United States — or its reliability may be low.

Supply chain resilience and security are linked. On 9/11, for example, Verizon’s communications infrastructure kept operating under extreme conditions. When one of the hijacked aircraft crashed into the Pentagon, it landed on top of one of the two communications points of presence (PoPs). The switches, which were located only a few floors below the point of impact, kept operating despite the fires, leaking jet fuel, and water. This kind of resilience cannot be obtained without focused attention to the quality, integrity, and security of the components in the supply chain.

Based on interviews with Henry Shiembob, Executive Director, Cyber Security and Fraud Operations

James McConnell, Director of Security

Marcus Sachs, Vice President, National Security Policy

September 2011 and January 2012

CASE STUDY

Verizon: Building Security into the Network

Page 114: USRP 0316 Resources 030812 v2.pdf

114 U.S. Resilience Project

Securing the Smart Grid Workshop

Communications networks are designed to withstand or recover from a spectrum of disasters — a mindset that goes back to the Cold War. With a demand for high uptime, the communications network keeps working during most types of emergencies — including floods, fires, earthquakes, and hurricanes. It works because of Verizon’s workforce and the company’s ongoing focus on its supply chains. Verizon’s view of supply chain goes beyond procurement, maintenance, and disposal — it views supply chain as an important part of the reliability and performance of the network and supported services.

Supply Chain Security Good PracticesFor Verizon, cybersecurity is not just a technology problem. Many non-cyber business practices need to be implemented to assure cybersecurity, including knowing who the company is doing business with, knowing the ownership and location of contractors and subcontractors, and ensuring validation and compliance with contract terms and conditions. These supply chain processes are just as important as testing the quality and security of devices when they arrive from manufacturers.

Verizon implements numerous security processes that help manage cyber risks in the supply chain, including the following:

Vendor Controls: Security processes are embedded into supply chain processes, from the selection of appropriate vendors and locations, to the completion and delivery of products or services, to the turndown of the relationship. Prior to any contractual agreement, prospective Verizon suppliers are scrutinized on criteria such as ownership and location; links to foreign countries; and red flag violations, including export controls. Verizon uses its own intelligence and public information to review suppliers.

Internal Clearance Processes: Verizon conducts an additional internal clearance process on prospective vendors to make sure that the business relationship is in compliance with all legal and regulatory imperatives, as well as all security priorities. This process includes background checks, export control statements, requirements for off-shoring or outsourcing notification and approval, disclosure of baseline security for handling data, and other clearance requirements, including assessments of physical and cyber controls.

Risk Prioritization: Verizon prioritizes these assessments both by ranking the criticality of components and the assurance levels desired for suppliers that have access to Verizon data, products, or systems. Many of the major components are purchased from key vendors that are within a trusted category and face restrictions on where products can be developed and manufactured, as well as where services may be performed. For certain relationships, Verizon contractors are required to list their subcontractors.

Page 115: USRP 0316 Resources 030812 v2.pdf

115www.usresilienceproject.org

CASE STUDY: Verizon

Assessments of High-Priority Vendors: Verizon also performs on-site reviews of high-priority vendors to ensure that they are complying with requirements and meeting appropriate security practices. Verizon employs on-site inspections and audits for these reviews, because there is concern that questionnaires may create a false sense of security. Vendors often give the answer that they think their customers want to hear or describe what the vendor believes is in place. Experience has shown that questionnaire answers rarely match up to the findings of on-site inspections.

Anti-Counterfeiting Efforts: There is a growing problem with counterfeit goods, which introduce potential risks when they connect to the Verizon network. Federal agencies estimate that 10 percent to 11 percent of the global electronics supply chain is counterfeit — everything from iPads and iPods to routers, switches, and heavy machinery. A circuit card that would normally cost $1,000 might be discounted by a licensed re-seller to $700-800 wholesale. But, when that product is offered as brand new for $99 on an auction site, there is no way it is genuine.

There is no way to stop a customer from going online and buying a fake or modified phone. However, Verizon’s own procurement processes — strong relationships with suppliers and other technical controls — lower the risk of counterfeit products being used in its environment or entering its supply chain. To further understand the vulnerabilities in its supply chain, Verizon maintains a rigorous independent verification and validation program.

Security Controls: Verizon also employs other detective controls, including supply chain fraud analytics, supply chain link analysis, supply chain mapping, and supply chain security awareness.

Page 116: USRP 0316 Resources 030812 v2.pdf

116 U.S. Resilience Project

Securing the Smart Grid Workshop

Page 117: USRP 0316 Resources 030812 v2.pdf

117www.usresilienceproject.org

CASE STUDY: HP

Supply Chain by the NumbersHP has one of the industry’s most extensive supply chains: more than 1000 production suppliers (responsible for product materials, components, manufacturing and distribution services) in more than 1200 locations; 450 supply chain nodes, and a billion customers worldwide. HP ships more than 60 million computers, printers and servers every year — approximately 3.5 products every second.

HP views supply chain as a competitive differentiator. The company takes an end-to-end view of supply chain management from manufacturing to distribution — and everyone in the company is expected to be actively engaged in managing supply chain risk in some capacity.

Continuous Crisis Management, Continuity and Contingency PlanningGiven its global footprint, HP maintains significant risk and crisis management capabilities. In 2011 alone, the company faced drought, floods, tornados, earthquakes, hurricanes, protest demonstrations, — and that was just in the United States. On the international front, a quick survey of the headlines included crises ranging from civil unrest in the Middle East, a devastating earthquake in New Zealand, a series of disasters in Japan, a state of emergency in Bahrain, financial crisis in Greece, attacks in India and Norway, followed by typhoons in the Philippines and flooding in Thailand. According to the chief security officer: “No global company can take ‘time off’ when it comes to crisis management and business continuity planning.”1

HP takes an enterprise-wide, all hazards approach to risk management because it is impossible to anticipate every crisis — and that is particularly true for supply chain disruptions. In an era of volatility, HP sees no substitute for effective planning. When the 9.0 magnitude earthquake struck the northeast coast of Japan on March 11, 2011, HP’s team was activated within an hour. A war room was set up from which every supplier in Japan, including sub-suppliers, was contacted; alterative sources for constrained parts were identified; and daily updates and triage were managed. This kind of competency comes from preparation and communications.

Additional impetus for supply chain management came from the 2011 floods in Thailand, which created a worldwide shortage of hard drive disks and continued to affect HP’s computer and server sales in the first quarter of 2012.

1 Priorities for America’s Preparedness: Best Practices from the Private Sector. U.S. Resilience Project. http://www.usresilienceproject.org/reports.html.

Based on interviews with Robert Moore, Vice President, Global Security Services; and

Fred Smith, Director, Supply Chain Global Security Group Programs & Supply Chain

CASE STUDY

HP: Mature Business Processes for End-to-End Supply Chain Security

Page 118: USRP 0316 Resources 030812 v2.pdf

118 U.S. Resilience Project

Securing the Smart Grid Workshop

Supply Chain Risk ManagementFar from minimizing investment in supply chain risk management, HP spends roughly $60 billion annually, or nearly half of its total sales, in support of its supply chain. Every year, the company conducts an annual supply chain mapping process to identify the most critical first- and third-party exposures. It regularly exercises supply chain continuity plans and emergency response capabilities in table-top drills. It also convenes an annual Suppliers Summit, bringing together more than 500 representatives from 150 suppliers, to share vision and priorities.

HP encourages its supplier base to adopt supply chain practices as well as technology solutions — and early resistance has turned into a standard part of doing business for most suppliers. Security programs tend to differ based on product, country and regional risks; HP suppliers have adopted much more stringent security measures in higher risk areas.

HP conducts about 100 audits of its supply chain partners every year — with follow-up action to ensure that corrective measures are implemented. Sites are selected for audit based on product value, volume and risk.

Mature Business Processes Support Supply Chain Risk ManagementSupply chain security begins with a set of rigorous business processes and controls. More rigorous controls evolved in lock step with globalization. Twenty years ago, supply chain executives had more hands-on control when manufacturing and warehousing was done in-house. The globalization of manufacturing and distribution networks necessitated more organized business processes to combat corruption, quality issues and theft. There are many processes in place to create confidence in the materials being sourced, the quality of the manufacturing process, security of the products in shipment, and end-of-life disposal.

In recent years, some new issues have emerged that have increased the scrutiny of supply chain controls, including cybersecurity, hi-tech counterfeiting, and social and environmental responsibility in the supply chain.

Cybersecurity: The visibility of cybersecurity issues and the scale and scope of the response is increasing — and HP customers want to know that HP is managing the risk. There are two aspects to cybersecurity. On the supply chain side, the maturity of existing business processes and controls can go a long way toward securing the cyber supply chain. HP’s initiatives to secure the manufacturing process against firmware or malware, regular testing, and its anti-cargo theft and anti-counterfeiting programs reduce the risk of malicious insertion of compromised or counterfeit components through its supply chain.

Although supply chain security and resilience processes are mature, the standards to secure cyberspace are still in development. HP is working with other industry members in co-developing a set of secure practices as part of the Open Group Trusted Technology Forum.

Page 119: USRP 0316 Resources 030812 v2.pdf

119www.usresilienceproject.org

CASE STUDY: HP

Cargo Security: HP shipping requirements include the seven step container inspection process for all shipments to the United States. All seal variances are reported and investigated. There is a global reporting process for compromised freight.

Overall, industry experts suggest that $40 billion a year is lost to cargo theft worldwide, and high tech electronics are one of the most popular targets. HP uses various GPS satellite-type technologies to track products in transit, particularly by truck or rail. Covert GPS units — monitored by third party security companies — send out “pings” on a regular basis that allow law enforcement officials to track and recover stolen goods.

For ocean containers, HP typically uses physical security methods, such as high-security or bar-lock seals. High value shipments that are vulnerable to theft are accompanied by a variety of security protective measures, from security escorts to covert tracking of the tractor, trailer and the product itself.

Counterfeiting: Counterfeiting is a significant concern for HP in an industry in which it is estimated that as many as 10 percent of products are counterfeit. The International Anticounterfeiting Coalition estimates that brand holders lose approximately $600 billion of revenue annually due to counterfeiting.2

HP is leveraging technology solutions, particularly in the printing and imaging areas, to reduce losses from counterfeiting, and achieve a loss ratio that is well below the industry average. HP links printing innovation with QR codes that users of mobile devices can use to scan the bar codes to check whether the product is genuine.

A relatively simple approach is to have a particular set of numbers, bars or other kind of code printed in several places on the packages. A more technical approach is to duplicate the overt code in infrared or ultraviolet ink — which is invisible unless viewed under IR or UV lamps. Comparisons of the overt and covert codes determines whether the product is authentic.

