CIGRE SC D2 Tutorials & Colloquium on SMART GRID Mysore, 13 – 15 November 2013 Vijayan SR Cyber Security in Implementing Modern Grid Automation Systems Agenda © ABB Group April 13, 2015 | Slide 2 Introduction Why Cyber Security ? Cyber Security Architectures, Features and Solutions An Overview of Cyber Security Standards Key Take Away/Summary Agenda © ABB Group April 13, 2015 | Slide 3 Introduction Why Cyber Security ? Cyber Security Architectures, Features and Solutions An Overview of Cyber Security Standards Key Take Away/Summary TRADITIONAL GRID Introduction Hierarchical Top to bottom approach INTER-CONNECTED GRID Inter-Connected Injections at various points (DERs) Customer inclusive © ABB Group April 13, 2015 | Slide 4 Enhanced Automation Phasor Measurement and Wide Area Monitoring Stability Analysis IP based communications: - IEC 61850 based SA systems - IEC 104 based communication to control systems Demand Side Management and Demand Response Asset Management/Asset Health Monitoring Management Tools Integration of different systems (OT – IT integration) – SCADA, OMS, GIS, Asset Mgmt etc. © ABB Group April 13, 2015 | Slide 5 Evolution of Substation Automation Systems © ABB Group April 13, 2015 | Slide 6 Conventional v/s Modern SCADA systems Conventional SCADA Systems Modern SCADA Systems High Sophisticated System (Touch Me Not !!!) Every utility feels the necessity (No more a Luxury) No Remote Operations Possibilities for Remote operations Closed network Remote Monitoring, including corporate and external networks Minimal / No external integrations Increasing integration between various systems within and outside the organization Communications based on Serial Interfaces IP based communications including the field sub-devices Hierarchical communication between control center, field devices Data / Information exchanges at different levels Hierarchical Grid Connectivity to Inter Connected Grid © ABB Group April 13, 2015 | Slide 7 Agenda © ABB Group April 13, 2015 | Slide 8 Introduction Why Cyber Security ? Cyber Security Architectures, Features and Solutions An Overview of Cyber Security Standards Key Take Away/Summary Why is Cyber Security an issue? Cyber security has become an issue by introducing Ethernet (TCP/IP) based communication protocols to industrial automation and control systems. e.g. IEC60870-5-104, DNP 3.0 via TCP/IP or IEC61850 Connections to and from external networks (e.g. office intranet) to industrial automation and control systems have opened systems and can be misused for cyber attacks……. ……..the interface sometimes is not in utilities control Implementing Smart Grid Technologies to improve operational efficiencies Cyber attacks on industrial automation and control systems are real and increasing, leading to large financial losses © ABB Group April 13, 2015 | Slide 9 Why is Cyber Security an issue? Threats & Vulnerabilities Operation Sabotages Data Security (Database & Communication) Communication Interference Grid Security © ABB Group April 13, 2015 | Slide 10 Cyber Security - Main Objectives Confidentiality Preventing the unauthorized access to information Cyber Security Accountability Preventing the denial of an action that took place or the claim of an action that did not take place Integrity Preventing the unauthorized modification or theft of information Availability Preventing the denial of service © ABB Group April 13, 2015 | Slide 11 Agenda © ABB Group April 13, 2015 | Slide 12 Introduction Why Cyber Security ? Cyber Security Architectures, Features and Solutions An Overview of Cyber Security Standards Key Take Away/Summary Cyber Security – Solution Overview People and Identity © ABB Group April 13, 2015 | Slide 13 Data and Information Application and Process Network, Server and End-Point Physical Infrastructure Cyber Security – Solution Overview © ABB Group April 13, 2015 | Slide 14 Cyber Security – Mitigation Techniques Hardening Insure all hosts run at a minimum level. Only mission critical software, services, ports and devices are allowed. Access Control Strong authentication and Role Based Access Control (RBAC) is a natural requirement in any security architecture, but is never stronger than the implementation. Intrusion Detection/Prevention Deploy sensors or agents on all hosts, perform log management of all devices, and use security information and event management (SIEM) to detect and possibly respond to anomalies in the system. Patch Management Processes and technology to insure that all available security updates that are verified not to interfere with system operation are installed in all hosts. © ABB Group April 13, 2015 | Slide 15 Cyber Security – Mitigation Techniques (Cont’d) Anti-Virus Employs blacklist, heuristic, and behavioral detection and prevention of malware. Application Whitelisting Only allows pre-approved software to execute. Less intrusive than Anti-Virus. Traffic Whitelisting Only accepts pre-approved