CIP-014-2 - Western Electricity Coordinating Council

CIP-014-2: Physical Security
Nick Weber, CPP, PSP, CBRM, CBRA
CIP Auditor
W
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
Speaker Intro:
Nick Weber, CPP, PSP, CBRM, CBRA
18 Years first responder, military, and security experience
– US Army Reserve Information Operations (Cyber)
• Network Defense Team Leader
• Dynamic Defense Deputy Team Leader
– US Department of Homeland Security
• Energy Sector Specialist
• Site Assistance Visit Team Leader
– US Army Cavalry Officer
• OIF veteran
• Bronze Star Medal
• National Training Center (NTC) Opposing Force (OPFOR)
– Account Manager at a security guard provider
– Wildland firefighter
W
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 Introduction
What it is:
– Physical security of Transmission stations and Transmission substations,
and their associated primary control centers, that if rendered inoperable
or damaged as a result of a physical attack could result in instability,
uncontrolled separation, or Cascading within an Interconnection.
What it is not:
An extension of, or related to CIP-006
Critical Cyber Asset/Protected Cyber Asset based
A limit to physical security measures
A one-size-fits all approach to physical security
–
–
–
–
W
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 Introduction
It may be helpful to view and manage CIP-014-2 as two major
components.
W
E
R1: Applicability and Risk
Assessment
R4: Threat and Vulnerability
Assessment
R2: Unaffiliated Review
R5: Security Plan
R3: Control Center Notification
R6: Unaffiliated Review
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 Process Overview
R2:
Unaffiliated
Review
R1:
Applicability
W
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
R5: Develop
a Security
Plan
R4: Conduct
Threat and
Vulnerability
Assessment
R3: Notify
Control
Centers
C
O
O
R
D
I
R6:
Unaffiliated
Review
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 Implementation
• R1 Risk Assessment must be completed on or before the
effective date (10/1/15)
• R2
o 2.1, 2.2, and 2.4 must be completed within 90 days of R1
assessment
o 2.3 must be completed within 60 days of 2.2 verification
• R3 must be completed within 7 days of R2 completion
• R4 must be completed within 120 days of R2 completion
W
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 Implementation
• R5 must be completed within 120 days of R2 completion
• R6
o 6.1, 6.2, and 6.4 must be completed within 90 days of R5
completion
o 6.3 must be completed within 60 days of 6.2 review
W
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 Implementation
Less than nine months from effective date to Security Plan completion
CIP-014-2 Implementation Timeline
W
R1 Assessment
Effective Date
0 Days
R2 Verification
Effective + 90
90 Days
R2.3 Address Discrepancies
R2.2 + 60
150 Days
R3 Notify Control Center
R2 + 7
157 Days
R4 Threat and Vulnerability Evaluation
R2 + 120
270 Days
R5 Security Plan
R2 + 120
270 Days
R6 Review
R5 + 90
360 Days
R6.3 Address Discrepancies
R6.2 + 60
420 Days
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 Identification
R1: Does
Station/Substation
meet 4.1.1 criteria?
(R1)
Could
Station/Substation
cause instability,
uncontrolled
separation, or
cascading? (R1)
Yes
No
Does the
unaffiliated 3rd
party reviewer
concur? (R2)
Does the
unaffiliated 3rd
party reviewer
concur? (R2)
Yes
In Scope
Yes
No
No
No
Yes
No
Concur with 3rd party
recommendations?
Not in Scope
Document the
technical basis for
non-concurrence
Yes
Adjust List
List of
Stations/Substations
in Scope for R3-R6
W
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 Assessment and Plan
Conduct Threat and
Vulnerability
Assessment (R4)
Develop security plan to
address threats and
vulnerabilities identified
in assessment (R5)
Does the unaffiliated 3rd
party reviewer concur
with assessment? (R6)
Does the unaffiliated 3rd
party reviewer concur
with security plan? (R6)
Yes
No
Yes
Yes
Concur with 3rd
party?
No
Adjust plan
No
Yes
Concur with 3rd
party?
