Agenda Event Analysis Subcommittee Conference Call

Size: px
Start display at page:

Download "Agenda Event Analysis Subcommittee Conference Call"

Transcription

1 Agenda Event Analysis Subcommittee Conference Call October 23, :00 a.m. 1:00 p.m. Eastern Ready Talk Conference Call and Web Meeting Information: Dial-In: Access Code: Security Code: Webinar: (On the left side of the screen click Join a Meeting enter the above access code and security code to join the webinar) NERC Antitrust Compliance Guidelines Call to Meeting and Roll Call Agenda 1. EIDS Project Status (10 minutes) LaCreacia Smith Objective: Provide an update on the EIDS project to date. 2. Lessons Learned (30 minutes)* Mark Vastano Objective Final Review of lesson learned prior to publishing. a. LL93 IT Communications Disabled b. LL101 Loss of SCADA c. LL109 Failure of Energy Management System (EMS) 3. EMS Task Force Update (10 minutes) Paul Johnson Objective: Update on EMSTF activities. 4. Trends Working Group Update (10 minutes) Jacquie Smith Objective Update on TWG activities. 5. Roundtable Discussion (10 minutes) All 6. Adjourn Hassan Hamdar *As needed, background materials attached.

2 Loss of EMS IT Communications Disabled Primary Interest Groups Generator Operator (GOP) Reliability Coordinator (RC) Transmission Operator (TOP) Transmission Owner (TO) Problem Statement Transmission System Operators lost abilities to authenticate to the EMS system, resulting in a loss of monitoring and control functionality for more than 30 minutes. Details Scheduled control center server maintenance was being performed, which required the local authentication server to be taken out of service. By design, control center EMS application authentication should have rerouted automatically to a remote authentication server when the local server was taken out of service. Contrary to expectations and design, the automatic rerouting of authentication traffic did not occur and the EMS application was impacted. As a result, maintenance on the local authentication server was curtailed and was brought back on line. Once local authentication was re established, full EMS functionality was available. The root cause analysis determined that a specific firewall policy allowing authentication failover from the local authentication server to the remote authentication server was inadvertently deleted. Corrective Actions The following corrective actions were implemented: IT and business teams worked together to develop a test plan template to ensure that application functionality would be retained and supporting infrastructure components would function as designed. The IT Change Management process was immediately modified to ensure that comprehensive test plans are executed regardless of change classification. The past practice for work believed to be low risk was to allow test plans as a streamlined process when implementing a change. The prior streamlined process for low risk firewall policy changes required only that an engineering analytical review be performed. IT personnel were retrained on a revised Change Management process that included, but was not limited to, use of comprehensive test plans for all change classifications. A redundant local authentication server was installed at the primary control center.

3 EMS network design should, where possible, include a redundant local authentication server on the same internal network as the primary local authentication server. Having the primary and redundant local authentication servers on the same internal network (i.e., behind the same firewall) eliminates the dependency on a firewall rule for internal communications to both the primary and redundant local authentication servers. The IT Change Management process should consider applying the following principles: o Apply a thorough test process that is reviewed with the client for all changes that could affect EMS function. o Test the design redundancy or back out plan prior to implementing a change. o Test plans need to be comprehensive and include regression level testing. NERC s goal with publishing lessons learned is to provide industry with technical and understandable information that assists them with maintaining the reliability of the Bulk Power System. NERC requests your input on this lesson learned by taking the short survey provided in the link below: Click here for: Lesson Learned Comment Form For more Information please contact: NERC Lessons Learned (via ) NPCC Event Analysis Source of Lesson Learned: Northeast Power Coordinating Council Lesson Learned #: Date Published: October XX, 2013 Category: Bulk Power System Operations This document is designed to convey lessons learned from NERC s various activities. It is not intended to establish new requirements under NERC s Reliability Standards or to modify the requirements in any existing Reliability Standards. Compliance will continue to be determined based on language in the NERC Reliability Standards as they may be amended from time to time. Implementation of this lesson learned is not a substitute for compliance with requirements in NERC s Reliability Standards. Lesson Learned Loss of EMS IT Communications Disabled 2

4 SCADA Failure Resulting in Reduced Monitoring Functionality Primary Interest Groups Reliability Coordinators (RC) Transmission Operators (TOP) Balancing Authority (BA) Problem Statement An entity s primary control center SCADA Management Platform (SMP) servers became unresponsive, which resulted in a partial loss of monitoring and control functions for more than 30 minutes. Because this loss of functionality was a result of a conflict between security software configuration changes and core operating system functions, a cybersecurity event was quickly ruled out, and no loss of load occurred during this event. Details The primary control center SMP servers ceased network functionality and were unresponsive to login attempts from the local console. Physical reboots of the servers were only able to resolve the problem momentarily. Recovery plans were immediately activated, and predefined decisions and procedures were followed as designed. The entity s primary control center Energy Management Platform (EMP) servers automatically began using the available SCADA signals provided by backup control center SMP servers and multisite IP routable SCADA. Manual actions quickly restored additional SCADA functionality for critical non IP routable circuits by moving those circuits to the backup SMP servers. Key generation facilities and substations were staffed to ensure that any needed control operations could be performed. Once the primary SMP servers were stabilized, they were used to operate only noncritical SCADA circuits until root cause was established and full remediation was completed. This was possible due to the multisite redundancy design of the overall Energy Management System, which allowed the entity s primary control center EMP servers to operate in a mixed mode, combining available SMP capabilities at both primary and backup control centers. Having this multisite redundancy meant the operators did not need to physically travel to the backup control center during this incident, and it also lowered risk during root cause analysis. The entity discovered that the root cause stemmed from a planned change to the security policy configuration of the host based intrusion detection (HIDS) and intrusion prevention (HIPS) software. As an unintended result, the HIDS/HIPS security software on the SMP server hosts began to block certain core operating system processes when those processes executed in a specific order that coincided with the HIDS/HIPS policy change. The block did not occur until several days after the change was implemented, when the SMP servers performed the specific functions that triggered the conflict and caused the HIDS/HIPS security software to lock down the core operating system.

