SlideShare a Scribd company logo
1 of 18
The Agile Fractal Grid
Chuck Speicher
John Reynolds
Friday, July 11, 2014
Security Fabric Alliance
• The Security Fabric Alliance is a working association dedicated
to practical deployment of the power grid and critical
infrastructure complex system solution in the United States:
– Utilities and telecommunications providers
– Systems integrators
– Manufacturers
– Technology partners
– National certification and interoperability entity
• The alliance is intended to give the CEO of a utility the purview
of up-to-the moment knowledge of the options available to
make wise investment decisions regarding infrastructure
deployment for optimal returns.
The variation includes the proper orientation for large, medium, and small entities.
The Industrial Internet
• The Industrial Internet Consortium was founded in 2014 to further
development, adoption and wide-spread use of interconnected
machines, intelligent analytics, and people at work.
• Through an independently-run consortium of technology innovators,
industrial companies, academia, and government, the goal of the IIC is to
accelerate the development and availability of intelligent industrial
automation for the public good.
• This goal of the consortium is to:
– Utilize existing and create new industry use cases and test beds for real-world
applications;
– Deliver best practices, reference architectures, case studies, and standards
requirements to ease deployment of connected technologies;
– Influence the global development standards process for internet and industrial
systems;
– Facilitate open forums to share and exchange real-world ideas, practices, lessons,
and insights;
– Build confidence around new and innovative approaches to security.
• The Industrial Internet Consortium (“IIC”) is a trademark of the Object Management
Group®, Inc. (OMG®), a not-for-profit 501(c)(6) tax-exempt organization.
The OMG process is more about establishing markets
as opposed to just setting standards.
SFA Reference
Builds
Certification of
Conformance &
Interoperability
The OMG is planning to standardize
the Security Fabric
for all critical infrastructure.
We are planning to support the 940 rural co-ops in the U.S. with
hybrid cloud/device services protected by the Security Fabric.
The FCC recently has emphasized that the best course of action
for rural broadband in the United States would be to use the rural electric utilities…
… the UTC and APPA expansions would triple the size of the coverage …
The Vision
“The Agile Fractal Grid”
Achieving
Grid Security, Reliability, and Resiliency
through Advanced Analytics and Control
What is needed:
1. A hybrid cloud for operations
and analytics
2. Substation of the future
3. Security Fabric end-to-end
Each level operates in
somewhat of a selfish fashion…
but recommendations for the
best trend for the flock
come from management
guidance from above.
Primary Data Flow
Patterns in
Laminar Control for
Power Grids
Electric power distribution and broadband communications
are like Siamese twins!
(They can’t go anywhere without each other.)
Digital control is needed
at each junction point.
Like electricity,
broadband can be used
for multiple things.
The Circulatory System The Nervous System
NRECA
UTC
As envisioned, Internet2 would eventually provide a
sequestered core network for the Industrial Internet.
Note the quadruple redundancy
Separation of the Industrial Internet
from the Generic Internet
The Core Network
Generic Internet
Carrier Ethernet
With Routing
DWDM Isolation
Cooperative Control Centers
Core City
Node
Enterprise Systems
Industrial Devices
Substation Nodes
Router+
Substation
Controller Router+
Carrier Ethernet
Isolation
NAN Nodes
HAN Nodes
Wireless LTE
700 MHz?
Wireless LTE
2.5 GHz?
PicoCell
Gateway
Sensor
Transverter
We will eventually use
a combination of DWDM separation
plus Carrier Ethernet separation.
Our communications has redundancy
built into the control protocols.
LTE
Macrocell
and
Distribution
Fiber
NAN
LTE
Picocell
Mobile
HAN
LTE
Home
Gateway
This is the only capability available
that allows handoff between terrestrial
LTE services and satellite services.
This system can simultaneously support
the public safety 700 MHz frequencies
as well as commercial usage.
15Mbps downloading and
5Mbps when uploading.
100 MB Access Services!
Internet2*
Cell Broadcast
The Security Fabric follows the guidelines required by the
NIST 7628 for the Department of Energy.
xSystem &
Network
Management
Controller
Device
Device The
Security
Fabric
The Security Fabric is an implementation of the
Tailored Trustworthy Space.
Embedded Device
Applications
Device
Management
Hypervisor
The fundamental concept is that
you must first separate the management elements of
a device from the application payload portions.
This is similar to the AMT philosophy, but expanded to the software dimension.
Separation of Protection and Security
• The major hardware approach for security or protection is the
use of hierarchical protection domains. Prominent example
of this approach is a ring architecture with "supervisor mode"
and "user mode“.
• This approach adopts
capabilities provided
by a lower level:
(hardware/firmware/kernel).
The Multics Style of Ring Structure
The cybersecurity threat sharing needs to be performed
between multiple communities to be effective.
Subscriber
Subscriber
Subscriber
Subscriber
Subscriber
Context
Top Secret
Secret
Unclassified
F
F
Threat
Connect
STIX
Custom
Community
Community
Community
1300
Communities
1200
Subscribers
On-Premises Cloud
UI
API
Private Cloud
Threat Connect
Cloud Platform
Amazon EC2
Broker
Sources
Free, $, other
The data arrangements can be hierarchical
to facilitate multi agency awareness.
IODEF
The “Concierge” Service
• Attention! Some of the co-ops have very tiny IT staffs. (Like
one person)
• The coming cyber attacks will be very sophisticated.
• Even the central staff will sometimes be challenged to deal
with the complexities associated with cyber defense.
• Thus, even with collaboration and data sharing, from time to
time, a co-op technician would like to have an “OnStar”
button to push to get instant help on demand from a
specialist.
This Concierge service from ThreatConnect may be very desirable.
Saturn sees the bigger picture.
Discussion
Agile fractal grid   7-11-14

