National Cybersecurity Center of Excellence (NCCoE) Securing the Industrial Internet of Things for the Energy Sector, 53683-53684 [2019-21852]
Download as PDF
Federal Register / Vol. 84, No. 195 / Tuesday, October 8, 2019 / Notices
Dated: September 30, 2019.
Jeffrey I. Kessler,
Assistant Secretary for Enforcement and
Compliance.
[FR Doc. 2019–21938 Filed 10–7–19; 8:45 am]
BILLING CODE 3510–DS–P
DEPARTMENT OF COMMERCE
National Institute of Standards and
Technology
[Docket No.: 190924–0035]
National Cybersecurity Center of
Excellence (NCCoE) Securing the
Industrial Internet of Things for the
Energy Sector
National Institute of Standards
and Technology, Department of
Commerce.
ACTION: Notice.
AGENCY:
The National Institute of
Standards and Technology (NIST)
invites organizations to provide
products and technical expertise to
support and demonstrate security
platforms for Securing the Industrial
Internet of Things (IIoT) for the energy
sector use case. This notice is the initial
step for the National Cybersecurity
Center of Excellence (NCCoE) in
collaborating with technology
companies to address cybersecurity
challenges identified under the energy
sector program. Participation in the use
case is open to all interested
organizations.
SUMMARY:
Collaborative activities will
commence as soon as enough completed
and signed letters of interest have been
returned to address all the necessary
components and capabilities, but no
earlier than November 7, 2019.
ADDRESSES: The NCCoE is located at
9700 Great Seneca Highway, Rockville,
MD 20850. Letters of interest must be
submitted to energy_nccoe@nist.gov or
via hardcopy to National Institute of
Standards and Technology, NCCoE;
9700 Great Seneca Highway, Rockville,
MD 20850. Organizations whose letters
of interest are accepted in accordance
with the process set forth in the
SUPPLEMENTARY INFORMATION section of
this notice will be asked to sign a
consortium Cooperative Research and
Development Agreement (CRADA) with
NIST. An NCCoE consortium CRADA
template can be found at: https://
nccoe.nist.gov/node/138.
FOR FURTHER INFORMATION CONTACT: Jim
McCarthy via email to energy_nccoe@
nist.gov; by telephone 301–975–0228; or
by mail to National Institute of
Standards and Technology, NCCoE;
jbell on DSK3GLQ082PROD with NOTICES
DATES:
VerDate Sep<11>2014
21:50 Oct 07, 2019
Jkt 250001
9700 Great Seneca Highway, Rockville,
MD 20850. Additional details about the
energy sector program are available at
https://www.nccoe.nist.gov/node/4741.
SUPPLEMENTARY INFORMATION: Interested
parties must contact NIST to request a
letter of interest template to be
completed and submitted to NIST.
Letters of interest will be accepted on a
first come, first served basis. When the
use case has been completed, NIST will
post a notice on the NCCoE energy
sector program website at https://
www.nccoe.nist.gov/node/4741
announcing the completion of the use
case and informing the public that it
will no longer accept letters of interest
for this use case.
Background: The NCCoE, part of
NIST, is a public-private collaboration
for accelerating the widespread
adoption of integrated cybersecurity
tools and technologies. The NCCoE
brings together experts from industry,
government, and academia under one
roof to develop practical, interoperable
cybersecurity approaches that address
the real-world needs of complex
Information Technology (IT) systems.
By accelerating dissemination and use
of these integrated tools and
technologies for protecting IT assets, the
NCCoE will enhance trust in U.S. IT
communications, data, and storage
systems; reduce risk for companies and
individuals using IT systems; and
encourage development of innovative,
job-creating cybersecurity products and
services.
Process: NIST is soliciting responses
from all sources of relevant
cybersecurity and infrastructure
capabilities (see below) to enter into a
Cooperative Research and Development
Agreement (CRADA) to provide
products and technical expertise to
support and demonstrate security
platforms for the Securing the IIoT for
the energy sector use case. The full use
case can be viewed at: https://
www.nccoe.nist.gov/node/4741.
