{"id":2149,"date":"2021-01-04T06:16:50","date_gmt":"2021-01-04T06:16:50","guid":{"rendered":"http:\/\/72.52.228.46\/~itegriti\/?p=2149"},"modified":"2021-04-12T05:12:33","modified_gmt":"2021-04-12T05:12:33","slug":"quarterly-roundup-of-key-nerc-security-updates-q4-2020","status":"publish","type":"post","link":"https:\/\/itegriti.com\/staging\/2021\/compliance\/quarterly-roundup-of-key-nerc-security-updates-q4-2020\/","title":{"rendered":"Quarterly Roundup of Key NERC Security Updates \u2013 Q4 2020"},"content":{"rendered":"<p>[fusion_builder_container hundred_percent=&#8221;no&#8221; hundred_percent_height=&#8221;no&#8221; hundred_percent_height_scroll=&#8221;no&#8221; hundred_percent_height_center_content=&#8221;yes&#8221; equal_height_columns=&#8221;no&#8221; hide_on_mobile=&#8221;small-visibility,medium-visibility,large-visibility&#8221; status=&#8221;published&#8221; background_position=&#8221;center center&#8221; background_repeat=&#8221;no-repeat&#8221; fade=&#8221;no&#8221; background_parallax=&#8221;none&#8221; enable_mobile=&#8221;no&#8221; parallax_speed=&#8221;0.3&#8243; video_aspect_ratio=&#8221;16:9&#8243; video_loop=&#8221;yes&#8221; video_mute=&#8221;yes&#8221; border_style=&#8221;solid&#8221; type=&#8221;legacy&#8221; admin_toggled=&#8221;no&#8221;][fusion_builder_row][fusion_builder_column type=&#8221;1_1&#8243; layout=&#8221;1_1&#8243; spacing=&#8221;&#8221; center_content=&#8221;no&#8221; link=&#8221;&#8221; target=&#8221;_self&#8221; min_height=&#8221;&#8221; hide_on_mobile=&#8221;small-visibility,medium-visibility,large-visibility&#8221; class=&#8221;&#8221; id=&#8221;&#8221; background_color=&#8221;&#8221; background_image=&#8221;&#8221; background_image_id=&#8221;&#8221; background_position=&#8221;left top&#8221; background_repeat=&#8221;no-repeat&#8221; hover_type=&#8221;none&#8221; border_color=&#8221;&#8221; border_style=&#8221;solid&#8221; border_position=&#8221;all&#8221; border_radius=&#8221;&#8221; box_shadow=&#8221;no&#8221; dimension_box_shadow=&#8221;&#8221; box_shadow_blur=&#8221;0&#8243; box_shadow_spread=&#8221;0&#8243; box_shadow_color=&#8221;&#8221; box_shadow_style=&#8221;&#8221; padding_top=&#8221;&#8221; padding_right=&#8221;&#8221; padding_bottom=&#8221;&#8221; padding_left=&#8221;&#8221; margin_top=&#8221;&#8221; margin_bottom=&#8221;&#8221; animation_type=&#8221;&#8221; animation_direction=&#8221;left&#8221; animation_speed=&#8221;0.3&#8243; animation_offset=&#8221;&#8221; last=&#8221;true&#8221; border_sizes_top=&#8221;0&#8243; border_sizes_bottom=&#8221;0&#8243; border_sizes_left=&#8221;0&#8243; border_sizes_right=&#8221;0&#8243; first=&#8221;true&#8221;][fusion_text columns=&#8221;&#8221; column_min_width=&#8221;&#8221; column_spacing=&#8221;&#8221; rule_style=&#8221;default&#8221; rule_size=&#8221;&#8221; rule_color=&#8221;&#8221; content_alignment_medium=&#8221;&#8221; content_alignment_small=&#8221;&#8221; content_alignment=&#8221;&#8221; hide_on_mobile=&#8221;small-visibility,medium-visibility,large-visibility&#8221; sticky_display=&#8221;normal,sticky&#8221; class=&#8221;&#8221; id=&#8221;&#8221; font_size=&#8221;&#8221; fusion_font_family_text_font=&#8221;&#8221; fusion_font_variant_text_font=&#8221;&#8221; line_height=&#8221;&#8221; letter_spacing=&#8221;&#8221; text_color=&#8221;&#8221; animation_type=&#8221;&#8221; animation_direction=&#8221;left&#8221; animation_speed=&#8221;0.3&#8243; animation_offset=&#8221;&#8221;]<\/p>\n<p>Every week, the North American Electric Reliability Corporation (NERC) releases a \u201c<a href=\"https:\/\/www.nerc.com\/pa\/comp\/news\/Pages\/default.aspx\">Standards, Compliance and Enforcement\u201d bulletin<\/a>. These documents contain important information with regard to <a href=\"https:\/\/www.nerc.com\/pa\/Stand\/Pages\/ReliabilityStandards.aspx\">NERC\u2019s Reliability Standards<\/a>. That includes the <a href=\"https:\/\/www.nerc.com\/pa\/Stand\/Pages\/CIPStandards.aspx\">Critical Infrastructure Protection<\/a> (CIP), a suite of measures designed to help organizations secure their bulk assets and thereby support the operability of North America\u2019s bulk electric system.