With variable date printing, it is now possible to give each item, case and packet its own unique code. Variable printing makes it possible to compute a set of non-linear unique codes ahead of time, which makes it difficult for counterfeiters to identify a sequence of numbers.

For the future, a new technology will be smart packaging, in which the package itself is imprinted with electro-conducive ink. Such inks can be charged in different ways and contain unique information that can only be decoded when passed through a reader. This will help drive security at the digital front end.3

2 Richetto, David. “Advanced Security Prevents Counterfeit Products.” Electronics Design, Strategy, News. November 3, 2011. http://www.edn.com/article/519756-Advanced_security_prevents_counterfeit_products.php.

3 Firth, Simon. “Fighting Fakes.” March 2006. http://www.hpl.hp.com/news/2006/jan-mar/fake.html.

Page 120: USRP 0316 Resources 030812 v2.pdf

120 U.S. Resilience Project

Securing the Smart Grid Workshop

Supply Chain Transparency for Social and Environmental ResponsibilityHP has an aggressive program to monitor the social and environmental conditions in its supply chain. It was the first electronics company to publish a list of its suppliers, representing more than 95 percent of HP’s procurement expenditures for materials, manufacturing and assembly of HP products all over the world. The list includes contract manufacturers, electronic manufacturing service providers, and original design manufacturers, as well as commodity suppliers. HP has set key performance indicators for suppliers and evaluates their performance through self-assessments and on-the-ground audits. This level of transparency gives HP the capability to assess issues in its supply chain, such as excluding purchases of conflict minerals.

Integrating Supply Chain Risk ManagementWith complex supply chains, one group cannot manage all risks. At HP, efforts are underway to strengthen communications and cooperation to manage end-to-end supply chain risks. Currently, the supply chain security (including anti-counterfeiting), cybersecurity, and business continuity functions are all in the same organization and work closely together. These units, in turn, work closely with the logistics function and business units. Supply chain security and logistics functions meet at least weekly to review joint initiatives and operational concerns.

Page 121: USRP 0316 Resources 030812 v2.pdf

121www.usresilienceproject.org

CASE STUDY: Securing Information on the Smart Grid

Telvent is an information technology company that specializes in real-time data collection and monitoring systems and operational tools to transform data into actionable information. One of its key business areas is smart grid applications and tools. Telvent applications are in use in engineering and operations departments at more than 550 utilities in North America and around the world. From core geospatial network modeling and management, to real-time analytics and control, Telvent builds software to enable the smart grid.

Best Practices in Software DevelopmentTelvent develops software and protects it through a common set of security practices that are appropriate and consistently implemented, and people who are vetted for capability and experience, as well as a potential for malicious intent.

Across its diverse product lines — from GIS systems to the outage models — Telvent’s programmers manage approximately 3-3.5 million lines of code.

Telvent uses Agile software development, a methodology based on iterative and incremental development and collaboration between cross-functional teams. The Agile approach offers competitive advantages in terms of adaptive planning and flexible response to change, but it has some built-in security safeguards as well.

Coders work in pairs for actual programming tasks. On the surface, any attempt to build disruptive or malicious functionality (malware) into the code would require at least two people working in tandem. In fact, even the coding pairs could not succeed in delivering code with embedded malware. The methodology dictates that teams never build anything that takes longer than two and a half weeks (a “sprint”), which could be anything from a couple of hundred to a couple of thousand lines of code. Each sprint involves at least one code review, during which members of the team “walk through” each other’s code. Functionality is tested at the end of each sprint against vetted requirements by a QA specialist assigned to the team. To introduce malware into an application in an Agile system would likely require the complicity of everyone on the subteam, approximately four to eight members, including the product owner, a senior programmer with both management and coding skills.

Based on an interview with Jeff Meyers, Director for Smart Grid Sales, Telvent

February 7, 2012

CASE STUDY

Securing Information on the Smart Grid: Telvent Supply Chain Best Practices

Page 122: USRP 0316 Resources 030812 v2.pdf

122 U.S. Resilience Project

Securing the Smart Grid Workshop

Best Practices in Software TestingA second level of security is attained during the testing process. Every software development organization tests. At Telvent, however, this is not a separate activity after the product development is complete. Testing is built into the development process from requirements validation, to unit testing for each sprint, to production testing for each software release. Once during each release cycle, each project team takes a one-day break in the coding cycle to stress test. This exercise, called “SWAT” (Software With A lot of Testers), takes place at a known date prior to release and is an all-hands-on-deck exercise in which all programmers stop coding and start testing, looking not only for quality bugs but security issues: holes, places in the code with a single sign-on, hard-coded paths, legacy protocols, anything that creates or increases the threat surface. The rewards are geared toward finding and learning from mistakes, and there are prizes for those who find the most bugs and the most significant security threats.

Beyond human testing, Telvent uses machine-based automated testing scripts for highly complex scenario testing, as well as for regression testing. Automated testing is particularly valuable when used to evaluate the impact of newly released code on legacy applications. Machine-based testing can simulate multi-user conditions and highly repetitive tasks. While not specifically able to sniff for malware, automated test scripts can discover functional anomalies based on repetitive use conditions that can be base triggers for malware such as Trojan horses or other kinds of disruptive functions.

Best Practices in Software DesignSmart grid technology itself is often seen as a potential security problem because it opens utility grids to many potential penetration points, including the Internet. A smarter grid requires integration among systems that have traditionally been isolated, further extending the threat surface. But application of standardization and interoperability principles can increase the security of the smart grid. Standard architectural patterns and standard integration techniques make it possible to create great efficiencies, but also enable operators to identify anomalies more easily.

Telvent adheres to key architectural principles that enable the company to design in, rather than add on, security. By adopting a standard reference architecture, such as Microsoft’s Smart Energy Reference Architecture, vendors can ensure that the integrated environment is built upon a foundation that has been designed with cybersecurity as a key requirement. Further, sticking to industry integration standards, such as the Common Information Model, allows for predictable integration with systems and devices beyond those delivered by a single vendor. Standard integration practices reduce customized code, a key failure point and a critical opportunity for cyber threat. Finally, solid architecture allows for the straightforward embedding of intrusion and malware detection and tamper-proofing tools that are built to provide internal security.

Page 123: USRP 0316 Resources 030812 v2.pdf

123www.usresilienceproject.org

CASE STUDY: Securing Information on the Smart Grid

The most secure software products must eventually leave the development shop and be implemented in the real world of grid modernization. Implementation means that grid management software must touch and be touched by legacy systems and external devices with varying levels of security design and management tools. By adopting a standard architecture and using standard integration techniques, the threat surface from these external factors is significantly reduced.

Gaps and Ongoing ImprovementsNo software product or system is 100 percent foolproof, and even the best development methodologies have room for improvement. Among the most crucial issues and key areas of concentration for Telvent are:

Δ Harmonization of methodology and security practices. Most modern software is not built in a single physical location, and Telvent is no exception, with development teams in two North American and one European locations. Although each team uses its own consistent practices, harmonizing those across all teams would enhance overall security.

Δ Securing implementations. Grid management software must be implemented in the real grid. Implementation teams often consist of both vendor and utility staff with varying backgrounds, capabilities, and degrees of vetting. Internal utility IT teams may have existing practices or methods that must be harmonized with the vendor’s to ensure consistency and close gaps in security.

Δ Ongoing surveillance of implemented technology. Delivering a system in a secure fashion does not guarantee that it will remain so indefinitely. Telvent uses strong-naming and code signing techniques to ensure tamper protection, but it and its clients could do more to ensure that patches, upgrades, and new integrations do not compromise system security.

Δ Future deployments using cloud computing technology. Most Telvent clients report that cloud computing is not currently an attractive option for mission-critical grid management applications. However, there is still work to be done to ensure that any cloud deployments that may touch or impact grid management tools are properly vetted, and that any future applications are designed with the rigor of system-based platforms.

Page 124: USRP 0316 Resources 030812 v2.pdf

124 U.S. Resilience Project

Securing the Smart Grid Workshop

Page 125: USRP 0316 Resources 030812 v2.pdf

125www.usresilienceproject.org

FROM THE UTILITIES: Appendix A

Δ Require Vendor/Contractor to ensure they have updated their System Development Life Cycle (SDLC) to address emerging cyber security vulnerabilities. This should be done by adapting to the SANS Top 25 Most Dangerous Programming Errors or the OWASP Top 10 Project. Require vendor to certify that their code is scanned for vulnerabilities with a continuously updated scanning tool to keep abreast of new vulnerabilities.

Δ Require additional code written onsite by Vendor/Contractor to adhere to the same standards used for delivered package.

Δ Require Vendor/Contractor to notify promptly when vulnerabilities are found in their product. Publication of vulnerability by US-CERT is a good trigger for this requirement. It is best to specify in contract how quickly notifications and remediation plans will be provided.

Δ Require Vendors/Contractors to allow Company to apply security related patches and updates to servers hosting Vendor/Contractor software and ensure continued functionality.

This applies to servers within the Company’s network.

Δ Forbid any connectivity to Company networks not explicitly provided for in Vendor/Contractor contract.

Δ Forbid any connectivity without execution of Confidentiality and Non-Disclosure Agreement.

Δ Limit remote access by Vendor/Contractor to a predefined Virtual Private Network (VPN) solution. Do not allow the VPN to be configured for split tunneling. Minimize Vendor/Contractor access rights to only portions of their product they are supporting. If administrative access is required it should not extend beyond specific system hosts.

Δ When Vendor/Contractor are required to connect to Company network, require that the computers they connect with have the latest operating system security patches/updates and latest anti virus/malware signatures.

Δ Require Vendor/Contractor to use unique set of login credentials for each of its individual employees. Forbid login credential sharing.

Δ If Vendor/Contractor’s support efforts require them to connect their computer to Company’s network then they should be required to demonstrate that those computers have the latest operating system security related patches/updates and latest anti virus/malware updates. Require Vendor/Contractor to submit to any ad hoc scans deemed prudent by Company.

FROM THE UTILITIES

Appendix A: Sample Guidelines for Supplier Cyber Security

Page 126: USRP 0316 Resources 030812 v2.pdf

126 U.S. Resilience Project

Securing the Smart Grid Workshop

Δ Data interfaces to be created as part of the Vendor/Contractor provided system should be required to have encryption and authentication (strong authentication when possible.)

Δ Vendor/Contractor must obtain explicit management approval before using removable media to transfer any data files to Company network. A manual anti virus/malware scan must be performed on the removable media before insertion into a network connected computer.

Δ Files containing Company information must be transferred using encrypted file transfer techniques.

