don't get hacked! cybersecurity boot camp
DESCRIPTION
At the 2011 NARUC Winter Committee Meetings, Patrick Miller teamed up with seasoned security experts Miles Keogh from NARUC and Bill Hunteman from the Department of Energy to deliver an engaging Cybersecurity Boot Camp.TRANSCRIPT
NA
RU
C Don’t Get Hacked! Cybersecurity Boot Camp
Patrick C Miller, EnergySec / NESCO Bill Hunteman, US DOE
Miles Keogh, NARUC February 13 2011
NARUC Winter Committee Meetings Marriott Renaissance, Washington DC
NA
RU
C Our Drill Instructors!
l Miles Keogh § Director of Grants and Research, NARUC
l Patrick C Miller § Founder, President and CEO, EnergySec § Principal Investigator, National Electric Sector Cybersecurity
Organization (NESCO) § Former Director, NERC CIP Practice, ICF International § Former Manager, WECC CIP Audits & Investigations § Corporate Security staff for several Pacific Northwest utilities § Deep roots in Telecom sector, IT and Industrial Control Systems § CRISC, CISA, CISSP-ISSAP, SSCP, CEH, CVI, NSA-IAM
NA
RU
C Our Drill Instructors!
l Bill Hunteman § Chief Advisor for Cybersecurity, US Department of Energy § DOE Chief Information Security Officer (CISO) and Associate CIO
for Cyber Security § Cybersecurity Program Manager for the DOE National Nuclear
Security Administration § Worked in the Los Alamos and Sandia National Laboratories § Managed cybersecurity research and development activities § Participated in the development of national and international cyber
security criteria § Joint projects with Russia to improve cyber security in the Russian
nuclear weapons complex § Design and development of high performance computer networks
and operating systems for many of the supercomputers used by DOE (and its predecessors)
§ Bachelor or Science in Mathematics and Master of Science Electrical Engineering/Computer Science
NA
RU
C What We’re Covering Today
l What’s the “Cyber” in “Cyber security?”
l What are we trying to protect?
l What threats do we face?
l What are the challenges of instituting cyber security?
l Where do the vulnerabilities within the system exist?
l What can Commissions do about it? l What are the policy structures you have
to work with?
NA
RU
C What Have You Seen?
l How well do you understand the confluence of networked and traditional devices?
l Has cybersecurity come before your commission?
l What has that looked like? l What questions do you have about
cybersecurity? l Is cybersecurity a concern at your
commission?
5 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Rising Cybersecurity Threats
6 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
CyberWar (InfoWar)
7 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Aurora
8 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Night Dragon
• Recently published by McAfee
• Activity designed to obtain sensitive data from targeted organizations in global oil and energy industries…
9 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Night Dragon
• Source appears to be China, but this is difficult to confirm exactly
• Began Nov 2009, possibly as early as 2007
• Techniques: – Social engineering
– Spear-phishing attacks
– Exploitation of Microsoft Windows vulnerabilities
– Microsoft Active Directory compromises
– Remote administration tools (RATs)
10 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Night Dragon
• Harvesting sensitive competitive proprietary operations, and project-financing information for oil and gas field bids and operations
• Controlled systems, then cracked accounts to move to more sensitive information/systems
• Focus was on operational oil and gas field production systems and financial documents related to field exploration and bidding
• In certain cases, the attackers collected data from SCADA systems
11 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Stuxnet
• First publicly disclosed control systems rootkit, but certainly wont be the last...
• USB vector; focused on “air-gapped” networks
• Highly sophisticated; infects everything, then rewrites PLC logic and hides
• Undermines integrity of control system
• Most regulations wouldn’t have stopped it
• No 100% security against determined
adversary
12 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
SHODAN, ERIPP, ETC
13 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
SHODAN, ERIPP, ETC
Berkeley Cyclotron HMI images
14 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
There’s An App For That
• “Get mobile access to your control system via an iPhone, iPad, Android and other smartphones and tablet devices. The Ignition Mobile Module gives you instant access to any HMI / SCADA project created with the Ignition Vision Module.”
