615 Security Architecture Principles For Digital Systems in Electric Power Utilities
615 Security Architecture Principles For Digital Systems in Electric Power Utilities
Working Group
D2.31
April 2015
Security architecture principles for digital
systems in Electric Power Utilities
Working Group
D2.31
April 2015
Members
1
Jens Zerbst (Convener), Ludovic Piètre-Cambacédès (Convener ), Mathias Ekstedt (Secretary),
Giovanna Dondossola, Christophe Poirier, Pascal Sitbon, Åge Torkilseng, Dennis Holstein, John
McDonald, Robert Evans, Marc Tritschler, Simon Zimmermann, Iiro Rinta-Jouppi, Göran Ericsson,
Marc Scherer, Feven Zegai, Olivier Breton
Copyright © 2015
“Ownership of a CIGRE publication, whether in paper form or on electronic support only infers right
of use for personal purposes. Are prohibited, except if explicitly agreed by CIGRE, total or partial
reproduction of the publication for use other than personal and transfer to a third party; hence circu-
lation on any intranet or other company network is forbidden”.
Disclaimer notice
“CIGRE gives no warranty or assurance about the contents of this publication, nor does it accept
any responsibility, as to the accuracy or exhaustiveness of the information. All implied warranties
and conditions are excluded to the maximum extent permitted by law”.
ISBN: 978-2-85873-317-0
1
from 2010-2012
TABLE OF CONTENT
1 Introduction .................................................................................................................................. 4
1.1 Risk of digital systems ............................................................................................................... 5
1.1.1 Change of technology ................................................................................................... 5
1.1.2 Increased connectivity .................................................................................................. 5
1.1.3 Increase of threats ........................................................................................................ 6
1.2 Current assistance available to EPUs ........................................................................................ 7
1.2.1 Current development in standardization ........................................................................ 8
1.2.2 Governance and organizational initiatives ..................................................................... 8
1.2.3 Cigré’s role ................................................................................................................... 9
2 Working Group D2.31 ................................................................................................................. 10
3 Summary of findings and recommendations of Working Group D2.31 ........................................... 11
4 Work stream 1: Classification methods for security zone/level definition (graded approach) ......... 12
4.1 Graded approach for EPUs: Clarifying the security levels and zones concepts .......................... 13
4.1.1 Terms and definitions ................................................................................................. 13
4.1.2 Standards and Best Practices of graded security approaches (as per beginning
of 2012) ...................................................................................................................... 15
4.1.3 Example of an applied Graded Security approach to mitigate a state -of-the-art
Cyber attack ............................................................................................................... 19
4.1.4 Comparison of a typical IACS infrastructure by the considered attack processes .......... 19
4.1.5 Examples of protective measures in a graded security approach .................................. 19
4.1.6 Evaluation of the graded security approach efficiency .................................................. 20
4.1.7 Conclusion ................................................................................................................. 21
4.2 Towards an adapted classification methodology for graded security approaches in EPU
architectures ........................................................................................................................... 21
4.2.1 A methodology to implement a “graded security approach” .......................................... 22
4.2.2 Definition of relevant classification criteria ................................................................... 23
4.2.3 Discussion on existing standards and best practices ................................................... 23
4.2.4 Practical methodology to classify systems to dedicated zones ..................................... 24
4.2.5 Application of a traversing path to determine a possible target zone ............................ 26
4.2.6 Application of the methodology in an example ............................................................. 27
4.2.7 Conclusion ................................................................................................................. 27
5 Work stream 2: Characterization, categorization and modelling of threats .................................... 28
5.1 Conceptual model of key concepts of cyber risk ....................................................................... 29
5.2 Why attack modelling is central to risk assessment .................................................................. 31
5.3 An overview of graphical attack modelling techniques .............................................................. 32
5.4 Security analysis of voltage control in active distributions grids ................................................ 34
5.4.1 Reference architecture ................................................................................................ 34
5.4.2 An example of attack tree ........................................................................................... 36
5.4.3 Voltage control architecture in CySeMoL ..................................................................... 38
5.4.4 Security evaluation using CySeMoL ............................................................................ 42
5.5 Conclusion .............................................................................................................................. 45
6 Work stream 3: Remote services................................................................................................. 46
6.1 Scope and purpose .................................................................................................................. 46
6.2 Landscape of threats ............................................................................................................... 46
6.3 Contractual issues: security requirements in procurement for Electric Power Utilities ................ 47
6.4 Application to real world architectures ...................................................................................... 51
6.5 Checklist of Security Requirements and Management Controls to Consider for T P
Agreements ............................................................................................................................. 55
6.6 Conclusion .............................................................................................................................. 56
7 Conclusion and outlook of WG D2.31 .......................................................................................... 57
A.1 ACRONYMS AND ABBREVIATIONS ........................................................................................ 58
A.2 REFERENCES ........................................................................................................................ 59
A.3 TABLE OF FIGURES ............................................................................................................... 65
A.4 TABLE OF TABLES ................................................................................................................. 65
1 Introduction
Before the era of digitalization, Electric Power Utilities (EPUs) did not worry much about
threats from the Internet. They rely on the obscurity of their systems, and p hysical protection.
The systems weren’t connected with data communication protocols, but rather with relays and
physical switches.
EPUs are accustomed to long lifespan for their technical infrastructure. Proprietary systems
were the norm; they were designed and built especially for their purpose. During the last ten
years technological development and the nature of the business has changed. Modern
equipment is built with Commercial Off the Shelf (COTS) products, standard hardware and
software that is designed for commodity and multiple purposes. In general the industry has
moved from specific hardware and software to generic operating systems and standard
applications that are also used for other purposes. The same development is happening to
Human Machine Interfaces (HMI), Programmable Logic Controllers (PLCs) as well as other
protection and automation equipment. Today a digital system with the same operating system
and vulnerabilities can be used in an office environment, in a control center for Supervisory
Control and Data Acquisition (SCADA), or in a substation to connect to protection relays.
The same is also true for data communication. Data communication links to c ontrol and
operate core processes of EPUs used to be “serial line” and “point -to-point” connections.
Today data communication in EPUs is based more and more on modern “routable”
communication protocols (e.g. IP protocols), which introduce a new level of co nnectivity with
new vulnerabilities and weaknesses. A return to older “serial” protocols would not allow the
bandwidth required to run advanced applications such as wide -area monitoring, and would
also not offer nearly as much capability as IP-based protocols.
A German newspaper article [1-3] [1-4] describing a real world example demonstrated the
increased connectivity between the commercial/business network and the digital systems
controlling critical infrastructures in a real worl d scenario. The article described a penetration
test targeting an EPU, which is located in Germany and supplies approximately 40,000
residents with electricity and water for the local region. According to the article in a short time
frame an IT security expert could get access to digital systems controlling critical
infrastructure by the penetration of the commercial and business network with a combination
of common attack methods, like social engineering and exploitation of vulnerabilities.
Although this might not be representative of all EPUs’ infrastructure and level of security, it
stresses a general fact that a total isolation of control systems from business systems is a
myth [1-5]. This myth has long prevented EPUs from adopting an adapted cybersecur ity
posture.
As another example of how system connectivity is used in real world attacks, one can study
the simplified example of a plant architecture showing different attack vectors of the “Stuxnet”
malware [1-6].
Commodity and business IT systems are already today connected to digital systems of critical
infrastructures.
Connectivity and integration are unstoppable trends for EPUs. They are embodied by an
increased use of remote accesses and of interoperable and open communications and
standard data models, like IEC 61850 [1-7]. The more interconnectivity and integration grow,
the more EPUs are exposed to cyber-attacks, with significant potential consequences.
New market requirements will drastically drive the need for this connectivity, electronic data
interchange, and integration, e.g.:
24/7 support maintenance combined with cost pressure drives the need for remote
services, which have to be accessible from around the world and have increased need
for high bandwidth to satisfy new requirements of ever -increasing pace and size of
service packs, updates, and configurations.
The energy branch is moving from demand driven control to demand response which
allows producers of renewable energy and the customers to interact in an automated
way in real-time, coordinating demand to flatten the peaks. Bi-directional energy flows
for distributed generation also need new communications. All this greatly increases
the number of market actors and needed communications.
The energy system needs to include the introducti on of more renewable energy, which
is by nature less controllable than conventional energy generation. This needs to be
compensated by a higher degree of connectivity and integration.
Smart metering is significantly enlarging communication needs compared t o before,
and adding controllability to the customers’ premises. At the same time as system
connectivity rises, criticality rises at the same pace. Suddenly the whole energy
system is very dependent on trustworthy communications. Without it, there is a ris k of
major black-outs [1-8].
Even if the systems are getting more complicated and open up new attack vectors, we still
need to remember the legacy systems. In an article of October 2013 [1-9], researchers report
on vulnerabilities found in devices that are used for serial and network communications
between servers and substations. These products have been largely overlooked as hacking
risks, because the security of power systems has focused only on IP communication and
hasn’t considered serial communication an important or viable attack vector (see [1-5]). But
the researchers say that breaching a power system through serial communication devices can
actually be easier than attacking through the IP network since it doesn’t require bypassing
layers of firewalls. A security breach is also represented by the later integration into existing
serial based devices of IP network interfaces supporting remote maintenance functions [1-10] .
According to a recent ICS-CERT report [1-11], the energy sector is highlighted as a cyber-
target in the industrial sector. Also an antivirus software vendor confirms this picture of
increasing threats with a report in the beginning of 2014, that “the energy sector has become
a major focus for targeted attacks and is now among the top five most targeted sectors
worldwide” [1-12].
The increase of threats is also reflected on the technical level. Vulnerability reports on
SCADA have grown by 600% since 2010, with the number of disclosed vulnerabilities
doubling between 2011 and 2012 [1-13]. Even if for some operators, incident reporting
becoming mandatory explains partially those numbers, this illustrates the growing interest by
attackers. These vulnerabilities affect a wide range of devi ces and manufacturers and exceed
the number of Java or Flash vulnerabilities, a significant fact because Java and Flash are
often viewed as poor security designed IT softwar e [1-13].
To give a more differentiated picture of today’s threat 2 landscape against digital systems in
the area of EPUs, threats could be categorized into directed and undirected attacks [1-14].
—————————
2 Not exhaustive: A further differentiation e.g. into intentional / un -intentional threats is not conducted
Examples of directed attacks:
Well financed nation state or organization attacks, like “Stuxnet” malware [1-15], which
quite likely disrupted the Iranian nuclear program, or the “Dragonfly Group” creating a
sabotage threat against western energy companies [1-16].
Hackers with political or environmental agendas, like “Anonymous” activists who have
targeted nuclear energy companies like EDF, GE an d ENEL in Q2/2011 after the
Fukushima tragedy [1-17] or the “Shamoon virus attack” 3 which infected around
30,000 computers of an oil company in Saudi Arabia in 2012 [1-18].
Disgruntled employees or third party support personnel with approved access rights
and knowledge of the intricacies of the EPU operation and storage facilities containing
sensitive data is a particular concern [1-19].
Even though not all of these attacks require sophisticated tools, nor do they necessarily
require extensive financing, attacks in general have become increasingly sophisticated
utilizing considerable capabilities and tactics.
A general projection is that these threats will increase in both sop histication and intensity with
the deployment of the Smart Grid’s Advanced Metering Infrastructure (AMI). This situation is
exacerbated when the AMI is connected to the public Internet and is not immune to threats
executed against EPU infrastructures using corporate or private intranets or by isolating the
systems.
EPUs need to be diligent in maintaining their awareness of rapidly evolving threats and
prepare accordingly to protect sensitive information and digital systems.
The definition of the term Cyber-security, which is used in the context, tries to summarize as
following:
“Cyber-security strives to preserve the availability and integrity of the networks and
infrastructure and the confidentiality of the information contained therein.” [1-22]
—————————
3 After a post at Pastebin.com, there are speculations, that the “Shamoon virus attack” was a directed attacked by
a hacker group.
1.2.1 Current development in standardization
The growing awareness of cyber risks has pushed the EPUs to investigate into security
standards currently applicable to the digital systems [1-24]. Recently the reference
standardization committees started the analysis of the communication and security standards
mapping them over the control use cases of smart grids.
Besides these three generic initiatives, control system vendors are also active in targeting the
development and implementation of security technologies related to standard communication
protocols, such as the IEC 61351 series managed by IEC TC57 WG15. Additionally, the
nuclear power generation domain has its own framework and initiatives, both at the national
level (e.g. NEI 08-09 in the US [1-30]) and at the international level (IAEA document [1-31]
and IEC standards like IEC 62645 or IEC 62859 [1-32]).
The uptake in smart grid deployments has motivated the EU and US to create the most
comprehensive implementation programs. Both have developed and maintained energy sector
roadmaps to achieve energy delivery system cybersecurity.
The high representation of the Union for Foreign Affair s and Security Policy outlined the EU’s
vision and the actions required to achieve an open, safe and secure cyberspace for their
member states [1-33].
To facilitate and support the process of a European-wide Smart Grid roll-out, the European
Commission set up a Task Force on Smart Grids. The ultimate goal of this Work Program is to
identify and produce a set of regulatory recommendations to ensure European -wide
consistent and fast implementation of Smart Grids, while achieving the expected Smart Grids'
services and benefits for all actors involved. The key deliverable of the Expert Group 2 (EG2)
is to identify the appropriate regulatory scenario and recommendations for data handling, data
security and data protection. The aim is to establis h a data privacy and data security
framework that both protects and enables. Within the EG2 program ENISA recently published
a proposal for a list of security measures for Smart Grids [1-34]. Such a list is used as a basis
by the WG Information Security of the CEN/CENELEC/ETSI Smart Grid Coordination Group in
order to correlate the security standards and to identify the need for further developments
addressing uncovered requirements. The European project Security of Energy Systems
(SoES) is moving a step ahead towards the filling of gaps identified by the aforementioned
expert groups [1-35].
