Title: CIP Update
1CIP Update
- Compliance User Group
- Marriott City Center, Denver, CO
- September 17, 2009
- Patrick Miller CISA CISSP-ISSAP
- Manager, CIP Audits and Investigations
2Disclaimer
- The Western Electricity Coordinating Council
(WECC) makes no representation as to the accuracy
or completeness of the information contained
herein or otherwise provided by WECC, their
affiliates or third parties, and accept no
responsibility or liability, in contract, in
tort, in negligence, or otherwise, should the
information be found to be inaccurate or
incomplete in any respect. WECC is not acting as
an advisor to the recipient of this information,
and the ultimate decision to proceed with any
action rests solely with the recipient of this
information. Therefore, prior to entering into
any action, the recipient of this information
should determine, without reliance upon WECC, the
economic risks and merits, as well as the legal,
and accounting characterizations and
consequences, of the transaction and that it is
able to assume these risks.
3CIP Audits Investigations Staff
- Josh Axelrod Compliance Engineer, Cyber
Security - 360.567.4067
- jaxelrod_at_wecc.biz
- Bill Fletcher Compliance Engineer, Cyber
Security - 360.567.4061
- wfletcher_at_wecc.biz
- Stacy Bresler Sr. Compliance Engineer, Cyber
Security - 360.567.4058
- sbresler_at_wecc.biz
- Steven Parker Sr. Compliance Engineer, Cyber
Security - 360.567.4055
- sparker_at_wecc.biz
- Patrick Miller Manager, CIP Audits
Investigations - 360.567.4056
- pmiller_at_wecc.biz
4CIP Compliance Organization
5CIP Statistics
- Recorded Violations 94
- Violations Fully Mitigated 60
- Entities with Critical Assets 81
- Entities with Critical Cyber Assets 63
- CIP-applicable entities 360
- Most Violated Standard CIP-004
- Most Violated Requirement CIP-004.R3
Since 7/1/2008
6CIP Backlog
As of 9/11/2009 Under review
7CIP Self Certifications
- Reviewing 7/1/2009 results 360 entities
- Will contact you for Not Applicable explanations
- Tracking and processing violations reported
through self certifications - Reviewing supplemental questionnaire results with
other Regions and NERC
Under review
8CIP Spot Checks
- Feedback has been very positive so far from
registered entities, NERC and FERC - WECCs spot check process
- Breadth and depth of review
- Adherence to the CMEP
- Expertise and professionalism of WECC team
- Receiving regular attendance from FERC and NERC
9CIP Approach Security Policy
- Must address the requirements of CIP-002 through
CIP-009 - WECC does a crosswalk to validate addresses the
requirements per R1.1 - Company shall adhere to all Federal, State and
Local regulations is too generic - Not a procedure but a policy
- Does not need to be a single policy document
10CIP Approach Security Policy
11CIP Approach Security Policy
- Readily available can be challenging to prove
- Intranet?
- Binders?
- When was it originally posted?
12CIP Approach Personnel
- CIP-004 is the most violated CIP standard
- CCWG whitepaper may be coming soon
- Similar to PRC whitepaper
- Evidence of specific access rights, training and
personnel risk assessments will be requested for
employees, contractors and vendors - Do not provide actual results of background
checks, only verification and type
13CIP Approach - Personnel
- CIP-004 summary table can really help (supporting
data is still required) - Employee ID and name
- Date electronic access granted
- Date physical access granted
- Date electronic access removed
- Date physical access removed
- Date of original training
- Date of annual training
- Date PRA completed
14CIP Approach Security Testing
- CIP-007.R1
- Functional testing vs. security testing
- See the FAQ CIP-007 Q4, page 23
- Basic port scans
- File integrity checking
- User account review
- Access controls, audit functions, etc
- Test results vs. performance results
15CIP Approach - Annual
- 12 months plus or minus one month
- AOT/CMPWG consensus approach
- CCWG consensus approach
- No official/public NERC position - yet
- Be mindful of the book end issue
- When does annual begin?
- Must happen at or before Compliance date within
CIP Implementation Plan
16Documentation
- Be prepared to provide all evidence and
documentation for the entire audit period - CIP Implementation Plan C date or
- Accepted Completed Mitigation Plan date
- Include revision histories within documentation
with specific changes - Document owners, dates, versions, classification,
etc - formalize
17Show and Tell
- Tell the auditor how you meet the requirement
(protocol) - Often policy, process, procedure, etc
- Show the auditor that you are actually meeting
the requirement (proof) - Supporting evidence logs, spreadsheets,
documents, database extracts, captures, etc - Covering both angles is necessary
18CIP Evidence Handling
- At some point in the near future, WECC will be
taking all CIP evidence provided before/at/during
the CIP Spot Check or Compliance Audit - This will be a shift from previous practice of
leaving all sensitive information with the entity - All Regions are moving to this model
19CIP Evidence Handling
- What gives WECC the authority to do this?
