Top Banner
Cyber Security for PUC’s Jeffrey R. Pillon Michigan Public Service Commission Mid-America Regulatory Conference June 17, 2009 Traverse City, Michigan
21

Cyber Security for PUC’s Jeffrey R. Pillon Michigan Public Service Commission Mid-America Regulatory Conference June 17, 2009 Traverse City, Michigan.

Dec 17, 2015

Download

Documents

Everett Barnett
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cyber Security for PUC’s Jeffrey R. Pillon Michigan Public Service Commission Mid-America Regulatory Conference June 17, 2009 Traverse City, Michigan.

Cyber Security for PUC’s

Jeffrey R. PillonMichigan Public Service CommissionMid-America Regulatory Conference

June 17, 2009Traverse City, Michigan

Page 2: Cyber Security for PUC’s Jeffrey R. Pillon Michigan Public Service Commission Mid-America Regulatory Conference June 17, 2009 Traverse City, Michigan.

2

Cyber Security Threats are IncreasingThe significant increase in new threats over the past year is indicative of the work of specialized malicious code authors and the existence of organizations that employ programmers dedicated to the production of these threats.

Page 3: Cyber Security for PUC’s Jeffrey R. Pillon Michigan Public Service Commission Mid-America Regulatory Conference June 17, 2009 Traverse City, Michigan.

Cyber Security Threats• In 2001, hackers penetrated the California Independent System

Operator which oversees most of the state's electricity transmission grid; attacks were routed through California, Oklahoma, and China.

• Ohio Davis-Besse nuclear power plant safety monitoring system was offline for 5 hours due to Slammer worm in January 2003.

• Aaron Caffrey, 19, brought down the Port of Houston in October, 2003. This is thought to be the first well-documented attack on critical U.S. infrastructure.

• In March 2005, security consultants within the electric industry reported that hackers were targeting the U.S. electric power grid and had gained access to U.S. utilities electronic control systems. In a few cases, these intrusions had “caused an impact.”

• In April 2009, the Wall Street Journal stated spies hacked into the U.S. electric grid and left behind computer programs that could allow them to disrupt service.

Page 4: Cyber Security for PUC’s Jeffrey R. Pillon Michigan Public Service Commission Mid-America Regulatory Conference June 17, 2009 Traverse City, Michigan.

A tornado near a state data center

Picture from a Security Camera Near Lansing , MI

It’s not only hackers that you need to be concerned about.

Page 5: Cyber Security for PUC’s Jeffrey R. Pillon Michigan Public Service Commission Mid-America Regulatory Conference June 17, 2009 Traverse City, Michigan.

Roles for Public Utility Commissions1. Assuring that cyber security requirements that

utilities are subject to are being met, and PUC oversight as appropriate exercised.

– PUC Staff need to be up-to-date on cyber security requirements and potential threats.

2. Assuring that the PUC’s computer systems and operations are subject to on-going cyber security reviews and remediation, and that disaster recovery plans are in place and tested.

– This also included cyber security awareness for agency employees.

3. Understand the National Strategy for Critical Infrastructure

Page 6: Cyber Security for PUC’s Jeffrey R. Pillon Michigan Public Service Commission Mid-America Regulatory Conference June 17, 2009 Traverse City, Michigan.

Cyber Security Requirements & Resources

• The North American Electric Reliability Corporation -- Standards CIP-002 through CIP-009 (the Critical Cyber Asset Identification portion of the Critical Infrastructure Protection standards)

• The National Institute of Standards and Technology (NIST) is developing set of smart grid interoperability standards and specifications for inclusion in the Smart Grid Interoperability Standards Framework, Release 1.0.

• The Transportation Security Administration is partnering with Gas Technology Institute to develop training and presentation materials to illustrate existing SCADA vulnerabilities and consequently increase the cyber security awareness of pipeline companies.