Starting in 2005 the US Department of Energy in cooperation with other US agencies and
Canada facilitated the development of the Roadmap to Secure Control Systems in the Energy
Sector to enhance cybersecurity across the energy sector. In 2011 the roadmap was updated
[1-36]] to include the changing landscape of Smart Grid technologies, building on new
priorities to enhance vulnerability disclosure, addressing the more inn ovative threats, and
emphasizing a culture of security that extends beyond the focus on compliance. The US goal
is by 2020 to realize resilient energy delivery systems that are designed, installed, operated,
and maintained to survive a cyber-incident while sustaining critical functions.
Cigré has a demonstrated commitment in past, present and future to support EPUs in dealing
with cybersecurity issues. This section summarizes the Cigré SC working groups associated
with the topic of Cyber security:
CIGRÉ Joint Working Group (JWG) D2/B3/C2-01, “Security for Information Systems and
Intranets in Electric Power Systems”. The work has been carried out between 2003 and 2006.
The JWG produced a technical brochure [1-37], whose purpose was to raise the awareness of
information and cybersecurity in electric power systems, and give some guidance on how to
solve the security problem by focusing on security domain modeling, risk assessment
methodology, and security framework building.
CIGRÉ Working Group D2.22, "Treatment of Information Security for Electric Power Utilities
(EPUs)". The work was carried out between 2006 and 2009 as a successor of the JWG
D2/B3/C2-01.The WG D2.22 has focused and deepened the study on the following three
issues: Frameworks for EPUs on how to manage information security; Risk assessment (RA)
common models and methods for treating vulnerabilities, threats and attacks; and security
technologies for SCADA including real time control networks [ 1-38].
CIGRÉ D2.38 “A framework for EPU operators to manage the response to a cyber-initiated
threat to their critical infrastructure”: When completed in 2015, this group’s Technical
Brochure will describe a framework for a tool set that EPU operators can use to automate
their response to cyber-initiated threats. Specific components of the tool set will be based on
the input received from a global survey of EPUs interested in a tool set that can be used to
automate their response to a cyber-initiated threat.
CIGRÉ B5-D2.46 “Application and Management of Cybersecurity Measures for Protection and
Control Systems”. This group’s Technical Brochure is nearing completion and focuses on
cyber security issues from the perspective of protection and control systems, including
discussions on threats, background information, standards, practical solutions and case
studies.
During the time working group D2.31 has done following publication and initiate following
activities:
The paper “Graded approach to cyber security for EPUs: Clarifying the secu rity levels
and zones concepts” has been presented at the D2 Colloquium 2011 in Buenos Aires.
[2-1]
The paper “Modelling of cyber-attacks for assessing smart grid security” has been
presented at the D2 Colloquium 2011 in Buenos Aires. [2-2]
The paper “Cyber-attack modelling and security graded approach: key elements when
designing security architecture for Electric Power Utilities (EPUs)” has been presented
at the Cigré 2012 Paris Session 2012. [2-3]
The paper “Towards an adapted classification methodology for graded security
approaches in EPU architectures” has been presented at the D2 Symposium 2013 in
Lisbon. [2-4]
The paper “Application of a cyber-security assessment framework to smart grid ICT
architectures” has been presented at the D2 Colloquium 2013 Mysore, Karnataka,
India in 2013. [2-5]
The working group held a “Cyber Security tutorial” at the Cigré International Tutorial &
Colloquium on SMART GRID at Mysore, Karnataka, India in 2013
“Security in remote services used by EPUs” has been sent in to the Cigré Paris
Session 2014 [2-6]
Publication of the invited paper “Status of Cyber security” in the Electra magazine
October 2014,[2-7]
Graphical attack modelling is both a relevant and viable method for cyber security
analysis of control system architectures for future smart grids. Attack modelling comes
in many flavors and in this work one of the simplest approaches, attack trees, has
been applied in an example. The work has indicated the value of this easy -to-use
approach as a means to obtain a first holistic understanding of the strengths and
weaknesses of a system architecture solution. A model such as this can be expanded,
both in detail and in scope, when needed.
Going more in depth, the application of modelling and evaluation tools supportin g the
security analysis of ICT architectures allows managing the complexity of correlating
component configurations with attack steps and security controls. Based on the
assumption that architecture configurations are the cornerstone of smart grid cyber
security, this work explored the application of an attack graph formalism, CySeMoL, to
the security analysis of architecture variants for the Voltage Control (VC) in active
distribution grids connecting DER. We have represented the VC architecture using the
CySeMoL meta-model and we have estimated the probability of attack successful
comparing three configuration variants.
The work has also drawn attention to many of the challenges that still remain in the
use of graphical attack modelling by EPUs. Clearly, the use of graphical attack
modelling in practical applications requires a number of trade -offs, starting with the
selection of either a simple modelling method (such as attack trees) or the use of more
complex probabilistic and dynamic approaches availabl e. Furthermore, the level of
detail used to describe the smart grid scenarios has an impact. For a complete model,
more details need to be added both with regards to various (ICT) system components
and to the description of other smart grid control functio nalities. Likewise, other attack
processes and additional targets beyond the example presented may need to be
considered. Added to this, countermeasures may also need to be included. Finally, in
order for graphical attack modelling to become a practical su pport to EPU decision
making, the consequences of various attacks, on both the power system and the
business as a whole, need to be addressed. Many of these aspects remain for future
work.
Work stream 3: Remote services
EPUs rely on remote access for several use cases like maintenance or monitoring.
While improving performance and the overall process, those connections come with
risks. In many cases remote access performed by third parties and inconsistencies
between security policies could weaken the EPU.
In order to support utilities efforts in this field, we have proposed a simplified checklist
applied to remote services. This checklist is expected to guide utilities deciding if they
need to use remote services provided by third parties and what requirem ents should
be included in their RFQ.
We have also discussed possible technical architectures and ways to mitigate the risk.
Further steps include integration of legacy devices for remote maintenance, overview
of different architectures for remote maintenance, technical comparison of
architectures, issues and controls for the use of mobility devices (e.g. tablets,
smartphones, etc.) for remote maintenance, and the analysis of the issues involved
with the extension of remote access to include remote contr ol purposes.
The wide variety of variations in standards, best practices and regulations can lead in practice
to challenges in regards to conformity, application and implementations.
The purpose of this chapter is to clarify the concept of graded security approach as a
fundamental security architecture principle for digital systems in EPUs, enabling efficient
mitigation of current and upcoming risks. The chapter is structured according to the following
objectives:
to clarify the associated terminology and definitions associated with the concept of graded
security approach;
to give a general overview about known standards and best practices architectures in the area
of graded security approaches;
to discuss their characteristics, differences and limitations;
to illustrate the effectiveness and the adaptability of a graded security approach in a real world
attack use-case.
4.1.1 Terms and definitions
Following definitions should clarify terms associated with the concept of graded securi ty approach.
Graded security approach:
Graded security approach is a practical approach when dealing with large or
distributed computer architectures. In such a context, a uniform set of security
measures would not be adapted; and in fact, it would not be cost-effective to define
and implement security measures on a system by system basis. The graded security
approach involves grouping systems sharing similar needs for protection. From this
perspective, the graded approach implies the definition of a limit ed number of security
levels. Based on the grouping of diversified security controls and requirements in
different security levels, the graded security approach could be a base to introduce a
Defense-in-Depth (DiD) concept into an infrastructure. The initial focus of this work is
on the discussion of the graded security as the overarching approach.
Security Level:
A Security level is assigned to a system or group of systems in order to reflect similar
needs for protection. A security level corresponds to a given set of high -level security
requirements. Each system is assigned a security level, based on assig nment criteria,
depending on each specific graded security approach implementation.
Security zone and Security zoning:
A security zone is a “grouping of logical or physical assets that share common security
requirements. A zone has a clearly defined borde r (either logical or physical), which is
the boundary between included and excluded elements.” [ 4-7]
The principle of security zoning corresponds to the definition and implementation of
security zones (latter simply called “zones”): it is the architectural and implementation
side of the graded security approach defined earlier. Each zone has a given security
level assigned, indicating the protective measures to be applied for all digital systems
in that zone. The relationship between zones and security leve ls is not one-to-one:
there may be several zones with the same security level. The use of different zones
for digital systems having similar security levels may be needed for different reasons,
e.g., distinct administrative and organizational set -ups, different technological
environments calling for specific security control implementations, communications
restrictions to be implemented between zones. In most implementations, different
systems belonging to one zone build a trusted area for communication wit hin that zone
whereas zone borders require control mechanisms for data flow between zones.
Zones can be hierarchical in the sense that they can be comprised of a collection of
sub zones [4-7]. The division of a zone into sub-zones can be needed to comply with
specific requirements, e.g. administrative/legal needs, technological flexibility, or
isolation of given systems, without compromising the concept of the overlaying zoning.
Defense-in-Depth (DiD)
Defense-in-Depth (DiD) is often defined as an approach to security in which multiple
and independent security measures, covering organizational, technical and
operational aspects [4-8], are deployed in a security architecture, as no individual
measure can provide an appropriate level of security. In such approa ch, it is the set of
diversified and independent security measures which are able to bring the needed
detection, protection and response capabilities.
DiD is now considered as a fundamental principle in cyber securi ty, e.g. in the system
design [4-7], software design [4-9], security architecture, or security control design [ 4-
10]. In the NRC RG 5.71 [4-11], DiD is described as follows: “from a security
architecture perspective, it involves setting up multiple security boundaries to protect
Critical Data Assets and networks from cyber-attack.”
Finally, it should be stressed that the notion of DiD is closely linked, and sometimes
confused with the concept of graded security approach and the security zoning
principle. The notion of DiD overlaps the notion of graded security approach in the
sense that the security levels defined by the graded security approach call for security
controls respecting the DiD principle, and that the very definition of different security
levels is per se a way to diversify and establish multiple security layers of protection.
The initial focus of this work is on the discussion of the graded security approach as
the overarching approach.
Security domains
The Cigré JWG D2/B3/C2 introduced a security domain concept for Electric Power
Utilities [4-12] which has been further elaborated by Cigré WGD2.22 [ 4-13] using a
framework definition of security domains [4-14]. A logical security domain model, that
requires different protection levels, is described in the WG D2.22 documentation [ 4-
13]. An example mapping security domains within a typical EPU data network is
provided as an illustration.
The term security domain is defined in this work as “environment or context that is
defined by a security policy, security model, or security architecture to include a set of
system resources and the set of system entities that have the right to access the
resources” as defined in the ISO 7498-2 [4-14].
The IEC Smart Grid Standardization Roadmap [4-15] is referring to the following
domains in its conceptual model: Markets, Operations, Service Provider, Bulk
Generation, Transmission, Distribution and Customer. These application domains are
examples of functional areas that could be mapped to a security domain model (“top-
down” approach) [4-13] or zone-based security architecture (“bottom-up” approach) [4-
7]. In this context security domains are defined by authorities to express their area of
responsibility and risk appetite. Security requirements are fulfilled by using a graded
security approach, security zoning principles and by implementing security controls in
electronic data networks.
4.1.2 Standards and Best Practices of graded security approaches (as per
beginning of 2012)
PERA defines the Control and Information Architecture as one of three basic
Architecture (PERA) and the ISA95, 99
components of any enterprise, (the other two are the Production Facilities, and
The Purdue Enterprise Reference
The PERA does not describe a “Graded security approach”. However, it is the
base for different standards and best practices in this area and is therefore
mentioned in this context. The PERA model has been further refined and
standardized in ISA-95 [4-17]. This standard defines 5 levels identifying the
boarders of enterprise level, manufacturing and control level. The ISA -99
standard, described later on, provides also a 5 level functional model directly
derived from the PERA and ISA-95 models, with levels slightly re-named and
reorganized to better suit architectural discussion on security.
(also issued as IEC 62443-1-
there is no strict requirement fixing the number of security levels to define, nor
associated assignment criteria’s, but the standard provides examples based on a
simple 3 security level approach. A more detailed concept, named SAL (security
assurance levels), is presently discussed within ISA99, in order to move from
qualitative levels to more quantitative descriptions and metrics [4-18].
Cigré WGD2.22 developed a security domain model with generic protection levels
relative to operation (cf. Section 3.5). In an actual case the protection levels
should be defined as results of a risk management process. Examples are given
Cigré WGD2.22
with the view to provide practical guidance for deploying cyber security
technology within Electric Power Utility (EPU) data networks. A table summarizes
(TB 419)
a model that could be used by Electric Power Utilities and their application
domains like Generation, Transmission, Distribution and Markets. The security
domains should be mapped to a physical EPU data network. Since each security
domain prescribes specific security controls, specific security technologies can be
selected for deployment. Examples of security controls/technology are given for
the Corporate domain and the additional security controls/technology that are
needed for the Business Critical and Operation Critical domains.
The National Institute of Standards and Technology (NIST) Special Publication
800-82 “Guide to Industrial Control Systems (ICS) Security” describes security
methods and security controls.
