You are on page 1of 31

December 2018

Cyber Security Roadmap

10300629
Introduction
Cyber Security Area Research Objective How We Do It
Conduct research, development, and demonstrations
Identify • We leverage the shared experience of our
that provide the technical basis and tools to support the utility members, industry engagement,
management of cyber security risk across the entire utility and the expertise of EPRI’s Cyber Security
enterprise. This roadmap describes EPRI's cyber security Team to Identify existing research gaps
research in its Power Delivery, Generation, and Nuclear and associated project needs.
Sectors in support of EPRI's mission to provide a safe, • We develop a portfolio of research
reliable, affordable and environmentally responsible projects that Create independent,
source of electric power for society. fact-based results and effective tools to

Approach
Create provide members decision support in
managing their cyber security risk.
• We use a collaborative model to Leverage investment, •W  e Transfer the research value to
Identify issues, Guide research, and Implement results. members through advisor interactions,
• We execute research using a Portfolio-based approach topical workshops, user groups, training
to provide Short-, Mid- and Long-Term Deliverables to modules, and direct member support.
address identified industry issues. Research results may be distilled into any
• We utilize a member-driven Roadmap which includes of the following forms:
Mission, Drivers, Future States, Gaps, and multi-year
Research Plans that document how EPRI is bridging these Transfer Reports
gaps.
• We utilize continual engagement with members to Reference Guides
ensure that the R&D we perform is High Value, Easy to
Implement and Likely to Succeed. Field Guides

Interest/User Groups

VALUE
Power Delivery and
Utilization Lab/Field Demos

Software Tools
Generation Sector
Videos

Nuclear Sector Training Modules


10300629
2
PROGRAMS DEFINE ACTION PLANS
Function Category ID
Asset Management ID.AM Action Plans and Project Definitions:
Business Environment ID.BE What we need to do to bridge the gaps to achieve the Future States

Governance ID.GV
Identify Annual Research Portfolio: EPRI’s offering of collaborative,
Risk Assessment ID.RA membership funded research work for a given year. All annual
Risk Management Strategy ID.RM research portfolio purchases are based on EPRI’s research year (the
calendar year). These offerings are made available each June for the
Supply Chain Risk Management ID.SC subsequent research year.

Identify Management and Access Control PR.AC Supplemental Project: Some research projects are not part of the
Awareness and Training PR.AT annual research portfolio, they are executed as supplemental projects.
These supplemental projects are done more as one-off projects; they
Data Security PR.DS can be single or multiple funder projects.
Protect
Information Protection Processes & Procedures PR.IP Technology Innovation Project: Technology Innovation allows
Maintenance PR.MA members to leverage their long-term investment (10+ years) in
collaborative research that may create entirely new markets, products
Protective Technology PR.PT and services, increase the public benefits of efficient, clean affordable
energy, and ensure the competitiveness of the energy enterprise.
Anomalies and Events DE.AE
Detect Security Continuous Monitoring DE.CM Pre-Demonstration Project: EPRI program to fund R&D that
would enable a large scale demonstration project. For example,
Detection Process DE.DP a pre-demonstration project that laid the foundation for the multi-
year, collaborative was the Field Area Network (FAN) Demonstration
Response Planning RS.RP
project.
Communications RS.CO
Government Project: A project that EPRI has been awarded
Analysis RS.AN through a government entity such as the U.S. Department of Energy,
California Energy Commission or the New York State Energy Research
Respond & Mitigation RS.MI
and Development Authority. Awards are typically made by these
Recover Improvements RS.IM organizations through an open, competitive solicitation process.

Recovery Planning RC.RP Workshops and Forums: EPRI meetings, direct interaction with one
or more potential customers can take place via face-to-face meetings,
Improvements RC.IM
workshops, conference calls, or webcasts and are defined as technical
Communications RC.CO deliverables. Forums or interest groups are formed by advisors and
stakeholders that also meet on a regular basis throughout the year.
NIST Cybersecurity Framework Functions and Categories
The U.S. National Institute of Standards and Technology (NIST) released Version 1.1 of the Framework
for Improving Critical Infrastructure Cybersecurity in April 2018. The NIST Cybersecurity Framework (CSF)
Reference Tool provides a “common organizing structure for multiple approaches to cyber security by
assembling standards, guidelines, and practices”. Since its initial release, the CSF has been adopted
by many utilities around the world. The future states of EPRI’s Cyber Security Roadmap have been
categorized according to the Framework Core’s five Functions of Identify, Protect, Detect, Respond,
10300629
and Recover, providing a clear mapping to utility cyber security activities. The chart above provides the
Functions and Categories from the CSF as a reference. 33
Cyber Security (CS) Roadmap

Future States Cyber Security Overview

Automating Asset and Configuration


Management (ACM) Technology Overview
For Power Systems Cyber security has become a critical priority for electric utilities across the power delivery, fossil
generation, and nuclear power sectors. The evolving electric grid is increasingly dependent on
Cyber Security Metrics for information technology and telecommunications infrastructures to ensure its reliable operation. As
The Electric Sector generation plants are being required to adapt to the complex demands of an ever increasingly
competitive marketplace, each power generation site is deploying more digital Instrumentation and
Compliance Standards Driven Solutions
Control assets from a variety of vendors. Additionally, the US Nuclear Industry has spent large sums on
Cyber Security Process and Integration regulatory mandated cyber security implementation to date, though it is not certain if these costs have
For Generation Facilities had a commiserate increase in security.
Cyber security measures must be designed and implemented to support grid reliability. These
Technical Assessment Methodology measures must also support grid resilience against attacks by terrorists and hackers, natural disasters,
and inadvertent threats such as equipment failures and user errors.
Hazard Consequence Analysis for Digital Systems The Cyber Security Portfolio of the Electric Power Research Institute (EPRI) focuses on addressing the
(HAZCADS) emerging threats to an interconnected electric sector through multidisciplinary, collaborative research
on cyber security technologies, standards, and business processes.
Cyber Security Program Guide

Cyber Security in the Supply Chain

Security Architecture for Flexible and


Resilient Utility Systems Pool Share
resources reponsibility
Protective Measures for
Distributed Energy Resources One of the goals outlined in the U.S.
Department of Energy’s Multiyear
Protective Measures for Generation EPRI Plan for Energy Sector Cyber Security
Industrial Control Systems Collaboration focuses on “accelerating game-
Answer changing research, development,
Incident Detection Increase and demonstration of resilient Energy
research
efficiency Delivery Systems”. EPRI’s Cyber Security
questions
Threat Management Portfolio supports this goal through
targeted cyber security research
Cyber Security Forensics for Industrial Share in generation, delivery, and use of
Control Systems technical skills electricity that leverages EPRI’s in-depth
understanding of power systems and
and expertise
Respond & Recover Capabilities for utility operating environments.
Generation Facilities

10300629
4
Cyber Security (CS) Roadmap

Cyber Security Research Value

Research Value
The rapid pace of change in the electric sector creates a challenging
environment for asset owners and operators to monitor the activities of
industry and standards organizations, develop an understanding of the
RESEARC
WER
security impacts of new technologies, and assess and monitor cyber
O HI security risks. EPRI employs a team of experts with comprehensive
P NS
IC TI backgrounds in cyber security who address these challenges by providing
TR T insight and analyses of various security tools, architectures, guidelines,
and results of testing to program participants. To enhance cyber security
EC

Collaborative

U
TE
Technology Development, R&D, EPRI will identify where relevant work is happening—whether it be
EL

Integration, and Application the national laboratories, manufacturers, or universities. Drawing on our
deep expertise in cyber security and diverse aspects of the power system,
LAB

we will transfer key insights and results of this work to the electric power
industry, helping companies to apply them in their operational systems.