Document reasons
for nonconcurrence
Adjust
assessment
No
Completed
Security Plan
Document reasons
for nonconcurrence
W
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 R1: Applicability and Risk Assessment
• Must be completed by the effective date of CIP-014-2
(10/1/15)
• Subsequent applications must be completed:
– 30 months for entities who identified applicable Stations/Substations on
the previous assessment
– 60 months for entities who identified null lists on the previous
assessment
W
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 R1: Applicability and Risk Assessment
• Create a Candidate List
– Substations/Stations operating at or above 200kV
– Substations/Stations identified in an IROL
– Substations/Stations critical to operation of nuclear facilities
• Apply criteria listed in 4.1.1 of CIP-014-2
– Operating at or above 500kV
-or-
– Identified by its Reliability Coordinator, Planning Coordinator, or Transmission
Planner as critical to the derivation of Interconnection Reliability Operating
Limits (IROLs) and their associated contingencies.
-or-
– Essential to meeting Nuclear Plant Interface Requirements
-or-
W
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 R1: Applicability and Risk Assessment
• Apply criteria listed in 4.1.1 of CIP-014-2 (continued)
– Operating between 200 kV and 499 kV at a single station or
substation, where the station or substation is connected at 200 kV or
higher voltages to three or more other Transmission stations or
substations and has an "aggregate weighted value" exceeding 3000
according to the table below.
W
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 R1: Applicability and Risk Assessment
• List developed after application of Applicability Section 4.1.1
• Conduct transmission analysis of stations/substations
identified 4.1.1 application, identify stations/substations that
if rendered inoperable or damaged could result in:
– Instability
– Uncontrolled Separation
– Cascading within the Interconnection
W
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 R1: Evidence
Nuclear Interface
Requirement
500 kV or Higher Total Value 3000+ IROL
W
Continue to Risk
Assessment
Kokanee Substation
N
Y
Redhook Switchyard
N
N
Epic Substation
Y
Y
Base Camp Substation
Y
Y
New Belgium Switchyard
N
N
Y
Stella Substation
N
N
N
N
N
Lagunitas Substation
N
N
N
Y
Y
Big Sky Switchyard
Y
Pacifico Substation
N
Sam Adams Switchyard
Y
E
S
T
E
R
N
E
L
E
C
Y
N
N
N
Y
Y
N
Y
Y
Y
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 R1: Evidence
Unstressed
Unstressed
Voltage
Power Flow* Stability*
Unstressed
Transient
Stability*
Stressed
Stressed
Voltage
Power Flow* Stability*
Stressed
Transient
Stability*
Kokanee Substation
Pass
Pass
Pass
Pass
Fail
Epic Substation
Pass
Pass
Pass
Pass
Pass
Base Camp Substation
Fail
New Belgium Switchyard
Pass
Pass
Pass
Lagunitas Substation
Pass
Pass
Fail
Big Sky Switchyard
Pass
Pass
Pass
Pass
Pass
Fail
Y
Pacifico Substation
Pass
Pass
Pass
Pass
Pass
Pass
N
Sam Adams Switchyard
Pass
Pass
Pass
Pass
Pass
Pass
N
In Scope
Y
Pass
N
Y
Pass
Pass
Pass
N
Y
*Any number of criterion may be used so long as they provide a reasonable prediction of system
performance in the event the station/substation is completely unavailable.
