Version 4 Critical Infrastructure Protection Reliability Standards, 58730-58741 [2011-24102]

Download as PDF 58730 Federal Register / Vol. 76, No. 184 / Thursday, September 22, 2011 / Proposed Rules DEPARTMENT OF ENERGY Federal Energy Regulatory Commission 18 CFR Part 40 [Docket No. RM11–11–000] Version 4 Critical Infrastructure Protection Reliability Standards Federal Energy Regulatory Commission. ACTION: Notice of proposed rulemaking. AGENCY: Under section 215 of the Federal Power Act, the Federal Energy Regulatory Commission (Commission) proposes to approve eight modified Critical Infrastructure Protection (CIP) Reliability Standards, CIP–002–4 through CIP–009–4, developed and submitted to the Commission for approval by the North American Electric Reliability Corporation (NERC), the Electric Reliability Organization certified by the Commission. In general, the CIP Reliability Standards provide a cybersecurity framework for the identification and protection of ‘‘Critical Cyber Assets’’ to support the reliable operation of the Bulk-Power System. Proposed Reliability Standard CIP–002– 4 requires the identification and documentation of Critical Cyber Assets associated with Critical Assets that support the reliable operation of the Bulk-Power System. The ‘‘Version 4’’ CIP Reliability Standards propose to modify CIP–002–4 to include ‘‘bright line’’ criteria for the identification of Critical Assets. The proposed Version 4 CIP Reliability Standards would replace the currently effective Version 3 CIP Reliability Standards. The Commission also proposes to approve the related Violation Risk Factors and Violation Severity Levels with modifications, the implementation plan, and effective date proposed by NERC. DATES: Comments are due November 21, 2011. ADDRESSES: You may submit comments, identified by docket number and in accordance with the requirements posted on the Commission’s Web site https://www.ferc.gov. Comments may be submitted by any of the following methods: • Agency Web Site: Documents created electronically using word processing software should be filed in native applications or print-to-PDF format and not in a scanned format, at https://www.ferc.gov/docs-filing/ efiling.asp. • Mail/Hand Delivery: Commenters unable to file comments electronically emcdonald on DSK5VPTVN1PROD with PROPOSALS SUMMARY: VerDate Mar<15>2010 18:25 Sep 21, 2011 Jkt 223001 must mail or hand deliver an original copy of their comments to: Federal Energy Regulatory Commission, Secretary of the Commission, 888 First Street, NE., Washington, DC 20426. These requirements can be found on the Commission’s Web site, see, e.g., the ‘‘Quick Reference Guide for Paper Submissions,’’ available at https:// www.ferc.gov/docs-filing/efiling.asp or via phone from FERC Online Support at 202–502–6652 or toll-free at 1–866– 208–3676. FOR FURTHER INFORMATION CONTACT: Jan Bargen (Technical Information), Office of Electric Reliability, Division of Logistics and Security, Federal Energy Regulatory Commission, 888 First Street, NE., Washington, DC 20426, (202) 502–6333. Edward Franks (Technical Information), Office of Electric Reliability, Division of Logistics and Security, Federal Energy Regulatory Commission, 888 First Street, NE., Washington, DC 20426, (202) 502–6311. Kevin Ryan (Legal Information), Office of the General Counsel, Federal Energy Regulatory Commission, 888 First Street, NE., Washington, DC 20426, (202) 502–6840. Matthew Vlissides (Legal Information), Office of the General Counsel, Federal Energy Regulatory Commission, 888 First Street, NE., Washington, DC 20426, (202) 502–8408. SUPPLEMENTARY INFORMATION: September 15, 2011. 1. Under section 215 of the Federal Power Act (FPA),1 the Commission proposes to approve eight modified Critical Infrastructure Protection (CIP) Reliability Standards, CIP–002–4 through CIP–009–4. The proposed ‘‘Version 4’’ CIP Standards were developed and submitted for approval to the Commission by the North American Electric Reliability Corporation (NERC), which the Commission certified as the Electric Reliability Organization (ERO) responsible for developing and enforcing mandatory Reliability Standards.2 In general, the CIP Reliability Standards provide a cybersecurity framework for the identification and protection of ‘‘Critical Cyber Assets’’ to support the reliable operation of the Bulk-Power System.3 In 1 16 U.S.C. 824o (2006). American Electric Reliability Corp., 116 FERC ¶ 61,062, order on reh’g & compliance, 117 FERC ¶ 61,126 (2006), aff’d sub nom. Alcoa, Inc. v. FERC, 564 F.3d 1342 (D.C. Cir. 2009). 3 The NERC Glossary of Terms defines Critical Assets to mean ‘‘Facilities, systems, and equipment which, if destroyed, degraded, or otherwise rendered unavailable, would affect the reliability or operability of the Bulk Electric System.’’ 2 North PO 00000 Frm 00009 Fmt 4702 Sfmt 4702 particular, the Version 4 CIP Reliability Standards propose to modify CIP–002– 4 to include ‘‘bright line’’ criteria for the identification of Critical Assets, in lieu of the currently-required risk-based assessment methodology that is developed and applied by applicable entities. In addition, NERC developed proposed conforming modifications to the remaining cybersecurity Reliability Standards, CIP–003–4 through CIP–009– 4. 2. The Commission proposes to approve Version 4, the Violation Risk Factors (VRFs),the Violation Severity Levels (VSLs) with modifications, the implementation plan, and effective date proposed by NERC. The Commission also proposes to approve the retirement of the currently effective Version 3 CIP Reliability Standards, CIP–002–3 to CIP–009–3. The Commission seeks comments on these proposals to approve. 3. While we propose to approve the Version 4 CIP Standards, like NERC, we recognize that the Version 4 CIP Standards represent an ‘‘interim step’’ 4 to addressing all of the outstanding directives set forth in Order No. 706.5 We believe that the electric industry, through the NERC standards development process, should continue to develop an approach to cybersecurity that is meaningful and comprehensive to assure that the nation’s electric grid is capable of withstanding a Cybersecurity Incident.6 Below, we reiterate several topics set forth in Order No. 706 that pertain to a tiered approach to identifying Cyber Assets, protection from misuse, and a regional perspective. We expect NERC will continue to improve the CIP Standards to address these and other outstanding matters addressed in Order No. 706. 4. Moreover, as discussed below, the Commission seeks comments from NERC and other interested persons on establishing a reasonable deadline for NERC to satisfy the outstanding directives in Order No. 706 pertaining to the CIP Standards, using NERC’s development timeline. 4 NERC Petition at 6. Reliability Standards for Critical Infrastructure Protection, Order No. 706, 122 FERC ¶ 61,040, order on reh’g, Order No. 706–A, 123 FERC ¶ 61,174 (2008), order on clarification, Order No. 706–B, 126 FERC ¶ 61,229 (2009). 6 Section 215(a) of the FPA defines Cybersecurity Incident as ‘‘a malicious act or suspicious event that disrupts, or was an attempt to disrupt, the operation of those programmable electronic devices and communication networks including hardware, software and data that are essential to the reliable operation of the Bulk-Power System.’’ 5 Mandatory E:\FR\FM\22SEP1.SGM 22SEP1 Federal Register / Vol. 76, No. 184 / Thursday, September 22, 2011 / Proposed Rules I. Background A. Mandatory Reliability Standards 5. Section 215 of the FPA requires a Commission-certified ERO to develop mandatory and enforceable Reliability Standards, which are subject to Commission review and approval. Once approved, the Reliability Standards may be enforced by the ERO, subject to Commission oversight, or by the Commission independently.7 6. Pursuant to section 215 of the FPA, the Commission established a process to select and certify an ERO 8 and, subsequently, certified NERC as the ERO.9 On January 18, 2008, the Commission issued Order No. 706 approving eight CIP Reliability Standards proposed by NERC. 7. In addition, pursuant to section 215(d)(5) of the FPA,10 the Commission directed NERC to develop modifications to the CIP Reliability Standards to address various concerns discussed in the Final Rule. In relevant part, the Commission directed the ERO to address the following issues regarding CIP–002–1: (1) Need for ERO guidance regarding the risk-based assessment methodology for identifying Critical Assets; (2) scope of Critical Assets and Critical Cyber Assets; (3) internal, management, approval of the risk-based assessment; (4) external review of Critical Assets identification; and (5) interdependency between Critical Assets of the Bulk-Power System and other critical infrastructures. Subsequently, the Commission approved Version 2 and Version 3 of the CIP Reliability Standards, each version including changes responsive to some but not all of the directives in Order No. 706.11 B. Current Version 3 CIP Reliability Standards 8. Reliability Standard CIP–002–3 addresses the identification of Critical Assets and associated Critical Cyber Assets. Pursuant to CIP–002–3, a 7 See 16 U.S.C. 824o(e). Concerning Certification of the Electric Reliability Organization; and Procedures for the Establishment, Approval and Enforcement of Electric Reliability Standards, Order No. 672, FERC Stats. & Regs. ¶ 31,204, order on reh’g, Order No. 672–A, FERC Stats. & Regs. ¶ 31,212 (2006). 9 North American Electric Reliability Corp., 116 FERC ¶ 61,062, order on reh’g & compliance, 117 FERC ¶ 61,126 (2006), aff’d sub nom., Alcoa, Inc. v. FERC, 564 F.3d 1342 (DC Cir. 2009). 10 16 U.S.C. 824o(d)(5). 11 North American Electric Reliability Corp., 128 FERC ¶ 61,291 (2009), order denying reh’g and granting clarification, 129 FERC ¶ 61,236 (2009) (approving Version 2 of the CIP Reliability Standards); North American Electric Reliability Corp., 130 FERC ¶ 61,271 (2010) (approving Version 3 of the CIP Reliability Standards). emcdonald on DSK5VPTVN1PROD with PROPOSALS 8 Rules VerDate Mar<15>2010 18:25 Sep 21, 2011 Jkt 223001 responsible entity must develop a riskbased assessment methodology to identify its Critical Assets. Requirement R1 specifies certain types of assets that an assessment must consider for Critical Asset status and also allows the consideration of additional assets that the responsible entity deems appropriate. Requirement R2 requires the responsible entity to develop a list of Critical Assets based on an annual application of the risk-based assessment methodology developed pursuant to Requirement R1. Requirement R3 provides that the responsible entity must use the list of Critical Assets to develop a list of associated Critical Cyber Assets that are essential to the operation of the Critical Assets. 9. In addition, the Commission approved the following ‘‘Version 3’’ CIP Standards: • CIP–003–3 (Security Management Controls); • CIP–004–3 (Personnel & Training); • CIP–005–3 (Electronic Security Perimeter(s)); • CIP–006–3 (Physical Security of Critical Cyber Assets); • CIP–007–3 (Systems Security Management); • CIP–008–3 (Incident Reporting and Response Planning); • CIP–009–3 (Recovery Plans for Critical Cyber Assets). II. Proposed Version 4 CIP Reliability Standards A. NERC Petition 10. On February 10, 2011, NERC filed a petition seeking Commission approval of proposed Reliability Standards CIP– 002–4 to CIP–009–4 and requesting the concurrent retirement of the currently effective Version 3 CIP Reliability Standards, CIP–002–3 to CIP–009–3.12 The principal differences are found in CIP–002, where NERC replaced the riskbased assessment methodology for identifying Critical Assets with 17 uniform bright line criteria for identifying Critical Assets. NERC does not propose any changes to the process of identifying the associated Critical Cyber Assets that are then subject to the cyber security protections required by CIP–003 through CIP–009. NERC also submitted proposed VRFs and VSLs and an implementation plan governing the transition to Version 4. NERC proposed that the Version 4 CIP Reliability Standards become effective the first day 12 NERC Petition at 1. The proposed Reliability Standards are not attached to the NOPR. They are, however, available on the Commission’s eLibrary document retrieval system in Docket No. RM11–11– 000 and are available on the ERO’s Web site, http: //www.nerc.com. Reliability Standards approved by the Commission are not codified in the CFR. PO 00000 Frm 00010 Fmt 4702 Sfmt 4702 58731 of the eighth calendar quarter after applicable regulatory approvals have been received. 11. On April 12, 2011, NERC made an errata filing correcting certain errors in the petition and furnishing corrected exhibits and the standard drafting team minutes. In the errata, NERC also replaced the VRFs and VSLs in the February 10 petition with new proposed VRFs and VSLs.13 12. In its Petition, NERC states that the Version 4 CIP Standards satisfy the Commission’s criteria, set forth in Order No. 672, for determining whether a proposed Reliability Standard is just, reasonable, not unduly discriminatory or preferential and in the public interest.14 According to NERC, CIP– 002–4 achieves a specified reliability goal by requiring the identification and documentation of Critical Cyber Assets associated with Critical Assets that support the reliable operation of the Bulk-Power System. NERC opines that the Reliability Standard ‘‘improves reliability by establishing uniform criteria across all Responsible Entities for the identification of Critical Assets.’’ 15 Further, NERC states that CIP–002–4 contains a technically sound method to achieve its reliability goal by requiring the identification and documentation of Critical Assets through the application of the criteria set forth in Attachment 1 of CIP–002–4. 13. NERC states that CIP–002–4 establishes clear and uniform criteria for identifying Critical Assets on the BulkPower System.16 NERC also states that CIP–002–4 does not reflect any differentiation in requirements based on size of the responsible entity. NERC asserts that CIP–002–4 will not have negative effects on competition or restriction of the grid. NERC also contends that the two-year implementation period for CIP–002–4 is reasonable given the time it will take responsible entities to determine 13 NERC states that the Version 4 VRFs and VSLs are carried over in part from the VRFs and VSLs in the Version 3 CIP Reliability Standards. NERC Petition at 46. The Commission approved the Version 2 and 3 VRFs and VSLs in Docket Nos. RD10–6–001 and RD09–7–003 on January 20, 2011 but required NERC to make modifications in a compliance filing due by March 21, 2011. North American Electric Reliability Corporation, 134 FERC ¶ 61,045 (2011). The February 10 petition did not carry over the modified Version 3 VRFs and VSLs since it was filed before the March 21 compliance filing. NERC submitted new Version 4 VRFs and VSLs that carried over the modified Version 3 VRFs and VSLs in the April 12 errata. On June 6, 2011, NERC filed the March 21, 2011 compliance filing in the present docket, Docket No. RM11–11–000. 14 Order No. 672, FERC Stats. & Regs. ¶ 31,204 at P 323–337. 15 NERC Petition at 4. 16 Id. at 38. E:\FR\FM\22SEP1.SGM 22SEP1 58732 Federal Register / Vol. 76, No. 184 / Thursday, September 22, 2011 / Proposed Rules whether assets meet the criteria included in Attachment 1 and to implement the controls required in CIP– 003–4 through CIP–009–4 for the newly identified assets. 14. Finally, NERC acknowledges that CIP–002–4 addresses some, but not all, of the Commission’s directives in Order No. 706. NERC explains that the standard drafting team limited the scope of requirements in the development of CIP Version 4 ‘‘as an interim step’’ limited to the concerns raised by the Commission regarding CIP–002.17 NERC states that it has taken a ‘‘phased’’ approach to meeting the Commission’s directives from Order No. 706 and, according to NERC, the standard drafting team continues to address the remaining Commission directives. According to NERC, the team will build on the bright line approach of CIP Version 4.18 B. Proposed Reliability Standard CIP– 002–4 15. Proposed Reliability Standard CIP–002–4 contains 3 requirements. Requirement R1, which pertains to the identification of Critical Assets, provides: emcdonald on DSK5VPTVN1PROD with PROPOSALS The Responsible Entity shall develop a list of its identified Critical Assets determined through an annual application of the criteria contained in CIP–002–4 Attachment 1— Critical Asset Criteria. The Responsible Entity shall update this list as necessary, and review it at least annually. Attachment 1 provides seventeen criteria to be used by all responsible entities for the identification of Critical Assets pursuant to Requirement R1. The thresholds pertain to specific types of facilities such as generating units, transmission lines and control centers. For example, Criterion 1.1 provides ‘‘[e]ach group of generating units (including nuclear generation) at a single plant location with an aggregate highest rated net Real Power capability of the preceding 12 months equal to or exceeding 1500 MW in a single Interconnection.’’ With regard to transmission, Criterion 1.6 provides ‘‘Transmission Facilities operated at 500 kV or higher,’’ and Criterion 1.7 provides ‘‘Transmission Facilities operated at 300 kV or higher at stations or substations interconnected at 300 kV or higher with three or more other transmission stations or substations.’’ 16. Reliability Standard CIP–002–4, Requirement R2 requires responsible entities to develop a list of Critical Cyber Assets associated with the Critical 17 NERC Petition at 6 (citing Order No. 706, 122 FERC ¶ 61,040 at P 236). 18 NERC Petition at 6. VerDate Mar<15>2010 18:25 Sep 21, 2011 Jkt 223001 Assets identified pursuant to Requirement R1. As in previous versions, the Requirement further states that to qualify as a Critical Cyber Asset, the Cyber Asset must: (1) Use a routable protocol to communicate outside the Electronic Security Perimeter; (2) use a routable protocol within a control center; or (3) be dial-up accessible. In the proposed version, in the context of generating units at a single plant location, the Requirement limits the designation of Critical Cyber Assets only to Cyber Assets shared by a combination of generating units whose compromise could within 15 minutes result in the loss of generation capability equal to or higher than 1500 MW. 17. Requirement R3 requires that a senior manager or delegate for each responsible entity approve annually the list of Critical Assets and the list of Critical Cyber Assets, even if the lists contain no elements. As mentioned above, proposed Reliability Standards CIP–003–4 to CIP–009–4 only reflect conforming changes to accord with the CIP–002–4 Reliability Standard. C. Additional Information Regarding Attachment 1 Criteria 18. In response to a Commission data request, NERC provided additional information regarding the bright line criteria for identifying Critical Assets.19 NERC provided some information regarding the development of the criteria. Further, based on an industry survey, NERC provided information regarding the estimated number of Critical Assets and the number of Critical Assets that have associated Critical Cyber Assets located in the United States that would be identified pursuant to CIP–002–4. For example, NERC indicates that the Version 4 CIP Standards would result in the identification of 532 control centers as Critical Assets with Critical Cyber Assets, and another 21 control centers as Critical Assets without any associated Critical Cyber Assets.20 Further, 201 control centers would not be identified as Critical Assets. With regard to Blackstart Resources, NERC’s survey results indicate that CIP–002–4 would result in the identification of approximately 234 Blackstart Resources as Critical Assets with associated Critical Cyber Assets, 273 identified as Critical Assets without Critical Cyber 19 See April 17, 2011 Commission staff data request issued in Docket No. RM11–11–000. NERC responded to the data request in staggered filings, on May 27, 2011 and June 30, 2011. 20 NERC June 30, 2011 Data Response at 2–3. PO 00000 Frm 00011 Fmt 4702 Sfmt 4702 Assets, and 35 Blackstart Resources not classified as Critical Assets.21 III. Discussion 19. Pursuant to FPA section 215(d)(2), the Commission proposes to approve CIP–002–4 to CIP–009–4 as just, reasonable, not unduly discriminatory or preferential, and in the public interest. The Commission proposes to approve the VRFs and VSLs, implementation plan, and effective date proposed by NERC. The Commission also proposes to approve the retirement of the currently effective Version 3 CIP Reliability Standards CIP–002–3 to CIP– 009–3 upon the effective date of CIP– 002–4 to CIP–009–4. The Commission seeks comments on these proposals. 