May SCADA Testbed Cyber-Security Evaluation. Iowa State University. Advisor: Members: Manimaran Govindarasu

Size: px
Start display at page:

Download "May SCADA Testbed Cyber-Security Evaluation. Iowa State University. Advisor: Members: Manimaran Govindarasu"

Transcription

1 Iowa State University SCADA Testbed Cyber-Security Evaluation Members: Justin Fitzpatrick Rafi Adnan Michael Higdon Ben Kregel Advisor: Manimaran Govindarasu May 1013

2 Project Overview Problem/Need statement Since the early 90 s, experts have become more and more concerned about the threat of cyber attacks on the supervisory control and data acquisition (SCADA) systems used to monitor and manage infrastructure systems. Most SCADA system designs from the past never anticipated the security threats which exist today. SCADA systems are designed to provide an efficient solution to monitoring, regulation and control of various utilities. These systems compose a significant portion of the nation s infrastructure and they are a potential target of attack for this reason. With many of the SCADA systems being significantly dated, security was little concern prior to today s internet age. For this reason most control systems are open to attack from the outside. Design and implementation of SCADA test beds for use in security evaluation, testing and simulations is necessary to guarantee the safety of our critical infrastructure and utilities. A SCADA network consists of three major components and levels of abstraction. A control center and all the resources contained within is used to process data required to operate field devices. Field devices do not make decisions. They merely report data to the control centers via communication methods and receive instructionss based on the parameters of control software. Control Center RTU Relays The high level diagram pictured below is an illustration of how the hierarchy of the SCADA network is configured. Each element serves a specific purpose. Objective Critical infrastructure systems, such as electric power grid and water distribution systems, use SCADA (Supervisory Control and Data Acquisition) system for varieties of sensing, decision making, and control associated with real-time operation of the infrastructure systems. Cyber security of SCADA and hence critical infrastructure systems is a timely R&D challenge due to growing concerns for cyber attacks. The ECpE department at ISU has acquired SCADA system with necessary security software/hardware to setup a SCADA-Security Testbed. The testbed will be used to conduct attack-defenstheir potential impacts on the performancee and stability of the power system. The basic version of the testbed is already exercises to study the various vulnerabilities of SCADA systems and running. The goal of the project is to integrate real-time power system simulation capabilities into the SCADA testbed, and conduct cyber attack-defense evaluations on the integrated system.

3 Hierarchy of our project/system In a high-level sense, the objective was broken into several different, smaller projects. Due to the large scale of the final goal, keeping a focus on many of the smaller, individual pieces of the project proved to be of benefit to the group. Viewing each task or smaller project as an experiment, the group was able to tackle each problem individually. Taking a close look at each particular element of the project allowed the group to organize our time, efforts and other resources in an efficient manner. Accomplishing one experiment at a time, the group was able to build upon a solid foundation. Experiments (Stages) Experiment 1 System Familiarization The following are all pieces which lead to the overall operation and understating of the SCADA test bed. Siemens PowerTG Modes and Launch The following control panel can be used to specify the different modes and operation for the Siemens software. Initially, this host mode panel can be launched by double-clicking the PowerTG icon seen in the taskbar. The logo icon displayed in the taskbar is representative of the mode in which the system database is operating. In illustration below, the database is running in primary mode. Alternate modes of operation would be DTS or Stop for example. Selecting the Start Workstation button will launch the PowerTG workstation interface. Siemens Power TG Operations Index This can be regarded as the Intro or Home screen for the use of a Siemens PowerTG workstation. Upon logging in, this screen seen below will be the first presented to the user. It may be returned to at any point in time.

4 This operations index panel is the heart of an operational SCADA system. It allows the user to configure and monitor all aspects of the system. The page is useful for a system engineer to set alarms, view historical data and view live system statistics. Alarms can be set to warn the user in case of certain circumstances. In the case of over-currents, voltage derivations, outages and faults, alarms can be displayed to the user. These indications represent live data in the field, which may be undesired activity. Trending can be used to monitor the performance or characteristics of the system with respect to time. Graphs, plots and statistics can be used to give the user a visual and quantitative representation of the activity going on elsewhere on the power grid. For example, one might find a graph to display increasing current trends on a warm summer day. System Maintenance Index Following a similar pattern to that of the Operations Index, the System Maintenance Index is used to establish changes to the configuration of the system. A system engineer can use this panel to monitor a greater portion of the system devices and functionality.

5 Local settings such as the display board, console and printer can be found in the Equipment column. These parameters simply change preferences for the user. DNP Server As part of understanding our Test bed, we have to look into the communication protocols used by the different systems. One of which is the Distributed Network Protocol (DNP). Its primary use is in communication between the master station and the rest of the remote terminal units (RTUs), intelligent electronic devices (IEDs) etc. Among other things, DNP provides multiplexing, data fragmentation, error checking, link control and prioritization. These properties help create a more robust and reliable network connection between all the devices. Setting up the DNP server in SICAM Since this is a very important aspect of the SCADA system, proper understanding of it is quite crucial. Fortunately its application, for our part, is quite simple and entails setting up the server at each of the substation computers and making sure the master station can communicate the substation DNP server and poll for data from the RTUs. This is done with the help of the SICAM software and making sure the SCALANCE devices are working properly. By the end, upon reading our guide a user will be able to easily set up a DNP server and get a network up and running between the workstations and the RTUs. The DNP server is up and running

6 Databases The PowerTG Source Database (SDB) is an integral part of the PowerTG software. It contains definitions for everything from network information to host system configurations. Setting up stations in the SDB client The database is manipulated using the SDB client and all the information is stored in the SDB server. A basic setup of PowerTG requires the following information to be set up: Define all the stations Define RTUs at each station Define the network over which the system communicates Define individual computers that make up the system Define PowerTG host systems Define HMI consoles Define RTU communication servers After setting up these basic elements, you have to perform a database installation to transfer this information to the PowerTG real time database.

