Revised Critical Infrastructure Protection Reliability Standard CIP-003-7-Cyber Security-Security Management Controls, 49541-49549 [2017-23287]
Download as PDF
49541
Proposed Rules
Federal Register
Vol. 82, No. 206
Thursday, October 26, 2017
This section of the FEDERAL REGISTER
contains notices to the public of the proposed
issuance of rules and regulations. The
purpose of these notices is to give interested
persons an opportunity to participate in the
rule making prior to the adoption of the final
rules.
DEPARTMENT OF ENERGY
Federal Energy Regulatory
Commission
18 CFR Part 40
[Docket No. RM17–11–000]
Revised Critical Infrastructure
Protection Reliability Standard CIP–
003–7—Cyber Security—Security
Management Controls
Federal Energy Regulatory
Commission, DOE.
ACTION: Notice of proposed rulemaking.
AGENCY:
The Federal Energy
Regulatory Commission (Commission)
proposes to approve Critical
Infrastructure Protection (CIP)
Reliability Standard CIP–003–7 (Cyber
Security—Security Management
Controls), submitted by the North
American Electric Reliability
Corporation (NERC). Proposed
Reliability Standard CIP–003–7
improves upon the current Commissionapproved CIP Reliability Standards by
clarifying the obligations pertaining to
electronic access control for low impact
BES Cyber Systems; adopting
mandatory security controls for
transient electronic devices (e.g., thumb
drives, laptop computers, and other
portable devices frequently connected to
and disconnected from systems) used at
low impact BES Cyber Systems; and
requiring responsible entities to have a
policy for declaring and responding to
CIP Exceptional Circumstances related
to low impact BES Cyber Systems. In
addition, the Commission proposes to
direct NERC to develop certain
modifications to the NERC Reliability
Standards to provide clear, objective
criteria for electronic access controls for
low impact BES Cyber Systems; and
address the need to mitigate the risk of
malicious code that could result from
third-party transient electronic devices.
DATES: Comments are due December 26,
2017.
ethrower on DSK3G9T082PROD with PROPOSALS
SUMMARY:
VerDate Sep<11>2014
16:45 Oct 25, 2017
Jkt 244001
Comments, identified by
docket number, may be filed in the
following ways:
• Electronic Filing through https://
www.ferc.gov. Documents created
electronically using word processing
software should be filed in native
applications or print-to-PDF format and
not in a scanned format.
• Mail/Hand Delivery: Those unable
to file electronically may mail or handdeliver comments to: Federal Energy
Regulatory Commission, Secretary of the
Commission, 888 First Street NE.,
Washington, DC 20426.
Instructions: For detailed instructions
on submitting comments and additional
information on the rulemaking process,
see the Comment Procedures section of
this document.
FOR FURTHER INFORMATION CONTACT:
Matthew Dale (Technical Information),
Office of Electric Reliability, Federal
Energy Regulatory Commission, 888
First Street NE., Washington, DC 20426,
(202) 502–6826, matthew.dale@ferc.gov,
Kevin Ryan (Legal Information), Office
of the General Counsel, Federal Energy
Regulatory Commission, 888 First Street
NE., Washington, DC 20426, (202) 502–
6840, kevin.ryan@ferc.gov.
SUPPLEMENTARY INFORMATION:
1. Pursuant to section 215 of the
Federal Power Act (FPA),1 the
Commission proposes to approve
Critical Infrastructure Protection (CIP)
Reliability Standard CIP–003–7 (Cyber
Security—Security Management
Controls). The North American Electric
Reliability Corporation (NERC), the
Commission-certified Electric
Reliability Organization (ERO),
submitted proposed Reliability Standard
CIP–003–7 in response to directives in
Order No. 822.2 The Commission also
proposes to approve the associated
violation risk factors and violation
severity levels, implementation plan
and effective dates proposed by NERC.
In addition, the Commission proposes to
approve the modified definitions of
Transient Cyber Asset and Removable
Media as well as the retirement of the
definitions for Low Impact External
Routable Connectivity (LERC) and Low
Impact Electronic Access Point (LEAP)
in the NERC Glossary of Terms Used in
ADDRESSES:
1 16
U.S.C. 824o (2012).
Critical Infrastructure Protection
Reliability Standards, Order No. 822, 154 FERC ¶
61,037, reh’g denied, Order No. 822–A, 156 FERC
¶ 61,052 (2016).
2 Revised
PO 00000
Frm 00001
Fmt 4702
Sfmt 4702
NERC Reliability Standards (NERC
Glossary). Further, the Commission
proposes to approve the retirement of
Reliability Standard CIP–003–6.
2. Proposed Reliability Standard CIP–
003–7 is designed to mitigate the
cybersecurity risks to bulk electric
system facilities, systems, and
equipment, which, if destroyed,
degraded, or otherwise rendered
unavailable as a result of a cybersecurity
incident, would affect the reliable
operation of the bulk electric system.3
As discussed below, the Commission
proposes to determine that proposed
Reliability Standard CIP–003–7 is just,
reasonable, not unduly discriminatory
or preferential, and in the public
interest and addresses the directives in
Order No. 822 by: 1. Clarifying the
obligations pertaining to electronic
access control for low impact BES Cyber
Systems; 4 and 2. adopting mandatory
security controls for transient electronic
devices (e.g., thumb drives, laptop
computers, and other portable devices
frequently connected to and
disconnected from systems) used at low
impact BES Cyber Systems. In addition,
by requiring responsible entities to have
a policy for declaring and responding to
CIP Exceptional Circumstances for low
impact BES Cyber Systems, the
proposed Reliability Standard aligns the
treatment of low impact BES Cyber
Systems with that of high and medium
impact BES Cyber Systems, which
currently include a requirement for
declaring and responding to CIP
Exceptional Circumstances.
Accordingly, we propose to approve
proposed Reliability Standard CIP–003–
7 because the proposed modifications
improve the base-line cybersecurity
posture of responsible entities compared
to the current Commission-approved
CIP Reliability Standards.
3. In addition, pursuant to FPA
section 215(d)(5), the Commission
proposes to direct NERC to develop
certain modifications to the CIP
Reliability Standards. As discussed
below, while proposed Reliability
Standard CIP–003–7 improves
electronic access control for low impact
BES Cyber Systems and enhances
security controls for transient electronic
3 See
NERC Petition at 2.
defines ‘‘BES Cyber System’’ as one or
more BES Cyber Assets logically grouped by a
responsible entity to perform one or more reliability
tasks for a functional entity.
4 NERC
E:\FR\FM\26OCP1.SGM
26OCP1
49542
Federal Register / Vol. 82, No. 206 / Thursday, October 26, 2017 / Proposed Rules
devices used at low impact BES Cyber
Systems, we propose to direct that
NERC modify Reliability Standard CIP–
003–7 to: 1. Provide clear, objective
criteria for electronic access controls for
low impact BES Cyber Systems; and 2.
address the need to mitigate the risk of
malicious code that could result from
third-party transient electronic devices.
We believe that modifications
addressing these two concerns will
address potential gaps and improve the
cyber security posture of responsible
entities that must comply with the CIP
standards.
I. Background
A. Section 215 and Mandatory
Reliability Standards
4. Section 215 of the FPA requires a
Commission-certified ERO to develop
mandatory and enforceable Reliability
Standards, subject to Commission
review and approval. Reliability
Standards may be enforced by the ERO,
subject to Commission oversight, or by
the Commission independently.5
Pursuant to section 215 of the FPA, the
Commission established a process to
select and certify an ERO,6 and
subsequently certified NERC.7
B. Order No. 822
5. The Commission approved the
‘‘Version 1’’ CIP standards in January
2008, and subsequently acted on revised
versions of the CIP standards.8 On
January 21, 2016, in Order No. 822, the
Commission approved seven CIP
Reliability Standards: CIP–003–6
(Security Management Controls), CIP–
004–6 (Personnel and Training), CIP–
006–6 (Physical Security of BES Cyber
Systems), CIP–007–6 (Systems Security
Management), CIP–009–6 (Recovery
Plans for BES Cyber Systems), CIP–010–
2 (Configuration Change Management
and Vulnerability Assessments), and
CIP–011–2 (Information Protection). The
Commission determined that the
Reliability Standards under
consideration at that time were an
improvement over the prior iteration of
5 16
U.S.C. 824o(e) (2012).
Concerning Certification of the Electric
Reliability Organization; and Procedures for the
Establishment, Approval, and Enforcement of
Electric Reliability Standards, Order No. 672, FERC
Stats. & Regs. ¶ 31,204, order on reh’g, Order No.
672–A, FERC Stats. & Regs. ¶ 31,212 (2006).
7 North American Electric Reliability Corp., 116
FERC ¶ 61,062, order on reh’g and compliance, 117
FERC ¶ 61,126 (2006), aff’d sub nom. Alcoa, Inc.
v. FERC, 564 F.3d 1342 (D.C. Cir. 2009).
8 Mandatory Reliability Standards for Critical
Infrastructure Protection, Order No. 706, 122 FERC
¶ 61,040, order on reh’g, Order No. 706–A, 123
FERC ¶ 61,174 (2008), order on clarification, Order
No. 706–B, 126 FERC ¶ 61,229 (2009), order on
clarification, Order No. 706–C, 127 FERC ¶ 61,273
(2009).
ethrower on DSK3G9T082PROD with PROPOSALS
6 Rules
VerDate Sep<11>2014
16:45 Oct 25, 2017
Jkt 244001
the CIP Reliability Standards and
addressed the directives in Order No.
791 by, among other things, addressing
in an equally effective and efficient
manner the need for a NERC Glossary
definition for the term ‘‘communication
networks’’ and providing controls to
address the risks posed by transient
electronic devices (e.g., thumb drives
and laptop computers) used at high and
medium impact BES Cyber Systems.9
6. In addition, in Order No. 822,
pursuant to section 215(d)(5) of the
FPA, the Commission directed NERC,
inter alia, to: 1. Develop modifications
to the LERC definition to eliminate
ambiguity surrounding the term
‘‘direct’’ as it is used in the LERC
definition; and 2. develop modifications
to the CIP Reliability Standards to
provide mandatory protection for
transient electronic devices used at low
impact BES Cyber Systems.10
C. NERC Petition
7. On March 3, 2017, NERC submitted
a petition seeking approval of Reliability
Standard CIP–003–7 and the associated
violation risk factors and violation
severity levels, implementation plan
and effective dates. NERC states that
proposed Reliability Standard CIP–003–
7 satisfies the criteria set forth in Order
No. 672 that the Commission applies
when reviewing a proposed Reliability
Standard.11 NERC also sought approval
of revisions to NERC Glossary
definitions for the terms Removable
Media and Transient Cyber Asset, as
well as the retirement of the NERC
Glossary definitions of LERC and LEAP.
In addition, NERC proposed the
retirement of Commission-approved
Reliability Standard CIP–003–6.
8. NERC states that proposed
Reliability Standard CIP–003–7
improves upon the existing protections
that apply to low impact BES Cyber
Systems. NERC avers that the proposed
modifications address the Commission’s
directives from Order No. 822 by: 1.
Clarifying electronic access control
requirements applicable to low impact
BES Cyber Systems; and 2. adding
requirements for the protection of
transient electronic devices used for low
impact BES Cyber Systems. In addition,
while not required by Order No. 822,
NERC proposes a CIP Exceptional
9 Order No. 822, 154 FERC ¶ 61,037 at P 17; see
also Version 5 Critical Infrastructure Protection
Reliability Standards, Order No. 791, 78 FR 72755
(Dec. 3, 2013), 145 FERC ¶ 61,160 (2013), order on
clarification and reh’g, Order No. 791–A, 146 FERC
¶ 61,188 (2014).
10 Order No. 822, 154 FERC ¶ 61,037 at P 18.
11 See NERC Petition at 2 (citing Order No. 672,
FERC Stats. & Regs. ¶ 31,204 at PP 262, 321–337);
id. at Exhibit D (Order No. 672 Criteria).
PO 00000
Frm 00002
Fmt 4702
Sfmt 4702
Circumstances policy for low impact
BES Cyber Systems.
9. In response to the Commission’s
directive to develop modifications to
eliminate ambiguity surrounding the
term ‘‘direct’’ as it is used in the LERC
definition, NERC proposes to: 1. Retire
the terms LERC and LEAP from the
NERC Glossary; and 2. modify Section
3 of Attachment 1 to proposed
Reliability Standard CIP–003–7 ‘‘to
more clearly delineate the
circumstances under which Responsible
Entities must establish access controls
for low impact BES Cyber Systems.’’ 12
NERC states that the proposed revisions
are designed to simplify the electronic
access control requirements associated
with low impact BES Cyber Systems in
order to avoid ambiguities associated
with the term ‘‘direct.’’ NERC explains
that it recognized the ‘‘added layer of
unnecessary complexity’’ introduced by
distinguishing between ‘‘direct’’ and
‘‘indirect’’ access within the LERC
definition and asserts that the proposed
revisions will ‘‘help ensure that
Responsible Entities implement the
required security controls
effectively.’’ 13
10. With regard to the Commission’s
directive to develop modifications to the
CIP Reliability Standards to provide
mandatory protection for transient
electronic devices used at low impact
BES Cyber Systems, NERC proposes to
add a new section to Attachment 1 to
proposed Reliability Standard CIP–003–
7 to require responsible entities to
include controls in their cyber security
plans to mitigate the risk of the
introduction of malicious code to low
impact BES Cyber Systems that could
result from the use of ‘‘Transient Cyber
Assets or Removable Media.’’
Specifically, proposed Section 5 of
Attachment 1 lists controls to be applied
to Transient Cyber Assets and
Removable Media that NERC contends
‘‘will provide enhanced protections
against the propagation of malware from
transient devices.’’ 14
11. NERC also proposes a
modification that was not directed by
the Commission in Order No. 822.
Namely, NERC proposes revisions in
Requirement R1 of proposed Reliability
Standard CIP–003–7 to require
responsible entities to have a policy for
declaring and responding to CIP
Exceptional Circumstances related to
low impact BES Cyber Systems.15 NERC
12 Id.
at 16.
at 16.
14 Id. at 26–27.
15 A CIP Exceptional Circumstance is defined in
the NERC Glossary as a situation that involves or
threatens to involve one or more of the following,
13 Id.
E:\FR\FM\26OCP1.SGM
26OCP1
Federal Register / Vol. 82, No. 206 / Thursday, October 26, 2017 / Proposed Rules
states that a number of requirements in
the existing CIP Reliability Standards
specify that responsible entities do not
have to implement or continue
implementing these requirements
during a CIP Exceptional Circumstance
in order to avoid hindering the entities’
ability to timely and effectively respond
to the CIP Exceptional Circumstance.
