Joseph B. Baugh, PhD, PMP, CISA, CISSP, CRISC, CISM Senior Compliance Auditor Cyber Security WECC: Vancouver WA Office

Similar documents
Iden%fying & Audi%ng Low Impact BES Assets: A Mock Audit BC Outreach Webinar: Session 2 Salt Lake City UT January 9, 2018

Standard CIP Cyber Security Critical Cyber As s et Identification

Reliability Standard Audit Worksheet 1

Cyber Security Reliability Standards CIP V5 Transition Guidance:

Standard CIP Cyber Security Critical Cyber As s et Identification

DRAFT. Cyber Security Communications between Control Centers. March May Technical Rationale and Justification for Reliability Standard CIP-012-1

CIP Version 5 Evidence Request User Guide

Critical Asset Identification Methodology. William E. McEvoy Northeast Utilities

CIP V5 Updates Midwest Energy Association Electrical Operations Conference

Reliability Standard Audit Worksheet 1

SPP RTO Compliance Forum Western Area Power Administration March 11, 2015

CIP V5 Implementation Study SMUD s Experience

DRAFT Reliability Standard Audit Worksheet 1

Draft CIP Standards Version 5

Standard CIP 005 2a Cyber Security Electronic Security Perimeter(s)

New Brunswick 2018 Annual Implementation Plan Version 1

Reliability Standard Audit Worksheet 1

Québec Reliability Standards Compliance Monitoring and Enforcement Program Implementation Plan Annual Implementation Plan

Disclaimer Executive Summary Introduction Overall Application of Attachment Generation Transmission...

Standard Development Timeline

This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective.

Standard CIP Cyber Security Critical Cyber Asset Identification

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

Bryan Carr PMP, CISA Compliance Auditor Cyber Security. Audit Evidence & Attachment G CIP 101 Salt Lake City, UT September 25, 2013

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard Development Timeline

Standard CIP Cyber Security Electronic Security Perimeter(s)

CIP Cyber Security Systems Security Management

Standards Authorization Request Form

Standard CIP 005 4a Cyber Security Electronic Security Perimeter(s)

Standard Development Timeline

Purpose. ERO Enterprise-Endorsed Implementation Guidance

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

Title. Critical Infrastructure Protection Getting Low with a Touch of Medium. CanWEA Operations and Maintenance Summit 2018.

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES

This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective.

requirements in a NERC or Regional Reliability Standard.

Physical Security Reliability Standard Implementation

CIP Cyber Security Personnel & Training

CIP Cyber Security Personnel & Training

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

Reliability Standard Audit Worksheet 1

CIP Cyber Security Security Management Controls. A. Introduction

Reliability Standard Audit Worksheet 1

Reliability Standard Audit Worksheet 1

Internal Controls Evaluation (ICE) Tony Eddleman, P.E. NERC Compliance Manager Nebraska Public Power District

Appendix A3 - Northeast Power Coordinating Council (NPCC) 2015 CMEP Implementation Plan for Entities within the U.S.

Reliability Standard Audit Worksheet 1

Low Impact Generation CIP Compliance. Ryan Walter

A. Introduction 1. Title: 2. Number: 3. Purpose: 4. Applicability: 4.1. Functional Entities: Balancing Authority Distribution Provider

Reliability Standard Audit Worksheet 1

Standard CIP-006-3c Cyber Security Physical Security

SGAS Low Impact Atlanta, GA September 14, 2016

Technical Questions and Answers CIP Version 5 Standards Version: June 13, 2014

NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION

Standard Development Timeline

CIP Cyber Security Security Management Controls

CIP Cyber Security Standards. Development Update

A. Introduction. B. Requirements and Measures

This draft standard is being posted for an initial comment and ballot. The draft includes modifications to meet the directives of FERC Order No. 791.