7 Setting up an RTU in the SDB client Our guides will contain a detailed yet brief look into carrying out all these steps including setting up communication lines, creating substations, defining RTU status/control points etc. After going through our guide the user will be able to set up their own complete system and carry out their own set of experiments on the SCADA test bed. The guide will contain an index of glossary, step by step configuration of each element with pictures and diagrams to help out at each step. The guides will be modularized enough so that any individual component will be able to stand on its own and yet be relevant to the rest of the system. Installing the information to the real time database

8 Experiment 2 At this stage of our project, we hope to have a basic and initial set up of our test bed. This would include all the RTUs, substations and master stations working properly and have them all interconnected using simple TCP/IP without any sort of firewall or security devices. This is to ensure at minimum reliable and proper test bed operations allowing us to conduct our later experiments which will include higher level security and attack/defense exercises Host 1 Host 2 WWW Relay 1 Relay Sicam 2 Sicam Topology of a basic networked SCADA system Topology The figure above shows a simple topology of the system. Each host, substation and remote terminal units will be connected to the internet and will be able to communicate with each other and as well as with devices from outside, which is a bad thing. After setting them up we can perform simple tests, such as closing and tripping circuits at the RTUs using the host systems and collecting analog data from them as well.

9 Closing a circuit breaker on a relay We believe with a proper and thorough understanding of the system from Experiment 1 will allow users to easily and quickly set up this system and move on to the next Experiments in our design process. Overview of the RTUCS, comm lines and RTUs Deliverables Deliverables for this stage will contain guides on how to accomplish the following tasks: Initial network hardware setup o Host systems o Database management o Substation and RTU configuration o Switches, Ethernet etc.

10 Internetwork communication o PowerTG to substation and back o Substations to RTUs and back Testing In addition to the previous, our guide will also contain a section on how to troubleshoot and test the final system. This will include simple exercises on how to connect to the DNP server and trip specific RTU led units. Experiment 3 Security Devices The SCALANCE devices are designed to protect individual devices or even entire automation cells from data espionage, data manipulation and unauthorized access. Security features available to us Firewall o IP firewall with stateful packet inspection o Bandwidth limitation Communication made secure by IPsec tunnels o SCALENCE devices are configured to form groups These groups can communicate securely with each other through these tunnels. Can also use SOFTNET Security Client to use establish secure IPsec tunnel communication in the VPN (Virtual Private Network). Protocol-independent o Both IP and non-ip frames are transmitted through the IPsec tunnel Router Mode o The SCALENCE device becomes a router that separates the internal network from the external network. The internal network becomes a separate subnet. Protection for devices and network segments o The firewall and VPN protective function can be applied to the operation of single devices, several devices, or entire network segments. No repercussions when included in flat networks o Just plug the SCALENCE device in and it will automatically find all the internal nodes, with no configuration required to nodes.

11 Our Current Setup - Tunneling Diagram Tunneling Please not that our groups project file for tunneling is located on the computer WORKSTATION in C:\Program Files\siemens\Security_Configuration_Tool\Projects\VPN\. Load this and transfer to all modules and you will have our current setup. ( see tunneling diagram) The following diagram shows what the SIEMENS Security Configuration Tool will show for our tunneling setup.

12 SCALANCE S (Tunneling) in productive operation The configuration is commissioned and the three SCALANCE S modules can now establish a communication tunnel over which network nodes from the two internal networks can communicate (green dashed line in diagram). No other communication can come from the outside network nor can anything in the tunnel talk to an external node outside the tunnel. You can only talk between SCALANCE devices. You can however set up IP address rules to allow other computers from the outside the network. Pretty much the same as just using the SCALANCE device as a firewall, except you do not have to set up all the IP address rules. SCALANCE Modules Tunneling Vulnerabilities The nice thing about the firewall is, only the rules set by the user are allowed through the SCALANCE devices. Substation 1 does not talk to Substation 2. This is good so that if one of the SCALANCE devices was compromised, it does not compromise both substations. This limits the amount of traffic between the certain SCALANCE devices as well and could improve performance All data being sent through the tunnel is encrypted even when going on the external network to get to the next SCALANCE device. Testing the tunnel function Testing phase 1 (All computers between each SCALANCE Module) 1. Enter the Ping command from Host 1( ) to SICAM 1 ( ) You will then receive the following message:

13 Result: You should see the Sent packets at 4 and the received packets at This means that since no other communication is permitted, these packets must have been transported through the VPN tunnel. 3. You can check all other nodes behind each SCALANCE device. Each node behind each SCALANCE device should be able to talk to the other nodes behind SCALANCE devices. Tunneling Test phase 2 (Computers outside the tunnel, on an external network) 1. Enter the Ping command from the outside computer to SICAM 1 ( ) You will then receive the following message: Result: You should see the Sent packets at 4 and the received packets at This means that the IP frames from the outside computer did not reach SICAM 1 since neither tunnel communication between these two devices is configured nor is normal IP data traffic permitted. A device inside the tunnel cannot talk to an outside computer not in the tunnel. Firewall In the firewall, IP traffic can only be initiated from the internal network; only the response is permitted from the external network. Please note that our groups project file for firewall is located on the computer WORKSTATION in C:\Program Files\siemens\Security_Configuration_Tool\Projects\firewall\. Load this and transfer to all modules and you will have our current setup. (see diagram)

14 Firewall setup diagram The following diagram shows what the SIEMENS Security Configuration Tool will show for our tunneling setup.

15 Configuring the firewall 1. The following are the rules needed for SUB1 to communicate to all other nodes necessary. 2. The following are the rules needed for SUB2 to communicate to all other nodes necessary. 3. The following are the rules needed for CONTROL to communicate to all other nodes necessary. SCALANCE S in productive operation The configuration has now been commissioned and the three SCALANCE S modules are now protecting the internal network with the firewall according to the configured rules. The rules are shown above and follow the diagram for who can communicate with who. Basically CONTROL SUB1 and CONTROL SUB2 Tunneling Vulnerabilities Since the SCALANCE devices are set up to tunnel Substation 1 can talk to Substation 2, which in a real world application, this would not be the case since there is no need for that.

16 This could cause vulnerabilities if somebody got into the tunnel because then it would compromise the whole network since the tunnel would let it talk to anybody inside the tunnel. o This can be fixed by creating 2 separate tunnels. 1 for CONTROL SUB1 and 1 for CONTROL SUB2 There is no way to encrypt the data being sent in this method. All data sent over the external network is not encrypted and could be sniffed if done correctly. Testing the firewall function Testing phase 1 (All computers between each SCALANCE Module) 1. Enter the Ping command from Host 1 to SICAM 1 (IP address ) You will then receive the following message: Result: You should see the Sent packets at 4 and the received packets at Due to the configuration, the ping packets can pass from the internal network to the external network. The PC in the external network has replied to the ping packets. Due to the "stateful inspection" function of the firewall, the reply packets arriving from the external network are automatically passed into the internal network. 3. This test will work for all IP rules set above. You can test each one. Test phase 2 (Computers outside the tunnel, on an external network) 1. Enter the Ping command from the outside computer to SICAM 1 ( ) You will then receive the following message: Result: You should see the Sent packets at 4 and the received packets at 0.