EN D ORS
O R ATO RIES

Creative EPRI’s Cyber Security portfolio can provide:


Ideas Applied • A better awareness of industry and government collaborative efforts,
Successfully in where members can “plug in” to current activities;
Practice • Guidance on developing cyber security strategies and requirements for
selecting effective technologies;

DV • Guidance on security metrics;


• Techniques for assessing and monitoring risk;
Basic
AN
Technology,
AN

Research and • Practical approaches to mitigating the risk of operating legacy systems;
Communications • Early identification of security gaps through laboratory assessments of
Development
U
S
D

security technologies;
ER

N L I
IV • Technologies which support the management of cyber incidents and
ER PP increase the cyber security and resiliency of the grid;
SITI SU • Methodology for integrating cyber security assessment and control
ES methods into the existing facility digital engineering (design, system,
and analysis) and operational program to achieve design and
implementation efficiency; and
• Technologies which support cyber programmatic management and
increase the cyber security posture.

10300629
5
Identify
The NIST Cybersecurity Framework defines the
Identify Function as “Develop an organizational
understanding to manage cybersecurity risk to
systems, people, assets, data, and capabilities.”
Specifically, the activities in this function
involve “Understanding the business context,
the resources that support critical functions,
and the related cyber security risks enables an
organization to focus and prioritize its efforts,
consistent with its risk management strategy and
business needs.”

Categories within this Function include:


• Asset Management;
• Business Environment;
• Governance;
• Risk Assessment;
• Risk Management Strategy; and
• Supply Chain Risk Management

The following Future States support the business


processes and technologies required to effectively
and efficiently execute activities within the Identify
Function’s categories:
•A utomating Asset and Configuration
Management (ACM) Technology for Power
Systems
• Cyber Security Metrics for the Electric Sector
• Compliance Standards Driven Solutions
•C yber Security Process and Integration for
Generation Facilities
• Cyber Security Assessment Methods
• Risk Informed Cyber Security Methods
• Cyber Security Program Guide
•S upply Chain Security and Digital Engineering
Process Integration

10300629
6
Automating Asset and Configuration Management (ACM) Technology for Power Systems

Major Past MEASURES OF SUCCESS


Future States: Utilities will be able to identify Accomplishments
2019 2020 Future
and track field assets and efficiently manage their The integration and testing
configurations by integrating automated solutions. Text Text Text Text of an integrated solution that
POWER DELIVERY CYBER SECURITY ANNUAL RESEARCH PORTFOLIO (P183) incorporates information
Description: Asset and configuration management from identification systems,
 ssessed purely
A  xtend safe active
E Demonstrate Expand integrated
is a critical area of interest for the electric sector configuration management
passive identification interrogation integrated solution to cover
with multiple significant challenges that must be systems, and password
techniques for ICS techniques and solution for device a larger set of
addressed to ensure the secure and reliable delivery management systems
equipment and explore integration identification, devices and
of power. While modern asset management and
explored safe active with Intelligent configuration explore the use of
configuration controls are routinely implemented in a
interrogation Electronic Devices monitoring device information
typical business IT environment, this research project DELIVERABLE TYPE
(IED) management and password to better coordinate
focuses on a unique set of conditions presented by
solutions management cyber security
cyber systems in an industrial control systems (ICS) Software, technical
controls
environment. For example, relatively long technology publications
refresh cycles lead to situations where legacy
hardware and software may remain in place long
after vendor support has been discontinued. This ARP PROJECT
scenario leaves utilities with a number of challenges to Gaps Addressed:
overcome when trying to manage and secure systems • The inconsistency of remote access and access control tools in their ability to securely P183.008: Asset and
that were not built with security in mind. access and configure power grid devices in a multi-vendor environment Configuration Management
• Significant manual effort required to baseline and manage devices (2018)
Action Plan: Automating Asset and • Vendor-neutral tools that can seamlessly interface with device configurations in a multi-
Configuration Management vendor environment TIES TO OTHER
• Assess commercial solutions for device • Vendor-neutral tools that can parse and manipulate configuration interfaces and files PROGRAMS
identification, configuration monitoring, and • Lack a centralized, policy-driven framework for configuration management of field
password management systems that is open and vendor-neutral Substations (P37)
• Identify key points of interoperability required
to integrate solutions and enable the automated
discovery and management of field devices
• Pilot an integrated system that enables exchange
of information from device discovery through
configuration and password management

10300629
7
Cyber Security Metrics for the Electric Sector

Major Past MEASURES OF SUCCESS


Future States: Utilities will measure their cyber Accomplishments
2019 2020 Future
security performance through a standard set of • Utility members contribute
security metrics. Using these metrics, they will clearly to the development of cyber
communicate the status of cyber security to various POWER DELIVERY CYBER SECURITY ANNUAL RESEARCH PORTFOLIO (P183) security metrics
stakeholders and measure the effectiveness of security • Utility members utilize
• EPRI Cyber Security • Establish Metrics • Security Metric • Operationalization
investment based on data. Utilities will also be able cyber security metrics
Metrics Advisory Council Aggregation of security metrics
to compare the scores and benchmark through through pilot studies
development for ongoing Framework through the
established metrics aggregation framework. • Other EPRI programs or
• Security metrics enhancement of implementation supplemental
external parties utilize
utility pilot the metrics with Metrics Hub project (continue)
Description: As cyber security threats continue research results
• Metrics calculator • Engage vendors • Operationalization • Industry
to grow in number and sophistication, utilities will
tool (MetCalc) and industry of security metrics statistics based on
need to evaluate and improve their security postures
development partners for through the aggregated data
continuously. Continuous improvement cannot be DELIVERABLE TYPE
• Study on data data collection supplemental • Data analytics
achieved without accurate performance metrics and
anonymization, automation project using aggregated
clear goals. While mandatory security standards Investigative results, software,
data security and metrics data and
provide the initial goal of compliance, the binary the establishment of industry
privacy issues for aggregation correlations with
nature of compliance comes short of providing advisory group
security • Metrics Hub other data sets
strategic direction for continuously evolving technology
(metric repository
and threat landscape. Security Metrics for the Electric
and portal site)
Sector is an ongoing research project that EPRI ARP PROJECT
development
is leading in collaboration with multiple member
utilities. It aims to create a common set of metrics that P183.014: Cyber Security
quantify the effectiveness of cyber security controls and Metrics (2018)
promote its wider adoption through standardization. dashboard reporting. In parallel to this effort, EPRI will start the background research
EPRI also is developing a framework for industry- on issues and solutions related to large-scale data aggregation, including data privacy, TIES TO OTHER
level metric data aggregation to support industry data anonymization, and security requirements. In 2019, with the consultation with the PROGRAMS
benchmarking and long-term trend analysis. members, EPRI will launch a supplemental project where the participants will implement
the security metrics tool in their own environment, paving the way to industry-level data Information and
Action Plan: aggregation in 2020 and onward. EPRI will also examine piloting the security metrics in Communication Technology
In 2017, EPRI developed a common set of sixty Generation and Nuclear operating environments. (P161)
security metrics based on 120-150 data points,
and pilot tested the set with six utility members. In Gaps Addressed:
2018, we will continue the utility pilot for further • The lack of a common set of metrics for leadership to communicate the security
refinement of metric formulae and data points. To status to stakeholders
realize the full value of the study, the metrics must • The lack of performance metric to measure the effectiveness of security controls
be 1) widely adopted; 2) aggregated for statistical and operations
analysis across the industry, and 3) correlated with • The lack of reliable historical data for establishing long-term strategic goals
the threat/breach data for advanced analytics. As the • The lack of industry-level statistics on cyber security performance for benchmarking
first step to address the gaps, EPRI will promote the • The lack of large-scale data aggregation framework for industry-level
common set of metrics through standardization and security data accumulation
start the development of a security metrics tool for
automated data collection, metric calculation, and

