Potential Enhancements to the Critical Infrastructure Protection Reliability Standards, 37932-37938 [2020-13618]

Download as PDF jbell on DSKJLSW7X2PROD with NOTICES 37932 Federal Register / Vol. 85, No. 122 / Wednesday, June 24, 2020 / Notices Comments Due: 5 p.m. ET 7/8/20. Docket Numbers: ER20–2085–000. Applicants: PJM Interconnection, L.L.C. Description: § 205(d) Rate Filing: Amendment to WMPAs No. 3276, Queue No. X1–012 RE: GSRP I to GSRP II (consent) to be effective 1/24/2017. Filed Date: 6/17/20. Accession Number: 20200617–5160. Comments Due: 5 p.m. ET 7/8/20. Docket Numbers: ER20–2086–000. Applicants: PJM Interconnection, L.L.C. Description: § 205(d) Rate Filing: Amendment to WMPA, SA No. 3503; Queue No. X4–031 RE: GSRP I to GSRP II (consent) to be effective 8/25/2014. Filed Date: 6/17/20. Accession Number: 20200617–5161. Comments Due: 5 p.m. ET 7/8/20. Docket Numbers: ER20–2087–000. Applicants: Gichi Noodin Wind Farm, LLC. Description: Baseline eTariff Filing: Gichi Noodin Wind Farm LLC MBR Application Filing to be effective 8/1/ 2020. Filed Date: 6/17/20. Accession Number: 20200617–5163. Comments Due: 5 p.m. ET 7/8/20. Docket Numbers: ER20–2088–000. Applicants: Southern California Edison Company. Description: § 205(d) Rate Filing: Amended LGIA Daggett Solar Power 3 LLC SA No. 225 to be effective 6/19/ 2020. Filed Date: 6/18/20. Accession Number: 20200618–5001. Comments Due: 5 p.m. ET 7/9/20. Docket Numbers: ER20–2089–000. Applicants: Southwestern Public Service Company. Description: § 205(d) Rate Filing: 2020–06–18_SPS–GSEC–DSEC–IA-Sub 26–718–SPS–0.0.0 to be effective 8/17/ 2020. Filed Date: 6/18/20. Accession Number: 20200618–5042. Comments Due: 5 p.m. ET 7/9/20. Docket Numbers: ER20–2090–000. Applicants: New York Independent System Operator, Inc., Consolidated Edison Company of New York, Inc. Description: § 205(d) Rate Filing: LGIA (SA2535) re: NYISO, Consolidated Edison, & NRG Berrians East Development to be effective 6/4/2020. Filed Date: 6/18/20. Accession Number: 20200618–5049. Comments Due: 5 p.m. ET 7/9/20. Docket Numbers: ER20–2091–000. Applicants: Alabama Power Company. Description: § 205(d) Rate Filing: CED Solar Development (Timberland Solar) VerDate Sep<11>2014 18:20 Jun 23, 2020 Jkt 250001 Amended and Restated LGIA Filing to be effective 6/5/2020. Filed Date: 6/18/20. Accession Number: 20200618–5055. Comments Due: 5 p.m. ET 7/9/20. Docket Numbers: ER20–2092–000. Applicants: Southwest Power Pool, Inc. Description: § 205(d) Rate Filing: 3672 City of Independence, MO/Evergy Metro Int Agr to be effective 8/17/2020. Filed Date: 6/18/20. Accession Number: 20200618–5065. Comments Due: 5 p.m. ET 7/9/20. Docket Numbers: ER20–2093–000. Applicants: Southwest Power Pool, Inc. Description: § 205(d) Rate Filing: 3673 OPPD & Evergy Kansas Central Interconnection Agreement to be effective 8/17/2020. Filed Date: 6/18/20. Accession Number: 20200618–5070. Comments Due: 5 p.m. ET 7/9/20. Docket Numbers: ER20–2094–000. Applicants: Southwest Power Pool, Inc. Description: § 205(d) Rate Filing: 3199R1 Evergy MO West/City of Liberal MO Interconnection Ag to be effective 8/17/2020. Filed Date: 6/18/20. Accession Number: 20200618–5073. Comments Due: 5 p.m. ET 7/9/20. Docket Numbers: ER20–2095–000. Applicants: PJM Interconnection, L.L.C. Description: § 205(d) Rate Filing: Amendment to WMPA, SA No. 3202; Queue No. W3–077 (amend) to be effective 4/30/2014. Filed Date: 6/18/20. Accession Number: 20200618–5074. Comments Due: 5 p.m. ET 7/9/20 Docket Numbers: ER20–2096–000. Applicants: Southwest Power Pool, Inc. Description: § 205(d) Rate Filing: 3218R1 Evergy Metro & Evergy Missouri West Inter Agr to be effective 8/17/2020. Filed Date: 6/18/20. Accession Number: 20200618–5077. Comments Due: 5 p.m. ET 7/9/20. Docket Numbers: ER20–2097–000. Applicants: American Transmission Systems, Incorporated, PJM Interconnection, L.L.C. Description: § 205(d) Rate Filing: ATSI submits ECSA No. 5644 to be effective 8/17/2020. Filed Date: 6/18/20. Accession Number: 20200618–5096. Comments Due: 5 p.m. ET 7/9/20. Docket Numbers: ER20–2098–000. Applicants: Titan Solar 1, LLC. Description: Baseline eTariff Filing: baseline new to be effective 8/17/2020. PO 00000 Frm 00113 Fmt 4703 Sfmt 4703 Filed Date: 6/18/20. Accession Number: 20200618–5110. Comments Due: 5 p.m. ET 7/9/20. Docket Numbers: ER20–2099–000. Applicants: American Transmission Systems, Incorporated, PJM Interconnection, L.L.C. Description: § 205(d) Rate Filing: ATSI submits ECSA No. 5583 to be effective 8/17/2020. Filed Date: 6/18/20. Accession Number: 20200618–5112. Comments Due: 5 p.m. ET 7/9/20. Docket Numbers: ER20–2100–000. Applicants: The Dayton Power and Light Company, PJM Interconnection, L.L.C. Description: § 205(d) Rate Filing: DP&L submits Supplemental Filing to Application filed in ER20–1068–000 to be effective 5/3/2020. Filed Date: 6/18/20. Accession Number: 20200618–5132. Comments Due: 5 p.m. ET 7/9/20. The filings are accessible in the Commission’s eLibrary system by clicking on the links or querying the docket number. Any person desiring to intervene or protest in any of the above proceedings must file in accordance with Rules 211 and 214 of the Commission’s Regulations (18 CFR 385.211 and 385.214) on or before 5:00 p.m. Eastern time on the specified comment date. Protests may be considered, but intervention is necessary to become a party to the proceeding. eFiling is encouraged. More detailed information relating to filing requirements, interventions, protests, service, and qualifying facilities filings can be found at: https://www.ferc.gov/ docs-filing/efiling/filing-req.pdf. For other information, call (866) 208–3676 (toll free). For TTY, call (202) 502–8659. Dated: June 18, 2020. Nathaniel J. Davis, Sr., Deputy Secretary. [FR Doc. 2020–13621 Filed 6–23–20; 8:45 am] BILLING CODE 6717–01–P DEPARTMENT OF ENERGY Federal Energy Regulatory Commission [Docket No. RM20–12–000] Potential Enhancements to the Critical Infrastructure Protection Reliability Standards Federal Energy Regulatory Commission, DOE. ACTION: Notice of Inquiry. AGENCY: The Federal Energy Regulatory Commission (Commission) SUMMARY: E:\FR\FM\24JNN1.SGM 24JNN1 jbell on DSKJLSW7X2PROD with NOTICES Federal Register / Vol. 85, No. 122 / Wednesday, June 24, 2020 / Notices seeks comment on certain potential enhancements to the currently-effective Critical Infrastructure Protection (CIP) Reliability Standards. In particular, the Commission seeks comment on whether the CIP Reliability Standards adequately address the following topics: (i) Cybersecurity risks pertaining to data security, (ii) detection of anomalies and events, and (iii) mitigation of cybersecurity events. In addition, the Commission seeks comment on the potential risk of a coordinated cyberattack on geographically distributed targets and whether Commission action including potential modifications to the CIP Reliability Standards would be appropriate to address such risk. DATES: Initial Comments are due August 24, 2020, and Reply Comments are due September 22, 2020. ADDRESSES: Comments, identified by docket number, may be filed in the following ways: • Electronic Filing through https:// www.ferc.gov. Documents created electronically using word processing software should be filed in native applications or print-to-PDF format and not in a scanned format. • Mail/Hand Delivery: Those unable to file electronically may mail or handdeliver comments to: Federal Energy Regulatory Commission, Secretary of the Commission, 888 First Street NE, Washington, DC 20426. • Instructions: For detailed instructions on submitting comments, see the Comment Procedures Section of this document. FOR FURTHER INFORMATION CONTACT: Vincent Le (Technical Information), Office of Electric Reliability, Federal Energy Regulatory Commission, 888 First Street NE, Washington, DC 20426, (202) 502–6204, Vincent.Le@ferc.gov. Kevin Ryan (Legal Information), Office of the General Counsel, Federal Energy Regulatory Commission, 888 First Street NE, Washington, DC 20426, (202) 502–6840, Kevin.Ryan@ferc.gov. SUPPLEMENTARY INFORMATION: 1. In this Notice of Inquiry (NOI), the Commission seeks comment on whether the currently-effective Critical Infrastructure Protection (CIP) Reliability Standards adequately address the following topics: (i) Cybersecurity risks pertaining to data security, (ii) detection of anomalies and events, and (iii) mitigation of cybersecurity events. In addition, the Commission seeks comment on the potential risk of a coordinated cyberattack on geographically distributed targets and whether Commission action, including potential VerDate Sep<11>2014 18:20 Jun 23, 2020 Jkt 250001 modifications to the CIP Reliability Standards, would be appropriate to address such risk. 2. The Commission-approved CIP Reliability Standards are intended to provide a risk-based, defense in depth (i.e., multiple, redundant ‘‘defensive’’ measures) approach to cybersecurity of the bulk electric system. Since the approval of the first mandatory CIP Reliability Standards in 2008, these standards have been modified on multiple occasions to address emerging issues and to improve the cybersecurity posture of the bulk electric system.1 Yet, new cyber threats continue to evolve, and the Reliability Standards should keep pace to maintain a robust, defense in depth approach to electric grid cybersecurity. 3. With this in mind, Commission staff undertook a review of the National Institute of Standards and Technology (NIST) Cyber Security Framework (NIST Framework), which sets forth a comprehensive, repeatable structure to guide cybersecurity activities and to consider cybersecurity risks as part of an organization’s risk management processes of its critical infrastructure.2 Commission staff compared the content of the NIST Framework with the substance of the CIP Reliability Standards, and identified certain topics addressed in the NIST Framework that may not be adequately addressed in the CIP Reliability Standards. Commission staff further analyzed whether the identified topics are within the scope of the CIP Reliability Standards.3 Commission staff then studied whether the potential ‘‘gaps’’ that are within the scope of the CIP Reliability Standards presented a significant risk to bulk electric system reliability. Based on this 1 See, e.g., Version 5 Critical Infrastructure Protection Reliability Standards, Order No. 791, 78 FR 72,755 (Dec. 3, 2013), 145 FERC ¶ 61,160 (2013), order on clarification and reh’g, Order No. 791–A, 146 FERC ¶ 61,188 (2014); Revised Critical Infrastructure Protection Reliability Standards, Order No. 822, 154 FERC ¶ 61,037, reh’g denied, Order No. 822–A, 156 FERC ¶ 61,052 (2016); Revised Critical Infrastructure Protection Reliability Standard CIP–003–7—Cyber Security—Security Management Controls, Order No. 843, 163 FERC ¶ 61,032 (2018). 2 NIST, Framework for Improving Critical Infrastructure Cybersecurity Version 1.1, Executive Summary at v, https://nvlpubs.nist.gov/nistpubs/ CSWP/NIST.CSWP.04162018.pdf. 3 The NIST Framework provisions that pertain to business organization activity were not considered appropriate to address in the CIP Reliability Standards. For example, the NIST Framework provisions that pertain to the Governance Category (ID.GV) were not considered appropriate to be addressed in the CIP Reliability Standards since they address the policies, procedures, and processes to manage and monitor the organization’s regulatory, legal, risk, environmental, and operational requirements that inform the management of cybersecurity risk. PO 00000 Frm 00114 Fmt 4703 Sfmt 4703 37933 analysis, Commission staff identified the three NIST Framework categories that are the subject of this NOI: (i) Cybersecurity risks pertaining to data security, (ii) detection of anomalies and events, and (iii) mitigation of cybersecurity events. 4. In addition, the Commission seeks comment on the risk of a coordinated cyberattack on the bulk electric system and potential Commission action to address such risk. In general, bulk electric system planning is based on the ability to withstand a system’s single largest contingency, known as an N–1 event. The Commission has questioned whether greater defense in depth is warranted to better protect the bulk electric system from a coordinated attack on multiple BES Cyber Assets.4 The risk of such a coordinated attack may be exacerbated by the recent shift from larger, centralized generation resources to smaller, more geographically distributed generation resources. The Commission seeks comment on the need to address the risk of a coordinated cyberattack on the bulk electric system, as well as potential approaches to address the matter, such as voluntary or mandatory participation in grid exercises, other types of training to prepare for a coordinated attack, and modifications to the current applicability thresholds in Reliability Standard CIP–002–5.1a that would subject additional facilities to the CIP controls that apply to medium and/or high impact BES Cyber Assets.5 4 Mandatory Reliability Standards for Critical Infrastructure Protection, Order No. 706, 122 FERC ¶ 61,040, at P 256, order on reh’g, Order No. 706– A, 123 FERC ¶ 61,174 (2008), order on clarification, Order No, 706–B, 126 FERC ¶ 61,229, order on clarification, Order No. 706–C, 127 FERC ¶ 61,273 (2009). NERC defines BES Cyber Asset as a ‘‘Cyber Asset that if rendered unavailable, degraded, or misused would, within 15 minutes of its required operation, misoperation, or non-operation, adversely impact one or more Facilities, systems, or equipment, which, if destroyed, degraded, or otherwise rendered unavailable when needed, would affect the reliable operation of the Bulk Electric System.’’ Glossary of Terms Used in NERC Reliability Standards, https://www.nerc.com/files/ glossary_of_terms.pdf. 5 Reliability Standard CIP–002–5.1a (Bulk Electric System Cyber System Categorization) requires a registered entity to categorize its cyber systems in terms of low, medium, and high impact to the grid. These impact ratings determine which requirements in NERC Reliability Standards CIP–004 though CIP– 013 apply to BES Cyber Systems. Attachment 1 of the Reliability Standards, ‘‘Impact Rating Criteria,’’ identifies the criteria for identifying cyber systems as low, medium or high impact. For example, a control center used to perform the functions of a balancing authority for generation equal to or greater than an aggregate of 3,000 megawatts (MW) in a single interconnection is designated a high impact asset. A control center that performs the operations of a generator operator for an aggregate highest rated net real power equal to or exceeding E:\FR\FM\24JNN1.SGM Continued 24JNN1 37934 Federal Register / Vol. 85, No. 122 / Wednesday, June 24, 2020 / Notices I. Background A. CIP Reliability Standards 5. In January 2008, the Commission issued Order No. 706, which approved the first set of mandatory CIP Reliability Standards addressing cybersecurity. In Order No. 706, the Commission stated inter alia that NERC should look to NIST as a source for improving the CIP Reliability Standards. The Commission also indicated that it may address the appropriateness of adopting NIST cybersecurity standards in the CIP Reliability Standards in a future proceeding: The Commission continues to believe—and is further persuaded by the comments—that NERC should monitor the development and implementation of the NIST standards to determine if they contain provisions that will protect the Bulk-Power System better than the CIP Reliability Standards. . . . Consistent with the CIP NOPR, any provisions that will better protect the BulkPower System should be addressed in NERC’s Reliability Standards development process. The Commission may revisit this issue in future proceedings as part of an evaluation of existing Reliability Standards or the need for new CIP Reliability Standards, . . . .6 Moreover, although Order No. 706 did not directly address the issue of a potential coordinated attack on cyber assets, the Commission did express concern that focus on the N–1 planning principle may not be appropriate in the context of a cybersecurity because an attacker may simultaneously attack multiple assets. In particular, the Commission observed: While the N minus 1 criterion may be appropriate in transmission planning, use of an N minus 1 criterion for the risk-based assessment in CIP–002–1 would result in the nonsensical result that no substations or generating plants need to be protected from cyber events. A cyber attack can strike multiple assets simultaneously, and a cyber attack can cause damage to an asset for such a time period that other asset outages may occur before the damaged asset can be returned to service. Thus, the fact that the system was developed to withstand the loss of any single asset should not be the basis for not protecting that asset.7 jbell on DSKJLSW7X2PROD with NOTICES 6. NIST has continued to serve as an important source for the improvement of the CIP Reliability Standards. For example, in 2013, the Commission issued Order No. 791, which approved the CIP Version 5 Standards.8 The CIP 1,500 MW in a single interconnection is designated as a medium impact asset. 6 Order No. 706, 122 FERC ¶ 61,040 at P 233. 7 Id. P 256. 8 Version 5 Critical Infrastructure Protection Reliability Standards, Order No. 791, 145 FERC ¶ 61,160 (2013), order on clarification and reh’g, Order No. 791–A, 146 FERC ¶ 61,188 (2014). VerDate Sep<11>2014 18:20 Jun 23, 2020 Jkt 250001 Version 5 Standards adapted a new approach to identifying BES Cyber Assets subject to the CIP Standards, categorizing such assets as of low, medium and high impact. NERC explained that it developed this tiered approach based on a review of NIST cyber security standards.9 B. The NIST Framework 7. The NIST Framework was developed in response to Executive Order 13,636 ‘‘Improving Critical Infrastructure Cybersecurity,’’ issued on February 12, 2013.10 The NIST Framework version 1.0 was released in February 2014 and revised version 1.1 was released in April 2018. Executive Order 13,636 stated that the NIST Framework was designed to ‘‘reduce cyber risks to critical infrastructure[,] . . . [and] shall include a set of standards, methodologies, procedures, and processes that align policy, business, and technological approaches to address cyber risks[,] . . . [and] incorporate voluntary consensus standards and industry best practices to the fullest extent possible.’’ 11 8. The NIST Framework consists of five Functions that each provide a highlevel, strategic view of one part of an organization’s cybersecurity risk management. The five Functions are: • Identify—Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities; • Protect—Develop and implement appropriate safeguards to ensure delivery of critical services; • Detect—Develop and implement appropriate activities to identify the occurrence of a cybersecurity event; • Respond—Develop and implement the appropriate activities to take action regarding a detected cybersecurity event; and • Recover—Develop and implement appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event. 9. Each of the five Functions is composed of Categories and 9 See Order No. 791, 145 FERC ¶ 61,160 at P 14. On August 26, 2019, the U.S. Government Accountability Office (GAO) submitted a report to Congress that addressed the completeness of the CIP Reliability Standards in comparison to the subject matter addressed in the NIST Framework as well as the risks to the electric grid from a coordinated cyberattack. GAO, Critical Infrastructure Protection: Actions Needed to Address Significant Cybersecurity Risks Facing the Electric Grid (Aug. 2019), https://www.gao.gov/ assets/710/701079.pdf. 10 Exec. Order No. 13,636, 78 FR 11737 (Feb. 19, 2013). 11 Id. at 11741. PO 00000 Frm 00115 Fmt 4703 Sfmt 4703 Subcategories, with the five Functions having a total of 23 Categories and 108 Subcategories. Categories are defined as cybersecurity outcomes closely tied to programmatic needs and activities. The 23 Categories that are organized within the five Functions, are as follows: (1) Identify Function (Asset Management, Business Environment, Governance, Risk Assessment, Risk Management Strategy, and Supply Chain Risk Management); (2) Protect Function (Identity Management and Access Control, Awareness and Training, Data Security, Information Protection Process and Procedures, Maintenance, and Protective Technology); (3) Detect Function (Anomalies and Events, Security Continuous Monitoring, and Detection Process); (4) Respond Function (Response Planning, Communications, Analysis, Mitigation, and Improvements); and (5) Recover Function (Recovery Planning, Improvements, and Communications). II. Discussion A. The NIST Framework 1. Analysis 10. Based on a comparison of the NIST Framework and CIP Reliability Standards, Commission staff identified three NIST Framework Categories that may not be adequately addressed in the CIP Reliability Standards, and thus could reflect potential reliability gaps: (i) Cybersecurity risks pertaining to data security, (ii) detection of anomalies and events, and (iii) mitigation of cybersecurity events. a. Data Security Category 11. The NIST Framework Data Security Category (PR.DS) specifies activities to manage information and records (i.e., data) consistent with an organization’s risk strategy to protect the confidentiality, integrity, and availability of information and data. The Data Security Category identifies internal controls in eight Subcategories to require that: (1) Data at rest is protected (PR.DS–1); (2) data in transit is protected (PR.DS–2); (3) assets are formally managed throughout removal, transfer, and disposition (PR.DS–3); (4) adequate capacity to ensure availability is maintained (PR.DS–4); (5) protections against data leaks are implemented (PR.DS–5); (6) integrity checking mechanisms are used to verify software, firmware, and information integrity (PR.DS–6); (7) the development and testing environment(s) are separate from the production environment (PR.DS–7); and (8) integrity checking mechanisms E:\FR\FM\24JNN1.SGM 24JNN1 Federal Register / Vol. 85, No. 122 / Wednesday, June 24, 2020 / Notices are used to verify hardware integrity (PR.DS–8).12 12. Commission staff analysis indicates that two NIST Data Security Subcategories may not be adequately addressed in the CIP Reliability Standards. First, the Subcategory requiring adequate capacity to ensure availability is maintained (PR.DS–4) does not appear to be addressed in Reliability Standard CIP–011–2 (Information Protection) or Reliability Standard CIP–012–1 (Communications between Control Centers), which addresses real-time assessment and realtime monitoring data while being transmitted between any applicable control center. Reliability Standard CIP– 011–2 addresses the confidentiality and integrity of medium and high impact BES Cyber System information, but it does not address availability of information and does not apply to low impact BES Cyber Systems. Reliability Standard CIP–012–1, which has not yet gone into effect, augments the data protection controls in the CIP Reliability Standard, but it is limited to real-time assessment and monitoring data transmitted between control centers.13 The loss of BES Cyber System information availability could result in a loss of the ability to accurately maintain or restore the bulk electric system, which could affect reliability. 13. In addition, while integrity checking mechanisms to verify software, firmware, and information integrity (PR.DS–6) are partially addressed by Reliability Standard CIP–013–1 (Supply Chain Risk Management), the requirements do not apply to low impact BES Cyber Systems, nor do they apply to information, such as a digital manual provided with a software tool, for low, medium, or high impact BES Cyber Systems. Not verifying software, firmware, and information integrity may allow a malicious actor to bypass existing security controls without detection. 14. In sum, the absence of CIP Reliability Standard requirements corresponding to Subcategories PR.DS– 4 and PR–DS–6 in the NIST Framework could represent a potential gap in the CIP Reliability Standards. jbell on DSKJLSW7X2PROD with NOTICES 12 See NIST Cybersecurity Framework at 32–33. Order No. 866, the Commission approved Reliability Standard CIP–012–1 and also directed NERC to modify the Reliability Standard to require protections regarding the availability of links and data communicated between control centers. Critical Infrastructure Protection Reliability Standard CIP–012–1—Cyber Security— Communications Between Control Centers, Order No. 866, 170 FERC ¶ 61,031 (2020). 13 In VerDate Sep<11>2014 18:20 Jun 23, 2020 Jkt 250001 b. Anomalies and Events Category 15. The NIST Framework Anomalies and Events Category (DE.AE) identifies security controls to detect anomalous activity and understand the potential impact of events. Specifically, the Anomalies and Events Category identifies internal controls in five Subcategories to require that: (1) A baseline of network operations and expected data flows for users and systems is established and managed (DE.AE–1); (2) detected events are analyzed to understand attack targets and methods (DE.AE–2); (3) event data are aggregated and correlated from multiple sources and sensors (DE.AE–3); (4) the impact of events is determined (DE.AE–4); and (5) incident alert thresholds are established (DE.AE–5).14 16. Reliability Standard CIP–008–5 (Incident Reporting and Response Planning) specifies incident response requirements to mitigate the risk to the reliable operation of the bulk electric system resulting from a cyber security incident.15 This includes a requirement that applicable entities have a process to ‘‘identify, classify, and respond to Cyber Security Incidents,’’ which corresponds to Subcategories DE.AE–2 and DE.AE– 4.16 However, Reliability Standard CIP– 008–5 is only applicable to medium and high impact BES Cyber Systems. Accordingly, there is no requirement, similar to Subcategories DE.AE–2 and DE.AE–4, for low impact BES Cyber Systems. If a low impact BES Cyber System is compromised and an analysis is not performed, the compromised low impact BES Cyber System can potentially be used to gain access to other BES Cyber Systems, including medium and high impact BES Cyber Systems. c. Mitigation Category 17. The NIST Framework Mitigation Category (RS.MI) specifies activities to prevent the expansion of a cybersecurity event, mitigate any effects and resolve the incident. The Mitigation Category identifies internal controls in three Subcategories to require that: (1) Incidents are contained (RS.MI–1); (2) incidents are mitigated (RS.MI–2); and (3) newly identified vulnerabilities are mitigated or documented as accepted risks (RS.MI–3).17 14 See NIST Cybersecurity Framework at 37–38. Standard CIP–008–6, which becomes effective on January 1, 2021, expands the current version’s scope to include Electronic Access Control or Monitoring Systems and suspicious activity, but it does not include low impact BES Cyber Systems. 