POWER June 2014 - 30

NERC CIP COMPLIANCE
Many such general security awareness
messages are appropriate for general audiences
across an organization. For example,
tips on the selection and use of strong passwords
help ensure compliance with password
policies and reduce the likelihood of
passwords being guessed. Another common
topic is email security. General awareness of
the types of risks posed by email, including
how to recognize the attacks that are often
sent via email, can substantially reduce the
probability, or at least the frequency, of successful
intrusions via this method.
would find inconceivable. Remote connectivity
to systems increases the pool of potential
attackers by orders of magnitude, while
simultaneously reducing the cost, difficulty,
and risk an attacker must overcome.
Remote connections come in many forms
and are used for many purposes. Internet access,
dialup, serial connections, wide area
networking, and wireless are examples. These
may exist for many legitimate business purposes
including employee remote access, vendor
support, operational control, and business
partner communications. A good CIP Version
The near ubiquity of network connectivity
has enabled attacks that many engineers
would find inconceivable.
Physical Security
The second area of concern that requires policy
action is physical security, a control that is
critical to the overall security of any digital system.
If an attacker can gain physical access to
a computer system or other electronic device,
full compromise of the device is nearly assured.
Likewise, physical access to network ports or
communication media can allow an attacker
to intercept, interfere with, or even inject messages
onto a network. In control environments,
this can have catastrophic consequences.
Access to BES Cyber Systems and associated
networks should be restricted to only those
personnel who require access for the performance
of their jobs. Physical security controls
must be implemented to enforce access restrictions
and to allow for the detection of unauthorized
access. Such controls can be preventive,
or detective. Preventive controls are designed
to prevent unauthorized access from occurring.
Examples are fences, walls, doors, and locked
cabinets. Detective controls are designed to
emphasize the detection of unauthorized access
and would activate an appropriate response
procedure. Examples include alarm systems,
video surveillance, and guard patrols.
Remote Access Connections
The third area of concern is remote electronic
access. The single greatest reason that cybersecurity
is such a significant issue today is the
tremendous increase in connectivity of critical
systems and the global reach of the Internet.
Any system that is connected to the Internet-
even indirectly through multiple other systems
or networks, and even if a plant worker is unaware
of those connections-has some risk of
compromise by motivated parties.
Although attacks can also be conducted
locally by individuals that gain physical access,
the near ubiquity of network connectivity
has enabled attacks that many engineers
30
5 process requires that such connections be
controlled and monitored to reduce the likelihood
of successful intrusions and to detect and
quickly respond to those that do occur.
Incident Response
Despite the best efforts of organizations to
protect their cyber assets, successful attacks
are likely to happen, at least occasionally. Organizations
must be prepared to respond appropriately
to such events not only because
the potential financial costs of equipment malfunctions
or worse can be enormous but also
because the longer a security breach is unaddressed,
the greater the potential damage not
only to an individual facility but also to other
facilities and the interconnected grid.
Incident response plans should be established
to effectively handle intrusions and
other cybersecurity events. These should include
the identification and training of personnel
who will be responsible for the initial
response, investigation, and containment, as
well as notification and escalation procedures
to senior management, legal, and communications
staff.
Plans should include provisions for external
notification of law enforcement and other appropriate
agencies or organizations such as the
Department of Homeland Security's Industrial
Control Systems Cyber Emergency Response
Team (ICS-CERT), the Electricity Sector
Information Sharing and Analysis Center
(ES-ISAC), and/or other state and local authorities.
Plans should also allow for the involvement
of commercial incident response and
forensic investigation specialists, as needed.
Recent Developments
Although there is a dramatic expansion of systems
that are in scope for NERC CIP Version
5, there is still room for improvement. In its order
approving Version 5 of the CIP standards,
www.powermag.com
the Federal Energy Regulatory Commission
(FERC) raised concerns regarding the lack of
specific requirements for Low-impact systems.
Although the standard requires that policies
be developed and implemented in four key areas,
there are no specific requirements, and
no criteria against which to measure the effectiveness
of controls that are actually put in
place. The lack of specific requirements leaves
FERC with little oversight or assurance that
security risks will be adequately addressed.
To correct this situation, FERC has directed
NERC to either develop new requirements
for Low-impact BES Cyber Systems or develop
" objective criteria " that can be used to
evaluate the effectiveness of the controls that
are deployed.
