C L A R I T Y ▪ A S S U R A N C E ▪ R E S U LT S MIDWEST R E L I AB I L I T Y O R G AN I Z AT I O N Notable Changes to NERC Reliability Standard CIP-010-3 Cyber Security – Configuration Change Management and Vulnerability Assessments Bill Steiner MRO Principal Risk Assessment and Mitigation Engineer MRO CIP Version 5 Workshop February 12 and 18, 2015 Improving RELIABILITY and mitigating RISKS to the Bulk Power System Agenda Applicable Systems Baseline Configuration Concept Vulnerability Assessment Transient Cyber Assets and Removable media Plan(s) for Transient Cyber Assets Plan(s) for Removable Media CL A RI T Y ▪ A S S URA NCE ▪ RE S ULT S 2 Applicable Systems Notable Changes in CIP-010-3 This Standard includes the Configuration Management requirements for: • High Impact BES Cyber Systems • Medium Impact BES Cyber Systems • Electronic Access Control or Monitoring Systems (EACMS) • Physical Access Control Systems (PACS) • Protected Cyber Assets (PCA) CL A RI T Y ▪ A S S URA NCE ▪ RE S ULT S 3 Baseline Configuration Concept Notable Changes in CIP-010-3 Baseline Configuration Concept • The baseline concept is designed to provide clarity on requirement language (“Significant”) found in previous CIP Standard Versions • The baseline provides the triggering mechanism for when entities must apply the change management processes • Five required items in baseline: —Operating system(s) (including version) or firmware where no OS exist —Any commercially available or open-source application software (including version) intentionally installed —Any custom software installed —Any logical network accessible ports —Any security patches applied CL A RI T Y ▪ A S S URA NCE ▪ RE S ULT S 4 Baseline Configuration Concept Notable Changes in CIP-010-3 Baseline Configuration Concept (continued) • Authorize and document changes that deviate from the existing baseline (change management system) • Baseline document must be updated within 30 days of change • Prior to the change – determine security controls (CIP-005 and CIP-007) which could be impacted • Following the change – verify the controls have not been adversely impacted CL A RI T Y ▪ A S S URA NCE ▪ RE S ULT S 5 Baseline Configuration Concept Notable Changes in CIP-010-3 Baseline Configuration Concept (continued) • Document Results —Evidence must provide reasonable assurance of completion of the test • This is typically done by providing screen shots or electronic results of testing • STRONG procedural controls, which would include signed, dated, detailed test results along with clear expectations and instructions of work to be completed can meet this requirement CL A RI T Y ▪ A S S URA NCE ▪ RE S ULT S 6 Baseline Configuration Concept Notable Changes in CIP-010-3 High Impact Control Centers have additional requirements: • Changes which impact the baseline configuration must be tested in an environment which minimize adverse effects to the production environment —Environment must be sufficient to ensure CIP-005 and CIP-007 test will be meaningful • Along with the test results, the environment of the test must also be documented —Include measures which were used to account for differences • Must monitor at least every 35 days for changes to the baseline —Intent is for automated monitoring when possible, manual procedural controls when not CL A RI T Y ▪ A S S URA NCE ▪ RE S ULT S 7 Vulnerability Assessment Notable Changes in CIP-010-3 Must conduct a paper or active vulnerability assessment at least every 15 calendar months Initial assessment must be completed within 12 months after the effective date of CIP Version 5 Paper Vulnerability Assessment • Intended to be a comprehensive review and verification of security controls without the impact of active network scanning tools Active Vulnerability Assessment • Use of active discovery tools (Nmap, etc.) to provide Network (including wireless), Ports/services, and vulnerability assessment of enabled services • Required at least every 36 months (in a test environment) at High Impact Control Centers CL A RI T Y ▪ A S S URA NCE ▪ RE S ULT S 8 Transient Cyber Assets and Removable Media Notable Changes in CIP-010-3 Proposed Definition – Transient Cyber Asset (NERC Glossary of