15 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Public Domain
16 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Only The Disclosed
17 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
TwitBookBlogosphere
18 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Research and Disclosure
• October 24, 2010, 12:39PM, Threat Post – SCADA Vendors Still Need Security Wake Up Call
• http://threatpost.com/en_us/blogs/scada-vendors-still-need-security-wake-call-102410
– “Please don’t waste my time”
• October 28, 2010: ICSJWG Seattle Meeting – Invensys, IOActive, ICS-CERT presented on case study on
Wonderware vulnerability
• Disclosure positions are hotly debated
19 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
From Obscurity To Novelty
• Smart Meter hacking
• Hacking cookbooks
• Metasploit
• Fuzzers
• Supply chain attacks
• Manuals available in all languages on Internet
20 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Shiny Object
• Shiny object for the mass media
• 60 minutes
• Wall Street Journal, National Journal, CNN
• Too many IT trade publications to name
• Blockbuster films
• Prime time television shows
• Social Media (blogosphere, Twitter)
21 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Economic Drivers
• Recession economy brings unique challenges
• Decreased participation working groups and conferences
• Static or shrinking headcount; increased workload
• Insider threat increases
• Decreased spending on new equipment
• Older products extended beyond intended lifespan
• Security is expensive for customers and vendors
22 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
People Problem
• Humans are the weakest link in any security system – Passwords for candy; Social engineering
• Humans are also the strongest link in any security system – The Aware Person System (APS)
– ICS culture shift is very slow, but can be very powerful
• Danger: unskilled/untrained operators of power tools can cause significant damage – Increasing complexity = training treadmill
23 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
People Solution
• So you’ve bought all of the fancy cybersecurity gizmos… – What about the skilled staff to use
them?
• So you’ve put cameras in all critical sites… – What about the staff to monitor and
respond?
• An appropriate balance of skilled people and current technology must be used
24 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Back In The Good Old Days
• Pneumatic, electromechanical, analog
• Telephone meant POTS or “bat phone”
• No Internet
• Less automation
• Less complexity
• Proprietary
• Long life span
25 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
ICS Gen-X
• Automation, more complexity
• Internet Protocol (TCP/UDP/etc)
• Data, more data and even more data
• Processing power, memory, bandwidth = SPEED!
• Interconnected business
• Flat networks
• COTS software and hardware
• Increasingly shorter lifespans
26 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Millennium Systems
• Highly digital, highly complex
• Highly interconnected, highly layered
• Bitflocking, dynamic emergent behavior
• New protocols
• New interdependencies
• Homogenization
• Innovation treadmill; constant lifespan flux
27 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Bigger, Better, Faster
• ARRA and other “green” dollars are flowing
• SCADA devices now come with a flash-webserver-WiMax-mesh-ZigBee-kitchensink
• Mixing legacy and bleeding edge tech is difficult
• Logical distance between kinetic endpoint and HMI is exponentially increasing; “hyperembeddedness”
• Most (but not all) vendors put features first, security last; this will not change in the foreseeable future
28 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Advantage: Attackers
• Security approaches favor new installations, legacy environments are still vulnerable
• Very difficult to replace/patch in-service devices
• Stuxnet: game changer, sets the new bar - even when sophisticated attacks aren’t necessary
• Organized crime will top Nation States and Non-Government Organizations (NGOs) as biggest threat
• Welcome to the cyberarms race
29 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Cybersecurity Vocabulary
• Network
• Connectivity
• Packet
• Header
• Traffic
• Bandwidth
• Latency
• Internet Protocol
• Virus/Trojan/Malware
• Firmware
• Denial of Service
• NIST
• NERC CIP
• SCADA
• Encryption
• Credential
30 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Information Technology 101
• Connectivity: how the systems talk to each other – Hub – Switch – Managed Switch – Router – Firewall – Next Generation Firewall – Workstation/Server
• What are we building for?
Device Intelligence
“dumb”
“smart”
31 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Three Flavors
Business Systems Control Systems “Smart Grid”
32 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Business IT Security
• Typical approach: password, firewall, anti-virus, etc • Protecting four key domains
1. Confidentiality – preventing unauthorized access to information
2. Integrity – preventing the unauthorized modification or theft of information
3. Availability – preventing the denial of service and ensuring authorized access to information
4. Non-Repudiation – preventing the denial of an action that took place or the claim of an action that did not take place
33 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
What Is A Control System?