Cyber Security Incident Report

Cyber Attacks on Energy Infrastructure Continue

EEI Fall 2008 Legal Conference Boston, Massachusetts Stephen M. Spina November 1,

CIP Cyber Security Configuration Management and Vulnerability Assessments

NERC Overview and Compliance Update

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

CIP Cyber Security Security Management Controls. Standard Development Timeline

Standard CIP Cyber Security Physical Security

CIP Cyber Security Critical Cyber Asset Identification. Rationale and Implementation Reference Document

Standard CIP-006-4c Cyber Security Physical Security

Reliability Standard Audit Worksheet 1

Unofficial Comment Form Project Modifications to CIP Standards Virtualization in the CIP Environment

CIP Cyber Security Physical Security of BES Cyber Systems

Implementation Plan for Newly Identified Critical Cyber Assets and Newly Registered Entities

Standard CIP 004 3a Cyber Security Personnel and Training

CIP Cyber Security Recovery Plans for BES Cyber Systems

Additional 45-Day Comment Period September Final Ballot is Conducted October/November Board of Trustees (Board) Adoption November 2014

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 June 2, 2014

Summary of FERC Order No. 791

Standard CIP Cyber Security Security Management Controls

Standard Development Timeline

Standard CIP Cyber Security Electronic Security Perimeter(s)

Impacts and Implementation: NERC Reliability Standards, Compliance Initiatives, and Regulatory Activities

Additional 45-Day Comment Period and Ballot November Final Ballot is Conducted January Board of Trustees (Board) Adoption February 2015

Cyber Threats? How to Stop?

Alberta Reliability Standard Cyber Security Electronic Security Perimeter(s) CIP-005-AB-5

CIP Standards Development Overview

CIP Cyber Security Recovery Plans for BES Cyber Systems

Implementation Plan for Newly Identified Critical Cyber Assets and Newly Registered Entities

Project Retirement of Reliability Standard Requirements

CIP Cyber Security Electronic Security Perimeter(s)

Lesson Learned CIP Version 5 Transition Program CIP R1: Grouping BES Cyber Assets Version: March 2, 2014

Standard Development Timeline

Lesson Learned CIP Version 5 Transition Program CIP : Communications and Networking Cyber Assets Version: October 6, 2015

Standard Development Timeline

OPUC Workshop March 13, 2015 Cyber Security Electric Utilities. Portland General Electric Co. Travis Anderson Scott Smith

Lesson Learned CIP Version 5 Transition Program CIP R1: Grouping BES Cyber Assets Version: September 8, 2015

Compliance: Evidence Requests for Low Impact Requirements

Compliance Enforcement Initiative

Critical Infrastructure Protection Version 5

Transcription:

Joseph B. Baugh, PhD, PMP, CISA, CISSP, CRISC, CISM Senior Compliance Auditor Cyber Security WECC: Vancouver WA Office CIP-101: CIP-002 v3 to v5 Transition WECC Office: Salt Lake City UT September 24-25, 2013 2 Speaker Introduction Dr. Joseph B. Baugh o 40 years Electrical Industry Experience Transmission Lineman NERC Certified System Operator Information Infrastructure Design & Implementation IT Manager & Power Operations Manager 20 years Information Technology & Security Experience Project Manager & IT Program Manager PMP, CISSP, CISA, CRISC, CISM, NSA-IAM/IEM certifications o 17 years Teaching Experience (Multiple Schools) Degrees: PhD, MBA, BS-Computer Science Information Technology and IT Security courses Business Strategy, Leadership, & Management courses PMP, CISSP, CISA, CISM, ITIL, & Cisco certification prep courses Project Management courses (c) 2013 Dr. Joseph B. Baugh 1

WECC CIP-101 Disclaimer The WECC Cyber Security team has created a mythical Registered Entity, Billiam Power Company (BILL) and fabricated evidence to illustrate key points in the CIP audit processes. Any resemblance of BILL to any actual Registered Entity is purely coincidental. All evidence presented, auditor comments, and findings made in regard to BILL during this presentation and the mock audit are fictitious, but are representative of audit team activities during an actual audit. 3 Agenda Class Introductions o Name, Title, Organization, Interest in CIP-002 CIP-002-3 Mock Audit Overview Review CIP-002-5 Transition Guidance Review CIP-002-3 Requirements Review CIP-002 Team audit approach The BILL Mock Audit Questions 4 (c) 2013 Dr. Joseph B. Baugh 2

CIP-101 Mock Audit Overview BILL has identified and documented a list of Critical Assets through an application of the CIP-002-5 Impact Rating Criteria (IRC) per the recent NERC v5 Transition Guidance BILL has identified associated Critical Cyber Assets BILL requires a full Compliance audit on CIP-002-3 through CIP-009-3 o First week: Discovery phase at WECC offices o Second week: Compliance audit at BILL office 5 CIP-101 Mock Audit Overview Mock Audit squeezes 2 weeks of audit activities into a few hours. Sample DR s Mock Interview Site Visits Use the RSAW as the guiding document Present and review evidence for each requirement What do YOU think is the appropriate finding for each requirement? 6 (c) 2013 Dr. Joseph B. Baugh 3

