Mick Neshem CISA, CISSP, CSSA Senior Compliance Auditor – Cyber Security CIP-005-5 Compliance Outreach CIP v5 Roadshow May 14-15, 2014 Salt Lake City, UT V5 Open Actions [SAR 1-4] 1. 2. 3. Modify or remove the IAC in the 17 impacted requirements [February 3, 2015] Develop modifications to the CIP standards to address security controls for Low impact assets Develop requirements to protect transient electronic devices -thumb drives, laptops that do not meet BES cyber asset definition 4. 5. Create a definition of “communication networks” and develop new or modified standards that address the protection of communication networks [February 3, 2015] Study the application of the 15-minute parameter for identification of BES Cyber Assets and the impact of this time constraint on the overall security and reliability of the BES. SDT Industry Webinar.pdf – April 22, 2014 2 3 FERC Staff Technical Conference (4/29/14) • whether additional definitions and/or security controls are needed to protect Bulk-Power System communications networks, including remote systems access • adequacy of the approved CIP version 5 Standards’ protections for Bulk-Power System data being transmitted over data networks • functional differences between the respective methods utilized for identification, categorization, and specification of appropriate levels of protection for cyber assets using CIP version 5 Standards as compared with those employed within the National Institute of Standards and Technology Security Risk Management Framework. http://ferc.gov/CalendarFiles/20140227165846-RM13-5-000TC.pdf 4 FERC Technical Conference Update • Significant discussion regarding Communications Network • Cyber Systems use of non routable communication • Cyber Security Procurement Processes • NIST Risk Management Framework and Cyber Security Framework 5 Terminology • • • • • • • • 6 Cyber Asset BES Cyber Asset (BCA) BES Cyber Systems (BCS) Protected Cyber Asset (PCA) Electronic Security Perimeter (ESP) External Routable Connectivity (ERC) Electronic Access Point (EAP) Dial-up Connectivity V3 vs. V5 Requirement Count • CIP v3 o 5 Requirements (Version 3) o 26 Sub-requirements • CIP v5 o 2 Requirements (Version 5) o 8 Parts 7 Applicable Systems 8 Moved 9 Deleted 10 IAC • 17 CIP Requirements that include IAC (2/3/2015) • CIP-005-5 contains no Identify, Assess and Correct language in requirement. 11 CIP-002-5 & CIP-005-5 • CIP-002-5 is the initial identification of the BES Cyber System • It is important for the CIP-002-5 and CIP005-5 teams in your organization to work closely in the identification of BES Cyber Systems and Impact Rating Criteria (IRC) • ESP boundaries and High Water Mark impacts may affect CIP-005-5 architecture 12 High Level Relationships [CIP-002-5] Control Centers and Backup Control Centers (RC, BA, TOP or GOP) that meets CIP-002-5 Attachment 1 Section 1 requirements BES Assets High Impact Facilities Medium Impact Facilities R1.1 R1.2 BES Cyber Systems (BCS) BES Cyber Systems (BCS) PCA BES Cyber BES Cyber Assets Assets BES Cyber Assets 13 CIP-002-5 Attachment 1 Section 2 requirements PCA BES Cyber BES Cyber Assets Assets BES Cyber Assets High Level Relationships [CIP-002-5] BES Assets High Impact Facilities R1.1 BES Cyber Systems (BCS) Medium Impact Facilities One or more BES Cyber Assets logically grouped by a responsible entity to perform one or more reliability tasks for a functional entity R1.2 BES Cyber Systems (BCS) PCA BES Cyber BES Cyber Assets Assets BES Cyber Assets 14 Programmable electronic devices, including the hardware, software, and data in those devices PCA BES Cyber BES Cyber Assets Assets BES Cyber Assets High Level Relationships [CIP-002-5] BES Cyber Asset High Impact Facilities R1.1 BES Cyber Systems (BCS) BES Cyber BES Cyber Assets Assets BES Cyber Assets 15 BES - A Cyber Asset that if rendered unavailable, degraded, Assetswould, within 15 minutes of its required or misused Impact operation, misoperation,Medium or non-operation, adversely Facilities impact one or more Facilities, systems, or equipment, which, if destroyed, degraded, or otherwise rendered unavailable when needed, would affect the reliable R1.2 operation of the Bulk Electric System. Redundancy of BES Cyber affected Facilities, systems, and equipment shall