Cybersecurity Incentives, 8309-8325 [2021-01986]

Download as PDF 8309 Proposed Rules Federal Register Vol. 86, No. 23 Friday, February 5, 2021 This section of the FEDERAL REGISTER contains notices to the public of the proposed issuance of rules and regulations. The purpose of these notices is to give interested persons an opportunity to participate in the rule making prior to the adoption of the final rules. Commission, and rates or practices affecting or pertaining to such rates for the purpose of ensuring the reliability of the Bulk-Power System. DATES: Comments are due April 6, 2021. Also, reply comments are due May 6, 2021. Comments, identified by docket number, may be filed electronically at https://www.ferc.gov in acceptable native applications and print-to-PDF, but not in scanned or picture format. For those unable to file electronically, comments may be filed by mail or may be hand-delivered. Mailed comments should be addressed to: Federal Energy Regulatory Commission, Secretary of the Commission, 888 First Street NE, Washington, DC 20426. Hand-delivered comments should be delivered to: Federal Energy Regulatory Commission, 12225 Wilkins Avenue, Rockville, Maryland 20852. The Comment Procedures Section of this document contains more detailed filing procedures. Jessica L. Cockrell (Technical Information), Office of Energy Policy and Innovation, Federal Energy Regulatory Commission, 888 First Street NE, Washington, DC 20426, (202) 502–8190, jessica.cockrell@ ferc.gov Craig W. Barrett (Technical Information), Office of Energy Infrastructure Security, Federal Energy Regulatory Commission, 888 First Street NE, Washington, DC 20426, (202) 502–8830, craig.barrett@ ferc.gov Andre´s Lo´pez Esquerra (Technical Information), Office of Electric Reliability, Federal Energy Regulatory Commission, 888 First Street NE, Washington, DC 20426, (202) 502– 6128, andres.lopez@ferc.gov Adam Batenhorst (Legal Information), Office of the General Counsel, Federal Energy Regulatory Commission, 888 First Street NE, Washington, DC 20426, (202) 502–6150, adam.batenhorst@ferc.gov SUPPLEMENTARY INFORMATION: FOR FURTHER INFORMATION CONTACT: Table of Contents ADDRESSES: DEPARTMENT OF ENERGY Federal Energy Regulatory Commission 18 CFR Part 35 [Docket No. RM21–3–000] Cybersecurity Incentives Federal Energy Regulatory Commission, Department of Energy. ACTION: Notice of Proposed Rulemaking. AGENCY: The Commission is proposing to revise its regulations to establish rules for incentive-based rate treatments for voluntary cybersecurity investments by a public utility for or in connection with the transmission or sale of electric energy subject to the jurisdiction of the SUMMARY: jbell on DSKJLSW7X2PROD with PROPOSALS Paragraph Nos. I. Introduction ............................................................................................................................................................................... II. Background ............................................................................................................................................................................... A. Critical Infrastructure Protection Reliability Standards ................................................................................................. B. NIST Framework ............................................................................................................................................................... C. Transmission Incentives Notice of Inquiry and Rulemaking ......................................................................................... D. Cybersecurity Incentives Policy White Paper ................................................................................................................. III. Need for Reform ...................................................................................................................................................................... IV. Discussion ............................................................................................................................................................................... A. Cybersecurity Incentives Framework .............................................................................................................................. B. Applicable Cybersecurity Investments ............................................................................................................................ 1. NERC CIP Incentives Approach ................................................................................................................................ 2. NIST Framework Approach ...................................................................................................................................... C. Incentives for Cybersecurity Investments ....................................................................................................................... 1. ROE Adder ................................................................................................................................................................. 2. Regulatory Asset Incentive ........................................................................................................................................ 3. Other Types of Incentives ......................................................................................................................................... D. Application Process .......................................................................................................................................................... 1. NERC CIP Incentives Approach ................................................................................................................................ 2. NIST Framework Approach ...................................................................................................................................... 3. ROE Adder ................................................................................................................................................................. 4. Regulatory Asset Incentive ........................................................................................................................................ E. Implementation ................................................................................................................................................................. 1. Incentive Duration ..................................................................................................................................................... 2. Informational Filing and Verification ....................................................................................................................... 3. Confidentiality Considerations .................................................................................................................................. V. Information Collection Statement ........................................................................................................................................... VI. Environmental Analysis ......................................................................................................................................................... VII. Regulatory Flexibility Act ..................................................................................................................................................... VIII. Comment Procedures ........................................................................................................................................................... IX. Document Availability ........................................................................................................................................................... VerDate Sep<11>2014 16:29 Feb 04, 2021 Jkt 253001 PO 00000 Frm 00001 Fmt 4702 Sfmt 4702 E:\FR\FM\05FEP1.SGM 05FEP1 1 5 5 10 12 14 17 20 20 21 22 32 38 38 40 47 48 50 54 57 58 59 59 61 74 76 92 93 97 100 8310 Federal Register / Vol. 86, No. 23 / Friday, February 5, 2021 / Proposed Rules I. Introduction 1. In this Notice of Proposed Rulemaking (NOPR), the Federal Energy Regulatory Commission (Commission) proposes under sections 205 and 206 of the Federal Power Act (FPA) 1 to establish rules for incentive-based rate treatments for voluntary cybersecurity investments 2 by a public utility.3 These rules would provide cybersecurity incentives to public utilities that make certain cybersecurity investments that go above and beyond the requirements of the CIP Reliability Standards,4 and materially enhance the cybersecurity posture of the Bulk-Power System 5 by enhancing the applicants’ cybersecurity posture substantially above levels required by CIP Reliability Standards, to the benefit of ratepayers. 2. First, we propose to allow public utilities making certain cybersecurity investments to request an increase in the rate of return on equity (ROE) applicable to those capital investments. Such cybersecurity investments would include investments following specific CIP Reliability Standards and/or standards and guidelines from the National Institute of Standards and Technology (NIST) 6 Framework. 3. Second, we propose to allow a public utility to seek deferred cost recovery for certain cybersecurity investments. We propose that only 1 16 U.S.C. 824d, 824e. cybersecurity investments refer to cybersecurity investments not required to meet mandatory North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection Reliability Standards (CIP Reliability Standards). 3 The proposed incentive-based treatments for cybersecurity investments would also be available to non-public utilities to the extent that they have Commission-jurisdictional rates. 4 Mandatory Reliability Standards for Critical Infrastructure Protection, Order No. 706, 73 FR 7367 (Feb. 7, 2008),122 FERC ¶ 61,040, at P 1, order on reh’g and clarification, Order No. 706–A, 123 FERC ¶ 61,174 (2008), order on clarification, Order No. 706–B, 74 FR 12544 (Mar. 25, 2009), 126 FERC ¶ 61,229, order denying clarification, Order No. 706–C, 74 FR 30067 (June 24, 2009), 127 FERC ¶ 61,273 (2009). 5 Bulk-Power System is defined by FPA section 215 as facilities and control systems necessary for operating an interconnected electric energy transmission network (or any portion thereof), and electric energy from generation facilities needed to maintain transmission system reliability. The term does not include facilities used in the local distribution of electric energy. 16 U.S.C. 825o(a). 6 NIST is a part of the U.S. Department of Commerce that advances measurement science, standards, and technology. It has developed the voluntary Framework for Improving Critical Infrastructure Cybersecurity (NIST Framework) to ‘‘address and manage cybersecurity risk in a costeffective way based on business and organizational needs without placing additional regulatory requirements on businesses.’’ NIST, Framework for Improving Critical Infrastructure Cybersecurity, at v (Apr. 16, 2018), https://nvlpubs.nist.gov/nistpubs/ CSWP/NIST.CSWP.04162018.pdf. jbell on DSKJLSW7X2PROD with PROPOSALS 2 Voluntary VerDate Sep<11>2014 16:29 Feb 04, 2021 Jkt 253001 expenses for activities that go above and beyond actions required to comply with the CIP Reliability Standards be eligible for these incentives. Therefore, expenses incurred to comply with mandatory CIP Reliability Standards that a public utility incurs on a regular or ongoing basis, or that are incurred prior to the incentive request, would not be eligible for such regulatory asset treatment. We propose to allow deferred cost recovery for three categories of expenses: (1) Expenses associated with third-party provision of hardware, software, and computing networking services; (2) expenses for training to implement new cybersecurity enhancements undertaken pursuant to this rule; and (3) other implementation expenses, such as risk assessments 7 by third parties or internal system reviews and initial responses to findings of such assessments. In all such cases, eligible costs would be limited to costs associated with implementing cybersecurity upgrades and would not include ongoing costs including system maintenance, surveillance, and other labor costs, either in the form of employee salaries or third-party service contracts. Furthermore, we propose that the deferred regulatory assets whose costs are typically expensed should be amortized over a five-year period. 4. Finally, under the proposed regulations, a public utility seeking one or more incentive based-rate treatments proposed in the NOPR must make a filing for Commission approval pursuant to FPA section 205 and receive such approval prior to implementing the proposed incentives in its Commissionjurisdictional rates. II. Background A. Critical Infrastructure Protection Reliability Standards 5. On August 8, 2005, Congress enacted the Energy Policy Act of 2005.8 The Energy Policy Act of 2005 added a new section 215 to the FPA,9 which requires a Commission-certified Electric Reliability Organization to develop mandatory and enforceable Reliability Standards,10 including requirements for 7 NIST, Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1, at 26 (Apr. 16, 2018), https://nvlpubs.nist.gov/nistpubs/ CSWP/NIST.CSWP.04162018.pdf. 8 Energy Policy Act of 2005, Pub. L. 109–58, secs. 1261 et seq., 119 Stat. 594 (2005). 9 16 U.S.C. 824o. 10 FPA section 215 defines Reliability Standard as a requirement, approved by the Commission, to provide for reliable operation of existing bulkpower system facilities, including cybersecurity protection, and the design of planned additions or modifications to such facilities to the extent necessary to provide for reliable operation of the Bulk-Power System. However, the term does not include any requirement to enlarge such facilities PO 00000 Frm 00002 Fmt 4702 Sfmt 4702 cybersecurity protection, which are subject to Commission review and approval. Once approved, the Reliability Standards may be enforced by the Electric Reliability Organization subject to Commission oversight, or the Commission can independently enforce Reliability Standards. 6. On February 3, 2006, the Commission issued Order No. 672,11 implementing FPA section 215. The Commission subsequently certified NERC as the Electric Reliability Organization. The Reliability Standards developed by NERC become mandatory and enforceable after Commission approval and apply to users, owners, and operators of the Bulk-Power System, as set forth in each Reliability Standard.12 The CIP Reliability Standards require entities to comply with specific requirements to safeguard critical cyber assets. These standards are results-based and do not specify a technology or method to achieve compliance, instead leaving it up to the entity to decide how best to comply. 7. On January 18, 2008, the Commission issued Order No. 706,13 approving the initial eight CIP Reliability Standards, CIP version 1 Standards, submitted by NERC. Subsequently, the Commission has approved multiple versions of the CIP Reliability Standards submitted by NERC, partly to address the evolving nature of cyber-related threats to the Bulk-Power System. On November 22, 2013, the Commission issued Order No. 791,14 approving CIP version 5 Standards, the last major revision to the CIP Reliability Standards. The CIP version 5 Standards implement a tiered approach to categorize assets, identifying them as high, medium, or or to construct new transmission capacity or generation capacity. Id. at 824o(a)(3). 