CIP-002-3 Overview CIP-002-3 is the first step in the CIP Compliance trail All Registered Entities who perform the BA, GO, GOP, LSE, TO, TOP, and/or TSP registered functions are required to be compliant with CIP-002-3. CIP-002-5 replaces LSE with the DP function, TSP function drops out. o However, for this mock audit, we are only using the CIP-002-5 R1 and accompanying Attachment 1 IRC to identify and document a list of Critical Assets and remain compliant with CIP-00x-3, so the v3 functions are still valid. Some entities find they are only required to be compliant with CIP-002-3 & CIP-003-3 R2. o Typically requires a reduced scope audit that is conducted at WECC offices or other locations as necessary. 7 Current CIP-002-3 Requirements: R1 R1: Identify and document a risk-based assessment methodology (the RBAM). o Include procedures and evaluation criteria (R1.1) o Consider all BES Assets, pay close attention to those assets listed in R1.2 (see R1.2.1 - R1.2.7). 8 (c) 2013 Dr. Joseph B. Baugh 4

CIP-002-3: R1, R1.1, R1.2 9 CIP-002-3: R1.2.1-1.2.7 Use these asset types as represented by your inventory of BES Assets in your application of the CIP-002-5 IRC during the transition period. 10 (c) 2013 Dr. Joseph B. Baugh 5

CIP-002-3 Requirements: R2 Apply the RBAM to a list of your BES Assets to identify and document a list of Critical Assets. Review the list of Critical Assets at least annually and update as necessary. 11 CIP-002-3: R2 12 (c) 2013 Dr. Joseph B. Baugh 6

CIP v5 Transition Guidance Cyber Security Standards Transition Guidance (NERC, 2013 Sept 5, p. 2) 13 CIP-00x-5 Transition Guidance Cyber Security Standards Transition Guidance (NERC, 2013 Sept 5, p. 2) BILL chooses Option 2 to identify and document a list of Critical Assets from its inventory of BES Assets. The CIP Senior Manager documents this choice prior to implementation. 14 (c) 2013 Dr. Joseph B. Baugh 7

BILL Documents Its CAID Choice 16 CIP-002-5 Transition Changes Each Responsible Entity shall implement a process that considers each of the following assets for purposes of parts 1.1 through 1.3: [Violation Risk Factor: High][Time Horizon: Operations Planning] o i. Control Centers and backup Control Centers; o ii. Transmission stations and substations; o iii. Generation resources; o iv. Systems and facilities critical to system restoration, including Blackstart Resources and Cranking Paths and initial switching requirements; o v. Special Protection Systems that support the reliable operation of the Bulk Electric System; and o vi. For Distribution Providers, Protection Systems specified in Applicability section 4.2.1 above. (Not applicable for transition) Ensure all asset types described in CIP-002-3 R1.2.1 through R1.2.7 are included in the above categories. If not, add them to the evaluation process (per slide 10). (c) 2013 Dr. Joseph B. Baugh 8

17 CIP-002-5 Transition Changes Each Responsible Entity shall implement a process that considers each of the following assets for purposes of parts 1.1 through 1.3: o 1.1. Identify each of the high impact BES Cyber Systems according to Attachment 1, Section 1, if any, at each asset; o 1.2. Identify each of the medium impact BES Cyber Systems according to Attachment 1, Section 2, if any, at each asset; and o 1.3. Identify each asset that contains a low impact BES Cyber System according to Attachment 1, Section 3, if any (a discrete list of low impact BES Cyber Systems is not required). CIP-002-5 R1.1-R1.3 are not applicable for the transition period. 18 CIP-002-3 R3 After identifying and documenting a list of Critical Assets by applying the IRC to BILL s inventory of BES Assets, the process reverts to the current mandatory and enforceable CIP-002-3 R3 processes. Use the list of Critical Assets (CA s) developed by applying CIP-002-5 R1 and the IRC to develop a list of Cyber Assets associated with each Critical Asset and apply the current Critical Cyber Asset Identification [CCAID] methodology to determine if any Cyber Assets are essential to the operation of the Critical Asset. (c) 2013 Dr. Joseph B. Baugh 9

