Issue 2 2015 March/April Inside this Issue Page A Note from the President 1 PRC -005-2 2 Dancing with Systems 3 Regulatory Affairs 4-5 The Seam 6-7 The Lighthouse 8-10 Standards Update 11-12 Watt’s Up at RF 13-14 Reliability Committee 15 Calendar 16 RF Member Roster 17 ReliabilityFirst Corporation 3 Summit Park Drive Suite 600 Cleveland, OH 44131 Main Phone: 216-503-0600 Web: www.rfirst.org Follow us on A Note from the President Tim Gallagher, President and CEO Dear Stakeholders: Spring is in the air bringing with it renewed life and new beginnings! Here at RF, we are experiencing new beginnings as well. We wrapped up our first quarter with our Board of Directors Meeting, which took place from March 25-26. I am happy to announce that at that meeting our Board approved RF’s first Annual Report for 2014. This Report is the culmination of the collaborative effort between RF, its members, and stakeholders with the goal of continuing to strive to operate a transparent organization. Basically, we want you to know what we have been up to and why. The 2014 Annual Report focuses on several company-wide initiatives as well as significant departmental activities. This newsletter provides an overview of the Annual Report but you can read the entire report, which I encourage you to do, on our website next week. Also in this issue, you will learn about the new ground broken by FERC when it issued two recent Orders approving NERC’s Risk-Based Registration Initiative and Reliability Assurance Initiative on an ERO-wide basis. Both of these programs strive to improve reliability by focusing on risk. The overall goal of RiskBased Registration is to ensure entities are registered and made subject to the Reliability Standards based on the risk they pose to reliability, while the Reliability Assurance program aims to provide reasonable assurance of reliability through risk-based compliance monitoring and enforcement. We at RF appreciate the value that both of these programs bring and will continue to work closely with NERC and the other Regions to uniformly implement these programs across North America. Carl Dister continues his discussion on a systems approach to reliability by focusing on the need for all of us to renew our interest in our given areas of expertise and to keep up with new and changing issues. Not to be outdone, Lew Folkerth also provides a thoughtful column aimed to continue guiding you in your transition to version 5 of the Critical Infrastructure Protection Reliability Standards. Finally, as we move forward into 2015, RF will hold its Spring Workshop from April 14-17, 2015, providing its members and interested stakeholders the opportunity to learn about the upcoming changes related to version 5 of the Critical Infrastructure Protection Reliability Standards, risk-based monitoring and enforcement, and several other important topics and issues. I will again be observing the sessions and look forward to learning from your insightful questions and unique perspectives. I hope to see you there! Forward Together ReliabilityFirst Important Changes Coming With PRC-005-2 n Ÿ Those for transformers connecting aggregated generation that is part of the BES; and Ÿ Those for station service or excitation transformers connected to the generator bus of generators which are part of the BES, that act to trip the generator. Under the previous version of PRC-005, an entity had the ability to determine its own Protection System maintenance and testing program, including maintenance and testing intervals, their basis, and a summary of procedures. However, under the new PRC-005-2, an entity must identify whether it will follow the time-based method provided in the standard, the performance-based method (described in PRC-005 Attachment A), or a combination of the two. With the April 1, 2015 implementation date for PRC-005-2 fast approaching, this article aims to highlight the important changes effected by the new Standard. PRC-005-2 applies to Transmission Owners, Generator Owners, and Distribution Providers. It combines four existing Standards addressing various aspects of maintenance and testing of Protection and Control Systems, including: (1) Transmission and Generation Protection Systems Maintenance and Testing (previously PRC-005-1.1b); (2) Underfrequency Load Shedding Equipment Maintenance Programs (previously PRC-008-0); (3) Undervoltage Load Shedding (UVLS) System Maintenance and Testing (previously PRC-011-0); and, (4) Special Protection System Maintenance and Testing (previously PRC-017-0). In addition, PRC-005-2 includes a new Requirement, R5, that requires entities to demonstrate efforts to correct identified Unresolved Maintenance Issues, which are defined as “deficienc[ies] identified during a maintenance activity that cause[] the component to not meet the intended performance, cannot be corrected, and require[] follow-up corrective action.” For generator Facilities that are part of the BES, PRC-005-2 applies to the following types of Protection Systems: Ÿ Those that act to trip the generator directly or through lockout or auxiliary tripping relays; Ÿ Those for step-up transformers for generators that are part of the BES; Page 2 The time-based method utilizes predefined maintenance intervals for each component type as shown in the tables at the end of the standard. An entity may modify these intervals by using the performancebased method for components that meet the performance-based criteria defined in Attachment A. Entities are required to fully comply with R1, R2 and R5 by April 1, 2015. However, NERC’s proposed implementation plan provides a longer implementation period with respect to R3 and R4, as shown in the table below, including a phased implementation process for maintenance intervals 3 years or greater: Maximum Maintenance Interval % Compliant Date Less than 1 year 1-2 calendar years 3 calendar years 3 calendar years 3 calendar years 6 calendar years 6 calendar years 6 calendar years 12 calendar years 12 calendar years 12 calendar years 100% 100% 30% 60% 100% 30% 60% 100% 30% 60% 100% 10/1/2015 4/1/2017 4/1/20161 4/1/2017 4/1/2018 4/1/20172 4/1/2019 4/1/2021 4/1/2019 4/1/2023 4/1/2027 1 Or, for generating plants with scheduled outage intervals exceeding two years, at the conclusion of the first succeeding maintenance outage. 2 Or, for generating plants with scheduled outage intervals exceeding three years, at the conclusion of the first succeeding maintenance outage. For those interested in reading more about PRC-005-2, NERC’s Implementation Plan can be found here as well as NERC’s FAQ document here. n Dancing with Systems dancing w ith By: Carl Dister, Principal Reliability Consultant Keeping up with the Weavers systems A few weeks ago, a colleague sent me a classic technical paper from a 1948 issue of American Scientist. The era in which it is was published brought to my mind visions of the TV Show Leave it to Beaver, Polka Dancing with Frankie Yankovic, and expressions like “Keeping up with the Joneses.” The author of the article was Warren Weaver and the article was simply titled “Science and Complexity.” Around the same time I received this classic article, my son invited me to the movie Imitation Game, which took place during a similar era. The movie looked back to the advent of the Turing Machine and how it helped crack German message encryption. Both the article and the movie reminded me how far behind I had been in my career in “Keeping Up” with applied Complexity Science, a key component of Systems Thinking. For 30 years, I was successful in my career