Grid Modernization Cybersecurity discussion for Massachusetts DPU 12 March 2013 © 2013 IBM Corporation Agenda Intro & Obligatory Threat update Key Issues & Challenges -- AMI and Smart Meter Security -- The Cybersecurity Side of Privacy -- Notes from Other States NARUC's Cybersecurity Guide for State Regulators 2.0 Security Governance initiative, metrics and the EO Q&A / Discussion © 2012 IBM Corporation About me Current IBM Energy Security Lead Founder, Smart Grid Security & DOD Energy Blogs Advisor to DOE, NIST Member, MIT Energy Club Former Cybersecurity start-up vet Tech analyst USAF Comms & Computers © 2012 IBM Corporation Threat update RasGas Hit By Computer Virus Saudi Aramco Struck By Shamoon Attack Rasgas, the world's second-biggest LNG exporter, found its corporate networks and computers over-run by a hostile virus. Source: Reuters, Aug 2012 Iberdrola USA Exposes Customer Records Telvent IT Breach Led to OT IP Theft Malware attack infected approximately 30,000 workstations at the world’s largest oil producer. Admits it allowed 3rd party access to 1.8 million customer records including PII and social security numbers. Attacker penetrated firewalls and security systems, implanted malicious software, and stole project files for systems that remotely control portions of the electric grid. Source: Information Week, Aug 2012 Source: InfoSecurity, Jan 2012 Source: ZDNet, Sep 2012 DHS ICS-CERT 4Q12 Report says (reported) attacks on sector way up: 2012 (81) vs. 2011 (32) © 2012 IBM Corporation Awareness update Mainstream DHS Secret Threat Briefing to Utility CEOs CEOs asking for help with intel on emerging threats Industry lobbying firm, the Edison Electric Group (EEI), shared an observation in June 2012 that for the last year utility CEOs have become much more interested in / concerned with cybersecurity matters, but are unsure how to proceed © 2012 IBM Corporation Issues and Challenges AMI and Smart Meter Security -- Black Hat exposures -- Software security -- Encryption and Head-end security protections Privacy -- Information Governance, Privacy and data security concerns -- Opt-out campaigns -- Youtube FUD video “A search without a warrant every day” -- Helpful: Smart Grid Consumer Collaborative (SGCC) Point of contact: Patty Durand © 2012 IBM Corporation Issues and Challenges (cont.) Key Question: Is AMI riskier than AMR and/or Advanced AMR? Vs. AMR: Yes Vs. Enhanced AMR: if using RF mesh, yes. Usually AMR is read only, so the meter data would need to be encrypted with some sort of authentication binding the meter to the HAN. AMI will include Demand Response actions ( More on Meter risks Reverse engineering meter hardware Searching for vulnerabilities and exploits at the board level (e.g., web services running on a chip of which the vendor is unaware) Also lock picking to defeat tamper resistance – how to open lid without triggering alarm Utility Actions/Options Collect tamper data and investigate This is a point problem with tolerable revenue loss However, cyber/malware issues that could propagate would be bigger. Utility might have to rebuild config files on each meter via optical or serial ports Recommendations Study what is working elsewhere and work very closely with Smart Meter vendor(s) With issues with billing accuracy, customer privacy, widespread outages - utilities should consider reputational/regulatory risks primary © 2012 IBM Corporation Notes from Other States California Points of Contact: Liza Malashenko and Chris Villarreal -- 2011 Privacy and Data Security decision -- Also Metrics (including cybersecurity) Cybersecurity policy paper and hosted discussions Texas Point of Contact: Allan Rivaldo -- Security and the statewide portal -- Teaming and collaboration with AMI and meter vendor on security matters Ohio -- Interrogatories on security (from NARUC) © 2012 IBM Corporation CPUC's Customer Usage Data Privacy Rules 7/29/2011: DECISION ADOPTING RULES TO PROTECT THE PRIVACY AND SECURITY OF THE ELECTRICITY USAGE DATA OF THE CUSTOMERS OF PG&E, SCE and SDG&E Touches on: HAN networks Real-time pricing signals for consumers 3rd party access to usage data with customer consent New security and privacy rules for the big 3 CA IOU utilities with CPUC oversight © 2012 IBM Corporation NARUC's Guide State utility regulators can and should: • Create expertise within their own organizations • Ask the right questions of utilities • Assess their own cybersecurity and information protection capabilities • Engage with other efforts led by the private sector, State agencies or federal officials, as well as engaging with processes that link these sectors Points of Contact: Miles Keogh Christina Cody © 2012 IBM Corporation NARUC Questions: Planning Having a plan indicates that the response isn’t piece-meal, reactive or fragmented. Asking planning questions aims to encourage proactive and strategic action on the part of the utilities, rather than a patchwork response: 1. Does your company have a cybersecurity policy, strategy or governing document? 