not be Systems considered when determining adverse impact. Each (BCS) BES Cyber Asset is included in one or more BES Cyber Systems. (A Cyber Asset is not a BES Cyber Asset if, for 30 consecutive calendar days or less, it is directly Cyber connected to a networkBES within an ESP, a Cyber Asset BES Cyber within an ESP, or to a BESAssets Cyber Asset, and it is used Assets Cyber maintenance, for data transfer, vulnerability BES assessment, or troubleshooting purposes.) Assets CIP-005-5 R1 Part 1.1 16 Changes 17 http://www.nerc.com/docs/standards/sar/Mapping_Docu ment_012913.pdf CIP-005-5 R1.1 [ESP] High Impact BCS PCA R1.1 Internal Routable Connectivity ? Medium Impact BCS PCA YES The logical border surrounding a network to which BES Cyber Systems are connected using a routable protocol. 18 Requires ESP One or more Cyber Assets connected using a routable protocol within or on an Electronic Security Perimeter that is not part of the highest impact BES Cyber System within the same Electronic Security Perimeter. The impact rating of Protected Cyber Assets is equal to the highest rated BES Cyber System in the same ESP. A Cyber Asset is not a Protected Cyber Asset if, for 30 consecutive calendar days or less, it is connected either to a Cyber Asset within the ESP or to the network within the ESP, and it is used for data transfer, vulnerability assessment, maintenance, or troubleshooting purposes. Defined ESP High BES Cyber System BCA PCA BCA BCA PCA ESP 19 Electronic Security Perimeter • Version 3 (1/18/2008) o The logical border surrounding a network to which Critical Cyber Assets are connected and for which access is controlled. • Version 5 (4/1/2016) o The logical border surrounding a network to which BES Cyber Systems are connected using a routable protocol. 20 Electronic Security Perimeter(s) ‘defined’ • ESP defines a zone of protection around the BES Cyber System • Helps determine what systems or Cyber Assets are in scope and what Impact Rating the Cyber Systems meet, ultimately determines which requirements are applicable 21 ESPs • Isolated • Discrete • Extended 22 Isolated ESP • ESP network with no external connectivity o An ESP (a logical border) is required around every routable protocol network that contains a BES Cyber System, even if it is an isolated network and has no external connectivity 23 Isolated ESP – No External Communications EMS Electronic Security Perimeter File Server Non-BCS Workstations PCA PCA Printer PCA PCA PCA Switch CIP-007 CIP-005 BCA/PCARouter BCA Printer Switch CIP-002 CCA BCA/PCA PCA BCA BCA BCA Workstations BCA 24 BCA BCA EMS Servers High Water Mark • CIP Cyber Security Standards do not require network segmentation of BES Cyber Systems by impact classification • A new concept from tiered impact model • Many different impact classifications can be identified within an ESP, however, the highest level of the BCS within the ESP sets the High Water Mark for all associated assets within that ESP 25 High Water Mark 26 High Water Mark High BES Cyber System BCA Medium BES Cyber System PCA BCA BCA EAP PCA BCA EAP BCA BCA PCA PCA ESP ESP PSP 27 Discrete ESPs Routable Protocols Medium BES Cyber System EAP ESP High BES Cyber System High BES Cyber System EAP ESP Medium BES Cyber System EAP Low BES Cyber System ESP 28 Discrete ESPs 29 Extended ESP High BES Cyber System Encrypted Tunnel ESP ESP Encrypted Tunnel Encrypted Tunnel High BES Cyber System 30 High BES Cyber System ESP Extended ESP High BES Cyber System Encrypted Tunnel ESP ESP Encrypted Tunnel Encrypted Tunnel CORP EAP High BES Cyber System 31 High BES Cyber System ESP Extended ESP • “If an entity wishes to state that a wide area network of sites are within one ESP, regardless of encryption, then all Cyber Assets (which includes, e.g., all communication or networking equipment) within that very large ESP become associated PCAs and must meet the Requirements of the highest level BES Cyber System in the ESP. The standards do not preclude doing this, but there are implications that Responsible Entities should take into account” Final_Petition_CIP_V5.pdf (Jan. 31, 2013, page 45) 32 CIP-005-5 Communication Equipment • Communications equipment between sites; o If using routable communication the communications equipment connecting discrete ESPs