CIP-002-3: R3 19 20 CIP-002-3 Requirements: R3 For each such Cyber Asset that is deemed essential, consider: o R3.1: Does it use a routable protocol to communicate outside the ESP? or o R3.2: Does it use a routable protocol within a control center? or o R3.3: Is it dial-up accessible? o If any of the above are true, the Cyber Asset is a CCA. Review the list of CCAs at least annually and update as necessary. (c) 2013 Dr. Joseph B. Baugh 10

CIP-002-3 Requirements: R4 The senior manager or delegate (as defined in CIP-003-3 R2) must approve at least annually: o The RBAM (not applicable under Option 1 or 2) o The list of Critical Assets o The list of CCAs, even if such list is null. The entity may determine it has no Critical Assets or associated CCAs The entity must maintain signed and dated records of the approvals listed above. 21 CIP-002-3: R4 22 (c) 2013 Dr. Joseph B. Baugh 11

CIP-002-3 Audit Team Approach Review the application of the IRC to identify and document a list of Critical Assets Audit to the Standard. Review the Evidence: o Current RBAM o Current list of Critical Assets o Current list of CCAs, even if such list is null. o Records of current and prior approved versions of the above documents (the Bookends) DR for additional information, as needed. 23 WECC Audit Team Approach Use a methodical approach to deliver consistent results across all entities Use the RSAW supplied by the entity as working papers to document the audit and findings Review Initial Evidence package supplied by the entity o Attachment G 24 (c) 2013 Dr. Joseph B. Baugh 12

Prior to the selection of an option, provide all versions of the RBAM in force during the audit period up to the date of selection. After a transition option is declared, entities should attach a copy of the CIP Senior Manager statement and the annual application of either the BLC or the IRC depending on choice in lieu of the RBAM. Initial Evidence: Attachment G 25 WECC Audit Team Approach Submit Data Requests (DR s) for any additional information that will support the entity s compliance efforts, e.g.: o One-line diagrams (we ll see the BILL one-line later) o Prior documentation to provide bookends o Initial list of Cyber Assets at each Critical Asset identified in R2. o Address any questions or concerns 26 (c) 2013 Dr. Joseph B. Baugh 13

WECC Audit Team Approach Review the RBAM or application of the IRC (R1), list of CA s (R2), lists of CCA s, even if such lists are null (R3) If full Compliance audit: o Hold interviews with the entity s CIP SMEs o Site visits (Trust, but Verify) Validate annual approval documentation (R4) Submit DR s, if needed, to clarify compliance Determine findings (NF, PV, or OEA) Discuss findings with entire Cyber Security Team Complete RSAW Prepare CIP audit report (ATL & CPC) 27 CIP-101 Mock Audit Walk through audit process in more detail Explain the differences between a reduced scope off-site audit and a full Compliance audit The Mock Audit simulates a Compliance audit of Billiam Power Company [BILL] BILL is registered with NERC as a BA, GO, GOP, LSE, TO, TOP, TP, and TSP. 28 (c) 2013 Dr. Joseph B. Baugh 14

Review Initial Evidence Received from the entity in the initial evidence package Response to data requests in Attachment G Information contained in entity response to the RSAWs Sets the stage for the initial audit review o Discovery phase at the WECC offices Followed up by additional Data Requests as needed 29 The BILL System (from entity report) Billiam Power Company s (hereafter referred to by its NERC acronym, BILL) Balancing Authority (BA) area is effectively within the boundaries of the three counties on the western edge of Some State, bordered by Another State on the north and the Almost Mountains on the East and South. These three counties occupy about 15% of the land area of the state and contain about 20% of the state's population. BILL is registered as a BA, DP, GO, GOP, LSE, TO, TOP, TSP 30 (c) 2013 Dr. Joseph B. Baugh 15