11 Rules Concerning Certification of the Elec. Reliability Org.; and Procedures for the Establishment, Approval, and Enf’t of Elec. Reliability Standards, Order No. 672, 71 FR 8661 (Feb. 17, 2006), 114 FERC ¶ 61,104, order on reh’g, Order No. 672–A, 71 FR 19814 (Apr. 28, 2006), 114 FERC ¶ 61,328 (2006). 12 NERC uses the term ‘‘registered entity’’ to identify users, owners, and operators of the BulkPower System responsible for performing specified reliability functions with respect to NERC Reliability Standards. See, e.g., Version 4 Critical Infrastructure Protection Reliability Standards, Order No. 761, 77 FR 24594 (Apr. 25, 2012), 139 FERC ¶ 61,058, at P 46, order denying clarification and reh’g, 140 FERC ¶ 61,109 (2012). Within the NERC Reliability Standards are various subsets of entities responsible for performing various specified reliability functions. We collectively refer to these as ‘‘entities.’’ 13 Order No. 706, 122 FERC ¶ 61,040 at P 1. 14 Version 5 Critical Infrastructure Protection Reliability Standards, Order No. 791, 78 FR 72755 (Dec. 13, 2013), 145 FERC ¶ 61,160 (2013), order on clarification and reh’g, Order No. 791–A, 146 FERC ¶ 61,188 (2014). E:\FR\FM\05FEP1.SGM 05FEP1 Federal Register / Vol. 86, No. 23 / Friday, February 5, 2021 / Proposed Rules jbell on DSKJLSW7X2PROD with PROPOSALS low risk to the operation of the Bulk Electric System (BES) 15 if compromised. High impact systems include large control centers. Medium impact systems include smaller control centers, ultra-high voltage transmission, and large substations and generating facilities. The remainder of the BES Cyber Systems 16 are categorized as low impact systems. Most requirements in the CIP Reliability Standards apply to high and medium impact systems; however, a technical controls requirement in CIP–003, described below, applies only to low impact systems. Since 2013, the Commission has approved new and modified CIP Reliability Standards that address specific issues such as supply chain risk management, cyber incident reporting, communications between control centers, and the physical security of critical transmission facilities.17 8. The CIP Reliability Standards currently consist of 12 standards specifying a set of requirements that entities must follow to ensure the cyber and physical security of the Bulk-Power System. There are 10 currently effective cybersecurity standards and one 15 In general, NERC defines BES to include all Transmission Elements operated at 100 kV or higher and Real Power and Reactive Power resources connected at 100 kV or higher. This does not include facilities used in the local distribution of electric energy. See NERC, Bulk Electric System Definition Reference Document, Version 3, at page iii (August 2018). In Order No. 693, the Commission found that NERC’s definition of BES is narrower than the statutory definition of Bulk-Power System. The Commission decided to rely on the NERC definition of BES to provide certainty regarding the applicability of Reliability Standards to specific entities. See Mandatory Reliability Standards for the Bulk-Power System, Order No. 693, 72 FR 16415 (Apr. 4, 2007), 118 FERC ¶ 61,218, at PP 75, 79, 491, order on reh’g, Order No. 693–A, 72 FR 49717 (July 25, 2007), 120 FERC ¶ 61,053 (2007). 16 NERC defines BES Cyber System as ‘‘[o]ne or more BES Cyber Assets logically grouped by a responsible entity to perform one or more reliability tasks for a functional entity.’’ NERC, Glossary of Terms Used in NERC Reliability Standards, at 5 (2020), https://www.nerc.com/files/glossary_of_ terms.pdf (NERC Glossary of Terms). NERC defines BES Cyber Asset as A Cyber Asset that if rendered unavailable, degraded, or misused would, within 15 minutes of its required operation, misoperation, or nonoperation, adversely impact one or more Facilities, systems, or equipment, which, if destroyed, degraded, or otherwise rendered unavailable when needed, would affect the reliable operation of the Bulk Electric System. Redundancy of affected Facilities, systems, and equipment shall not be considered when determining adverse impact. Each BES Cyber Asset is included in one or more BES Cyber Systems. Id. at 4. 17 See, e.g., Order No. 791, 78 FR 72755; Revised Critical Infrastructure Protection Reliability Standards, Order No. 822, 81 FR 4177 (Jan. 26, 2016), 154 FERC ¶ 61,037, reh’g denied, Order No. 822–A, 156 FERC ¶ 61,052 (2016); Revised Critical Infrastructure Protection Reliability Standard CIP– 003–7—Cyber Security—Security Management Controls, Order No. 843, 163 FERC ¶ 61,032 (2018). VerDate Sep<11>2014 16:29 Feb 04, 2021 Jkt 253001 cybersecurity standard that has been approved by the Commission and will become enforceable on July 1, 2022. There is also one physical security standard, which is not the subject of this NOPR:18 • CIP–002–5.1a Bulk Electric System Cyber System Categorization: requires entities to identify and categorize BES Cyber Assets for the application of cyber security requirements commensurate with the adverse impact that loss, compromise, or misuse of those BES Cyber Systems could have on the reliable operation of the BES. • CIP–003–8 Security Management Controls: Requires entities to specify consistent and sustainable security management controls that establish responsibility and accountability to protect BES Cyber Systems against compromise that could lead to misoperation or instability in the BES. • CIP–004–6 Personnel and Training: Requires entities to minimize the risk against compromise that could lead to misoperation or instability in the BES from individuals accessing BES Cyber Systems by requiring an appropriate level of personnel risk assessment, training, and security awareness in support of protecting BES Cyber Systems. • CIP–005–6 Electronic Security Perimeter(s): Requires entities to manage electronic access to BES Cyber Systems by specifying a controlled Electronic Security Perimeter in support of protecting BES Cyber Systems against compromise that could lead to misoperation or instability in the BES. • CIP–006–6 Physical Security of Bulk Electric System Cyber Systems: Requires entities to manage physical access to BES Cyber Systems by specifying a physical security plan in support of protecting BES Cyber Systems against compromise that could lead to misoperation or instability in the BES. • CIP–007–6 System Security Management: Requires entities to manage system security by specifying select technical, operational, and procedural requirements in support of protecting BES Cyber Systems against compromise that could lead to misoperation or instability in the BES. • CIP–008–5 Incident Reporting and Response Planning: 19 Requires entities 18 CIP–014–2—Physical Security: requires entities to identify and protect transmission stations and transmission substations, and their associated primary control centers, that, if rendered inoperable or damaged as a result of a physical attack, could result in instability, uncontrolled separation, or cascading within an interconnection. 19 An update to CIP–008–6 Reliability Standard will become enforceable on January 1, 2021. PO 00000 Frm 00003 Fmt 4702 Sfmt 4702 8311 to mitigate the risk to the reliable operation of the BES as the result of a cybersecurity incident by specifying incident response requirements. • CIP–009–6 Recovery Plans for Bulk Electric System Cyber Systems: Requires entities to recover reliability functions performed by BES Cyber Systems by specifying recovery plan requirements in support of the continued stability, operability, and reliability of the BES. • CIP–010–3 Configuration Change Management and Vulnerability Assessments: Requires entities to prevent and detect unauthorized changes to BES Cyber Systems by specifying configuration change management and vulnerability assessment requirements in support of protecting BES Cyber Systems from compromise that could lead to misoperation or instability in the BES. • CIP–011–2 Information Protection: Requires entities to prevent unauthorized access to BES Cyber System Information by specifying information protection requirements in support of protecting BES Cyber Systems against compromise that could lead to misoperation or instability in the BES. • CIP–012–1 Communications between Control Centers: 20 Requires entities to protect the confidentiality and integrity of Real-time Assessment and Real-time monitoring data transmitted between Control Centers. • CIP–013–1 Supply Chain Risk Management: Requires entities to mitigate cybersecurity risks to the reliable operation of the BES by implementing security controls for supply chain risk management of BES Cyber Systems. 9. The CIP Reliability Standards, viewed as a whole, implement a defense-in-depth approach to protecting the security of BES Cyber Systems at all impact levels.21 The CIP Reliability Standards are objective-based and allow entities to choose compliance approaches best tailored to their systems.22 B. NIST Framework 10. The Cybersecurity Enhancement Act of 2014 (Cybersecurity Act) 23 updated the role of the NIST to include identifying and developing cybersecurity risk frameworks for voluntary use by critical infrastructure owners and operators. Under the Cybersecurity Act, NIST must identify a 20 CIP–012–1: Communications between Control Centers will be subject to enforcement by July 1, 2022. 21 Order No. 822, 154 FERC ¶ 61,037 at 32. 22 Order No. 706, 122 FERC ¶ 61,040 at 72. 23 15 U.S.C. 272(e)(1)(A)(i). E:\FR\FM\05FEP1.SGM 05FEP1 8312 Federal Register / Vol. 86, No. 23 / Friday, February 5, 2021 / Proposed Rules jbell on DSKJLSW7X2PROD with PROPOSALS prioritized, flexible, repeatable, performance-based, and cost-effective approach, including information security measures and controls, that may be voluntarily adopted by owners and operators of critical infrastructure to help them identify, assess, and manage cyber risks.24 11. As noted above, NIST implements the Cybersecurity Act through its NIST Framework,25 which provides a common organizing structure for multiple approaches to cybersecurity by assembling standards, guidelines, and practices that are currently working effectively in industry.26 The Cybersecurity Framework incorporates voluntary consensus standards and industry best practices to the fullest extent possible.27 The NIST Framework consists of three parts: Framework Core; Implementation Tiers; and Framework Profiles.28 The Framework Core is a set of cybersecurity activities, outcomes, and informative references that are common across sectors and critical infrastructure. Elements of the Framework Core provide detailed guidance for developing individual Framework Profiles.29 Through use of Framework Profiles, the NIST Framework is designed to help an organization to align and prioritize its cybersecurity activities with its business/mission requirements, risk tolerances, and resources. The Implementation Tiers provide a mechanism for an organization to view and understand the characteristics of its approach to managing cybersecurity risk, which is designed to help in prioritizing and achieving cybersecurity objectives.30 The Framework Core consists of five concurrent and continuous Functions—Identify, Protect, Detect, Respond, and Recover. When considered together, these Functions provide a high-level, strategic 24 15 U.S.C. 272 (e)(1)(A)(iii). Security Controls is defined as follows: The management, operational, and technical controls (i.e., safeguards or countermeasures) prescribed for an information system to protect the confidentiality, integrity, and availability of the system and its information. NIST, Computer Security Resource Center Glossary, https://csrc.nist.gov/glossary/term/security_ controls. 25 Version 1.0 of the NIST Framework was released in 2014, and subsequently replaced with version 1.1 in 2018. 26 NIST, Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1, at v (Apr. 16, 2018), https://nvlpubs.nist.gov/nistpubs/CSWP/ NIST.CSWP.04162018.pdf. 27 See Executive Order No. 13636, Improving Critical Infrastructure Cybersecurity, 78 FR 11737 (Feb. 19, 2013). 28 NIST Framework at v. 29 Id. 30 Id. VerDate Sep<11>2014 16:29 Feb 04, 2021 Jkt 253001 view of the lifecycle of an organization’s management of cybersecurity risk.31 C. Transmission Incentives Notice of Inquiry and Rulemaking 12. On March 21, 2019, the Commission issued a Notice of Inquiry seeking comment on the scope and implementation of its electric transmission incentives policy 32 to ensure that the policy continues to satisfy its obligations under FPA section 219.33 The Notice of Inquiry included numerous questions regarding the Commission’s approach to, and the objectives of, its transmission incentives policy; the mechanics and implementation of a transmission incentives policy; and metrics for evaluating the effectiveness of transmission incentives. As related to this proceeding, the Commission requested comment on whether it should incent physical and cybersecurity enhancements at transmission facilities and, if so, what types of security investments should qualify for transmission incentives.34 13. On March 20, 2020, the Commission issued a Notice of Proposed Rulemaking on several topics considered in the 2019 Notice of Inquiry.35 In the Transmission Incentives NOPR, the Commission acknowledged that, although reliability is clearly delineated as a benefit to be promoted by transmission incentives, there are differing mandates for promoting reliability under FPA sections 215 and 219. Further, the Commission stated that cybersecurity is an important part of reliability and indicated that it would address cybersecurity incentives independently in a separate, future proceeding.36 D. Cybersecurity Incentives Policy White Paper 14. On June 18, 2020, Commission staff issued a white paper to explore a new framework for providing transmission incentives to public utilities for cybersecurity investments that produce significant cybersecurity benefits for actions taken that exceed the requirements of the CIP Reliability 31 Id. at 3. 32 Inquiry Regarding the Commission’s Electric Transmission Incentives Policy, 166 FERC ¶ 61,208 (2019) (2019 Notice of Inquiry). 33 16 U.S.C. 824s. 34 2019 Notice of Inquiry, 166 FERC ¶ 61,208 at P 27. 35 Electric Transmission Incentives Policy Under Section 219 of the Federal Power Act, 85 FR 18784 (Apr. 2, 2020), 170 FERC ¶ 61,204, errata notice, 171 FERC ¶ 61,072 (2020) (Transmission Incentives NOPR). 