17 2. The IP packets from the outside computer must not reach SICAM 1 since the data traffic from the "internal network" (SICAM 1) to the "external network" (outside computer) is not permitted. 3. This will be the same for any computer not set in the above IP rules. NAT (Network Address Translation) Router Mode 1. The common use case in which all internal nodes send packets to the external network and keep their IP addresses hidden by the NAT functionality is preconditioned on the SCALANCE S. 2. This could be used for each SCALANCE device so that the IP addresses would be hidden of each node behind the SCALANCE device. 3. This would make it a little harder to sniff the data since it is not encrypted in this method. 4. We will be learning more about this method throughout the implementation part of the project. Checking to make sure the test bed works The major test of both all 3 of the methods above is: 1. We need to make sure RTUs. the 2 RTUs connect to the DNP server which gives us the ability to trip the a. This can be tested by logging onto the Power TG software and tripping the relays. b. The light should turn red as show in the picture below. If it does, you have configured everything correctly. c. As an example for Relay 1, IP 201 should talk to 217 when pinging 2. Make sure you cannot talk to the external network based on the rules you set forth or the tunnels you have set up. Along with this making sure all unauthorized connectionsare blocked. Checking status of SCALANCE Modules One of the things you can do is log the packets coming in and out of the SCALANCE device Allows you to see what is coming in and out of the SCALANCE device and what is actually being blocked. This allows you to see if someone from the outside is trying to get to your nodes behind the SCALANCE.

18 SCALANCE Device Summary Ideally we would use a combination of all these 3 methods. Each has their own benefits and flaws. When implementing this we have to make sure the testbed is set up like a real world situation. As of now everything is talking to each other the way they should be and we will be starting with the basics and trying to hack into that and then working our way up to higher security. Experiment 4 - Adjustable load on Relays Relay Overview The SIPROTEC series relays being used on this SCADA test bed are flexible and have the ability to serve in a variety of applications across the system. Primarily, relays are used on a power distribution network to open and close loads or various branches of the power grid. The Siemens SIPROTEC 7SJ61 relay modules have the ability to monitor current flow on all three phases of whatever particular node they may be connected to. Above is an illustration of a Siemens relay monitoring a distribution line. Current Monitoring Monitoring current becomes the secondary focus and implementation of these relays. Data can be logged from the activity of the relay as an analog point of the live performance. An analog point simply becomes a variable of some particular characteristic within the test bed. Say, current at a particular branch of a long three-phase transmission line, or the phase voltage at the end of a lengthy span of conductor.

19 Above is a relay on the test bed displaying data from a single analog point. A constant load has been connected to this relay, drawing a current of 5 amps. Deliverables In this scenario, the practice of over current protection will be the focus of our efforts. In the field, transmission lines are subject to handling excess amounts of current in times of high load demand or weather conditions. As a result, equipment can be damaged, transmission lines can heat up to levels compromising the reliability of the grid. To protect against these potentially harmful or dangerous situations, relays can release load from the distribution network, helping preserve the integrity of the grid. Modeling in PowerTG Data from the analog points of a relay can be monitored from within the Siemens PowerTG software. Naturally, an engineer on a regional power grid is going to use such relays to report data and protect their infrastructure. Over currents can be monitored in real-time, and set to be rapidly acted upon. In this case, we will be opening relays whose lines exceed chosen current values.

20 Above is a large scale representation of the analog points which a PowerTG control center can be monitoring. In a fully configured system, the values would not read 0. Above is a screenshot indicating two circuit breakers indicated by CBA 1 and CBA 2 contained within a single relay. These both display status trip which means that they have been opened by the PowerTG software for reasons related to protecting the system. Execution of action

21 Above is another screenshot displaying some configuration parameters from the PowerTG database. This particular configuration indicates how a section of the relay is currently configured to remain in a tripped or closed state based on a monitored analog point. Testing A simple method of testing can be used in the scenarios of a SCADA test bed such as the model used in this design project. With a fully functional network of equipment, it is unnecessary to have relays connected to an actual power transmission line to verify the switching and protection of an over current. Although actual testing procedures have not yet taken place, it is an intended focus of the Spring 2010 semester. In principle, the testing on our test bed will be composed of introducing a variable load to a relay. The load will be selectable and can range in value. Initially, a small load can be subjected to the relay. Slowly, load can be increased to such a level that the relay will execute an opening, or trip action as defined in PowerTG parameters. When the observed load exceeds this current threshold, the action will take place. Implementing such a test can be done by using some simple components and Electrical Engineering principles. We will be designing a panel containing perhaps a half dozen resistors. In this case, simple 100 watt light bulbs will suffice adequately. With a light switch in series with each bulb, current ranging from 0 to 5 amps can be produced when connected to a 120v source. Experiment 5 The final stage of our project consists of the security evaluation of our SCADA testbed. All 4 previous experiments have lead to the development of an operational, small-scale SCADA network. The primary goals of this evaluation will be to conduct an investigation into Critical Infrastructure Protection (CIP) protocol standards to determine whether our SCADA network adheres to these standards and if not, how can the system be modified to do so? The secondary objective will be to examine various types of known attack schemes and determine if any of them can be used effectively to compromise our SCADA network. In conjunction with this effort our team will also examine the SCADA system and software to determine if any security vulnerabilities exist which could potentially be exploited. Criticial Infrastructure Protection (CIP) Compliance The North American Electric Reliability Corporation (NERC) defines the reliability requirements for operation of bulk power systems such as those that might be controlled by our SCADA network testbed. The CIP standards, and their explanations as taken from NERC, consist of 9 requirements that all bulk power operators are required to follow: CIP-001-1: Purpose: CIP-002-2: Purpose: Sabotage Reporting Disturbances or unusual occurrences, suspected or determined to be caused by sabotage, shall be reported to the appropriate systems, governmental agencies and regulatory bodies. Critical Cyber Asset Identification Provide a framework for the identification and protection of Critical Cyber Assets to support reliable operation of the Bulk Electric System. Management and maintenance of Bulk Electric Systems relies on communication between Cyber Assets that support critical reliability functions and process. Development of a risk-based methodology to identify and document Critical Cyber Assets.

