UCAIug Summit SG Security Session 28 February 2012 Knoxville, TN Opening Session Agenda Status Updates Embedded Systems Security TF UCAIug IPR Policy • UCAIug Public or Private Documents may or may not contain the information included in the IPR Disclosure Form. • Any Sharing of any Contribution during any UCAIug Activity shall be deemed to have occurred on a non-confidential basis. • No valid copyright, trade secret or patent right shall be deemed to have been waived by such Sharing • Any Contributor who knows that IPR is or may be included in his Contribution to UCAIug Document must disclose such IPR • UCAIug was not formed for and is unable to verify the validity of any IPR and that all such information is being provided “AS IS”. SG Security Overview • Chair – Darren Highfill, SCE • Vice Chair – Bobby Brown, EnerNex • Secretary – Scott Palmquist, Itron update SG Security WG – Task Forces • Usability Analysis Task Force – – • CyberSec-Interop Task Force (in hibernation) – – – • Spinoff from DOE National SCADA Test Bed Lemnos Interoperable Security Project Development of interoperable security configuration profiles Chair: Dave Teumim (Teumim Technical), Vice-Chair: John Stewart (TVA) AMI-SEC Task Force (in hibernation) – – – • Evaluation and refinement of Security Profiles and other materials considered for ratification by the SG Security WG Chair: John Lilley (SDG&E), Vice-Chair: Daniel Thanos (GE) Produce technical specifications used by utilities to assess and procure AMI Will review AMI Security Profile v3 after draft release by NIST CSWG Chair: Darren Highfill (SCE), Vice-Chair: Bobby Brown (EnerNex) Embedded Systems Security Task Force – – Security requirements for embedded components and devices used in utility field systems Chair: Rohit Khera (PG&E), Vice-Chair: Daniel Thanos (GE) Progress since Austin • Continued coordination with external groups – IEC TC57 (Power Systems) WG15 (Communications Security) – NIST Cyber Security Working Group – Industrial Control Systems Joint Working Group (ICSJWG) Vendor Subgroup • Usability Analysis Task Force – Revision and approval of Distribution Management Security Profile • CyberSec Interop Task Force – (Work currently taking place under EPRI program) • Embedded Systems Security Task Force – Working on Secure Device Profile for Embedded Systems • Discussions about Vulnerability Handling – Digital Bond’s Project Basecamp: disclosure of PLC exploits Objectives for Spring 2012 F2F Meeting • Support relationships with other OpenSG working groups and task forces – OpenADR • Review interim work done by TFs – Security Profiles: Wide Area Monitoring, Protection, & Control (Synchrophasors) – Device Profiles for Embedded Security – Review ASAP-SG progress on Substation Automation Security Profile • Open topics: where does this take us? – Control system vulnerability handling – CERT Resilience Management Model Slide 6 Darren Highfill, SCE SG Sec – Session 1 • Additions/modifications to the agenda? • Update from the ICSJWG • Embedded Systems Security Task Force Agenda Day Timeslot Subject Group Monday 1500-1700 SG Security Boot Camp SG Sec WG Tuesday 0800-1000 Opening Plenary UCAIug 1030-1200 Agenda & Status Updates Embedded Systems Security TF SG Sec WG 1300-1500 ASAP-SG Research: State Machine Analysis SG Sec WG 0800-1000 Usability Analysis TF SG Sec WG 1030-1200 SG Security / OpenADR* Joint Session 1300-1500 Control System Vulnerabilities SG Sec WG 0800-1000 CERT-RMM SG Sec WG 1030-1200 External Activities Update Closeout / Actions Forward SG Sec WG Wednesday Thursday Ralph Mackiewicz, SISCO ICSJWG UPDATE Rohit Khera, S&C Electric EMBEDDED SYSTEMS SECURITY TF UCAIug Summit SG Security Session 29 February 2012 Knoxville, TN Working Sessions Usability Analysis TF Joint Session with OpenADR Control System Vulnerabilities John Lilley, San Diego Gas & Electric USABILITY ANALYSIS TASK FORCE UA TF Meeting Schedule • Meetings – Every two weeks – Monday, 10 am Pacific – Next meeting • Monday, 3/5/2012, 10 am Pacific • Active participants from utility, manufacturing, and service companies Completed Activities • Completed definition of analysis criteria • Security profiles completed and approved – AMI Security Profile (v1 and v2) – Third Party Data Access Security Profile – Distribution Management Security Profile • Security profiles completed and pending approval – WAMPAC Security Profile Current & Future Activities • Distribution Management Security Profile – During voting process received comments • WAMPAC Security Profile analysis – Support working group approval process • Substation Automation – Collect and resolve comments – Provide revised document, resolved comments, and a usability analysis report to working group Distribution Management Security Profile • Feedback on comments received during voting – Requirements vs. Guidelines – Power system resiliency vs. Security Controls – Risk evaluation should include impact of not mitigating an identified risk • Discussion of follow up action items (if any) WAMPAC Security Profile • Comment resolution activity review • Summary of profile and comments • Current approval status – Comments resolved, document updated, usability analysis report completed – Next step: Open SG WG pre-vote review period WAMPAC Security Profile • Timeline / Status – May 2011: ASAP-SG Draft provided to SG Sec WG – Aug. 2010: Usability Analysis TF review • Scope – Phasor measurements used in electric system operational decisions (off-line, real-time manual, and automated processes) • Technical Features – Refined failure analysis • Failures broken into common and system-specific – Refined network segmentation recommendations – Control generation • DHS as inspiration • Re-write at system-specific level – "What does it mean to implement this control for WAMPAC?" – Selection based on mitigation of failures Document Essentials Scope • Functionality Covered • Applications, Interfaces, & Sub-Components • Explicit Examples Logical Architecture • • • • Communications Architecture Roles Use Cases Mapping to Concrete Applications Security Considerations • Contextual & Operational Assumptions • Security Principles • Failure Analysis Security Controls • Network Segmentation • Control Definitions • Mapping of Controls to Roles & Segments Scope Roles and Functionality Application of Logical Architecture: Post-Event Analysis WAMPAC Logical