• be_ixf; php_sdk; php_sdk_1.4.11
  • 33 ms
  • iy_2023; im_12; id_05; ih_09; imh_34; i_epoch:1.70179766181E+12
  • ixf-compiler; ixf-compiler_1.0.0.0
  • py_2018; pm_11; pd_14; ph_12; pmh_14; p_epoch:1.54222645072E+12
  • link-block; link-block_link-block; bodystr
  • pn_tstr:Wed Nov 14 12:14:10 PST 2018; pn_epoch:1.54222645072E+12
  • 0 ms
  • be_ixf; php_sdk; php_sdk_1.4.11
  • https://www.naes.com/news/cyber-security-myths-exposed/
  • https://www.naes.com/news/cyber-security-myths-exposed/
Skip to content
NAES
  • Twitter
  • LinkedIn
  • Services
    • Power Services
    • Compliance & Fleet Services
      • Engineering
      • E3 Consulting
      • O&M Services
      • Regulatory Compliance Services
      • Maximo Services
      • Field Engineering and Research
    • Fabrication, Maintenance, & Construction
    • Staffing Services
  • About Us
    • Subsidiaries
    • Leadership
  • Communications
    • News
    • Case Studies
    • Press Releases
  • Careers
  • Contact
    • Contact a Location
    • NAES Login Center
Solar Panels

In the News

Home Communications In the News Cyber Security Myths Exposed

6.19.2018

Cyber Security Myths Exposed

By Allen Kent, NERC CIP Specialist, NAES Corporation

Fear is a strong motivator for most people – which is why it gets used a lot in security presentations.  “The sky is falling!” cried Chicken Little. Sometimes the sky really is falling, and sometimes there is just a preface to, or potential for, an attack. Here are a few cyber security myths that are commonly found in the power sector – exposed once and for all!

“We don’t have anything that an attacker would want” or “Nobody would want to attack us.”

NAES NERC Cyber Security Myths Exposed article imageIn cyber security, any device with a connection to a network – the Internet, for example – can be used to attack others. For this reason and many others, it’s important to secure your systems. Imagine leaving your loaded firearm lying around. Are you responsible if someone picks it up and accidentally or intentionally uses it to hurt others? Likely yes! But under today’s interpretation of cyber security, you are often not held accountable for improperly securing your system, even if it allows an attacker to use it against others. However, security negligence will likely not be the norm for long as the legal and/or regulatory landscape continues to evolve. Businesses are already being held accountable when they lose the confidentiality of their hosted customer or asset data. Consider the recent NERC Notice of Penalty (accompanied by a $2.7 million fine) that was served to a Western entity that hadn’t taken sufficient measures to protect its data from being mishandled by a third-party vendor.

“If I’m compliant with the standards, then I’m doing enough to ensure security.”

Businesses need to be profitable if they intend to stay in business. The return on investment for additional security controls may be difficult to measure, but the cost of failing to properly secure cyber systems is growing. Management should analyze the risk of potential exploitation and determine the tolerance that their businesses can accept, but this analysis will continue to change as the threats evolve. In the power sector, we are outmatched by our adversaries. Other nations are targeting our sector – as a form of warfare – to find weaknesses that can be exploited. These are professional attackers who are being paid to find ways into your networks. While the CIP Standards serve as good baseline protections, merely checking the box on these security regulations is not enough to combat the threats; more is needed. What we call ‘eggshell security’ – strong on the perimeter (i.e., CIP-003 low impact controls) but soft on the inside – is not effective security.

“Our firewall protects us.”

A firewall is generally required if you are connecting a computer to the Internet, but it certainly does not serve to stop all cyber-attacks. Typically, certain communication is allowed in (e.g., to your email or web servers) and some communication is allowed out (e.g., web access from your desktops). However, both of these examples create holes in the firewall’s protection that can be exploited by a cyber attacker to gain access, as does any software vulnerability in the firewall itself.

Most organizations therefore need to consider more protections. What can you do to prepare? At a minimum, meet all applicable current and upcoming NERC CIP compliance requirements, especially your firewalls review. In addition, work with your management to add an annual budget item for incremental increases in cyber security that go beyond these minimum requirements. Your best first addition would be a Security Information and Event Management (SIEM) solution, which can help detect when someone has gained or is attempting to gain unauthorized access to your systems. All in all, understanding the reality of these common cyber security myths will help you better prepare for the day when the sky actually is falling.

Join the Conversation

  • Twitter
  • LinkedIn
NAES

© Copyright 2023 NAES. All rights reserved.

