CIP Version 5 Transition Program – Lessons Learned & FAQs Tom Hofstetter, CIP Auditor June 2, 2015 Disclaimer • Not speaking for the Commission, for NERC, for SPPRE, etc. • These are dynamic issues, so content, descriptions, and musings may be an educated guess about who’s responsible, what it is, where it’s going, when it’s likely, why it’s needed, or how it’s done • Any perceived “guidance” on specific approaches for implementing the CIP V5 Standards is unintentional o compliance is dependent on how it is implemented o there may be other ways to comply with the Standards that are not discussed • I focus on system-wide TFE issues; details typically can be addressed by the Region 2 RELIABILITY | ACCOUNTABILITY Lessons Learned and FAQs Topic Generation Segmentation Lesson Learned Date Posted for Stakeholder Comment October 23, 2014 Far-End Relay BES Impact of Transmission Scheduling Systems Lesson Learned FAQ October 23, 2014 April 24, 2015 • Grouping of BES Cyber Systems Lesson Learned March 2, 2015 Shared Equipment at a Substation Virtualization Intrusion Detection Systems FAQ April 1, 2015 Lesson Learned FAQ April 17, 2015 April 30, 2015 • • • Interactive Remote Access Lesson Learned January 8, 2015 Mixed Trust EACMS Multiple Physical Access Controls Protecting Physical Ports Lesson Learned FAQ January 8, 2015 April 1, 2015 FAQ April 1, 2015 Identifying Sources of Patch Management Mitigating Threat of Detected Malicious Code FAQ April 30, 2015 FAQ November 25, 2014 FAQ April 1, 2015 Vulnerability Testing of Physical Access Controls 3 Lesson Learned or FAQ At a glance: • 23 original topics 50 FAQs 7 LLs 57 topics via Section 11 5 issues addressed by NERC RELIABILITY | ACCOUNTABILITY Lessons Learned & FAQ • Document effective approaches to implementation or compliance Suggestions on “how” to comply Somewhat prescriptive but not binding Uses industry comment and vetting approach 4 RELIABILITY | ACCOUNTABILITY Guidance: Effective Approaches to Comply Section 11 Guidance Development Process 5 RELIABILITY | ACCOUNTABILITY NERC Communications • Used when question is not about approaches to implementation nor compliance • Rather, used to address questions regarding the meaning of a particular requirement or term • Defers to Standard Drafting Team portions of “the record”: • Guidelines and Technical Basis • Comment responses • Issued April 21, 2015 6 RELIABILITY | ACCOUNTABILITY Status • • • • • • • • • • • • • Far-end Relay Generation Segmentation Mixed Trust EACMs Interactive Remote Access Grouping of BES Cyber Systems Virtualization (Networks and Servers) 3rd Party Notifications of medium impact assets* Generation Interconnection * Programmable Electronic Devices * Serial Devices that are accessed remotely * Network devices as BES Cyber Systems * Control Centers operated by TOs and non-registered BAs * General FAQs * - Not Issued as Lessons Learned or FAQ 7 RELIABILITY | ACCOUNTABILITY What’s Trending with CIP V5 Transition • 8 Far-end Relay (AKA Transfer-Trip) – Status: Approved by Standards Committee and Posted as Final. – The far-end relay does not automatically inherit a Medium impact categorization if the near-end substation satisfies the qualifications of Criterion 2.5. RELIABILITY | ACCOUNTABILITY What’s Trending with CIP V5 Transition • 9 Generation Segmentation – Status: Approved by Standards Committee and Posted as Final. – BES Cyber Systems associated with a generating plant in excess of 1500 MW Net Real Power Capability can be segmented such that there are no Medium impacting BES Cyber Systems. – Includes a discussion of evidence required to demonstrate sufficient segregation. RELIABILITY | ACCOUNTABILITY What’s Trending with CIP V5 Transition • 10 Mixed Trust Electronic Access Control or Monitoring Systems – Status: Addressing industry comments – The issue is whether corporate resources (Active Directory servers, remote access authentication servers, log servers, Intrusion Detection Systems, etc.) supporting both corporate and Electronic Security Perimeter access control are Electronic Access Control or Monitoring Systems. – Current position is that if the Cyber Asset is providing electronic access control or monitoring support to the CIP environment, the Cyber Asset is an EACMS for the purposes of CIP compliance. RELIABILITY | ACCOUNTABILITY What’s Trending with CIP V5 Transition • 11 Interactive Remote Access (Scripts and Management Consoles) – Status: Addressing industry comments – provide guidance on implementing security controls for the use of Interactive Remote Access. – Open question is whether scripts under programmatic control and actions performed by management consoles constitute Interactive Remote Access. RELIABILITY | ACCOUNTABILITY What’s Trending with CIP V5 Transition • 12 Grouping of BES Cyber Systems – Status: Addressing industry comments – Purpose is to describe useful methods to group BES Cyber Assets into BES Cyber Systems (BCS). RELIABILITY | ACCOUNTABILITY What’s Trending with CIP V5 Transition • 13 3rd Party Notifications of medium impact assets – Status: Issued as a NERC “Communication” and not a Lessons Learned – For IRC 2.3 and 2.6 Reliability Coordinator, Planning Coordinator, or Transmission Planner addresses the Facility (generation or transmission) – The asset