Although it is not yet known which approach
will be taken or what potential specific
controls may be required, the objectives
are clear, as is the need. Organizations should
develop and deploy controls that provide prudent
protections in the four identified areas
of concern. Although some adjustments may
need to be made based on the actual requirements
developed by NERC, those organizations
that have worked proactively to address
these areas of risk will be both more secure,
and better positioned for compliance.
The concern over cybersecurity risks to critical
infrastructure, of which power generation is
a significant element, is unlikely to wane in the
foreseeable future. In fact, the issue is receiving
increasing scrutiny from the federal government
and, recently, state utility commissions
and legislatures. The expectation that critical
infrastructure operators will proactively and effectively
address cyber risks is increasing.
Additionally, with respect to the NERC
CIP standards, there is an active effort to shift
the focus of audit and enforcement away from
a strict measurement against specific requirements
toward a qualitative assessment of internal
controls. This move will reinforce the
need for holistic approaches that emphasize
real security rather than mere compliance.
Compliance requirements can be an effective
catalyst to kickstart cybersecurity efforts,
but if they remain the only focus, long-term
success is unlikely. Holistic efforts that view
cybersecurity as a means to compliance, rather
than assuming compliance is the basis for
security, are the only effective way to address
both concerns now and into the future. ■
-Steven Parker, CISA, CISSP is president
and a founding director of Energy Sector
Security Consortium (EnergySec). He has
been engaged in electricity sector critical
infrastructure protection for more than a
decade, including eight years at PacifiCorp.
He was also part of the team that established
the NERC CIP audit program at the
Western Electricity Coordinating Council.
POWER | June 2014
http://www.powermag.com

POWER June 2014

Table of Contents for the Digital Edition of POWER June 2014

Contents
POWER June 2014 - Cover1
POWER June 2014 - Cover2
POWER June 2014 - Contents
POWER June 2014 - 2
POWER June 2014 - 3
POWER June 2014 - 4
POWER June 2014 - 5
POWER June 2014 - 6
POWER June 2014 - 7
POWER June 2014 - 8
POWER June 2014 - 9
POWER June 2014 - 10
POWER June 2014 - 11
POWER June 2014 - 12
POWER June 2014 - 13
POWER June 2014 - 14
POWER June 2014 - 15
POWER June 2014 - 16
POWER June 2014 - 17
POWER June 2014 - 18
POWER June 2014 - 19
POWER June 2014 - 20
POWER June 2014 - 21
POWER June 2014 - 22
POWER June 2014 - 23
POWER June 2014 - 24
POWER June 2014 - 25
POWER June 2014 - 26
POWER June 2014 - 27
POWER June 2014 - 28
POWER June 2014 - 29
POWER June 2014 - 30
POWER June 2014 - 31
POWER June 2014 - 32
POWER June 2014 - 33
POWER June 2014 - 34
POWER June 2014 - 35
POWER June 2014 - 36
POWER June 2014 - 37
POWER June 2014 - 38
POWER June 2014 - 39
POWER June 2014 - 40
POWER June 2014 - 41
POWER June 2014 - 42
POWER June 2014 - 43
POWER June 2014 - 44
POWER June 2014 - 45
POWER June 2014 - 46
POWER June 2014 - 47
POWER June 2014 - 48
POWER June 2014 - 49
POWER June 2014 - 50
POWER June 2014 - 51
POWER June 2014 - 52
POWER June 2014 - 53
POWER June 2014 - 54
POWER June 2014 - 55
POWER June 2014 - 56
POWER June 2014 - 57
POWER June 2014 - 58
POWER June 2014 - 59
POWER June 2014 - 60
POWER June 2014 - 61
POWER June 2014 - 62
POWER June 2014 - 63
POWER June 2014 - 64
POWER June 2014 - 65
POWER June 2014 - 66
POWER June 2014 - 67
POWER June 2014 - 68
POWER June 2014 - 69
POWER June 2014 - 70
POWER June 2014 - 71
POWER June 2014 - 72
POWER June 2014 - 73
POWER June 2014 - 74
POWER June 2014 - 75
POWER June 2014 - 76
POWER June 2014 - 77
POWER June 2014 - 78
POWER June 2014 - 79
POWER June 2014 - 80
POWER June 2014 - 81
POWER June 2014 - 82
POWER June 2014 - 83
POWER June 2014 - 84
POWER June 2014 - Cover3