10300629
8
Compliance Standards Driven Solutions

Major Past MEASURES OF SUCCESS


Future States: Utilities have the capability to Accomplishments
2019 2020 Future
transparently and confidently implement technical and • NERC-informed security
procedural solutions that resolve security challenges guidance
while effectively complying with mandatory standards. POWER DELIVERY CYBER SECURITY ANNUAL RESEARCH PORTFOLIO (P183) • Solutions to address
By using the Implementation Guidance process, EPRI compliance issues with
L ab testing of patch Implementation Development Development
will develop solutions that are effective and compliant cloud-based operations
management tools Guidance for of Security of Community
to address security and regulatory challenges.
Cloud Solutions Architectures Based-Cloud Pilot
– Encryption of for Real-time Program
Description: Cyber security standards, guidance, DELIVERABLE TYPE
BCSI Operations
and regulations have been developed in response
to continual threats to business and process control – Operating BES • Security-based
networks. In recent years, electric utilities that are Cyber Systems Implementation Guidance
part of the North American Bulk Electric System Off-premise Considerations
(BES) have established cyber security programs to • Technical Architectures
ensure compliance with the critical infrastructure
protection (CIP) standards of the North American
Electric Reliability Corporation (NERC). New cyber Action Plan: Secure Architecture Methodology ARP PROJECT
security requirements for critical infrastructure are •B
 ecome a pre-approved organization that can submit implementation
being introduced in other regions as well, such as •D
 evelopment of guidelines and industry support for critical challenges in cloud-based P183.013: Cyber Security
the Directive on Security of Network and Information operations for BES Cyber System and BES Cyber Systems Information Compliance (2018)
Systems (NIS Directive) of the European Commission.
In addition, some states are developing cyber security Gaps Addressed: TIES TO OTHER
requirements for the distribution sector of the grid. Lack of NERC-approved solutions to address emerging risks on the Bulk Electric System. PROGRAMS
Compliance with cyber security regulations and
cyber security requirements is non-trivial and requires Substation (P37),
IT staff and control system engineers to work together Grid Operations and
to implement and maintain a cyber security program Planning (P39)
for control systems. In some cases, entities seek
regulatory certainty from the regulators to determine
if a solution will meet compliance with the standards.
EPRI can help provide this certainty by developing
Implementation Guidance, which are NERC-approved
methods to comply with CIP standards, to help provide
our members with confidence that their security
solutions will be deemed compliant.

10300629
9
Cyber Security Process and Integration for Generation Facilities

Major Past MEASURES OF SUCCESS


Future States: Cyber security is integrated into Accomplishments
2019 2020 Future
other utility and generation plant programs and • Incorporation of cyber
departments, such as physical security, procurement, security into plant processes
design engineering, maintenance, and training. GENERATION INSTRUMENTATION, CONTROLS, AND AUTOMATION CYBER and departments
SECURITY SUPPLEMENTAL PROJECT (P68) • Other EPRI programs
Description: This future state studies technical incorporating cyber security
• Cyber •T  ransient Cyber
approaches to address process and coordination into their process guidance
Security in the Asset and
challenges associated with cyber security. Additional and research deliverables
Supply Chain Removable
research in this area includes IT/OT integration and
•G  eneration OT Media Guideline
coordination; technical approaches and strategies
Cyber Security •S  upply Chain
to address the conflict between skill requirements DELIVERABLE TYPE
Assessment Case Studies
and reduced resources; security metrics; integration
Methodology • Renewables
with physical security and procurement departments; Working groups, Technical
• Technical Cyber Security
training needs; and risk management. results (knowledge base,
Assessment Overview
guidance, and application
Methodology • Technical
Action Plan: level)
Assessment
EPRI will work with members and utilities to
Methodology –
understand the synergies that exist between cyber
Case Studies
security programs, practices, procedures, and ARP PROJECT
interdependencies with other utility and plant
departments and programs. By benchmarking GENERATION CYBER SECURITY ANNUAL RESEARCH PORTFOLIO (P209) P68 Supplemental, P209
utilities and assessing their maturity and capability, (2020)
EPRI will be able to research methodologies to better • Cyber Security • Workforce
incorporate cyber security into all applicable plant Design Development for TIES TO OTHER
and utility functions. Engineering Generation Cyber PROGRAMS
Integration Security
Gaps Addressed: •P  lant • Internal Audit for Operations (P108),
• Research on how to integrate cyber security into Management Generation DCS Maintenance and
generation-specific plant’s O&M programs Cyber Security Cyber Security Reliability (P69), Balance
• Understanding of the integration of cyber security Review • Vendor of Plant Systems (P104),
with physical security and the interdependencies •W  orkforce Qualifications Instrumentation & Control
• Research on transitioning workforce, skill gaps, and Development for • Self-Assessment and Automation (P68),
reduction of overall generation workforce (dedicated Generation Cyber Tools Renewables (P193)
cyber security staff) Security • Receipt
Inspections and
Warehousing for
Generation Plants

10300629
10
Technical Assessment Methodology

Major Past MEASURES OF SUCCESS


Future States: Consistent, repeatable, regulatory Accomplishments
2019 2020 Future
agnostic, risk informed processes are used to • Other EPRI programs
assess systems, services, and assets across critical incorporating cyber security
infrastructure facilities, vendors, and suppliers. EPRI TECHNOLOGY INNOVATION CROSS-CUTTING CYBER SECURITY PROGRAM into their process guidance
and research deliverables
Description: A consistent risk informed, graded, • T echnical • Technical • Technical • Technical • Member use and
Assessment Assessment Assessment Assessment
technical process is needed to assess systems, acceptance of TAM into
Methodology Methodology Methodology Methodology
assets, and services. This process must be modular, their facility processes and
(TAM) Rev One Tech Transfer Tech Transfer Tech Transfer
integrated, and able to be incorporated across the procedures
•T  AM Field Guides • TAM Field Guides • TAM Field Guides
supply chain to be performed by different people, at • Member engagement with
TAM Case Studies •T  AM Classroom • TAM Classroom
different times, across different organizations. the continued development
for All Sectors Training Training
and update of the TAM
(Generation, •T  AM Revision 2
Action Plan: • Vendor acceptance and use
Nuclear, PDU) •E  XSIM Database
EPRI will work with different national laboratories, of TAM
•T  AM Classroom Software Tool
members, and organizations to develop an
Training Production
engineering-based method that meets these •E  XSIM Database
objectives. Software Tool DELIVERABLE TYPE
Beta
Gaps Addressed: •T  AM CBT Technical reports, field guides,
• Develop a repeatable method that is fully bounded, Modules, training deliverables including
efficient, and repeatable by plant engineers and Classroom, CBT modules
other technically trained personnel and Distance
• Develop a process that is risk informed, allowing Learning TIES TO OTHER
threat capability intelligence to inform the process Environment PROGRAMS
and ensure the appropriate level of protection is (DLE) Training
achieved Development Nuclear Instrumentation and
• Improve the detailed subject matter knowledge Control (41.05.03),
as skill and knowledge gaps are recognized due Advanced Nuclear Technology
to changing technology or insufficient awareness (41.08.01),
of EPRI methods through detailed field guides as Instrumentation & Control and
needed Automation (P68),
• Develop training materials to reduce skill gaps, PDU - Cyber Security (P183),
and improve technology transfer for the overall P209 (2020)
workforce

10300629
11
Hazard Consequence Analysis for Digital Systems (HAZCADS)

Major Past MEASURES OF SUCCESS


Future States: Utilities have tools that allow for Accomplishments
2019 2020 Future
understanding the impact hazards that are unique Methodology to identify
to digital hazards such as EMI/RFI, Common Cause causal factors unique to
Failures, Cyber Security, Single Point Vulnerabilities, EPRI TECHNOLOGY INNOVATION CROSS-CUTTING CYBER SECURITY PROGRAM digital equipment and
and others have on digital equipment and how they systems that can cause a
impact plant consequences. •H
 azard Analysis •H  AZCAD Tech •H  AZCAD Tech • HAZCAD plant consequence is adopted
Methods for Digital Transfer Transfer Integration with
by utilities and integrators
Instrumentation • HAZCAD •H  AZCAD Field other Digital
Description: Digital equipment can have almost worldwide
and Control Integration with Guides Hazard Research
unlimited configurability and the failure mechanisms
Systems Risk Assessment • HAZCAD such as SPV,
of the equipment and how it can impact plant
•P
 rogram on Software Tool Software EMI/RFI
consequences is difficult to determine using traditional DELIVERABLE TYPE
Technology •H  AZCAD Case Tool Training • HAZCAD Field
PRA and other quantitative risk analysis methods.
Innovation: Cyber Studies for CCF Development Guides
Using qualitative risk methods, these digital failure Technical reports, updates,
Hazards Analysis and Cyber • HAZCAD • HAZCAD
mechanisms can be analyzed to inform engineers and member updates, training
Risk Methodology Security Training Training
owners/operators. deliverables including CBT
– Phase II: A • HAZCAD
Risk Informed CBT Modules, modules
Action Plan: Approach Classroom,
Work with national laboratories, universities, and •H
 AZCADS: Distance
research the best hazard analysis methods and how Hazards and Learning ARP PROJECT
they can be applied to digital equipment and systems. Consequences Environment
STAMP, STPA, and FTA are all methods that will be Analysis for Digital (DLE) Training Technology Innovation Project
researched and determined how they can be utilized Systems with Programs (P41, P68, and
effectively to mitigate digital hazards. P183)

