Cybersecurity for Energy Delivery Systems (CEDS) R&D
Following the Energy Sector’s Roadmap
Carol Hawk
CEDS R&D Program Manager
Energy Sectors Roadmap Carol Hawk CEDS R&D Program Manager - - PowerPoint PPT Presentation
Cybersecurity for Energy Delivery Systems (CEDS) R&D Following the Energy Sectors Roadmap Carol Hawk CEDS R&D Program Manager Roadmap Framework for Collaboration Energy Sectors synthesis of energy delivery systems
CEDS R&D Program Manager
systems security challenges, R&D needs, and implementation milestones
– align activities to sector needs – coordinate public and private programs – stimulate investments in energy delivery systems security
Roadmap Vision By 2020, resilient energy delivery systems are designed, installed, operated, and maintained to survive a cyber incident while sustaining critical functions. For more information go to: www.controlsystemsroadmap.net
2
critical functions
patching/upgrades
bandwidth) to support the addition of cybersecurity capabilities that are not tailored to the energy delivery system operational environment
accessible areas where they are subject to physical tampering
Energy Delivery Control Systems Business IT Systems
Different Priorities
3
Build a Culture of Security
Training Education Improved communication within industry
Assess and Monitor Risk
Electricity Subsector Cybersecurity Capability Maturity Model Situational Awareness Tools Common Vulnerability Analysis Threat Assessments Consequence Assessments
Develop and Implement New Protective Measures to Reduce Risk
Support Cybersecurity Standards Development Near-term Industry-led R&D projects Mid-term Laboratory Academia R&D projects Long-term Laboratory Academia R&D projects
Manage Incidents
NSTB (National SCADA Test Bed) Outreach Cyber Exercises
Sustain Security Improvements
Product upgrades to address evolving threats Collaboration among all stakeholders to identify needs and implement solutions
4
Laboratories
Security
Risk
Implement New Protective Measures
Improvements Near-term (0–3 yrs) 1.1 1.2 Executive engagement and support of cyber resilience efforts Industry-driven safe code development and software assurance awareness workforce training campaign launched 2.1 Common terms and measures specific to each energy subsector available for baselining security posture in
3.1 Capabilities to evaluate the robustness and survivability of new platforms, systems, networks, architectures, policies, and other system changes commercially available 4.1 4.2 Tools to identify cyber events across all levels
system networks commercially available Tools to support and implement cyber attack response decision making for the human
available 5.1 5.2 Cyber threats, vulnerability, mitigation strategies, and incidents timely shared among appropriate sector stakeholders Federal and state incentives available to accelerate investment in resilient energy delivery systems Mid-term (4-7 years) 1.3 1.4 1.5 Vendor systems and components using sophisticated secure coding and software assurance practices widely available Field-proven best practices for energy delivery systems security widely employed Compelling business case developed for investment in energy delivery systems security 2.2 Majority of asset owners baselining their security posture using energy subsector specific metrics 3.2 3.3 Scalable access control for all energy delivery system devices available Next-generation, interoperable, and upgradeable solutions for secure serial and routable communications between devices at all levels of energy delivery system networks implemented 4.3 4.4 4.5 Incident reporting guidelines accepted and implemented by each energy subsector Real-time forensics capabilities commercially available Cyber event detection tools that evolve with the dynamic threat landscape commercially available 5.3 5.4 Collaborative environments, mechanisms, and resources available for connecting security and operations researchers, vendors, and asset owners Federally funded partnerships and
cybersecurity become self-sustaining Long-term (8-10 years) 1.6 Significant increase in the number of workers skilled in energy delivery, information systems, and cybersecurity employed by industry 2.3 Tools for real-time security state monitoring and risk assessment of all energy delivery system architecture levels and across cyber- physical domains commercially available 3.4 3.5 3.6 Self-configuring energy delivery system network architectures widely available Capabilities that enable security solutions to continue operation during a cyber attack available as upgrades and built-in to new security solutions Next-generation, interoperable, and upgradeable solutions for secure wireless communications between devices at all levels of energy delivery system networks implemented 4.6 4.7 Lessons learned from cyber incidents shared and implemented throughout the energy sector Capabilities for automated response to cyber incidents, including best practices for implementing these capabilities available 5.5 5.6 Private sector investment surpasses Federal investment in developing cybersecurity solutions for energy delivery systems Mature, proactive processes to rapidly share threat, vulnerabilities, and mitigation strategies are implemented throughout the energy sector
5
6
Mobile Devices, Remote Access
Feeder Automation
Utility Central Operations Balancing Authority
Field Area Network (FAN) Energy Management System (EMS)
Other Utility’s Control Center
Home Area Network (HAN) Wide Area Network (WAN) Home Intelligence Substation Automation Transmission Automation Distribution Automation (DA)
Cloud Computing
Local Area Network (LAN) Local Area Network (LAN)
Cyber- Physical Interface
Generation Line Switch with Radio Transceiver Distribution Poles AMI Collector Solar (or Wind)
Smart Meter Electric Vehicles Smart Thermostat Communications Tower Fiber Optic
Project Lead Project Partnerships
Project: short description (summary)
Cyber summary:
Priority aspect(s) of the project
Benefits to the energy sector, asset owner
Addresses Roadmap Milestones: (milestone numbers from slide 5)
Smart Substations (Transmission & Distribution House
Project Title
Energy Sector Security Appliances in a System for Intelligent, Learning Network Configuration Management and Monitoring
Partners
7
Cigital
Cooperative Research Network
NRECA cooperatives
Stronger, easier to manage operational and back
resources to securely define, configure, manage and monitor utility operational networks
systems to virtualization and cloud managed services
secure operational network management to reduce effort and risk associated with manual processes
Easier, more reliable development and enforcement of utility’s security policy
expected traffic flow to better inform human operators
threats evolve
utility’s security policy
Real-time cybersecurity that is aware of power grid operations
detect and prevent malicious operational network traffic using utility protocols (e.g., Multispeak, DNP3)
invoke graceful degradation tailored to the role
decreased
Addresses Roadmap Milestones:2.3, 3.3, 3.4, 3.5 , 4.1, 4.2, 4.5
Mobile Devices, Remote Access
Feeder Automation
Utility Central Operations
Field Area Network (FAN) Energy Management System (EMS)
Other Utility’s Control Center
Home Area Network (HAN) Wide Area Network (WAN) Home Intelligence Substation Automation Transmission Automation Distribution Automation (DA)
Cloud Computing
Local Area Network (LAN) Local Area Network (LAN) Generation Line Switch with Radio Transceiver Distribution Poles AMI Collector Solar (or Wind)
Smart Meter Electric Vehicles Smart Thermostat Communications Tower Fiber Optic Smart Substations (Transmission & Distribution House Cyber- Physical Interface
Balancing Authority