NERC explains that since the proposed
requirements relating to transient
electronic devices used at low impact
BES Cyber Systems include an
exception for CIP Exceptional
Circumstances, NERC is proposing to
add a requirement for responsible
entities to have a CIP Exceptional
Circumstances policy that applies to
low impact BES Cyber Systems, as it
already requires for high and medium
impact BES Cyber Systems.16
12. NERC requests that proposed
Reliability Standard CIP–003–7 and the
revised definitions of Transient Cyber
Asset and Removable Media become
effective the first day of the first
calendar quarter that is eighteen months
after the effective date of the
Commission’s order approving the
proposed Reliability Standard.
ethrower on DSK3G9T082PROD with PROPOSALS
II. Discussion
13. Pursuant to section 215(d)(2) of
the FPA, we propose to approve
Reliability Standard CIP–003–7 as just,
reasonable, not unduly discriminatory
or preferential, and in the public
interest. Proposed Reliability Standard
CIP–003–7 largely addresses the
Commission’s directives in Order No.
822 and is an improvement over the
current Commission-approved CIP
Reliability Standards. Specifically, the
modifications to Section 3 of
Attachment 1 to Reliability Standard
CIP–003–7 clarify the obligations
pertaining to electronic access control
for low impact BES Cyber Systems. In
addition, the modifications to
Attachment 1 to Reliability Standard
CIP–003–7 require mandatory security
controls for transient electronic devices
used at low impact BES Cyber Systems.
We also propose to approve the new
provision in Reliability Standard CIP–
003–7, Requirement R1 requiring
responsible entities to have a policy for
declaring and responding to CIP
or similar, conditions that impact safety or bulk
electric system reliability: A risk of injury or death;
a natural disaster; civil unrest; an imminent or
existing hardware, software, or equipment failure;
a Cyber Security Incident requiring emergency
assistance; a response by emergency services; the
enactment of a mutual assistance agreement; or an
impediment of large scale workforce availability.
Glossary of Terms Used in NERC Reliability
Standards (August 1, 2017), https://www.nerc.com/
files/glossary_of_terms.pdf.
16 NERC Petition at 31–32.
VerDate Sep<11>2014
16:45 Oct 25, 2017
Jkt 244001
Exceptional Circumstances related to
low impact BES Cyber Systems. While
Order No. 822 did not direct NERC to
expand the scope of the CIP Exceptional
Circumstances policy, the revision
aligns the treatment of low impact BES
Cyber Systems with that of high and
medium impact BES Cyber Systems if
and when a CIP Exceptional
Circumstance occurs.
14. We also propose to approve the
revisions to the NERC Glossary
definitions of Transient Cyber Asset and
Removable Media, as well as the
retirement of the NERC Glossary
definitions for LERC and LEAP since the
proposed modifications to Reliability
Standard CIP–003–7 obviate the need
for the two terms. We further propose to
approve the violation risk factor and
violation severity level assignments
associated with proposed Reliability
Standard CIP–003–7 as well as NERC’s
proposed implementation plan and
effective dates.
15. In addition, as discussed below,
pursuant to section 215(d)(5) of the
FPA, the Commission proposes to direct
NERC to develop certain modifications
to the CIP Reliability Standards. While
proposed Reliability Standard CIP–003–
7 improves electronic access control for
low impact BES Cyber Systems and
enhances security controls for transient
electronic devices used at low impact
BES Cyber Systems, we propose to
direct that NERC modify Reliability
Standard CIP–003–7 to: 1. Provide clear,
objective criteria for electronic access
controls for low impact BES Cyber
Systems; and 2. address the need to
mitigate the risk of malicious code that
could result from third-party transient
electronic devices.
16. Below, we discuss the following
issues: A. Electronic access controls for
low impact BES Cyber Systems; B.
protection of transient electronic
devices; C. proposed retirement and
modification of definitions; D. NERC’s
proposed implementation plan and
effective dates; and E. proposed
violation severity level and violation
risk factor assignments.
A. Electronic Access Controls for Low
Impact BES Cyber Systems Order No.
822
17. In Order No. 822, the Commission
directed NERC to modify the LERC
definition to eliminate ambiguity
surrounding the term ‘‘direct’’ as it is
used in the LERC definition.17 The
Commission explained that the directive
was intended to codify the clarification
provided in NERC’s NOPR comments,
in which NERC referenced a statement
17 Order
PO 00000
No. 822, 154 FERC ¶ 61,037 at P 73.
Frm 00003
Fmt 4702
Sfmt 4702
49543
in the Guidelines and Technical Basis
section of Reliability Standard CIP–003–
6 that electronic access controls must be
applied to low impact BES Cyber
Systems unless responsible entities
implement a ‘‘complete security break’’
between the external host (cyber asset)
and any cyber asset(s) that may be used
to pass communications to the low
impact BES Cyber System.18 The
Commission observed that ‘‘a suitable
means to address our concern is to
modify the [LERC] definition consistent
with the commentary in the Guidelines
and Technical Basis section of CIP–003–
6.’’ 19
18. In addition, the Commission
explained that the directive was also
intended to eliminate a loophole that
would have allowed transitive
connections to out-of-scope cyber assets
(e.g., serial devices) to go unprotected
under the LERC definition.20
NERC Petition
19. In its Petition, NERC proposes to:
1. Retire the terms LERC and LEAP from
the NERC Glossary; and 2. modify
Section 3 of Attachment 1 to Reliability
Standard CIP–003–7 ‘‘to more clearly
delineate the circumstances under
which Responsible Entities must
establish access controls for low impact
BES Cyber Systems.’’ 21 NERC states that
the proposed revisions are designed to
simplify the electronic access control
requirements associated with low
impact BES Cyber Systems in order to
avoid ambiguities associated with the
term ‘‘direct.’’ NERC states further that
it recognized the ‘‘added layer of
unnecessary complexity’’ introduced by
distinguishing between ‘‘direct’’ and
‘‘indirect’’ access within the LERC
definition and asserts that the proposed
revisions will ‘‘help ensure that
Responsible Entities implement the
required security controls
effectively.’’ 22
20. NERC states that proposed
Reliability Standard CIP–003–7 would
require responsible entities to
implement electronic access controls for
any communication, direct or indirect
(i.e., communications through an
intermediary device where no direct
connection is present), between a low
18 Id.
(citing NERC NOPR Comments at 31).
19 Id.
20 Id. (‘‘NERC’s clarification on this issue resolves
many of the concerns raised by EnergySec, APS,
and SPP RE regarding the proposed definition, as
a complete security break would not appear to
permit transitive connections through one or more
out of scope cyber assets to go unprotected under
the definition, and would appear to require the
assets to maintain ‘separate conversations’ as
suggested by SPP RE.’’).
21 NERC Petition at 16.
22 Id.
E:\FR\FM\26OCP1.SGM
26OCP1
49544
Federal Register / Vol. 82, No. 206 / Thursday, October 26, 2017 / Proposed Rules
impact BES Cyber System and an
outside Cyber Asset that uses a routable
protocol when entering or leaving the
asset containing the low impact BES
Cyber System. NERC asserts that the
proposed revisions to Section 3 of
Attachment 1 to proposed Reliability
Standard CIP–003–7 improve the clarity
of the electronic access requirements
and focus responsible entities ‘‘on the
security objective of controlling
electronic access to permit only
necessary inbound and outbound
electronic access to low impact BES
Cyber Systems.’’ 23
21. NERC explains that Section 3.1 of
Attachment 1 to proposed Reliability
Standard CIP–003–7 is composed of
three basic elements: 1. Identifying
routable protocol communications from
outside the asset containing the low
impact BES Cyber System; 2.
determining necessary inbound and
outbound electronic access; and 3.
implementing electronic access controls
to permit only necessary inbound and
outbound electronic access to the low
impact BES Cyber System.
22. With regard to the first element,
NERC states that Section 3.1 of
Attachment 1 defines the circumstances
where communications require
electronic access controls. The three
characteristics are:
ethrower on DSK3G9T082PROD with PROPOSALS
1. The communication is between the low
impact BES Cyber System and a Cyber Asset
outside the asset containing low impact BES
Cyber System(s);
2. the communication uses a routable
protocol when entering or leaving the asset
containing the low impact BES Cyber
System(s); and
3. the communication is not used for timesensitive protection or control functions
between intelligent electronic devices.
NERC states further that each of the
three characteristics were included in
the original LERC definition.24
23. NERC asserts that the first
characteristic helps to properly focus
the electronic access controls in light of
‘‘the wide array of low impact BES
Cyber Systems and the risk-based
approach to protecting different types of
BES Cyber Systems.’’ 25 NERC explains
that, whether a ‘‘Responsible Entity uses
a logical border as a demarcation point
or some other understanding of what is
inside or outside the asset, [the
responsible entity] would have to
provide a reasonable justification for its
determination.’’ 26 On the second
characteristic, NERC states that routable
communications present increased risks
at 17.
at 18.
25 Id. at 19.
26 Id.
to the security of BES Cyber Systems
and require additional protections.
Therefore, communications with a low
impact BES Cyber System involving
routable connections require protections
to address the risk of uncontrolled
communications. With regard to the
third characteristic, NERC explains that
the exclusion of communications for
time-sensitive protection and control
functions is intended to avoid
precluding the functionality of timesensitive reliability enhancing
functions. NERC states, however, that an
entity invoking this exclusion may have
to demonstrate that applying electronic
access controls would introduce latency
that would negatively impact
functionality.27
24. According to NERC, the second
characteristic of Section 3.1 of
Attachment 1 provides that responsible
entities may permit only necessary
inbound and outbound electronic access
to low impact BES Cyber Systems as
determined by the responsible entity.
NERC explains that Section 3.1 does not
specify a bright line as to what
constitutes ‘‘necessary inbound and
outbound access’’ due to ‘‘the wide
array of assets containing low impact
BES Cyber Systems and the myriad of
reasons a Responsible Entity may need
to allow electronic access to and from a
low impact BES Cyber Systems.’’ 28
NERC maintains that responsible
entities ‘‘have the flexibility to identify
the necessary electronic access to meet
their business and operational
needs.’’ 29
25. NERC explains that ‘‘a
Responsible Entity must document the
necessity of its inbound and outbound
electronic access permissions and
provide justification of the need for
such access’’ in order to demonstrate
compliance with Section 3.1 of
Attachment 1.30 NERC states that absent
a documented, reasonable justification,
the ERO may find that the responsible
entity was not in compliance with
Section 3.1. NERC asserts that the
purpose of the phrase ‘‘as determined by
the Responsible Entity’’ in Section 3.1 is
to indicate that the determination
whether electronic access is necessary is
to be made in the first instance by the
responsible entity based on the facts and
circumstances of each case. NERC states
further that that the phrase ‘‘as
determined by the Responsible Entity’’
does not limit the ERO’s ability to
engage in effective compliance
oversight. Specifically, NERC contends
23 Id.
27 Id.
24 Id.
28 Id.
VerDate Sep<11>2014
at 20.
at 21–22.
29 Id. at 22.
30 Id.
16:45 Oct 25, 2017
Jkt 244001
PO 00000
Frm 00004
Fmt 4702
Sfmt 4702
that the ERO has the authority to review
the documented justification for
permitting electronic access and to
determine whether it represents a
reasonable exercise of discretion in light
of the overall reliability objective.31
26. In support of its position, NERC
cites the draft Reliability Standard
Audit Worksheet (RSAW) for proposed
Reliability Standard CIP–003–7, which
provides the following language in the
Note to Auditor section for Requirement
R2:
The entity must document its
determination as to what is necessary
inbound and outbound electronic access and
provide justification of the business need for
such access. Once this determination has
been made and documented, the audit team’s
professional judgment cannot override the
determination made by the Responsible
Entity.32
NERC also provides a list of
Commission-approved CIP Reliability
Standards where the phrase ‘‘as
determined by the Responsible Entity’’
or similar language is used. NERC states
that in all circumstances where the
phrase ‘‘as determined by the
Responsible Entity’’ or similar language
is used, ‘‘the ERO has the authority to
evaluate the reasonableness of the
Responsible Entity’s determination
when assessing compliance to ensure it
is consistent with the reliability
objective of the requirement. To
interpret this language otherwise would
be inconsistent with NERC’s statutory
obligation to engage in meaningful
compliance oversight . . .’’ 33
Commission Proposal
27. The Commission proposes to
approve Reliability Standard CIP–003–7
because, as discussed above, the
proposed Reliability Standard largely
addresses the directives in Order No.
822 and is an improvement over the
current Commission-approved CIP
Reliability Standards. However, NERC’s
proposed revisions to Reliability
Standard CIP–003–7 regarding the LERC
31 Id.
at 22–23.
at 22, n.42.
33 Id. at 23–24. NERC also indicates, id at n.42,
that Footnote 1 of the draft RSAW states that
‘‘[w]hile the information included in this RSAW
provides some of the methodology that NERC has
elected to use to assess compliance with the
requirements of the Reliability Standard, this
document should not be treated as a substitute for
the Reliability Standard or viewed as additional
Reliability Standard requirements. In all cases, the
Regional Entity should rely on the language
contained in the Reliability Standard itself, and not
on the language contained in the RSAW, to
determine compliance with the Reliability
Standard.’’ Draft RSAW, https://www.nerc.com/pa/
Stand/Project%20201602%20Modifications%20to
%20CIP%20Standards%20DL/RSAW_CIP-003-7(i)_
v2_Clean_01202017.pdf.
32 Id.
E:\FR\FM\26OCP1.SGM
26OCP1
ethrower on DSK3G9T082PROD with PROPOSALS
Federal Register / Vol. 82, No. 206 / Thursday, October 26, 2017 / Proposed Rules
directive and electronic access controls
for low impact BES Cyber Systems raise
certain issues. In Order No. 822, the
Commission directed NERC to develop
modifications to the LERC definition to
eliminate ambiguity surrounding the
term ‘‘direct’’ as it is used in the
definition. The directive was based on
the concern that responsible entities
could avoid adopting adequate
electronic access protections for low
impact BES Cyber Systems by simply
installing a device, such as a laptop or
protocol converter, in front of the BES
Cyber System to ‘‘break’’ the direct
routable connection. As the Commission
noted in Order No. 822, the desired
clarification could have been made by
including the security concepts from the
Guidelines and Technical Basis section
of Reliability Standard CIP–003–6 in the
definition.34 Instead, NERC’s proposal
comprehensively revises a responsible
entity’s obligations under Requirement
R2 through the revisions to Attachment
1 by deleting the term LERC and giving
responsible entities significantly more
deference in determining how they
construct the electronic access
protections for low impact BES Cyber
Systems.
28. We are concerned that the
proposed revisions may not provide
adequate electronic access controls for
low impact BES Cyber Systems.