applying the basic engineering equations learned in college coursework, and I had a prejudice that Complexity Science was some type of political campaign from the scientific community to support political issues (e.g., Creationism vs Evolution, Global Climate Change, Capitalism, etc.). I wasn't interested in a political debate as a traditional Engineer. However, I have come to realize that Complexity Science is to Systems Thinking as Classical Science is to Basic Engineering. And in the area of Risk Management, understanding the foundations of Complexity Science is critical, not a political party propaganda tool. Here is a summary of some of the takeaways from the 1948 Weaver paper. (How well do you think these radical ideas apply to Risk Management in your organizations almost 70 years later?): “The essence of science is not to be found in its outward appearance, in its physical manifestations,… the Page 3 scientific method requires of its practitioners high standards of personal honesty, open-mindedness, focused vision, and love of the truth” (Are we focused on the “truth” of Reliability, or the relativism of Compliance?) “We must stop thinking of science in terms of gadgetry. Above all, science must not be thought of as a modern improved black magic capable of accomplishing anything and everything.” (Do we believe improving reliability simply means spending more money on equipment?) “As never before, the quantitative experimental methods and the mathematical analytical methods of the physical sciences are being applied to the biological, the medical, and even the social sciences”; “Knowledge of individual and group behavior must be improved” (How are we doing with applying the Social Sciences to Resiliency?) “Communication must be improved between peoples of different languages and cultures, as well as between all the varied interests.” (Do we understand the importance of diversity in the workforce to face unknown threats?) “Some scientists will seek and develop for themselves new kinds of collaborative arrangements; that these groups will have members drawn from essentially all fields of science; and that these new ways of working, effectively instrumented by huge computers, will contribute greatly to the advance which the next half century will surely achieve in handling the complex, but essentially organic, problems of the biological and social sciences” (Do we have cross functional risk teams (not separate OPS and CIP focused teams) that include Social Scientists and Financial folks?) How clear an understanding of Complexity Science do we have compared to the Classical Science most of us learned in school? As I have been trying to keep up with Complexity Science, especially how to apply it to real world problems like improving grid reliability and resiliency, here are a few foundational references I have personally found helpful to “Keep up with the Weavers”: Mitchell, M., Complexity : A Guided Tour. 2011, New York; Oxford: Oxford University Press. xvi, 349 p. Melanie Mitchell's book is very readable! She purposefully wrote the book to help people without detailed math and science backgrounds to understand the basics of Complexity. Rosa, E.A., O. Renn, and A.M. McCright, The Risk Society Revisited : Social Theory and Governance. 2014, Philadelphia: Temple University Press. xxx, 233 pages. The Risk Society dives into the underpinnings of Risk Management, and how we should be considering risks in governance. Although not highly mathematical, this book explores the philosophy behind the concept of risk. I found it very helpful in understanding the way different people from different levels of society understand risk. Flake, G.W., The Computational Beauty of Nature : Computer Explorations of Fractals, Chaos, Complex Systems, and Adaptation. 1998, Cambridge, Mass: MIT Press. xviii, 493 p. Gary Flake’s book is a real blast for those of you who have a background in computer science. Even without that background, he shows how computation is at work in the natural world around you. Fascinating. Strogatz, S.H., Nonlinear Dynamics and Chaos : with Applications to Physics, Biology, Chemistry, and Engineering. Studies in Nonlinearity. 1994 (Revised in 2014) Reading, Mass.: Addison-Wesley Pub. xi, 498 p. This book is a classic in the field of Complexity Science. As the title implies, the mathematics underpinning complexity science is highly non-linear. For those of us who were trained in engineering using classical calculus, this book continues on where we left off. The visualizations and examples are superb. Live Long and Prosper! n Regulatory Affairs Senate Committee on Homeland Security and Governmental Affairs Holds Cybersecurity Hearing On January 28, 2015, The U.S. Senate Committee on Homeland Security and Governmental Affairs held a meeting entitled “Protecting America from Cyber Attacks: The Importance of Information Sharing.” Committee Chairman Ron Johnson (R-WI) explained that the purpose of the hearing was to better understand cybersecurity threats in order to craft legislation that would appropriately respond to those threats. Representatives from American Express, Microsoft, Marsh & McLennan Companies, FireEye, and the Center for Democracy & Technology all testified at the hearing. Their testimony stressed the evolving nature of cyber security threats, the tremendous increase in the number of threats over the last few years, and the need for information sharing legislation with strong liability protections. Information sharing is most effective when it is “real time” sharing and when private companies and government consistently share information with each other. The witnesses also stressed that however Congress responds to these increased cybersecurity threats will influence international policy on cybersecurity. U.S. Department of Energy Considers Stockpiling Large Transformers to Prevent Grid Threats The United States Department of Energy’s Office of Electric Delivery and Energy Reliability has been studying the potential need to stockpile transformers in case damage to the power grid causes widespread blackouts. Such damage could come from physical terrorist attacks on substations, cyberattacks that cause physical harm, or large solar storms that add too much current to the grid. One of the challenges related to recovering from a blackout caused by, or resulting in, damage to a transformer is that the U.S. grid has a limited number of spare, large transformers, which are increasingly supplied by overseas manufacturers. On March 9, 2015, the DOE Office of Electric Delivery and Energy Reliability also announced up to $27 million in funding for academic collaborations that will develop and transition advanced cybersecurity technologies to the energy sector. This funding will help the energy sector adjust to the ever changing cybersecurity landscape and further reduce the risk of a power disruption resulting from a cyber incident. Page 4 FERC Issues Order on NERC's Risk-Based Registration Initiative On March 19, 2015, FERC issued an Order approving the overwhelming majority of NERC's proposed revisions to the NERC Rules of Procedure designed to implement NERC's Risk-Based Registration (RBR) initiative, which NERC states is intended to ensure that entities are subject to an appropriate set of applicable Reliability Standards by using a consistent approach to risk assessment and registration. The major reforms proposed by NERC include: (1) the elimination of the Purchase-Selling Entity, Interchange Authority, and Load-Serving Entity functional registration