Remote Comms Master Meters Sensors Field Devices
PLC IED RTU Controller
Protocols Wired Wireless
SCADA Server HMI EMS DCS
I/O
Control Valve
M
R S M
O.L. STOP START
M
L1 L2
M
Basic Motor Control Ladder Logic
Human Machine Interface
Programmable Logic Controllers
34 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
IT vs ICS Security
TOPIC Informa5on Technology Industrial Control Systems
AnA-‐Virus/Mobile Code Common, widely used Uncommon, impossible
Typical Lifespan 3-‐5 years 15-‐20 years
Outsourcing Common, widely used Rare, uncommon
Patch Management Regular, scheduled Slow, vendor-‐specific
Change Management Regular, scheduled Uncommon
Time CriAcal Content Generally delays accepted CriAcal due to safety
Availability Generally delays accepted 24 x 7 x 365 x forever
Security Awareness Good Poor, except physical
Security TesAng/Audit Scheduled, mandated Occasional, uncommon
Physical Security Secure Remote and unmanned
35 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Typical Architecture
Corporate Network
Internet SCADA and other field devices
Process Control Network
Firewall
36 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Smart Grid Complications
37 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Smart Grid Complications
38 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
What Have You Seen?
• Did cyber security appear in your filings and hearings?
• How did this fit in your list of priorities?
• What elements were most important? – Privacy?
– Reliability?
– Cost?
– Security Effectiveness?
– Upgradeability as a solution or vulnerability?
39 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Threat Sources
• Inadvertent errors
• Power system equipment malfunctions
• Communication equipment failure
• Deliberate malicious acts
40 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Threat Types
• Replay attacks
• Indiscretions (leaks) by personnel
• Brute force
• Bypass controls
• Man-in-the-Middle
• Denial of Service
• Resource Exhaustion
41 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Nothing New Under The Sun
• Mature security practices; highly refined – Defense in Depth
– Principle of Least Privilege
– Segregation of Duties
– Need to Know
– Confidentiality, Integrity, Availability
• No Silver Bullet, 100%, Total Security
• Strong protection has never been easy, inexpensive or quick to implement
• Tradeoff between functionality and security
42 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Strategies for Defense In Depth
• Governance, policy
• Authentication
• Authorization
• Admission control
• Encryption
• Integrity checking
• Auditing, detection
43 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Defense In Depth: Example
• NERC CIP Standards
– CIP-002 – Critical Cyber Asset Identification
– CIP-003 – Security Management Controls
– CIP-004 – Personnel & Training
– CIP-005 – Electronic Security Perimeter(s)
– CIP-006 – Physical Security
– CIP-007 – Systems Security Management
– CIP-008 – Incident Reporting & Response Planning
– CIP-009 – Recovery Plans for Critical Cyber Assets
44 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Proven Security Solutions
• Physical Protection
• Network Controls: Admission, Segmentation
• Strong ID, Authentication and Authorization
• Aware Person System (Training and Awareness)
• Intrusion Detection/Prevention
• Integrity Assurance
• Application Whitelisting
• Response and Recovery
45 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
You Don’t Need a Perfect Defense
• If defensive measures can be beaten, does the system ensure the results of the attack are : – Unprofitable
– Limited in its ramifications
– Hard enough to make the “juice” not worth the “squeeze”
– Difficult to replicate
– Quickly and easily recoverable
– Traceable and easy to detect; and
– Otherwise unappealing
NA
RU
C Why Your Role Is Increasing
l Increased attacks to business processes l NERC CIP compliance l The deployment of smart grid
l These are increasingly drivers for cost recovery consideration and other contexts in cases that are coming your way very soon
l Is that reflected in what you’re seeing / hearing?
NA
RU
C Proposal: Roles for
Public Utility Commissions 1. Ask the right questions when considering cost
recovery of prudent utility expenditures for cyber security.
2. Assuring that cyber security requirements that utilities are subject to are being met.
§ PUC Staff need to be up-to-date on cyber security requirements and potential threats.
3. Assuring that the PUC’s computer systems and operations are subject to on-going cyber security reviews and remediation, and that disaster recovery plans are in place and tested.
§ This also included cyber security awareness for agency employees.
