SlideShare a Scribd company logo
1 of 13
ADVANCING THE POWER OF ENERGY
The Art of Securing Microgrid
Control Systems
Presented at the Energy, Utility, and Environment
Conference, March 6, 2018, San Diego, CA
Jim Dodenhoff, Regional Director of Business Development
Intelligent Power & Energy Research Corporation (IPERC)
50
Utility security professionals
that have reported at least
one security breach
70%
of total 2016 ICS-CERT ICS
cyber incidents targeted
the Energy sector
20%
Cyber Attacks Go Beyond International Cyberwarfare and they Go Beyond Data Breaches
3
Microgrids: A System of Systems
4
Overly Complex Security Protocols Result in Fragile Systems
COMPLEXITY ≠ RESILIENCY
Augmentation of cybersecurity solutions adds
devices and applications that can malfunction and
cause system degradation or cascading failures.
KNOW YOUR SYSTEM’S NEEDS
Understand the components and interfaces
of your system and assess the risks at hand
before selecting security measures.
≠
→
5
The Art of Securing a Microgrid Control System
Initial Threat
Analysis
Security Measure
Identification
Prioritized Security
Implementation
01 02 03
6Proprietary
Initial Threat Analysis: Develop System Configuration Baseline
LEGACY EQUIPMENT
INTERCONNECTIONS
Review all interconnections including ports,
protocols, services, and end-device connections
Consider the impact of legacy assets and
potential bandwidth constraints
SECURITY POLICIES
Examine which security procedures are
applicable and reduce the most risk
COMPONENT INVENTORY
Detailed system inventory with an overarching
layered, port-level diagram
7Proprietary
Initial Threat Analysis: Examine Potential Attack Vectors & High Risk Points
PHYSICAL SECURITY
FRAGILITY
Identify where there could be single points of
failure and threats to missions
Ensure locked enclosures and controlled
access points
CRITICAL SECURITY
Review security checklists for critical open
items such as ICS standards, and DoD and
vendor checklists
CONNECTIONS
Examine connections to external networks, pivot
points, and remote access
!
8Proprietary
Security Measure Identification: Network Based Measures
MONITORING
ENTERPRISE CONSIDERATIONS
Identify where there could be single points of
failure and threats to mission dependencies
Enable monitoring and alert tools to notify
system operators
SIMPLIFICATION
Reduce system fragility by selecting the
right security measures for your microgrid
SEGMENTATION
Physically and logically separate computer
networks to isolate network threats
9Proprietary
Security Measure Identification: End Devices
AUTHORIZED CONFIGURATION
ACCESS CONTROL
Selectively restrict physical and logical access to end
devices based on needs
Each component should have a known,
good configuration.
CHANGE DETECTION
Monitor end device activity for any changes
that occur
INVENTORY
Develop and maintain a comprehensive listing of all
system end devices
10Proprietary
Security Measure Identification: Control System
FLOW CONTROL
WHITELISTING
A strong form of access control denies access by
default unless on the “whitelist.”
Manage data flow between system devices
at an efficient pace
SECURITY HARDENING
Build control system software and
hardware security from the ground up
ACCESS CONTROL
Restrict system access to only authorized operators
and devices
11Proprietary
Prioritized Security Implementation
05 HOST BASED PROTECTIONS
04 RAPID RECOVERY03 RISK-BASED PRIORITIZATION
06 MONITOR & TEST
02 TECHNICAL SECURITY
01 PLAN OF ACTION
!
12
Not all security postures are created equal
Legacy Security Paradigm
Intrusion
Detection
Whitelisting Authentication Encryption Soft/Hardware
Hardening
Defense in Depth Security Paradigm
Firewall
 Jim.Dodenhoff@iperc.com
 M310-936-9456
www.IPERC.com
IPERC Contact: Jim Dodenhoff
Regional Business Development
Director

More Related Content

What's hot

Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber SecurityJAZEEL K T
 
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityCybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityLeonardo ENERGY
 
Smart Grid Security - Attack & Defense
Smart Grid Security - Attack & Defense Smart Grid Security - Attack & Defense
Smart Grid Security - Attack & Defense NESslides
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of buildingCharles "Chuck" Speicher Jr.
 