Gaps Addressed: Develop a repeatable TIES TO OTHER


methodology for identifying causal factors that can PROGRAMS
lead to plant consequences that are attributable to
digital components and systems. Nuclear Instrumentation
and Control (41.05.03),
Advanced Nuclear Technology
(41.08.01)

10300629
12
Cyber Security Program Guide

Major Past MEASURES OF SUCCESS


Future States: Utilities have a regulatory agnostic, Accomplishments
2019 2020 Future
technically sound, risk informed and performance- Program Guide is used by
based framework for implementing a cyber security members as needed to assist
program. This guidance document will guide the NUCLEAR INSTRUMENTATION AND CONTROL PROGRAM ANNUAL RESEARCH with implementing a sound
facility and owner/operator to securing their facility. PORTFOLIO (P41.05.03) cyber security program
worldwide
Cyber Security Cyber Security Cyber Security Revision of Program
Description: This program guide can be used by
Program Guide for Program Guide Program Guide Guide that allows
any facility or owner/operator implementing a risk-
Nuclear Facilities Tech Transfer Tech Transfer for cross-sector use
informed cyber security program. DELIVERABLE TYPE
cases and provides
additional guidance
Action Plan: Cyber Security Program Guide Technical reports, updates,
Research existing regulatory frameworks such as member updates
IEC 62443 and others to provide a risk informed
framework that synthesizes existing guidance.
The program guide should integrate other risk ARP PROJECT
informed approaches where appropriate such as
the EPRI Technical Assessment Methodology for Nuclear Instrumentation and
performing assessments, or using the Supply Chain Control (41.05.03)
Procurement Methodology and using HAZCADS for
determining digital causal factors that can lead to TIES TO OTHER
a plant consequence. The program guide should PROGRAMS
also integrate security metrics to monitor the overall
performance of the program as appropriate.

Gaps Addressed:
Develop a regulatory agnostic technical based
program that mitigates cyber security threats.

10300629
13
Cyber Security in the Supply Chain

Major Past MEASURES OF SUCCESS


Future States: Utilities have the capability to Accomplishments
2019 2020 Future
leverage a common supply chain security and Methodology to address
procurement methodology across all of their business security in the supply chain
units that provides a common understanding among EPRI TECHNOLOGY INNOVATION CROSS-CUTTING CYBER SECURITY PROGRAM adopted by utilities
all parties in the supply chain and incorporates a and suppliers
• Cyber Security • Supply Chain •
 Supply Chain •
 Vendor
risk informed process in the development of the
Procurement Tech Transfer Tech Transfer Qualifications
target asset and supply chain integrity cyber security
Methodology for • Supply Chain • Supply Chain • Receipt
requirements. DELIVERABLE TYPE
Power Delivery Case Studies Field Guides Inspections and
Systems for All sectors • Digital Warehousing
Description: The supply chain for existing and Technical reports, updates,
• Cyber Security (Generation, Procurement for Generation
new nuclear generating stations, as wells as other member updates, training
Procurement Nuclear, PDU) Methodology Facilities
generation, transmission, and distribution facilities, deliverables including CBT
Methodology, • Supply Chain Rev. 3
represents a significant cyber-attack pathway for modules
Rev 2 SDID Guide • Cyber Security
digital assets and systems. There are several key
• Supply Chain Design
issues associated with the supply chain that affect
Field Guides Engineering
both buyers and suppliers including software/ ARP PROJECT
• Supply Chain
firmware of unknown provenance, unknown hardware
CBT Modules,
development sources, counterfeit hardware and Technology Innovation Project
Classroom,
software components that may contain malicious with Programs (P41, P68, and
Distance
code, lack of universal technical standards for cyber P183)
Learning
security in the supply chain, regulatory uncertainty,
Environment
risk transference where buyers and suppliers attempt TIES TO OTHER
(DLE) Training
to transfer cyber security risk to the other entity, PROGRAMS
uncertainty about where integration occurred and
who performed the integration, improperly vetted or P41.05.03 Nuclear
managed technical services, commingling of target development of cyber security procurement specifications for a target asset by providing a Instrumentation and Control,
asset cyber security requirements with supply chain clear division of responsibility between the buyer and supplier using a graded approach, P41.08.01 Advanced Nuclear
integrity requirements, and lack of visibility into lower as well as development of supply chain integrity specifications while a target asset is in a Technology,
tier suppliers and processes. supply chain segment or in transition. Instrumentation & Control and
Automation (P68),
Action Plan: Security in the Supply Chain Gaps Addressed: P183 PDU - Cyber Security
The procurement methodology developed for this The lack of techniques, including strategies, to address potential cyber security P209 (2020)
future state introduces a supply chain model to vulnerabilities in the supply chain.
establish common understanding among all parties
in the supply chain and integrates the EPRI Technical
Assessment Methodology (TAM) guidance to assist
in the development of target asset and supply chain
integrity cyber security requirements. This provides
a risk informed process for determining the attack
surface of a target asset or system and mitigating the
attack surface with engineered or site/shared cyber
security control methods. This methodology enables

10300629
14
Protect
The NIST Cybersecurity Framework defines the
Protect Function as “Develop and implement
appropriate safeguards to ensure the delivery of
critical services.” Specifically, the activities in this
function involve “the ability to limit or contain the
impact of a potential cyber security event.”

Categories within this Function include:


• Identity Management and Access Control;
• Awareness and Training;
• Data Security;
• Information Protection Processes and
Procedures;
• Maintenance; and
• Protective Technology

The following Future States support the business


processes and technologies required to effectively
and efficiently execute activities within the Protect
Function’s categories:
•S ecurity Architecture for Flexible and Resilient
Utility Systems
•P rotective Measures for Distributed Energy
Resources
•P rotective Measures for Generation Industrial
Control Systems

10300629
15
Security Architecture for Flexible and Resilient Utility Systems

Future State: Flexibility and resiliency have become the foundational work of 2018 and tackle the challenge of creating reference architectures for distribution grid
critical concerns for the OT infrastructure supporting modernization and large-scale renewable generation.
utility systems. Security architecture patterns supporting
these characteristics are available to industry for timely Especially the following topics will be examined:
analysis of emerging vulnerabilities and establishment • Security Architecture for DER integration
of practical risk mitigation strategies. • Cyber security Considerations for Distributed Energy Storage
• Security Architecture using Software Defined Network (SDN)
Description: The rapid changes occurring in the • Security Architecture for Large-Scale Renewables
grid demand flexibility and resiliency of the grid, • Security Architecture for utility IoT
in addition to reliability. The modern technologies • Security Architecture for Electric Vehicle Service Equipment (EVSE)
adopted to support this demand depend increasingly • Updating NESCOR Failure Scenario for grid-edge systems
on digitalization and interconnection, expanding • Attack modeling for utility OT infrastructure
attack surface exponentially. To maintain security in
such rapid expansion, cyber security professionals Gaps Addressed:
require the ability to design and deploy key security The lack of practical security reference architecture that can be modified and applied into a utility OT environment in a
controls quickly and analyze and mitigate emerging short period of time.
vulnerabilities in a timely manner.
Security architecture research aims to identify Major Past
system architecture patterns for various areas of Accomplishments
2019 2020 Future
utility operations and provide multiple reference
architectures with built-in security controls. The security
POWER DELIVERY CYBER SECURITY ANNUAL RESEARCH PORTFOLIO (P183)
reference architectures can be used for:
• Design and deployment of new systems •A
 ttack surface analysis Attack modeling for utility Security Architecture for Security Architecture using
• Security augmentation of old systems for micro-grid OT infrastructure utility IoT Software Defined Network
• Architectural review of current systems •S
 ecurity architecture for
• Remediation of discovered security vulnerabilities distribution systems
•C
 yber security
In addition, the research also suggests methodologies considerations for
for vulnerability analysis and attack modeling, which distribution operators
can be utilized for the configuration of security
controls.
EPRI TECHNOLOGY INNOVATION CROSS-CUTTING CYBER SECURITY PROGRAM
Action Plan: Reference Architectures •S
 ecurity Architecture for • Security Architecture for Security Architecture for
The project will run as a multi-year effort, addressing DER integration EVSE EVSE (continue)
different areas of utility OT systems each year. In the  yber security
•C • Updated NESCOR
past, the focus was given to the transition for legacy, Considerations for Attack Scenarios for
transient, and future substations. In 2018, the project Distributed Energy Grid-edge systems
focused on current systems supporting distribution Storage (continue)
operations – DMS, ADMS, GIS, ORMS, DERMS, etc., •U
 pdated NESCOR
and the surrounding infrastructures. To complete the Attack Scenarios for
picture, the project collaborated with P200 Distribution grid-edge systems
Operations and Planning to address cyber security
guidelines for distribution operators, who are the Continued next page
main users of this system. The project will leverage
10300629
16
Security Architecture for Flexible and Resilient Utility Systems/continued

