Careers & Certifications

09:10 AM
Connect Directly
RSS
E-Mail
50%
50%

NitroSecurity, Encari Partner On NERC CIP

Security vendor NitroSecurity and electric utilities consulting specialists Encari are collaborating to launch a package of industry-specific products and services to help utilities achieve compliance with the North American Energy Reliability Corporation Critical Infrastructure Protection (NERC CIP) cyber security standards, mandated by the Federal Energy Regulatory Commission (FERC). NitroSecurity has announced NitroView CIP, a version of its suite NitroView products, centering on its Enterpri

Security vendor NitroSecurity and electric utilities consulting specialists Encari are collaborating to launch a package of industry-specific products and services to help utilities achieve compliance with the North American Energy Reliability Corporation Critical Infrastructure Protection (NERC CIP) cyber security standards, mandated by the Federal Energy Regulatory Commission (FERC). NitroSecurity has announced NitroView CIP, a version of its suite NitroView products, centering on its Enterprise Security Manager (ESM) SIEM, plus database monitoring, application data monitoring, log management and network intrusion prevention. Nitro partnered with Encari to leverage its expertise in developing the NERC-centric product versions.

"We are not compliance experts, we are technology experts.' They [Encari] are compliance experts," said Eric Knapp, Nitro VP of technology marketing. "Compliance without the technology to remediate compliance gaps can be difficult; information technology equipment without overarching compliance guidelines to be implemented properly is lacking."

Electric utilities are supposed to be in "audit compliance" with NERC CIP's eight requirements by June:

  1. Identification and documentation of the critical cyber assets.
  2. Minimum security management controls to protect critical cyber assets.
  3. An appropriate level of personnel risk assessment, training, and security awareness.
  4. Identification and protection of the electronic security perimeter(s) inside which all critical cyber assets reside, as well as all access points on the perimeter.
  5. A physical security program for the protection of critical cyber assets.
  6. Defined methods, processes, and procedures for securing those systems determined to be critical cyber assets.
  7. Identification, classification, response, and reporting of cyber security incidents.
  8. Recovery plans for critical cyber assets

The industry has been under close scrutiny for years, with intense congressional criticism resulting in mandatory, audited security controls, overriding industry claims that it could police itself. Although there has been no evidence of a deliberate attempt to disrupt the North American power grid, there have been incidents that raised alarms:
  • A remote, simulated attack that brought down a diesel electrical generator.
  • A highly critical GAO report on the state of security at the Tennessee Valley Authority.
  • A Wall Street Journal report that Russian and Chinese attackers had planted malware within the U.S. power grid.
  • NERC CSO Michael Assante told Congress that the industry is concerned about "the potential for an intelligent attacker to exploit a common vulnerability that impacts many assets at once, and from a distance."
Much of the concern comes from the gradual introduction of standard IP networks and operation systems to tie into control systems, such as supervisory control and data acquisition (SCADA) systems and distributed control systems (DCS). "The biggest concerns in utility and CI environments, such as electric, are out in the field where the power distribution and management occur," said Jennifer Jabbusch, network security specialist for Cary, N.C.-based Carolina Advanced Digital. "Those areas are not only the most accessible and vulnerable to basic attack; they're also the point at which the most damage can be inflicted."

NitroSecurity says NitroView CIP goes beyond compliance reporting packs--for HIPAA, SOX, PCI DSS, GLBA etc--typically included with SIEM, log management and other security/compliance products. The vendor claims that monitoring devices are customized to understand SCADA protocols, applications and processes, both within and outside what the NERC requirements refer to as the electronic security perimeter (ESP). "Utilities are concerned whether products have a valid interpretation of compliance requirements," said Steve Hamburg, Encari co-founder, "or has this been somewhat of an academic exercise so that the nuances associated with compliance requirements are not ingrained within the product functionality."

The NitroSecurity product includes a five-day services consulting engagement with Encari, in which the consulting firm develops an initial "SIEM compliance roadmap." After that, the utility can decide whether or not to engage Encari for additional services. "It gives the customer an understanding of 'here's where you stand today in terms of implementation, deployment and configuration," Hamburg said, "and here's where you need to be in terms of being in full compliance in terms of SIEM requirements.'" There's evidence that utility security managers, with backgrounds steeped in dealing with direct threats to proprietary control systems and often lag behind in dealing with threats to contemporary IT networks.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Slideshows
Cartoon
Audio Interviews
Archived Audio Interviews
Jeremy Schulman, founder of Schprockits, a network automation startup operating in stealth mode, joins us to explore whether networking professionals all need to learn programming in order to remain employed.
White Papers
Register for Network Computing Newsletters
Current Issue
Video
Twitter Feed