22 September 2011
Protection of Critical Cyber Assets
[Federal Register Volume 76, Number 184 (Thursday, September 22, 2011)]
[Proposed Rules]
[Pages 58730-58741]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2011-24102]
[[Page 58730]]
=======================================================================
-----------------------------------------------------------------------
DEPARTMENT OF ENERGY
Federal Energy Regulatory Commission
18 CFR Part 40
[Docket No. RM11-11-000]
Version 4 Critical Infrastructure Protection Reliability
Standards
AGENCY: Federal Energy Regulatory Commission.
ACTION:
-----------------------------------------------------------------------N
otice of proposed rulemaking.
SUMMARY: Under section 215 of the Federal Power Act, the Federal Energy
Regulatory Commission (Commission) proposes to approve eight modified
Critical Infrastructure Protection (CIP) Reliability Standards, CIP-
002-4 through CIP-009-4, developed and submitted to the Commission for
approval by the North American Electric Reliability Corporation (NERC),
the Electric Reliability Organization certified by the Commission. In
general, the CIP Reliability Standards provide a cybersecurity
framework for the identification and protection of ``Critical Cyber
Assets'' to support the reliable operation of the Bulk-Power System.
Proposed Reliability Standard CIP-002-4 requires the identification and
documentation of Critical Cyber Assets associated with Critical Assets
that support the reliable operation of the Bulk-Power System. The
``Version 4'' CIP Reliability Standards propose to modify CIP-002-4 to
include ``bright line'' criteria for the identification of Critical
Assets. The proposed Version 4 CIP Reliability Standards would replace
the currently effective Version 3 CIP Reliability Standards. The
Commission also proposes to approve the related Violation Risk Factors
and Violation Severity Levels with modifications, the implementation
plan, and effective date proposed by NERC.
DATES: Comments are due November 21, 2011.
ADDRESSES: You may submit comments, identified by docket number and in
accordance with the requirements posted on the Commission's Web site
http://www.ferc.gov. Comments may be submitted by any of the following
methods:
Agency Web Site: Documents created electronically using
word processing software should be filed in native applications or
print-to-PDF format and not in a scanned format, at
http://www.ferc.gov/docs-filing/efiling.asp.
Mail/Hand Delivery: Commenters unable to file comments
electronically must mail or hand deliver an original copy of their
comments to: Federal Energy Regulatory Commission, Secretary of the
Commission, 888 First Street, NE., Washington, DC 20426. These
requirements can be found on the Commission's Web site, see, e.g., the
``Quick Reference Guide for Paper Submissions,'' available at
http://www.ferc.gov/docs-filing/efiling.asp or via phone from FERC Online
Support at 202-502-6652 or toll-free at 1-866-208-3676.
FOR FURTHER INFORMATION CONTACT:
Jan Bargen (Technical Information), Office of Electric Reliability,
Division of Logistics and Security, Federal Energy Regulatory
Commission, 888 First Street, NE., Washington, DC 20426, (202) 502-
6333.
Edward Franks (Technical Information), Office of Electric Reliability,
Division of Logistics and Security, Federal Energy Regulatory
Commission, 888 First Street, NE., Washington, DC 20426, (202) 502-
6311.
Kevin Ryan (Legal Information), Office of the General Counsel, Federal
Energy Regulatory Commission, 888 First Street, NE., Washington, DC
20426, (202) 502-6840.
Matthew Vlissides (Legal Information), Office of the General Counsel,
Federal Energy Regulatory Commission, 888 First Street, NE.,
Washington, DC 20426, (202) 502-8408.
SUPPLEMENTARY INFORMATION:
September 15, 2011.
1. Under section 215 of the Federal Power Act (FPA),\1\ the
Commission proposes to approve eight modified Critical Infrastructure
Protection (CIP) Reliability Standards, CIP-002-4 through CIP-009-4.
The proposed ``Version 4'' CIP Standards were developed and submitted
for approval to the Commission by the North American Electric
Reliability Corporation (NERC), which the Commission certified as the
Electric Reliability Organization (ERO) responsible for developing and
enforcing mandatory Reliability Standards.\2\ In general, the CIP
Reliability Standards provide a cybersecurity framework for the
identification and protection of ``Critical Cyber Assets'' to support
the reliable operation of the Bulk-Power System.\3\ In particular, the
Version 4 CIP Reliability Standards propose to modify CIP-002-4 to
include ``bright line'' criteria for the identification of Critical
Assets, in lieu of the currently-required risk-based assessment
methodology that is developed and applied by applicable entities. In
addition, NERC developed proposed conforming modifications to the
remaining cybersecurity Reliability Standards, CIP-003-4 through CIP-
009-4.
---------------------------------------------------------------------------
\1\ 16 U.S.C. 824o (2006).
\2\ North American Electric Reliability Corp., 116 FERC ]
61,062, order on reh'g & compliance, 117 FERC ] 61,126 (2006), aff'd
sub nom. Alcoa, Inc. v. FERC, 564 F.3d 1342 (D.C. Cir. 2009).
\3\ The NERC Glossary of Terms defines Critical Assets to mean
``Facilities, systems, and equipment which, if destroyed, degraded,
or otherwise rendered unavailable, would affect the reliability or
operability of the Bulk Electric System.''
---------------------------------------------------------------------------
2. The Commission proposes to approve Version 4, the Violation Risk
Factors (VRFs),the Violation Severity Levels (VSLs) with modifications,
the implementation plan, and effective date proposed by NERC. The
Commission also proposes to approve the retirement of the currently
effective Version 3 CIP Reliability Standards, CIP-002-3 to CIP-009-3.
The Commission seeks comments on these proposals to approve.
3. While we propose to approve the Version 4 CIP Standards, like
NERC, we recognize that the Version 4 CIP Standards represent an
``interim step'' \4\ to addressing all of the outstanding directives
set forth in Order No. 706.\5\ We believe that the electric industry,
through the NERC standards development process, should continue to
develop an approach to cybersecurity that is meaningful and
comprehensive to assure that the nation's electric grid is capable of
withstanding a Cybersecurity Incident.\6\ Below, we reiterate several
topics set forth in Order No. 706 that pertain to a tiered approach to
identifying Cyber Assets, protection from misuse, and a regional
perspective. We expect NERC will continue to improve the CIP Standards
to address these and other outstanding matters addressed in Order No.
706.
---------------------------------------------------------------------------
\4\ NERC Petition at 6.
\5\ Mandatory Reliability Standards for Critical Infrastructure
Protection, Order No. 706, 122 FERC ] 61,040, order on reh'g, Order
No. 706-A, 123 FERC ] 61,174 (2008), order on clarification, Order
No. 706-B, 126 FERC ] 61,229 (2009).
\6\ Section 215(a) of the FPA defines Cybersecurity Incident as
``a malicious act or suspicious event that disrupts, or was an
attempt to disrupt, the operation of those programmable electronic
devices and communication networks including hardware, software and
data that are essential to the reliable operation of the Bulk-Power
System.''
---------------------------------------------------------------------------
4. Moreover, as discussed below, the Commission seeks comments from
NERC and other interested persons on establishing a reasonable deadline
for NERC to satisfy the outstanding directives in Order No. 706
pertaining to the CIP Standards, using NERC's development timeline.
[[Page 58731]]
I. Background
A. Mandatory Reliability Standards
5. Section 215 of the FPA requires a Commission-certified ERO to
develop mandatory and enforceable Reliability Standards, which are
subject to Commission review and approval. Once approved, the
Reliability Standards may be enforced by the ERO, subject to Commission
oversight, or by the Commission independently.\7\
---------------------------------------------------------------------------
\7\ See 16 U.S.C. 824o(e).
---------------------------------------------------------------------------
6. Pursuant to section 215 of the FPA, the Commission established a
process to select and certify an ERO \8\ and, subsequently, certified
NERC as the ERO.\9\ On January 18, 2008, the Commission issued Order
No. 706 approving eight CIP Reliability Standards proposed by NERC.
---------------------------------------------------------------------------
\8\ Rules Concerning Certification of the Electric Reliability
Organization; and Procedures for the Establishment, Approval and
Enforcement of Electric Reliability Standards, Order No. 672, FERC
Stats. & Regs. ] 31,204, order on reh'g, Order No. 672-A, FERC
Stats. & Regs. ] 31,212 (2006).
\9\ North American Electric Reliability Corp., 116 FERC ]
61,062, order on reh'g & compliance, 117 FERC ] 61,126 (2006), aff'd
sub nom., Alcoa, Inc. v. FERC, 564 F.3d 1342 (DC Cir. 2009).
---------------------------------------------------------------------------
7. In addition, pursuant to section 215(d)(5) of the FPA,\10\ the
Commission directed NERC to develop modifications to the CIP
Reliability Standards to address various concerns discussed in the
Final Rule. In relevant part, the Commission directed the ERO to
address the following issues regarding CIP-002-1: (1) Need for ERO
guidance regarding the risk-based assessment methodology for
identifying Critical Assets; (2) scope of Critical Assets and Critical
Cyber Assets; (3) internal, management, approval of the risk-based
assessment; (4) external review of Critical Assets identification; and
(5) interdependency between Critical Assets of the Bulk-Power System
and other critical infrastructures. Subsequently, the Commission
approved Version 2 and Version 3 of the CIP Reliability Standards, each
version including changes responsive to some but not all of the
directives in Order No. 706.\11\
---------------------------------------------------------------------------
\10\ 16 U.S.C. 824o(d)(5).