Major Past MEASURES OF SUCCESS


Accomplishments
2019 2020 Future
• Utilities contribute to the
development of reference
GENERATION INSTRUMENTATION, CONTROLS, AND AUTOMATION CYBER SECURITY SUPPLEMENTAL architecture and attack models
PROJECT (P68) • Utilities utilize architecture
patterns and attack models
•G
 eneration DCS
• Other EPRI programs or
Reference Architectures
external parties utilize research
•S
 ecure Remote Access
results
Reference Architecture

DELIVERABLE TYPE
GENERATION CYBER SECURITY ANNUAL RESEARCH PORTFOLIO (P209)
Investigative reports
Reference Architecture for Reference Architecture
Large-Scale Renewables for Generation
Cyber Security Interdependencies ARP PROJECT

P183.012: Cyber Security


Architecture
P68 Supplemental and P209
(2020)

TIES TO OTHER
PROGRAMS

Electric Transportation (P18),


Energy Storage and Distributed
Generation (P94), Information
and Communication Technology
(P161), Integration of Distributed
Energy Resources (P174)

10300629
17
Protective Measures for Distributed Energy Resources

Major Past MEASURES OF SUCCESS


Future States: Effective cyber security strategies Accomplishments
2019 2020 Future
are implemented in the multi-party grid where large • Utility members contribute
numbers of distributed energy resources are deployed to the development of
and managed by utilities, customers and various third EPRI TECHNOLOGY INNOVATION CROSS-CUTTING CYBER SECURITY PROGRAM guidelines, requirements, or
parties. white paper
Device Hardening Communication Utility guidelines • Utility members utilize
Description: Distributed Energy Resources (DER), Guide for DER security guidelines for system security research results in their
including solar photovoltaics, battery storage, electric Integration for DER Integration management for current projects or
vehicles, demand response, and axiomatic devices, DER/DERMS operations
and sub-systems and systems, are connected to the • Other EPRI programs or
grid in ever-increasing numbers. Integrated DER external parties utilize
can perform advanced grid-supportive services, research results
but in order to enable these services, the devices Gaps Addressed:
must be connected; and data must flow among The lack of commonly accepted cyber security solutions for communication and
different systems. The growing presence of utility and operational security for customer-, utility- or third-party owned assets/systems. DELIVERABLE TYPE
third-party owned DER has introduced significant
challenges for cyber security. Effective cyber security Investigative results
requires utilities to understand potential threats and to
implement cyber security governance, architectures,
technology solutions, and business processes. ARP PROJECT

Action Plan: TBD


EPRI will take a multi-pronged approach to address
cyber security needs for the fast-changing world of TIES TO OTHER
DERs. Multiple studies, tests, and assessments will be PROGRAMS
conducted in over-lapping time scale, focusing on
the risks that are introduced to the reliability of the Electric Transportation (P18),
distribution or even bulk transmission grids. Energy Storage and
Distributed Generation (P94),
This action plan includes: Information and
• Survey cyber security leading practices and Communication Technology
solutions for management of utility, customer and (P161), Integration of
third-party owned devices, addressing configuration Distributed Energy Resources
management, patch management, and change (P174), Instrumentation &
management Control and Automation (P68)
• Research and test new technologies and approaches
for securing communications among DER systems
owned by multiple parties
• Further, refine electric sector-specific guidelines
for cyber security and data protection for DER
integration

10300629
18
Protective Measures for Generation Industrial Control Systems

Major Past MEASURES OF SUCCESS


Future States: Methodologies, process guidance, Accomplishments 2019 2020 Future
and technology to protect against a cyber attack in • Increased cyber security
generation facilities are available and widely adopted. posture and readiness
GENERATION INSTRUMENTATION, CONTROLS, AND AUTOMATION CYBER levels within the industry
Description: This research focus area concentrates SECURITY SUPPLEMENTAL PROJECT (P68) • Integration of process
on technical and operational security control methods guidance, methodologies,
• Interactive Remote • Hardening Field
to protect against an attack. Generation Sector Access and technology into
Guides
research in this area has included interactive remote • Configuration generation utility cyber
• Advanced
access, patch management, hardening, access and Management and security program
Vulnerability
identity management. Additional research needs Hardening environments
Grading Tool
in this area include identity management and • Patch Management • Integration of process
•A  ccess and
• Secure Remote
governance, cryptography, asset and configuration guidance, methodologies,
Permission Access Pilots
management, advanced boundary devices, hardware- and technology into other
based decentralized secure remote access, secure Management EPRI programs
• Technical
architectures and effective personnel awareness
Assessment
programs.
Methodology
DELIVERABLE TYPE
Action Plan: EPRI will conduct research and
development on many different aspects of Major Past Technical results (Knowledge
protection against a cyber attack in a generation Accomplishments 2019 2020 Future base, process guidance, and
plant. Because of the unique nature of generation application deliverables)
control system networks and interaction with cyber- GENERATION CYBER SECURITY ANNUAL RESEARCH PORTFOLIO (209)
physical processes, EPRI will focus the research and
development efforts working with utility members, • Network • Secure Wireless ARP PROJECT
industry subject matter experts, and third-party Connectivity and •A  pplication White
research partners (such as government and university). Segmentation listing P68 Supplemental, P209
Depending on the sector and programmatic maturity, • Cryptography •A  utomated Patch (2020)
research results may be presented as knowledge Management and
and
Regression Testing
base documents, generation-specific guidance, or Authentication TIES TO OTHER
•H  ardening Field
application-type deliverables. • Integration of Guides
PROGRAMS
Physical and • Integration of
Gaps Addressed: Cyber Security Physical and Cyber Instrumentation & Control
• Research on how to protect generation-specific •D  CS Integrated Security and Automation (P68),
equipment from a cyber attack Architecture and •S  ecuring non-DCS Maintenance and Reliability
• Understanding of the methodologies, technologies, Active Directory Assets (P69), Operations (P108),
and procedures that are appropriate in a •H  ardening Field •U  sing Advanced Renewables (P193)
generation plant and integrate with legacy existing Guides Security Techniques
equipment to provide protective functions against in Virtualization
•U  sing and
cyber attacks
Protecting RTOS
• Advanced
Boundary Device
Architectures
•H  ardening Field
10300629 Guides
19
Detect
The NIST Cybersecurity Framework defines the
Detect Function as “Develop and implement
appropriate activities to identify the occurrence of
a cybersecurity event.” Specifically, the activities
in this function “enable timely discovery of
cybersecurity events”.