36 2019 Notice of Inquiry, 166 FERC ¶ 61,208 at P 5. PO 00000 Frm 00004 Fmt 4702 Sfmt 4702 Standards.37 In the White Paper, Commission staff discussed augmenting the current CIP Reliability Standards under FPA section 215 with an incentive-based framework under FPA section 219 that encourages public utilities to undertake cybersecurity investments on a voluntary basis. Commission staff reasoned that this framework would incent a public utility to adopt best practices to protect its own transmission system as well as improve the security of the BES. Further, Commission staff stated that the framework could allow the electric industry to be more agile in monitoring and responding to new and evolving cybersecurity threats, to identify and respond to a wider range of threats, and to address threats with comprehensive and more effective solutions. Commission staff reasoned that an incentive-based framework would allow a public utility to tailor its request for incentives to the potential challenges it faces and take responsive action. Commission staff explained that, in the future, these voluntary actions taken by public utilities, if proven beneficial, could be the basis of future CIP Reliability Standards that would be mandatory.38 15. Commission staff stated that providing transmission incentives for cybersecurity investments would require a new framework for the Commission to evaluate requests from public utilities for transmission incentives. Commission staff opined that a first necessary step would be to establish approaches that examine the effectiveness of cybersecurity investments in enabling the public utility to achieve a level of protection that exceeds the CIP Reliability Standards and also enhances the security of its transmission system. Commission staff stated that a public utility would then be able to identify the cybersecurity investments for which it seeks transmission incentives with the Commission evaluating such transmission incentive requests. 16. In the White Paper, Commission staff provided two potential approaches for identifying cybersecurity investments eligible for transmission incentives. The first approach was based on a public utility voluntarily applying certain CIP Reliability Standard requirements to transmission facilities that are not subject to those requirements, e.g., applying all requirements applicable to medium or 37 Cybersecurity Incentives Policy White Paper, Notice of White Paper, Docket No. AD20–19–000 (issued June 18, 2020) (White Paper). 38 Id. at 12–13. E:\FR\FM\05FEP1.SGM 05FEP1 Federal Register / Vol. 86, No. 23 / Friday, February 5, 2021 / Proposed Rules high impact systems to low impact systems. The second approach was based on a public utility voluntarily implementing portions of the NIST Framework. Commission staff suggested that the two approaches could be used independently or in combination.39 jbell on DSKJLSW7X2PROD with PROPOSALS III. Need for Reform 17. We recognize that the energy sector faces numerous and complex cybersecurity challenges. These growing threats come at a time of both great change in the operation of the transmission system and an increase in the number and nature of attack methods.40 Encouraging utilities to address cybersecurity of the Bulk-Power System is uniquely important given the degree to which components of the Bulk-Power System are digitally interconnected with one another and the ever-expanding risks posed by adversaries create challenges for those tasked with defending those interconnections from cyber exploitation. In addition, a cybersecurity breach could have exponential effects on the Bulk-Power System. As the operating environment continues to change, there is the potential for increased vulnerabilities and amplification of cybersecurity threats to the Bulk-Power System. For example, as the Commission has previously explained, the global supply chain affords significant benefits to customers, including low cost, interoperability, rapid innovation, and a variety of product features.41 Despite these benefits, the global supply chain creates opportunities for adversaries to directly or indirectly affect the management or operation of companies with potential risks to end users that could introduce new unintended threats to the system and necessitate rapid mitigating actions.42 Further, the COVID–19 national emergency 43 39 Commission staff noted that, under this potential approach, although a public utility could request a combination of incentives for its facility containing multiple assets, each individual asset would be eligible for only one cybersecurity incentive at a time. 40 See, e.g., Eversource Energy Serv. Co., Comments, Docket No. Public Law 19–3–000, at 29– 30 (filed June 26, 2019) (noting that market operations are becoming increasingly more complex at the same time that there is an increasing cybersecurity threat to the operation and control of the transmission system). 41 See, e.g. Revised Critical Infrastructure Protection Reliability Standards, Notice of Proposed Rulemaking, 80 FR 43354, 152 FERC ¶ 61,054, at PP 61–62 (2015). 42 Supply Chain Risk Management Reliability Standards, Order No. 850, 165 FERC ¶ 61,020, at P 2 (2018). 43 The Secretary of Health and Human Services declared a public health emergency on January 31, 2020, under section 319 of the Public Health VerDate Sep<11>2014 16:29 Feb 04, 2021 Jkt 253001 prompted many organizations to revise their operations to support an increased number of remote workers. The rapid expansion of teleworking capabilities revealed potential vulnerabilities, and some identified cybersecurity events specifically targeting remote access network equipment.44 It is important that public utilities make cybersecurity investments to quickly and effectively address these cybersecurity challenges as well as other emerging threats. Therefore, the Commission has concluded that, given the unique importance of protecting the cybersecurity of the Bulk-Power System, it is appropriate to provide incentives for public utility cybersecurity investment as proposed in this NOPR. 18. Section 215 of the FPA and the CIP Reliability Standards promulgated under that statute have served as the Commission’s primary tools for mandating changes to cybersecurity practices within the electric sector. As required by FPA section 215, the Commission’s mandatory CIP Reliability Standards provide for the reliable operation of the Bulk-Power System.45 Although the CIP Reliability Standards offer protection of the BES 46 and improve the baseline cybersecurity posture of entities,47 they have certain limitations. For example, it can take many months for a new Reliability Standard to be developed and, once approved, it may be several more months or years before a Reliability Standard is fully implemented and enforceable.48 Further, the Bulk-Power System relies on the interdependence of connected networks and equipment; because the CIP Reliability Standards apply to BES facilities, which are generally 100 kV or higher as identified in CIP–002, not all cybersecurity systems are covered by these standards. Thus, while there are limits to how quickly CIP Reliability Standards can Service Act (42 U.S.C. 247d), in response to COVID–19. 44 Cybersecurity and Infrastructure Security Agency, National Cyber Awareness System Alerts, COVID–19 Exploited by Malicious Cyber Actors (Alert AA20–099A) (Apr. 8, 2020), https://uscert.cisa.gov/ncas/alerts/aa20099a#:∼:text=Both %20CISA%20and%20NCSC%20are,threat %20to%20individuals%20and%20organizations. 45 FPA section 215(a)(3) provides that the term reliability standard means a requirement, approved by the Commission under this section, to provide for reliable operation of the bulk-power system. 46 Order No. 791, 145 FERC ¶ 61,160 at PP 2, 41. 47 Order No. 822, 154 FERC ¶ 61,037 at 2. 48 See, e.g., Am. Elec. Power, Inc., Comments, Docket No. PL19–3–000, at 13–14 (filed June 26, 2019) (noting that there is a potential gap between the dynamic threats faced by the energy industry and the CIP Reliability Standards development and compliance process, which sets the rules for minimum compliance). PO 00000 Frm 00005 Fmt 4702 Sfmt 4702 8313 become mandatory and enforceable as well as limits to what the CIP Reliability Standards can cover, the cybersecurity threats public utilities face evolve and arise on their own timeframe. For these reasons, we believe that an effective strategy against emerging cybersecurity threats includes not only requiring public utilities to comply with the mandatory CIP Reliability Standards but also encouraging public utilities to make cybersecurity investments in addition to those required by the CIP Reliability Standards. We propose to do this by providing incentives to public utilities that voluntarily make certain cybersecurity investments above and beyond those investments required by the CIP Reliability Standards. The Commission proposes taking a twoprong approach to cybersecurity, which includes both mandatory CIP Reliability Standards and a cybersecurity incentives framework. This approach would encourage public utilities to increase the protection of their systems against cybersecurity threats. Currently, public utilities may not have the appropriate economic incentives to invest in cybersecurity measures that go above and beyond the mandatory CIP Reliability Standards. The cybersecurity incentives outlined in this NOPR strive to incent public utilities to use known, effective, and dynamic solutions to cybersecurity threats for the benefit of ratepayers. 19. Given that cybersecurity investments can be made to more than a public utility’s transmission system, we find that basing our incentives framework under this proposal on our transmission incentives authority under FPA section 219, as considered in the White Paper, may unnecessarily limit the application of an effective cybersecurity incentives framework and, thereby, limit possible cybersecurity investment. Creating an incentive-based approach under FPA sections 205 and 206 that encourages public utilities to undertake cybersecurity investments on a voluntary basis that are above and beyond the requirements of the mandatory CIP Reliability Standards better ensures secure service for ratepayers. This approach would incent a public utility to adopt cybersecurity practices that would not only better protect its own systems but also improve the security of the Bulk-Power System. For example, the expansion of network monitoring provides the potential integration of all aspects of Bulk-Power System security to include physical access control, equipment status indicators, and system performance monitoring. This provides E:\FR\FM\05FEP1.SGM 05FEP1 8314 Federal Register / Vol. 86, No. 23 / Friday, February 5, 2021 / Proposed Rules for improved incident response time, pre-emptive planning, and system optimization. Further, relying on FPA sections 205 and 206 would allow public utilities to be more agile in monitoring and responding to new and unanticipated cybersecurity threats, to identify and respond to a wider range of threats, and to address threats with comprehensive and more effective solutions. An incentive-based approach allows a public utility to tailor its request for incentives to the potential challenges and responsive actions that it faces. Finally, while we recognize that granting incentives to a public utility under this proposal will have an impact on the public utility’s rates, we believe that such impact, over time, will be outweighed by the public utility having a more secure grid and services for the benefit of ratepayers. IV. Discussion A. Cybersecurity Incentives Framework 20. Pursuant to FPA sections 205 and 206,49 we propose to add § 35.48 to the Commission’s regulations to establish rules to provide incentive-based rate treatments for voluntary cybersecurity investments made by a public utility for or in connection with the transmission or sale of electric energy subject to the jurisdiction of the Commission. FPA sections 205 and 206 give the Commission authority over the rates of a public utility for or in connection with the transmission or sale of electric energy subject to the Commission’s jurisdiction.50 The Commission’s FPA section 205 and 206 authority is broader than the Commission’s authority under FPA section 219. FPA section 219 requires the Commission to issue a rule that provides incentive rate treatment for the transmission of electric energy in interstate commerce by public utilities for the purpose of benefitting consumers by ensuring reliability and reducing the cost of delivered power by reducing transmission congestion.51 However, in this NOPR the Commission is proposing to provide incentives for a different purpose under a different section of the 49 16 U.S.C. 824d(a). U.S.C. 824d(a) (FPA section 205(a) provides that all rates and charges made, demanded, or received by any public utility for or in connection with the transmission or sale of electric energy subject to the jurisdiction of the Commission, and all rules and regulations affecting or pertaining to such rates or charges shall be just and reasonable); see also FERC v. Elec. Power Supply Ass’n, 136 S. Ct. 760, 774 (2016) (stating the Commission’s FPA section 205 and 206 jurisdiction extends to practices that directly affect Commissionjurisdictional rates and that are not otherwise expressly excluded from the Commission’s jurisdiction). 51 16 U.S.C. 824s(a). jbell on DSKJLSW7X2PROD with PROPOSALS 50 16 VerDate Sep<11>2014 16:29 Feb 04, 2021 Jkt 253001 FPA: To provide incentives for cybersecurity investment not only in transmission facilities but also for cybersecurity investment in information technology and operational technology 52 networks that a public utility uses to provide other jurisdictional services. Reliance on FPA sections 205 and 206, therefore, allows for a more comprehensive way to encourage cybersecurity investment than is available under FPA section 219. We believe that this comprehensive approach is warranted because cybersecurity threats to a public utility’s system can come in a variety of forms, such as through a public utility’s information technology and management systems, and not just through a public utility’s systems that directly operate its transmission facilities. In addition, the means a public utility may need to use to protect against cybersecurity intrusions that may harm its jurisdictional system may not be limited to steps to protect the public utility’s systems that run its transmission assets. Incentive ratemaking to encourage cybersecurity investments for not only those systems that are used to directly operate a public utility’s transmission system but also other systems used for the provision of jurisdictional services is consistent with our general ratemaking authority under FPA sections 205 and 206 under which we may depart from cost-of-service ratemaking.53 We believe that this action is appropriate to facilitate increased cybersecurity investment, and that the resulting rates will be just and reasonable. B. Applicable Cybersecurity Investments 21. We propose to add § 35.48(b) to the Commission’s regulations to authorize incentive-based rate treatments for a public utility that makes voluntary cybersecurity investments in the Bulk-Power System, provided that the proposed incentive is 52 Operational technology is defined as programmable systems or devices that interact with the physical environment (or manage devices that interact with the physical environment). These systems/devices detect or cause a direct change through the monitoring and/or control of devices, processes, and events. Examples include industrial control systems, building management systems, fire control systems, and physical access control mechanisms. NIST, Computer Security Resource Center Glossary, https://csrc.nist.gov/glossary/term/ operational_technology. 