are not in scope (4.2.3.2) o Extended ESPs will need to include the communications equipment – not “discrete” ESPs o Serial communications equipment will be included as no exclusion exists o This is TBD by Communication standard work in progress - wait and see GET INVOLVED Contact Ryan Stewart at NERC to be added to the SDT plus list Ryan.Stewart@nerc.net 33 BCS Boundaries Can a BCS span multiple facilities crossing discrete ESPs? 34 BCS Boundaries [Single BCS] 35 BCS Boundaries [Multi BCS] 36 Example EMS ESP [Routable] EMS Electronic Security Perimeter Workstations Printer EMS WAN File Server CIP-005 Router Access Control Server Switch EAP Firewall CIP-007 CIP-005 Router EAP CorpNet CCA Firewall Switch Switch DMZ CCA Printer CCA CCA EACM EACM CCA Intermediate Server 37 CCA Access Control Server CCA Workstations CCA EMS Servers Example EMS ESP [Routable] EMS Electronic Security Perimeter All PCA devices take on the impact level of the BCS File Server Non-BCS Workstations PCA PCA Printer PCA PCA Router PCA Switch CIP-005 DMZ CIP-005 BCA Printer Switch CIP-002 CCA BCA/PCA PCA BCA BCA EACM EACM Access Control Server BCA Workstations BCA Intermediate Server Firewall BCA/PCARouter Firewall Switch 38 EAP CIP-007 EAP CorpNet EMS WAN BCA BCA EMS Servers Example EMS ESP [Multi-BCS ESP] EMS Electronic Security Perimeter BCS Server BCS Workstations BCA BCA Printer EMS WAN PCA BCA Router BCA Switch MEDIUM CIP-005 CIP-007 EAP CorpNet Firewall CIP-005 BCA/PCARouter BCA Firewall Switch DMZ EACM Printer BCA BCA Workstations EACM Access Control Server CCA BCA/PCA BCA BCA Intermediate Server Switch CIP-002 PCA CIP-005 39 EAP BCA BCA EMS Servers HIGH Example EMS ESP [High Water Mark Impact] EMS Electronic Security Perimeter All PCA devices take on the impact level of the BCS File Server Non-BCS Workstations PCA PCA Printer EMS WAN PCA PCA Router PCA Switch EAP Firewall EAP CorpNet BCA/PCARouter BCA Firewall Switch DMZ Switch Printer CCA BCA/PCA PCA BCA BCA EACM EACM BCA Intermediate Server 40 Access Control Server BCA Workstations BCA BCA EMS Servers Non-Routable BCS • Cyber Assets are subject to the CIP standards based on their functionality and resultant potential impact to BES reliability • BES Cyber Systems and associated BES Cyber Assets are not dependent upon a routable protocol (see definitions) o A BES Cyber System may include non-routable (serial) devices. End point devices (relays) may be included within the v5 requirements and identified as BES Cyber Assets, even if no routable communications exist. Therefore, there are v5 requirements to be addressed (i.e. CIP-007-5) 41 BCS and ESPs • Does a BCS require an ESP? o BCS may not require an ESP o A BCA with no routable connectivity cannot be part of an ESP o The level of protection required depends on the classification (IRC) of the asset Still required to apply the protections under CIP-007 that apply to a BCA/PCA 42 Mixed connectivity BCS Non-routable BCA 43 Non-Routable BCS BCS 44 Measures (Part 1.1) • List of BES Cyber Systems • List of BES Cyber Assets within each BCS o A BCA may be included in more than one BCS • List of Protected Cyber Assets (associated assets) • ESP network topology including subnets • Cyber Asset IP addresses 45 CIP-005-5 R1 Part 1.2 46 Changes 47 CIP-005-5 R1.2 [Electronic AP] High Impact BCS PCA R1.1 Internal Routable Connectivity ? Medium Impact BCS PCA YES Requires ESP The ability to access a BES Cyber System from a Cyber Asset that is outside of its associated Electronic Security Perimeter via a bidirectional routable protocol connection. External Routable Connectivity ? YES R1.2 Requires Electronic Access Point 48 A Cyber Asset interface on an Electronic Security Perimeter that allows routable communication between Cyber Assets outside an Electronic Security Perimeter and Cyber Assets inside an Electronic Security Perimeter. Change Rationale (Part 1.2) • Changed to refer to the defined term Electronic Access Point (EAP versus ESP access point) and BES Cyber System • Where external routable connectivity and the ESP logical border are defined by the implementation of Electronic Access Points (EAPs) 49 Electronic Access Point ‘identified’ • • • • • Firewalls Modems VPN concentrators Dual-homed systems Protocol converters (communications