Attachment Security Questions Supplier Brief Response INSTRUCTIONS: The items listed below are paraphrased from the NISTIR 7628 Volume 1, which we understand to be in draft form. These are not requirements. We would like to learn more about the security characteristics of your product that are provided now or will be provided in the future. Please answer the questions clearly "yes" or "no," and if the proposed system is capable of accomplishing the security characteristic, please briefly describe how. If your system or product includes any security characteristics above and beyond the listed items, such as any additional considerations or enhancements as described in the NISTIR 7628, please describe those as well. Note: the term "system" shall mean software, hardware, etc. that may exist at the head-end and/or equipment that is located remotely within the electric distribution grid. 1 Reference: SG.AC-4 Access Enforcement. Can the proposed system enforce assigned authorizations for controlling access to the Smart Grid information system in accordance with organization-defined policy? If so, please briefly describe how this is accomplished. # Description 2 Reference: SG.AC-5 Information Flow Enforcement. Does the proposed system enforce assigned authorizations for controlling the flow of information within the Smart Grid information system and between interconnected Smart Grid information systems in accordance with applicable policy? If so, please briefly describe how this is accomplished. 3 Reference: SG.AC-8 Unsuccessful Login Attempts. Can the proposed system enforce a limit of organizationdefined number of consecutive invalid login attempts by a user during an organization-defined time period? If so, briefly describe how this is accomplished. 4 Reference: SG.AC-9 Smart Grid Information System Use Notification. Does the proposed system display an approved system use notification message or banner before granting access to the Smart Grid information system that provides privacy and security notices consistent with applicable laws, directives, policies, regulations, standards, and guidance? If so, briefly describe how this is accomplished. 5 Reference: SG.AC-10 Previous Logon Notification. Does the proposed system notify the user, upon successful logon, of the date and time of the last logon and the number of unsuccessful logon attempts since the last successful logon? If so, briefly describe how this is accomplished. 6 Reference: SG.AC-12 Session Lock. Does the proposed system— 1. Prevent further access to the Smart Grid information system by initiating a session lock after an organizationdefined time period of inactivity or upon receiving a request from a user? 2. Retain the session lock until the user reestablishes access using appropriate identification and authentication procedures? If so, briefly describe how this is accomplished. Reference: SG.AC-13 Remote Session Termination. Does the proposed system terminate a remote session at the end of the session or after an organization-defined time period of inactivity? If so, briefly describe how this is accomplished. Reference: SG.AU-3 Content of Audit Records. Does the proposed system produce an audit record, containing the following information, for each event: • Data and time of the event, • The component of the Smart Grid information system where the event occurred, • Type of event, • User/subject identity, and • The outcome of the events? If so, briefly describe how this is accomplished. 7 8 9 Reference: SG.AU-5 Response to Audit Processing Failures. Does the proposed system— 1. Alert designated organizational officials in the event of an audit processing failure? 2. Execute an organization-defined set of actions to be taken (e.g., shutdown Smart Grid information system, overwrite oldest audit records, and stop generating audit records)? If so, briefly describe how this is accomplished. 10 Reference: SG.AU-7 Audit Reduction and Report Generation. Does the proposed system provide an audit reduction and report generation capability? If so, briefly describe how this is accomplished. 11 Reference: SG.AU-8 Time Stamps. Does the proposed system use internal system clocks to generate time stamps for audit records? If so, briefly describe how this is accomplished. 12 Reference: SG.AU-9 Protection of Audit Information. Does the proposed system protect audit information and audit tools from unauthorized access, modification, and deletion? If so, briefly describe how this is accomplished. 13 Reference: SG.AU-15 Audit Generation. Does the proposed system— 1. Provide audit record generation capability and generates audit records for the selected list of auditable events? 2. Provide audit record generation capability and allows authorized users to select auditable events at the organization-defined Smart Grid information system components? If so, briefly describe how this is accomplished. Reference: SG.AU-16 Non-Repudiation. Does the proposed system protect against an individual falsely denying having performed a particular action? If so, briefly describe how this is accomplished. 14 15 Reference: SG.CP-11 Fail-Safe Response. Does the proposed system have the ability to execute an appropriate fail-safe procedure upon the loss of communications with other Smart Grid information systems or the loss of the Smart Grid information system itself? If so, briefly describe how this is accomplished. 16 Reference: SG.IA-4 User Identification and Authentication. Does the proposed system uniquely identify and authenticate users (or processes acting on behalf of users)? If so, briefly describe how this is accomplished. 17 Reference: SG.IA-5 Device Identification and Authentication. Does the proposed system uniquely identify and authenticate an organization-defined list of devices before establishing a connection? If so, briefly describe how this is accomplished. 18 Reference: SG.IA-6 Authenticator Feedback. Do the authentication mechanisms in the proposed system obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals? If so, briefly describe how this is accomplished. 19 Reference: SG.ID-5 Automated Labeling. Does the proposed system automatically label information in storage, in process, and in transmission in accordance with— 1. Access control requirements; 2. Special dissemination, handling, or distribution instructions; and 3. Otherwise as required by the Smart Grid information system security policy? If so, briefly describe how this is accomplished. Reference: SG.SA-5 Smart Grid Information System Documentation. 