ucaiug summit sg security session 16 november 2011 austin, tx opening session agenda status updates...

46
UCAIug Summit SG Security Session 16 November 2011 Austin, TX Opening Session Agenda Status Updates Distribution Reliability & Cyber Security

Upload: rosalind-warner

Post on 16-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

UCAIug SummitSG Security Session

16 November 2011Austin, TX

Opening SessionAgenda

Status UpdatesDistribution Reliability & Cyber Security

AgendaDay Timeslot Subject Group

Tuesday 1530-1730 SG Security Boot Camp SG Sec WG

Wednesday 0800-1200 Opening Plenary UCAIug

1300-1500 Agenda & Status updatesUsability Analysis TFDistribution Reliability & Cyber Security

SG Sec WG

Thursday 0800-1000 Vulnerability Handling & Information Sharing SG Sec WG

1030-1200 SG Security / OpenADR* Joint Session 1530-1730 Substation Automation Security Profile SG Sec WG

Friday 0800-1000 External Activities: NERC , NESCOR, SGIP…Closeout / Actions Forward

SG Sec WG

SG Security Working Group

Chair Darren Highfill, SCE

Vice-Chair Bobby Brown, EnerNex

Secretary Scott Palmquist, Itron

SG Security WG – Task Forces• Usability Analysis Task Force

– Chair: John Lilley (SDG&E), Vice-Chair: Daniel Thanos (GE)

• CyberSec-Interop Task Force– Chair: Dave Teumim (Teumim Technical), Vice-Chair: John Stewart (TVA)

• AMI-SEC Task Force– Chair: Darren Highfill (SCE), Vice-Chair: Bobby Brown (EnerNex)

• Embedded Systems Security Task Force– Chair: Mark Ward (PG&E), Vice-Chair: Rohit Khera (S&C Electric)

SG Security – Recent Accomplishments

• Usability Analysis Task Force– 2nd Review of Distribution Management Security Profile– Revision of Wide-Area Monitoring, Protection, & Control Security Profile

• Embedded Systems Security Task Force– Working on Secure Device Profile for Embedded Systems

• OpenADR Support– Draft DR Security Profile

Objectives for November F2F Meeting

• Support relationships with other OpenSG working groups and task forces– OpenADR– Security Conformity

• Update on external activites– NERC, NESCOR, SGIP

• ASAP-SG– New work: Substation Automation Security Profile

• Open discussions– Vulnerability Handling

Usability Analysis TF

• Distribution Management Security Profile– Status: COMPLETE– Comments have been reviewed and incorporated into the

document– Evaluation report issued– Ratification vote passed– Awaiting OpenSG Technical Committee approval

Usability Analysis TF

• WAMPAC (Synchrophasor) Security Profile– Status: NEARING COMPLETION– Comments have been reviewed and incorporated

into the document– Evaluation Report is being finalized– Expect draft for vote soon…

Continuation of CyberSec-Interop?

• Interoperable Configuration Profiles– Valuable work products– Close alignment with goals of UCA, SGIP

• Work/activity appears to have stalled• Need champion to carry work forward

AMI-SEC Task Force

• Re-work of AMI Security Profile by CSWG AMI Security Subgroup– Using ASAP-SG method

• Are there other tasks?

Embedded Systems Security TF

• Work still continuing, but loss of momentum• Re-scope work to reap value from what has

already been accomplished?• Re-examine sub-leads and meeting times

Distribution Reliability

• Classic definitions– Interruption indices: SAIDI, SAIFI, CAIFI

• Number of momentary and sustained interruptions• Duration of interruptions• Number of customers interrupted

Smart Grid Conceptual Model

Distribution Domain

Home Area Network

Distribution Failures• Line Segments

– Permanent vs. Temporary– Mean Time to Repair

• Protective & Switching Devices– Probability of Failure– Protection Reliability– Reclose Reliability– Mean Time to Repair– Switching Reliability– Mean Time to Switch

Distribution Reliability

• Newer generation of indices– Power Quality (sag and swell)– SIARFI, SMARFI, STARFI

• Customers with specific power needs– Largely industrial customers to-date– Moving toward service-oriented model?

Customer Domain

Ways to Improve

• Maintenance– Corrective and Preventative

• Installation of reclosers & breakers

• Automation• Crew Management

• Switching algorithms– Upstream and Downstream

(back feeding)• System Reconfiguration

– Islanding & Restoration

UCAIug SummitSG Security Session

17 November 2011Austin, TX

Security Vulnerability Discussion

Vulnerability Disclosure and Information Sharing

Vulnerability Disclosure Progress ?