Laboratories
Security
Risk
Implement New Protective Measures
Improvements Near-term (0–3 yrs) 1.1 1.2 Executive engagement and support of cyber resilience efforts Industry-driven safe code development and software assurance awareness workforce training campaign launched 2.1 Common terms and measures specific to each energy subsector available for baselining security posture in
3.1 Capabilities to evaluate the robustness and survivability of new platforms, systems, networks, architectures, policies, and other system changes commercially available 4.1 4.2 Tools to identify cyber events across all levels
system networks commercially available Tools to support and implement cyber attack response decision making for the human
available 5.1 5.2 Cyber threats, vulnerability, mitigation strategies, and incidents timely shared among appropriate sector stakeholders Federal and state incentives available to accelerate investment in resilient energy delivery systems Mid-term (4-7 years) 1.3 1.4 1.5 Vendor systems and components using sophisticated secure coding and software assurance practices widely available Field-proven best practices for energy delivery systems security widely employed Compelling business case developed for investment in energy delivery systems security 2.2 Majority of asset owners baselining their security posture using energy subsector specific metrics 3.2 3.3 Scalable access control for all energy delivery system devices available Next-generation, interoperable, and upgradeable solutions for secure serial and routable communications between devices at all levels of energy delivery system networks implemented 4.3 4.4 4.5 Incident reporting guidelines accepted and implemented by each energy subsector Real-time forensics capabilities commercially available Cyber event detection tools that evolve with the dynamic threat landscape commercially available 5.3 5.4 Collaborative environments, mechanisms, and resources available for connecting security and operations researchers, vendors, and asset owners Federally funded partnerships and
cybersecurity become self-sustaining Long-term (8-10 years) 1.6 Significant increase in the number of workers skilled in energy delivery, information systems, and cybersecurity employed by industry 2.3 Tools for real-time security state monitoring and risk assessment of all energy delivery system architecture levels and across cyber- physical domains commercially available 3.4 3.5 3.6 Self-configuring energy delivery system network architectures widely available Capabilities that enable security solutions to continue operation during a cyber attack available as upgrades and built-in to new security solutions Next-generation, interoperable, and upgradeable solutions for secure wireless communications between devices at all levels of energy delivery system networks implemented 4.6 4.7 Lessons learned from cyber incidents shared and implemented throughout the energy sector Capabilities for automated response to cyber incidents, including best practices for implementing these capabilities available 5.5 5.6 Private sector investment surpasses Federal investment in developing cybersecurity solutions for energy delivery systems Mature, proactive processes to rapidly share threat, vulnerabilities, and mitigation strategies are implemented throughout the energy sector
8
Roadmap Milestone 2.3 Tools for real-time security state monitoring and risk assessment
architecture levels and across cyber-physical domains commercially available
Alliance Projects Partners
Unified central control of both cyber and physical access to energy sector buildings and cyber assets
existing Lemnos and Padlock cybersecurity system and unifies trust management, logging and administrative activities for both physical and cyber security
access for immediate change control and ease of administration
Ethernet Gateway (SEL-3620) and Padlock (SEL-3622)
Tailored trust: protect cyber-physical systems with physical-cybersecurity
cybersecurity
physical security
access control – down to rack level
Addresses Roadmap Milestones: 3.2
Single, unified cyber-physical trust management
facilitates compliance and incident response
trail of who's where, when and what they are doing becomes clear with no additional administrative overhead
control administration
same as cyber access, like your RSA token
9
Mobile Devices, Remote Access
Feeder Automation
Utility Central Operations
Field Area Network (FAN) Energy Management System (EMS)
Other Utility’s Control Center
Home Area Network (HAN) Wide Area Network (WAN) Home Intelligence Substation Automation Transmission Automation Distribution Automation (DA)
Cloud Computing
Local Area Network (LAN) Local Area Network (LAN)
Cyber- Physical Interface
Generation Line Switch with Radio Transceiver Distribution Poles AMI Collector Solar (or Wind)
Smart Meter Electric Vehicles Smart Thermostat Communications Tower Fiber Optic Smart Substations (Transmission & Distribution House
Balancing Authority
Laboratories
Security
Risk
Implement New Protective Measures
Improvements Near-term (0–3 yrs) 1.1 1.2 Executive engagement and support of cyber resilience efforts Industry-driven safe code development and software assurance awareness workforce training campaign launched 2.1 Common terms and measures specific to each energy subsector available for baselining security posture in
3.1 Capabilities to evaluate the robustness and survivability of new platforms, systems, networks, architectures, policies, and other system changes commercially available 4.1 4.2 Tools to identify cyber events across all levels
system networks commercially available Tools to support and implement cyber attack response decision making for the human
available 5.1 5.2 Cyber threats, vulnerability, mitigation strategies, and incidents timely shared among appropriate sector stakeholders Federal and state incentives available to accelerate investment in resilient energy delivery systems Mid-term (4-7 years) 1.3 1.4 1.5 Vendor systems and components using sophisticated secure coding and software assurance practices widely available Field-proven best practices for energy delivery systems security widely employed Compelling business case developed for investment in energy delivery systems security 2.2 Majority of asset owners baselining their security posture using energy subsector specific metrics 3.2 3.3 Scalable access control for all energy delivery system devices available Next-generation, interoperable, and upgradeable solutions for secure serial and routable communications between devices at all levels of energy delivery system networks implemented 4.3 4.4 4.5 Incident reporting guidelines accepted and implemented by each energy subsector Real-time forensics capabilities commercially available Cyber event detection tools that evolve with the dynamic threat landscape commercially available 5.3 5.4 Collaborative environments, mechanisms, and resources available for connecting security and operations researchers, vendors, and asset owners Federally funded partnerships and
cybersecurity become self-sustaining Long-term (8-10 years) 1.6 Significant increase in the number of workers skilled in energy delivery, information systems, and cybersecurity employed by industry 2.3 Tools for real-time security state monitoring and risk assessment of all energy delivery system architecture levels and across cyber- physical domains commercially available 3.4 3.5 3.6 Self-configuring energy delivery system network architectures widely available Capabilities that enable security solutions to continue operation during a cyber attack available as upgrades and built-in to new security solutions Next-generation, interoperable, and upgradeable solutions for secure wireless communications between devices at all levels of energy delivery system networks implemented 4.6 4.7 Lessons learned from cyber incidents shared and implemented throughout the energy sector Capabilities for automated response to cyber incidents, including best practices for implementing these capabilities available 5.5 5.6 Private sector investment surpasses Federal investment in developing cybersecurity solutions for energy delivery systems Mature, proactive processes to rapidly share threat, vulnerabilities, and mitigation strategies are implemented throughout the energy sector
