DocumentCode :
3531383
Title :
Requirements or recommendations? Sorting out NERC CIP, NIST, and DOE cybersecurity
Author :
Dolezilek, David ; Hussey, Laura
fYear :
2011
fDate :
11-14 April 2011
Firstpage :
328
Lastpage :
333
Abstract :
Oil and gas, water and electric power - all of these essential services rely on SCADA (supervisory control and data acquisition), protection, and monitoring systems that use communications networks. The use of communications networks makes these systems potentially vulnerable to cyberattack. Over the past decade, faced with an increase in computer hacking and the recognition of the importance of these services to health and welfare, economic stability, and national security, the United States federal government has been increasingly involved in efforts to assist utilities in improving their security posture. Smart grid has become synonymous with asynchronous, nonmission-critical information exchange applications. Smart grid infrastructure describes the existing, yet largely unrecognized, mission-critical control applications that enable generation and delivery of power. Smart grid infrastructure applications require deterministic and synchronous message exchange, including automation and teleprotection. Today, utilities are faced with a confusing array of cybersecurity guidance, standards, and regulatory requirements. Electric utilities operating bulk power system assets must comply with eight NERC (North American Electric Reliability Corporation) CIP (Critical Infrastructure Protection) standards that are in the process of being revised. Federal entities are required by the FISMA (Federal Information Security Management Act of 2002) to comply with NIST (National Institute of Standards and Technology) standards. Under the Energy Independence and Security Act of 2007, Congress gave NIST the task of developing a framework of interoperability and cybersecurity for smart grid applications. To date, the framework has been primarily focused on smart grid information exchange applications that use asynchronous data flow, including metering, demand response, and the near realtime elements of substation and distribution automation. These automation elements and other smart g- - rid infrastructure applications that require deterministic synchronous data exchange, including teleprotection and synchrophasor state measurement, remain a future endeavor. This paper discusses various cybersecurity requirements and presents a clear picture of work being done by NIST to explain what is required and recommended and what utilities should expect to see in the near future as NERC and NIST work continues.
Keywords :
critical infrastructures; electricity supply industry deregulation; power system security; smart power grids; substation automation; DOE cybersecurity; Energy Independence and Security Act of 2007; FISMA; Federal Information Security Management Act of 2002; NERC CIP cybersecurity; NIST cybersecurity; National Institute of Standards and Technology standards; North American Electric Reliability Corporation; SCADA; bulk power system assets; communication networks; critical infrastructure protection; deterministic synchronous data exchange; distribution automation; electric utility; interoperability framework; nonmission-critical information exchange; smart grid information exchange; smart grid infrastructure; substation automation; supervisory control and data acquisition; synchronous message exchange; synchrophasor state measurement; Computer security; NIST; Power system reliability; Smart grids;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Protective Relay Engineers, 2011 64th Annual Conference for
Conference_Location :
College Station, TX
Print_ISBN :
978-1-4577-0494-9
Type :
conf
DOI :
10.1109/CPRE.2011.6035634
Filename :
6035634
Link To Document :
بازگشت