Tuesday, July 2, 2024

Securing the facility grid: Are you prepared for NERC CIP’s upcoming mandate?

A defense-in-depth technique is one which protects organizations from assaults that bypass the primary layer of safety controls. It’s a nicely understood idea, and one which has been adopted by most organizations over time. Nonetheless, till lately, the North American Electrical Reliability Company (NERC) offered a spot the place regulation required securing the digital safety perimeter (ESP), however there have been no additional safety controls past the community perimeter. If utilities adopted NERC CIP, after which went no additional, they might be uncovered to assaults that bypassed that first layer of protection.

Upon route from the Federal Vitality Regulatory Fee (FERC), NERC has proposed a set of necessities for Inside Community Safety Monitoring (INSM). INSM is designed to deal with these conditions the place the community perimeter has been breached, rising the likelihood of detecting a compromise. By offering visibility inside the vital community, entities may be warned that an assault is in course of and motion may be taken earlier than the assault can propagate.

Identification of property and their communication patterns

Cisco Cyber Imaginative and prescient, a deep packet inspection engine inside Cisco industrial IoT community tools, uncovers the smallest particulars of your grid infrastructure. It routinely builds an in depth stock of all grid property, together with their communication patterns, vulnerabilities, rack slot configurations, vendor references, serial numbers, and extra. By embedding the sensor inside the community infrastructure, Cisco Cyber Imaginative and prescient presents complete visibility, capturing knowledge passively with out the necessity for costly further home equipment or SPAN cabling.

INSM requires assortment strategies to supply safety worth to deal with the perceived dangers the infrastructure faces. Cyber Imaginative and prescient applies a threat rating to all gadgets and system teams found within the OT community. Utilizing a mixture of vulnerabilities, actions, and affect, threat scores present a steering of which gadgets needs to be addressed first when implementing risk-management measures.

Evaluating the community towards an anticipated community communication baseline

Utility networks, particularly the communication with an ESP, are normally fairly static. By understanding what’s regular to your community, you possibly can extra simply spot when one thing uncommon occurs. For instance, if a tool all of a sudden begins speaking utilizing a distinct protocol, or has began to speak with new gadgets, it would imply a nasty actor has compromised the system.

To fulfill the necessities proposed by NERC, Cyber Imaginative and prescient knowledge may be filtered and saved as a baseline, and any deviations from regular course of behaviors will generate an alert. If the deviation was anticipated, an administrative person can acknowledge and make the brand new norm a part of the baseline. Nonetheless, if the change was sudden, it may be reported and despatched for additional investigation.

Detecting anomalous actions inside the ESP

NERC CIP 005-7, the necessities doc for cybersecurity throughout the ESP, requires a mechanism for detecting identified or suspected malicious communication for each inbound and outbound communications. Historically, that is completed through the use of an intrusion detection system (IDS) or intrusion prevention system (IPS) embedded in a boundary firewall.

With the introduction of INSM, this requirement has been prolonged to be used inside the ESP. Firewalls as a know-how are listed, however will solely seize knowledge that crosses the system, resulting in tough structure decisions on the place to deploy these bins.

Along with its capabilities to detect deviations from a baseline, Cyber Imaginative and prescient leverages Snort to detect malicious site visitors inside the operational community. Snort is the IDS engine used throughout the Cisco portfolio and supported by Talos, one of many world’s largest personal menace intelligence group and official developer of Snort signature recordsdata.

Talos, Cisco’s menace intelligence arm, repeatedly screens the worldwide menace panorama, identifies, and analyses new vulnerabilities, and supplies real-time menace intelligence feeds which might be tailor-made to OT techniques. Not solely does the Talos experience present menace intelligence for Cyber Imaginative and prescient, however additionally they have a staff of individuals devoted to assist safe vital infrastructure. I like to recommend studying the weblog by Joe Marshall – Serving to to maintain the lights on in Ukraine within the face of digital warfare.

Cisco’s industrial IoT safety answer

Cisco’s industrial IoT safety answer supplies organizations with a phased strategy to securing their industrial networks. This strategy concerned constructing the muse with good community design and safe elements, utilizing the community to realize visibility throughout the vital infrastructure, after which lastly implementing coverage again into the identical community infrastructure for preventative and reactionary measures. INSM is one small piece of a bigger safety technique, and Cisco supplies the constructing blocks for securing the infrastructure throughout LAN, WAN, and Cloud.

 

To be taught extra about NERC-CIP and the way Cisco may also help you higher safe your grid operations, examine our white paper or ask for a one-on-one assembly with a Cisco knowledgeable.

Share:

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles