Project QC-2014-02 Public consultation on CIP Version 5 Standards
Information session
January 15, 2015
Direction – Contrôle des mouvements d'énergie
Standards Information session January 15, 2015 Direction Contrle - - PowerPoint PPT Presentation
Project QC-2014-02 Public consultation on CIP Version 5 Standards Information session January 15, 2015 Direction Contrle des mouvements d'nergie Webinar Outline (instructions) Please mute your telephone during the entire webinar.
Direction – Contrôle des mouvements d'énergie
2
3
4
5
6
7
8 Direction – Contrôle des mouvements d'énergie
Health Food Finance Water IT and Telecom Safety Energy and utilities Manufacturing Government Transport
9
9
Hydro-Québec
> Activists > Criminals or organized crime > Disgruntled employees > Radicalized individuals > Lone wolves > Terrorist organizations > Countries, states and companies > Greed or profit > Vengeance, anger or rage > Coercion (blackmail) > Pride > Ideology or patriotism > Social engineering > Malware, pirating, botnets > Pressure tactics > Break-in > Weapons, explosives, tools, vehicles > Civil disobedience > Confidential information > Intellectual property > Goods or revenue > Strategic assets > Reputation > Power system > Personal safety > Network or ICT systems
Technological security risks Physical security risks
Exposure
11 Hydro-Québec
12
– NIST – ISO27002 – Evolution of previous versions (CIP v1 to v3)
13
14
– Interactive Remote Access – BES Cyber Asset – Protected Cyber Assets (PCA) – CIP Senior Manager – Control Center – CIP Exceptional Circumstance – External Routable Connectivity – Dial-up Connectivity – Reportable Cyber Security Incident – BES Cyber System Information
15
– Electronic Access Point – BES Cyber System – Intermediate System – Physical Access Control Systems (PACS) – Electronic Access Control or Monitoring Systems (EACMS)
* Reduced applicability for distributors
16
17
18
19
1: Canadian Nuclear Safety Commission
20
21
22
23
24
25
List of applicable assets and impact
Systems Substations and Generating Stations Control Centers
Assets identified in the Applicability section Assets considered E1 (i. to vi.) Assessment using impact level criteria (Appendix 1) Cyber Assets
Lists of BES Cyber Assets Access point
Digital relays
Servers
Assessment using the definition of BES Cyber Asset (negative impact on facility within 15 minutes) Aggregation of BES Cyber System assets BES Cyber System categorization (High, Medium or Low Impact)
CIP-003-5 Security Management Controls R1 Cyber security Policies (E, M) R2 Cyber security Policies (F) R3 Senior Manager CIP R4 Delegation of Powers
CIP-004-5.1 Personnel and Training R1 Security Awareness Program R2 Cyber Security Training Program R3 Personnel Risk Assessment Program R4 Access Management Program R5 Revocation of Access Program
CIP-006-5 Physical Security of BES Cyber Systems R1 Physical Security Plans R2 Visitor Control Program R3 Physical Access Control System Maintenance and Testing Program
CIP-007-5 Systems Security Management R1 Ports and services R2 Security Patch Management R3 Malicious Software Prevention R4 Security Event Monitoring R5 System Access Control
CIP-008-5 Incident Reporting and Response Planning R1 Cyber Security Incident Response Plan R2 Cyber Security Incident Response Plan Implementation and Testing R3 Cyber Security Incident Response Plan Review, Update and Communication
CIP-009-5 Recovery Plans for BES Cyber Systems R1 Recovery Plans R2 Recovery Plan Implementation and Testing R3 Recovery Plan Review, Update and Communication
CIP-010-1 Configuration Change Management and Vulnerability Assessments R1 Configuration Change Management R2 Configuration Monitoring R3 Vulnerability Assessments
35
Policies and leadership Awareness and training, criminal record check and access control Flow and interactive access controls and electronic security perimeter monitoring Physical perimeter Ports (logical and physical), malicious code, cyber asset monitoring and account management Security incidents Backup plan and tests* Changes and configuration, vulnerability management Information protection
Policies and leadership Awareness and training, criminal record check and access control Flow and interactive access controls and electronic security perimeter monitoring Physical perimeter Ports (logical and physical), malicious code, cyber asset monitoring and account management Security incidents Backup plan and tests Changes and configuration, vulnerability management Information protection
Policies Awareness and training Flow control Physical perimeter Account managmenet Security incidents
Entity Effective date in the United States Proposed effective date in Québec Reason Medium and High Impact Low Impact Medium and High Impact Low Impact Entities governed by Version 1 CIP Standards approved by the Régie 2016-04-01 2017-04-01 2016-04-01 2017-04-01 Standardize practices with the other jurisdictions Entities exempted from Version 1 CIP Standards under the specific provisions of those standards The first day
calendar quarter that is 24 months following the adoption of the standards by the Régie de l’énergie The first day
calendar quarter that is 24 months following the adoption of the standards by the Régie de l’énergie Provide the time needed to implement Version 5 CIP Standards to entities that were exempt under Version 1
36
CIP-002-5.1 to CIP-011-1 Low Moderate High Standard name X Maintaining the standard X Compliance monitoring X
37
Legend: Low: Normal industry practice that only requires minor adjustments to existing processes or practices. Moderate: Change that requires allocation of some physical, human or financial resources to implement, maintain or monitor compliance with the proposed standard. High: Change that requires allocation of significant physical, human or financial resources to plan, implement, maintain or monitor compliance with the proposed standard.
38
39
40