53 Incentive Ratemaking for Interstate Natural Gas Pipelines, Oil Pipelines, & Elec. Utilities, 61 FERC ¶ 61,168, at 61,594 (1992); see also Farmers Union Cent. Exchange, Inc. v. FERC, 734 F.2d 1486, 1503– 04 (D.C. Cir. 1984) (‘‘In some circumstances, the contrasting or changing characteristics of regulated industries may justify the agency’s decision to take a new approach to the determination of ‘just and reasonable’ rates.’’). PO 00000 Frm 00006 Fmt 4702 Sfmt 4702 just and reasonable and not unduly discriminatory or preferential. 1. NERC CIP Incentives Approach 22. We propose to add § 35.48(b)(1) to the Commission’s regulations to provide that a public utility may receive incentive rate treatment for voluntarily applying identified CIP Reliability Standards to facilities that are not currently subject to those requirements (NERC CIP Incentives Approach). Using the existing CIP Reliability Standards as a framework for providing cybersecurity incentives allows the Commission to leverage an existing set of baseline cybersecurity requirements. Further, public utilities and the Commission are already familiar with the CIP Reliability Standards and encouraging public utilities to voluntarily apply known standards to additional facilities will establish a benchmark for determining eligibility for an incentive. 23. As discussed above, CIP–002 (Bulk Electric System Cyber System Categorization) implements a tiered approach to categorizing assets, requiring an entity to categorize its cyber assets as high, medium, or low risk to the reliable operation of the BES if compromised. These impact ratings determine which requirements in the CIP Reliability Standards CIP–003 though CIP–013 apply to BES Cyber Systems. 24. The CIP version 5 Standards became enforceable for high and medium impact BES Cyber Systems on July 1, 2016, and the CIP Reliability Standards applicable to low impact BES Cyber Systems became enforceable on April 1, 2020. In approving the CIP version 5 Standards, the Commission determined that ‘‘categorizing BES Cyber Systems based on their low, medium, or high impact on the reliable operation of the BES, with all BES Cyber Systems being categorized as at least low impact, offers more comprehensive protection of the bulk electric system’’ and that ‘‘the new cybersecurity controls improve the security posture of responsible entities.’’ 54 25. We propose two ways for a public utility to demonstrate that it is eligible for a cybersecurity incentive through voluntary investment in applying the requirements of the CIP Reliability Standards to additional facilities. Public utilities that choose to request the proposed incentives under the NERC CIP Incentives Approach will receive a rebuttable presumption that the investments materially enhance the security posture of the Bulk-Power System by enhancing the applicants’ 54 Order E:\FR\FM\05FEP1.SGM No. 791, 145 FERC ¶ 61,160 at P2. 05FEP1 Federal Register / Vol. 86, No. 23 / Friday, February 5, 2021 / Proposed Rules cybersecurity posture substantially above levels required by CIP Reliability Standards to merit an incentive for such cybersecurity investments.55 a. Med/High Incentive 26. We propose to add § 35.48(b)(1)(i) to the Commission’s regulations to allow a public utility to receive incentive rate treatment for voluntarily applying the requirements for medium or high impact systems to low impact systems, and/or the requirements for high impact systems to medium impact systems (Med/High Incentive). 27. Under the Med/High Incentive, a public utility seeking a cybersecurity incentive for a facility that is classified as a low impact BES Cyber System would invest in ways to make that facility meet all the requirement and sub-requirement protections applicable to medium or high impact BES Cyber Systems. Also, under the Med/High incentive, a public utility seeking a cybersecurity incentive for a facility classified as a medium impact BES Cyber System would invest in ways to make that facility meet all the requirement and sub-requirement protections applicable to high impact BES Cyber Systems. The public utility could choose to apply the medium and/ or high impact requirements to some or all of its low or medium impact BES Cyber Systems, and would receive incentives only for the investments it makes to apply the more stringent protections. b. Hub-Spoke Incentive jbell on DSKJLSW7X2PROD with PROPOSALS 28. We propose to add § 35.48(b)(1)(ii) to the Commission’s regulations to allow a public utility to receive incentive rate treatment for voluntarily ensuring that all external routable connectivity 56 to and from the low impact system connect to a high or medium impact BES Cyber System (Hub-Spoke Incentive). Under the HubSpoke Incentive, a public utility is eligible for incentives if its investment applies CIP Reliability Standard security controls inherited from a high or medium impact BES Cyber System at locations containing low impact BES Cyber Systems by ensuring all external routable connectivity to and from the 55 We do not propose that NERC will have any role in monitoring or reviewing the implementation of voluntary incentives or otherwise participating in this incentives program. 56 NERC defines external routable connectivity as ‘‘the ability to access a BES Cyber System from a Cyber Asset that is outside of its associated Electronic Security Perimeter via a bi-directional routable protocol connection.’’ NERC, Glossary of Terms Used in NERC reliability Standards (2020), https://www.nerc.com/files/glossary_of_terms.pdf. VerDate Sep<11>2014 16:29 Feb 04, 2021 Jkt 253001 low impact system connect to a high or medium impact BES Cyber System. 29. Under the Hub-Spoke Incentive, all the cyber communications to and from a low impact system location must connect to a medium or high impact BES Cyber System and the cyber communication security controls required for the medium or high impact BES Cyber System must be implemented on the low impact system.57 Therefore, the cyber communication would be protected at a higher security level before being transmitted to or received by the low impact BES Cyber System. Thus, low impact BES Cyber Systems would inherit the higher security posture of either the medium or high impact controls. c. Other Considerations 30. Nothing in this proposal modifies a public utility’s obligation to comply with all the mandatory NERC Reliability Standard obligations for its low, medium, and high impact BES Cyber Systems. A public utility requesting incentive rate treatment for voluntarily applying the CIP Reliability Standards requirements, as discussed above, will not be subject to penalties from the Commission for failing to voluntarily follow the CIP Reliability Standards. However, if the Commission approves a public utility’s request for cybersecurity incentives pursuant to either the Med/ High or Hub-Spoke Incentive and the public utility subsequently ceases to implement the CIP Reliability Standards consistent with the order approving the application, we propose that the public utility would not be able to receive the incentive for the period during which it is not implementing the CIP Reliability Standards consistent with the order approving the application. 31. Additionally, since the NERC CIP Incentives Approach is based on a public utility making voluntary cybersecurity investments based on the CIP Reliability Standards as they exist at the time of the investment, we propose that the determination of the types of cybersecurity incentives that a public utility would be eligible for would reflect the currently enforceable version of the CIP Reliability Standards at the time the public utility submits a request for incentives. As discussed in section IV.E.1 (Incentive Duration), where NERC publicly announces that it is considering making certain cybersecurity activities or investments mandatory through issuing a standard 57 See PO 00000 proposed § 35.48(b)(1)(ii). Frm 00007 Fmt 4702 Sfmt 4702 8315 authorization request,58 a public utility would still be eligible to receive incentives until the requirements become mandatory and enforceable. 2. NIST Framework Approach 32. We propose to add § 35.48(b)(2) to the Commission’s regulations to provide that a public utility may receive incentive rate treatment for implementing certain security controls included in the NIST Framework (NIST Framework Approach). The Commission would evaluate a public utility’s application for cybersecurity investments that implement security controls in the NIST Framework to determine whether the cybersecurity investments go above and beyond the CIP Reliability Standards and are eligible for incentives. Through the NIST Framework Approach, public utilities have the flexibility of nonprescriptive implementation options to go above and beyond the CIP Reliability Standards. 33. Although the NIST Framework contains many types of security controls, we propose to limit eligibility for cybersecurity incentives to the types of controls that are most likely to provide a significant benefit to the cybersecurity of Commissionjurisdictional transmission facilities, not just the BES. In the White Paper, Commission staff identified five types of security controls included in the NIST Framework that may be considered for incentives under the NIST Framework approach: (1) Automated and continuous monitoring; (2) access control; (3) data protection; (4) incident response; and (5) physical security of cyber systems. Commission staff also acknowledged that, given the continuous and rapid changes in cybersecurity risks, the Commission may need to periodically update the types of security controls eligible for incentives.59 In proposing the NIST Framework Approach, we propose to initially only consider incentives that fall within the first type of security controls, automated and continuous monitoring. For example, continuous monitoring tools that utilize automated features for pulling information from a variety of sources or that allow for data consolidation into Security Information and Event Management tools would 58 A standard authorization request is the form used to document the scope and reliability benefit of a proposed project for one or more new or modified Reliability Standards or definitions, as well as document the benefit of retiring one or more approved Reliability Standards. NERC, Standard Authorization Request (SAR), https:// www.nerc.com/pa/Stand/Pages/SARs.aspx. 59 White Paper at 19. E:\FR\FM\05FEP1.SGM 05FEP1 jbell on DSKJLSW7X2PROD with PROPOSALS 8316 Federal Register / Vol. 86, No. 23 / Friday, February 5, 2021 / Proposed Rules qualify as automated and continuous monitoring security controls.60 While this will limit the NIST Framework security controls eligible for incentives at this time, the Commission considers this to be an important next step in encouraging cybersecurity investments and may consider additional security control types in the future. 34. Under this proposal, one example of an investment that could warrant an incentive as automated and continuous monitoring would be for a public utility to install a dynamic asset management program to improve its ability to quickly detect and address new or previously unknown equipment on its network. Unknown and unattended equipment can present significant vulnerabilities and threats to both the information technology and operational technology networks. Implementing a process that automatically and continuously scans the current inventory of hardware and software across both the information technology and operational technology networks can identify, block, log and report any unauthorized access. 35. Another example of an automated and continuous monitoring investment eligible for an incentive is the implementation of a dynamic file analysis program or a ‘‘sandbox.’’ One deployment of a sandbox is as an automated malware detection environment that continuously scans email attachments and weblinks in the corporate email system for malicious code. When malicious code is detected, a sandbox blocks delivery to the end user in real time and automatically issues an alert to the security team. Malicious code deployed in the sandbox will potentially be activated when placed there, but it will be isolated from the information technology and operational technology networks, thereby protecting the networks while alerting the public utility to the threat. The deployment of sandboxes enhances the ability of a public utility to detect and prevent the delivery of malicious code, disrupts social engineering attacks on users, and tests software for dangerous behavior. Further, the ability to perform post-incident forensic triage and analysis enables public utilities to establish the root causes of an event, identify related vulnerabilities, and mitigate associated risks in an expedited manner to optimize long-term operational capabilities. 36. As discussed below, public utilities seeking an incentive under this 60 NIST, Information Security Continuous Monitoring for Federal Information Systems and Organizations, NIST Special Publication 800–137, at 13 (Sep. 2011), https://nvlpubs.nist.gov/nistpubs/ Legacy/SP/nistspecialpublication800-137.pdf. VerDate Sep<11>2014 16:29 Feb 04, 2021 Jkt 253001 approach would need to show how a cybersecurity investment, for example, in physical components, software, licensing for cybersecurity enhancements as well as operational costs such as contracts with security providers, third-party incident responders, and third-party security operations centers, allows the public utility to meet NIST Framework security controls, as identified above, will go above and beyond the requirements of the CIP Reliability Standards, and materially enhance the current cybersecurity posture of the Bulk-Power System by enhancing the applicants’ cybersecurity posture substantially above levels required by CIP Reliability Standards, to the benefit of ratepayers. As the Commission evaluates incentive applications, we will remain cognizant of ongoing changes to the CIP Reliability Standards, the NIST Framework, and underlying referenced security controls. 