Specifically, proposed Reliability
Standard CIP–003–7 does not provide
clear, objective criteria or measures to
assess compliance by independently
confirming that the access control
strategy adopted by a responsible entity
would reasonably meet the security
objective of permitting only ‘‘necessary
inbound and outbound electronic
access’’ to its low impact BES Cyber
Systems.
29. Section 3.1 of Attachment 1 to
proposed Reliability Standard CIP–003–
7 does not appear to contain clear
criteria or objective measures to
determine whether the electronic access
control strategy chosen by the
responsible entity would be effective for
a given low impact BES Cyber System
to permit only necessary inbound and
outbound connections. In order to
ensure an objective and consistentlyapplied requirement, the electronic
access control plan required in
Attachment 1 should require the
responsible entity to articulate its access
control strategy for a particular set of
low impact BES Cyber Systems and
provide a technical rationale rooted in
security principles explaining how that
strategy will reasonably restrict
electronic access. Attachment 1 should
34 See
Order No. 822, 154 FERC ¶ 61,037 at P 73.
VerDate Sep<11>2014
16:45 Oct 25, 2017
Jkt 244001
also outline basic security principles in
order to provide clear, objective criteria
or measures to assist in assessing
compliance. Without such a
requirement, auditors will not
necessarily have adequate information
to assess the reasonableness of the
responsible entity’s decision with
respect to how the responsible entity
identified necessary communications or
restricted electronic access to specific
low impact BES Cyber Systems. And
absent such information, it is possible
that an auditor could assess a violation
where an entity adequately protected its
low impact BES Cyber Systems or fail to
recognize a situation where additional
protections are necessary to meet the
security objective of the standard.
30. As the Commission stated in
Order No. 672, there ‘‘should be a clear
criterion or measure of whether an
entity is in compliance with a proposed
Reliability Standard. It should contain
or be accompanied by an objective
measure of compliance so that it can be
enforced and so that enforcement can be
applied in a consistent and nonpreferential manner.’’ 35 The
Commission reiterated this point in
Order No. 791, stating that ‘‘the absence
of objective criteria to evaluate the
controls chosen by responsible entities
for Low Impact assets introduces an
unacceptable level of ambiguity and
potential inconsistency into the
compliance process, and creates an
unnecessary gap in reliability.’’ 36 The
Commission also observed that
‘‘ambiguity will make it difficult for
registered entities to develop, and NERC
and the regions to objectively evaluate,
the effectiveness of procedures
developed to implement’’ the Reliability
Standard.37
31. As a possible model, the
electronic access control requirements
that are applied to medium and high
impact BES Cyber systems provide a
number of criteria that can be used to
assess the sufficiency of a responsible
entity’s electronic access control
strategy. For medium and high impact
BES Cyber Systems, auditors use the
following criteria to review whether the
access control strategy is reasonable: 1.
Whether the electronic access was
granted through an authorized and
monitored electronic access point
(Reliability Standard CIP–005–5,
Requirement R1); 2. whether the
electronic access granted to individuals/
35 Rules Concerning Certification of the Electric
Reliability Organization and Procedures for the
Establishment, Approval, and Enforcement of
Electric Reliability Standards, Order No. 672, FERC
Stats. & Regs. ¶ 31,204, at P 327 (2006).
36 Order No. 791, 145 FERC ¶ 61,160 at P 108.
37 Id.
PO 00000
Frm 00005
Fmt 4702
Sfmt 4702
49545
devices was evaluated based on need
(Reliability Standard CIP–005–5,
Requirement R1.3); 3. whether the entity
has mechanisms to enforce
authentication of users with electronic
access (Reliability Standard CIP–007–6,
Requirement R5); and 4. whether the
responsible entity routinely uses strong
passwords and manages password
changes (Reliability Standard CIP–007–
6, Requirement R5). Absent similar
criteria in the low impact electronic
access control plan that are
appropriately tailored to the risks posed
by low impact BES Cyber Systems,
responsible entities may adopt
electronic access controls that do not
meet the overarching security objective
of restricting inbound and outbound
electronic access.
32. Therefore, pursuant to section
215(d)(5) of the FPA, we propose to
direct NERC to develop modifications to
Reliability Standard CIP–003–7 to
provide clear, objective criteria for
electronic access controls for low
impact BES Cyber Systems consistent
with the above discussion. The
Commission seeks comment on this
proposal.
B. Protection of Transient Electronic
Devices
Order No. 822
33. In Order No. 822, the Commission
directed NERC to develop modifications
to provide mandatory protection for
transient electronic devices used at low
impact BES Cyber Systems based on the
risk posed to bulk electric system
reliability. The Commission stated that
such modifications ‘‘will provide an
important enhancement to the security
posture of the bulk electric system by
reinforcing the defense-in-depth nature
of the CIP Reliability Standards at all
impact levels.’’ 38 The Commission also
stated that the proposed modifications
should be designed to effectively
address the risks posed by transient
electronic devices used at low impact
BES Cyber Systems ‘‘in a manner that is
consistent with the risk-based approach
reflected in the CIP version 5
Standards.’’ 39
NERC Petition
34. In its Petition, NERC proposes to
add a new section to Attachment 1 to
proposed Reliability Standard CIP–003–
7 to require responsible entities to
include controls in their cyber security
plans to mitigate the risk of the
introduction of malicious code to low
impact BES Cyber Systems through the
38 Order No. 822, 154 FERC ¶ 61,037 at P 32
(emphasis in original).
39 Id.
E:\FR\FM\26OCP1.SGM
26OCP1
ethrower on DSK3G9T082PROD with PROPOSALS
49546
Federal Register / Vol. 82, No. 206 / Thursday, October 26, 2017 / Proposed Rules
use of ‘‘Transient Cyber Assets or
Removable Media.’’ Specifically,
proposed Section 5 of Attachment 1 lists
controls to be applied to Transient
Cyber Assets and Removable Media that
NERC states ‘‘will provide enhanced
protections against the propagation of
malware from transient devices.’’ 40
35. NERC states that the language in
proposed Section 5 to Attachment 1
parallels the language in Attachment 1
to Reliability Standard CIP–010–2,
which addresses mitigation of the risks
of the introduction of malicious code to
high and medium impact BES Cyber
Systems through the use of Transient
Cyber Assets or Removable Media.
NERC states further that, as in
Reliability Standard CIP–010–2,
proposed Section 5 distinguishes
between Transient Cyber Assets
managed by a responsible entity and
those managed by a third-party; the
distinction arising because of a
responsible entity’s lack of control over
Transient Cyber Assets managed by a
third-party. NERC explains that the
proposed controls for Removable Media
do not distinguish between the
responsible entity-managed assets and
third-party managed assets due to the
functionality of Removable Media.
NERC provides the example of a thumb
drive that can be scanned prior to use
regardless of which party manages the
asset.41
36. NERC explains that proposed
Section 5 of Attachment 1 requires
responsible entities to meet the security
objectives ‘‘by implementing the
controls that the Responsible Entity
determines necessary to meet its
affirmative obligation to mitigate the
risks of the introduction of malicious
code.’’ 42 NERC states that the approach
reflected in Section 5 provides the
flexibility to implement the controls
that best suit the needs and
characteristics of a responsible entity’s
organization. NERC explains further that
‘‘the Responsible Entity must
demonstrate that its selected controls
were designed to meet the security
objective to mitigate the risk of the
introduction of malicious code.’’ 43
37. NERC outlines certain distinctions
between proposed Section 5 of
Attachment 1 to proposed Reliability
Standard CIP–003–7 and Attachment 1
to Reliability Standard CIP–010–2.
Specifically, NERC states that proposed
Section 5 does not include requirements
relating to authorization or software
vulnerabilities, as are contained in
40 Id.
41 Id.
at 26–27.
at 28.
Petition at 29.
at 29–30.
46 Id. at 30.
47 See NERC Petition at 29–30.
45 Id.
at 29.
VerDate Sep<11>2014
Commission Proposal
39. NERC’s proposed modifications in
Reliability Standard CIP–003–7,
Requirement R2, Attachment 1, Section
5 that include malware detection and
prevention controls for responsible
entity-managed Transient Cyber Assets
and Removable Media should improve
the cybersecurity posture of
responsibility entities compared to
currently-effective Reliability Standard
CIP–003–6. The revisions in Section 5.2,
however, do not address one aspect of
the reliability gap identified in Order
No. 822 regarding low impact BES
Cyber Systems. Specifically, as noted
above, proposed Reliability Standard
CIP–003–7 does not explicitly require
mitigation of the introduction of
malicious code from third-party
managed Transient Cyber Assets, even if
the responsible entity determines that
the third-party’s policies and
procedures are inadequate.47 While the
44 NERC
42 Id.
43 Id.
Attachment 1 to Reliability Standard
CIP–010–2. NERC explains that this
difference is consistent with the riskbased approach of the CIP Reliability
Standards and ‘‘the underlying
principle of concentrating limited
industry resources on protecting those
BES Cyber Systems with greater risk to
the BES.’’ NERC states that Section 5
focuses on the risk associated with the
introduction of malicious code.44
38. In addition, NERC states that
proposed Section 5 to Attachment 1
does not include language requiring a
responsible entity to determine whether
additional mitigation actions are
necessary where a third party manages
a Transient Cyber Asset, nor does it
include language requiring a responsible
entity to implement additional
mitigation actions in such situations.
NERC states that it nonetheless expects
‘‘that if another party’s processes and
practices for protecting its Transient
Cyber Assets do not provide reasonable
assurance that they are designed to
effectively meet the security objective of
mitigating the introduction of malicious
code, the Responsible Entity must take
additional steps to meet the stated
objective.’’ 45 NERC explains that if a
third party’s practices and policies do
not provide reasonable assurance that
the Transient Cyber Assets would be
protected from malicious code, ‘‘simply
reviewing those policies and procedures
without taking other steps to mitigate
the risks of introduction of malicious
code may not constitute compliance.’’ 46
16:45 Oct 25, 2017
Jkt 244001
PO 00000
Frm 00006
Fmt 4702
Sfmt 4702
proposed Reliability Standard does not
explicitly require mitigation of the
introduction of malicious code from
third-party managed Transient Cyber
Assets, NERC states that the failure to
mitigate this risk ‘‘may not constitute
compliance.’’ 48 NERC’s statement
suggests that, with regard to low impact
BES Cyber Systems, the proposed
requirement lacks an obligation for a
responsible entity to correct any
deficiencies that are discovered during
a review of third-party Transient Cyber
Asset management practices. Indeed,
the parallel provision for high and
medium impact BES Cyber Systems
specifies that ‘‘Responsible Entities
shall determine whether any additional
mitigation actions are necessary and
implement such actions prior to
connecting the Transient Cyber
Asset.’’ 49 Yet, such language obligating
mitigation action is not proposed for
low impact BES Cyber Assets.
40. The proposed Reliability Standard
may, therefore, contain a reliability gap
where a responsible entity contracts
with a third-party but fails to mitigate
potential deficiencies discovered in the
third-party’s malicious code detection
and prevention practices prior to a
Transient Cyber Asset being connected
to a low impact BES Cyber System. That
is because the proposed Reliability
Standard does not contain: 1. A
requirement for the responsible entity to
mitigate any malicious code found
during the third-party review(s); or 2. a
requirement that the responsible entity
take reasonable steps to mitigate the
risks of third party malicious code on
their systems, if an arrangement cannot
be made for the third-party to do so.
Without these obligations, we are
concerned that responsible entities
could, without compliance
consequences, simply accept the risk of
deficient third-party transient electronic
device management practices.50
Moreover, the requirement to ‘‘review’’
methods used by third-parties to detect
and prevent malware may fail to convey
the necessary next steps that a
responsible entity should take.51
48 Id.
at 30.
49 Reliability
Standard CIP–010–2 (Cyber
Security—Configuration Change Management and
Vulnerability Assessments), Requirement R4,
Attachment 1, Section 2.3. In contrast, the
obligations to ‘‘review’’ methods used by thirdparties to detect and prevent malware are similar
for lower, medium and high impact BES Cyber
Assets. Cf. CIP–010–2, Attachment 1, Sections 2.1
and 2.2; and proposed CIP–010–3, Attachment 1,
Section 3.2.
50 See Order No. 706, 122 FERC ¶ 61,040 at P 150
(rejecting the concept of acceptance of risk in the
CIP Reliability Standards).
51 See Order No. 791, 145 FERC ¶ 61,160 at P 108.
E:\FR\FM\26OCP1.SGM
26OCP1
Federal Register / Vol. 82, No. 206 / Thursday, October 26, 2017 / Proposed Rules
41. Therefore, pursuant to section
215(d)(5) of the FPA, we propose to
direct that NERC develop modifications
to proposed Reliability Standard CIP–
003–7 to address the need to mitigate
the risk of malicious code that could
result from third-party Transient Cyber
Assets consistent with the above
discussion. The Commission seeks
comment on this proposal.
C. Proposed NERC Glossary Definitions
42. Proposed Reliability Standard
CIP–003–7 includes two revised
definitions for inclusion in the NERC
Glossary. Specifically, NERC proposes
to revise the definitions of Transient
Cyber Asset and Removable Media in
order to accommodate the use of the
terms at all impact levels. NERC
explains that the original definitions
include references to concepts or
requirements associated only with high
and medium impact BES Cyber Systems
and the definitions were modified to
avoid confusion because protections for
Transient Electronic Devices will now
be extended to low impact BES Cyber
Systems.52
43. In addition, NERC proposes to
retire the definitions of LERC and LEAP.
NERC states that the proposed
retirement of the NERC Glossary terms
LERC and LEAP accords with the
proposed modifications to Section 3 of
Attachment 1 to proposed Reliability
Standard CIP–003–7 and is intended to
simplify the electronic access control
requirements for low impact BES Cyber
Systems by avoiding the ambiguities
associated with the term ‘‘direct.’’ NERC
explains further that it ‘‘recognized that
distinguishing between ‘direct’ and
‘indirect’ electronic access within the
LERC definition added a layer of
unnecessary complexity.’’ 53
44. We propose to approve the revised
definitions of Transient Cyber Asset and
Removable Media, as well as the
retirement of the definitions of LERC
and LEAP.
D. Implementation Plan and Effective
Dates
45. NERC requests an effective date
for proposed Reliability Standard CIP–
003–7 and the revised definitions of
52 NERC
ethrower on DSK3G9T082PROD with PROPOSALS
53 Id.
Petition at 30.
at 16.