4. Understand and participate in regional and national efforts for protecting critical infrastructure
NA
RU
C l Worth saying twice: someone at the PUC staff needs to be up-to-date on cyber security requirements and potential threats.
l Ask how security is addressed (conceptually) for each component l Don’t accept assurances that all products used were built to be secure, or that IT solutions will work for SCADA systems. Insist that vendors document & independently verify their security controls
l Use “compliance” as a floor, not a ceiling: Ask to see risk assessment documentation
l Ensure security is budgeted for and individuals are assigned responsibility
l Ensure service providers (for example, telcos, meter data processors) are included in risk assessment and provide sufficient information
l Ensure integrated security between business systems and control systems for existing grid and for smart grid
48
Cybersecurity Investments: What To Ask
NA
RU
C Three examples of State action
l Pennsylvania l Missouri l New York
l PUCs don’t need to become cyber experts or enforces, but if you ask a utility a question they will return with an answer
50 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Cybersecurity Requirements and Resources
• For the Bulk Power System: – The North American Electric Reliability Corporation --
Standards CIP-002 through CIP-009 (the Critical Cyber Asset Identification portion of the Critical Infrastructure Protection standards)
– http://www.nerc.com/page.php?cid=2|20
• For the Smart Grid: – The National Institute of Standards and Technology (NIST)
smart grid interoperability standards and specifications for inclusion in the Smart Grid Interoperability Standards Framework, Release 1.0. These include three volumes on cyber security
– http://csrc.nist.gov/publications/PubsNISTIRs.html#NIST-IR-7628
• What’s Missing? – Distribution systems, serial control systems, and other gaps
51 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Smart Grid Investment Grant Program
• Requires a description of how cyber security concerns will be addressed with respect to the use of best available equipment and the application of procedures and practices involving system design, testing, deployment, operations and decommissioning, including at a minimum: i. A description of the cyber security risks at each stage of the system
deployment lifecycle, ii. Cyber security criteria used for vendor and device selection, iii. Cyber security control strategies, iv. Descriptions of residual cyber security risks, v. Relevant cyber security standards and best practices, and vi. Descriptions of how the project will support/adopt/implement
emerging smart grid security standards
Source: Notice of Intent to Issue a Funding Opportunity Announcement For the Smart Grid Investment Grant Program, April 16, 2009
52 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Is Smart Grid More Vulnerable?
Source: “San Diego Smart Grid Study”, October 2006
Power outages cost between $80 billion and $150 billion every year
53 53
Energy Independence and Security Act o In the Energy Independence and Security Act
(EISA) of 2007, Congress established the development of a Smart Grid as a national policy goal.
o Under EISA, NIST is directed to “coordinate the development of a framework that includes protocols and model standards for information management to achieve interoperability of smart grid devices and systems” as well as maintain the reliability and security of the electricity infrastructure.
54
Conceptual Reference Diagram for Smart Grid Information Networks
55 55
Interoperability Framework
Testing and Certification
Standards
Security Architecture and Requirements
Conceptual Reference Model
Business and Public Policy Requirements
56
NIST Three Phase Plan
PHASE 1 Identify an initial set of
existing consensus standards and develop a roadmap to fill gaps
PHASE 2 Establish public/private
Standards Panel to provide ongoing recommendations for
new/revised standards
PHASE 3 Testing and Certification Framework
2009 2010 56
57 57
Smart Grid – an Opportunity o Modernization provides an opportunity to
improve security of the Grid o Integration of new IT and networking
technologies n Brings new risks as well as an array of security
standards, processes, and tools o Architecture is key
n Security must be designed in – it cannot be added on later
58 58
CSWG o To address the cross-cutting issue of cyber
security, NIST established the Cyber Security Coordination Task Group (CSCTG) in March 2009
o Moved under the NIST Smart Grid Interoperability Panel (SGIP) as a standing working group and was renamed the Cyber Security Working Group (SGIP–CSWG)
o The CSWG now has more than 475 participants from the private sector (including vendors and service providers), academia, regulatory organizations, national research laboratories, and federal agencies
59 59
Guidelines for Smart Grid Cyber Security
o NIST Interagency Report 7628 - Augut 2010 n Development of the document lead by NIST n Represents significant coordination among
o Federal agencies o Private sector o Regulators o Academics
n Document includes material that will be used in selecting and modifying security requirements
60 60
NISTIR 7628 – What it IS and IS NOT What it IS o A tool for organizations that are researching, designing,
developing, and implementing Smart Grid technologies o May be used as a guideline to evaluate the overall cyber risks to
a Smart Grid system during the design phase and during system implementation and maintenance
o Guidance for organizations n Each organization must develop its own cyber security strategy
(including a risk assessment methodology) for the Smart Grid.