Δ Vendor/Contractor must agree to abide by all Company Information Security Policies while connected to Company networks.

Δ Vendor/Contractor must agree to maintain current anti-malicious code mechanisms for the environment they are hosting. This should include security related patches/updates for operating systems, anti virus/malware systems, and other security related patches/updates for relevant software such as Relational Data Base Management (RDBMS) systems. Require Vendor/Contractor to guarantee update promptness.

Δ If access to hosted product requires the use of a third party product like a web browser then Vendor/Contractor must ensure compatibility to that third party product when security related patches/updates are applied. Vendor/Contractor should guarantee promptness.

Δ Require Vendor/Contractor to conduct background checks of all its employees.

Δ Require Vendor/Contractor to perform periodic cyber security awareness training for its employees.

Page 127: USRP 0316 Resources 030812 v2.pdf

127www.usresilienceproject.org

FROM THE UTILITIES: Appendix B

FROM THE UTILITIES

Appendix B: Sample Smart Grid Cybersecurity and Interoperability Requirements

ID Requirement Comply (yes/no/partial)

For partial, list exceptions

Security Architecture

Physical security features of the solution shall be idenitified by the vendor.

Cyber security features of the solution shall be identified by the vendor.

Methodologies to maintain physcial security features shall be included with the solution.

Methodologies to maintain cyber security features shall be included with the solution.

Methodologies to change vendor configured or manufacturer default settings shall be included with the solution.

The solution shall support being deployed in a network with different security zones.

All security zones in the solution shall be protected with a stateful firewall.

All security zones in the solution shall be protected with separate authentication domains.

The solution shall have no restrictions on network segmentation.

The solution shall have no restrictions on stateful firewall placement.

There shall be no restrictions on placing different components of your solution in different authentication domains.

The use of trusts between authentication domains in the different security zones shall be limited and not assumed.

Page 128: USRP 0316 Resources 030812 v2.pdf

128 U.S. Resilience Project

Securing the Smart Grid Workshop

A listing of all types and locations of customer information shall be provided to the Cyber Security team for review and analysis.

All backdoors to the solution shall be identified along with corresponding security controls.

Communications in the solution shall originate from the more trusted/privileged component to the lesser trusted/privileged component.

In the event of a communication failure only the more trusted/privileged component shall reinitiate communications.

For distributed components only the centralized/master node shall initiate communications to remote nodes.

The HAN interface in the solution shall prevent HAN devices from accessing utility control functions.

All device management software shall be compatible with Microsoft Windows Server 2008 R2 Terminal Server.

Network Security

The solution shall have the capability to restrict access at the network layer, e.g. IP address and port filtering.

All firewalls that are part of the solution shall be stateful.

All firewalls that are part of the solution shall be configured with a default deny policy.

All firewalls that are part of the solution shall only allow required and approved ingress and egress data flows.

The solution shall have stateful, firewalled network boundaries between HAN and NAN zones.

The solution shall have stateful, firewalled network boundaries between NAN and WAN interfaces.

The solution shall have stateful, firewalled network boundaries between WAN and centralized AMI system components (head-end, MDMS, AMI system management, AMI network management) interfaces.

The solution shall have stateful, firewalled network boundaries between the AMI system and other networks.

The solution shall have stateful, firewalled network boundaries between the AMI applications and other applications leveraging AMI transport infrastructure.

ID Requirement Comply (yes/no/partial)

For partial, list exceptions

Page 129: USRP 0316 Resources 030812 v2.pdf

129www.usresilienceproject.org

FROM THE UTILITIES: Appendix B

All required ingress and egress data flows shall be submitted to the Cyber Security team for approval during the design phase.

All components in the solution shall support the Secure DNS protocol.

IPSec VPN tunnel creation shall be supported between any distributed components and the master/head-end component

IPSec VPN tunnels shall support one of the following encryption algorithms: 3DES, AES-128 or greater, or SSL 128 bit or greater.

All wireless links in the solution shall be protected with authentication.

All wireless links in the solution shall be protected with encryption.

The solution shall have a mechanism to scan for unauthorized wireless access points.

Device Configuration

System Hardening

The solution shall remove or disable all unused device drivers for network hardware.

The solution shall remove or disable all unused network ports and protocols.

The solution shall remove or disable all unused communication ports.

The solution shall remove or disable all unused administrative utilities.

The solution shall remove or disable all unused diagnostic functions.

The solution shall remove or disable all unused network management functions.

The solution shall remove or disable all unused system management functions.

The solution shall remove all unused data files.

The solution shall remove all unused configuration files.

The solution shall disable or remove all unneeded removable media drives/ports.

ID Requirement Comply (yes/no/partial)

For partial, list exceptions

Page 130: USRP 0316 Resources 030812 v2.pdf

130 U.S. Resilience Project

Securing the Smart Grid Workshop

Hardware components in the solution shall be capable of being configured with least privilege file access.

Hardware components in the solution shall be capable of being configured with least privilege account access.

Software components in the solution shall be capable of being configured with least privilege file access.

Software components in the solution shall be capable of being configured with least privilege account access.

Configuration Management & Reporting

The solution shall support centralized security management for stateful firewall policy configurations.

The solution shall support centralized security management for software upgrades.

The solution shall support centralized security management for firmware upgrades.

The solution shall support centralized security management for configuration settings.

The solution shall support centralized security management for security patches.

The solution shall support centralized security management for IDS/IPS signature updates.

The solution shall support centralized security management for configuration of security features.

The solution shall support centralized security management for enabling security features.

The solution shall allow a baseline configuration template to be created for all distributed components in the solution.

The baseline configuration template shall be automatically applied to provide a distributed component with an initial configuration.

The baseline configuration template shall have the capability to be modified and changes automatically applied to existing distributed components.

Access Control & Management

Management of Built-In or Default Accounts

ID Requirement Comply (yes/no/partial)

For partial, list exceptions

Page 131: USRP 0316 Resources 030812 v2.pdf

131www.usresilienceproject.org

FROM THE UTILITIES: Appendix B

Vendors shall provide documentation about built-in and/or default accounts including account names, purpose, and authorizations to the Cyber Security team.

Vendors shall provide recommendations for which accounts need to be active.

Vendors shall provide recommendations for which accounts need to be disabled.

Vendors shall provide recommendations for which accounts need to be removed.

Vendors shall provide recommendations for which accounts need to be modified.

The solution shall support renaming built-in and/or default account identifiers.

The solution shall support renaming built-in and/or default account passwords.

The solution shall support renaming built-in and/or default account authorizations.

Session Management

Concurrent login attempts by the same user identifiers shall be blocked.

The solution shall not allow the storage of user identifiers between sessions.

Storage of user passwords between sessions shall not be allowed.

Auto-fill functionality during login shall be prevented.

Anonymous logins shall be blocked.

Upon successful logon, the date and time of the last logon shall be displayed to the user.

Upon successful login, the number of unsuccessful logon attempts since the last logon shall be displayed to the user.

Password Policy & Management

The solution shall integrate with Microsoft's Active Directory.

LDAP integration shall be supported.

Kerberos authentication shall be supported.

ID Requirement Comply (yes/no/partial)

For partial, list exceptions

Page 132: USRP 0316 Resources 030812 v2.pdf

132 U.S. Resilience Project

Securing the Smart Grid Workshop

All credentials shall be encrypted while at rest.

All credentials shall be encrypted while in transit.

The RADIUS protocol shall be supported.

Te TACACS protocol shall be supported.

The solution shall integrate with RSA's SecurID.

The solution shall support creating access accounts locally.

The solution shall support creating access authorizations locally.

The use of local access accounts shall be limited and not assumed.

The solution shall have configurable technical controls to enforce password complexity.

The solution shall have configurable technical controls to prevent a user from reusing a password for at least eighteen months.

The solution shall have configurable technical controls to enforce an eight character minimum password length for user accounts

The solution shall have configurable technical controls to force end-users to change their passwords at least every ninety days

The solution shall have configurable technical controls to force privileged users to change their passwords at least every sixty days.

The solution shall have configurable technical controls to automatically lock accounts immediately following five consecutive authentication failures.

The solution shall have configurable technical controls to prevent a user's password from matching his/her user ID.

The solution shall have configurable technical controls to automatically lock a user's session that has been inactive for a configurable period of time.

The solution shall have configurable technical controls to automatically terminate a user's session that has been inactive for a configurable period of time.

Distributed components shall support local password changes.

Distributed components shall support remote password changes.

Distributed components shall support global password changes.

ID Requirement Comply (yes/no/partial)

For partial, list exceptions

Page 133: USRP 0316 Resources 030812 v2.pdf

133www.usresilienceproject.org

FROM THE UTILITIES: Appendix B

The potential breach resulting from passwords being reused across multiple components in the solution shall be minimized.

Passwords shall not be embedded in tools.

Passwords shall not be embedded in source code.

Passwords shall not be embedded in scripts.

Passwords shall not be embedded in shortcuts.

Passwords shall not be displayed when entered by a user.

Error messages for invalid account identifiers shall be the same as those for invalid passwords.

Host/Device Authentication

Devices shall authenticate before accessing the network.

RADIUS device authentication shall be supported.

Account identifiers used for device authentication shall be configurable.

Account passwords used for device authentication shall be configurable.

Devices shall authenticate using PKI certificates.

Role-Based Access Control

User interfaces in the solution shall require authentication.

User interfaces in the solution shall have authorization controls.

Application interfaces in the solution shall require authentication.

Application interfaces in the solution shall have authorization.

Users shall authenticate before accessing configuration files.

Users shall authenticate before accessing configuration settings.

Users shall authenticate before performing firmware upgrades.

Users shall authenticate before performing software upgrades.

User accounts shall be configured with only the required authorizations for a specfic job role.

Application to application (process) accounts shall be configured with only the required authorizations for a specific application role.

ID Requirement Comply (yes/no/partial)

For partial, list exceptions

Page 134: USRP 0316 Resources 030812 v2.pdf

134 U.S. Resilience Project

Securing the Smart Grid Workshop

Users role associations shall have the capability to be changed.

Administrators shall have the capability to create emergency/temporary accounts.

The use of emergency/temporary accounts shall be limited and not assumed.

Emergency/temporary accounts shall have the same or greater security controls than traditional user accounts.

Emergency/temporary accounts shall be automatically disabled or deleted after a configurable amount of time.

Emergency/temporary accounts shall be centrally monitored.

The solution shall support PKI-based authentication.

PKI certificates shall be validates by constructing a certification path to an accepted trust anchor.

The solution shall enforce authorized access to the certificate's private key.

The solution shall enforce authorized use of the certificate's private key.