categories; (2) modifications to the thresholds for registering entities as Distribution Providers; and, (3) procedural improvements to the registration process. In the Order, FERC concluded that NERC's overall goal of ensuring entities are registered and made subject to the Reliability Standards based on the risk they pose to reliability was reasonable and determined that many of the proposed revisions clearly promote this goal and were adequately justified. However, FERC concluded that NERC failed to adequately justify the proposed elimination of the Load-Serving Entity function from the registry process and directed NERC to submit a compliance filing within 60 days to address FERC's concerns on this issue. Additionally, while FERC approved NERC’s proposed revisions related to the registration of Distribution Providers, FERC directed NERC to include Reliability Standard PRC-005 as applicable to underfrequency load shedding-only Distribution Providers. Finally, FERC also directed NERC to make one further modification to the proposed revisions to the Rules of Procedure, and directed NERC to submit a one-year compliance filing discussing the implementation of the RBR program. The full FERC Order can be found here. n Regulatory Affairs FERC Issues Order on the Reliability Assurance Initiative On November 3, 2014, NERC submitted to the FERC a filing describing the Reliability Assurance Initiative (RAI), which aims to provide reasonable assurance of reliability through risk-based compliance monitoring and enforcement. On February 19, 2015, FERC issued an Order (Order) approving the implementation of the RAI, subject to the following: 1) A compliance filing; 2) Certain conditions; and 3) An annual reporting requirement. See 150 FERC ¶ 61,108. Compliance Filing FERC directed NERC to submit a compliance filing, due May 9, 2015, addressing the following three items. First, NERC must propose revisions to the NERC Rules of Procedure to include RAI concepts and programs. According to FERC, the NERC Rules of Procedure should, at a minimum, recognize the existence of the RAI processes, articulate basic RAI concepts and define fundamental RAI elements, and require Commission approval for significant changes in the RAI program as NERC further develops and implements its risk-based approach. Second, NERC must address its oversight plan for the RAI. Third, NERC must address a methodology for: (a) assessing an entity's internal controls as a prerequisite to self-logging; and (b) standardizing the Regions' review of noncompliances recorded on the self-logs. Conditions FERC imposed certain conditions on the implementation and continued development of the RAI program relating to: 1) Transparency (requiring public posting) of compliance exceptions; 2) Treatment of compliance exceptions in compliance history; 3) Finality of compliance exceptions; and 4) Qualifications for self-logging. Regarding self-logging, FERC’s Order provides that NERC must require some level of formal review of an entity's internal controls before granting the flexibility to self-log instances of noncompliance. Regarding the transparency of compliance exceptions, although RF Commissioner Bay to Succeed Chairman LaFleur as FERC Chairman in April FERC Commissioner Norman Bay, who previously served as Director of FERC’s Office of Enforcement, will assume the position of FERC Chairman when Cheryl LaFleur steps down in April. She was appointed to this position after Chairman Jon Wellinghoff’s departure in November 2013. supported NERC’s position against the public posting of compliance exceptions, RF nevertheless recognizes the value that the practice of public posting will provide to the industry. Annual Reporting Requirements FERC directed NERC to submit an annual filing, by February 19, 2016, addressing the following: 1) Progress of the RAI program and any necessary enhancements or expansions; 2) Interplay between the RAI program and other NERC program areas; 3) Whether a baseline audit is necessary to properly evaluate a Registered Entity's internal controls; 4) NERC's oversight of the RAI program; and 5) Inherent Risk Assessments and other CMEP tools. The Regions are working closely with NERC as NERC prepares its Compliance Filing. We will keep you updated on progress. The full Order is available here: RAI Order. FERC HoldsTechnical Conference on EPA's Clean Power Act On March 11, 2015, RF attended FERC’s Eastern Regional technical conference on the EPA’s Clean Power Act in Washington, D.C., to discuss implications of compliance approaches to the Clean Power Plan proposed rule, issued by the EPA on June 2, 2014. During her 17 month tenure leading the commission, LaFleur effectively dealt with concerns about climate change, the EPA's draft Clean Power Plan, natural gas infrastructure, and grid reliability. This conference was the second in a series of four technical conferences on the EPA’s Clean Power Act, focusing on issues related to electric reliability, wholesale electric markets and operations, and energy infrastructure. The discussion during this conference regularly returned to considering the need for a “reliability safety value” in the EPA’s proposed rule making and what that might look like. Chairwoman LaFleur will continue to serve as FERC Commissioner after Commissioner Bay takes over the gavel as Chairman in April. The Central Regional technical conference took place on March 31, 2015, in St. Louis, Missouri. The final technical conference will be scheduled soon. Page 5 Sn The Seam MISO & PJM Submit Fuel Assurance Reports to FERC In late 2014, FERC issued an Order in which it asked each RTO and ISO to report on the status of its efforts to address market and system performance associated with fuel assurance issues. This issue of The Seam will provide an overview of MISO and PJM's fuel assurance reports to FERC in response to this Order. MISO Fuel Assurance Report MISO explained that in its footprint, Load Serving Entities (LSEs), with oversight by the States as applicable, are primarily responsible for resource adequacy planning and fuel assurance issues. In turn, MISO’s role is to support and facilitate the role of the LSEs and the States with market designs that incentivize fuel assurance, supply availability, and the efficient dispatching of available resources across MISO’s broad, multi-State footprint to reliably meet demand. ... MISO’s role is to support and facilitate the role of the LSEs and the States with market designs that incentivize fuel assurance, supply availability, and the efficient dispatching of available resources across MISO’s broad, multi-State footprint to reliably meet demand. MISO stated that fuel assurance issues have become more prominent as a result of emerging environmental regulations, evolving fuel economics, and associated lower MISO reserve margins. MISO is continually reviewing opportunities for increased transparency, reduced operational volatility, enhanced situational awareness, and improved market alignment to address fuel assurance concerns and needs as the challenges become more prominent. MISO noted that fuel assurance in its footprint is primarily a concern during severe winter weather when: i) natural gas and coal procurement / transportation logistic constraints and disruptions may be exacerbated; and ii) competition is highest for natural gas in other sectors (e.g., as a heating fuel). MISO’s system reliability during the extreme weather conditions of the 2014 polar vortex demonstrated MISO's ability to effectively manage adverse conditions. MISO