What it IS NOT o It does not prescribe particular solutions o It is not mandatory
61 61
!"#$%#&'()%*&+*,+$(-./01(/!!!1(/!.1(2%345
!"#$%#&'()%*&+*,+$(-./01(/!!!1(/!.1(2%345
64(7$2(.*$2(8&*9:$#$
64(7$2(.*$2(8&*9:$#$
;<%%<=(>?(*&*9:$#$-@>9&2,*A#9#%:(
39*$$2$5
;<%%<=(>?(*&*9:$#$-@>9&2,*A#9#%:(
39*$$2$5
B<?C+<D&(*&*9:$#$-#&%2,C3<=?<&2&%E(
+<=*#&5
B<?C+<D&(*&*9:$#$-#&%2,C3<=?<&2&%E(
+<=*#&5
FA4()=*,%(G,#+()%*&+*,+$8$$2$$=2&%
FA4()=*,%(G,#+()%*&+*,+$8$$2$$=2&%
F*4()23>,#%:(8,3H#%23%>,2F*4()23>,#%:(8,3H#%23%>,2
I4(.<&J<,=#%:8$$2$$=2&%I4(.<&J<,=#%:8$$2$$=2&%
K4(L#'H(M2@29()23>,#%:(
N2O>#,2=2&%$
K4(L#'H(M2@29()23>,#%:(
N2O>#,2=2&%$
P4(N#$Q(8$$2$$=2&%! /+2&%#J:(*$$2%$! R>9&2,*A#9#%#2$! BH,2*%$! /=?*3%$
P4(N#$Q(8$$2$$=2&%! /+2&%#J:(*$$2%$! R>9&2,*A#9#%#2$! BH,2*%$! /=?*3%$
0,#@*3:(8$$2$$=2&%0,#@*3:(
8$$2$$=2&%
Smart Grid Cyber Security Strategy - Tasks
62 62
NISTIR 7628 Content The NISTIR includes the following
o Executive Summary
o Chapter 1 - Overall cyber security strategy for the Smart Grid
o Chapter 2 – High level and logical security architecture
o Chapter 3 – High level security requirements
o Chapter 4 – Cryptography and key management
63 63
NISTIR 7628 Content (2)
o Chapter 5 - Privacy and the Smart Grid
o Chapter 6 – Vulnerability Classes
o Chapter 7 – Bottom-up security analysis of the Smart Grid
o Chapter 8 - R&D themes for cyber security in the Smart Grid
o Chapter 9 – Overview of the standards review
64 64
NISTIR 7628 Content (3) o Chapter 10 – Key power system use cases for
security requirements
o Appendices A - J
65 65
How to Participate in CSWG
o NIST Smart Grid portal http://nist.gov/smartgrid
o Cyber Security Working Group n Lead: Marianne Swanson
([email protected]) n NIST Support: Tanya Brewer
([email protected]) o Cyber Security Twiki site o http://collaborate.nist.gov/twiki-sggrid/bin/view/
SmartGrid/CyberSecurityCTG
NA
RU
C Security of PUC’s computer
systems
l Assuring that the computer systems that the PUC relies have on-going cyber security reviews and remediation of identified vulnerabilities.
l Disaster recovery plans are in place and tested and Continuity of Operation Plans have been developed.
l Cyber security awareness for agency employees including social engineering and insider threats.
This may be the responsibility of another state agency or office, but the implication of a failure will impact the business operation of the Commission
NA
RU
C Continuity of Operation Plans
(COOP) l Internal contingency plans of government and
business to assure the rapid resumption of essential functions as soon as possible if they are disrupted for any reason: e.g., fire, tornado, hurricanes, wildfires, earthquakes, terrorism, pandemics, etc. – Build Self-reliance and Resiliency
l Helps assure that critical/essential functions can quickly resume operations
l Addresses key or essential employees, required facilities, computer system records and back-up data systems, etc.
l Minimize damage & losses l Management succession & emergency powers
NA
RU
C On what cyber systems do you
rely? l What IT systems
support critical PUC functions?
l What are the backed up systems?
l What systems are needed to support restoration?
l What systems are needed operationally?
l In what sequence should systems be restored?
l What are the telecommunication needs and requirements?