The solution shall map the authenticated certificate identity to the user account.

The solution shall restrict the life-span of passwords for field tools.

The solution shall restrict the life-span of certificates.

Dual authorization shall be required to execute privileged functions that have effects on facility, human, and environmental safety.

Single Sign On (SSO)

The solution shall support single-sign-on for user accounts.

Access control provided by single-sign-on (SSO) shall be the same or greater than that of a direct logon.

Single-Sign-On shall be supported across all components in the solution.

SSO implementations shall have strict access control in place for key files like authorization and password files.

SSO implementations shall encrypt authorization and password files.

ID Requirement Comply (yes/no/partial)

For partial, list exceptions

Page 135: USRP 0316 Resources 030812 v2.pdf

135www.usresilienceproject.org

FROM THE UTILITIES: Appendix B

The solution shall integrate with CA SiteMinder.

Application/Hardware Security

Customizable login banners shall be available for all user interfaces in the solution.

Customizable login banners shall allow at least 256 characters.

Sensitive information such as make and model of product and/or software or firmware versions shall not be displayed before successful authentication is completed.

The solution shall have the capability to automatically push login banner changes to distributed components.

The solution shall isolate telemetry/data acquisition services from management services.

The solution shall isolate telemetry/data acquisition services from information storage services (e.g. a database).

The solution shall isolate security functions from non-security functions.

The solution shall implement security functions as independent modules.

The solution shall limit interactions between the different security functions (modules).

The soluiton shall implement security functions in a layered manner.

Lower layer security functions shall not be dependent on higher layer security functions.

Information system remnants, including encrypted information, shall be cleared from registers after a resource has been returned to the information system.

Information system remnants, including encrypted information, shall be cleared from main memory after a resource has been returned to the information system.

Information system remnants, including encrypted information, shall be cleared from secondary storage after a resource has been returned to the information system.

Security related components shall be designed to fail to a safe mode, thus preventing a security component failure from causing a denial of service event in the solution.

ID Requirement Comply (yes/no/partial)

For partial, list exceptions

Page 136: USRP 0316 Resources 030812 v2.pdf

136 U.S. Resilience Project

Securing the Smart Grid Workshop

Operationally significant security components (e.g. firewalls, PKI, access control, etc.) shall be highly available/redundant.

Processes executed shall be prioritized.

Higher priority processes shall be executed before lower priority processes.

The solution shall have protocol level message authentication mechanisms for serial protocols.

The solution shall have protocol level message authentication mechanisms for routable protocols.

Integrity/authenticity checking shall be performed before firmware and/or software is loaded.

Inputs shall be filtered and allow only those matching a predefined valid set to be processed.

Inputs that don't match the predefined set shall be rejected and logged.

Detail shall be limited in returned error messages.

Security mechanisms shall be designed using a default-deny strategy, i.e. access is denied until allowed, not allowed until denied.

The solution shall include data integrity checking.

The solution shall include message integrity checking.

Inputs and outputs shall be validated.

The solution shall have handle errors securely.

The following vulnerability shall be mitigated in the solution: Injection flaws, such as SQL, OS, and LDAP injection, occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing unauthorized data.

The following vulnerability shall be mitigated in the solution: Cross-Site Scripting (XSS) flaws occur whenever an application takes untrusted data and sends it to a web browser without proper validation and escaping. XSS allows attackers to execute scripts in the victim’s browser which can hijack user sessions, deface web sites, or redirect the user to malicious sites.

ID Requirement Comply (yes/no/partial)

For partial, list exceptions

Page 137: USRP 0316 Resources 030812 v2.pdf

137www.usresilienceproject.org

FROM THE UTILITIES: Appendix B

The following vulnerability shall be mitigated in the solution: Broken Authentication and Session Management – Application functions related to authentication and session management are often not implemented correctly, allowing attackers to compromise passwords, keys, session tokens, or exploit other implementation flaws to assume other users’ identities.

The following vulnerability shall be mitigated in the solution: Insecure Direct Object References – A direct object reference occurs when a developer exposes a reference to an internal implementation object, such as a file, directory, or database key. Without an access control check or other protection, attackers can manipulate these references to access unauthorized data.

The following vulnerability shall be mitigated in the solution: Cross-Site Request Forgery (CSRF) – A CSRF attack forces a logged-on victim’s browser to send a forged HTTP request, including the victim’s session cookie and any other automatically included authentication information, to a vulnerable web application. This allows the attacker to force the victim’s browser to generate requests the vulnerable application thinks are legitimate requests from the victim.

The following vulnerability shall be mitigated in the solution: Security Misconfiguration – Good security requires having a secure configuration defined and deployed for the application, frameworks, application server, web server, database server, and platform. All these settings should be defined, implemented, and maintained as many are not shipped with secure defaults. This includes keeping all software up to date, including all code libraries used by the application.

The following vulnerability shall be mitigated in the solution: Insecure Cryptographic Storage – Many web applications do not properly protect sensitive data, such as credit cards, SSNs, and authentication credentials, with appropriate encryption or hashing. Attackers may steal or modify such weakly protected data to conduct identity theft, credit card fraud, or other crimes.

The following vulnerability shall be mitigated in the solution: Failure to Restrict URL Access – Many web applications check URL access rights before rendering protected links and buttons. However, applications need to perform similar access control checks each time these pages are accessed, or attackers will be able to forge URLs to access these hidden pages anyway.

ID Requirement Comply (yes/no/partial)

For partial, list exceptions

Page 138: USRP 0316 Resources 030812 v2.pdf

138 U.S. Resilience Project

Securing the Smart Grid Workshop

The following vulnerability shall be mitigated in the solution: Insufficient Transport Layer Protection – Applications frequently fail to authenticate, encrypt, and protect the confidentiality and integrity of sensitive network traffic. When they do, they sometimes support weak algorithms, use expired or invalid certificates, or do not use them correctly.

The following vulnerability shall be mitigated in the solution: Web applications frequently redirect and forward users to other pages and websites, and use untrusted data to determine the destination pages. Without proper validation, attackers can redirect victims to phishing or malware sites, or use forwards to access unauthorized pages.

Field tools shall be authenticated by field components before accepting configuration data.

Field tools shall be authenticated by field components before displaying configuration data.

The solution shall prevent uploading of executable files from the HAN interface to the AMI meter.

Field components shall not provide developer level diagnostic/debug information to a field user.

Components with remote connect and/or disconnect capabilities shall introduce a random delay of between 0 and 360 minutes or greater before responding to a remote connect and/or disconnect command.

Meters shall respond immediately to a cancel remote connect/disconnect command by cancelling any connect/disconnect command that has been received but not yet executed.

Selection and imposition of remote connect and/or disconnect delays are implemented by a device whose operation, excepting disconnect/connect requests and request cancellations, cannot be modified via a network interface.

The software associated with scheduling remote connects/disconnects shall recognize when a dangerously large number of remote connects/disconnects have been scheduled to occur simultaneously.

The software associated with scheduling remote connects/disconnects shall provide notification when a dangerously large number of remote connects/disconnects have been scheduled to occur simultaneously.

ID Requirement Comply (yes/no/partial)

For partial, list exceptions

Page 139: USRP 0316 Resources 030812 v2.pdf

139www.usresilienceproject.org

FROM THE UTILITIES: Appendix B

The software associated with scheduling remote connects/disconnects shall suspend issuing any connect/disconnect commands when a dangerously large number of remote connects/disconnects have been scheduled to occur simultaneously until the situation is understood and resolved by properly authorized utility personnel.

Remote connect/disconnect devices and/or their associated infrastructure shall log sufficient information about remote connect/disconnect commands received by the device to enable subsequent troubleshooting, tracking, and other forensic analysis in the event of a suspected attack or other anomaly.

Web Services

Application interfaces shall be protected with TLS v1.2 or greater or SSL v3 or greater.

x.509 certificates shall be used for application interface encryption.

Applications shall validate identies using a Security Token Service (STS).

The WS-Trust protocol shall be supported for use of Secure Token Services (STS).

Web applications shall require authentication and authorization on a reverse proxy before users may reach the application or its corresponding infrastructure.

The solution shall support integration with CA SiteMinder for user authentication.

The solution shall support integration with CA SiteMinder for user authorization.

The solution shall support integration with CA SiteMinder for reverse proxying.

Cryptography

The solution shall not allow encryption keys to be installed on multiple components.

Enabling cryptographic protections shall not degrade performance or functionality

A cryptographic protection mechanism failure shall not impact normal operations of the solution.

ID Requirement Comply (yes/no/partial)

For partial, list exceptions

Page 140: USRP 0316 Resources 030812 v2.pdf

140 U.S. Resilience Project

Securing the Smart Grid Workshop

All cryptographic modules shall meet Federal Information Processing Standard (FIPS) 140-2 requirements where technically feasible.

All management interfaces shall be encrypted.

All communication interfaces shall be encrypted.

Encryption keys shall not be embedded in source code.

Encryption keys shall not be shared across multiple customer deployments.

Standard IPSec VPN concentrators shall be supported for IPSec connections.

Key Management

The solution shall provide key establishment/generation in a secure way.

The solution shall provide key destruction in a secure way.

The solution shall require periodic key changes.

The solution shall support quantities of certificates in the magnitude of millions.

The solution shall provide reporting capabilities for the key management system.

The solution shall provide a revocation function.

The key management solution shall restrict communications to specific devices.

Latency induced by using certificates shall not degrade the operational performance of the solution.

Malware Detection & Protection

The information required to configure a host-based intrusion detection system (HIDS) shall be delivered with the solution.

The solution shall be fully compatible with Symantec Endpoint Protection v11 software.

Symantec Endpoint Protection v11 software shall be installed on all components in the solution.

Latency induced by performing periodic full scans shall not degrade the operational performance of the solution.

ID Requirement Comply (yes/no/partial)

For partial, list exceptions

Page 141: USRP 0316 Resources 030812 v2.pdf

141www.usresilienceproject.org

FROM THE UTILITIES: Appendix B

Latency induced by performing periodic real-time scans shall not degrade the operational performance of the solution.

The solution shall be fully compatible with standard antivirus software.

The solution shall support real-time virus scanning on all components.

The solution shall support periodic full system virus scans on all components.

Flaw Remediation

Security Updates/Patching and Notification

Vendors shall notify PGN upon discovering a flaw or vulnerability and include detailed documentation describing the flaw, security impact, root cause, and corrective action.

Vendors shall notify PGN via email when security patches or updates are available.

Vendors shall notify PGN via email when security patches or updates are available for any operating system, application, or other third party component leveraged by their products.