POWER June 2014 - Cover4
https://www.nxtbook.com/accessintelligence/POWER/pwr_may-2024
https://www.nxtbook.com/accessintelligence/POWER/pwr_april-2024
https://www.nxtbook.com/accessintelligence/POWER/pwr_march-2024
https://www.nxtbook.com/accessintelligence/POWER/pwr_february-2024
https://www.nxtbook.com/accessintelligence/POWER/pwr_january-2024
https://www.nxtbook.com/accessintelligence/POWER/pwr_december-2023
https://www.nxtbook.com/accessintelligence/POWER/pwr_november-2023
https://www.nxtbook.com/accessintelligence/POWER/power-october-2023
https://www.nxtbook.com/accessintelligence/POWER/re-tech-supp-to-power-september-2023
https://www.nxtbook.com/accessintelligence/POWER/power-september-2023
https://www.nxtbook.com/accessintelligence/POWER/power-and-re-tech-supp-september-2023
https://www.nxtbook.com/accessintelligence/POWER/power-august-2023
https://www.nxtbook.com/accessintelligence/POWER/power-july-2023
https://www.nxtbook.com/accessintelligence/POWER/power-june-2023
https://www.nxtbook.com/accessintelligence/POWER/power-may-2023
https://www.nxtbook.com/accessintelligence/POWER/power-april-2023
https://www.nxtbook.com/accessintelligence/POWER/power-march-2023
https://www.nxtbook.com/accessintelligence/POWER/power-february-2023
https://www.nxtbook.com/accessintelligence/POWER/power-january-2023
https://www.nxtbook.com/accessintelligence/POWER/power-december-2022
https://www.nxtbook.com/accessintelligence/POWER/power-november-2022
https://www.nxtbook.com/accessintelligence/POWER/Power-October-2022-140th-Anniversary-Supp
https://www.nxtbook.com/accessintelligence/POWER/Power-October-2022-and-Anniversary-Supp
https://www.nxtbook.com/accessintelligence/POWER/power-and-re-tech-supp-september-2022
https://www.nxtbook.com/accessintelligence/POWER/power-september-2022
https://www.nxtbook.com/accessintelligence/POWER/power-august-2022
https://www.nxtbook.com/accessintelligence/POWER/Power-July-2022-Intl
https://www.nxtbook.com/accessintelligence/POWER/power-july-2022
https://www.nxtbook.com/accessintelligence/POWER/power-june-2022-intl
https://www.nxtbook.com/accessintelligence/POWER/power-june-2022
https://www.nxtbook.com/accessintelligence/POWER/power-may-2022
https://www.nxtbook.com/accessintelligence/POWER/power-may-2022-intl
https://www.nxtbook.com/accessintelligence/POWER/power-april-2022
https://www.nxtbook.com/accessintelligence/POWER/Power-April-2022-Intl
https://www.nxtbook.com/accessintelligence/POWER/power-march-2022
https://www.nxtbook.com/accessintelligence/POWER/power-february-2022
https://www.nxtbook.com/accessintelligence/POWER/power-january-2022
https://www.nxtbook.com/accessintelligence/POWER/power-december-2021
https://www.nxtbook.com/accessintelligence/POWER/power-top-plants-supp-december-2021
https://www.nxtbook.com/accessintelligence/POWER/power-november-2021
https://www.nxtbook.com/accessintelligence/POWER/power-october-2021
https://www.nxtbook.com/accessintelligence/POWER/power-september-2021
https://www.nxtbook.com/accessintelligence/POWER/power-august-2021
https://www.nxtbook.com/accessintelligence/POWER/power-july-2021
https://www.nxtbook.com/accessintelligence/POWER/power-june-2021
https://www.nxtbook.com/accessintelligence/POWER/power-may-2021
https://www.nxtbook.com/accessintelligence/POWER/power-april-2021
https://www.nxtbook.com/accessintelligence/POWER/power-march-2021
https://www.nxtbook.com/accessintelligence/POWER/power-february-2021
https://www.nxtbook.com/accessintelligence/POWER/power-january-2021
https://www.nxtbook.com/accessintelligence/POWER/power-december-2020
https://www.nxtbook.com/accessintelligence/POWER/power-november-2020
https://www.nxtbook.com/accessintelligence/POWER/power-october-2020
https://www.nxtbook.com/accessintelligence/POWER/power-september-2020
https://www.nxtbook.com/accessintelligence/POWER/power-august-2020
https://www.nxtbook.com/accessintelligence/POWER/power-july-2020
https://www.nxtbook.com/accessintelligence/POWER/power-june-2020
https://www.nxtbook.com/accessintelligence/POWER/power-may-2020
