Update On Smart Grid Cyber Security Kshamit Dixit Manager – IT Security Toronto Hydro Ontario Canada Smart Energy Canada 2009 Toronto ON 1 Agenda • Cyber Security Overview • Security Framework • Securing Smart Grid Securing Smart Grid 2 Smart Energy Canada 2009 Toronto ON Smart Grid Attack Threats “Energy control systems are subject to targeted cyber attacks Potential adversaries have pursued progressively devious means to exploit flaws in system components telecommunication methods and common operating systems found in modern energy systems with the intent to infiltrate and sabotage vulnerable control systems ” “Sophisticated cyber attack tools require little technical knowledge to use and can be found on the Internet as can manufacturers’ technical specifications for popular control system equipment ” Source Roadmap to Secure Control Systems in the Energy Sector Roadmap to Secure Control Systems in the Energy Sector The Department of Homeland Security and US Department of Energy The Department of Homeland Security and US Department of Energy 3 Smart Energy Canada 2009 Toronto ON Critical Infrastructure Security Challenges • Cyber attacks can change every 3060 seconds Cyber attacks can change every 30 •Requires integrated quick response system Requires integrated quick response system • Convergence of traditionally isolated control systems •Cyber vulnerabilities introduced to critical systems Cyber vulnerabilities introduced to critical systems •Mitigation strategies not as easy as regular IT Mitigation strategies not as easy as regular IT • Utilities tend to work internally in silos •Prevents rapid exchange of identity information between different Prevents rapid exchange of identity information between different departments 4 Smart Energy Canada 2009 Toronto ON The Landscape is Changing Around Us We have information from multiple regions outside the United States of cyber intrusions into utilities followed by extortion demands ” “…We have information that cyber attacks have been used to disrupt power equipment in several regions outside the United States In at least one case the disruption caused a power outage affecting multiple cities ” “We do not know who executed these attacks or why but all involved intrusions through the Internet Central Intelligence Agency 2008 Did this include any Smart Grid elements Did this include any Smart Grid elements 5 Smart Energy Canada 2009 Toronto ON Cyber Security Drivers Windows Unix Proprietary Use of COTS hardware and software Vulnerable protocols Control systems not designed with security Larger Code bases Increasingly complex systems Increased Attack Surface Increasing interconnecti on and Integration Performance metrics peerto peer Increased Risk to Operations 2 way control systems New customer touch points AMI; Realtime load shedding Time of Use; Billing; 6 Smart Energy Canada 2009 Toronto ON Access Points Numerous and Diverse Access Points Numerous and Diverse v Due to convergence the number of access points has increased v v v v v v Access from the Internet Access from corporate users Access into SCADA LAN keep operators happy Access from the vendors Access from the upstream providers Metering system connects directly to corporate in many cases v Customer care and billing requires maximum integrity v Methods for communications is in open source v Defense in depth is the only real countermeasure v v v v Zones Conduits Layered defense modeling Unified Threat Management and Anomaly Detection 7 Smart Energy Canada 2009 Toronto ON Emerging Issues v Current Smart Grid Meter solution is prescriptive for only one Current Smart Grid Meter solution is prescriptive for only one way control traffic v But what about meters deployed with ‘kill switch’ enabled v California PCT program can provide a tremendous foundation v Future will migrate to 802 x communications v How will THAT be secured v 802 15 4 proven to vulnerable to jamming Jan 2009 v How much more vulnerable will the system be v What can the vendor do to ensure security of Grid operation v Proof of concept to get security keys from chipset Feb 2009 v Mobile worm can impact firmware in all meters in mesh grid because it is ‘smart’ v What can the utility do to protect metering v More than simple IDS deployed to the meter level More than simple IDS deployed to the meter level – must include defining operational envelope v Security Information and Event Monitoring SIEM must be cost effective scalable AND nonintrusive to collection operations intrusive to collection operations 8 Smart Energy Canada 2009 Toronto ON Question – How is Security Being Done How is Security Being Done v Has anyone looked into the cyber security issues of the Smart Meter system and Smart Grid v Yes and it is not pretty v How do we protect the control of the meters our grid and the customer data v Delicate balance required v How can cyber security be a value How can cyber security be a valueadd to the customer v Meters and SG must communicate reliably AND securely to Meters and SG must communicate reliably AND securely to central location But how do we enforce the mechanisms central location But how do we enforce the mechanisms cell analog 802 x BPL 9 Smart Energy Canada 2009 Toronto ON Current and Future Scenario 20 th Century Grid 21 st Century Smart Grid Electromechanical Digital Oneway communication if any Two Twoway communication Built for centralized generation Accommodates distributed generation Radial topology Network topology Few sensors Monitors and sensors throughout “Blind” Self monitoring Manual restoration Semi Semiautomated restoration and eventually selfhealing Prone to failures and blackouts