20. Further, as discussed below, the Commission seeks comments from NERC and other interested persons on the proposal to establish a reasonable deadline for NERC to satisfy the outstanding directives in Order No. 706. Specifically, as explained in detail later, the Commission requests comments on: (1) The proposal to establish a deadline using NERC’s development timeline for the next version of the CIP Reliability Standards; (2) how much time NERC needs to develop and file the next version of the CIP Reliability Standards; (3) other potential approaches to Critical Cyber Asset identification; and (4) whether the next version is anticipated to satisfy all of the directives in Order No. 706. A. The Commission Proposes To Approve the Version 4 CIP Reliability Standards 21. The Commission, in giving due weight to NERC’s Filing, proposes to approve the Version 4 CIP Reliability Standards. The Commission also proposes to approve the implementation plan and effective date proposed by NERC. Version 4 provides a change in three respects: (1) Version 4 will result in the identification of certain types of Critical Assets that may not be identified under the current approach; (2) Version 4 uses bright line criteria to identify Critical Assets, eliminating the use of existing entity-defined risk-based assessment methodologies that generally do not adequately identify Critical Assets; and (3) Version 4 provides a level of consistency and clarity regarding the identification of Critical Assets lacking under Version 3. We 21 Id. at 3–4. In the June 30, 2011 Data Response, NERC stated that with respect to Blackstart Resources some responsible entities indicated that they had not performed a complete analysis of their systems based on CIP–002–4 and are unsure whether some units may be classified as Critical Assets. Id. at 4. E:\FR\FM\22SEP1.SGM 22SEP1 Federal Register / Vol. 76, No. 184 / Thursday, September 22, 2011 / Proposed Rules separately address each of these reasons for proposing to approve Version 4 below. 1. Critical Asset Identification 22. In its Petition, NERC indicates that, after conducting reviews of CIP– 002 compliance, NERC ‘‘determined that the existing methodologies generally do not adequately identify all Critical Assets.’’ 22 While recognizing that CIP version 4 is intended as an ‘‘interim step,’’ it appears that the proposed bright line criteria will result in the identification of certain types of Critical Assets (e.g. 500 kV substations) that may not be identified by the approach that is currently in effect. This is reflected in NERC’s June 30, 2011 data response, in which NERC presented industry survey data reflecting the application of the bright line criteria in Version 4. To facilitate an analysis of the data, NERC also provided observations and data from several of its earlier industry surveys, including the 2009 ‘‘CIP Self-Certification Survey’’ and 2010 ‘‘CIP–002 Critical Asset Methodology Data Request.’’. For example, NERC states in the June 30, 2011 data response that in the 2009 survey only 50 percent of substations rated 300 kV and above are classified as Critical Assets while that figure would increase to 70 percent under Version 4.23 23. The NERC petition indicates that 270 transmission substations rated 500 kV and above are classified as Critical Assets under Version 3 while, according to the data response, the figure would rise to 437 under Version 4.24 This increase is consistent with Criterion 1.6 of Attachment 1 to CIP–002–4, which identifies all transmission substations rated 500 kV as Critical Assets. According to the data response, the 25 percent of generation units rated 300 MVA and above would be identified as Critical Assets under Version 4. Moreover, the proportion of total Blackstart Resources classified as Critical Assets increases due to the required 100 percent coverage of these under Version 4.25 Further, the number 22 NERC Petition at 11. at 4. 24 Id. at 5. 25 NERC Petition at 17 (explaining that each Blackstart Resource identified in a Transmission Operator’s restoration plan is a Critical Asset). In the June 30, 2011 Data Response, NERC’s survey found that responsible entities identified 93 percent of Blackstart Resources as Critical Assets. NERC stated that confusion over the term Blackstart Resource may have contributed to the lower percentage, and that responsible entities will be educated on the definition of Blackstart Resource prior to the effective date of CIP–002–4. NERC June 30, 2011 Data Response at 4. emcdonald on DSK5VPTVN1PROD with PROPOSALS 23 Id. VerDate Mar<15>2010 18:25 Sep 21, 2011 Jkt 223001 of control centers identified as Critical Assets increases from 425 under Version 3 to 553 under Version 4, the latter figure representing 74 percent of all control centers. These figures represent increases in certain categories in Critical Asset identification among generation, transmission, and control centers. We also note that NERC’s industry survey data indicates decreases in the number of generation and blackstart resources identified as Critical Assets with Critical Cyber Assets. While the bright line thresholds result in the identification of a significant number of additional generation plants rated above 1500 MVA as Critical Assets, the thresholds also result in the identification of less generation below 300 MVA. 24. As NERC recognizes in its filing, the improvements in Critical Asset identification under Version 4 represent an interim step in complying with the directives in Order No. 706.26 As we discuss below, Version 4 should not be viewed as an endpoint but as a step towards eventual full compliance with Order No. 706. 2. Version 4 Removes Discretion in Identifying Critical Assets 25. The proposed Version 4 CIP Reliability Standards discards the current risk-based methodology for identifying Critical Assets. Under the current CIP–002–3, responsible entities are tasked with identifying Critical Assets based on their own risk-based methodology. In the Petition NERC points out that in Order No. 706 the Commission directed NERC to ‘‘provide reasonable technical support to assist entities in determining whether their assets are critical to the Bulk-Power System.’’ 27 NERC explains that it responded to the Commission’s direction by developing guidance documents to assist entities in developing their risk-based methodologies and Critical Asset identification.28 26. In its Petition, NERC states that it ‘‘conducted various reviews of riskbased methodologies developed by many entities of varying sizes * * * and determined that the existing methodologies generally do not adequately identify all Critical Assets.’’ 29 To address this, NERC proposes to replace the current riskbased methodology with uniform, bright line criteria, which will be used by all 27 Id. at 10–11 (citing Order No. 706, 122 FERC ¶ 61,040 at P 255). 28 Id. at 11. 29 Id. PO 00000 Frm 00012 Fmt 4702 Sfmt 4702 58733 responsible entities to identify Critical Assets. 27. While risk-based assessment methodologies have merit, we share NERC’s concerns about the existing application of the currently effective CIP–002–3, Requirement 1. Thus, in this context, we believe that a shift away from responsible entity-designed riskbased methodologies for identifying Critical Assets, which NERC has found to be inadequate, to the use of NERCdeveloped criteria is an improvement. 3. Version 4 Provides Consistency and Clarity in the Identification of Critical Assets 28. In its June 30, 2011 data response, NERC states that the survey results from 2009 generated concern ‘‘about the apparent inconsistency in the application of the standards across the system, as evidenced by the apparent variation from region to region.’’ 30 NERC states that it subsequently engaged with the Regional Entities and stakeholders to better understand the data, with these efforts resulting in the development of Version 4. 29. We believe that the application of uniform criteria is an improvement over the current approach because they add greater consistency and clarity in identifying Critical Assets. The risks posed by cyber threats suggest a different approach than the possibly inconsistent, inadequate methodologies for identifying Critical Assets, as evidenced by NERC’s conclusion that insufficient numbers of Critical Assets were identified using the risk-based assessment methodology. As an integrated system, the protection afforded for Critical Assets and their Critical Cyber Assets is only as strong as its weakest link. In this respect, allowing responsible entities to devise their own methodologies for identifying Critical Assets, especially if these methodologies prove to be weak, may compromise the Critical Assets and Critical Cyber Assets of other responsible entities even if they have adopted a more stringent methodology. The uniform system of Critical Asset identification proposed by NERC in Version 4 helps to address this weakness and places all responsible entities on an equal footing with respect to Critical Asset identification. 30. In addition, clear, bright line criteria should make it easier for Regional Entities, NERC and the Commission to monitor responsible entities and evaluate how they are identifying Critical Assets. A single set of bright line criteria, as opposed to 30 NERC E:\FR\FM\22SEP1.SGM June 30, 2011 Data Response at 3. 22SEP1 emcdonald on DSK5VPTVN1PROD with PROPOSALS 58734 Federal Register / Vol. 76, No. 184 / Thursday, September 22, 2011 / Proposed Rules myriad entity-designed risk-based methodologies, should improve the CIP compliance process. 31. However, under the currentlyeffective CIP–002–3, an entity that applies its risk-based assessment methodology considers specific types of assets identified in Requirement R1, as well as ‘‘any additional assets that support the operation of the Bulk Electric System that the Responsible Entity deems appropriate to include in its assessment.’’ Thus, currently, a responsible entity has the flexibility to consider any assets it deems appropriate. The Commission also notes that there are assets currently identified as Critical Assets which would no longer be identified as Critical Assets under the Proposed Reliability Standard CIP–002–4 bright line criteria for Critical Asset identification. The Commission seeks comment whether, under CIP Version 4, a responsible entity retains the flexibility to identify assets that, although outside of the bright line criteria, are essential to BulkPower System reliability. Further, we seek comment whether the ERO and/or Regional Entities would have the ability, either in an event-driven investigation or compliance audit, to identify specific assets that fall outside the bright-line criteria yet are still essential to BulkPower System reliability and should be subject prospectively to compliance with the CIP Reliability. If so, on what basis should that decision be made? 32. In addition, the Commission is cognizant of one caution that remains concerning a binary bright line criteria protection philosophy, i.e., either an asset satisfies the threshold and is subject to compliance or is below the threshold and not subject to compliance (as opposed to a tiered approach to compliance as discussed below), in terms of applying cybersecurity protections to Cyber Assets. Specifically, bright line criteria that limit legally-mandated cybersecurity protections to certain classes of BulkPower System assets may indicate to an adversary the types of assets that fail to meet the threshold and, therefore, are not subject to mandatory CIP compliance. Therefore, the Commission encourages NERC to accelerate development of the next version of the CIP Reliability Standards and to address the concerns discussed herein in Section B. Reliability Standards.31 NERC explains that each requirement in Version 4 is assigned a VRF and a set of VSLs and that these elements support the determination of an initial value range for the base penalty amount regarding violations of requirements in Commission-approved Reliability Standards, as defined in the ERO Sanction Guidelines.32 34. The principal changes in the proposed Version 4 VRFs and VSLs relate to CIP–002–4. NERC proposes to carry forward the Version 3 VRFs and VSLs for all other Requirements (in CIP– 003–4 through CIP–009–4), for which no substantive revisions are proposed. CIP– 002–4 no longer contains subRequirements and, instead, each of three main Requirements has a single VRF and set of VSLs, consistent with the methodology proposed by NERC and approved by the Commission.33 The VRF designations for the three Requirements in CIP–002–4 are consistent with those assigned to similar Requirements in previous versions of the CIP Reliability Standards and satisfy our established guidelines. Therefore, the Commission proposes to approve the Version 4 VRFs proposed by NERC and incorporate appropriately the modifications directed to prior versions. 35. With regard to the proposed Version 4 VSLs for CIP–002–4, we are concerned that the VSLs for Requirement R1 and Requirement R2, while carrying forward the wording from corresponding Version 3 VSLs, do not adequately address the purpose of NERC’s proposed bright line criteria: To ensure accurate and complete identification of all Critical Assets, so that all associated Critical Cyber Assets become subject to the protections required by the CIP Standards. 36. More importantly, neither set of VSLs address the failure to properly identify either Critical Assets or Critical Cyber Assets in the first place. The failure to identify a Critical Asset, whether inadvertently or through misapplication of the bright line criteria, is paramount because if an Asset is not identified and included on the Critical Asset list, its associated Cyber Assets will not be considered under Requirement R2. Failure to identify those Cyber Assets as Critical Cyber Assets under Requirement R2 then creates the ‘‘weakest link’’ circumstance discussed in the Commission’s order 4. Violation Risk Factors/Violation Severity Levels 31 North American Electric Reliability Corp., 134 FERC ¶ 61,045 (2011) (approving Version 2 and 3 CIP Reliability Standards VRFs and VSLs but requiring modifications in a compliance filing). 32 NERC Petition at 37. 33 North American Electric Reliability Corp., 135 FERC ¶ 61,166, at 8 (2011). 33. NERC states that the proposed VRFs and VSLs are consistent with those approved for the Version 3 CIP VerDate Mar<15>2010 18:25 Sep 21, 2011 Jkt 223001 PO 00000 Frm 00013 Fmt 4702 Sfmt 4702 establishing two CIP VSL Guidelines for analyzing the validity of VSLs pertaining to cyber security.34 37. Therefore, the Commission proposes to direct the ERO to modify the VSLs for CIP–002–4, Requirements R1 and R2, to address a failure to identify either Critical Assets or Critical Cyber Assets, as shown in Appendix 1.35 The Commission proposes to approve the Version 4 VSLs proposed by NERC, as modified, because they would then satisfy our established guidelines, fully address the purpose of NERC’s bright line criteria, and incorporate appropriately the modifications directed to prior versions. 5. Implementation Plan and Effective Date 38. NERC proposes an effective date for full compliance with the Version 4 CIP Standards of the first day of the eighth calendar quarter after applicable regulatory approvals have been received. In addition, NERC provides a detailed implementation plan for newly identified Critical Assets and newly registered entities. NERC also presents a number of scenarios intended to explain how CIP–002–4 will be implemented. Depending on the situation, the implementation plan establishes timelines and milestones for entities to reach full compliance with CIP–002–4. 39. The Commission proposes to approve the effective date and implementation plan for CIP–002–4. Under the scenarios presented by NERC, we understand that entities with existing CIP compliance implementation programs will effectively no longer use CIP–002–3 to identify Critical Assets after approval of CIP–002–4 but rather will apply the criteria in Attachment 1 of CIP–002–4. While some responsible entities have already installed the necessary equipment and software to address 34 CIP VSL Guideline 1 states, ‘‘Requirements where a single lapse in protection can compromise computer network security, i.e., the ‘‘weakest link’’ characteristic, should apply binary rather than gradated VSLs.’’ 35 NERC proposes to assign a Severe VSL for a violation of Requirement R1 if a responsible entity does not develop a list of its identified Critical Assets ‘‘even if such list is null.’’ NERC does not propose to assign a VSL for a violation of Requirement R1 when a responsible entity fails to identify a Critical Asset that falls within any of the Critical Asset Criteria in Attachment 1, or fails to include an identified Critical Asset in its Critical Asset list. NERC further proposes to assign a Severe VSL to a responsible entity’s violation of Requirement R2 only when it fails to include in its list of Critical Cyber Assets a Critical Cyber Asset it has identified. NERC does not propose to assign a VSL for a violation of Requirement R2 resulting from a responsible entity’s failure to identify as a Critical Cyber Asset a Cyber Asset that qualifies as a Critical Cyber Asset. E:\FR\FM\22SEP1.SGM 22SEP1 Federal Register / Vol. 76, No. 184 / Thursday, September 22, 2011 / Proposed Rules emcdonald on DSK5VPTVN1PROD with PROPOSALS cybersecurity, we recognize that other responsible entities may need to purchase and install new equipment and software to achieve compliance for assets that are brought within the scope of the protections under the CIP–002–4 bright line criteria. Based on these considerations, the Commission believes that the implementation plan proposed by NERC sets reasonable deadlines for industry compliance. B. Ongoing Development Efforts To Satisfy Directives Set Forth in Order No. 706 40. As acknowledged by NERC, the proposed Version 4 CIP Reliability Standards do not address all of the directives set forth in Order No. 706. Although the Commission proposes to approve CIP–002–4, we highlight the need for NERC, working through the Reliability Standards development process, to address all outstanding Order No. 706 directives as soon as possible. 41. Below, we discuss several directives in Order No. 706 that have yet to be satisfied and propose to give guidance regarding the next version of the CIP Reliability Standards, such as the need to address the NIST framework, data network connectivity, and the potential misuse of control centers or control systems and the adoption of a regional perspective and oversight. Our guidance is intended to more fully ensure that all Cyber Assets serving reliability functions of the BulkPower System are within scope of the CIP Reliability Standards. In addition, as discussed below, we seek comments from NERC and other interested persons on a proposal to establish a deadline for NERC to submit modified CIP Reliability Standards that address the outstanding directives set forth in Order No. 706, using NERC’s development timeline. 42. The stated purpose of Reliability Standard CIP–002 is the accurate identification of Critical Cyber Assets. Both the currently-effective and proposed CIP–002 Reliability Standards, along with guidance NERC provided to industry,36 are structured in a staged approach. First, an entity must identify Critical Assets. NERC defines Critical Assets as ‘‘facilities, systems, and equipment which, if destroyed, degraded, or otherwise rendered unavailable, would affect the reliability 36 North American Reliability Corporation Security Guideline for the Electric Sector: ‘‘Identifying Critical Cyber Assets’’ Version 1.0, Effective June 17, 2010, at 4–5, and North American Reliability Corporation Security Guideline for the Electric Sector: ‘‘Identifying Critical Assets’’ Version 1.0, Effective September 17, 2009. VerDate Mar<15>2010 18:25 Sep 21, 2011 Jkt 223001 or operability of the Bulk Electric System.’’ 37 Second, based on the Critical Assets identified in the first step, an entity must identify Cyber Assets supporting the Critical Assets. The NERC Glossary defines Cyber Assets as ‘‘programmable electronic devices and communication networks including hardware, software, and data.’’ 38 Third, an entity should identify the Critical Cyber Assets by determining, in accordance with the NERC Glossary, the ‘‘Cyber Assets essential to the reliable operation of the Critical Assets.’’ 39 In Order No. 706, the Commission did not address whether or not the staged approach outlined above was the only method for identifying Critical Cyber Assets. Rather at that time, focus was placed on addressing specific concerns with the first step— the identification of Critical Assets. Recognizing CIP–002 as the cornerstone of the CIP Reliability Standards,40 a failure to accurately identify Critical Assets could greatly impact accurate Critical Cyber Asset identification and the overall applicability of the protection measures afforded in CIP– 003 through CIP–009. 43. In light of recent cybersecurity vulnerabilities, threats and attacks that have exploited the interconnectivity of cyber systems,41 the Commission seeks comments regarding the method of identification of Critical Cyber Assets 42 to ensure sufficiency and accuracy. The Commission recognizes that control systems that support Bulk-Power System reliability are ‘‘only as secure as their weakest links,’’ and that a single vulnerability opens the computer network and all other networks with which it is interconnected to potential malicious activity.43 Accordingly, the Commission believes that any criteria adopted for the purposes of identifying a Critical Cyber Asset under CIP–002 should be based upon a Cyber Asset’s connectivity and its potential to compromise the reliable operation 44 of 37 NERC Glossary of Terms at 11. 38 Id. 39 Id. 40 Order No. 706, 122 FERC ¶ 61,040 at P 234. include the discovery of Stuxnet, Night Dragon and RSA breaches from advanced persistent threats in July 2010, February 2011 and March 2011 respectively, where systems were compromised. 42 In Order No. 706, the Commission declined to direct a method for identifying Critical Cyber Assets, but stated that it may revisit this circumstance in a future proceeding. See Order No. 706, 122 FERC ¶ 61,040 at P 284. 43 North American Electric Reliability Corp., 130 FERC ¶ 61,211, at P 15 (2010). 44 16 U.S.C. 824o(a)(4). The term ‘‘reliable operation’’ means ‘‘operating the elements of the bulk-power system within equipment and electric system thermal, voltage, and stability limits so that instability, uncontrolled separation, or cascading 41 These PO 00000 Frm 00014 Fmt 4702 Sfmt 4702 58735 the Bulk-Power System, rather than focusing on the operation of any specific Critical Asset(s). The Commission seeks comments on this approach. 