White Paper. The North American Electric Reliability Corporation Standards for Critical Infrastructure Protection

Similar documents
THE TRIPWIRE NERC SOLUTION SUITE

Industrial Defender ASM. for Automation Systems Management

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

Digital Wind Cyber Security from GE Renewable Energy

How AlienVault ICS SIEM Supports Compliance with CFATS

QuickBooks Online Security White Paper July 2017

INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.

Cyber Threats? How to Stop?

CyberArk Solutions for Secured Remote Interactive Access. Addressing NERC Remote Access Guidance Industry Advisory

Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced)

Keys to a more secure data environment

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

Industrial Cyber Security. ICS SHIELD Top-down security for multi-vendor OT assets

SECURING AWS ACCESS WITH MODERN IDENTITY SOLUTIONS

CyberArk Solutions for Secured Remote Interactive Access. Addressing NERC Remote Access Guidance Industry Advisory

Aerohive and IntelliGO End-to-End Security for devices on your network

HIPAA Regulatory Compliance

IPM Secure Hardening Guidelines

ISO27001 Preparing your business with Snare

CISCO SHIELDED OPTICAL NETWORKING

Protect Yourself Against VPN-Based Attacks: Five Do s and Don ts

Making Passwordless Possible. How SecureAuth is eliminating passwords while improving security and user experience

CipherCloud CASB+ Connector for ServiceNow

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Today s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps

Secure Access & SWIFT Customer Security Controls Framework

Securing Industrial Control Systems

PORTAL PROTECTION. Raising security without raising disruptions

Checklist for Evaluating Deception Platforms

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS

Choosing the right two-factor authentication solution for healthcare

Continuous protection to reduce risk and maintain production availability

MITIGATE CYBER ATTACK RISK

Information Assurance 101

ALIENVAULT USM FOR AWS SOLUTION GUIDE

align security instill confidence

IDENTITY AND THE NEW AGE OF ENTERPRISE SECURITY BEN SMITH CISSP CRISC CIPT RSA FIELD CTO

Next Generation Authentication

IDENTITY: A KEY ELEMENT OF BUSINESS-DRIVEN SECURITY

DigitalPersona for Healthcare Organizations

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Critical Infrastructure Protection for the Energy Industries. Building Identity Into the Network

BEST PRACTICES GUIDE MFA INTEGRATION WITH OKTA

SIEM: Five Requirements that Solve the Bigger Business Issues

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

KantanMT.com. Security & Infra-Structure Overview

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

Cybersecurity for the Electric Grid

About NitroSecurity. Application Data Monitor. Log Mgmt Database Monitor SIEM IDS / IPS. NitroEDB

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

ADAPTIVE AUTHENTICATION ADAPTER FOR IBM TIVOLI. Adaptive Authentication in IBM Tivoli Environments. Solution Brief

Best Practices in ICS Security for System Operators

Integrated Access Management Solutions. Access Televentures

Adaptive Authentication Adapter for Juniper SSL VPNs. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

Automation Services and Solutions

Liferay Security Features Overview. How Liferay Approaches Security

WHITE PAPER BEST PRACTICES GUIDE TO STRONG IDENTITY ACCESS MANAGEMENT

Cyber Security Panel Discussion Gary Hayes, SVP & CIO Technology Operations. Arkansas Joint Committee on Energy March 16, 2016

Cyber security tips and self-assessment for business

Adaptive Authentication Adapter for Citrix XenApp. Adaptive Authentication in Citrix XenApp Environments. Solution Brief

Cloud Computing Lectures. Cloud Security

Sage Data Security Services Directory

Keep the Door Open for Users and Closed to Hackers

CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n

Teradata and Protegrity High-Value Protection for High-Value Data

BIDMC Multi-Factor Authentication Enrollment Guide Table of Contents

Securing Today s Mobile Workforce

Machine Learning and Advanced Analytics to Address Today s Security Challenges

Cracking the Access Management Code for Your Business

Standard CIP-006-1a Cyber Security Physical Security

Standard CIP Cyber Security Electronic Security Perimeter(s)

Cyber security for digital substations. IEC Europe Conference 2017

Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT

How CyberArk can help mitigate security vulnerabilities in Industrial Control Systems

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Security Fundamentals for your Privileged Account Security Deployment

WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD

Comprehensive Database Security

FERC Hydroproject Cyber Security [FERC 3A Section 9 versus CIP v5]

ARBOR DDoS PRODUCTS IN A GDPR COMPLIANT ENVIRONMENT. Guidelines and Frequently Asked Questions

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

Symantec Security Monitoring Services

NIST Revision 2: Guide to Industrial Control Systems (ICS) Security

ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

10 Cybersecurity Questions for Bank CEOs and the Board of Directors

Passwords Are Dead. Long Live Multi-Factor Authentication. Chris Webber, Security Strategist

Simplify PCI Compliance

Summary of FERC Order No. 791

Security Standards for Electric Market Participants

Modern two-factor authentication: Easy. Affordable. Secure.