31 The BILL System (continued) BILL s primary generation station is located in eastern Whatchamacallit County. The BILL generation station has two 1,000 MW fossil fuel generating units. The output of these units supports BILL s native load and any available excess energy is marketed throughout the WECC Interconnection. BILL owns and operates nine Combustion Turbines (averaging 30 MWs each) located near various consumer load centers throughout the service territory. These CT s are primarily used as peaking units and for voltage and frequency support during the summer months. BILL also owns and operates the BILL-3 Hydroelectric plant on the Sweet William River. BILL-3 has a nameplate rating of 100 MW. This hydro unit is Blackstart capable and is connected to the BILL Generation Station through a dedicated 115 kv line that runs 87 miles from Sub3 to Sub1. Total BILL generation capacity is 2,380 MWs. The BILL System (continued) There are two synchronous 345 kv interties with adjacent BA s that define the BILL BA area. These ties are with XXXX Electrical Utility and YYYY Federal Power District at Sub1, which is adjacent to the BILL Generation Station. The BES portion of BILL's BA area, its 345 kv, 230 kv, and 115 kv facilities, include 190 miles of 345 kv transmission lines, 450 miles of 230 kv lines, and 973 miles of 115 kv lines. BILL owns and operates two 345kV substations, 25 230 kv substations, and 52 115 kv substations throughout its service territory. BILL serves its native residential and commercial load through its 115 kv and 230 kv transmission facilities. The Generation and Transmission facilities are monitored and managed from the Primary Control Center (PCC) located at the corporate headquarters in Big Bill City. BILL also maintains a hot stand-by Back-up Control Center (BUCC) located in its operations center in Little Bill City, which is approximately 50 miles from the PCC. BILL is a summer peaking BA and BILL's BA all-time area peak load was recorded on July 20, 2010 at 2,482 MWs. 32 (c) 2013 Dr. Joseph B. Baugh 16

BILL One-Line Diagram 33 34 BILL s Critical Asset Identification The first step in a normal CIP-002-3 audit is to review the RBAM. The second step is to review the Critical Asset Identification Methodology [CAID]. The CAID is typically included as part of the RBAM, but the audit team will review the application of the IRC under this scenario o Starts with an overall list of entity BES Assets. o Uses the IRC to identify and document a list of Critical Assets. Review BILL s 2013 list of Critical Assets derived from the IRC and compare it to the previous lists derived from the RBAM. Were applicable BES Assets evaluated relative to IRC criteria 2.3. 2.6. or 2.8? [If Option 1 selected, then 1.3, 1.8, 1.9, 1.10] o Did BILL demonstrate coordination with the applicable registered function(s)? o If not, should we submit a data request? (c) 2013 Dr. Joseph B. Baugh 17

BILL BES Assets: 2012 Control Centers 35 BILL BES Assets: 2013 Control Centers 36 (c) 2013 Dr. Joseph B. Baugh 18

BILL BES Assets: 2012 Substations 37 BILL BES Assets: 2013 Substations 38 (c) 2013 Dr. Joseph B. Baugh 19

BILL BES Assets: 2012 Generation 39 BILL BES Assets: 2013 Generation 40 (c) 2013 Dr. Joseph B. Baugh 20

BILL BES Assets: 2012 Special Systems 41 BILL BES Assets: 2013 Special Systems 42 (c) 2013 Dr. Joseph B. Baugh 21

BILL BES Assets: 2012 Critical Assets 43 BILL BES Assets: 2013 Critical Assets 44 (c) 2013 Dr. Joseph B. Baugh 22

2012-2013 Critical Assets Net Changes 45 Control Centers o No change Substations o Add 4 (Subs 4, 7, 8, 11) o Drop 1 (Sub 3, related to blackstart) Generation Units o Drop blackstart unit Special Protection Systems o No change 46 R2: Critical Asset Review Questions Did BILL apply the IRC appropriately? Does BILL need to confer with its RC, PA, or TP to consider any Critical Assets relative to Criteria 2.3, 2.6, or 2.8? Did BILL review its list of Critical Assets at least annually? Did BILL update the list as necessary? Application Questions o Did BILL consider all BES Assets in R1.i through R1.vi? o Did BILL review and evaluate all BES Assets through the IRC? o Did BILL clearly identify and document all Critical Assets? Is any additional information necessary? o If so, do we submit a DR? (c) 2013 Dr. Joseph B. Baugh 23

BILL s Critical Cyber Asset Identification 47 The third step in a CIP-002-3 audit is to review the Critical Cyber Asset Identification Methodology [CCAID]. Under this scenario, the CCAID should be maintained as a discrete document. Starts with the identified list of Critical Assets. Uses the CCAID procedures and evaluation criteria to identify and document a list of Critical Cyber Assets, even if such list is null. Review the BILL Critical Cyber Asset Identification Methodology Review List of Critical Cyber Assets 2012 CCAs: Primary Control Center 48 (c) 2013 Dr. Joseph B. Baugh 24