Vendors shall provide software updates or workarounds to mitigate all identified vulnerabilities within ten business days.

Vendors shall have formal flaw/vulnerability remediation processes that are shared with PGN during the RFP scoring phase.

Vendors shall provide a history of identified flaws/vulnerabilites in their products/solutions along with the remediation steps taken during the RFP scoring phase.

Software updates, patches, firmware updates, etc. shall not require a physical site visit to load and install.

Production components shall not require internet access to obtain updates.

Vendors shall deliver mitigations for zero-day vulnerabilities within 10 business days.

Vendors shall certify compliance with critical operating system patches within two business days.

Vendors shall certify compliance with non-critical operating system patches within ten business days.

ID Requirement Comply (yes/no/partial)

For partial, list exceptions

Page 142: USRP 0316 Resources 030812 v2.pdf

142 U.S. Resilience Project

Securing the Smart Grid Workshop

The solution shall have an automated method to remotely install patches, security updates, and firmware on all end-devices.

Successful authentication shall be required before firmware can be loaded and installed.

Vendors shall provide the number of security updates/patches released for all their products over the past 12 months during the RFP phase.

Problem Reporting

The vendor shall have a formal process for users to submit problem report and remediation requests.

Vendors shall review problem reports and remediation requests and provide a corrective action plan within 24 hours of PGN's submittal.

Vendors shall protect problem reports PGN submits to the same degree as their company's confidential information.

Vulnerability Management

Vendors shall conduct vulnerability assessments on their products/solutions at least annually.

Vendors shall mitigate all vulnerabilities in their solutions.

Vendors shall use a creditable entity to perform vulnerability assessments.

All application and hardware code shall be reviewed and assessed for vulnerabilities by a creditable entity within the past year.

All application and hardware code vulnerabilities shall be mitigated.

All web servers/services and the applications that leverage them shall be scanned for vulnerabilities at least annually by a creditable entity using standard tools.

All identified web server/services and web applications vulnerabilities shall be mitigated.

All web server/services versions installed shall be supported, current, and fully patched.

The solution shall minimize the system impact of a potential denial of service attack.

Capacity shall be managed to limit information flooding DoS attacks.

ID Requirement Comply (yes/no/partial)

For partial, list exceptions

Page 143: USRP 0316 Resources 030812 v2.pdf

143www.usresilienceproject.org

FROM THE UTILITIES: Appendix B

Bandwidth shall be managed to limit information flooding DoS attacks.

All redundancies shall be managed to limit information flooding DoS attacks.

The solution shall mitigate the impact of a potential radio jamming attack.

The solution shall mitigate the impact of potential energy theft.

Physical security controls shall be in place to mitigate tampering.

The risk associated with potential lost or stolen components shall be mitigated.

The solution shall minimize the system impact an unauthorized user gaining access to the Neighborhood-Area-Network (NAN).

The solution shall detect and alert on unsuccessful login attempts.

The solution shall detect unauthorized components that are introduced into the solution.

The solution shall quarantine unauthorized components that have been introduced into the solution.

Vendors shall provide a website where security patches and updates can be downloaded on demand.

Vendors shall include integrity and authenticity checking when updates are downloaded.

Monitoring, Auditing, Logging, & Reporting

The solution shall support mirroring security logs from all hardware and software components to a central logging server.

The syslog standard shall be supported on all components in the solution.

The solution shall support periodic synchronization of system clocks with a centralized clock using NTP for all components.

System clocks shall be periodically synchronized to minimize drift.

The solution shall aggregate audit logs and security events, and provide reports and alerts.

The solution shall alert and report on excessive authentication failures for a specific account.

ID Requirement Comply (yes/no/partial)

For partial, list exceptions

Page 144: USRP 0316 Resources 030812 v2.pdf

144 U.S. Resilience Project

Securing the Smart Grid Workshop

The solution shall alert and report on abnormal behavior on a specific account.

The solution shall alert and report on adding, deleting, or modifying user accounts.

The solution shall alert and report on modifying the configuration of the solution.

The solution shall alert and report on altering data stored in the solution.

The solution shall alert and report on modifying the solution's security settings.

The solution shall alert and report when logging facilities are not operational.

The solution shall alert and report when log storage limit has been reached?

The solution shall generate log entries for all user activity.

The solution shall generate log entries for all component activity.

The solution shall provide a reporting function for user level activities.

The solution shall provide a reporting function for component level activities.

The solution shall provide a reporting function for solution level activities.

All log entries generated by the solution shall include the date and time of the event/action.

All log entries generated by the solution shall include the component where the event occurred.

All log entries generated by the solution shall include the type of the event or action.

All log entries generated by the solution shall include the user/subject identity.

All log entries generated by the solution shall include the outcome of events.

All log files shall be encrypted.

ID Requirement Comply (yes/no/partial)

For partial, list exceptions

Page 145: USRP 0316 Resources 030812 v2.pdf

145www.usresilienceproject.org

FROM THE UTILITIES: Appendix B

The latency induced by enabling all logging, alerting, and reporting functions shall not degrade the operational performance of the solution.

A heartbeat signal that can be remotely monitored shall be generated to ensure the solution is working and available.

The retention period for all log repositories shall meet business and regulatory requirements and be no less than one year.

The solution shall integrate with standard security incident and event management tools.

The solution shall integrate with ArcSight.

The solution shall include custom adapters for ArcSight.

The solution shall integrate with Microsoft System Center and Operations Manager (SCOM).

The solution shall include custom adapters for Microsoft System Center and Operations Manager (SCOM).

The solution shall include an automatic and periodic auditing/verification mechanism to check configuration parameters.

The solution shall include an automatic and periodic auditing/verification mechanism to check security settings.

The solution shall include an automatic and periodic auditing/verification mechanism to check firmware versions.

The solution shall include an automatic and periodic auditing/verification mechanism to check program settings.

The solution shall generate reports and alerts resulting from discrepencies resulting from automatic and periodic auditing/verification mechanisms.

The solution shall automatically correct discrepencies identified during automatic and periodic auditing/verification mechanisms.

The solution shall have a security self-test function capabilitity that will run periodically and test all security functions in the soluiton.

Alerts, reports, and log entries shall be generated or created for failures identified during the security self-test.

ID Requirement Comply (yes/no/partial)

For partial, list exceptions

Page 146: USRP 0316 Resources 030812 v2.pdf

146 U.S. Resilience Project

Securing the Smart Grid Workshop

The sollution shall take steps to inhibit the control, communications, and relaying/repeating functions on any device with a failure identifed during the security self-test until the failure is corrected.

Periodic integrity checks shall be performed on installed software and firmware.

The solution shall alert on anomalies resulting from periodic integrity checks that are performed on installed software and firmware.

The solution shall support SNMP v3 on all devices.

Field Tools

Field service tools shall not require a connection through the HAN to interface to the AMI meter.

Field tools shall not collect nor store sensitive information like customer personally identifiable information, customer premise identifiers, customer certificates, or system information.

Field tools shall support full-volume encryption.

Field tools shall support multi-factor authentication.

Field tools shall support RSA SecurID.

Field tools shall support automatic application of all security updates for the operating system and installed applications.

Field tools shall support host-based firewalls.

Field tools shall support host-based IDS.

Field tools shall support anti-virus, anti-malware, and anti-spam software.

Field tools shall support automatic scanning of removable media when attached.

Field tools shall support Symantec EndPoint Protection software v11.

Field tools shall not save nor store customer information, passwords, encryption keys, or any other information that may compromise the solution.

Supply Chain

ID Requirement Comply (yes/no/partial)

For partial, list exceptions

Page 147: USRP 0316 Resources 030812 v2.pdf

147www.usresilienceproject.org

FROM THE UTILITIES: Appendix B

Vendors shall have a certified quality assurance process for all manufactured products.

Vendors shall assure 100% of their manufactured products through a certified quality assurance process.

Quality assurance testing shall be performed by a creditable entity.

Vendor supply chain processes shall be assessed for vulnerabilities by a creditable entity at least annually.

All identified vendor supply chain vulnerabilities shall be mitigated.

Vendor quality assurance processes shall be audited by a creditable entity at least annually.

All gaps resulting from periodic quality assurance process audits shall be remediated.

Vendors shall audit their supppliers against their own quality assurance and requirements at least annually.

All gaps resulting from audity of vendor's suppliers shall be remediated.

Vendors shall mitigate international supply chain risks for any hardware, software, or components manufactured, programmed, or developed outside of the United States.

Vendor shall implement security controls to prevent unauthorized code from being loaded on products during manufacturing.

Asset Management

The solution shall provide a mechanism to track maintenance on all components.

The solution shall collect and store the date and time of all maintenance.

The solution shall collect and store the name of the individual performing maintenance.

The solution shall collect and store a description of all maintenance.

The solution shall collect and store a description and identification number for any removed and/or replaced equipment.

The solution shall support integration with a configuration management database (CMDB).

ID Requirement Comply (yes/no/partial)

For partial, list exceptions

Page 148: USRP 0316 Resources 030812 v2.pdf

148 U.S. Resilience Project

Securing the Smart Grid Workshop

The solution shall provide a mechanism to report on maintenance trends.

The solution shall provide a mechanism to report on deployed hardware and software version levels.

The solution shall provide a mechanism to report on actions taken by specific maintenance personnel.

The solution shall include methods that are compliant with PGN's CSP to remove all critical/sensitive information (customer, company, and system information) before equipment and/or media is disposed.

Business Continuity/Disaster Recovery

The solution shall include automated backup and restore mechanisms for all critical software, applications, and data for all components.

Backups shall be physically separated from operational components.

The timeframe for performing a restore for each operational component shall be limited.

Backups shall be encrypted.

The solution shall integrate with an standard enterprise backup solutions.

Integration with Tivoli Storage Manager (TSM) shall be supported.

Service Provider(s) - Complete if your solution includes a hosted option.

Hosting/service providers shall comply with all requirements in PGN's Cyber Security Policy.

Hosting/service providers shall have a formal cyber security policy that meets ISO 17799/27002.

Hosting/service providers shall have an effective security awareness program.

Hosting/service providers shall complete PGN's SaaS/Application Service Provider questionnaire and remediate all findings.

Hosting/service providers shall have undergone a SAS 70 Type II audit or equivalent within the past year.

ID Requirement Comply (yes/no/partial)

For partial, list exceptions

Page 149: USRP 0316 Resources 030812 v2.pdf

149www.usresilienceproject.org

FROM THE UTILITIES: Appendix B

Hosting/service providers shall provide documentation of findings, dispositions, and mitigations which result from a SAS 70 Type II audit or equivalent.

Hosting/service providers shall conduct penetration tests on their service at least annually.