traffic through stateful and deep packet inspection. © ABB Group April 13, 2015 | Slide 16 Cyber Security – Mitigation Techniques Network Partitioning Example Network Partitioning: Insure cyber assets are isolated, categorized by criticality, external interfaces and physical location. © ABB Group April 13, 2015 | Slide 17 Agenda © ABB Group April 13, 2015 | Slide 18 Introduction Why Cyber Security ? Cyber Security Architectures, Features and Solutions An Overview of Cyber Security Standards Key Take Away/Summary Cyber Security for Substation Automation Key Cyber-Security initiatives Standard Main Focus Status NIST SGIP-CSWG Smart Grid Interoperability Panel – Cyber Security Working Group On-going * NERC CIP NERC CIP Cyber Security regulation for North American power utilities Released, On-going * IEC 62351 Data and Communications Security Partly released, On-going * IEEE PSRC/H13 & SUB/C10 Cyber Security Requirements for Substation Automation, Protection and Control Systems On-going* IEEE 1686 IEEE Standard for Substation Intelligent Electronic Devices (IEDs) Cyber Security Capabilities Finalized ISA S99 Industrial Automation and Control System Security Partly released, On-going * © ABB Group April 13, 2015 | Slide 19 Cyber Security for Substation Automation Standards and their scope © ABB Group April 13, 2015 | Slide 20 Graphical representation of scope and completeness of selected standards *) source DTS IEC 62351-10 10: Security architecture guidelines Cyber Security for Substation Automation Relevant standards – NERC-CIP The North American Electric Reliability Corporation (NERC), provides for critical infrastructure protection (NERC CIP). CIP 002 - Critical Cyber Asset Identification CIP 003 - Security Management Controls CIP 004 - Personnel and Training CIP 005 - Electronic Security Perimeter(s) CIP 006 - Physical Security of Critical Cyber Assets CIP 007 - Systems Security Management CIP 008 - Incident Reporting and Response Planning CIP 009 - Recovery Plans for Critical Cyber Asset © ABB Group April 13, 2015 | Slide 21 Cyber Security for Substation Automation Relevant standards – IEC62351 Explanation Information security for power system control operations. Security standards for IEC TC 57 defined protocols, specifically the IEC 60870-5 series, the IEC 60870-6 series, the IEC 61850 series, the IEC 61970 series, and the IEC 61968 series. Status Recommendation © ABB Group April 13, 2015 | Slide 22 Some part approved as Ed1 but not compatible with new draft of Ed2 Wait until standard is fully approved Cyber Security for Substation Automation Relevant standards – IEEE1686 Explanation IEEE Standard for Substation Intelligent Electronic Devices (IEDs) Cyber Security Capabilities The standard defines the functions and features to be provided in substation intelligent electronic devices (IEDs) to accommodate critical infrastructure protection (CIP) programs. The standard addresses security regarding the access, operation, configuration, firmware revision, and data retrieval from an IED. Status © ABB Group April 13, 2015 | Slide 23 Approved since 2008 Agenda © ABB Group April 13, 2015 | Slide 24 Introduction Why Cyber Security ? Cyber Security Architectures, Features and Solutions An Overview of Cyber Security Standards Key Take Away/Summary Key Take Away Protect, Detect and Respond The implementation should be able to minimize the attack surface, detect possible attacks and respond in an appropriate manner to minimize the impacts Defense in Depth No single security measure itself is foolproof as vulnerabilities and weaknesses could be identified at any time. In order to reduce these risks, implementing multiple protections in series avoids single point of failure. Technical, Procedural and Managerial measures Technology is insufficient on its own to provide robust protection. Cyber security policies and processes must be implemented in the organization to best be able to assess and mitigate the risks and respond to incidents. Implementing solutions around cyber security has to be a continuous process. It’s not only important to protect a system from the current vulnerabilities, but is also equally important to have mechanisms (technical and process) in place to quickly detect and effectively react to any incidents and isolate security breaches. © ABB Group April 13, 2015 | Slide 25 Inter-Connected Systems Executive Dashboard T&D Operations EMS DMS SCADA Ops .Planning T&D Planning & Engineering System Planning Maint. Mgmt. Asset Mgmt. DSM Dist. Mgmt. GIS Power Procurement & Market Ops. Planning & Forecasting Resource Dispatch Bidding & Scheduling Settlements Trading & Contracts Enterprise Application and Data Integration OMS Customer Services MDMS CIS Billing Communication Infrastructure Substation Automation © ABB Group April 13, 2015 | Slide 27 Feeder Automation Advanced Metering Infrastructure Call Center Smart Grid Systems © ABB Group April 13, 2015 | Slide 28