controllers, FEP, etc.) • Etc. 50 Unidirectional Gateways 51 External Routable Connectivity • External Routable Connectivity’ includes the term ‘bi-directional’ o ‘bi-directional routable protocol connection’ • Systems behind a data diode do not have External Routable Connectivity 52 Serially Connected Cyber Assets • Are serially connected Cyber Assets within scope for Requirements applicable to BES Cyber Systems with External Routable Connectivity? o All BES Cyber Assets are in scope of all the CIP Version 5 standards o Type of connectivity limits applicability 53 Protocol Conversion • Non-intelligent Device – thing of the past o Serial IP conversion o One to one relationship – one serial port & 1 IP port o Non-intelligent – no advanced conversion capabilities • Intelligent Device o Serial IP conversion o Multiple serial ports supported with individual port management o Advanced conversion and connectivity capabilities per serial port Reverse telnet per serial port Passthru capabilities – direct IP to specific serial device connected to a serial port on the device 54 Cisco TS [2511] – Reverse Telnet TCP Port associated with the specific serial device http://www.cisco.com/c/en/us/support/docs/dialaccess/asynchronous-connections/5466-commserver.html#design http://www.cisco.com/c/en/us/support/docs/dial55 access/asynchronous-connections/177199.html#reversetelnet DIGI TS http://ftp1.digi.com/support/documentation/90287 00c.pdf -- (page 113) 56 Protocol Conversion Issues • • • • • • 57 External Routable Connectivity (ERC) High Water Mark Impacts Electronic Security Perimeter (ESP) Electronic Access Point (EAP) V5 Standard & Guidance Connectivity versus accessibility Serial to Field Device 58 Serial to Field Device 59 Serial Communications [standalone ESPs] SCADA WAN Telecom Telecom IP BCA serial serial BCA IP serial BCA BCA Serial/Routable RTU Terminal Server Protocol convertor FEP Router/Switch 60 serial BCA BCA BCA BCA BCA Routable Communications [Discrete ESPs] SCADA WAN IP IP Telecom Telecom IP IP EAP EAP EAP serial BCA BCA serial BCA BCA serial 61 Serial/Routable RTU Terminal Server Protocol convertor FEP Router/Switch BCA BCA BCA BCA BCA Single BCS across PSP/ESP [Discrete ESPs] SCADA WAN IP IP Telecom Telecom IP IP EAP EAP EAP serial BCA BCA serial BCA BCA serial BCA 62 BCA BCA BCA BCA Multiple BCS example [Routable – Discrete ESPs] SCADA WAN IP IP Telecom Telecom IP EAP EAP Serial – IP convertor Serial – IP convertor serial BCA IP BCA BCA BCA PCA serial 63 serial BCA Serial – IP convertor Medium BCS IP EAP BCA BCA BCA BCA Medium BCS PCC Serial WAN Serial Subs PSP EMS Electronic Security Perimeter File Server Non-BCS Workstations PCA Printer PCA ESP PSP PCA Medium BCS RT BCA U BCA serial BCA BCA BCA PCA PCA CorpNet Switch Medium BCS EAP PCA RT BCA serial U Router BCA BCA BCA BCA BCA Printer Switch High BCS FEP CCA BCA/PCA PCA BCA BCA BCA Workstations BCA 64 BCA BCA EMS Servers PCC Routable with Serial & IP substations EMS Electronic Security Perimeter File Server Medium BCS Non-BCS Workstations PCA Printer PCA EAP IP BCABCA PCA IP IP IP PCA RT BCA U PCA CorpNet BCA BCA BCA Switch Medium BCS EAP EAP IP BCA/PCA Router IP BCA serial EAP Printer RT BCA U Switch High BCS CCA BCA/PCA PCA serial BCA BCA BCA BCA Low BCS Serial BCA BCABCA BCA Workstations BCA BCA EMS Servers RT BCA ESP 65 Serial BCA U PSP Serial BCA BCA BCA Field Devices - Complexity • Connection method (serial, Ethernet, etc.) • Connection protocol (non-routable, routable) • Serial convertors/ controllers – IP accessible requires EAP capabilities if IRA • End to end serial, no ESP or EAP required • Be aware of multiple connection types 66 SEL-421 Connectivity capabilities Ethernet (IP) 67 https://www.selinc.com/SEL-421/ IP Accessible CIP-006-5 ERC Impacts • • • • • • • • • • • 68 CIP-006-5 Part 1.2 – physical access controls Part 1.4 – Monitor for unauthorized PSP access Part 1.5 – Alarms and alerts on detection of unauthorized access to PSP Part 1.6 – PACS systems monitoring Part 1.7 – PACS alarms Part 1.8 – Logging of access for authorized unescorted access Part 1.9 – Retention of access logs for 90 days Part 2.1 – Visitor escort requirements Part 2.2 – Visitor logging required Part 2.3 – Visitor log retention Span Ports 69 https://supportforums.cisco.com/docs/DOC-32763 