RELI ABI LI TY | RESI LI ENCE | SECURI TY
Welcome!
NERC 2019 Compliance and Standards Workshop Embassy Suites by Hilton Minneapolis July 23, 2019
Welcome! NERC 2019 Compliance and Standards Workshop Embassy Suites - - PowerPoint PPT Presentation
Welcome! NERC 2019 Compliance and Standards Workshop Embassy Suites by Hilton Minneapolis July 23, 201 9 RELI ABI LI TY | RESI LI ENCE | SECURI TY NERC Antitrust Compliance Guidelines It is NERCs policy and practice to obey the antitrust
RELI ABI LI TY | RESI LI ENCE | SECURI TY
NERC 2019 Compliance and Standards Workshop Embassy Suites by Hilton Minneapolis July 23, 2019
RELI ABI LI TY | RESI LI ENCE | SECURI TY 2
It is NERC’s policy and practice to obey the antitrust laws and to avoid all conduct that unreasonably restrains competition. This policy requires the avoidance of any conduct that violates, or that might appear to violate, the antitrust laws. Among other things, the antitrust laws forbid any agreement between or among competitors regarding prices, availability of service, product design, terms of sale, division of markets, allocation of customers, or any other activity that unreasonably restrains competition. NERC Antitrust Compliance Guidelines
RELI ABI LI TY | RESI LI ENCE | SECURI TY 3
Participants are reminded that this meeting is public. Notice of the meeting was posted on the NERC website and widely
audience may include members of the press and representatives of various governmental authorities. Public Announcement
RELI ABI LI TY | RESI LI ENCE | SECURI TY 4
General Announcements
RELI ABI LI TY | RESI LI ENCE | SECURI TY 5
Toolkit
Today’s Agenda
RELI ABI LI TY | RESI LI ENCE | SECURI TY 6
Today’s Agenda
RELI ABI LI TY | RESI LI ENCE | SECURI TY 7
RELI ABI LI TY | RESI LI ENCE | SECURI TY
Sara Patrick, President and CEO, MRO 2019 Compliance and Standards Workshop July 23, 2019
NERC Compliance and Standards Workshop
July 23, 2019
Whyte Ridge retention pond, Winnipeg, Manitoba Source: Winnipeg Free Press
White Bear Lake, Minnesota
RELI ABI LI TY | RESI LI ENCE | SECURI TY
Mark Lauby, NERC, Senior Vice President and Chief Reliability Officer 2019 Compliance and Standards Workshop July 23, 2019
RELI ABI LI TY | RESI LI ENCE | SECURI TY 2
Bulk Power System Reliability and Security Bulk Power System Resilience* Bulk Electric System Reliability
Resilience is a Characteristic of a Reliable System
*Solely the Bulk
Power System. Does not include local distribution systems.
NERC Reliability Assurance
NERC Reliability Assessments and Performance Analysis
Operator Training E-ISAC
RELI ABI LI TY | RESI LI ENCE | SECURI TY 3
Resilience I ndicators
R(t)
Tdisruption
RALR-Nadir
Trebound
R100%
Reliable
Trecovered
Disruptive Event
Reliability RTarget
Degradation Recovery Recovery State
Improved Deteriorated
Robustness
t
If Detectable, Pre-Position
Amplitude
Stable
RELI ABI LI TY | RESI LI ENCE | SECURI TY 4
Ensuring ALR
R(t)
Tdisruption
RALR-Nadir
Trebound
R100%
Reliable Disruptive Event
Reliable Operation
Avoid & control
(e.g. serve critical load)
Reliability RTarget Recovered Steady- State
If Detectable, Pre-Position
Trecovered
t
RELI ABI LI TY | RESI LI ENCE | SECURI TY 5
Declaration & Problem
The Electric Reliability Organization (ERO) Enterprise requires a consistent framework to address and prioritize known and emerging reliability risks
initiatives to identify known and emerging risks and their mitigation
for example: webinars and conferences, lessons learned, Alerts, Guidelines, and standard development.