2013 CCAs: Primary Control Center 49 2012 CCAs: Backup Control Center 50 (c) 2013 Dr. Joseph B. Baugh 25

2013 CCAs: Backup Control Center 51 2012 CCAs: SUB1 52 (c) 2013 Dr. Joseph B. Baugh 26

2013 CCAs: SUB1 53 2012 Null Lists CCAs: Generation & Subs 54 (c) 2013 Dr. Joseph B. Baugh 27

2013 Null Lists CCAs: Generation & Subs 55 56 R3: Critical Cyber Asset Review Questions Did BILL use the Critical Asset list developed in R2 to identify Critical Cyber Assets? Did BILL apply its Critical Cyber Asset Identification Methodology [CCAID] appropriately to consider all Cyber Assets supporting the reliability function of the Critical Asset? Did BILL review the list at least annually and update the list as necessary? Application Questions o Did BILL consider all Cyber Assets located at its Critical Assets for evaluation through the CCAID? o Did BILL consider R3.1-R3.3 for all Cyber Assets considered essential to the operation of the Critical Asset o Did BILL clearly identify and document all Critical Cyber Assets? Are any DR s necessary? o If so, what additional information is required? (c) 2013 Dr. Joseph B. Baugh 28

BILL s Annual Approvals The fourth step in a CIP-002-3 audit is to review the annual approvals of the RBAM, the list of Critical Assets, and the lists of Critical Cyber Assets, even if such lists are null. Review the BILL 2012 Annual Approvals Review the BILL 2013 Annual Approvals 57 R4: Annual Approval Review Questions Did the BILL CIP Senior Manager or delegate approve at least annually the RBAM, the list of Critical Assets, and the lists of Critical Cyber Assets, even if such lists are null? Application Questions o Did BILL provide evidence of annual reviews and approvals? Are any DR s necessary? o If so, what additional information is required? 58 (c) 2013 Dr. Joseph B. Baugh 29

On-Site Activities: The Interview Set up through an interview DR the prior week Typically held on Monday of the on-site week immediately after the opening presentation Examines the entity s understanding of and approach to R1-R4 Cover any areas of concern raised through the initial evidence review Schedule follow-up interview(s), if needed, after the site visits 59 On-site activities: Mock Interview Need four volunteers o You are BILL SMEs o No, you don t get to practice We will ask a series of questions that we generally ask all CIP-002 SMEs Also ask questions of concern, if indicated by the initial review of the evidence The Interview Question Set 60 (c) 2013 Dr. Joseph B. Baugh 30

On-site activities: Mock Interview What did we learn from the interview? What was the key issue from an audit perspective? Should we find a PV for this issue? Why or why not? 61 On-Site Activities: Site Visit Set up through a site visit DR the prior week Itinerary determined through review of the initial evidence Trust, but verify. Why? Depending on entity size, 100% validation or a statistical sampling Where? o Control Centers o Generation Facilities o Transmission Facilities 62 (c) 2013 Dr. Joseph B. Baugh 31

On-Site Activities: Site Visit 63 Who? o CIP-002-3 Sub-Team Validates lists of CCAs, even if such lists are NULL Works in conjunction with CIP-005-3a sub-team o CIP-005-3a Sub-Team Validates Electronic Access Points [EAPs] and Electronic Access Control and Monitoring devices [EACMs]. Confirms ESP boundaries o CIP-006-3c Sub-Team Validates PSPs and Physical Access Controls, such as PACS, cameras, logs, etc. My colleague, Wally Magda, provided an overview on CIP-006-3c audit activities earlier. 64 On-Site Activities: CIP-002-3 Site Visit What? o Validate lists of CCAs o Validate null lists of CCAs o Look for aberrations from the lists o Hold informal interviews with entity SMEs When? o Sometimes during the off-site week. o Typically on Tuesday of the on-site audit o May also be on Wednesday depending on sites visited, distances traveled, etc. (c) 2013 Dr. Joseph B. Baugh 32