Span Ports • SPAN – typical for IDS sensor o local • RSPAN o Cannot cross any Layer 3 device • ERSPAN (Cisco proprietary) o Can monitor traffic across a WAN or different networks –L3 connectivity o Look for an identified EAP 70 R1.2 Audit Approach • V3 Electronic Access Points and routable connectivity concepts are valid – ESPs expanded to “isolated” ESPs • Electronic Access Point required for all ESPs with any external routable connectivity to or from BES cyber assets • External Routable Connectivity – o What about “IP Accessible” via routable protocol? o Routable protocol accessible? – serial IP conversion o The serial field devices are no longer under a serial exemption, therefore are included within BCS as a BCA. They are now included in CIP compliance Standards based on BES criteria (reliability operating services), regardless of their connectivity method o However, be aware of reverse telnet risks (IP Accessible) associated with protocol conversion devices – may require IRA and ERC requirements o Extended ESPs are still a valid ESP configuration 71 Measures (Part 1.2) • Network Diagrams • External routable communication paths • List of all Identified EAPs 72 CIP-005-5 R1 Part 1.3 73 CIP-005-5 R1.3 [Bi-Directional Controls] High Impact BCS PCA The logical border surrounding a network to which BES Cyber Systems are connected using a routable protocol. The ability to access a BES Cyber System from a Cyber Asset that is outside of its associated Electronic Security Perimeter via a bidirectional routable protocol connection. A Cyber Asset interface on an Electronic Security Perimeter that allows routable communication between Cyber Assets outside an Electronic Security Perimeter and Cyber Assets inside an Electronic Security Perimeter. 74 R1.1 Internal Routable Connectivity ? Medium Impact BCS PCA YES Requires ESP R1.2 External Routable Connectivity ? YES Requires Electronic Access Point R1.3 Requires Bi-directional controls One or more Cyber Assets connected using a routable protocol within or on an Electronic Security Perimeter that is not part of the highest impact BES Cyber System within the same Electronic Security Perimeter. The impact rating of Protected Cyber Assets is equal to the highest rated BES Cyber System in the same ESP. A Cyber Asset is not a Protected Cyber Asset if, for 30 consecutive calendar days or less, it is connected either to a Cyber Asset within the ESP or to the network within the ESP, and it is used for data transfer, vulnerability assessment, maintenance, or troubleshooting purposes. Change Rationale (Part 1.3) • Changed to refer to the defined term Electronic Access Point and to focus on the entity knowing and having a reason for what it allows through the EAP in both inbound and outbound directions 75 Audit Approach (Part 1.3) • Responsible Entity knows what other Cyber Assets or ranges of addresses a BES Cyber System needs to communicate with and limits the communications to that known range • Not required to document the inner workings of stateful firewalls, where connections initiated in one direction are allowed a return path 76 Access Permissions • “SDT notes the requirement does not require that all 65535 ports be documented as this is a ‘deny by default’ requirement and only the remaining open ports (those that ‘grant access’) should be documented.” Final_Petition_CIP_V5.pdf (Jan. 31, 2013, page 46) 77 Measures (Part 1.3) • Established baseline • Electronic Access Point(s) configuration(s) • Utilize ‘remark’ type command 78 ACL Remarks Object-group network BCS1 Network-object host 10.1.1.3 Network-object host 10.1.1.4 Object-group network BCS2 Network-object host 172.16.1.5 Network-object host 172.16.1.8 access-list 101 remark BCS1 hosts allowed to communicate with BCS2 hosts access−list 101 remark permit_SSH for EIA access−list 101 permit tcp host 10.1.1.2 host 172.16.1.10 eq 22 access-list 201 remark ‘deny by default CIP-005-5 R1.3 access-list 101 deny ip any any log access=-list 201 remark BCS2 hosts allowed to communicate with BCS1 access-list 201 remark permit_iccp access-list 201 permit tcp host 10.1.1.3 host 172.16.1.5 eq 102 access-list 201 remark ‘deny by default CIP-005-5 R1.3 access-list 201 deny ip any any log Access-group 101 in interface