5 Once the root cause was identified, the entity created a new HIDS/HIPS security policy configuration that allowed the HIDS/HIPS security software to handle the core operating system functions on the SMP server hosts properly. The entity then conducted the necessary testing and implementation to restore functionality to the SMP systems. Corrective Actions The entity engaged the HIDS/HIPS security software vendor to review and implement policy changes to better manage the balance between custom configurations and secure threat detection and protection. Processes for implementing HIDS/HIPS security policy changes while also maintaining system integrity are being reviewed for enhanced functionality and reliability. Solutions from these reviews are being implemented. Lesson Learned This event brought forward several positive lessons learned that minimized the extent of the outage: Security software configurations need careful analysis, design, testing, and implementation, as they may impact reliability in unpredictable ways. Registered entities should consider a multisite hosting configuration. This configuration provides flexibility and convenience for rapid recovery capability of EMS and SCADA functions. Frequent exercise of and training on recovery plans ensures that actual event responses go according to plan and promptly mitigate operational impacts. NERC s goal with publishing lessons learned is to provide industry with technical and understandable information that assists them with maintaining the reliability of the Bulk Power System. NERC requests your input on this lesson learned by taking the short survey provided in the link below. Click here for: Lesson Learned Comment Form For more Information please contact: NERC Lessons Learned (via ) Steve Ashbaker (via ) or (801) Source of Lesson Learned: Western Electricity Coordinating Council Lesson Learned #: Date Published: October XX, 2013 Category: Communications This document is designed to convey lessons learned from NERC s various activities. It is not intended to establish new requirements under NERC s Reliability Standards or to modify the requirements in any existing Reliability Standards. Compliance will continue to be determined based on language in the NERC Reliability Standards as they may be amended from time to time. Implementation of this lesson learned is not a substitute for compliance with requirements in NERC s Reliability Standards. Lesson Learned SCADA Failure Resulting in Reduced Monitoring Functionality 2

6 Failure of Energy Management System While Performing Database Update Primary Interest Groups Reliability Coordinators (RC) Transmission Operators (TOP) Transmission Owners (TO) Problem Statement Failure of Energy Management System (EMS) while performing a database update. Details While performing edits to the EMS database, the entity received alarms that indicated errors for the communications servers. A decision was made to restore the database to its original state. While performing the restore procedure, the standby communications server in the Primary Control Center (PCC) was manually restarted. This caused the reversal of the database edits to fail and create faulty data files that synchronized across the integrated system servers. Although alarms were received for all communication servers, only the standby communications server in the PCC failed; the EMS remained fully operational. The faulty data files were manually removed from all servers, and a SCADA server failover was completed. An attempt to enable the standby communications server at the PCC failed. The EMS group executed a system warm restart, but since the EMS is an integrated system, the system warm restart resulted in the faulty data in the database being loaded into the remaining two communications servers, whereby all three communications servers failed. At this point, the EMS lost functionality and was operational on a sporadic basis. At no point was the EMS off line for a period exceeding 30 minutes. With the failure of the three communications servers, incremental system scans were performed. Subsequently, the substantive issues with the EMS were resolved and the EMS was restored with a minimum server requirement configuration with full functionality. Once the limited server system was verified as stable, all remaining servers were successfully brought back manually into synchronization with the EMS. Corrective Actions Training documents will be developed to document revised steps for database updates and communication server restarts to eliminate the failure mode experienced during this incident as a result of the integrated system. Database update testing procedures and documentation will be reviewed to ensure that testing requirements are clear and concise. Although the database updates were implemented first on