VerDate Sep<11>2014
16:45 Oct 25, 2017
Jkt 244001
Transient Cyber Asset and Removable
Media on the first day of the first
calendar quarter that is eighteen months
after the effective date of the
Commission’s order approving the
proposed Reliability Standard. NERC
explains that the proposed
implementation plan does not alter the
previously-approved compliance dates
for Reliability Standard CIP–003–6 other
than the compliance date for Reliability
Standard CIP–003–6, Requirement R2,
Attachment 1, Sections 2 and 3, which
would be replaced with the effective
date for proposed Reliability Standard
CIP–003–7. NERC also proposes that the
retirement of Reliability Standard CIP–
003–6 and the associated definitions
become effective on the effective date of
proposed Reliability Standard CIP–003–
7.54
46. We propose to approve NERC’s
implementation plan for proposed
Reliability Standard CIP–003–7, as
described above.
E. Violation Risk Factor/Violation
Severity Level Assignments
47. NERC requests approval of two
violation risk factors and violation
severity levels assigned to proposed
Reliability Standard CIP–003–7.
Specifically, NERC requests approval of
violation risk factor and violation
severity level assignments associated
with Requirements R1 and R2 of
Reliability Standard CIP–003–7.55 We
propose to accept these violation risk
factors and violation severity levels.
III. Information Collection Statement
48. The FERC–725B information
collection requirements contained in
this proposed rule are subject to review
by the Office of Management and
Budget (OMB) under section 3507(d) of
the Paperwork Reduction Act of 1995.56
OMB’s regulations require approval of
certain information collection
requirements imposed by agency
rules.57 Upon approval of a collection of
information, OMB will assign an OMB
control number and expiration date.
Respondents subject to the filing
54 Id.,
Exhibit C (Implementation Plan).
Exhibit F (Analysis of Violation Risk
Factors and Violation Severity Levels).
56 44 U.S.C. 3507(d) (2012).
57 5 CFR 1320.11 (2017).
55 Id.,
PO 00000
Frm 00007
Fmt 4702
Sfmt 4702
49547
requirements of this rule will not be
penalized for failing to respond to these
collections of information unless the
collections of information display a
valid OMB control number. The
Commission solicits comments on the
Commission’s need for this information,
whether the information will have
practical utility, the accuracy of the
burden estimates, ways to enhance the
quality, utility, and clarity of the
information to be collected or retained,
and any suggested methods for
minimizing respondents’ burden,
including the use of automated
information techniques.
49. The Commission bases its
paperwork burden estimates on the
changes in paperwork burden presented
by the proposed revision to CIP
Reliability Standard CIP–003–7 as
compared to the current Commissionapproved Reliability Standard CIP–003–
6. The Commission has already
addressed the burden of implementing
Reliability Standard CIP–003–6.58 As
discussed above, the immediate
rulemaking addresses three areas of
modification to the CIP Reliability
Standards: 1. Clarifying the obligations
pertaining to electronic access control
for low impact BES Cyber Systems; 2.
adopting mandatory security controls
for transient electronic devices (e.g.,
thumb drives, laptop computers, and
other portable devices frequently
connected to and disconnected from
systems) used at low impact BES Cyber
Systems; and 3. requiring responsible
entities to have a policy for declaring
and responding to CIP Exceptional
Circumstances related to low impact
BES Cyber Systems.
50. The NERC Compliance Registry,
as of September 2017, identifies
approximately 1,320 U.S. entities that
are subject to mandatory compliance
with Reliability Standards. Of this total,
we estimate that 1,100 entities will face
an increased paperwork burden under
proposed Reliability Standard CIP 003–
7, estimating that a majority of these
entities will have one or more low
impact BES Cyber Systems. Based on
these assumptions, we estimate the
following reporting burden:
58 See Order No. 822, 154 FERC ¶ 61,037 at PP
84–88.
E:\FR\FM\26OCP1.SGM
26OCP1
49548
Federal Register / Vol. 82, No. 206 / Thursday, October 26, 2017 / Proposed Rules
RM17–11–000
NOPR
[Mandatory Reliability Standards for Critical Infrastructure Protection Reliability Standards]
Number of
respondents
(1)
Annual
number of
responses
per respondent
(2)
Total number of responses
(1) * (2) =
(3)
Cost per
respondent
($)
(5) ÷ (1)
Average burden & cost
per response 59
(4)
Total annual burden
hours & total annual cost
(3) * (4) = (5)
$1,680
37,800
1,680
Create low impact TCA assets plan (one-time) 60 ...
Updates and reviews of low impact TCA assets
(ongoing) 61.
Update/modify documentation to remove LERC
and LEAP (one-time) 60.
Update paperwork for access control implementation in Section 2 64 and Section 3 65 (ongoing) 61.
1,100
1,100
62 300
1,100
330,000
20 hrs.; $1,680 ...............
1.5 hrs. 63; $126 .............
1,100
1
1,100
20 hrs.; $1,680 ...............
6,875 hrs.; $1,848,000 ...
495,000 hrs.;
$41,580,000.
6,875 hrs.; $1,848,000 ...
1,100
1
1,100
20 hrs.; $1,680 ...............
6,875 hrs.; $1,848,000 ...
Total (one-time) 60 .............................................
....................
....................
2,200
........................................
13,750 hrs.; $3,696,000
....................
....................
....................
331,100
........................................
501,875 hrs.;
$43,428,000.
....................
Total
(ongoing) 61
..............................................
ethrower on DSK3G9T082PROD with PROPOSALS
51. The following shows the annual
cost burden for each group, based on the
burden hours in the table above:
• Year 1: $3,696,000.
• Years 2 and 3: $43,428,000.
• The paperwork burden estimate
includes costs associated with the initial
development of a policy to address
requirements relating to: 1. Clarifying
the obligations pertaining to electronic
access control for low impact BES Cyber
Systems; 2. adopting mandatory security
controls for transient electronic devices
(e.g., thumb drives, laptop computers,
and other portable devices frequently
connected to and disconnected from
systems) used at low impact BES Cyber
Systems; and 3. requiring responsible
entities to have a policy for declaring
and responding to CIP Exceptional
Circumstances related to low impact
BES Cyber Systems. Further, the
estimate reflects the assumption that
costs incurred in year 1 will pertain to
59 The loaded hourly wage figure (includes
benefits) is based on the average of three
occupational categories for 2016 found on the
Bureau of Labor Statistics Web site (https://
www.bls.gov/oes/current/naics2_22.htm):
Legal (Occupation Code: 23–0000): $143.68.
Electrical Engineer (Occupation Code: 17–2071):
$68.12.
Office and Administrative Support (Occupation
Code: 43–0000): $40.89 ($143.68 + $68.12 + $40.89)
÷ 3 = $84.23. The figure is rounded to $84.00 for
use in calculating wage figures in this NOPR.
60 This one-time burden applies in Year One only.
61 This ongoing burden applies in Year 2 and
beyond.
62 We estimate that each entity will perform 25
updates per month. 25 updates *12 months = 300
updates (i.e. responses) per year.
63 The 1.5 hours of burden per response is
comprised of three sub-categories:
Updates to managed low TCA assets: 15 minutes
(0.25 hours) per response.
Updates to unmanaged low TCA assets: 60
minutes (1 hour) per response.
Reviews of low TCA applicable controls: 15
minutes (0.25 hours) per response.
64 Physical Security Controls.
65 Electronic Access Controls.
VerDate Sep<11>2014
18:24 Oct 25, 2017
Jkt 244001
1
policy development, while costs in
years 2 and 3 will reflect the burden
associated with maintaining logs and
other records to demonstrate ongoing
compliance.
52. Title: Mandatory Reliability
Standards, Revised Critical
Infrastructure Protection Reliability
Standards
Action: Proposed Collection FERC–
725B.
OMB Control No.: 1902–0248.
Respondents: Businesses or other forprofit institutions; not-for-profit
institutions.
Frequency of Responses: On
Occasion.
Necessity of the Information: This
proposed rule proposes to approve the
requested modifications to Reliability
Standards pertaining to critical
infrastructure protection. As discussed
above, the Commission proposes to
approve NERC’s proposed revised CIP
Reliability Standard CIP–003–7
pursuant to section 215(d)(2) of the FPA
because it improves upon the currentlyeffective suite of cyber security CIP
Reliability Standards.
Internal Review: The Commission has
reviewed the proposed Reliability
Standards and made a determination
that its action is necessary to implement
section 215 of the FPA.
53. Interested persons may obtain
information on the reporting
requirements by contacting the
following: Federal Energy Regulatory
Commission, 888 First Street NE.,
Washington, DC 20426 [Attention: Ellen
Brown, Office of the Executive Director,
email: DataClearance@ferc.gov, phone:
(202) 502–8663, fax: (202) 273–0873].
54. For submitting comments
concerning the collection(s) of
information and the associated burden
estimate(s), please send your comments
to the Commission, and to the Office of
Management and Budget, Office of
PO 00000
Frm 00008
Fmt 4702
Sfmt 4702
1,680
Information and Regulatory Affairs,
Washington, DC 20503 [Attention: Desk
Officer for the Federal Energy
Regulatory Commission, phone: (202)
395–4638, fax: (202) 395–7285]. For
security reasons, comments to OMB
should be submitted by email to: oira_
submission@omb.eop.gov. Comments
submitted to OMB should include
Docket Number RM17–11–000 and
OMB Control Number 1902–0248.
IV. Regulatory Flexibility Act Analysis
55. The Regulatory Flexibility Act of
1980 (RFA) generally requires a
description and analysis of proposed
rules that will have significant
economic impact on a substantial
number of small entities.66 The Small
Business Administration’s (SBA) Office
of Size Standards develops the
numerical definition of a small
business.67 The SBA revised its size
standard for electric utilities (effective
January 22, 2014) to a standard based on
the number of employees, including
affiliates (from the prior standard based
on megawatt hour sales).68 Proposed
Reliability Standard CIP–003–7 is
expected to impose an additional
burden on 1,100 entities 69 (reliability
coordinators, generator operators,
generator owners, interchange
coordinators or authorities, transmission
operators, balancing authorities,
66 5
U.S.C. 601–12 (2012).
CFR 121.101 (2017).
68 SBA Final Rule on ‘‘Small Business Size
Standards: Utilities,’’ 78 FR 77343 (Dec. 23, 2013).
69 Public utilities may fall under one of several
different categories, each with a size threshold
based on the company’s number of employees,
including affiliates, the parent company, and
subsidiaries. For the analysis in this NOPR, we are
using a 500 employee threshold due to each
affected entity falling within the role of Electric
Bulk Power Transmission and Control (NAISC
Code: 221121).
67 13
E:\FR\FM\26OCP1.SGM
26OCP1
Federal Register / Vol. 82, No. 206 / Thursday, October 26, 2017 / Proposed Rules
transmission owners, and certain
distribution providers).
56. Of the 1,100 affected entities
discussed above, we estimate that
approximately 857 or 78 percent 70 of
the affected entities are small. As
discussed above, proposed Reliability
Standard CIP–003–7 enhances
reliability by providing criteria against
which NERC and the Commission can
evaluate the sufficiency of an entity’s
electronic access controls for low
impact BES Cyber systems, as well as
improved security controls for transient
electronic devices (e.g., thumb drives,
laptop computers, and other portable
devices frequently connected to and
disconnected from systems). We
estimate that each of the 857 small
entities to whom the proposed
modifications to Reliability Standard
CIP–003–7 applies will incur one-time
costs of approximately $3,360 per entity
to implement this standard, as well as
the ongoing paperwork burden reflected
in the Information Collection Statement
(approximately $39,480 per year per
entity). We do not consider the
estimated costs for these 857 small
entities to be a significant economic
impact.
57. Based on the above analysis, we
propose to certify that the proposed
Reliability Standard will not have a
significant economic impact on a
substantial number of small entities.
ethrower on DSK3G9T082PROD with PROPOSALS
V. Environmental Analysis
58. The Commission is required to
prepare an Environmental Assessment
or an Environmental Impact Statement
for any action that may have a
significant adverse effect on the human
environment.71 The Commission has
categorically excluded certain actions
from this requirement as not having a
significant effect on the human
environment. Included in the exclusion
are rules that are clarifying, corrective,
or procedural or that do not
substantially change the effect of the
regulations being amended.72 The
actions proposed herein fall within this
categorical exclusion in the
Commission’s regulations.
VI. Comment Procedures
59. The Commission invites interested
persons to submit comments on the
matters and issues proposed in this
notice to be adopted, including any
related matters or alternative proposals
that commenters may wish to discuss.
Comments are due December 26, 2017.
70 77.95
percent.
Implementing the National
Environmental Policy Act of 1969, Order No. 486,
FERC Stats. & Regs. ¶ 30,783 (1987).
72 18 CFR 380.4(a)(2)(ii) (2017).
71 Regulations
VerDate Sep<11>2014
16:45 Oct 25, 2017
Jkt 244001
Comments must refer to Docket No.
RM17–11–000, and must include the
commenter’s name, the organization
they represent, if applicable, and
address.
60. The Commission encourages
comments to be filed electronically via
the eFiling link on the Commission’s
Web site at https://www.ferc.gov. The
Commission accepts most standard
word processing formats. Documents
created electronically using word
processing software should be filed in
native applications or print-to-PDF
format and not in a scanned format.
Commenters filing electronically do not
need to make a paper filing.
61. Commenters that are not able to
file comments electronically must send
an original of their comments to:
Federal Energy Regulatory Commission,
Secretary of the Commission, 888 First
Street NE., Washington, DC 20426.
62. All comments will be placed in
the Commission’s public files and may
be viewed, printed, or downloaded
remotely as described in the Document
Availability section below. Commenters
on this proposal are not required to
serve copies of their comments on other
commenters.
VII. Document Availability
63. In addition to publishing the full
text of this document in the Federal
Register, the Commission provides all
interested persons an opportunity to
view and/or print the contents of this
document via the Internet through the
Commission’s Home Page (https://
www.ferc.gov) and in the Commission’s
Public Reference Room during normal
business hours (8:30 a.m. to 5:00 p.m.
Eastern time) at 888 First Street NE.,
Room 2A, Washington, DC 20426.
64. From the Commission’s Home
Page on the Internet, this information is
available on eLibrary. The full text of
this document is available on eLibrary
in PDF and Microsoft Word format for
viewing, printing, and/or downloading.
To access this document in eLibrary,
type the docket number of this
document, excluding the last three
digits, in the docket number field.
65. User assistance is available for
eLibrary and the Commission’s Web site
during normal business hours from the
Commission’s Online Support at 202–
502–6652 (toll free at 1–866–208–3676)
or email at ferconlinesupport@ferc.gov,
or the Public Reference Room at (202)
502–8371, TTY (202) 502–8659. Email
the Public Reference Room at
public.referenceroom@ferc.gov.
By direction of the Commission.
PO 00000
Frm 00009
Fmt 4702
Sfmt 4702
49549
Issued October 19, 2017.