ethernet 0/0 79 Audit Approach (Part 1.3) • Requirement does not require that all 65535 ports be documented as this is a ‘deny by default’ requirement • Only the remaining open ports (those that ‘grant access’) should be documented per R1.3 • Does not limit the Responsible Entity from controlling outbound traffic at the level of granularity that it deems appropriate and large ranges of internal addresses may be allowed 80 Identifying Ports and Services for EAP/EACM • Is an EAP an EACM in version 5? o To remove any cross referencing, these Cyber Assets are now included in the Applicability column for each cyber security requirement 81 Categorization Criteria • Electronic Access Control or Monitoring Systems (“EACMS”) o Examples include: Electronic Access Points, Intermediate Devices, authentication servers (e.g., RADIUS servers, Active Directory servers, Certificate Authorities), security event monitoring systems, and intrusion detection systems 82 CIP-005-5 R1 Part 1.4 83 Changes 84 Change Rationale (Part 1.4) • Added clarification that dial-up connectivity should perform authentication so that the BES Cyber System is not directly accessible with a phone number only 85 ‘Dial-up Connectivity’ • A data communication link that is established when the communication equipment dials a phone number and negotiates a connection with the equipment on the other end of the link • CIP-005-5 is silent on differentiating Dial-in vs. Dial-out direction • Dial-up is generally and historically recognized as a two way communication service once established • Requirement R2 (Interactive Remote Access) builds upon Requirement R1.4 when the session meets the definition of Interactive Remote Access 86 R1.4 Audit Approach • Requires authentication for all dial-up accessible cyber assets • Authentication – does not require multifactor authentication as in IRA • Capability does not mean – “because we do not want to” or “it makes access difficult”, “our techs wont use it”, etc…. 87 CIP-005-5 R1.4 Applicability • Applies to any access including machine to machine • CIP-005 R1.4 concerns the security of the ‘network’ level and requires that there be some form of authentication before a ‘network’ connection is established to the BES Cyber System o R2 only applies to ‘Interactive Remote Access’ which is user-based • EAP-like functionality on dialups o Once a connection is made, then CIP-007 applies as we’ve moved from the ‘network’ level security to device level security and any user access has to be authenticated at the device 88 Measures (Part 1.4) • “…a documented process…” • Auditors conducting performance audits • “…how the Responsible Entity is providing authenticated access through each dial‐up connection.” 89 CIP-005-5 R1 Part 1.5 90 Changes 91 CIP-005-5 R1.5 [Malicious Communication Detection] High Impact BCS Medium Impact BCS PCA PCA Control Centers Electronic Access Point Exists? Yes R1.5 Requires Bi-directional monitoring for malicious activity 92 Change Rationale • Per FERC Order No. 706, Paragraphs 496503, ESPs need two distinct security measures such that the Cyber Assets do not lose all perimeter protection if one measure fails or is misconfigured. The Order makes clear this is not simple redundancy of firewalls, thus the SDT has decided to add the security measure of malicious traffic inspection as a requirement for these ESPs. 93 Audit Approach (Part 1.5) • Is audit approach to detect 100% of all malicious communications? o “Known or suspected” o Communications that have attributes of known or suspected malicious communications 94 IDS placement Routable Protocols Medium BES Cyber System EAP ESP High BES Cyber System High BES Cyber System EAP ESP Medium BES Cyber System IDS Low BES Cyber System ESP 95 Audit Approach (Part 1.5) • Direction of the traffic monitored o both inbound and outbound traffic subject to the detection • Placement of malicious communications inspection o specific architecture and placement is not prescribed • Number of IDS’s o Applicability is set at the EAP level o EAPs at Medium Impact BCS Control Centers needs to be covered by the entity’s method for detecting malicious communications • CIP-007-5 Part 4 addresses logging (4.1) and alerting (4.2) for this malicious communications detection device (EACMS) 96 EAP Malicious Code Prevention • No TFE language in CIP-007-5 R3 for EACMS • Requirement has been written at a much higher level than previous versions • Guidance has numerous suggested methods up to and including policy level measures • Requirement no longer prescriptively requires a single technology tool for addressing the issue 97 Unified Threat Management (UTM) • Does the IDS measure have its own configuration, firmware, module? • Can the IDS measure operate independent of a failure or misconfiguration of the Electronic Access Point? 