Hosting/service providers shall mitigate all penetration test findings.

Hosting/service providers shall use a creditable entity to perform penetration tests.

Hosting/service providers shall provide all material weaknesses or deficiencies identified during audits on the hosting facilities, accessing customer information, or data pathways supporting the project.

Hosting/service providers shall segregate and protect PGN data and access from other customer's data and access at the hosting facility.

Hosting/service providers shall support building a site-to-site VPN with PGN that is encrypted with 3DES or AES algorithms.

Hosting/service providers shall require authentication to access wireless networks at their facilities.

Hosting/service providers shall encrypt communications over the wireless network.

Hosting/service providers shall take steps to ensure non-approved wireless devices are not connected to their network.

Hosting/service providers shall require multi-factor authentication for remote access to their network.

Hosting/service providers shall encrypt all remote access connections to their network using 3DES, AES, or SSL 128 or greater algorithms.

Hosting/service providers' cyber security management practices shall meet the requirements in PGN's Cyber Security Policy.

Hosting/service providers shall support signle sign on for PGN users using standard and secure methods.

Hosting/service providers shall support standard directory federation technologies.

ID Requirement Comply (yes/no/partial)

For partial, list exceptions

Page 150: USRP 0316 Resources 030812 v2.pdf

150 U.S. Resilience Project

Securing the Smart Grid Workshop

Hosting/service providers shall conduct criminal background checks on all employees that go back seven years or to the date of the eighteenth birthday, whichever is less.

Risks of using international hosting/service providers shall be mitigated.

Hosting/service providers shall mitigate risks of system outages, power outages, disasters, and failures.

Hosting/service providers shall use carriers who specialize in transporting confidential data when physically shipping data.media.

Hosting/service providers shall have a formal chain-of-custody process for the physical movement of data/media.

Hosting/service providers shall place all physical media in locked containers before it leaves the data center.

Hosting/service providers shall track data containers individually through the shipping process.

Hosting/service providers shall ensure all data containers are signed for upon delivery.

Hosting/service providers shall have a formal process to idenitfy data container delivery recepients.

Hosting/service providers shall reconcile shipping/tracking information against records from the backup/archive application at least monthly.

Hosting/service providers shall have a formal process to investigate and notify PGN about lost or missing data.

Hosting/service providers shall encrypt all physical media before shipping it.

Hosting/service providers shall have a formal process for sanitizing and securely wiping physical media.

Interoperability & Cyber Security Standards Compliance

The solution shall comply with ISO 17799/27002 - Code of practice for information security management.

The solution shall comply with NERC CIP 002-009.

ID Requirement Comply (yes/no/partial)

For partial, list exceptions

Page 151: USRP 0316 Resources 030812 v2.pdf

151www.usresilienceproject.org

FROM THE UTILITIES: Appendix B

The solution shall comply with NIST Special Publication (SP) 800-53, NIST SP 800-82 Cyber security standards and guidelines for federal information systems, including those for the bulk power system.

The solution shall comply with NIST IR 7628 - Smart Grid Cyber Security Strategy & Requirements.

The solution shall comply with AMI-SEC System Security – Requirements Advanced metering infrastructure (AMI) and Smart Grid end-to-end security.

The solution shall comply with SG-AMI 1-2009 - NEMA Meter Upgradability Standard

The solution shall comply with NIST 800-95 - Guide to Secure Web Services

The solution shall comply with ANSI/ISA-99.02.01-2009 Security for Industrial Automation and Control Systems Standard

The solution shall comply with IEEE-1686 – IEEE Standard for Substation Intelligent Electronic Devices (IEDs) Cyber Security Capabilities

The solution shall comply with IEC 62351 Parts 1-8 - Defines information security for power system control operations

The solution shall comply with ISA SP99 - Explains the process for establishing an industrial automation and control systems security program through risk analysis, establishing awareness and countermeasures, and monitoring and improving an organization’s cyber security management system.

The solution shall comply with NIST FIPS 140-2 - U.S. government computer security standard used to accredit cryptographic modules

The solution shall comply with OASIS WS-Security and OASIS suite of security standards - Toolkit for building secure, distributed applications and applying a wide range of security technologies

The solution shall comply with IEC TC 57 Common Information Model (CIM)

The solution shall comply with ANSI C12.19 DNP3

The solution shall comply with IEC 61850 - International standard for communication in substations

ID Requirement Comply (yes/no/partial)

For partial, list exceptions

Page 152: USRP 0316 Resources 030812 v2.pdf

152 U.S. Resilience Project

Securing the Smart Grid Workshop

The solution shall comply with IEC 61968 - Standards for information exchanges between electrical distribution systems

The solution shall comply with IEEE-1613 – Standard Environmental and Testing Requirements for Communications Devices in Electric Power Substations.

The solution shall comply with IEEE 1547 – Physical and electrical interconnections between utility and distributed generation (DG)

The solution shall comply with FCC Part 68 - Governs the direct connection of Terminal Equipment (TE) to the Public Switched Telephone Network (PSTN), and to wireline carrier-owned facilities used to provide private line services

The solution shall comply with IEC 61000-4 - Electromagnetic Compatibility (EMC) Testing and Measurement Techniques for use in residential, commercial and industrial environments

The solution shall comply with IEC 600068 - Environmental testing standards

The solution shall comply with RFC 1878 - Variable length subnet table for IPv4

The solution shall comply with RFC 2131 - Dynamic Host Configuration Protocol

The solution shall comply with RFC 1723 - RIP Version 2

The solution shall comply with IETF RFC 2474 - Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers

The solution shall comply with IETF RFC 2475 - An Architecture for Differentiated Service

The solution shall comply with IETF RFC 2597 - Assured Forwarding PHB Group

The solution shall comply with IETF RFC 3140 - Per Hop Behavior Identification Codes

The solution shall comply with IETF RFC 3246 - An Expedited Forwarding PHB (Per-Hop Behavior)

The solution shall comply with ANSI/ASHRAE 135-2008/ISO 16484-5 BACnet - A Data Communication Protocol for Building Automation and Control Networks

The solution shall comply with ANSI C12.1 - Performance and safety type tests for revenue meters

ID Requirement Comply (yes/no/partial)

For partial, list exceptions

Page 153: USRP 0316 Resources 030812 v2.pdf

153www.usresilienceproject.org

FROM THE UTILITIES: Appendix B

The solution shall comply with ANSI C12.18/IEEE P1701/MC1218 - Protocol and optical interface for measurement devices

The solution shall comply with ANSI C12.19/MC1219 - Revenue metering End Device Tables

The solution shall comply with ANSI C12.20 - Revenue metering accuracy specification and type tests

The solution shall comply with ANSI C12.21/IEEE P1702/MC1221 - Transport of measurement device data over telephone networks

The solution shall comply with ANSI/CEA 709 and CEA 852.1 LON Protocol Suite - local area networking protocol for various applications including electric meters, street lighting, home automation and building automation

The solution shall comply with IEC 60870-6 / TASE.2 - Defines messages sent between control centers of different utilities

The solution shall comply with IEEE C37.118 - Defines phasor measurement unit (PMU) performance specifications and communications

The solution shall comply with IEEE 1588 - Standard for time management and clock synchronization across the Smart Grid for equipment needing consistent time management

The solution shall comply with IETF RFC 2460 - IPv6

The solution shall comply with IETF RFC 791 - IPv4

The solution shall comply with Core Protocol in the Internet Suite, draft-baker-ietf-core-04

The solution shall comply with Multispeak - A specification for application software integration within the utility operations domain

The solution shall comply with OpenADR - The specification defines messages exchanged between utilities and commercial/industrial customers for price-responsive and direct load control

The solution shall comply with OPC-UA Industrial - A platform-independent specification for a secure, reliable, high-speed data exchange based on a publish/subscribe mechanism

The solution shall comply with Open Geospatial Consortium Geography Markup Language (GML) - A standard for exchange of location-based information addressing geographic data requirements for many Smart Grid applications

ID Requirement Comply (yes/no/partial)

For partial, list exceptions

Page 154: USRP 0316 Resources 030812 v2.pdf

154 U.S. Resilience Project

Securing the Smart Grid Workshop

The solution shall comply with ZigBee/HomePlug Smart Energy Profile 2.0 - Home Area Network (HAN) Device Communications and Information Model

The solution shall comply with OpenHAN - A specification for home area network (HAN) to connect to the utility advanced metering system including device communication, measurement, and control

The solution shall comply with AEIC Guidelines v2.0 - A guideline comprising a - framework and testing criteria for vendors and utilities who desire to implement standards-based AMI (StandardAMI) as the choice for Advanced Metering Infrastructure (AMI) solutions

The solution shall comply with W3C Suite - Web Architecture & Security Standards

Physical Security

The solution shall provide end-to-end physical security for all components.

All physical enclosures shall include a physical door contact alarm sensor.

All physical door contact alarm sensors and wiring shall not be accessible from the outside of the enclosure.

At least one device in each enclosure shall be capable of accepting door contact alarm inputs.

Devices that accept door contact alarm inputs shall forward related alarm signals to a head-end system.

Devices that accept door contact alarm inputs shall forward related alarm signals using the DNP3.0 protocol.

All physical enclosures shall securely terminate conduit for all cabling entering the enclosure.

Conduit termination hardware such as clamps, screws, fasteners, etc. shall not be accessible from outside the enclosure.

ID Requirement Comply (yes/no/partial)

For partial, list exceptions

Page 155: USRP 0316 Resources 030812 v2.pdf

155www.usresilienceproject.org

FROM THE SUPPLY CHAIN RISK LEADERSHIP COUNCIL: Appendix 1

Your company should ensure that proper contractual terms and conditions are in place requiring your suppliers and logistics partners to comply with proper supply chain security procedures as follows:

SAMPLE SUPPLIER Terms and Conditions

For those Goods ordered by Buyer from Seller that are shipped directly to Buyer, Seller agrees to comply with the following supply chain security requirements from the Point of Origin as provided below. The Point of Origin is the site where such Goods are assembled, manufactured, packaged and shipped.

Seller shall include this provision with applicable Subcontractors. For purposes of this provision, Subcontractors shall be defined as those sub-tier manufacturers or suppliers from which the shipment of Goods is shipped directly from said manufacturers or supplier’s facilities to Buyer and those suppliers engaged in packaging or transport of Buyer shipments (including but not limited to freight forwarders, 3rd party logistic companies, packagers). Seller shall be responsible to Buyer for any breach of such requirement by its subcontractor.

