Draft NISTIR 7628 Revision 1, Guidelines for Smart Grid Cyber Security
Total Page:16
File Type:pdf, Size:1020Kb
The attached DRAFT document (provided here for historical purposes) has been superseded by the following publication: Publication Number: NIST Interagency Report (NISTIR) 7628 Revision 1 Title: Guidelines for Smart Grid Cybersecurity: Volume 1: Smart Grid Cybersecurity Strategy, Architecture, and High- Level Requirements Volume 2: Privacy and the Smart Grid Volume 3: Supportive Analyses and References Publication Date: September 2014 • Final Publication: https://doi.org/10.6028/NIST.IR.7628r1 (direct link: http://nvlpubs.nist.gov/nistpubs/ir/2014/NIST.IR.7628r1.pdf). • Information on other NIST Computer Security Division publications and programs can be found at: http://csrc.nist.gov/ The following information was posted with the attached DRAFT document: Oct. 25, 2013 NIST IR 7628 Rev. 1 DRAFT Guidelines for Smart Grid Cybersecurity: Vol. 1 - Smart Grid Cybersecurity Strategy, Architecture, and High-Level Requirements Vol. 2 - Privacy and the Smart Grid Vol. 3 - Supportive Analyses and References The National Institute of Standards and Technology (NIST) seeks comments on draft NISTIR 7628 Revision 1, Guidelines for Smart Grid Cyber Security. The comment period will be open from October 25 through December 23, 2013. Draft NISTIR 7628 Rev. 1 was completed by the NIST-led Smart Grid Cybersecurity Committee (formerly the Cyber Security Working Group) of the Smart Grid Interoperability Panel. The document has been updated to address changes in technologies and implementations since the release of NISTIR 7628 in September 2010. In addition, the document development strategy, cryptography and key management, privacy, vulnerability classes, research and development topics, standards review, and key power system use cases have been updated and expanded to reflect changes in the Smart Grid environment since 2010. The final version is expected to be posted in the spring of 2014. Below are 6 links - the first 3 are for the NISTIR 7628 Rev. 1 which are broken down into 3 separate files (Volume 1, Volume 2, and Volume 3 in that order). Then the last 3 links provided are Public comment period: October 25 – December 24, 2013. Email comments to: [email protected] . DRAFT NISTIR 7628 Revision 1 Guidelines for Smart Grid Cyber Security: Vol. 3, Supportive Analyses and References The Smart Grid Interoperability Panel – Smart Grid Cybersecurity Committee DRAFT NISTIR 7628 Revision 1 Guidelines for Smart Grid Cyber Security: Vol. 3, Supportive Analyses and References The Smart Grid Interoperability Panel –Smart Grid Cybersecurity Committee October 2013 U. S. Department of Commerce Penny Pritzker, Secretary National Institute of Standards and Technology Patrick D. Gallagher, Under Secretary of Commerce for Standards and Technology and Director National Institute of Standards and Technology Interagency Report 7628 Rev. 1, vol. 3 235 pages (October 2013) Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by NIST, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including concepts and methodologies, may be used by Federal agencies even before the completion of such companion publications. Thus, until each publication is completed, current requirements, guidelines, and procedures, where they exist, remain operative. For planning and transition purposes, Federal agencies may wish to closely follow the development of these new publications by NIST. Organizations are encouraged to review all draft publications during public comment periods and provide feedback to NIST. All NIST publications, other than the ones noted above, are available at http://csrc.nist.gov/publications. Comments on this publication may be submitted to: [email protected] Public comment period: October 25 – December 24, 2013 National Institute of Standards and Technology Attn: Computer Security Division, Information Technology Laboratory 100 Bureau Drive (Mail Stop 8930) Gaithersburg, MD 20899-8930 Email: [email protected] Comment form available at: http://csrc.nist.gov/publications/drafts/nistir-7628- r1/nistir7628_r1_vol3_comments_template.xlsx Reports on computer systems technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analyses to advance the development and productive use of information technology. ITL’s responsibilities include the development of management, administrative, technical, and physical standards and guidelines for the cost-effective security and privacy of other than national security-related information in Federal information systems. Abstract This three-volume report, Guidelines for Smart Grid Cybersecurity, presents an analytical framework that organizations can use to develop effective cybersecurity strategies tailored to their particular combinations of Smart Grid-related characteristics, risks, and vulnerabilities. Organizations in the diverse community of Smart Grid stakeholders—from utilities to providers of energy management services to manufacturers of electric vehicles and charging stations— can use the methods and supporting information presented in this report as guidance for assessing risk and identifying and applying appropriate security requirements. This approach recognizes that the electric grid is changing from a relatively closed system to a complex, highly interconnected environment. Each organization’s cybersecurity requirements should evolve as technology advances and as threats to grid security inevitably multiply and diversify. Keywords advanced metering infrastructure; architecture; cryptography; cybersecurity; electric grid; privacy; security requirements; smart grid ACKNOWLEDGMENTS This revision to the NISTIR was developed by members of the Smart Grid Interoperability Panel (SGIP) Smart Grid Cybersecurity Committee (SGCC) (formerly the Cyber Security Working Group (CSWG)), which is chaired by Marianne Swanson (NIST). Dave Dalva (Stroz Friedberg), Akhlesh Kaushiva (Department of Energy), and Scott Saunders (Sacramento Municipal Utility District) are the vice chairs and Mark Enstrom (Neustar) and Amanda Stallings (Ohio PUC) have served as the secretary. Tanya Brewer of NIST is the lead editor of this report. A special note of thanks goes to the subgroup leads, Frances Cleveland (Xanthus Consulting International), Victoria Pillitteri and Nelson Hastings (NIST), Rebecca Herold (Rebecca Herold & Associates, LLC), Elizabeth Sisley (Calm Sunrise Consulting, LLC), and Doug McGinnis (Exelon) who along with their subgroup team members contributed significantly to this revision. The dedication and commitment of all the individuals in developing the original document and now this revision is significant. In addition, appreciation is extended to the various organizations that have committed these resources to supporting this endeavor. Past and current members of the CSWG are listed in Appendix J of this report. Acknowledgement is also extended to the NIST Smart Grid Team and to Liz Lennon (NIST) for her superb technical editing of this report. Thanks is also extended to Bruce McMillin (Missouri University of Science and Technology), and to Harold Booth and Quynh Dang (NIST) for assistance in updating specific sections in the document. Finally, acknowledgment is extended to all the other individuals who have contributed their time and knowledge to ensure this report addresses the security needs of the Smart Grid. TABLE OF CONTENTS OVERVIEW AND REPORT ORGANIZATION ....................................................................................... IX Report Overview ...................................................................................................................... ix Audience .................................................................................................................................. ix Content of the Report ............................................................................................................... ix CHAPTER 6 VULNERABILITY CLASSES .............................................................................................1 6.1 Introduction ........................................................................................................................1 6.2 People, Policy & Procedure ...............................................................................................1 6.3 Platform Software/Firmware Vulnerabilities .....................................................................7 6.4 Platform Vulnerabilities ...................................................................................................22 6.5 Network............................................................................................................................26 6.6 References ........................................................................................................................30 CHAPTER 7 BOTTOM-UP