Remote - Spring 2016 - (Page 14)
Feature Article
Going Beyond Compliance: Using NERC CIP v5 as a Catalyst
For a Greater Security Strategy
Doug Wylie, CISSP
NexDefense
The North American electricity industry, including power generation and transmission is largely comprised of private organizations, yet it has shown itself to be one of the most progressive in its commitment to make measureable investments for proactive physical and cyber security. It has done so in the effort to ensure the integrity, safety and reliability of its critical assets and
operations - those that both people and business have come to depend on each and every day.
There are very good reasons why investments to better protect power generation and transmission are imperative. In the
energy sector alone, according to PwC1, the average number of detected cybersecurity incidents jumped six times from 2013
to 2014. In addition, attacks attributed to foreign nation-states, such as the one in which Russian nationalists2 are suspected of
inserting advanced malware into the networks of critical infrastructure, more than doubled.
The electricity industry has a rich history of recognizing growing risks that emerge from expanding cyber threats. Now over a
decade ago, in 2005, the Federal Energy Regulatory Commission (FERC) passed revisions to its definition of what comprises
a bulk electric system (BES). In doing so, it provided "greater
clarity, consistency and improved reliability by focusing on core
facilities that are necessary for operating the interconnected
transmission network." This action helped cement government
and industry's recognition that the electricity sub-sector had
already evolved to a highly interconnected system of systems.
In parallel to the expanded definition, FERC took an added
step to grant the North American Electric Reliability Corporation
(NERC) the authority to coordinate with BES industry partners
to develop and issue the NERC Critical Infrastructure Protection Cyber Security Reliability Standards (NERC CIP), which has
governed the industry since.
NERC CIP establishes base-level reliability standards for bulk electric power generation and transmission. But the proliferation
of advanced, sophisticated and targeted cyber threats demonstrates that power organizations must be more proactive with
cybersecurity investments, rather than fulfilling and complying with baseline requirements-checklists established by standards.
Instead, each organization serving the North American power grid, no matter the size, must learn to embrace NERC CIP as a
starting point and catalyst for a deep culture shift; one that embraces cybersecurity as a part of a greater risk mitigation strategy, and is supported by those in the highest levels of governance.
The New Era of NERC CIP Standards
In November 2013, FERC approved the NERC Critical Infrastructure Protection (CIP) V5 standards, and the requirements for
which owners and operators must conform to will become enforceable beginning in April 1, 2016. Version 5 represents the
most material changes to accountability in the electricity sub-sector in more than 10 years, which is representative of both the
changing threat landscape, and the recognition that it's time to expand upon the progress already achieved in certain portions
of the BES to more broadly mitigate cyber risks to the electric grid.
In addition, the NERC CIP V5 standards incorporate a significantly larger scope of the systems protected as compared to previous versions, and all facilities that meet the definition of BES will now be subject to comply with regulations. Because NERC
CIP V5 reaches nearly every power generation facility, come April 2016, many private organizations will be held accountable
to meet cybersecurity standards for the very first time.
Unlike most government regulations, industry regulations have many benefits, because they are often rooted in standards both
authored and influenced by its very stakeholders. Once in place, the regulations force organizations, under mandate, to make
changes to align with and conform to the standards. In the case of NERC CIP, the V5 standards will require an even broader
set of power entities to implement cybersecurity practices and controls to enhance reliability and protection of critical systems,
or risk being fined $1 million per day per violation.
14
www.RemoteMagazine.com
http://www.RemoteMagazine.com
Table of Contents for the Digital Edition of Remote - Spring 2016
Editor's Choice
Driving Real-Time Insight in the Oil and Gas Industry
One Network to Rule Them All
Rolls-Royce Power Systems Protection Underground Data Center
Going Beyond Compliance: Using NERC CIP v5 as a Catalyst for a Greater Security Strategy
Different Hardware Platforms, Same HMI Software
Satellite Communications: Extending the Reach of Your Monitoring and Control Footprint
Key Elements to Designing an IoT Network for Remote Monitoring
4G LTE Versus Wi-Fi Versus Bluetooth: What Every Aspiring IoT Entrepreneur Needs to Know
SCADA
Networking
Security
Onsite Power
Industry News
Remote - Spring 2016
https://www.nxtbook.com/nxtbooks/webcom/remote_2016winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2016fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2016
https://www.nxtbook.com/nxtbooks/webcom/remote_2016spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2015fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2015m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2015spring
https://www.nxtbook.com/nxtbooks/webcom/remote_industrialnetworking2014
https://www.nxtbook.com/nxtbooks/webcom/remote_2014fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2014m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2014spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2013winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2013m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2013fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2013summer
https://www.nxtbook.com/nxtbooks/webcom/remote_2013spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2012winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2012m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2012fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2012summer
https://www.nxtbook.com/nxtbooks/webcom/remote_2012scada
https://www.nxtbook.com/nxtbooks/webcom/remote_2012spring
https://www.nxtbook.com/nxtbooks/webcom/remote_201112
https://www.nxtbook.com/nxtbooks/webcom/remote_201110
https://www.nxtbook.com/nxtbooks/webcom/remote_201108
https://www.nxtbookmedia.com