16 Reliability Standard CIP–008–5, Requirement R1.1. 17 See NIST Cybersecurity Framework at 42–43. 15 Reliability PO 00000 Frm 00116 Fmt 4703 Sfmt 4703 37935 18. Reliability Standard CIP–008–5 requires responsible entities to document their cybersecurity incident response plans and provide evidence of incident response processes or procedures that address incident handling. However, Reliability Standard CIP–008–5 does not specifically require incident containment or mitigation as discussed in Subcategories RS.MI–1 and RS.MI–2.18 In addition, Reliability Standard CIP–008–5 does not apply to low impact BES Cyber Systems. Similarly, while Reliability Standard CIP–010–2 (Configuration Management and Vulnerability Assessments) addresses the need to mitigate newly identified vulnerabilities for medium and high impact BES Cyber Systems consistent with Subcategory RS.MI–3, it does not apply to low impact BES Cyber Systems. As noted above, without proper containment and mitigation, the compromise of a low impact BES Cyber System can potentially be used as a launching point to gain access to other BES Cyber Systems, including medium and high impact BES Cyber Systems. 2. Request for Comments 19. The Commission seeks comment on whether the currently effective CIP Reliability Standards adequately address aspects of the NIST Framework that support bulk electric system reliability and associated operational technology (i.e., industrial control systems), as well as current and projected cybersecurity risks. As discussed above, there may be subcategories in the NIST Framework that are not adequately addressed in the CIP Reliability Standards, or addressed only with regard to medium and high impact BES Cyber Assets but not low impact BES Cyber Assets. While differences between the CIP Reliability Standards and the NIST Framework are to be expected, the Commission seeks comment on whether the differences identified herein reflect potential reliability gaps in the CIP Reliability Standards that should be addressed. 20. Below, we pose questions that commenters should address in their submissions. However, commenters need not address every topic or answer every question identified below. A1. The security controls in the Data Security Category require the management of information and records (i.e., data) consistent with an organization’s risk strategy to protect the confidentiality, integrity, and availability of information and data. The Commission seeks comment on whether the CIP Reliability Standards adequately address 18 Reliability Standard CIP–008–6 also does not specifically address incident containment or mitigation. E:\FR\FM\24JNN1.SGM 24JNN1 jbell on DSKJLSW7X2PROD with NOTICES 37936 Federal Register / Vol. 85, No. 122 / Wednesday, June 24, 2020 / Notices each data security subcategory as outlined in the NIST Framework and, if not, what are possible solutions, and in particular: • Do the CIP Reliability Standards adequately address Data Security Subcategories PR.DS–4 and PR.DS–6 for medium and high impact BES Cyber Systems, and if so how? • Do the CIP Reliability Standards adequately address the same Subcategories for low impact BES Cyber Systems, and if so how? • If the CIP Reliability Standards do not adequately address these Subcategories, or any other Data Security Subcategories, for either low, medium or high impact BES Cyber Systems, explain whether this poses a risk to the reliable operation of the BulkPower System today and the Bulk-Power System of the near future. A2. The security controls in the Anomalies and Events Category require that anomalous activity is detected and the potential impact of events is understood. Furthermore, it requires that detected events are analyzed to understand attack targets and methods. The Commission seeks comment on whether the CIP Reliability Standards adequately address the detection and mitigation of anomalous activity as outlined in the NIST Framework and, if not, what are possible solutions, and in particular: • Should low impact BES Cyber Systems be covered by Anomalies and Events Subcategories DE.AE–2 and DE.AE–4? • Do the CIP Reliability Standards adequately address Anomalies and Events Subcategories DE.AE–2 and DE.AE–4 for low impact BES Cyber Systems, and if so how? • If the CIP Reliability Standards do not adequately address these Subcategories for low impact BES Cyber Systems, explain whether this poses a risk to the reliable operation of the Bulk-Power System today and the Bulk-Power System of the near future. • If the CIP Reliability Standards do not adequately address any other Anomalies and Events Subcategories, for either low, medium or high impact BES Cyber Systems, explain whether this poses a risk to the reliable operation of the Bulk-Power System today and the Bulk-Power System of the near future. A3. The security controls in the Mitigation Category require that newly identified vulnerabilities are mitigated or, alternatively, documented as accepted risks. Response activities are performed to prevent expansion of an event, mitigate its effects, and resolve the incident. The Commission seeks comment on whether the CIP Reliability Standards adequately address the mitigation of newly identified vulnerabilities as outlined in the NIST Framework and, if not, what are possible solutions, and in particular: • Do the CIP Reliability Standards adequately address Mitigation Subcategories RS.MI–1 and RS.MI–2 for low, medium and high impact BES Cyber Systems, and if so how? • Do the CIP Reliability Standards adequately address Mitigation Subcategory RS.MI–3 for low impact BES Cyber Systems, and if so how? VerDate Sep<11>2014 18:20 Jun 23, 2020 Jkt 250001 • If the CIP Reliability Standards do not adequately address these Subcategories for low, medium or high impact BES Cyber Systems, explain whether this poses a risk to the reliable operation of the Bulk-Power System today and the Bulk-Power System of the near future. B. Coordinated Cyberattack Assessment 1. Analysis 21. As discussed below, this NOI seeks comment on the risk of a coordinated cyberattack on the bulk electric system and the potential need for Commission action to address such risk. 22. Since the Commission approved the first mandatory CIP Reliability Standards in 2008, the generation resource mix has shifted away from larger, centralized generation resources to the expanding integration of smaller, geographically distributed generation resources. Accordingly, an increasing number of generation resources are categorized as low impact BES Cyber Systems, because they do not meet the thresholds in Reliability Standard CIP– 002–5.1a for medium or high impact BES Cyber Systems, and therefore are not required to comply with the full suite of CIP Reliability Standards.19 23. In 2008, when the CIP Reliability Standards first became effective, it might have been more effective to focus cybersecurity protections on larger generation plants than smaller plants. However, given the shift to smaller generation resources, it is worth examining whether a sophisticated threat actor could initiate a coordinated cyberattack targeting geographically distributed generation resources, posing an unacceptable risk to bulk electric system reliability. Such a coordinated cyberattack would present itself as a ‘‘common mode failure,’’ which could be similar in risk to a wide-scale disruption to fuel supplies, such as an attack on a natural gas pipeline. 24. Recent publicly available studies and reports have assessed the potential reliability impacts of a coordinated cyberattack on geographically distributed targets. These sources evaluated the impact to the power grid from simultaneous or near simultaneous loss of geographically distributed electrical facilities that could result in widespread loss of electrical services, including long-duration, large-scale disturbances. The following three reports highlight the potential risks to Bulk-Power System reliability. 25. First, the NERC’s 2019 Supply Chain Risk Assessment, based on 19 Reliability Standard CIP–002–5.1a (Cyber Security—BES Cyber System Categorization), Attachment 1 (Impact Rating Criteria). PO 00000 Frm 00117 Fmt 4703 Sfmt 4703 information obtained through a mandatory data request to industry, concludes that a coordinated cyberattack ‘‘could greatly affect [bulk electric system] reliability beyond the local area.’’ 20 The Supply Chain Risk Assessment examined the nature and complexity of cybersecurity supply chain risks, including those associated with low impact assets, and it found that: While [low impact] locations represent a small percentage of all transmission stations and substation locations, the combined effect of a coordinated cyberattack on multiple locations could affect BES reliability beyond the local area. The analysis of third-party electronic access to generation resource locations is even more concerning. More than 50% of all low impact locations of generation resources allow third-party electronic access. As with transmission stations and substations, the combined effect of a coordinated cyberattack could greatly affect BES reliability beyond the local area. Based on this assessment, NERC staff recommended that the Supply Chain Reliability Standards should be modified to include low impact BES Cyber Systems with remote electronic access connectivity.21 26. Second, on September 4, 2019, NERC published a Lessons Learned document regarding a denial-of-service attack against multiple remote generation sites whose BES Cyber Systems are categorized as low impact. The document explained that a known vulnerability in the web interface of a vendor’s firewall was exploited, allowing an unauthenticated attacker to cause unexpected reboots of the devices. The reboots resulted in a denial of service condition at a low impact control center and multiple remote low impact generation sites. This resulted in brief communications outages (i.e., less than five minutes) between field devices at the generation sites, as well as between the generation sites and the control center. Although the cyberattack did not cause a disturbance, it met the definition of a coordinated cyberattack, 20 See NERC, Supply Chain Risk Assessment: Analysis of Data Collected under the NERC Rules of Procedure Section 1600 Data Request, at vi (Dec. 9, 2019) https://www.nerc.com/pa/comp/Supply ChainRiskMitigationProgramDL/SupplyChainRisk AssesmentReport.pdf. 21 Id. The NERC Board of Trustees adopted an alternative proposal to initiate a project to modify Reliability Standard CIP–003–8 to include policies for low impact BES Cyber Systems for malicious communications and vendor remote access, while continuing to evaluate the effectiveness and sufficiency of the supply chain risk management Reliability Standards. NERC, Resolution for Agenda Item 8.d: Supply Chain Recommendations (February 6, 2020), https://www.nerc.com/gov/bot/ Agenda%20highlights%20and%20Mintues %202013/Approved_Resolution_%20Supply %20Chain%20Follow%20Up%20(2-6-2020).pdf. E:\FR\FM\24JNN1.SGM 24JNN1 Federal Register / Vol. 85, No. 122 / Wednesday, June 24, 2020 / Notices jbell on DSKJLSW7X2PROD with NOTICES and it is possible that this was the first coordinated cyberattack on the BulkPower System. The document recommended that ‘‘[e]ven in cases involving low-Impact BES assets, an entity should strive for good cyber security policies and procedures’’ by considering adopting security controls for low impact BES Cyber Assets above those required under the CIP Reliability Standards.22 27. Finally, on January 29, 2019, the United States Office of the Director of National Intelligence (ODNI) reported to the United States Senate Select Committee on Intelligence concerning potential nation state risks.23 Specifically, the ODNI reported that: Russia has the ability to execute cyber attacks in the United States that generate localized, temporary disruptive effects on critical infrastructure—such as disrupting an electrical distribution network for at least a few hours—similar to those demonstrated in Ukraine in 2015 and 2016. Moscow is mapping our critical infrastructure with the long-term goal of being able to cause substantial damage.24 28. In addition, ODNI reported that, ‘‘China has the ability to launch cyber attacks that cause localized, temporary disruptive effects on critical infrastructure—such as disruption of a natural gas pipeline for days to weeks— in the United States.’’ 