- Ensure that all cyber assets are properly identified and that all substation cyber systems are properly categorized as high, medium, or low impact.
- Inspect all physical security perimeters periodically to ensure that no unidentified physical access points exist.
- Ensure that backup and recovery procedures are updated in a timely manner and that all remediation plans and steps taken to mitigate vulnerabilities are documented; and
- Consider evaluating the security controls implemented by third parties regularly, and implement additional controls where needed when using a third party to manage cyber system information.
In its 2020 Report on CIP Reliability Audits, the Federal Energy Regulatory Commission (FERC) found that most of the cybersecurity protection processes and procedures adopted by utilities met the mandatory CIP requirements for protecting the Bulk Electric System (BES). However, there are lessons learned and guidance for improvements that can better facilitate efforts to improve power system security.
Trc’s Clients Are Encouraged to Read the Report in Its Entirety
Several of the Lessons Learned are simply “good housekeeping” or industry-standard cybersecurity practices – above and beyond the requirements of NERC CIP compliance, but strongly recommended by Infosec practitioners.
However, our experts have noted that Lessons Learned 3, 5, 9, and 11 in particular are areas where utilities may benefit from independent review and perspective in order to improve security.
The report includes references to lessons learned from prior annual reports going back to 2017.
- Ensure that all BES Cyber Assets are properly identified.
- Ensure that all substation BES Cyber Systems are properly categorized as high, medium, or low impact.
- Ensure that electronic access to BES Cyber System Information (BCSI) is properly authorized and revoked.
- Consider having a dedicated visitor log at each Physical Security Perimeter (PSP) access point.
- Consider locking BES Cyber Systems’ server racks where possible.
- Inspect all Physical Security Perimeters (PSPs) periodically to ensure that no unidentified physical access points exist.
- Review security patch management processes periodically and ensure that they are implemented properly.
- Consider consolidating and centralizing password change procedures and documentation.
- Ensure that backup and recovery procedures are updated in a timely manner.
- Ensure that all remediation plans and steps taken to mitigate vulnerabilities are documented.
- Ensure that all procedures for tracking the reuse and disposal of substation assets are reviewed and updated regularly.
- Consider evaluating the security controls implemented by third parties regularly and implement additional controls where needed when using a third party to manage BES Cyber System Information (BCSI).