Terms) • A Cyber Asset that (i) is capable of transmitting or transferring executable code, (ii) is not included in a BES Cyber System, (iii) is not a Protected Cyber Asset (PCA), and (iv) is directly connected (e.g., using Ethernet, serial, Universal Serial Bus, or wireless, including near field or Bluetooth communication) for 30 consecutive calendar days or less to a BES Cyber Asset, a network within an ESP, or a PCA. Examples include, but are not limited to, Cyber Assets used for data transfer, vulnerability assessment, maintenance, or troubleshooting purposes. CL A RI T Y ▪ A S S URA NCE ▪ RE S ULT S 9 Transient Cyber Assets and Removable Media Notable Changes in CIP-010-3 Proposed Definition – Removable Media (NERC Glossary of Terms) • Storage media that (i) are not Cyber Assets, (ii) are capable of transferring executable code, (iii) can be used to store, copy, move, or access data, and (iv) are directly connected for 30 consecutive calendar days or less to a BES Cyber Asset, a network within an ESP, or a Protected Cyber Asset. Examples include, but are not limited to, floppy disks, compact disks, USB flash drives, external hard drives, and other flash memory cards/drives that contain nonvolatile memory. These types of devices represent the highest risk to BES Attachment 1 of CIP-010-3 • Details the required sections in the plan which must be implemented for Transient Cyber Assets and Removable Media CL A RI T Y ▪ A S S URA NCE ▪ RE S ULT S 10 Plan Requirements for Transient Cyber Assets Notable Changes in CIP-010-3 Highlights - Transient Cyber Assets owned by Registered Entities • Authorization (all apply) —Users, either individually, group, or role —Locations, either individually, group, or role —Uses, which shall be limited to what is necessary to perform business functions • Software Vulnerability Mitigation (use one or combination) —Security patching —OS and software from read-only media —System Hardening —Other method(s) CL A RI T Y ▪ A S S URA NCE ▪ RE S ULT S 11 Plan Requirements for Transient Cyber Assets Notable Changes in CIP-010-3 Highlights - Transient Cyber Assets owned by Registered Entities • Introduction of Malicious Code Mitigation (one or combination) —Antivirus software —Application whitelisting —Other method(s) • Unauthorized Use Mitigation (one or combination) —Restrict physical access —Full-disk encryption with authentication —Multi-factor authentication —Other method(s) CL A RI T Y ▪ A S S URA NCE ▪ RE S ULT S 12 Plan Requirements for Transient Cyber Assets Notable Changes in CIP-010-3 Highlights - Transient Cyber Assets managed by Third Party • Software Vulnerabilities (one or combination) —Review installed security patch(es) —Review security patching process used by the party —Review other mitigation performed by the party —Other method(s) CL A RI T Y ▪ A S S URA NCE ▪ RE S ULT S 13 Plan Requirements for Transient Cyber Assets Notable Changes in CIP-010-3 Highlights - Transient Cyber Assets managed by Third Party, (continued) • Introduction of malicious code mitigation (one or combination) —Review antivirus update level —Review antivirus update process used by the party —Review of application whitelisting used by the party —Review use of OS and software executable on from read-only media —Review of system hardening used by the party —Other method(s) • Determination of 3rd party policies for sufficiency CL A RI T Y ▪ A S S URA NCE ▪ RE S ULT S 14 Plan Requirements for Removable Media Notable Changes in CIP-010-3 Highlights - Removable Media • Authorization —Users, either individually, by group, or role —Locations, either individually or by group • Malicious Code Mitigation —Use method(s) to detect malicious code on Removable Media using a Cyber Asset other that a BCS or PCA —Mitigate the threat of detected malicious code on Removable Media prior to connecting to a BCA or PCA CL A RI T Y ▪ A S S URA NCE ▪ RE S ULT S 15 Plan Requirements - Transient Cyber Assets and Removable Media Attachment 2 of CIP-010-3 • Provides detailed examples of expected evidence Can get complicated with Jointly owned facilities CL A RI T Y ▪ A S S URA NCE ▪ RE S ULT S 16 Questions? CL A RI T Y ▪ A S S URA NCE ▪ RE S ULT S 17
© Copyright 2026 Paperzz