and ERO Enterprise experts
strategies, to monitoring the success of these mitigations
RELI ABI LI TY | RESI LI ENCE | SECURI TY 6
Six-Step Framework
RELI ABI LI TY | RESI LI ENCE | SECURI TY 7
Six-Step Framework
RELI ABI LI TY | RESI LI ENCE | SECURI TY 8
Six-Step Framework
RELI ABI LI TY | RESI LI ENCE | SECURI TY 9
Six-Step Framework
RELI ABI LI TY | RESI LI ENCE | SECURI TY 10
Six-Step Framework
RELI ABI LI TY | RESI LI ENCE | SECURI TY 11
Six-Step Framework
RELI ABI LI TY | RESI LI ENCE | SECURI TY 12
Six-Step Framework
RELI ABI LI TY | RESI LI ENCE | SECURI TY 13
Guiding Principles
1.Reliability Standards address sustained risks with moderate impacts which are probable, and severe impacts which are probable or improbable. 2.Reliability Guidelines used to address sustained risks that are probable or
jurisdiction, or are practices that improve reliability beyond standards. 3.Lessons Learned used for sustain risks or a one-and-done activities with moderate impacts and are both probable and improbable 4.Alerts will be used for time sensitive information, for information, to request action or direct action. 5.A combination of tools can be used towards gaining industry action, setting the stage for standards as well as addressing a risk while a Standard is being
Reliability Standard is required.
RELI ABI LI TY | RESI LI ENCE | SECURI TY 14
Risk Tools and Time Horizon
RELI ABI LI TY | RESI LI ENCE | SECURI TY 15
I llustrative Diagram
RELI ABI LI TY | RESI LI ENCE | SECURI TY 16
NERC Compliance & Standards Workshop Minneapolis MN July 23, 2019
Senior Compliance Auditor—Cyber Security
assessment, as well as common project management and procurement principles (see also NERC, 2017 April, Implementation Guidance, pp. 1–10)
SCRM program, risk identification and assessment methodology, processes, and procedures to support compliance with the Standard and enhance the reliability and security of the BES
considered a prescriptive solution that will guarantee compliance with CIP-013-1, as each entity has a unique blend of applicable BCS, vendors, products, and required services that may require a different approach
specific plan
2
and goals for operational effectiveness, efficiency, and accurate reporting to demonstrate compliance with the NERC Reliability Standards, Requirements, and/or Parts and addresses risks associated with the reliable operations of its business during the implementation of the Standards
013-1, an entity must develop and document its R1- R3 SCRM plan(s), processes, and procedures
timely and accurate compliance and effective artifacts in conjunction with its documented CIP-013-1 plans and processes or shortly thereafter
3
4
CIP-013-1 SCRM procurement plan?
applicable procurement implementation)
compliance and effective artifacts in conjunction with the CIP-013-1 plans and processes
5
areas [R1.2.1 – R1.2.6] that require specific processes to address various components of vendor access and other risks to high and medium impact BCS through vendor products and/or services:
1. Notifications of vendor-identified incidents, 2. Coordination of responses to such incidents, 3. Notification of termination of remote or onsite access to BCS for vendor representatives, 4. Disclosure by vendors of known vulnerabilities, 5. Verification of software and patch integrity and authenticity, and 6. Coordination of controls for vendor-initiated IRA and system-to-system remote access.
6
CIP-013-1 recognizes the risks posed by compromised BCS through vendor products and/or services and expressly requires applicable Responsible Entities to: “develop one or more documented supply chain cyber security risk management plan(s) for high and medium impact BES Cyber Systems. The plan(s) shall include” [see Parts R1.1 and R1.2]:
components and phases of their processes (e.g. defined requirements, request for proposal, bid evaluation, external vendor assessment tools and data, third party certifications and audit reports*, etc.) to help them meet the objective of Requirement R1 and give them flexibility to negotiate contracts with vendors to efficiently mitigate risks.”(NERC, 2017 April, SCRM Implementation Guidance: General Considerations, p. 1)
7
* Bold font indicates [emphasis added], where applicable, to draw attention to specific items
i. procuring and installing vendor equipment and software; and ii. transitions from one vendor(s) to another vendor(s).
and documenting the R1 SCRM plan?