\11\ North American Electric Reliability Corp., 128 FERC ]
61,291 (2009), order denying reh'g and granting clarification, 129
FERC ] 61,236 (2009) (approving Version 2 of the CIP Reliability
Standards); North American Electric Reliability Corp., 130 FERC ]
61,271 (2010) (approving Version 3 of the CIP Reliability
Standards).
---------------------------------------------------------------------------
B. Current Version 3 CIP Reliability Standards
8. Reliability Standard CIP-002-3 addresses the identification of
Critical Assets and associated Critical Cyber Assets. Pursuant to CIP-
002-3, a responsible entity must develop a risk-based assessment
methodology to identify its Critical Assets. Requirement R1 specifies
certain types of assets that an assessment must consider for Critical
Asset status and also allows the consideration of additional assets
that the responsible entity deems appropriate. Requirement R2 requires
the responsible entity to develop a list of Critical Assets based on an
annual application of the risk-based assessment methodology developed
pursuant to Requirement R1. Requirement R3 provides that the
responsible entity must use the list of Critical Assets to develop a
list of associated Critical Cyber Assets that are essential to the
operation of the Critical Assets.
9. In addition, the Commission approved the following ``Version 3''
CIP Standards:
CIP-003-3 (Security Management Controls);
CIP-004-3 (Personnel & Training);
CIP-005-3 (Electronic Security Perimeter(s));
CIP-006-3 (Physical Security of Critical Cyber Assets);
CIP-007-3 (Systems Security Management);
CIP-008-3 (Incident Reporting and Response Planning);
CIP-009-3 (Recovery Plans for Critical Cyber Assets).
II. Proposed Version 4 CIP Reliability Standards
A. NERC Petition
10. On February 10, 2011, NERC filed a petition seeking Commission
approval of proposed Reliability Standards CIP-002-4 to CIP-009-4 and
requesting the concurrent retirement of the currently effective Version
3 CIP Reliability Standards, CIP-002-3 to CIP-009-3.\12\ The principal
differences are found in CIP-002, where NERC replaced the risk-based
assessment methodology for identifying Critical Assets with 17 uniform
bright line criteria for identifying Critical Assets. NERC does not
propose any changes to the process of identifying the associated
Critical Cyber Assets that are then subject to the cyber security
protections required by CIP-003 through CIP-009. NERC also submitted
proposed VRFs and VSLs and an implementation plan governing the
transition to Version 4. NERC proposed that the Version 4 CIP
Reliability Standards become effective the first day of the eighth
calendar quarter after applicable regulatory approvals have been
received.
---------------------------------------------------------------------------
\12\ NERC Petition at 1. The proposed Reliability Standards are
not attached to the NOPR. They are, however, available on the
Commission's eLibrary document retrieval system in Docket No. RM11-
11-000 and are available on the ERO's Web site, http://www.nerc.com.
Reliability Standards approved by the Commission are
not codified in the CFR.
---------------------------------------------------------------------------
11. On April 12, 2011, NERC made an errata filing correcting
certain errors in the petition and furnishing corrected exhibits and
the standard drafting team minutes. In the errata, NERC also replaced
the VRFs and VSLs in the February 10 petition with new proposed VRFs
and VSLs.\13\
---------------------------------------------------------------------------
\13\ NERC states that the Version 4 VRFs and VSLs are carried
over in part from the VRFs and VSLs in the Version 3 CIP Reliability
Standards. NERC Petition at 46. The Commission approved the Version
2 and 3 VRFs and VSLs in Docket Nos. RD10-6-001 and RD09-7-003 on
January 20, 2011 but required NERC to make modifications in a
compliance filing due by March 21, 2011. North American Electric
Reliability Corporation, 134 FERC ] 61,045 (2011). The February 10
petition did not carry over the modified Version 3 VRFs and VSLs
since it was filed before the March 21 compliance filing. NERC
submitted new Version 4 VRFs and VSLs that carried over the modified
Version 3 VRFs and VSLs in the April 12 errata. On June 6, 2011,
NERC filed the March 21, 2011 compliance filing in the present
docket, Docket No. RM11-11-000.
---------------------------------------------------------------------------
12. In its Petition, NERC states that the Version 4 CIP Standards
satisfy the Commission's criteria, set forth in Order No. 672, for
determining whether a proposed Reliability Standard is just,
reasonable, not unduly discriminatory or preferential and in the public
interest.\14\ According to NERC, CIP-002-4 achieves a specified
reliability goal by requiring the identification and documentation of
Critical Cyber Assets associated with Critical Assets that support the
reliable operation of the Bulk-Power System. NERC opines that the
Reliability Standard ``improves reliability by establishing uniform
criteria across all Responsible Entities for the identification of
Critical Assets.'' \15\ Further, NERC states that CIP-002-4 contains a
technically sound method to achieve its reliability goal by requiring
the identification and documentation of Critical Assets through the
application of the criteria set forth in Attachment 1 of CIP-002-4.
---------------------------------------------------------------------------
\14\ Order No. 672, FERC Stats. & Regs. ] 31,204 at P 323-337.
\15\ NERC Petition at 4.
---------------------------------------------------------------------------
13. NERC states that CIP-002-4 establishes clear and uniform
criteria for identifying Critical Assets on the Bulk-Power System.\16\
NERC also states that CIP-002-4 does not reflect any differentiation in
requirements based on size of the responsible entity. NERC asserts that
CIP-002-4 will not have negative effects on competition or restriction
of the grid. NERC also contends that the two-year implementation period
for CIP-002-4 is reasonable given the time it will take responsible
entities to determine
[[Page 58732]]
whether assets meet the criteria included in Attachment 1 and to
implement the controls required in CIP-003-4 through CIP-009-4 for the
newly identified assets.
---------------------------------------------------------------------------
\16\ Id. at 38.
---------------------------------------------------------------------------
14. Finally, NERC acknowledges that CIP-002-4 addresses some, but
not all, of the Commission's directives in Order No. 706. NERC explains
that the standard drafting team limited the scope of requirements in
the development of CIP Version 4 ``as an interim step'' limited to the
concerns raised by the Commission regarding CIP-002.\17\ NERC states
that it has taken a ``phased'' approach to meeting the Commission's
directives from Order No. 706 and, according to NERC, the standard
drafting team continues to address the remaining Commission directives.
According to NERC, the team will build on the bright line approach of
CIP Version 4.\18\
---------------------------------------------------------------------------
\17\ NERC Petition at 6 (citing Order No. 706, 122 FERC ] 61,040
at P 236).
\18\ NERC Petition at 6.
---------------------------------------------------------------------------
B. Proposed Reliability Standard CIP-002-4
15. Proposed Reliability Standard CIP-002-4 contains 3
requirements. Requirement R1, which pertains to the identification of
Critical Assets, provides:
The Responsible Entity shall develop a list of its identified
Critical Assets determined through an annual application of the
criteria contained in CIP-002-4 Attachment 1--Critical Asset
Criteria. The Responsible Entity shall update this list as
necessary, and review it at least annually.
Attachment 1 provides seventeen criteria to be used by all responsible
entities for the identification of Critical Assets pursuant to
Requirement R1. The thresholds pertain to specific types of facilities
such as generating units, transmission lines and control centers. For
example, Criterion 1.1 provides ``[e]ach group of generating units
(including nuclear generation) at a single plant location with an
aggregate highest rated net Real Power capability of the preceding 12
months equal to or exceeding 1500 MW in a single Interconnection.''
With regard to transmission, Criterion 1.6 provides ``Transmission
Facilities operated at 500 kV or higher,'' and Criterion 1.7 provides
``Transmission Facilities operated at 300 kV or higher at stations or
substations interconnected at 300 kV or higher with three or more other
transmission stations or substations.''
16. Reliability Standard CIP-002-4, Requirement R2 requires
responsible entities to develop a list of Critical Cyber Assets
associated with the Critical Assets identified pursuant to Requirement
R1. As in previous versions, the Requirement further states that to
qualify as a Critical Cyber Asset, the Cyber Asset must: (1) Use a
routable protocol to communicate outside the Electronic Security
Perimeter; (2) use a routable protocol within a control center; or (3)
be dial-up accessible. In the proposed version, in the context of
generating units at a single plant location, the Requirement limits the
designation of Critical Cyber Assets only to Cyber Assets shared by a
combination of generating units whose compromise could within 15
minutes result in the loss of generation capability equal to or higher
than 1500 MW.
17. Requirement R3 requires that a senior manager or delegate for
each responsible entity approve annually the list of Critical Assets
and the list of Critical Cyber Assets, even if the lists contain no
elements. As mentioned above, proposed Reliability Standards CIP-003-4
to CIP-009-4 only reflect conforming changes to accord with the CIP-
002-4 Reliability Standard.