W
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 R4: Evidence
Control Center
Stone Control Center
Deschutes Control Center
Stone Control Center
Stone Control Center
Kokanee Substation
Base Camp Substation
Lagunitas Substation
Big Sky Switchyard
W
E
S
T
E
R
N
E
L
Control Center Operator (if external)
E
C
T
R
I
C
I
T
Y
C
N/A
Billiam Power Company (BPC)
N/A
N/A
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 R1: Applicability and Risk Assessment
• Many options for a methodology
• See the July 2015 open webinar for detailed methodology
presentation
https://www.wecc.biz/_layouts/15/WopiFrame.aspx?sourcedoc=
/Administrative/WECC%20Open%20Mic%20Webinar%20Slide%2
0Deck%202015%2007%2016rev.pdf&action=default&DefaultIte
mOpen=1
• WECC staff willing to review methodologies outside the audit
as available
W
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 R2: Unaffiliated Review of R1
Assessment
• Must be completed within 90 days of R1 Assessment and may
be conducted concurrently
• Unaffiliated third party must be:
– A registered Planning Coordinator, Transmission Planner, or Reliability
Coordinator
-or– An entity that has transmission planning or analysis experience
• The SDT interprets “unaffiliated” as external to the corporate
structure
• The credentials of the third party will be assessed and may
impact the audit risk and subsequent rigor for R1
W
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 R2: Unaffiliated Review of R1
Assessment
• Unaffiliated reviewer recommendations must be addressed
within 60 days of review
– Modify its identification under Requirement R1 consistent with the
recommendation
-or– Document the technical basis for not modifying the identification in
accordance with the recommendation
• This language is NOT intended to trigger TFEs
• Implement procedures to protect sensitive information
throughout the review process
W
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 R2: Evidence
• Reviewer Qualifications
• Evidence of Review (Dated)
– Attestation by reviewer
– Review documentation
– Recommendations or non-concurrence
• Protection of Sensitive Information
–
–
–
–
NDA
Encryption
May leverage CIP-011-2 controls (NOT REQUIRED)
Procedural controls
• Response to recommendations or non-concurrence
– Accept and modify
– Document reasons not to modify
W
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 R3: Notify Control Center Owners
• The entity has 7 days to notify control center operators for
primary control centers associated with Stations/Substations
identified in R1 assessment
• The entity has 7 days to notify control center operators for
primary control centers associated with Stations/Substations
removed in subsequent in R1 assessments
• Compliance tips:
– Use email read receipts
– Implement three part communications
– Receive and document confirmation of notification from control
center operators
W
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 R3: Evidence
• Email
– Dated
– Read receipt
– Confirmation
• Phone log
– Record date and time
– Record name of person called
• Letter
– Registered mail
W
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 R3: Evidence
W
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 R4: Threat and Vulnerability
Assessment
Conduct a threat and vulnerability assessment that considers:
– Unique characteristics
– Attack history, attacks on similar facilities
• Frequency
• Geographic Proximity
• Severity
– Intelligence or threat warnings
W
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 R4: Threat and Vulnerability
Assessment
Unique Characteristics may include:
– Terrain
• Rural
• Urban
– Equipment/Facility Array
• Are critical vulnerable assets on the perimeter or are they shielded from view or
attack by less critical components of the facility?
– Existing Protections
– Facility size and shape
• A pure rectangle faces fewer inherent vulnerabilities than a facility with multiple
corners, alcoves, and salient points.
– Crime statistics
– Weather
W
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 R4: Threat and Vulnerability
Assessment
Assessment Tips
–
–
–
–
–
Identify what components of the facility are critical to the mission
Evaluate your facility from an adversary’s perspective
Extend the assessment beyond the fence line
Understand the advantages and disadvantages afforded by surrounding terrain
Understand your threat environment
• Evaluate attacks on similar facilities globally
• Evaluate attacks in your geographic area even if the target facility is unlike yours
Some Existing Assessment Methodologies
– CARVER
– DHS Enhanced Critical Infrastructure Protection Infrastructure Survey Tool (ECIP/IST)
– Attack Tree Modeling
W
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 R4: Threat and Vulnerability
Assessment
Suggested threat vectors to consider
– Direct Fire
• Can an adversary fire a line-of-sight weapon and damage a critical component?
– Indirect Fire
• Can an adversary to fire a weapon on an arc trajectory and damage a critical component?
– Explosive
• Can an adversary place an explosive device such that it will damage a critical component?
– Vehicular Attack
• Can an adversary drive a vehicle into my facility to damage a critical component?
– Forced Entry
• Can an adversary force his way into my facility to damage a critical component?
– Surreptitious Entry
• Can an adversary sneak into the facility to damage a critical component?
– Arson
• Can an adversary damage critical components with fire?