Interested parties should contact NIST
using the information provided in the
FOR FURTHER INFORMATION CONTACT
section of this notice. NIST will then
provide each interested party with a
letter of interest template, which the
party must complete, certify that it is
accurate, and submit to NIST. NIST will
contact interested parties if there are
questions regarding the responsiveness
of the letters of interest to the use case
objective or requirements. NIST will
select participants who have submitted
complete letters of interest on a first
come, first served basis up to the
number of participants necessary to
carry out this use case. However, there
PO 00000
Frm 00012
Fmt 4703
Sfmt 4703
53683
may be continuing opportunity to
participate even after initial activity
commences. Selected participants will
be required to enter into a consortium
CRADA with NIST (for reference, see
the ADDRESSES section above). NIST
published a notice in the Federal
Register on October 19, 2012 (77 FR
64314) inviting U.S. companies to enter
into National Cybersecurity Excellence
Partnerships (NCEPs) in furtherance of
the NCCoE. For this demonstration
project, NCEP partners will not be given
priority for participation.
Use Case Objective: The objective of
this use case is to provide an
architecture that can be referenced and
develop guidance for securing IIoT in
commercial- and/or utility-scale
distributed energy resource (DER)
environments, and to include an
example solution that uses existing,
commercially available and/or opensource cybersecurity products. A
detailed description of the Securing the
IIoT use case is available at https://
www.nccoe.nist.gov/node/4741.
Requirements: Each responding
organization’s letter of interest should
identify which security platform
component(s) or capability(ies) it is
offering. Letters of interest should not
include company proprietary
information, and all components and
capabilities must be commercially
available. Components and capabilities
are listed in section 4 of the Securing
the IIoT for the energy sector use case
(for reference, please see the link in the
PROCESS section above) and include:
• Access control techniques for
network, application, and data access
• Data integrity technologies that
protect data at rest or in transit, detect
data integrity violations, and ensure
data authenticity
• Graph analytics, machine learning,
behavioral monitoring, and predictive
analytics that aid in detecting
malware and data integrity violations
• Information visualization and
dashboard techniques that present
analytic results to human operators
• Infrastructure components to
construct or emulate the elements of
the conceptual architecture
• Infrastructure components that
incorporate integrity and
trustworthiness techniques
• Sensors, network monitoring, system
monitoring, data acquisition devices,
intelligent sensor gateways, and
security information and event
management, or SIEM, systems that
provide data and event information
for analysis
• System/device and human
authentication techniques that
support federation
E:\FR\FM\08OCN1.SGM
08OCN1
53684
Federal Register / Vol. 84, No. 195 / Tuesday, October 8, 2019 / Notices
jbell on DSK3GLQ082PROD with NOTICES
• Trustworthy distributed audit trails
for accountability
• Workflow techniques to orchestrate
analysis
Each responding organization’s letter
of interest should identify how their
products or infrastructure components
address one or more of the following
desired solution characteristics in
section 4 of the Securing the IIoT for the
energy sector use case (for reference,
please see the link in the PROCESS
section above):
1. Analysis and Visualization. The
analysis and visualization capabilities
collect and process monitoring data
from communications, management
systems, and control systems to detect
anomalies and identify anomalies that
represent potential malicious activity.
2. Authentication and Access Control.
The authentication and access control
capabilities are used on all
communication among DER
management and control systems. These
capabilities ensure that only known,
authorized systems/devices can
exchange information. Further, these
capabilities may limit the types of
information exchanged. Attempted
unauthorized communication or
attempted communication by unknown
systems/devices is detected and
reported to the analysis and
visualization capabilities.
3. Behavioral Monitoring. The
behavioral monitoring capabilities
measure behavioral characteristics of
the management and control systems.
Measurements are compared with
expected or normal behavioral
characteristics that have been learned
over time. Anomalies are reported to the
analysis and visualization capability.
4. Command Register. The command
register capability records transactions
between the distribution control system
and control systems managing DERs.
This capability allows both the utility
and the DER operator to verify
information exchanges.
5. Data Integrity. Data integrity
capabilities ensure that information is
not modified in transit between the
sender and receiver. If the information
is modified, the capabilities detect the
modification and notify the analysis and
visualization capabilities.
6. Malware Detection. The malware
detection capabilities monitor both
information exchanges among the DER
management and control systems and
processing by the management and
control systems, looking for indications
of compromise by known malware.
Responding organizations need to
understand and, in their letters of
interest, commit to provide:
VerDate Sep<11>2014
21:50 Oct 07, 2019
Jkt 250001
1. Access for all participants’ project
teams to component interfaces and the
organization’s experts necessary to make
functional connections among security
platform components.
2. Support for development and
demonstration of the Securing the IIoT
for the energy sector use case in NCCoE
facilities which will be conducted in a
manner consistent with the NIST
Cybersecurity Framework, and other
relevant standards and guidance listed
in section 4 of the Securing the IIoT for
the energy sector use case.