<\/p>\n<p>It\u2019s imperative that organizations keep up with these bulletins so that they might modify their compliance efforts accordingly. Towards that end, here is a roundup of the key security updates, including news surrounding CIP, that NERC made over the course of Q4 2020.<\/p>\n<p>[fusion_table fusion_table_type=&#8221;1&#8243; fusion_table_rows=&#8221;&#8221; fusion_table_columns=&#8221;&#8221; hide_on_mobile=&#8221;small-visibility,medium-visibility,large-visibility&#8221; class=&#8221;&#8221; id=&#8221;&#8221; animation_type=&#8221;&#8221; animation_direction=&#8221;left&#8221; animation_speed=&#8221;0.3&#8243; animation_offset=&#8221;&#8221;]<\/p>\n<div class=\"table-1\">\n<table width=\"100%\">\n<thead>\n<tr>\n<td colspan=\"1\" align=\"center\" bgcolor=\"#002868\"><strong><span style=\"color: #ffffff;\">Date of Bulletin<\/span><\/strong><\/td>\n<td colspan=\"1\" align=\"center\" bgcolor=\"#002868\"><strong><span style=\"color: #ffffff;\">Overview of Update<\/span><\/strong><\/td>\n<td colspan=\"1\" align=\"center\" bgcolor=\"#002868\"><strong><span style=\"color: #ffffff;\">Description of Update<\/span><\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td align=\"left\">8\/31\/20<\/td>\n<td align=\"left\">Comment period open for \u201cSupply Chain Procurement Language\u201d draft security guideline<\/td>\n<td align=\"left\">The Reliability and Security Technical Committee Executive Committee reviewed the initial draft of the <a href=\"https:\/\/www.nerc.com\/comm\/CIPC_Security_Guidelines_DL\/Procurement_Language_FINAL_20200728.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Supply Chain Procurement Language guideline<\/a>. This document provides resources that electric organizations can use to formalize risk mitigation practices when procuring a solution from a vendor and to thereby harden the security of their supply chain. Subsequently, the Committee approved to post this document for industry comment.<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">9\/21\/20<\/td>\n<td align=\"left\">FERC and NERC outline cyber incident response and recovery best practices<\/td>\n<td align=\"left\">Staff of NERC and the Federal Energy Regulatory Commission interviewed subject matter experts from eight electric utilities of varying size and function. Subsequently, they used those insights to release a report on the commonalities of organizations\u2019 Incident Response and Recovery (IRR) plans. The full announcement is available <a href=\"https:\/\/www.nerc.com\/news\/Headlines%20DL\/FERC_NERC_Cypres%20News%20Release%20FINAL.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">9\/21\/20<\/td>\n<td align=\"left\">Series of webinars released on the topic of managing cyber security supply chain risk<\/td>\n<td align=\"left\">The Supply Chain Working Group (SCWG), part of the Reliability and Security Technical Committee (RSTC), released a series of webinars that explore how to manage cyber security supply chain risk. The topics of these webinars are as follows: <a href=\"https:\/\/vimeopro.com\/nerclearning\/supply-chain-working-group\/video\/455970601\" target=\"_blank\" rel=\"noopener noreferrer\">Cyber Security Risk Management Lifecycle<\/a>, <a href=\"https:\/\/vimeopro.com\/nerclearning\/supply-chain-working-group\/video\/454562908\" target=\"_blank\" rel=\"noopener noreferrer\">Provenance<\/a>, <a