is leveraging its experiences from this event to implement several new operating procedures, improve fuel issue transparency, and evaluate potential market enhancements with stakeholders. MISO also previously determined that increased situational awareness associated with the gas industry was necessary. Historically, MISO had limited visibility and awareness of how the pipeline industry interfaced with generation. Consequently, operational flow orders or other less common system activities in the pipeline industry did not always raise effective situational awareness for generation capacity. In response, MISO conducted an Electric/Gas Coordination Field Trial with two prominent gas pipeline companies in late 2013, and continues to work through its stakeholder processes to improve electric and natural gas communication going forward with all of the 70-plus gas pipeline operators serving gas-fired power plants in MISO's 15-State footprint. MISO has developed tools to improve visibility into gas pipeline events and associated notifications. These methods include a new control room display of the pipeline infrastructure and a consolidated gas pipeline critical notice webpage. MISO also initiated a generator survey in late 2014, to obtain better information about generator fuel assurance practices such as the use of backup fuels or some form of firm pipeline capacity. On the pricing front, MISO is working to improve the price signals in its energy and operating reserves markets that appropriately align the market incentives to the reliability needs of the MISO system. Two examples are the adoption of Extended Locational Marginal Pricing (ELMP) and Evaluation of Value of Lost Load (VOLL) Pricing. ELMP allows prices to better reflect total operational costs when MISO commits a fast-start resource to meet requirements, while VOLL establishes the locational marginal pricing price cap in MISO markets (if established too low, generators may be unwilling to follow dispatch or make themselves available during emergency situations, and may be less likely to build generation). PJM Fuel Assurance Report PJM noted that fuel assurance issues were highlighted during the Polar Vortex as fuel supply inadequacies and generator outages in the PJM region led to tight system conditions. Fuel-related contractual constraints on generator availability, inflexible pipeline tariff provisions, and gas marketer demands for multi-day gas commitments severely constrained generators and drove up prices even during weekend Continued on page 7 Page 6 Sn The Seam Continued from page 6 PJM’s most significant initiative to improve fuel is its and non-peak hours during the Polar Vortex. These issues are becoming more urgent given the trend toward greater reliance on gas-fired generation. PJM highlighted various strategies, Capacity Performance programs, and mechanisms aimed at improving fuel assurance in its region. Proposal, where owners and PJM’s most significant initiative to improve operators of generation fuel is its Capacity Performance Proposal, where owners and operators of capacity resources would generation capacity resources would have strong economic have strong economic incentives to invest in fuel assurance and improved incentives to invest in fuel operation and maintenance, including firm fuel transportation assurance and improved arrangements, dual-fuel capability, on-site operation and maintenance ... storage, and weatherization. Additionally, the proposal would make capacity market offer caps more flexible to allow fuel assurance costs to be included in sell offers, and would impose more severe economic consequences for resource non-performance. PJM has also proposed energy market reforms that would require offers from capacity resources to be based strictly on the specific physical operational characteristics of those resources, and not on economic or budgetary considerations, including considerations related to natural gas supply. This means sellers would have greater incentive to invest in fuel assurance including dual-fuel capability and on-site storage. PJM highlighted its Gas Unit Commitment Coordination process, which introduced changes in real-time operations for this winter, including improved clarity in dispatcher communications and notifications, improved generator data accuracy, more transparency and standardization in the commitment of units with long lead times due to fuel restrictions, and better sharing of updated unit parameters (including dual-fuel capability and availability, fuel inventories, and operational restrictions). PJM has undertaken a number of other initiatives, both short and long term, to improve fuel assurance, including: (1) A winter study and sensitivity analysis which included a gas shortage Page7 scenario based on pipeline restrictions; (2) A survey of generator fuel inventories and operational capabilities; (3) The development of a cold-weather resource capability test and preparation checklist for generators; (4) The rollout of new dispatch training that also reviews emergency procedures to relevant PJM and PJM member company staff; (5) The development of a gas-fired generator database that included information on dual-fuel capabilities and the generator's natural gas service provider; (6) A geographic information system mapping of gas-fired generators and gas pipelines; (7) The establishment of protocols for the sharing of nonpublic, operational information with interstate pipeline operators within the PJM region; (8) The establishment of a PJM gas analysis team that supports PJM dispatchers in understanding the impact of natural gas availability on PJM's ability to reliably operate the grid; and (9) The establishment of a mechanism by which a Market Seller can make intraday changes on an hourly basis to a generator's cost-based schedule in the real-time energy market. This ability is expected to improve the availability of generation and the efficiency of the markets by allowing sellers to include in their cost-based schedules a more accurate reflection of true fuel costs, which otherwise might result in out-of-market payments or taking a generator off-line rather than operating at a loss. n The Lighthouse By: Lew Folkerth, Principal Reliability Consultant Compliance Approach for CIP-005-5 R1 We continue the series of compliance approaches that began in the previous issue with a discussion of CIP-002-5.1 R1. While I call what follows a “Compliance Approach,” you will find my recommendations may go beyond compliance. Blindly following the recommendations here will NOT ensure compliance or a desirable audit outcome. You, as the Registered Entity, must apply these approaches to your specific circumstances. No one can tell you how to be compliant. You must chart your own course, perhaps referring to that point of light on the shore to help you find your way. Cyber Systems, unless low impact BES Cyber Systems are explicitly mentioned. I will discuss low impact BES Cyber Systems in a future article, probably after FERC acts on CIP Version 6. CIP-005-5 R1 - Discussion of the Language There has been considerable confusion over the identification and classification of the Cyber Assets to be protected by the Version 5 (and 6) CIP Standards. Cyber Assets for which the CIP Standards are applicable may fit one or more of these classifications: Ÿ A component of a BES Cyber System; Ÿ An Electronic Access Control or Monitoring System (EACMS); Ÿ A Protected Cyber Asset (PCA); Ÿ A Physical Access Control System (PACS). I won't repeat the language of CIP-005-5 