Categories within this Function include:


• Anomalies and Events;
• Security Continuous Monitoring; and
• Detection Processes

The following Future States support the business


processes and technologies required to effectively
and efficiently execute activities within the Detect
Function’s categories:
• Incident Detection
• Threat Management

10300629
20
Incident Detection

Future State: Utilities will have the tools and Gaps Addressed:
capabilities to effectively monitor and detect cyber • Situational awareness for the entire utility environment, including IT, OT, physical security,
security incidents. They will have solutions in place and operations
to integrate event monitoring and response for IT, • Tools needed to analyze the significant amount of data collected for security operations
OT, physical security, power system operations, and • Solutions for automating incident detection and prioritization are needed to augment the
external threat information. As part of the incident ISOC capabilities
management response, utilities will have the skills and • Effective application of IDS/IPS tools in the OT environment has not been achieved
tools to conduct effective forensics analysis in the OT
environment. New solutions will emerge to automatically
detect and prioritize security events using machine- Major Past
learning technology. Additionally, data analytics will be Accomplishments
2019 2020 Future
a mainstream tool utilized by utilities to determine trends
for cyber security event information and develop decision
models for incident monitoring and detection. POWER DELIVERY CYBER SECURITY ANNUAL RESEARCH PORTFOLIO (P183)

• ISOC Guidebook • ISOC Guidebook • ISOC Guidebook Artificial intelligence for


Description: The objective of this project is to increase
• Guidelines for planning update update predictive analysis
the capabilities and efficiency of incident detection
an ISOC • Utilizing artificial • Utilizing artificial
for power delivery and generation systems through
• Guidelines for intelligence and intelligence and
innovative monitoring solutions.
integrating control machine-learning for machine-learning for
center systems into incident management incident management
Action Plan: The Integrated Security Operations
an ISOC • Data analytics • Data analytics for
Center (ISOC)
• Guidelines for guidelines for incident incident management;
This project provides guidelines and solutions for
integrating the management utilizing use cases and
implementing a security operations center that integrates
substation and field • Review and update determining trends for
monitoring and response for IT, OT, physical security, grid
domain into an ISOC the National Electric machine-learning
operations events, and external threat information. The
• IDS/IPS guidelines for Sector Cyber security
ISOC will enable power delivery system owners to:
power deliver systems Organization Resource
• Enhance incident monitoring and detection capabilities
• ITAF framework and (NESCOR) failure
• Improve incident response times
utility testing scenarios
• Contain incidents
• Reduce operational impact of incidents

Action Plan: Intrusion Detection/Prevention POWER DELIVERY CYBER SECURITY SUPPLEMENTAL PROJECT – INTRUSION DETECTION/PREVENTION SYSTEMS
Systems (IDS/IPS) Solutions Analysis and Testing (IDS/IPS) SOLUTIONS ANALYSIS AND TESTING FOR ICS ENVIRONMENTS (P183)
for ICS Environments Project launched Interim test results and Final report published
This project will provide guidance for the evaluation of draft report
IDS/IPS solutions and will evaluate effectiveness of IDS/
IPS solutions during various types of cyber-attacks and
incidents. The resulting knowledge will help utilities
save time and money by eliminating the need to set up
their own testing environments, benefit from pooled
knowledge, and may improve their vendor selection
processes. Continued next page
10300629
21
Incident Detection/continued

Action Plan: Incident Detection for DER Systems


Enhance utility threat detection and response capabilities by 1) developing and testing new threat detection technologies for DER
systems and 2) exploring solutions for monitoring power distribution system behavior for early identification and isolation of cyber
security incidents. PDU Program P183: Incident Detection for DER and Grid-Edge Systems

Gaps Addressed:
Accelerating the development and adoption of new technologies that could enable effective threat detection and response for DER
assets, systems, or supporting network infrastructure.

Major Past
Accomplishments
2019 2020 Future

EPRI TECHNOLOGY INNOVATION CROSS-CUTTING CYBER SECURITY PROGRAM

Advanced security event  dvanced security event


A
monitoring and threat monitoring and threat
detection for DER systems – detection for DER systems –
exploring solutions for early exploring solutions for early
detection and isolation detection and isolation

Continued next page


10300629
22
Incident Detection/continued

MEASURES OF SUCCESS
Action Plan: Incident Detection for Generation Facilities
The Generation Sector’s research in this area includes control network scanning and security status event monitoring. Additional • Situational awareness is fully
research includes monitoring and inspection of control system protocols, network and system level monitoring, real-time detection achieved for power delivery
and notification, data analytics, monitoring devices in the M&D center and plant security integration with Integrated Security system owners
Operation Centers (ISOC). • Incident management solutions
and processes are available
Gaps Addressed: and utilized for power deliver
• Research on how to detect cyber attacks in generation-specific DCS and control system networks systems
• Understanding of the methodologies, technologies, and procedures that are appropriate in a generation plant and integrate with • Artificial intelligence and
legacy existing equipment to provide detection mechanism for cyber attacks machine-learning are utilized
for incident management
Major Past • Data analytics solutions have
Accomplishments
2019 2020 Future been applied to the incident
management process

GENERATION INSTRUMENTATION, CONTROLS, AND AUTOMATION CYBER SECURITY SUPPLEMENTAL PROJECT (P68)
DELIVERABLE TYPE
•R  eal-time Detection •N
 etwork and System
Overview Monitoring
Technical updates, investigative
•C  ontrol Systems Protocols •D
 ata Analytics and Incident
results, working group
and Scanning Detection
•S  ecurity Status (Event)
Monitoring
ARP PROJECT
• ISOC and M&D Integration
183.005: Incident Response
(2018)
Major Past P68 Supplemental Project, P209
Accomplishments
2019 2020 Future (2020)

TIES TO OTHER
GENERATION CYBER SECURITY ANNUAL RESEARCH PORTFOLIO (P209) PROGRAMS
•S
 ecuring DCS and • Securing DCS and
Substations (P37), Distribution
Generation Control System Generation Control System
(P180), Integration of DER
Protocols Protocols
(P174), Instrumentation &
•N
 etwork and Asset • Integrated Event Monitoring
Control and Automation (P68),
Discovery and Visualization Frameworks (ISOC)
Operations (P108)
•D
 ata Analytics and Incident • Detection and Correlation
Detection Across Different OT
Networks
• Plant Data Analytics for
Cyber Incident Detection

10300629
23
Threat Management

Major Past MEASURES OF SUCCESS


Future State: Utilities will have the tools and Accomplishments
2019 2020 Future
capabilities to manage and mitigate threats. • Prioritizing and addressing
threats that are considered
POWER DELIVERY CYBER SECURITY ANNUAL RESEARCH PORTFOLIO (P183)
Description: The objective of threat and vulnerability important (e.g., implement
management is to establish and maintain plans, • Investigated and Guidelines for Develop  ilot testing of
P mitigating controls, monitor
procedures, and technologies to detect, identify, contributed to OT integrating threat automated automated threat threat status)
analyze, manage, and respond to cyber security Threat Modeling intelligence feeds response to threat response system • Threat hunting capabilities
threats and vulnerabilities, commensurate with the Language tools for protecting OT intelligence for OT for OT systems
risk to the organization’s infrastructure (for example for OT systems systems systems • Exchange of threat
critical, IT, or OT) and organizational objectives. •G  uidelines for information for OT
Advanced Threat Management for should: threat hunting protocols, applications, and
• Be adaptive to the changing threat environment techniques for systems
• Incorporate threat intelligence into automated OT systems • Development of tools
response systems •T  hree successful that enable the effective
• Rapidly contain cyber incidents Birds of a penetration testing of ICS
• Provide a better understanding of the impact of Feather Threat systems
decisions on power system operations Management • Discovery of new, zero
• Identify and measure the impact of a cyber security Workshops day, vulnerabilities in utility
incident focused ICS systems