W
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 R4: Evidence
•
•
•
•
•
W
Methodology
Application/Results
Diagrams
Maps
Pictures
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 R4: Evidence
Value
Criticality
Accessibility
Recuperability
Vulnerability
Effect
Recognizability
Threat
9-10
Loss would
stop
operations
Easily
accessible, not
secured
Replacement lead
time 1 year or
more
Attack requires
no training or
special tools
Extreme
socioeconomic
impact
Easily recognized
with no training
and no confusion
Attack carried out in
close proximity or
intelligence warning
mentions the asset
7-8
Loss would
significantly
reduce
operations
Easily
accessible,
limited security
Replacement lead
time 6-12 months
Attack requires
little training or
special tools
Significant
socioeconomic
impact
Easily recognized
by most with
minimal confusion
Attack recently
carried out in a
distant location or
intelligence
mentions asset type
5-6
Loss would
reduce
operations
Accessible, but
secured
Replacement lead
time 2-6 months
Attack requires
training and
special tools
Noticeable
socioeconomic
impact
Recognized with
some training
Attempted in
proximity or some
time ago or
intelligence
mentions similar
facilities
3-4
Loss may
reduce
operations
Difficult to
access
Replacement lead
time 2-8 weeks
Attack requires
intensive
training and
special tools
Minimal
socioeconomic
impact
Difficult to
recognize without
extensive training
Attempted in a
distant location or
some time ago or
intelligence
mentions the
sector/industry
1-2
Loss would
not affect
operations
Very difficult to
access
Replacement lead
time less than 2
weeks
Attack requires
well-trained
team with
numerous
toolsO O
Yspecial C
No noticeable
impact
Extremely difficult
to recognize
without training
and surveillance
Attack has never
been attempted on
a like facility
W
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 R4: Evidence
Asset
C
A
R
V
E
R
T
Total
Transformers
9
7
10
7
9
5
9
56
Block House
9
5
5
5
6
7
6
43
Switches
8
8
7
7
5
5
4
44
Cap Bank
6
8
6
9
5
4
4
42
• Repeat for each station/substation and control center
• May want to drill down farther
– Assets by type (ie: 230kv, 500kv, etc)
– Assets by each (individual component)
W
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 R4: Evidence
Kokanee Substation
Transformer
Criticality: (9) Loss of one or more transformers would all but end operations at
the substation until recovered
Accessibility: (7) Transformers are located toward the center of the yard. The
yard is protected by an 8’ chain link fence with triple strand barbed wire
outriggers.
Recuperability: (10) Transformers would take 18-24 months to replace
Vulnerability: (7) Transformers could be damaged by commercially-available
rifles, home made explosives, or vehicles.
Effect: (9) Similar attacks have yielded public outcry and governmental action.
Recognizability: (5) Identification of transformers requires a basic
understanding of bulk electric system components, view of transformers at
Kokanee is obscured, further hampering recognizability.
Threat: (9) A similar facility was attacked using direct-fire ballistic weapons.
W
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 R5: Security Plan
Develop a security plan including
– Resilience or security measures
• Ensure the measures address vulnerabilities identified in R4
– Law enforcement contact and coordination may include:
Simply a name and phone number
Meetings to discuss security concerns, site-specific hazards, etc
Site-specific training for law enforcement
Hosting law enforcement exercises
•
•
•
•
– Timeline for implementing physical security projects
• No specific dates or time frames required in this timeline, but it must pass the
common sense test
– Provision to evaluate evolving threats
• Should include a process or mechanism to receive threat information
• Should include a process to evaluate threat information as it is received
W
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 R5: Security Plan
Security Plan Tips
– Conduct a second assessment including the new measures
• Provides valuable metrics to stakeholders and regulators
• If conducted in the planning phase, may prevent costly but minimally effective security
enhancements
– Ensure the plan makes sense
• A reasonably-informed person should be able to follow and implement the plan without
extensive knowledge of the site or entity
– Law enforcement is your friend
• Coordinate early and often to ensure all parties understand facility nuances and specific
hazards/concerns
• Law enforcement training on site = free security
• Ensure mutual understanding of law enforcement response procedures and capabilities
– Consider developing a threat/risk assessment function
• May require additional human capital
• Can be achieved through vendor solutions
W
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 R6: Unaffiliated Review of
Assessment and Plan
• R6: Unaffiliated Review of R4 Assessment and R5 Plan
– An organization with industry physical security experience AND a
Certified Protection Professional (CPP) or Physical Security
Professional (PSP) on staff.