• The U. S. Computer Emergency Readiness Team (US-CERT) • Multi-State Information Sharing and Analysis Center (MS-ISAC)• FBI’s Infragard Program: http://www.infragard.net/

1. Utility Oversight

Page 7: Cyber Security for PUC’s Jeffrey R. Pillon Michigan Public Service Commission Mid-America Regulatory Conference June 17, 2009 Traverse City, Michigan.

Benefits of the Smart Grid

Source: “San Diego Smart Grid Study”, October 2006

Power outages cost between $80 billion and $150 billion every year.

Page 8: Cyber Security for PUC’s Jeffrey R. Pillon Michigan Public Service Commission Mid-America Regulatory Conference June 17, 2009 Traverse City, Michigan.

Smart Grid Matching Grant Program

From: Notice of Intent to Issue a Funding Opportunity Announcement For the Smart Grid Investment Grant Program, April 16, 2009

i. A description of the cyber security risks at each stage of the system deployment lifecycle,

ii. Cyber security criteria used for vendor and device selection,iii. Cyber security control strategies,iv. Descriptions of residual cyber security risks,v. Relevant cyber security standards and best practices, andvi. Descriptions of how the project will support/adopt/implement

emerging smart grid security standards.

Requires a description of how cyber security concerns will be addressed with respect to the use of best available equipment and the application of procedures and practices involving system design, testing, deployment, operations and decommissioning, including at a minimum:

Page 9: Cyber Security for PUC’s Jeffrey R. Pillon Michigan Public Service Commission Mid-America Regulatory Conference June 17, 2009 Traverse City, Michigan.

Cost Recovery

• Are the costs prudent?• Will the resulting system be more secure and the

power grid less vulnerable to outages and allow for faster recovery when outages occur?

• To what degree have the cyber security requirements been met?

• Are PUC’s staff knowledgeable about cyber security and know the questions that need to be asked?

Investments in Smart Grid 50/50 Matching Grants

Page 10: Cyber Security for PUC’s Jeffrey R. Pillon Michigan Public Service Commission Mid-America Regulatory Conference June 17, 2009 Traverse City, Michigan.

Security of PUC’s computer systems

• Assuring that the computer systems that the PUC relies have on-going cyber security reviews and remediation of identified vulnerabilities.

• Disaster recovery plans are in place and tested and Continuity of Operation Plans have been developed.

• Cyber security awareness for agency employees including social engineering and insider threats.

This may be the responsibility of another state agency or office, but the implication of a failure will impact the business operation of the Commission

2. PUC Internal Operations

Page 11: Cyber Security for PUC’s Jeffrey R. Pillon Michigan Public Service Commission Mid-America Regulatory Conference June 17, 2009 Traverse City, Michigan.

Continuity of Operation Plans (COOP)• Internal contingency plans of government and business to

assure the rapid resumption of essential functions as soon as possible if they are disrupted for any reason: e.g., fire, tornado, hurricanes, wildfires, earthquakes, terrorism, pandemics, etc. – Build Self-reliance and Resiliency

• Helps assure that critical/essential functions can quickly resume operations

• Addresses key or essential employees, required facilities, computer system records and back-up data systems, etc.

• Minimize damage & losses

• Management succession & emergency powers

Page 12: Cyber Security for PUC’s Jeffrey R. Pillon Michigan Public Service Commission Mid-America Regulatory Conference June 17, 2009 Traverse City, Michigan.

On what cyber systems do you rely?• What IT systems support

critical PUC functions?• What are the backed up

systems?• What systems are needed to

support restoration?• What systems are needed

operationally?• In what sequence should

systems be restored?• What are the

telecommunication needs and requirements?

Hourly Loss from Downtime in the Information Technology Sector $1.3 million/hr

Page 13: Cyber Security for PUC’s Jeffrey R. Pillon Michigan Public Service Commission Mid-America Regulatory Conference June 17, 2009 Traverse City, Michigan.

What if this happen to your agency

Page 14: Cyber Security for PUC’s Jeffrey R. Pillon Michigan Public Service Commission Mid-America Regulatory Conference June 17, 2009 Traverse City, Michigan.

