CIP CyberAssessmentGuide
CIP CyberAssessmentGuide
Executive Summary
The North American Electric Reliability Corporation adopted Critical Infrastructure Protection
standards in 2006. The standards establish the minimum requirements needed to ensure the
security of electronic exchange of information needed to support the reliability and the bulk
power system. Industry feedback at conferences and meetings indicate uncertainty about
implementation of the standards. Sandia National Labs Center for Control System Security
(C2S2) undertook a work package for the Department of Energy’s Office of Electricity Delivery
and Energy Reliability under the National SCADA Test Bed program to develop guidance for
conducting assessments required by the new standards. Sandia built on experience performing
over 100 critical infrastructure assessments to develop a project plan for a CIP Cyber
Vulnerability assessment of an actual utility. They performed that assessment with the help and
cooperation of the utility to gain lessons for inclusion in the guidance. As a result, the team
believes that the most important aspects of these assessments are cooperation, safety, and
developing actionable information for mitigation. We believe that any group or organization that
plans to conduct CIP Cyber Vulnerability Assessments would do well to consider the guidance in
this document.
i. Table of Contents
Guide to CIP Cyber Vulnerability Assessment 1
Executive Summary 1
1. Introduction 3
1.1. Purpose 3
1.2. Scope 3
1.2.1. Resources 3
1.2.2. Document Overview 3
1.3. Acronyms and Abbreviations 3
1.1. Purpose
The purpose of this document is to guide the planning, execution, and reporting of CIP Cyber
Vulnerability Assessments of utilities’ critical cyber assets and electronic security perimeter.
Two different but related cyber vulnerability assessments are needed to meet the requirements of
assessment of critical cyber assets per CIP-007 and to meet the requirements of assessment of the
electronic security perimeter per CIP-005.
1.2. Scope
This guide discusses the overall process of conducting CIP Cyber Vulnerability Assessments,
provides detailed information about the steps in the process, and points to resources that can help
an assessment. This is a parent document that refers to other resources: a planning spreadsheet,
an example of a filled-out spreadsheet, and an example of a project plan. These resources are not
necessary but are very helpful in understanding the content of this guide; they should be included
with and in the same location as this guide.
1.2.1. Resources
The useful resources associated with this guide include:
1. Planning Spreadsheet (SystemTemplate.xls)
2. Example filled-out planning spreadsheet (CIP_CyberAssessmentPlanningList.xls)
3. Microsoft Project template Plan (CIP assessment.mpp)
2.2.1. Planning
A CIP cyber assessment is not something that can or should be done off-the-cuff. The assessment
team will need to plan the assessment in close collaboration with the operations and engineering
personnel at the responsible entity. There are multiple reasons for careful, collaborative planning.
The assessment activity will require more resources than just the assessment team. System and
network administration personnel will need to support the assessment by providing data and
access. This can be a stress on key personnel, especially in conjunction with other audits,
assessments, system changes or other activity.
The assessment will need to be scheduled at a time when operational stresses do not complicate
the situation. For example, some regions have bad weather that causes outages during certain
seasons. Adding the stress of an assessment to the stresses of responding to outages will cause
problems with the operations and engineering personnel who need to work with the assessment.
The assessment team will need to consider the scope of the effort – how long will it take, how
many assessors will be required, how will data be collected, who will collect the data, how many
systems will be assessed at how many locations – all of these questions will need to be answered
to plan the assessment.
Assumptions
The folowing assumptions were made to allow the plan for this assessment to be developed:
• The control center scope is usually well known.
• The generation plan scope is less known – while the Responsible Entity may have
determined that generation assets are critical per the CIP-002 standard, the cyber assets
critical to control those generation assets are usually not well known.
• The substation plan scope is less known – while the Responsible Entity may have determined
that certain substation assets are critical per the CIP-002 standard, the cyber assets critical to
the control of those substation assets are usually not well known.
• There are at least two different substation architectures (seen during the scoping visit) with
an unknown number of critical cyber assets within each architecture.
3.1.2. Generation
Assumptions
The primary assumption in performing the CIP Cyber Vulnerability Assessment of critical cyber
assets at generation critical assets is that they are identified. For purposes of description, we will
assume that there is a single generation critical asset (not necessarily a good assumption) and
four different computer application platforms at that asset (not unreasonable). The assessment
team lead will need to modify these tasks to suit the actual scope.
3.1.2.1. Application Platform Services Check
This task is a simple check of the relevant Windows registry settings or Unix control files or
VMS startup files and network status to confirm the services that are exposed. It may require
little or a lot of effort for each check depending upon the operating system of the application
platform. Because of the flexibility required and the possible use of less-known operating
systems, this is a task best performed by experienced security analysts with assistance from a
local administrator.
3.1.2.2. Application Platform External Scan
This task is simple, technically, but very complex logistically. Generation critical assets
infrequently have a test network and may not easily image systems to that network. If that is the
case, then assessors will need to image operational systems and use standard vulnerability
scanning tools to examine copies of the operational systems. If that is not possible, then the
assessors would only be able to perform this if the generation asset is off-line as it would be too
dangerous to use those same tools on the operational systems. If the assessors can use a test
network, then this is well within the capability of any security analyst on the team. Because of
the nature of scanning, the wall-clock time for this will be much greater than the effort time.
Assessors should expect that they can scan one system per eight-hour period with no more than
two hours of effort. This might also complicate the use of any testing network – after all, it is
there for reasons other than the vulnerability assessment.
3.1.2.3. Application Platform Account Check
This task would be combined with Application Platform Services Check. This addresses a
specific requirement of the CIP to look for default accounts. The task would also look for easily
guessed or cracked account security. Again, since the nature of this task is uncertain, experienced
security analysts should perform this work.
3.1.2.4. Network Account Check
This task is the network (PDC/LDAP/Active Directory) equivalent of the platform account
check. An experienced security analyst should perform this with the cooperation of the
generation network administrators.
Assumptions
Substation critical cyber asset configurations are similar between critical asset substations of the
same type. Thus, the assessment need only look at a single substation’s critical cyber assets for
each type of substation. There will be no more than four different critical cyber assets at this type
of substation.
3.1.4.1. Platform Inventory
Determine what, if any, critical cyber assets are typically located at this type of substation.
3.1.4.2. Platform Research
Research the substation critical cyber assets to determine how to perform the services check, any
scans, and account checks.
3.1.4.3. Platform Services Check
This task is highly dependent on the type of cyber asset at the substation. Most equipment has
some method to obtain configuration information from a console port or other access.
Fortunately, much of the equipment is likely to be from the same vendor. Because of the
uncertainty, experienced security analysts should perform this task with Responsible Entity
substation engineer assistance.
3.1.4.4. Platform External Scan
This task is highly dependent on the type of cyber asset at the substation. Scanning might be war-
dialing or might be network scanning. Again, because of the uncertainty, expereinced security
analysts should perform this task with Responsible Entity security analyst and substation
engineer assistance.
3.1.4.5. Platform Account Check
This task is highly dependent on the type of cyber asset at the substation. Many substation cyber
assets will have no access control and thus no accounts. Because of the uncertainty, experienced
security analysts should perform this task with Utility substation engineer assistance.
3.1.5. Substation Type B
This is a placeholder under the assumption of more than one type of substation. The tasks are
identical to those for a Type A substation.