More Related Content

What's hot

What's hot (20)

Cyber security in Smart grid system
Cyber security in Smart grid systemCyber security in Smart grid system
Cyber security in Smart grid system
 
Blueprint for the Industrial Internet of Things
Blueprint for the Industrial Internet of ThingsBlueprint for the Industrial Internet of Things
Blueprint for the Industrial Internet of Things
 
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityCybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
 
CYBER SECURITY IN THE SMART GRID
CYBER SECURITY IN THE SMART GRIDCYBER SECURITY IN THE SMART GRID
CYBER SECURITY IN THE SMART GRID
 
Smart grid security
Smart grid securitySmart grid security
Smart grid security
 
Security and smart grid what you need to know john chowdhury 2012 final
Security and smart grid what you need to know   john chowdhury 2012 finalSecurity and smart grid what you need to know   john chowdhury 2012 final
Security and smart grid what you need to know john chowdhury 2012 final
 
Cps sec sg sg2017 conf_iran
Cps sec sg  sg2017 conf_iranCps sec sg  sg2017 conf_iran
Cps sec sg sg2017 conf_iran
 
Software defined network based smart grid communication
Software defined network based smart grid communicationSoftware defined network based smart grid communication
Software defined network based smart grid communication
 
D2D communication for spectral efficiency improvement and interference reduct...
D2D communication for spectral efficiency improvement and interference reduct...D2D communication for spectral efficiency improvement and interference reduct...
D2D communication for spectral efficiency improvement and interference reduct...
 
Challenges and Emerging Technology in 5G
Challenges and Emerging Technology in 5GChallenges and Emerging Technology in 5G
Challenges and Emerging Technology in 5G
 
Smart Grid
Smart GridSmart Grid
Smart Grid
 
Mobile Edge Computing
Mobile Edge ComputingMobile Edge Computing
Mobile Edge Computing
 
A secure cloud computing based framework for big information management syste...
A secure cloud computing based framework for big information management syste...A secure cloud computing based framework for big information management syste...
A secure cloud computing based framework for big information management syste...
 