Additional details about the Securing
the IIoT for the energy sector use case
are available at: https://
www.nccoe.nist.gov/node/4741.
NIST cannot guarantee that all
products proposed by respondents will
be used in the demonstration. Each
prospective participant will be expected
to work collaboratively with NIST staff
and other project participants under the
terms of the consortium CRADA in the
development of the Securing the IIoT for
the energy sector capability. Prospective
participants’ contribution to the
collaborative effort will include
assistance in establishing the necessary
interface functionality, connection and
set-up capabilities and procedures,
demonstration harnesses, environmental
and safety conditions for use, integrated
platform user instructions, and
demonstration plans and scripts
necessary to demonstrate the desired
capabilities. Each participant will train
NIST personnel, as necessary, to operate
its product in capability demonstrations
to the energy community. Following
successful demonstrations, NIST will
publish a description of the security
platform and its performance
characteristics sufficient to permit other
organizations to develop and deploy
security platforms that meet the security
objectives of the Securing the IIoT for
the energy sector use case. These
descriptions will be public information.
Under the terms of the consortium
CRADA, NIST will support
development of interfaces among
participants’ products by providing IT
infrastructure, laboratory facilities,
office facilities, collaboration facilities,
and staff support to component
composition, security platform
documentation, and demonstration
activities.
The dates of the demonstration of the
Securing the IIoT for the energy sector
capability will be announced on the
NCCoE website at least two weeks in
advance at https://nccoe.nist.gov/. The
expected outcome of the demonstration
is to improve the security of IIoT across
an entire energy sector enterprise.
Participating organizations will gain
PO 00000
Frm 00013
Fmt 4703
Sfmt 4703
from the knowledge that their products
are interoperable with other
participants’ offerings.
For additional information on the
NCCoE governance, business processes,
and NCCoE operational structure, visit
the NCCoE website https://
nccoe.nist.gov/.
Kevin A. Kimball,
Chief of Staff.
[FR Doc. 2019–21852 Filed 10–7–19; 8:45 am]
BILLING CODE 3510–13–P
DEPARTMENT OF COMMERCE
National Oceanic and Atmospheric
Administration
RIN 0648–XV099
North Pacific Fishery Management
Council; Public Meeting
National Marine Fisheries
Service (NMFS), National Oceanic and
Atmospheric Administration (NOAA),
Commerce.
ACTION: Notice of public meeting of the
North Pacific Fishery Management
Council’s Charter Halibut Management
Committee.
AGENCY:
The North Pacific Fishery
Management Council (Council) Charter
Halibut Management Committee will
meet October 29, 2019.
DATES: The meeting will be held on
Tuesday, October 29, 2019, from 10:30
a.m. to 4 p.m., Alaska Standard Time.
ADDRESSES: The meeting will be held in
the Old Federal Building, 605 W 4th
Ave., Suite 205, Anchorage, AK 99501–
2252. Teleconference line: (907) 271–
2896.
Council address: North Pacific
Fishery Management Council, 605 W
4th Ave., Suite 306, Anchorage, AK
99501–2252; telephone: (907) 271–2809.
FOR FURTHER INFORMATION CONTACT:
Steve MacLean, Council staff;
telephone: (907) 271–2809.
SUPPLEMENTARY INFORMATION:
SUMMARY:
Agenda
Tuesday, October 29, 2019
The purpose of the Charter Halibut
Management Committee meeting is to
identify a range of potential
management measures for the Area 2C
and Area 3A charter halibut fisheries in
2020 using the management measures in
place for 2019 as a baseline. For Area
2C, the baseline management measure
includes regulations applicable to
charter halibut fishing in all areas, and
a daily limit of one fish less than or
equal to 38 inches or greater than or
E:\FR\FM\08OCN1.SGM
08OCN1
Agencies
[Federal Register Volume 84, Number 195 (Tuesday, October 8, 2019)]
[Notices]
[Pages 53683-53684]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2019-21852]
-----------------------------------------------------------------------
DEPARTMENT OF COMMERCE
National Institute of Standards and Technology
[Docket No.: 190924-0035]
National Cybersecurity Center of Excellence (NCCoE) Securing the
Industrial Internet of Things for the Energy Sector
AGENCY: National Institute of Standards and Technology, Department of
Commerce.
ACTION: Notice.