44. Further, the Commission seeks comments on how to ensure that the directives of Order No. 706 relative to CIP–002 with respect to the concerns discussed below are addressed, resulting in a method that will lead to sufficient and accurate Critical Cyber Asset identification. 45. The Commission believes that NERC should consider the following three strategies to meet the outstanding directives and seeks comments on these strategies. First, NERC should consider applicable features of the NIST Risk Management Framework to ensure protection of all cyber systems connected to the Bulk-Power System, including establishing CIP requirements based on entity functional characteristics rather than focusing on Critical Asset size. Second, such as in the consideration of misuse, NERC should consider mechanisms for identifying Critical Cyber Assets by examining all possible communication paths between a given cyber resource and any asset supporting a reliability function. Third, NERC should provide a method for review and approval of Critical Cyber Asset lists from external sources such as the Regional Entities or NERC. Each of these strategies is discussed below. 1. NIST Framework 46. In Order No. 706, the Commission directed NERC to ‘‘monitor the development and implementation’’ of cybersecurity standards then being developed by the National Institute of Standards and Technology (NIST).45 The Commission also directed NERC to consider the effectiveness of the NIST standards.46 At that time, the Commission directed NERC to address any NIST provisions that will better protect the Bulk-Power System in the Reliability Standards development process.47 While the Commission determined not to require NERC to adopt or incorporate elements of the NIST standards, Order No. 706 left open the option of revisiting the NIST standards at a later time.48 The Commission is not here proposing to direct that NERC use elements of the NIST standards. However, we continue failures of such system will not occur as a result of a sudden disturbance, including a cybersecurity incident, or unanticipated failure of system elements.’’ 45 Order No. 706, 122 FERC ¶ 61,040 at P 233. 46 Id. 47 Id. 48 Id. E:\FR\FM\22SEP1.SGM 22SEP1 58736 Federal Register / Vol. 76, No. 184 / Thursday, September 22, 2011 / Proposed Rules emcdonald on DSK5VPTVN1PROD with PROPOSALS to believe that the NIST framework could provide beneficial input into the NERC CIP Reliability Standards and we urge NERC to consider any such provisions that will better protect the Bulk-Power System. 47. The NIST Risk Management Framework was developed to manage the risks associated with all information systems, and offers a structured yet flexible approach that can now be applied to the electric industry. The NIST Risk Management Framework guides selection and specification of cybersecurity controls and measures necessary to protect individuals and the operations and assets of the organization, while considering effectiveness, efficiency, and constraints due to applicable laws, directives, policies, standards, or regulations. Each of the activities in the Risk Management Framework has an associated NIST security standard and/or guidance document that can be used by organizations implementing the framework. The management of risk is a key element. 48. Two primary features of the NIST Framework are: (1) Customizing protection to the mission of the cyber systems subject to protection (similar to the role identified by the NERC Functional Model); and (2) ensuring that all connected cyber systems associated with the Bulk-Power System, based on their function, receive some level of protection.49 The Bulk-Power System could benefit from each of these tested approaches. a. NIST Approach and the NERC Functional Model 49. The purpose of the NERC CIP Reliability Standards is to specify mandatory Requirements for responsible entities to establish, maintain, and preserve the cybersecurity of key information technology systems’ assets, the use of which is essential to reliable operation of the Bulk-Power System. The CIP Reliability Standards include Requirements which are based upon the functional roles of the responsible entities as specified in the NERC Functional Model.50 The identification of cyber systems and assets used to execute these functional roles should be the first step in identifying the systems for coverage under the CIP Reliability Standards for protection. The 49 NIST SP800–53, Section 1.4, Organizational Responsibilities. 50 Reliability Functional Model, Function Definitions and Functional Entities, Version 5, approved by NERC Board of Trustees May 2010; and, Reliability Functional Model Technical Document Version 5, approved by NERC Board of Trustees May 2010. VerDate Mar<15>2010 18:25 Sep 21, 2011 Jkt 223001 Functional Model should be used as a starting point when considering the applicability of the NIST Framework for securing the operation of cyber assets to provide for the Reliable Operation of the Bulk-Power System. b. NIST Tiered Approach 50. If applied to the Bulk-Power System, the NIST Framework would specify the level of protection appropriate for systems based upon their importance to the reliable operation of the Bulk-Power System. Cyber systems connected to the BulkPower System require availability, integrity, and confidentiality to effectively ensure the reliability of the Bulk-Power System. 51. The NIST Framework provides for a tiered approach to cybersecurity protection where protection of some type would be applied to all cyber assets connected to the Bulk-Power System. Under the NIST Framework, cyber assets whose compromise or loss of operability could result in a greater risk to Bulk-Power System reliability would be subject to more rigorous cybersecurity protections compared to a less important asset. The NIST Framework recognizes that all connected assets require a baseline level of protection to prevent attackers from gaining a foothold to launch further, even more devastating attacks on other critical systems. 52. Using the NIST framework, all cyber assets would also be reviewed to determine the appropriate level of cyber protection. The level of protection required for a given cyber asset is based upon its mission criticality and its innate technological risks. 2. Misuse of Control Systems 53. In Order No. 706, the Commission directed NERC to consider the misuse of control centers and control systems in the determination of Critical Assets.51 If a perpetrator is able to misuse an asset, the attacker may navigate across and between control system data networks in order to gain access to multiple sites, which could enable a coordinated multi-site attack. Recent cybersecurity incidents 52 illustrate the importance of restricting connectivity between control systems and external networks, emphasizing the inherent risk exposure created by networking critical cyber control systems. Future mechanisms for identifying when cyber assets require protection will have to examine all 51 Order No. 706, 122 FERC ¶ 61,040 at P 282. include the discovery of Stuxnet, Night Dragon and RSA breaches from advanced persistent threats in July 2010, February 2011 and March 2011 respectively, where systems were compromised. 52 These PO 00000 Frm 00015 Fmt 4702 Sfmt 4702 possible paths between a given cyber resource and any asset supporting a reliability function. 54. In Order No. 706, the Commission expressed concerns regarding the classification of control centers and the potential misuse of control systems.53 With regard to control centers, the Commission noted that responsible entities should be required to ‘‘examine the impact on reliability if the control centers are unavailable, due for example to power or communications failures, or denial of service attacks.’’ 54 In addition, the Commission stated that ‘‘[r]esponsible entities should also examine the impact that misuse of those control centers could have on the electric facilities they control and what the combined impact of those electric facilities could be on the reliability of the Bulk-Power System.’’ 55 The Commission stated that ‘‘when these matters are taken into account, it is difficult to envision a scenario in which a reliability coordinator, transmission operator or transmission owner control center or backup control center would not properly be identified as a critical asset.’’ 56 55. In addition, the Commission raised concerns about the misuse of a control system that controls more than one asset.57 Specifically, the Commission noted that multiple assets, whether multiple generating units, multiple transmission breakers, or perhaps even multiple substations, could be taken out of service simultaneously due to a failure or misuse of the control system. The Commission stated that even if one or all of the assets would not be considered as a Critical Asset on a stand alone basis, a simultaneous outage resulting from the single point of control might affect the reliability or operability of the Bulk-Power System. The Commission stated ‘‘[i]n that case, the common control system should be considered a Critical Cyber Asset.’’ 58 56. The Commission is concerned that the proposed CIP–002–4 bright line criteria do not adequately address the Commission’s prior directive regarding the classification of control centers or take the potential misuse of control systems into account in the identification of Critical Assets. For example, the proposed bright line criteria leave a number of Critical Assets 53 Order No. 706, 122 FERC ¶ 61,040 at P 280– 281. 54 Id. P 280. 55 Id. 56 Id. 57 Id. P 281. 58 Id. E:\FR\FM\22SEP1.SGM 22SEP1 Federal Register / Vol. 76, No. 184 / Thursday, September 22, 2011 / Proposed Rules with potentially unprotected cyber assets, including a total of 222 59 control centers with no legal obligation to apply cybersecurity measures. These potentially unprotected control centers involve an unknown number of associated control systems. 57. Consider the following example: Electric grid control system operation in part consists of the collection of raw data needed to run the grid, collected by a SCADA system from intelligent electronic devices (IEDs) (e.g., RTUs and synchrophasors). The SCADA data is typically aggregated by an energy management system (EMS). The EMS may, in some cases, calculate area control error (ACE) and transmit it to a balancing authority, which in turn makes computer based decisions about balancing load and generation. Those decisions are then used by the balancing authority or generation operator as part of an automated generation control (AGC) process. At each of these one or more sites, there are many data network interconnection points with other entities, (e.g., neighboring transmission operators, generation operators, and reliability coordinators) and additional connectivity to corporate data networks and elsewhere, employing several communications technologies. This results in a complex interconnection of cyber assets (including the data of those cyber assets) demanding vigilant protection.60 These cyber systems require comprehensive protection because the interconnected system is only as strong as its weakest link. 58. Any failure to take into account the interconnectivity of control systems represents a significant reliability gap. Where modern data networking technology is used for operation of the Bulk-Power System (e.g., control systems, synchrophasors, smart grid), a network-based cyber attack could result in multiple simultaneous outages of grid equipment and cyber systems alike through misuse of a single point of control (e.g., a SCADA control host system). Such an attack could take place by way of a cyber system associated 59 NERC June 30, 2011 Data Response at 3. generally, Ron Ross, Managing Enterprise Risk in Today’s World of Sophisticated Threats, National Institute of Standards and Technology (2007). emcdonald on DSK5VPTVN1PROD with PROPOSALS 60 See VerDate Mar<15>2010 18:25 Sep 21, 2011 Jkt 223001 58737 with an asset that falls outside the CIP– 002–4 bright line criteria yet is connected in common with other cyber systems on the Bulk-Power System. The risk of a cyber attack is greater now than when Order No. 706 was issued, as borne out by the recent increased frequency and sophistication of cyber attacks. It is critical, therefore, that the Commission’s concerns regarding the potential misuse of control centers and associated control systems be addressed in the CIP Reliability Standards. reserve a high level of independent authority to the registered entity to categorize and prioritize its cyber assets. Looking forward, it will be essential for NERC and the Regional Entities to actively review the designation of cyber assets that are subject to the CIP Reliability Standards, including those which span regions, in order to determine whether additional cyber assets should be protected. 3. Regional Perspective 59. In Order No. 706, the Commission directed NERC to ‘‘develop a process of external review and approval of critical asset lists based on a regional perspective.’’ 61 The Commission found that ‘‘Regional Entities must have a role in the external review to assure that there is sufficient accountability in the process [and] * * * because the Regional Entities and ERO are ultimately responsible for ensuring compliance with Reliability Standards.’’ 62 60. The Commission is concerned that the lack of a regional review in the identification of cyber assets might result in a reliability gap. In Order No. 706, the Commission expressed concerns regarding the need for developing a process of external review and approval of Critical Asset lists based on a regional perspective, and that such lists are considered from a wide-area view. This process would help to identify trends in Critical Asset identification. Further, while we recognize that individual circumstances may likely vary, an external review will provide an appropriate level of consistency.63 For example, reliability coordinators may communicate through a common system and compromise of that system could propagate across multiple regions. A cyber compromise can easily propagate across these data and control networks with potential adverse consequences to the Bulk-Power System on multi-region basis. 61. This problem may become exacerbated by any future revisions to the CIP Reliability Standards that opt to 62. In summary, the Commission proposes to approve NERC’s proposed Version 4 CIP Standards pursuant to section 215(d)(2) of the FPA. As discussed above, it appears that the Version 4 CIP Standards represent an improvement in three respects in that they: (1) Will result in the identification of certain types of Critical Assets that may not be identified under the current approach; (2) use bright line criteria to identify Critical Assets, thus limiting the discretion of responsible entities when identifying Critical Assets; and (3) provide a level of consistency and clarity regarding the identification of Critical Assets. 63. While we believe that the Version 4 CIP Reliability Standards satisfy the statutory standard for approval, we also believe that more improvement is needed. As NERC explains in its Petition, the Version 4 CIP Reliability Standards are intended as ‘‘interim’’ and future versions will build on Version 4. We believe that the electric industry, through the NERC standards development process, should continue to develop an approach to cybersecurity that is meaningful and comprehensive to assure that the nation’s electric grid is capable of withstanding a Cybersecurity Incident.64 As discussed above, we believe that some of the essential components of such a meaningful and comprehensive approach to cybersecurity are set forth in Order No. 706. 61 Order No. 706, 122 FERC ¶ 61,040 at P 329. P 327. 63 Id. P 322. 62 Id. PO 00000 Frm 00016 Fmt 4702 Sfmt 4702 4. Summary 64 Section 215(a) of the FPA defines Cybersecurity Incident as ‘‘a malicious act or suspicious event that disrupts, or was an attempt to disrupt, the operation of those programmable electronic devices and communication networks including hardware, software and data that are essential to the reliable operation of the Bulk-Power System.’’ E:\FR\FM\22SEP1.SGM 22SEP1 58738 Federal Register / Vol. 76, No. 184 / Thursday, September 22, 2011 / Proposed Rules 5. Reasonable Deadline for Full Compliance With Order No. 706 64. The Commission issued Order No. 706 on January 18, 2008. In Order No. 706, the Commission approved Version 1 of the CIP Reliability Standards while also directing modifications pursuant to section 215(d)(5) of the FPA, some of which are described above. Later approved versions of the CIP Reliability Standards, and now the proposed Version 4 CIP Reliability Standards, addressed some of the directives in Order No. 706, but other directives remain unsatisfied. 65. Over three years have elapsed since the Commission issued the Final Rule in January 2008. As discussed above, we believe that it is important for the successful implementation of a comprehensive approach to cybersecurity that NERC timely addresses the modifications directed by the Commission in Order No. 706. Accordingly, the Commission proposes to set a deadline for NERC to file the next version of the CIP Reliability Standards, which NERC indicates will address all outstanding Order No. 706 directives.65 This proposal is consistent with the views expressed in the January 2011 Audit Report of the Department of Energy’s Inspector General, who found ‘‘that the Commission could have, but did not impose specific deadlines for the ERO to incorporate changes to the CIP standards.’’ 66 Similarly, our proposal is responsive to the Audit Report finding that ‘‘the CIP standards implementation approach and schedule approved by the Commission were not adequate to ensure that systems-related risks to the Nation’s power grid were emcdonald on DSK5VPTVN1PROD with PROPOSALS 65 See NERC’s May 27, 2011 Responses to Data Requests, Response 1 (‘‘[t]he standard drafting team expects that the filing for the next version of the CIP Reliability Standards will address the remaining FERC Order No. 706 directives’’). 66 Department of Energy Inspector General Audit Report, Federal Energy Regulatory Commission’s Monitoring of Power Grid Cybersecurity at 6 (January 2011). VerDate Mar<15>2010 18:25 Sep 21, 2011 Jkt 223001 mitigated or addressed in a timely manner.’’ 67 66. The Commission understands that, under NERC’s timeline for the ongoing effort to address all outstanding Order No. 706 directives, it anticipates submitting the next version of the CIP Reliability Standards to the NERC Board of Trustees by the second quarter of 2012, and filing that version the Commission by the end of the third quarter of 2012.68 67. The Commission proposes to establish NERC’s current development timeline above as a deadline for compliance with the outstanding Order No. 706 CIP Standard directives. The Commission seeks comments from NERC and other parties concerning this proposal. Further, NERC and other parties may propose and support an alternative compliance deadline. IV. Information Collection Statement 68. The Office of Management and Budget (OMB) regulations require that OMB approve certain reporting and recordkeeping requirements (collections of information) imposed by an agency.69 The information contained here is also subject to review under section 3507(d) of the Paperwork Reduction Act of 1995.70 We will submit this proposed rule to OMB for review. 69. As stated above, the Commission previously approved Reliability Standards similar to the proposed Reliability Standards that are the subject of the current rulemaking.71 70. The principal differences in the information collection requirements and resulting burden imposed by the 67 Id. at 2. NERC’s May 27, 2011 Responses to Data Requests, Response 1. See also North American Electric Reliability Corporation Reliability Standards Development Plan 2011–2013 Informational Filing Pursuant to Section 310 of the NERC Rules of Procedure, Docket Nos. RM05–17– 000, RM05–25–000, RM06–16–000 at 14 (filed April 5, 2011). 69 5 CFR 1320.11. 70 44 U.S.C. 3507(d). 71 North American Electric Reliability Corporation, 130 FERC ¶ 61,271 (2010). 68 See PO 00000 Frm 00017 Fmt 4702 Sfmt 4702 proposed Reliability Standards in this rule are triggered by the proposed changes in Reliability Standard CIP– 002–4. The previous risk-based assessment methodology for identifying Critical Assets will be replaced by 17 uniform ‘‘bright line’’ criteria for identifying Critical Assets (in CIP–002– 4, Attachment 1, ‘‘Critical Asset Criteria’’). Proposed Reliability Standard CIP–002–4 would require each responsible entity to use the bright line criteria as a ‘‘checklist’’ to identify Critical Assets, initially and in an annual review, instead of performing the more technical and individualized risk analysis involved in complying with the currently-effective CIP Reliability Standards. As in past versions, each Responsible Entity will then identify the Critical Cyber Assets associated with its updated list of Critical Assets. If application of the bright line criteria result in the identification of new Critical Cyber Assets, such assets become subject to the remaining standards (proposed CIP– 003–4, CIP–004–4, CIP–005–4a, CIP– 006–4c, CIP–007–4, CIP–008–4, and CIP–009–4), and the information collection requirements contained therein. 71. We estimate that the burden associated with the annual review of the assets (by the estimated 1,501 entities) will be simplified by the ‘‘Critical Asset Criteria’’ in proposed Reliability Standard CIP–002–4. Rather than each entity annually reviewing and updating a Risk-Based Assessment Methodology that frequently required technical analysis and judgment decisions, the proposed bright line criteria will provide a straight forward checklist for all entities to use. Thus, we estimate that the proposal will reduce the burden associated with the annual review, as well as provide a consistent and clear set of criteria for all entities to follow. 