R1 here. The base Requirement and its five Parts are comprised of one sentence each. Each sentence is straightforward with, in my opinion, little or no ambiguity. The ambiguity and ongoing discussion and clarification efforts involve some of the terms defined in the NERC Glossary that are used in this Requirement. These terms, and some of the points under discussion, are: Ÿ BES Cyber System - An entity is granted great flexibility in defining its BES Cyber Systems. Where and when is this flexibility useful? What are the pitfalls to consider when exercising this flexibility? Ÿ Cyber Assets - What does “programmable electronic device” really mean? Ÿ External Routable Connectivity - Ÿ When is a routable connection “bi-directional” and, more importantly, when is it not? Under what circumstances can a serially connected device be considered to be accessible via bi-directional routable protocol connection? Electronic Access Point - What are the implications of the access point being defined as an “interface?” Control Center - Does the ability to remotely start a generator from the control room of a different generator make that control room a Control Center? I don't answer those questions in this article. I list them here to inform you that there are ongoing discussions regarding these issues. Please follow the development of the Frequently Asked Questions (FAQs) and Lessons Learned on the NERC web site. If you would like me to address any of these issues in a future article, please see the “Feedback” section below. This article will deal with Cyber Assets associated with high and medium impact BES Considerations for Processes and Procedures Little Sable Point, MI (Photo: L. Folkerth) Let's first cover these components and determine when and how to identify them. Step 1: Identify BES Cyber Systems and BES Cyber Assets (per CIP-0025.1 R1) The first step in identifying the Cyber Assets to be protected is to identify your BES Cyber Systems as required by CIP-002-5.1 R1. After completing CIP-002-5.1 R1 you will have a list of your BES Cyber Systems and the BES Cyber Assets (and, optionally, Cyber Assets) that comprise the BES Cyber Systems. Also, you will have assigned an impact rating to each BES Cyber System. Step 2: Identify the Cyber Assets that are required to reside within an Electronic Security Perimeter (ESP) Those Cyber Assets of high and medium impact BES Cyber Systems that are connected to a network with a routable protocol are required to reside within an ESP. This is separate from the concept of External Routable Connectivity. Step 3: Identify Electronic Security Perimeter(s) around each of the Cyber Assets identified in Step 2 In this step you will define the “logical border” enclosing each of the Cyber Assets you identified in the previous step. You can have as many ESPs as you choose. Make sure that every Cyber Asset of every high and medium impact BES Cyber System that is Continued on page 9 Page 8 n The Lighthouse Continued from page 8 connected to a network with a routable protocol is protected by an ESP. Step 4: Identify any Protected Cyber Assets (PCA) Once the ESP is defined, identify any additional Cyber Assets connected to the ESP network that are not part of a BES Cyber System. These Cyber Assets must either be relocated outside of the ESP, or they must be identified as PCA. In addition, any Cyber Asset of a BES Cyber System that is not part of the highest rated BES Cyber System within the ESP must be designated as a PCA associated with the highest rated BES Cyber System. For example, if an ESP contains both medium and low impact BES Cyber Systems, then the Cyber Assets of the low impact BES Cyber Systems must be identified as PCA associated with a medium impact BES Cyber System. Step 5: Identify the Electronic Access Point(s) (EAP) for each ESP If any Cyber Asset within an ESP can be accessed from outside the ESP via a bi-directional routable protocol connection, then you must identify one or more EAPs for this traffic. Note that the EAP is an “interface” of a Cyber Asset. This is a significant change from CIP-0053. Any Cyber Asset that has an interface designated as an EAP must be identified as an EACMS for use in Step 7. Step 6: Identify the methods and systems used for Interactive Remote Access If you are going to permit Interactive Remote Access into your ESPs, you need to identify the Cyber Assets that will be used for this purpose. Any Cyber Asset used as part of an Intermediate System must be identified as an EACMS for use in Step 7. Step 7: Identify the Electronic Access Control or Monitoring Systems (EACMS) associated with each ESP Any Cyber Asset that is used for electronic access control or for electronic access monitoring must be identified as an EACMS. This will include firewalls or other network devices that host an EAP, components of Intermediate Systems, authentication systems, intrusion detection systems, or any other system that meets the definition. Step 8: Identify the Physical Security Perimeter (PSP) surrounding each ESP (per CIP-006-6 R1) Identifying, at least at a general level, the PSPs lets us identify the Physical Access Control Systems in Step 9. The details of identifying the PSPs must be left for a discussion of CIP-006-6. Step 9: Identify the Physical Access Control Systems (PACS) for each PSP Any Cyber Asset that controls, alerts, or logs access to a PSP must be identified as part of a PACS. Step 10: Identify the BES Cyber Systems with special attributes Some Requirements only apply to BES Cyber Systems or associated Cyber Assets with special attributes. The BES Cyber Systems with these attributes must be identified so that the appropriate Requirements are applied. Suggested Evidence Your compliance evidence should include the process used to identify your Cyber Assets within the scope of CIP compliance, and any applicable attributes (such as External Routable Connectivity), per the steps above. Note that Steps 1 and 8 could reside in the processes for CIP-002-5.1 R1 and CIP-006-6 R1, respectively. You should be prepared to show that you followed this process to create your list of in-scope Cyber Assets. You should also be able to show the outcome of your process. I suggest keeping the outcome in a spreadsheet or database table with one row for each inscope Cyber Asset. I suggest maintaining the following information, at a minimum, for each row in the table: Ÿ Cyber Asset identifier (this identifier should also be clearly marked on the Cyber Asset to facilitate audit review) Ÿ Type of Cyber Asset (server, workstation, switch, firewall, etc.) Ÿ If part of a BES Cyber System: - BES Cyber System identifier - Impact rating of BES Cyber System - Is the Cyber Asset connected to a network via a routable protocol? Asset type (Control Center, Transmission substation, etc.) If within an ESP, the ESP identifier If within a PSP, the PSP identifier Classification of Cyber Asset (BES Cyber Asset, Cyber Asset of a BES Cyber System, EACMS, PACS, PCA) Vendor (Dell, Cisco, etc.) Model Operating System (Windows Server 2008, IOS 15.4, etc.) External Routable Connectivity These are the Cyber Assets that communicate outside of an ESP with a bi-directional routable protocol. This is not a simple determination, and a Lessons Learned document is being prepared to provide additional clarification. Dial-Up Connectivity If a BES Cyber System is accessible via a dial-up connection (modem and phone line, or equivalent) this constitutes dial-up connectivity. Step 11: Identify any medium impact BES Cyber Systems (and associated EAP) at Control