37. As with the NERC CIP Incentives Approach, if a public utility ceases to maintain the cybersecurity posture associated with the Commission’s order approving its NIST Framework Approach incentives application, the public utility would not be able to receive the incentive for the period during which it is not implementing the CIP Reliability Standards as described in the Commission’s order approving its application. C. Incentives for Cybersecurity Investments 1. ROE Adder 38. We propose to add § 35.48(c)(1) to the Commission’s regulations to allow a public utility that makes eligible cybersecurity capital investments, as more fully described above, to request an ROE adder of 200 basis points (Cybersecurity ROE Incentives) for those eligible cybersecurity investments. This ROE incentive will encourage public utilities to proactively make additional investments in cybersecurity systems. We believe that such a 200-basis point adder is appropriate to provide a meaningful incentive to encourage public utilities to improve their systems’ cybersecurity. For example, we note that given the relatively small size of such investments, compared to conventional transmission projects, the dollar amounts provided under the incentives should not have a burdensome effect on the public utility’s rates. Yet, the benefit to the system, and ultimately to rate payers, by this additional investment will provide additional cybersecurity protections that could have a large impact on the public utility’s system by allowing it to better detect and address PO 00000 Frm 00008 Fmt 4702 Sfmt 4702 cybersecurity threats to the Bulk-Power System. The total cybersecurity incentives requested would be capped at the zone of reasonableness.61 Additionally, we find that the same expenditures should not be eligible for both the Cybersecurity ROE Incentives and the Regulatory Asset Incentives discussed below. Given that regulatory asset treatment is available to costs that are normally treated as expenses, as discussed below, we believe that it is unnecessary to incent investment to also enable deferred costs that would otherwise be expensed to receive this 200 basis-point incentive. We propose that public utilities only be eligible to receive the Cybersecurity ROE Incentive as a cybersecurity incentive for capital investments. 39. Transmission-specific investments based on the NERC CIP Incentives Approach and the NIST Framework Approach may be eligible for the Cybersecurity ROE Incentive under this NOPR. In addition, we propose that enterprise-wide costs—which are not specific to transmission but a portion of which are recovered through transmission rates—may also be eligible for incentives if the applicant can demonstrate how the investment will materially enhance the security posture of the Bulk-Power System by enhancing the applicants’ cybersecurity posture substantially above levels required by CIP Reliability Standards, to the benefit of ratepayers. While cybersecurity systems that are not subject to the CIP Reliability Standards may be less critical to reliable operations, compromise of these systems may nevertheless allow access to more critical systems and therefore we believe that incentivizing the enhanced protection of these systems is important to the reliability of the Bulk-PowerSystem.62 Only the conventionally allocated portion of such investments that flows through to Commission jurisdictional cost-of-service rates will be eligible for this rate treatment. For instance, if a public utility seeks an incentive for cybersecurity investment that it made to its general plant 61 In the Transmission Incentives NOPR the Commission proposes that, under FPA section 219, the Commission may approve a rate that exceeds the zone of reasonableness to further the purposes of that statutory provision. In this NOPR, however, the Commission is acting under FPA sections 205 and 206. 62 For example, WANNACRY attacked specific servers that were vulnerable and once the attacker gained access to the server, the attacker moved to other internal systems to complete the attack. See, NCCIC, Fact Sheet, What is Wannacry/ Wanacryptor?, https://us-cert.cisa.gov/sites/default/ files/FactSheets/NCCIC%20ICS_FactSheet_ WannaCry_Ransomware_S508C.pdf. E:\FR\FM\05FEP1.SGM 05FEP1 Federal Register / Vol. 86, No. 23 / Friday, February 5, 2021 / Proposed Rules jbell on DSKJLSW7X2PROD with PROPOSALS facilities, both the underlying investments and associated incentives must be allocated based on conventions of the rates (e.g., the transmission share using a wages and salaries allocator for general plant in most transmission cost of service rates). With this limitation, we seek to ensure that the cybersecurity incentives policy adheres to the ratemaking principles of beneficiary pays and cost-causality by limiting a transmission customer’s share of incentive costs to the share of such investments that serve (and is traditionally allocated to) transmission. We note that the Commission’s rules and regulations in the Uniform System of Accounts 63 already require public utilities to maintain records supporting any entries to the regulatory asset account so that the utility can furnish full information as to the nature and amount of, and justification for, each regulatory asset recorded in the account. Therefore, pursuant to our existing regulations, public utilities must maintain sufficient records to support the distinction of any expenses that are afforded incentivized treatment.64 2. Regulatory Asset Incentive 40. We propose to add § 35.48(c)(2) to the Commission’s regulations to allow a public utility to seek deferred cost recovery pursuant to this NOPR. We believe that, in limited circumstances, it may be appropriate to allow a public utility to defer recovery of certain cybersecurity costs that are generally expensed as incurred, and treat them as regulatory assets, while also allowing such regulatory assets to be included in transmission rate base (Regulatory Asset Incentive). Such expenses must be associated with the NERC CIP Incentives Approach or the NIST Framework Approach investments that receive Commission approval for ROE incentives. Like the provision of ROE incentives, discussed above, we propose that only expenses for activities that go above and beyond the CIP Reliability Standards, as discussed above, be eligible for incentives. Under this proposal, expenses that are mandatory, that a public utility incurs on a regular or ongoing basis, or that are incurred prior to the incentive request, would not be eligible for such regulatory asset treatment. 41. More specifically, to implement proposed § 35.48(c)(2) of the Commission’s regulations, we propose to allow deferred cost recovery for three 63 See 18 CFR part 101, Account Definition Account 182.3, Other Regulatory Assets, paragraph D. 64 Id. VerDate Sep<11>2014 16:29 Feb 04, 2021 Jkt 253001 categories of expenses: (1) Expenses associated with third-party provision of hardware, software, and computing networking services; (2) expenses for training to implement new cybersecurity enhancements undertaken pursuant to this rule; and (3) other implementation expenses, such as system assessments by third parties or internal system reviews and initial responses to findings of such assessments. In all such cases, eligible costs are limited to costs associated with implementing cybersecurity upgrades and do not include ongoing costs including system maintenance, surveillance, and other labor costs, either in the form of employee salaries or third-party service contracts. 42. Regarding the first category, certain cost categories, such as software, that companies traditionally purchased and could capitalize, are now often procured as services with periodic payments to vendors that is updated as needed. Therefore, to encourage investment in cybersecurity, we believe that it would be appropriate to allow public utilities to defer and amortize eligible costs that are typically recorded as expense that are associated with third party provision of hardware, software, and computing and networking services. Pursuant to our existing regulations, public utilities must maintain sufficient records to support the distinction of any expenses that are afforded incentivized treatment.65 43. Regarding the second category, in response to the White Paper, many commenters stated that training is central to improving cybersecurity. We agree that such training is critical to successful implementation of cybersecurity enhancements. Therefore, we propose to allow public utilities to request the Regulatory Asset Incentive for training expenses associated with cybersecurity investments made pursuant to this rule. However, ongoing training expenses, which many organizations provide to employees regularly, would not be eligible because such training is an ongoing rather than implementation type of operating expense for the implementation we seek to incentivize. Pursuant to our existing regulations, public utilities must maintain sufficient records to support the distinction of any training expenses that are afforded incentivized treatment.66 44. Regarding the third category, we believe that there may be large one-time expenses associated with implementing cybersecurity upgrades. These may 65 Id. 66 Id. PO 00000 Frm 00009 Fmt 4702 Sfmt 4702 8317 include unusually large internal system evaluations and assessments or analyses by third parties. These expenses may be large relative to the size of the capital investments associated with the cybersecurity upgrades and essential to their proper implementation. We propose that such expenses not include regularly scheduled activities that would occur irrespective of the cybersecurity upgrades. Pursuant to our existing regulations, public utilities must maintain sufficient records to support the distinction of any expenses that are afforded incentivized treatment. 45. Additionally, consistent with the proposal for the ROE incentive for eligible cybersecurity capital investments, only directly assigned transmission costs or the conventionally allocated (i.e., using the wages and salaries allocator) portion of enterprisewide expenses would be eligible the Regulatory Asset Incentive. Applicants would be required under proposed § 35.48(b) to demonstrate that any enterprise-wide expenses for which they seek this treatment materially enhances the cybersecurity of the Bulk-Power System by enhancing the applicants’ cybersecurity posture substantially above levels required by CIP Reliability Standards, to the benefit of ratepayers. 46. Finally, we propose in § 35.48(d)(2) that deferred regulatory assets whose costs are typically expensed should be amortized over a five-year period. We believe that this duration will allow incentive recipients a reasonable amount of time to earn a return on expenditures for which no return is normally allowed. Moreover, the proposed amortization period generally corresponds to the short lifespan and depreciation rates of cybersecurity investments. 3. Other Types of Incentives 47. In this NOPR, we are proposing to grant ROE and deferred cost recovery incentives. Nonetheless, we recognize that other incentives, such as construction work in progress, may be warranted to encourage investment in cybersecurity if adequately supported. To maintain flexibility under this proposal for other types of incentives under these new regulations, we propose to add § 35.48(c)(3) to the Commission’s regulations that provides the Commission additional flexibility to grant a public utility any other incentives, pursuant to the requirements of this section, that the Commission deems to be just and reasonable and not unduly discriminatory or preferential for investments undertaken pursuant to E:\FR\FM\05FEP1.SGM 05FEP1 8318 Federal Register / Vol. 86, No. 23 / Friday, February 5, 2021 / Proposed Rules this rule.67 We propose to consider applications for other cybersecurity incentives on a case-by-case basis to determine if they are just and reasonable and not unduly discriminatory or preferential under FPA section 205. D. Application Process 48. Proposed § 35.48(e) of the Commission’s regulations would require a public utility’s request for one or more incentive based-rate treatments to be made in a filing pursuant to FPA section 205. As proposed, such a request must include a detailed explanation of how the public utility plans to implement one or both of the proposed incentive approaches and the requested rate treatment. We propose that applicants provide detail on the investments or expenses for which they seek incentives, as described in more detail below. An applicant would make a filing showing how its project(s) meet the eligibility requirements described below. In proposing what showing an applicant must make, we balance the need for sufficient information to determine if an applicant is eligible for the incentive against the risk of the applicant providing potentially sensitive information on cybersecurity vulnerabilities in its application. We discuss confidentiality concerns further in section IV.E.3 (Confidentiality Considerations). 49. Finally, under § 35.48(e) of the proposed regulations, a public utility seeking one or more incentive basedrate treatments proposed in the NOPR must make a filing for Commission approval pursuant to FPA section 205 and receive such approval prior to implementing the proposed incentives in its Commission-jurisdictional rates. In order to effectuate the incentives in rates, public utilities would need to propose in their FPA section 205 filing conforming revisions to their formula rates, as appropriate, to reflect incentive rate treatment granted pursuant to these proposed regulations.68 jbell on DSKJLSW7X2PROD with PROPOSALS 1. NERC CIP Incentives Approach 50. To implement proposed § 35.48(b) of the Commission’s regulations, for 67 We note that the Commission adopted similar flexibility and language to consider other proposals in § 35.35(d)(viii) of the Commission’s rules and regulations in Order No. 679. See 18 CFR 35.35(d)(1)(viii); Promoting Transmission Investment through Pricing Reform, Order No. 679, 71 FR 43293 (Jul. 31, 2006), 116 FERC ¶ 61,057 (2006), order on reh’g, Order No. 679–A, 72 FR 1152 (Jan. 10, 2007), 117 FERC ¶ 61,345 (2006), order on reh’g 119 FERC ¶ 61,062 (2007). 68 Public utilities with stated rates may file under FPA section 205 to seek incentives as part of a larger rate case or make a request for single issue ratemaking, which the Commission will evaluate on a case-by-case basis. VerDate Sep<11>2014 16:29 Feb 04, 2021 Jkt 253001 capital investments, we propose that an applicant describe the proposed investments as well as their anticipated cost, completion date and geographic location. An applicant would also describe how the proposed investment meets the description of the Med/High Incentive and/or the Hub-Spoke Incentive. 51. We propose that applicants describe the implementation and method of continuing adherence to the actions required to obtain and maintain the incentive, as described in § 35.48(e)(1) of the proposed regulations. The applicant would include in its application, at a minimum, an identification of the scope of assets for which the public utility is requesting the incentive, and the associated BES Cyber Systems that will be protected. Specifically, an applicant would include a list of BES assets for which the public utility is requesting the incentive, the geographical location of the BES assets, the function they support, the incentive method the public utility is requesting for each of the BES assets, the current impact ratings of the BES assets and the impact level(s) that the assets now meet as a result of the investment, and a list of BES Cyber Systems associated with each of the BES assets including details on their use. 52. Unlike conventional transmission investments, which entail completion of a physical transmission project, investments under the NERC CIP Incentives Approach seek to bring BES assets otherwise not required to be subject to certain cybersecurity requirements to a higher cybersecurity level, and that higher level must be maintained for it to continue to provide ratepayer benefits. Consequently, the Commission proposes that, if an investment that receives a Med/High Incentive or Hub-Spoke Incentive ceases to meet the requirements of that incentive, the public utility would be required to update its cost-of-service rates to reflect this change. In addition, the Commission or third parties may initiate FPA section 206 proceedings to revoke such incentives. 