10
Roadmap Milestone 3.2 Scalable access control for all energy delivery system devices available
Addresses Roadmap Milestones: 3.2, 3.3
Secure Policy-Based Configuration Framework (PBCONF) Partners
Reduce risk of cyber attacks that exploit incorrect or inconsistent energy delivery device security
energy delivery devices
consistency, scalability and resiliency
remote access method, API for vendor’s to use to describe device-specific configuration
protect intellectual property
Utility-wide uniform single view and secure remote configuration of energy delivery devices, modern or legacy, of any vendor
consistent implementation of security policy and saves resources by reducing the need to visit and independently configure individual devices
security configuration to utility’s security policy
Easier, more reliable implementation of utility’s remote access security policy
reports deviations from and enables consistent implementation of remote access security policy
configuration changes
11
Mobile Devices, Remote Access
Feeder Automation
Utility Central Operations
Field Area Network (FAN) Energy Management System (EMS)
Other Utility’s Control Center
Home Area Network (HAN) Wide Area Network (WAN) Home Intelligence Substation Automation Transmission Automation Distribution Automation (DA)
Cloud Computing
Local Area Network (LAN) Local Area Network (LAN)
Cyber- Physical Interface
Generation Line Switch with Radio Transceiver Distribution Poles AMI Collector Solar (or Wind)
Smart Meter Electric Vehicles Smart Thermostat Communications Tower Fiber Optic Smart Substations (Transmission & Distribution House
Balancing Authority
Laboratories
Security
Risk
Implement New Protective Measures
Improvements Near-term (0–3 yrs) 1.1 1.2 Executive engagement and support of cyber resilience efforts Industry-driven safe code development and software assurance awareness workforce training campaign launched 2.1 Common terms and measures specific to each energy subsector available for baselining security posture in
3.1 Capabilities to evaluate the robustness and survivability of new platforms, systems, networks, architectures, policies, and other system changes commercially available 4.1 4.2 Tools to identify cyber events across all levels
system networks commercially available Tools to support and implement cyber attack response decision making for the human
available 5.1 5.2 Cyber threats, vulnerability, mitigation strategies, and incidents timely shared among appropriate sector stakeholders Federal and state incentives available to accelerate investment in resilient energy delivery systems Mid-term (4-7 years) 1.3 1.4 1.5 Vendor systems and components using sophisticated secure coding and software assurance practices widely available Field-proven best practices for energy delivery systems security widely employed Compelling business case developed for investment in energy delivery systems security 2.2 Majority of asset owners baselining their security posture using energy subsector specific metrics 3.2 3.3 Scalable access control for all energy delivery system devices available Next-generation, interoperable, and upgradeable solutions for secure serial and routable communications between devices at all levels of energy delivery system networks implemented 4.3 4.4 4.5 Incident reporting guidelines accepted and implemented by each energy subsector Real-time forensics capabilities commercially available Cyber event detection tools that evolve with the dynamic threat landscape commercially available 5.3 5.4 Collaborative environments, mechanisms, and resources available for connecting security and operations researchers, vendors, and asset owners Federally funded partnerships and
cybersecurity become self-sustaining Long-term (8-10 years) 1.6 Significant increase in the number of workers skilled in energy delivery, information systems, and cybersecurity employed by industry 2.3 Tools for real-time security state monitoring and risk assessment of all energy delivery system architecture levels and across cyber- physical domains commercially available 3.4 3.5 3.6 Self-configuring energy delivery system network architectures widely available Capabilities that enable security solutions to continue operation during a cyber attack available as upgrades and built-in to new security solutions Next-generation, interoperable, and upgradeable solutions for secure wireless communications between devices at all levels of energy delivery system networks implemented 4.6 4.7 Lessons learned from cyber incidents shared and implemented throughout the energy sector Capabilities for automated response to cyber incidents, including best practices for implementing these capabilities available 5.5 5.6 Private sector investment surpasses Federal investment in developing cybersecurity solutions for energy delivery systems Mature, proactive processes to rapidly share threat, vulnerabilities, and mitigation strategies are implemented throughout the energy sector
12
Roadmap Milestone 3.3 Next-generation, interoperable, and upgradeable solutions for secure serial and routable communications between devices at all levels of energy delivery system networks implemented
The SDN Project Software Defined Network Partners
Addresses Roadmap Milestones: 2.3, 3.3, 3.4, 3.5 , 4.1, 4.2, 4.5
More secure, reliable operational network traffic shaping – automatic, pre-defined rerouting around network disruption
sector to maintain a more secure, reliable network
protocol
central control for fast and predefined incident response actions
disruptions, developed from threat analysis use cases
wide near real-time visualization and diagnostics
Simplify utility network configuration
Easier, more reliable enforcement of utility’s security policy
configuration to operational, security, and compliance policies
to centrally administer and respond to events
View, manage and securely configure geographically dispersed substation networks as a single entity
diagnostics
13
Mobile Devices, Remote Access
Feeder Automation
Utility Central Operations
Field Area Network (FAN) Energy Management System (EMS)
Other Utility’s Control Center
Home Area Network (HAN) Wide Area Network (WAN) Home Intelligence Substation Automation Transmission Automation Distribution Automation (DA)
Cloud Computing
Local Area Network (LAN) Local Area Network (LAN)
Cyber- Physical Interface
Generation Line Switch with Radio Transceiver Distribution Poles AMI Collector Solar (or Wind)
Smart Meter Electric Vehicles Smart Thermostat Communications Tower Fiber Optic Smart Substations (Transmission & Distribution House
Balancing Authority
Laboratories
Security
Risk
Implement New Protective Measures
Improvements Near-term (0–3 yrs) 1.1 1.2 Executive engagement and support of cyber resilience efforts Industry-driven safe code development and software assurance awareness workforce training campaign launched 2.1 Common terms and measures specific to each energy subsector available for baselining security posture in
3.1 Capabilities to evaluate the robustness and survivability of new platforms, systems, networks, architectures, policies, and other system changes commercially available 4.1 4.2 Tools to identify cyber events across all levels