72. The estimated changes to burden as contained in the proposed rule in RM11–11 follow. E:\FR\FM\22SEP1.SGM 22SEP1 Federal Register / Vol. 76, No. 184 / Thursday, September 22, 2011 / Proposed Rules FERC–725B Data collection (per proposed Version 4) Net Total ............... Average number of annual responses per respondent Average number of burden hours per response 73 Effect of NOPR in RM11–11, on total annual hours (1) Entities that (previously and now) will identify at least one Critical Cyber Asset [category a]. Entities that (previously and now) will not identify any Critical Cyber Assets [category b]. Entities that will newly identify a Critical Asset/Critical Cyber Asset due to the requirements in RM11– 11 74 [category c]. Number of respondents 72 (2) (3) emcdonald on DSK5VPTVN1PROD with PROPOSALS Annual burden hours upon implementation of RM11–11 (1) × (2) × (3) 345 [no change] .......... 1 1,880 [reduction of 40 hours from 1,920 to 1,880 hours]. reduction of 13,800 hours. 648,600 1,144 [reduction of 12 entities from 1156 to 1,144]. 1 120 [no change] .......... Reduction of 1,440 hours [for the 12 entities]. 137,280 increase of 12 [formerly 0]. 1 3,840 75 ....................... increase of 46,080 ...... 46,080 ................................ ..................................... +30,840 ....................... 831,960 1,501 72 ....................... The revisions to the cost estimates based on requirements of this proposed rule are: • Each entity that has identified Critical Cyber Assets has a reduction of 40 hours (345 entities × 40 hrs. × @$96/ hour = $1,324,800 reduction). 72 The NERC Compliance Registry as of 9/28/2010 indicated that 2,079 entities were registered for NERC’s compliance program. Of these, 2,057 were identified as being U.S. entities. Staff concluded that of the 2,057 U.S. entities, approximately 1,501 were registered for at least one CIP related function. According to an April 7, 2009 memo to industry, NERC noted that only 31% of entities responding to an earlier survey reported that they had at least one Critical Asset, and only 23% reported having a Critical Cyber Asset. Staff applied the 23% (an estimate unchanged for Version 4 standards) to the 1,501 figure to estimate the number of entities that identified Critical Assets under Version 3 CIP Standards. 73 Calculations for figures prior to applying reductions: Respondent category b: 3 employees × (working 50%) × (40 hrs/week) × (2 weeks) = 120 hours. Respondent category c: 20 employees × (working 50%) × (40 hrs/week) × (8 weeks) = 3200 hours. 20 employees × (working 20%) × (3200 hrs) = 640 hours. Total = 3840. Respondent category a: 50% of 3840 hours (category d) = 1920. 74 We estimate 12 (or 1%) of the existing entities that formerly had no identified Critical Cyber Assets will have them under the proposed Reliability Standards. This proposed rule does not affect the burden for the 6 new U.S. Entities that were estimated to newly register or otherwise become subject to the CIP Standards each year in FERC–725B, and therefore are not included in this chart. 75 This estimated burden estimate applies only to the first three year audit cycle. In subsequent audit cycles these entities will move into category a, or be removed from the burden as an entity that no longer is registered for a CIP related function. VerDate Mar<15>2010 58739 18:25 Sep 21, 2011 Jkt 223001 • 12 Entities that formerly had not identified Critical Cyber Assets, but now will have them, has Æ A reduction of 120 hours and an increase of 3,840 hours (for a net increase of 3,720 annual hours), giving 12 entities × 3,720 hrs.@$96/hour = $4,285,440. Æ Storage costs = 12 entities@$15.25/ entity = $183. Total Net Annual Cost for the FERC– 725B requirements contained in the NOPR in RM11–11 = $2,960,823 ($4,285,440 + $183 ¥$1,324,800). The estimated hourly rate of $96 is the average cost of legal services ($230 per hour), technical employees ($40 per hour) and administrative support ($18 per hour), based on hourly rates from the Bureau of Labor Statistics (BLS) and the 2009 Billing Rates and Practices Survey Report.76 The $15.25 per entity for storage costs is an estimate based on the average costs to service and store 1 GB of data to demonstrate compliance with the CIP Standards.77 Title: Mandatory Reliability Standards, Version 4 Critical Infrastructure Protection Standards. Action: Proposed Collection FERC– 725B. OMB Control No.: 1902–0248. 76 Bureau of Labor Statistics figures were obtained from https://www.bls.gov/oes/current/ naics2_22.htm, and 2009 Billing Rates figure were obtained from https://www.marylandlawyerblog.com /2009/07/average_hourly_rate_for_lawyer.html. Legal services were based on the national average billing rate (contracting out) from the above report and BLS hourly earnings (in-house personnel). It is assumed that 25% of respondents have in-house legal personnel. 77 Based on the aggregate cost of an advanced data protection server. PO 00000 Frm 00018 Fmt 4702 Sfmt 4702 Respondents: Businesses or other forprofit institutions; not-for-profit institutions. Frequency of Responses: On Occasion. Necessity of the Information: This proposed rule proposes to approve the requested modifications to Reliability Standards pertaining to critical infrastructure protection. The proposed Reliability Standards help ensure the reliable operation of the Bulk-Power System by providing a cybersecurity framework for the identification and protection of Critical Assets and associated Critical Cyber Assets. As discussed above, the Commission proposes to approve NERC’s proposed Version 4 CIP Standards pursuant to section 215(d)(2) of the FPA because they represent an improvement to the currently-effective CIP Reliability Standards. Internal Review: The Commission has reviewed the proposed Reliability Standards and made a determination that its action is necessary to implement section 215 of the FPA. 73. Interested persons may obtain information on the reporting requirements by contacting the following: Federal Energy Regulatory Commission, 888 First Street, NE., Washington, DC 20426 [Attention: Ellen Brown, Office of the Executive Director, e-mail: DataClearance@ferc.gov, phone: (202) 502–8663, fax: (202) 273–0873]. 74. For submitting comments concerning the collection(s) of information and the associated burden estimate(s), please send your comments to the Commission, and to the Office of Management and Budget, Office of Information and Regulatory Affairs, E:\FR\FM\22SEP1.SGM 22SEP1 58740 Federal Register / Vol. 76, No. 184 / Thursday, September 22, 2011 / Proposed Rules VI. Regulatory Flexibility Act Certification 76. The Regulatory Flexibility Act of 1980 (RFA) 80 generally requires a description and analysis of final rules that will have a significant economic impact on a substantial number of small entities. The RFA mandates consideration of regulatory alternatives that accomplish the stated objectives of a proposed rule and that minimize any significant economic impact on a substantial number of small entities. The Small Business Administration’s (SBA) Office of Size Standards develops the numerical definition of a small business.81 The SBA has established a size standard for electric utilities, stating that a firm is small if, including its affiliates, it is primarily engaged in the transmission, generation and/or distribution of electric energy for sale and its total electric output for the preceding twelve months did not exceed four million megawatt hours.82 77. The Commission analyzed the affect of the proposed rule on small entities. The Commission’s analysis found that the DOE’s Energy Information Administration (EIA) reports that there were 3,276 electric utility companies in the United States in 2009,83 and 3,015 of these electric utilities qualify as small entities under the Small Business Administration (SBA) definition. Of these 3,276 electric utility companies, the EIA subdivides them as follows: (1) 875 Cooperatives of which 843 are small entity cooperatives; (2) 1,841 municipal utilities, of which 1,826 are small entity municipal utilities; (3) 128 political subdivisions, of which 115 are small entity political subdivisions; (4) 171 power marketers, of which 113 individually could be considered small entity power marketers; 84 (5) 200 privately owned utilities, of which 93 could be considered small entity private utilities; (6) 24 state organizations, of which 14 are small entity state organizations; and (7) 9 federal organizations of which 4 are small entity federal organizations. 78. Many of the entities that have not previously identified Critical Assets and Critical Cyber Assets are considered small entities. The new CIP version 4 bright line criteria generally result in the identification of relatively larger BulkPower System equipment as Critical Assets. For the most part, the small entities do not own or operate these larger facilities. There is a limited possibility that these entities would have facilities that meet the bright line criteria and therefore be subject to the full CIP standards (CIP–002 through CIP–009). The Commission expects only a marginal increase in the number of small entities that will identify at least one Critical Asset under the Version 4 CIP Reliability Standards that have not done so previously. 79. The Commission estimates that only one percent (12) of the small and medium-sized entities that have not previously identified Critical Assets and Critical Cyber Assets will have an increased cost due to the proposed Reliability Standards and their identification of new Critical Cyber Assets. For each of those 12 entities, we anticipate a cost increase associated with creating a cyber security program along with the actual cyber security protections associated with the identified Critical Cyber Assets. The Commission requests comment on the potential implementation cost and subsequent cost increases that could be experienced by such small entities. Small and medium-sized entities that 78 Order No. 486, Regulations Implementing the National Environmental Policy Act of 1969, FERC Stats. & Regs., Regulations Preambles 1986–1990 ¶ 30,783 (1987). 79 18 CFR 380.4(a)(2)(ii). 80 5 U.S.C. 601–612. 81 13 CFR 121.101. 82 13 CFR 121.201, Sector 22, Utilities & n.1. 83 See Energy Information Administration Database, Form EIA–861, Dept. of Energy (2009), available at https://www.eia.doe.gov/cneaf/ electricity/page/eia861.html. 84 Most of these small entity power marketers and private utilities are affiliated with others and, therefore, do not qualify as small entities under the SBA definition. Washington, DC 20503 [Attention: Desk Officer for the Federal Energy Regulatory Commission, phone: (202) 395–4638, fax: (202) 395–7285]. For security reasons, comments to OMB should be submitted by e-mail to: oira_submission@omb.eop.gov. Comments submitted to OMB should include Docket Number RM11–11 and OMB Control Number 1902–0248. emcdonald on DSK5VPTVN1PROD with PROPOSALS V. Environmental Analysis 75. The Commission is required to prepare an Environmental Assessment or an Environmental Impact Statement for any action that may have a significant adverse effect on the human environment.78 The Commission has categorically excluded certain actions from this requirement as not having a significant effect on the human environment. Included in the exclusion are rules that are clarifying, corrective, or procedural or that do not substantially change the effect of the regulations being amended.79 The actions proposed here fall within this categorical exclusion in the Commission’s regulations. VerDate Mar<15>2010 18:25 Sep 21, 2011 Jkt 223001 PO 00000 Frm 00019 Fmt 4702 Sfmt 4702 continue to have no Critical Assets will not see any change in their burden. 80. In general, the majority of small entities are not required to comply with mandatory Reliability Standards because they are not regulated by NERC pursuant to the NERC Registry Criteria. Moreover, a small entity that is registered but does not identify critical cyber assets pursuant to CIP–002–4 will not have compliance obligations pursuant to CIP–003–4 through CIP– 009–4. 81. The Commission also investigated possible alternatives. These included the Commission’s adoption in Order No. 693 of the NERC definition of bulk electric system, which reduces significantly the number of small entities responsible for compliance with mandatory Reliability Standards. The Commission also noted that small entities could join a joint action agency or similar organization, which could accept responsibility for compliance with mandatory Reliability Standards on behalf of its members and also may divide the responsibility for compliance with its members. 82. Based on the foregoing, the Commission certifies that the proposed Reliability Standards will not have a significant impact on a substantial number of small entities. Accordingly, no regulatory flexibility analysis is required. VII. Comment Procedures 83. The Commission invites interested persons to submit comments on the matters and issues proposed in this notice to be adopted, including any related matters or alternative proposals that commenters may wish to discuss. Comments are due November 21, 2011. Comments must refer to Docket No. RM11–11–000, and must include the commenter’s name, the organization they represent, if applicable, and their address in their comments. 84. The Commission encourages comments to be filed electronically via the eFiling link on the Commission’s Web site at https://www.ferc.gov. The Commission accepts most standard word processing formats. Documents created electronically using word processing software should be filed in native applications or print-to-PDF format and not in a scanned format. Commenters filing electronically do not need to make a paper filing. 85. Commenters unable to file comments electronically must mail or hand deliver an original copy of their comments to: Federal Energy Regulatory Commission, Secretary of the Commission, 888 First Street, NE., Washington, DC 20426. E:\FR\FM\22SEP1.SGM 22SEP1 Federal Register / Vol. 76, No. 184 / Thursday, September 22, 2011 / Proposed Rules 86. All comments will be placed in the Commission’s public files and may be viewed, printed, or downloaded remotely as described in the Document Availability section below. Commenters on this proposal are not required to serve copies of their comments on other commenters. VIII. Document Availability 87. In addition to publishing the full text of this document in the Federal Register, the Commission provides all interested persons an opportunity to view and/or print the contents of this document via the Internet through the Commission’s Home Page (https:// www.ferc.gov) and in the Commission’s Public Reference Room during normal business hours (8:30 a.m. to 5 p.m. Eastern time) at 888 First Street, NE., Room 2A, Washington, DC 20426. 88. From the Commission’s Home Page on the Internet, this information is available on eLibrary. The full text of this document is available on eLibrary in PDF and Microsoft Word format for viewing, printing, and/or downloading. To access this document in eLibrary, type the docket number excluding the last three digits of this document in the docket number field. 89. User assistance is available for eLibrary and the Commission’s Web site during normal business hours from FERC Online Support at 202–502–6652 (toll free at 1–866–208–3676) or e-mail at ferconlinesupport@ferc.gov, or the Public Reference Room at (202) 502– 8371, TTY (202) 502–8659. E-mail the Public Reference Room at public.referenceroom@ferc.gov. DATES: List of Subjects in 18 CFR Part 40 58741 ADDRESSES: Electric power, Electric utilities, Reporting and recordkeeping requirements. By direction of the Commission. Nathaniel J. Davis, Sr., Deputy Secretary. [FR Doc. 2011–24102 Filed 9–21–11; 8:45 am] BILLING CODE 6717–01–P DEPARTMENT OF ENERGY Federal Energy Regulatory Commission 18 CFR Part 284 [Docket No. RM11–4–000] Storage Reporting Requirements of Interstate and Intrastate Natural Gas Companies Federal Energy Regulatory Commission. ACTION: Notice of proposed rulemaking. AGENCY: The Commission proposes to eliminate the semi-annual storage reporting requirements for Interstate and Intrastate Natural Gas Companies that are currently codified in our regulations. The Commission finds that the reports now proposed for elimination are largely duplicative with other reporting requirements. SUMMARY: Comments are due November 21, 2011. Comments, identified by docket number, may be filed in the following methods: • Electronic Filing through https:// www.ferc.gov. Documents created electronically using word processing software should be filed in native applications or print-to-PDF format and not in a scanned format. • Mail/Hand Delivery: Those unable to file electronically may mail or handdeliver an original of their comments to: Federal Energy Regulatory Commission, Secretary of the Commission, 888 First Street, NE., Washington, DC 20426. Instructions: For detailed instructions on submitting comments and additional information on the rulemaking process, see the Comment Procedures Section of this document. FOR FURTHER INFORMATION CONTACT: Vince Mareino (Legal Information), Office of the General Counsel, Federal Energy Regulatory Commission, 888 First Street, NE., Washington, DC 20426, (202) 502–6167, Vince.Mareino@ferc.gov. Thomas Russo (Technical Information), Office of Enforcement, Federal Energy Regulatory Commission, 888 First Street, NE., Washington, DC 20426, (202) 502–8792, Thomas.Russo@ferc.gov. SUPPLEMENTARY INFORMATION: Table of Contents Paragraph Nos. I. Background ............................................................................................................................................................................................ A. Current Regulations ...................................................................................................................................................................... B. Notice of Inquiry ........................................................................................................................................................................... C. Comments to the Notice of Inquiry ............................................................................................................................................. D. Executive Orders .......................................................................................................................................................................... II. Discussion ............................................................................................................................................................................................ A. Interstate Storage Reports ............................................................................................................................................................ B. Intrastate and Hinshaw Storage Reports ..................................................................................................................................... III. Regulatory Requirements ................................................................................................................................................................... A. Information Collection Statement ............................................................................................................................................... B. Environmental Analysis ............................................................................................................................................................... C. Regulatory Flexibility Act [Analysis Or Certification] ............................................................................................................... D. Comment Procedures ................................................................................................................................................................... E. Document Availability .................................................................................................................................................................. emcdonald on DSK5VPTVN1PROD with PROPOSALS September 15, 2011. 1. The Commission proposes to eliminate the semi-annual storage reporting requirements for: (1) Interstate natural gas companies subject to the Commission’s jurisdiction under the Natural Gas Act (NGA), as codified in 18 CFR 284.13(e); (2) intrastate pipelines providing interstate services pursuant to section 311 of the Natural Gas Policy VerDate Mar<15>2010 18:25 Sep 21, 2011 Jkt 223001 Act of 1978 (NGPA),1 as codified in 18 CFR 284.126(c); and (3) Hinshaw 2 1 15 U.S.C. 3372. 1(c) of the NGA exempts from the Commission’s NGA jurisdiction pipelines which transport gas in interstate commerce if (1) They receive natural gas at or within the boundary of a state, (2) all the gas is consumed within that state, and (3) the pipeline is regulated by a state Commission. This exemption is referred to as the Hinshaw exemption after the Congressman who introduced the bill amending the NGA to include 2 Section PO 00000 Frm 00020 Fmt 4702 Sfmt 4702 2 2 7 9 11 13 14 24 29 29 34 35 36 40 pipelines providing interstate services subject to the Commission’s Natural Gas Act (NGA) jurisdiction pursuant to blanket certificates issued under § 284.224 of the Commission’s regulations, as also codified in 18 CFR § 1(c). See ANR Pipeline Co. v. Federal Energy Regulatory Comm’n, 71 F.3d 897, 898 (1995) (briefly summarizing the history of the Hinshaw exemption). E:\FR\FM\22SEP1.SGM 22SEP1