53. In Order No. 791, the Commission recognized that categorizing BES Cyber Systems based on their low, medium, or high impact on the reliable operation of the BES, with all BES Cyber Systems being categorized as at least low impact, offers more comprehensive protection of the BES than the prior CIP Reliability Standards.69 The Commission also acknowledged that CIP version 5 Standards offer new cybersecurity 69 Order PO 00000 No. 791, 145 FERC ¶ 61,160 at P 41. Frm 00010 Fmt 4702 Sfmt 4702 controls that will improve the overall security posture of responsible entities.70 Given the Commission’s experience with the CIP Reliability Standards, we propose that an asset-byasset showing of benefits is unnecessary because, though the benefits of upgrades may vary by system, we believe that all upgrades based on the NERC CIP Incentives Approach materially enhance the cybersecurity posture of the BulkPower System by enhancing the applicants’ cybersecurity posture substantially above levels required by CIP Reliability Standards, to the benefit of ratepayers, and warrant incentives. Thus, we propose that a public utility seeking incentives under the NERC CIP Incentives Approach and that provides the information required under this application process receive a rebuttable presumption that the cybersecurity investments materially enhance the cybersecurity of the Bulk-Power System by enhancing the applicants’ cybersecurity posture substantially above levels required by CIP Reliability Standards to merit an incentive. 2. NIST Framework Approach 54. In contrast to applications for incentives based on the NERC CIP Incentives Approach, we propose that a public utility seeking incentives for cybersecurity investments under the NIST Framework Approach would not be entitled to a rebuttable presumption and instead must provide additional information showing that the proposed investment materially enhances the cybersecurity posture of the Bulk-Power System by enhancing the applicants’ cybersecurity posture substantially above levels required by CIP Reliability Standards. However, we request comments on what demonstration an applicant should be required to make to show that its NIST Framework Approach investments merit incentives under the FPA section 205 just and reasonable standard. 55. Depending on a public utility’s existing attributes; namely the hardware, system configuration, and operating practices that contribute to its overall cybersecurity posture, and the specific characteristics of the proposed cybersecurity investments, proposed cybersecurity investments may or may not materially enhance the cybersecurity posture of the Bulk-Power System by enhancing the applicants’ cybersecurity posture substantially above levels required by CIP Reliability Standards to warrant incentives. Under § 35.48(e)(2) of the Commission’s regulations, we propose that an 70 Id. E:\FR\FM\05FEP1.SGM 05FEP1 Federal Register / Vol. 86, No. 23 / Friday, February 5, 2021 / Proposed Rules applicant must describe its current cybersecurity posture, desired cybersecurity posture, and the quantified risk factors being addressed through the proposed incentive actions. An application must include full and detailed explanations of how proposed cybersecurity investments will materially enhance the cybersecurity of the Bulk-Power System by enhancing the applicants’ cybersecurity posture substantially above levels required by CIP Reliability Standards, to the benefit of ratepayers. In assessing whether an application meets the standard for granting incentives under this NOPR, we propose that the Commission would review the stated expenditures and level of risk mitigated in comparison to the public utility’s pre-incentivized network configuration. This judgement will be made on a case-by-case basis. The application would need to detail the specific components to be installed, network deployment, sensor configuration, and enterprise data incorporation as described in the fourstep review process, discussed below. 56. Consistent with incentive requests under the NERC CIP Incentives Approach, an applicant seeking incentives under the NIST Framework Approach would be required to provide detail on the investments or expenses for which it seeks incentives. For capital investments, applicants would describe: (1) The required network components; (2) how the sensors connect to the network; (3) how the sensors deployment recognizes the specific attributes of the network; (4) the costs of all investments; and (5) when the costs are expected to be incurred. 3. ROE Adder 57. Under § 35.48(e)(3) of the proposed regulations, applicants requesting an ROE adder of 200 basis points must include the anticipated cost of the capital investment and identify the Commission-jurisdictional rate schedules under which they will recover the ROE adder. jbell on DSKJLSW7X2PROD with PROPOSALS 4. Regulatory Asset Incentive 58. For expenses that the applicant seeks to receive regulatory asset treatment associated with either ROE incentive-eligible projects based on either the NERC CIP Incentives Approach or the NIST Framework Approach, under § 35.48(e)(4) of the proposed regulations, the applicant must describe and estimate the nature of such expenses, their costs, and when VerDate Sep<11>2014 16:29 Feb 04, 2021 Jkt 253001 they are expected to be incurred.71 Applicants would be expected to provide a narrative explanation of how such expenses meet the description of the Med/High Incentive, the Hub-Spoke Incentive and/or the NIST Framework Approach. Applicants would then describe whether the expenses are: (1) Expenses associated with third-party provision of hardware, software, and computing networking services; (2) expenses for training to implement new cybersecurity enhancements; or (3) other transition expenses, such as risk assessments 72 by third parties or internal system reviews, and initial responses to findings of such assessments. An applicant would also be required to describe the cost, location, and timing of all eligible capital investments and the cost and timing of all deferred expenses. E. Implementation 1. Incentive Duration 59. We propose to add § 35.48(d) to the Commission’s regulations to allow a public utility granted an incentive under this NOPR to receive that incentive for the lesser of: (1) The depreciation life of the underlying asset; (2) 10 years from when the cybersecurity improvements enter service; (3) when the investments or activities that serve as the basis of that incentive become mandatory pursuant to a Reliability Standard approved by the Commission; or (4) when the public utility no longer meets the requirements for receiving the incentive.73 We are seeking to incentivize cybersecurity assets that primarily include equipment or system modifications that typically have short depreciation lives. The cybersecurity incentives identified in this NOPR are intended to apply to technology and systems investments and not to more long-lived assets like physical structures. Thus, we believe that most public utilities granted cybersecurity incentives under this NOPR should receive those incentives for the depreciation life of the asset. However, for investments with useful lives exceeding 10 years, we propose that the incentive end at the conclusion of 10 years from when the cybersecurity incentives enter service. Although it is 71 We reiterate that applicants’ ongoing costs of operating a more cybersecure system are not eligible for such incentive treatment under this NOPR. 72 NIST, Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1, at 26 (Apr. 16, 2018), https://nvlpubs.nist.gov/nistpubs/ CSWP/NIST.CSWP.04162018.pdf. 73 FPA section 205 filings revising cost of service rates to implement incentives must contain language limiting incentive duration to the lesser of these three eventualities. PO 00000 Frm 00011 Fmt 4702 Sfmt 4702 8319 possible that specific components of cybersecurity investments may feature longer useful lives than 10 years, given the evolving nature of cybersecurity threats, we find that 10 years is a reasonable expectation of the principal benefits of the cybersecurity investments, which should correspond to the investment duration. 60. In addition, we propose that, where cybersecurity investments are mandatory, cybersecurity incentives are inappropriate and would only serve to increase ratepayer costs. However, where NERC publicly announces that it is considering making certain cybersecurity activities or investments mandatory, through issuing a standard authorization request, public utilities may receive incentives until the requirements become mandatory. For a public utility that requests regulatory asset treatment for costs normally recorded to expenses, if such expenditures become mandatory, we propose that the public utility must recover the unamortized portion of expenses through expenses in rates with no further earning of an incentive return on the regulatory asset. 2. Informational Filing and Verification 61. In order to ensure that a public utility receiving incentive rate treatment has implemented the requirements for the incentive and to ensure that it continues to adhere to these requirements, we propose to add § 35.48(f) to the Commission’s regulations to require public utilities to submit annual informational filings with the Commission.74 We propose specific reporting requirements for each of the NERC CIP Incentives Approach and the NIST Framework Approach below. 62. The Transmission Incentives NOPR proposes additional reporting requirements for recipients of transmission incentives under FPA section 219.75 Such additional reporting is likewise appropriate for cybersecurity upgrades receiving incentives. Accordingly, we propose to add § 35.48(f) to require that, within 120 days of the completion of cybersecurity upgrades for which an applicant is granted incentives, an incentives recipient must make an informational filing and subsequent informational filings annually thereafter. The annual informational filings must detail the specific investments that were made 74 These reporting requirements also apply to non-public utilities that receive cybersecurity incentives through their Commission-jurisdictional rates. 75 Transmission Incentives NOPR, 166 FERC ¶ 61,208 at P 115. E:\FR\FM\05FEP1.SGM 05FEP1 8320 Federal Register / Vol. 86, No. 23 / Friday, February 5, 2021 / Proposed Rules pursuant to the Commission’s approval and the corresponding FERC account(s) used. In addition, the annual informational filings must describe what parts of its network were upgraded or expanded (i.e., which substations, control centers, automated and continuous monitoring equipment) in addition to the nature (i.e., describing hardware purchase) and actual cost of the various capital investments. For incentives where the Commission allows deferral of expenses as regulatory assets, annual informational filings should describe such expenses in sufficient detail to demonstrate that such expenses are specifically related to implementing the cybersecurity incentives described in this NOPR and not for ongoing costs including system maintenance, surveillance, and other labor costs, either in the form of employee salaries or third-party service contracts. 63. We preliminarily find that the proposed reporting requirements are necessary to provide the Commission with an understanding of the costs of various types of cybersecurity investments in order to more precisely target future incentives or other policies. However, based on the qualities of such investments, as well as the likely higher sensitivity of the information, we propose to require different reporting requirements under this proposal than those proposed under the Transmission Incentives NOPR. 64. Several aspects of cybersecurity necessitate reporting different information that the Commission has required for conventional transmission facilities receiving incentives pursuant to FPA section 219. First, cybersecurity investments are not observable. Unlike conventional transmission facilities, such as a new transmission line, it is not readily apparent if, and when, such investments are completed and serving customers. Therefore, it is important to confirm the completion of cybersecurity investments by establishing additional reporting requirements. Second, certain cybersecurity investments may require public utilities to undertake subsequent actions or make expenditures to maintain the status for which they receive incentives. Annual reports enable public utilities to demonstrate that they have undertaken such actions or expenditures. 65. Finally, we propose that both the initial and annual informational filings provide a summary of the costs incurred to achieve the higher level of security, including supporting documentation that provides a narrative explanation of the nature of the expenses proposed for deferred cost recovery, and inclusion in rate base as a regulatory asset, including the specific accounts (under the Commission’s Uniform System of Accounts) initially charged for the incurred expenses. 66. Also, the Commission may conduct periodic verification to assess cybersecurity investments and expenses for which it has approved incentives. The Commission could perform such verifications through multiple means (i.e., directing further informational filings, audits, etc.). The annual informational filings will inform the Commission on how and when the additional verification is warranted. a. NERC CIP Incentives Approach 67. To demonstrate that a public utility has implemented the requirements for the Med/High incentive and to ensure that the recipient continues to adhere to these requirements, we propose that the informational filing would describe implementation of the enhanced security controls, as applicable, in all the topics covered by the CIP Reliability Standards. Below is a table of currently effective and Commission-approved CIP Reliability Standards and examples of supporting documentation a public utility may provide to demonstrate incentive adherence to each CIP Reliability Standard. For the first informational filing, we would expect the public utility to provide documents, as indicated below, plus any additional documentation needed to demonstrate voluntary application of identified CIP Reliability Standards to facilities that are not currently subject to those requirements.76 For each subsequent annual informational filing, the public utility would only need to provide an updated version of the supporting documentation showing any changes from the prior informational filing as well as information on any period of time during the reported year where the public utility ceased to voluntarily apply identified CIP Reliability Standards to facilities that are not currently subject to those requirements. jbell on DSKJLSW7X2PROD with PROPOSALS SUPPORTING DOCUMENTATION DEMONSTRATING INCENTIVE ADHERENCE Topic Standard Documentation BES Cyber System Categorization .......... Management Controls .............................. CIP–002 77 ........ CIP–003 ........... Personnel and Training ............................ CIP–004 ........... Electronic Security Perimeters ................. CIP–005 ........... Physical Security of BES Cyber Systems CIP–006 ........... Systems Security Management ................ CIP–007 ........... Incident Reporting and Response ............ Backup and Recovery Plans .................... Configuration Change Management ........ CIP–008 ........... CIP–009 ........... CIP–010 ........... Information Protection .............................. Communications between Control Centers. CIP–011 ........... CIP–012 78 ........ List of the categorization of BES Cyber Systems included in the incentive. Senior Management approval of revised cyber security policies; updates to delegation procedures. Cyber security training program and quarterly reinforcement; personnel risk assessment program; access management program, and timely access revocation processes. Establishment of ESPs and management of electronic access points; remote access management. Physical security plans; visitor control program; PACS maintenance and testing procedures. Ports and services management; security patch management; malicious code prevention methods; security event monitoring; system access controls. Cyber security incident response plan, implementation, and testing procedures. System recovery plans, implementation, and testing procedures. System baseline configurations; configuration monitoring; vulnerability assessment processes. Information protection procedures; cyber asset reuse and disposal methods. Plans mitigating the risks posed by unauthorized disclosure and unauthorized modification of Real-time Assessment and Real-time monitoring data while being transmitted between any applicable Control Centers; and evidence of the associated security protections implemented and used. 76 The information requested is similar to the information FERC staff reviews during a NERC CIP Reliability Standards audit. VerDate Sep<11>2014 16:29 Feb 04, 2021 Jkt 253001 77 CIP–002 actions are not eligible for the incentive since it is a mandatory requirement for all BES assets. PO 00000 Frm 00012 Fmt 4702 Sfmt 4702 78 CIP–012–1: Communications between Control Centers will be subject to enforcement on July 1, 2022. E:\FR\FM\05FEP1.SGM 05FEP1 Federal Register / Vol. 86, No. 23 / Friday, February 5, 2021 / Proposed Rules 8321 SUPPORTING DOCUMENTATION DEMONSTRATING INCENTIVE ADHERENCE—Continued Topic Standard Documentation Supply Chain Risk Management .............. CIP–013 ........... Supply chain security risk management plan, implementation, and testing procedures. jbell on DSKJLSW7X2PROD with PROPOSALS 68. To demonstrate that a public utility has implemented the requirements for the Hub-Spoke incentive, we propose that the informational filing describe the reconfiguration and assets added to the communication paths to/from locations containing low impact BES Cyber Systems. For the first annual informational filing, we propose that the public utility provide documents demonstrating these changes. For any subsequent annual informational filing, the public utility would only need to provide an updated version of any supporting documentation if a change occurred for the previous informational filing, as well as information on any failure to maintain the communication paths, and any mitigating actions the public utility undertook to resolve the problem. b. NIST Framework Approach 69. We propose that the reporting requirements to implement proposed § 35.48(f) of its regulations for the NIST Framework Approach differ from those under the NERC CIP Incentives Approach. The Commission would review the informational filings to determine if the proposed changes meet the requirements for incentives by focusing on four areas: Acquisition and installation, system connectivity, security application, and relevance to entity monitoring/response actions. For each subsequent annual informational filing, the public utility would only need to provide an updated version of the supporting documentation showing any changes from the prior informational filing, as well as information on any period of time during the reported year where the public utility ceased to continuously implement specific requirements consistent with the Commission’s order approving the application. 70. Step 1 of the review process addresses the acquisition and installation of required network components (i.e., high-fidelity sensors) that meet the proposed security enhancements subject to incentives. The Commission would require a public utility to confirm that funds have been expended on the necessary equipment through documentation such as purchase orders, receipts, licensing agreements, and installation VerDate Sep<11>2014 16:29 Feb 04, 2021 Jkt 253001 documentation with specified time periods. 71. Step 2 of the review process addresses the attainment of necessary training and personnel for the implementation of the incentivized action. Training and additional personnel must be necessary and limited to the implementation of the cybersecurity equipment within the affected networks. The Commission would require a public utility to verify training and personnel actions through documentation such as third-party contractor agreements, training program curricula, and official job descriptions. 72. Step 3 of the review process addresses network and sensor node recognition optimization of system deployment, and strategic configuration. This step describes how the sensors are connected to a network and how they substantively improve the visibility and security of the affected networks. The public utility could demonstrate this network and sensor node recognition through such items as configuration files, system logs, configuration settings, and a description of its location on the affected network. 73. Step 4 of the review process addresses the incorporation of sensor nodes in the enterprise level incident monitoring and response plan. This step verifies that the incentivized action is being incorporated into monitoring and response actions to impact overall network security. The utility would need to attest that the information would be included in operational activities such as incident response plans, playbooks, and Standard Operating Procedures. 3. Confidentiality Considerations 74. We recognize that the Commission’s cybersecurity incentives policy must balance the need to maintain the confidentiality of cybersecurity systems and protocols with the need for transparency in rates when awarding incentive rates to public utilities for cybersecurity investments. The Commission balances these considerations through its confidential 79 and Critical Energy/ 79 Section 388.112 of the Commission’s regulations specifies that any person submitting a document to the Commission may request privileged treatment for some or all of the information contained in a particular document that PO 00000 Frm 00013 Fmt 4702 Sfmt 4702 Electric Infrastructure Information (CEII) filing regulations.80 These regulations recognize that intervenors in a Commission proceeding, such as a proceeding establishing incentive rates, may need access to information that the applicant believes should be withheld from disclosure to the general public, in order to participate effectively in the proceeding. Therefore, the Commission’s regulations provide for any person who is a participant in a proceeding or has filed a motion to intervene or notice of intervention to make a written request to the filer for a copy of the complete, non-public version of the document. 75. Accordingly, we propose that, if a public utility applying for incentive rate treatment under this rule is concerned that the information contained in an application for incentives could lead to the disclosure of confidential information or CEII related to its cybersecurity systems, the public utility could request protection of its information pursuant to these procedures. The Commission’s practice, however, is not to allow for the filing of an FPA section 205 rate application under seal. Under this proposal, to the extent an applicant seeks confidential treatment, we expect that the applicant’s request for such treatment will be specific and limited. If an applicant requests portions of the application be protected, we expect that the public portion of an application should contain sufficient information for ratepayers to judge the rate impact and scope of the proposed incentives, including the general approach adopted. The Commission will address such requests it claims is exempt from the mandatory public disclosure requirements of the Freedom of Information Act and that should be withheld from public disclosure. In particular, § 388.112(b)(2) sets forth procedures for filing and obtaining access to material that is filed as privileged in any proceeding to which a right to intervention exists and specifies that if a person files material as privileged in such proceeding, that person must include a proposed form of protective agreement with the filing, or identify a protective agreement that has already been filed in the proceeding that applies to the filed material. 18 CFR 388.112. 80 Section 388.113 governs the procedures for submitting, designating, handling, sharing, and disseminating CEII submitted to or generated by the Commission. Section 388.113(d)(1)(iii) provides for the person filing material as CEII in a proceeding to which a right to intervention exists to include a proposed form of protective agreement. 18 CFR 388.113. E:\FR\FM\05FEP1.SGM 05FEP1 8322 Federal Register / Vol. 86, No. 23 / Friday, February 5, 2021 / Proposed Rules for protection on a case by case basis.81 We request comments on the specific and limited types of information that would be appropriate for applicants to shield from public disclosure, and any other specific modifications or additions to the Commission’s generally applicable filing regulations that may be appropriate for the incentives filings proposed in this NOPR. V. Information Collection Statement 76. The information collection requirements contained in this NOPR are subject to review by the Office of Management and Budget (OMB) under section 3507(d) of the Paperwork Reduction Act of 1995.82 OMB’s regulations require approval of certain information collection requirements imposed by agency rules.83 Upon approval of a collection of information, OMB will assign an OMB control number and expiration date. Respondents subject to the filing requirements of this rule will not be penalized for failing to respond to these collections of information unless the collections of information display a valid OMB control number. 77. This NOPR will establish the Commission’s regulations and policy with respect to the mechanics and implementation of the Commission’s cybersecurity incentives policy and will require an annual report from the recipients of cybersecurity incentives in order to demonstrate compliance with the Commission’s cybersecurity incentives regulations and policy. 78. Interested persons may obtain information on the reporting requirements by contacting Ellen Brown, Office of the Executive Director, Federal Energy Regulatory Commission, 888 First Street NE, Washington, DC 20426 via email (DataClearance@ ferc.gov) or telephone ((202) 502–8663). 79. The Commission solicits comments on the Commission’s need for this information, whether the information will have practical utility, the accuracy of the burden estimates, ways to enhance the quality, utility, and clarity of the information to be collected or retained, and any suggested methods for minimizing respondents’ burden, including the use of automated information techniques. 80. Please send comments concerning the collection of information and the associated burden estimates to: Office of Information and Regulatory Affairs, Office of Management and Budget, 725 17th Street NW, Washington, DC 20503 [Attention: Desk Officer for the Federal Energy Regulatory Commission]. Due to security concerns, comments should be sent electronically to the following email address: oira_submission@ omb.eop.gov. Comments submitted to OMB should refer to OMB Control Nos. 81. Please submit a copy of your comments on the information collections to the Commission via the eFiling link on the Commission’s website at https://www.ferc.gov. If you are not able to file comments electronically, please send a copy of your comments to: Federal Energy Regulatory Commission, Secretary of the Commission, 888 First Street NE, Washington, DC 20426. Comments on the information collection that are sent to FERC should refer to RM21–3–000. 82. Title: Report of Cybersecurity Incentives Investment Activity. 83. Action: Proposed revision of collections of information in accordance with RM21–XX–000. 84. OMB Control Nos.: 1902–0248 (FERC–725B). 85. Respondents for this Rulemaking: Public Utilities that seek incentivebased rate treatment for cybersecurity projects. 86. Frequency of Information Collection: Annually beginning with the calendar year the Commission grants incentive-based rate treatment. 87. Necessity of Information: Required to obtain or retain benefits. 88. Internal Review: The Commission has reviewed the changes and has determined that such changes are necessary. These requirements conform to the Commission’s need for efficient information collection, communication, and management within the energy industry. The Commission has specific, objective support for the burden estimates associated with the information collection requirements. 89. The NERC Compliance Registry, as of October 02, 2020, identifies approximately 319 Transmission Owners in the U.S. that are subject to this proposed rulemaking. 90. The Commission estimates that the NOPR would affect the burden 84 and cost 85 as follows: PROPOSED CHANGES IN NOPR IN DOCKET NO. RM21–3–000 A B C D E F Area of modification Number of respondents Annual estimated number of responses per respondent Annual estimated number of responses (column B × column C) Average burden hours and cost per response Total estimated burden hours and total estimated cost (column D × column E) Report of Cybersecurity Incentives Investment Activity Additional filers of Report of Cybersecurity Incentives Investment Activity (Annually and Ongoing). Critical Infrastructure Protection Reliability Standards for FERC–725B (unchanged). jbell on DSKJLSW7X2PROD with PROPOSALS Total ................................................................. 20 1 20 80 hours; $6,640 ............ 1,600 hours; $132,800. 223,875 1 223,875 9.13 hours; $757.44 ....... 2,043,026 hours; $169,571,158. ........................ ........................ 223,895 ......................................... 2,044,626 hours; $169,703,958. 91. For the purposes of estimating burden in this NOPR, in the table above, we conservatively estimate annual 81 An applicant or any other person may object to disclosure generally or to a particular requester, and in such cases the non-public document will not be provided to the requester until ordered by the Commission or a decisional authority. 18 CFR 388.112(b)(2)(iv), 388.113(g)(4). 