Overview:
BES Cyber System Information (BCSI) is information (e.g., IP addresses) that could be used to attack medium or high impact BES Cyber Systems. Requirement R1 of NERC standard CIP-011 requires the NERC entity with high or medium impact assets to develop an Information Protection Plan (IPP) for BCSI. Until 2024, that plan only needed to deal with BCSI stored on the NERC Entity’s premises.
However, on January 1, 2024, a new version of CIP-011 Requirement R1, as well as a new CIP-004 Requirement R6, came into effect. CIP-011-3 R1.2 now implicitly requires the NERC entity to include protection of both “on-premise” and “off-premise” BCSI in their IPP. The latter includes protection of BCSI during its transmittal to, storage in and use by software running in the cloud (SaaS).
The new CIP-004-7 Requirement R6 requires protection of “provisioned access” to BCSI, including emergency access, by individuals not employed by the NERC entity. This includes access by employees of the SaaS provider or Platform Cloud Service Provider (CSP).
People who work for NERC entities and are concerned with these issues, as well as people who work for software companies that have customers subject to NERC CIP compliance, should take this course.
Why you should Attend:
The January 1, 2024, changes to the BCSI requirements raise two compliance concerns:
This course will discuss the above compliance concerns and provide examples of IPP language and compliance documentation that might address those concerns.
Areas Covered in the Session:
Who Will Benefit:
People who work in other industries (or for consulting organizations), who would like to hear what lessons can be learned from the power industry’s experience with CIP.
Tom Alrich is an independent consultant and trainer specializing in two important topics
Compliance with the rigorous NERC CIP cybersecurity standards, which apply to the control systems that monitor and operate the North American power grid. They are enforced by NERC and the Federal Energy Regulatory Commission (FERC); they carry maximum penalties of $1 million per violation. While these standards have been successful in securing the grid in the 15 years they have been in effect, they are increasingly inhibiting security by preventing many electric utilities and Independent Power Producers from utilizing cloud-based security software and services.
Software vulnerabilities, which “open the door” for the most successful cyber attacks. All software has vulnerabilities. These can never be eliminated, but they can be managed. However, management can only be successful if there are good data available on vulnerabilities, as well as data on the software or devices in which the vulnerabilities are found. Currently, two big US government programs are essential to providing that data: the CVE Program (run by the US Department of Homeland Security) and the National Vulnerability Database (run by the Department of Commerce). There are currently serious problems with both programs, and both are likely to undergo big changes in the coming years.