- Energy Policy Act of 2005
- Section 215 of the Federal Power Act
- Implementing Rule 18 CFR 39 (Order 672)
- Responsibility Oversight assigned to FERC
- FERC designated NERC as Electric Reliability Org.
- NERC has delegation agreement with WECC
- Authority to Request Evidence
- Mandatory Reliability Standards
- Implementing Rule 18 CFR 40 (Order 706)
- Issued January 18th 2008
- NERC CPB 2009-004v2.0
20CIP Evidence Handling
- Best practice security measures will be used to
protect the Regions CIP data - Will not remove/receive CIP sensitive information
until appropriate security measures are in place - Will keep the Registered Entities informed of all
changes in advance - Expected date of process change is not yet known
21CIP Spot Check Schedule
- CIP Spot Checks will be conducted through
December 2010 - Previous schedule had all CIP Spot Checks
completed by 6/30/2010, with only the first 13
requirements as initial scope - CIP Spot Checks conducted after 7/1/2010 will
cover all 41 CIP requirements - The new schedule is posted on the Compliance
website
http//compliance.wecc.biz/Application/ContentPa
geView.aspx?ContentId195
22CIP Spot Check Schedule
- CIP Spot Checks were bundled into pre-existing
Order 693 Compliance Audit cycles - Entities with no Order 693 Compliance Audit this
scheduled for this cycle will have a standalone
CIP Spot Check - 60-day notice will still be given for both
(combo or standalone)
23CIP Spot Check Timetable
- Monday
- Onsite arrival and team meeting
- 1 PM - Introductory Presentations
- 3 PM - Start the auditing process
- Tuesday, Wednesday and Thursday
- 8 AM to 5 PM - Auditing
- Final call for evidence is 2 PM Thursday
- Friday
- Spot check team determines findings
- Develop closing presentation
- 1 PM (no later than) Closing Presentation
24Spot Check (Audit) Logistics
- Spot Check (Audit) Room
- One conference room large enough to comfortably
hold WECC spot check team with room for laptops
and working documents - One USB printer is needed
- Interview Rooms
- At least one, preferably two smaller conference
rooms or closed enclaves to perform interviews.
Need to be able to hold at least four persons. - Lunches and Refreshments (WECC Spot Check Team)
- Onsite coffee, lunches, afternoon snack need to
provided - Please provide bill/receipt to WECC Spot Check
Team Lead for reimbursement
25Opening Presentations
- WECC Presentation
- WECC Spot Check Team Lead will need about 15
minutes to set up - 15-20 minute opening presentation
- Overview of Spot Check process
- Entity Presentation
- Brief (30 min max) presentation describing
company history, organizational structure,
computer systems, compliance culture, etc.
26CIP Spot Check Scope - Required
- Currently monitored and enforceable CIP standards
(First 13) - CIP-002, Requirements 1, 2 and 3
- CIP-003, Requirements 1, 2 and 3
- CIP-004, Requirements, 2, 3 and 4
- CIP-007, Requirement 1
- CIP-008, Requirement 1
- CIP-009, Requirements, 1 and 2
27CIP Spot Check Scope - Expanded
- Though the default required set is only the 13
actively monitored standards and requirements,
the WECC Spot Check Team has authority to expand
the Spot Check scope to any CIP requirement in
the Compliant phase of the CIP Implementation
Plan for all applicable functions during the spot
check if there is reason to believe violations
exist.