7 both the Product Development System (PDS) and the Dispatcher Training System (DTS), error logs were only partially reviewed. Therefore, the testing procedures will be updated to include step bystep instructions to ensure that the procedures are completely carried out, thus simulating the production environment that includes separate windows used for log viewing and update time log tracing. EMS analysts will receive training on the existing and new procedures. A proposal was requested and has been received from the EMS vendor to upgrade the EMS to a new EMS server environment in which the PCC and the Alternate Control Center (ACC) databases will be separate. In the new system, database updates will be required to be performed independently on the PCC and ACC to reduce the risk of any anomalies at the PCC from being propagated to the ACC. This will provide increased reliability to the EMS system. Lesson Learned When the EMS was purchased, the vulnerability of an integrated system architecture was unknown. To eliminate this now exposed vulnerability, it is recommended that functional separation of the PCC from the ACC be implemented. NERC s goal with publishing lessons learned is to provide industry with technical and understandable information that assists them with maintaining the reliability of the Bulk Power System. NERC requests your input on this lesson learned by taking the short survey provided in the link below: Click here for: Lesson Learned Comment Form For more Information please contact: NERC Lessons Learned (via ) NPCC Event Analysis Source of Lesson Learned: Northeast Power Coordinating Council Lesson Learned #: LL Date Published: October XX, 2013 Category: Communications This document is designed to convey lessons learned from NERC s various activities. It is not intended to establish new requirements under NERC s Reliability Standards or to modify the requirements in any existing Reliability Standards. Compliance will continue to be determined based on language in the NERC Reliability Standards as they may be amended from time to time. Implementation of this lesson learned is not a substitute for compliance with requirements in NERC s Reliability Standards. Lesson Learned Failure of Energy Management System While Performing Database Update 2

Agenda Event Analysis Subcommittee Conference Call

Agenda Event Analysis Subcommittee Conference Call Agenda Event Analysis Subcommittee Conference Call September 11, 2013 11:00 a.m. 1:00 p.m. Eastern Ready Talk Conference Call and Web Meeting Information: Dial-In: 1-866-740-1260 Access Code: 6517175 Security

More information

Agenda Event Analysis Subcommittee Conference Call

Agenda Event Analysis Subcommittee Conference Call Agenda Event Analysis Subcommittee Conference Call August 14, 2013 11:00 a.m. 1:00 p.m. Eastern Ready Talk Conference Call and Web Meeting Information: Dial-In: 1-866-740-1260 Access Code: 6517175 Security

More information

Title. Critical Infrastructure Protection Getting Low with a Touch of Medium. CanWEA Operations and Maintenance Summit 2018.

Title. Critical Infrastructure Protection Getting Low with a Touch of Medium. CanWEA Operations and Maintenance Summit 2018. Critical Infrastructure Protection Getting Low with a Touch of Medium Title CanWEA Operations and Maintenance Summit 2018 January 30, 2018 George E. Brown Compliance Manager Acciona Wind Energy Canada

More information

Loss of Control Center Functionality: EOP-008-1, CIP-008-3, CIP September 30, 2014

Loss of Control Center Functionality: EOP-008-1, CIP-008-3, CIP September 30, 2014 Loss of Control Center Functionality: EOP-008-1, CIP-008-3, CIP-009-3 September 30, 2014 James Williams Lead Compliance Specialist jwilliams.re@spp.org 501.614.3261 Jeremy Withers Senior Compliance Specialist

More information

Gamma Service Incident Report Final 18/9/14

Gamma Service Incident Report Final 18/9/14 Gamma Service Report Final 18/9/14 Broadband Service Please read the following as it could have an impact on some of your customers. Reference: Start Date: Start Time: Actual Clear Date: Actual Clear Time:

More information

2 nd Annual NERC Monitoring and Situational Awareness Conference: FPL s Operational Technology Center

2 nd Annual NERC Monitoring and Situational Awareness Conference: FPL s Operational Technology Center 2 nd Annual NERC Monitoring and Situational Awareness Conference: FPL s Operational Technology Center Ed Batalla Director of Grid Control Systems Florida Power & Light Company Sept. 24, 2014 Florida Power

More information

Lesson Learned Initiatives to Address and Reduce Misoperations

Lesson Learned Initiatives to Address and Reduce Misoperations Lesson Learned Initiatives to Address and Reduce Misoperations Primary Interest Groups Transmission Owners (TOs) Generator Owners (GOs) Problem Statement A registered entity experienced a high rate of

More information

primary Control Center, for the exchange of Real-time data with its Balancing

primary Control Center, for the exchange of Real-time data with its Balancing A. Introduction 1. Title: Reliability Coordination Monitoring and Analysis 2. Number: IRO-002-5 3. Purpose: To provide System Operators with the capabilities necessary to monitor and analyze data needed

More information

Cyber Security Incident Report

Cyber Security Incident Report Cyber Security Incident Report Technical Rationale and Justification for Reliability Standard CIP-008-6 January 2019 NERC Report Title Report Date I Table of Contents Preface... iii Introduction... 1 New

More information

NERC Event Analysis Update Webinar. Hassan Hamdar Chair, Event Analysis Subcommittee October 20, 2016

NERC Event Analysis Update Webinar. Hassan Hamdar Chair, Event Analysis Subcommittee October 20, 2016 NERC Event Analysis Update Webinar Hassan Hamdar Chair, Event Analysis Subcommittee October 20, 2016 Webinar Agenda ERO Event Analysis Process Update Lesson Learned Presentation from Entity ERO Lessons

More information

Standard Development Timeline

Standard Development Timeline Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard is adopted by the NERC Board of Trustees (Board).