system networks commercially available Tools to support and implement cyber attack response decision making for the human
available 5.1 5.2 Cyber threats, vulnerability, mitigation strategies, and incidents timely shared among appropriate sector stakeholders Federal and state incentives available to accelerate investment in resilient energy delivery systems Mid-term (4-7 years) 1.3 1.4 1.5 Vendor systems and components using sophisticated secure coding and software assurance practices widely available Field-proven best practices for energy delivery systems security widely employed Compelling business case developed for investment in energy delivery systems security 2.2 Majority of asset owners baselining their security posture using energy subsector specific metrics 3.2 3.3 Scalable access control for all energy delivery system devices available Next-generation, interoperable, and upgradeable solutions for secure serial and routable communications between devices at all levels of energy delivery system networks implemented 4.3 4.4 4.5 Incident reporting guidelines accepted and implemented by each energy subsector Real-time forensics capabilities commercially available Cyber event detection tools that evolve with the dynamic threat landscape commercially available 5.3 5.4 Collaborative environments, mechanisms, and resources available for connecting security and operations researchers, vendors, and asset owners Federally funded partnerships and
cybersecurity become self-sustaining Long-term (8-10 years) 1.6 Significant increase in the number of workers skilled in energy delivery, information systems, and cybersecurity employed by industry 2.3 Tools for real-time security state monitoring and risk assessment of all energy delivery system architecture levels and across cyber- physical domains commercially available 3.4 3.5 3.6 Self-configuring energy delivery system network architectures widely available Capabilities that enable security solutions to continue operation during a cyber attack available as upgrades and built-in to new security solutions Next-generation, interoperable, and upgradeable solutions for secure wireless communications between devices at all levels of energy delivery system networks implemented 4.6 4.7 Lessons learned from cyber incidents shared and implemented throughout the energy sector Capabilities for automated response to cyber incidents, including best practices for implementing these capabilities available 5.5 5.6 Private sector investment surpasses Federal investment in developing cybersecurity solutions for energy delivery systems Mature, proactive processes to rapidly share threat, vulnerabilities, and mitigation strategies are implemented throughout the energy sector
14
Roadmap Milestone 3.4 Self-configuring energy delivery system network architectures widely available
Collaborative Defense of Transmission and Distribution Protection and Control Devices Against Cyber Attacks
Partners
Don’t allow cyber activity that could jeopardize grid operations
substations, reach collaborative consensus to verify that a received input makes sense in the current operational state of the power grid
collaborative defense, encourage vendor-neutral adoption and offer in firmware of ABB protection and control devices
Real-time cybersecurity that is aware of power grid operations
with expected syntax, protocol and device function, that if acted on could jeopardize power grid operations
malicious commands or configuration set points by anticipating their effect on power grid operations
compromised device
Power grid devices work together to validate commands
protection and control relays to collaboratively validate that inputs, configuration changes or power system data, make sense for reliable grid
completes collaborative validation as fast as the response time of the protection device so as to not impede protection and control function
Addresses Roadmap Milestones: 2.3, 3.5, 4.1, 4.2, 4.5, 4.7
15
Mobile Devices, Remote Access
Feeder Automation
Utility Central Operations
Field Area Network (FAN) Energy Management System (EMS)
Other Utility’s Control Center
Home Area Network (HAN) Wide Area Network (WAN) Home Intelligence Substation Automation Transmission Automation Distribution Automation (DA)
Cloud Computing
Local Area Network (LAN) Local Area Network (LAN)
Cyber- Physical Interface
Generation Line Switch with Radio Transceiver Distribution Poles AMI Collector Solar (or Wind)
Smart Meter Electric Vehicles Smart Thermostat Communications Tower Fiber Optic Smart Substations (Transmission & Distribution House
Balancing Authority
Laboratories
Security
Risk
Implement New Protective Measures
Improvements Near-term (0–3 yrs) 1.1 1.2 Executive engagement and support of cyber resilience efforts Industry-driven safe code development and software assurance awareness workforce training campaign launched 2.1 Common terms and measures specific to each energy subsector available for baselining security posture in
3.1 Capabilities to evaluate the robustness and survivability of new platforms, systems, networks, architectures, policies, and other system changes commercially available 4.1 4.2 Tools to identify cyber events across all levels
system networks commercially available Tools to support and implement cyber attack response decision making for the human
available 5.1 5.2 Cyber threats, vulnerability, mitigation strategies, and incidents timely shared among appropriate sector stakeholders Federal and state incentives available to accelerate investment in resilient energy delivery systems Mid-term (4-7 years) 1.3 1.4 1.5 Vendor systems and components using sophisticated secure coding and software assurance practices widely available Field-proven best practices for energy delivery systems security widely employed Compelling business case developed for investment in energy delivery systems security 2.2 Majority of asset owners baselining their security posture using energy subsector specific metrics 3.2 3.3 Scalable access control for all energy delivery system devices available Next-generation, interoperable, and upgradeable solutions for secure serial and routable communications between devices at all levels of energy delivery system networks implemented 4.3 4.4 4.5 Incident reporting guidelines accepted and implemented by each energy subsector Real-time forensics capabilities commercially available Cyber event detection tools that evolve with the dynamic threat landscape commercially available 5.3 5.4 Collaborative environments, mechanisms, and resources available for connecting security and operations researchers, vendors, and asset owners Federally funded partnerships and
cybersecurity become self-sustaining Long-term (8-10 years) 1.6 Significant increase in the number of workers skilled in energy delivery, information systems, and cybersecurity employed by industry 2.3 Tools for real-time security state monitoring and risk assessment of all energy delivery system architecture levels and across cyber- physical domains commercially available 3.4 3.5 3.6 Self-configuring energy delivery system network architectures widely available Capabilities that enable security solutions to continue operation during a cyber attack available as upgrades and built-in to new security solutions Next-generation, interoperable, and upgradeable solutions for secure wireless communications between devices at all levels of energy delivery system networks implemented 4.6 4.7 Lessons learned from cyber incidents shared and implemented throughout the energy sector Capabilities for automated response to cyber incidents, including best practices for implementing these capabilities available 5.5 5.6 Private sector investment surpasses Federal investment in developing cybersecurity solutions for energy delivery systems Mature, proactive processes to rapidly share threat, vulnerabilities, and mitigation strategies are implemented throughout the energy sector