28CIP Spot Check Scope - Expanded
- Will only expand scope for cause
- Not an arbitrary decision
- Based on evidence
- Will communicate reasoning and extent of scope
expansion to entity as early as possible during
the spot check - Will document scope expansion within spot check
report and respective QRSAW
29CIP Spot Check Process
- Entity will be required to submit information in
advance via portal - Entity will list all documents to be offered as
evidence in the Supporting Evidence and
Documentation section of the RSAW for each
Standard/Requirement - Do not enter statements of compliance or embed
documents in the RSAWs - No binders
30CIP Spot Check Evidence
- Shall be provided on
- CD/DVD ROM
- Weve had problems with USB
- Folder structure one folder per standard, one
folder per requirement - SHA-256 hash shall be provided for every document
submitted as evidence may come as table,
spreadsheet, etc for all evidence
31CIP Spot Check Process
- RSAWs are used to document evidence reviewed and
determinations of compliance - All audit information is stored in RSAWs,
including hashes and locations or pointers to
evidence (document title, revision, dates,
approving authority, page, section, etc)
interview notes and auditor observations
32CIP Spot Check Exit Presentation
- The exit presentation will
- Summarize all spot check findings
- Present any areas of concern or suggestions
- Concerns do not result in a possible violation
- Suggestions help future compliance position
- Explain all next steps (spot check report
completion, comments, review, approval, etc) - Spot check reports are not sent to NERC
- Only violations are forwarded, per CMEP
33Lessons Learned
- At least one daily check in with the entity
contact is highly beneficial to both parties - Monitor all data and interview requests closely
to allow appropriate time for delivery and review
escalate if needed
34Lessons Learned
- Electronic evidence is good and bad
- Some things are just easier to read in print
- Please provide a shred bin
- PDFs are not always the best option
- Often come as image scans, no OCR
- Often come locked with no ability to copy, print,
etc - CD/DVD ROM is best
- Some documents change just by being opened
- Hashing is less difficult than originally thought
35Lessons Learned
- Label classified media such as CD/DVD ROMs and
all appropriate evidence, per CIP-003.R4 - Provide attestations of no event
- E.g. No exceptions to policy per CIP-003.R3
36Break
37TFE Background
- Not a CIP-003.R3 exception
- Interim guidance originally issued by NERC on
7/1/2009 - Process posted for comment on 8/25/2009
- New process and forms are being developed and
should be available in the very near future - Significant/substantive industry comments
38WECC Position on TFEs
- Not adopted yet, much is still in question
- WECC does not currently consent to the process as
proposed on 8/25/2009 - WECC wants 90 days for all Regions to begin
processing TFEs, assess workload and develop
appropriate work plan without deadlines - Lesson learned from prior experience
39Current TFE Process Status
- NERC is reviewing this week (one week window),
may or may not change proposal - NERC expects to issue additional interim guidance
at the end of the week or early next week - NERC plans to open doors for TFE processing by
9/21/09 - NERC will release the final instructions with the
Interim Bulletin
40TFE Next Steps, Upon Approval
- File the ROP change to FERC (if adopted by NERC
BOT) - Develop a final educational package and program
for Industry - Stand up TFE program(s) and staff/develop
implementation for all Regions and NERC - Technical implementation projects to develop
information exchange tools between NERC and
Regions
41Potential TFE Scope
- Requirements most likely eligible for TFE
Request, but there may be more - CIP-005-1/R2.4
- CIP-005-1/R2.6
- CIP-005-1/R3.1
- CIP-005-1/R3.2
- CIP-006-1/R1.1
- CIP-007-1/R2.3
- CIP-007-1/R3.2
- CIP-007-1/R4
- CIP-007-1/R4.1
- CIP-007-1/R5.3
- CIP-007-1/R5.3.1
- CIP-007-1/R5.3.2
- CIP-007-1/R5.3.3
- CIP-007-1/R6.
- CIP-007-1/R6.3
42Possible TFE Areas
- The following slides provide supplemental
awareness with respect to use of the proposed
Technical Feasibility Exception (TFE) Process,
prepared by the CCWG - The slides list potential factors that might
trigger a TFE. - The proposed Technical Feasibility Exception
Process is located at http//www.nerc.com/files/F
inal_TFE_Posting_08-25-09.pdf - This presentation is not authoritative and should
not be used to supersede information in the above
referenced document
43CIP-005-1/R2.4
- R2.4. Where external interactive access into the
Electronic Security Perimeter has been enabled,
the Responsible Entity shall implement strong
procedural or technical controls at the access
points to ensure authenticity of the accessing
party, where technically feasible. - Legacy system
- No feasible upgrade path
44CIP-005-1/R2.6
- R2.6. Appropriate Use Banner Where technically
feasible, electronic access control devices shall
display an appropriate use banner on the user
screen upon all interactive access attempts. The
Responsible Entity shall maintain a document
identifying the content of the banner. - Access control point that does not support a
login banner - External dial-up modem that cannot support a
banner - ILO and other out-of-band interfaces that do not
support banners
45CIP-005-1/R3.1
- R3.1. For dial-up accessible Critical Cyber
Assets that use non-routable protocols, the
Responsible Entity shall implement and document
monitoring process(es) at each access point to
the dial-up device, where technically feasible. - Dial-up device cannot be front-ended with an
access control device
46CIP-005-1/R3.2
- R3.2. Where technically feasible, the security
monitoring process(es) shall detect and alert for
attempts at or actual unauthorized accesses.
These alerts shall provide for appropriate
notification to designated response personnel.