NIST SP800-82
“RG 5.71 [4-5] describes a regulatory position that promotes a defensive strategy
consisting of a defensive architecture and a set of security controls based on
standards provided in NIST SP 800-53 and NIST SP 800-82, “Guide to Industrial
Control Systems Security” [4-20]. One part of the RG 5.71 is the definition of
defensive levels conceptually correspond to existing physical security areas and
describe an example defensive architecture as following: “This defensive
architecture includes five concentric cyber security defensive levels separated by
security boundaries, such as firewalls and diodes, at which digital
communications are monitored and restricted.” [4-5] “An example of such a
defensive architecture is one that inc ludes a series of concentric defensive levels
of increasing security which conceptually correspond to existing physical security
areas at a facility” [4-5 - C.3.2.1]
process. The NEI and its members develop policy on key legislative and
regulatory issues affecting the industry. The NEI plays an active role in the cyber
security area: in 2005, they issued the NEI 04-04 as guide for the cyber security
of US nuclear power plants. Following a new regulation on cyber security passed
in 2009 (10 CFR 73.54), NEI 04-04 has been replaced by NEI 08-09, issued
publicly in 2010 (as Revision 6) to be used by the US nuclear utilities as a
template when elaborating a cyber-security plan for their critical digital assets. Its
format aims at facilitate compliance with NRC regulations on cyber security.
The International Atomic Energy Agency (IAEA) has prepared a new document
Computer security at nuclear
IAEA reference manual on
dealing with computer security at nuclear facilities. After several years of debate,
it is in its last editorial stage before publication, at the moment of writing this
paper. The targeted audience is very wide, including regulators, policy -makers,
operators and vendors. The scope is also large, as the document provides
facilities
“The purpose of the AMI Security Specification is to provide the utility industry
security requirements
Table 4—1. Standard and best practices of graded security approach (as per beginning of 2012)
2000
(ISA95)
Table 4—2. Comparison of standards and best practices (as per beginning of 2012)
4.1.3 Example of an applied Graded Security approach to mitigate a state -of-
the-art Cyber attack
To illustrate the effectiveness of a graded security approach, we evaluate in this section the
effect of an advanced but realistic multi-vector attack against a simplified architecture. This
architecture implements a graded security approach and security zoning principle, as
described in Section 3.1 and 3.3. The chosen attack processes correspond to the mal icious
framework “Stuxnet” [4-25].
In this purpose, this section provides:
a short presentation of the attack vectors used by “Stuxnet”;
an identification of possible attack points for these vectors in a simplified architecture,
designed along a graded security approach;
examples of the associated protective measures; an explanation of the expected mitigation
effects of such an architecture in front of the considered attack vectors.
These elements are only given to illustrate the application and possible efficiency of a graded
security approach based on a specific example and implementation. They do not intend to
provide a detailed case or guideline, to be generic, complete or exhaustive
4.1.3.1 Attack processes
Referring to the current publicly available information, Stuxnet is based on the following propagation
methods [4-25]:
i. Network propagation routines: Infecting WinCC machines via a hardcoded database server
password
ii. Network propagation routines: Propagating through network shares
iii. Network propagation routines: Propagating through the MS08-067 Windows Server Service
Vulnerability
iv. Propagation routines: Peer-to-peer communication and updates4
v. Propagation routines: Propagating through the MS10-061 Print Spooler Zero-Day
Vulnerability²
vi. Removable drive propagation: LNK Vulnerability (CVE-2010-2568) or AutoRun.Inf
vii. Step 7 Project File Infections: S7 files, MCP files or TMP files
Figure 5-2 gives a high-level and simplified scenario of how the different attack processes
could affect an IACS infrastructure, divided into security zones. The scenario has no claim of
completeness or detailed visualisation, more over the scenario shows the basic effectiveness
of a graded security approach. The red numbers ref er to the methods listed in the previous
subsection. Due to clarity the scenario applies not all possible attack proce sses to all possible
instances
.
4.1.5 Examples of protective measures in a graded security approach
To evaluate the effect of a graded security approach, the following security controls are assumed to be
applied to the different zones.
i. Physical separation of systems, e.g. air gap, physical one-way restriction (Zone E)
—————————
4 No direct propagation routine
ii. Logical separation of systems with functional connectivity based on application requirement,
e.g. firewall, deep packet inspection (Zone D)
iii. Restricted connection on public internet access (Zone B, C, D)
iv. System / Zone specific hardening based on requirement level (Zone A, B, C, D, E)
v. System / Zone specific patch management for system types / requirement level (Zone A, B, C,
D, E)
vi. Restriction on portable medias, e.g. organizational or technical restriction on USB or CD
usage (Zone D)
vii. Restriction on connection of portal workstation to network segments (Zone B,D)
rd
viii. Restriction on 3 party remote maintenance (Zone D)
ix. Application of antivirus scanner (Zone A,B)
Ethernet
1,2,3,4
3rd Party
Controller Controller
Maintenance
Workstation
Figure 4—1. Simplified example of a plant architecture showing different attack processes with no claim of completeness
Based on a simplified simulation of the attack processes against a simplified architecture the
following basic conclusions about graded approaches could be drawn:
Isolation or network segmentation is an effective mitigation of infection ways between secure
zones, see e.g. segment D and E. Important is the efficiency of the implemented security
controls establishing the graded security approach, e.g. firewall/traffic control rules to separate
zones.
The application of different security controls in different zones enables an adapted and
practical implementation with a sufficient security; see e.g. USB restriction in segment D and
E, but not in A and B. In segment A and B, antivirus scanner (and not represented
organizational procedures) may be considered sufficient for USB-based attack processes.
Graded security approach enables the use of best-of-breed security controls: see for example
the antivirus scanner in segment A and B, but due to system characteristic, or incomplete
implementation it is not in D and C.
Infringements of the graded security approach could lead to direct failures of the overall
security posture; see for example the 3rd party maintenance in segment C.
4.1.7 Conclusion
EPUs face new challenges in terms of cybersecurity, driven by the tremendous evolutions of
their environment and their technical infrastructures. Numerous standards, best practices and
blueprint architectures push for a graded security approach, and the implementation of
security zones. Based on a survey of the different standards, best practices and blueprint
architectures dealing with graded security approach and security zoning principles, the
following conclusions could be drawn:
Terminology and definitions related to the graded security approach differ partly in the
examined documents. This could lead in practice to challenges in regards to conformity,
application and implementations. Nevertheless, most of the examined documents share
common generic concepts and principles, which are identified and discussed in this paper.
The development of a graded security approach for digital systems can’t be seen isolated. The
practical implementation and operation of a graded security approach should include and
connect to “non security” aspects like business integration, architecture, governance,
organization structure, physical environment, legal or safety regulations. All these aspects
have to feed in and be aligned with the graded security approach to ensure a successful and
efficient implementation and operation.
It is essential to provide classification criteria to ensure a consistent mapping of digital
systems to different zones and ensure so a successful implementation of a graded security
approach. The examined documents provide only partly or not at all detailed classification
criteria.
Further could be stated, that security classification criteria should not lead to unidentified
conflicts with “non security” characteristics, like the ones previously mentioned.
The effectiveness of a graded security approach relies on an appropriate selection,
implementation and operation of different security controls. Therefore security controls cannot
be reduced to network segmentation measures, but must integrate security controls of
different level like organizational, physical and technical, in a Defense-in-Depth approach.
—————————
5 “zone or sub-zone” later referred only as “zone”
general fulfilment of requirements by technical, organization and physical controls
implicated by the specific control set and architecture of a zone. The mapping to a
zone could be described as a part of the high level system design and is therefore part
of the realization phase of the system development.
e) Dedicated digital system controls: Gaps between the identified digital system
requirements and the applied zone control set should be identified to ensure the
appropriate mitigation by dedicated systems controls. If a mitigation by dedicated
systems control is not possible (e.g. tolerable risk is not in the limit) among others
following methods could be applied:
Re-assessment of systems or surrounding systems,
adaptation of the specific zone control set,
re-assessment of the system design, operational model,
re-assessment of overarching zone model
The gap analysis and the definition of dedicated system control s could be described
as part of the detailed system design.
f) Other phases of a lifecycle, like parts of the realization phase (e.g. start -up
acceptance testing) or operational phase are not further discussed at this point.
Based on the phased implementation of a “graded security approach” this paper outlines key
areas to support a practical implementation of a “graded security approach”:
definition of relevant classification criteria
practical methodology to assign systems to dedicated zones
application of the methodology in an example
7 ArchiMate, an Open Group Standard, is an enterprise architecture methodology and framework to improve
business efficiency.
The technology layer deals with the hardware and communication infrastructure to
support the application layer. In the context of a “graded security approach” the
technology layer is adapted to criteria like network categories, e.g. control system LAN
Based on these clusters CIGRE WG D2.31 analyzed selected standards and best practices to
classification criteria, zone criteria and/or controls to establish a “graded security approach”.
Figure 1 shows the summary of this analysis showing the focus area o f the different standards
and best practices.
The result concludes that standards and best practice covers and focus on different target
group, application areas and characteristics of a “graded security approach”. Further it could
be concluded, that an overarching normalization of classification criteria does not exist. This
could also apply to a common definition of a control set applied in a "graded security
approach” or common zone model.
The example shows the classification of a digital system to a zone model with 4+n zones
based on sample non-exhaustive questions in the area of impact, IT security, safety, and
architecture. The questions and answers are hypothetical, but should give an insight as to
how the methodology can be applied in practice to determinate the proposed target zone.
4.2.7 Conclusion
The success of a “graded security approach” depends on an effective implemen tation,
maintenance and operation. Practical methodologies, guidelines, template and reference to
standards and best practices are needed to ease the setup of a “graded security approach”
and to ensure compliance. An effective practical methodology to intr oduce a graded security
approach in EPU architectures is to design and implement a classification approach that is
directly applicable to the business, technology and applications of the EPU.
In addition to a quicker “graded security approach” design, suc h methodology can remove
burden of the security review by pointing out critical allocation of systems that need some
dedicated controls. For more enforceability of the results, the next step could be to building of
a common definition of a "graded security approach” and requirements set for specific areas
in the smart grid.
5 Work stream 2: Characterization, categorization and modelling of
threats
The objective of the working stream is to discuss and develop:
graphical attack modelling approaches relevan t for EPUs contexts;
help consequence analysis of implementing access solutions to the smart grid
networks, and support an optimal deployment of appropriate security
countermeasures;
the connection between attack modelling and the comprehensive risk analy sis
frameworks to optimize countermeasure configurations.
The working stream 2 started with the modelling of cyber-attacks for assessing smart grid
security, as a basis for further evaluation of architecture principles.
Smart grid developments will enable numerous new services with new traffic patterns. These
developments will change radically both network accesses and core architectures and
technologies. A smart grid is likely to be topologically complex, to contain vast numbers of
heterogeneous endpoints, participants, interfaces, communication channels, operational
modes and will require operational policies encompassing different domains requiring the
know-how and expertise of IT personnel. These changes could result in a significant number
of new types of vulnerabilities. This will constitute a great challenge for network planners and
operators. It is highlighted in the IEC Smart Grid Standardization Roadmap [5-1], that cyber-
security in particular will play a key role in the efficient and reliable operation of smart grids.
Cyber security requirements have to be derived from risk assessments an d general
architectural decisions. A smart grid reference description (e.g. [5-2]) and security use-cases
are necessary bases for such a work, which will be accomplished in a continuous approach.
Focusing on a weak point of the ongoing cyber security stand ards [5-3], this working stream
initially addresses the characterisation, categorization and modelling of malicious cyber
threats, which represent key steps in a risk assessment process. Following this the work
focuses on the cyber security in smart applic ations for energy grid topologies characterised by
high penetration of distributed energy resources (DER) with renewable generation, storage
devices and controllable loads, and the involvement of multiple active actors across the smart
grid domains.
To illustrate this, a representative use case dealing with the Voltage Control (VC) of active
Medium Voltage (MV) distribution grids will be considered. The role of the VC function is to
adjust the voltage profile on the MV grid to optimise technical and economi c objectives,
sending set points to distributed energy resources and to the distribution grid devices.
The aim of the work is to demonstrate techniques for deriving justifiable estimations of the
difficulty of succeeding with different kinds of cyber-attacks to VC related communication
services within the substation automation system.
Starting with the description of a VC function architecture as a representative use case of
future smart grids, the work focusses on the application of CySeMoL (Cyber Securit y
Modelling Language) to the sample case aimed at the evaluation of the adequacy of the tool
to the smart grid sector. The CySeMoL methodology is applied to describe the grid ICT
architecture (networks, operating systems, services, protocols, data flows, a nd more), the
security measures and the source and the target of the attack. The CySeMoL modelling
approach is based on the attack graph formalism and provides justifiable quantitative
estimates on the likelihood that different attack paths will be success ful. In this work
CySeMoL will be used for estimating the likelihood of certain attack processes affecting the
VC functions, including attacks caused by the remote maintenance procedures on the VC
devices.
This work will start by presenting in Section 5.1 a conceptual model expressing the meaning
and the links between the key concepts of cyber security risks. Following this, the work
examines attack modelling, addressing some pertinent technical and architectural issues.
Section 5.2 explains why attack modelling is central to risk assessment, and subsequently
graphical approaches to attack modelling are presented in Section 5.3. In the second half of
the work, the significance of attack modelling for smart grids is demonstrated. A reference
architecture for smart grid use cases is presented in Section 5.4.1 as a basis for the
application of attack modelling, while in Sections 5.4.2 and 5.4.3 the connection between
attack modelling and security analysis is discussed by using attack tree and CySeMoL
formalisms. The work concludes in Section 5.5 by summarizing the work presented and the
issues still to be addressed.