security risks…” (p. 1), which is reinforced by the note in the Requirement 1: Rationale section, “The security objective is to ensure entities consider … options for mitigating these risks (Part 1.1, p. 11)
8
9
10
11
12
13
14
15
16
17
18
19
Each Responsible Entity shall review and obtain CIP Senior Manager or delegate approval of its supply chain cyber security risk management plan(s) specified in Requirement R1 at least
2020 (NERC, 2017 July, Implementation Plan: Initial Performance section, p. 3)
20
associated with medium and high BES Cyber Systems” (FERC, Order 850,
PACS, PCA, and LIBCS
Chain Risk Mitigation Program)
associated with high and medium impact BCS, with more to come later on from FERC, NERC, and the SDT
which may be rolled into CIP-013-2 Requirements or into future implementation guidance documents
21
Management Reliability Standard Final Rule. 165 FERC ¶ 61, 020, 18 CFR Part 40, Docket No. RM17-13-000. In Federal Register, 83(208), pp. 53992-54005. Retrieved from https://www.gpo.gov/fdsys/pkg/FR-2018-10-26/pdf/2018-23201.pdf
Recommended Actions [Draft]. In MRC Agenda Item 9, pp. 4-43. Retrieved from https://www.rtoinsider.com/wp-content/uploads/Draft-NERC-Supply-Chain- Report-2-6-19.pdf
Management [Reliability Standard]. Retrieved from https://www.nerc.com/pa/Stand/Reliability%20Standards/CIP-013-1.pdf
Papers]. Retrieved from https://www.nerc.com/pa/comp/Pages/Supply-Chain- Risk-Mitigation-Program.aspx
22
and Services Supply Chain. In Federal Register, 84(96), pp. 22689-22692. Retrieved from https://www.govinfo.gov/content/pkg/FR-2019-05-17/pdf/2019-10538.pdf
Federal Register, 78(33), pp. 11739-11744. Retrieved from https://www.federalregister.gov/documents/2013/02/19/2013-03915/improving-critical- infrastructure-cybersecurity
CIP-010-3 R1 Requirement Part 1.6 [ERO Approved Guidance Document]. Retrieved from https://www.nerc.com/pa/comp/guidance/EROEndorsedImplementationGuidance/ CIP-010-3%20R1.6%20Software%20Integrity%20and%20Authenticity.pdf
24
Systems (UAS) - Critical Infrastructure. Retrieved from https://www.dhs.gov/cisa/uas-critical-infrastructure
Elsevier Press. ISSN 1353-4858 (pp. 1-3). Retrieved from https://www.sciencedirect.com/science/article/pii/S1353485818300722?via%3Dihub
Street Journal [Online]. Retrieved from https://www.wsj.com/articles/russian- hackers-reach-u-s-utility-control-rooms-homeland-security-officials- say-1532388110
Door—and Russia Walked Through It. The Wall Street Journal [Online]. Retrieved from https://www.wsj.com/articles/americas-electric-grid-has-a-vulnerable-back- doorand-russia-walked-through-it-11547137112
25
timelines, and processes designed to:
least once every 15 calendar months thereafter
vendor products and/or services obtained for High and Medium BCS after July 1, 2020
procurement plans, processes and procedures
26
Senior Compliance Auditor—Cyber Security jbaugh@wecc.org
27
Keith Smith Manager, O& P Compliance Monitoring
Meeting Title Date
2
Objectives
applicable Equipment Rating of the individual equipment that comprises that Facility
3
Internal Controls
4
Internal Controls
5
Facility Rating Methodology
6
Facility Rating Methodology Example #1
item required by the Standard at a high level.
7
Facility Rating Methodology Example #2
that address each item in the Standard and includes:
8
Inventory
9
Inventory Example #1
identifies the series equipment, Equipment Ratings, and Facility Rating for its Facilities
10
Inventory Example #2
identifies the series equipment, Equipment Ratings, and Facility Rating for its Facilities, and includes:
11
Verification
12
Verification Example #1
Ratings using as-built one-line diagrams at the time it established its Facility Ratings
13
Verification Example #2
inspections of a percentage of its Facilities to ensure all applicable equipment has been considered in Facility Ratings documentation and Equipment Ratings are accurate.