Centers If a medium impact BES Cyber System or an associated PCA is at a Control Center, then it must be identified, as additional Requirements apply. Ÿ Ÿ Ÿ Ÿ Ÿ Ÿ Ÿ Ÿ If this is a guest on a virtual system: Continued on page 10 Page 9 n The Lighthouse Continued from page 9 - The type of virtualization (VMware ESX, etc.) Physical host identifier Ÿ Deployment date, if deployed within the audit period Ÿ Indicators (yes/no) for: - Dial-up Connectivity - External Routable Connectivity Ÿ If information is for multiple registered entities, indicate the entity responsible for compliance For each ESP, identify all Electronic Access Points. For each Electronic Access Point, provide: Ÿ The list of inbound access permissions Ÿ The list of outbound access permissions Ÿ The reason for granting access for each of the inbound and outbound permissions Ÿ Evidence that all other access is denied by default For each in-scope Cyber Asset with Dial-up Connectivity, provide: equivalent will be requested by the audit teams during the review of CIP-005-5 R1. Also, this list will make your job of identifying and protecting your in-scope assets much easier. If you keep this list and periodically review it, you will be ahead of the curve when you are audited. Ensure all Electronic Access points have been identified. Ensure that you can provide the inbound and outbound permissions (rule sets), and the reason for each permission. Ensure that you can demonstrate deny by default. If you permit Dial-up Connectivity, your process must show how it is controlled and authenticated. If your dial-up equipment does not support authentication, be sure you have a TFE in place. If you do not permit or do not use Dial-up Connectivity, be able to document this. For BES Cyber Systems at Control Centers, ensure you can provide evidence demonstrating your ability to detect malicious communications in both directions. Best Practices Ÿ Evidence that authentication is performed when establishing a connection, or Here are some practices not explicitly required by CIP005-5 R1, but that are highly advisable: Ÿ A reference to an approved Technical Feasibility Exception (TFE) covering this Part and this Cyber Asset 1. Keep the Cyber Asset spreadsheet or database (from Suggested Evidence, above) under version control. In other words, keep a record of all changes, including details of the change and the date of the change. 2. Periodically review the evidence for this requirement to ensure it is correct and current. Document this review, including who performed the review and the date. For each Electronic Access Point for a high impact BES Cyber System or a medium impact BES Cyber System at a Control Center, provide evidence of one or more methods of detecting malicious communications. Compliance Approach For all high and medium impact BES Cyber Systems, be able to show that all BES Cyber Assets, and all Cyber Assets that are part of a BES Cyber System, that are connected to a network via a routable protocol, are identified and are protected by an ESP. The CIP Standards do not explicitly require a list of inscope Cyber Assets. However, creating and maintaining such a list is an implicit requirement; this list or an Page 10 3. Periodically perform a discovery process to identify any previously unidentified devices within your ESPs. Document this process, document each time it is performed, and the results of each discovery. 4. Ensure your change management procedures require updating the evidence for this requirement as part of any applicable change. 5. If Part 1.5 is applicable to you, have a method of alerting appropriate personnel on detected malicious communications. Managing Compliance with CIP-002-5.1 R1 As CIP Senior Manager, you should understand the approach your subject matter experts (SMEs) have taken to identify and document the Electronic Security Perimeters. Here are some questions you might ask your SMEs: Ÿ Is there a comprehensive list of Cyber Assets that are subject to CIP compliance? If not, how are these Cyber Assets being managed? Ÿ Have all Cyber Assets that are subject to CIP compliance been identified? How do we know this? Ÿ Are there processes we follow to keep the Electronic Security Perimeter documentation up to date? Are these processes and the resulting evidence approved by the appropriate manager? Ÿ Each inbound and outbound access permission requires a reason for the permission. Have these reasons been reviewed to ensure that they are actually the reasons the permission is required, as opposed to a statement of the nature of the permission? For example, if an inbound permission permits email to pass to a protected system, does the reason say what the permission is (“email to system xyz”), or does it provide an actual reason (“email to system xyz is required to permit coordination of failover status between primary and backup systems”)? References CIP-005-5 NERC Glossary 'NERCs “Implementation Study, Lessons Learned, and FAQs” Web Page Feedback Please let me hear any feedback you may have on these articles. Suggestions for topics are always appreciated. I may be reached at lew.folkerth@rfirst.org. n Standards Update CIP Version 5 News NERC will continue its Small Group Advisory Sessions (SGAS) from April 21 to April 23 in Atlanta. These sessions are closed one-on-one discussions lasting 60 to 90 minutes between a Registered Entity's subject matter experts and ERO staff about issues pertinent to that entity's implementation of the CIP V5 Standards. The SGAS will be held along with a CIP Version 5 Workshop on April 24 that covers topics such as bright line criteria, CIP V5 core requirements, lessons learned from the implementation study, CIP Standards modification status, and compliance. Information about this and more CIP V5 workshop resources can be found on the CIP V5 Transition Page. On January 21, 2015, NERC filed a petition for approval of TPL-007-1, which is the second phase of standards to address geomagnetic disturbances. NERC has created a 2015 Curriculum document, which is a repository of numerous training resources from both NERC and the Regional Entities in three categories: 100 – Standard-Specific Training, 200 – Compliance and Enforcement Considerations, and 300 – Lessons Learned, Guidance, and FAQs. Upcoming workshops and training can be found on the 2015 Events page or the CIP Workshops and Curriculum Calendar. On January 22, 2015, FERC issued a final rule approving PRC-005-3, which includes revisions to require applicable entities to test and maintain certain autoreclosing relays as part of a protection system maintenance program. The Commission directed NERC to develop a modification to the Standard to include maintenance and testing of supervisory relays. This Standard becomes enforceable on April 1, 2016. Three new draft lessons learned documents were posted for comment in January and February addressing programmable electronic devices, interactive remote access, and EACMS mixed trust authentication. Feedback on those lessons learned is now posted. In addition, two additional lessons learned have been posted for comment relating to the grouping of BES Cyber Systems and identification of BES Cyber Systems at control centers based on functional registration. Two lessons learned documents have been finalized relating to generation segmentation and far-end relays. Lessons learned documents are supporting reference documents designed to convey lessons learned from the NERC CIP Version 5 transition program, and do not establish new requirements under the Standards, modify the