Cyber security in Smart grid system
Cyber security in Smart grid systemCyber security in Smart grid system
Cyber security in Smart grid systemamaljose949563
 
Practical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart gridsPractical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart gridsSergey Gordeychik
 
Analytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber securityAnalytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber securityBoston Global Forum
 
The Future of Cybersecurity in Energy Sector
 The Future of Cybersecurity in Energy Sector The Future of Cybersecurity in Energy Sector
The Future of Cybersecurity in Energy Sectoracinfotec
 
Internet of Things Security - Trust in the supply chain
Internet of Things Security  - Trust in the supply chainInternet of Things Security  - Trust in the supply chain
Internet of Things Security - Trust in the supply chainDuncan Purves
 
Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1EnergySec
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramEnergySec
 
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...EnergySec
 
S4 krotofil morning_sesh_2017
S4 krotofil morning_sesh_2017S4 krotofil morning_sesh_2017
S4 krotofil morning_sesh_2017Marina Krotofil
 
Industrial IOT and Security
Industrial IOT and SecurityIndustrial IOT and Security
Industrial IOT and SecurityKapil Sabharwal
 
Smart grid chinedu opara(m00560830)
Smart grid   chinedu opara(m00560830)Smart grid   chinedu opara(m00560830)
Smart grid chinedu opara(m00560830)Chinedu Opara
 
The Not So Smart Grid
The Not So Smart GridThe Not So Smart Grid
The Not So Smart Gridgueste0b5fe
 
Dressing up the ICS Kill Chain
Dressing up the ICS Kill ChainDressing up the ICS Kill Chain
Dressing up the ICS Kill ChainDragos, Inc.
 

What's hot (19)

Cyber security for smart grid
Cyber security for smart grid Cyber security for smart grid
Cyber security for smart grid
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
 
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityCybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
 
Smart Grid Security - Attack & Defense
Smart Grid Security - Attack & Defense Smart Grid Security - Attack & Defense
Smart Grid Security - Attack & Defense
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of building
 
Cyber security in Smart grid system
Cyber security in Smart grid systemCyber security in Smart grid system
Cyber security in Smart grid system
 
Practical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart gridsPractical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart grids
 
Analytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber securityAnalytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber security
 
The Future of Cybersecurity in Energy Sector
 The Future of Cybersecurity in Energy Sector The Future of Cybersecurity in Energy Sector
The Future of Cybersecurity in Energy Sector
 
Agile fractal grid 7-11-14
Agile fractal grid   7-11-14Agile fractal grid   7-11-14
Agile fractal grid 7-11-14
 
Internet of Things Security - Trust in the supply chain
Internet of Things Security  - Trust in the supply chainInternet of Things Security  - Trust in the supply chain
Internet of Things Security - Trust in the supply chain
 
Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure Program
 
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
 
S4 krotofil morning_sesh_2017
S4 krotofil morning_sesh_2017S4 krotofil morning_sesh_2017
S4 krotofil morning_sesh_2017
 
Industrial IOT and Security
Industrial IOT and SecurityIndustrial IOT and Security
Industrial IOT and Security
 
Smart grid chinedu opara(m00560830)
Smart grid   chinedu opara(m00560830)Smart grid   chinedu opara(m00560830)
Smart grid chinedu opara(m00560830)
 
The Not So Smart Grid
The Not So Smart GridThe Not So Smart Grid
The Not So Smart Grid
 
Dressing up the ICS Kill Chain
Dressing up the ICS Kill ChainDressing up the ICS Kill Chain
Dressing up the ICS Kill Chain
 

Similar to The art of securing microgrid control systems

Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilitiesNirmal Thaliyil
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Shakeel Ali
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonPatricia M Watson
 
Defending against industrial malware
Defending against industrial malwareDefending against industrial malware
Defending against industrial malwareAyed Al Qartah
 
Securing Industrial Control System
Securing Industrial Control SystemSecuring Industrial Control System
Securing Industrial Control SystemHemanth M
 
Industrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.pptIndustrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.pptDelforChacnCornejo
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Networks
 
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...Schneider Electric
 
Computer security aspects in
Computer security aspects inComputer security aspects in
Computer security aspects inVishnu Suresh
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Mukesh Chinta
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence SystemJoseph Yosi Margalit
 
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)Ivan Carmona
 
Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327vimal Kumar Gupta
 
SGSB Webcast 2 : Smart grid and data security
SGSB Webcast 2 : Smart grid and data securitySGSB Webcast 2 : Smart grid and data security
SGSB Webcast 2 : Smart grid and data securityAndy Bochman
 