Employee Education

http://www.michigan.gov/cybersecurity

Page 15: Cyber Security for PUC’s Jeffrey R. Pillon Michigan Public Service Commission Mid-America Regulatory Conference June 17, 2009 Traverse City, Michigan.

NIPP 2009 Update– Incorporates extensive State, local, and

private sector input– Expands risk management framework:

• Risk framework is based on threat, vulnerability, and consequences

• Focuses on assets, systems, networks, and functions

– Strengthens information sharing and protection to include the “information sharing life-cycle”

– Represents an “All Hazards” approach– Establishes a “steady-state” of security across

critical infrastructure/key resource (CI/KR) sectors

www.dhs.gov/nipp

3. The National Strategy for Critical Infrastructure

Page 16: Cyber Security for PUC’s Jeffrey R. Pillon Michigan Public Service Commission Mid-America Regulatory Conference June 17, 2009 Traverse City, Michigan.

The NIPP and Sector-Specific Plans Set Security Goals Identify Assets, Systems, Networks, and Functions Assess Risk (Consequences, Vulnerabilities, and Threats Prioritize Implement Protective Programs Measure Effectiveness

Page 17: Cyber Security for PUC’s Jeffrey R. Pillon Michigan Public Service Commission Mid-America Regulatory Conference June 17, 2009 Traverse City, Michigan.

Sector Specific Plan

http://www.dhs.gov/xlibrary/assets/nipp-ssp-information-tech.pdf

IT Sector Goals

• Prevention and Protection Through Risk Management

• Situational Awareness

• Response, Recovery, and Reconstitution

“Public and private sector security partners have an enduring interest in assuring the availability of the infrastructure and promoting its resilience.”

Page 18: Cyber Security for PUC’s Jeffrey R. Pillon Michigan Public Service Commission Mid-America Regulatory Conference June 17, 2009 Traverse City, Michigan.

Defining Resilience

The loss of resilience, R, can be measured as the expected loss in quality (probability of failure) over the time to recovery, t1 – t0. Thus, mathematically, R is defined as:  

Source: Multidisciplinary Center for Earthquake Engineering Research framework for defining resilience (Bruneau and Reinhorn, 2007; Bruneau et al., 2003)

Page 19: Cyber Security for PUC’s Jeffrey R. Pillon Michigan Public Service Commission Mid-America Regulatory Conference June 17, 2009 Traverse City, Michigan.

Resilience has four factors• Robustness

– The ability to operate or stay standing in the face of disaster

• Resourcefulness– skillfully managing a disaster once it unfolds

• Rapid Recovery– The capacity to get things back to normal as quickly as

possible after a disaster• Learning lessons

– Having the means to absorb the new lessons that can be drawn from a catastrophe

Flynn, S. (2008) America the Resilient: Defying Terrorism and Mitigating Natural Disasters. Foreign Affairs, 87 (2), 2-8.

Page 20: Cyber Security for PUC’s Jeffrey R. Pillon Michigan Public Service Commission Mid-America Regulatory Conference June 17, 2009 Traverse City, Michigan.

Intersecting Stakeholder Interest

State & Local

Federal Private Sector

Source: Homeland Security Advisory Council, Critical Infrastructure Task Force Report, January 2006

• Infrastructure Protection• Governance• Planning• Information Sharing Technologies

• Government Continuity & Resiliency • Safety, Protection & Response

• Business Continuity & Resilience• Innovation & Quality • Shareholder Value

Resiliency

In 2004 Osama bin Laden enunciated a policy of “bleeding America to the point of bankruptcy.”

Public/Private Sector Partnerships

Page 21: Cyber Security for PUC’s Jeffrey R. Pillon Michigan Public Service Commission Mid-America Regulatory Conference June 17, 2009 Traverse City, Michigan.

Questions?

Jeffrey R. Pillon, Manager Energy Data & SecurityMichigan Public Service CommissionE-mail: [email protected] (517) 241-6171