More information

Cyber Security and Substation Equipment Overview

Cyber Security and Substation Equipment Overview Cyber Security and Substation Equipment Overview Northeast Power Coordinating Council Task Force on Infrastructure Security & Technology s Cyber Security Workshop June 7 & 8, 2006 John Ciufo Alfred Moniz

More information

New Brunswick 2018 Annual Implementation Plan Version 1

New Brunswick 2018 Annual Implementation Plan Version 1 New Brunswick Energy and Utilities Board Reliability Standards, Compliance and Enforcement Program New Brunswick 2018 Annual Implementation Plan Version 1 December 28, 2017 Table of Contents Version History...

More information

TOP for Transmission Operators

TOP for Transmission Operators Meeting Title Date TOP-001-4 for Transmission Operators Compliance Team Lead, Keith Smith Background Effective July 1, 2018 Replaces currently effective TOP-001-3 Modified to address reliability concerns

More information

Managed NIDS Care Services

Managed NIDS Care Services Managed NIDS Care Services This Service Guide ( SG ) sets forth a description of CenturyLink Managed NIDS Care Service ( Service ) offerings including technical details and additional requirements or terms,

More information

CIP V5 Implementation Study SMUD s Experience

CIP V5 Implementation Study SMUD s Experience CIP V5 Implementation Study SMUD s Experience Tim Kelley October 16, 2014 Powering forward. Together. SMUD Fast Facts General Information SMUD employs approximately 2,000 individuals Service area of 900

More information

Data Center Operations Guide

Data Center Operations Guide Data Center Operations Guide SM When you utilize Dude Solutions Software as a Service (SaaS) applications, your data is hosted in an independently audited data center certified to meet the highest standards

More information

Procedure For NPCC Bulk Electric System Asset Database

Procedure For NPCC Bulk Electric System Asset Database Procedure For NPCC Bulk Electric System Asset Database Compliance Procedure 09 (CP-09) Revision 2 Table of Contents 1. Introduction and Purpose... 3 2. Responsibilities... 3 3. Overview... 3 4. Asset Database...

More information

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

CIP Cyber Security Configuration Change Management and Vulnerability Assessments CIP-010-2 3 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:

More information

POWER SYSTEM DATA COMMUNICATION STANDARD

POWER SYSTEM DATA COMMUNICATION STANDARD POWER SYSTEM DATA COMMUNICATION STANDARD PREPARED BY: AEMO Systems Capability VERSION: 2 EFFECTIVE DATE: 1 December 2017 STATUS: FINAL Australian Energy Market Operator Ltd ABN 94 072 010 327 www.aemo.com.au

More information

Potential Mitigation Strategies for the Common Vulnerabilities of Control Systems Identified by the NERC Control Systems Security Working Group

Potential Mitigation Strategies for the Common Vulnerabilities of Control Systems Identified by the NERC Control Systems Security Working Group Potential Mitigation Strategies for the Common Vulnerabilities of Control Systems Identified by the NERC Control Systems Security Working Group Submitted on behalf of the U.S. Department of Energy National

More information

Security Standards for Electric Market Participants

Security Standards for Electric Market Participants Security Standards for Electric Market Participants PURPOSE Wholesale electric grid operations are highly interdependent, and a failure of one part of the generation, transmission or grid management system

More information

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

CIP Cyber Security Configuration Change Management and Vulnerability Assessments CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information

Standard Req # Requirement D20MX Security Mechanisms D20ME II and Predecessors Security Mechanisms

Standard Req # Requirement D20MX Security Mechanisms D20ME II and Predecessors Security Mechanisms GE Digital Energy D20MX - NERC - CIP Response Product Bulletin Date: May 6th, 2013 Classification: GE Information NERC Critical Infrastructure Protection Response Overview The purpose of this document

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information

Incident Response Lessons From the Front Lines. Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles

Incident Response Lessons From the Front Lines. Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles Incident Response Lessons From the Front Lines Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles 1 Conflict of Interest Nolan Garrett Has no real or apparent conflicts of

More information

Project Consideration of Commission Directives in Order No. 693

Project Consideration of Commission Directives in Order No. 693 Project 2009-02 Consideration of Commission Directives in Order Order P 905-906 Further, consistent with the NOPR, the Commission directs the ERO to modify IRO-002-1 to require a minimum set of tools that

More information

Compliance Exception and Self-Logging Report Q4 2014

Compliance Exception and Self-Logging Report Q4 2014 Agenda Item 5 Board of Trustees Compliance Committee Open Session February 11, 2015 Compliance Exception and Self-Logging Report Q4 2014 Action Information Introduction Beginning in November 2013, NERC

More information

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 January 23, 2015

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 January 23, 2015 Federal Energy Regulatory Commission Order No. 791 January 23, 2015 67 and 76 67. For the reasons discussed below, the Commission concludes that the identify, assess, and correct language, as currently

More information

Securing the Grid and Your Critical Utility Functions. April 24, 2017

Securing the Grid and Your Critical Utility Functions. April 24, 2017 Securing the Grid and Your Critical Utility Functions April 24, 2017 1 Securing the Grid Effectively and Efficiently Recent threats to the Electric Grid and the importance of security Standards and Requirements

More information

Cyber Threats? How to Stop?