I Own Your Building (Management System)
I Own Your Building (Management System)I Own Your Building (Management System)
I Own Your Building (Management System)Zero Science Lab
 
2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital SecurityShawn Wells
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxkarlhennesey
 

Similar to The art of securing microgrid control systems (20)

Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
Defending against industrial malware
Defending against industrial malwareDefending against industrial malware
Defending against industrial malware
 
Securing Industrial Control System
Securing Industrial Control SystemSecuring Industrial Control System
Securing Industrial Control System
 
10. industrial networks safety and security tom hammond
10. industrial networks safety and security   tom hammond10. industrial networks safety and security   tom hammond
10. industrial networks safety and security tom hammond
 
Industrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.pptIndustrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.ppt
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
 
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
 
Computer security aspects in
Computer security aspects inComputer security aspects in
Computer security aspects in
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence System
 
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)
 
Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327
 
Industrial networks safety & security - e+h june 2018 ben murphy
Industrial networks safety & security - e+h june 2018   ben murphyIndustrial networks safety & security - e+h june 2018   ben murphy
Industrial networks safety & security - e+h june 2018 ben murphy
 
SGSB Webcast 2 : Smart grid and data security
SGSB Webcast 2 : Smart grid and data securitySGSB Webcast 2 : Smart grid and data security
SGSB Webcast 2 : Smart grid and data security
 
Utilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA NetworksUtilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA Networks
 
I Own Your Building (Management System)
I Own Your Building (Management System)I Own Your Building (Management System)
I Own Your Building (Management System)
 
2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 

More from Jim Dodenhoff

A new world wildfires -2021111 for posting
A new world wildfires -2021111 for postingA new world wildfires -2021111 for posting
A new world wildfires -2021111 for postingJim Dodenhoff
 
Wastewater Treatment Plants: Enhancing the Water-Energy Nexus at the Most Cri...
Wastewater Treatment Plants: Enhancing the Water-Energy Nexus at the Most Cri...Wastewater Treatment Plants: Enhancing the Water-Energy Nexus at the Most Cri...
Wastewater Treatment Plants: Enhancing the Water-Energy Nexus at the Most Cri...Jim Dodenhoff
 
How Changes to Time of Use (TOU) Rates are Impacting Commercial & Industrial ...
How Changes to Time of Use (TOU) Rates are Impacting Commercial & Industrial ...How Changes to Time of Use (TOU) Rates are Impacting Commercial & Industrial ...
How Changes to Time of Use (TOU) Rates are Impacting Commercial & Industrial ...Jim Dodenhoff
 
Terrestrial Microgrid Control
Terrestrial Microgrid ControlTerrestrial Microgrid Control
Terrestrial Microgrid ControlJim Dodenhoff
 
A Guide to Resiliency
A Guide to ResiliencyA Guide to Resiliency
A Guide to ResiliencyJim Dodenhoff
 
Microgrid Autonomous Control
Microgrid Autonomous ControlMicrogrid Autonomous Control
Microgrid Autonomous ControlJim Dodenhoff
 
Utility Microgrids: Why robust control solutions are critical to advanced mic...
Utility Microgrids: Why robust control solutions are critical to advanced mic...Utility Microgrids: Why robust control solutions are critical to advanced mic...
Utility Microgrids: Why robust control solutions are critical to advanced mic...Jim Dodenhoff
 
Integrating Cybersecure Microgrids Improves Energy Resiliency for the U.S. Mi...
Integrating Cybersecure Microgrids Improves Energy Resiliency for the U.S. Mi...Integrating Cybersecure Microgrids Improves Energy Resiliency for the U.S. Mi...
Integrating Cybersecure Microgrids Improves Energy Resiliency for the U.S. Mi...Jim Dodenhoff
 
Integrating Renewable Energy and Cybersecurity to Improve Energy Resiliency
Integrating Renewable Energy and Cybersecurity to Improve Energy ResiliencyIntegrating Renewable Energy and Cybersecurity to Improve Energy Resiliency
Integrating Renewable Energy and Cybersecurity to Improve Energy ResiliencyJim Dodenhoff
 
Water system optimization an energy efficiency view final presentation
Water system optimization an energy efficiency view final presentationWater system optimization an energy efficiency view final presentation
Water system optimization an energy efficiency view final presentationJim Dodenhoff
 