2. Is the cybersecurity policy reviewed or audited? Internally or by an outside party? What qualifications does the company consider relevant to this type of review? 3. Does your cybersecurity plan contain both cyber and physical security components, or does your physical security plan identify critical cyber assets?. © 2012 IBM Corporation NARUC Questions: Standards Standards are an important driver of enforceable action with which regulators can attempt to ensure utilities’ compliance. 13. Describe the company’s compliance status with NERC CIP-002 through CIP-009. 14. What collaborative organizations or efforts has your company interacted with or become involved with to improve its cybersecurity posture (such as NESCO, NESCOR, Fusion centers, Infragard, US-CERT, ICS-CERT, ES-ISAC, SANS, the Cross-Sector Cyber Security Working Group of the National Sector Partnership, etc.)? 15. Can your company identify any other mandatory cybersecurity standards that apply to its systems? What is your company’s plan for certifying its compliance or identifying that it has a timetable for compliance? © 2012 IBM Corporation NARUC Questions: Procurement Practices While the information of procurement seen upstream to vendors may only be proprietary to the utility, the decisions the vendor makes around procurement may contain key elements for cybersecurity. The questions below cover these aspects of procurement. 19. Has your organization conducted an evaluation of the cybersecurity risks for major systems at each stage of the system deployment lifecycle? What has been done with the results? 20. Are cybersecurity criteria used for vendor and device selection? 21. Have vendors documented & independently verified their cybersecurity controls? Who is the verifier and how are they qualified? © 2012 IBM Corporation NARUC Questions: Personnel and Policies Personnel, the people who run the systems we aim to protect, are key to ensuring cybersecurity. They way employees are hired, trained and separated from operations can make or break cybersecurity. 27. Is cybersecurity budgeted for? What is the current budget for cybersecurity activities relative to the overall security spending? 28. Are individuals specifically assigned cybersecurity responsibility? Do you have a Chief Security Officer and do they have explicit cybersecurity responsibilities? 29. Does your company employ IT personnel directly, use outsourcing or employ both approaches to address IT issues? For companies that lack a full IT department, explain if one individual in your company is held responsible for IT security. (You may want to ask same questions in regard to Operations Technology (OT) [i.e. energy operations] security; larger companies may have separate staffs.) © 2012 IBM Corporation NARUC Questions: Systems and Operations Be aware that as the questioning agency, you want to consider carefully whether answers to the below questions are needed and, if so, whether the answers to them could create vulnerabilities to the system. Modify them to your needs accordingly. 37. Is cybersecurity integrated between business systems and control systems? For the existing grid and for the smart grid? 38. Have logical and physical connections to key systems been evaluated and addressed? 39. Does the company maintain standards and expectations for downtime during the upgrade and replacement cycle? © 2012 IBM Corporation Security Governance guidance for utilities For CEOs and BoDs: 1. Security as risk management 2. A fully integrated security enterprise 3. Security by design 4. Business-oriented security metrics and measurement 5. Change that begins at the top 6. IBM’s 10 essential security actions 16 © 2012 IBM Corporation IBM Security Systems A measurement movement is forming – DOE's Electricity Subsector Cybersecurity Maturity Model (June 2012) • Metrics for utilities to use to baseline and gauge effectiveness – DOE’s Electricity Subsector Risk Management Process (May 2012) • Help translating cybersecurity into risk management framework – NARUC's Cybersecurity for State Regulators (June 2012, Feb 2013 update) • Questions utilities will be asked by their state public utility commissions – NIST’s NISTIR 7628 Assessment Guide (Aug 2012) – NRECA's Guide to Developing a Cybersecurity and Risk Mitigation Plan (June 2011) 17 © 2012 IBM Corporation Andy Bochman WW Energy Security Lead, IBM bochman@us.ibm.com ---------------------------------Smart Grid Security Blog ibm.com/energy ibm.com/security © Copyright IBM Corporation 2012. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. © 2012 IBM Corporation