Professional Documents
Culture Documents
22-Feb-2012 2
Convergence of Information Technology and
Operation Technology.
Smart Grid Technology
Information Technology Operations Technology
Enterprise Systems
Control Systems
Web Applications
Protection Systems
AMI
DSM
OMS
GIS
22-Feb-2012 3
-: Need of Data Sharing :-
-: Increased use of digital information :-
-: Two way flow of information for Power Grid :-
Service
Markets
Providers
Flow of Information
22-Feb-2012 4
Agenda
Concerns with regard to security of power grid
solutions.
22-Feb-2012 5
Concerns with regard to security of
power grid solutions.
22-Feb-2012 6
Cyber Security in Power Grid
Requirements Threats
Unauthorised
Integrity Modification or Theft
of Infomation
Denial of Service or
Availability Prevention of
Authorised Access
Unauthorised
Confidentiality access to
Infomation
22-Feb-2012 7
Concerns
• Current power grid depends on complex network of
computers, software and communication technologies.
• If compromised, have the potential to cause great
damages.
• A cyber attack has the unique in nature that it can be
launched through
– public network
– from a remote location
– Form any where in the world.
– Coordinated to attack many locations
22-Feb-2012 8
More Concerns
• The legacy communication method used for grid
operations also provide potential cyber attack
paths.
• Many cyber vulnerabilities in Supervisory Control
and Data Acquisition (SCADA) System have been
surfaced.
• Level of automation in substations is increasing,
which can lead more cyber security issues.
• Recent study have shown that the deployed
components have significant cyber vulnerabilities.9
22-Feb-2012
Still More Concerns
• Efforts of energy sector to
uncover system vulnerabilities
develop effective countermeasures
22-Feb-2012 11
Standards and Framework
• ISO/IEC 27001- Information Security
Management System.
• NERC-CIP Standards - Critical
Infrastructure Protection
Standard.
• NIST IR 7628 – Guidelines for Smart
Grid Cyber Security.
• IEC 62351 Series Security Standards Standards
22-Feb-2012 12
ISO/IEC 27001 - ISMS
• Information Security Management System
Standard.
• Published by International Organization for
Standards and International Electro technical
Commission.
• Information technology -- Security techniques --
Information security management systems --
Requirements.
• Formally specifies a management system that is
intended to bring information security under explicit
management control.
22-Feb-2012 13
NERC – CIP Standards
• Critical infrastructure protection (CIP) is a
concept by North American Reliability Corporation
(NERC).
• Efforts to improve physical and cyber security for
the bulk power system of North America.
• include standards development, compliance
enforcement, assessments of risk and
preparedness
• provide a cyber security framework for the
identification and protection of Critical Cyber
Assets to support reliable operation of the Bulk
22-Feb-2012 14
NERC – CIP Standards Series
CIP-001 Sabotage Reporting
CIP-002 Critical Cyber Asset Identification
CIP-003 Security Management Controls
CIP-004 Personnel & Training
CIP-005 Electronic Security Perimeter(s)
CIP-006 Physical Security of Critical Cyber Assets
CIP-007 Systems Security Management
CIP-008 Incident Reporting and Response Planning
CIP-009 Recovery Plans for Critical Cyber Assets
22-Feb-2012 15
NIST IR-7628 Guidelines for Smart Grid
Cyber Security.
• Advisory guidelines – neither prescriptive
nor mandatory
• Intended to facilitate efforts to develop:-
– A cyber Security Strategy
– Effectively focused on
• Prevention
• Detection
• Response and
• Recovery
22-Feb-2012 16
NIST IR-7628 Guideline
The three-volume reports of Guidelines for Smart
Grid Cyber Security are:-
• Volume 1 - Smart Grid Cyber Security Strategy,
Architecture, and High-Level
Requirements
• Volume 2 - Privacy and the Smart Grid
• Volume 3 - Supportive Analyses and References
22-Feb-2012 19
Correlation between IEC 62351 and Power
System Protocols
IEC 62351-1 : Introduction
IEC
IEC 60870-6
60870-6 TASE.2
TASE.2
IEC 62351-3 : Profiles Including TCP/IP
Management
IEC 62351-4 : Profiles Including MMS
IEC 60870-5-104 TCP/IP
IEC 62351-5 : IEC 60870-5 &
Derivatives IEC 60870-5-101, 102 and 103
22-Feb-2012 20
Challenges of integrating new
technologies with legacy systems.
22-Feb-2012 21
Legacy System – Silos of Information
22-Feb-2012 22
Smart System – Sharing of Information
Generation Transmission Distribution Customers
AMI DSM
System System
Operations Operations
22-Feb-2012 23
Challenges in Integrating
Increasing New 2-Way
Interconnection Systems
and Integration (e.g. AMI, DSM)
22-Feb-2012 24
Some Solutions
22-Feb-2012 25
Challenges of integrating new
technologies with legacy systems.
22-Feb-2012 26
Barriers
• Cyber threats are unpredictable and evolve faster
than the sector’s ability to develop and deploy
countermeasures
• Security upgrades to legacy systems are limited by
inherent limitations of the equipment and
architectures
• Threat, vulnerability, incident, and mitigation
information sharing is insufficient among
government and industry
• Weak business case for cyber security investment
by industry
22-Feb-2012 27
Strategies
• Build a culture of security.
• Access and Monitor Risks.
• Develop and Implement New Protective Measures
to reduce Risks.
• Manage Incidence.
• Sustain Security Improvements.
22-Feb-2012 28
Road Map for Security of Smart Grid
• Information Security Management System have
been adopted by each regional load dispatch
center.
• Each RLDC has been certified by International
Certifying Body (BSI) for ISO 27001:2005.
• SCADA system up gradation is being done with:-
– Adoption of IEC 62351 security standards.
– Secure connection between SCADA network and
Enterprise network for cyber security.
– Access control for physical security.
22-Feb-2012 29
22-Feb-2012 30