C. Additional Information Regarding Attachment 1 Criteria
18. In response to a Commission data request, NERC provided
additional information regarding the bright line criteria for
identifying Critical Assets.\19\ NERC provided some information
regarding the development of the criteria. Further, based on an
industry survey, NERC provided information regarding the estimated
number of Critical Assets and the number of Critical Assets that have
associated Critical Cyber Assets located in the United States that
would be identified pursuant to CIP-002-4. For example, NERC indicates
that the Version 4 CIP Standards would result in the identification of
532 control centers as Critical Assets with Critical Cyber Assets, and
another 21 control centers as Critical Assets without any associated
Critical Cyber Assets.\20\ Further, 201 control centers would not be
identified as Critical Assets. With regard to Blackstart Resources,
NERC's survey results indicate that CIP-002-4 would result in the
identification of approximately 234 Blackstart Resources as Critical
Assets with associated Critical Cyber Assets, 273 identified as
Critical Assets without Critical Cyber Assets, and 35 Blackstart
Resources not classified as Critical Assets.\21\
---------------------------------------------------------------------------
\19\ See April 17, 2011 Commission staff data request issued in
Docket No. RM11-11-000. NERC responded to the data request in
staggered filings, on May 27, 2011 and June 30, 2011.
\20\ NERC June 30, 2011 Data Response at 2-3.
\21\ Id. at 3-4. In the June 30, 2011 Data Response, NERC stated
that with respect to Blackstart Resources some responsible entities
indicated that they had not performed a complete analysis of their
systems based on CIP-002-4 and are unsure whether some units may be
classified as Critical Assets. Id. at 4.
---------------------------------------------------------------------------
III. Discussion
19. Pursuant to FPA section 215(d)(2), the Commission proposes to
approve CIP-002-4 to CIP-009-4 as just, reasonable, not unduly
discriminatory or preferential, and in the public interest. The
Commission proposes to approve the VRFs and VSLs, implementation plan,
and effective date proposed by NERC. The Commission also proposes to
approve the retirement of the currently effective Version 3 CIP
Reliability Standards CIP-002-3 to CIP-009-3 upon the effective date of
CIP-002-4 to CIP-009-4. The Commission seeks comments on these
proposals.
20. Further, as discussed below, the Commission seeks comments from
NERC and other interested persons on the proposal to establish a
reasonable deadline for NERC to satisfy the outstanding directives in
Order No. 706. Specifically, as explained in detail later, the
Commission requests comments on: (1) The proposal to establish a
deadline using NERC's development timeline for the next version of the
CIP Reliability Standards; (2) how much time NERC needs to develop and
file the next version of the CIP Reliability Standards; (3) other
potential approaches to Critical Cyber Asset identification; and (4)
whether the next version is anticipated to satisfy all of the
directives in Order No. 706.
A. The Commission Proposes To Approve the Version 4 CIP Reliability
Standards
21. The Commission, in giving due weight to NERC's Filing, proposes
to approve the Version 4 CIP Reliability Standards. The Commission also
proposes to approve the implementation plan and effective date proposed
by NERC. Version 4 provides a change in three respects: (1) Version 4
will result in the identification of certain types of Critical Assets
that may not be identified under the current approach; (2) Version 4
uses bright line criteria to identify Critical Assets, eliminating the
use of existing entity-defined risk-based assessment methodologies that
generally do not adequately identify Critical Assets; and (3) Version 4
provides a level of consistency and clarity regarding the
identification of Critical Assets lacking under Version 3. We
[[Page 58733]]
separately address each of these reasons for proposing to approve
Version 4 below.
1. Critical Asset Identification
22. In its Petition, NERC indicates that, after conducting reviews
of CIP-002 compliance, NERC ``determined that the existing
methodologies generally do not adequately identify all Critical
Assets.'' \22\ While recognizing that CIP version 4 is intended as an
``interim step,'' it appears that the proposed bright line criteria
will result in the identification of certain types of Critical Assets
(e.g. 500 kV substations) that may not be identified by the approach
that is currently in effect. This is reflected in NERC's June 30, 2011
data response, in which NERC presented industry survey data reflecting
the application of the bright line criteria in Version 4. To facilitate
an analysis of the data, NERC also provided observations and data from
several of its earlier industry surveys, including the 2009 ``CIP Self-
Certification Survey'' and 2010 ``CIP-002 Critical Asset Methodology
Data Request.''. For example, NERC states in the June 30, 2011 data
response that in the 2009 survey only 50 percent of substations rated
300 kV and above are classified as Critical Assets while that figure
would increase to 70 percent under Version 4.\23\
---------------------------------------------------------------------------
\22\ NERC Petition at 11.
\23\ Id. at 4.
---------------------------------------------------------------------------
23. The NERC petition indicates that 270 transmission substations
rated 500 kV and above are classified as Critical Assets under Version
3 while, according to the data response, the figure would rise to 437
under Version 4.\24\ This increase is consistent with Criterion 1.6 of
Attachment 1 to CIP-002-4, which identifies all transmission
substations rated 500 kV as Critical Assets. According to the data
response, the 25 percent of generation units rated 300 MVA and above
would be identified as Critical Assets under Version 4. Moreover, the
proportion of total Blackstart Resources classified as Critical Assets
increases due to the required 100 percent coverage of these under
Version 4.\25\ Further, the number of control centers identified as
Critical Assets increases from 425 under Version 3 to 553 under Version
4, the latter figure representing 74 percent of all control centers.
These figures represent increases in certain categories in Critical
Asset identification among generation, transmission, and control
centers. We also note that NERC's industry survey data indicates
decreases in the number of generation and blackstart resources
identified as Critical Assets with Critical Cyber Assets. While the
bright line thresholds result in the identification of a significant
number of additional generation plants rated above 1500 MVA as Critical
Assets, the thresholds also result in the identification of less
generation below 300 MVA.
---------------------------------------------------------------------------
\24\ Id. at 5.
\25\ NERC Petition at 17 (explaining that each Blackstart
Resource identified in a Transmission Operator's restoration plan is
a Critical Asset). In the June 30, 2011 Data Response, NERC's survey
found that responsible entities identified 93 percent of Blackstart
Resources as Critical Assets. NERC stated that confusion over the
term Blackstart Resource may have contributed to the lower
percentage, and that responsible entities will be educated on the
definition of Blackstart Resource prior to the effective date of
CIP-002-4. NERC June 30, 2011 Data Response at 4.
---------------------------------------------------------------------------
24. As NERC recognizes in its filing, the improvements in Critical
Asset identification under Version 4 represent an interim step in
complying with the directives in Order No. 706.\26\ As we discuss
below, Version 4 should not be viewed as an endpoint but as a step
towards eventual full compliance with Order No. 706.
2. Version 4 Removes Discretion in Identifying Critical Assets
25. The proposed Version 4 CIP Reliability Standards discards the
current risk-based methodology for identifying Critical Assets. Under
the current CIP-002-3, responsible entities are tasked with identifying
Critical Assets based on their own risk-based methodology. In the
Petition NERC points out that in Order No. 706 the Commission directed
NERC to ``provide reasonable technical support to assist entities in
determining whether their assets are critical to the Bulk-Power
System.'' \27\ NERC explains that it responded to the Commission's
direction by developing guidance documents to assist entities in
developing their risk-based methodologies and Critical Asset
identification.\28\
---------------------------------------------------------------------------
\27\ Id. at 10-11 (citing Order No. 706, 122 FERC ] 61,040 at P
255).
\28\ Id. at 11.
---------------------------------------------------------------------------
26. In its Petition, NERC states that it ``conducted various
reviews of risk-based methodologies developed by many entities of
varying sizes * * * and determined that the existing methodologies
generally do not adequately identify all Critical Assets.'' \29\ To
address this, NERC proposes to replace the current risk-based
methodology with uniform, bright line criteria, which will be used by
all responsible entities to identify Critical Assets.
---------------------------------------------------------------------------
\29\ Id.
---------------------------------------------------------------------------
27. While risk-based assessment methodologies have merit, we share
NERC's concerns about the existing application of the currently
effective CIP-002-3, Requirement 1. Thus, in this context, we believe
that a shift away from responsible entity-designed risk-based
methodologies for identifying Critical Assets, which NERC has found to
be inadequate, to the use of NERC-developed criteria is an improvement.
3. Version 4 Provides Consistency and Clarity in the Identification of
Critical Assets
28. In its June 30, 2011 data response, NERC states that the survey
results from 2009 generated concern ``about the apparent inconsistency
in the application of the standards across the system, as evidenced by
the apparent variation from region to region.'' \30\ NERC states that
it subsequently engaged with the Regional Entities and stakeholders to
better understand the data, with these efforts resulting in the
development of Version 4.
---------------------------------------------------------------------------
\30\ NERC June 30, 2011 Data Response at 3.
---------------------------------------------------------------------------
29. We believe that the application of uniform criteria is an
improvement over the current approach because they add greater
consistency and clarity in identifying Critical Assets. The risks posed
by cyber threats suggest a different approach than the possibly
inconsistent, inadequate methodologies for identifying Critical Assets,
as evidenced by NERC's conclusion that insufficient numbers of Critical
Assets were identified using the risk-based assessment methodology. As
an integrated system, the protection afforded for Critical Assets and
their Critical Cyber Assets is only as strong as its weakest link. In
this respect, allowing responsible entities to devise their own
methodologies for identifying Critical Assets, especially if these
methodologies prove to be weak, may compromise the Critical Assets and
Critical Cyber Assets of other responsible entities even if they have
adopted a more stringent methodology. The uniform system of Critical
Asset identification proposed by NERC in Version 4 helps to address
this weakness and places all responsible entities on an equal footing
with respect to Critical Asset identification.
30. In addition, clear, bright line criteria should make it easier
for Regional Entities, NERC and the Commission to monitor responsible
entities and evaluate how they are identifying Critical Assets. A
single set of bright line criteria, as opposed to
[[Page 58734]]
myriad entity-designed risk-based methodologies, should improve the CIP
compliance process.
31. However, under the currently-effective CIP-002-3, an entity
that applies its risk-based assessment methodology considers specific
types of assets identified in Requirement R1, as well as ``any
additional assets that support the operation of the Bulk Electric
System that the Responsible Entity deems appropriate to include in its
assessment.'' Thus, currently, a responsible entity has the flexibility
to consider any assets it deems appropriate. The Commission also notes
that there are assets currently identified as Critical Assets which
would no longer be identified as Critical Assets under the Proposed
Reliability Standard CIP-002-4 bright line criteria for Critical Asset
identification. The Commission seeks comment whether, under CIP Version
4, a responsible entity retains the flexibility to identify assets
that, although outside of the bright line criteria, are essential to
Bulk-Power System reliability. Further, we seek comment whether the ERO
and/or Regional Entities would have the ability, either in an event-
driven investigation or compliance audit, to identify specific assets
that fall outside the bright-line criteria yet are still essential to
Bulk-Power System reliability and should be subject prospectively to
compliance with the CIP Reliability. If so, on what basis should that
decision be made?
32. In addition, the Commission is cognizant of one caution that
remains concerning a binary bright line criteria protection philosophy,
i.e., either an asset satisfies the threshold and is subject to
compliance or is below the threshold and not subject to compliance (as
opposed to a tiered approach to compliance as discussed below), in
terms of applying cybersecurity protections to Cyber Assets.
Specifically, bright line criteria that limit legally-mandated
cybersecurity protections to certain classes of Bulk-Power System
assets may indicate to an adversary the types of assets that fail to
meet the threshold and, therefore, are not subject to mandatory CIP
compliance. Therefore, the Commission encourages NERC to accelerate
development of the next version of the CIP Reliability Standards and to
address the concerns discussed herein in Section B.
4. Violation Risk Factors/Violation Severity Levels
33. NERC states that the proposed VRFs and VSLs are consistent with
those approved for the Version 3 CIP Reliability Standards.\31\ NERC
explains that each requirement in Version 4 is assigned a VRF and a set
of VSLs and that these elements support the determination of an initial
value range for the base penalty amount regarding violations of
requirements in Commission-approved Reliability Standards, as defined
in the ERO Sanction Guidelines.\32\
---------------------------------------------------------------------------
\31\ North American Electric Reliability Corp., 134 FERC ]
61,045 (2011) (approving Version 2 and 3 CIP Reliability Standards
VRFs and VSLs but requiring modifications in a compliance filing).
\32\ NERC Petition at 37.
---------------------------------------------------------------------------
34. The principal changes in the proposed Version 4 VRFs and VSLs
relate to CIP-002-4. NERC proposes to carry forward the Version 3 VRFs
and VSLs for all other Requirements (in CIP-003-4 through CIP-009-4),
for which no substantive revisions are proposed. CIP-002-4 no longer
contains sub-Requirements and, instead, each of three main Requirements
has a single VRF and set of VSLs, consistent with the methodology
proposed by NERC and approved by the Commission.\33\ The VRF
designations for the three Requirements in CIP-002-4 are consistent
with those assigned to similar Requirements in previous versions of the
CIP Reliability Standards and satisfy our established guidelines.
Therefore, the Commission proposes to approve the Version 4 VRFs
proposed by NERC and incorporate appropriately the modifications
directed to prior versions.
---------------------------------------------------------------------------
\33\ North American Electric Reliability Corp., 135 FERC ]
61,166, at 8 (2011).
---------------------------------------------------------------------------
35. With regard to the proposed Version 4 VSLs for CIP-002-4, we
are concerned that the VSLs for Requirement R1 and Requirement R2,
while carrying forward the wording from corresponding Version 3 VSLs,
do not adequately address the purpose of NERC's proposed bright line
criteria: To ensure accurate and complete identification of all
Critical Assets, so that all associated Critical Cyber Assets become
subject to the protections required by the CIP Standards.
36. More importantly, neither set of VSLs address the failure to
properly identify either Critical Assets or Critical Cyber Assets in
the first place. The failure to identify a Critical Asset, whether
inadvertently or through misapplication of the bright line criteria, is
paramount because if an Asset is not identified and included on the
Critical Asset list, its associated Cyber Assets will not be considered
under Requirement R2. Failure to identify those Cyber Assets as
Critical Cyber Assets under Requirement R2 then creates the ``weakest
link'' circumstance discussed in the Commission's order establishing
two CIP VSL Guidelines for analyzing the validity of VSLs pertaining to
cyber security.\34\
---------------------------------------------------------------------------
\34\ CIP VSL Guideline 1 states, ``Requirements where a single
lapse in protection can compromise computer network security, i.e.,
the ``weakest link'' characteristic, should apply binary rather than
gradated VSLs.''
---------------------------------------------------------------------------
37. Therefore, the Commission proposes to direct the ERO to modify
the VSLs for CIP-002-4, Requirements R1 and R2, to address a failure to
identify either Critical Assets or Critical Cyber Assets, as shown in
Appendix 1.\35\ The Commission proposes to approve the Version 4 VSLs
proposed by NERC, as modified, because they would then satisfy our
established guidelines, fully address the purpose of NERC's bright line
criteria, and incorporate appropriately the modifications directed to
prior versions.
---------------------------------------------------------------------------
\35\ NERC proposes to assign a Severe VSL for a violation of
Requirement R1 if a responsible entity does not develop a list of
its identified Critical Assets ``even if such list is null.'' NERC
does not propose to assign a VSL for a violation of Requirement R1
when a responsible entity fails to identify a Critical Asset that
falls within any of the Critical Asset Criteria in Attachment 1, or
fails to include an identified Critical Asset in its Critical Asset
list. NERC further proposes to assign a Severe VSL to a responsible
entity's violation of Requirement R2 only when it fails to include
in its list of Critical Cyber Assets a Critical Cyber Asset it has
identified. NERC does not propose to assign a VSL for a violation of
Requirement R2 resulting from a responsible entity's failure to
identify as a Critical Cyber Asset a Cyber Asset that qualifies as a
Critical Cyber Asset.
---------------------------------------------------------------------------
5. Implementation Plan and Effective Date
38. NERC proposes an effective date for full compliance with the
Version 4 CIP Standards of the first day of the eighth calendar quarter
after applicable regulatory approvals have been received. In addition,
NERC provides a detailed implementation plan for newly identified
Critical Assets and newly registered entities. NERC also presents a
number of scenarios intended to explain how CIP-002-4 will be
implemented. Depending on the situation, the implementation plan
establishes timelines and milestones for entities to reach full
compliance with CIP-002-4.
39. The Commission proposes to approve the effective date and
implementation plan for CIP-002-4. Under the scenarios presented by
NERC, we understand that entities with existing CIP compliance
implementation programs will effectively no longer use CIP-002-3 to
identify Critical Assets after approval of CIP-002-4 but rather will
apply the criteria in Attachment 1 of CIP-002-4. While some responsible
entities have already installed the necessary equipment and software to
address
[[Page 58735]]
cybersecurity, we recognize that other responsible entities may need to
purchase and install new equipment and software to achieve compliance
for assets that are brought within the scope of the protections under
the CIP-002-4 bright line criteria. Based on these considerations, the
Commission believes that the implementation plan proposed by NERC sets
reasonable deadlines for industry compliance.
B. Ongoing Development Efforts To Satisfy Directives Set Forth in Order
No. 706
40. As acknowledged by NERC, the proposed Version 4 CIP Reliability
Standards do not address all of the directives set forth in Order No.
706. Although the Commission proposes to approve CIP-002-4, we
highlight the need for NERC, working through the Reliability Standards
development process, to address all outstanding Order No. 706
directives as soon as possible.
41. Below, we discuss several directives in Order No. 706 that have
yet to be satisfied and propose to give guidance regarding the next
version of the CIP Reliability Standards, such as the need to address
the NIST framework, data network connectivity, and the potential misuse
of control centers or control systems and the adoption of a regional
perspective and oversight. Our guidance is intended to more fully
ensure that all Cyber Assets serving reliability functions of the Bulk-
Power System are within scope of the CIP Reliability Standards. In
addition, as discussed below, we seek comments from NERC and other
interested persons on a proposal to establish a deadline for NERC to
submit modified CIP Reliability Standards that address the outstanding
directives set forth in Order No. 706, using NERC's development
timeline.