https://www.nxtbook.com/accessintelligence/POWER/power-april-2020
https://www.nxtbook.com/accessintelligence/POWER/power-march-2020
https://www.nxtbook.com/accessintelligence/POWER/power-february-2020
https://www.nxtbook.com/accessintelligence/POWER/power-january-2020
https://www.nxtbook.com/accessintelligence/POWER/power-december-2019
https://www.nxtbook.com/accessintelligence/POWER/power-november-2019
https://www.nxtbook.com/accessintelligence/POWER/power-october-2019
https://www.nxtbook.com/accessintelligence/POWER/power-september-2019
https://www.nxtbook.com/accessintelligence/POWER/power-august-2019
https://www.nxtbook.com/accessintelligence/POWER/power-july-2019
https://www.nxtbook.com/accessintelligence/POWER/power-june-2019
https://www.nxtbook.com/accessintelligence/POWER/power-may-2019
https://www.nxtbook.com/accessintelligence/POWER/power-april-2019
https://www.nxtbook.com/accessintelligence/POWER/power-march-2019
https://www.nxtbook.com/accessintelligence/POWER/power-february-2019
https://www.nxtbook.com/accessintelligence/POWER/power-january-2019
https://www.nxtbook.com/accessintelligence/POWER/power-december-2018
https://www.nxtbook.com/accessintelligence/POWER/power-november-2018
https://www.nxtbook.com/accessintelligence/POWER/power-october-2018
https://www.nxtbook.com/accessintelligence/POWER/power-september-2018
https://www.nxtbook.com/accessintelligence/POWER/power-august-2018
https://www.nxtbook.com/accessintelligence/POWER/power-july-2018
https://www.nxtbook.com/accessintelligence/POWER/power-june-2018
https://www.nxtbook.com/accessintelligence/POWER/power-may-2018
https://www.nxtbook.com/accessintelligence/POWER/power-april-2018
https://www.nxtbook.com/accessintelligence/POWER/power-march-2018
https://www.nxtbook.com/accessintelligence/POWER/power-february-2018
https://www.nxtbook.com/accessintelligence/POWER/power-january-2018
https://www.nxtbook.com/accessintelligence/POWER/power-december-2017
https://www.nxtbook.com/accessintelligence/POWER/power-november-2017
https://www.nxtbook.com/accessintelligence/POWER/power-october-2017
https://www.nxtbook.com/accessintelligence/POWER/power-september-2017
https://www.nxtbook.com/accessintelligence/POWER/power-august-2017
https://www.nxtbook.com/accessintelligence/POWER/power-july-2017
https://www.nxtbook.com/accessintelligence/POWER/power-june-2017
https://www.nxtbook.com/accessintelligence/POWER/power-may-2017
https://www.nxtbook.com/accessintelligence/POWER/power-april-2017
https://www.nxtbook.com/accessintelligence/POWER/power-march-2017
https://www.nxtbook.com/accessintelligence/POWER/power-february-2017
https://www.nxtbook.com/accessintelligence/POWER/power-january-2017
https://www.nxtbook.com/accessintelligence/POWER/power-december-2016
https://www.nxtbook.com/accessintelligence/POWER/power-november-2016
https://www.nxtbook.com/accessintelligence/POWER/power-october-2016
https://www.nxtbook.com/accessintelligence/POWER/power-september-2016
https://www.nxtbook.com/accessintelligence/POWER/power-august-2016
https://www.nxtbook.com/accessintelligence/POWER/power-july-2016
https://www.nxtbook.com/accessintelligence/POWER/power-june-2016
https://www.nxtbook.com/accessintelligence/POWER/power-may-2016
https://www.nxtbook.com/accessintelligence/POWER/power-april-2016
https://www.nxtbook.com/accessintelligence/POWER/power-march-2016
https://www.nxtbook.com/accessintelligence/POWER/power-february-2016
https://www.nxtbook.com/accessintelligence/POWER/power-january-2016
https://www.nxtbook.com/accessintelligence/POWER/power-december-2015
https://www.nxtbook.com/accessintelligence/POWER/power-november-2015
https://www.nxtbook.com/accessintelligence/POWER/power-october-2015
https://www.nxtbook.com/accessintelligence/POWER/power-september-2015
https://www.nxtbook.com/accessintelligence/POWER/power-august-2015
https://www.nxtbook.com/accessintelligence/POWER/power-july-2015
https://www.nxtbook.com/accessintelligence/POWER/power-june-2015
https://www.nxtbook.com/accessintelligence/POWER/power-may-2015