The domain of cyber security risk is characterized by the use of complicated and sometime
confusing terminology and concepts. The domain makes use of abstract and conceptual
words such as threat, risk, impact, attack, vulnerability, exploit, countermeasure, intrusion,
mitigation, security, availability, integrity, confidentiality, and non -repudiation, and others.
These words are often mixed with somewhat more concrete and tangible words such as
spoofing, sniffing, distributed denial of service attack, firewall, intrusion detection system,
intrusion prevention system, patches, insider, cracking, phishing, a nd others. It is easy to get
confused by this mix of terminology. Although attempts have been made to unify the security
vocabulary, there is still no common single vocabulary or dictionary. Instead, several of these
words have changing or even overlapping meanings, depending on context. Furthermore,
implicit, unstated relationships can exist between these terms.
Conceptual models have been proposed in order to attempt to clarify such relationships.
Perhaps the most commonly cited is the one adopted in the ISO/IEC Common Criteria (CC)
standard [5-4]. The relationships between fundamental security concepts proposed by this
model are depicted Figure 5-1.
An alternative conceptual model has been developed to address some of those specific
shortcomings using the Cyber Security Modelling Language (CySeMoL) [5-5], cf. Figure 5-2.
CySeMoL is a domain specific language, a meta-model, which allows modelling of ICT
architectures. CySeMoL is aligned with CC model but in addition considers explicitly causal
dependencies between concepts in a probabilistic way. This is achieved by classifying the
security concepts in the forms of either explicit “entities” or as “attributes” of these entities (in
the same way as modelling languages such as Unified Modelling Language). The entiti es are
related with semantic entity relationships and the attributes are related with their causal
dependencies. The language CySeMoL is built up around “attack steps” that are targeting
“critical cyber assets”. “Attack steps” have some likelihood of being accomplished
successfully (Possible To Accomplish attribute) and the “assets” have certain value,
“expected loss”, to an “owner”. The owner value thus represents the relation to primary
equipment which makes a certain cyber asset worth while protecting . The product of that
value and the likelihood that an attack is successful yields an expected loss that corresponds
to the CC concept of risk. A distinction exists between the CC model and the CySeMoL
representation in the way that “threats” are characterize d. Within CySeMoL a “threat” is a
specific attack scenario consisting of a set of “attack steps”. “Threats” are raised by “threat
agents”. Importantly, as “attack steps” incorporate a probabilistic dimension, a “threat”
indicates the likelihood that a set of attack steps are successful given that they are attempted.
All the individual attack step probabilities are based on a combination of knowledge elicited
from domain experts and previously published academic research studies (where such exist).
The attacker is assumed to be a professional penetration tester with one week of preparation.
Finally, “attack steps” can be more or less effectively mitigated by “countermeasures”. The
representation used for “countermeasures” is a second key feature of CySeMoL. “ Counter-
measures” are a special kind of “assets” which have the purpose of protecting other “assets”.
CySeMoL differentiates between five different types of countermeasures:
Contingency - which operate only after an attack is successful, e.g. back -ups;
Preventive - which the attack harder to accomplish, e.g. firewalls and access control;
Detective - which merely register attacks and set off alarms , e.g. intrusion detection
systems;
Reactive - which are a mixture of detective and preventive countermeasur es and
incorporate sufficient intelligence to actively take precautions under attack; and finally
Accountability – which do not mitigate an attack as such but it collects information
about it. This will have a causal impact on the attack success rate sinc e a good
accountability defense is expected to scare off threat agents who like to minimize their
risk of being caught.
0..* Association
Owner 1..*
0..*
Value
ExpectedLoss
ContingencyCountermeasure Asset
ExpectedLoss SUM
Functioning ExpectedLoss
Countermeasure
ExpectedLoss
Functioning
PreventiveCountermeasure OR
ExpectedLoss Threat
0..*
Target
Functioning
AttackStep IsRealized
ReactiveCountermeasure
ExpectedLoss PossibleToAccomplish AND PossibleToAccomplish
Functioning
OR
DetectiveCountermeasure Leaves accountability
ExpectedLoss 0..* Includes
Functioning
1..*
AccountabilityCountermeasure
ExpectedLoss
Functioning
1
ThreatAgent
Resources GiveRiseTo
It is clear from the preceding discussion that CySeMoL represents an example of reference
models that is trying to establish a more rigorous terminology for communicating, modelling
and analyzing cyber security. That said, it will remain important in the short term to define a
clear conceptual framework for each work environment. While the following section focuses
on the clarification of attack processes, similar clarifying work may be needed for many other
concepts.
This dependence is important. It highlights, from the perspective of cyber security decision
makers in utilities, what can be controlled through choice of the ICT infrastructure. For
example, the consequences of attacks, although affected by the countermeasures in the ICT
infrastructure, depend primarily on the operational conditions decided by the business of the
utility. Likewise, the skills and behavior of the threat agents, from the perspective of the cyber
security decision maker, are observable but no controllable. The likelihood of threat
realization, however, can be affected by the ICT infrastructure selection . Thus it is natural that
any decision support methodology or tool is focused on this aspect. Irrespective of whether
the decision maker is a TSO acting in a country facing the threat of a war, or a small DSO in
society with a low level of criminality, the decision process often focuses on how many
countermeasures are enough, in response to the likelihood of threat realization.
The key then to understand how to optimize the security of the ICT infrastructure lies in
understanding the different vulnerabilities in the system as a whole. An efficient approach to
this is to model and examine different attack scenarios to the system. Attack scenarios are, in
essence, the steps that an attacker needs to take to realize a threat. Their description can b e
textual, but also graphical. Originally, graphical attack modelling focused purely on technical
issues. The techniques have since been extended to include “softer” organizational aspects
since security is a system level property. E.g. a technically exce llent access control solution is
negated if anyone can call the helpdesk and get an account. In the next section we will now
look at methods for graphical representation and comparison of attack scenarios.
Numerous graphical attack modelling formalisms are available. The most known and widely
used formalism is probably the attack tree methodology [5-7]. Inspired by the fault-tree
formalism commonly used in dependability, attack steps and techniques are organized in a
Boolean logical tree, with the attack objective as the “top -event” (root) - cfr. Fig. 5-3. Attack
trees have been applied to a range of different kinds systems, including EPU -related ones,
like SCADA systems [5-8][5-9], smart metering systems [5-10] or safety automation in nuclear
power-plants [5-11].
Complementing attack trees are several more academic formalisms for attack modelling.
These include Petri-net based approaches [5-12][5-13], Bayesian network-based approaches
(see [5-14] for a SCADA-system oriented example) or UML-oriented ones like abuse cases [5-
15] or misuse cases [5-16].
Each of the available methods offers a different trade -off between readability, scalability,
modelling power and quantification capabilities. For instance, attack trees are ea sy to read
but are not very powerful, being a static formalism. On the opposite, Petri net -based
approaches are very powerful, but difficult to handle for non -specialists of these formalisms.
Considering such diversity, it comes as no surprise that each of the authors was more
particularly familiar with a specific method. For instance, RSE employs a state -diagram
approach for modelling attack experiments [5-17], illustrated by Fig. 5-4, which can be seen
as the horizontal explosion of an ordered goal-tree with timed transitions [5-18]. Alternatively,
EDF R&D has developed a formalism called BDMP [5-19] which, although visually close to
attack trees, enables the modelling of dynamic characteristics such as sequential attack
steps, detections and reactions. An example is given in Fig.5-5. The formalism has been
adapted from the dependability area [5-20], it supports diverse treatments which cannot be
made in classical attack trees. Finally, KTH has developed a Probabilistic Relational Model
(PRM) for cyber security risk analysis [5-5], shown in Figure 5-2, which enables attack step
representation while providing a broader framework supporting risk computations on an
instantiable UML-like class diagram.
AND
RAS compromised
OR
Wardialing RAS access granted
OR AND
Authentication with password Vulnerability_found_and_exploite
Vulnerability found and exploited
AND
OR
OR AND
Force brute
Social engineering Find vulnerability Exploit vulnerability
Figure 5—5. BDMP modelling of the RAS attack (with sequences represented by the red arrows)
For qualitative evaluations, the simple process of making use of graphical modelling approach
enables a simpler evaluation of likelihood, which can then be based on tangible and visual
representations. Expert discussion and debates are easier, and the diversity of the potential
attack paths is more clearly understandable. For complementary quantitative analysis,
different numerical parameters can be added to the model s, including probabilistic ones,
depending on the attack modelling technique chosen. More globally, attack modelling can also
help further in the risk assessment process and in particular aid the identification of the
vulnerable part of the security architecture and overall organization: Specific attack steps or
techniques may appear in many scenarios and for different attacker goals, pointing priority
weaknesses for treatment. Automatic model processing can in some cases help the analyst in
this task, depending on the modelling approach adopted.
In complement to the above discussion, more detailed examples of the use of attack trees are
available. Several risk assessment methodologies (mainly from the USA) explain in details the
use of attack trees in the risk evaluation process. Concrete examples include the case of
SQUARE (Security Quality Requirements Engineering), developed by Carnegie Mellon
University [5-21], or MORDA (Mission Oriented Risk and Design Analysis), defined by the US
National Security Agency, and mainly used in the Defense industry [5-22][5-23]. Coming to a
more EPU-related domain, a recent US regulatory guide on cyber security of nuclear power
plants also mention the use of attack trees in risk analysis [5-24].
As a first step, the attack tree formalism will be used to represent attack scenarios on the
reference architecture of the voltage control function described in Section 5.4. Such a choice
has been made, not for a hypothetical superiority with respect to the other formalisms, but
because attack trees provide the most readable and accessible representation in the context
of this work. As a second step the usage of the CySeMoL tool is presenting showing the kind
of evaluations from its underlying modelling method.
The operation of active distribution grids with high penetration of DER, connected to MV bars
and feeders, requires the implementation of a new VC function (cf. Use Case WGSP -0200 in
[5-25]). In MV feeders including distributed generation, the power injected by DERs can lead
the voltage beyond the limits in some parts of the grid, mainly due to uncontrollable
generation from renewable sources. Control actions limited to the OLTC (On Line Ta p
Changers) of the substation transformers and compensation measures, as usually operated in
passive grids, may be not sufficient to meet the supply requirements established by the norm
EN 50160. Voltage profiles in the MV grids may be adjusted acting also on DERs connected
to the MV feeders and substation devices as capacitor banks and storage devices.
Figure 5-6 presents the main components of the grid control architecture involved in the VC
function. By focusing on the HV/MV substation, the figure highli ghts the need of a new VC
function performed by a station level control system (called Substation SCADA). The main
control loop of the VC function is based on substation – centre, intra-substation and
substation-DER communications. Given the grid topology, field measurements, market prices
and resource operation costs, the VC function optimises the voltage profile computing and
sending appropriate set points to the third party distributed energy resources (generators,
flexible loads and storages) and distributor's devices (i.e. capacitor banks and OLTCs). The
algorithm is based on an AC Optimal Power Flow where grid losses and integral constraints
are taken into account. The status of the grid, required by the control algorithm, is computed
by a State Estimator function, based on actual measurements and grid topology.
The management and the security administration of the centre and substation ICT
components and networks are performed by the DSO ICT Control Centre. It has direct access
to network and control components, except substation IED elements and DER components.
The data flows for the remote management of communication and control devices are based
on secure operations using, e.g. HTTPS and SSH protocols.
According to the architectural layout in Figure 5-6, the supply chain of the VC function
depends on several communication links involving remote accesses from systems outside the
perimeter of the DSO organisation. In particular the VC application in the substation has
communication links with third party DERs, possibly deploying heterogeneous communication
technologies available in different geographical areas. From the operation stand point, the
optimization function has to receive voltage regulation requests by the TSO (Transmission
System Operator) whenever a transmission grid contingency needs to apply preventive
measure to voltage collapse. Load and generation forecasts are used to optimize the
operation of distributed devices, while the economic optimization is based on market prices
and DER operation costs.
The information exchanges of the VC function would map onto the IEC 60870 -5-104 protocol
(for centre-substation communications) and the MMS profile of the IEC 61850 standard (for
the intra-substation and substation-DER communications).
By focusing on the core of the MV regulation scheme, it results evident that the correct
elaboration of the optimal set points depends on the provision of correct operation and
economic data from the above communication channels [5-26]. A malicious attack to one of
the above communication links may cause the loss of generation forecasts, economic data
from the market, TSO requests, topological changes, oper ational data from the DMS, the
introduction of faked generation forecasts, economic data from the market, TSO requests,
topological changes, operational data from the DMS, monitoring data or set points. The
effects of communication attacks may lead the regulation function either to diverge from
optimum set points or, even worse, to produce inadequate set points with cascading effects
on connected generators. The objective of the security countermeasures integrated in the
architecture is to meet the VC availability and integrity communication requirements, i.e. to
undo data losses and to avoid injection of spurious messages.
Typical cyber security risk analysis requires the identification and the hierachization of critical
functions and associated supporting systems to protect. Such results take into account both
the potential consequences and the likelihood of disruption to the functions and associated
systems. Previous work done in Cigré WG D2.22 have already described and reviewed
different risk analysis methodologies, ref. [5-27] while a generic framework can be found in
ISO/IEC 27005 on an information security standpoint [5-28]. With respect to the smart-grid
use-case presented previously, it is assumed that a preliminary risk an alysis process has led
us to focus on the substation automation and in particular the correctness of the VC bay -level
function.