42. The stated purpose of Reliability Standard CIP-002 is the
accurate identification of Critical Cyber Assets. Both the currently-
effective and proposed CIP-002 Reliability Standards, along with
guidance NERC provided to industry,\36\ are structured in a staged
approach. First, an entity must identify Critical Assets. NERC defines
Critical Assets as ``facilities, systems, and equipment which, if
destroyed, degraded, or otherwise rendered unavailable, would affect
the reliability or operability of the Bulk Electric System.'' \37\
Second, based on the Critical Assets identified in the first step, an
entity must identify Cyber Assets supporting the Critical Assets. The
NERC Glossary defines Cyber Assets as ``programmable electronic devices
and communication networks including hardware, software, and data.''
\38\ Third, an entity should identify the Critical Cyber Assets by
determining, in accordance with the NERC Glossary, the ``Cyber Assets
essential to the reliable operation of the Critical Assets.'' \39\ In
Order No. 706, the Commission did not address whether or not the staged
approach outlined above was the only method for identifying Critical
Cyber Assets. Rather at that time, focus was placed on addressing
specific concerns with the first step--the identification of Critical
Assets. Recognizing CIP-002 as the cornerstone of the CIP Reliability
Standards,\40\ a failure to accurately identify Critical Assets could
greatly impact accurate Critical Cyber Asset identification and the
overall applicability of the protection measures afforded in CIP-003
through CIP-009.
---------------------------------------------------------------------------
\36\ North American Reliability Corporation Security Guideline
for the Electric Sector: ``Identifying Critical Cyber Assets''
Version 1.0, Effective June 17, 2010, at 4-5, and North American
Reliability Corporation Security Guideline for the Electric Sector:
``Identifying Critical Assets'' Version 1.0, Effective September 17,
2009.
\37\ NERC Glossary of Terms at 11.
\38\ Id.
\39\ Id.
\40\ Order No. 706, 122 FERC ] 61,040 at P 234.
---------------------------------------------------------------------------
43. In light of recent cybersecurity vulnerabilities, threats and
attacks that have exploited the interconnectivity of cyber systems,\41\
the Commission seeks comments regarding the method of identification of
Critical Cyber Assets \42\ to ensure sufficiency and accuracy. The
Commission recognizes that control systems that support Bulk-Power
System reliability are ``only as secure as their weakest links,'' and
that a single vulnerability opens the computer network and all other
networks with which it is interconnected to potential malicious
activity.\43\ Accordingly, the Commission believes that any criteria
adopted for the purposes of identifying a Critical Cyber Asset under
CIP-002 should be based upon a Cyber Asset's connectivity and its
potential to compromise the reliable operation \44\ of the Bulk-Power
System, rather than focusing on the operation of any specific Critical
Asset(s). The Commission seeks comments on this approach.
---------------------------------------------------------------------------
\41\ These include the discovery of Stuxnet, Night Dragon and
RSA breaches from advanced persistent threats in July 2010, February
2011 and March 2011 respectively, where systems were compromised.
\42\ In Order No. 706, the Commission declined to direct a
method for identifying Critical Cyber Assets, but stated that it may
revisit this circumstance in a future proceeding. See Order No. 706,
122 FERC ] 61,040 at P 284.
\43\ North American Electric Reliability Corp., 130 FERC ]
61,211, at P 15 (2010).
\44\ 16 U.S.C. 824o(a)(4). The term ``reliable operation'' means
``operating the elements of the bulk-power system within equipment
and electric system thermal, voltage, and stability limits so that
instability, uncontrolled separation, or cascading failures of such
system will not occur as a result of a sudden disturbance, including
a cybersecurity incident, or unanticipated failure of system
elements.''
---------------------------------------------------------------------------
44. Further, the Commission seeks comments on how to ensure that
the directives of Order No. 706 relative to CIP-002 with respect to the
concerns discussed below are addressed, resulting in a method that will
lead to sufficient and accurate Critical Cyber Asset identification.
45. The Commission believes that NERC should consider the following
three strategies to meet the outstanding directives and seeks comments
on these strategies. First, NERC should consider applicable features of
the NIST Risk Management Framework to ensure protection of all cyber
systems connected to the Bulk-Power System, including establishing CIP
requirements based on entity functional characteristics rather than
focusing on Critical Asset size. Second, such as in the consideration
of misuse, NERC should consider mechanisms for identifying Critical
Cyber Assets by examining all possible communication paths between a
given cyber resource and any asset supporting a reliability function.
Third, NERC should provide a method for review and approval of Critical
Cyber Asset lists from external sources such as the Regional Entities
or NERC. Each of these strategies is discussed below.
1. NIST Framework
46. In Order No. 706, the Commission directed NERC to ``monitor the
development and implementation'' of cybersecurity standards then being
developed by the National Institute of Standards and Technology
(NIST).\45\ The Commission also directed NERC to consider the
effectiveness of the NIST standards.\46\ At that time, the Commission
directed NERC to address any NIST provisions that will better protect
the Bulk-Power System in the Reliability Standards development
process.\47\ While the Commission determined not to require NERC to
adopt or incorporate elements of the NIST standards, Order No. 706 left
open the option of revisiting the NIST standards at a later time.\48\
The Commission is not here proposing to direct that NERC use elements
of the NIST standards. However, we continue
[[Page 58736]]
to believe that the NIST framework could provide beneficial input into
the NERC CIP Reliability Standards and we urge NERC to consider any
such provisions that will better protect the Bulk-Power System.
---------------------------------------------------------------------------
\45\ Order No. 706, 122 FERC ] 61,040 at P 233.
\46\ Id.
\47\ Id.
\48\ Id.
---------------------------------------------------------------------------
47. The NIST Risk Management Framework was developed to manage the
risks associated with all information systems, and offers a structured
yet flexible approach that can now be applied to the electric industry.
The NIST Risk Management Framework guides selection and specification
of cybersecurity controls and measures necessary to protect individuals
and the operations and assets of the organization, while considering
effectiveness, efficiency, and constraints due to applicable laws,
directives, policies, standards, or regulations. Each of the activities
in the Risk Management Framework has an associated NIST security
standard and/or guidance document that can be used by organizations
implementing the framework. The management of risk is a key element.
48. Two primary features of the NIST Framework are: (1) Customizing
protection to the mission of the cyber systems subject to protection
(similar to the role identified by the NERC Functional Model); and (2)
ensuring that all connected cyber systems associated with the Bulk-
Power System, based on their function, receive some level of
protection.\49\ The Bulk-Power System could benefit from each of these
tested approaches.
---------------------------------------------------------------------------
\49\ NIST SP800-53, Section 1.4, Organizational
Responsibilities.
---------------------------------------------------------------------------
a. NIST Approach and the NERC Functional Model
49. The purpose of the NERC CIP Reliability Standards is to specify
mandatory Requirements for responsible entities to establish, maintain,
and preserve the cybersecurity of key information technology systems'
assets, the use of which is essential to reliable operation of the
Bulk-Power System. The CIP Reliability Standards include Requirements
which are based upon the functional roles of the responsible entities
as specified in the NERC Functional Model.\50\ The identification of
cyber systems and assets used to execute these functional roles should
be the first step in identifying the systems for coverage under the CIP
Reliability Standards for protection. The Functional Model should be
used as a starting point when considering the applicability of the NIST
Framework for securing the operation of cyber assets to provide for the
Reliable Operation of the Bulk-Power System.
---------------------------------------------------------------------------
\50\ Reliability Functional Model, Function Definitions and
Functional Entities, Version 5, approved by NERC Board of Trustees
May 2010; and, Reliability Functional Model Technical Document
Version 5, approved by NERC Board of Trustees May 2010.
---------------------------------------------------------------------------
b. NIST Tiered Approach
50. If applied to the Bulk-Power System, the NIST Framework would
specify the level of protection appropriate for systems based upon
their importance to the reliable operation of the Bulk-Power System.
Cyber systems connected to the Bulk-Power System require availability,
integrity, and confidentiality to effectively ensure the reliability of
the Bulk-Power System.
51. The NIST Framework provides for a tiered approach to
cybersecurity protection where protection of some type would be applied
to all cyber assets connected to the Bulk-Power System. Under the NIST
Framework, cyber assets whose compromise or loss of operability could
result in a greater risk to Bulk-Power System reliability would be
subject to more rigorous cybersecurity protections compared to a less
important asset. The NIST Framework recognizes that all connected
assets require a baseline level of protection to prevent attackers from
gaining a foothold to launch further, even more devastating attacks on
other critical systems.
52. Using the NIST framework, all cyber assets would also be
reviewed to determine the appropriate level of cyber protection. The
level of protection required for a given cyber asset is based upon its
mission criticality and its innate technological risks.
2. Misuse of Control Systems
53. In Order No. 706, the Commission directed NERC to consider the
misuse of control centers and control systems in the determination of
Critical Assets.\51\ If a perpetrator is able to misuse an asset, the
attacker may navigate across and between control system data networks
in order to gain access to multiple sites, which could enable a
coordinated multi-site attack. Recent cybersecurity incidents \52\
illustrate the importance of restricting connectivity between control
systems and external networks, emphasizing the inherent risk exposure
created by networking critical cyber control systems. Future mechanisms
for identifying when cyber assets require protection will have to
examine all possible paths between a given cyber resource and any asset
supporting a reliability function.