14
Change Management Change management processes are necessary to ensure:
evaluated to identify impacts to Facility Ratings
evaluated to identify impacts to protection, analysis, and monitoring
15
Change Management Example
TOP- 003-3 TOP- 001-4 TOP- 002-4 TPL- 001-4 IRO- 010-2
MOD- 032-1
PRC- 023-4
16
Change Management Example #1
management processes but states:
change
17
Change Management Example #2
change management processes for equipment changes that include:
18
Change Management Example #2
change management processes for Facility Rating changes that include:
19
Questions?
Meeting Title Date
RELI ABI LI TY | RESI LI ENCE | SECURI TY
Webinar participants: We will return at 3:45 p.m. Central
Safety First and Always
July 23 – 24th , 2019 Minneapolis, MN 55402
Paolo D’ D’Alessandro, J JD Senio ior S Specia ialist Relia iabil ilit ity C Compliance
Safety First and Always
Eversource Energy: Service Territories
MA, and NH states through the following regulated subsidiaries (all doing business as Eversource Energy):
– Connecticut Light & Power with over
1,270,000 electric customers
– NSTAR Electric, including former Western
Massachusetts Electric Company with 1,380,000 electric customers
– Public Service of New Hampshire with
528,000 electric customers
certain functions, such as transmission
Yankee Gas Services Company and NSTAR Gas, delivering natural gas to approximately 524,000 customers.
customers through Aquarion Water Company.
ISO-NE NSTAR CONVEX ESCC 2
Safety First and Always
consolidated with:
Eversource is no longer a GO or GOP
D i s t r i b u t i
P r
i d e r T r a n s m i s s i
O w n e r T r a n s m i s s i
O p e r a t
T r a n s m i s s i
P l a n n e r T r a n s m i s s i
S e r v i c e P r
i d e r
DP TO TOP TP TSP
Eversource Energy Service Company NCR07176
X X X X X
Safety First and Always
compliance related activities.
Compliance and Internal Audit).
SME responsibilities primarily effect the following enterprise level groups:
Safety First and Always
Organization: Dedicated Committees & Departments to Ensure Compliance
Comm mmittees es Compliance and Ethics Committee Reliability Steering Committee - Quarterly Compliance Work Plan (CWP) - Monthly Departments Reliability Compliance / Operational Compliance Internal Audit Enterprise Risk Management
Safety First and Always
Examples of internal controls that support NERC compliance at an enterprise-wide level consist of the following:
Eversource - Enterprise-Wide Controls
Relia iabil ilit ity C Compliance Department Oversee and assist the business in ensuring compliance with all applicable Reliability Standards & Requirements Co Compl pliance a and nd E Ethics Com
mittee Executive level committee that oversees all compliance activity within the organization Int nternal A Aud udit Independently conducts periodic audits of compliance activities, including NERC Reliability Standards Enterprise R Risk Man anagem agement Framework and process that enables enterprise wide view of business risks and how they are appropriately managed and mitigated Co Compl pliance Work Plan n Monthly meetings to brief leadership on compliance activity including (1) KPI’s (2) standards development & implementation (3) review of compliance activity (4) emerging issues CAT ATSWeb Database system used to track and ensure completion of gap analysis and action plans for applicable NERC Standards and NPCC Directories
Safety First and Always
Ensure New Technologies are Secure (IT & OT)
Ensure Cloud Technologies are Secure
Ensure Strong Cyber Hygiene Policies, Vulnerability Management, Anti-malware technology, Security Monitoring, Security Awareness, Incident Response, Encryption, Secure Architecture Secure Legacy Systems Technologies that isolate or protect vulnerable systems from being exploited
Risk Based, Defense In Depth strategy that evolves based on the business and industry trends
Ensure OT/SCADA Systems are Secure Device authentication Device and network monitoring Strict external/remote access protocols
Safety First and Always
Eversource O&P/CIP ICE Lessons Learned
In 2018, Eversource participated in both an O&P and CIP ICE
Management on the following:
internal controls, enhancement to existing controls and the reduction in audit scope outweighed the impact to the line.
preventative) that support ongoing compliance.
needed to work with SMEs to review controls, complete the ICE Template and create flowcharts.