The role of the VC function is to adjust the voltage profile on the MV grid to optimise the
stated technical and economic objectives, sending the respective commands to the distributed
energy resources and to the distribution grid devices (e.g., capacitor banks, OLTC switches,
MV feeders). Several information flows are required consisting of the exchange of grid
topology, field measures and market prices. The limited measurements available from the
field mean that there is a need to complete actual measures with measurements computed by
a state estimator function. The function also takes into account the forecasts of distributed
generation production and consumption by intelligent loads. In the hypothesised architecture,
the generation forecasts are assumed to be provided by an external system communicating
with the central DMS, whilst the load forecasting is a function provided by t he DMS itself.
Finally, the Transmission System Operator (TSO) may also send signals to the VC control
system in order to implement defense actions dealing with a general stability of the
interconnected grid.
The following Figure 5-7 provides a generic input/output view of the VC function. This figure is
complementary to and coherent with the arc hitectural diagram shown in Figure 5-6. The
information flows have been simplified to assist the development of the attack model.
DMS / SCADA
TSO Information
State Estimation
Market Data
VPC Function Local measurements
Generation
Forecasts
DER / OLTC
Consider now the characterisation of the likelihood of attacks targeting such a function. In this
process, graphical attack modelling techniques such as described in Section 5.3 can provide
precious support. This is achieved on a qualitative point of view by enhancing the analysis
coverage regarding the attack scenarios and techniques and also by clarifying the potential
vulnerabilities taken into account. Depending on the selected technique, quantitative analysis
can also complement and feed in the likelihood evaluation process in order to compare and
classify likelihoods of other scenarios in the overall risk analysis. Starting from the gener al I/O
representation of the VC function in Figure 5-7, attack scenarios leading to incorrect VC
function results can be grouped in three categories, each of which will be reflected in the
graphical attack model. The attack scenarios include:
attacks on inputs of the VC function, either on the source or the messages
themselves;
attacks on the system processing the function;
attacks on the output of the function.
Fig. 5-8 gives a high-level attack tree representation following such a break -down. The top-
level branches and gates correspond to the high-level categories of attacks previously
described, plus a gate accounting for attacks on legitimate remote entities. Detailed sub trees
should be elaborated and connected to this structure, in order to represent c oncrete attack
techniques and vulnerability exploitation. These lower level decompositions require a vision of
the communication infrastructure, such as is shown in Figure 5-6. Figure 5-8 presents some
initial stages in the decomposition of an attack proce ss leading to the on-line corruption of
needed input messages of the VC function. Under the OR gate “input messages modification”,
Figure 5-8 illustrates a possible approach to the corruption of the information sent by the
TSO. Such network-centric attacks may include specific spoofing and forge techniques, as
well as gaining access to the actual communication channels. Alternatively, an intrusion
process might be used to attack the system processing the function. The intrusion process, in
turn, could be broken down into intermediate steps such as: violation of the local access
control measures, interception and then use of remote access credentials and finally
corruption of process. As indicated on the figure, the modelling of the specific attacks requires
greater technical details of the communication architecture (c.f. Figure 5-6). In either case,
the hierarchical nature of the Boolean tree notation enables different depths of representation
for these elements. Moreover, if the dynamic aspects of the attac ks (i.e. the order and timing
of the different attack steps) are deemed important, the simple attack tree representation may
be substituted by dynamic modelling techniques (cf. Section 5.3).
High level attacker
objectives/targets VPC dangerous results
(cf. Fig. 7)
OR
VPC corruption (bad results)
OR OR OR
Attacks on legitimate
Attacks on I/O communication messages VPC function direct modification
remote entities
(substation attack)
OR OR OR AND
Output messages Input messages
modification modification
[Attack tree cut for space reasons] [Attack tree cut for space reasons]
AND
OR
Attack step 1
Attack step 2
The main concepts modelled in CySeMoL are the following. First, each local area network
(e.g., DSO area control centre) is modelled as a network zone, assuming full reachability
between arbitrary hosts (e.g., services, applications or operating systems) located within the
network zone. Network zones are interconnected through gateways, with which firewalls and
intrusion detection systems can be associated. Second, within each of the network zone s and
across them, there are services, applications and operating systems (i.e., software
installations), each corresponding to a software product. Third, services, applications and
other software installations can connect to and communicate with each othe r. This is
modelled by data flows and protocols, while data possession is modelled by data stores.
Fourth, there are human users having access to systems, which can be protected through
authentication – access control points, authentication mechanisms and user accounts. Finally,
network zones can be associated with physical zones and zone management processes. For
a more elaborate description of CySeMoL, cf. [5-29]. CySeMoL with its related software tool
can be downloaded 8 online.
In order to reduce the scope of the analysis, this work covers the DSO Area Control Centre,
DSO Substation, DER and DSO ICT Control Centre, together with their interconnections and
related information flows. As for the security measures, the capability of firewalls in
interconnecting gateways, gateway-to-gateway network layer VPN and end-to-end transport
layer security, as prescribed by the Part 3 of the IEC 62351 standard [5-30], are
comparatively evaluated by means of CySeMoL runs.
Regarding the attack scenarios, this work focuses on attack processes exploiting
vulnerabilities in the remote ICT maintenance accesses to the substation SCADA and
—————————
8 http://www.ics.kth.se/cysemol
targeting the generation of faked set points. The tool will evaluate the success probability of
the possible attacks sorting them by decreasing probability. The vulnerabilities/actions
exploited/performed by the attack process getting the highest scores will be then considered
for further protection of residual risks.
The ICT architecture under evaluation is separated into four logical zones: D SO ICT control
centre; DSO area control centre; DSO substations; and DERs (see Figure 5-9). Each of these
logical zones corresponds to a network zone (local area network) and a physical zone in
CySeMoL.
Subject Assumptions
Both workstation and server On many systems (but not all) a host firewall is present and
operating systems functioning. In particular substations and DERs devices could not be
equipped with a well configured firewall
Workstation operating In centre domain they are generally up to date, and use recent
systems operating systems (i.e., Windows 7 as compared to Windows XP or
older). Although workstation systems are proprietary (as opposed to
open-source), binaries are obtainable by antagonists, since the
systems are well known and widely used (e.g., Windows). Substations
and DERs components could not be updated
Server operating systems Systems are usually well patched and use recent operating systems
(usually Linux based, thus open-source). Systems sensitive for control
of the electrical process (including those at substations) are an
exception, since frequent regular updating of systems sensitive for
process control poses high verification demands and
stability/compatibility risks, based on which such updates are seldom
performed.
Switches and gateways In the control centres, gateways use static ARP tables and switches
(network infrastructure) use port security, which disallows unknown network interface units to
connect.
Remote access client They are generally up to date (having recent patches applied).
Subject Assumptions
applications
Enterprise-level systems They are proprietary, and thus source code is not available to the
(e.g., asset management attacker.
system) and SCADA
systems.
Infrastructure systems (e.g., They are open-source, as well as using on open-source protocol
NTP server, remote access implementations (e.g., SSH).
services)
Services and applications Applications and services such as those for remote access, similarly to
operating systems, have undergone considerable cyber securit y
scrutiny and improvements within their development life cycle. This is
not the case for process control services and applications, which are
heavily verified regarding baseline functional correctness and process -
robustness, rather than cyber security.
Network management Network management is generally working according to best practice in
the DSO ICT control centre. Somewhat less so in the DSO area control
centre, where regular updating is not present for all systems, and
regular security audits also are uncertain. On the substation level,
regular log reviews do not take place, in addition.
Security awareness Security awareness program takes place for ICT maintenance
program personnel and the control operators. For technicians working on
substation level, it is uncertain.
Communication protocols Remote access protocols and protocols based on SSH, TLS or SSL,
such as HTTPS, are both encrypted and cryptographically
authenticated, as well as freshness indicated. Process control protocols
are neither encrypted nor cryptographically authenticated. Network time
synchronization protocol does not use any cryptographic techniques.
Domain services (X.500) and Windows Update (MS-WUSP) use
cryptographic authentication, but not obfuscation (communication
encryption). Process control communication protocols are neither
encrypted nor cryptographically authenticated.
Table 5—1: Brief description of assumptions made for the CySeMoL model
We hereby present the evaluation of three variants of the ICT architecture presented above, as
summarized in table 5-2.
For each variant of the ICT architecture we analysed seven attack targets. The targets were
chosen according to their assumed sensitiveness to the potential of cyber -sabotaging the
electrical process in the smart grid. The attack targets are listed in table 5-3. There are two
types of attack sources. First, we modelled outsider attacks. The outsider -attacker was
modelled as someone equipped with a computer and able to access in a malicious manner to
an intermediary network (i.e., DSO control network, DSO ICT management network, and DER
control network). Second, we modelled insider attacks. The insider -attacker was modelled as
someone able impersonating an ICT administrator, who had access to the remote access
application and a respective workstation operating system in the DSO ICT maintena nce
network.
For every single pair of source and target of the attack there exist a large number of potential
paths. For every scenario we are only considering the most likely attack (the easiest attack
according to CySeMoL). In Fig. 5-11 one such attack scenario is visualized. In this particular
example the starting point of the attack is assumed to be the DSO Control Network (framed
with a yellow rectangle), where the attacker has gained access. The target is the DSO Control
Center SCADA Front End (red rectangle). According to the calculations the most probable
path in would be that there first is a poorly configured firewall in the DSO Area Control Centre
(which assumes that we don’t have full understanding of its actual state) (step 8 – there is a
35% chance that this attack step is reached). After that it is assumed to be able to connect to
the SCADA front end without any problem (steps 9 and 10 – still a 35% chance to succeed).
Next, there is a chance that there exists a high severity vulnerability (ac cording to the CVSS 9
[5-31]) in the Front End service to which it also exists an exploit readily available that the
attacker gets hold of (steps 11 through 14 – there is a 32% chance that the attacker has such
an exploit). (Again this assumes that we do not have the exact knowledge about such
vulnerability and exploits exist for the Front End.) Finally, the attacker launches an arbitrary
code execution attack and by doing this achieves full control over the operating system
hosting the Front End (steps 15 through 17 – the final probability of reaching this state is 5%.
It is assumed that if the arbitrary code attack is successful, which in itself is quite low
probability, it also gets full access to the operating system.).
Figure 5—11. An example of an attack path visualized in CySeMoL. Attack steps are ordered according to
numbers on the arrows and the cumulative likelihood of succeeding the attack is visualized after the
attack step (attack steps 1-7 have been omitted for the sake
In table 6-3 the end results (attack probabilities) for all scenarios are displayed – both for
outsider and insider attacks (in parentheses). For clarity, they are also plotted in figure 5 -12.
We explain the results below.
—————————
9 http://www.first.org/cvss/cvss-guide.pdf
Probability of the conditional success of
the attack for outsider (insider) in:
Attack target Variant 1 Variant 2 Variant 3
SCADA HMI in the DSO area control centre .15 (.4) .41 (.4) .08 (.4)
SCADA frontend in the DSO area control centre .05 (.4) .47 (.4) .09 (.4)
Substation-level SCADA .11 (.38) .13 (.38) .11 (.38)
Substation gateway .17 (.19) .21 (.19) .21 (.19)
Control communications between the area control .33 (.38) .99 (.38) .17 (.05)
centre and substations
Control communications within substations .32 (.37) .98 (.37) 0.0 (.05)
Control communications between substations and .32 (.37) 1.0 (.37) 0.0 (.05)
DERs
The results show that variant 2, which does not use a VPN protection for communication
across the DER control network (i.e., between substations and DERs), appears by far least
secure. As the outsider attack initially propagates through the process control data flows, the
process communications appear highly exposed, resulting in almost certainty of being
compromised (if an attack is attempted). Consequently, the SCADA frontend and the SCADA
HMI at the DSO area control centre become notably easier targets. The substation -level
SCADA also appears more exposed. The second worst scoring variant is variant 1, which on
the other hand appears considerably more secure than variant 2 – thanks to no major
shortcoming such as a missing communication protection on an untrusted network. Realizing
the VPN protection in a host-to-host fashion (as is the case for TLS VPN), which normally
protects the communication anywhere outside the source, the destination host and the VPN
concentrator (gateway), appears to lead to the attacker’s inability to compromise such data
flows from positions other than the two hosts themselves. All in all, the evaluations show that
VPN protection is an important countermeasure in s uch architecture, and that the protection
of TLS VPN is superior to that of IPsec VPN, since it protects larger parts of the
communication.
5.5 Conclusion
The purpose of the working stream has been to demonstrate that graphical attack modelling is
both a relevant and viable method for cyber security analysis of control system architectures
for future smart grids. Attack modelling comes in many flavours and in this work one of the
simplest approaches, attack trees, has been applied in an example. The work has i ndicated
the value of this easy-to-use approach as a mean to obtain a first holistic understanding of
strengths and weaknesses of a system architecture solution. A model such as this can be
expanded, both in detail and in scope, when needed.
Cyber security analysis of ICT architectures is becoming more and more relevant in future
smart grid applications, characterised by multiple and heterogeneous communication links for
critical grid control systems. The application of modelling and evaluation tools suppor ting
security analysis allows managing the complexity of correlating component configurations with
attack steps and security controls. Based on the assumption that architecture configurations
are the cornerstone of smart grid cyber security, this work expl ored the application of an
attack graph formalism, CySeMoL, to the security analysis of architecture variants for the
Voltage Control (VC) in active distribution grids connecting DER.
We have represented the VC architecture using the CySeMoL meta -model and we have
estimated the probability of attack successful comparing three configuration variants.