98 Audit Approach (Part 1.5) • Isolated networks applicability? o Isolated networks do not have EAPs o R1.5 would not be applicable? o IDS is an EACM … therefore Detection is only one half of the issue Addressing or mitigating the detected threat per CIP-007-5 R4 99 EACMs and PACS • EACMs and PACS can still be located outside an ESP • PACS o No distinction between “field devices” and “central servers” o Protections primarily through the CIP-007 requirements for authorization, access control, and logging and monitoring for these systems 100 Measures (Part 1.5) • • • • 101 Dual protection architecture IDS configuration Layer 7 firewall configuration Monitoring evidence R1 Issues & Pitfalls • EAP and Intrusion Detection System (IDS) o Need both technologies not just access control • Inbound and outbound access controls o Requires detailed understanding of all traffic • Bi-directional monitoring • Multiple ESPs with different impact levels at one facility o Intercommunications and High Water Mark • Extended ESPs may still be a valid ESP architecture – Technical conference to provide communications devices security controls may affect the Extended ESP architecture – stay tuned 102 R2 Interactive Remote Access 103 v5 Interactive Remote Access • v5 – CIP-005-5 R2 Summary Requires Intermediate system [proxy/jump host] Requires encryption to intermediate system Requires multi-factor authentication at intermediate system Strong Procedures are not included as option for interactive remote access 104 CIP-005-5 R2.1 105 Changes 106 CIP-005-5 R2.1 [Intermediate System] High Impact BCS PCA User-initiated access by a person employing a remote access client or other remote access technology using a routable protocol. Remote access originates from a Cyber Asset that is not an Intermediate System and not located within any of the Responsible Entity’s Electronic Security Perimeter(s) or at a defined Electronic Access Point (EAP). Remote access may be initiated from: 1) Cyber Assets used or owned by the Responsible Entity, 2) Cyber Assets used or owned by employees, and 3) Cyber Assets used or owned by vendors, contractors, or consultants. Interactive remote access does not include system-to-system process communications. Interactive Remote Access ? A Cyber Asset or collection of Cyber Assets performing access control to restrict Interactive Remote Access to only authorized users. The Intermediate System must not be located inside the Electronic Security Perimeter. 107 Yes R2.1 Requires Intermediate System for Interactive Remote Access Yes Medium Impact BCS External Routable Connectivity ? PCA R2.1 Audit Approach • All Interactive Remote Access requires an intermediate system that “proxies” all traffic into the ESP o No direct external access from client to internal BES cyber asset o Source IP address is the IP address of the intermediate system – no pass through • System-to system process communications not IRA o Can this communications be accessed for interactive remote access? • System Interactive communication– capabilities are key, not limited to functional use alone • Interactive Remote Access includes any cyber asset that is not within the ESP o (i.e Corp net, DMZs, Substation, Internet, etc.) and includes bidirectional traffic to/from a lower security zone (non-ESP) • ESP ESP interactive access does not require R2 108 CIP-005-5 R2.2 109 CIP-005-5 R2.2 [Encrypted communications] High Impact BCS Medium Impact BCS PCA Interactive Remote Access ? Yes R2.1 Requires Intermediate System for Interactive Remote Access R2.2 Requires encryption that terminates at Intermediate System 110 Yes External Routable Connectivity ? PCA R2.2 Audit Approach • Interactive Remote Access requires encryption