22 CIP-003-2: Purpose: CIP-004-2: Purpose: CIP-005-2: Purpose: CIP-006-2: Purpose: CIP-007-2: Purpose: CIP-008-2: Purpose: CIP-009-2: Purpose: Security Management Controls Development and documentation of a security policy that addresses the issues of cyber security policy exceptions, information protection and access control. Personnel & Training Establishment, documentation, implementation and maintenance of a security awareness program to ensure that personnel having authorized cyber or authorized unescorted physical access to Critical Cyber Assets, including contractors and service vendors, have an appropriate level of personnel risk assessment, training, awareness of security practices. Electronic Security Perimeter(s) Identification and protection of the Electronic Security Perimeter(s) inside which all Critical Cyber Assets reside, as well as access points on the perimeter. This evaluation should include an assessment of cyber vulnerability at access points as well as electronic access controls and monitoring of these access control mechanism. Physical Security of Critical Cyber Assets Establishment of a physical security program for the protection of Critical Cyber Assets. The Physical Security Plan should include documentation of physical access points, protection physical and electronic access control systems, monitoring and protection of physical access controls, and logging of physical access. Systems Security Management Definition of methods, processes, and procedures for securing those systems determined to be Critical Cyber Assets, as well as the other (non-critical) Cyber Assets within the Electronic Security Perimeter(s). Process and procedures should include port and service necessity, security patch management, malicious software prevention, account management, security status monitoring, and vulnerability assessment. Incident Reporting and Response Planning Identification, classification, response, and reporting of Cyber Security Incidents related to Critical Cyber Assets, including but not limited to an Incident Response Plan consisting of procedures to classify incidents, response actions, communication plans, reporting incidents and updating and ensuring the Incident Response Plan. Recovery Plans for Critical Cyber Assets Ensure that recovery plan(s) are put in place for Critical Cyber Assets and that these plans follow established business continuity and disaster recovery techniques and practices. Recovery plans should plans and procedures for response actions, exercising/drilling of the plan, making changes, and backup and restoration of information used to restore Critical Cyber Assets. CIP Compliance Evaluation During our security evaluation we will use the CIP Standard documents from the NERC website to take a detailed look at which requirements our SCADA network and lab adhere to as well as where the holes are and how they can be

23 modified. We will look to determine where the requirements leave the electronic realm and begin to enter the physical. Additionally, we plan to employ the Cyber Security Evaluation Tool (CSET) development by the Department of Homeland Security US-CERT. The purpose of the software is guide the user through a step-by-step process to evaluate the control system security practices against industry standards. This software incorporates standards from organizations such as NIST and NERC; our hope in using this software is to gain additional insight into industry standard control system security best practices. Attack Development After our evaluation of the SCADA testbed with respect to CIP compliance our focus will move more towards software and network security. While some of these concerns are addressed in CIP-007-2, Systems Security Management, the reliability standard does not seem to completely cover the topic. The main goal of this phase of the security evaluation will be to look mainly at network and some software level attacks that could potentially be deployed against our SCADA network. At the same time we will be examining the Siemens software looking for potential security vulnerabilities within the software. What follows is a few broad categories characterizing attacks we hope to develop and deploy: Denial-of-Service Prevent access to a network resource using various DoS attack schemes Invalid Data Sending packets into the network with invalid headers or data Physical Attacks Attacks to network connections or physical devices Remote Access Targeting applications and protocols used to remotely access devices and software Information Theft obtaining information using network traffic sniffing or social engineering Social Engineering Development of social engineering based access scenarios Testing Testing the effectiveness of these various attacks would be relatively simply and consist mainly of the development and execution of attacks against the SCADA network. It is likely that we will relax some of the security settings on our system in order to prove that an attack works without security measures in place and fails with security in place. Follow-up The last element of this phase will be an examination of any vulnerabilities discovered during the evaluation process. If software or network vulnerabilities are found then we will determine the risk presented by the vulnerabilities and look for solutions to correct the problem presented.

i-pcgrid WORKSHOP 2016 INTERACTIVE REMOTE ACCESS

i-pcgrid WORKSHOP 2016 INTERACTIVE REMOTE ACCESS i-pcgrid WORKSHOP 2016 INTERACTIVE REMOTE ACCESS siemens.com/ruggedcom INTERACTIVE REMOTE ACCESS INTELLIGENT ELECTRONIC DEVICES Intelligent Electronic Devices (IEDs) Devices that can provide real-time

More information

Security Standards for Electric Market Participants

Security Standards for Electric Market Participants Security Standards for Electric Market Participants PURPOSE Wholesale electric grid operations are highly interdependent, and a failure of one part of the generation, transmission or grid management system

More information

Iowa State University

Iowa State University Iowa State University Cyber Security Smart Grid Testbed Senior Design, Final Report Dec 13-11 Derek Reiser Jared Pixley Rick Sutton Faculty Advisor: Professor Manimaran Govindarasu 1 Table of Contents

More information

Cyber Threats? How to Stop?

Cyber Threats? How to Stop? Cyber Threats? How to Stop? North American Grid Security Standards Jessica Bian, Director of Performance Analysis North American Electric Reliability Corporation AORC CIGRE Technical Meeting, September

More information

How AlienVault ICS SIEM Supports Compliance with CFATS

How AlienVault ICS SIEM Supports Compliance with CFATS How AlienVault ICS SIEM Supports Compliance with CFATS (Chemical Facility Anti-Terrorism Standards) The U.S. Department of Homeland Security has released an interim rule that imposes comprehensive federal

More information

Automation Services and Solutions

Automation Services and Solutions Automation Services and Solutions Automate substation data acquisition and control to improve performance Maintain uninterrupted power services with proactive grid monitoring and controlling features.

More information

Chapter X Security Performance Metrics

Chapter X Security Performance Metrics DRAFT February 19, 15 BES Security s Working Group Page 1 of 7 Chapter X Security Performance s 1 3 3 3 3 0 Background The State of Reliability 1 report noted that the NERC PAS was collaborating with the

More information

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for

More information

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

CIP Cyber Security Configuration Change Management and Vulnerability Assessments Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information

Standard Development Timeline

Standard Development Timeline Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard is adopted by the NERC Board of Trustees (Board).

