CIP Violation Data Trends 2012-2015 Deandra Williams-Lewis - - PowerPoint PPT Presentation
CIP Violation Data Trends 2012-2015 Deandra Williams-Lewis - - PowerPoint PPT Presentation
CIP Violation Data Trends 2012-2015 Deandra Williams-Lewis Violation Volume Decreasing CIP Violations by Deemed Date 2015 53 2014 92 2013 91 2012 153 2011 165 2010 259 0 50 100 150 200 250 300 2010: Mandatory Compliance
Forward Together • ReliabilityFirst
Violation Volume Decreasing
- 2010: Mandatory Compliance for all CIP Standards Begins; RF commences
full scope audits; Entities at beginning stages of CIP implementation
- 2015: Maturation of CIP programs; Increased use of automated tools;
increased outreach
259 165 153 91 92 53 50 100 150 200 250 300 2010 2011 2012 2013 2014 2015
CIP Violations by Deemed Date
Forward Together • ReliabilityFirst
Majority of Violations are Self-Reported
Larger Entities Drive Volume of Self-Reports Two audit outliers in 2014 responsible for 92 of 117 audit violations,
- therwise steady downward trend
Forward Together • ReliabilityFirst
Volume Driven by High-Frequency Conduct
Requirements concerning “high-frequency conduct” drive volume
CIP-004, R4 (access: lists for cyber access and physical access; revoking privileges) CIP-006, R1 (physical security of critical cyber assets: physical access logging) CIP-007, R5 (account management: passwords and access lists)
These violations tend to be self-reported and pose a lesser risk
- However, can be indicative of systemic issues
Forward Together • ReliabilityFirst
Decrease between Deemed and Reporting Dates
- Average 317 decrease in days (trending downward)
5
Detection and Reporting Duration Impovement *Includes noncompliance start date, time to identify, assess,
correct, and then report
Forward Together • ReliabilityFirst
Improved Risk Posture
Year-over-year decrease in severity
- 75% of CIP violations are Minimal to Moderate risk
- 9% of CIP violations are serious risk
- implementation issues
- culture and programmatic issues
Forward Together • ReliabilityFirst
Volume Driven by Larger Entities
Larger entities have experienced initial implementation challenges
- More assets, business units, and people = more challenges
- 100% of serious risk issues concern larger entities
- 93.3% of audit findings concern larger entities
- 79.8% of all violations driven by large entities
- CIP Themes Report: identified and shared common themes
7
Forward Together • ReliabilityFirst
Observations
- Possible Drivers of Positive Trending
- Maturation (both RF and Entities)
- Active Monitoring and Enforcement
- Trending, Analytics, and Sharing
‒ Assist Visits and Outreach ‒ CIP Themes Report ‒ Case Study Outreach
- Remain Vigilant – Moving Target
- Dynamic Regulatory Approach
‒ Focus on continuous improvement ‒ Violations not always indicative of security state
- Volume can indicate strong detective controls or weak
preventative/corrective controls
- Paper compliance does not equal security
8
Common CIP Themes
Patrick O’Connor
Forward Together • ReliabilityFirst
Purpose of CIP Themes Report
10
- IDENTIFY
- Common themes underlying systemic CIP violations.
- Possible resolutions
‒ Not directive because “one size does not fit all”
- Based on RF’s observations through years of compliance monitoring
and enforcement activities ‒ Collaborated with entities that dealt with higher risk CIP Violations ‒ In coordination with NERC
- COMMUNICATE
- Raise awareness and prevent recurrence
‒ Report available on RF’s website
Forward Together • ReliabilityFirst
The Identified CIP Themes
11
Forward Together • ReliabilityFirst
Scenario #1
- Entity implemented tools to monitor its account usage.
- Entity did not configure these properly, causing voluminous logs that could not
be meaningfully digested.
- Entity implemented tool to automatically generate revocation
notices.
- Responsible employee did not review notifications and thus did not perform
necessary revocations.
12
Forward Together • ReliabilityFirst
Scenario #2
13
- Entity utilized a vendor’s asset management system.
- Protecting Critical Cyber Asset Information was not considered nor
mentioned in the vendor contract.
- Entity contracted with vendor to provide security patch
management.
- Vendor did not provide entity with timely assessments of patch releases.
Forward Together • ReliabilityFirst
Scenario # 3
- Entity used its mirrored-back-up
data center constituted as its disaster recovery data center.
- Entity did not understand that
corruption of the main data center would promptly result in a corrupted back-up data center.
14
- Entity permitted compromised
assets to communicate freely with command and control server.
- Entity did not understand firewall
commands (“permit any any” on
- utbound traffic).
Forward Together • ReliabilityFirst
Questions & Answers
Forward Together ReliabilityFirst
15