  • Privacy Policy
  • Terms of Use
  • Do Not Sell My Personal Information

Website design by Jordan Crown

  • Services
    • Power Services
    • Compliance & Fleet Services
      • Engineering
      • E3 Consulting
      • O&M Services
      • Regulatory Compliance Services
      • Maximo Services
      • Field Engineering and Research
    • Fabrication, Maintenance, & Construction
    • Staffing Services
  • About Us
    • Subsidiaries
    • Leadership
  • Communications
    • News
    • Case Studies
    • Press Releases
  • Careers
  • Contact
    • Contact a Location
    • NAES Login Center

‹ › ×
    Manage Cookie Consent
    We use cookies to optimize our website and our service.
    Functional cookies Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage vendors Read more about these purposes
    View preferences
    {title} {title} {title}
    CAISO Generator Modeling Process and Data Requirements

    Don’t wait until the last minute. You should allow time for at least one iteration with CAISO so that you are complete and deemed compliant before your deadline.

    On August 1, 2018, CAISO introduced a revised Business Practice Manual for Transmission Planning Process (BPM), which includes new data requirements for interconnected generation resources within the ISO’s footprint. Section 10 of the BPM establishes revised data requirements and compliance procedures for all participating generators including non-NERC registered entities. While additional requirements have been placed on larger NERC registered facilities, these changes may pose an even greater burden to entities that have been exempt from NERC mandated modeling and protection requirements.

    New data requirements include voltage and frequency protection models, power flow models, and in some cases, sub-synchronous resonance models. These models must be verified using criteria listed in the BPM, which can only be performed by entities with modeling software and knowledge of modeling practices.

    NAES is prepared to assist entities with data aggregation, modeling, and testing to ensure compliance with CAISO’s data requests. The following links will allow entities to determine when to expect their individual data requests (phase) and what data will be required (category).

    Business Practice Manual (BPM)

    Entity Category and Phase Listing

    CAISO Transmission Planning Website

    TPL-007

    TPL-007 establishes planning criteria for induced currents caused by geomagnetic disturbances. The standard is applicable to facilities using transformer(s) with a high side, wye grounded winding operated above 200 kV and can require both submittal of general geomagnetic data (R2) and thermal impact assessments (R6) depending on results of Planning Coordinator analysis.

    VOLTAGE AND REACTIVE (VAR) STANDARDS

    VAR-501-WECC

    VAR-501-WECC requires applicable entities within the WECC region to confirm performance settings and characteristics of Power System Stabilizers (PSS). NAES provides physical testing and reporting services to address WECC’s specific PSS requirements.

    PERSONNEL PERFORMANCE, TRAINING AND QUALIFICATIONS

    PER-006

    PER-006 requires Generator Operators to provide training to personnel who are responsible for the Real-time control of a generator. NAES has developed specific protection system training materials suitable for compliance with the Standard and provides this training both on and off site

    PROTECTION AND CONTROL (PRC) STANDARDS

    PRC-001

    PRC-001 requires entities to coordinate protection system changes with other affected parties. NAES offers both procedural documentation and engineering services to establish the required coordination for both PRC-001 and PRC-027.

    PRC-002

    PRC-002 requires the installation and operation of disturbance monitoring equipment (DME) for applicable entities. NAES can assist with the design and installation of DME as well as ongoing compliance support.

    PRC-019

    PRC-019 requires applicable entities to show coordination between voltage regulating controls, limiters, equipment capabilities, and protection settings. NAES produces PRC-019 specific coordination studies for both traditional generators and renewable projects to establish compliance with the Standard.

    PRC-023

    PRC-023 requires load responsive protective relays be set according to criteria within the Standard to ensure settings do not limit transmission loadability. NAES provides full engineering analyses to maintain compliance with this Standard.

    PRC-024

    PRC-024 requires applicable entities to ensure generator protective relays do not trip within predefined frequency and voltage limits. NAES can complete protection settings analyses and provide compliance documentation that clearly identifies protection settings as they relate to NERC’s “no trip” zones.

    PRC-025

    PRC-025 establishes minimum settings requirements for load-responsive relays protecting generators, step up transformers, and auxiliary transformers. NAES utilizes predefined calculation options as well as simulations to determine a facility’s compliance status and development of new relay settings if required.

    PRC-026

    PRC-026 requires applicable entities to perform load responsive relay settings analyses based on criteria identified within the Standard. Entities are typically notified by the Planning Coordinator when an analysis is required. NAES performs all required studies to establish compliance.

    MODELING, DATA, AND ANALYSIS (MOD) STANDARDS

    MOD-025

    MOD-025 requires Real and Reactive Power capability testing for individual generating units over 20 MVA or facilities with over 75 MVA of generation capacity. NAES offers site specific test procedures and/or complete onsite testing services to meet the requirements of this standard.

    MOD-026

    MOD-026 requires verification of excitation or volt/var control dynamic models through utilization of either system disturbances or physical testing. NAES offers full testing and modeling services to meet the requirements of this standard.

    MOD-027

    MOD-027 requires verification of governor or active power/frequency control dynamic models through utilization of either system disturbances or physical testing. NAES offers full testing and modeling services to meet the requirements of this standard.