Cyber Threats? How to Stop? Cyber Threats? How to Stop? North American Grid Security Standards Jessica Bian, Director of Performance Analysis North American Electric Reliability Corporation AORC CIGRE Technical Meeting, September

More information

COM Communications and Coordination

COM Communications and Coordination COM-002-2 Communications and Coordination February 27, 2014 Lonnie Lindekugel ~ SPP Jim Nail ~ City of Independence INTRODUCTION NERC Reliability Standard COM-002-2 (Communications and Coordination) serves

More information

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES 002 5 R1. Each Responsible Entity shall implement a process that considers each of the following assets for purposes of parts 1.1 through 1.3: i. Control Centers and backup Control Centers; ii. Transmission

More information

DEFINITIONS AND REFERENCES

DEFINITIONS AND REFERENCES DEFINITIONS AND REFERENCES Definitions: Insider. Cleared contractor personnel with authorized access to any Government or contractor resource, including personnel, facilities, information, equipment, networks,

More information

CIP Cyber Security Recovery Plans for BES Cyber Systems

CIP Cyber Security Recovery Plans for BES Cyber Systems A. Introduction 1. Title: Cyber Security Recovery Plans for BES Cyber Systems 2. Number: CIP-009-6 3. Purpose: To recover reliability functions performed by BES Cyber Systems by specifying recovery plan

More information

Blackout 2003 Reliability Recommendations

Blackout 2003 Reliability Recommendations Blackout 2003 Reliability Recommendations 2005 NPCC General Meeting The Cranwell Resort Lenox, MA September 29, 2005 Philip A. Fedora Director, Market Reliability Interface Northeast Power Coordinating

More information

CIP Cyber Security Systems Security Management

CIP Cyber Security Systems Security Management A. Introduction 1. Title: Cyber Security System Security Management 2. Number: CIP-007-5 3. Purpose: To manage system security by specifying select technical, operational, and procedural requirements in

More information

Question No: 1 After running a packet analyzer on the network, a security analyst has noticed the following output:

Question No: 1 After running a packet analyzer on the network, a security analyst has noticed the following output: Volume: 75 Questions Question No: 1 After running a packet analyzer on the network, a security analyst has noticed the following output: Which of the following is occurring? A. A ping sweep B. A port scan

More information

AUTHORITY FOR ELECTRICITY REGULATION

AUTHORITY FOR ELECTRICITY REGULATION SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...

More information

Securing Industrial Control Systems

Securing Industrial Control Systems L OCKHEED MARTIN Whitepaper Securing Industrial Control Systems The Basics Abstract Critical infrastructure industries such as electrical power, oil and gas, chemical, and transportation face a daunting

More information

Wide-Area Reliability Monitoring and Visualization Tools

Wide-Area Reliability Monitoring and Visualization Tools OE Visualization and Controls Peer Review Wide-Area Reliability Monitoring and Visualization Tools Carlos Martinez CERTS - Electric Power Group 21 October 2008 Washington, D.C. Presentation Outline Research

More information

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

CIP Cyber Security Configuration Change Management and Vulnerability Assessments Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed

More information

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 June 2, 2014

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 June 2, 2014 Federal Energy Regulatory Commission Order No. 791 June 2, 2014 67 and 76 67. For the reasons discussed below, the Commission concludes that the identify, assess, and correct language, as currently proposed

More information

DRAFT Risks and Mitigations for Losing EMS Functions

DRAFT Risks and Mitigations for Losing EMS Functions DRAFT Risks and Mitigations for Losing EMS Functions 1.0 Executive Summary Energy Management System (EMS) is a system of computer-aided tools used by System Operators to monitor, control, and optimize

More information

CIP Cyber Security Recovery Plans for BES Cyber Systems

CIP Cyber Security Recovery Plans for BES Cyber Systems Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed

More information

Standard CIP 005 2a Cyber Security Electronic Security Perimeter(s)

Standard CIP 005 2a Cyber Security Electronic Security Perimeter(s) A. Introduction 1. Title: Cyber Security Electronic Security Perimeter(s) 2. Number: CIP-005-2a 3. Purpose: Standard CIP-005-2 requires the identification and protection of the Electronic Security Perimeter(s)

More information

Project Posting 8 Frequently Asked Questions Guide

Project Posting 8 Frequently Asked Questions Guide Project 2007-02 Posting 8 Frequently Asked Questions Guide General Questions 1. What were the inputs that drove the development of posting 8 of Project 2007-02? The NERC Board of Trustees November 7 th,

More information

WON Security Guideline

WON Security Guideline WON Security Guideline Data Exchange Work Group October 7, 2015 155 rth 400 West, Suite 200 Salt Lake City, Utah 84103-1114 WON Security Guideline 1 Table of Contents Purpose... 1 Background... 1 Security

More information

BILLING CODE P DEPARTMENT OF ENERGY Federal Energy Regulatory Commission. [Docket No. RM ] Cyber Systems in Control Centers