owning registered entity must then determine which BES Cyber Assets or BES Cyber Systems support the identified Facility RELIABILITY | ACCOUNTABILITY What’s Trending with CIP V5 Transition • 14 Generation Interconnection (IRC 2.5) – Status: Issued as a NERC “Communication” and not a Lessons Learned – The question is whether the line (sometimes referred to as the generator lead line) operated at transmission voltages between a generating plant and a transmission substation is a Transmission Facility for the purposes of the CIP-002-5 Impact Rating Criteria. – Position is for transmission line to be considered a Transmission Facility and included in the Criterion 2.5 calculation, the line must be used for network flow of the Bulk Electric System and connected to another Transmission station or substation. RELIABILITY | ACCOUNTABILITY What’s Trending with CIP V5 Transition • Programmable Electronic Devices (PED) 15 – Status: Issued as a NERC “Communication” and not a Lessons Learned – Went back to the official record of the Standard Drafting Team and determined that questions raised were already addressed – Programmable electronic device (PED) “Is an electronic device which can execute a sequence of instructions loaded to it through software or firmware, and configuration of an electronic device is included in programmable.” - SDT Considerations of for V5 Posting RELIABILITY | ACCOUNTABILITY What’s Trending with CIP V5 Transition • 16 Virtualization (Networks and Servers) – Status: To be issued as a Lessons Learned – The concern with virtualization is when there is a mixed trust environment – The standards do not do a good job of addressing the technology – For virtual servers where a mixed trust environment is being used there will be a lot of scrutiny of security controls in place – For networks using mixed trust will need to see that the appropriate Electronic Access Point Controls are in place for the device RELIABILITY | ACCOUNTABILITY What’s Trending with CIP V5 Transition • 17 Serial Devices that are accessed remotely – Status: Issued as a NERC “Communication” and not a Lessons Learned – ERC definition – “…ability to access …” – The position is that terminal server/gateways that are connected using external routable connectivity with serial devices on the back end, and that perform no application-level processing are external routable connectivity all the way to the serial device. They must be within an ESP and have protection of an Electronic Access Point. RELIABILITY | ACCOUNTABILITY What’s Trending with CIP V5 Transition • 18 Serial devices with ERC: • Use a “dumb” converter (e.g., a “terminal server” • No application-level processing or proxying of traffic • Data passed from routable connection to serial connection with no application-level processing • Require an EACMS RELIABILITY | ACCOUNTABILITY What’s Trending with CIP V5 Transition • 19 Serial devices without ERC: • Use application proxy converter (e.g., a “data concentrator” or “application gateway”) • Application or protocol break between routable network and serial device • Data passes through application-level filtering or conversion RELIABILITY | ACCOUNTABILITY What’s Trending with CIP V5 Transition • 20 Network Devices and BES Cyber Systems – Status: Issued as a NERC “Communication” and not a Lessons Learned – Exclusion: Cyber Assets associated with communication networks and data communication links between discrete Electronic Security Perimeters. – Network devices can be considered BCAs based on the BCA definition, especially if inside ESPs – ERO will use discretion to exempt any Cyber Assets associated with non-routable communication networks/links that would be exempt if they were routable communication between discrete ESPs RELIABILITY | ACCOUNTABILITY What’s Trending with CIP V5 Transition • Control Centers operated by TOs and non-registered BAs – Status: Issued as a NERC “Communication” and not a Lessons Learned – High Impact Rating (H) o – Medium Impact Rating (M) o 21 1.3 Each Control Center or backup Control Center used to perform the functional obligations of the Transmission Operator for one or more of the assets that meet criterion 2.2, 2.4, 2.5, 2.7, 2.8, 2.9, or 2.10. 2.12. Each Control Center or backup Control Center used to perform the functional obligations of the Transmission Operator not included in High Impact Rating (H), above. RELIABILITY | ACCOUNTABILITY What’s Trending with CIP V5 Transition • 22 Control Centers operated by TOs and non-registered Bas – Went back to the official record of the Standard Drafting Team and determined it was clearly addressed that the SDT intent was the functions you are performing and not how you are registered. RELIABILITY | ACCOUNTABILITY What’s Trending with CIP V5 Transition • 23 General Frequently Asked Questions (FAQs) – 3 are already posted on the V5 Transition Program page on the NERC web site as “Technical FAQs” – 34 FAQs were posted for industry comment April 2 with comments due by May 15. – More FAQs posted May 1; comments due June 15 RELIABILITY | ACCOUNTABILITY References • 24 CIP Version 5 Transition page: http://www.nerc.com/pa/CI/Pages/Transition-Program.aspx RELIABILITY | ACCOUNTABILITY Questions Tom Hofstetter, CISA, CISSP CIP Compliance Auditor tom.hofstetter@nerc.net