requirements, or provide a formal interpretation of the Standards. On February 13, 2015, NERC filed a petition for approval of the following proposed Standards: CIP-003-6, CIP-004-6, CIP-006-6, CIP-007-6, CIP-009-6, CIP-010-2, and CIP-011-2. This package of updated CIP Standards addresses modifications directed by FERC in its Order No. 791, which approved the CIP Version 5 Standards. These changes include the removal of “identify, assess, and correct” throughout the Version 5 cybersecurity standards, the addition of security controls for Low Impact BES Cyber Security Systems, and requirements for the protection of transient devices and communication networks. ReliabilityFirst will host a CIP Version 5 workshop on April 16 and April 17. This workshop will include presentations on various transition and implementation topics and will be held after the Spring Reliability workshop on April 14 and April 15. For more details, including a link for registration, see the 2015 Spring Reliability Workshop announcement. NERC Filings and FERC Orders On February 19, 2015, FERC issued an order approving MOD-031-1, which provides authority for planners and operators to collect demand, energy, and related data to support reliability studies and assessments. On March 4, 2015, FERC issued an order approving PRC-006-2, which establishes design and documentation requirements for automatic underfrequency load shedding programs to arrest declining frequency, assist recovery of frequency following underfrequency events, and provide last resort system preservation measures. This revised Standard becomes enforceable on October 1, 2015. NERC filed a supplemental petition to FERC on March 13, 2015 for approval of of PRC-001-1.1, PRC-019-2 and PRC-024-2 to clarify their applicability to dispersed generation resources. Page 11 n Standards Update This recurring column provides our Registered Entities with relevant and recent updates to the Reliability Standards and Requirements. As we have noted before, this column does not cover all updates on Reliability Standards, but we will focus on updates that might be of more significant interest to the industry. Please take note of the following changes to Standards and progress on new and revised Standards. Reliability Standard Audit Worksheets NERC has provided one new RSAW, BAL-003-1, available on its RSAW web page. A Reliability Standard Audit Worksheet (RSAW) is a guide provided by NERC that describes types of evidence Registered Entities may use to demonstrate compliance with a Reliability Standard. RSAWs also include information regarding how Regional Entities and NERC may assess that evidence. Recent and Upcoming Standards Enforcement Dates Ÿ TPL-001-4 became enforceable on January 1, 2015. Ÿ BAL-003-1, the new GMD Standard EOP-010-1, and PRC-005-2 become enforceable on April 1, 2015. Ÿ MOD-032-1 will be enforceable on July 1, 2015. Ÿ The recently-approved CIP-014-1 and the revised PRC-006-2 will be enforceable October 1, 2015. Page 12 New Standards Projects Several new Standards projects and new project phases are underway. Projects are described on the NERC Standards website, along with links to all drafts, voting results, and similar materials. Recent additions include the following projects: Ÿ Project 2007-06.2 System Protection Coordination Ÿ Project 2008-02.2 Phase 2 Undervoltage Load Shedding: Misoperations Ÿ Project 2015-02 Emergency Operations Periodic Review Ÿ Project 2015-03 Periodic Review of System Operating Limit Standards Ÿ Project 2015-04 Alignment of NERC Glossary of Terms and Definitions Used in the Rules of Procedure Standards Resources NERC has updated its list of FAQs related to the new BES definition. The complete list of FAQs n Watt’s Up at RF ReliabilityFirst has Career Opportunities RF Spring Workshop RF’s core mission is to preserve and enhance the bulk power system reliability and security within the RF footprint. In doing so, RF is committed to supporting the efforts and serving as an extension of the North American Electric Reliability Corporation (NERC) in its mission as the Electric Reliability Organization (ERO) to ensure the reliability of the bulk power system in North America. RF’s upcoming spring workshop scheduled for April 14-17, 2015, will include two major sessions: RF currently has employment opportunities within its Compliance Monitoring, Entity Development, and Risk Analysis and Mitigation areas. These positons offer opportunities to collaborate, coach, and monitor Registered Entities that function as users, owners and/or operators of the Bulk Electric System. If you are interested in joining our team or would like more information, click here: The general session will take place from April 14-15. This session will include an overview of: 1. General Session; and 2. CIP v5 Workshop Ÿ Ÿ Ÿ Ÿ Ÿ ReliabilityFirst Board Approves Public Release of First Annual Report During the March 2015 meeting, the RF Board of Directors accepted RF’s first Annual Report for FY 2014 and approved it for public release. Assurance Initiative (RAI) in the most effective manner possible. The FY2014 Annual Report focuses on several company-wide initiatives as well as significant departmental activities. Additionally, RF also embarked on several other company-wide initiatives including developing an Enterprise Risk Management Program to identify and address key risks facing the corporation, creating a Threats and Vulnerabilities Team to identify and address emerging BES threats and vulnerabilities, and completing the first Regional Risk Assessment to identify high-priority risks within the RF footprint. One of the key company-wide initiatives for 2014 was RF’s corporate restructuring, which was implemented to more clearly focus RF’s operational activities around risk and to support and implement the Reliability The Fy2014 Annual Report describes these, as well as several department-specific activities, in more detail. Keep an eye out for the public release of the full Annual Report in the coming weeks. Page 13 Ÿ Ÿ Internal Controls Evaluation (ICE); Inherent Risk Assessment (IRA); RF’s Risk-Based Enforcement Process; CIP Lessons Learned; Energy Management System (EMS) Outages Analysis; Lessons Learned, preparing effective self-reports and mitigation plans; and ICS Cyber Security & Risk. The CIP v5 workshop will take place from April 16-17 and will include topics such as Impact Rating Criteria, CIP v5 Core Requirements, Risk-Based Compliance approach to CIP v5, as well as an open Q&A panel discussion. We will post the agenda for the entire spring workshop on our website in the coming weeks. SPRING 2015 Follow on n Watt’s Up at RF RF Celebrates History As many of you know, the conference rooms in our new office space are named after some of the thirteen states located within our footprint, such as the Delaware, Illinois, Indiana and the Michigan conference rooms. When we moved to this new office space, several members donated images for us to display in these conference rooms that capture the important role that the energy sector has played in the history of their respective states, as well as the nation given the critical location, both geographically and electrically, of the ReliabilityFirst footprint. Donated by The Dayton Power and Light Company and displayed in the Ohio Conference Room Donated by PSEG and displayed in the New Jersey Conference Room We would like to thank our members for contributing these compelling images, and would like to share some of them with you. The next time you visit ReliabilityFirst's offices in