Agencies

[Federal Register Volume 76, Number 184 (Thursday, September 22, 2011)]
[Proposed Rules]
[Pages 58730-58741]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2011-24102]



[[Page 58730]]

=======================================================================
-----------------------------------------------------------------------

DEPARTMENT OF ENERGY

Federal Energy Regulatory Commission

18 CFR Part 40

[Docket No. RM11-11-000]


Version 4 Critical Infrastructure Protection Reliability 
Standards

AGENCY: Federal Energy Regulatory Commission.

ACTION: 

-----------------------------------------------------------------------N
otice of proposed rulemaking.

SUMMARY: Under section 215 of the Federal Power Act, the Federal Energy 
Regulatory Commission (Commission) proposes to approve eight modified 
Critical Infrastructure Protection (CIP) Reliability Standards, CIP-
002-4 through CIP-009-4, developed and submitted to the Commission for 
approval by the North American Electric Reliability Corporation (NERC), 
the Electric Reliability Organization certified by the Commission. In 
general, the CIP Reliability Standards provide a cybersecurity 
framework for the identification and protection of ``Critical Cyber 
Assets'' to support the reliable operation of the Bulk-Power System. 
Proposed Reliability Standard CIP-002-4 requires the identification and 
documentation of Critical Cyber Assets associated with Critical Assets 
that support the reliable operation of the Bulk-Power System. The 
``Version 4'' CIP Reliability Standards propose to modify CIP-002-4 to 
include ``bright line'' criteria for the identification of Critical 
Assets. The proposed Version 4 CIP Reliability Standards would replace 
the currently effective Version 3 CIP Reliability Standards. The 
Commission also proposes to approve the related Violation Risk Factors 
and Violation Severity Levels with modifications, the implementation 
plan, and effective date proposed by NERC.

DATES: Comments are due November 21, 2011.

ADDRESSES: You may submit comments, identified by docket number and in 
accordance with the requirements posted on the Commission's Web site 
https://www.ferc.gov. Comments may be submitted by any of the following 
methods:
     Agency Web Site: Documents created electronically using 
word processing software should be filed in native applications or 
print-to-PDF format and not in a scanned format, at https://www.ferc.gov/docs-filing/efiling.asp.
     Mail/Hand Delivery: Commenters unable to file comments 
electronically must mail or hand deliver an original copy of their 
comments to: Federal Energy Regulatory Commission, Secretary of the 
Commission, 888 First Street, NE., Washington, DC 20426. These 
requirements can be found on the Commission's Web site, see, e.g., the 
``Quick Reference Guide for Paper Submissions,'' available at https://www.ferc.gov/docs-filing/efiling.asp or via phone from FERC Online 
Support at 202-502-6652 or toll-free at 1-866-208-3676.

FOR FURTHER INFORMATION CONTACT: 

Jan Bargen (Technical Information), Office of Electric Reliability, 
Division of Logistics and Security, Federal Energy Regulatory 
Commission, 888 First Street, NE., Washington, DC 20426, (202) 502-
6333.
Edward Franks (Technical Information), Office of Electric Reliability, 
Division of Logistics and Security, Federal Energy Regulatory 
Commission, 888 First Street, NE., Washington, DC 20426, (202) 502-
6311.
Kevin Ryan (Legal Information), Office of the General Counsel, Federal 
Energy Regulatory Commission, 888 First Street, NE., Washington, DC 
20426, (202) 502-6840.
Matthew Vlissides (Legal Information), Office of the General Counsel, 
Federal Energy Regulatory Commission, 888 First Street, NE., 
Washington, DC 20426, (202) 502-8408.

SUPPLEMENTARY INFORMATION: 

September 15, 2011.
    1. Under section 215 of the Federal Power Act (FPA),\1\ the 
Commission proposes to approve eight modified Critical Infrastructure 
Protection (CIP) Reliability Standards, CIP-002-4 through CIP-009-4. 
The proposed ``Version 4'' CIP Standards were developed and submitted 
for approval to the Commission by the North American Electric 
Reliability Corporation (NERC), which the Commission certified as the 
Electric Reliability Organization (ERO) responsible for developing and 
enforcing mandatory Reliability Standards.\2\ In general, the CIP 
Reliability Standards provide a cybersecurity framework for the 
identification and protection of ``Critical Cyber Assets'' to support 
the reliable operation of the Bulk-Power System.\3\ In particular, the 
Version 4 CIP Reliability Standards propose to modify CIP-002-4 to 
include ``bright line'' criteria for the identification of Critical 
Assets, in lieu of the currently-required risk-based assessment 
methodology that is developed and applied by applicable entities. In 
addition, NERC developed proposed conforming modifications to the 
remaining cybersecurity Reliability Standards, CIP-003-4 through CIP-
009-4.
---------------------------------------------------------------------------

    \1\ 16 U.S.C. 824o (2006).
    \2\ North American Electric Reliability Corp., 116 FERC ] 
61,062, order on reh'g & compliance, 117 FERC ] 61,126 (2006), aff'd 
sub nom. Alcoa, Inc. v. FERC, 564 F.3d 1342 (D.C. Cir. 2009).
    \3\ The NERC Glossary of Terms defines Critical Assets to mean 
``Facilities, systems, and equipment which, if destroyed, degraded, 
or otherwise rendered unavailable, would affect the reliability or 
operability of the Bulk Electric System.''
---------------------------------------------------------------------------

    2. The Commission proposes to approve Version 4, the Violation Risk 
Factors (VRFs),the Violation Severity Levels (VSLs) with modifications, 
the implementation plan, and effective date proposed by NERC. The 
Commission also proposes to approve the retirement of the currently 
effective Version 3 CIP Reliability Standards, CIP-002-3 to CIP-009-3. 
The Commission seeks comments on these proposals to approve.
    3. While we propose to approve the Version 4 CIP Standards, like 
NERC, we recognize that the Version 4 CIP Standards represent an 
``interim step'' \4\ to addressing all of the outstanding directives 
set forth in Order No. 706.\5\ We believe that the electric industry, 
through the NERC standards development process, should continue to 
develop an approach to cybersecurity that is meaningful and 
comprehensive to assure that the nation's electric grid is capable of 
withstanding a Cybersecurity Incident.\6\ Below, we reiterate several 
topics set forth in Order No. 706 that pertain to a tiered approach to 
identifying Cyber Assets, protection from misuse, and a regional 
perspective. We expect NERC will continue to improve the CIP Standards 
to address these and other outstanding matters addressed in Order No. 
706.
---------------------------------------------------------------------------

    \4\ NERC Petition at 6.
    \5\ Mandatory Reliability Standards for Critical Infrastructure 
Protection, Order No. 706, 122 FERC ] 61,040, order on reh'g, Order 
No. 706-A, 123 FERC ] 61,174 (2008), order on clarification, Order 
No. 706-B, 126 FERC ] 61,229 (2009).
    \6\ Section 215(a) of the FPA defines Cybersecurity Incident as 
``a malicious act or suspicious event that disrupts, or was an 
attempt to disrupt, the operation of those programmable electronic 
devices and communication networks including hardware, software and 
data that are essential to the reliable operation of the Bulk-Power 
System.''
---------------------------------------------------------------------------

    4. Moreover, as discussed below, the Commission seeks comments from 
NERC and other interested persons on establishing a reasonable deadline 
for NERC to satisfy the outstanding directives in Order No. 706 
pertaining to the CIP Standards, using NERC's development timeline.