More information

Intro to the NERC/NIPC Indications, Analysis & Warnings Program

Intro to the NERC/NIPC Indications, Analysis & Warnings Program Intro to the NERC/NIPC Indications, Analysis & Warnings Program (IAW Program - Electric Power Sector) Before Seeing this Presentation, Make Sure Everyone Has a Copy of Each of the Following: Job Aid (NIPC

More information

Securing Industrial Control Systems

Securing Industrial Control Systems L OCKHEED MARTIN Whitepaper Securing Industrial Control Systems The Basics Abstract Critical infrastructure industries such as electrical power, oil and gas, chemical, and transportation face a daunting

More information

Chapter X Security Performance Metrics

Chapter X Security Performance Metrics Chapter X Security Performance Metrics Page 1 of 10 Chapter X Security Performance Metrics Background For many years now, NERC and the electricity industry have taken actions to address cyber and physical

More information

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES 002 5 R1. Each Responsible Entity shall implement a process that considers each of the following assets for purposes of parts 1.1 through 1.3: i. Control Centers and backup Control Centers; ii. Transmission

More information

Control Systems Cyber Security Awareness

Control Systems Cyber Security Awareness Control Systems Cyber Security Awareness US-CERT Informational Focus Paper July 7, 2005 Produced by: I. Purpose Focus Paper Control Systems Cyber Security Awareness The Department of Homeland Security

More information

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

CIP Cyber Security Configuration Change Management and Vulnerability Assessments CIP-010-2 3 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:

More information

Firewalls (IDS and IPS) MIS 5214 Week 6

Firewalls (IDS and IPS) MIS 5214 Week 6 Firewalls (IDS and IPS) MIS 5214 Week 6 Agenda Defense in Depth Evolution of IT risk in automated control systems Security Domains Where to put firewalls in an N-Tier Architecture? In-class exercise Part

More information

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS NERC CIP VERSION 6 COMPLIANCE BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements

More information

ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT

ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT ENERGY AUTOMATION - SMART GRID Restricted Siemens AG 20XX All rights reserved. siemens.com/answers Frederic Buchi, Energy Management Division, Siemens AG Cyber

More information

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010 Standard CIP 011 1 Cyber Security Protection Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes

More information

Substation automation products. MicroSCADA Pro for substation automation

Substation automation products. MicroSCADA Pro for substation automation Substation automation products for substation automation Perfect control anywhere, anytime is an investment for today and tomorrow. Start, for instance, with monitoring or gateway functionality and integrate

More information

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on April 16, 2018 15:41 PM O verview 1 90% Compliance About PCI DSS 2.0 PCI-DSS is a legal obligation mandated not by government

More information

Digital Substation Unrestricted Siemens AG 2017 siemens.com/digital-substation

Digital Substation Unrestricted Siemens AG 2017 siemens.com/digital-substation Digital Substation A Substation Why Should We Make It Digital? Adopt new business models Time to operation Quality assurance Business agility Avoid outages Investment security Ensuring grid availability

More information

PRACTICAL NETWORK DEFENSE VERSION 1

PRACTICAL NETWORK DEFENSE VERSION 1 PRACTICAL NETWORK DEFENSE VERSION 1 The world s premiere online practical network defense course elearnsecurity has been chosen by students in over 140 countries in the world and by leading organizations

More information

Toward Open Source Intrusion Tolerant SCADA. Trevor Aron JR Charles Akshay Srivatsan Mentor: Marco Platania

Toward Open Source Intrusion Tolerant SCADA. Trevor Aron JR Charles Akshay Srivatsan Mentor: Marco Platania Toward Open Source Intrusion Tolerant SCADA Trevor Aron JR Charles Akshay Srivatsan Mentor: Marco Platania Outline What is SCADA? SCADA Vulnerabilities What is Intrusion Tolerance? Prime PvBrowser Our

More information

Industrial Security - Protecting productivity. Industrial Security in Pharmaanlagen

Industrial Security - Protecting productivity. Industrial Security in Pharmaanlagen - Protecting productivity Industrial Security in Pharmaanlagen siemens.com/industrialsecurity Security Trends Globally we are seeing more network connections than ever before Trends Impacting Security

More information

AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID

AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID Sherif Abdelwahed Department of Electrical and Computer Engineering Mississippi State University Autonomic Security Management Modern

More information

DRAFT. Cyber Security Communications between Control Centers. March May Technical Rationale and Justification for Reliability Standard CIP-012-1

DRAFT. Cyber Security Communications between Control Centers. March May Technical Rationale and Justification for Reliability Standard CIP-012-1 DRAFT Cyber Security Communications between Control Centers Technical Rationale and Justification for Reliability Standard CIP-012-1 March May 2018 NERC Report Title Report Date I Table of Contents Preface...

More information

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

CIP Cyber Security Configuration Change Management and Vulnerability Assessments CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:

More information

Security Audit What Why

Security Audit What Why What A systematic, measurable technical assessment of how the organization's security policy is employed at a specific site Physical configuration, environment, software, information handling processes,

More information

Chapter X Security Performance Metrics

Chapter X Security Performance Metrics Chapter X Security Performance Metrics Page 1 of 9 Chapter X Security Performance Metrics Background For the past two years, the State of Reliability report has included a chapter for security performance

More information

AUTHORITY FOR ELECTRICITY REGULATION

AUTHORITY FOR ELECTRICITY REGULATION SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...

More information

Lesson Learned CIP Version 5 Transition Program

Lesson Learned CIP Version 5 Transition Program Lesson Learned CIP Version 5 Transition Program CIP-002-5: BES Cyber Assets Version: December 7, 2015 This document is designed to convey lessons learned from NERC s various CIP version 5 transition activities.

More information

Cyber Security and Substation Equipment Overview

Cyber Security and Substation Equipment Overview Cyber Security and Substation Equipment Overview Northeast Power Coordinating Council Task Force on Infrastructure Security & Technology s Cyber Security Workshop June 7 & 8, 2006 John Ciufo Alfred Moniz

More information

CIP Cyber Security Personnel & Training

CIP Cyber Security Personnel & Training A. Introduction 1. Title: Cyber Security Personnel & Training 2. Number: CIP-004-5.1 3. Purpose: To minimize the risk against compromise that could lead to misoperation or instability in the BES from individuals

More information

Technical Questions and Answers CIP Version 5 Standards Version: June 13, 2014

Technical Questions and Answers CIP Version 5 Standards Version: June 13, 2014 Technical s and s CIP Version 5 Standards Version: June 13, 2014 This document is designed to convey lessons learned from NERC s various activities. It is not intended to establish new requirements under