Seminar report
Seminar reportSeminar report
Seminar report
 
Smart Grid for the CSO
Smart Grid for the CSOSmart Grid for the CSO
Smart Grid for the CSO
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
 
iDirect's solution for electric ulities
iDirect's solution for electric ulitiesiDirect's solution for electric ulities
iDirect's solution for electric ulities
 
SaskTel & Data for Good - Sean Milne
SaskTel & Data for Good - Sean MilneSaskTel & Data for Good - Sean Milne
SaskTel & Data for Good - Sean Milne
 
Report-Fog Based Emergency System For Smart Enhanced Living Environment
Report-Fog Based Emergency System For Smart Enhanced Living EnvironmentReport-Fog Based Emergency System For Smart Enhanced Living Environment
Report-Fog Based Emergency System For Smart Enhanced Living Environment
 
Healthcare Infrastructure Solutions that Deliver Dramatic Savings
Healthcare Infrastructure Solutions that Deliver Dramatic SavingsHealthcare Infrastructure Solutions that Deliver Dramatic Savings
Healthcare Infrastructure Solutions that Deliver Dramatic Savings
 

Viewers also liked

BK 7210 Design principles urbanism and Kop van Zuid – ir. John Westrik
BK 7210 Design principles urbanism and Kop van Zuid – ir. John WestrikBK 7210 Design principles urbanism and Kop van Zuid – ir. John Westrik
BK 7210 Design principles urbanism and Kop van Zuid – ir. John Westrik
jornvorn
 
BK 7210 Urbanism Rotterdam and the Delta – ir. Han Meyer
BK 7210 Urbanism Rotterdam and the Delta – ir. Han MeyerBK 7210 Urbanism Rotterdam and the Delta – ir. Han Meyer
BK 7210 Urbanism Rotterdam and the Delta – ir. Han Meyer
jornvorn
 
Stanford Case Study - Salesforce.com Transformation
Stanford Case Study - Salesforce.com TransformationStanford Case Study - Salesforce.com Transformation
Stanford Case Study - Salesforce.com Transformation
Steve Greene
 
BK 7210 Urban analysis and design principles – ir. Evelien Brandes
BK 7210 Urban analysis and design principles – ir. Evelien BrandesBK 7210 Urban analysis and design principles – ir. Evelien Brandes
BK 7210 Urban analysis and design principles – ir. Evelien Brandes
jornvorn
 

Viewers also liked (11)

Smart Cities link to a real operational Smart Grid
Smart Cities link to a real operational Smart GridSmart Cities link to a real operational Smart Grid
Smart Cities link to a real operational Smart Grid
 
2-25-2014 Part 1 - NRECA Kickoff Meeting v2
2-25-2014 Part 1 - NRECA Kickoff Meeting v22-25-2014 Part 1 - NRECA Kickoff Meeting v2
2-25-2014 Part 1 - NRECA Kickoff Meeting v2
 
BK 7210 Design principles urbanism and Kop van Zuid – ir. John Westrik
BK 7210 Design principles urbanism and Kop van Zuid – ir. John WestrikBK 7210 Design principles urbanism and Kop van Zuid – ir. John Westrik
BK 7210 Design principles urbanism and Kop van Zuid – ir. John Westrik
 
New Urbanism: Just... performs...better
New Urbanism: Just... performs...betterNew Urbanism: Just... performs...better
New Urbanism: Just... performs...better
 
Urban complexity's role in a practical emergent urbanism
Urban complexity's role in a practical emergent urbanismUrban complexity's role in a practical emergent urbanism
Urban complexity's role in a practical emergent urbanism
 
BK 7210 Urbanism Rotterdam and the Delta – ir. Han Meyer
BK 7210 Urbanism Rotterdam and the Delta – ir. Han MeyerBK 7210 Urbanism Rotterdam and the Delta – ir. Han Meyer
BK 7210 Urbanism Rotterdam and the Delta – ir. Han Meyer
 
Platforms Transitions
Platforms TransitionsPlatforms Transitions
Platforms Transitions
 
BK 7210 Urban plan typology Rotterdam Zuid – ir. Evelien Brandes
BK 7210 Urban plan typology Rotterdam Zuid – ir. Evelien BrandesBK 7210 Urban plan typology Rotterdam Zuid – ir. Evelien Brandes
BK 7210 Urban plan typology Rotterdam Zuid – ir. Evelien Brandes
 
Stanford Case Study - Salesforce.com Transformation
Stanford Case Study - Salesforce.com TransformationStanford Case Study - Salesforce.com Transformation
Stanford Case Study - Salesforce.com Transformation
 