A. Supplier will maintain adequate security controls and procedures as further described in this Section 6.l.A.

a. Seller Subcontractor Selection Process: Seller shall have documented processes for the selection of its Subcontractors. The process shall ensure that such Subcontractors maintain adequate security controls and procedures.

b. Physical Security: Facilities must be protected against unauthorized access including but not limited to cargo handling and storage facilities which shall have physical security deterrents.

i. All entry and exit points for vehicles and personnel shall be controlled.

ii. Secure all external and internal windows, gates, and doors through which unauthorized personnel could access the facility or cargo storage areas with locking devices.

iii. Provide adequate lighting inside and outside facilities to prevent unauthorized access.

FROM THE SUPPLY CHAIN RISK LEADERSHIP COUNCIL

Appendix 1: Sample Contract Terms and Conditions for Supply-Chain Security

Page 156: USRP 0316 Resources 030812 v2.pdf

156 U.S. Resilience Project

Securing the Smart Grid Workshop

c. Access controls: Prevent unauthorized entry into facilities using access controls which may include but are not limited to badge readers, locks, key cards, or guards.

i. Positively identify all persons at all points of entry to facilities.

ii. Maintain adequate controls for the issuance and removal of employee, visitor and vendor identification badges, if utilized.

iii. Upon arrival, photo identification shall be required for all non-employee visitors.

d. Personnel Security and Verification: Screen prospective employees consistent with local regulations. Verify employment application information prior to employment.

e. Ocean Container and Truck Trailer Security: Maintain container and trailer security to protect against the introduction of unauthorized material and/or persons into shipments. In the event containers are stuffed, inspections shall be made of all ocean containers or truck trailers prior to stuffing, including but not limited to the inspection of the reliability of the locking mechanisms of all doors.

i. Ocean Container and Truck Trailer Seals: Properly seal and secure shipping containers and trailers at the point of stuffing. Affix a high security seal to all access doors on truck trailers and ocean containers bound for the U.S. Such seals must meet or exceed the current PAS ISO 17712 standard for high security seals.

ii. Ocean Container and Truck Trailer Storage: Empty or stuffed ocean containers and truck trailers must be stored in a secure area to prevent unauthorized access and/or manipulation.

f. Information Technology (IT) Security: maintain IT security measures to ensure all automated systems are protected from unauthorized access.

i. Use individually assigned accounts that require a periodic change of password for all automated systems.

ii. Maintain a system to identify the abuse of IT resources including but not limited to improper access, tampering or altering of business data and will discipline violators.

g. Procedural Security: maintain, document, implement and communicate the following security procedures to ensure the security measures in this clause are followed and must include:

i. Procedures for the issuance, removal and changing of access devices.

ii. Procedures to identify and challenge unauthorized or unidentified persons

iii. Procedures to remove identification, facility, and system access for terminated employees.

Page 157: USRP 0316 Resources 030812 v2.pdf

157www.usresilienceproject.org

FROM THE SUPPLY CHAIN RISK LEADERSHIP COUNCIL: Appendix 1

iv. Procedures for IT security and standards.

v. Procedures to verify application information for potential employees.

vi. Procedures for employees to report security incidents and/or suspicious behavior.

vii. Procedures for the inspection of ocean containers or truck trailers prior to stuffing.

viii. Procedures to control, manage, and record the issuance and use of high security bolt seals for ocean containers and truck trailers. Such procedures must stipulate how seals are to be controlled and affixed to loaded containers and shall include procedures for recognizing and reporting compromised seals or containers to Customs or the appropriate authority and Buyer.

B. Upon request, complete a Supply Chain Security Self Assessment Questionnaire.

C. Seller and its subcontractors shall be subject to periodic site visits by Buyer during normal operation hours, to confirm compliance with the terms contained within this clause.

D. Maintain procedures for employees to report security incidents and/or suspicious behavior. Immediately notify Buyer of any actual or suspected breach of security involving Buyer’s cargo.

Page 158: USRP 0316 Resources 030812 v2.pdf

158 U.S. Resilience Project

Securing the Smart Grid Workshop

Page 159: USRP 0316 Resources 030812 v2.pdf

159www.usresilienceproject.org

FROM THE SUPPLY CHAIN RISK LEADERSHIP COUNCIL: Appendix 2

For those Goods which are distributed, handled, warehoused, transported or shipped by Service Provider to (your company), Service Provider agrees to comply with the provisions of this section. For purposes of this section, 3PL includes Service Providers and means any outsourced Service Provider that provides services (e.g. distribution, handling, warehousing, transportation or shipping) for (your company) shipments.

Service Provider shall ensure that Subcontractors comply with the terms of this section and shall include these terms and conditions in any Subcontractor contracts. For purposes of this section, Subcontractors shall be defined as those sub-tier service providers of Service Provider which are involved in the distribution, handling, warehousing, transportation and shipping of (your company) shipments (including but not limited to freight forwarders, 3rd party logistic companies, packagers, local trucking/transport companies). Service Provider shall be responsible for any breach of this section by its Subcontractors.

A. Supply Chain Security Compliance: Service Provider must ensure that all Service Provider and applicable Subcontractor facilities involved in the distribution, handling, warehousing, transporting or shipping of (your company) goods meet all security standards documented below and all applicable local regulations. Service Provider should maintain certification in an official supply chain security program (C-TPAT, AEO, etc) and comply with those respective security standards throughout the period of this Agreement. Service Provider’s loss of certification or failure to sustain appropriate security standards or breach of this section will be grounds for termination of this Agreement.

B. Supply Chain Security Program Status: Prior to execution of this Agreement, Service Provider will send a letter verifying its supply chain security certification in any official program it participates in. Service Provider will immediately notify (your company) of any change to its certification status.

If not certified, Service Provider must complete a Security Questionnaire to confirm that its procedures and security measures comply with minimum supply chain security criteria. Service Provider will send copies of the aforementioned Security Questionnaire to (your company).

FROM THE SUPPLY CHAIN RISK LEADERSHIP COUNCIL

Appendix 2: Sample Supply-Chain Security Contract Language for International and Third-Party Logistics Service Providers

Page 160: USRP 0316 Resources 030812 v2.pdf

160 U.S. Resilience Project

Securing the Smart Grid Workshop

C. C-TPAT Certification: Service Provider agrees to use certified Subcontractors to the extent available. In the absence of certified Subcontractor, Service Provider may use companies (including local cartage companies) that have agreed in writing to follow these supply chain security guidelines and will promptly notify (your company) of such usage. If no certified transport and handling providers or companies that have agreed to follow these security guidelines are available to move (your company) shipments, Service Provider will contact (your company) immediately for direction.

D. Service Provider will maintain adequate security controls and procedures as further described in this section.

1. Supply Chain Security Program: Service Providers are encouraged to participate in and will advise (your company) of its participation in national supply chain security programs including, but not limited to. Partners in Protection (“PIP”) and Authorized Economic Operator (“AEO”) and shall list the countries and extent of participation. Service Provider shall provide prompt notice of any changes to its supply chain security program status.

2. Service Provider Subcontractor Selection Process: Service Provider shall have documented processes for the selection of its Subcontractors. The process shall ensure that such Subcontractors maintain adequate security controls and procedures.

3. Physical Security: Facilities must be protected against unauthorized access including but not limited to cargo handling and storage facilities which shall have physical security deterrents.

a. All entry and exit points for vehicles and personnel shall be controlled.

b. Secure all external and internal windows, gates, and doors through which unauthorized personnel could access the facility or cargo storage areas with locking devices.

c. Provide adequate lighting inside and outside facilities to prevent unauthorized access.

4. Access controls: Prevent unauthorized entry into facilities using access controls which may include but are not limited to badge readers, locks, key cards, or guards.

a. Positively identify all persons at all points of entry to facilities.

b. Maintain adequate controls for the issuance and removal of employee, visitor and vendor identification badges, if utilized.

c. Upon arrival, photo identification shall be required for all non-employee visitors.

5. Personnel Security and Verification: Screen prospective employees consistent with local regulations. Verify employment application information prior to employment.

6. Ocean Container and Truck Trailer Security: Maintain container and trailer security to protect against the introduction of unauthorized material and/or persons into shipments. In the event containers are stuffed, inspections shall be made of all ocean containers or truck trailers prior to stuffing, including but not limited to the inspection of the reliability of the locking mechanisms of all doors.

Page 161: USRP 0316 Resources 030812 v2.pdf

161www.usresilienceproject.org

FROM THE SUPPLY CHAIN RISK LEADERSHIP COUNCIL: Appendix 2

a. Ocean Container and Truck Trailer Seals: Properly seal and secure shipping containers and trailers at the point of stuffing. Affix a high security seal to all access doors on truck trailers and ocean containers Such seals must meet or exceed the current PAS ISO 17712 standard for high security seals.

b. Ocean Container and Truck Trailer Storage: Empty or stuffed ocean containers and truck trailers must be stored in a secure area to prevent unauthorized access and/or manipulation.

7. Information Technology (IT) Security: maintain IT security measures to ensure all automated systems are protected from unauthorized access.

a. Use individually assigned accounts that require a periodic change of password for all automated systems.

b. Maintain a system to identify the abuse of IT resources including but not limited to improper access, tampering or altering of business data and will discipline violators.

8. Procedural Security: maintain, document, implement and communicate the following security procedures to ensure the security measures in this clause are followed and must include:

a. Procedures for the issuance, removal and changing of access devices.

b. Procedures to identify and challenge unauthorized or unidentified persons

c. Procedures to remove identification, facility, and system access for terminated employees.

d. Procedures for IT security and standards.

e. Procedures to verify application information for potential employees.

f. Procedures for employees to report security incidents and/or suspicious behavior.

g. Procedures for the inspection of ocean containers or truck trailers prior to stuffing.

h. Procedures to control, manage and record the issuance and use of high security bolt seals for ocean containers and truck trailers. Such procedures must stipulate how seals are to be controlled and affixed to loaded containers and shall include procedures for recognizing and reporting compromised seals or containers to Customs or the appropriate authority and (your company).

9. Security Awareness Program: A Security Awareness Program will be implemented by Service Provider and provided to its employees including awareness and understanding of the supply chain security program, recognizing internal conspiracies, maintaining cargo integrity, and determining and addressing unauthorized access. The Security Awareness Program should encourage active employee participation in security controls. Service Provider shall ensure that key personnel receive regular training which shall be no less than once per year on security procedures and requirements. Service Provider shall submit evidence of such Security Awareness training upon request.

Page 162: USRP 0316 Resources 030812 v2.pdf

162 U.S. Resilience Project

Securing the Smart Grid Workshop

E. Questionnaire: Service Provider will, upon request, complete a Supply Chain Security Questionnaires provided to Service Provider by (your company).