---------------------------------------------------------------------------
\51\ Order No. 706, 122 FERC ] 61,040 at P 282.
\52\ These include the discovery of Stuxnet, Night Dragon and
RSA breaches from advanced persistent threats in July 2010, February
2011 and March 2011 respectively, where systems were compromised.
---------------------------------------------------------------------------
54. In Order No. 706, the Commission expressed concerns regarding
the classification of control centers and the potential misuse of
control systems.\53\ With regard to control centers, the Commission
noted that responsible entities should be required to ``examine the
impact on reliability if the control centers are unavailable, due for
example to power or communications failures, or denial of service
attacks.'' \54\ In addition, the Commission stated that ``[r]esponsible
entities should also examine the impact that misuse of those control
centers could have on the electric facilities they control and what the
combined impact of those electric facilities could be on the
reliability of the Bulk-Power System.'' \55\ The Commission stated that
``when these matters are taken into account, it is difficult to
envision a scenario in which a reliability coordinator, transmission
operator or transmission owner control center or backup control center
would not properly be identified as a critical asset.'' \56\
---------------------------------------------------------------------------
\53\ Order No. 706, 122 FERC ] 61,040 at P 280-281.
\54\ Id. P 280.
\55\ Id.
\56\ Id.
---------------------------------------------------------------------------
55. In addition, the Commission raised concerns about the misuse of
a control system that controls more than one asset.\57\ Specifically,
the Commission noted that multiple assets, whether multiple generating
units, multiple transmission breakers, or perhaps even multiple
substations, could be taken out of service simultaneously due to a
failure or misuse of the control system. The Commission stated that
even if one or all of the assets would not be considered as a Critical
Asset on a stand alone basis, a simultaneous outage resulting from the
single point of control might affect the reliability or operability of
the Bulk-Power System. The Commission stated ``[i]n that case, the
common control system should be considered a Critical Cyber Asset.''
\58\
---------------------------------------------------------------------------
\57\ Id. P 281.
\58\ Id.
---------------------------------------------------------------------------
56. The Commission is concerned that the proposed CIP-002-4 bright
line criteria do not adequately address the Commission's prior
directive regarding the classification of control centers or take the
potential misuse of control systems into account in the identification
of Critical Assets. For example, the proposed bright line criteria
leave a number of Critical Assets
[[Page 58737]]
with potentially unprotected cyber assets, including a total of 222
\59\ control centers with no legal obligation to apply cybersecurity
measures. These potentially unprotected control centers involve an
unknown number of associated control systems.
---------------------------------------------------------------------------
\59\ NERC June 30, 2011 Data Response at 3.
---------------------------------------------------------------------------
57. Consider the following example: Electric grid control system
operation in part consists of the collection of raw data needed to run
the grid, collected by a SCADA system from intelligent electronic
devices (IEDs) (e.g., RTUs and synchrophasors). The SCADA data is
typically aggregated by an energy management system (EMS). The EMS may,
in some cases, calculate area control error (ACE) and transmit it to a
balancing authority, which in turn makes computer based decisions about
balancing load and generation. Those decisions are then used by the
balancing authority or generation operator as part of an automated
generation control (AGC) process. At each of these one or more sites,
there are many data network interconnection points with other entities,
(e.g., neighboring transmission operators, generation operators, and
reliability coordinators) and additional connectivity to corporate data
networks and elsewhere, employing several communications technologies.
This results in a complex interconnection of cyber assets (including
the data of those cyber assets) demanding vigilant protection.\60\
These cyber systems require comprehensive protection because the
interconnected system is only as strong as its weakest link.
---------------------------------------------------------------------------
\60\ See generally, Ron Ross, Managing Enterprise Risk in
Today's World of Sophisticated Threats, National Institute of
Standards and Technology (2007).
---------------------------------------------------------------------------
58. Any failure to take into account the interconnectivity of
control systems represents a significant reliability gap. Where modern
data networking technology is used for operation of the Bulk-Power
System (e.g., control systems, synchrophasors, smart grid), a network-
based cyber attack could result in multiple simultaneous outages of
grid equipment and cyber systems alike through misuse of a single point
of control (e.g., a SCADA control host system). Such an attack could
take place by way of a cyber system associated with an asset that falls
outside the CIP-002-4 bright line criteria yet is connected in common
with other cyber systems on the Bulk-Power System. The risk of a cyber
attack is greater now than when Order No. 706 was issued, as borne out
by the recent increased frequency and sophistication of cyber attacks.
It is critical, therefore, that the Commission's concerns regarding the
potential misuse of control centers and associated control systems be
addressed in the CIP Reliability Standards.
3. Regional Perspective
59. In Order No. 706, the Commission directed NERC to ``develop a
process of external review and approval of critical asset lists based
on a regional perspective.'' \61\ The Commission found that ``Regional
Entities must have a role in the external review to assure that there
is sufficient accountability in the process [and] * * * because the
Regional Entities and ERO are ultimately responsible for ensuring
compliance with Reliability Standards.'' \62\
---------------------------------------------------------------------------
\61\ Order No. 706, 122 FERC ] 61,040 at P 329.
\62\ Id. P 327.
---------------------------------------------------------------------------
60. The Commission is concerned that the lack of a regional review
in the identification of cyber assets might result in a reliability
gap. In Order No. 706, the Commission expressed concerns regarding the
need for developing a process of external review and approval of
Critical Asset lists based on a regional perspective, and that such
lists are considered from a wide-area view. This process would help to
identify trends in Critical Asset identification. Further, while we
recognize that individual circumstances may likely vary, an external
review will provide an appropriate level of consistency.\63\ For
example, reliability coordinators may communicate through a common
system and compromise of that system could propagate across multiple
regions. A cyber compromise can easily propagate across these data and
control networks with potential adverse consequences to the Bulk-Power
System on multi-region basis.
---------------------------------------------------------------------------
\63\ Id. P 322.
---------------------------------------------------------------------------
61. This problem may become exacerbated by any future revisions to
the CIP Reliability Standards that opt to reserve a high level of
independent authority to the registered entity to categorize and
prioritize its cyber assets. Looking forward, it will be essential for
NERC and the Regional Entities to actively review the designation of
cyber assets that are subject to the CIP Reliability Standards,
including those which span regions, in order to determine whether
additional cyber assets should be protected.
4. Summary
62. In summary, the Commission proposes to approve NERC's proposed
Version 4 CIP Standards pursuant to section 215(d)(2) of the FPA. As
discussed above, it appears that the Version 4 CIP Standards represent
an improvement in three respects in that they: (1) Will result in the
identification of certain types of Critical Assets that may not be
identified under the current approach; (2) use bright line criteria to
identify Critical Assets, thus limiting the discretion of responsible
entities when identifying Critical Assets; and (3) provide a level of
consistency and clarity regarding the identification of Critical
Assets.
63. While we believe that the Version 4 CIP Reliability Standards
satisfy the statutory standard for approval, we also believe that more
improvement is needed. As NERC explains in its Petition, the Version 4
CIP Reliability Standards are intended as ``interim'' and future
versions will build on Version 4. We believe that the electric
industry, through the NERC standards development process, should
continue to develop an approach to cybersecurity that is meaningful and
comprehensive to assure that the nation's electric grid is capable of
withstanding a Cybersecurity Incident.\64\ As discussed above, we
believe that some of the essential components of such a meaningful and
comprehensive approach to cybersecurity are set forth in Order No. 706.
---------------------------------------------------------------------------
\64\ Section 215(a) of the FPA defines Cybersecurity Incident as
``a malicious act or suspicious event that disrupts, or was an
attempt to disrupt, the operation of those programmable electronic
devices and communication networks including hardware, software and
data that are essential to the reliable operation of the Bulk-Power
System.''
---------------------------------------------------------------------------
[[Page 58738]]
5. Reasonable Deadline for Full Compliance With Order No. 706
64. The Commission issued Order No. 706 on January 18, 2008. In
Order No. 706, the Commission approved Version 1 of the CIP Reliability
Standards while also directing modifications pursuant to section
215(d)(5) of the FPA, some of which are described above. Later approved
versions of the CIP Reliability Standards, and now the proposed Version
4 CIP Reliability Standards, addressed some of the directives in Order
No. 706, but other directives remain unsatisfied.
65. Over three years have elapsed since the Commission issued the
Final Rule in January 2008. As discussed above, we believe that it is
important for the successful implementation of a comprehensive approach
to cybersecurity that NERC timely addresses the modifications directed
by the Commission in Order No. 706. Accordingly, the Commission
proposes to set a deadline for NERC to file the next version of the CIP
Reliability Standards, which NERC indicates will address all
outstanding Order No. 706 directives.\65\ This proposal is consistent
with the views expressed in the January 2011 Audit Report of the
Department of Energy's Inspector General, who found ``that the
Commission could have, but did not impose specific deadlines for the
ERO to incorporate changes to the CIP standards.'' \66\ Similarly, our
proposal is responsive to the Audit Report finding that ``the CIP
standards implementation approach and schedule approved by the
Commission were not adequate to ensure that systems-related risks to
the Nation's power grid were mitigated or addressed in a timely
manner.'' \67\
---------------------------------------------------------------------------
\65\ See NERC's May 27, 2011 Responses to Data Requests,
Response 1 (``[t]he standard drafting team expects that the filing
for the next version of the CIP Reliability Standards will address
the remaining FERC Order No. 706 directives'').