BK 7210 Urban analysis and design principles – ir. Evelien Brandes
BK 7210 Urban analysis and design principles – ir. Evelien BrandesBK 7210 Urban analysis and design principles – ir. Evelien Brandes
BK 7210 Urban analysis and design principles – ir. Evelien Brandes
 
Urban Design Definition
Urban Design DefinitionUrban Design Definition
Urban Design Definition
 

Similar to Agile fractal grid 7-11-14

Critical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideCritical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems Worldwide
Angela Hays
 
Common industrial protocol
Common industrial protocolCommon industrial protocol
Common industrial protocol
Huấn Trần
 
Connected Vehicles, Zonal In Vehicle Network Architecture
Connected Vehicles, Zonal In Vehicle Network ArchitectureConnected Vehicles, Zonal In Vehicle Network Architecture
Connected Vehicles, Zonal In Vehicle Network Architecture
ijtsrd
 

Similar to Agile fractal grid 7-11-14 (20)

Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of building
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of building
 
Wide area network in smart grid kundan
Wide area network in smart grid kundanWide area network in smart grid kundan
Wide area network in smart grid kundan
 
Detroit A Smart City..... inspired by a "Community of Practice"
Detroit  A Smart City..... inspired by a "Community of Practice"Detroit  A Smart City..... inspired by a "Community of Practice"
Detroit A Smart City..... inspired by a "Community of Practice"
 
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGenUnderstanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
 
Securing the 5G growth story with NFVi.pdf
Securing the 5G growth story with NFVi.pdfSecuring the 5G growth story with NFVi.pdf
Securing the 5G growth story with NFVi.pdf
 
Securing the 5G growth story with NFVi (1).pdf
Securing the 5G growth story with NFVi (1).pdfSecuring the 5G growth story with NFVi (1).pdf
Securing the 5G growth story with NFVi (1).pdf
 
IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel Talk
 
IBM End-to-End Security for Smart Grids
IBM End-to-End Security for Smart GridsIBM End-to-End Security for Smart Grids
IBM End-to-End Security for Smart Grids
 
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
 
Critical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideCritical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems Worldwide
 
What is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your ReachWhat is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your Reach
 
Common industrial protocol
Common industrial protocolCommon industrial protocol
Common industrial protocol
 
Connected Vehicles, Zonal In Vehicle Network Architecture
Connected Vehicles, Zonal In Vehicle Network ArchitectureConnected Vehicles, Zonal In Vehicle Network Architecture
Connected Vehicles, Zonal In Vehicle Network Architecture
 
Securing Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecuring Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdf
 
Securing Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecuring Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdf
 
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
 
IRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET- Data Security in Local Network through Distributed Firewalls: A ReviewIRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET- Data Security in Local Network through Distributed Firewalls: A Review
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA Networks
 