25 ODNI concluded that our nation state adversaries and strategic competitors will increasingly use cyber capabilities to, among other things, disrupt critical infrastructure. 29. The loss of power supply to an Interconnection can and has caused instability, uncontrolled separation, and cascading failures. Unreliable operations can be caused by either near simultaneous or sequential loss of facilities, which cause thermal, voltage, and/or stability limits to be violated. Simultaneous or near simultaneous loss of multiple facilities under 1,500 MW can cause these effects, which has been demonstrated historically 26 and through simulations.27 The loss of even 22 NERC, Lesson Learned Risks Posed by Firewall Firmware Vulnerabilities, at 2–3 (Sept. 4, 2019). 23 ODNI, Worldwide Threat Assessment of the US Intelligence Community (Jan. 29, 2019), https:// www.dni.gov/files/ODNI/documents/2019-ATASFR-SSCI.pdf. 24 Id. at 5. 25 Id. at 6. 26 See generally U.S.-Canada Power System Outage Task Force, Final Report on the August 14 Blackout in the United States and Canada: Causes and Recommendations (April 2004), https:// www.ferc.gov/cust-protect/moi/blackout.asp. 27 See, e.g., NERC, Frequency Response Initiative Report: The Reliability Impact of Frequency Response (October 30, 2012). VerDate Sep<11>2014 18:20 Jun 23, 2020 Jkt 250001 a single facility can cause thermal overloads on parallel facilities. Combined or sequential losses can trigger safety systems such as underfrequency load shedding relays to operate across the Interconnection which, in turn, could lead to instability and cascading outages. Based on the review of publicly available information discussed above, it is possible that such incidents could be caused by a coordinated cyberattack on geographically distributed targets. 2. Request for Comments 30. The Commission seeks comment on the potential risk of a coordinated cyberattack on geographically distributed targets and whether modifications to the CIP Reliability Standards, including potential modifications to the current MW thresholds, would be appropriate to address such risks. In particular, the Commission seeks comment regarding the procedures and security controls that are currently employed to protect against the potential risk of a geographically distributed coordinated cyberattack and whether modifications to the CIP Reliability Standards would be appropriate to address such risks. B1. Are there operating processes and procedures that can be used to evaluate, mitigate, protect against, and recover from potential geographically distributed coordinated cyberattacks? Describe generally the efficiency and effectiveness of these operating processes and procedures, including response to and recovery from a potential geographically distributed coordinated cyberattack. B2. Are there security controls that can be used to evaluate, mitigate, and protect against potential geographically distributed coordinated cyberattacks? Describe generally the efficiency and effectiveness of these security controls in mitigating the risk of a potential geographically distributed coordinated cyberattack. B3. Which, if any, of these processes, procedures, or security controls could enhance the currently approved CIP Reliability Standards to better address the risk of a geographically distributed coordinated cyberattack? B4. What future changes to the bulk electric system design could affect the potential risks of geographically distributed coordinated cyberattacks? B5. Are current regional drill exercises and operator training effective in preparing to mitigate and recover from a geographically distributed coordinated cyberattack? • Does current initial system operator training, or refresher training, either in class or in EMS simulation, include training to recognize and respond to a coordinated cyberattack, and should that training be required? • Do system operators and their leadership participate, and if so, how often, in regional PO 00000 Frm 00118 Fmt 4703 Sfmt 4703 37937 drills and training exercises that simulate coordinated cyberattacks on the Bulk Electric System, and should participation in such exercises be required? • Do system operators and their leadership participate, and if so, how often, in regional drills and training exercises that simulate coordinated cyberattacks on other critical infrastructure in addition to the bulk electric system (i.e., communication systems, pipelines, water systems, etc.), and should participation in such exercises be mandatory? • Discuss whether any aspects of drill exercises or operating training pertaining to mitigation and recover from a geographically distributed coordinated cyberattack should be incorporated into the Reliability Standards. In particular, while some entities may voluntarily engage in drill exercises or training, should this be required of all entities, or specific functional categories? Should participation of specific personnel categories or leadership be required? B6. Describe the effectiveness of industry information sharing at mitigating potential geographically distributed coordinated cyberattacks? B7. Discuss whether the thresholds established in Reliability Standard CIP–002– 5.1a, Attachment 1, Section 2 are appropriate to address the risk of a geographically distributed coordinated cyberattack. • If not, what would be appropriate method or approach to identify thresholds to address the risk. • Alternatively, what additional security controls, if implemented, would be appropriate to address the risk? III. Comment Procedures 31. The Commission invites interested persons to submit comments on the matters and issues proposed in this notice, including any related matters or alternative proposals that commenters may wish to discuss. Comments are due August 24, 2020, and Reply Comments are due September 22, 2020. Comments must refer to Docket No. RM20–12–000, and must include the commenter’s name, the organization they represent, if applicable, and their address. 32. The Commission encourages comments to be filed electronically via the eFiling link on the Commission’s website at https://www.ferc.gov. The Commission accepts most standard word-processing formats. Documents created electronically using wordprocessing software should be filed in native applications or print-to-PDF format and not in a scanned format. Commenters filing electronically do not need to make a paper filing. 33. Commenters that are not able to file comments electronically must send an original of their comments to: Federal Energy Regulatory Commission, Secretary of the Commission, 888 First Street NE, Washington, DC 20426. 34. All comments will be placed in the Commission’s public files and may E:\FR\FM\24JNN1.SGM 24JNN1 37938 Federal Register / Vol. 85, No. 122 / Wednesday, June 24, 2020 / Notices be viewed, printed, or downloaded remotely as described in the Document Availability section below. Commenters on this proposal are not required to serve copies of their comments on other commenters. IV. Document Availability 35. In addition to publishing the full text of this document in the Federal Register, the Commission provides all interested persons an opportunity to view and/or print the contents of this document via the internet through the Commission’s Home Page (https:// www.ferc.gov) and in the Commission’s Public Reference Room during normal business hours (8:30 a.m. to 5:00 p.m. eastern time) at 888 First Street NE, Room 2A, Washington, DC 20426. 36. From the Commission’s Home Page on the internet, this information is available on eLibrary. The full text of this document is available on eLibrary in PDF and Microsoft Word format for viewing, printing, and/or downloading. To access this document in eLibrary, type the docket number excluding the last three digits of this document in the docket number field. 37. User assistance is available for eLibrary and the Commission’s website during normal business hours from the Commission’s Online Support at (202) 502–6652 (toll free at 1–866–208–3676) or email at ferconlinesupport@ferc.gov, or the Public Reference Room at (202) 502–8371, TTY (202) 502–8659. Email the Public Reference Room at public.referenceroom@ferc.gov. By direction of the Commission. Issued: June 18, 2020. Nathaniel J. Davis, Sr., Deputy Secretary. [FR Doc. 2020–13618 Filed 6–23–20; 8:45 am] BILLING CODE 6717–01–P DEPARTMENT OF ENERGY Federal Energy Regulatory Commission jbell on DSKJLSW7X2PROD with NOTICES Combined Notice of Filings Take notice that the Commission has received the following Natural Gas Pipeline Rate and Refund Report filings: Docket Number: PR20–65–000. Applicants: American Midstream (SIGCO Intrastate), LLC. Description: Tariff filing per 284.123(e)+(g)/: American Midstream (SIGCO Intrastate), LLC Cancellation of SOC to be effective 6/17/2020. Filed Date: 6/17/2020. Accession Number: 202006175090. Comments Due: 5 p.m. ET 7/8/2020. VerDate Sep<11>2014 18:20 Jun 23, 2020 Jkt 250001 284.123(g) Protests Due: 5 p.m. ET 8/ 17/2020. Docket Number: PR20–66–000. Applicants: Pacific Gas and Electric Company. Description: Tariff filing per 284.123(b),(e)+(g): Revisions to Appendix A of Statement of Operating Conditions 2020 to be effective 10/1/ 2019. Filed Date: 6/17/2020. Accession Number: 202006175123. Comments Due: 5 p.m. ET 7/8/2020. 284.123(g) Protests Due: 5 p.m. ET 8/ 17/2020. Docket Number: PR20–58–001. Applicants: Black Hills/Kansas Gas Utility Company, LLC. Description: Tariff filing per 284.123(b), (e)/: Substitute Statement of Operating Conditions to be effective 4/ 16/2020. Filed Date: 6/17/2020. Accession Number: 202006175034. Comments/Protests Due: 5 p.m. ET 7/ 1/2020. Docket Number: PR20–32–000. Applicants: Columbia Gas of Ohio, Inc. Description: Pre-Arranged/Pre-Agreed (Stipulation and Agreement) Filing of Columbia Gas of Ohio, Inc. under PR20– 32. Filed Date: 6/12/2020. Accession Number: 202006125260. Comments/Protests Due: 5 p.m. ET 6/ 26/2020. Docket Numbers: RP20–957–000. Applicants: Golden Pass LNG Terminal LLC. Description: Petition for Limited Waiver of Golden Pass LNG Terminal LLC under RP20–957. Filed Date: 6/17/20. Accession Number: 20200617–5060. Comments Due: 5 p.m. ET 6/29/20. The filings are accessible in the Commission’s eLibrary system by clicking on the links or querying the docket number. Any person desiring to intervene or protest in any of the above proceedings must file in accordance with Rules 211 and 214 of the Commission’s Regulations (18 CFR 385.211 and 385.214) on or before 5:00 p.m. Eastern time on the specified date(s). Protests may be considered, but intervention is necessary to become a party to the proceeding. eFiling is encouraged. More detailed information relating to filing requirements, interventions, protests, service, and qualifying facilities filings can be found at: https://www.ferc.gov/ docs-filing/efiling/filing-req.pdf. For other information, call (866) 208–3676 (toll free). For TTY, call (202) 502–8659. PO 00000 Frm 00119 Fmt 4703 Sfmt 4703 Dated: June 18, 2020. Nathaniel J. Davis, Sr., Deputy Secretary. [FR Doc. 2020–13629 Filed 6–23–20; 8:45 am] BILLING CODE 6717–01–P DEPARTMENT OF ENERGY Federal Energy Regulatory Commission [Docket No. CP20–480–000] Dominion Energy Transmission, Inc.; Notice of Request Under Blanket Authorization Take notice that on June 12, 2020, Dominion Energy Transmission, Inc. (DETI), 120 Tredgar Street, Richmond, Virginia 23219, filed a prior notice application pursuant to sections 157.205, 157.208(c), and 157.210 of the Federal Energy Regulatory Commission’s (Commission) regulations under the Natural Gas Act (NGA), and DETI’s blanket certificate issued in Docket No. CP82–537–000. DETI proposes to provide an additional 10,000 dekatherms per day of firm transportation capacity on its system from primary receipt at the Leidy Interconnection located in Clinton County, Pennsylvania to primary delivery at the interconnection with Iroquois Gas Transmission System, LP at Canajoharie in Montgomery, New York. DETI states that lowering the ambient temperatures during winter months utilized in its hydraulic flow model will enable DETI to offer additional available capacity utilizing existing horsepower at four existing compressor stations, all as more fully set forth in the application, which is open to the public for inspection. The filing may also be viewed on the web at https:// www.ferc.gov using the eLibrary link. Enter the docket number excluding the last three digits in the docket number field to access the document. For assistance, contact FERC at FERCOnlineSupport@ferc.gov or call toll-free, (866) 208–3676 or TTY, (202) 502–8659. Any questions regarding this application should be directed to Matthew R. Bley, Director, Gas Transmission Certificates, Dominion Energy Services, Inc, 707 East Main Street—20th Floor, Richmond, Virginia 23219, or phone (866) 319–3382, or by email Matthew.R.Bley@ DominionEnergy.com. Any person or the Commission’s staff may, within 60 days after issuance of the instant notice by the Commission, file pursuant to Rule 214 of the Commission’s Procedural Rules (18 CFR E:\FR\FM\24JNN1.SGM 24JNN1