On-Site Activities: BILL Site Visits Visit the Primary and Backup Control Centers o 100% validation of CCAs in both locations o Talk to Operators & SMEs Visit the BILL Generation Station, SUB1, SUB2, SUB4, SUB7, SUB8, and SUB11. o Validate the Null Lists of CCAs o Talk with entity SMEs Site Visit Questions o Why validate all CCAs at a given site? o Why validate Null lists of CCAs? o Why ask questions of entity SMEs? 65 BILL Site Visits: Control Centers Visited the Primary Control Center o 100% validation of CCAs o Found nothing out of the ordinary. Visited the Backup Control Center o 100% validation of CCAs o Found nothing out of the ordinary. 66 (c) 2013 Dr. Joseph B. Baugh 33

Site Visits: Generation Units Visited BILL Generation Station o Validated Null list of CCAs o Found nothing out of the ordinary. 67 68 Site Visits: Substations Visited Sub1 o 100% validation of CCAs o Found nothing out of the ordinary. Visited Sub2 o Validated Null list of CCAs o Noticed something strange here. Visited Subs 4, 7, 8, & 11 o Validated Null list of CCAs o Noticed something strange at each of these substations too. (c) 2013 Dr. Joseph B. Baugh 34

Site Visits: What Did We See? What is this device and what is it doing here in the subs? 69 On-Site Activities: Site Visit What did we learn from the site visit? Why do we validate Null lists of CCAs? What was the main concern with the unexpected devices? Should we DR for additional information? o Tour Notes DR Would another interview be more effective? Does this situation call for an R3 PV finding? Why or why not? 70 (c) 2013 Dr. Joseph B. Baugh 35

71 Discussing the Findings Discuss with whole Cyber Security Team Is there a PV for the undocumented devices? o R2: Undeclared Critical Assets The Combustion Turbines Does the entity have documentation from its TP or PA/PC that exempts the CTs from Criterion 2.3? o R3: Undeclared Critical Cyber Assets The Substation Modems Determine the scope of a PV o How do we do this? Complete the CIP-002-3 Findings Table in RSAW Submit to the ATL and CPC for the Closeout Presentation Value-Added Activity: Feedback WECC Audit Teams never Prescribe Solutions, but we do describe: o Brief entities on findings o Encourage good security practices o Discuss examples of industry best practices o Identify areas of concern, which may not be violations, but which could stand improvements o Provide suggestions, when appropriate Support development of a sustainable compliance culture 72 (c) 2013 Dr. Joseph B. Baugh 36

Audit Documentation: The RSAW An auditor is judged by the quality of his or her working papers. o Complete the RSAW o Document findings o DR for any final needed information 73 Audit Documentation Auditors review evidence, find facts, and report findings o Turn PVs over to the Enforcement team o Enforcement team depends heavily on the quality of auditor documentation Be Literate, be Concise, but above all else, Be Accurate. If it s not written down, it didn t happen. 74 (c) 2013 Dr. Joseph B. Baugh 37

Post-Audit Auditor Activities The Audit Report o Work with ATL & CPC o Verify findings and other information related to audited standard(s) Document findings in webcdms o PV & OEA findings only Work with WECC Enforcement personnel to support Investigations as SME for audit processes and findings 75 Post-Audit Auditor Activities Participate in entity Outreach activities, such as this event and CIPUG meetings Be available to address entity questions/ comments Work at National level o CCWG o Drafting teams o Comment on new Standards, CANs, etc. o Attend and present at conferences 76 (c) 2013 Dr. Joseph B. Baugh 38

Summary Audit to the Standard Provide useful feedback to the entity Prepare a valid report Be available to CIP personnel at the entities Work at National level 77 Remember the Auditor s Mission Just the facts, Ma am, Just the facts! 78 (c) 2013 Dr. Joseph B. Baugh 39

References NERC. (2013 September 5). Cyber Security Standards Transition Guidance (Revised). Retrieved from http://www.nerc.com/pa/comp/resources/ ResourcesDL/Cyber%20Security %20Standards%20Transition%20Guidance %20(Revised).pdf 79 Questions? Joseph B. Baugh, Ph.D., PMP, CISA, CISSP, CRISC, CISM Senior Compliance Auditor - Cyber Security Western Electricity Coordinating Council (WECC) 7400 NE 41st Street, Suite 160 Vancouver, WA 98662 jbaugh (at) wecc (dot) biz (C) 520.331.6351 (O) 360.567.4061 (c) 2013 Dr. Joseph B. Baugh 40