CySeMoL evaluation has shown a few differences among the configuration variants of the
examined ICT architecture. From these preliminary evaluations we can conclude that the
confidence in the output probability values increases with the adequacy of the architecture
and attack models captured by the tool knowledge base, while decreases with the uncertainty
in architecture configurations that is reflected by the am ount of assumptions used in the
evaluation. However having a real and more detailed architecture at hand, more certain
results could have been obtained from the evaluation. Moreover, CySeMoL is a simplified
although comprehensive meta-model, which integrates a number of different topics within the
domain of cyber security. As such it can be a powerful tool for an IT architect, who considers
or develops different alternatives of a Smart Grid securement, and who might appreciate
guidance with roots in established models of cyber security, research experiments and
knowledge elicited from experts in the domain of cyber security.
The application of the current CySeMoL version to the Voltage Control architecture variants
has also allowed identifying specific aspects that are not covered by the current version of
CySeMoL, e.g. details on communication protocols and security measures. The further
application of CySeMoL to smart grid architectures will provide results about the adequacy of
this formalism to the smart grid sector.
The work has also drawn attention to many of the challenges that still remain in use of
graphical attack modelling by EPUs. Clearly, the use of graphical attack modelling in practical
applications requires a number of trade-offs, starting with the selection of either a simple
modelling method (such as attack trees) or the use of more complex probabilistic and dynamic
approaches available. Furthermore, the level of detail used to describe the smart grid
scenarios has an impact. For a complete model, more details need to be added both with
regards to various (ICT) system components and to the description of other smart grid control
functionalities. Likewise, other attack processes and additional targets beyond the example
presented may need to be considered. Added to this, countermeasures may also need to be
included. Finally, in order for graphical attack modelling to become a practical support to EPU
decision making, the consequences of various attacks, on both the power system and the
business as a whole, need to be addressed. Many of these aspects remain for future work.
6 Work stream 3: Remote services
The objective of the working stream is to discuss:
rd
risks of 3 party maintenance and information transfer to/from partners;
rules and best practices for maintenance support of 3rd parties as well as information
transfer to/from external partners.
This chapter proposes guidelines to EPUs to choose the most relevant standards or best
practices, provides a checklist to support the process, and discusses generic architectures. A
further step could involve more technical guidance and the extension of the discussion to
remote control of critical infrastructure.
This type of breach is not new: one of the first publicly known successful attack dates back
2000. An Australian, bitter from not being hired by Maroochydore Shire Council remotely
opened wastewater valves, resulting in pollution and death of marine life. One of the last
major public known breaches was due to pr0f, a 22 year old American that hacked into the
Springfield water treatment system that served 16.000 people in Texas and had broken a
th
pump on November 17 2012. These attacks are growing every day and many organizations
share interest on ICS hacking as the Trend Micro reports suggest [ 6-4], [6-5].
In order to mitigate these growing threats, we have worked on two types of security controls:
on the one hand by providing an actionable checklist against contractual issues and on the
other hand by highlighting technical controls given by some state of the art remote access
architectures.
There are many cybersecurity standards, guidelines, and best practic es. They address to a
great extent cybersecurity requirements for an EPU operator to design a strong cybersecurity
program, efficiently operate the program, and specify security controls to mitigate known
threats to their essential resources. These requirements commonly address access control
(identification, authentication, and authorization), data confidentiality and integrity, restricting
network domains and data flows, detection systems, incident management, and ensuring
availability of key resources. They are more and more taking into account the specifics of
industrial systems such as safety first, primacy of availability and integrity over confidentiality,
architecture and system constraints, etc. Examples include DHS and DOE [ 6-6,6-7], EPRI
cybersecurity procurement language [6-8,6-9], WIB M2784X10 [6-10] or ISO/IEC 27036 [6-
11], NISTIR 7628 [6-12], ISO/IEC 62443 [6-13], ISO/IEC 27019 [6-14], and the NERC CIP [6-
15]. Some of them are positioned on the figure 7-2.
Some standards (like IEC 62351) include security interoperability requirements for selected
communication protocols. Other standards address legacy systems using serial
communication protocols (IEEE P1689 [6-16]). All resources provide an excellent source to
help EPU for different needs, e.g.:
Technical controls, e.g. ISO/IEC 27002
Procurement requirements such as the DHS Procurement Language, e.g. to include in
a Request For Quotation (RFQ) [6-6]
Risk analysis or organizational controls, e.g. ISO/IEC 27001
Specific controls related to EPUs, e.g. ISO/IEC 27019 or IEC 62443
Related efforts aiming at future proofing procurement security requirements are ongoing,
defining grading scheme, and making it easier to compare and rate the security maturity
offered in a proposed solution. They also discuss different contract types and the related
incentive to support security [6-17]. This approach has been successfully tested on electric
power delivery substation gateway and further work could be done to adapt it to TP remote
access.
We propose in Table 6-1 a simplified checklist for EPUs to help them quickly identify essential
aspects before setting up a remote access by a TP. This checklist is not exhaust ive: Its aim is
not to replace existing standards and best practices but to provide an actionable support to
ensure that security has been addressed during the process.
Business needs and requirements
Describe the business needs (e.g. monitoring, maintenance, etc.) and scope
Consider alternative solutions to remote access by a third party (internal personnel, local access)
Include all Utility’s interested parties in the loop (e.g. CISO, Process, IT, Purchase departments)
Define how security requirements could be revised o ver time and periodicity
Define how Contractor’s security posture could be controlled (e.g. internal/external review,
logging)
Request Contractor to describe its security posture and strategy (e .g. supply chain, incident
management)
Define network security requirements (e.g. network perimeters, protocols, access control)
Include physical security requirements if applicable (e.g. building entrance, visitor policy)
Table 6—1: Summary of the checklist for an EPU before setting up third party remote
access
We also propose in Section 6.5 an extended list of security requirements with associated
controls for consideration by an EPU before contracting with third parties for remote access.
The EPU could select the relevant requirements/controls for their case and include it in their
RFQ.
We can think of three types of systems to be maintained remotely: Critical systems, small
systems and all the other. Even if it is neither a cost effective nor a practical approach for a
critical system, it is up to the security posture of the EPU to choose to allow remote access to
critical systems. It has to be a management decision, but some standards [ 6-14] and national
recommendations [6-18], [6-19], [6-20] tend to prevent utilities from remotely maintaining
safety systems by imposing a high burden with technical controls. The architecture chosen
has to support the management decision and provide security and safety.
As shown in Figure 7-3, the remote access architecture has several components:
TP Subject is the population inside the TP who will get access to the resources;
TP ICT Resources used to perform the remote access activities;
Access Network which could be a public network;
EPU Access Architecture zone which is itself composed of the Resources that are
made available but also security components to isolate and protect the different zones
and provide access to the EPU Accessible Resources;
EPU Internal Resources zone which usually remains not accessible to the Third Party.
Depending on the contract, the responsibilities could be different as illustrated by the arrows.
Several implementations are of course also possible, e.g. using a public access network like
Internet or dedicated one, using different authentication schemes, using an IPSec VPN,
managing a strict isolated zone on the EPU side for third party accessible resources, etc.
Figure 7-3 Remote Access generic architecture
The architecture choice is based on EPU constraints, needs and risk management. An
essential criterion is the direction of information flow. An outbound -only flow from the EPU to
the TP could be enough for some use cases like gathering logs for further analysis (examples
include fault records from DFR or protection relays, asset management information, etc.) .
The remote access could be restricted to an isolated zone which can reside in the EPU
Access Architecture with no access to EPU Internal Resources.
The green arrow on figure 7-4 (independent file extraction) gives a good example of an
architecture with this outbound-only flow. Sensitive devices export their data to a data
extraction platform inside a DMZ. No communication is made possible from these platforms to
sensitive devices (even acknowledgment), thanks to the firewall between the substation and
the office. Firewall could be replaced by a diode (at layer 1 of the OSI model) for more
effective security in this case.
Here are some best practices and reference architecture tak en from available standards ([6-
14], [6-15], [6-13], [6-19]) and guidelines ([6-18], [6-20], [6-21], [6-22], [6-23], [6-24], [6-25],
[6-26], [6-27]).
Direct dial-in connections on systems should not be possible or apply same security controls
as for the security gateway. If remote maintenance should be applied, the following se curity
controls should be applied:
Keep logs for access and connections and use only nominative accounts in order to
keep track of individual actions. An inactivity timer and maximum time of connection is
required to ensure that no session sharing is done.
Keep logs of activities
Use cryptography for external data flows
Use 2 factor authentication
The remote access should come from a dedicated computer in a dedicated DMZ and
all administered systems should only allow configuration from this dedicated compu ter.
The Utility should ensure segmentation on its internal network so that the contractor
has only access to systems he has to connect to. This should be enforced by Utility -
controlled devices, particularly when the access architecture is controlled by th e TP.
Remote management from the TP should only occur when local knowledgeable staff is
available and watching (4 eyes principle in order to be able to prevent unwanted
action). Any action should be recorded for further analysis or forensics.
The direct connection of the system to the internet is not a recommended practice, but could
be done only if the enterprise has no enterprise wide internet access and/or for small systems
installed remotely from offices like DER (small solar panels farms, isolated win d turbine, etc.)
In addition to the previously discussed best practices, Table 6-2 shows how the main security
goals of the architecture are supported by both contractual and technical controls which
complement each other. It illustrates good practices on each component of the remote access
architecture.
6.6 Conclusion
EPUs rely on remote access for several use cases like maintenance or monitoring. While
improving performance and the overall process, those connections come with risks. In many
cases remote access performed by third parties and inconsistencies between security policies
could weaken the EPU.
In order to support utilities efforts in th is field, we have proposed a simplified checklist applied
to remote services. This checklist is expected to guide utilities deciding if they need to use
remote services provided by third parties and what requirements should be included in their
RFQ.
We have also discussed possible technical architectures and ways to mitigate the risk.
Further steps include integration of legacy devices for remote maintenance, overview of
different architectures for remote maintenance, technical comparison of architectures , issues
and controls for the use of mobility devices (e.g. tablets, smartphones, etc.) for remote
maintenance, and the analysis of the issues involved with the extension of remote access to
include remote control purposes.
7 Conclusion and outlook of WG D2.31
Operational Technology and Information Technology convergence is here to stay.
Communication infrastructure and information flows are getting even more critical for EPUs.
At the same time the industry is getting more interesting as a target for malevo lent actors and
foreign governmental agencies. Therefore it has become essential for EPUs to consider
cybersecurity threats and risks across all the organization and raise awareness from
operational to executive level, including vendors, partners, and thi rd parties.
SCD2 Working Group WG D2.01 conducted a global survey [7 -1] in 2013 to determine the
priority of operational and business information systems issues for EPUs. This information is
then used to help with the formation of new working groups and p referential study topics from
2014 onwards. In the survey the highest priority issue was determined to be “Cybersecurity
for evolving EPU business and operational practices and risks” – driven by the business
needs of remote control and use of mobility de vices. This information has helped to set a
strategy of forming new working groups charged with covering these topics when WGD2.31
has completed its tasks. Thus SCD2 plans to continue to support EPUs in the future study on
cybersecurity issues.
A.1 ACRONYMS AND ABBREVIATIONS
Acronym/abbreviation Definition
AMI Advanced Metering Infrastructure
European Committee for Standardization/European
CEN/CENELEC/ETSI Committee for Electro technical Standardization/European
Telecommunications Standards Institute
CySeMoL Cyber Security Modelhing Language
DER Distributed Energy Resources
DMS Distribution Management System
DSO Distribution System Operator
EMS Energy Management System
EPU Electric Power Utility
EV Electric Vehicle
GOOSE Generic Object Oriented Substation Events
HMI Human-Machine Interface
HTTPS HyperText Transfer Protocol over Secure Socket Layer
HV High Voltage
ICT Information Communication Technology
IEC International Electro technical Commission
IED Intelligent Electronic Device
IEEE Institute of Electrical and Electronic Engineers
IP Internet Protocol
LAN Local Area Network
LV Low Voltage
MMS Manufacturing Message Specification
MV Medium Voltage
NERC North American Electric Reliability Corporation
NIST National Institute of Standards and Technology
OLTC On-Load Tap Changer
PLC Programmable Logic Controller
SCADA Supervisory Control and Data Acquisition
SSH Secure Shell
SSL Secure Socket Layer
TLS Transport Layer Security
TSO Transmission System Operator
UML Unified Modeling Language
VC Voltage Control
VPN Virtual Private Network
A.2 REFERENCES
[1-1] J.-T. Zerbst, S. Zimmermann, D.K. Holstein, and C. Poirier, "Towards an adapted
classification methodology for graded security approaches in EPU architectures" CIGRE
Symposium, Lisbon, 2013
[1-2] Source: Électricité de France (EDF), Smart grid Europe 2009 presentation at SmartGrids
Europe conference, Barcelona, 2009
[1-3] Christiane Grefe,“Blackout”, Die Zeit 16/2014
http://www.zeit.de/2014/16/blackout-energiehacker-stadtwerk-ettlingen
[1-4] Felix Lindner, ”Licht aus!”, c’t magazin 09/2014 http://heise.de/-2165153
[1-5] L. Pietre-Cambacedes , M. Tritschler and G. Ericsson, "Cyber security myths on power
control systems: 21 misconceptions and false beliefs," IEEE Transactions on Power
Delivery, Vol. 26, Issue 1, pp. 161-172, January 2011.