href=\"https:\/\/vimeopro.com\/nerclearning\/supply-chain-working-group\/video\/399784126\" target=\"_blank\" rel=\"noopener noreferrer\">Risk Consideration for Open-Source Software<\/a>, <a href=\"https:\/\/vimeopro.com\/nerclearning\/supply-chain-working-group\/video\/454581169\" target=\"_blank\" rel=\"noopener noreferrer\">Risks Related to Cloud Service Providers<\/a>, <a href=\"https:\/\/vimeopro.com\/nerclearning\/supply-chain-working-group\/video\/452360839\" target=\"_blank\" rel=\"noopener noreferrer\">Secure Equipment Delivery<\/a>, <a href=\"https:\/\/vimeopro.com\/nerclearning\/supply-chain-working-group\/video\/452259885\" target=\"_blank\" rel=\"noopener noreferrer\">Vendor Incident Response<\/a>, <a href=\"https:\/\/vimeopro.com\/nerclearning\/supply-chain-working-group\/video\/453692351\" target=\"_blank\" rel=\"noopener noreferrer\">Vendor Risk Management Lifecycle<\/a> and <a href=\"https:\/\/vimeopro.com\/nerclearning\/supply-chain-working-group\/video\/453811208\" target=\"_blank\" rel=\"noopener noreferrer\">Procurement Language (DRAFT)<\/a>.<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">9\/21\/20<\/td>\n<td align=\"left\">FERC takes action during September open meeting<\/td>\n<td align=\"left\">During its monthly open meeting, FERC released a <a href=\"https:\/\/www.ferc.gov\/sites\/default\/files\/2020-09\/09-2020-E-2.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">notice of inquiry (NOI)<\/a> seeking comment on potential security risks to the Bulk Electric System posed by the use of foreign-manufactured equipment and software. FERC went on to seek comment around strategies that organizations could use to minimize those digital security risks.<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">9\/28\/20<\/td>\n<td align=\"left\">Three standards take effect<\/td>\n<td align=\"left\">On October 1, 2020, three standards took effect: <a href=\"http:\/\/www.nerc.com\/pa\/Stand\/Reliability%20Standards\/CIP-005-6.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">CIP-005-6<\/a>, which helps organizations to manage electronic access to BES Cyber Systems by specifying a controlled Electronic Security Perimeter; <a href=\"http:\/\/www.nerc.com\/pa\/Stand\/Reliability%20Standards\/CIP-010-3.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">CIP-010-3<\/a>, which specifies configuration change management and vulnerability assessment requirements in support of protecting BES Cyber Systems; and <a href=\"http:\/\/www.nerc.com\/pa\/Stand\/Reliability%20Standards\/CIP-013-1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">CIP-013-1<\/a>, which involves the implementation of security controls for supply chain risk management of BES Cyber Systems.<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">10\/05\/20<\/td>\n<td align=\"left\">Joint webinar announced<\/td>\n<td align=\"left\">The North American Transmission Forum (NATF), Reliability First and the SERC Reliability Corporation announced a joint <a href=\"https:\/\/natf.webex.com\/natf\/onstage\/g.php?MTID=e769fafd00ddc82fab60cd39f8223120c\" target=\"_blank\" rel=\"noopener noreferrer\">webinar<\/a> entitled \u201cIdentifying and Managing Potential Compromise of Network Interface Cards.\u201d The webinar explored how organizations could reduce risk introduced by the supply chain.<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">10\/05\/20<\/td>\n<td align=\"left\">Second compliance filing submitted to FERC by NERC<\/td>\n<td align=\"left\">At the end of September 2020, NERC submitted the second <a href=\"https:\/\/www.nerc.com\/FilingsOrders\/us\/NERC%20Filings%20to%20FERC%20DL\/Second%20Compliance%20Filing%20on%20Five-Year%20Order.