SLIDE 11 University of Illinois • Dartmouth College • Cornell University • Washington State University
Trustworthy Cyber Infrastructure for the Power Grid
Presentations
10 7 University of Illinois • Dartmouth College • Cornell University • Washington State University
Security Assessment
Analyze critical cyberinfrastructure and workflow descriptions with respect to practices, policies, and threats
Sample Workflow
Step 1: Aggregate Information from field sensors (authenticity, confidentiality) Step 2: Send sensor information to CC (confidential, integrity) Step 3: Receive control information from CC (authenticity, integrity)
Power Grid Workflow Power Grid CIM description of assets
Trust Analysis
Derived Predicates Security Concerns
Approach : – Use standardized schema (CIM) to describe asset and workflow security attributes
- Convert to prolog terms and predicates
– Transform high level concerns into prolog predicates, for examples:
- NERC CIP 005 best practices
- Threat Model
– Build model of deployed system in prolog – Use prolog engine to discover deviations of implementation from best practices
10 8 University of Illinois • Dartmouth College • Cornell University • Washington State University
Security Assessment
Build tool chain for automated security assessment and vulnerability analysis of the power grid cyberinfrastructure Sample Workflow
Step 1: Aggregate Information from field sensors (authenticity, confidentiality) Step 2: Send sensor information to CC (confidential, integrity) Step 3: Receive control information from CC (authenticity, integrity)
Power Grid Workflow Power Grid CIM description of assets
Trust Analysis
Derived Predicates Security Concerns
Results (using executable first-order logic) : – Annotated common cyberinfrastructure components with additional security properties – Derived security model from
- CIM description of the major components in Intelligrid
architecture
- Workflow descriptions of tasks and attacks
– Derived security requirements from
- Case studies of threats on existing cyberinfrastructure
- CIP 005 recommendations
– Analysis of whether given cyberinfrastructure installation supports given workflow security needs. – Automated security assessment of vulnerabilities in example and experimental cyber installation models based on CIP and case study security requirements