16
Roadmap Milestone 3.5 Capabilities that enable security solutions to continue operation during a cyber attack available as upgrades and built-in to new security solutions
Addresses Roadmap Milestones: 2.3, 3.2, 3.6, 4.1
Secure SW Defined Radio Partners
More secure “last mile” communications to remote sites
remote substations lacking wired communications
providing configurable bandwidth, data, rate and radio bands
Enhanced cybersecurity
Faster more reliable Distribution Automation
infrastructure
17
Mobile Devices, Remote Access
Feeder Automation
Utility Central Operations
Field Area Network (FAN) Energy Management System (EMS)
Other Utility’s Control Center
Home Area Network (HAN) Wide Area Network (WAN) Home Intelligence Substation Automation Transmission Automation Distribution Automation (DA)
Cloud Computing
Local Area Network (LAN) Local Area Network (LAN) Generation Line Switch with Radio Transceiver Distribution Poles AMI Collector Solar (or Wind)
Smart Meter Electric Vehicles Smart Thermostat Communications Tower Fiber Optic Smart Substations (Transmission & Distribution House Cyber- Physical Interface
Balancing Authority
Laboratories
Security
Risk
Implement New Protective Measures
Improvements Near-term (0–3 yrs) 1.1 1.2 Executive engagement and support of cyber resilience efforts Industry-driven safe code development and software assurance awareness workforce training campaign launched 2.1 Common terms and measures specific to each energy subsector available for baselining security posture in
3.1 Capabilities to evaluate the robustness and survivability of new platforms, systems, networks, architectures, policies, and other system changes commercially available 4.1 4.2 Tools to identify cyber events across all levels
system networks commercially available Tools to support and implement cyber attack response decision making for the human
available 5.1 5.2 Cyber threats, vulnerability, mitigation strategies, and incidents timely shared among appropriate sector stakeholders Federal and state incentives available to accelerate investment in resilient energy delivery systems Mid-term (4-7 years) 1.3 1.4 1.5 Vendor systems and components using sophisticated secure coding and software assurance practices widely available Field-proven best practices for energy delivery systems security widely employed Compelling business case developed for investment in energy delivery systems security 2.2 Majority of asset owners baselining their security posture using energy subsector specific metrics 3.2 3.3 Scalable access control for all energy delivery system devices available Next-generation, interoperable, and upgradeable solutions for secure serial and routable communications between devices at all levels of energy delivery system networks implemented 4.3 4.4 4.5 Incident reporting guidelines accepted and implemented by each energy subsector Real-time forensics capabilities commercially available Cyber event detection tools that evolve with the dynamic threat landscape commercially available 5.3 5.4 Collaborative environments, mechanisms, and resources available for connecting security and operations researchers, vendors, and asset owners Federally funded partnerships and
cybersecurity become self-sustaining Long-term (8-10 years) 1.6 Significant increase in the number of workers skilled in energy delivery, information systems, and cybersecurity employed by industry 2.3 Tools for real-time security state monitoring and risk assessment of all energy delivery system architecture levels and across cyber- physical domains commercially available 3.4 3.5 3.6 Self-configuring energy delivery system network architectures widely available Capabilities that enable security solutions to continue operation during a cyber attack available as upgrades and built-in to new security solutions Next-generation, interoperable, and upgradeable solutions for secure wireless communications between devices at all levels of energy delivery system networks implemented 4.6 4.7 Lessons learned from cyber incidents shared and implemented throughout the energy sector Capabilities for automated response to cyber incidents, including best practices for implementing these capabilities available 5.5 5.6 Private sector investment surpasses Federal investment in developing cybersecurity solutions for energy delivery systems Mature, proactive processes to rapidly share threat, vulnerabilities, and mitigation strategies are implemented throughout the energy sector
18
Roadmap Milestone 3.6 Next-generation, interoperable, and upgradeable solutions for secure wireless communications between devices at all levels of energy delivery system networks implemented
ARMORE: Applied Resiliency for More Trustworthy Grid Operations
Partners
More secure, faster ways to use substation data from both legacy and modern devices
brought as close to data-source devices as possible
reporting security violations with legacy and modern data sources
transparency for added layered security protections
communication and computation architecture, within and between substations, with enhanced security
More secure legacy communications
placed near legacy devices decreases the reach of insecure legacy protocols
requirements for both legacy and modern communications
Faster, more secure PMU “big data” analysis for wide-area grid visibility
high-rate data (e.g., PMU) security and streamlines “big data” analysis
associated with transfer of PMU data from remote to central analysis location
monitoring protection and control (WAMPAC)
Addresses Roadmap Milestones: 2.3, 3.2, 3.3, 4.1, 4.2, 4.5
19
Mobile Devices, Remote Access
Feeder Automation
Utility Central Operations
Field Area Network (FAN) Energy Management System (EMS)
Other Utility’s Control Center
Home Area Network (HAN) Wide Area Network (WAN) Home Intelligence Substation Automation Transmission Automation Distribution Automation (DA)
Cloud Computing
Local Area Network (LAN) Local Area Network (LAN)
Cyber- Physical Interface
Generation Line Switch with Radio Transceiver Distribution Poles AMI Collector Solar (or Wind)
Smart Meter Electric Vehicles Smart Thermostat Communications Tower Fiber Optic Smart Substations (Transmission & Distribution House
Balancing Authority
Laboratories
Security
Risk
Implement New Protective Measures
Improvements Near-term (0–3 yrs) 1.1 1.2 Executive engagement and support of cyber resilience efforts Industry-driven safe code development and software assurance awareness workforce training campaign launched 2.1 Common terms and measures specific to each energy subsector available for baselining security posture in
3.1 Capabilities to evaluate the robustness and survivability of new platforms, systems, networks, architectures, policies, and other system changes commercially available 4.1 4.2 Tools to identify cyber events across all levels
system networks commercially available Tools to support and implement cyber attack response decision making for the human