[[Page 58731]]

I. Background

A. Mandatory Reliability Standards

    5. Section 215 of the FPA requires a Commission-certified ERO to 
develop mandatory and enforceable Reliability Standards, which are 
subject to Commission review and approval. Once approved, the 
Reliability Standards may be enforced by the ERO, subject to Commission 
oversight, or by the Commission independently.\7\
---------------------------------------------------------------------------

    \7\ See 16 U.S.C. 824o(e).
---------------------------------------------------------------------------

    6. Pursuant to section 215 of the FPA, the Commission established a 
process to select and certify an ERO \8\ and, subsequently, certified 
NERC as the ERO.\9\ On January 18, 2008, the Commission issued Order 
No. 706 approving eight CIP Reliability Standards proposed by NERC.
---------------------------------------------------------------------------

    \8\ Rules Concerning Certification of the Electric Reliability 
Organization; and Procedures for the Establishment, Approval and 
Enforcement of Electric Reliability Standards, Order No. 672, FERC 
Stats. & Regs. ] 31,204, order on reh'g, Order No. 672-A, FERC 
Stats. & Regs. ] 31,212 (2006).
    \9\ North American Electric Reliability Corp., 116 FERC ] 
61,062, order on reh'g & compliance, 117 FERC ] 61,126 (2006), aff'd 
sub nom., Alcoa, Inc. v. FERC, 564 F.3d 1342 (DC Cir. 2009).
---------------------------------------------------------------------------

    7. In addition, pursuant to section 215(d)(5) of the FPA,\10\ the 
Commission directed NERC to develop modifications to the CIP 
Reliability Standards to address various concerns discussed in the 
Final Rule. In relevant part, the Commission directed the ERO to 
address the following issues regarding CIP-002-1: (1) Need for ERO 
guidance regarding the risk-based assessment methodology for 
identifying Critical Assets; (2) scope of Critical Assets and Critical 
Cyber Assets; (3) internal, management, approval of the risk-based 
assessment; (4) external review of Critical Assets identification; and 
(5) interdependency between Critical Assets of the Bulk-Power System 
and other critical infrastructures. Subsequently, the Commission 
approved Version 2 and Version 3 of the CIP Reliability Standards, each 
version including changes responsive to some but not all of the 
directives in Order No. 706.\11\
---------------------------------------------------------------------------

    \10\ 16 U.S.C. 824o(d)(5).
    \11\ North American Electric Reliability Corp., 128 FERC ] 
61,291 (2009), order denying reh'g and granting clarification, 129 
FERC ] 61,236 (2009) (approving Version 2 of the CIP Reliability 
Standards); North American Electric Reliability Corp., 130 FERC ] 
61,271 (2010) (approving Version 3 of the CIP Reliability 
Standards).
---------------------------------------------------------------------------

B. Current Version 3 CIP Reliability Standards

    8. Reliability Standard CIP-002-3 addresses the identification of 
Critical Assets and associated Critical Cyber Assets. Pursuant to CIP-
002-3, a responsible entity must develop a risk-based assessment 
methodology to identify its Critical Assets. Requirement R1 specifies 
certain types of assets that an assessment must consider for Critical 
Asset status and also allows the consideration of additional assets 
that the responsible entity deems appropriate. Requirement R2 requires 
the responsible entity to develop a list of Critical Assets based on an 
annual application of the risk-based assessment methodology developed 
pursuant to Requirement R1. Requirement R3 provides that the 
responsible entity must use the list of Critical Assets to develop a 
list of associated Critical Cyber Assets that are essential to the 
operation of the Critical Assets.
    9. In addition, the Commission approved the following ``Version 3'' 
CIP Standards:
     CIP-003-3 (Security Management Controls);
     CIP-004-3 (Personnel & Training);
     CIP-005-3 (Electronic Security Perimeter(s));
     CIP-006-3 (Physical Security of Critical Cyber Assets);
     CIP-007-3 (Systems Security Management);
     CIP-008-3 (Incident Reporting and Response Planning);
     CIP-009-3 (Recovery Plans for Critical Cyber Assets).

II. Proposed Version 4 CIP Reliability Standards

A. NERC Petition

    10. On February 10, 2011, NERC filed a petition seeking Commission 
approval of proposed Reliability Standards CIP-002-4 to CIP-009-4 and 
requesting the concurrent retirement of the currently effective Version 
3 CIP Reliability Standards, CIP-002-3 to CIP-009-3.\12\ The principal 
differences are found in CIP-002, where NERC replaced the risk-based 
assessment methodology for identifying Critical Assets with 17 uniform 
bright line criteria for identifying Critical Assets. NERC does not 
propose any changes to the process of identifying the associated 
Critical Cyber Assets that are then subject to the cyber security 
protections required by CIP-003 through CIP-009. NERC also submitted 
proposed VRFs and VSLs and an implementation plan governing the 
transition to Version 4. NERC proposed that the Version 4 CIP 
Reliability Standards become effective the first day of the eighth 
calendar quarter after applicable regulatory approvals have been 
received.
---------------------------------------------------------------------------

    \12\ NERC Petition at 1. The proposed Reliability Standards are 
not attached to the NOPR. They are, however, available on the 
Commission's eLibrary document retrieval system in Docket No. RM11-
11-000 and are available on the ERO's Web site, https://www.nerc.com. Reliability Standards approved by the Commission are 
not codified in the CFR.
---------------------------------------------------------------------------

    11. On April 12, 2011, NERC made an errata filing correcting 
certain errors in the petition and furnishing corrected exhibits and 
the standard drafting team minutes. In the errata, NERC also replaced 
the VRFs and VSLs in the February 10 petition with new proposed VRFs 
and VSLs.\13\
---------------------------------------------------------------------------

    \13\ NERC states that the Version 4 VRFs and VSLs are carried 
over in part from the VRFs and VSLs in the Version 3 CIP Reliability 
Standards. NERC Petition at 46. The Commission approved the Version 
2 and 3 VRFs and VSLs in Docket Nos. RD10-6-001 and RD09-7-003 on 
January 20, 2011 but required NERC to make modifications in a 
compliance filing due by March 21, 2011. North American Electric 
Reliability Corporation, 134 FERC ] 61,045 (2011). The February 10 
petition did not carry over the modified Version 3 VRFs and VSLs 
since it was filed before the March 21 compliance filing. NERC 
submitted new Version 4 VRFs and VSLs that carried over the modified 
Version 3 VRFs and VSLs in the April 12 errata. On June 6, 2011, 
NERC filed the March 21, 2011 compliance filing in the present 
docket, Docket No. RM11-11-000.
---------------------------------------------------------------------------

    12. In its Petition, NERC states that the Version 4 CIP Standards 
satisfy the Commission's criteria, set forth in Order No. 672, for 
determining whether a proposed Reliability Standard is just, 
reasonable, not unduly discriminatory or preferential and in the public 
interest.\14\ According to NERC, CIP-002-4 achieves a specified 
reliability goal by requiring the identification and documentation of 
Critical Cyber Assets associated with Critical Assets that support the 
reliable operation of the Bulk-Power System. NERC opines that the 
Reliability Standard ``improves reliability by establishing uniform 
criteria across all Responsible Entities for the identification of 
Critical Assets.'' \15\ Further, NERC states that CIP-002-4 contains a 
technically sound method to achieve its reliability goal by requiring 
the identification and documentation of Critical Assets through the 
application of the criteria set forth in Attachment 1 of CIP-002-4.
---------------------------------------------------------------------------

    \14\ Order No. 672, FERC Stats. & Regs. ] 31,204 at P 323-337.
    \15\ NERC Petition at 4.
---------------------------------------------------------------------------

    13. NERC states that CIP-002-4 establishes clear and uniform 
criteria for identifying Critical Assets on the Bulk-Power System.\16\ 
NERC also states that CIP-002-4 does not reflect any differentiation in 
requirements based on size of the responsible entity. NERC asserts that 
CIP-002-4 will not have negative effects on competition or restriction 
of the grid. NERC also contends that the two-year implementation period 
for CIP-002-4 is reasonable given the time it will take responsible 
entities to determine

[[Page 58732]]

whether assets meet the criteria included in Attachment 1 and to 
implement the controls required in CIP-003-4 through CIP-009-4 for the 
newly identified assets.
---------------------------------------------------------------------------

    \16\ Id. at 38.
---------------------------------------------------------------------------

    14. Finally, NERC acknowledges that CIP-002-4 addresses some, but 
not all, of the Commission's directives in Order No. 706. NERC explains 
that the standard drafting team limited the scope of requirements in 
the development of CIP Version 4 ``as an interim step'' limited to the 
concerns raised by the Commission regarding CIP-002.\17\ NERC states 
that it has taken a ``phased'' approach to meeting the Commission's 
directives from Order No. 706 and, according to NERC, the standard 
drafting team continues to address the remaining Commission directives. 
According to NERC, the team will build on the bright line approach of 
CIP Version 4.\18\
---------------------------------------------------------------------------

    \17\ NERC Petition at 6 (citing Order No. 706, 122 FERC ] 61,040 
at P 236).
    \18\ NERC Petition at 6.
---------------------------------------------------------------------------

B. Proposed Reliability Standard CIP-002-4

    15. Proposed Reliability Standard CIP-002-4 contains 3 
requirements. Requirement R1, which pertains to the identification of 
Critical Assets, provides:

    The Responsible Entity shall develop a list of its identified 
Critical Assets determined through an annual application of the 
criteria contained in CIP-002-4 Attachment 1--Critical Asset 
Criteria. The Responsible Entity shall update this list as 
necessary, and review it at least annually.

Attachment 1 provides seventeen criteria to be used by all responsible 
entities for the identification of Critical Assets pursuant to 
Requirement R1. The thresholds pertain to specific types of facilities 
such as generating units, transmission lines and control centers. For 
example, Criterion 1.1 provides ``[e]ach group of generating units 
(including nuclear generation) at a single plant location with an 
aggregate highest rated net Real Power capability of the preceding 12 
months equal to or exceeding 1500 MW in a single Interconnection.'' 
With regard to transmission, Criterion 1.6 provides ``Transmission 
Facilities operated at 500 kV or higher,'' and Criterion 1.7 provides 
``Transmission Facilities operated at 300 kV or higher at stations or 
substations interconnected at 300 kV or higher with three or more other 
transmission stations or substations.''
    16. Reliability Standard CIP-002-4, Requirement R2 requires 
responsible entities to develop a list of Critical Cyber Assets 
associated with the Critical Assets identified pursuant to Requirement 
R1. As in previous versions, the Requirement further states that to 
qualify as a Critical Cyber Asset, the Cyber Asset must: (1) Use a 
routable protocol to communicate outside the Electronic Security 
Perimeter; (2) use a routable protocol within a control center; or (3) 
be dial-up accessible. In the proposed version, in the context of 
generating units at a single plant location, the Requirement limits the 
designation of Critical Cyber Assets only to Cyber Assets shared by a 
combination of generating units whose compromise could within 15 
minutes result in the loss of generation capability equal to or higher 
than 1500 MW.
    17. Requirement R3 requires that a senior manager or delegate for 
each responsible entity approve annually the list of Critical Assets 
and the list of Critical Cyber Assets, even if the lists contain no 
elements. As mentioned above, proposed Reliability Standards CIP-003-4 
to CIP-009-4 only reflect conforming changes to accord with the CIP-
002-4 Reliability Standard.

C. Additional Information Regarding Attachment 1 Criteria

    18. In response to a Commission data request, NERC provided 
additional information regarding the bright line criteria for 
identifying Critical Assets.\19\ NERC provided some information 
regarding the development of the criteria. Further, based on an 
industry survey, NERC provided information regarding the estimated 
number of Critical Assets and the number of Critical Assets that have 
associated Critical Cyber Assets located in the United States that 
would be identified pursuant to CIP-002-4. For example, NERC indicates 
that the Version 4 CIP Standards would result in the identification of 
532 control centers as Critical Assets with Critical Cyber Assets, and 
another 21 control centers as Critical Assets without any associated 
Critical Cyber Assets.\20\ Further, 201 control centers would not be 
identified as Critical Assets. With regard to Blackstart Resources, 
NERC's survey results indicate that CIP-002-4 would result in the 
identification of approximately 234 Blackstart Resources as Critical 
Assets with associated Critical Cyber Assets, 273 identified as 
Critical Assets without Critical Cyber Assets, and 35 Blackstart 
Resources not classified as Critical Assets.\21\
---------------------------------------------------------------------------

    \19\ See April 17, 2011 Commission staff data request issued in 
Docket No. RM11-11-000. NERC responded to the data request in 
staggered filings, on May 27, 2011 and June 30, 2011.
    \20\ NERC June 30, 2011 Data Response at 2-3.
    \21\ Id. at 3-4. In the June 30, 2011 Data Response, NERC stated 
that with respect to Blackstart Resources some responsible entities 
indicated that they had not performed a complete analysis of their 
systems based on CIP-002-4 and are unsure whether some units may be 
classified as Critical Assets. Id. at 4.
---------------------------------------------------------------------------

III. Discussion

    19. Pursuant to FPA section 215(d)(2), the Commission proposes to 
approve CIP-002-4 to CIP-009-4 as just, reasonable, not unduly 
discriminatory or preferential, and in the public interest. The 
Commission proposes to approve the VRFs and VSLs, implementation plan, 
and effective date proposed by NERC. The Commission also proposes to 
approve the retirement of the currently effective Version 3 CIP 
Reliability Standards CIP-002-3 to CIP-009-3 upon the effective date of 
CIP-002-4 to CIP-009-4. The Commission seeks comments on these 
proposals.
    20. Further, as discussed below, the Commission seeks comments from 
NERC and other interested persons on the proposal to establish a 
reasonable deadline for NERC to satisfy the outstanding directives in 
Order No. 706. Specifically, as explained in detail later, the 
Commission requests comments on: (1) The proposal to establish a 
deadline using NERC's development timeline for the next version of the 
CIP Reliability Standards; (2) how much time NERC needs to develop and 
file the next version of the CIP Reliability Standards; (3) other 
potential approaches to Critical Cyber Asset identification; and (4) 
whether the next version is anticipated to satisfy all of the 
directives in Order No. 706.