More information

Cyber security for digital substations. IEC Europe Conference 2017

Cyber security for digital substations. IEC Europe Conference 2017 Cyber security for digital substations IEC 61850 Europe Conference 2017 Unrestricted Siemens 2017 siemens.com/gridsecurity Substation Digitalization process From security via simplicity 1st generation:

More information

Industrial Defender ASM. for Automation Systems Management

Industrial Defender ASM. for Automation Systems Management Industrial Defender ASM for Automation Systems Management INDUSTRIAL DEFENDER ASM FOR AUTOMATION SYSTEMS MANAGEMENT Industrial Defender ASM is a management platform designed to address the overlapping

More information

Categorizing Cyber Systems

Categorizing Cyber Systems Categorizing Cyber Systems An Approach Based on BES Reliability Functions NERC Cyber Security Standards Drafting Team for Order 706 06/15/2009 Team CATEGORIZING CYBER SYSTEMS: AN APPROACH BASED ON IMPACT

More information

CYBER SECURITY POLICY REVISION: 12

CYBER SECURITY POLICY REVISION: 12 1. General 1.1. Purpose 1.1.1. To manage and control the risk to the reliable operation of the Bulk Electric System (BES) located within the service territory footprint of Emera Maine (hereafter referred

More information

Comprehensive Cyber Security Features in SIPROTEC & SICAM. SIPROTEC Dag 11. Mei 2017

Comprehensive Cyber Security Features in SIPROTEC & SICAM. SIPROTEC Dag 11. Mei 2017 Comprehensive Cyber Security Features in SIPROTEC & SICAM SIPROTEC Dag 11. Mei 2017 siemens.tld/keyword Changes to Substation Automation and Protection over Time Evolving Threat Landscape (tomorrow today...)

More information

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE s3security.com Security Professional Services S3 offers security services through its Security Professional Services (SPS) group, the security-consulting

More information

Cyber Security For Utilities Risks, Trends & Standards. IEEE Toronto March 22, Doug Westlund Senior VP, AESI Inc.

Cyber Security For Utilities Risks, Trends & Standards. IEEE Toronto March 22, Doug Westlund Senior VP, AESI Inc. Cyber Security For Utilities Risks, Trends & Standards IEEE Toronto March 22, 2017 Doug Westlund Senior VP, AESI Inc. Agenda Cyber Security Risks for Utilities Trends & Recent Incidents in the Utility

More information

Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure

Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure SESSION ID: SBX1-R07 Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure Bryan Hatton Cyber Security Researcher Idaho National Laboratory In support of DHS ICS-CERT @phaktor 16 Critical

More information

CIP Cyber Security Systems Security Management

CIP Cyber Security Systems Security Management A. Introduction 1. Title: Cyber Security System Security Management 2. Number: CIP-007-5 3. Purpose: To manage system security by specifying select technical, operational, and procedural requirements in

More information

ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS

ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS P. Fidry, V. Rakotomanana, C. Ausanneau Pierre.fidry@alcatel-lucent.fr Alcatel-Lucent, Centre de Villarceaux, 91620, Nozay, France Abstract: As a consequence of

More information

The Honest Advantage

The Honest Advantage The Honest Advantage READY TO CHALLENGE THE STATUS QUO GSA Security Policy and PCI Guidelines The GreenStar Alliance 2017 2017 GreenStar Alliance All Rights Reserved Table of Contents Table of Contents

More information

Grid Automation Products. MicroSCADA Pro Substation automation applications.

Grid Automation Products. MicroSCADA Pro Substation automation applications. Grid Automation Products Substation automation applications. 2 Substation automation applications Automate, control and optimize your operations. is an investment for today and tomorrow. Start, for instance,

More information

External Supplier Control Obligations. Cyber Security

External Supplier Control Obligations. Cyber Security External Supplier Control Obligations Cyber Security Control Title Control Description Why this is important 1. Cyber Security Governance The Supplier must have cyber risk governance processes in place

More information

PROTECTING MANUFACTURING and UTILITIES Industrial Control Systems

PROTECTING MANUFACTURING and UTILITIES Industrial Control Systems PROTECTING MANUFACTURING and UTILITIES Industrial Control Systems Mati Epstein Global Sales Lead, Critical Infrastructure and ICS [Internal Use] for Check Point employees 1 Industrial Control Systems (ICS)/SCADA

More information

Cybersecurity Overview

Cybersecurity Overview Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where

More information

Education Network Security

Education Network Security Education Network Security RECOMMENDATIONS CHECKLIST Learn INSTITUTE Education Network Security Recommendations Checklist This checklist is designed to assist in a quick review of your K-12 district or

More information

CIP-014. JEA Compliance Approach. FRCC Fall Compliance Workshop Presenter Daniel Mishra

CIP-014. JEA Compliance Approach. FRCC Fall Compliance Workshop Presenter Daniel Mishra CIP-014 JEA Compliance Approach FRCC Fall Compliance Workshop Presenter Daniel Mishra Acronyms & Terminologies DHS Department of Homeland Security JEA It s not an acronym JSO Jacksonville Sheriff's Office

More information

Why Should You Care About Control System Cybersecurity. Tim Conway ICS.SANS.ORG

Why Should You Care About Control System Cybersecurity. Tim Conway ICS.SANS.ORG Why Should You Care About Control System Cybersecurity Tim Conway ICS.SANS.ORG Events Example #1 Dec 23, 2015 Cyber attacks impacting Ukrainian Power Grid Targeted, synchronized, & multi faceted Three

More information

Potential Mitigation Strategies for the Common Vulnerabilities of Control Systems Identified by the NERC Control Systems Security Working Group

Potential Mitigation Strategies for the Common Vulnerabilities of Control Systems Identified by the NERC Control Systems Security Working Group Potential Mitigation Strategies for the Common Vulnerabilities of Control Systems Identified by the NERC Control Systems Security Working Group Submitted on behalf of the U.S. Department of Energy National

More information

Snort: The World s Most Widely Deployed IPS Technology

Snort: The World s Most Widely Deployed IPS Technology Technology Brief Snort: The World s Most Widely Deployed IPS Technology Overview Martin Roesch, the founder of Sourcefire and chief security architect at Cisco, created Snort in 1998. Snort is an open-source,

More information

Title. Critical Infrastructure Protection Getting Low with a Touch of Medium. CanWEA Operations and Maintenance Summit 2018.