Agencies

[Federal Register Volume 85, Number 122 (Wednesday, June 24, 2020)]
[Notices]
[Pages 37932-37938]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2020-13618]


-----------------------------------------------------------------------

DEPARTMENT OF ENERGY

Federal Energy Regulatory Commission

[Docket No. RM20-12-000]


Potential Enhancements to the Critical Infrastructure Protection 
Reliability Standards

AGENCY: Federal Energy Regulatory Commission, DOE.

ACTION: Notice of Inquiry.

-----------------------------------------------------------------------

SUMMARY: The Federal Energy Regulatory Commission (Commission)

[[Page 37933]]

seeks comment on certain potential enhancements to the currently-
effective Critical Infrastructure Protection (CIP) Reliability 
Standards. In particular, the Commission seeks comment on whether the 
CIP Reliability Standards adequately address the following topics: (i) 
Cybersecurity risks pertaining to data security, (ii) detection of 
anomalies and events, and (iii) mitigation of cybersecurity events. In 
addition, the Commission seeks comment on the potential risk of a 
coordinated cyberattack on geographically distributed targets and 
whether Commission action including potential modifications to the CIP 
Reliability Standards would be appropriate to address such risk.

DATES: Initial Comments are due August 24, 2020, and Reply Comments are 
due September 22, 2020.

ADDRESSES: Comments, identified by docket number, may be filed in the 
following ways:
     Electronic Filing through https://www.ferc.gov. Documents 
created electronically using word processing software should be filed 
in native applications or print-to-PDF format and not in a scanned 
format.
     Mail/Hand Delivery: Those unable to file electronically 
may mail or hand-deliver comments to: Federal Energy Regulatory 
Commission, Secretary of the Commission, 888 First Street NE, 
Washington, DC 20426.
     Instructions: For detailed instructions on submitting 
comments, see the Comment Procedures Section of this document.

FOR FURTHER INFORMATION CONTACT: 
    Vincent Le (Technical Information), Office of Electric Reliability, 
Federal Energy Regulatory Commission, 888 First Street NE, Washington, 
DC 20426, (202) 502-6204, [email protected].
    Kevin Ryan (Legal Information), Office of the General Counsel, 
Federal Energy Regulatory Commission, 888 First Street NE, Washington, 
DC 20426, (202) 502-6840, [email protected].

SUPPLEMENTARY INFORMATION: 
    1. In this Notice of Inquiry (NOI), the Commission seeks comment on 
whether the currently-effective Critical Infrastructure Protection 
(CIP) Reliability Standards adequately address the following topics: 
(i) Cybersecurity risks pertaining to data security, (ii) detection of 
anomalies and events, and (iii) mitigation of cybersecurity events. In 
addition, the Commission seeks comment on the potential risk of a 
coordinated cyberattack on geographically distributed targets and 
whether Commission action, including potential modifications to the CIP 
Reliability Standards, would be appropriate to address such risk.
    2. The Commission-approved CIP Reliability Standards are intended 
to provide a risk-based, defense in depth (i.e., multiple, redundant 
``defensive'' measures) approach to cybersecurity of the bulk electric 
system. Since the approval of the first mandatory CIP Reliability 
Standards in 2008, these standards have been modified on multiple 
occasions to address emerging issues and to improve the cybersecurity 
posture of the bulk electric system.\1\ Yet, new cyber threats continue 
to evolve, and the Reliability Standards should keep pace to maintain a 
robust, defense in depth approach to electric grid cybersecurity.
---------------------------------------------------------------------------

    \1\ See, e.g., Version 5 Critical Infrastructure Protection 
Reliability Standards, Order No. 791, 78 FR 72,755 (Dec. 3, 2013), 
145 FERC ] 61,160 (2013), order on clarification and reh'g, Order 
No. 791-A, 146 FERC ] 61,188 (2014); Revised Critical Infrastructure 
Protection Reliability Standards, Order No. 822, 154 FERC ] 61,037, 
reh'g denied, Order No. 822-A, 156 FERC ] 61,052 (2016); Revised 
Critical Infrastructure Protection Reliability Standard CIP-003-7--
Cyber Security--Security Management Controls, Order No. 843, 163 
FERC ] 61,032 (2018).
---------------------------------------------------------------------------

    3. With this in mind, Commission staff undertook a review of the 
National Institute of Standards and Technology (NIST) Cyber Security 
Framework (NIST Framework), which sets forth a comprehensive, 
repeatable structure to guide cybersecurity activities and to consider 
cybersecurity risks as part of an organization's risk management 
processes of its critical infrastructure.\2\ Commission staff compared 
the content of the NIST Framework with the substance of the CIP 
Reliability Standards, and identified certain topics addressed in the 
NIST Framework that may not be adequately addressed in the CIP 
Reliability Standards. Commission staff further analyzed whether the 
identified topics are within the scope of the CIP Reliability 
Standards.\3\ Commission staff then studied whether the potential 
``gaps'' that are within the scope of the CIP Reliability Standards 
presented a significant risk to bulk electric system reliability. Based 
on this analysis, Commission staff identified the three NIST Framework 
categories that are the subject of this NOI: (i) Cybersecurity risks 
pertaining to data security, (ii) detection of anomalies and events, 
and (iii) mitigation of cybersecurity events.
---------------------------------------------------------------------------

    \2\ NIST, Framework for Improving Critical Infrastructure 
Cybersecurity Version 1.1, Executive Summary at v, https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf.
    \3\ The NIST Framework provisions that pertain to business 
organization activity were not considered appropriate to address in 
the CIP Reliability Standards. For example, the NIST Framework 
provisions that pertain to the Governance Category (ID.GV) were not 
considered appropriate to be addressed in the CIP Reliability 
Standards since they address the policies, procedures, and processes 
to manage and monitor the organization's regulatory, legal, risk, 
environmental, and operational requirements that inform the 
management of cybersecurity risk.
---------------------------------------------------------------------------

