SlideShare a Scribd company logo
1 of 18
The Agile Fractal Grid
Chuck Speicher
John Reynolds
Friday, July 11, 2014
Security Fabric Alliance
• The Security Fabric Alliance is a working association dedicated
to practical deployment of the power grid and critical
infrastructure complex system solution in the United States:
– Utilities and telecommunications providers
– Systems integrators
– Manufacturers
– Technology partners
– National certification and interoperability entity
• The alliance is intended to give the CEO of a utility the purview
of up-to-the moment knowledge of the options available to
make wise investment decisions regarding infrastructure
deployment for optimal returns.
The variation includes the proper orientation for large, medium, and small entities.
The Industrial Internet
• The Industrial Internet Consortium was founded in 2014 to further
development, adoption and wide-spread use of interconnected
machines, intelligent analytics, and people at work.
• Through an independently-run consortium of technology innovators,
industrial companies, academia, and government, the goal of the IIC is to
accelerate the development and availability of intelligent industrial
automation for the public good.
• This goal of the consortium is to:
– Utilize existing and create new industry use cases and test beds for real-world
applications;
– Deliver best practices, reference architectures, case studies, and standards
requirements to ease deployment of connected technologies;
– Influence the global development standards process for internet and industrial
systems;
– Facilitate open forums to share and exchange real-world ideas, practices, lessons,
and insights;
– Build confidence around new and innovative approaches to security.
• The Industrial Internet Consortium (“IIC”) is a trademark of the Object Management
Group®, Inc. (OMG®), a not-for-profit 501(c)(6) tax-exempt organization.
The OMG process is more about establishing markets
as opposed to just setting standards.
SFA Reference
Builds
Certification of
Conformance &
Interoperability
The OMG is planning to standardize
the Security Fabric
for all critical infrastructure.
We are planning to support the 940 rural co-ops in the U.S. with
hybrid cloud/device services protected by the Security Fabric.
The FCC recently has emphasized that the best course of action
for rural broadband in the United States would be to use the rural electric utilities…
… the UTC and APPA expansions would triple the size of the coverage …
The Vision
“The Agile Fractal Grid”
Achieving
Grid Security, Reliability, and Resiliency
through Advanced Analytics and Control
What is needed:
1. A hybrid cloud for operations
and analytics
2. Substation of the future
3. Security Fabric end-to-end
Each level operates in
somewhat of a selfish fashion…
but recommendations for the
best trend for the flock
come from management
guidance from above.
Primary Data Flow
Patterns in
Laminar Control for
Power Grids
Electric power distribution and broadband communications
are like Siamese twins!
(They can’t go anywhere without each other.)
Digital control is needed
at each junction point.
Like electricity,
broadband can be used
for multiple things.
The Circulatory System The Nervous System
NRECA
UTC
As envisioned, Internet2 would eventually provide a
sequestered core network for the Industrial Internet.
Note the quadruple redundancy
Separation of the Industrial Internet
from the Generic Internet
The Core Network
Generic Internet
Carrier Ethernet
With Routing
DWDM Isolation
Cooperative Control Centers
Core City
Node
Enterprise Systems
Industrial Devices
Substation Nodes
Router+
Substation
Controller Router+
Carrier Ethernet
Isolation
NAN Nodes
HAN Nodes
Wireless LTE
700 MHz?
Wireless LTE
2.5 GHz?
PicoCell
Gateway
Sensor
Transverter
We will eventually use
a combination of DWDM separation
plus Carrier Ethernet separation.
Our communications has redundancy
built into the control protocols.
LTE
Macrocell
and
Distribution
Fiber
NAN
LTE
Picocell
Mobile
HAN
LTE
Home
Gateway
This is the only capability available
that allows handoff between terrestrial
LTE services and satellite services.
This system can simultaneously support
the public safety 700 MHz frequencies
as well as commercial usage.
15Mbps downloading and
5Mbps when uploading.
100 MB Access Services!
Internet2*
Cell Broadcast
The Security Fabric follows the guidelines required by the
NIST 7628 for the Department of Energy.
xSystem &
Network
Management
Controller
Device
Device The
Security
Fabric
The Security Fabric is an implementation of the
Tailored Trustworthy Space.
Embedded Device
Applications
Device
Management
Hypervisor
The fundamental concept is that
you must first separate the management elements of
a device from the application payload portions.
This is similar to the AMT philosophy, but expanded to the software dimension.
Separation of Protection and Security
• The major hardware approach for security or protection is the
use of hierarchical protection domains. Prominent example
of this approach is a ring architecture with "supervisor mode"
and "user mode“.
• This approach adopts
capabilities provided
by a lower level:
(hardware/firmware/kernel).
The Multics Style of Ring Structure
The cybersecurity threat sharing needs to be performed
between multiple communities to be effective.
Subscriber
Subscriber
Subscriber
Subscriber
Subscriber
Context
Top Secret
Secret
Unclassified
F
F
Threat
Connect
STIX
Custom
Community
Community
Community
1300
Communities
1200
Subscribers
On-Premises Cloud
UI
API
Private Cloud
Threat Connect
Cloud Platform
Amazon EC2
Broker
Sources
Free, $, other
The data arrangements can be hierarchical
to facilitate multi agency awareness.
IODEF
The “Concierge” Service
• Attention! Some of the co-ops have very tiny IT staffs. (Like
one person)
• The coming cyber attacks will be very sophisticated.
• Even the central staff will sometimes be challenged to deal
with the complexities associated with cyber defense.
• Thus, even with collaboration and data sharing, from time to
time, a co-op technician would like to have an “OnStar”
button to push to get instant help on demand from a
specialist.
This Concierge service from ThreatConnect may be very desirable.
Saturn sees the bigger picture.
Discussion
Agile Fractal Grid - 7-11-14