Agile fractal grid 7-11-14

  • 1. The Agile Fractal Grid Chuck Speicher John Reynolds Friday, July 11, 2014
  • 2. Security Fabric Alliance • The Security Fabric Alliance is a working association dedicated to practical deployment of the power grid and critical infrastructure complex system solution in the United States: – Utilities and telecommunications providers – Systems integrators – Manufacturers – Technology partners – National certification and interoperability entity • The alliance is intended to give the CEO of a utility the purview of up-to-the moment knowledge of the options available to make wise investment decisions regarding infrastructure deployment for optimal returns. The variation includes the proper orientation for large, medium, and small entities.
  • 3. The Industrial Internet • The Industrial Internet Consortium was founded in 2014 to further development, adoption and wide-spread use of interconnected machines, intelligent analytics, and people at work. • Through an independently-run consortium of technology innovators, industrial companies, academia, and government, the goal of the IIC is to accelerate the development and availability of intelligent industrial automation for the public good. • This goal of the consortium is to: – Utilize existing and create new industry use cases and test beds for real-world applications; – Deliver best practices, reference architectures, case studies, and standards requirements to ease deployment of connected technologies; – Influence the global development standards process for internet and industrial systems; – Facilitate open forums to share and exchange real-world ideas, practices, lessons, and insights; – Build confidence around new and innovative approaches to security. • The Industrial Internet Consortium (“IIC”) is a trademark of the Object Management Group®, Inc. (OMG®), a not-for-profit 501(c)(6) tax-exempt organization.
  • 4. The OMG process is more about establishing markets as opposed to just setting standards. SFA Reference Builds Certification of Conformance & Interoperability The OMG is planning to standardize the Security Fabric for all critical infrastructure.
  • 5. We are planning to support the 940 rural co-ops in the U.S. with hybrid cloud/device services protected by the Security Fabric. The FCC recently has emphasized that the best course of action for rural broadband in the United States would be to use the rural electric utilities… … the UTC and APPA expansions would triple the size of the coverage …
  • 6. The Vision “The Agile Fractal Grid” Achieving Grid Security, Reliability, and Resiliency through Advanced Analytics and Control What is needed: 1. A hybrid cloud for operations and analytics 2. Substation of the future 3. Security Fabric end-to-end
  • 7. Each level operates in somewhat of a selfish fashion… but recommendations for the best trend for the flock come from management guidance from above. Primary Data Flow Patterns in Laminar Control for Power Grids
  • 8. Electric power distribution and broadband communications are like Siamese twins! (They can’t go anywhere without each other.) Digital control is needed at each junction point. Like electricity, broadband can be used for multiple things. The Circulatory System The Nervous System NRECA UTC
  • 9. As envisioned, Internet2 would eventually provide a sequestered core network for the Industrial Internet. Note the quadruple redundancy
  • 10. Separation of the Industrial Internet from the Generic Internet The Core Network Generic Internet Carrier Ethernet With Routing DWDM Isolation Cooperative Control Centers Core City Node Enterprise Systems Industrial Devices Substation Nodes Router+ Substation Controller Router+ Carrier Ethernet Isolation NAN Nodes HAN Nodes Wireless LTE 700 MHz? Wireless LTE 2.5 GHz? PicoCell Gateway Sensor Transverter We will eventually use a combination of DWDM separation plus Carrier Ethernet separation.
  • 11. Our communications has redundancy built into the control protocols. LTE Macrocell and Distribution Fiber NAN LTE Picocell Mobile HAN LTE Home Gateway This is the only capability available that allows handoff between terrestrial LTE services and satellite services. This system can simultaneously support the public safety 700 MHz frequencies as well as commercial usage. 15Mbps downloading and 5Mbps when uploading. 100 MB Access Services! Internet2* Cell Broadcast
  • 12. The Security Fabric follows the guidelines required by the NIST 7628 for the Department of Energy. xSystem & Network Management Controller Device Device The Security Fabric The Security Fabric is an implementation of the Tailored Trustworthy Space.
  • 13. Embedded Device Applications Device Management Hypervisor The fundamental concept is that you must first separate the management elements of a device from the application payload portions. This is similar to the AMT philosophy, but expanded to the software dimension.
  • 14. Separation of Protection and Security • The major hardware approach for security or protection is the use of hierarchical protection domains. Prominent example of this approach is a ring architecture with "supervisor mode" and "user mode“. • This approach adopts capabilities provided by a lower level: (hardware/firmware/kernel). The Multics Style of Ring Structure
  • 15. The cybersecurity threat sharing needs to be performed between multiple communities to be effective. Subscriber Subscriber Subscriber Subscriber Subscriber Context Top Secret Secret Unclassified F F Threat Connect STIX Custom Community Community Community 1300 Communities 1200 Subscribers On-Premises Cloud UI API Private Cloud Threat Connect Cloud Platform Amazon EC2 Broker Sources Free, $, other The data arrangements can be hierarchical to facilitate multi agency awareness. IODEF
  • 16. The “Concierge” Service • Attention! Some of the co-ops have very tiny IT staffs. (Like one person) • The coming cyber attacks will be very sophisticated. • Even the central staff will sometimes be challenged to deal with the complexities associated with cyber defense. • Thus, even with collaboration and data sharing, from time to time, a co-op technician would like to have an “OnStar” button to push to get instant help on demand from a specialist. This Concierge service from ThreatConnect may be very desirable. Saturn sees the bigger picture.