    4. In addition, the Commission seeks comment on the risk of a 
coordinated cyberattack on the bulk electric system and potential 
Commission action to address such risk. In general, bulk electric 
system planning is based on the ability to withstand a system's single 
largest contingency, known as an N-1 event. The Commission has 
questioned whether greater defense in depth is warranted to better 
protect the bulk electric system from a coordinated attack on multiple 
BES Cyber Assets.\4\ The risk of such a coordinated attack may be 
exacerbated by the recent shift from larger, centralized generation 
resources to smaller, more geographically distributed generation 
resources. The Commission seeks comment on the need to address the risk 
of a coordinated cyberattack on the bulk electric system, as well as 
potential approaches to address the matter, such as voluntary or 
mandatory participation in grid exercises, other types of training to 
prepare for a coordinated attack, and modifications to the current 
applicability thresholds in Reliability Standard CIP-002-5.1a that 
would subject additional facilities to the CIP controls that apply to 
medium and/or high impact BES Cyber Assets.\5\
---------------------------------------------------------------------------

    \4\ Mandatory Reliability Standards for Critical Infrastructure 
Protection, Order No. 706, 122 FERC ] 61,040, at P 256, order on 
reh'g, Order No. 706-A, 123 FERC ] 61,174 (2008), order on 
clarification, Order No, 706-B, 126 FERC ] 61,229, order on 
clarification, Order No. 706-C, 127 FERC ] 61,273 (2009). NERC 
defines BES Cyber Asset as a ``Cyber Asset that if rendered 
unavailable, degraded, or misused would, within 15 minutes of its 
required operation, misoperation, or non[hyphen]operation, adversely 
impact one or more Facilities, systems, or equipment, which, if 
destroyed, degraded, or otherwise rendered unavailable when needed, 
would affect the reliable operation of the Bulk Electric System.'' 
Glossary of Terms Used in NERC Reliability Standards, https://www.nerc.com/files/glossary_of_terms.pdf.
    \5\ Reliability Standard CIP-002-5.1a (Bulk Electric System 
Cyber System Categorization) requires a registered entity to 
categorize its cyber systems in terms of low, medium, and high 
impact to the grid. These impact ratings determine which 
requirements in NERC Reliability Standards CIP-004 though CIP-013 
apply to BES Cyber Systems. Attachment 1 of the Reliability 
Standards, ``Impact Rating Criteria,'' identifies the criteria for 
identifying cyber systems as low, medium or high impact. For 
example, a control center used to perform the functions of a 
balancing authority for generation equal to or greater than an 
aggregate of 3,000 megawatts (MW) in a single interconnection is 
designated a high impact asset. A control center that performs the 
operations of a generator operator for an aggregate highest rated 
net real power equal to or exceeding 1,500 MW in a single 
interconnection is designated as a medium impact asset.

---------------------------------------------------------------------------

[[Page 37934]]

I. Background

A. CIP Reliability Standards

    5. In January 2008, the Commission issued Order No. 706, which 
approved the first set of mandatory CIP Reliability Standards 
addressing cybersecurity. In Order No. 706, the Commission stated inter 
alia that NERC should look to NIST as a source for improving the CIP 
Reliability Standards. The Commission also indicated that it may 
address the appropriateness of adopting NIST cybersecurity standards in 
the CIP Reliability Standards in a future proceeding:

    The Commission continues to believe--and is further persuaded by 
the comments--that NERC should monitor the development and 
implementation of the NIST standards to determine if they contain 
provisions that will protect the Bulk-Power System better than the 
CIP Reliability Standards. . . . Consistent with the CIP NOPR, any 
provisions that will better protect the Bulk-Power System should be 
addressed in NERC's Reliability Standards development process. The 
Commission may revisit this issue in future proceedings as part of 
an evaluation of existing Reliability Standards or the need for new 
CIP Reliability Standards, . . . .\6\
---------------------------------------------------------------------------

    \6\ Order No. 706, 122 FERC ] 61,040 at P 233.

    Moreover, although Order No. 706 did not directly address the issue 
of a potential coordinated attack on cyber assets, the Commission did 
express concern that focus on the N-1 planning principle may not be 
appropriate in the context of a cybersecurity because an attacker may 
simultaneously attack multiple assets. In particular, the Commission 
---------------------------------------------------------------------------
observed:

    While the N minus 1 criterion may be appropriate in transmission 
planning, use of an N minus 1 criterion for the risk-based 
assessment in CIP-002-1 would result in the nonsensical result that 
no substations or generating plants need to be protected from cyber 
events. A cyber attack can strike multiple assets simultaneously, 
and a cyber attack can cause damage to an asset for such a time 
period that other asset outages may occur before the damaged asset 
can be returned to service. Thus, the fact that the system was 
developed to withstand the loss of any single asset should not be 
the basis for not protecting that asset.\7\
---------------------------------------------------------------------------

    \7\ Id. P 256.

    6. NIST has continued to serve as an important source for the 
improvement of the CIP Reliability Standards. For example, in 2013, the 
Commission issued Order No. 791, which approved the CIP Version 5 
Standards.\8\ The CIP Version 5 Standards adapted a new approach to 
identifying BES Cyber Assets subject to the CIP Standards, categorizing 
such assets as of low, medium and high impact. NERC explained that it 
developed this tiered approach based on a review of NIST cyber security 
standards.\9\
---------------------------------------------------------------------------

    \8\ Version 5 Critical Infrastructure Protection Reliability 
Standards, Order No. 791, 145 FERC ] 61,160 (2013), order on 
clarification and reh'g, Order No. 791-A, 146 FERC ] 61,188 (2014).
    \9\ See Order No. 791, 145 FERC ] 61,160 at P 14. On August 26, 
2019, the U.S. Government Accountability Office (GAO) submitted a 
report to Congress that addressed the completeness of the CIP 
Reliability Standards in comparison to the subject matter addressed 
in the NIST Framework as well as the risks to the electric grid from 
a coordinated cyberattack. GAO, Critical Infrastructure Protection: 
Actions Needed to Address Significant Cybersecurity Risks Facing the 
Electric Grid (Aug. 2019), https://www.gao.gov/assets/710/701079.pdf.
---------------------------------------------------------------------------

B. The NIST Framework

    7. The NIST Framework was developed in response to Executive Order 
13,636 ``Improving Critical Infrastructure Cybersecurity,'' issued on 
February 12, 2013.\10\ The NIST Framework version 1.0 was released in 
February 2014 and revised version 1.1 was released in April 2018. 
Executive Order 13,636 stated that the NIST Framework was designed to 
``reduce cyber risks to critical infrastructure[,] . . . [and] shall 
include a set of standards, methodologies, procedures, and processes 
that align policy, business, and technological approaches to address 
cyber risks[,] . . . [and] incorporate voluntary consensus standards 
and industry best practices to the fullest extent possible.'' \11\
---------------------------------------------------------------------------

    \10\ Exec. Order No. 13,636, 78 FR 11737 (Feb. 19, 2013).
    \11\ Id. at 11741.
---------------------------------------------------------------------------

    8. The NIST Framework consists of five Functions that each provide 
a high-level, strategic view of one part of an organization's 
cybersecurity risk management. The five Functions are:
     Identify--Develop the organizational understanding to 
manage cybersecurity risk to systems, assets, data, and capabilities;
     Protect--Develop and implement appropriate safeguards to 
ensure delivery of critical services;
     Detect--Develop and implement appropriate activities to 
identify the occurrence of a cybersecurity event;
     Respond--Develop and implement the appropriate activities 
to take action regarding a detected cybersecurity event; and
     Recover--Develop and implement appropriate activities to 
maintain plans for resilience and to restore any capabilities or 
services that were impaired due to a cybersecurity event.
    9. Each of the five Functions is composed of Categories and 
Subcategories, with the five Functions having a total of 23 Categories 
and 108 Subcategories. Categories are defined as cybersecurity outcomes 
closely tied to programmatic needs and activities. The 23 Categories 
that are organized within the five Functions, are as follows: (1) 
Identify Function (Asset Management, Business Environment, Governance, 
Risk Assessment, Risk Management Strategy, and Supply Chain Risk 
Management); (2) Protect Function (Identity Management and Access 
Control, Awareness and Training, Data Security, Information Protection 
Process and Procedures, Maintenance, and Protective Technology); (3) 
Detect Function (Anomalies and Events, Security Continuous Monitoring, 
and Detection Process); (4) Respond Function (Response Planning, 
Communications, Analysis, Mitigation, and Improvements); and (5) 
Recover Function (Recovery Planning, Improvements, and Communications).

II. Discussion

A. The NIST Framework

1. Analysis
    10. Based on a comparison of the NIST Framework and CIP Reliability 
Standards, Commission staff identified three NIST Framework Categories 
that may not be adequately addressed in the CIP Reliability Standards, 
and thus could reflect potential reliability gaps: (i) Cybersecurity 
risks pertaining to data security, (ii) detection of anomalies and 
events, and (iii) mitigation of cybersecurity events.
a. Data Security Category
    11. The NIST Framework Data Security Category (PR.DS) specifies 
activities to manage information and records (i.e., data) consistent 
with an organization's risk strategy to protect the confidentiality, 
integrity, and availability of information and data. The Data Security 
Category identifies internal controls in eight Subcategories to require 
that: (1) Data at rest is protected (PR.DS-1); (2) data in transit is 
protected (PR.DS-2); (3) assets are formally managed throughout 
removal, transfer, and disposition (PR.DS-3); (4) adequate capacity to 
ensure availability is maintained (PR.DS-4); (5) protections against 
data leaks are implemented (PR.DS-5); (6) integrity checking mechanisms 
are used to verify software, firmware, and information integrity 
(PR.DS-6); (7) the development and testing environment(s) are separate 
from the production environment (PR.DS-7); and (8) integrity checking 
mechanisms

[[Page 37935]]

are used to verify hardware integrity (PR.DS-8).\12\
---------------------------------------------------------------------------

    \12\ See NIST Cybersecurity Framework at 32-33.
---------------------------------------------------------------------------

    12. Commission staff analysis indicates that two NIST Data Security 
Subcategories may not be adequately addressed in the CIP Reliability 
Standards. First, the Subcategory requiring adequate capacity to ensure 
availability is maintained (PR.DS-4) does not appear to be addressed in 
Reliability Standard CIP-011-2 (Information Protection) or Reliability 
Standard CIP-012-1 (Communications between Control Centers), which 
addresses real-time assessment and real-time monitoring data while 
being transmitted between any applicable control center. Reliability 
Standard CIP-011-2 addresses the confidentiality and integrity of 
medium and high impact BES Cyber System information, but it does not 
address availability of information and does not apply to low impact 
BES Cyber Systems. Reliability Standard CIP-012-1, which has not yet 
gone into effect, augments the data protection controls in the CIP 
Reliability Standard, but it is limited to real-time assessment and 
monitoring data transmitted between control centers.\13\ The loss of 
BES Cyber System information availability could result in a loss of the 
ability to accurately maintain or restore the bulk electric system, 
which could affect reliability.
---------------------------------------------------------------------------

    \13\ In Order No. 866, the Commission approved Reliability 
Standard CIP-012-1 and also directed NERC to modify the Reliability 
Standard to require protections regarding the availability of links 
and data communicated between control centers. Critical 
Infrastructure Protection Reliability Standard CIP-012-1--Cyber 
Security--Communications Between Control Centers, Order No. 866, 170 
FERC ] 61,031 (2020).
---------------------------------------------------------------------------