-----------------------------------------------------------------------
SUMMARY: The National Institute of Standards and Technology (NIST)
invites organizations to provide products and technical expertise to
support and demonstrate security platforms for Securing the Industrial
Internet of Things (IIoT) for the energy sector use case. This notice
is the initial step for the National Cybersecurity Center of Excellence
(NCCoE) in collaborating with technology companies to address
cybersecurity challenges identified under the energy sector program.
Participation in the use case is open to all interested organizations.
DATES: Collaborative activities will commence as soon as enough
completed and signed letters of interest have been returned to address
all the necessary components and capabilities, but no earlier than
November 7, 2019.
ADDRESSES: The NCCoE is located at 9700 Great Seneca Highway,
Rockville, MD 20850. Letters of interest must be submitted to
[email protected] or via hardcopy to National Institute of
Standards and Technology, NCCoE; 9700 Great Seneca Highway, Rockville,
MD 20850. Organizations whose letters of interest are accepted in
accordance with the process set forth in the SUPPLEMENTARY INFORMATION
section of this notice will be asked to sign a consortium Cooperative
Research and Development Agreement (CRADA) with NIST. An NCCoE
consortium CRADA template can be found at: https://nccoe.nist.gov/node/138.
FOR FURTHER INFORMATION CONTACT: Jim McCarthy via email to
[email protected]; by telephone 301-975-0228; or by mail to
National Institute of Standards and Technology, NCCoE; 9700 Great
Seneca Highway, Rockville, MD 20850. Additional details about the
energy sector program are available at https://www.nccoe.nist.gov/node/4741.
SUPPLEMENTARY INFORMATION: Interested parties must contact NIST to
request a letter of interest template to be completed and submitted to
NIST. Letters of interest will be accepted on a first come, first
served basis. When the use case has been completed, NIST will post a
notice on the NCCoE energy sector program website at https://www.nccoe.nist.gov/node/4741 announcing the completion of the use case
and informing the public that it will no longer accept letters of
interest for this use case.
Background: The NCCoE, part of NIST, is a public-private
collaboration for accelerating the widespread adoption of integrated
cybersecurity tools and technologies. The NCCoE brings together experts
from industry, government, and academia under one roof to develop
practical, interoperable cybersecurity approaches that address the
real-world needs of complex Information Technology (IT) systems. By
accelerating dissemination and use of these integrated tools and
technologies for protecting IT assets, the NCCoE will enhance trust in
U.S. IT communications, data, and storage systems; reduce risk for
companies and individuals using IT systems; and encourage development
of innovative, job-creating cybersecurity products and services.
Process: NIST is soliciting responses from all sources of relevant
cybersecurity and infrastructure capabilities (see below) to enter into
a Cooperative Research and Development Agreement (CRADA) to provide
products and technical expertise to support and demonstrate security
platforms for the Securing the IIoT for the energy sector use case. The
full use case can be viewed at: https://www.nccoe.nist.gov/node/4741.
Interested parties should contact NIST using the information
provided in the FOR FURTHER INFORMATION CONTACT section of this notice.
NIST will then provide each interested party with a letter of interest
template, which the party must complete, certify that it is accurate,
and submit to NIST. NIST will contact interested parties if there are
questions regarding the responsiveness of the letters of interest to
the use case objective or requirements. NIST will select participants
who have submitted complete letters of interest on a first come, first
served basis up to the number of participants necessary to carry out
this use case. However, there may be continuing opportunity to
participate even after initial activity commences. Selected
participants will be required to enter into a consortium CRADA with
NIST (for reference, see the ADDRESSES section above). NIST published a
notice in the Federal Register on October 19, 2012 (77 FR 64314)
inviting U.S. companies to enter into National Cybersecurity Excellence
Partnerships (NCEPs) in furtherance of the NCCoE. For this
demonstration project, NCEP partners will not be given priority for
participation.
Use Case Objective: The objective of this use case is to provide an
architecture that can be referenced and develop guidance for securing
IIoT in commercial- and/or utility-scale distributed energy resource
(DER) environments, and to include an example solution that uses
existing, commercially available and/or open-source cybersecurity
products. A detailed description of the Securing the IIoT use case is
available at https://www.nccoe.nist.gov/node/4741.