Hourly Loss from Downtime in the Information Technology Sector: $1.3 million/hr
NA
RU
C What if this happened?
NA
RU
C Employee Education
http://www.michigan.gov/cybersecurity
71 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Resilience Factors
• Robustness – The ability to operate or stay standing in the face of
disaster • Resourcefulness
– skillfully managing a disaster once it unfolds • Rapid Recovery
– The capacity to get things back to normal as quickly as possible after a disaster
• Learning lessons – Having the means to absorb the new lessons that can be
drawn from a catastrophe
72 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Resilience Considerations
• Resilience depends on humans – Human networks are key – Ability to work together and individually – Potential for panic or confusion – Build necessary connections (relationships) in advance
• In the event of an electric power sector cyberattack, do you know: – Your role? If not, whose role it is to act? – Who to call? What they can /should do?
73 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Protecting The Right Stuff
• Very little security actuarial data vs. engineering actuarial data
• Most organizations don’t communicate details of security breaches
• Most estimates are based on FUD (Fear, Uncertainty and Doubt)
• Need better/current data on: – What is being attacked? (most preferred targets)
– Which attacks were successful?
74 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Product/Service Problem(s)
• Utilities are married to their products [and vendors] for many years
• Most products are very expensive to replace or upgrade and challenging to coordinate
• Product vendors are trying to balance security and profit; guess which one wins…
• Some vendors are responsive, most are not
• SCADA Procurement Language can help, but only for new purchases
75 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
What Can State Regulators Do?
• Get educated (even more than today)
• Strategic communication, in all directions
• Build new relationships and reshape old
• Support measures to get actuarial data
• Support secure procurement measures
• Support security training/education
• Support appropriate staffing levels
• Rethink the rate case approach
76 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
What Can State Regulators Do?
• Ask questions… – Are you using the SCADA Procurement Language?
– Are you participating in local, state, regional, national security/disaster exercises?
– What security training/education/awareness are you providing to your staff and how often?
– Where do you get your situational awareness data?
– What cybersecurity technologies do you use?
– Have you performed a full [exhaustive] inventory of all control systems and all associated communication links?
77 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Education and Training
• What is happening in Operations, Federal, States?
• OpSec, Red-Blue, Security Body of Knowledge, security concepts
• Security practices change rapidly – Need for training on new tactics and new technology is
perpetual
• Lack of education leads to a false sense of security – Otherwise known as knowing just enough to be dangerous
78 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Communication
• Ratepayers want a secure grid, until they see the bill – Expect rate shock
– Rates could triple or more, for some infrastructures
• “Common Practice” vs. “Best Practice”
• Early and regular, fact-based communication can minimize negative public reaction
• Remind ratepayers that smart, informed decisions are being made
79 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Communication
• Keep the story fresh; lather, rinse, repeat
• Leverage existing Safety communication vehicles/mechanisms – Newsletters
– Mailers, billing notices
– Public service announcments
– Sponsored events
• Partner with utilities, Federal agencies and even Media to convey a unified message
80 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Relationships
• Get out and talk to your operators
• Get to know the industry thought leaders
• What are your peers doing?
• Situational Awareness – NESCO, VirtualUSA, Einstein, Fusion centers, Infragard…
• Take a partnership approach to the rate case (vs. adversarial) as much as possible
81 The Na'onal Electric Sector Cybersecurity Organiza'on (NESCO) is a DOE-‐funded EnergySec Program
Closing Thoughts
• Cybersecurity is worth taking seriously, but will have to fit into a long list of concerns and priorities
• There are few response networks for utility sector cybersecurity among State Governments
• Few of those evaluating cybersecurity investments understand cybersecurity
• An unskilled operator of any power tool will hurt themselves and those around them – Training and staffing are imperative
• A culture shift is the first ingredient for success
• Soft-skills may matter more than technical skills
NA
RU
C Questions?
Patrick C Miller, President and CEO, EnergySec Principal Investigator, NESCO
[email protected] 503-446-1212
Miles Keogh, NARUC Director of Grants & Research
[email protected] 202-898-2217
Bill Hunteman, Chief Cyber Security Advisor
US Department of Energy Office of Electricity Deliver & Energy Reliability