Overview:
The North American Electric Reliability Corporation (NERC) includes six Regional Entities (REs), which were formerly called Regional Reliability Organizations. While the REs have other responsibilities as well, they play a vital role in education on, and enforcement of, the NERC Reliability Standards. At least two of the REs develop, promulgate and enforce their own regional reliability standards.
The most visible function of the REs is enforcing compliance with the NERC Reliability Standards, including the NERC CIP cybersecurity standards, among the NERC entities that own grid assets (substations, fossil and renewable generating facilities and Control Centers) in their Region. These include electric utilities, Independent Power Producers and other organizations that are members of NERC. NERC entities that own assets in multiple Regions are audited by each RE, although in some cases the audits are combined to avoid duplication of effort. NERC has its own auditors, who audit the Regional Entities and sometimes participate with the Regions in audits of their members.
Besides auditing, the REs utilize other means to enforce compliance, including spot checks, investigations, self-reports, and compliance self-certifications. The REs also help their members understand the NERC requirements they must comply with. However, as part of the “NERC ERO”, the REs are not allowed to make direct interpretations of requirements or to advise their members on how to comply with any requirement.
When it comes to the NERC CIP standards, the REs face some real challenges, because the CIP standards are quite different from the other NERC standards - which are known as the “Operations and Planning” (“O&P”) standards. The O&P standards are ultimately based on the laws of physics, so there is usually a single correct interpretation of the wording of any requirement.
However, some of the concepts on which the CIP requirements are based, including words like “impact”, “programmable”, and “routable”, don’t have generally accepted definitions, nor are they defined in the NERC Glossary. This makes it difficult for NERC entities to comply with some CIP requirements, unless their RE can advise them on what they interpret these and other terms to mean. This puts the auditors in a tough position; moreover, it leads in some cases to different Regional Entities auditing one requirement in different ways.
Why you should Attend:
If you are involved with NERC CIP compliance at a NERC Entity (electric utility or IPP), it’s important to understand the delicate balancing act that the regional CIP auditors must carry out. On the one hand, the NERC entities in their Region are questioning them about the unresolved ambiguities in some of the CIP requirements and definitions; but, on the other hand, the NERC lawyers enforce a strict prohibition on providing in writing anything that looks like an interpretation of a NERC requirement, due to concern that by doing that, they would violate “auditor independence”.
In practice, it’s usually possible to receive compliance advice from one of your Regional CIP auditors, at least in cases where there is genuine ambiguity in the requirement. If your RE has a “compliance outreach” team, they should be your first point of contact regarding any compliance question. However, even if there is no such team in your Region, you shouldn’t hesitate to reach out to the auditors in your Region with such questions, if you don’t ask a question like, “How do I comply with CIP-007 Requirement R2 Part 2.2? or “How do you define the term ‘programmable’ in the NERC Glossary definition of Cyber Asset?”
Areas Covered in the Session:
Who Will Benefit:
People who work in other industries (or for consulting organizations), who would like to hear what lessons can be learned from the power industry’s experience with CIP.
Tom Alrich is an independent consultant and trainer specializing in two important topics
Compliance with the rigorous NERC CIP cybersecurity standards, which apply to the control systems that monitor and operate the North American power grid. They are enforced by NERC and the Federal Energy Regulatory Commission (FERC); they carry maximum penalties of $1 million per violation. While these standards have been successful in securing the grid in the 15 years they have been in effect, they are increasingly inhibiting security by preventing many electric utilities and Independent Power Producers from utilizing cloud-based security software and services.
Software vulnerabilities, which “open the door” for the most successful cyber attacks. All software has vulnerabilities. These can never be eliminated, but they can be managed. However, management can only be successful if there are good data available on vulnerabilities, as well as data on the software or devices in which the vulnerabilities are found. Currently, two big US government programs are essential to providing that data: the CVE Program (run by the US Department of Homeland Security) and the National Vulnerability Database (run by the Department of Commerce). There are currently serious problems with both programs, and both are likely to undergo big changes in the coming years.