More Related Content

What's hot

Security and smart grid what you need to know john chowdhury 2012 final
Security and smart grid what you need to know   john chowdhury 2012 finalSecurity and smart grid what you need to know   john chowdhury 2012 final
Security and smart grid what you need to know john chowdhury 2012 finalJohn Chowdhury
 
A LOW COST AND FLEXIBLE ZIGBEE SYSTEM FOR LOGISTICS USING WIRELESS SENSOR NET...
A LOW COST AND FLEXIBLE ZIGBEE SYSTEM FOR LOGISTICS USING WIRELESS SENSOR NET...A LOW COST AND FLEXIBLE ZIGBEE SYSTEM FOR LOGISTICS USING WIRELESS SENSOR NET...
A LOW COST AND FLEXIBLE ZIGBEE SYSTEM FOR LOGISTICS USING WIRELESS SENSOR NET...AM Publications
 
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityCybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityLeonardo ENERGY
 
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...University of Southern California
 
Cyber Security of Power grids
Cyber Security of Power grids Cyber Security of Power grids
Cyber Security of Power grids Jishnu Pradeep
 
How to Architect Microgrids for the Industrial Internet of Things
How to Architect Microgrids for the Industrial Internet of ThingsHow to Architect Microgrids for the Industrial Internet of Things
How to Architect Microgrids for the Industrial Internet of ThingsReal-Time Innovations (RTI)
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber SecurityJAZEEL K T
 
CYBER SECURITY IN THE SMART GRID
CYBER SECURITY IN THE SMART GRIDCYBER SECURITY IN THE SMART GRID
CYBER SECURITY IN THE SMART GRIDSiva Sasthri
 
Security Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksSecurity Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksWilliam Chipman
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesjournalBEEI
 
Elements of IoT connectivity technologies
Elements of IoT connectivity technologiesElements of IoT connectivity technologies
Elements of IoT connectivity technologiesusman sarwar
 
Smart grid chinedu opara(m00560830)
Smart grid   chinedu opara(m00560830)Smart grid   chinedu opara(m00560830)
Smart grid chinedu opara(m00560830)Chinedu Opara
 
Control on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing ServicesControl on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing ServicesIRJET Journal
 
iDirect's solution for electric ulities
iDirect's solution for electric ulitiesiDirect's solution for electric ulities
iDirect's solution for electric ulitiesJoshua Cohen
 
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)Ivan Carmona
 

What's hot (20)

Security and smart grid what you need to know john chowdhury 2012 final
Security and smart grid what you need to know   john chowdhury 2012 finalSecurity and smart grid what you need to know   john chowdhury 2012 final
Security and smart grid what you need to know john chowdhury 2012 final
 
A LOW COST AND FLEXIBLE ZIGBEE SYSTEM FOR LOGISTICS USING WIRELESS SENSOR NET...
A LOW COST AND FLEXIBLE ZIGBEE SYSTEM FOR LOGISTICS USING WIRELESS SENSOR NET...A LOW COST AND FLEXIBLE ZIGBEE SYSTEM FOR LOGISTICS USING WIRELESS SENSOR NET...
A LOW COST AND FLEXIBLE ZIGBEE SYSTEM FOR LOGISTICS USING WIRELESS SENSOR NET...
 