Title. Critical Infrastructure Protection Getting Low with a Touch of Medium. CanWEA Operations and Maintenance Summit 2018. Critical Infrastructure Protection Getting Low with a Touch of Medium Title CanWEA Operations and Maintenance Summit 2018 January 30, 2018 George E. Brown Compliance Manager Acciona Wind Energy Canada

More information

Security Solutions. Overview. Business Needs

Security Solutions. Overview. Business Needs Security Solutions Overview Information security is not a one time event. The dynamic nature of computer networks mandates that examining and ensuring information security be a constant and vigilant effort.

More information

Standard Development Timeline

Standard Development Timeline Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard is adopted by the NERC Board of Trustees (Board).

More information

CIP Cyber Security Recovery Plans for BES Cyber Systems

CIP Cyber Security Recovery Plans for BES Cyber Systems A. Introduction 1. Title: Cyber Security Recovery Plans for BES Cyber Systems 2. Number: CIP-009-6 3. Purpose: To recover reliability functions performed by BES Cyber Systems by specifying recovery plan

More information

CIP Cyber Security Security Management Controls. A. Introduction

CIP Cyber Security Security Management Controls. A. Introduction CIP-003-7 - Cyber Security Security Management Controls A. Introduction 1. Title: Cyber Security Security Management Controls 2. Number: CIP-003-7 3. Purpose: To specify consistent and sustainable security

More information

CIP Cyber Security Personnel & Training

CIP Cyber Security Personnel & Training A. Introduction 1. Title: Cyber Security Personnel & Training 2. Number: CIP-004-6 3. Purpose: To minimize the risk against compromise that could lead to misoperation or instability in the Bulk Electric

More information

PowerCyber: CPS Security Testbed for Power Grid

PowerCyber: CPS Security Testbed for Power Grid Learn invent impact PowerCyber: CPS Security Testbed for Power Grid REMOTE ACCESS INTERFACE USER GUIDE Version 1.0 Funded jointly by: NSF Award #CNS 1446831 Compiled by: Sujatha K Swamy, Graduate Research

More information

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified TestOut Network Pro - English 4.1.x COURSE OUTLINE Modified 2017-07-06 TestOut Network Pro Outline - English 4.1.x Videos: 141 (18:42:14) Demonstrations: 81 (10:38:59) Simulations: 92 Fact Sheets: 145

More information

Loss of Control Center Functionality: EOP-008-1, CIP-008-3, CIP September 30, 2014

Loss of Control Center Functionality: EOP-008-1, CIP-008-3, CIP September 30, 2014 Loss of Control Center Functionality: EOP-008-1, CIP-008-3, CIP-009-3 September 30, 2014 James Williams Lead Compliance Specialist jwilliams.re@spp.org 501.614.3261 Jeremy Withers Senior Compliance Specialist

More information

Methods for Reducing Cybersecurity Vulnerabilities of Power Substations Using Multi-Vendor Smart Devices in a Smart Grid Environment

Methods for Reducing Cybersecurity Vulnerabilities of Power Substations Using Multi-Vendor Smart Devices in a Smart Grid Environment S&L Logo Methods for Reducing Cybersecurity Vulnerabilities of Power Substations Using Multi-Vendor Smart Devices in a Smart Grid Environment Date: October 24, 2017 Authors/Presenters: J. Matt Cole, PE

More information

TABLE OF CONTENTS. Section Description Page

TABLE OF CONTENTS. Section Description Page GPA Cybersecurity TABLE OF CONTENTS Section Description Page 1. Cybersecurity... 1 2. Standards... 1 3. Guides... 2 4. Minimum Hardware/Software Requirements For Secure Network Services... 3 4.1. High-Level

More information

Critical Infrastructure Protection for the Energy Industries. Building Identity Into the Network

Critical Infrastructure Protection for the Energy Industries. Building Identity Into the Network Critical Infrastructure Protection for the Energy Industries Building Identity Into the Network Executive Summary Organizations in the oil, gas, and power industries are under increasing pressure to implement

More information

Easily configurable HMI system for power automation siemens.com/sicam

Easily configurable HMI system for power automation siemens.com/sicam SICAM SCC Easily configurable HMI system for power automation siemens.com/sicam Small components big prospects: Your SICAM SCC station control Power grid operation is becoming more and more dynamic. To

More information

Connectivity 101 for Remote Monitoring Systems

Connectivity 101 for Remote Monitoring Systems Connectivity 101 for Remote Monitoring Systems Paul Wacker Moxa, Inc. Manager - Edge Connectivity Ariana Drivdahl Moxa, Inc. Product Marketing Manager Pain Points of Remote Monitoring Pressure to enhance

More information

Cyber Attacks & Breaches It s not if, it s When

Cyber Attacks & Breaches It s not if, it s When ` Cyber Attacks & Breaches It s not if, it s When IMRI Team Aliso Viejo, CA Trusted Leader with Solution Oriented Results Since 1992 Data Center/Cloud Computing/Consolidation/Operations 15 facilities,

More information

Ovation Ethernet Link Controller Module Data Sheet

Ovation Ethernet Link Controller Module Data Sheet Ovation Ethernet Link Controller Module Features: Provides native Ethernet connectivity capability at the I/O level Enables faster, more efficient integration of robust data from third-party devices Dedicated

More information

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations May 14, 2018 1:30PM to 2:30PM CST In Plain English: Cybersecurity and IT Exam Expectations Options to Join Webinar and audio Click on the link: https://www.webcaster4.com/webcast/page/584/24606 Choose

More information

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 January 23, 2015

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 January 23, 2015 Federal Energy Regulatory Commission Order No. 791 January 23, 2015 67 and 76 67. For the reasons discussed below, the Commission concludes that the identify, assess, and correct language, as currently

More information

MicroSCADA Pro Substation automation applications.

MicroSCADA Pro Substation automation applications. G R I D AUTO M ATI O N PRO D U C T S Substation automation applications. ABB Oy Finland Power Grids Grid Automation P.O. Box 614 FI-65101 Vaasa, Finland Phone: +358 10 22 21999 (Customer Support Center)

More information

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I Standards Sections Checklist Section Security Management Process 164.308(a)(1) Information Security Program Risk Analysis (R) Assigned Security Responsibility 164.308(a)(2) Information Security Program

More information

Protecting Control Systems from Cyber Attack: A Primer on How to Safeguard Your Utility May 15, 2012

Protecting Control Systems from Cyber Attack: A Primer on How to Safeguard Your Utility May 15, 2012 Protecting Control Systems from Cyber Attack: A Primer on How to Safeguard Your Utility May 15, 2012 Paul Kalv Electric Director, Chief Smart Grid Systems Architect, City of Leesburg Doug Westlund CEO,

More information

Disclaimer Executive Summary Introduction Overall Application of Attachment Generation Transmission...