Nathaniel J. Davis, Sr.,
Deputy Secretary.
[FR Doc. 2017–23287 Filed 10–25–17; 8:45 am]
BILLING CODE 6717–01–P
DEPARTMENT OF THE TREASURY
Internal Revenue Service
26 CFR Part 1
[REG–134247–16]
RIN 1545–BN73
Revision of Regulations Under Chapter
3 Regarding Withholding of Tax on
Certain U.S. Source Income Paid to
Foreign Persons; Correction
Internal Revenue Service (IRS),
Treasury.
ACTION: Notice of proposed rulemaking;
correction.
AGENCY:
This document corrects a
correction to a notice of proposed
rulemaking (REG–134247–16) that was
published in the Federal Register on
Friday, September 15, 2017. The notice
of proposed rulemaking, published on
January 6, 2017, under section 1441 of
the Internal Revenue Code of 1986
(Code), relates to withholding of tax on
certain U.S. source income paid to
foreign persons and requirements for
certain claims for refund or credit of
income tax made by foreign persons.
DATES: The correction published on
September 15, 2017 (82 FR 43314), is
corrected as of October 26, 2017 and is
applicable beginning January 6, 2017.
FOR FURTHER INFORMATION CONTACT:
Kamela Nelan at (202) 317- 6942 (not a
toll-free number).
SUPPLEMENTARY INFORMATION:
SUMMARY:
Background
The notice of proposed rulemaking
(REG–134247–16) that is the subject of
this correction is under section 1441 of
the Code.
Need for Correction
As published, the notice of proposed
rulemaking (REG–134247–16) contains
an error which may prove to be
misleading and needs to be corrected.
Correction of Publication
Accordingly, the notice of proposed
rulemaking published at 82 FR 43314,
September 15, 2017, is corrected as
follows:
On page 43314, in the third column,
under the heading ‘‘Correction of
Publication’’, in the fourth line, the
E:\FR\FM\26OCP1.SGM
26OCP1
Agencies
[Federal Register Volume 82, Number 206 (Thursday, October 26, 2017)]
[Proposed Rules]
[Pages 49541-49549]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2017-23287]
========================================================================
Proposed Rules
Federal Register
________________________________________________________________________
This section of the FEDERAL REGISTER contains notices to the public of
the proposed issuance of rules and regulations. The purpose of these
notices is to give interested persons an opportunity to participate in
the rule making prior to the adoption of the final rules.
========================================================================
Federal Register / Vol. 82, No. 206 / Thursday, October 26, 2017 /
Proposed Rules
[[Page 49541]]
DEPARTMENT OF ENERGY
Federal Energy Regulatory Commission
18 CFR Part 40
[Docket No. RM17-11-000]
Revised Critical Infrastructure Protection Reliability Standard
CIP-003-7--Cyber Security--Security Management Controls
AGENCY: Federal Energy Regulatory Commission, DOE.
ACTION: Notice of proposed rulemaking.
-----------------------------------------------------------------------
SUMMARY: The Federal Energy Regulatory Commission (Commission) proposes
to approve Critical Infrastructure Protection (CIP) Reliability
Standard CIP-003-7 (Cyber Security--Security Management Controls),
submitted by the North American Electric Reliability Corporation
(NERC). Proposed Reliability Standard CIP-003-7 improves upon the
current Commission-approved CIP Reliability Standards by clarifying the
obligations pertaining to electronic access control for low impact BES
Cyber Systems; adopting mandatory security controls for transient
electronic devices (e.g., thumb drives, laptop computers, and other
portable devices frequently connected to and disconnected from systems)
used at low impact BES Cyber Systems; and requiring responsible
entities to have a policy for declaring and responding to CIP
Exceptional Circumstances related to low impact BES Cyber Systems. In
addition, the Commission proposes to direct NERC to develop certain
modifications to the NERC Reliability Standards to provide clear,
objective criteria for electronic access controls for low impact BES
Cyber Systems; and address the need to mitigate the risk of malicious
code that could result from third-party transient electronic devices.
DATES: Comments are due December 26, 2017.
ADDRESSES: Comments, identified by docket number, may be filed in the
following ways:
Electronic Filing through https://www.ferc.gov. Documents
created electronically using word processing software should be filed
in native applications or print-to-PDF format and not in a scanned
format.
Mail/Hand Delivery: Those unable to file electronically
may mail or hand-deliver comments to: Federal Energy Regulatory
Commission, Secretary of the Commission, 888 First Street NE.,
Washington, DC 20426.
Instructions: For detailed instructions on submitting comments and
additional information on the rulemaking process, see the Comment
Procedures section of this document.
FOR FURTHER INFORMATION CONTACT: Matthew Dale (Technical Information),
Office of Electric Reliability, Federal Energy Regulatory Commission,
888 First Street NE., Washington, DC 20426, (202) 502-6826,
[email protected], Kevin Ryan (Legal Information), Office of the
General Counsel, Federal Energy Regulatory Commission, 888 First Street
NE., Washington, DC 20426, (202) 502-6840, [email protected].
SUPPLEMENTARY INFORMATION:
1. Pursuant to section 215 of the Federal Power Act (FPA),\1\ the
Commission proposes to approve Critical Infrastructure Protection (CIP)
Reliability Standard CIP-003-7 (Cyber Security--Security Management
Controls). The North American Electric Reliability Corporation (NERC),
the Commission-certified Electric Reliability Organization (ERO),
submitted proposed Reliability Standard CIP-003-7 in response to
directives in Order No. 822.\2\ The Commission also proposes to approve
the associated violation risk factors and violation severity levels,
implementation plan and effective dates proposed by NERC. In addition,
the Commission proposes to approve the modified definitions of
Transient Cyber Asset and Removable Media as well as the retirement of
the definitions for Low Impact External Routable Connectivity (LERC)
and Low Impact Electronic Access Point (LEAP) in the NERC Glossary of
Terms Used in NERC Reliability Standards (NERC Glossary). Further, the
Commission proposes to approve the retirement of Reliability Standard
CIP-003-6.
---------------------------------------------------------------------------
\1\ 16 U.S.C. 824o (2012).
\2\ Revised Critical Infrastructure Protection Reliability
Standards, Order No. 822, 154 FERC ] 61,037, reh'g denied, Order No.
822-A, 156 FERC ] 61,052 (2016).
---------------------------------------------------------------------------
2. Proposed Reliability Standard CIP-003-7 is designed to mitigate
the cybersecurity risks to bulk electric system facilities, systems,
and equipment, which, if destroyed, degraded, or otherwise rendered
unavailable as a result of a cybersecurity incident, would affect the
reliable operation of the bulk electric system.\3\ As discussed below,
the Commission proposes to determine that proposed Reliability Standard
CIP-003-7 is just, reasonable, not unduly discriminatory or
preferential, and in the public interest and addresses the directives
in Order No. 822 by: 1. Clarifying the obligations pertaining to
electronic access control for low impact BES Cyber Systems; \4\ and 2.
adopting mandatory security controls for transient electronic devices
(e.g., thumb drives, laptop computers, and other portable devices
frequently connected to and disconnected from systems) used at low
impact BES Cyber Systems. In addition, by requiring responsible
entities to have a policy for declaring and responding to CIP
Exceptional Circumstances for low impact BES Cyber Systems, the
proposed Reliability Standard aligns the treatment of low impact BES
Cyber Systems with that of high and medium impact BES Cyber Systems,
which currently include a requirement for declaring and responding to
CIP Exceptional Circumstances. Accordingly, we propose to approve
proposed Reliability Standard CIP-003-7 because the proposed
modifications improve the base-line cybersecurity posture of
responsible entities compared to the current Commission-approved CIP
Reliability Standards.
---------------------------------------------------------------------------
\3\ See NERC Petition at 2.
\4\ NERC defines ``BES Cyber System'' as one or more BES Cyber
Assets logically grouped by a responsible entity to perform one or
more reliability tasks for a functional entity.
---------------------------------------------------------------------------
3. In addition, pursuant to FPA section 215(d)(5), the Commission
proposes to direct NERC to develop certain modifications to the CIP
Reliability Standards. As discussed below, while proposed Reliability
Standard CIP-003-7 improves electronic access control for low impact
BES Cyber Systems and enhances security controls for transient
electronic
[[Page 49542]]
devices used at low impact BES Cyber Systems, we propose to direct that
NERC modify Reliability Standard CIP-003-7 to: 1. Provide clear,
objective criteria for electronic access controls for low impact BES
Cyber Systems; and 2. address the need to mitigate the risk of
malicious code that could result from third-party transient electronic
devices. We believe that modifications addressing these two concerns
will address potential gaps and improve the cyber security posture of
responsible entities that must comply with the CIP standards.
I. Background
A. Section 215 and Mandatory Reliability Standards
4. Section 215 of the FPA requires a Commission-certified ERO to
develop mandatory and enforceable Reliability Standards, subject to
Commission review and approval. Reliability Standards may be enforced
by the ERO, subject to Commission oversight, or by the Commission
independently.\5\ Pursuant to section 215 of the FPA, the Commission
established a process to select and certify an ERO,\6\ and subsequently
certified NERC.\7\
---------------------------------------------------------------------------
\5\ 16 U.S.C. 824o(e) (2012).
\6\ Rules Concerning Certification of the Electric Reliability
Organization; and Procedures for the Establishment, Approval, and
Enforcement of Electric Reliability Standards, Order No. 672, FERC
Stats. & Regs. ] 31,204, order on reh'g, Order No. 672-A, FERC
Stats. & Regs. ] 31,212 (2006).
\7\ North American Electric Reliability Corp., 116 FERC ]
61,062, order on reh'g and compliance, 117 FERC ] 61,126 (2006),
aff'd sub nom. Alcoa, Inc. v. FERC, 564 F.3d 1342 (D.C. Cir. 2009).
---------------------------------------------------------------------------
B. Order No. 822
5. The Commission approved the ``Version 1'' CIP standards in
January 2008, and subsequently acted on revised versions of the CIP
standards.\8\ On January 21, 2016, in Order No. 822, the Commission
approved seven CIP Reliability Standards: CIP-003-6 (Security
Management Controls), CIP-004-6 (Personnel and Training), CIP-006-6
(Physical Security of BES Cyber Systems), CIP-007-6 (Systems Security
Management), CIP-009-6 (Recovery Plans for BES Cyber Systems), CIP-010-
2 (Configuration Change Management and Vulnerability Assessments), and
CIP-011-2 (Information Protection). The Commission determined that the
Reliability Standards under consideration at that time were an
improvement over the prior iteration of the CIP Reliability Standards
and addressed the directives in Order No. 791 by, among other things,
addressing in an equally effective and efficient manner the need for a
NERC Glossary definition for the term ``communication networks'' and
providing controls to address the risks posed by transient electronic
devices (e.g., thumb drives and laptop computers) used at high and
medium impact BES Cyber Systems.\9\
---------------------------------------------------------------------------
\8\ Mandatory Reliability Standards for Critical Infrastructure
Protection, Order No. 706, 122 FERC ] 61,040, order on reh'g, Order
No. 706-A, 123 FERC ] 61,174 (2008), order on clarification, Order
No. 706-B, 126 FERC ] 61,229 (2009), order on clarification, Order
No. 706-C, 127 FERC ] 61,273 (2009).
\9\ Order No. 822, 154 FERC ] 61,037 at P 17; see also Version 5
Critical Infrastructure Protection Reliability Standards, Order No.
791, 78 FR 72755 (Dec. 3, 2013), 145 FERC ] 61,160 (2013), order on
clarification and reh'g, Order No. 791-A, 146 FERC ] 61,188 (2014).
---------------------------------------------------------------------------
6. In addition, in Order No. 822, pursuant to section 215(d)(5) of
the FPA, the Commission directed NERC, inter alia, to: 1. Develop
modifications to the LERC definition to eliminate ambiguity surrounding
the term ``direct'' as it is used in the LERC definition; and 2.
develop modifications to the CIP Reliability Standards to provide
mandatory protection for transient electronic devices used at low
impact BES Cyber Systems.\10\
---------------------------------------------------------------------------
\10\ Order No. 822, 154 FERC ] 61,037 at P 18.
---------------------------------------------------------------------------
C. NERC Petition
7. On March 3, 2017, NERC submitted a petition seeking approval of
Reliability Standard CIP-003-7 and the associated violation risk
factors and violation severity levels, implementation plan and
effective dates. NERC states that proposed Reliability Standard CIP-
003-7 satisfies the criteria set forth in Order No. 672 that the
Commission applies when reviewing a proposed Reliability Standard.\11\
NERC also sought approval of revisions to NERC Glossary definitions for
the terms Removable Media and Transient Cyber Asset, as well as the
retirement of the NERC Glossary definitions of LERC and LEAP. In
addition, NERC proposed the retirement of Commission-approved
Reliability Standard CIP-003-6.
---------------------------------------------------------------------------
\11\ See NERC Petition at 2 (citing Order No. 672, FERC Stats. &
Regs. ] 31,204 at PP 262, 321-337); id. at Exhibit D (Order No. 672
Criteria).
---------------------------------------------------------------------------
8. NERC states that proposed Reliability Standard CIP-003-7
improves upon the existing protections that apply to low impact BES
Cyber Systems. NERC avers that the proposed modifications address the
Commission's directives from Order No. 822 by: 1. Clarifying electronic
access control requirements applicable to low impact BES Cyber Systems;
and 2. adding requirements for the protection of transient electronic
devices used for low impact BES Cyber Systems. In addition, while not
required by Order No. 822, NERC proposes a CIP Exceptional
Circumstances policy for low impact BES Cyber Systems.
9. In response to the Commission's directive to develop
modifications to eliminate ambiguity surrounding the term ``direct'' as
it is used in the LERC definition, NERC proposes to: 1. Retire the
terms LERC and LEAP from the NERC Glossary; and 2. modify Section 3 of
Attachment 1 to proposed Reliability Standard CIP-003-7 ``to more
clearly delineate the circumstances under which Responsible Entities
must establish access controls for low impact BES Cyber Systems.'' \12\
NERC states that the proposed revisions are designed to simplify the
electronic access control requirements associated with low impact BES
Cyber Systems in order to avoid ambiguities associated with the term
``direct.'' NERC explains that it recognized the ``added layer of
unnecessary complexity'' introduced by distinguishing between
``direct'' and ``indirect'' access within the LERC definition and
asserts that the proposed revisions will ``help ensure that Responsible
Entities implement the required security controls effectively.'' \13\
---------------------------------------------------------------------------
\12\ Id. at 16.
\13\ Id. at 16.