A. The Commission Proposes To Approve the Version 4 CIP Reliability 
Standards

    21. The Commission, in giving due weight to NERC's Filing, proposes 
to approve the Version 4 CIP Reliability Standards. The Commission also 
proposes to approve the implementation plan and effective date proposed 
by NERC. Version 4 provides a change in three respects: (1) Version 4 
will result in the identification of certain types of Critical Assets 
that may not be identified under the current approach; (2) Version 4 
uses bright line criteria to identify Critical Assets, eliminating the 
use of existing entity-defined risk-based assessment methodologies that 
generally do not adequately identify Critical Assets; and (3) Version 4 
provides a level of consistency and clarity regarding the 
identification of Critical Assets lacking under Version 3. We

[[Page 58733]]

separately address each of these reasons for proposing to approve 
Version 4 below.
1. Critical Asset Identification
    22. In its Petition, NERC indicates that, after conducting reviews 
of CIP-002 compliance, NERC ``determined that the existing 
methodologies generally do not adequately identify all Critical 
Assets.'' \22\ While recognizing that CIP version 4 is intended as an 
``interim step,'' it appears that the proposed bright line criteria 
will result in the identification of certain types of Critical Assets 
(e.g. 500 kV substations) that may not be identified by the approach 
that is currently in effect. This is reflected in NERC's June 30, 2011 
data response, in which NERC presented industry survey data reflecting 
the application of the bright line criteria in Version 4. To facilitate 
an analysis of the data, NERC also provided observations and data from 
several of its earlier industry surveys, including the 2009 ``CIP Self-
Certification Survey'' and 2010 ``CIP-002 Critical Asset Methodology 
Data Request.''. For example, NERC states in the June 30, 2011 data 
response that in the 2009 survey only 50 percent of substations rated 
300 kV and above are classified as Critical Assets while that figure 
would increase to 70 percent under Version 4.\23\
---------------------------------------------------------------------------

    \22\ NERC Petition at 11.
    \23\ Id. at 4.
---------------------------------------------------------------------------

    23. The NERC petition indicates that 270 transmission substations 
rated 500 kV and above are classified as Critical Assets under Version 
3 while, according to the data response, the figure would rise to 437 
under Version 4.\24\ This increase is consistent with Criterion 1.6 of 
Attachment 1 to CIP-002-4, which identifies all transmission 
substations rated 500 kV as Critical Assets. According to the data 
response, the 25 percent of generation units rated 300 MVA and above 
would be identified as Critical Assets under Version 4. Moreover, the 
proportion of total Blackstart Resources classified as Critical Assets 
increases due to the required 100 percent coverage of these under 
Version 4.\25\ Further, the number of control centers identified as 
Critical Assets increases from 425 under Version 3 to 553 under Version 
4, the latter figure representing 74 percent of all control centers. 
These figures represent increases in certain categories in Critical 
Asset identification among generation, transmission, and control 
centers. We also note that NERC's industry survey data indicates 
decreases in the number of generation and blackstart resources 
identified as Critical Assets with Critical Cyber Assets. While the 
bright line thresholds result in the identification of a significant 
number of additional generation plants rated above 1500 MVA as Critical 
Assets, the thresholds also result in the identification of less 
generation below 300 MVA.
---------------------------------------------------------------------------

    \24\ Id. at 5.
    \25\ NERC Petition at 17 (explaining that each Blackstart 
Resource identified in a Transmission Operator's restoration plan is 
a Critical Asset). In the June 30, 2011 Data Response, NERC's survey 
found that responsible entities identified 93 percent of Blackstart 
Resources as Critical Assets. NERC stated that confusion over the 
term Blackstart Resource may have contributed to the lower 
percentage, and that responsible entities will be educated on the 
definition of Blackstart Resource prior to the effective date of 
CIP-002-4. NERC June 30, 2011 Data Response at 4.
---------------------------------------------------------------------------

    24. As NERC recognizes in its filing, the improvements in Critical 
Asset identification under Version 4 represent an interim step in 
complying with the directives in Order No. 706.\26\ As we discuss 
below, Version 4 should not be viewed as an endpoint but as a step 
towards eventual full compliance with Order No. 706.
2. Version 4 Removes Discretion in Identifying Critical Assets
    25. The proposed Version 4 CIP Reliability Standards discards the 
current risk-based methodology for identifying Critical Assets. Under 
the current CIP-002-3, responsible entities are tasked with identifying 
Critical Assets based on their own risk-based methodology. In the 
Petition NERC points out that in Order No. 706 the Commission directed 
NERC to ``provide reasonable technical support to assist entities in 
determining whether their assets are critical to the Bulk-Power 
System.'' \27\ NERC explains that it responded to the Commission's 
direction by developing guidance documents to assist entities in 
developing their risk-based methodologies and Critical Asset 
identification.\28\
---------------------------------------------------------------------------

    \27\ Id. at 10-11 (citing Order No. 706, 122 FERC ] 61,040 at P 
255).
    \28\ Id. at 11.
---------------------------------------------------------------------------

    26. In its Petition, NERC states that it ``conducted various 
reviews of risk-based methodologies developed by many entities of 
varying sizes * * * and determined that the existing methodologies 
generally do not adequately identify all Critical Assets.'' \29\ To 
address this, NERC proposes to replace the current risk-based 
methodology with uniform, bright line criteria, which will be used by 
all responsible entities to identify Critical Assets.
---------------------------------------------------------------------------

    \29\ Id.
---------------------------------------------------------------------------

    27. While risk-based assessment methodologies have merit, we share 
NERC's concerns about the existing application of the currently 
effective CIP-002-3, Requirement 1. Thus, in this context, we believe 
that a shift away from responsible entity-designed risk-based 
methodologies for identifying Critical Assets, which NERC has found to 
be inadequate, to the use of NERC-developed criteria is an improvement.
3. Version 4 Provides Consistency and Clarity in the Identification of 
Critical Assets
    28. In its June 30, 2011 data response, NERC states that the survey 
results from 2009 generated concern ``about the apparent inconsistency 
in the application of the standards across the system, as evidenced by 
the apparent variation from region to region.'' \30\ NERC states that 
it subsequently engaged with the Regional Entities and stakeholders to 
better understand the data, with these efforts resulting in the 
development of Version 4.
---------------------------------------------------------------------------

    \30\ NERC June 30, 2011 Data Response at 3.
---------------------------------------------------------------------------

    29. We believe that the application of uniform criteria is an 
improvement over the current approach because they add greater 
consistency and clarity in identifying Critical Assets. The risks posed 
by cyber threats suggest a different approach than the possibly 
inconsistent, inadequate methodologies for identifying Critical Assets, 
as evidenced by NERC's conclusion that insufficient numbers of Critical 
Assets were identified using the risk-based assessment methodology. As 
an integrated system, the protection afforded for Critical Assets and 
their Critical Cyber Assets is only as strong as its weakest link. In 
this respect, allowing responsible entities to devise their own 
methodologies for identifying Critical Assets, especially if these 
methodologies prove to be weak, may compromise the Critical Assets and 
Critical Cyber Assets of other responsible entities even if they have 
adopted a more stringent methodology. The uniform system of Critical 
Asset identification proposed by NERC in Version 4 helps to address 
this weakness and places all responsible entities on an equal footing 
with respect to Critical Asset identification.
    30. In addition, clear, bright line criteria should make it easier 
for Regional Entities, NERC and the Commission to monitor responsible 
entities and evaluate how they are identifying Critical Assets. A 
single set of bright line criteria, as opposed to

[[Page 58734]]

myriad entity-designed risk-based methodologies, should improve the CIP 
compliance process.
    31. However, under the currently-effective CIP-002-3, an entity 
that applies its risk-based assessment methodology considers specific 
types of assets identified in Requirement R1, as well as ``any 
additional assets that support the operation of the Bulk Electric 
System that the Responsible Entity deems appropriate to include in its 
assessment.'' Thus, currently, a responsible entity has the flexibility 
to consider any assets it deems appropriate. The Commission also notes 
that there are assets currently identified as Critical Assets which 
would no longer be identified as Critical Assets under the Proposed 
Reliability Standard CIP-002-4 bright line criteria for Critical Asset 
identification. The Commission seeks comment whether, under CIP Version 
4, a responsible entity retains the flexibility to identify assets 
that, although outside of the bright line criteria, are essential to 
Bulk-Power System reliability. Further, we seek comment whether the ERO 
and/or Regional Entities would have the ability, either in an event-
driven investigation or compliance audit, to identify specific assets 
that fall outside the bright-line criteria yet are still essential to 
Bulk-Power System reliability and should be subject prospectively to 
compliance with the CIP Reliability. If so, on what basis should that 
decision be made?
    32. In addition, the Commission is cognizant of one caution that 
remains concerning a binary bright line criteria protection philosophy, 
i.e., either an asset satisfies the threshold and is subject to 
compliance or is below the threshold and not subject to compliance (as 
opposed to a tiered approach to compliance as discussed below), in 
terms of applying cybersecurity protections to Cyber Assets. 
Specifically, bright line criteria that limit legally-mandated 
cybersecurity protections to certain classes of Bulk-Power System 
assets may indicate to an adversary the types of assets that fail to 
meet the threshold and, therefore, are not subject to mandatory CIP 
compliance. Therefore, the Commission encourages NERC to accelerate 
development of the next version of the CIP Reliability Standards and to 
address the concerns discussed herein in Section B.
4. Violation Risk Factors/Violation Severity Levels
    33. NERC states that the proposed VRFs and VSLs are consistent with 
those approved for the Version 3 CIP Reliability Standards.\31\ NERC 
explains that each requirement in Version 4 is assigned a VRF and a set 
of VSLs and that these elements support the determination of an initial 
value range for the base penalty amount regarding violations of 
requirements in Commission-approved Reliability Standards, as defined 
in the ERO Sanction Guidelines.\32\
---------------------------------------------------------------------------

    \31\ North American Electric Reliability Corp., 134 FERC ] 
61,045 (2011) (approving Version 2 and 3 CIP Reliability Standards 
VRFs and VSLs but requiring modifications in a compliance filing).
    \32\ NERC Petition at 37.
---------------------------------------------------------------------------

    34. The principal changes in the proposed Version 4 VRFs and VSLs 
relate to CIP-002-4. NERC proposes to carry forward the Version 3 VRFs 
and VSLs for all other Requirements (in CIP-003-4 through CIP-009-4), 
for which no substantive revisions are proposed. CIP-002-4 no longer 
contains sub-Requirements and, instead, each of three main Requirements 
has a single VRF and set of VSLs, consistent with the methodology 
proposed by NERC and approved by the Commission.\33\ The VRF 
designations for the three Requirements in CIP-002-4 are consistent 
with those assigned to similar Requirements in previous versions of the 
CIP Reliability Standards and satisfy our established guidelines. 
Therefore, the Commission proposes to approve the Version 4 VRFs 
proposed by NERC and incorporate appropriately the modifications 
directed to prior versions.
---------------------------------------------------------------------------

    \33\ North American Electric Reliability Corp., 135 FERC ] 
61,166, at 8 (2011).
---------------------------------------------------------------------------

    35. With regard to the proposed Version 4 VSLs for CIP-002-4, we 
are concerned that the VSLs for Requirement R1 and Requirement R2, 
while carrying forward the wording from corresponding Version 3 VSLs, 
do not adequately address the purpose of NERC's proposed bright line 
criteria: To ensure accurate and complete identification of all 
Critical Assets, so that all associated Critical Cyber Assets become 
subject to the protections required by the CIP Standards.
    36. More importantly, neither set of VSLs address the failure to 
properly identify either Critical Assets or Critical Cyber Assets in 
the first place. The failure to identify a Critical Asset, whether 
inadvertently or through misapplication of the bright line criteria, is 
paramount because if an Asset is not identified and included on the 
Critical Asset list, its associated Cyber Assets will not be considered 
under Requirement R2. Failure to identify those Cyber Assets as 
Critical Cyber Assets under Requirement R2 then creates the ``weakest 
link'' circumstance discussed in the Commission's order establishing 
two CIP VSL Guidelines for analyzing the validity of VSLs pertaining to 
cyber security.\34\
---------------------------------------------------------------------------

    \34\ CIP VSL Guideline 1 states, ``Requirements where a single 
lapse in protection can compromise computer network security, i.e., 
the ``weakest link'' characteristic, should apply binary rather than 
gradated VSLs.''
---------------------------------------------------------------------------

    37. Therefore, the Commission proposes to direct the ERO to modify 
the VSLs for CIP-002-4, Requirements R1 and R2, to address a failure to 
identify either Critical Assets or Critical Cyber Assets, as shown in 
Appendix 1.\35\ The Commission proposes to approve the Version 4 VSLs 
proposed by NERC, as modified, because they would then satisfy our 
established guidelines, fully address the purpose of NERC's bright line 
criteria, and incorporate appropriately the modifications directed to 
prior versions.
---------------------------------------------------------------------------

    \35\ NERC proposes to assign a Severe VSL for a violation of 
Requirement R1 if a responsible entity does not develop a list of 
its identified Critical Assets ``even if such list is null.'' NERC 
does not propose to assign a VSL for a violation of Requirement R1 
when a responsible entity fails to identify a Critical Asset that 
falls within any of the Critical Asset Criteria in Attachment 1, or 
fails to include an identified Critical Asset in its Critical Asset 
list. NERC further proposes to assign a Severe VSL to a responsible 
entity's violation of Requirement R2 only when it fails to include 
in its list of Critical Cyber Assets a Critical Cyber Asset it has 
identified. NERC does not propose to assign a VSL for a violation of 
Requirement R2 resulting from a responsible entity's failure to 
identify as a Critical Cyber Asset a Cyber Asset that qualifies as a 
Critical Cyber Asset.
---------------------------------------------------------------------------

5. Implementation Plan and Effective Date
    38. NERC proposes an effective date for full compliance with the 
Version 4 CIP Standards of the first day of the eighth calendar quarter 
after applicable regulatory approvals have been received. In addition, 
NERC provides a detailed implementation plan for newly identified 
Critical Assets and newly registered entities. NERC also presents a 
number of scenarios intended to explain how CIP-002-4 will be 
implemented. Depending on the situation, the implementation plan 
establishes timelines and milestones for entities to reach full 
compliance with CIP-002-4.
    39. The Commission proposes to approve the effective date and 
implementation plan for CIP-002-4. Under the scenarios presented by 
NERC, we understand that entities with existing CIP compliance 
implementation programs will effectively no longer use CIP-002-3 to 
identify Critical Assets after approval of CIP-002-4 but rather will 
apply the criteria in Attachment 1 of CIP-002-4. While some responsible 
entities have already installed the necessary equipment and software to 
address

[[Page 58735]]

cybersecurity, we recognize that other responsible entities may need to 
purchase and install new equipment and software to achieve compliance 
for assets that are brought within the scope of the protections under 
the CIP-002-4 bright line criteria. Based on these considerations, the 
Commission believes that the implementation plan proposed by NERC sets 
reasonable deadlines for industry compliance.