\66\ Department of Energy Inspector General Audit Report,
Federal Energy Regulatory Commission's Monitoring of Power Grid
Cybersecurity at 6 (January 2011).
\67\ Id. at 2.
---------------------------------------------------------------------------
66. The Commission understands that, under NERC's timeline for the
ongoing effort to address all outstanding Order No. 706 directives, it
anticipates submitting the next version of the CIP Reliability
Standards to the NERC Board of Trustees by the second quarter of 2012,
and filing that version the Commission by the end of the third quarter
of 2012.\68\
---------------------------------------------------------------------------
\68\ See NERC's May 27, 2011 Responses to Data Requests,
Response 1. See also North American Electric Reliability Corporation
Reliability Standards Development Plan 2011-2013 Informational
Filing Pursuant to Section 310 of the NERC Rules of Procedure,
Docket Nos. RM05-17-000, RM05-25-000, RM06-16-000 at 14 (filed April
5, 2011).
---------------------------------------------------------------------------
67. The Commission proposes to establish NERC's current development
timeline above as a deadline for compliance with the outstanding Order
No. 706 CIP Standard directives. The Commission seeks comments from
NERC and other parties concerning this proposal. Further, NERC and
other parties may propose and support an alternative compliance
deadline.
IV. Information Collection Statement
68. The Office of Management and Budget (OMB) regulations require
that OMB approve certain reporting and recordkeeping requirements
(collections of information) imposed by an agency.\69\ The information
contained here is also subject to review under section 3507(d) of the
Paperwork Reduction Act of 1995.\70\ We will submit this proposed rule
to OMB for review.
---------------------------------------------------------------------------
\69\ 5 CFR 1320.11.
\70\ 44 U.S.C. 3507(d).
---------------------------------------------------------------------------
69. As stated above, the Commission previously approved Reliability
Standards similar to the proposed Reliability Standards that are the
subject of the current rulemaking.\71\
---------------------------------------------------------------------------
\71\ North American Electric Reliability Corporation, 130 FERC ]
61,271 (2010).
---------------------------------------------------------------------------
70. The principal differences in the information collection
requirements and resulting burden imposed by the proposed Reliability
Standards in this rule are triggered by the proposed changes in
Reliability Standard CIP-002-4. The previous risk-based assessment
methodology for identifying Critical Assets will be replaced by 17
uniform ``bright line'' criteria for identifying Critical Assets (in
CIP-002-4, Attachment 1, ``Critical Asset Criteria''). Proposed
Reliability Standard CIP-002-4 would require each responsible entity to
use the bright line criteria as a ``checklist'' to identify Critical
Assets, initially and in an annual review, instead of performing the
more technical and individualized risk analysis involved in complying
with the currently-effective CIP Reliability Standards. As in past
versions, each Responsible Entity will then identify the Critical Cyber
Assets associated with its updated list of Critical Assets. If
application of the bright line criteria result in the identification of
new Critical Cyber Assets, such assets become subject to the remaining
standards (proposed CIP-003-4, CIP-004-4, CIP-005-4a, CIP-006-4c, CIP-
007-4, CIP-008-4, and CIP-009-4), and the information collection
requirements contained therein.
71. We estimate that the burden associated with the annual review
of the assets (by the estimated 1,501 entities) will be simplified by
the ``Critical Asset Criteria'' in proposed Reliability Standard CIP-
002-4. Rather than each entity annually reviewing and updating a Risk-
Based Assessment Methodology that frequently required technical
analysis and judgment decisions, the proposed bright line criteria will
provide a straight forward checklist for all entities to use. Thus, we
estimate that the proposal will reduce the burden associated with the
annual review, as well as provide a consistent and clear set of
criteria for all entities to follow.
72. The estimated changes to burden as contained in the proposed
rule in RM11-11 follow.
[[Page 58739]]
--------------------------------------------------------------------------------------------------------------------------------------------------------
Annual burden
FERC-725B Data collection (per Number of respondents Average number of Average number of Effect of NOPR in RM11- hours upon
proposed Version 4) \72\ annual responses burden hours per 11, on total annual implementation of
per respondent response \73\ hours RM11-11
(1).................... (2) (3).................... (1) x (2) x (3)........
--------------------------------------------------------------------------------------------------------------------------------------------------------
Entities that (previously and now) 345 [no change]........ 1 1,880 [reduction of 40 reduction of 13,800 648,600
will identify at least one Critical hours from 1,920 to hours.
Cyber Asset [category a]. 1,880 hours].
Entities that (previously and now) 1,144 [reduction of 12 1 120 [no change]........ Reduction of 1,440 137,280
will not identify any Critical Cyber entities from 1156 to hours [for the 12
Assets [category b]. 1,144]. entities].
Entities that will newly identify a increase of 12 1 3,840 \75\............. increase of 46,080..... 46,080
Critical Asset/Critical Cyber Asset [formerly 0].
due to the requirements in RM11-11
\74\ [category c].
------------------------------------------------------------------------------------------------------------------
Net Total........................ 1,501 \72\............. .................. ....................... +30,840................ 831,960
--------------------------------------------------------------------------------------------------------------------------------------------------------
The revisions to the cost estimates based on requirements of this
proposed rule are:
---------------------------------------------------------------------------
\72\ The NERC Compliance Registry as of 9/28/2010 indicated that
2,079 entities were registered for NERC's compliance program. Of
these, 2,057 were identified as being U.S. entities. Staff concluded
that of the 2,057 U.S. entities, approximately 1,501 were registered
for at least one CIP related function. According to an April 7, 2009
memo to industry, NERC noted that only 31% of entities responding to
an earlier survey reported that they had at least one Critical
Asset, and only 23% reported having a Critical Cyber Asset. Staff
applied the 23% (an estimate unchanged for Version 4 standards) to
the 1,501 figure to estimate the number of entities that identified
Critical Assets under Version 3 CIP Standards.
\73\ Calculations for figures prior to applying reductions:
Respondent category b:
3 employees x (working 50%) x (40 hrs/week) x (2 weeks) = 120
hours.
Respondent category c:
20 employees x (working 50%) x (40 hrs/week) x (8 weeks) = 3200
hours.
20 employees x (working 20%) x (3200 hrs) = 640 hours.
Total = 3840.
Respondent category a:
50% of 3840 hours (category d) = 1920.
\74\ We estimate 12 (or 1%) of the existing entities that
formerly had no identified Critical Cyber Assets will have them
under the proposed Reliability Standards. This proposed rule does
not affect the burden for the 6 new U.S. Entities that were
estimated to newly register or otherwise become subject to the CIP
Standards each year in FERC-725B, and therefore are not included in
this chart.
\75\ This estimated burden estimate applies only to the first
three year audit cycle. In subsequent audit cycles these entities
will move into category a, or be removed from the burden as an
entity that no longer is registered for a CIP related function.
---------------------------------------------------------------------------
Each entity that has identified Critical Cyber Assets has
a reduction of 40 hours (345 entities x 40 hrs. x @$96/hour =
$1,324,800 reduction).
12 Entities that formerly had not identified Critical
Cyber Assets, but now will have them, has
[cir] A reduction of 120 hours and an increase of 3,840 hours (for
a net increase of 3,720 annual hours), giving 12 entities x 3,720
hrs.@$96/hour = $4,285,440.
[cir] Storage costs = 12 entities@$15.25/entity = $183.
Total Net Annual Cost for the FERC-725B requirements contained in
the NOPR in RM11-11 = $2,960,823 ($4,285,440 + $183 -$1,324,800).
The estimated hourly rate of $96 is the average cost of legal
services ($230 per hour), technical employees ($40 per hour) and
administrative support ($18 per hour), based on hourly rates from the
Bureau of Labor Statistics (BLS) and the 2009 Billing Rates and
Practices Survey Report.\76\ The $15.25 per entity for storage costs is
an estimate based on the average costs to service and store 1 GB of
data to demonstrate compliance with the CIP Standards.\77\
---------------------------------------------------------------------------
\76\ Bureau of Labor Statistics figures were obtained from
http://www.bls.gov/oes/current/naics2_22.htm, and 2009 Billing
Rates figure were obtained from http://www.marylandlawyerblog.com/2009/07
/average_hourly_rate_for_lawyer.html. Legal services were
based on the national average billing rate (contracting out) from
the above report and BLS hourly earnings (in-house personnel). It is
assumed that 25% of respondents have in-house legal personnel.
\77\ Based on the aggregate cost of an advanced data protection
server.
---------------------------------------------------------------------------
Title: Mandatory Reliability Standards, Version 4 Critical
Infrastructure Protection Standards.
Action: Proposed Collection FERC-725B.
OMB Control No.: 1902-0248.
Respondents: Businesses or other for-profit institutions; not-for-
profit institutions.