available 5.1 5.2 Cyber threats, vulnerability, mitigation strategies, and incidents timely shared among appropriate sector stakeholders Federal and state incentives available to accelerate investment in resilient energy delivery systems Mid-term (4-7 years) 1.3 1.4 1.5 Vendor systems and components using sophisticated secure coding and software assurance practices widely available Field-proven best practices for energy delivery systems security widely employed Compelling business case developed for investment in energy delivery systems security 2.2 Majority of asset owners baselining their security posture using energy subsector specific metrics 3.2 3.3 Scalable access control for all energy delivery system devices available Next-generation, interoperable, and upgradeable solutions for secure serial and routable communications between devices at all levels of energy delivery system networks implemented 4.3 4.4 4.5 Incident reporting guidelines accepted and implemented by each energy subsector Real-time forensics capabilities commercially available Cyber event detection tools that evolve with the dynamic threat landscape commercially available 5.3 5.4 Collaborative environments, mechanisms, and resources available for connecting security and operations researchers, vendors, and asset owners Federally funded partnerships and
cybersecurity become self-sustaining Long-term (8-10 years) 1.6 Significant increase in the number of workers skilled in energy delivery, information systems, and cybersecurity employed by industry 2.3 Tools for real-time security state monitoring and risk assessment of all energy delivery system architecture levels and across cyber- physical domains commercially available 3.4 3.5 3.6 Self-configuring energy delivery system network architectures widely available Capabilities that enable security solutions to continue operation during a cyber attack available as upgrades and built-in to new security solutions Next-generation, interoperable, and upgradeable solutions for secure wireless communications between devices at all levels of energy delivery system networks implemented 4.6 4.7 Lessons learned from cyber incidents shared and implemented throughout the energy sector Capabilities for automated response to cyber incidents, including best practices for implementing these capabilities available 5.5 5.6 Private sector investment surpasses Federal investment in developing cybersecurity solutions for energy delivery systems Mature, proactive processes to rapidly share threat, vulnerabilities, and mitigation strategies are implemented throughout the energy sector
20
Roadmap Milestone 4.1 Tools to identify cyber events across all levels of energy delivery system networks commercially available
Cyber-Intrusion Auto- Response Policy and Management System (CAPMS) Partners
Detect, evaluate, and respond to a cyber intrusion without disrupting power grid
security service protects utility network access and detects intrusion using a hybrid centralized and distributed architecture
cybersecurity posture
based trustworthiness of themselves and their peers, informing the global view
automate a utility’s policy-based response to cyber intrusion
Cybersecurity that is aware of power grid
predefined response to intrusion that conforms with utility’s security policy
energy delivery control system are implemented in response to cyber intrusion
to research the potential use of device cybersecurity posture as a safety input to
Addresses Roadmap Milestones: 2.3, 3.5, 4.1, 4.2, 4.5, 4.7
Utility can extend protections to energy delivery control devices of any vendor, legacy
vendor
standards-based interoperability
natural disasters)
21
Mobile Devices, Remote Access
Feeder Automation
Utility Central Operations
Field Area Network (FAN) Energy Management System (EMS)
Other Utility’s Control Center
Home Area Network (HAN) Wide Area Network (WAN) Home Intelligence Substation Automation Transmission Automation Distribution Automation (DA)
Cloud Computing
Local Area Network (LAN) Local Area Network (LAN) Generation Line Switch with Radio Transceiver Distribution Poles AMI Collector Solar (or Wind)
Smart Meter Electric Vehicles Smart Thermostat Communications Tower Fiber Optic Smart Substations (Transmission & Distribution House Cyber- Physical Interface
Balancing Authority
Laboratories
Security
Risk
Implement New Protective Measures
Improvements Near-term (0–3 yrs) 1.1 1.2 Executive engagement and support of cyber resilience efforts Industry-driven safe code development and software assurance awareness workforce training campaign launched 2.1 Common terms and measures specific to each energy subsector available for baselining security posture in
3.1 Capabilities to evaluate the robustness and survivability of new platforms, systems, networks, architectures, policies, and other system changes commercially available 4.1 4.2 Tools to identify cyber events across all levels
system networks commercially available Tools to support and implement cyber attack response decision making for the human
available 5.1 5.2 Cyber threats, vulnerability, mitigation strategies, and incidents timely shared among appropriate sector stakeholders Federal and state incentives available to accelerate investment in resilient energy delivery systems Mid-term (4-7 years) 1.3 1.4 1.5 Vendor systems and components using sophisticated secure coding and software assurance practices widely available Field-proven best practices for energy delivery systems security widely employed Compelling business case developed for investment in energy delivery systems security 2.2 Majority of asset owners baselining their security posture using energy subsector specific metrics 3.2 3.3 Scalable access control for all energy delivery system devices available Next-generation, interoperable, and upgradeable solutions for secure serial and routable communications between devices at all levels of energy delivery system networks implemented 4.3 4.4 4.5 Incident reporting guidelines accepted and implemented by each energy subsector Real-time forensics capabilities commercially available Cyber event detection tools that evolve with the dynamic threat landscape commercially available 5.3 5.4 Collaborative environments, mechanisms, and resources available for connecting security and operations researchers, vendors, and asset owners Federally funded partnerships and
cybersecurity become self-sustaining Long-term (8-10 years) 1.6 Significant increase in the number of workers skilled in energy delivery, information systems, and cybersecurity employed by industry 2.3 Tools for real-time security state monitoring and risk assessment of all energy delivery system architecture levels and across cyber- physical domains commercially available 3.4 3.5 3.6 Self-configuring energy delivery system network architectures widely available Capabilities that enable security solutions to continue operation during a cyber attack available as upgrades and built-in to new security solutions Next-generation, interoperable, and upgradeable solutions for secure wireless communications between devices at all levels of energy delivery system networks implemented 4.6 4.7 Lessons learned from cyber incidents shared and implemented throughout the energy sector Capabilities for automated response to cyber incidents, including best practices for implementing these capabilities available 5.5 5.6 Private sector investment surpasses Federal investment in developing cybersecurity solutions for energy delivery systems Mature, proactive processes to rapidly share threat, vulnerabilities, and mitigation strategies are implemented throughout the energy sector
22
Roadmap Milestone 4.2 Tools to support and implement cyber attack response decision making for the human operator commercially available
Cybersecurity Intrusion Detection and Monitoring for Field Area Networks Partners
23
Smart Meter and Distribution Automation wireless communications security
metering infrastructure and Distribution Automation wireless mesh networks
the-air security controls, mitigates supply chain cyber threats
the ACS SecureSmart managed security service for energy utilities
