Securing the ability grid: Are you prepared for NERC CIP’s upcoming mandate?

0
45

[ad_1]

A defense-in-depth technique is one which protects organizations from assaults that bypass the primary layer of safety controls. It’s a nicely understood idea, and one which has been adopted by most organizations through the years. Nonetheless, till lately, the North American Electrical Reliability Company (NERC) offered a spot the place regulation required securing the digital safety perimeter (ESP), however there have been no additional safety controls past the community perimeter. If utilities adopted NERC CIP, after which went no additional, they’d be uncovered to assaults that bypassed that first layer of protection.
Upon path from the Federal Power Regulatory Fee (FERC), NERC has proposed a set of necessities for Inner Community Safety Monitoring (INSM). INSM is designed to handle these conditions the place the community perimeter has been breached, rising the chance of detecting a compromise. By offering visibility inside the important community, entities might be warned that an assault is in course of and motion might be taken earlier than the assault can propagate.
Identification of belongings and their communication patterns
Cisco Cyber Imaginative and prescient, a deep packet inspection engine inside Cisco industrial IoT community tools, uncovers the smallest particulars of your grid infrastructure. It routinely builds an in depth stock of all grid belongings, together with their communication patterns, vulnerabilities, rack slot configurations, vendor references, serial numbers, and extra. By embedding the sensor inside the community infrastructure, Cisco Cyber Imaginative and prescient provides complete visibility, capturing information passively with out the necessity for costly further home equipment or SPAN cabling.

INSM requires assortment strategies to supply safety worth to handle the perceived dangers the infrastructure faces. Cyber Imaginative and prescient applies a threat rating to all units and machine teams found within the OT community. Utilizing a mixture of vulnerabilities, actions, and impression, threat scores present a steerage of which units ought to be addressed first when implementing risk-management measures.
Evaluating the community towards an anticipated community communication baseline
Utility networks, particularly the communication with an ESP, are normally fairly static. By understanding what’s regular to your community, you may extra simply spot when one thing uncommon occurs. For instance, if a tool immediately begins speaking utilizing a distinct protocol, or has began to speak with new units, it’d imply a foul actor has compromised the machine.

To fulfill the necessities proposed by NERC, Cyber Imaginative and prescient information might be filtered and saved as a baseline, and any deviations from regular course of behaviors will generate an alert. If the deviation was anticipated, an administrative consumer can acknowledge and make the brand new norm a part of the baseline. Nonetheless, if the change was sudden, it may be reported and despatched for additional investigation.
Detecting anomalous actions inside the ESP
NERC CIP 005-7, the necessities doc for cybersecurity throughout the ESP, requires a mechanism for detecting identified or suspected malicious communication for each inbound and outbound communications. Historically, that is achieved by utilizing an intrusion detection system (IDS) or intrusion prevention system (IPS) embedded in a boundary firewall.
With the introduction of INSM, this requirement has been prolonged to be used inside the ESP. Firewalls as a expertise are listed, however will solely seize information that crosses the machine, resulting in troublesome structure decisions on the place to deploy these bins.
Along with its capabilities to detect deviations from a baseline, Cyber Imaginative and prescient leverages Snort to detect malicious site visitors inside the operational community. Snort is the IDS engine used throughout the Cisco portfolio and supported by Talos, one of many world’s largest non-public risk intelligence group and official developer of Snort signature information.
Talos, Cisco’s risk intelligence arm, constantly screens the worldwide risk panorama, identifies, and analyses new vulnerabilities, and gives real-time risk intelligence feeds which can be tailor-made to OT techniques. Not solely does the Talos experience present risk intelligence for Cyber Imaginative and prescient, however additionally they have a staff of individuals devoted to assist safe important infrastructure. I like to recommend studying the weblog by Joe Marshall – Serving to to maintain the lights on in Ukraine within the face of digital warfare.
Cisco’s industrial IoT safety answer
Cisco’s industrial IoT safety answer gives organizations with a phased method to securing their industrial networks. This method concerned constructing the muse with good community design and safe parts, utilizing the community to achieve visibility throughout the important infrastructure, after which lastly implementing coverage again into the identical community infrastructure for preventative and reactionary measures. INSM is one small piece of a bigger safety technique, and Cisco gives the constructing blocks for securing the infrastructure throughout LAN, WAN, and Cloud.
 

To be taught extra about NERC-CIP and the way Cisco might help you higher safe your grid operations, examine our white paper or ask for a one-on-one assembly with a Cisco knowledgeable.

Share:

[ad_2]