[1-6] R. Langer, “Robust Control System Networks - How to achieve reliable control after
Stuxnet”, Momentum Press, New York, 2012
[1-7] ABB white paper: “Security in the Smart Grids”, 2009
http://www02.abb.com/db/db0003/db002698.nsf/0/832c29e54746dd0fc12576400024ef16
/$file/paper_Security+in+the+Smart+Grid+%28Sept+09 %29_docnum.pdf
[1-8] Jacobs, Mike. "10 Years After Record Blackout, Is U.S. Any Better Prepared? (Op -Ed)."
LiveScience. TechMedia Network, 14 Aug. 2013. Web. 17 Apr. 2014.
http://www.livescience.com/38905-is-nation-better-prepared-to-prevent-blackouts.html
[1-9] Kim Zetter, “Researchers Uncover Holes That Open Power Stations to Hacking”,
wired.com, 2013 http://www.wired.com/2013/10/ics/
[1-10] G. Dondossola, F. Garrone, J. Szanto “Cyber Risks in Energy Grid ICT Infrastructures”
in Critical Infrastructure Protection and Resilience in the ICT Sector, Paul Theron and S.
Bologna Ed., IGI Global, 2013
[1-11] ICS-CERT Monitor “Incident Response Activity - October, November, December 2013”,
2013 http://ics-cert.us-cert.gov/sites/default/files/Monitors/ICS-CERT_Monitor_Oct-
Dec2013.pdf
[1-12] C. Wueest, Symantec, “Targeted Attacks Against the Energy Sector”, 2014
[1-13] Stefan Frei, “ Vulnerability Threat Trends: A DECADE IN REVIEW, TRANSITION ON
THE WAY ”, NSS Labs, Inc., 2013
[1-14] J. Zerbst, M. Schaefer, I. Rinta-Jouppi, "Zone principles as Cyber Security architecture
element for Smart Grids", Innovative Smart Grid Technologies Conference Europe (ISGT
Europe), 2010 IEEE PES
[1-15] Nicolas Falliere, Liam O Murchu, Eric Chien, “W32.Stuxnet Dossier”, 2011
http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers
/w32_stuxnet_dossier.pdf
[1-16] Symantec Security Response: Dragonfly: Western Energy Companies Under Sabotage
Threat http://www.symantec.com/connect/blogs/dragonfly-western-energy-companies-
under-sabotage-threat-energetic-bear
[1-17] François Page, McAfee Labs, ”Hacktivism Cyberspace has become the new m edium for
political voices”, 2012
[1-18] Heather MacKenzie, „Shamoon Malware and SCADA Security“, 2012
http://www.isssource.com/shamoon-malware-and-scada-security/
[1-19] Marshall Abrams, Joe Weiss “Malicious Control System Cyber Security Attack Case
Study Maroochy Water Services, Australia”, 2008
http://csrc.nist.gov/groups/SMA/fisma/ics/documents/Maroochy-Water-Services-Case-
Study_report.pdf
[1-20] Ryan Naraine, ” Shodan search exposes insecure SCADA systems”, 2010
http://www.zdnet.com/blog/security/shodan -search-exposes-insecure-scada-
systems/7611
[1-21] Kevin Poulsen, ”Slammer worm crashed Ohio nuke plant net”, 2003
http://www.theregister.co.uk/2003/08/20/slammer_worm_crashed_ohio_nuke/
[1-22] European Commission, „Cybersecurity Strategy of the European Union: An Open, Safe
and Secure Cyberspace“, Brussel, 2013
[1-23] Cyberspace policy review: Assuring a Trusted and Resilient Information and
Communications Infrastructure
http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf
[1-24] L. Piètre-Cambacédès, T. Kropp, J. Weiss, R. Pellizzoni “Cybersecurity standards for the
electric power industry – a survival kit”, Paper D2-217, CIGRE Paris Session 2008,
France
[1-25] The NIST Smart Grid Interoperability Panel Cyber Security Working Group, “Introduction
to NISTIR 7628 - Guidelines for Smart Grid Cyber Security”, September 2010.
http://www.nist.gov/smartgrid/upload/nistir-7628_total.pdf
[1-26] F. Cleveland, “List of Cybersecurity for Smart Grid Standards and Guidelines”, May
2013.
http://iectc57.ucaiug.org/wg15public/Public%20Documents/List%20of%20Smart%20Grid
%20Standards%20with%20Cybersecurity.pdf
[1-27] Smart Grid Coordination Group Set of Standards Working Group “First set of standards”
version 2.0, November 2012.
http://ec.europa.eu/energy/gas_electricity/smartgrids/doc/xpert_group1_first_set_of_stan
dards.pdf
[1-28] see “Working-party on Instrument Behaviour” (WIB) web site at www.wib.nl
[1-29] NIST Cybersecurity Framework
http://www.nist.gov/cyberframework/upload/cybersecurity-framework-021214-final.pdf
[1-30] Nuclear Energy Institute, NEI 08-09 Cyber Security Plan for Nuclear Power Reactors
(rev. 6), April 2010
[1-31] IAEA Nuclear Security Series No. 17, Reference Manual, C omputer Security aAt Nuclear
Facilities, 2011
[1-32] L. Pietre-Cambacedes, T. Quinn, L. Hardin "Cyber Security of Nuclear Instrumentation
and Control Systems - Overview of the IEC Standardization Activities" IFAC conference
on Manufacturing, Management and Control (MIM 2013), Invited session on
Cybersecurity of Control and Safety systems, St. Petersburg, Russia, June 2013
[1-33] European-Commission, "Cybersecurity strategy of the European Union: An open, safe
and secure cyberspace," European Commission, Joint Communication JOIN (2013) 1
final, 7 February 2013
[1-34] European Network and Information Security Agency (ENISA), “Smart Grid Security,
Recommendations for Europe and Member States”, 2012 -07-01
[1-35] SoES Project, “International Standards and Policies – Map and Analysis”, Security of
Energy Systems Project, Deliverable D2, 2014. http://www.soes-project.eu
[1-36] ECSWG, "Roadmap to Achieve Energy Delivery Systems Cybersecurity," US Department
of Energy, September 2011
[1-37] Cigré JWG D2/B3/C2-1 Technical Brochure TB 317 on “Security for Information Systems
and Intranets in Electric Power Systems”, 2007
[1-38] Technical Brochure 419 of the WG D2.22 " Information Security for Electric Power
Utilities (EPUs) — CIGRÉ Developments on Frameworks, Risk Assessment, and
Technology", 2010
[2-1] J. Zerbst et al, “Graded approach to cyber-security for EPUs: Clarifying the security levels and
zone concepts”, Paper D2-02-B09, 2011 SC D2 Colloquium, Buenos Aires – Argentina.
[2-2] G. Dondossola et al, “Modelling of cyber-attacks for assessing smart grid security”, Paper D2-
02-B10, 2011 SC D2 Colloquium, Buenos Aires – Argentina.
[2-3] J. Zerbst et al, “Cyber-attack modelling and security graded approach: key elements when
designing security architecture for Electric Power Utilities (EPUs)”, Paper D2-07, 2012 SC D2
Session, Paris - France.
[2-4] J. Zerbst et al, “Towards an adapted classification methodology for graded security approaches
in EPU architectures”, Paper D2-02-B09, 2013 Cigre Symposium, Lisbon– Portugal.
[2-5] M. Ekstedt et al, “Application of a cyber-security assessment framework to smart grid
architectures” Paper D2-02-11, 2013 SC D2 Colloquium, Mysore - India.
[2-6] P.Sitbon et al, “Security in remote services used by EPUs”, Paper D2-203-2014, 2014 SC D2
Session, Paris - France.
[2-7] J. Zerbst et al, “Status of Cybersecurity”, Electra 276, October 2014.
[4-1] IEC 62443-1, 2008, “Industrial communication networks - Network and system security
Part 1 Terminology, concepts and models”, 7 et sqq.
[4-2] IEC 62254-1, 2003, “Enterprise-control system integration – Part 1: Models and
terminology”, 185 et sqq.
[4-3] IEC 61226, 2005, “Nuclear power plants - Instrumentation and control systems important
to safety - Classification of instrumentation and control functions”
[4-4] NIST 800-60 Volume II Revision 1, 2008, “SECURITY CATEGORIZATION OF
INFORMATION AND INFORMATION SYSTEMS
[4-5] U.S. Nuclear Regulatory Commission (NRC), 2010, “Regulatory Guide 5.71 - Cyber
Security programs for Nuclear Facilities”, pp. 35
[4-6] Idaho National Laboratory, 2006, “Control Systems Cyber Security: Defense in Depth
Strategies”, online
http://csrp.inl.gov/Documents/Defense%20in%20Depth%20Strategies.pdf
[4-7] American National Standards Institute (ANSI), International Electro technical
Commission (IEC), International Society of Automation (ISA), ANSI/ISA -99.00.01-2007,
2007, IEC 62443-1 Security for Industrial Automation and Control Systems Part 1:
Terminology, Concepts, and Models
[4-8] NSA, Defense in Depth. US National Security Agency
[4-9] International Standard Organisation (ISO), International Electrotechnical Commission
(IEC), 1994, “ISO/IEC 7498-1 Information Technology – Basis Reference Model: The
Basic Model
[4-10] Trusted Information Sharing Network for Critical Infrastructure Protection, 2008,
“Defense in depth”, Available at:
http://www.tisn.gov.au/www/tisn/tisn.nsf/Page/Publications_e-SecurityPublications (last
visited 5th May 2010)
[4-11] U.S. NUCLEAR REGULATORY COMMISSION, 2010, REGULATORY GUIDE 5.71 -
CYBER SECURITY PROGRAMS FOR NUCLEAR FACILITIES
[4-12] Cigre JWG D2/B3/C2-1, 2007, Technical Brochure TB 317 on “Security for Information
Systems and Intranets in Electric Power Systems”
[4-13] Cigre WG D2.22, Technical Brochure TB 419 on “Treatment of Information Security for
Electric Power Utilities”, June 2010.
[4-14] ISO 7498-2: Information processing systems, 1989, Open System Interconnection –
Basic Reference Model – Part 2: Security Architecture
[4-15] IEC Smart Grid Standardization Roadmap, Edition 1.0, 2010
[4-16] PERA Enterprise Model, Gary Rathwell
[4-17] American National Standards Institute (ANSI), International Society of Automation (ISA),
“ANSI/ISA-95.00.01-2000, Enterprise-Control System Integration, Part 1: Models and
Terminology”
[4-18] J. D. Gilsinn, R. Schierholz, "Security Assurance Levels: A Vector Approach to
Describing Security Requirement," Oct. 2010, Available at:
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906330 (last visited 14th
May 2011)
[4-19] CIGRÉ Working Group WGD2.24 “EMS for the 21st Century - System Requirements”
Technical Brochure 452, February 2011.
[4-20] National Institute of Standards and Technology (NIST), 2008, “Guide to Industrial
Control Systems (ICS) Security (NIST 800-82)”
[4-21] Department of Homeland Security (DHS),2006, “Control Systems Cyber Security:
Defense in Depth Strategies”
[4-22] US Department of Homeland Security, 2009, Recommended Practice: Improving
Industrial Control Systems Cybersecurity with Defense -In-Depth Strategies”. Control
Systems Security Program, National Security Division.
[4-23] SINTEF report, 2007, "The SeSa Method for Assessing Secure Remote Access to Safety
Instrumented Systems", Available at:
http://www.sintef.no/upload/Teknologi_og_samfunn/Sikkerhet%20og%20p%C3%A5litelig
het/Rapporter/SINTEF%20A1626%20-%20SeSa%20report-final.pdf (last visited 25th
April 2011)
[4-24] AMI-SEC Task Force and AMI Security Acceleration Project (ASAP), 2009, “AMI Security
Implementation Guide V1.01”
[4-25] W32.Stuxnet Dossier, 2011, Nicolas Falliere, Liam O Murchu, Eric Chien Available at:
http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers
/w32_stuxnet_dossier.pdf
[4-26] IEC 62443-1, 2008, “Industrial communication networks - Network and system security
Part 1 Terminology, concepts and models”, 7 et. sqq.
[4-27] IAEA Nuclear Security Series No. 17: Technical Guidance, Computer Security at Nuclear
Facilities, 2011
[4-28] U.S. Nuclear Regulatory Commission (NRC), 2010, “Regulatory Guide 5.71 - Cyber
Security programs for Nuclear Facilities”, pp. 35
[4-29] NERC: reliability considerations from the integration of Smart Grid available at
http://www.nerc.com/files/SGTF_Report_Final_posted.pdf in particular see defense in
depth p 89
[4-30] J.-T. Zerbst, L. Pietre-Cambacedes, Å. Torkilseng and O. Breton, "Graded approach to
cyber security for EPUs: Clarifying the security levels and zones concepts," 2011
CIGRE D2 Colloquium, Buenos Aires, Argentina, October 2011
[4-31] IEC 61508 edition 2.0, 2010, “Functional safety of electrical/electronic/programmable
electronic safety-related systems”
[4-32] NERC CIP-002 to NERC CIP-009, “Cyber Security Standard of NERC”, 2006,
http://www.nerc.com (last visited 27th December 2012)
[4-33] "Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security", 2010, NIST
[4-34] "IT-Grundschutz-Standards", 2008, Federal Office for Information Security of Germany
(BSI)
[4-35] "ABB White Paper: Security for Industrial Automation and Control Systems", 2010, ABB
[4-36] "Cyber Security Compliant Architecture for the Nuclear Industry" 2011, Invensys
[4-37] ArchiMate® 2.0, 2012, The Open Group
[4-38] “Protection Profile for the Security Module of a Smart Meter Gateway (Security Module
PP)”, Bundesamt für Sicherheit in der Informationstechnik, 2012, Available at:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/SmartMeter/PP_Security_%20
Module.pdf?__blob=publicationFile (last visited 27th December 2012)’
[4-39] "Zone principles as Cyber Security architecture element for Smart Grids", 2010, Jens
Zerbst, Martin Schaefer, Iiro Rinta-Jouppi
[4-40] Payment Card Industry (PCI) Data Security Standard 2.0, 2010, PCI Security Standard
Council
[4-41] L. Pietre-Cambacedes and M. Bouissou, "Modeling safety and security
interdependencies with BDMP (Boolean logic Driven Markov Processes)," Proceedings
of the IEEE International Conference on Systems, Man, and Cybernetics (SMC 2010),
Istanbul, Turkia, pp. 2852-2861, October 2010
[4-42] PERA Enterprise Model, Gary Rathwell, Available at:
http://www.pera.net/Pera/PERA_Papers/Levels-4Rs/4r_pres.htm (last visited 27th
December 2012)
[4-43] "Data Structures And Algorithms", 1983, A.A. Puntambekar
[5-1] IEC Smart Grid Standardization RoadMap, SMB Smart Grid Strategic Group SG3,
Edition 1.0, June 2010.