    13. In addition, while integrity checking mechanisms to verify 
software, firmware, and information integrity (PR.DS-6) are partially 
addressed by Reliability Standard CIP-013-1 (Supply Chain Risk 
Management), the requirements do not apply to low impact BES Cyber 
Systems, nor do they apply to information, such as a digital manual 
provided with a software tool, for low, medium, or high impact BES 
Cyber Systems. Not verifying software, firmware, and information 
integrity may allow a malicious actor to bypass existing security 
controls without detection.
    14. In sum, the absence of CIP Reliability Standard requirements 
corresponding to Subcategories PR.DS-4 and PR-DS-6 in the NIST 
Framework could represent a potential gap in the CIP Reliability 
Standards.
b. Anomalies and Events Category
    15. The NIST Framework Anomalies and Events Category (DE.AE) 
identifies security controls to detect anomalous activity and 
understand the potential impact of events. Specifically, the Anomalies 
and Events Category identifies internal controls in five Subcategories 
to require that: (1) A baseline of network operations and expected data 
flows for users and systems is established and managed (DE.AE-1); (2) 
detected events are analyzed to understand attack targets and methods 
(DE.AE-2); (3) event data are aggregated and correlated from multiple 
sources and sensors (DE.AE-3); (4) the impact of events is determined 
(DE.AE-4); and (5) incident alert thresholds are established (DE.AE-
5).\14\
---------------------------------------------------------------------------

    \14\ See NIST Cybersecurity Framework at 37-38.
---------------------------------------------------------------------------

    16. Reliability Standard CIP-008-5 (Incident Reporting and Response 
Planning) specifies incident response requirements to mitigate the risk 
to the reliable operation of the bulk electric system resulting from a 
cyber security incident.\15\ This includes a requirement that 
applicable entities have a process to ``identify, classify, and respond 
to Cyber Security Incidents,'' which corresponds to Subcategories 
DE.AE-2 and DE.AE-4.\16\ However, Reliability Standard CIP-008-5 is 
only applicable to medium and high impact BES Cyber Systems. 
Accordingly, there is no requirement, similar to Subcategories DE.AE-2 
and DE.AE-4, for low impact BES Cyber Systems. If a low impact BES 
Cyber System is compromised and an analysis is not performed, the 
compromised low impact BES Cyber System can potentially be used to gain 
access to other BES Cyber Systems, including medium and high impact BES 
Cyber Systems.
---------------------------------------------------------------------------

    \15\ Reliability Standard CIP-008-6, which becomes effective on 
January 1, 2021, expands the current version's scope to include 
Electronic Access Control or Monitoring Systems and suspicious 
activity, but it does not include low impact BES Cyber Systems.
    \16\ Reliability Standard CIP-008-5, Requirement R1.1.
---------------------------------------------------------------------------

c. Mitigation Category
    17. The NIST Framework Mitigation Category (RS.MI) specifies 
activities to prevent the expansion of a cybersecurity event, mitigate 
any effects and resolve the incident. The Mitigation Category 
identifies internal controls in three Subcategories to require that: 
(1) Incidents are contained (RS.MI-1); (2) incidents are mitigated 
(RS.MI-2); and (3) newly identified vulnerabilities are mitigated or 
documented as accepted risks (RS.MI-3).\17\
---------------------------------------------------------------------------

    \17\ See NIST Cybersecurity Framework at 42-43.
---------------------------------------------------------------------------

    18. Reliability Standard CIP-008-5 requires responsible entities to 
document their cybersecurity incident response plans and provide 
evidence of incident response processes or procedures that address 
incident handling. However, Reliability Standard CIP-008-5 does not 
specifically require incident containment or mitigation as discussed in 
Subcategories RS.MI-1 and RS.MI-2.\18\ In addition, Reliability 
Standard CIP-008-5 does not apply to low impact BES Cyber Systems. 
Similarly, while Reliability Standard CIP-010-2 (Configuration 
Management and Vulnerability Assessments) addresses the need to 
mitigate newly identified vulnerabilities for medium and high impact 
BES Cyber Systems consistent with Subcategory RS.MI-3, it does not 
apply to low impact BES Cyber Systems. As noted above, without proper 
containment and mitigation, the compromise of a low impact BES Cyber 
System can potentially be used as a launching point to gain access to 
other BES Cyber Systems, including medium and high impact BES Cyber 
Systems.
---------------------------------------------------------------------------

    \18\ Reliability Standard CIP-008-6 also does not specifically 
address incident containment or mitigation.
---------------------------------------------------------------------------

2. Request for Comments
    19. The Commission seeks comment on whether the currently effective 
CIP Reliability Standards adequately address aspects of the NIST 
Framework that support bulk electric system reliability and associated 
operational technology (i.e., industrial control systems), as well as 
current and projected cybersecurity risks. As discussed above, there 
may be subcategories in the NIST Framework that are not adequately 
addressed in the CIP Reliability Standards, or addressed only with 
regard to medium and high impact BES Cyber Assets but not low impact 
BES Cyber Assets. While differences between the CIP Reliability 
Standards and the NIST Framework are to be expected, the Commission 
seeks comment on whether the differences identified herein reflect 
potential reliability gaps in the CIP Reliability Standards that should 
be addressed.
    20. Below, we pose questions that commenters should address in 
their submissions. However, commenters need not address every topic or 
answer every question identified below.

    A1. The security controls in the Data Security Category require 
the management of information and records (i.e., data) consistent 
with an organization's risk strategy to protect the confidentiality, 
integrity, and availability of information and data. The Commission 
seeks comment on whether the CIP Reliability Standards adequately 
address

[[Page 37936]]

each data security subcategory as outlined in the NIST Framework 
and, if not, what are possible solutions, and in particular:
     Do the CIP Reliability Standards adequately address 
Data Security Subcategories PR.DS-4 and PR.DS-6 for medium and high 
impact BES Cyber Systems, and if so how?
     Do the CIP Reliability Standards adequately address the 
same Subcategories for low impact BES Cyber Systems, and if so how?
     If the CIP Reliability Standards do not adequately 
address these Subcategories, or any other Data Security 
Subcategories, for either low, medium or high impact BES Cyber 
Systems, explain whether this poses a risk to the reliable operation 
of the Bulk-Power System today and the Bulk-Power System of the near 
future.
    A2. The security controls in the Anomalies and Events Category 
require that anomalous activity is detected and the potential impact 
of events is understood. Furthermore, it requires that detected 
events are analyzed to understand attack targets and methods. The 
Commission seeks comment on whether the CIP Reliability Standards 
adequately address the detection and mitigation of anomalous 
activity as outlined in the NIST Framework and, if not, what are 
possible solutions, and in particular:
     Should low impact BES Cyber Systems be covered by 
Anomalies and Events Subcategories DE.AE-2 and DE.AE-4?
     Do the CIP Reliability Standards adequately address 
Anomalies and Events Subcategories DE.AE-2 and DE.AE-4 for low 
impact BES Cyber Systems, and if so how?
     If the CIP Reliability Standards do not adequately 
address these Subcategories for low impact BES Cyber Systems, 
explain whether this poses a risk to the reliable operation of the 
Bulk-Power System today and the Bulk-Power System of the near 
future.
     If the CIP Reliability Standards do not adequately 
address any other Anomalies and Events Subcategories, for either 
low, medium or high impact BES Cyber Systems, explain whether this 
poses a risk to the reliable operation of the Bulk-Power System 
today and the Bulk-Power System of the near future.
    A3. The security controls in the Mitigation Category require 
that newly identified vulnerabilities are mitigated or, 
alternatively, documented as accepted risks. Response activities are 
performed to prevent expansion of an event, mitigate its effects, 
and resolve the incident. The Commission seeks comment on whether 
the CIP Reliability Standards adequately address the mitigation of 
newly identified vulnerabilities as outlined in the NIST Framework 
and, if not, what are possible solutions, and in particular:
     Do the CIP Reliability Standards adequately address 
Mitigation Subcategories RS.MI-1 and RS.MI-2 for low, medium and 
high impact BES Cyber Systems, and if so how?
     Do the CIP Reliability Standards adequately address 
Mitigation Subcategory RS.MI-3 for low impact BES Cyber Systems, and 
if so how?
     If the CIP Reliability Standards do not adequately 
address these Subcategories for low, medium or high impact BES Cyber 
Systems, explain whether this poses a risk to the reliable operation 
of the Bulk-Power System today and the Bulk-Power System of the near 
future.

B. Coordinated Cyberattack Assessment

1. Analysis
    21. As discussed below, this NOI seeks comment on the risk of a 
coordinated cyberattack on the bulk electric system and the potential 
need for Commission action to address such risk.
    22. Since the Commission approved the first mandatory CIP 
Reliability Standards in 2008, the generation resource mix has shifted 
away from larger, centralized generation resources to the expanding 
integration of smaller, geographically distributed generation 
resources. Accordingly, an increasing number of generation resources 
are categorized as low impact BES Cyber Systems, because they do not 
meet the thresholds in Reliability Standard CIP-002-5.1a for medium or 
high impact BES Cyber Systems, and therefore are not required to comply 
with the full suite of CIP Reliability Standards.\19\
---------------------------------------------------------------------------

    \19\ Reliability Standard CIP-002-5.1a (Cyber Security--BES 
Cyber System Categorization), Attachment 1 (Impact Rating Criteria).
---------------------------------------------------------------------------

    23. In 2008, when the CIP Reliability Standards first became 
effective, it might have been more effective to focus cybersecurity 
protections on larger generation plants than smaller plants. However, 
given the shift to smaller generation resources, it is worth examining 
whether a sophisticated threat actor could initiate a coordinated 
cyberattack targeting geographically distributed generation resources, 
posing an unacceptable risk to bulk electric system reliability. Such a 
coordinated cyberattack would present itself as a ``common mode 
failure,'' which could be similar in risk to a wide-scale disruption to 
fuel supplies, such as an attack on a natural gas pipeline.
    24. Recent publicly available studies and reports have assessed the 
potential reliability impacts of a coordinated cyberattack on 
geographically distributed targets. These sources evaluated the impact 
to the power grid from simultaneous or near simultaneous loss of 
geographically distributed electrical facilities that could result in 
widespread loss of electrical services, including long-duration, large-
scale disturbances. The following three reports highlight the potential 
risks to Bulk-Power System reliability.
    25. First, the NERC's 2019 Supply Chain Risk Assessment, based on 
information obtained through a mandatory data request to industry, 
concludes that a coordinated cyberattack ``could greatly affect [bulk 
electric system] reliability beyond the local area.'' \20\ The Supply 
Chain Risk Assessment examined the nature and complexity of 
cybersecurity supply chain risks, including those associated with low 
impact assets, and it found that:
---------------------------------------------------------------------------

    \20\ See NERC, Supply Chain Risk Assessment: Analysis of Data 
Collected under the NERC Rules of Procedure Section 1600 Data 
Request, at vi (Dec. 9, 2019) https://www.nerc.com/pa/comp/SupplyChainRiskMitigationProgramDL/SupplyChainRiskAssesmentReport.pdf.