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityCybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
 
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
 
Smart grid security
Smart grid securitySmart grid security
Smart grid security
 
Cyber Security of Power grids
Cyber Security of Power grids Cyber Security of Power grids
Cyber Security of Power grids
 
How to Architect Microgrids for the Industrial Internet of Things
How to Architect Microgrids for the Industrial Internet of ThingsHow to Architect Microgrids for the Industrial Internet of Things
How to Architect Microgrids for the Industrial Internet of Things
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
 
Seminar report
Seminar reportSeminar report
Seminar report
 
CYBER SECURITY IN THE SMART GRID
CYBER SECURITY IN THE SMART GRIDCYBER SECURITY IN THE SMART GRID
CYBER SECURITY IN THE SMART GRID
 
Security Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksSecurity Models in Cellular Wireless Networks
Security Models in Cellular Wireless Networks
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
 
Smart Grid
Smart Grid Smart Grid
Smart Grid
 
Elements of IoT connectivity technologies
Elements of IoT connectivity technologiesElements of IoT connectivity technologies
Elements of IoT connectivity technologies
 
Smart grid chinedu opara(m00560830)
Smart grid   chinedu opara(m00560830)Smart grid   chinedu opara(m00560830)
Smart grid chinedu opara(m00560830)
 
Control on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing ServicesControl on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing Services
 
LTE Self Organizing Network Projects
LTE Self Organizing Network ProjectsLTE Self Organizing Network Projects
LTE Self Organizing Network Projects
 
iDirect's solution for electric ulities
iDirect's solution for electric ulitiesiDirect's solution for electric ulities
iDirect's solution for electric ulities
 
Fog Networking
Fog NetworkingFog Networking
Fog Networking
 
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)
 

Similar to Agile Fractal Grid - 7-11-14

Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of buildingCharles "Chuck" Speicher Jr.
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of buildingChuck Speicher
 
Wide area network in smart grid kundan
Wide area network in smart grid kundanWide area network in smart grid kundan
Wide area network in smart grid kundanKundan Kumar
 
Detroit A Smart City..... inspired by a "Community of Practice"
Detroit  A Smart City..... inspired by a "Community of Practice"Detroit  A Smart City..... inspired by a "Community of Practice"
Detroit A Smart City..... inspired by a "Community of Practice"Charles "Chuck" Speicher Jr.
 
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGenUnderstanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGenSecurityGen1
 
Securing the 5G growth story with NFVi.pdf
Securing the 5G growth story with NFVi.pdfSecuring the 5G growth story with NFVi.pdf
Securing the 5G growth story with NFVi.pdfSecurity Gen
 
Securing the 5G growth story with NFVi (1).pdf
Securing the 5G growth story with NFVi (1).pdfSecuring the 5G growth story with NFVi (1).pdf
Securing the 5G growth story with NFVi (1).pdfSecurity Gen
 
IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkNathan Wallace, PhD, PE
 
IBM End-to-End Security for Smart Grids
IBM End-to-End Security for Smart GridsIBM End-to-End Security for Smart Grids
IBM End-to-End Security for Smart GridsIBM Energy & Utilties
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilitiesNirmal Thaliyil
 
Critical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideCritical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideAngela Hays
 
What is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your ReachWhat is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your ReachSUSE
 
Common industrial protocol
Common industrial protocolCommon industrial protocol
Common industrial protocolHuấn Trần
 
Connected Vehicles, Zonal In Vehicle Network Architecture
Connected Vehicles, Zonal In Vehicle Network ArchitectureConnected Vehicles, Zonal In Vehicle Network Architecture
Connected Vehicles, Zonal In Vehicle Network Architectureijtsrd
 
Securing Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecuring Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecurity Gen
 
Securing Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecuring Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecurity Gen
 
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...SecurityGen1
 
IRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET- Data Security in Local Network through Distributed Firewalls: A ReviewIRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET- Data Security in Local Network through Distributed Firewalls: A ReviewIRJET Journal
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksGeorge Wainblat
 
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Unisys Corporation
 

Similar to Agile Fractal Grid - 7-11-14 (20)

Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of building
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of building
 
Wide area network in smart grid kundan
Wide area network in smart grid kundanWide area network in smart grid kundan
Wide area network in smart grid kundan
 
Detroit A Smart City..... inspired by a "Community of Practice"
Detroit  A Smart City..... inspired by a "Community of Practice"Detroit  A Smart City..... inspired by a "Community of Practice"
Detroit A Smart City..... inspired by a "Community of Practice"
 
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGenUnderstanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
 
Securing the 5G growth story with NFVi.pdf
Securing the 5G growth story with NFVi.pdfSecuring the 5G growth story with NFVi.pdf
Securing the 5G growth story with NFVi.pdf
 
Securing the 5G growth story with NFVi (1).pdf
Securing the 5G growth story with NFVi (1).pdfSecuring the 5G growth story with NFVi (1).pdf
Securing the 5G growth story with NFVi (1).pdf
 
IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel Talk
 
IBM End-to-End Security for Smart Grids
IBM End-to-End Security for Smart GridsIBM End-to-End Security for Smart Grids
IBM End-to-End Security for Smart Grids
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
 
Critical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideCritical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems Worldwide
 
What is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your ReachWhat is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your Reach
 
Common industrial protocol
Common industrial protocolCommon industrial protocol
Common industrial protocol
 
Connected Vehicles, Zonal In Vehicle Network Architecture
Connected Vehicles, Zonal In Vehicle Network ArchitectureConnected Vehicles, Zonal In Vehicle Network Architecture
Connected Vehicles, Zonal In Vehicle Network Architecture
 
Securing Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecuring Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdf
 
Securing Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecuring Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdf
 
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
 
IRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET- Data Security in Local Network through Distributed Firewalls: A ReviewIRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET- Data Security in Local Network through Distributed Firewalls: A Review
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA Networks
 
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
 

More from Charles "Chuck" Speicher Jr.

More from Charles "Chuck" Speicher Jr. (6)

011018 afg branded 3_dfs-microgrid-presentation
011018 afg branded 3_dfs-microgrid-presentation011018 afg branded 3_dfs-microgrid-presentation
011018 afg branded 3_dfs-microgrid-presentation
 
The Agile Fractal Grid orchestrated by a platform of platforms
The Agile Fractal Grid  orchestrated by a platform of platformsThe Agile Fractal Grid  orchestrated by a platform of platforms
The Agile Fractal Grid orchestrated by a platform of platforms
 
Smart Cities link to a real operational Smart Grid
Smart Cities link to a real operational Smart GridSmart Cities link to a real operational Smart Grid
Smart Cities link to a real operational Smart Grid
 
2 25-2014 part 2 - nreca kickoff meeting v2a
2 25-2014 part 2 - nreca kickoff meeting v2a2 25-2014 part 2 - nreca kickoff meeting v2a
2 25-2014 part 2 - nreca kickoff meeting v2a
 
Our race with intelligent machines wh two pager
Our race with intelligent machines wh two pagerOur race with intelligent machines wh two pager
Our race with intelligent machines wh two pager
 
2-25-2014 Part 1 - NRECA Kickoff Meeting v2
2-25-2014 Part 1 - NRECA Kickoff Meeting v22-25-2014 Part 1 - NRECA Kickoff Meeting v2
2-25-2014 Part 1 - NRECA Kickoff Meeting v2
 