---------------------------------------------------------------------------
10. With regard to the Commission's directive to develop
modifications to the CIP Reliability Standards to provide mandatory
protection for transient electronic devices used at low impact BES
Cyber Systems, NERC proposes to add a new section to Attachment 1 to
proposed Reliability Standard CIP-003-7 to require responsible entities
to include controls in their cyber security plans to mitigate the risk
of the introduction of malicious code to low impact BES Cyber Systems
that could result from the use of ``Transient Cyber Assets or Removable
Media.'' Specifically, proposed Section 5 of Attachment 1 lists
controls to be applied to Transient Cyber Assets and Removable Media
that NERC contends ``will provide enhanced protections against the
propagation of malware from transient devices.'' \14\
---------------------------------------------------------------------------
\14\ Id. at 26-27.
---------------------------------------------------------------------------
11. NERC also proposes a modification that was not directed by the
Commission in Order No. 822. Namely, NERC proposes revisions in
Requirement R1 of proposed Reliability Standard CIP-003-7 to require
responsible entities to have a policy for declaring and responding to
CIP Exceptional Circumstances related to low impact BES Cyber
Systems.\15\ NERC
[[Page 49543]]
states that a number of requirements in the existing CIP Reliability
Standards specify that responsible entities do not have to implement or
continue implementing these requirements during a CIP Exceptional
Circumstance in order to avoid hindering the entities' ability to
timely and effectively respond to the CIP Exceptional Circumstance.
NERC explains that since the proposed requirements relating to
transient electronic devices used at low impact BES Cyber Systems
include an exception for CIP Exceptional Circumstances, NERC is
proposing to add a requirement for responsible entities to have a CIP
Exceptional Circumstances policy that applies to low impact BES Cyber
Systems, as it already requires for high and medium impact BES Cyber
Systems.\16\
---------------------------------------------------------------------------
\15\ A CIP Exceptional Circumstance is defined in the NERC
Glossary as a situation that involves or threatens to involve one or
more of the following, or similar, conditions that impact safety or
bulk electric system reliability: A risk of injury or death; a
natural disaster; civil unrest; an imminent or existing hardware,
software, or equipment failure; a Cyber Security Incident requiring
emergency assistance; a response by emergency services; the
enactment of a mutual assistance agreement; or an impediment of
large scale workforce availability. Glossary of Terms Used in NERC
Reliability Standards (August 1, 2017), https://www.nerc.com/files/glossary_of_terms.pdf.
\16\ NERC Petition at 31-32.
---------------------------------------------------------------------------
12. NERC requests that proposed Reliability Standard CIP-003-7 and
the revised definitions of Transient Cyber Asset and Removable Media
become effective the first day of the first calendar quarter that is
eighteen months after the effective date of the Commission's order
approving the proposed Reliability Standard.
II. Discussion
13. Pursuant to section 215(d)(2) of the FPA, we propose to approve
Reliability Standard CIP-003-7 as just, reasonable, not unduly
discriminatory or preferential, and in the public interest. Proposed
Reliability Standard CIP-003-7 largely addresses the Commission's
directives in Order No. 822 and is an improvement over the current
Commission-approved CIP Reliability Standards. Specifically, the
modifications to Section 3 of Attachment 1 to Reliability Standard CIP-
003-7 clarify the obligations pertaining to electronic access control
for low impact BES Cyber Systems. In addition, the modifications to
Attachment 1 to Reliability Standard CIP-003-7 require mandatory
security controls for transient electronic devices used at low impact
BES Cyber Systems. We also propose to approve the new provision in
Reliability Standard CIP-003-7, Requirement R1 requiring responsible
entities to have a policy for declaring and responding to CIP
Exceptional Circumstances related to low impact BES Cyber Systems.
While Order No. 822 did not direct NERC to expand the scope of the CIP
Exceptional Circumstances policy, the revision aligns the treatment of
low impact BES Cyber Systems with that of high and medium impact BES
Cyber Systems if and when a CIP Exceptional Circumstance occurs.
14. We also propose to approve the revisions to the NERC Glossary
definitions of Transient Cyber Asset and Removable Media, as well as
the retirement of the NERC Glossary definitions for LERC and LEAP since
the proposed modifications to Reliability Standard CIP-003-7 obviate
the need for the two terms. We further propose to approve the violation
risk factor and violation severity level assignments associated with
proposed Reliability Standard CIP-003-7 as well as NERC's proposed
implementation plan and effective dates.
15. In addition, as discussed below, pursuant to section 215(d)(5)
of the FPA, the Commission proposes to direct NERC to develop certain
modifications to the CIP Reliability Standards. While proposed
Reliability Standard CIP-003-7 improves electronic access control for
low impact BES Cyber Systems and enhances security controls for
transient electronic devices used at low impact BES Cyber Systems, we
propose to direct that NERC modify Reliability Standard CIP-003-7 to:
1. Provide clear, objective criteria for electronic access controls for
low impact BES Cyber Systems; and 2. address the need to mitigate the
risk of malicious code that could result from third-party transient
electronic devices.
16. Below, we discuss the following issues: A. Electronic access
controls for low impact BES Cyber Systems; B. protection of transient
electronic devices; C. proposed retirement and modification of
definitions; D. NERC's proposed implementation plan and effective
dates; and E. proposed violation severity level and violation risk
factor assignments.
A. Electronic Access Controls for Low Impact BES Cyber Systems Order
No. 822
17. In Order No. 822, the Commission directed NERC to modify the
LERC definition to eliminate ambiguity surrounding the term ``direct''
as it is used in the LERC definition.\17\ The Commission explained that
the directive was intended to codify the clarification provided in
NERC's NOPR comments, in which NERC referenced a statement in the
Guidelines and Technical Basis section of Reliability Standard CIP-003-
6 that electronic access controls must be applied to low impact BES
Cyber Systems unless responsible entities implement a ``complete
security break'' between the external host (cyber asset) and any cyber
asset(s) that may be used to pass communications to the low impact BES
Cyber System.\18\ The Commission observed that ``a suitable means to
address our concern is to modify the [LERC] definition consistent with
the commentary in the Guidelines and Technical Basis section of CIP-
003-6.'' \19\
---------------------------------------------------------------------------
\17\ Order No. 822, 154 FERC ] 61,037 at P 73.
\18\ Id. (citing NERC NOPR Comments at 31).
\19\ Id.
---------------------------------------------------------------------------
18. In addition, the Commission explained that the directive was
also intended to eliminate a loophole that would have allowed
transitive connections to out-of-scope cyber assets (e.g., serial
devices) to go unprotected under the LERC definition.\20\
---------------------------------------------------------------------------
\20\ Id. (``NERC's clarification on this issue resolves many of
the concerns raised by EnergySec, APS, and SPP RE regarding the
proposed definition, as a complete security break would not appear
to permit transitive connections through one or more out of scope
cyber assets to go unprotected under the definition, and would
appear to require the assets to maintain `separate conversations' as
suggested by SPP RE.'').
---------------------------------------------------------------------------
NERC Petition
19. In its Petition, NERC proposes to: 1. Retire the terms LERC and
LEAP from the NERC Glossary; and 2. modify Section 3 of Attachment 1 to
Reliability Standard CIP-003-7 ``to more clearly delineate the
circumstances under which Responsible Entities must establish access
controls for low impact BES Cyber Systems.'' \21\ NERC states that the
proposed revisions are designed to simplify the electronic access
control requirements associated with low impact BES Cyber Systems in
order to avoid ambiguities associated with the term ``direct.'' NERC
states further that it recognized the ``added layer of unnecessary
complexity'' introduced by distinguishing between ``direct'' and
``indirect'' access within the LERC definition and asserts that the
proposed revisions will ``help ensure that Responsible Entities
implement the required security controls effectively.'' \22\
---------------------------------------------------------------------------
\21\ NERC Petition at 16.
\22\ Id.
---------------------------------------------------------------------------
20. NERC states that proposed Reliability Standard CIP-003-7 would
require responsible entities to implement electronic access controls
for any communication, direct or indirect (i.e., communications through
an intermediary device where no direct connection is present), between
a low
[[Page 49544]]
impact BES Cyber System and an outside Cyber Asset that uses a routable
protocol when entering or leaving the asset containing the low impact
BES Cyber System. NERC asserts that the proposed revisions to Section 3
of Attachment 1 to proposed Reliability Standard CIP-003-7 improve the
clarity of the electronic access requirements and focus responsible
entities ``on the security objective of controlling electronic access
to permit only necessary inbound and outbound electronic access to low
impact BES Cyber Systems.'' \23\
---------------------------------------------------------------------------
\23\ Id. at 17.
---------------------------------------------------------------------------
21. NERC explains that Section 3.1 of Attachment 1 to proposed
Reliability Standard CIP-003-7 is composed of three basic elements: 1.
Identifying routable protocol communications from outside the asset
containing the low impact BES Cyber System; 2. determining necessary
inbound and outbound electronic access; and 3. implementing electronic
access controls to permit only necessary inbound and outbound
electronic access to the low impact BES Cyber System.
22. With regard to the first element, NERC states that Section 3.1
of Attachment 1 defines the circumstances where communications require
electronic access controls. The three characteristics are:
1. The communication is between the low impact BES Cyber System
and a Cyber Asset outside the asset containing low impact BES Cyber
System(s);
2. the communication uses a routable protocol when entering or
leaving the asset containing the low impact BES Cyber System(s); and
3. the communication is not used for time-sensitive protection
or control functions between intelligent electronic devices.
NERC states further that each of the three characteristics were
included in the original LERC definition.\24\
---------------------------------------------------------------------------
\24\ Id. at 18.
---------------------------------------------------------------------------
23. NERC asserts that the first characteristic helps to properly
focus the electronic access controls in light of ``the wide array of
low impact BES Cyber Systems and the risk-based approach to protecting
different types of BES Cyber Systems.'' \25\ NERC explains that,
whether a ``Responsible Entity uses a logical border as a demarcation
point or some other understanding of what is inside or outside the
asset, [the responsible entity] would have to provide a reasonable
justification for its determination.'' \26\ On the second
characteristic, NERC states that routable communications present
increased risks to the security of BES Cyber Systems and require
additional protections. Therefore, communications with a low impact BES
Cyber System involving routable connections require protections to
address the risk of uncontrolled communications. With regard to the
third characteristic, NERC explains that the exclusion of
communications for time-sensitive protection and control functions is
intended to avoid precluding the functionality of time-sensitive
reliability enhancing functions. NERC states, however, that an entity
invoking this exclusion may have to demonstrate that applying
electronic access controls would introduce latency that would
negatively impact functionality.\27\
---------------------------------------------------------------------------
\25\ Id. at 19.
\26\ Id.
\27\ Id. at 20.
---------------------------------------------------------------------------
24. According to NERC, the second characteristic of Section 3.1 of
Attachment 1 provides that responsible entities may permit only
necessary inbound and outbound electronic access to low impact BES
Cyber Systems as determined by the responsible entity. NERC explains
that Section 3.1 does not specify a bright line as to what constitutes
``necessary inbound and outbound access'' due to ``the wide array of
assets containing low impact BES Cyber Systems and the myriad of
reasons a Responsible Entity may need to allow electronic access to and
from a low impact BES Cyber Systems.'' \28\ NERC maintains that
responsible entities ``have the flexibility to identify the necessary
electronic access to meet their business and operational needs.'' \29\
---------------------------------------------------------------------------
\28\ Id. at 21-22.
\29\ Id. at 22.
---------------------------------------------------------------------------
25. NERC explains that ``a Responsible Entity must document the
necessity of its inbound and outbound electronic access permissions and
provide justification of the need for such access'' in order to
demonstrate compliance with Section 3.1 of Attachment 1.\30\ NERC
states that absent a documented, reasonable justification, the ERO may
find that the responsible entity was not in compliance with Section
3.1. NERC asserts that the purpose of the phrase ``as determined by the
Responsible Entity'' in Section 3.1 is to indicate that the
determination whether electronic access is necessary is to be made in
the first instance by the responsible entity based on the facts and
circumstances of each case. NERC states further that that the phrase
``as determined by the Responsible Entity'' does not limit the ERO's
ability to engage in effective compliance oversight. Specifically, NERC
contends that the ERO has the authority to review the documented
justification for permitting electronic access and to determine whether
it represents a reasonable exercise of discretion in light of the
overall reliability objective.\31\
---------------------------------------------------------------------------
\30\ Id.
\31\ Id. at 22-23.
---------------------------------------------------------------------------
26. In support of its position, NERC cites the draft Reliability
Standard Audit Worksheet (RSAW) for proposed Reliability Standard CIP-
003-7, which provides the following language in the Note to Auditor
section for Requirement R2:
The entity must document its determination as to what is
necessary inbound and outbound electronic access and provide
justification of the business need for such access. Once this
determination has been made and documented, the audit team's
professional judgment cannot override the determination made by the
Responsible Entity.\32\
---------------------------------------------------------------------------
\32\ Id. at 22, n.42.
NERC also provides a list of Commission-approved CIP Reliability
Standards where the phrase ``as determined by the Responsible Entity''
or similar language is used. NERC states that in all circumstances
where the phrase ``as determined by the Responsible Entity'' or similar
language is used, ``the ERO has the authority to evaluate the
reasonableness of the Responsible Entity's determination when assessing
compliance to ensure it is consistent with the reliability objective of
the requirement. To interpret this language otherwise would be
inconsistent with NERC's statutory obligation to engage in meaningful
compliance oversight . . .'' \33\
---------------------------------------------------------------------------
\33\ Id. at 23-24. NERC also indicates, id at n.42, that
Footnote 1 of the draft RSAW states that ``[w]hile the information
included in this RSAW provides some of the methodology that NERC has
elected to use to assess compliance with the requirements of the
Reliability Standard, this document should not be treated as a
substitute for the Reliability Standard or viewed as additional
Reliability Standard requirements. In all cases, the Regional Entity
should rely on the language contained in the Reliability Standard
itself, and not on the language contained in the RSAW, to determine
compliance with the Reliability Standard.'' Draft RSAW, https://www.nerc.com/pa/Stand/Project%20201602%20Modifications%20to%20CIP%20Standards%20DL/RSAW_CIP-003-7(i)_v2_Clean_01202017.pdf.
---------------------------------------------------------------------------
Commission Proposal
27. The Commission proposes to approve Reliability Standard CIP-
003-7 because, as discussed above, the proposed Reliability Standard
largely addresses the directives in Order No. 822 and is an improvement
over the current Commission-approved CIP Reliability Standards.