Where alerting is not technically feasible, the
Responsible Entity shall review or otherwise
assess access logs for attempts at or actual
unauthorized accesses at least every ninety
calendar days. - Systems implemented do not support alerting
- Systems cannot connect to an external
communication system to communicate alerts
47CIP-006-1/R1.1
- R1.1. Processes to ensure and document that all
Cyber Assets within an Electronic Security
Perimeter also reside within an identified
Physical Security Perimeter. Where a completely
enclosed (six-wall) border cannot be
established, the Responsible Entity shall deploy
and document alternative measures to control
physical access to the Critical Cyber Assets. - Entity has implemented alternative measures in
lieu of a six-wall boundary
48CIP-007-1/R2.3
- R2.3. In the case where unused ports and services
cannot be disabled due to technical limitations,
the Responsible Entity shall document
compensating measure(s) applied to mitigate risk
exposure or an acceptance of risk. - Permitted where ports and services cannot be
configured
49CIP-007-1/R3.2
- R3.2. The Responsible Entity shall document the
implementation of security patches. In any case
where the patch is not installed, the Responsible
Entity shall document compensating measure(s)
applied to mitigate risk exposure or an
acceptance of risk. - Decision has been made that the patch cannot be
installed at this time - Vendor directive
- Testing proves incompatibility
- Insufficient information to make determination
for installation
50CIP-007-1/R4
- R4. Malicious Software Prevention The
Responsible Entity shall use anti-virus software
and other malicious software (malware)
prevention tools, where technically feasible, to
detect, prevent, deter, and mitigate the
introduction, exposure, and propagation of
malware on all Cyber Assets within the Electronic
Security Perimeter(s). - Device with embedded processor such as
- Relay, PLC, network switch, hub, printer, remote
KVM, serial server, VOIP phone, stand-alone
firewall, router, RTU, storage devices (SAN/NAS),
alarm panel, badge reader, GPS receiver - Product maintained by vendor which does not
permit anti-malware installation (black box)
51CIP-007-1/R4.1
- R4.1. The Responsible Entity shall document and
implement anti-virus and malware prevention
tools. In the case where anti-virus software and
malware prevention tools are not installed, the
Responsible Entity shall document compensating
measure(s) applied to mitigate risk exposure or
an acceptance of risk. - See R4
52CIP-007-1/R5.3
- R5.3. At a minimum, the Responsible Entity shall
require and use passwords, subject to the
following, as technically feasible - Legacy systems that do not support passwords
53CIP-007-1/R5.3.1
- R5.3.1. Each password shall be a minimum of six
characters. - Legacy and other devices that do not support a
restriction of six character or greater passwords - Legacy devices that do not permit passwords as
long as six characters
54CIP-007-1/R5.3.2
- R5.3.2. Each password shall consist of a
combination of alpha, numeric, and special
characters. - Legacy and other devices that do not support a
restriction to complex passwords with all 3
elements - Systems and devices that cannot be configured to
restrict the complexity of passwords to that
specified - Note that, in most cases, it is feasible to apply
appropriate complexity rules within the Microsoft
Active Directory (Windows) environment
55CIP-007-1/R5.3.3
- R5.3.3. Each password shall be changed at least
annually, or more frequently based on risk. - Legacy devices that do not permit password
changes - Devices that cannot be changed without an outage
of the device (may need to wait for a planned
outage of sufficient duration)
56CIP-007-1/R6
- R6. Security Status Monitoring The Responsible
Entity shall ensure that all Cyber Assets within
the Electronic Security Perimeter, as technically
feasible, implement automated tools or
organizational process controls to monitor system
events that are related to cyber security. - Systems and devices that do not support
monitoring and that cannot be effectively
monitored by an external device
57CIP-007-1/R6.3
- R6.3. The Responsible Entity shall maintain logs
of system events related to cyber security, where
technically feasible, to support incident
response as required in Standard CIP-008. - Legacy and other systems that do not support a
log of sufficient size to comply - Systems that cannot configure log retention to at
least the required time
58Proposed TFE Forms
- Part A
- Brief overview of the request for TFE and
mitigating measures (and/or plan) - Must be complete to be processed
- See instructions included with TFE proposal from
NERC (five pages) - Will likely be submitted through the Portal
- Part B
- Specific and detailed portion of the request
59Informal TFE Survey
- How many will your organization be submitting?
- Rough numbers are fine
- Use this presentation as a guide
- Use the proposed public process, forms and
instructions as a guide even though the process
is not formally adopted yet - Please provide your TFE forecast numbers to
lmilanes_at_wecc.biz by 9/30/2009 or sooner
60Getting Help
- CUG
- CIPUG
- EnergySec
- WICF
- NERC (training webinars starting soon)
- Choose your vendors carefully
61Upcoming CIPUG/EnergySec
- September 22nd CIPUG Meeting
- September 23rd and 24th EnergySec
- Joint Meeting, but separate events
- Same hotel, Seattle WA
- Different registrations
- CIPUG is 100
- EnergySec Summit is free
629/22 Seattle CIPUG Agenda
63Questions?
Patrick Miller CISA, CISSP-ISSAPManager, CIP
Audits and Investigations Western Electricity
Coordinating Council360.567.4056
pmiller_at_wecc.biz 7600 NE 41st Street, Suite
160 Vancouver, WA 98662