BILLING CODE P DEPARTMENT OF ENERGY Federal Energy Regulatory Commission. [Docket No. RM ] Cyber Systems in Control Centers This document is scheduled to be published in the Federal Register on 07/28/2016 and available online at http://federalregister.gov/a/2016-17854, and on FDsys.gov BILLING CODE 6717-01-P DEPARTMENT OF ENERGY

More information

Standard TOP Transmission Operations

Standard TOP Transmission Operations A. Introduction 1. Title: Transmission Operations 2. Number: TOP-001-34 3. Purpose: To prevent instability, uncontrolled separation, or Cascading outages that adversely impact the reliability of the Interconnection

More information

Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017)

Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) GENERAL TERMS & INFORMATION A. GENERAL TERMS & DEFINITIONS 1. This Services Specification

More information

Microsoft SharePoint Server 2013 Plan, Configure & Manage

Microsoft SharePoint Server 2013 Plan, Configure & Manage Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that

More information

Analysis of EMS Outages

Analysis of EMS Outages Analysis of EMS Outages Venkat Tirupati, LCRA, Supervisor EMS SW & Advanced Applications NERC 3 rd Annual Monitoring and Situational Awareness Conference September 29-30, 2015 Agenda Introduction Common

More information

What can the OnBase Cloud do for you? lbmctech.com

What can the OnBase Cloud do for you? lbmctech.com What can the OnBase Cloud do for you? lbmctech.com The OnBase Cloud by Hyland When it comes to cloud deployments, experience matters. With experience comes more functionality, long tracks of outstanding

More information

Reliability Compliance Update. Reliability Standards and Compliance Subcommittee Preston Walker August 16, 2018

Reliability Compliance Update. Reliability Standards and Compliance Subcommittee Preston Walker August 16, 2018 Reliability Compliance Update Reliability Standards and Compliance Subcommittee Preston Walker August 16, 2018 NERC Standards Under Development Standards Project Action End Date Comment 08/27/2018 Draft

More information

CIP V5 Updates Midwest Energy Association Electrical Operations Conference

CIP V5 Updates Midwest Energy Association Electrical Operations Conference CIP V5 Updates Midwest Energy Association Electrical Operations Conference May 2015 Bob Yates, CISSP, MBA Principal Technical Auditor ReliabilityFirst Corporation Agenda Cyber Security Standards Version

More information

TB+ 1.5 Billion+ The OnBase Cloud by Hyland 600,000,000+ content stored. pages stored

TB+ 1.5 Billion+ The OnBase Cloud by Hyland 600,000,000+ content stored. pages stored the onbase cloud ONBASE CLOUD // Experience Matters The OnBase Cloud by Hyland When it comes to cloud deployments, experience matters. With experience comes more functionality, an established history of

More information

TOP/IRO Standards. RC Users Group January 21, Vic Howell Manager, Operations Engineering Support

TOP/IRO Standards. RC Users Group January 21, Vic Howell Manager, Operations Engineering Support TOP/IRO Standards RC Users Group January 21, 2016 Vic Howell Manager, Operations Engineering Support Saad Malik Manager, Real-Time Operations Engineering New/Revised TOP & IRO Standards November 19, 2015,

More information

Submitted on behalf of the DOE National SCADA Test Bed. Jeff Dagle, PE Pacific Northwest National Laboratory (509)

Submitted on behalf of the DOE National SCADA Test Bed. Jeff Dagle, PE Pacific Northwest National Laboratory (509) Potential Mitigation Strategies for the Common Vulnerabilities of Control Systems Identified by the NERC Control Systems Security Working Group (CSSWG) Submitted on behalf of the DOE National SCADA Test

More information

Standard Development Timeline

Standard Development Timeline Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard is adopted by the NERC Board of Trustees (Board).

More information

DRAFT. Standard 1300 Cyber Security

DRAFT. Standard 1300 Cyber Security These definitions will be posted and balloted along with the standard, but will not be restated in the standard. Instead, they will be included in a separate glossary of terms relevant to all standards

More information

IT CONTINUITY, BACKUP AND RECOVERY POLICY

IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY Effective Date May 20, 2016 Cross- Reference 1. Emergency Response and Policy Holder Director, Information Business Resumption

More information

Guidelines for Submitting NERC Reliability Standards Required Documents to the SPP Reliability Coordinator and the SPP Balancing Authority Version 1

Guidelines for Submitting NERC Reliability Standards Required Documents to the SPP Reliability Coordinator and the SPP Balancing Authority Version 1 Guidelines for Submitting NERC Reliability Standards Required Documents to the SPP Reliability Coordinator and the SPP Balancing Authority Version 1 Revision History Version Effective Date Summary of Revisions

More information

THE TRIPWIRE NERC SOLUTION SUITE

THE TRIPWIRE NERC SOLUTION SUITE CONFIDENCE: SECURED BUSINESS INTELLIGENCE SOLUTION BRIEF THE TRIPWIRE NERC SOLUTION SUITE A TAILORED SUITE OF PRODUCTS AND SERVICES TO AUTOMATE NERC CIP COMPLIANCE u u We ve been able to stay focused on

More information

Date adopted/approved 02/08/2013 Custodian (entity responsible for maintenance and upkeep) Data Exchange Work Group. Web URL: Previous name/number