https://www.nxtbook.com/accessintelligence/POWER/power-april-2015
https://www.nxtbook.com/accessintelligence/POWER/power-march-2015
https://www.nxtbook.com/accessintelligence/POWER/power-february-2015
https://www.nxtbook.com/accessintelligence/POWER/power-january-2015
https://www.nxtbook.com/accessintelligence/POWER/power-december-2014
https://www.nxtbook.com/accessintelligence/POWER/power-november-2014
https://www.nxtbook.com/accessintelligence/POWER/power-october-2014
https://www.nxtbook.com/accessintelligence/POWER/power-september-2014
https://www.nxtbook.com/accessintelligence/POWER/power-august-2014
https://www.nxtbook.com/accessintelligence/POWER/power-july-2014
https://www.nxtbook.com/accessintelligence/POWER/power-june-2014
https://www.nxtbook.com/accessintelligence/POWER/power-may-2014
https://www.nxtbook.com/accessintelligence/POWER/power-april-2014
https://www.nxtbook.com/accessintelligence/POWER/power-march-2014
https://www.nxtbook.com/accessintelligence/POWER/power-february-2014
https://www.nxtbook.com/accessintelligence/POWER/power-january-2014
https://www.nxtbook.com/accessintelligence/POWER/power-december-2013
https://www.nxtbook.com/accessintelligence/POWER/power-november-2013
https://www.nxtbook.com/accessintelligence/POWER/power-october-2013
https://www.nxtbook.com/accessintelligence/POWER/power-september-2013
https://www.nxtbook.com/accessintelligence/POWER/power-august-2013
https://www.nxtbook.com/accessintelligence/POWER/power-july-2013
https://www.nxtbook.com/accessintelligence/POWER/power-june-2013
https://www.nxtbook.com/accessintelligence/POWER/power-may-2013
https://www.nxtbook.com/accessintelligence/POWER/power-april-2013
https://www.nxtbook.com/accessintelligence/POWER/power-march-2013
https://www.nxtbook.com/accessintelligence/POWER/power-february-2013
https://www.nxtbook.com/accessintelligence/POWER/power-january-2013
https://www.nxtbook.com/accessintelligence/POWER/power-december-2012
https://www.nxtbook.com/accessintelligence/POWER/power-november-2012
https://www.nxtbook.com/accessintelligence/POWER/power-october-2012
https://www.nxtbook.com/accessintelligence/POWER/power-september-2012
https://www.nxtbook.com/accessintelligence/POWER/power-august-2012
https://www.nxtbook.com/accessintelligence/POWER/power-july-2012
https://www.nxtbook.com/accessintelligence/POWER/power-june-2012
https://www.nxtbook.com/accessintelligence/POWER/power-may-2012
https://www.nxtbook.com/accessintelligence/POWER/power-april-2012
https://www.nxtbook.com/accessintelligence/POWER/power-march-2012
https://www.nxtbook.com/accessintelligence/POWER/power-february-2012
https://www.nxtbook.com/accessintelligence/POWER/power-january-2012
https://www.nxtbook.com/accessintelligence/POWER/power-november-2011
https://www.nxtbook.com/accessintelligence/POWER/power-october-2011
https://www.nxtbook.com/accessintelligence/POWER/power-september-2011
https://www.nxtbook.com/accessintelligence/POWER/power-august-2011
https://www.nxtbook.com/accessintelligence/POWER/power-july-2011
https://www.nxtbook.com/accessintelligence/POWER/power-june-2011
https://www.nxtbook.com/accessintelligence/POWER/power-may-2011
https://www.nxtbook.com/accessintelligence/POWER/power-april-2011
https://www.nxtbook.com/accessintelligence/POWER/power-march-2011
https://www.nxtbook.com/accessintelligence/POWER/power-february-2011
https://www.nxtbook.com/accessintelligence/POWER/power-january-2011
https://www.nxtbook.com/accessintelligence/POWER/power-december-2010
https://www.nxtbook.com/accessintelligence/POWER/power-november-2010
https://www.nxtbook.com/accessintelligence/POWER/power-october-2010
https://www.nxtbook.com/accessintelligence/POWER/power-september-2010
https://www.nxtbook.com/accessintelligence/POWER/power-august-2010
https://www.nxtbook.com/accessintelligence/POWER/power-july-2010
https://www.nxtbook.com/accessintelligence/POWER/power-june-2010
https://www.nxtbook.com/accessintelligence/POWER/power-may-2010
https://www.nxtbookmedia.com