from remote client all the way to the intermediate system • Intermediate system provides decryption of the encrypted traffic • ESP remote access only allowed into the ESP from the intermediate system o source IP address of the intermediate system • Restrictive access controls defined for all traffic from the intermediate system into the ESP • All Intermediate system communications into the ESP must traverse an EAP prior to entry into ESP 111 CIP-005-5 R2.3 112 CIP-005-5 R2.3 [Multi-factor Authentication] High Impact BCS Medium Impact BCS PCA Interactive Remote Access ? Yes External Routable Connectivity ? PCA Yes R2.1 Requires Intermediate System for Interactive Remote Access R2.2 Requires encryption that terminates at Intermediate System R2.3 Requires multi-factor authentication 113 Multi-Factor Authentication -- examples • Something the individual knows such as passwords or PINs. • Something the individual has such as tokens, digital certificates, or smart cards; • Something the individual is such as fingerprints, iris scans, or other biometric characteristics. R2.3 Audit Approach • Multi-factor authentication is required for all Interactive Remote Access • Multi-factor authentication requires at least two of the following: o Something you have (tokens) o Something you know (passwords) o Something you are (biometrics) • Multi-factor authentication is required at the intermediate system –this is in addition to external corporate VPN access authentication 114 v3 Remote Access [Discreet ESP] Support Corp DMZ Internet Encrypted Corp VPN concentrator 2 Factor Technical solution Requires 2-factor authentication for ESP access from both networks ESP EAP Vendor All internal corp access into the ESP is the same as the “Logical VPN User” EMS WAN Logical VPN User CorpNet EAP ESP EMS Console 1-4 Corporate User Prod Net EAP Mgmt DMZ ProdAD 2 Factor 115 MgmtAD Jump Host EMS Not required, but best practice HMI1 ICCP 1- 2 v5 Remote Access [Discreet ESP] Support Requires 2-factor authentication for ESP access Corp DMZ Internet Encrypted Corp VPN concentrator 2 Factor EAP Vendor All internal corp access into the ESP is the same as the “Logical VPN User” Medium ESP Logical VPN User CorpNet EAP EMS WAN ESP EMS Console 1-4 Corporate User Prod Net EAP High Mgmt DMZ PCA ProdAD 2 Factor 116 MgmtAD Jump Host REQUIRED EMS HMI1 ICCP 1- 2 R2 Issues & Pitfalls • v5 potential issues: o Adding an “intermediate system” into current remote access architectures o Proxy architecture – how will this affect access data flows and performance o Encryption to the intermediate system o Multi-factor authentication at the intermediate system o High water mark security 117 What Do We Do Now? • Additional ESP identification – routable connectivity of High and Medium impact Cyber Systems – with no external routable communications • Inbound and outbound access controls o Requires detailed understanding of all traffic • EAP and IDS – requires both technologies • Bi-directional monitoring • Adding an “intermediate system” into current remote access architectures • Planning for proxy architecture – how will this affect access • Encryption to the intermediate system • Multi-factor authentication at the intermediate system 118 CIP-005-5 Roadshow Presentation Revision History 119 CIP-005-5 Change History Date By V1 Initial Presentation developed for SLC V5 Roadshow 2/4/14 M Neshem, M King V2 Presentation modified for Marina Del Ray Roadshow. Added drawings, VM slides added, UTM slides added and modified slide content 3/18/14 M Neshem, M King V3 SMUD Outreach presentation modified to clarify questions received from previous presentation. Serial relay communications clarification and additional detailed slides. SAR additional slide 5/5/14 M Neshem, M King V4 Updated content and presentation flow for SLC Roadshow based upon previous lessons learned. Removed redundant slides, modified content as needed. Change order of serial relay topic. Added Revision table. Updated slides 43 and 44 for clarification 5/14/14 M Neshem, M King Questions? Michael (Mick) Neshem CISA, CISSP, CSSA Senior Compliance Auditor - Cyber Security Western Electricity Coordinating Council (WECC) 7400 NE 41st Street, Suite 320 Vancouver, WA 98662 Mneshem@wecc.biz (C) 425.891.4671 (O) 801.734.8187