Architecture Use Cases PMU Use Case 2 – Alignment Processes PMU Data Start 1A: PMU sends data to Alignment Data Store Alignment 2: Alignment monitors clock Phasor Gateway Communications Architecture 3: Alignment validates incoming data packet 4: Archive incoming data? Yes Yes 5: Alignment sends data frames to Data Store 7: Alignment discards data Use Case 5 Start 1B: Phasor Gateway forwards PMU data to Alignment 6: Data old (max lag time exceeded)? No 8: Alignment buffers data until all data received or max lag time reached End Use Case 3 Recommended Network Segmentation Role Assignment to Segments Mapping Controls to Roles Control Definition Security Profile Development Process Mapping Use Cases • Link structure varies depending upon level of granularity in text vs. implementation • Traceability provided regardless • Analysis for coverage should be performed after catalog of profiles is more complete { Mapping Roles to Actors Security Principles NISTIR Use Case Objectives NISTIR Controls as Inspiration & to Ensure Coverage • Start with relevant NISTIR control to address identified failure scenario • Re-write control specifically for implementation • Ensure control is testable • Use NISTIR to ensure coverage Comparison & Validation Interface Categories Controls Actors Map Validate Controls Roles Failure Analysis SG Security WG activities • After document returns from task force: – One week review period – One week voting period • If approved, document is presented by WG chair to Technical Committee for endorsement Substation Automation Security Profile • Profile is under development by ASAP-SG • Status update was provided yesterday • Open Discussion topic – Lessons learned to aid in upcoming profile review Substation Automation - Inform Substation Automation - Operate Substation Automation - Config SA Operational Assumptions 1. 2. 3. 4. 5. 6. The primary mission of the substation automation system is to protect personnel safety. The secondary mission of the SA system is to protect the integrity of power system assets. The tertiary mission of the SA system is to maintain and/or restore electric power service to as many customers as possible. Local substation functions should be able to continue operations in the absence of external communications. Automated system protection decisions should not be executed based solely on data from non-utility assets. Protection should not be disabled on energized equipment. a) b) 7. Maintenance? No ability to remotely disable protection - requires someone on-site. For a given Actuator, there is at most one Control Application that can send control actions to that Actuator. (NOTE: Protection Applications do not follow this constraint.) SA Security Principles 1. Security controls should not interfere with the missions of the SA system. a) b) c) d) e) SA protection functions are particularly sensitive to reduced availability and added latency. SA monitoring and control functions are particularly sensitive to reduced availability. Security controls must not inhibit manual emergency override capabilities. Security controls should provide clear visibility/indication of the sequence of security events, automated control actions taken, and expedient operator actions for restoration/recovery of substation automation systems. Security controls should provide for the maximum amount of operational flexibility (e.g., updates of ACL's should not require a full re-evaluation of the entire system). SA Security Principles (continued) 2. Security controls should protect the system from unauthorized actions that could endanger personnel or equipment. a) Users should not be allowed to perform any action that falls outside of their assigned role. I. II. b) No unauthorized or unauthenticated remote access should be granted by a SA system device or component. I. II. c) Remote access should be restricted to designated systems and locations. All remote access should utilize designated points for ingress/egress. No unauthorized or unauthenticated control commands should be processed by a SA system device or component. I. II. d) Generally, local operation takes precedence over remote operation. Configuration and operation of the system should be performed by separate roles. Only control commands from designated systems and locations should be executed. Control commands should use designated points for ingress/egress. No unauthorized or unauthenticated changes to system behavior or operation should be permitted. SA Security Principles (continued) 3. Security controls should provide evidence of SA system behavior and operation. a) [Considerations: Regulatory requirements] 4. Any SA system device or component should be able to validate the authenticity and integrity of all data acquired from another SA device or component. a) [Considerations: Peer-to-Peer comms] 5. Asset owners should not solely rely on security measures outside their direct observation and control. a) Responsibility for system behavior, operations, and associated monitoring may be outsourced; however accountability remains with the system owner/operator. 6. Operations should be degraded in a defined order of precedence (i.e., protection is more important than control, is more important than monitoring…). General Discussion • How have the security profiles been used? • What experiences can be shared with this group? • Suggested changes to the analysis criteria, analysis process, or other document review activities? Summary • Distribution Management Security Profile – Comments from voters • WAMPAC Security Profile – Review and voting by WG • Substation Automation Security Profile – Under development by ASAP-SG How to participate • Meetings: Every other Monday • Next Meeting: Mon, 3/5/2011, 10am Pacific • Distribution List: – UTILISEC-USABILITY@SmartGridListServ.ORG • Contact Information – – – – John Lilley, Chair, jlilley@sempra.com Daniel Thanos, Vice Chair, Daniel.Thanos@ge.com Scott Palmquist, Secretary, Scott.Palmquist@itron.com Darren Highfill, SG Security Chair, darren@utilisec.com Bruce Bartell, Xtensible Solutions SG SEC – OPENADR JOINT SESSION Reid Wightman, Digital Bond CONTROL SYSTEM VULNERABILITIES Darren Highfill, UtiliSec CERT RESILIENCE MANAGEMENT MODEL SG Security Working Group CLOSEOUT & ACTIONS FORWARD Questions? darren@utilisec.com SG Security WG Collaboration Site http://osgug.ucaiug.org/utilisec