[5-2] NIST Internal Report 7628, “Guidelines for Smart Grid Cyber Security”, 3 Volumes, The
Smart Grid Interoperability Panel – Cyber Security Working Group, August 2010.
[5-3] L. Piètre-Cambacédès, T. Kropp, J. Weiss, R Pellizzoni: “Cybersecu¬rity standards for
the electric power industry – a survival kit” – Paper D2-217, CIGRÉ Paris Session 2008,
France, August 2008.
[5-4] ISO/IEC 15408-1, Information technology — Security techniques — Evaluation criteria
for IT security — Part 1: Introduction and general model, Second edition, 2005.
[5-5] T. Sommestad, M. Ekstedt, P. Johnson, “A probabilistic relational model for security risk
analysis,” Computers & Security, vol. 29, no. 6, pp. 659 –679, 2010.
[5-6] N. Falliere, L.O. Murchu, E. Chien “W32.Stuxnet Dossier”, Symantec Security Response,
Version 1.4, February 2011.
[5-7] B. Schneier, “Attack trees: Modeling security threats”, Dr. Dobb's Journal, vol. 12, no.
24, pp. 21-29, 1999.
[5-8] C.-W. Ten, C.-C. Liu, M. Govindarasu, “Vulnerability assessment of cybersecurity for
SCADA systems using attack trees,” in Proceedings of the IEEE Power Engineering
Society General Meeting, pp. 1–8, Tampa, USA, June 2007.
[5-9] S. C. Patel, J. H. Graham, P. A. Ralston, “Quantitatively assessing the vulnerability of
critical information systems: A new method for evaluating security enhancements,”
International Journal of Information Management, vol. 28, no. 6, pp. 483 –491, December
2008.
[5-10] S. McLaughlin, P. McDaniel, D. Podkuiko, “Energy theft in the advanced metering
infrastructure,” in Proceedings of the 4th International Workshop on Critical Information
Infrastructure Security (CRITIS’09), Bonn, Germany, 2009.
[5-11] G.-Y. Park, C. K. Lee, J. G. Choi, D. H. Kim, Y. J. Lee, K.-C. Kwon, “Cyber security
analysis by attack trees for a reactor protection system,” in Proceedings of the Korean
Nuclear Society (KNS) Fall Meeting, Pyeong Chang, Korea, October 2008.
[5-12] J. P. McDermott, “Attack net penetration testing,” in Proceedings of the 2000 Workshop
on New Security Paradigms (NSPW’00), pp. 15–21, Cork, Ireland, September 2000.
[5-13] S. Pudar, G. Manimaran, C. Liu, “PENET: a practical method and tool for integrated
modeling of security attacks and countermeasures,” Com puters & Security, vol. 28, no.
8, pp. 754–771, May 2010.
[5-14] T. Sommestad, M. Ekstedt, L. Nordström, “Modeling security of power communication
systems using defense graphs and influence diagrams,” IEEE Transactions on Power
Delivery, vol. 24, no. 4, pp. 1801–1808, October 2009.
[5-15] J. McDermott, C. Fox, “Using abuse case models for security requirements analysis,” in
Proceedings of the 15th Annual Computer Security Applications Conference
(ACSAC’99), Phoenix, USA, Dec. 1999, pp. 55–64.
[5-16] G. Sindre, A. L. Opdahl, “Eliciting security requirements with misuse cases,”
Requirements Engineering, vol. 10, no. 1, pp. 34–44, 2005.
[5-17] G. Dondossola, F. Garrone, J. Szanto “Experimental Evaluation of Cyber Intrusions into
Highly Critical Power Control Systems” Proceedings of the CIRED 2011 - International
Conference on Electricity Distribution, Paper n. 0440, Frankfurt, June 2011.
[5-18] M.-Y. Huang and T. M. Wicks, “A large-scale distributed intrusion detection framework
based on attack strategy analysis,” in Proceeding of the 1st International Workshop on
the Recent Advances in Intrusion Detection (RAID’99), pp. 2433 –248, Louvain-la-Neuve,
Belgium, Sep. 1998.
[5-19] L. Piètre-Cambacédès, M. Bouissou, “Attack and defense dynamic modeling with
BDMP”, in Proceedings of the 5th International Conference on Mathematical Methods,
Models, and Architectures for Computer Networks Security (MMM-ACNS-2010), pp. 86–
101, LNCS 6258, St Petersburg, Russia, September 2010.
[5-20] M. Bouissou, J.-L. Bon, “A new formalism that combines advantages of fault-trees and
Markov models: Boolean logic driven Markov processes,” Reliability Engineering &
System Safety, vol. 82, no. 2, pp. 149–163, November 2003.
[5-21] N. Mead, E. Hough, T. Stehney, “Security quality requirements engi neering (SQUARE)
methodology,” Carnegie Mellon University, Tech. Rep. CMU/SEI -2005-TR-009, 2005.
[5-22] S. Evans, D. Heinbuch, E. Kyule, J. Piorkowski, and J. Wallner, “Risk -based systems
security engineering: stopping attacks with intention,” IEEE Securit y and Privacy, vol. 2,
no. 6, pp. 59–62, 2004.
[5-23] Buckshaw, D. L.; Parnell, G. S.; Unkenholz, W. L.; Parks, D. L.; Wallner, J. M. &
Saydjari, O. S. Mission Oriented Risk and Design Analysis of Critical Information
Systems, Military Operations Research, Vol. 10 No. 2, pp. 19-38, 2005,
http://www.innovativedecisions.com/documents/Buckshaw-Parnelletal.pdf.
[5-24] U.S. Nuclear Regulatory Commission (NRC), “Cyber security programs for nuclear
facilities,” Regulatory Guide 5.71, January 2010.
[5-25] CEN/CENELEC/ETSI “Use Case Management Process — Use Case Collection,
Management, Repository, Analysis and Harmonization”, Draft Report of the Working
Group Sustainable Processes to the Smart Grid Coordination Group - Mandate M/490,
November 2012
[5-26] G. Dondossola, F. Garrone, G. Proserpio, C. Tornelli, 2012, “Impact of DER integration
on the cyber security of SCADA systems – the Medium Voltage regulation case study”.
CIRED 2012 Lisbon (PT), 29-30 May 2012
[5-27] G. Dondossola: “Risk Assessment of Information and Communication Systems - Analysis
of some practices and methods in the Electric Power Industry”, CIGRÉ Electra, No. 239,
August 2008.
[5-28] ISO/IEC 27005:2008, Information technology -- Security techniques -- Information
security risk management
http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=4210
7.
[5-29] T. Sommestad, M. Ekstedt, H. Holm, 2012, “The Cyber Security Modeling Language: A
Tool for Assessing the Vulnerability of Enterprise System Architectures”. IEEE Systems
Journal, 2012
[5-30] IEC/TS 62351-3 ed1.0 Power systems management and associated information
exchange - Data and communications security - Part 3: Communication network and
system security - Profiles including TCP/IP, 22 June 2007
[5-31] P. Mell, K. Scarfone, S. Romanosky, 2007, ”A complete guide to the common
vulnerability scoring system version 2.0”. Forum of Incident Response and Security
Teams (FIRST), 2007
[6-1] Robert O’Harrow Jr “Cyber search engine Shodan exposes industrial control systems to
new risks” [Washington Post, June 03, 2012] - http://articles.washingtonpost.com/2012-
06-03/news/35459595_1_computer-systems-desktop-computers-search-engine
[6-2] An Undirected Attack Against Critical Infrastructure: A case study for improving Your
control system Security, http://ics-cert.us-
cert.gov/sites/default/files/documents/CaseStudy-002.pdf
[6-3] BSI – aperçu des menaces cybersécurité - https://www.allianz-fuer-
cybersicherheit.de/ACS/DE/_downloads/angriffsmethoden/statistiken/BSI -CS_029.html
[6-4] Trend Micro: Who's really attacking your SCADA, https://media.blackhat.com/us-13/US-
13-Wilhoit-The-SCADA-That-Didnt-Cry-Wolf-Whos-Really-Attacking-Your-ICS-Devices-
Slides.pdf
[6-5] Trend Micro: The SCADA That didn't Cry Wolf, Who's really attacking your SCADA part
2): https://media.blackhat.com/us-13/US-13-Wilhoit-The-SCADA-That-Didnt-Cry-Wolf-
Whos-Really-Attacking-Your-ICS-Devices-Slides.pdf
[6-6] DHS Cybersecurity Procurement language, http://ics-cert.us-
cert.gov/sites/default/files/Procurement_Language_Rev4_100809.pdf
[6-7] DOE Cybersecurity procurement language, http://energy.gov/oe/downloads/cyber-
security-procurement-language-control-systems-version-18
[6-8] EPRI Cyber Security Procurement—Application of the Methodology
http://www.epri.com/abstracts/Pages/ProductAbstract.aspx?ProductId=00000000300200
1735
[6-9] EPRI Cyber Security Procurement Methodology
http://www.epri.com/abstracts/Pages/ProductAbstract.aspx?ProductId=00000000000102
6562
[6-10] WIB M2784X10 (PCS requirements for vendors)
[6-11] ISO/IEC 27036: Information security for supplier relationships (International standard)
[6-12] NISTIR 7628: Guidelines for Smart Grid Cyber Security – Introduction
[6-13] ISO/IEC 62443-3-3:2013: System security requirements and security levels.
[6-14] ISO/IEC TR 27019:2013 Information technology Security techniques - Information
security management guidelines based on ISO/IEC 27002 for process control systems
specific to the energy utility industry
[6-15] Critical Infrastructure Protection (CIP), (NERC, US) and particularly: NERC-CIP-005,
NERC-CIP-006, NERC-CIP-007
[6-16] IEEE P1689, Trial Use Standard for Cyber Security of Serial SCADA Links and IED
Remote Access
[6-17] D. K. Holstein, P. Sitbon, “Security requirements in procurement for Electric Power
Utilities”, C&ESAR conference, Rennes, France, October 2013.
[6-18] NERC: Guidance for Secure Interactive Remote Access, July 2011
[6-19] VGB S-175 standard
[6-20] ANSSI: méthode de classification et mesures principales pour les installations
industrielles (french national guideline to be published)
[6-21] ANSSI - Externalisation des systèmes d’information – maîtriser les risques de
l’infogérance http://www.ssi.gouv.fr/IMG/pdf/2010-12-03_Guide_externalisation.pdf
[6-22] CPNI Good Practice Guidelines for Process Control and SCADA Security:
http://www.cpni.gov.uk/ProtectingYourAssets/scada.aspx
[6-23] DHS/CPNI: Configuring and Managing Remote Access for Industrial Control Systems,
November 2011.
[6-24] DoE: 21 Steps to Improve Cyber Security of SCADA Networks
[6-25] EXERA M3958X10 - Cybersécurité des systèmes de contrôle commande
[6-26] CIGRE Electra ELT_244_2 “Security Technologies Guideline - Practical Guidance for
Deploying Cyber Security Technology within Electric Utility Data Networks”, June 2009
[6-27] CIGRE Technical Brochure TB419 - ”Treatment of Information Security for Electric
Power Utilities (EPUs)”, D2.22, June 2010.
[7-1] CIGRÉ Working Group WGD2.01 “Strategic Priorities for Information Systems Issues”,
Electra 274, pp 30-33, June 2014.
Working Group
D2.31
April 2015
Members
1
Jens Zerbst (Convener), Ludovic Piètre-Cambacédès (Convener ), Mathias Ekstedt (Secretary),
Giovanna Dondossola, Christophe Poirier, Pascal Sitbon, Åge Torkilseng, Dennis Holstein, John
McDonald, Robert Evans, Marc Tritschler, Simon Zimmermann, Iiro Rinta-Jouppi, Göran Ericsson,
Marc Scherer, Feven Zegai, Olivier Breton
Copyright © 2015
“Ownership of a CIGRE publication, whether in paper form or on electronic support only infers right
of use for personal purposes. Are prohibited, except if explicitly agreed by CIGRE, total or partial
reproduction of the publication for use other than personal and transfer to a third party; hence circu-
lation on any intranet or other company network is forbidden”.
Disclaimer notice
“CIGRE gives no warranty or assurance about the contents of this publication, nor does it accept
any responsibility, as to the accuracy or exhaustiveness of the information. All implied warranties
and conditions are excluded to the maximum extent permitted by law”.
ISBN: 978-2-85873-317-0
1
from 2010-2012