Adaptive protection and islanding Check equipment manually Monitor equipment remotely Emergency decisions by committee and phone Decision support systems predictive reliability Limited control over power flows Pervasive control systems Limited price information Full price information Few customer choices Many customer choices Many customer choices Source The Emerging Smart Grid Smart Energy Canada 2009 Toronto ON Current Issues in Smart Grid Cyber Security Current Issues in Smart Grid Cyber Security vNeed to protect protect Time of Use TOU data and access from non authorized users vNeed to protect protect meters from being abused as control channel into grid operations vNeed to protect protect future twoway communications for meter activity vNeed to ensure future control capability is secure secure Smart Energy Canada 2009 Toronto ON 11 Smart Grid Characteristics Technology Security v Selfhealing v Empowers and incorporates the consumer v Resilient to physical and cyber attacks v Provides power quality needed by 21 st century users v Accommodates a wide variety of generation options v Fully enables maturing electricity markets v Optimizes assets Services and Applications Using the data in new ways Business Integration Integrating the data with the rest of the business Centralized Control Using the data for visualization and control Physical and Logical Security First Level Integration Collecting the data Field Communication Moving the data through the build of networks Sensors Monitoring and detecting the data 12 Smart Energy Canada 2009 Toronto ON Smart Grid Security Components v Cyber security policy and procedures v Security policy v Standard operating procedures OPSEC v Guidelines v Smart Grid Security Cyber security Planning Security Measurements v Strategic planning v Tactical planning v Architecture and technology v v v v v v Network segmentation Tightly controlled communication Identity and access management Threat management Vulnerability management Policy Planning Management Technology Services Cyber Security Framework Services v Certification and Accreditation v Risk and Security Measurements v Security KPI and KRI v Real time Security Dashboard 13 Smart Energy Canada 2009 Toronto ON Smart Grid Security Strategy v Enterprise DefenceinDepth Strategy Depth Strategy v Security Assessments v Asset Management v Network Application security v Education and Awareness Program Education and Awareness Program 14 Smart Energy Canada 2009 Toronto ON Identity and Access Management Identity and Access Management Resources Remote Access SCADA U N I V E R S I T Y Business Applications User Identity Access Management Strong Authentication Physical Access Provisioning HR Approval Entry into ERP BU Approval Business Worker Requisition Form HR Purchasing Provisioning Request Onboarding Employees Contractors Temps Students Third Parties Vendors Generate Global UID Worker Requisition Form De –Provisioning Provisioning Request Role change Identity Business Processes Smart Energy Canada 2009 Toronto ON Worker Termination De –Provisioning Request Offboarding termination 15 Measuring Security OS Mitigation Prevent SCADA Database Security Policy Procedure Refinement Procedure Refinement Respond Correct Firewall AV IPS IDS Web Security Events Sources Security Dashboard KRI KVI KPX KPI Measurements Smart Grid VPN Applications IAM Card NBS Measure 16 Smart Energy Canada 2009 Toronto ON Measuring Security Components Measuring Security Components Risk Dashboard OS Security Dashboard SCADA Database Incident Analysis Compliance Automation Respond Firewall Forensics Linux VPN Applications Centralized Event Management Correct Real time visualization Mitigation Prevent Ops Security Command Centre Reporting Analytics Compliance IAM Detect Card Events Normalization Aggregation Correlation Smart Energy Canada 2009 Toronto ON Network Scanner 17 Building Security In by ‘Defence in Depth’ Customer Field Equipment Intelligence Communication Data Advanced Communications Office Data Intelligent Processes and Applications Advanced Power Flow Control Distributed Energy Information CYBER SECURITY Customer Energy Management People Knowledge Intelligence Intelligence Grid Intelligence Intelligent Business Decisions GRID SECURITY INTEGRATION 18 Smart Energy Canada 2009 Toronto ON Expected Gaps and ‘Solution’ Paths SECURITY GAPS POSSIBLE SOLUTION PATHS Poor protection of critical data Local encryption; access controls; access management Inadequate reliability of collection mechanism Communication authentication and access control Inadequate security of transmission data Message digests pointoforigin validation intrusion Message digests point detection proprietary encryption Poor redundancy of Storage Protection Secure network topology Insufficient device security Monitors tamperproof devices integrity checking Monitors tamper self selfhealing networks Nonscalable Security Solutions Standards regulatory efforts vendor groups Insufficient security for Customer Presentation Lifecycle integrity secure web access server protection firewalls IDS Insufficient security for Convergence with SCADA and Corporate Adaptive protection zones conduits multitier Adaptive protection zones conduits multi security deep security deeppacket inspection Commercial solutions can be leveraged to support budget and time constraints – constraints – but assessments provide tactical understanding but assessments provide tactical understanding but assessments provide tactical understanding Smart Energy Canada 2009 Toronto ON Q A Q A Contact Kshamit Dixit Toronto Hydro kdixit@torontohydro com 416423343 20 Smart Energy Canada 2009 Toronto ON