Visualize and analyze Smart Meter and Distribution Automation wireless communications
mesh network
Meter and Distribution Automation wireless mesh network traffic
to detect departure from expected behavior
performance
Real-time Smart Meter and Distribution Automation anomaly and intrusion detection
anomalies and malicious activity in Smart Meter and Distribution Automation wireless communications
behavior from traffic analysis
firmware and software manifest in traffic analysis to detect exploitation attempts
Addresses Roadmap Milestones: 2.3, 3.6, 4.1, 4.2, 4.4, 4.5
Mobile Devices, Remote Access
Feeder Automation
Utility Central Operations
Field Area Network (FAN) Energy Management System (EMS)
Other Utility’s Control Center
Home Area Network (HAN) Wide Area Network (WAN) Home Intelligence Substation Automation Transmission Automation Distribution Automation (DA)
Cloud Computing
Local Area Network (LAN) Local Area Network (LAN) Generation Line Switch with Radio Transceiver Distribution Poles AMI Collector Solar (or Wind)
Smart Meter Electric Vehicles Smart Thermostat Communications Tower Fiber Optic Smart Substations (Transmission & Distribution House Cyber- Physical Interface
Balancing Authority
Laboratories
Security
Risk
Implement New Protective Measures
Improvements Near-term (0–3 yrs) 1.1 1.2 Executive engagement and support of cyber resilience efforts Industry-driven safe code development and software assurance awareness workforce training campaign launched 2.1 Common terms and measures specific to each energy subsector available for baselining security posture in
3.1 Capabilities to evaluate the robustness and survivability of new platforms, systems, networks, architectures, policies, and other system changes commercially available 4.1 4.2 Tools to identify cyber events across all levels
system networks commercially available Tools to support and implement cyber attack response decision making for the human
available 5.1 5.2 Cyber threats, vulnerability, mitigation strategies, and incidents timely shared among appropriate sector stakeholders Federal and state incentives available to accelerate investment in resilient energy delivery systems Mid-term (4-7 years) 1.3 1.4 1.5 Vendor systems and components using sophisticated secure coding and software assurance practices widely available Field-proven best practices for energy delivery systems security widely employed Compelling business case developed for investment in energy delivery systems security 2.2 Majority of asset owners baselining their security posture using energy subsector specific metrics 3.2 3.3 Scalable access control for all energy delivery system devices available Next-generation, interoperable, and upgradeable solutions for secure serial and routable communications between devices at all levels of energy delivery system networks implemented 4.3 4.4 4.5 Incident reporting guidelines accepted and implemented by each energy subsector Real-time forensics capabilities commercially available Cyber event detection tools that evolve with the dynamic threat landscape commercially available 5.3 5.4 Collaborative environments, mechanisms, and resources available for connecting security and operations researchers, vendors, and asset owners Federally funded partnerships and
cybersecurity become self-sustaining Long-term (8-10 years) 1.6 Significant increase in the number of workers skilled in energy delivery, information systems, and cybersecurity employed by industry 2.3 Tools for real-time security state monitoring and risk assessment of all energy delivery system architecture levels and across cyber- physical domains commercially available 3.4 3.5 3.6 Self-configuring energy delivery system network architectures widely available Capabilities that enable security solutions to continue operation during a cyber attack available as upgrades and built-in to new security solutions Next-generation, interoperable, and upgradeable solutions for secure wireless communications between devices at all levels of energy delivery system networks implemented 4.6 4.7 Lessons learned from cyber incidents shared and implemented throughout the energy sector Capabilities for automated response to cyber incidents, including best practices for implementing these capabilities available 5.5 5.6 Private sector investment surpasses Federal investment in developing cybersecurity solutions for energy delivery systems Mature, proactive processes to rapidly share threat, vulnerabilities, and mitigation strategies are implemented throughout the energy sector
24
Roadmap Milestone 4.4 Real-time forensics capabilities commercially available
Cyber-Physical Modeling and Simulation for Situational Awareness (CYMSA)
Partners
Predict in real-time how a cyber attack might disrupt energy delivery, and dynamically protect
grid operations and cyber control systems
distributed state estimation
level and global central control system-level
substation and central control system levels to evaluate cyber control messages in a dynamic security context
Real-time cybersecurity awareness for power grid operations
dynamically evolves with power grid operations
power system components outside of dynamically varying allowed ranges
using allowed cyber activity, but in the wrong
Cyber-physical contingency analysis
intrusion detection, control command validation, and control command assessment in terms of the cyber control layer and power grid operations
impede energy delivery control functions
Addresses Roadmap Milestones: 2.3, 3.4, 3.5, 4.1, 4.2, 4.5
25
Mobile Devices, Remote Access
Feeder Automation
Utility Central Operations
Field Area Network (FAN) Energy Management System (EMS)
Other Utility’s Control Center
Home Area Network (HAN) Wide Area Network (WAN) Home Intelligence Substation Automation Transmission Automation Distribution Automation (DA)
Cloud Computing
Local Area Network (LAN) Local Area Network (LAN)
Cyber- Physical Interface
Generation Line Switch with Radio Transceiver Distribution Poles AMI Collector Solar (or Wind)
Smart Meter Electric Vehicles Smart Thermostat Communications Tower Fiber Optic Smart Substations (Transmission & Distribution House
Balancing Authority
Laboratories
Security
Risk
Implement New Protective Measures
Improvements Near-term (0–3 yrs) 1.1 1.2 Executive engagement and support of cyber resilience efforts Industry-driven safe code development and software assurance awareness workforce training campaign launched 2.1 Common terms and measures specific to each energy subsector available for baselining security posture in
3.1 Capabilities to evaluate the robustness and survivability of new platforms, systems, networks, architectures, policies, and other system changes commercially available 4.1 4.2 Tools to identify cyber events across all levels
system networks commercially available Tools to support and implement cyber attack response decision making for the human
available 5.1 5.2 Cyber threats, vulnerability, mitigation strategies, and incidents timely shared among appropriate sector stakeholders Federal and state incentives available to accelerate investment in resilient energy delivery systems Mid-term (4-7 years) 1.3 1.4 1.5 Vendor systems and components using sophisticated secure coding and software assurance practices widely available Field-proven best practices for energy delivery systems security widely employed Compelling business case developed for investment in energy delivery systems security 2.2 Majority of asset owners baselining their security posture using energy subsector specific metrics 3.2 3.3 Scalable access control for all energy delivery system devices available Next-generation, interoperable, and upgradeable solutions for secure serial and routable communications between devices at all levels of energy delivery system networks implemented 4.3 4.4 4.5 Incident reporting guidelines accepted and implemented by each energy subsector Real-time forensics capabilities commercially available Cyber event detection tools that evolve with the dynamic threat landscape commercially available 5.3 5.4 Collaborative environments, mechanisms, and resources available for connecting security and operations researchers, vendors, and asset owners Federally funded partnerships and