However, NERC's proposed revisions to Reliability Standard CIP-003-7
regarding the LERC
[[Page 49545]]
directive and electronic access controls for low impact BES Cyber
Systems raise certain issues. In Order No. 822, the Commission directed
NERC to develop modifications to the LERC definition to eliminate
ambiguity surrounding the term ``direct'' as it is used in the
definition. The directive was based on the concern that responsible
entities could avoid adopting adequate electronic access protections
for low impact BES Cyber Systems by simply installing a device, such as
a laptop or protocol converter, in front of the BES Cyber System to
``break'' the direct routable connection. As the Commission noted in
Order No. 822, the desired clarification could have been made by
including the security concepts from the Guidelines and Technical Basis
section of Reliability Standard CIP-003-6 in the definition.\34\
Instead, NERC's proposal comprehensively revises a responsible entity's
obligations under Requirement R2 through the revisions to Attachment 1
by deleting the term LERC and giving responsible entities significantly
more deference in determining how they construct the electronic access
protections for low impact BES Cyber Systems.
---------------------------------------------------------------------------
\34\ See Order No. 822, 154 FERC ] 61,037 at P 73.
---------------------------------------------------------------------------
28. We are concerned that the proposed revisions may not provide
adequate electronic access controls for low impact BES Cyber Systems.
Specifically, proposed Reliability Standard CIP-003-7 does not provide
clear, objective criteria or measures to assess compliance by
independently confirming that the access control strategy adopted by a
responsible entity would reasonably meet the security objective of
permitting only ``necessary inbound and outbound electronic access'' to
its low impact BES Cyber Systems.
29. Section 3.1 of Attachment 1 to proposed Reliability Standard
CIP-003-7 does not appear to contain clear criteria or objective
measures to determine whether the electronic access control strategy
chosen by the responsible entity would be effective for a given low
impact BES Cyber System to permit only necessary inbound and outbound
connections. In order to ensure an objective and consistently-applied
requirement, the electronic access control plan required in Attachment
1 should require the responsible entity to articulate its access
control strategy for a particular set of low impact BES Cyber Systems
and provide a technical rationale rooted in security principles
explaining how that strategy will reasonably restrict electronic
access. Attachment 1 should also outline basic security principles in
order to provide clear, objective criteria or measures to assist in
assessing compliance. Without such a requirement, auditors will not
necessarily have adequate information to assess the reasonableness of
the responsible entity's decision with respect to how the responsible
entity identified necessary communications or restricted electronic
access to specific low impact BES Cyber Systems. And absent such
information, it is possible that an auditor could assess a violation
where an entity adequately protected its low impact BES Cyber Systems
or fail to recognize a situation where additional protections are
necessary to meet the security objective of the standard.
30. As the Commission stated in Order No. 672, there ``should be a
clear criterion or measure of whether an entity is in compliance with a
proposed Reliability Standard. It should contain or be accompanied by
an objective measure of compliance so that it can be enforced and so
that enforcement can be applied in a consistent and non-preferential
manner.'' \35\ The Commission reiterated this point in Order No. 791,
stating that ``the absence of objective criteria to evaluate the
controls chosen by responsible entities for Low Impact assets
introduces an unacceptable level of ambiguity and potential
inconsistency into the compliance process, and creates an unnecessary
gap in reliability.'' \36\ The Commission also observed that
``ambiguity will make it difficult for registered entities to develop,
and NERC and the regions to objectively evaluate, the effectiveness of
procedures developed to implement'' the Reliability Standard.\37\
---------------------------------------------------------------------------
\35\ Rules Concerning Certification of the Electric Reliability
Organization and Procedures for the Establishment, Approval, and
Enforcement of Electric Reliability Standards, Order No. 672, FERC
Stats. & Regs. ] 31,204, at P 327 (2006).
\36\ Order No. 791, 145 FERC ] 61,160 at P 108.
\37\ Id.
---------------------------------------------------------------------------
31. As a possible model, the electronic access control requirements
that are applied to medium and high impact BES Cyber systems provide a
number of criteria that can be used to assess the sufficiency of a
responsible entity's electronic access control strategy. For medium and
high impact BES Cyber Systems, auditors use the following criteria to
review whether the access control strategy is reasonable: 1. Whether
the electronic access was granted through an authorized and monitored
electronic access point (Reliability Standard CIP-005-5, Requirement
R1); 2. whether the electronic access granted to individuals/devices
was evaluated based on need (Reliability Standard CIP-005-5,
Requirement R1.3); 3. whether the entity has mechanisms to enforce
authentication of users with electronic access (Reliability Standard
CIP-007-6, Requirement R5); and 4. whether the responsible entity
routinely uses strong passwords and manages password changes
(Reliability Standard CIP-007-6, Requirement R5). Absent similar
criteria in the low impact electronic access control plan that are
appropriately tailored to the risks posed by low impact BES Cyber
Systems, responsible entities may adopt electronic access controls that
do not meet the overarching security objective of restricting inbound
and outbound electronic access.
32. Therefore, pursuant to section 215(d)(5) of the FPA, we propose
to direct NERC to develop modifications to Reliability Standard CIP-
003-7 to provide clear, objective criteria for electronic access
controls for low impact BES Cyber Systems consistent with the above
discussion. The Commission seeks comment on this proposal.
B. Protection of Transient Electronic Devices
Order No. 822
33. In Order No. 822, the Commission directed NERC to develop
modifications to provide mandatory protection for transient electronic
devices used at low impact BES Cyber Systems based on the risk posed to
bulk electric system reliability. The Commission stated that such
modifications ``will provide an important enhancement to the security
posture of the bulk electric system by reinforcing the defense-in-depth
nature of the CIP Reliability Standards at all impact levels.'' \38\
The Commission also stated that the proposed modifications should be
designed to effectively address the risks posed by transient electronic
devices used at low impact BES Cyber Systems ``in a manner that is
consistent with the risk-based approach reflected in the CIP version 5
Standards.'' \39\
---------------------------------------------------------------------------
\38\ Order No. 822, 154 FERC ] 61,037 at P 32 (emphasis in
original).
\39\ Id.
---------------------------------------------------------------------------
NERC Petition
34. In its Petition, NERC proposes to add a new section to
Attachment 1 to proposed Reliability Standard CIP-003-7 to require
responsible entities to include controls in their cyber security plans
to mitigate the risk of the introduction of malicious code to low
impact BES Cyber Systems through the
[[Page 49546]]
use of ``Transient Cyber Assets or Removable Media.'' Specifically,
proposed Section 5 of Attachment 1 lists controls to be applied to
Transient Cyber Assets and Removable Media that NERC states ``will
provide enhanced protections against the propagation of malware from
transient devices.'' \40\
---------------------------------------------------------------------------
\40\ Id. at 26-27.
---------------------------------------------------------------------------
35. NERC states that the language in proposed Section 5 to
Attachment 1 parallels the language in Attachment 1 to Reliability
Standard CIP-010-2, which addresses mitigation of the risks of the
introduction of malicious code to high and medium impact BES Cyber
Systems through the use of Transient Cyber Assets or Removable Media.
NERC states further that, as in Reliability Standard CIP-010-2,
proposed Section 5 distinguishes between Transient Cyber Assets managed
by a responsible entity and those managed by a third-party; the
distinction arising because of a responsible entity's lack of control
over Transient Cyber Assets managed by a third-party. NERC explains
that the proposed controls for Removable Media do not distinguish
between the responsible entity-managed assets and third-party managed
assets due to the functionality of Removable Media. NERC provides the
example of a thumb drive that can be scanned prior to use regardless of
which party manages the asset.\41\
---------------------------------------------------------------------------
\41\ Id. at 28.
---------------------------------------------------------------------------
36. NERC explains that proposed Section 5 of Attachment 1 requires
responsible entities to meet the security objectives ``by implementing
the controls that the Responsible Entity determines necessary to meet
its affirmative obligation to mitigate the risks of the introduction of
malicious code.'' \42\ NERC states that the approach reflected in
Section 5 provides the flexibility to implement the controls that best
suit the needs and characteristics of a responsible entity's
organization. NERC explains further that ``the Responsible Entity must
demonstrate that its selected controls were designed to meet the
security objective to mitigate the risk of the introduction of
malicious code.'' \43\
---------------------------------------------------------------------------
\42\ Id.
\43\ Id. at 29.
---------------------------------------------------------------------------
37. NERC outlines certain distinctions between proposed Section 5
of Attachment 1 to proposed Reliability Standard CIP-003-7 and
Attachment 1 to Reliability Standard CIP-010-2. Specifically, NERC
states that proposed Section 5 does not include requirements relating
to authorization or software vulnerabilities, as are contained in
Attachment 1 to Reliability Standard CIP-010-2. NERC explains that this
difference is consistent with the risk-based approach of the CIP
Reliability Standards and ``the underlying principle of concentrating
limited industry resources on protecting those BES Cyber Systems with
greater risk to the BES.'' NERC states that Section 5 focuses on the
risk associated with the introduction of malicious code.\44\
---------------------------------------------------------------------------
\44\ NERC Petition at 29.
---------------------------------------------------------------------------
38. In addition, NERC states that proposed Section 5 to Attachment
1 does not include language requiring a responsible entity to determine
whether additional mitigation actions are necessary where a third party
manages a Transient Cyber Asset, nor does it include language requiring
a responsible entity to implement additional mitigation actions in such
situations. NERC states that it nonetheless expects ``that if another
party's processes and practices for protecting its Transient Cyber
Assets do not provide reasonable assurance that they are designed to
effectively meet the security objective of mitigating the introduction
of malicious code, the Responsible Entity must take additional steps to
meet the stated objective.'' \45\ NERC explains that if a third party's
practices and policies do not provide reasonable assurance that the
Transient Cyber Assets would be protected from malicious code, ``simply
reviewing those policies and procedures without taking other steps to
mitigate the risks of introduction of malicious code may not constitute
compliance.'' \46\
---------------------------------------------------------------------------
\45\ Id. at 29-30.
\46\ Id. at 30.
---------------------------------------------------------------------------
Commission Proposal
39. NERC's proposed modifications in Reliability Standard CIP-003-
7, Requirement R2, Attachment 1, Section 5 that include malware
detection and prevention controls for responsible entity-managed
Transient Cyber Assets and Removable Media should improve the
cybersecurity posture of responsibility entities compared to currently-
effective Reliability Standard CIP-003-6. The revisions in Section 5.2,
however, do not address one aspect of the reliability gap identified in
Order No. 822 regarding low impact BES Cyber Systems. Specifically, as
noted above, proposed Reliability Standard CIP-003-7 does not
explicitly require mitigation of the introduction of malicious code
from third-party managed Transient Cyber Assets, even if the
responsible entity determines that the third-party's policies and
procedures are inadequate.\47\ While the proposed Reliability Standard
does not explicitly require mitigation of the introduction of malicious
code from third-party managed Transient Cyber Assets, NERC states that
the failure to mitigate this risk ``may not constitute compliance.''
\48\ NERC's statement suggests that, with regard to low impact BES
Cyber Systems, the proposed requirement lacks an obligation for a
responsible entity to correct any deficiencies that are discovered
during a review of third-party Transient Cyber Asset management
practices. Indeed, the parallel provision for high and medium impact
BES Cyber Systems specifies that ``Responsible Entities shall determine
whether any additional mitigation actions are necessary and implement
such actions prior to connecting the Transient Cyber Asset.'' \49\ Yet,
such language obligating mitigation action is not proposed for low
impact BES Cyber Assets.
---------------------------------------------------------------------------
\47\ See NERC Petition at 29-30.
\48\ Id. at 30.
\49\ Reliability Standard CIP-010-2 (Cyber Security--
Configuration Change Management and Vulnerability Assessments),
Requirement R4, Attachment 1, Section 2.3. In contrast, the
obligations to ``review'' methods used by third-parties to detect
and prevent malware are similar for lower, medium and high impact
BES Cyber Assets. Cf. CIP-010-2, Attachment 1, Sections 2.1 and 2.2;
and proposed CIP-010-3, Attachment 1, Section 3.2.
---------------------------------------------------------------------------
40. The proposed Reliability Standard may, therefore, contain a
reliability gap where a responsible entity contracts with a third-party
but fails to mitigate potential deficiencies discovered in the third-
party's malicious code detection and prevention practices prior to a
Transient Cyber Asset being connected to a low impact BES Cyber System.
That is because the proposed Reliability Standard does not contain: 1.
A requirement for the responsible entity to mitigate any malicious code
found during the third-party review(s); or 2. a requirement that the
responsible entity take reasonable steps to mitigate the risks of third
party malicious code on their systems, if an arrangement cannot be made
for the third-party to do so. Without these obligations, we are
concerned that responsible entities could, without compliance
consequences, simply accept the risk of deficient third-party transient
electronic device management practices.\50\ Moreover, the requirement
to ``review'' methods used by third-parties to detect and prevent
malware may fail to convey the necessary next steps that a responsible
entity should take.\51\
---------------------------------------------------------------------------
\50\ See Order No. 706, 122 FERC ] 61,040 at P 150 (rejecting
the concept of acceptance of risk in the CIP Reliability Standards).
\51\ See Order No. 791, 145 FERC ] 61,160 at P 108.
---------------------------------------------------------------------------
[[Page 49547]]
41. Therefore, pursuant to section 215(d)(5) of the FPA, we propose
to direct that NERC develop modifications to proposed Reliability
Standard CIP-003-7 to address the need to mitigate the risk of
malicious code that could result from third-party Transient Cyber
Assets consistent with the above discussion. The Commission seeks
comment on this proposal.
C. Proposed NERC Glossary Definitions
42. Proposed Reliability Standard CIP-003-7 includes two revised
definitions for inclusion in the NERC Glossary. Specifically, NERC
proposes to revise the definitions of Transient Cyber Asset and
Removable Media in order to accommodate the use of the terms at all
impact levels. NERC explains that the original definitions include
references to concepts or requirements associated only with high and
medium impact BES Cyber Systems and the definitions were modified to
avoid confusion because protections for Transient Electronic Devices
will now be extended to low impact BES Cyber Systems.\52\
---------------------------------------------------------------------------
\52\ NERC Petition at 30.
---------------------------------------------------------------------------
43. In addition, NERC proposes to retire the definitions of LERC
and LEAP. NERC states that the proposed retirement of the NERC Glossary
terms LERC and LEAP accords with the proposed modifications to Section
3 of Attachment 1 to proposed Reliability Standard CIP-003-7 and is
intended to simplify the electronic access control requirements for low
impact BES Cyber Systems by avoiding the ambiguities associated with
the term ``direct.'' NERC explains further that it ``recognized that
distinguishing between `direct' and `indirect' electronic access within
the LERC definition added a layer of unnecessary complexity.'' \53\
---------------------------------------------------------------------------
\53\ Id. at 16.
---------------------------------------------------------------------------
44. We propose to approve the revised definitions of Transient
Cyber Asset and Removable Media, as well as the retirement of the
definitions of LERC and LEAP.
