What You Need to Know About the New Requirements and How to Comply (Part 1)
NERC CIP-003-9
Keon McEwen | Ben Stirling | Michiko Sell | Joe Baxter
Questions
OT Cybersecurity by Numbers
3
Increase of Cyber Attacks in Critical Infrastructure
4
2019
2018
2017
2016
2015
2010
2011
2012
2013
2014
Shamoon3
VPNFilter
Alert (TA18-074A)
Op Ghoul
Havex
Steel Mill Attack
Shamoon
Dragonfly
Stuxnet
Aurora
EKANS
MAZE
Ryuk
2020
2021
LockerGoga
Dtrack
Lemon Duck
Wannacry
Triton
Petya
Black Energy
Industroyer
Red October
Night Dragon
Solarwinds
FL Water
Colonial
JBS
Oiltanking Deutschland GmbH & Co.
Ukraine Power
Deutsche Windtechnik
2022
4
February 2023
�A U.S. Energy company reported that adversaries successfully reached the company’s OT network and reported that was infected with Royal ransomware. At this time, it’s believed that the ransomware was general and not intended for the ICS environment.
May 2021
�The Colonial Pipeline was the victim of a ransomware and halted operations.
Impact to operations because of concerns over safety due to impacts to operations monitoring and visibility.
April 2022
�PIPEDREAM: the seventh known ICS specific malware and specifically designed to disrupt industrial processes.
PIPEDREAM affects libraries used across vendors. Lists of effected control processor may not be comprehensive.
NERC Cybersecurity Requirements
NERC Compliance
5
Cyber Security Requirements – Coming Down the Road
General
FERC is pushing for Low Impact BES Cyber Systems (BCS) to be treated more like Medium Impact BCS.
Project 2020-03 Supply Chain Low Impact Revisions - CIP-003-9
Board Adopted: November 16, 2022
Adopted by FERC: March 16, 20233
Effective Date: April 1, 2026
New Section 6 in Attachment 1 Section 6
Vendor Electronic Remote Access Security Controls: For assets containing �low impact BES Cyber System(s) identified pursuant to CIP‐002, that allow �vendor electronic remote access, the Responsible Entity shall implement a �process to mitigate risks associated with vendor electronic remote access, �where such access has been established under Section 3.1.
These processes shall include:
6.1 One or more method(s) for determining vendor electronic remote access;
6.2 One or more method(s) for disabling vendor electronic remote access; and
6.3 One or more method(s) for detecting known or suspected inbound and� outbound malicious communications for vendor electronic remote access.
6
Don’t Rely on the Vendor
7
Vendor Remote access often bypasses the indented security controls and allows direct access to the ICS environment.
Understand the limits of risk transfer: Vendors vs Responsible entities
More than a Jump Host
8
The Two Sides of Network Visibility
Keep the network representation current. Enhance understanding of dependencies.
Monitor and detect adverse action in a timely and actionable manner.
Network Traffic Monitoring
Network Access Modeling
Which assets can connect to which services
Which assets are connecting to which services
Asset
Service
TAP / SPAN
Asset
Service
Firewall
Cyber Resiliency Building Blocks: Visibility & Understanding
Five+ Process Activities
Prerequisites
Deny-by-Default
Justified Routable
Time-Sensitive
Vendor Access Control
Demonstrate Segmentation
Don’t just talk about it.
Show segmentation directly from evidence.
Questions
Additional Resources
ABS Group, NAES Corp and Network Perception are working together to proactively address the potential scope of work that will be required to achieve compliance with the new CIP-003 low impact requirements.
Thank You
Joseph Baxter
Director - Solutions Engineering
Keon McEwen�ISOC Director, Industrial Cybersecurity kmcewen@absconsulting.com
Ben Stirling
Director - Industrial Cybersecurity
ABS Group
With over 50 years of risk management and safety experience, ABS Group provides data-driven risk and reliability solutions and technical services that help clients confirm the integrity, cybersecurity, quality and efficiency of critical assets and operations, in the marine and offshore, oil, gas and chemical, government �and power and energy sectors.
16
1000+
Employees
20+
Countries
50
Years
17
About NAES
Network Perception’s Mission:
Securing the critical infrastructure that runs the world
Bowtie Kill Chain for OT
19