Safety First and Always
Safety First and Always
Safety First and Always
Safety First and Always
Safety First and Always
C r e a t i n g s u s t a i n a b l e v a l u e f o r a l l
Kristen Long, Sr. Analyst
HIGHLY SENSITIVE, CONFIDENTIAL AND PROPRIETARY. SEE NOTICE ON LAST PAGE Page 2
Gather existing information
procedures
history
Kickoff meeting with BU
Development meetings
standard
for a process map
updated existing controls
controls and tests to address risks
Approval
SMEs
management
Upload to GRC Tool
Purpose: NERC Compliance will lead a complete review of existing controls and work with the Business Units to develop new controls utilizing the appropriate control type (detective, corrective, preventative) to address compliance, reliability, security, financial, and/or operational risks, and document the updated controls in Archer
DRAFT
HIGHLY SENSITIVE, CONFIDENTIAL AND PROPRIETARY. SEE NOTICE ON LAST PAGE Page 3
Control Development
End Goal – develop rigorous preventative controls and tests for NERC reliability standards applicable to Entergy Priority – start with CMEP standards, focus on CMEP requirements with Med/High VRF (2019) Approach – tailored to the individual standard:
HIGHLY SENSITIVE, CONFIDENTIAL AND PROPRIETARY. SEE NOTICE ON LAST PAGE Page 4
All controls address some type of risk: compliance (RSAW measures), reliability (relay settings being in sync, preventing cascading outages), security (unauthorized physical or cyber intrusion), financial, operational. Items that could affect risk:
complicated manual process, etc.), and
HIGHLY SENSITIVE, CONFIDENTIAL AND PROPRIETARY. SEE NOTICE ON LAST PAGE Page 5
Approach to Control & Test Deployment
No Violations Established Process
Less persuasive evidence/ documentation, fewer controls & tests More persuasive evidence/ documentation, increased controls & tests
Lower Risk Higher Risk
HIGHLY SENSITIVE, CONFIDENTIAL AND PROPRIETARY. SEE NOTICE ON LAST PAGE Page 6
HIGHLY SENSITIVE, CONFIDENTIAL AND PROPRIETARY. SEE NOTICE ON LAST PAGE Page 7
FOR ILLUSTRATIVE PURPOSES ONLY
HIGHLY SENSITIVE, CONFIDENTIAL AND PROPRIETARY. SEE NOTICE ON LAST PAGE Page 8
HIGHLY SENSITIVE, CONFIDENTIAL AND PROPRIETARY. SEE NOTICE ON LAST PAGE Page 9
so = improperly designed)
.
HIGHLY SENSITIVE, CONFIDENTIAL AND PROPRIETARY. SEE NOTICE ON LAST PAGE Page 10
a) A control captured in the GRC tool that automatically kicks off, annually, directing a specific employee perform a required compliance action 1 month ahead of the deadline. b) A yellow sticky note attached to the same employees monitor reminding them to perform the same action by the mandated deadline.
HIGHLY SENSITIVE, CONFIDENTIAL AND PROPRIETARY. SEE NOTICE ON LAST PAGE Page 11
a) A bus full of nuns that testify they personally witnessed the patch control management performed on January 1, 2019, well within the mandated time periods. b) An electronic time stamped entry into the GRC tool, or another application, showing when the patch management was performed. c) A now convicted felon stating that when he was still unindicted he personally performed the patch management on the same date. d) Contemporarily made video of the employee performing the patch management on January 1, 2019.
July 23, 2019
Employees: 11,865 Natural gas operations
Electricity operations
Xcel Energy is an electric and natural gas company, with annual revenues
comprehensive portfolio of energy-related products through four operating companies.
3
Northern States Power Company- Minnesota Northern States Power Company- Wisconsin Public Service Company of Colorado Southwestern Public Service
MRO:
WECC:
Service Revenue & customer- Focused Assets Customer Effort & Cost to Serve
4
BROADEN
Economic growth and use of clean energy
HELP
Customers be more efficient and lower energy use
IMPROVE
Grid utilization, effectiveness, and economics
EXPAND
Role and scope of propositions we
LOWER
Total cost, effort, and time to serve customers
Lead the Clean Energy Transition Enhance the Customer Experience Keep Bills Low LEAD THE CLEAN ENERGY TRANSITION ENHANCE THE CUSTOMER EXPERIENCE KEEP BILLS LOW
Leverage competitive advantages to reduce emissions improve grid performance and provide customer value
RELI ABI LI TY | ACCOUNTABI LI TY 1