2017 wwtp presentation y20170524 final linkedinnonotes
2017 wwtp presentation y20170524 final linkedinnonotes2017 wwtp presentation y20170524 final linkedinnonotes
2017 wwtp presentation y20170524 final linkedinnonotesJim Dodenhoff
 
052115 final nlm jd water energy goggles 2015 emc final
052115 final nlm jd water energy goggles 2015 emc final052115 final nlm jd water energy goggles 2015 emc final
052115 final nlm jd water energy goggles 2015 emc finalJim Dodenhoff
 
Distributed Control and Intelligence for Electric Grids
Distributed Control and Intelligence for Electric GridsDistributed Control and Intelligence for Electric Grids
Distributed Control and Intelligence for Electric GridsJim Dodenhoff
 
2017 wwtp presentation y20170524 final linkedinnonotes
2017 wwtp presentation y20170524 final linkedinnonotes2017 wwtp presentation y20170524 final linkedinnonotes
2017 wwtp presentation y20170524 final linkedinnonotesJim Dodenhoff
 
2017 clean energy presentation dodenhoff y20170608 linked in nonotes
2017 clean energy presentation dodenhoff y20170608 linked in nonotes2017 clean energy presentation dodenhoff y20170608 linked in nonotes
2017 clean energy presentation dodenhoff y20170608 linked in nonotesJim Dodenhoff
 

More from Jim Dodenhoff (15)

A new world wildfires -2021111 for posting
A new world wildfires -2021111 for postingA new world wildfires -2021111 for posting
A new world wildfires -2021111 for posting
 
Wastewater Treatment Plants: Enhancing the Water-Energy Nexus at the Most Cri...
Wastewater Treatment Plants: Enhancing the Water-Energy Nexus at the Most Cri...Wastewater Treatment Plants: Enhancing the Water-Energy Nexus at the Most Cri...
Wastewater Treatment Plants: Enhancing the Water-Energy Nexus at the Most Cri...
 
How Changes to Time of Use (TOU) Rates are Impacting Commercial & Industrial ...
How Changes to Time of Use (TOU) Rates are Impacting Commercial & Industrial ...How Changes to Time of Use (TOU) Rates are Impacting Commercial & Industrial ...
How Changes to Time of Use (TOU) Rates are Impacting Commercial & Industrial ...
 
Terrestrial Microgrid Control
Terrestrial Microgrid ControlTerrestrial Microgrid Control
Terrestrial Microgrid Control
 
A Guide to Resiliency
A Guide to ResiliencyA Guide to Resiliency
A Guide to Resiliency
 
Microgrid Autonomous Control
Microgrid Autonomous ControlMicrogrid Autonomous Control
Microgrid Autonomous Control
 
Utility Microgrids: Why robust control solutions are critical to advanced mic...
Utility Microgrids: Why robust control solutions are critical to advanced mic...Utility Microgrids: Why robust control solutions are critical to advanced mic...
Utility Microgrids: Why robust control solutions are critical to advanced mic...
 
Integrating Cybersecure Microgrids Improves Energy Resiliency for the U.S. Mi...
Integrating Cybersecure Microgrids Improves Energy Resiliency for the U.S. Mi...Integrating Cybersecure Microgrids Improves Energy Resiliency for the U.S. Mi...
Integrating Cybersecure Microgrids Improves Energy Resiliency for the U.S. Mi...
 
Integrating Renewable Energy and Cybersecurity to Improve Energy Resiliency
Integrating Renewable Energy and Cybersecurity to Improve Energy ResiliencyIntegrating Renewable Energy and Cybersecurity to Improve Energy Resiliency
Integrating Renewable Energy and Cybersecurity to Improve Energy Resiliency
 
Water system optimization an energy efficiency view final presentation
Water system optimization an energy efficiency view final presentationWater system optimization an energy efficiency view final presentation
Water system optimization an energy efficiency view final presentation
 
2017 wwtp presentation y20170524 final linkedinnonotes
2017 wwtp presentation y20170524 final linkedinnonotes2017 wwtp presentation y20170524 final linkedinnonotes
2017 wwtp presentation y20170524 final linkedinnonotes
 
052115 final nlm jd water energy goggles 2015 emc final
052115 final nlm jd water energy goggles 2015 emc final052115 final nlm jd water energy goggles 2015 emc final
052115 final nlm jd water energy goggles 2015 emc final
 