Agile Fractal Grid - 7-11-14

  • 1. The Agile Fractal Grid Chuck Speicher John Reynolds Friday, July 11, 2014
  • 2. Security Fabric Alliance • The Security Fabric Alliance is a working association dedicated to practical deployment of the power grid and critical infrastructure complex system solution in the United States: – Utilities and telecommunications providers – Systems integrators – Manufacturers – Technology partners – National certification and interoperability entity • The alliance is intended to give the CEO of a utility the purview of up-to-the moment knowledge of the options available to make wise investment decisions regarding infrastructure deployment for optimal returns. The variation includes the proper orientation for large, medium, and small entities.
  • 3. The Industrial Internet • The Industrial Internet Consortium was founded in 2014 to further development, adoption and wide-spread use of interconnected machines, intelligent analytics, and people at work. • Through an independently-run consortium of technology innovators, industrial companies, academia, and government, the goal of the IIC is to accelerate the development and availability of intelligent industrial automation for the public good. • This goal of the consortium is to: – Utilize existing and create new industry use cases and test beds for real-world applications; – Deliver best practices, reference architectures, case studies, and standards requirements to ease deployment of connected technologies; – Influence the global development standards process for internet and industrial systems; – Facilitate open forums to share and exchange real-world ideas, practices, lessons, and insights; – Build confidence around new and innovative approaches to security. • The Industrial Internet Consortium (“IIC”) is a trademark of the Object Management Group®, Inc. (OMG®), a not-for-profit 501(c)(6) tax-exempt organization.
  • 4. The OMG process is more about establishing markets as opposed to just setting standards. SFA Reference Builds Certification of Conformance & Interoperability The OMG is planning to standardize the Security Fabric for all critical infrastructure.
  • 5. We are planning to support the 940 rural co-ops in the U.S. with hybrid cloud/device services protected by the Security Fabric. The FCC recently has emphasized that the best course of action for rural broadband in the United States would be to use the rural electric utilities… … the UTC and APPA expansions would triple the size of the coverage …
  • 6. The Vision “The Agile Fractal Grid” Achieving Grid Security, Reliability, and Resiliency through Advanced Analytics and Control What is needed: 1. A hybrid cloud for operations and analytics 2. Substation of the future 3. Security Fabric end-to-end
  • 7. Each level operates in somewhat of a selfish fashion… but recommendations for the best trend for the flock come from management guidance from above. Primary Data Flow Patterns in Laminar Control for Power Grids
  • 8. Electric power distribution and broadband communications are like Siamese twins! (They can’t go anywhere without each other.) Digital control is needed at each junction point. Like electricity, broadband can be used for multiple things. The Circulatory System The Nervous System NRECA UTC
  • 9. As envisioned, Internet2 would eventually provide a sequestered core network for the Industrial Internet. Note the quadruple redundancy
  • 10. Separation of the Industrial Internet from the Generic Internet The Core Network Generic Internet Carrier Ethernet With Routing DWDM Isolation Cooperative Control Centers Core City Node Enterprise Systems Industrial Devices Substation Nodes Router+ Substation Controller Router+ Carrier Ethernet Isolation NAN Nodes HAN Nodes Wireless LTE 700 MHz? Wireless LTE 2.5 GHz? PicoCell Gateway Sensor Transverter We will eventually use a combination of DWDM separation plus Carrier Ethernet separation.
  • 11. Our communications has redundancy built into the control protocols. LTE Macrocell and Distribution Fiber NAN LTE Picocell Mobile HAN LTE Home Gateway This is the only capability available that allows handoff between terrestrial LTE services and satellite services. This system can simultaneously support the public safety 700 MHz frequencies as well as commercial usage. 15Mbps downloading and 5Mbps when uploading. 100 MB Access Services! Internet2* Cell Broadcast
  • 12. The Security Fabric follows the guidelines required by the NIST 7628 for the Department of Energy. xSystem & Network Management Controller Device Device The Security Fabric The Security Fabric is an implementation of the Tailored Trustworthy Space.
  • 13. Embedded Device Applications Device Management Hypervisor The fundamental concept is that you must first separate the management elements of a device from the application payload portions. This is similar to the AMT philosophy, but expanded to the software dimension.
  • 14. Separation of Protection and Security • The major hardware approach for security or protection is the use of hierarchical protection domains. Prominent example of this approach is a ring architecture with "supervisor mode" and "user mode“. • This approach adopts capabilities provided by a lower level: (hardware/firmware/kernel). The Multics Style of Ring Structure
  • 15. The cybersecurity threat sharing needs to be performed between multiple communities to be effective. Subscriber Subscriber Subscriber Subscriber Subscriber Context Top Secret Secret Unclassified F F Threat Connect STIX Custom Community Community Community 1300 Communities 1200 Subscribers On-Premises Cloud UI API Private Cloud Threat Connect Cloud Platform Amazon EC2 Broker Sources Free, $, other The data arrangements can be hierarchical to facilitate multi agency awareness. IODEF
  • 16. The “Concierge” Service • Attention! Some of the co-ops have very tiny IT staffs. (Like one person) • The coming cyber attacks will be very sophisticated. • Even the central staff will sometimes be challenged to deal with the complexities associated with cyber defense. • Thus, even with collaboration and data sharing, from time to time, a co-op technician would like to have an “OnStar” button to push to get instant help on demand from a specialist. This Concierge service from ThreatConnect may be very desirable. Saturn sees the bigger picture.