McAfee Total Protection for Data Loss Prevention

Health Analyzer VAM Best Practices Guide

Standard Req # Requirement D20MX Security Mechanisms D20ME II and Predecessors Security Mechanisms

Cybersecurity Best Practices

GDPR How to Comply in an HPE NonStop Environment. Steve Tcherchian GTUG Mai 2018

OpenWay by Itron Security Overview

Transcription:

White Paper The North American Electric Reliability Corporation Standards for Critical Infrastructure Protection February, 2017

Introduction The North American Electric Reliability Corporation (NERC) maintains standards for Critical Infrastructure Protection (CIP) covering security requirements with a main goal to improve all North American power system s security. In this white paper you will learn how to meet compliance with the NERC for CIP using SecureAuth IdP s unique strong authentication capabilities including adaptive (risk-based) authentication. Preventing the Misuse of Stolen Credentials 2

Table of Contents What is NERC CIP?... 4 What is SCADA?... 4 The SecureAuth Authentication System... 5 Adaptive & Contextual Authentication... 5 Additional Adaptive Authentication with Real-time Threat Analysis... 6 SecureAuth Authentication s NERC CIP Compliance Checklist... 6 Summary... 7 Preventing the Misuse of Stolen Credentials 3

What is NERC CIP? The North American Electric Reliability Corporation (NERC) maintains the various cybersecurity standards for Critical Infrastructure Protection (CIP). Consisting of 9 standards and 45 requirements covering security requirements ranging from perimeter protection, cyber assets controls, end-to-end accountability and reliability, training, security management and disaster recovery, the CIP program s main goal is to improve all North American power system s security. Under NERC CIP, organizations are required to identify critical assets and to regularly perform risk analysis of said assets. Defining of policies for monitoring and changing the configuration of assets as well as policies governing access to those assets is a requirement. In addition, NERC CIP requires the use of firewalls to block vulnerable ports and the implementation of cyber-attack monitoring. Further, organizations are required to enforce controls protecting access to critical cyber assets while systems for monitoring security events must be deployed, and must have comprehensive contingency plans. With CIP version 3, only general BES (bulk electric systems) facilities were required to comply with these standards, yet as Version 5 comes into place April 2016, and version 6 in 2017, all tiered classifications for BES facilities are required to comply. What is SCADA? Supervisory control and data acquisition (SCADA) is a system operating with coded signals over communication channels so as to provide control of remote equipment (typically one communication channel per remote station). The control system typically is connected to various data tools gathering and analyzing activity records. SCADA is a type of industrial control system (ICS) consisting of Remote Terminal Units (RTUs)/Programmable logic controllers (PLCs) or the brains of the various processes and the Human Machine Interface (HMI) which is usually linked to a database. But, SCADA systems historically distinguish themselves from other ICS systems by the sheer number of large-scale processes that can include multiple sites across various distances encompassing industrial, infrastructure, and facility-based processes. While most believe SCADA is safe, the actuality of SCADA systems today are networked, meaning that unauthorized access even via a simple command prompt to the main HMI or to any of the networked units, could potentially compromise the whole environment. Preventing the Misuse of Stolen Credentials 4