cybersecurity become self-sustaining Long-term (8-10 years) 1.6 Significant increase in the number of workers skilled in energy delivery, information systems, and cybersecurity employed by industry 2.3 Tools for real-time security state monitoring and risk assessment of all energy delivery system architecture levels and across cyber- physical domains commercially available 3.4 3.5 3.6 Self-configuring energy delivery system network architectures widely available Capabilities that enable security solutions to continue operation during a cyber attack available as upgrades and built-in to new security solutions Next-generation, interoperable, and upgradeable solutions for secure wireless communications between devices at all levels of energy delivery system networks implemented 4.6 4.7 Lessons learned from cyber incidents shared and implemented throughout the energy sector Capabilities for automated response to cyber incidents, including best practices for implementing these capabilities available 5.5 5.6 Private sector investment surpasses Federal investment in developing cybersecurity solutions for energy delivery systems Mature, proactive processes to rapidly share threat, vulnerabilities, and mitigation strategies are implemented throughout the energy sector
26
Roadmap Milestone 4.5 Cyber event detection tools that evolve with the dynamic threat landscape commercially available
Patch and Update Management Program for Energy Delivery Systems Partners
Reduce the risk that a known vulnerability could be exploited on an energy delivery control system
Patch and update managed service for the energy sector so the utility can more easily:
Reduce the risk that the patch or update itself could cause system down-time
validation program, could perform patch and update performance validation using test facilities of asset
Addresses Roadmap Milestones: 1.3, 3.1, 5.1, 5.3
27
Mobile Devices, Remote Access
Feeder Automation
Utility Central Operations
Field Area Network (FAN) Energy Management System (EMS)
Other Utility’s Control Center
Home Area Network (HAN) Wide Area Network (WAN) Substation Automation Transmission Automation Distribution Automation (DA) Home Intelligence
Cloud Computing
Local Area Network (LAN) Local Area Network (LAN)
Cyber- Physical Interface
Generation Line Switch with Radio Transceiver Distribution Poles AMI Collector Solar (or Wind)
Smart Meter Electric Vehicles Smart Thermostat Communications Tower Fiber Optic Smart Substations (Transmission & Distribution House
Balancing Authority
Laboratories
Security
Risk
Implement New Protective Measures
Improvements Near-term (0–3 yrs) 1.1 1.2 Executive engagement and support of cyber resilience efforts Industry-driven safe code development and software assurance awareness workforce training campaign launched 2.1 Common terms and measures specific to each energy subsector available for baselining security posture in
3.1 Capabilities to evaluate the robustness and survivability of new platforms, systems, networks, architectures, policies, and other system changes commercially available 4.1 4.2 Tools to identify cyber events across all levels
system networks commercially available Tools to support and implement cyber attack response decision making for the human
available 5.1 5.2 Cyber threats, vulnerability, mitigation strategies, and incidents timely shared among appropriate sector stakeholders Federal and state incentives available to accelerate investment in resilient energy delivery systems Mid-term (4-7 years) 1.3 1.4 1.5 Vendor systems and components using sophisticated secure coding and software assurance practices widely available Field-proven best practices for energy delivery systems security widely employed Compelling business case developed for investment in energy delivery systems security 2.2 Majority of asset owners baselining their security posture using energy subsector specific metrics 3.2 3.3 Scalable access control for all energy delivery system devices available Next-generation, interoperable, and upgradeable solutions for secure serial and routable communications between devices at all levels of energy delivery system networks implemented 4.3 4.4 4.5 Incident reporting guidelines accepted and implemented by each energy subsector Real-time forensics capabilities commercially available Cyber event detection tools that evolve with the dynamic threat landscape commercially available 5.3 5.4 Collaborative environments, mechanisms, and resources available for connecting security and operations researchers, vendors, and asset owners Federally funded partnerships and
cybersecurity become self-sustaining Long-term (8-10 years) 1.6 Significant increase in the number of workers skilled in energy delivery, information systems, and cybersecurity employed by industry 2.3 Tools for real-time security state monitoring and risk assessment of all energy delivery system architecture levels and across cyber- physical domains commercially available 3.4 3.5 3.6 Self-configuring energy delivery system network architectures widely available Capabilities that enable security solutions to continue operation during a cyber attack available as upgrades and built-in to new security solutions Next-generation, interoperable, and upgradeable solutions for secure wireless communications between devices at all levels of energy delivery system networks implemented 4.6 4.7 Lessons learned from cyber incidents shared and implemented throughout the energy sector Capabilities for automated response to cyber incidents, including best practices for implementing these capabilities available 5.5 5.6 Private sector investment surpasses Federal investment in developing cybersecurity solutions for energy delivery systems Mature, proactive processes to rapidly share threat, vulnerabilities, and mitigation strategies are implemented throughout the energy sector
28
Roadmap Milestone 5.3 Collaborative environments, mechanisms, and resources available for connecting security and operations researchers, vendors, and asset owners
29
Mobile Devices, Remote Access
Feeder Automation
Utility Central Operations Balancing Authority
Field Area Network (FAN) Energy Management System (EMS)
Other Utility’s Control Center
Home Area Network (HAN) Wide Area Network (WAN) Home Intelligence Substation Automation Transmission Automation Distribution Automation (DA)
Cloud Computing
Local Area Network (LAN) Local Area Network (LAN)
Cyber- Physical Interface
Generation Line Switch with Radio Transceiver Distribution Poles AMI Collector Solar (or Wind)
Smart Meter Electric Vehicles Smart Thermostat Communications Tower Fiber Optic
Roadmap Vision
By 2020, resilient energy delivery systems are designed, installed, operated and maintained to survive a cyber incident while sustaining critical functions
CEDS 2013 R&D Addresses Roadmap Milestones: 1.3, 2.3, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6 ,4.1, 4.2, 4.4, 4.5, 4.7, 5.1, 5.3
Smart Substations (Transmission & Distribution House
Carol Hawk Carol.Hawk@hq.doe.gov 202-586-3247 Diane Hooie Diane.Hooie@netl.doe.gov 304-285-4524 David Howard David.Howard@hq.doe.gov 202-586-6460 Visit: http://energy.gov/oe/technology-development/control-systems-security www.controlsystemsroadmap.net
30