    While [low impact] locations represent a small percentage of all 
transmission stations and substation locations, the combined effect 
of a coordinated cyberattack on multiple locations could affect BES 
reliability beyond the local area. The analysis of third-party 
electronic access to generation resource locations is even more 
concerning. More than 50% of all low impact locations of generation 
resources allow third-party electronic access. As with transmission 
stations and substations, the combined effect of a coordinated 
cyberattack could greatly affect BES reliability beyond the local 
---------------------------------------------------------------------------
area.

    Based on this assessment, NERC staff recommended that the Supply 
Chain Reliability Standards should be modified to include low impact 
BES Cyber Systems with remote electronic access connectivity.\21\
---------------------------------------------------------------------------

    \21\ Id. The NERC Board of Trustees adopted an alternative 
proposal to initiate a project to modify Reliability Standard CIP-
003-8 to include policies for low impact BES Cyber Systems for 
malicious communications and vendor remote access, while continuing 
to evaluate the effectiveness and sufficiency of the supply chain 
risk management Reliability Standards. NERC, Resolution for Agenda 
Item 8.d: Supply Chain Recommendations (February 6, 2020), https://www.nerc.com/gov/bot/Agenda%20highlights%20and%20Mintues%202013/Approved_Resolution_%20Supply%20Chain%20Follow%20Up%20(2-6-
2020).pdf.
---------------------------------------------------------------------------

    26. Second, on September 4, 2019, NERC published a Lessons Learned 
document regarding a denial-of-service attack against multiple remote 
generation sites whose BES Cyber Systems are categorized as low impact. 
The document explained that a known vulnerability in the web interface 
of a vendor's firewall was exploited, allowing an unauthenticated 
attacker to cause unexpected reboots of the devices. The reboots 
resulted in a denial of service condition at a low impact control 
center and multiple remote low impact generation sites. This resulted 
in brief communications outages (i.e., less than five minutes) between 
field devices at the generation sites, as well as between the 
generation sites and the control center. Although the cyberattack did 
not cause a disturbance, it met the definition of a coordinated 
cyberattack,

[[Page 37937]]

and it is possible that this was the first coordinated cyberattack on 
the Bulk-Power System. The document recommended that ``[e]ven in cases 
involving low-Impact BES assets, an entity should strive for good cyber 
security policies and procedures'' by considering adopting security 
controls for low impact BES Cyber Assets above those required under the 
CIP Reliability Standards.\22\
---------------------------------------------------------------------------

    \22\ NERC, Lesson Learned Risks Posed by Firewall Firmware 
Vulnerabilities, at 2-3 (Sept. 4, 2019).
---------------------------------------------------------------------------

    27. Finally, on January 29, 2019, the United States Office of the 
Director of National Intelligence (ODNI) reported to the United States 
Senate Select Committee on Intelligence concerning potential nation 
state risks.\23\ Specifically, the ODNI reported that:
---------------------------------------------------------------------------

    \23\ ODNI, Worldwide Threat Assessment of the US Intelligence 
Community (Jan. 29, 2019), https://www.dni.gov/files/ODNI/documents/2019-ATA-SFR-SSCI.pdf.
---------------------------------------------------------------------------

    Russia has the ability to execute cyber attacks in the United 
States that generate localized, temporary disruptive effects on 
critical infrastructure--such as disrupting an electrical distribution 
network for at least a few hours--similar to those demonstrated in 
Ukraine in 2015 and 2016. Moscow is mapping our critical infrastructure 
with the long-term goal of being able to cause substantial damage.\24\
---------------------------------------------------------------------------

    \24\ Id. at 5.
---------------------------------------------------------------------------

    28. In addition, ODNI reported that, ``China has the ability to 
launch cyber attacks that cause localized, temporary disruptive effects 
on critical infrastructure--such as disruption of a natural gas 
pipeline for days to weeks--in the United States.'' \25\ ODNI concluded 
that our nation state adversaries and strategic competitors will 
increasingly use cyber capabilities to, among other things, disrupt 
critical infrastructure.
---------------------------------------------------------------------------

    \25\ Id. at 6.
---------------------------------------------------------------------------

    29. The loss of power supply to an Interconnection can and has 
caused instability, uncontrolled separation, and cascading failures. 
Unreliable operations can be caused by either near simultaneous or 
sequential loss of facilities, which cause thermal, voltage, and/or 
stability limits to be violated. Simultaneous or near simultaneous loss 
of multiple facilities under 1,500 MW can cause these effects, which 
has been demonstrated historically \26\ and through simulations.\27\ 
The loss of even a single facility can cause thermal overloads on 
parallel facilities. Combined or sequential losses can trigger safety 
systems such as underfrequency load shedding relays to operate across 
the Interconnection which, in turn, could lead to instability and 
cascading outages. Based on the review of publicly available 
information discussed above, it is possible that such incidents could 
be caused by a coordinated cyberattack on geographically distributed 
targets.
---------------------------------------------------------------------------

    \26\ See generally U.S.-Canada Power System Outage Task Force, 
Final Report on the August 14 Blackout in the United States and 
Canada: Causes and Recommendations (April 2004), https://www.ferc.gov/cust-protect/moi/blackout.asp.
    \27\ See, e.g., NERC, Frequency Response Initiative Report: The 
Reliability Impact of Frequency Response (October 30, 2012).
---------------------------------------------------------------------------

2. Request for Comments
    30. The Commission seeks comment on the potential risk of a 
coordinated cyberattack on geographically distributed targets and 
whether modifications to the CIP Reliability Standards, including 
potential modifications to the current MW thresholds, would be 
appropriate to address such risks. In particular, the Commission seeks 
comment regarding the procedures and security controls that are 
currently employed to protect against the potential risk of a 
geographically distributed coordinated cyberattack and whether 
modifications to the CIP Reliability Standards would be appropriate to 
address such risks.

    B1. Are there operating processes and procedures that can be 
used to evaluate, mitigate, protect against, and recover from 
potential geographically distributed coordinated cyberattacks? 
Describe generally the efficiency and effectiveness of these 
operating processes and procedures, including response to and 
recovery from a potential geographically distributed coordinated 
cyberattack.
    B2. Are there security controls that can be used to evaluate, 
mitigate, and protect against potential geographically distributed 
coordinated cyberattacks? Describe generally the efficiency and 
effectiveness of these security controls in mitigating the risk of a 
potential geographically distributed coordinated cyberattack.
    B3. Which, if any, of these processes, procedures, or security 
controls could enhance the currently approved CIP Reliability 
Standards to better address the risk of a geographically distributed 
coordinated cyberattack?
    B4. What future changes to the bulk electric system design could 
affect the potential risks of geographically distributed coordinated 
cyberattacks?
    B5. Are current regional drill exercises and operator training 
effective in preparing to mitigate and recover from a geographically 
distributed coordinated cyberattack?
     Does current initial system operator training, or 
refresher training, either in class or in EMS simulation, include 
training to recognize and respond to a coordinated cyberattack, and 
should that training be required?
     Do system operators and their leadership participate, 
and if so, how often, in regional drills and training exercises that 
simulate coordinated cyberattacks on the Bulk Electric System, and 
should participation in such exercises be required?
     Do system operators and their leadership participate, 
and if so, how often, in regional drills and training exercises that 
simulate coordinated cyberattacks on other critical infrastructure 
in addition to the bulk electric system (i.e., communication 
systems, pipelines, water systems, etc.), and should participation 
in such exercises be mandatory?
     Discuss whether any aspects of drill exercises or 
operating training pertaining to mitigation and recover from a 
geographically distributed coordinated cyberattack should be 
incorporated into the Reliability Standards. In particular, while 
some entities may voluntarily engage in drill exercises or training, 
should this be required of all entities, or specific functional 
categories? Should participation of specific personnel categories or 
leadership be required?
    B6. Describe the effectiveness of industry information sharing 
at mitigating potential geographically distributed coordinated 
cyberattacks?
    B7. Discuss whether the thresholds established in Reliability 
Standard CIP-002-5.1a, Attachment 1, Section 2 are appropriate to 
address the risk of a geographically distributed coordinated 
cyberattack.
     If not, what would be appropriate method or approach to 
identify thresholds to address the risk.
     Alternatively, what additional security controls, if 
implemented, would be appropriate to address the risk?

III. Comment Procedures

    31. The Commission invites interested persons to submit comments on 
the matters and issues proposed in this notice, including any related 
matters or alternative proposals that commenters may wish to discuss. 
Comments are due August 24, 2020, and Reply Comments are due September 
22, 2020. Comments must refer to Docket No. RM20-12-000, and must 
include the commenter's name, the organization they represent, if 
applicable, and their address.
    32. The Commission encourages comments to be filed electronically 
via the eFiling link on the Commission's website at https://www.ferc.gov. The Commission accepts most standard word-processing 
formats. Documents created electronically using word-processing 
software should be filed in native applications or print-to-PDF format 
and not in a scanned format. Commenters filing electronically do not 
need to make a paper filing.
    33. Commenters that are not able to file comments electronically 
must send an original of their comments to: Federal Energy Regulatory 
Commission, Secretary of the Commission, 888 First Street NE, 
Washington, DC 20426.
    34. All comments will be placed in the Commission's public files 
and may

[[Page 37938]]

be viewed, printed, or downloaded remotely as described in the Document 
Availability section below. Commenters on this proposal are not 
required to serve copies of their comments on other commenters.

IV. Document Availability

    35. In addition to publishing the full text of this document in the 
Federal Register, the Commission provides all interested persons an 
opportunity to view and/or print the contents of this document via the 
internet through the Commission's Home Page (https://www.ferc.gov) and 
in the Commission's Public Reference Room during normal business hours 
(8:30 a.m. to 5:00 p.m. eastern time) at 888 First Street NE, Room 2A, 
Washington, DC 20426.
    36. From the Commission's Home Page on the internet, this 
information is available on eLibrary. The full text of this document is 
available on eLibrary in PDF and Microsoft Word format for viewing, 
printing, and/or downloading. To access this document in eLibrary, type 
the docket number excluding the last three digits of this document in 
the docket number field.
    37. User assistance is available for eLibrary and the Commission's 
website during normal business hours from the Commission's Online 
Support at (202) 502-6652 (toll free at 1-866-208-3676) or email at 
[email protected], or the Public Reference Room at (202) 502-
8371, TTY (202) 502-8659. Email the Public Reference Room at 
[email protected].

    By direction of the Commission.

    Issued: June 18, 2020.
Nathaniel J. Davis, Sr.,
Deputy Secretary.
[FR Doc. 2020-13618 Filed 6-23-20; 8:45 am]
BILLING CODE 6717-01-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.