• General practice

• ICSJWG Whitepaper status

• The Beresford Vulnerabilities, ICS-CERT, and Siemens

• Digital Bond’s Response

Information SharingWhat is this?• Some people know something bad about security of critical

infrastructure• Only government agencies, asset owners, the discoverer,

and the supplier directly involved are allowed to know.• Other people need to know this

– Ever hear of proactive response to threats?

• Government lawyers are here to help but don’t tell anybody what you know.

Vulnerability Disclosure and Information Sharing

• Who is going to shoot that &%$#&@ elephant!?

• Can we hold anyone responsible for being irresponsible?

• Do we want to hold anyone responsible?

Vulnerability Disclosure and Information Sharing

• Does anyone know the requirements for vulnerability disclosure and information sharing processes that would protect the security of critical infrastructure?

• Sounds like an OSGug kind of thing to me?

UCAIug OpenADR Taskforce Meeting

Nov 16,17, 2011Austin Face to Face Meeting

Face to Face OpenADR Taskforce Agenda

• Wed, 11/16 – 3:30 – 5:50 PAP09/OpenADR joint meeting

• Thur, 11/17 – 8:00 -10:00 – Phase II SRS discussion – 100:30 - 12:00 Joint Security Meeting– 3:30-5:30 Phase II SRS wrap up, future planning

Phase 2 Requirements• Phase 2 Business & User Requirements addressed by System Requirements

• Phase 2 requirements B&U requirements are Dispositioned in one of five ways:

1 New service is identified.

2 Change to an existing service.

3 Existing service addresses the requirement.

4 Non-functional requirement.

5 Out of Scope.

OpenADR Security Profile• Goal: Provide vetted OpenADR Security Profile November 2011• Today’s Session (Working Session)

– Review Security Profile Development Process– Review ASAP-SG Framework used– High level review of existing document

• OpenADR functionality• Use Cases- taxonomy and failure points

– Open Issues– Steps to conclusion for comments and approval

OpenADR Security Profile Process

• Developed by joint team from OpenADR TF and SG Security

• Additional Stakeholders in OpenADR Alliance (OpenADR 2.0 Spec. & CoS)

• Developed using ASAP-SG Framework– Framework overview from Darren

ASAP-SGSUBSTATION AUTOMATION SECURITY PROFILE

ROLE TO DEVICE MAPPING DISCUSSION

UCAIug/SG Security F2FNovember 2011

32

Substation Roles Identified SENSOR ACTUATOR PROTECTION APPLICATION MONITORING APPLICATION CONTROL APPLICATION CONTROL AUTHORITY

INFORMATION REPOSITORY PROXY USER INTERFACE DEVICE MANAGER USER MAINTAINER

Some Quick Notes About Roles

• Many devices today can support numerous roles• A Utility may implement all or a subset of the

devices capabilities (roles)• A role may be implemented more than once

within a substation automation system

33

Example Substation Architecture

34

Role to Device Mapping Example

35

PROTECTION RELAY and MERGING UNIT

36

COMMUNICATIONS PROCESSOR

Role to Device Mapping Example

37

DIGITAL FAULT RECORDER & METER

Role to Device Mapping Example

38

HUMAN MACHINE INTERFACE (HMI)

Role to Device Mapping Example

39

SUBSTATION GATEWAY

40

REMOTE TERMINAL UNIT (RTU)

Role to Device Mapping Example

41

PROGRAMMABLE LOGIC CONTROLLER (PLC)

Role to Device Mapping Example

Substation Automation Security Profile

• Security of automated functions found in transmission and distribution substations, including system monitoring, switchgear control, and system protection

• Considered “in scope”:– Equipment inside the substation perimeter (i.e., fence, building, or other enclosure)– Interfaces to substation equipment for communications with remote sites and other facilities– Direct communications between substations (e.g., transfer trip)

Processing &Communications of

Measurements,Notifications, &Control Signals

Operate,Control, &

Protect

Within & AmongstSubstation Components

used to

the Electric Grid

UCAIug SummitSG Security Session

18 November 2011Austin, TX

Industry UpdatesAction Items & Closeout

CSWG Update• Subgroups

– DPG– Privacy– High Level Requirements– Architecture– Testing & Certification– AMI Security

• F2F– GridInterop, December 5, 2011, 3:30-5:00 CT, Phoenix– Cyber Physical conference in April 23-24, 2012, Gaithersburg, MD– CSWG F2F April 24-25, 2012, Sterling, VA

NERC Update

• 2011 GridEx – Cybersecurity exercise completed yesterday

• Smart Grid Task Force• Cyber Attack Task Force• Severe Impact Resiliency

Questions?

[email protected]

SG Security WG Collaboration Sitehttp://osgug.ucaiug.org/utilisec