Date adopted/approved 02/08/2013 Custodian (entity responsible for maintenance and upkeep) Data Exchange Work Group. Web URL: Previous name/number Document name Category Guideline for WECC Operations Network Node: Responsibilities and Procedures ( ) Regional Reliability Standard ( ) Regional Criteria ( ) Policy (X) Guideline ( ) Report or other (

More information

ERO Enterprise IT Projects Update

ERO Enterprise IT Projects Update ERO Enterprise IT Projects Update Stan Hoptroff, Vice President, Chief Technology Officer and Director of Information Technology Technology and Security Committee Meeting November 6, 2018 Agenda ERO IT

More information

Lesson Learned CIP Version 5 Transition Program CIP : Communications and Networking Cyber Assets Version: October 6, 2015

Lesson Learned CIP Version 5 Transition Program CIP : Communications and Networking Cyber Assets Version: October 6, 2015 Lesson Learned CIP Version 5 Transition Program CIP-002-5.1: Communications and Networking Cyber Assets Version: October 6, 2015 Authorized by the Standards Committee on October 29, 2015 for posting as

More information

EEI Fall 2008 Legal Conference Boston, Massachusetts Stephen M. Spina November 1,

EEI Fall 2008 Legal Conference Boston, Massachusetts Stephen M. Spina November 1, EEI Fall 2008 Legal Conference Boston, Massachusetts Stephen M. Spina November 1, 2008 www.morganlewis.com Overview Reliability Standards Enforcement Framework Critical Infrastructure Protection (CIP)

More information

Violation Risk Factor and Violation Severity Level Justifications Project Modifications to CIP Standards

Violation Risk Factor and Violation Severity Level Justifications Project Modifications to CIP Standards Violation Risk Factor and Violation Severity Level Justifications Project 2016-02 Modifications to CIP Standards This document provides the standard drafting team s (SDT s) justification for assignment

More information

Disclaimer Executive Summary Introduction Overall Application of Attachment Generation Transmission...

Disclaimer Executive Summary Introduction Overall Application of Attachment Generation Transmission... CIP-002-4 Cyber Security Critical Cyber Asset Identification Rationale and Implementation Reference Document September, 2010 Table of Contents TABLE OF CONTENts Disclaimer... 3 Executive Summary... 4 Introduction...

More information

Data Security and Privacy Principles IBM Cloud Services

Data Security and Privacy Principles IBM Cloud Services Data Security and Privacy Principles IBM Cloud Services 2 Data Security and Privacy Principles: IBM Cloud Services Contents 2 Overview 2 Governance 3 Security Policies 3 Access, Intervention, Transfer

More information

Purpose. ERO Enterprise-Endorsed Implementation Guidance

Purpose. ERO Enterprise-Endorsed Implementation Guidance Lesson Learned CIP Version 5 Transition Program CIP-002-5.1 Requirement R1: Impact Rating of Generation Resource Shared BES Cyber Systems Version: January 29, 2015 Authorized by the Standards Committee

More information

Standard CIP-006-3c Cyber Security Physical Security

Standard CIP-006-3c Cyber Security Physical Security A. Introduction 1. Title: Cyber Security Physical Security of Critical Cyber Assets 2. Number: CIP-006-3c 3. Purpose: Standard CIP-006-3 is intended to ensure the implementation of a physical security

More information

Symantec Security Monitoring Services

Symantec Security Monitoring Services 24x7 real-time security monitoring and protection Protect corporate assets from malicious global threat activity before it impacts your network. Partnering with Symantec skilled and experienced analysts

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective.

This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Description of Current Draft

More information

DISASTER RECOVERY PRIMER

DISASTER RECOVERY PRIMER DISASTER RECOVERY PRIMER 1 Site Faliure Occurs Power Faliure / Virus Outbreak / ISP / Ransomware / Multiple Servers Sample Disaster Recovery Process Site Faliure Data Centre 1: Primary Data Centre Data

More information

CIP Cyber Security Configuration Management and Vulnerability Assessments

CIP Cyber Security Configuration Management and Vulnerability Assessments Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed

More information

Ransomware A case study of the impact, recovery and remediation events

Ransomware A case study of the impact, recovery and remediation events Ransomware A case study of the impact, recovery and remediation events Peter Thermos President & CTO Tel: (732) 688-0413 peter.thermos@palindrometech.com Palindrome Technologies 100 Village Court Suite

More information

ClearPath OS 2200 System LAN Security Overview. White paper

ClearPath OS 2200 System LAN Security Overview. White paper ClearPath OS 2200 System LAN Security Overview White paper Table of Contents Introduction 3 Baseline Security 3 LAN Configurations 4 Security Protection Measures 4 Software and Security Updates 4 Security

More information

B O N N E V I L L E A D M I N I S T R A T I O N B O N N E V I L L E P O W E R A D M I N I S T R A T I O N

B O N N E V I L L E A D M I N I S T R A T I O N B O N N E V I L L E P O W E R A D M I N I S T R A T I O N B O N N E V I L L E A D M I N I S T R A T I O N B O N N E V I L L E P O W E R A D M I N I S T R A T I O N NERC Monitoring and Situational Awareness Conference Bonneville Power Administration Self-Monitoring:

More information

CIP Cyber Security Recovery Plans for BES Cyber Systems

CIP Cyber Security Recovery Plans for BES Cyber Systems A. Introduction 1. Title: Cyber Security Recovery Plans for BES Cyber Systems 2. Number: CIP-009-5 3. Purpose: To recover reliability functions performed by BES Cyber Systems by specifying recovery plan

More information

CIP Version 5 Evidence Request User Guide

CIP Version 5 Evidence Request User Guide CIP Version 5 Evidence Request User Guide Version 1.0 December 15, 2015 NERC Report Title Report Date I Table of Contents Preface... iv Introduction... v Purpose... v Evidence Request Flow... v Sampling...

More information

BUILDING AND MAINTAINING SOC

BUILDING AND MAINTAINING SOC BUILDING AND MAINTAINING SOC Digit Oktavianto KOMINFO 7 December 2016 digit dot oktavianto at gmail dot com 1 Digit Oktavianto Profile in 1 Page Currently working as a Security Architect Professional Certifications:

More information

Technical Questions and Answers CIP Version 5 Standards Version: June 13, 2014

Technical Questions and Answers CIP Version 5 Standards Version: June 13, 2014 Technical s and s CIP Version 5 Standards Version: June 13, 2014 This document is designed to convey lessons learned from NERC s various activities. It is not intended to establish new requirements under

More information

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure

More information

Physical Security Reliability Standard Implementation

Physical Security Reliability Standard Implementation Physical Security Reliability Standard Implementation Attachment 4b Action Information Background On March 7, 2014, the Commission issued an order directing NERC to submit for approval, within 90 days,

More information

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE INTRODUCTION In line with commercial industry standards, the data center used by EndNote employs a dedicated security team to protect our

More information

SOUTH TEXAS ELECTRIC COOPERATIVE, INC.

SOUTH TEXAS ELECTRIC COOPERATIVE, INC. SOUTH TEXAS ELECTRIC COOPERATIVE, INC. P.O. Box 119 Nursery, Texas 77976 (361) 575-6491 Fax (361) 576-1433 Transmission Interconnection Requirements Table of Contents I. Introduction II. Interconnection

More information

IBM Security Intelligence on Cloud

IBM Security Intelligence on Cloud Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients

More information

Information Technology General Control Review

Information Technology General Control Review Information Technology General Control Review David L. Shissler, Senior IT Auditor, CPA, CISA, CISSP Office of Internal Audit and Risk Assessment September 15, 2016 Background Presenter Senior IT Auditor

More information

TOP-010-1(i) Real-time Reliability Monitoring and Analysis Capabilities

TOP-010-1(i) Real-time Reliability Monitoring and Analysis Capabilities A. Introduction 1. Title: Real-time Reliability Monitoring and Analysis Capabilities 2. Number: TOP-010-1(i) 3. Purpose: Establish requirements for Real-time monitoring and analysis capabilities to support

More information

NW NATURAL CYBER SECURITY 2016.JUNE.16

NW NATURAL CYBER SECURITY 2016.JUNE.16 NW NATURAL CYBER SECURITY 2016.JUNE.16 ADOPTED CYBER SECURITY FRAMEWORKS CYBER SECURITY TESTING SCADA TRANSPORT SECURITY AID AGREEMENTS CONCLUSION QUESTIONS ADOPTED CYBER SECURITY FRAMEWORKS THE FOLLOWING

More information

Standard CIP 007 3a Cyber Security Systems Security Management

Standard CIP 007 3a Cyber Security Systems Security Management A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-3a 3. Purpose: Standard CIP-007-3 requires Responsible Entities to define methods, processes, and procedures for

More information

NERC-Led Technical Conferences

NERC-Led Technical Conferences NERC-Led Technical Conferences NERC s Headquarters Atlanta, GA Tuesday, January 21, 2014 Sheraton Phoenix Downtown Phoenix, AZ Thursday, January 23, 2014 Administrative Items NERC Antitrust Guidelines

More information

PretaGov Australia SaaS Hosting with Fully Managed Services, Support and Maintenance

PretaGov Australia SaaS Hosting with Fully Managed Services, Support and Maintenance PretaGov Australia SaaS Hosting with Fully Managed Services, Support and Maintenance Introduction to PretaGov PretaGov operates a Government Community Plone CMS (content management system) SaaS Cloud exclusively

More information

Cybersecurity Overview

Cybersecurity Overview Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where

More information

JEA Lessons Learned?

JEA Lessons Learned? JEA Lessons Learned? $ whoami Daniel D. Mishra JEA Director of CIP Compliance mishdd@jea.com Electric Utility Experience 20 years Critical Infrastructure Experience 10 Years Specialization Innovative and

More information

Designing Secure Remote Access Solutions for Substations

Designing Secure Remote Access Solutions for Substations Designing Secure Remote Access Solutions for Substations John R Biasi MBA, CISA, CISSP October 19, 2017 Agenda Brief Biography Interactive Remote Access Dial-Up Access Examples Transient Devices Vendor

More information