Disclaimer Executive Summary Introduction Overall Application of Attachment Generation Transmission... CIP-002-4 Cyber Security Critical Cyber Asset Identification Rationale and Implementation Reference Document September, 2010 Table of Contents TABLE OF CONTENts Disclaimer... 3 Executive Summary... 4 Introduction...

More information

SECURING THE SUPPLY CHAIN

SECURING THE SUPPLY CHAIN SECURING THE SUPPLY CHAIN BY Jerome Farquharson, CISSP, Donald Dustin Williams, PE, AND Courtney Buser The advance of smart grids, smart devices and increasingly interconnected systems provides exceptional

More information

This draft standard is being posted for an initial comment and ballot. The draft includes modifications to meet the directives of FERC Order No. 791.

This draft standard is being posted for an initial comment and ballot. The draft includes modifications to meet the directives of FERC Order No. 791. Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed

More information

IEC A cybersecurity standard approaching the Rail IoT

IEC A cybersecurity standard approaching the Rail IoT IEC 62443 A cybersecurity standard approaching the Rail IoT siemens.com/communications-for-transportation Today s Siemens company structure focusing on several businesses Siemens AG Power and Gas (PG)

More information

October 05, ECE 421 Session 12. Utility SCADA and Automation. Presented by: Chris Dyer

October 05, ECE 421 Session 12. Utility SCADA and Automation. Presented by: Chris Dyer ECE 421 Session 12 October 05, 2017 Utility SCADA and Automation Presented by: Chris Dyer Utility SCADA & Automation Chris Dyer, P.E. BSEE University of Idaho, 1997 SCADA & Automation Engineer POWER Engineers,

More information

Chapter 2 State Estimation and Visualization

Chapter 2 State Estimation and Visualization Chapter 2 State Estimation and Visualization One obvious application of GPS-synchronized measurements is the dynamic monitoring of the operating conditions of the system or the dynamic state estimation

More information

Submitted on behalf of the DOE National SCADA Test Bed. Jeff Dagle, PE Pacific Northwest National Laboratory (509)

Submitted on behalf of the DOE National SCADA Test Bed. Jeff Dagle, PE Pacific Northwest National Laboratory (509) Potential Mitigation Strategies for the Common Vulnerabilities of Control Systems Identified by the NERC Control Systems Security Working Group (CSSWG) Submitted on behalf of the DOE National SCADA Test

More information

Information Security for Mail Processing/Mail Handling Equipment

Information Security for Mail Processing/Mail Handling Equipment Information Security for Mail Processing/Mail Handling Equipment Handbook AS-805-G March 2004 Transmittal Letter Explanation Increasing security across all forms of technology is an integral part of the

More information

PND at a glance: The World s Premier Online Practical Network Defense course. Self-paced, online, flexible access

PND at a glance: The World s Premier Online Practical Network Defense course. Self-paced, online, flexible access The World s Premier Online Practical Network Defense course PND at a glance: Self-paced, online, flexible access 1500+ interactive slides (PDF, HTML5 and Flash) 5+ hours of video material 10 virtual labs

More information

MIS5206-Section Protecting Information Assets-Exam 1

MIS5206-Section Protecting Information Assets-Exam 1 Your Name Date 1. Which of the following contains general approaches that also provide the necessary flexibility in the event of unforeseen circumstances? a. Policies b. Standards c. Procedures d. Guidelines

More information

Trends in Cybersecurity in the Water Industry A Strategic Approach to Mitigate Control System Risk

Trends in Cybersecurity in the Water Industry A Strategic Approach to Mitigate Control System Risk Trends in Cybersecurity in the Water Industry A Strategic Approach to Mitigate Control System Risk Standards Certification Education & Training Publishing Conferences & Exhibits Steve Liebrecht W/WW Industry

More information

Critical Cyber Asset Identification Security Management Controls

Critical Cyber Asset Identification Security Management Controls Implementation Plan Purpose On January 18, 2008, FERC (or Commission ) issued Order. 706 that approved Version 1 of the Critical Infrastructure Protection Reliability Standards, CIP-002-1 through CIP-009-1.

More information

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

CIP Cyber Security Configuration Change Management and Vulnerability Assessments CIP 010 1 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:

More information

IPM Secure Hardening Guidelines

IPM Secure Hardening Guidelines IPM Secure Hardening Guidelines Introduction Due to rapidly increasing Cyber Threats and cyber warfare on Industrial Control System Devices and applications, Eaton recommends following best practices for

More information

CCISO Blueprint v1. EC-Council

CCISO Blueprint v1. EC-Council CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance

More information

CIP Cyber Security Recovery Plans for BES Cyber Systems

CIP Cyber Security Recovery Plans for BES Cyber Systems Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed

More information

Hugo E. Meier, Heidelberg, Germany, June 2014 Integrator Partner Seminar2014 Substation automation trends

Hugo E. Meier, Heidelberg, Germany, June 2014 Integrator Partner Seminar2014 Substation automation trends Hugo E. Meier, Heidelberg, Germany, June 2014 Integrator Partner Seminar2014 Substation automation trends Substation automation trends Contents Product Portfolio Trends in substation automation Cyber Security

More information

Gujarat Forensic Sciences University

Gujarat Forensic Sciences University Gujarat Forensic Sciences University Knowledge Wisdom Fulfilment Cyber Security Consulting Services Secure Software Engineering Infrastructure Security Digital Forensics SDLC Assurance Review & Threat

More information

Project Cyber Security - Order No. 791 Identify, Assess, and Correct; Low Impact; Transient Devices; and Communication Networks Directives

Project Cyber Security - Order No. 791 Identify, Assess, and Correct; Low Impact; Transient Devices; and Communication Networks Directives Project 2014-02 - Cyber Security - Order No. 791 Identify, Assess, and Correct; Low Impact; Transient Devices; and Communication Networks Directives Violation Risk Factor and Justifications The tables

More information

20-CS Cyber Defense Overview Fall, Network Basics

20-CS Cyber Defense Overview Fall, Network Basics 20-CS-5155 6055 Cyber Defense Overview Fall, 2017 Network Basics Who Are The Attackers? Hackers: do it for fun or to alert a sysadmin Criminals: do it for monetary gain Malicious insiders: ignores perimeter

More information