1. Does the proposed system documentation include how to configure, install, and use the information system and the information system’s security features? 2. Will the organization be able to obtain from the Supplier information describing the functional properties of the security controls employed within the proposed system? If so, briefly describe how this is accomplished. 20 21 22 23 Reference: SG.SC-2 Communications Partitioning. Does the proposed system partition the communications for telemetry/data acquisition services and management functionality? If so, briefly describe how this is accomplished. Reference: SG.SC-3 Security Function Isolation. Does the proposed system isolate security functions from nonsecurity functions? If so, briefly describe how this is accomplished. Reference: SG.SC-4 Information Remnants. Does the proposed system prevent unauthorized or unintended information transfer via shared Smart Grid information system resources? If so, briefly describe how this is accomplished. 24 Reference: SG.SC-5 Denial-of-Service Protection. Does the proposed system mitigate or limit the effects of denial-of-service attacks based on an organization-defined list of denial-of-service attacks? If so, briefly describe how this is accomplished. 25 Reference: SG.SC-6 Resource Priority. Does the propsoed system prioritize the use of resources? If so, briefly describe how this is accomplished. 26 Reference: SG.SC-7 Boundary Protection. 1. Does the proposed system monitor and control communications at the external boundary of the system and at key internal boundaries within the system? 2. Does the proposed system connect to external networks or information systems only through managed interfaces consisting of boundary protection devices? 3. Does the managed interface implement security measures appropriate for the protection of integrity and confidentiality of the transmitted information? If so, briefly describe how this is accomplished. 27 Reference: SG.SC-8 Communication Integrity. Does the proposed system protect the integrity of electronically communicated information? If so, briefly describe how this is accomplished. 28 Reference: SG.SC-9 Communication Confidentiality. Does the proposed system protect the confidentiality of communicated information? If so, briefly describe how this is accomplished. 29 Reference: SG.SC-10 Trusted Path. Does the proposed system establish a trusted communications path between the user and the Smart Grid information system? If so, briefly describe how this is accomplished. Reference: SG.SC-12 Use of Validated Cryptography. Are all of the cryptography and other security functions (e.g., hashes, random number generators, etc.) which are required for use in a Smart Grid information system NIST Federal Information Processing Standard (FIPS) approved or allowed for use in FIPS modes? If so, briefly describe how this is accomplished. 30 31 32 Reference: SG.SC-14 Transmission of Security Parameters. Does the proposed system reliably associate security parameters with information exchanged between the enterprise information systems and the Smart Grid information system? If so, briefly describe how this is accomplished. Reference: SG.SC-18 System Connections. Are all external Smart Grid information system and communication connections identified and protected from tampering or damage? If so, briefly describe how this is accomplished. 33 Reference: SG.SC-19 Security Roles. Does the Smart Grid information system design and implementation specify the security roles and responsibilities for the users of the proposed system? If so, briefly describe how this is accomplished. 34 Reference: SG.SC-20 Message Authenticity. Does the proposed system provide mechanisms to protect the authenticity of device-to-device communications? If so, briefly describe how this is accomplished. 35 Reference: SG.SC-22 Fail in Known State. Does the proposed system fail to a known state for defined failures? If so, briefly describe how this is accomplished. 36 Reference: SG.SC-23 Thin Nodes. Does the proposed system employ processing components that have minimal functionality and data storage? If so, briefly describe how this is accomplished. 37 Reference: SG.SC-24 Honeypots. Does the proposed system include components specifically designed to be the target of malicious attacks for the purpose of detecting, deflecting, analyzing, and tracking such attacks? If so, briefly describe how this is accomplished. 38 Reference: SG.SC-25 Operating System-Independent Applications. Can the proposed system include organization-defined applications that are independent of the operating system? If so, briefly describe how this is accomplished. 39 Reference: SG.SC-26 Confidentiality of Information at Rest. Does the proposed system employ cryptographic mechanisms for all critical security parameters (e.g., cryptographic keys, passwords, security configurations) to prevent unauthorized disclosure of information at rest? If so, briefly describe how this is accomplished. 40 Reference: SG.SC-29 Application Partitioning. Does the proposed system separate user functionality (including user interface services) from Smart Grid information system management functionality? If so, briefly describe how this is accomplished. 41 Reference: SG.SI-3 Malicious Code and Spam Protection. Does the proposed information system prevent users from circumventing malicious code protection capabilities? If so, briefly describe how this is accomplished. 42 Reference: SG.SI-6 Security Functionality Verification. Does the proposed system notify the management authority when anomalies are discovered? If so, briefly describe how this is accomplished. 43 Reference: SG.SI-7 Software and Information Integrity. Does the proposed system monitor and detect unauthorized changes to software and information? If so, briefly describe how this is accomplished. 44 Reference: SG.SI-8 Information Input Validation. Does the proposed system employ mechanisms to check information for accuracy, completeness, validity, and authenticity? If so, briefly describe how this is accomplished. 45 Reference: SG.SI-9 Error Handling. Does the proposed system — 1. Identify error conditions? 