The SecureAuth Authentication System SecureAuth solves the problems of cyber security controls, monitoring, adaptive enforcement and authentication. The end result is a multifactor, adaptive solution that: + Requires Limited or no Software + Requires No Hard Tokens to Carry + Enables Geo-Location via IP and/or Country controls + Enables Geo-Velocity controls (Historical analysis of authentication access and geo-location) + Allows IP white-listing/black-listing controls + Checking the reputation of the IP address of the user s machine against the SecureAuth Threat Service, a combination of multiple industry leading sources of threat intelligence and threat information. + Behavioral Biometrics unique keystroke dynamics on varying devices + Multiple phone number related fraud checks including preventing attackers from spamming and guessing one-time passcodes, blocking recently ported phone numbers, blocking global carrier networks, and blocking certain class of phones (e.g. virtual, mobile, landline, toll-free, etc..) + Works from Any Browser on Any Site (Home, Office, Internet Café, etc.) + Fractions of the cost of Tokens The result is a more secure interface that meets government compliance, ease-of-use user experience, and limits any disruptions of processes without breaking the IT budget. Adaptive (risk-based) Authentication Utilizing various workflow options and integration points, SecureAuth provides adaptive and multi-factor authentication in one solution. For example, Use Case A, an engineer onsite needs to log into one of the SCADA units and as their IP address shows they are onsite in HQ, authentication could potentially be allowing user name and password. Then there is, Use Case B, a staff member needs to connect to the same SCADA unit but they are on the other side of the country connecting remotely, because staff member is logging in from new location, we can require a multi-factor authentication method before proceeding. Group membership along with IP/location can easily be utilized in defining the adaptive authentication a user experiences and security controls when accessing SCADA and/or NERC CIP ed systems. Let s say the engineer from Use Case A has rights to all the SCADA units and the staff member from Use Case B does not. The staff member happens to be asked to look into one of the PLCs, they don t have access but they do know the engineer from Use Case A, so they ask to borrow their credentials to login. With SecureAuth s geo-velocity solution, the staff member trying to utilize the engineer s credentials to authenticate will be utilizing Allow, Deny, Step-up, Step-down, or Redirect options, meaning that the systems can detect IP address changes and adaptively address authentication. Preventing the Misuse of Stolen Credentials 5

Additional Adaptive Authentication with SecureAuth Threat Service The SecureAuth Threat Service provides highly enriched and actionable threat intelligence that enhances SecureAuth IdP s adaptive authentication. We combine threat intelligence and threat information from leading industry sources and open source providers that are continually updated in real time. With the ability to analyze the IP address of where the user is authenticating from, and all other layers of risk via adaptive authentication, SecureAuth can help detect and protect against cyber-threats before harm can be done. We help identify and stop bad actors who attempt to log in externally, as well as bad actors who are inside and moving laterally in your network even if they have valid credentials. We can easily integrate with your existing infrastructure in hours, not weeks or months, and we maintain a smooth user experience by requiring multi-factor authentication only when risk factors are present. SecureAuth Authentication s NERC CIP Compliance Checklist* NERC CIP Requirements SecureAuth Authentication Feature Benefit CIP-003-3 R5 & D1.4 (Security Management Controls) Access control flexibility with auditing Sustainable access security controls with SIEM auditing CIP-005-3a R2.4 (Electronic Security Perimeter(s)) Access controls with Risk Analysis Risk Analysis at the perimeter along with SIEM integration and reporting CIP-007-3a R5.3 & R6 (Systems Security Management) 20+ Authentication Methods with system logging & SIEM options Security controls ranging from x.509v3 to RADIUS to SAML with logging Future-Proofing: CIP-005-5 R2-Part 2.3 Access controls with Risk Analysis Advanced Risk Analysis at the perimeter along with SIEM integration, dashboards and reporting CIP-007-5 R4-Part 4.1, 4.3, R5-Part 5.1, 5.5, 5.6 25+ Authentication Methods along with Identity Management Options By specifying security system requirements, the multitude of authentication options limit any compromise CIP-011-1 Part 1.2 (Information Protection) SecureAuth Adaptive Strong Authentication with SecureAuth Threat Service. Preventing unauthorized access and secure information handling *NOTE: All of the SecureAuth features and benefits listed above also are available for SCADA environments Preventing the Misuse of Stolen Credentials 6

Summary SecureAuth provides deployable and scalable solutions to meet both the security requirements of today and tomorrow along with the granularity needed for ever-changing regulations, processes, and controls. SCADA and organizations under CIP encounter various cyber-attacks and cyberterrorism and while this grows, the security processes and controls necessary can potentially become cumbersome to the point of disruption of critical systems. Solutions that provide external and internal security controls while not limiting or disrupting any and all systems, processes, and controls is what is truly needed in today s world. SecureAuth IdP delivers a solution to these Centralized Systems and Organizations. Preventing the Misuse of Stolen Credentials 7

ABOUT SECUREAUTH SecureAuth is the leader in adaptive access control solutions, empowering organizations to determine identities with confidence and preventing the misuse of stolen credentials. SecureAuth provides strong identity security while minimizing disruptions to the end-user. SecureAuth has been providing SSO and MFA solutions for over a decade. For the latest insights on adaptive access control, follow the SecureAuth blog, follow @ SecureAuth on Twitter and on LinkedIn, or Contact Us to get started today. Preventing the Misuse of Stolen Credentials 8

8845 Irvine Center Drive Irvine, CA 92618 p: 1-949-777-6959 f: 1-949-743-5833 secureauth.com 2016 SecureAuth Corporation. All Rights Reserved. www.secureauth.com WP-NERC CIP-021517