F. Detailed Mapping: Service Provider will, upon request, promptly provide a detailed mapping for planned routings and any Subcontractors involved in the transport of (your company) shipments.

G. Site Visits: Service Provider and its subcontractors shall be subject to periodic site visits during normal operating hours to confirm compliance with supply chain security standards.

H. Breach of Security: Service Provider and its subcontractors shall immediately notify (your company) of any actual or suspected breach of security involving (your company) cargo. This may include cargo theft, tampering, unauthorized access, or other activities that involve suspicious actions or circumstances related to (your company) cargo.

Page 163: USRP 0316 Resources 030812 v2.pdf

163www.usresilienceproject.org

FROM THE SUPPLY CHAIN RISK LEADERSHIP COUNCIL: Appendix 3

Instructions: On questions which require a yes or no answer, please circle yes or no, and then describe your answer in the space provided. If desired, you may attach copies of documents that support your descriptions.

General Information

Contact Name:

Company Name:

Primary Location/Address:

Street:

City, State/Province, Postal Code:

Country:

Phone:

If you have multiple locations from which you ship to (your company), please list additional sites:

Please list your company contacts for Security and Transportation below.

Contact for Security:

Name:

Title:

Phone Number:

Email address:

Contact for Transportation:

Name:

Title:

Phone Number:

Email address:

Type of products produced for (your company) at your facility:

FROM THE SUPPLY CHAIN RISK LEADERSHIP COUNCIL

Appendix 3: Sample Supply Chain Security Self-Assessment Questionnaire for Suppliers or Other Supply-Chain Partners

Page 164: USRP 0316 Resources 030812 v2.pdf

164 U.S. Resilience Project

Securing the Smart Grid Workshop

Physical Security

1. Does your facility utilize security guards? Yes No

1a. If yes, describe how they are positioned and the hours of coverage and areas of coverage within your facility that they provide.

Additional Comments:

2. Is your facility fully enclosed by perimeter fencing or walls?

Yes No

2a. If yes, please describe the type of materials used and the height.

Additional Comments:

3. Does your facility utilize security cameras for monitoring perimeters, entries and exits, loading bays, or other areas?

Yes No

3a. If yes, describe coverage provided and who monitors them.

Additional Comments:

4. Does your facility have locks on doors, windows and gates?

Yes No

Additional Comments:

Page 165: USRP 0316 Resources 030812 v2.pdf

165www.usresilienceproject.org

FROM THE SUPPLY CHAIN RISK LEADERSHIP COUNCIL: Appendix 3

Physical Security Continued

5. Are the locks kept locked at all times to prevent unauthorized personnel from entering?

Yes No

5a. If no, please explain why.

Additional Comments:

6. Do you have bars, screens, or other materials over the windows?

Yes No

6a. If yes, please describe what materials are used.

Additional Comments:

7. Do you have an alarm intrusion system? Yes No

7a. If yes, please describe who is monitoring the alarm and where the alarm sensors are located at.

Additional Comments:

8. Is your facility exterior lighted/illuminated at night? Yes No

8a. If yes, please describe what areas are illuminated.

Additional Comments:

Page 166: USRP 0316 Resources 030812 v2.pdf

166 U.S. Resilience Project

Securing the Smart Grid Workshop

Physical Security Continued

9. Is the shipping/receiving area secure at all times to prevent access by unauthorized personnel?

Yes No

9a. If yes, please describe what physical barriers are used and what personnel is allowed access.

Additional Comments:

10. Are outgoing shipments stored in a separate area that is secure and prevents unauthorized access?

Yes No

10a. If yes, describe where the shipments are stored and who has access to them.

Additional Comments:

Please describe any aspects of physical security at your facility that you feel were not addressed above.

Page 167: USRP 0316 Resources 030812 v2.pdf

167www.usresilienceproject.org

FROM THE SUPPLY CHAIN RISK LEADERSHIP COUNCIL: Appendix 3

Access Control

1. Do you use an employee badge system for entry and monitoring onsite activities?

Yes No

1a. If yes, describe the badge system (electronic, color coded, how many badges are needed to gain access, etc.)

1b. If no, but you use another method to identify and track employees, please describe.

Additional Comments:

2. Do you have access controls in place at entry points to your facility?

Yes No

2a. If yes, describe what access controls are used at each point of access into your facility.

Additional Comments:

3. Is vehicle access into your facility controlled? Yes No

3a. If yes, describe how vehicle access is controlled and what vehicles are allowed access.

Additional Comments:

4. Are vehicles and drivers screened or inspected prior to entry to your facility?

Yes No

4a. If yes, describe the method of screening (driver ID checks, vehicle inspections, etc.).

Additional Comments:

Page 168: USRP 0316 Resources 030812 v2.pdf

168 U.S. Resilience Project

Securing the Smart Grid Workshop

Access Control Continued

5. Do you identify, record, and track all visitors? Yes No

5a. If yes, what method is used and how are the records kept?

Additional Comments:

Please explain any access controls at your facilities that you feel were not addressed above.

Page 169: USRP 0316 Resources 030812 v2.pdf

169www.usresilienceproject.org

FROM THE SUPPLY CHAIN RISK LEADERSHIP COUNCIL: Appendix 3

Personnel Security

1. Are employee work history background checks completed prior to hiring?

Yes No

1a. If yes, describe to what extent the background check is completed.

1b. If no, describe if there is a local law that prohibits this action.

Additional Comments:

2. Are employee criminal background checks completed prior to hiring?

Yes No

2a. If yes, describe to what extent the background check is completed.

2b. If no, describe if there is a local law that prohibits this action.

Additional Comments:

3. Are non-employee contractors allowed routine access into your facility (janitorial service, delivery drivers, food vendors, etc) ?

Yes No

3a. If yes, are employment and criminal background checks completed prior to access being allowed?

3b. Is access restricted to these workers so that they may only access facilities that they need to be in?

Yes No

3c. Are these workers restricted from accessing the shipping and receiving areas?

Yes No

3d. Are these workers required to wear identification badges?

Yes No

Please explain any personnel controls at your facilities that you feel were not addressed above.

Page 170: USRP 0316 Resources 030812 v2.pdf

170 U.S. Resilience Project

Securing the Smart Grid Workshop

Procedural Security

1. Is there a Security Manager and staff? Yes No

1a. If yes, what is the person’s name and how many staff are working security?

Additional Comments:

2. Are physical security procedures documented? Yes No

2a. Are access control security procedures documented? Yes No

2b. Are I.T. security procedures documented? Yes No

2c. Are personnel security procedures documented? Yes No

2d. Are education/training of security procedures documented?

Yes No

Additional Comments:

3. Are there procedures for employees reporting security problems and addressing the situation?

Yes No

Additional Comments:

4. Are there procedures for marking, counting and weighing outgoing shipments?

Yes No

Additional Comments:

Page 171: USRP 0316 Resources 030812 v2.pdf

171www.usresilienceproject.org

FROM THE SUPPLY CHAIN RISK LEADERSHIP COUNCIL: Appendix 3

Procedural Security Continued

1. Is there a Security Manager and staff? Yes No

1a. If yes, what is the person’s name and how many staff are working security?

Additional Comments:

2. Are physical security procedures documented? Yes No

2a. Are access control security procedures documented? Yes No

2b. Are IT security procedures documented? Yes No

2c. Are personnel security procedures documented? Yes No

2d. Are education/training of security procedures documented?

Yes No

Additional Comments:

3. Are there procedures for employees reporting security problems and addressing the situation?

Yes No

Additional Comments:

4. Are there procedures for marking, counting and weighing outgoing shipments?

Yes No

Additional Comments:

Page 172: USRP 0316 Resources 030812 v2.pdf

172 U.S. Resilience Project

Securing the Smart Grid Workshop

Procedural Security Continued

5. Are there procedures for documenting outgoing shipments?

Yes No

Additional Comments:

6. Are there procedures for storing and identifying incoming and outgoing shipments?

Yes No

Additional Comments:

7. Are there procedures in place for storing shipment documentation (packing list, commercial invoice, etc.)?

Yes No

Additional Comments:

8. Are procedures in place for securing outgoing shipments against intrusion?

Yes No

Additional Comments:

9. Does a 3rd party physically pack these shipments? Yes No

9a. If yes, are security procedures flowed down to the packers?

Additional Comments:

If ocean and/or truck trailer containers are used, please answer questions 10 - 12.

If not, skip to question 13.

Page 173: USRP 0316 Resources 030812 v2.pdf

173www.usresilienceproject.org

FROM THE SUPPLY CHAIN RISK LEADERSHIP COUNCIL: Appendix 3

Procedural Security Continued

10. Are containers examined prior to loading to ensure no explosives or other contraband is present?

Yes No

10a. If yes, describe the process.

Additional Comments:

11. Describe how ocean containers (full and/or empty) are stored.

Additional Comments:

12. Are high security bolt seals used on ALL ocean/truck trailer container entry doors?

Yes No

12a. If yes, How are bolt seals controlled? (e.g., storage and procedures to assure no fraudulent use)

Additional Comments:

13. What security considerations have been established for selecting and screening carriers that are providing transportation services for outgoing shipments?

Additional Comments:

14. Are there procedures for reporting problems/delays in the movement of cargo?

Yes No

14a. If yes, describe the process.

Additional Comments:

Page 174: USRP 0316 Resources 030812 v2.pdf

174 U.S. Resilience Project

Securing the Smart Grid Workshop

Procedural Security Continued

15. Describe the materials used for packing products that are being sent to Boeing (e.g., cardboard box, container, etc).

15a. Are tamper evident materials used?

Additional Comments:

Please explain any procedural controls at your facilities that you feel were not addressed above.

Page 175: USRP 0316 Resources 030812 v2.pdf

175www.usresilienceproject.org

FROM THE SUPPLY CHAIN RISK LEADERSHIP COUNCIL: Appendix 3

Education and Training

1. Does your company provide a security awareness program related to protecting product integrity and facility security?

Yes No

1a. If yes, please describe what is covered in this training and awareness program.

1b. If yes, how often are employees required to take this training and awareness program?

Additional Comments:

2. Is your company certified in a supply chain security or known shipper/consignor program? (e.g. AEO, PIP, etc.)

Yes No

2a. If yes, indicate which program you have certification in, when it was obtained, and who provided the certification.

Additional Comments:

3. Do you require cargo integrity training for employees in the shipping and receiving areas and opening mail?

Yes No

3a. If yes, how often is this training required?

Additional Comments:

4. Do you require education on recognizing internal conspiracies and protecting access controls for all employees?

Yes No

4a. If yes, how often is this training required?

Additional Comments:


Recommended