Action Plan: Threat and Vulnerability POWER DELIVERY CYBER SECURITY SUPPLEMENTAL PROJECT – INTRUSION
Management DETECTION/PREVENTION SYSTEMS (IDS/IPS) SOLUTIONS ANALYSIS AND TESTING DELIVERABLE TYPE
• Provide visibility into indicators of compromise FOR ICS ENVIRONMENTS (P183)
across the entire enterprise Investigative results
• Incorporate threat intelligence into automated • Identify ICS • Identify more  rovide on going
•P
response systems vulnerabilities advanced ICS training to utility
• Develop automated threat response systems for and means of vulnerabilities members ARP PROJECT
utility environments exploitation and mitigations •P
 rovide on
• Develop guidebooks to contain cyber incidents more • Investigate •B  uild the going discovery P183.006: Threat
rapidly vulnerability capabilities to do of advanced Management (2018)
• Ability to identify and measure the impact of a cyber mitigations and in house industry vulnerabilities
security incident. solutions. training in utility focused TIES TO OTHER
• Develop the capabilities to discover vulnerabilities in • Provide ICS solutions PROGRAMS
a utility ICS environment training on ICS
penetration Substations (P37),
Gaps Addressed: testing best Distribution (P180)
• The lack of utility focused tools to facilitate threat practices
and vulnerability management
• The lack of trained subject matter experts that are
capable of performing penetration testing and
hunting in a utility environment

Continued next page


10300629
24
Threat Management/continued

Major Past MEASURES OF SUCCESS


Action Plan: Threat Management for Accomplishments 2019 2020 Future
Generation Systems • Situational awareness of
This action plan focuses on understanding and staying current and evolving threats
apprised of current threats, vulnerabilities, and trends GENERATION INSTRUMENTATION, CONTROLS, AND AUTOMATION CYBER effecting the generation
for Generation Systems. Research in this area includes SECURITY SUPPLEMENTAL PROJECT (P68) sector
guidance on using multiple information sources to • Adaptation of threat
understand and gauge the threat, understanding Quick Briefs/ • Coordination information used within
new emerging threats, evaluating vulnerabilities, Analysis on with the the generation sector for
and distilling and interpreting threat information Forming or Technical protection, detection, and
by informing the cyber security program and Impending Assessment response & recovery
posture to stay ahead of an advancing adversary’s Cyber Threats to Methodology • Use of 3rd Party information
sophistication. Generation • Changing Threat in generation focused
Landscape Study threat protection activities
Gaps Addressed:
• Understanding of the current threat landscape and
trends associated with the Generation Sector Major Past DELIVERABLE TYPE
• Understanding the impact of vulnerabilities in Accomplishments 2019 2020 Future
Generation-specific industrial control system Technical updates, working
equipment groups, technical results
• Implementing threat intelligence feeds into risk GENERATION CYBER SECURITY ANNUAL RESEARCH PORTFOLIO (P209) p68 (knowledge base, guidelines,
management approaches application deliverables)
 • Coordination •T  hreat
with the Technical Information
Assessment Sharing and ARP PROJECT
Methodology Collaboration
• Advanced •T  echnologies P183
Skills Training: and Services for P68 Supplemental, P209
Threat Threat Discovery/ (2020)
Hunting in Mitigation
DCS Systems • I ndicator TIES TO OTHER
• Threat Hunting in Development PROGRAMS
DCS Systems Techniques,
Technologies, Instrumentation & Control
and Standards and Automation (P68)
• Distilling Internal
and 3rd Party
Information
•D  efense-in-
Depth Holistic
Protection
Measures

10300629
25
Respond &
Recover
The Respond and Recover Functions are grouped
together in this Roadmap since they are often
developed jointly within organizations. The NIST
Cybersecurity Framework defines the Respond
Function as “Develop and implement appropriate
activities to take action regarding a detected
cybersecurity incident.” Categories within this
Function include:
• Response Planning;
• Communications;
• Analysis;
• Mitigation; and
• Improvements.

The Recover Function is defined as “Develop and


implement appropriate activities to maintain plans
for resilience and to restore any capabilities or
services that were impaired due to a cybersecurity
incident.” Categories within this Function include:
• Recovery Planning;
• Improvements; and
• Communications

The following Future States support the business


processes and technologies required to effectively
and efficiently execute activities within the Respond
and Recover Functions’ categories:
•C yber Security Forensics for Industrial Control
Systems
•R espond & Recover Capabilities for Generation
Facilities

10300629
26
Cyber Security Forensics for Industrial Control Systems

Major Past MEASURES OF SUCCESS


Future States: Utilities will have the tools and Accomplishments
2019 2020 Future
capabilities to conduct effective forensics analysis ICS forensics capabilities are
in an OT environment. available and utilized for
POWER DELIVERY CYBER SECURITY ANNUAL RESEARCH PORTFOLIO (P183) power delivery systems
Description: Incident Response is the process
•G  uidelines for • ICS Forensics • ICS Forensics
of containing and recovering from cyber security
an ICS forensics Analysis Analysis
events. The objective of this project is to increase the DELIVERABLE TYPE
program Guidelines Guidelines
capabilities and efficiency of incident response through
• ICS Forensics • ICS Forensics • ICS Forensics
innovative forensics solutions and technical tabletop Investigative results, working
Working Group Working Group Working Group
exercises. These capabilities also will aid utilities in group
understanding the origin of incidents and the impact •P  ower Delivery
on power system operations. Forensics
Tabletop Testing
ARP PROJECT
Action Plan: Cyber security Forensics for and Drills
Industrial Control Systems (ICS) Methodology
183.005: Incident Response
This project provides guidelines and methods for (2018)
utilities to manage security incidents in the latter
stages of the incident management process including TIES TO OTHER
response to incidents, recovery and continuity of PROGRAMS
operations, and post-incident analysis and action. This
project will improve the forensics capabilities of power Substations (P37),
delivery system owners by: Distribution (P180),
• Providing methods for detection of cyber security Instrumentation & Control
incidents in ICS systems and Automation (P68),
• Identifying tools that support forensics in ICS systems Instrumentation & Control
• Improving processes for sharing information related (P41)
to ICS cyber security incidents for:
– Entities involved in the internal and external
forensics process
– Peer utilities
– Industry partners
– Solution providers

Gaps Addressed:
The lack of forensics tools and processes for the
industrial control system or OT environment.

10300629
27
Respond & Recover Capabilities for Facilities

Major Past MEASURES OF SUCCESS


Future States: Facilities will have the guidelines and Accomplishments
2019 2020 Future
processes necessary to efficiently respond and recover • Incident management
from a cyber security attack. solutions and processes
GENERATION INSTRUMENTATION, CONTROLS, AND AUTOMATION CYBER are available and utilized
Description: This research area focuses on technical SECURITY SUPPLEMENTAL PROJECT (P68) for all sectors (Generation,
and operational security control methods to respond Nuclear, and PDU)
Incident Response Incident Detection
and recover from an attack. Research needs in this • Incident response and
Guideline and Classification
area include identifying a cyber-attack, back-up and preparedness is improved
(Generation) Field Guide
recovery, incident classification and response, and within the generation sector
industry operating experience and forensic analysis. • Data analytics and
Monitoring and Diagnostics
Gaps Addressed: data is used to inform
Major Past
• Research on how to respond and recover from a
Accomplishments
2019 2020 Future incident response
cyber-attack in DCS and control system networks capabilities
• Understanding of the methodologies, technologies,
and procedures that are appropriate in a generation EPRI TECHNOLOGY INNOVATION CROSS-CUTTING CYBER SECURITY PROGRAM
plant and integrate with legacy existing equipment DELIVERABLE TYPE
to provide response and recovery functions to • Cross Sector • Playbook
include augmenting disaster management Plant Testing Development Working groups, technical
• Investigate backups and reconstitution methods for and Drills • Response results (knowledge base,
legacy, emerging technologies, and automation, Methodology and Recovery guidelines, application
and DCS targeted for critical infrastructure plants • Generation Integration into deliverables)
Cyber Incident Disaster Recovery
Scenarios Operations
• Nuclear •P  lant Response ARP PROJECT
Cyber Incident Functions
Scenarios Integration into P68 Supplemental, P209
• PDU Cyber Corporate ISOCs (2020)
Security Incident •B  ackup and
Scenarios Restoration Best TIES TO OTHER
Practices PROGRAMS
•E  xternal Support
and Intelligence Power Delivery Cyber Security
•F  orensics in (P183), Instrumentation &
DCS Incident Control and Automation
Response (P68), P41.05.03 Nuclear
Instrumentation & Control