B. Ongoing Development Efforts To Satisfy Directives Set Forth in Order 
No. 706

    40. As acknowledged by NERC, the proposed Version 4 CIP Reliability 
Standards do not address all of the directives set forth in Order No. 
706. Although the Commission proposes to approve CIP-002-4, we 
highlight the need for NERC, working through the Reliability Standards 
development process, to address all outstanding Order No. 706 
directives as soon as possible.
    41. Below, we discuss several directives in Order No. 706 that have 
yet to be satisfied and propose to give guidance regarding the next 
version of the CIP Reliability Standards, such as the need to address 
the NIST framework, data network connectivity, and the potential misuse 
of control centers or control systems and the adoption of a regional 
perspective and oversight. Our guidance is intended to more fully 
ensure that all Cyber Assets serving reliability functions of the Bulk-
Power System are within scope of the CIP Reliability Standards. In 
addition, as discussed below, we seek comments from NERC and other 
interested persons on a proposal to establish a deadline for NERC to 
submit modified CIP Reliability Standards that address the outstanding 
directives set forth in Order No. 706, using NERC's development 
timeline.
    42. The stated purpose of Reliability Standard CIP-002 is the 
accurate identification of Critical Cyber Assets. Both the currently-
effective and proposed CIP-002 Reliability Standards, along with 
guidance NERC provided to industry,\36\ are structured in a staged 
approach. First, an entity must identify Critical Assets. NERC defines 
Critical Assets as ``facilities, systems, and equipment which, if 
destroyed, degraded, or otherwise rendered unavailable, would affect 
the reliability or operability of the Bulk Electric System.'' \37\ 
Second, based on the Critical Assets identified in the first step, an 
entity must identify Cyber Assets supporting the Critical Assets. The 
NERC Glossary defines Cyber Assets as ``programmable electronic devices 
and communication networks including hardware, software, and data.'' 
\38\ Third, an entity should identify the Critical Cyber Assets by 
determining, in accordance with the NERC Glossary, the ``Cyber Assets 
essential to the reliable operation of the Critical Assets.'' \39\ In 
Order No. 706, the Commission did not address whether or not the staged 
approach outlined above was the only method for identifying Critical 
Cyber Assets. Rather at that time, focus was placed on addressing 
specific concerns with the first step--the identification of Critical 
Assets. Recognizing CIP-002 as the cornerstone of the CIP Reliability 
Standards,\40\ a failure to accurately identify Critical Assets could 
greatly impact accurate Critical Cyber Asset identification and the 
overall applicability of the protection measures afforded in CIP-003 
through CIP-009.
---------------------------------------------------------------------------

    \36\ North American Reliability Corporation Security Guideline 
for the Electric Sector: ``Identifying Critical Cyber Assets'' 
Version 1.0, Effective June 17, 2010, at 4-5, and North American 
Reliability Corporation Security Guideline for the Electric Sector: 
``Identifying Critical Assets'' Version 1.0, Effective September 17, 
2009.
    \37\ NERC Glossary of Terms at 11.
    \38\ Id.
    \39\ Id.
    \40\ Order No. 706, 122 FERC ] 61,040 at P 234.
---------------------------------------------------------------------------

    43. In light of recent cybersecurity vulnerabilities, threats and 
attacks that have exploited the interconnectivity of cyber systems,\41\ 
the Commission seeks comments regarding the method of identification of 
Critical Cyber Assets \42\ to ensure sufficiency and accuracy. The 
Commission recognizes that control systems that support Bulk-Power 
System reliability are ``only as secure as their weakest links,'' and 
that a single vulnerability opens the computer network and all other 
networks with which it is interconnected to potential malicious 
activity.\43\ Accordingly, the Commission believes that any criteria 
adopted for the purposes of identifying a Critical Cyber Asset under 
CIP-002 should be based upon a Cyber Asset's connectivity and its 
potential to compromise the reliable operation \44\ of the Bulk-Power 
System, rather than focusing on the operation of any specific Critical 
Asset(s). The Commission seeks comments on this approach.
---------------------------------------------------------------------------

    \41\ These include the discovery of Stuxnet, Night Dragon and 
RSA breaches from advanced persistent threats in July 2010, February 
2011 and March 2011 respectively, where systems were compromised.
    \42\ In Order No. 706, the Commission declined to direct a 
method for identifying Critical Cyber Assets, but stated that it may 
revisit this circumstance in a future proceeding. See Order No. 706, 
122 FERC ] 61,040 at P 284.
    \43\ North American Electric Reliability Corp., 130 FERC ] 
61,211, at P 15 (2010).
    \44\ 16 U.S.C. 824o(a)(4). The term ``reliable operation'' means 
``operating the elements of the bulk-power system within equipment 
and electric system thermal, voltage, and stability limits so that 
instability, uncontrolled separation, or cascading failures of such 
system will not occur as a result of a sudden disturbance, including 
a cybersecurity incident, or unanticipated failure of system 
elements.''
---------------------------------------------------------------------------

    44. Further, the Commission seeks comments on how to ensure that 
the directives of Order No. 706 relative to CIP-002 with respect to the 
concerns discussed below are addressed, resulting in a method that will 
lead to sufficient and accurate Critical Cyber Asset identification.
    45. The Commission believes that NERC should consider the following 
three strategies to meet the outstanding directives and seeks comments 
on these strategies. First, NERC should consider applicable features of 
the NIST Risk Management Framework to ensure protection of all cyber 
systems connected to the Bulk-Power System, including establishing CIP 
requirements based on entity functional characteristics rather than 
focusing on Critical Asset size. Second, such as in the consideration 
of misuse, NERC should consider mechanisms for identifying Critical 
Cyber Assets by examining all possible communication paths between a 
given cyber resource and any asset supporting a reliability function. 
Third, NERC should provide a method for review and approval of Critical 
Cyber Asset lists from external sources such as the Regional Entities 
or NERC. Each of these strategies is discussed below.
1. NIST Framework
    46. In Order No. 706, the Commission directed NERC to ``monitor the 
development and implementation'' of cybersecurity standards then being 
developed by the National Institute of Standards and Technology 
(NIST).\45\ The Commission also directed NERC to consider the 
effectiveness of the NIST standards.\46\ At that time, the Commission 
directed NERC to address any NIST provisions that will better protect 
the Bulk-Power System in the Reliability Standards development 
process.\47\ While the Commission determined not to require NERC to 
adopt or incorporate elements of the NIST standards, Order No. 706 left 
open the option of revisiting the NIST standards at a later time.\48\ 
The Commission is not here proposing to direct that NERC use elements 
of the NIST standards. However, we continue

[[Page 58736]]

to believe that the NIST framework could provide beneficial input into 
the NERC CIP Reliability Standards and we urge NERC to consider any 
such provisions that will better protect the Bulk-Power System.
---------------------------------------------------------------------------

    \45\ Order No. 706, 122 FERC ] 61,040 at P 233.
    \46\ Id.
    \47\ Id.
    \48\ Id.
---------------------------------------------------------------------------

    47. The NIST Risk Management Framework was developed to manage the 
risks associated with all information systems, and offers a structured 
yet flexible approach that can now be applied to the electric industry. 
The NIST Risk Management Framework guides selection and specification 
of cybersecurity controls and measures necessary to protect individuals 
and the operations and assets of the organization, while considering 
effectiveness, efficiency, and constraints due to applicable laws, 
directives, policies, standards, or regulations. Each of the activities 
in the Risk Management Framework has an associated NIST security 
standard and/or guidance document that can be used by organizations 
implementing the framework. The management of risk is a key element.
    48. Two primary features of the NIST Framework are: (1) Customizing 
protection to the mission of the cyber systems subject to protection 
(similar to the role identified by the NERC Functional Model); and (2) 
ensuring that all connected cyber systems associated with the Bulk-
Power System, based on their function, receive some level of 
protection.\49\ The Bulk-Power System could benefit from each of these 
tested approaches.
---------------------------------------------------------------------------

    \49\ NIST SP800-53, Section 1.4, Organizational 
Responsibilities.
---------------------------------------------------------------------------

a. NIST Approach and the NERC Functional Model
    49. The purpose of the NERC CIP Reliability Standards is to specify 
mandatory Requirements for responsible entities to establish, maintain, 
and preserve the cybersecurity of key information technology systems' 
assets, the use of which is essential to reliable operation of the 
Bulk-Power System. The CIP Reliability Standards include Requirements 
which are based upon the functional roles of the responsible entities 
as specified in the NERC Functional Model.\50\ The identification of 
cyber systems and assets used to execute these functional roles should 
be the first step in identifying the systems for coverage under the CIP 
Reliability Standards for protection. The Functional Model should be 
used as a starting point when considering the applicability of the NIST 
Framework for securing the operation of cyber assets to provide for the 
Reliable Operation of the Bulk-Power System.
---------------------------------------------------------------------------

    \50\ Reliability Functional Model, Function Definitions and 
Functional Entities, Version 5, approved by NERC Board of Trustees 
May 2010; and, Reliability Functional Model Technical Document 
Version 5, approved by NERC Board of Trustees May 2010.
---------------------------------------------------------------------------

b. NIST Tiered Approach
    50. If applied to the Bulk-Power System, the NIST Framework would 
specify the level of protection appropriate for systems based upon 
their importance to the reliable operation of the Bulk-Power System. 
Cyber systems connected to the Bulk-Power System require availability, 
integrity, and confidentiality to effectively ensure the reliability of 
the Bulk-Power System.
    51. The NIST Framework provides for a tiered approach to 
cybersecurity protection where protection of some type would be applied 
to all cyber assets connected to the Bulk-Power System. Under the NIST 
Framework, cyber assets whose compromise or loss of operability could 
result in a greater risk to Bulk-Power System reliability would be 
subject to more rigorous cybersecurity protections compared to a less 
important asset. The NIST Framework recognizes that all connected 
assets require a baseline level of protection to prevent attackers from 
gaining a foothold to launch further, even more devastating attacks on 
other critical systems.
    52. Using the NIST framework, all cyber assets would also be 
reviewed to determine the appropriate level of cyber protection. The 
level of protection required for a given cyber asset is based upon its 
mission criticality and its innate technological risks.
2. Misuse of Control Systems
    53. In Order No. 706, the Commission directed NERC to consider the 
misuse of control centers and control systems in the determination of 
Critical Assets.\51\ If a perpetrator is able to misuse an asset, the 
attacker may navigate across and between control system data networks 
in order to gain access to multiple sites, which could enable a 
coordinated multi-site attack. Recent cybersecurity incidents \52\ 
illustrate the importance of restricting connectivity between control 
systems and external networks, emphasizing the inherent risk exposure 
created by networking critical cyber control systems. Future mechanisms 
for identifying when cyber assets require protection will have to 
examine all possible paths between a given cyber resource and any asset 
supporting a reliability function.
---------------------------------------------------------------------------

    \51\ Order No. 706, 122 FERC ] 61,040 at P 282.
    \52\ These include the discovery of Stuxnet, Night Dragon and 
RSA breaches from advanced persistent threats in July 2010, February 
2011 and March 2011 respectively, where systems were compromised.
---------------------------------------------------------------------------

    54. In Order No. 706, the Commission expressed concerns regarding 
the classification of control centers and the potential misuse of 
control systems.\53\ With regard to control centers, the Commission 
noted that responsible entities should be required to ``examine the 
impact on reliability if the control centers are unavailable, due for 
example to power or communications failures, or denial of service 
attacks.'' \54\ In addition, the Commission stated that ``[r]esponsible 
entities should also examine the impact that misuse of those control 
centers could have on the electric facilities they control and what the 
combined impact of those electric facilities could be on the 
reliability of the Bulk-Power System.'' \55\ The Commission stated that 
``when these matters are taken into account, it is difficult to 
envision a scenario in which a reliability coordinator, transmission 
operator or transmission owner control center or backup control center 
would not properly be identified as a critical asset.'' \56\
---------------------------------------------------------------------------

    \53\ Order No. 706, 122 FERC ] 61,040 at P 280-281.
    \54\ Id. P 280.
    \55\ Id.
    \56\ Id.
---------------------------------------------------------------------------

    55. In addition, the Commission raised concerns about the misuse of 
a control system that controls more than one asset.\57\ Specifically, 
the Commission noted that multiple assets, whether multiple generating 
units, multiple transmission breakers, or perhaps even multiple 
substations, could be taken out of service simultaneously due to a 
failure or misuse of the control system. The Commission stated that 
even if one or all of the assets would not be considered as a Critical 
Asset on a stand alone basis, a simultaneous outage resulting from the 
single point of control might affect the reliability or operability of 
the Bulk-Power System. The Commission stated ``[i]n that case, the 
common control system should be considered a Critical Cyber Asset.'' 
\58\
---------------------------------------------------------------------------

    \57\ Id. P 281.
    \58\ Id.
---------------------------------------------------------------------------

    56. The Commission is concerned that the proposed CIP-002-4 bright 
line criteria do not adequately address the Commission's prior 
directive regarding the classification of control centers or take the 
potential misuse of control systems into account in the identification 
of Critical Assets. For example, the proposed bright line criteria 
leave a number of Critical Assets

[[Page 58737]]

with potentially unprotected cyber assets, including a total of 222 
\59\ control centers with no legal obligation to apply cybersecurity 
measures. These potentially unprotected control centers involve an 
unknown number of associated control systems.
---------------------------------------------------------------------------

    \59\ NERC June 30, 2011 Data Response at 3.
---------------------------------------------------------------------------

    57. Consider the following example: Electric grid control system 
operation in part consists of the collection of raw data needed to run 
the grid, collected by a SCADA system from intelligent electronic 
devices (IEDs) (e.g., RTUs and synchrophasors). The SCADA data is 
typically aggregated by an energy management system (EMS). The EMS may, 
in some cases, calculate area control error (ACE) and transmit it to a 
balancing authority, which in turn makes computer based decisions about 
balancing load and generation. Those decisions are then used by the 
balancing authority or generation operator as part of an automated 
generation control (AGC) process. At each of these one or more sites, 
there are many data network interconnection points with other entities, 
(e.g., neighboring transmission operators, generation operators, and 
reliability coordinators) and additional connectivity to corporate data 
networks and elsewhere, employing several communications technologies. 
This results in a complex interconnection of cyber assets (including 
the data of those cyber assets) demanding vigilant protection.\60\ 
These cyber systems require comprehensive protection because the 
interconnected system is only as strong as its weakest link.
---------------------------------------------------------------------------

    \60\ See generally, Ron Ross, Managing Enterprise Risk in 
Today's World of Sophisticated Threats, National Institute of 
Standards and Technology (2007).
---------------------------------------------------------------------------

    58. Any failure to take into account the interconnectivity of 
control systems represents a significant reliability gap. Where modern 
data networking technology is used for operation of the Bulk-Power 
System (e.g., control systems, synchrophasors, smart grid), a network-
based cyber attack could result in multiple simultaneous outages of 
grid equipment and cyber systems alike through misuse of a single point 
of control (e.g., a SCADA control host system). Such an attack could 
take place by way of a cyber system associated with an asset that falls 
outside the CIP-002-4 bright line criteria yet is connected in common 
with other cyber systems on the Bulk-Power System. The risk of a cyber 
attack is greater now than when Order No. 706 was issued, as borne out 
by the recent increased frequency and sophistication of cyber attacks. 
It is critical, therefore, that the Commission's concerns regarding the 
potential misuse of control centers and associated control systems be 
addressed in the CIP Reliability Standards.
3. Regional Perspective
    59. In Order No. 706, the Commission directed NERC to ``develop a 
process of external review and approval of critical asset lists based 
on a regional perspective.'' \61\ The Commission found that ``Regional 
Entities must have a role in the external review to assure that there 
is sufficient accountability in the process [and] * * * because the 
Regional Entities and ERO are ultimately responsible for ensuring 
compliance with Reliability Standards.'' \62\
---------------------------------------------------------------------------

    \61\ Order No. 706, 122 FERC ] 61,040 at P 329.
    \62\ Id. P 327.
---------------------------------------------------------------------------

    60. The Commission is concerned that the lack of a regional review 
in the identification of cyber assets might result in a reliability 
gap. In Order No. 706, the Commission expressed concerns regarding the 
need for developing a process of external review and approval of 
Critical Asset lists based on a regional perspective, and that such 
lists are considered from a wide-area view. This process would help to 
identify trends in Critical Asset identification. Further, while we 
recognize that individual circumstances may likely vary, an external 
review will provide an appropriate level of consistency.\63\ For 
example, reliability coordinators may communicate through a common 
system and compromise of that system could propagate across multiple 
regions. A cyber compromise can easily propagate across these data and 
control networks with potential adverse consequences to the Bulk-Power 
System on multi-region basis.
---------------------------------------------------------------------------

    \63\ Id. P 322.
---------------------------------------------------------------------------

    61. This problem may become exacerbated by any future revisions to 
the CIP Reliability Standards that opt to reserve a high level of 
independent authority to the registered entity to categorize and 
prioritize its cyber assets. Looking forward, it will be essential for 
NERC and the Regional Entities to actively review the designation of 
cyber assets that are subject to the CIP Reliability Standards, 
including those which span regions, in order to determine whether 
additional cyber assets should be protected.
4. Summary
    62. In summary, the Commission proposes to approve NERC's proposed 
Version 4 CIP Standards pursuant to section 215(d)(2) of the FPA. As 
discussed above, it appears that the Version 4 CIP Standards represent 
an improvement in three respects in that they: (1) Will result in the 
identification of certain types of Critical Assets that may not be 
identified under the current approach; (2) use bright line criteria to 
identify Critical Assets, thus limiting the discretion of responsible 
entities when identifying Critical Assets; and (3) provide a level of 
consistency and clarity regarding the identification of Critical 
Assets.
    63. While we believe that the Version 4 CIP Reliability Standards 
satisfy the statutory standard for approval, we also believe that more 
improvement is needed. As NERC explains in its Petition, the Version 4 
CIP Reliability Standards are intended as ``interim'' and future 
versions will build on Version 4. We believe that the electric 
industry, through the NERC standards development process, should 
continue to develop an approach to cybersecurity that is meaningful and 
comprehensive to assure that the nation's electric grid is capable of 
withstanding a Cybersecurity Incident.\64\ As discussed above, we 
believe that some of the essential components of such a meaningful and 
comprehensive approach to cybersecurity are set forth in Order No. 706.
---------------------------------------------------------------------------
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.