NitroSecurity, Encari Partner On NERC CIP

Security vendor NitroSecurity and electric utilities consulting specialists Encari are collaborating to launch a package of industry-specific products and services to help utilities achieve compliance with the North American Energy Reliability Corporation Critical Infrastructure Protection (NERC CIP) cyber security standards, mandated by the Federal Energy Regulatory Commission (FERC). NitroSecurity has announced NitroView CIP, a version of its suite NitroView products, centering on its Enterpri

May 25, 2010

4 Min Read
Network Computing logo

Security vendor NitroSecurity and electric utilities consulting specialists Encari are collaborating to launch a package of industry-specific products and services to help utilities achieve compliance with the North American Energy Reliability Corporation Critical Infrastructure Protection (NERC CIP) cyber security standards, mandated by the Federal Energy Regulatory Commission (FERC). NitroSecurity has announced NitroView CIP, a version of its suite NitroView products, centering on its Enterprise Security Manager (ESM) SIEM, plus database monitoring, application data monitoring, log management and network intrusion prevention. Nitro partnered with Encari to leverage its expertise in developing the NERC-centric product versions.

"We are not compliance experts, we are technology experts.' They [Encari] are compliance experts," said Eric Knapp, Nitro VP of technology marketing. "Compliance without the technology to remediate compliance gaps can be difficult; information technology equipment without overarching compliance guidelines to be implemented properly is lacking."

Electric utilities are supposed to be in "audit compliance" with NERC CIP's eight requirements by June:

  1. Identification and documentation of the critical cyber assets.

  2. Minimum security management controls to protect critical cyber assets.

  3. An appropriate level of personnel risk assessment, training, and security awareness.

  4. Identification and protection of the electronic security perimeter(s) inside which all critical cyber assets reside, as well as all access points on the perimeter.

  5. A physical security program for the protection of critical cyber assets.

  6. Defined methods, processes, and procedures for securing those systems determined to be critical cyber assets.

  7. Identification, classification, response, and reporting of cyber security incidents.

  8. Recovery plans for critical cyber assets


The industry has been under close scrutiny for years, with intense congressional criticism resulting in mandatory, audited security controls, overriding industry claims that it could police itself. Although there has been no evidence of a deliberate attempt to disrupt the North American power grid, there have been incidents that raised alarms:

  • A remote, simulated attack that brought down a diesel electrical generator.

  • A highly critical GAO report on the state of security at the Tennessee Valley Authority.

  • A Wall Street Journal report that Russian and Chinese attackers had planted malware within the U.S. power grid.

  • NERC CSO Michael Assante told Congress that the industry is concerned about "the potential for an intelligent attacker to exploit a common vulnerability that impacts many assets at once, and from a distance."

Much of the concern comes from the gradual introduction of standard IP networks and operation systems to tie into control systems, such as supervisory control and data acquisition (SCADA) systems and distributed control systems (DCS). "The biggest concerns in utility and CI environments, such as electric, are out in the field where the power distribution and management occur," said Jennifer Jabbusch, network security specialist for Cary, N.C.-based Carolina Advanced Digital. "Those areas are not only the most accessible and vulnerable to basic attack; they're also the point at which the most damage can be inflicted."

NitroSecurity says NitroView CIP goes beyond compliance reporting packs--for HIPAA, SOX, PCI DSS, GLBA etc--typically included with SIEM, log management and other security/compliance products. The vendor claims that monitoring devices are customized to understand SCADA protocols, applications and processes, both within and outside what the NERC requirements refer to as the electronic security perimeter (ESP). "Utilities are concerned whether products have a valid interpretation of compliance requirements," said Steve Hamburg, Encari co-founder, "or has this been somewhat of an academic exercise so that the nuances associated with compliance requirements are not ingrained within the product functionality."

The NitroSecurity product includes a five-day services consulting engagement with Encari, in which the consulting firm develops an initial "SIEM compliance roadmap." After that, the utility can decide whether or not to engage Encari for additional services. "It gives the customer an understanding of 'here's where you stand today in terms of implementation, deployment and configuration," Hamburg said, "and here's where you need to be in terms of being in full compliance in terms of SIEM requirements.'" There's evidence that utility security managers, with backgrounds steeped in dealing with direct threats to proprietary control systems and often lag behind in dealing with threats to contemporary IT networks."My experience has been that the attitude toward IT security in these organization is many degrees off from what we would consider the norm, and a lot of that comes from the legacy of utilities and their telecom managers," said Jabbusch. "Most of the managers of these systems simply don't realize the very real threats they're facing now against these critical infrastructure systems."

Base pricing for NitroView CIP is $75,000, including two redundant SIEM and log management appliances and five days of Encari services.

SUBSCRIBE TO OUR NEWSLETTER
Stay informed! Sign up to get expert advice and insight delivered direct to your inbox
More Insights