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">compliance filing<\/a> for FERC\u2019s five-year performance review order. The filing included updates about NERC\u2019s Infrastructure Security Program and addressed the directive to discuss how the Electricity Information Sharing and Analysis Center (E-ISAC) uses its <a href=\"https:\/\/www.eisac.com\/resources\/bulletins\" target=\"_blank\" rel=\"noopener noreferrer\">All Points Bulletins<\/a> to increase industry awareness of security threats.<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">11\/09\/20<\/td>\n<td align=\"left\">Reliability Standard audit worksheet posted<\/td>\n<td align=\"left\">NERC announced that it had posted a new Reliability Standard Audit Worksheet (RSAW) for CIP-008-6 \u2013 Cyber Security \u2013 Incident Reporting and Response Planning on its <a href=\"http:\/\/www.nerc.com\/pa\/comp\/Pages\/Reliability-Standard-Audit-Worksheets-(RSAWs).aspx\" target=\"_blank\" rel=\"noopener noreferrer\">RSAW page<\/a>. To learn more about CIP-008-6 before it becomes effective on January 1, 2021, click <a href=\"http:\/\/72.52.228.46\/~itegriti\/2020\/blog\/the-ultimate-implementation-guide-for-nerc-cip-008-6\/\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">12\/07\/20<\/td>\n<td align=\"left\">Reporting mechanisms for CIP-008-6 released<\/td>\n<td align=\"left\">NERC specified that NERC-registered entities must comply with CIP-008-6 by submitting reports to E-ISAC via one of five communication channels. The organization went on to explain how entities within the United States must also report those incidents to the U.S. Department of Homeland Security Cybersecurity and Infrastructure Agency (DHS CISA).<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">12\/07\/20<\/td>\n<td align=\"left\">E-ISAC expands cybersecurity program<\/td>\n<td align=\"left\">In partnership with the Department of Energy (DOE), E-ISAC <a href=\"https:\/\/www.nerc.com\/news\/Headlines%20DL\/CRISP%2030NOV20.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">expanded its Cybersecurity Risk Information Sharing Program<\/a> (CRISP) to include two operational technology pilots. The purpose of these pilots was to capture operational technology data and compare it to CRISP information technology data for the purpose of identifying potential digital threats to entities\u2019 industrial processes.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>[\/fusion_table]<\/p>\n<p>Check back next quarter for another roundup of security-related updates. In the meantime, you can review NERC\u2019s full list of bulletins <a href=\"https:\/\/www.nerc.com\/pa\/comp\/news\/Pages\/default.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n<p>[\/fusion_text][\/fusion_builder_column][\/fusion_builder_row][\/fusion_builder_container]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here is a roundup of the key security updates, including news surrounding CIP, that NERC made over the course of Q4 2020.<\/p>\n","protected":false},"author":12,"featured_media":2158,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2179],"tags":[],"_links":{"self":[{"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/posts\/2149"}],"collection":[{"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/comments?post=2149"}],"version-history":[{"count":8,"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/posts\/2149\/revisions"}],"predecessor-version":[{"id":2159,"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/posts\/2149\/revisions\/2159"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/media\/2158"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/media?parent=2149"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/categories?post=2149"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/tags?post=2149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}