Cleveland, Ohio, please take the time to enjoy these and other images that are proudly displayed throughout our conference rooms. Forward Together, ReliabilityFirst. Donated by FirstEnergy and displayed in the Pennsylvania Conference Room Donated by We Energies and displayed in the Wisconsin Conference Room Page 14 Donated by Southern Maryland Electric Cooperative and displayed in the Maryland Conference Room Donated by Baltimore Gas & Electric and displayed in the Maryland Conference Room n Reliability Committees RELIABILITY COMMITTEE (RC) The Committee will be holding its first of two face-to-face meetings on Wednesday, May 13, 2015, at ReliabilityFirst's offices, located at 3 Summit Park Drive, Cleveland, OH 44131. The meeting agenda will include items to endorse the summer reliability assessment reports and a presentation on an aspect of human performance. If there is an item you would like to see on the agenda, please contact Kevin Sherd or Jeff Mitchell. The second 2015 face-to-face meeting of the Committee will be November 18, 2015 at the ReliabilityFirst offices. You can contact Joyce Lemmon at for any questions regarding the meeting details. For information on past RC meetings, the minutes are posted on the ReliabilityFirst website here. Coming up either in late summer or the fall, ReliabilityFirst is planning to host a one-day training session targeted for substation supervisors, mechanics, and relay technicians. The training will encompass power line carrier equipment (which was conducted last year with our Protection Subcommittee, a substation tool kit to aid in labeling during maintenance activities (developed by Dominion Virginia Power), and other human performance aspects of substation work and lessons learned.) Stay tuned for more information. Continuing education hours may be earned for this training. We hope there will be much interest in this, and it is meant to get information to the personnel who may benefit from the information the most. OPERATIONS SUBCOMMITTEE (OS) Please mark your calendar for our spring face-to-face meeting on Tuesday, May 12 from 1:00-5:00 p.m. ET at the ReliabilityFirst offices. The semi-annual “Neighbor's meeting” is held to cover operational topics for the upcoming summer period. It is also a great opportunity to network with your industry colleagues in the RF region and to share best practices and “war stories” (plus there is free food!). For more information on the Operations Subcommittee, please contact John Idzior. Page 15 PROTECTION SUBCOMMITTEE (PS) The next Protection Subcommittee conference call will be held on April 22, 2015 beginning at 2:00 p.m. ET. To become a new member of the PS or to submit an agenda item, please contact Bill Crossland. Also, the ReliabilityFirst staff is considering a misoperation peer review and is exploring the processes that other Regions such as NPCC and SERC use for their misoperation peer reviews. More information will be coming via future PS meetings and conference calls. Coming up later this year, ReliabilityFirst is planning to host a one-day training session via the Subcommittee on settings for microprocessor relays. Stay tuned for more information. Continuing education hours may be earned for this training and there will be no fee to attend! RESOURCE ASSESSMENT SUBCOMMITTEE (RAS) The WebEx conference call to review the 2015 Summer Resource Assessment is scheduled for April 28 from 9:00 a.m.-12 p.m. ET. The agenda for the meeting and the draft assessment will be sent out by April 24, 2015. Once the RAS has completed its review, the draft assessment will be presented to the Reliability Committee for endorsement before seeking Board of Director approval and public posting on the internet. TRANSMISSION PERFORMANCE SUBCOMMITTEE (TPS) The next TPS meeting will be held on May 5, 2015 at the ReliabilityFirst offices in Cleveland. This will be the first time that the TPS has met face-to-face in over four years. During this meeting, the TPS will be reviewing the 2015 and 2016 portions of the summer seasonal transmission assessment that will be presented at the May 13, 2015 Reliability Committee meeting. The staff facilitator for the TPS is Ray Mason. For more information, contact Ray Mason. SPECIAL PROTECTION SYSTEM (SPS) REVIEW STATUS The SPS Review Team has eight SPS installations due for a periodic 5-year review in 2015. Data requests for these reviews will be sent to the respective SPS owners shortly. Please contact Bill Crossland with questions regarding SPS reviews. RF 2015 Calendar of Events Complete calendar located at RF website Date Time (ET) Meeting Details Location Apr 14-17 See Agenda ReliabilityFirst Spring Workshops Cleveland, OH Apr 22 2:00 pm to 4:00 pm Reliability - Protection Subcommittee Apr 28 9:00 am to 12:00 pm Reliability - Resource Assessment Subcommittee WebEx May 05 8:00 am to 4:00 pm Reliability - Transmission Performance Committee Cleveland, OH May 12 1:00 pm to 5:00 pm Reliability - Operations Subcommittee Cleveland, OH May 13 8:00 am to 5:00 pm Reliability Committee Cleveland, OH Jun 03 1:00 pm to 5:30 pm Board of Directors Committee Meetings Cleveland, OH Jun 04 8:30 am to 3:00 pm Annual Meeting of the Members Board of Directors Meeting Cleveland, OH Conference Call Share your feedback Please email any ideas or suggestions for the newsletter to prcommrequest@rfirst.org Newsletter Update Starting in 2015, the RF Newsletter will move to a bimonthly publication! Page 16 Forward Together ReliabilityFirst ReliabilityFirst Members ReliabilityFirst Page 17 Forward Together AEP ENERGY PARTNERS AES NORTH AMERICA GENERATION ALLEGHENY ELECTRIC COOPERATIVE, INC AMERICAN ELECTRIC POWER SERVICE CORP AMERICAN TRANSMISSION CO, LLC APPALACHIAN POWER COMPANY ATLANTIC CITY ELECTRIC BALTIMORE GAS & ELECTRIC COMPANY BOSTON ENERGY TRADING & MARKETING & TRADING, INC BUCKEYE POWER INC CALPINE ENERGY SERVICES, LP CASTLETON COMMODITIES MERCHANT TRADING LP CITY OF VINELAND, NJ CMS ENERGY RESOURCE MANAGEMENT CO CMS ENTERPRISES COMPANY CLOVERLAND ELECTRIC COOPERATIVE CONSUMERS ENERGY COMPANY DARBY ENERGY, LLLP THE DAYTON POWER & LIGHT CO DC OFFICE OF THE PEOPLE'S COUNSEL DELMARVA POWER DOMINION ENERGY, INC DTE ELECTRIC DUKE ENERGY SHARED SERVICES INC DUQUESNE LIGHT COMPANY DYNEGY, INC EXELON CORPORATION FIRSTENERGY SERVICES COMPANY HAZELTON GENERATION LLC HOOSIER ENERGY RURAL ELECTRIC COOPERATIVE, INC ILLINOIS CITIZENS UTILITY BOARD ILLINOIS MUNICIPAL ELECTRIC AGENCY INDIANA MICHIGAN POWER COMPANY INDIANAPOLIS POWER & LIGHT COMPANY INTERNATIONAL TRANSMISSION COMPANY LANSING BOARD OF WATER AND LIGHT LINDEN VFT, LLC MICHIGAN ELECTRIC TRANSMISSION CO, LLC MICHIGAN PUBLIC POWER AGENCY MIDCONTINENT INDEPENDENT SYSTEM OPERATOR, INC MORGAN STANLEY CAPITAL GROUP, INC NEPTUNE REGIONAL TRANSMISSION SYSTEM, LLC NEXTERA ENERGY RESOURCES, LLC NORTHERN INDIANA PUBLIC SERVICE COMPANY OHIO POWER COMPANY OHIO VALLEY ELECTRIC CORPORATION OLD DOMINION ELECTRIC COOPERATIVE ROCKLAND ELECTRIC COMPANY PENNSYLVANIA OFFICE OF CONSUMER ADVOCATE PEPCO ENERGY SERVICES, INC PJM INTERCONNECTION, LLC POTOMAC ELECTRIC POWER COMPANY PPL BRUNNER ISLAND, LLC PPL ELECTRIC UTILITIES CORPORATION PPL ENERGYPLUS, LLC PPL HOLTWOOD, LLC PPL LOWER MOUNT BETHEL ENERGY, LLC PPL MARTINS CREEK, LLC PPL MONTOUR, LLC PPL SUSQUEHANNA, LLC PUBLIC SERVICE ENTERPRISE GROUP, INC SOUTHERN MARYLAND ELECTRIC COOPERATIVE, INC TENASKA, INC TENNESSEE VALLEY AUTHORITY UTILITY SERVICES, INC VECTREN ENERGY DELIVERY OF INDIANA, INC WABASH VALLEY POWER ASSOCIATION, INC WISCONSIN ELECTRIC POWER COMPANY WOLVERINE POWER SUPPLY COOPERATIVE, INC