2. Generate error messages that provide information necessary for corrective actions without revealing potentially harmful information that could be exploited by adversaries? If so, briefly describe how this is accomplished. INSTRUCTIONS: Please provide answers to the questions below in the space provided. 46 Security Approach. Describe the current security approach for your product. Specifically, what is your firm’s approach to ensuring your product meets customer expectations for IT security, software security, and compliance? 47 System Boundaries. Provide one or more diagrams or technical descriptions for each of the following: (1) A network-oriented view of where each part of your product is installed in the cooperative’s networks; (2) A network-oriented view of each of the communications protocols used by your product; (3) An architecture-oriented diagram that shows each of the security components (authentication, authorization, cryptography, and so on) included with your product. a. Also include with each diagram or description: (1) the demarcation points where your product expects to interface with a cooperative’s previously existing technology; (2) the interface requirements at each demarcation point; (3) any specific security requirements required for a secure interface at the demarcation point. 48 Certification and Compliance. Provide a list of standards, recommendations, guidance, statutes, and related items with which you claim compliance or certification for any part of your product. 49 Asset Identification. Provide a list of all components of your product that would be considered “critical assets” or “critical cyber assets” under the definitions in the current NERC CIPs. 50 Key Management. If cryptographic key management is required as part of the product’s operation, describe the procedures, hardware, software, skill sets, and any other resources required for the various key management activities (e.g., generation, distribution, and so on). 51 Dependence on Existing Systems. If acceptable security for the product (hardware, software, and protocols) relies on certain security technologies and procedures being in place at the cooperative, describe the recommended security technologies and procedures that should be in place. 52 Security of Out-Sourced Components. If some part of the product or its operation (e.g., hardware, software, command and control, data) will remain outside the cooperative's direct control (e.g., in a remote data center, as part of a SaaS offering, and so on), describe and diagram the parts outside the cooperative's control and describe the security practices applied to keeping those parts both safe and compliant with all applicable regulatory needs. External Connections. If installation or continued operation of the product requires Supplier remote access to some part of the cooperative networks or systems, describe how this is done securely. Training. Describe the training available to the cooperative on the installation, configuration, and operation of security-related settings, components, and related characteristics for your product. 53 54 55 56 57 58 Documentation. Describe the detailed documentation available for the primary security configuration items associated with your product, along with detailed guidance to help cooperatives make good security choices during both installation and ongoing operations. Protection for Data in Transit. Describe how the product provides protection for all associated functional and administrative data communications (i.e., data in transit). Protection for Data at Rest. Describe how the product provides protection for all associated data storage (i.e., data at rest). Product Access Controls and Separation of Duties. Describe how the product provides protection (e.g., access control, authorizations, permissions, encryption) and separation of duties for all functional and administrative access. 59 Protection of Sensitive Data. List and describe how the product creates, processes , and stores sensitive data (e.g., customer personal data, credit card data, customer usage data, etc.) in full compliance with all applicable security standards. 60 Audit and Forensics Support. Describe how the product logs or provides for the logging of administrative actions and other important events to support incident response and forensic analysis. 61 Firmware and Software Integrity. Describe how the product periodically verifies its software and/or firmware to ensure its validity and detect tampering. 62 Account and Password Controls. Describe how the product provides for unique user accounts and the ability to change default passwords and/or other credentials. 63 Cryptographic Certification. Provide a list of the cryptographic components included in the product and detail the current compliance status of each with respect to NIST standards. 64 Equipment Removal. Describe the security procedures required for safely removing the product from the field (sunsetting, end-of-life, recall, swap out, etc.). Supply Chain. Describe the hardware and software supply chain for all security-related hardware and software components in your product. Software Development Lifecycle. Describe the security aspects of the software development lifecycle used to build the current version of your product (regardless of whether the codebase was developed by your firm or a subcontractor). 65 66 67 Threat Modeling. Describe the threat model used to decide on the appropriate security features, security configuration controls, security designs, and software security approaches present in your product. 68 Security Testing. Describe all types of security testing applied to your product and list any current security testing artifacts available for review. Desired artifacts include results from a static code review tool, a dynamic analysis tool, a fuzz testing tool, a penetration test, an architecture risk assessment, an industry or government certification, and/or any similar security-specific review. Attachment Security Questions - Communications # 1 Description Please explain how your product can be configured to protect sensitive data being transmitted over the wireless path, protect sensitive data being stored, and verify that critical commands (whether provided locally or remotely) originate from authorized users or devices. Supplier Brief Response