D. Implementation Plan and Effective Dates
45. NERC requests an effective date for proposed Reliability
Standard CIP-003-7 and the revised definitions of Transient Cyber Asset
and Removable Media on the first day of the first calendar quarter that
is eighteen months after the effective date of the Commission's order
approving the proposed Reliability Standard. NERC explains that the
proposed implementation plan does not alter the previously-approved
compliance dates for Reliability Standard CIP-003-6 other than the
compliance date for Reliability Standard CIP-003-6, Requirement R2,
Attachment 1, Sections 2 and 3, which would be replaced with the
effective date for proposed Reliability Standard CIP-003-7. NERC also
proposes that the retirement of Reliability Standard CIP-003-6 and the
associated definitions become effective on the effective date of
proposed Reliability Standard CIP-003-7.\54\
---------------------------------------------------------------------------
\54\ Id., Exhibit C (Implementation Plan).
---------------------------------------------------------------------------
46. We propose to approve NERC's implementation plan for proposed
Reliability Standard CIP-003-7, as described above.
E. Violation Risk Factor/Violation Severity Level Assignments
47. NERC requests approval of two violation risk factors and
violation severity levels assigned to proposed Reliability Standard
CIP-003-7. Specifically, NERC requests approval of violation risk
factor and violation severity level assignments associated with
Requirements R1 and R2 of Reliability Standard CIP-003-7.\55\ We
propose to accept these violation risk factors and violation severity
levels.
---------------------------------------------------------------------------
\55\ Id., Exhibit F (Analysis of Violation Risk Factors and
Violation Severity Levels).
---------------------------------------------------------------------------
III. Information Collection Statement
48. The FERC-725B information collection requirements contained in
this proposed rule are subject to review by the Office of Management
and Budget (OMB) under section 3507(d) of the Paperwork Reduction Act
of 1995.\56\ OMB's regulations require approval of certain information
collection requirements imposed by agency rules.\57\ Upon approval of a
collection of information, OMB will assign an OMB control number and
expiration date. Respondents subject to the filing requirements of this
rule will not be penalized for failing to respond to these collections
of information unless the collections of information display a valid
OMB control number. The Commission solicits comments on the
Commission's need for this information, whether the information will
have practical utility, the accuracy of the burden estimates, ways to
enhance the quality, utility, and clarity of the information to be
collected or retained, and any suggested methods for minimizing
respondents' burden, including the use of automated information
techniques.
---------------------------------------------------------------------------
\56\ 44 U.S.C. 3507(d) (2012).
\57\ 5 CFR 1320.11 (2017).
---------------------------------------------------------------------------
49. The Commission bases its paperwork burden estimates on the
changes in paperwork burden presented by the proposed revision to CIP
Reliability Standard CIP-003-7 as compared to the current Commission-
approved Reliability Standard CIP-003-6. The Commission has already
addressed the burden of implementing Reliability Standard CIP-003-
6.\58\ As discussed above, the immediate rulemaking addresses three
areas of modification to the CIP Reliability Standards: 1. Clarifying
the obligations pertaining to electronic access control for low impact
BES Cyber Systems; 2. adopting mandatory security controls for
transient electronic devices (e.g., thumb drives, laptop computers, and
other portable devices frequently connected to and disconnected from
systems) used at low impact BES Cyber Systems; and 3. requiring
responsible entities to have a policy for declaring and responding to
CIP Exceptional Circumstances related to low impact BES Cyber Systems.
---------------------------------------------------------------------------
\58\ See Order No. 822, 154 FERC ] 61,037 at PP 84-88.
---------------------------------------------------------------------------
50. The NERC Compliance Registry, as of September 2017, identifies
approximately 1,320 U.S. entities that are subject to mandatory
compliance with Reliability Standards. Of this total, we estimate that
1,100 entities will face an increased paperwork burden under proposed
Reliability Standard CIP 003-7, estimating that a majority of these
entities will have one or more low impact BES Cyber Systems. Based on
these assumptions, we estimate the following reporting burden:
[[Page 49548]]
RM17-11-000 NOPR
[Mandatory Reliability Standards for Critical Infrastructure Protection Reliability Standards]
--------------------------------------------------------------------------------------------------------------------------------------------------------
Annual
number of Total Cost per
Number of responses number of Average burden & cost per Total annual burden hours & respondent
respondents per responses response \59\ (4) total annual cost (3) * (4) ($) (5) /
(1) respondent (1) * (2) = = (5) (1)
(2) (3)
--------------------------------------------------------------------------------------------------------------------------------------------------------
Create low impact TCA assets plan (one- 1,100 1 1,100 20 hrs.; $1,680............. 6,875 hrs.; $1,848,000..... $1,680
time) \60\.
Updates and reviews of low impact TCA 1,100 \62\ 300 330,000 1.5 hrs. \63\; $126......... 495,000 hrs.; $41,580,000.. 37,800
assets (ongoing) \61\.
Update/modify documentation to remove 1,100 1 1,100 20 hrs.; $1,680............. 6,875 hrs.; $1,848,000..... 1,680
LERC and LEAP (one-time) \60\.
Update paperwork for access control 1,100 1 1,100 20 hrs.; $1,680............. 6,875 hrs.; $1,848,000..... 1,680
implementation in Section 2 \64\ and
Section 3 \65\ (ongoing) \61\.
--------------------------------------------------------------------------------------------------------------
Total (one-time) \60\................ ........... ........... 2,200 ............................ 13,750 hrs.; $3,696,000 ...........
--------------------------------------------------------------------------------------------------------------
Total (ongoing) \61\................. ........... ........... 331,100 ............................ 501,875 hrs.; $43,428,000.. ...........
--------------------------------------------------------------------------------------------------------------------------------------------------------
51. The following shows the annual cost burden for each group,
based on the burden hours in the table above:
---------------------------------------------------------------------------
\59\ The loaded hourly wage figure (includes benefits) is based
on the average of three occupational categories for 2016 found on
the Bureau of Labor Statistics Web site (https://www.bls.gov/oes/current/naics2_22.htm):
Legal (Occupation Code: 23-0000): $143.68.
Electrical Engineer (Occupation Code: 17-2071): $68.12.
Office and Administrative Support (Occupation Code: 43-0000):
$40.89 ($143.68 + $68.12 + $40.89) / 3 = $84.23. The figure is
rounded to $84.00 for use in calculating wage figures in this NOPR.
\60\ This one-time burden applies in Year One only.
\61\ This ongoing burden applies in Year 2 and beyond.
\62\ We estimate that each entity will perform 25 updates per
month. 25 updates *12 months = 300 updates (i.e. responses) per
year.
\63\ The 1.5 hours of burden per response is comprised of three
sub-categories:
Updates to managed low TCA assets: 15 minutes (0.25 hours) per
response.
Updates to unmanaged low TCA assets: 60 minutes (1 hour) per
response.
Reviews of low TCA applicable controls: 15 minutes (0.25 hours)
per response.
\64\ Physical Security Controls.
\65\ Electronic Access Controls.
Year 1: $3,696,000.
Years 2 and 3: $43,428,000.
The paperwork burden estimate includes costs associated
with the initial development of a policy to address requirements
relating to: 1. Clarifying the obligations pertaining to electronic
access control for low impact BES Cyber Systems; 2. adopting mandatory
security controls for transient electronic devices (e.g., thumb drives,
laptop computers, and other portable devices frequently connected to
and disconnected from systems) used at low impact BES Cyber Systems;
and 3. requiring responsible entities to have a policy for declaring
and responding to CIP Exceptional Circumstances related to low impact
BES Cyber Systems. Further, the estimate reflects the assumption that
costs incurred in year 1 will pertain to policy development, while
costs in years 2 and 3 will reflect the burden associated with
maintaining logs and other records to demonstrate ongoing compliance.
52. Title: Mandatory Reliability Standards, Revised Critical
Infrastructure Protection Reliability Standards
Action: Proposed Collection FERC-725B.
OMB Control No.: 1902-0248.
Respondents: Businesses or other for-profit institutions; not-for-
profit institutions.
Frequency of Responses: On Occasion.
Necessity of the Information: This proposed rule proposes to
approve the requested modifications to Reliability Standards pertaining
to critical infrastructure protection. As discussed above, the
Commission proposes to approve NERC's proposed revised CIP Reliability
Standard CIP-003-7 pursuant to section 215(d)(2) of the FPA because it
improves upon the currently-effective suite of cyber security CIP
Reliability Standards.
Internal Review: The Commission has reviewed the proposed
Reliability Standards and made a determination that its action is
necessary to implement section 215 of the FPA.
53. Interested persons may obtain information on the reporting
requirements by contacting the following: Federal Energy Regulatory
Commission, 888 First Street NE., Washington, DC 20426 [Attention:
Ellen Brown, Office of the Executive Director, email:
[email protected], phone: (202) 502-8663, fax: (202) 273-0873].
54. For submitting comments concerning the collection(s) of
information and the associated burden estimate(s), please send your
comments to the Commission, and to the Office of Management and Budget,
Office of Information and Regulatory Affairs, Washington, DC 20503
[Attention: Desk Officer for the Federal Energy Regulatory Commission,
phone: (202) 395-4638, fax: (202) 395-7285]. For security reasons,
comments to OMB should be submitted by email to:
[email protected]. Comments submitted to OMB should include
Docket Number RM17-11-000 and OMB Control Number 1902-0248.
IV. Regulatory Flexibility Act Analysis
55. The Regulatory Flexibility Act of 1980 (RFA) generally requires
a description and analysis of proposed rules that will have significant
economic impact on a substantial number of small entities.\66\ The
Small Business Administration's (SBA) Office of Size Standards develops
the numerical definition of a small business.\67\ The SBA revised its
size standard for electric utilities (effective January 22, 2014) to a
standard based on the number of employees, including affiliates (from
the prior standard based on megawatt hour sales).\68\ Proposed
Reliability Standard CIP-003-7 is expected to impose an additional
burden on 1,100 entities \69\ (reliability coordinators, generator
operators, generator owners, interchange coordinators or authorities,
transmission operators, balancing authorities,
[[Page 49549]]
transmission owners, and certain distribution providers).
---------------------------------------------------------------------------
\66\ 5 U.S.C. 601-12 (2012).
\67\ 13 CFR 121.101 (2017).
\68\ SBA Final Rule on ``Small Business Size Standards:
Utilities,'' 78 FR 77343 (Dec. 23, 2013).
\69\ Public utilities may fall under one of several different
categories, each with a size threshold based on the company's number
of employees, including affiliates, the parent company, and
subsidiaries. For the analysis in this NOPR, we are using a 500
employee threshold due to each affected entity falling within the
role of Electric Bulk Power Transmission and Control (NAISC Code:
221121).
---------------------------------------------------------------------------
56. Of the 1,100 affected entities discussed above, we estimate
that approximately 857 or 78 percent \70\ of the affected entities are
small. As discussed above, proposed Reliability Standard CIP-003-7
enhances reliability by providing criteria against which NERC and the
Commission can evaluate the sufficiency of an entity's electronic
access controls for low impact BES Cyber systems, as well as improved
security controls for transient electronic devices (e.g., thumb drives,
laptop computers, and other portable devices frequently connected to
and disconnected from systems). We estimate that each of the 857 small
entities to whom the proposed modifications to Reliability Standard
CIP-003-7 applies will incur one-time costs of approximately $3,360 per
entity to implement this standard, as well as the ongoing paperwork
burden reflected in the Information Collection Statement (approximately
$39,480 per year per entity). We do not consider the estimated costs
for these 857 small entities to be a significant economic impact.
---------------------------------------------------------------------------
\70\ 77.95 percent.
---------------------------------------------------------------------------
57. Based on the above analysis, we propose to certify that the
proposed Reliability Standard will not have a significant economic
impact on a substantial number of small entities.
V. Environmental Analysis
58. The Commission is required to prepare an Environmental
Assessment or an Environmental Impact Statement for any action that may
have a significant adverse effect on the human environment.\71\ The
Commission has categorically excluded certain actions from this
requirement as not having a significant effect on the human
environment. Included in the exclusion are rules that are clarifying,
corrective, or procedural or that do not substantially change the
effect of the regulations being amended.\72\ The actions proposed
herein fall within this categorical exclusion in the Commission's
regulations.
---------------------------------------------------------------------------
\71\ Regulations Implementing the National Environmental Policy
Act of 1969, Order No. 486, FERC Stats. & Regs. ] 30,783 (1987).
\72\ 18 CFR 380.4(a)(2)(ii) (2017).
---------------------------------------------------------------------------
VI. Comment Procedures
59. The Commission invites interested persons to submit comments on
the matters and issues proposed in this notice to be adopted, including
any related matters or alternative proposals that commenters may wish
to discuss. Comments are due December 26, 2017. Comments must refer to
Docket No. RM17-11-000, and must include the commenter's name, the
organization they represent, if applicable, and address.
60. The Commission encourages comments to be filed electronically
via the eFiling link on the Commission's Web site at https://www.ferc.gov. The Commission accepts most standard word processing
formats. Documents created electronically using word processing
software should be filed in native applications or print-to-PDF format
and not in a scanned format. Commenters filing electronically do not
need to make a paper filing.
61. Commenters that are not able to file comments electronically
must send an original of their comments to: Federal Energy Regulatory
Commission, Secretary of the Commission, 888 First Street NE.,
Washington, DC 20426.
62. All comments will be placed in the Commission's public files
and may be viewed, printed, or downloaded remotely as described in the
Document Availability section below. Commenters on this proposal are
not required to serve copies of their comments on other commenters.
VII. Document Availability
63. In addition to publishing the full text of this document in the
Federal Register, the Commission provides all interested persons an
opportunity to view and/or print the contents of this document via the
Internet through the Commission's Home Page (https://www.ferc.gov) and
in the Commission's Public Reference Room during normal business hours
(8:30 a.m. to 5:00 p.m. Eastern time) at 888 First Street NE., Room 2A,
Washington, DC 20426.
64. From the Commission's Home Page on the Internet, this
information is available on eLibrary. The full text of this document is
available on eLibrary in PDF and Microsoft Word format for viewing,
printing, and/or downloading. To access this document in eLibrary, type
the docket number of this document, excluding the last three digits, in
the docket number field.
65. User assistance is available for eLibrary and the Commission's
Web site during normal business hours from the Commission's Online
Support at 202-502-6652 (toll free at 1-866-208-3676) or email at
[email protected], or the Public Reference Room at (202) 502-
8371, TTY (202) 502-8659. Email the Public Reference Room at
[email protected].
By direction of the Commission.
Issued October 19, 2017.
Nathaniel J. Davis, Sr.,
Deputy Secretary.
[FR Doc. 2017-23287 Filed 10-25-17; 8:45 am]
BILLING CODE 6717-01-P