-or– An organization approved by the ERO.
-or– A government agency with physical security expertise.
-or– An organization with demonstrated law enforcement or military
physical security expertise.
W
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 R6: Evidence
• Reviewer Qualifications
–
–
–
–
Industry Experience and CPP or PSP
Approved by ERO
Government Agency with Physical Security Expertise
Law Enforcement or Military Physical Security Expertise
• Evidence of Review (Dated)
– Attestation by reviewer
– Review documentation
– Recommendations or non-concurrence
Protection of Sensitive Information
•
–
–
–
–
Response to recommendations or non-concurrence
•
–
–
W
NDA
Encryption
May leverage CIP-011-2 controls (NOT REQUIRED)
Procedural controls
E
S
T
Accept and modify
Document reasons not to modify
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 R4: Practical Exercise
• Review the Salt Lake Hardware Building and surrounding area
for vulnerabilities
• Consider how you would mitigate vulnerabilities
• Ground Rules:
–
–
–
–
W
E
S
T
Do not enter/attempt to enter any restricted areas or offices
Do not impede building tenants
Be aware of traffic on adjacent streets and parking lot
Cooperate with building staff, security, and law enforcement as necessary
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 R4: Practical Exercise
Break for Practical Exercise
W
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 R4: Practical Exercise
• Vulnerabilities:
–
–
–
–
–
–
–
–
W
E
S
T
High Speed Avenue of approach on 400W with little/no obstruction
Unrestricted Parking less than 5 feet from the building
Two open access points, one unmonitored, one intermittently monitored
Hotel across North Temple
Mass transit facilities on south and west sides
Long-term construction to the north
Elevated crime area
Building construction
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 R4: Practical Exercise
• Vulnerabilities:
– High Speed Avenue of approach on 400W with little/no obstruction
•
•
Vehicle barriers
Work with city for traffic calming
– Unrestricted Parking less than 5 feet from the building
•
•
•
Remove parking immediately adjacent to building
Assign parking adjacent to building
– Work outward (higher trust = closer parking)
Vehicle screening
– Use randomization to reduce resource burden
– Two open access points, one unmonitored, one intermittently monitored
•
•
Increase security staffing to monitor 24/7
Restrict access through unmonitored door
– Hotel across North Temple
•
•
W
E
S
T
E
R
Work with hotel to identify suspicious behavior
Ask hotel to avoid long-term guests in rooms facing north
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
CIP-014-2 R4: Practical Exercise
• Vulnerabilities:
– Mass transit facilities on south and west sides
•
•
Pay closer attention to these areas as surveillance points
Work with transit authority to promote suspicious behavior reporting
– See something say something
– Long-term construction to the north
•
•
Pay closer attention to this area as a surveillance point
Work with construction company to identify suspicious behavior
– Unusual interest in Hardware Building
– Unexplained short-term employment
– Elevated crime area
•
•
•
Work with local law enforcement for increased patrols/presence
Work with neighboring businesses to create security group (neighborhood watch approach)
Crime Prevention Through Environmental Design (CPTED)
– Building construction
•
W
E
S
T
E
R
Retrofits
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
At Your Service
• PSWG- Get plugged in!
• http://www.wecc.biz/committees/StandingCommittees/OC/CI
IMS/PSWG/default.aspx
• Phone call away
• We want to help.
• Always willing to provide our audit approach
W
E
S
T
E
R
N
E
L
E
C
T
R
I
C
I
T
Y
C
O
O
R
D
I
N
A
T
I
N
G
C
O
U
N
C
I
L
Questions?
Nick Weber, CPP, PSP, CBRM, CBRA
Compliance Auditor, Physical and Cyber Security
Western Electricity Coordinating Council
155 North 400 West, Suite 200
Salt Lake City, UT 84103
(801) 386-6288
[email protected]