10300629
28
Glossary and Acronym Definitions

A D IED: Intelligent Electronic Devices


ACM: Asset and Configuration Management DCS: Distributed Control System IoT: Internet of Things
ADMS: Advanced Distribution Management Systems DER: Distributed Energy Resources IOUs: Investor owned utilities
AHR: Air-conditioning, Heating, and Refrigeration DERMS: Distributed Energy Resource IP: Internet Protocol
Institute Management System IPS: Intrusion Protection System
AMI: Advanced Metering Infrastructure Distributed Control System IR: Incident Response
ANL: Argonne National Laboratory DLE: Distance Learning Environment IRM: Interface Reference Model
ANSI C12.22: American National Standard for Protocol DMD: Distribution Modernization Demonstration ISOC: Integrated Security Operations Center
Specification for Interfacing to Data Communication DMR: Digital Mobile Radio IT: Information Technology
Networks DMS: Distribution Management System ITAF: Integrated Threat Analysis Framework
APPA: American Public Power Association DNP3: Distributed Network Protocol ITIL: Information Technology Infrastructure Library
DR: Demand Response
B DRAS: Demand Response Automation Server L
Backhaul: The backhaul portion of the DRMS: Demand Response Management System LMR: Land mobile radio
telecommunications network comprises the intermediate
links between the core network, or backbone network E M
and the small subnetworks at the “edge” of the entire EA: Enterprise Architecture M&D: Monitoring and Diagnostic
hierarchical network EDM: External Dependencies Management MG: Microgrid
BES: Bulk Electric System EEI: Edison Electric Institute MOM: Message-oriented middleware
Bitcoin: A cryptocurrency and a payment system EMI/RFI: Electromagnetic and Radio Frequency MPLS: Multi Protocol Label Switching
BlockChain: A distributed database that maintains a Interference MVNO: Mobile virtual network operator
continuously-growing list of ordered records called blocks EPIC: California Electric Program Investment Charge
EPRI: Electric Power Research Institute N
C EVSE: Electric Vehicle Service Equipment NAN: Neighborhood Area Network
CBT: Computer Based Training NaN: Stands for not a number, is a numeric data type
CCF: Common Cause Failure F value representing an undefined or unrepresentable value
CCOMS: Cyber combat simulator FAN: Field Area Network NERC: North American Electric Reliability Corporation
CEC: California Energy Commission FCC: Federal Communications Commission NESCOR-Cybersecurity: National Electric Sector
CIM: Common Information Model FLISR: Fault location, isolation, and service restoration Cyber Security Organization Resource
CIP: Critical Infrastructure Protection FTA: Fault Tree Analysis NFV: Network Functions Virtualization
CM: Configuration Management NIS: Network and Information Security
COP: Common Operating Picture G NIST: U.S. National Institute of Standards and
COTS: Commercial Off-the-Shelf GIS: Geospatial Information System Technology
CPM: Cyber Security Program Management NMS: Network management station
CS: Cyber Security H NOC: Network operations center
CSF: NIST Cybersecurity Framework (CSF) Reference Tool HAZCADS: Hazard Consequence Analysis for Digital NRECA: National Rural Electric Cooperative
Systems Association
NREL: National Renewable Energy Lab
I
ICS: Industrial control systems environment O
ICT: Information and Communications Technology O&M: Operation and Maintenance
IDS: Intrusion Detection System ODI: Outage Data Initiative
IEC: International Electrotechnical Commission OFDM: Orthogonal Frequency Division Multiplexing
10300629
29
Glossary and Acronym Definitions

OMS: Outage Management System R U


OP: Operations Technology RF: Low-power RF networking refers to the use of UAS: Unmanned aerial system
OpenADR: Open Automated Demand Response 315 MHz/433 MHz/780 MHz/2.4-GHz frequencies with UTC: Utilities Technology Council
OpenESB: Open Enterprise Service Bus transmit power equal to or less than 50 mW
OpenFMB: Open Field Message Box RF LAN: Radio Frequency-Local Area Network V
OpenWMS: Open Workflow Management System RM: Risk Management VLAN: Virtual local area network
ORM: Object-relational mapping VoLTE: Voice over LTE (Long Term Evolution)
OSI: Open Systems Interconnection S VPP: Virtual Power Plant
OT: Operational Technology SA: Secure Authentication
SANS: The SANS Institute was established in 1989 as a W
P cooperative research and education organization. SANS WAN: Wide Area Network
P25: Project 25 (or APCO-25) Standards for digital is the most trusted and by far the largest source for Wi-Sun: Alliance promoting open interoperable industry
radio communications information security training and security certification in standards for smart utility network communications
PDP: Pre-Demonstration Project the world WSDL: An XML format for describing network services
PDU: Power Delivery Utilization SAS: (previously "Statistical Analysis System") is a as a set of endpoints operating on messages containing
PHY: Is an abbreviation for the physical layer of the OSI software suite developed by SAS Institute for advanced either document-oriented or procedure-oriented
model and refers to the circuitry required to implement analytics, multivariate analyses, business intelligence, information. The operations and messages are described
physical layer functions data management, and predictive analytics abstractly, and then bound to a concrete network protocol
PHY: PHYsical Layer SCRAM: Security, cyber, risk assessment methodology and message format to define an endpoint
PHY and MAC: PHY chips handle the physical layer SDN: Software Defined Network
(Layer 1 of the OSI model), while MAC chips handle the SDO: Standards Development Organization X
data link layer (Layer 2 of the OSI model). MAC is SME: Subject Matter Expert XSD: (XML Schema Definition), a recommendation of the
Media Access Control which will control the transfer of SOA: Service-Oriented Architecture World Wide Web Consortium (W3C)
data from PHY SPN: Supplemental Opportunity
Physical Layer L1: In the seven-layer OSI model of SPV: Single Point Vulnerability
computer networking, the physical layer or layer 1 is the STPA: Systems Theoretic Process Analysis
first and lowest layer. The implementation of this layer is
often termed PHY T
PLC Network Technology: PLC offers a unique means T&D: Transmission and Distribution
of communication for a power-supply system, which T&S: Transmission and Substations
takes full advantage of the wide coverage of power-line TAM: Technical Assessment Methodology
installations without having to lay dedicated cables. Like TDM: Time-division multiplexing
RF wireless modules, it’s easy to embed PLC modules into TETRA: Terrestrial Trunked Radio
electrical meters TI: Technology Innovations
PMU: Phasor measurement units Transport Layer L4: Transport layer is a conceptual
PRA: Probabilistic Risk Assessment division of methods in the layered architecture of
PV: Photovoltaics protocols in the network stack in the Internet Protocol Suite
PVNO: Private virtual network operator and the Open Systems Interconnection (OSI).
In the OSI model the transport layer is most often referred
Q to as Layer 4
QoS: Quality of service TVM: Threat and Vulnerability Management

10300629
30
The Electric Power Research Institute, Inc.
(EPRI, www.epri.com) conducts research and development
relating to the generation, delivery and use of electricity
for the benefit of the public. An independent, nonprofit
organization, EPRI brings together its scientists and
engineers as well as experts from academia and industry
to help address challenges in electricity, including reliability,
efficiency, affordability, health, safety and the environment.
EPRI also provides technology, policy and economic
analyses to drive long-range research and development
planning, and supports research in emerging technologies.
EPRI’s members represent approximately 90 percent of the
electricity generated and delivered in the United States,
and international participation extends to more than 30
countries. EPRI’s principal offices and laboratories are
located in Palo Alto, CA; Charlotte, NC; Knoxville, TN; and
Lenox, MA.

©2018 Electric Power Research Institute (EPRI), Inc. All rights reserved. Electric
Power Research Institute, EPRI, and TOGETHER...SHAPING THE FUTURE OF
ELECTRICITY are registered service marks of the Electric Power Research Institute.

3002014536

3420 Hillview Avenue, Palo Alto, California 94304-1338


PO Box 10412, Palo Alto, California 94303-0813, USA
800.313.3774 • 650.855.2121
askepri@epri.com • www.epri.com

To join, contact:
Power Delivery and Utilization Sector: Galen Rasche, 650.855.8779,
grasche@epri.com
Generation Sector: Jason Hollern, 704.595.2579, jhollern@epri.com
10300629 Nuclear Sector: Michael Thow, 704.595.2967, mthow@epri.com
31

You might also like