Distributed Control and Intelligence for Electric Grids
Distributed Control and Intelligence for Electric GridsDistributed Control and Intelligence for Electric Grids
Distributed Control and Intelligence for Electric Grids
 
2017 wwtp presentation y20170524 final linkedinnonotes
2017 wwtp presentation y20170524 final linkedinnonotes2017 wwtp presentation y20170524 final linkedinnonotes
2017 wwtp presentation y20170524 final linkedinnonotes
 
2017 clean energy presentation dodenhoff y20170608 linked in nonotes
2017 clean energy presentation dodenhoff y20170608 linked in nonotes2017 clean energy presentation dodenhoff y20170608 linked in nonotes
2017 clean energy presentation dodenhoff y20170608 linked in nonotes
 

Recently uploaded

Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 

Recently uploaded (20)

Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 

The art of securing microgrid control systems

  • 1. ADVANCING THE POWER OF ENERGY The Art of Securing Microgrid Control Systems Presented at the Energy, Utility, and Environment Conference, March 6, 2018, San Diego, CA Jim Dodenhoff, Regional Director of Business Development Intelligent Power & Energy Research Corporation (IPERC)
  • 2. 50 Utility security professionals that have reported at least one security breach 70% of total 2016 ICS-CERT ICS cyber incidents targeted the Energy sector 20% Cyber Attacks Go Beyond International Cyberwarfare and they Go Beyond Data Breaches
  • 4. 4 Overly Complex Security Protocols Result in Fragile Systems COMPLEXITY ≠ RESILIENCY Augmentation of cybersecurity solutions adds devices and applications that can malfunction and cause system degradation or cascading failures. KNOW YOUR SYSTEM’S NEEDS Understand the components and interfaces of your system and assess the risks at hand before selecting security measures. ≠ →
  • 5. 5 The Art of Securing a Microgrid Control System Initial Threat Analysis Security Measure Identification Prioritized Security Implementation 01 02 03
  • 6. 6Proprietary Initial Threat Analysis: Develop System Configuration Baseline LEGACY EQUIPMENT INTERCONNECTIONS Review all interconnections including ports, protocols, services, and end-device connections Consider the impact of legacy assets and potential bandwidth constraints SECURITY POLICIES Examine which security procedures are applicable and reduce the most risk COMPONENT INVENTORY Detailed system inventory with an overarching layered, port-level diagram
  • 7. 7Proprietary Initial Threat Analysis: Examine Potential Attack Vectors & High Risk Points PHYSICAL SECURITY FRAGILITY Identify where there could be single points of failure and threats to missions Ensure locked enclosures and controlled access points CRITICAL SECURITY Review security checklists for critical open items such as ICS standards, and DoD and vendor checklists CONNECTIONS Examine connections to external networks, pivot points, and remote access !
  • 8. 8Proprietary Security Measure Identification: Network Based Measures MONITORING ENTERPRISE CONSIDERATIONS Identify where there could be single points of failure and threats to mission dependencies Enable monitoring and alert tools to notify system operators SIMPLIFICATION Reduce system fragility by selecting the right security measures for your microgrid SEGMENTATION Physically and logically separate computer networks to isolate network threats
  • 9. 9Proprietary Security Measure Identification: End Devices AUTHORIZED CONFIGURATION ACCESS CONTROL Selectively restrict physical and logical access to end devices based on needs Each component should have a known, good configuration. CHANGE DETECTION Monitor end device activity for any changes that occur INVENTORY Develop and maintain a comprehensive listing of all system end devices
  • 10. 10Proprietary Security Measure Identification: Control System FLOW CONTROL WHITELISTING A strong form of access control denies access by default unless on the “whitelist.” Manage data flow between system devices at an efficient pace SECURITY HARDENING Build control system software and hardware security from the ground up ACCESS CONTROL Restrict system access to only authorized operators and devices
  • 11. 11Proprietary Prioritized Security Implementation 05 HOST BASED PROTECTIONS 04 RAPID RECOVERY03 RISK-BASED PRIORITIZATION 06 MONITOR & TEST 02 TECHNICAL SECURITY 01 PLAN OF ACTION !
  • 12. 12 Not all security postures are created equal Legacy Security Paradigm Intrusion Detection Whitelisting Authentication Encryption Soft/Hardware Hardening Defense in Depth Security Paradigm Firewall
  • 13.  Jim.Dodenhoff@iperc.com  M310-936-9456 www.IPERC.com IPERC Contact: Jim Dodenhoff Regional Business Development Director