Requirements: Each responding organization's letter of interest
should identify which security platform component(s) or capability(ies)
it is offering. Letters of interest should not include company
proprietary information, and all components and capabilities must be
commercially available. Components and capabilities are listed in
section 4 of the Securing the IIoT for the energy sector use case (for
reference, please see the link in the PROCESS section above) and
include:
Access control techniques for network, application, and data
access
Data integrity technologies that protect data at rest or in
transit, detect data integrity violations, and ensure data authenticity
Graph analytics, machine learning, behavioral monitoring, and
predictive analytics that aid in detecting malware and data integrity
violations
Information visualization and dashboard techniques that
present analytic results to human operators
Infrastructure components to construct or emulate the elements
of the conceptual architecture
Infrastructure components that incorporate integrity and
trustworthiness techniques
Sensors, network monitoring, system monitoring, data
acquisition devices, intelligent sensor gateways, and security
information and event management, or SIEM, systems that provide data
and event information for analysis
System/device and human authentication techniques that support
federation
[[Page 53684]]
Trustworthy distributed audit trails for accountability
Workflow techniques to orchestrate analysis
Each responding organization's letter of interest should identify
how their products or infrastructure components address one or more of
the following desired solution characteristics in section 4 of the
Securing the IIoT for the energy sector use case (for reference, please
see the link in the PROCESS section above):
1. Analysis and Visualization. The analysis and visualization
capabilities collect and process monitoring data from communications,
management systems, and control systems to detect anomalies and
identify anomalies that represent potential malicious activity.
2. Authentication and Access Control. The authentication and access
control capabilities are used on all communication among DER management
and control systems. These capabilities ensure that only known,
authorized systems/devices can exchange information. Further, these
capabilities may limit the types of information exchanged. Attempted
unauthorized communication or attempted communication by unknown
systems/devices is detected and reported to the analysis and
visualization capabilities.
3. Behavioral Monitoring. The behavioral monitoring capabilities
measure behavioral characteristics of the management and control
systems. Measurements are compared with expected or normal behavioral
characteristics that have been learned over time. Anomalies are
reported to the analysis and visualization capability.
4. Command Register. The command register capability records
transactions between the distribution control system and control
systems managing DERs. This capability allows both the utility and the
DER operator to verify information exchanges.
5. Data Integrity. Data integrity capabilities ensure that
information is not modified in transit between the sender and receiver.
If the information is modified, the capabilities detect the
modification and notify the analysis and visualization capabilities.
6. Malware Detection. The malware detection capabilities monitor
both information exchanges among the DER management and control systems
and processing by the management and control systems, looking for
indications of compromise by known malware.
Responding organizations need to understand and, in their letters
of interest, commit to provide:
1. Access for all participants' project teams to component
interfaces and the organization's experts necessary to make functional
connections among security platform components.
2. Support for development and demonstration of the Securing the
IIoT for the energy sector use case in NCCoE facilities which will be
conducted in a manner consistent with the NIST Cybersecurity Framework,
and other relevant standards and guidance listed in section 4 of the
Securing the IIoT for the energy sector use case.
Additional details about the Securing the IIoT for the energy
sector use case are available at: https://www.nccoe.nist.gov/node/4741.
NIST cannot guarantee that all products proposed by respondents
will be used in the demonstration. Each prospective participant will be
expected to work collaboratively with NIST staff and other project
participants under the terms of the consortium CRADA in the development
of the Securing the IIoT for the energy sector capability. Prospective
participants' contribution to the collaborative effort will include
assistance in establishing the necessary interface functionality,
connection and set-up capabilities and procedures, demonstration
harnesses, environmental and safety conditions for use, integrated
platform user instructions, and demonstration plans and scripts
necessary to demonstrate the desired capabilities. Each participant
will train NIST personnel, as necessary, to operate its product in
capability demonstrations to the energy community. Following successful
demonstrations, NIST will publish a description of the security
platform and its performance characteristics sufficient to permit other
organizations to develop and deploy security platforms that meet the
security objectives of the Securing the IIoT for the energy sector use
case. These descriptions will be public information. Under the terms of
the consortium CRADA, NIST will support development of interfaces among
participants' products by providing IT infrastructure, laboratory
facilities, office facilities, collaboration facilities, and staff
support to component composition, security platform documentation, and
demonstration activities.
The dates of the demonstration of the Securing the IIoT for the
energy sector capability will be announced on the NCCoE website at
least two weeks in advance at https://nccoe.nist.gov/. The expected
outcome of the demonstration is to improve the security of IIoT across
an entire energy sector enterprise. Participating organizations will
gain from the knowledge that their products are interoperable with
other participants' offerings.
For additional information on the NCCoE governance, business
processes, and NCCoE operational structure, visit the NCCoE website
https://nccoe.nist.gov/.
Kevin A. Kimball,
Chief of Staff.
[FR Doc. 2019-21852 Filed 10-7-19; 8:45 am]
BILLING CODE 3510-13-P