Frequency of Responses: On Occasion.
Necessity of the Information: This proposed rule proposes to
approve the requested modifications to Reliability Standards pertaining
to critical infrastructure protection. The proposed Reliability
Standards help ensure the reliable operation of the Bulk-Power System
by providing a cybersecurity framework for the identification and
protection of Critical Assets and associated Critical Cyber Assets. As
discussed above, the Commission proposes to approve NERC's proposed
Version 4 CIP Standards pursuant to section 215(d)(2) of the FPA
because they represent an improvement to the currently-effective CIP
Reliability Standards.
Internal Review: The Commission has reviewed the proposed
Reliability Standards and made a determination that its action is
necessary to implement section 215 of the FPA.
73. Interested persons may obtain information on the reporting
requirements by contacting the following: Federal Energy Regulatory
Commission, 888 First Street, NE., Washington, DC 20426 [Attention:
Ellen Brown, Office of the Executive Director, e-mail:
DataClearance@ferc.gov, phone: (202) 502-8663, fax: (202) 273-0873].
74. For submitting comments concerning the collection(s) of
information and the associated burden estimate(s), please send your
comments to the Commission, and to the Office of Management and Budget,
Office of Information and Regulatory Affairs,
[[Page 58740]]
Washington, DC 20503 [Attention: Desk Officer for the Federal Energy
Regulatory Commission, phone: (202) 395-4638, fax: (202) 395-7285]. For
security reasons, comments to OMB should be submitted by e-mail to:
oira_submission@omb.eop.gov. Comments submitted to OMB should include
Docket Number RM11-11 and OMB Control Number 1902-0248.
V. Environmental Analysis
75. The Commission is required to prepare an Environmental
Assessment or an Environmental Impact Statement for any action that may
have a significant adverse effect on the human environment.\78\ The
Commission has categorically excluded certain actions from this
requirement as not having a significant effect on the human
environment. Included in the exclusion are rules that are clarifying,
corrective, or procedural or that do not substantially change the
effect of the regulations being amended.\79\ The actions proposed here
fall within this categorical exclusion in the Commission's regulations.
---------------------------------------------------------------------------
\78\ Order No. 486, Regulations Implementing the National
Environmental Policy Act of 1969, FERC Stats. & Regs., Regulations
Preambles 1986-1990 ] 30,783 (1987).
\79\ 18 CFR 380.4(a)(2)(ii).
---------------------------------------------------------------------------
VI. Regulatory Flexibility Act Certification
76. The Regulatory Flexibility Act of 1980 (RFA) \80\ generally
requires a description and analysis of final rules that will have a
significant economic impact on a substantial number of small entities.
The RFA mandates consideration of regulatory alternatives that
accomplish the stated objectives of a proposed rule and that minimize
any significant economic impact on a substantial number of small
entities. The Small Business Administration's (SBA) Office of Size
Standards develops the numerical definition of a small business.\81\
The SBA has established a size standard for electric utilities, stating
that a firm is small if, including its affiliates, it is primarily
engaged in the transmission, generation and/or distribution of electric
energy for sale and its total electric output for the preceding twelve
months did not exceed four million megawatt hours.\82\
---------------------------------------------------------------------------
\80\ 5 U.S.C. 601-612.
\81\ 13 CFR 121.101.
\82\ 13 CFR 121.201, Sector 22, Utilities & n.1.
---------------------------------------------------------------------------
77. The Commission analyzed the affect of the proposed rule on
small entities. The Commission's analysis found that the DOE's Energy
Information Administration (EIA) reports that there were 3,276 electric
utility companies in the United States in 2009,\83\ and 3,015 of these
electric utilities qualify as small entities under the Small Business
Administration (SBA) definition. Of these 3,276 electric utility
companies, the EIA subdivides them as follows: (1) 875 Cooperatives of
which 843 are small entity cooperatives; (2) 1,841 municipal utilities,
of which 1,826 are small entity municipal utilities; (3) 128 political
subdivisions, of which 115 are small entity political subdivisions; (4)
171 power marketers, of which 113 individually could be considered
small entity power marketers; \84\ (5) 200 privately owned utilities,
of which 93 could be considered small entity private utilities; (6) 24
state organizations, of which 14 are small entity state organizations;
and (7) 9 federal organizations of which 4 are small entity federal
organizations.
---------------------------------------------------------------------------
\83\ See Energy Information Administration Database, Form EIA-
861, Dept. of Energy (2009), available at
http://www.eia.doe.gov/cneaf/electricity/page/eia861.html.
\84\ Most of these small entity power marketers and private
utilities are affiliated with others and, therefore, do not qualify
as small entities under the SBA definition.
---------------------------------------------------------------------------
78. Many of the entities that have not previously identified
Critical Assets and Critical Cyber Assets are considered small
entities. The new CIP version 4 bright line criteria generally result
in the identification of relatively larger Bulk-Power System equipment
as Critical Assets. For the most part, the small entities do not own or
operate these larger facilities. There is a limited possibility that
these entities would have facilities that meet the bright line criteria
and therefore be subject to the full CIP standards (CIP-002 through
CIP-009). The Commission expects only a marginal increase in the number
of small entities that will identify at least one Critical Asset under
the Version 4 CIP Reliability Standards that have not done so
previously.
79. The Commission estimates that only one percent (12) of the
small and medium-sized entities that have not previously identified
Critical Assets and Critical Cyber Assets will have an increased cost
due to the proposed Reliability Standards and their identification of
new Critical Cyber Assets. For each of those 12 entities, we anticipate
a cost increase associated with creating a cyber security program along
with the actual cyber security protections associated with the
identified Critical Cyber Assets. The Commission requests comment on
the potential implementation cost and subsequent cost increases that
could be experienced by such small entities. Small and medium-sized
entities that continue to have no Critical Assets will not see any
change in their burden.
80. In general, the majority of small entities are not required to
comply with mandatory Reliability Standards because they are not
regulated by NERC pursuant to the NERC Registry Criteria. Moreover, a
small entity that is registered but does not identify critical cyber
assets pursuant to CIP-002-4 will not have compliance obligations
pursuant to CIP-003-4 through CIP-009-4.
81. The Commission also investigated possible alternatives. These
included the Commission's adoption in Order No. 693 of the NERC
definition of bulk electric system, which reduces significantly the
number of small entities responsible for compliance with mandatory
Reliability Standards. The Commission also noted that small entities
could join a joint action agency or similar organization, which could
accept responsibility for compliance with mandatory Reliability
Standards on behalf of its members and also may divide the
responsibility for compliance with its members.
82. Based on the foregoing, the Commission certifies that the
proposed Reliability Standards will not have a significant impact on a
substantial number of small entities. Accordingly, no regulatory
flexibility analysis is required.
VII. Comment Procedures
83. The Commission invites interested persons to submit comments on
the matters and issues proposed in this notice to be adopted, including
any related matters or alternative proposals that commenters may wish
to discuss. Comments are due November 21, 2011. Comments must refer to
Docket No. RM11-11-000, and must include the commenter's name, the
organization they represent, if applicable, and their address in their
comments.
84. The Commission encourages comments to be filed electronically
via the eFiling link on the Commission's Web site at http://www.ferc.gov.
The Commission accepts most standard word processing
formats. Documents created electronically using word processing
software should be filed in native applications or print-to-PDF format
and not in a scanned format. Commenters filing electronically do not
need to make a paper filing.
85. Commenters unable to file comments electronically must mail or
hand deliver an original copy of their comments to: Federal Energy
Regulatory Commission, Secretary of the Commission, 888 First Street,
NE., Washington, DC 20426.
[[Page 58741]]
86. All comments will be placed in the Commission's public files
and may be viewed, printed, or downloaded remotely as described in the
Document Availability section below. Commenters on this proposal are
not required to serve copies of their comments on other commenters.
VIII. Document Availability
87. In addition to publishing the full text of this document in the
Federal Register, the Commission provides all interested persons an
opportunity to view and/or print the contents of this document via the
Internet through the Commission's Home Page (http://www.ferc.gov) and
in the Commission's Public Reference Room during normal business hours
(8:30 a.m. to 5 p.m. Eastern time) at 888 First Street, NE., Room 2A,
Washington, DC 20426.
88. From the Commission's Home Page on the Internet, this
information is available on eLibrary. The full text of this document is
available on eLibrary in PDF and Microsoft Word format for viewing,
printing, and/or downloading. To access this document in eLibrary, type
the docket number excluding the last three digits of this document in
the docket number field.
89. User assistance is available for eLibrary and the Commission's
Web site during normal business hours from FERC Online Support at 202-
502-6652 (toll free at 1-866-208-3676) or e-mail at
ferconlinesupport@ferc.gov, or the Public Reference Room at (202) 502-
8371, TTY (202) 502-8659. E-mail the Public Reference Room at
public.referenceroom@ferc.gov.
List of Subjects in 18 CFR Part 40
Electric power, Electric utilities, Reporting and recordkeeping
requirements.
By direction of the Commission.
Nathaniel J. Davis, Sr.,
Deputy Secretary.
[FR Doc. 2011-24102 Filed 9-21-11; 8:45 am]
BILLING CODE 6717-01-P
|