82 44 U.S.C. 3507(d). VerDate Sep<11>2014 16:29 Feb 04, 2021 Jkt 253001 numbers of the different possible cybersecurity incentive requests as similar to the historical high 83 5 CFR 1320.11. is the total time, effort, or financial resources expended by persons to generate, maintain, retain, or disclose or provide information to or for a Federal agency. For further explanation of what is included in the information collection burden, refer to 5 CFR 1320.3. 84 ‘‘Burden’’ PO 00000 Frm 00014 Fmt 4702 Sfmt 4702 experienced for incentives Orders issued under Section 219. For example, to date, the Commission has received 85 Commission staff estimates that respondents’ hourly wages (including benefits) are comparable to those of FERC employees. Therefore, the hourly cost used in this analysis is $83.00 ($172,329 per year). E:\FR\FM\05FEP1.SGM 05FEP1 Federal Register / Vol. 86, No. 23 / Friday, February 5, 2021 / Proposed Rules approximately 110 incentive requests since Order No. 679 was issued in 2006, and has issued an average of 8 incentives Orders per year, with a single year high of 21 incentive Orders issued. This estimate is consistent with our expectation that the cybersecurity incentives are likely to attract significant interest from the industry. We seek comment on the estimates in the table above regarding the number of incentive requests. VI. Environmental Analysis 92. The Commission is required to prepare an Environmental Assessment or an Environmental Impact Statement for any action that may have a significant adverse effect on the human environment.86 We conclude that neither an Environmental Assessment nor an Environmental Impact Statement is required for this proposed rule under § 380.4(a)(15) of the Commission’s regulations, which provides a categorical exemption for approval of actions under FPA sections 205 and 206 relating to the filing of schedules containing all rates and charges for the transmission or sale of electric energy subject to the Commission’s jurisdiction, plus the classification, practices, contracts, and regulations that affect rates, charges, classification, and services.87 jbell on DSKJLSW7X2PROD with PROPOSALS VII. Regulatory Flexibility Act 93. The Regulatory Flexibility Act of 1980 88 generally requires a description and analysis of proposed and final rules that will have significant economic impact on a substantial number of small entities. The Small Business Administration (SBA) sets the threshold for what constitutes a small business. Under SBA’s size standards,89 Transmission owners all fall under the category of Electric Bulk Power Transmission and Control (NAICS code 221121), with a size threshold of 500 employees (including the entity and its associates).90 94. We estimate that 319 transmission owners are reported in the NERC registry. Using the list of Transmission Owners from the NERC Registry (dated October 2, 2020), we estimate that approximately 6% of those entities may file for incentives. 86 Regulations Implementing the National Environmental Policy Act of 1969, Order No. 486, 52 FR 47897 (Dec. 17, 1987), FERC Stats. & Regs. Preambles 1986–1990 ¶ 30,783 (1987) (cross referenced at 41 FERC ¶ 61,284). 87 18 CFR 380.4(a)(15). 88 5 U.S.C. 601–612. 89 13 CFR 121.201 90 The threshold for the number of employees indicates the maximum allowed for a concern and its affiliates to be considered small. VerDate Sep<11>2014 16:29 Feb 04, 2021 Jkt 253001 95. We estimate additional annual costs associated with the NOPR (as shown in the table above) of: • $6,640 per filer for 20 new filers. • These costs are only incurred on a voluntary basis. 96. Therefore, the estimated additional annual cost per entity ranges from $0 to $132,800. According to SBA guidance, the determination of significance of impact ‘‘should be seen as relative to the size of the business, the size of the competitor’s business, the number of filers received annually (20), and the impact this regulation has on larger competitors.’’ 91 We do not consider the estimated cost to be a significant economic impact. As a result, we certify that the proposals in this NOPR will not have a significant economic impact on a substantial number of small entities. VIII. Comment Procedures 97. The Commission invites interested persons to submit comments on the matters and issues proposed in this notice to be adopted, including any related matters or alternative proposals that commenters may wish to discuss. Comments are due April 6, 2021. Also, reply comments are due May 6, 2021. Comments must refer to Docket No. RM20–3–000, and must include the commenter’s name, the organization they represent, if applicable, and their address in their comments. 98. The Commission encourages comments to be filed electronically via the eFiling link on the Commission’s website at https://www.ferc.gov. The Commission accepts most standard word processing formats. Documents created electronically using word processing software should be filed in native applications or print-to-PDF format and not in a scanned format. Commenters filing electronically do not need to make a paper filing. 99. Commenters that are not able to file comments electronically may mail or hand-deliver an original of their comments. Mailed comments should be addressed to: Federal Energy Regulatory Commission, Secretary of the Commission, 888 First Street NE, Washington, DC 20426. Hand-delivered comments should be delivered to: Federal Energy Regulatory Commission, 12225 Wilkins Avenue, Rockville, Maryland 20852. All comments will be placed in the Commission’s public files and may be viewed, printed, or downloaded remotely as described in 91 U.S. Small Business Administration, A Guide for Government Agencies How to Comply with the Regulatory Flexibility Act, at 18 (May 2012), https:// www.sba.gov/sites/default/files/advocacy/rfaguide_ 0512_0.pdf. PO 00000 Frm 00015 Fmt 4702 Sfmt 4702 8323 the Document Availability section below. Commenters on this proposal are not required to serve copies of their comments on other commenters. IX. Document Availability 100. In addition to publishing the full text of this document in the Federal Register, the Commission provides all interested persons an opportunity to view and/or print the contents of this document via the internet through the Commission’s Home Page (https:// www.ferc.gov). At this time, the Commission has suspended access to the Commission’s Public Reference Room due to the President’s March 13, 2020 proclamation declaring a National Emergency concerning the Novel Coronavirus Disease (COVID–19). 101. From the Commission’s Home Page on the internet, this information is available on eLibrary. The full text of this document is available on eLibrary in PDF and Microsoft Word format for viewing, printing, and/or downloading. To access this document in eLibrary, type the docket number excluding the last three digits of this document in the docket number field. 102. User assistance is available for eLibrary and the Commission’s website during normal business hours from the Commission’s Online Support at 202– 502–6652 (toll free at 1–866–208–3676) or email at ferconlinesupport@ferc.gov, or the Public Reference Room at (202) 502–8371, TTY (202) 502–8659. Email the Public Reference Room at public.referenceroom@ferc.gov. List of Subjects in 18 CFR Part 35 Electric power rates, Electric utilities, Reporting and recordkeeping requirements. By direction of the Commission. Chairman Danly and Commissioner Glick are concurring with a joint separate statement attached. Commissioner Clements is not participating. Issued: December 17, 2020. Kimberly D. Bose, Secretary. In consideration of the foregoing, the Commission is proposing to amend part 35, chapter I, title 18, Code of Federal Regulations, as follows. PART 35—FILING OF RATE SCHEDULES AND TARIFFS 1. The authority citation for part 35 continues to read as follows: ■ Authority: 16 U.S.C. 791a–825r, 2601– 2645; 31 U.S.C. 9701; 42 U.S.C. 7101–7352. 2. Section 35.48 is added to read as follows: ■ E:\FR\FM\05FEP1.SGM 05FEP1 8324 Federal Register / Vol. 86, No. 23 / Friday, February 5, 2021 / Proposed Rules Subpart K—Cybersecurity Investment Provisions jbell on DSKJLSW7X2PROD with PROPOSALS § 35.48 Cybersecurity investment. (a) Purpose. This section establishes rules for incentive-based rate treatments for voluntarily making cybersecurity investments by a public utility as described in this subpart. (b) Incentive-based rate treatments for cybersecurity investment. The Commission will authorize incentivebased rate treatments for a public utility that makes cybersecurity investments under this subpart that materially enhance the cybersecurity posture of the Bulk-Power System by enhancing the applicants’ cybersecurity posture substantially above levels required by Critical Infrastructure Protection Reliability Standards, provided that the proposed incentive is just and reasonable and not unduly discriminatory or preferential. A public utility may request one or both of the following incentive approaches for those eligible cybersecurity investments: (1) Critical Infrastructure Protection Incentive Approach. A public utility may receive incentive rate treatment for voluntarily applying Critical Infrastructure Protection Reliability Standards to bulk electric system facilities that are not currently subject to those requirements. A public utility will receive a rebuttable presumption that the investments made pursuant to this Critical Infrastructure Protection Incentive Approach materially enhance the cybersecurity posture of the BulkPower System to merit an incentive for such cybersecurity investments. A public utility may receive incentive rate treatment for the investments as follows: (i) Increasing the Critical Infrastructure Protection Reliability Standard security controls for facilities identified as low or medium impact bulk electric system Cyber Systems by applying the requirements for medium or high impact systems to low impact systems, and/or the requirements for high impact systems to medium impact systems; or (ii) Ensuring all external routable connectivity to and from the low impact system connect to a high or medium impact bulk electric system Cyber System and the cyber communication security controls required for the medium or high impact bulk electric system Cyber System must be implemented on the low impact system. (2) National Institute of Standards and Technology Framework Approach. A public utility may receive incentive rate treatment for implementing certain security controls, identified from time to time through a Commission issuance, VerDate Sep<11>2014 16:29 Feb 04, 2021 Jkt 253001 that are included in the National Institute of Standards and Technology Framework. (c) Types of incentive-based rate treatments for cybersecurity investment. For purposes of paragraph (b) of this section, incentive-based rate treatment shall be for those eligible cybersecurity investments and means any of the following: (1) An increase in rate of return on equity of 200 basis points; (2) Deferred cost recovery; or (3) Any other incentives approved by the Commission, pursuant to the requirements of this section that are deemed to be just and reasonable and not unduly discriminatory or preferential. (d) Incentive duration. (1) A return on equity incentive rate treatment approved pursuant to this section may last the earlier of: (i) The depreciation life of the underlying asset; (ii) 10 years from when the cybersecurity improvements enter service; (iii) when the investments or activities that serve as the basis of that incentive become mandatory pursuant to a Reliability Standard approved by the Commission; (iv) or when the public utility no longer meets the requirements for receiving the incentive. (2) A deferred regulatory asset whose costs are typically expensed should be amortized over a five-year period. (e) Incentive Applications. For the purpose of paragraphs (b) and (c) of this section, a public utility’s request for one or more incentive based-rate treatments, to be made in a filing pursuant to section 205 of the Federal Power Act, must include a detailed explanation of the proposed rate treatment and include the following information: (1) For applications under the Critical Infrastructure Protection Incentive Approach: (i) The Bulk Electric System assets for which the public utility is requesting the incentive; (ii) The geographical location of the Bulk Electric System assets; (iii) The function the Bulk Electric System assets support; (iv) The incentive method the public utility is requesting for each of the Bulk Electric System assets; (v) The current and new impact ratings of the Bulk Electric System assets if they change because of the incentive; and (vi) A list of the Bulk Electric System Cyber Systems associated with each of the Bulk Electric System assets including details on their use. PO 00000 Frm 00016 Fmt 4702 Sfmt 4702 (2) For applications under the National Institute of Standards and Technology Framework Approach: (i) A description of the public utility’s current cybersecurity posture; (ii) A description of the public utility’s desired cybersecurity posture; (iii) A description of the quantified risk factors being addressed through the proposed incentive actions. (3) For applications requesting an increase in rate of return on equity of 200 basis points: (i) The anticipated cost of the capital investment; and (ii) The identity of the Commission jurisdictional rate schedule(s) under which it will recover the increased return on equity. (4) For applications requesting deferred cost recovery: (i) A description of any expenses, including whether the expenses are: (A) Expenses associated with thirdparty provision of hardware, software, and computing networking services; (B) Expenses for training to implement new cybersecurity enhancements; or (C) Other transition expenses, such as risk assessments by third parties or internal system reviews, and initial responses to findings of such assessments. (ii) Estimates of the cost of such expenses; (iii) When the costs are expected to be incurred; (iv) A narrative explanation of how the expenses meet the requested Critical Infrastructure Protection Incentive Approach or National Institute of Standards and Technology Framework Approach. (f) Reporting requirements. A public utility that has received cybersecurity incentives under this section must, within 120 days of completion of upgrades for which it receives incentives, make an informational filing and must make subsequent informational filings annually thereafter detailing the specific investments that were made pursuant to the Commission’s approval and the corresponding FERC account used. An incentive recipient must describe the parts of its network that it upgraded in addition to the nature and cost of the various capital investments. For incentives where the Commission allows deferral of expenses, annual informational filings should describe such expenses in sufficient detail to demonstrate that such expenses are specifically related to the cybersecurity investment granted incentives and not for ongoing services including system E:\FR\FM\05FEP1.SGM 05FEP1 jbell on DSKJLSW7X2PROD with PROPOSALS Federal Register / Vol. 86, No. 23 / Friday, February 5, 2021 / Proposed Rules maintenance, surveillance, and other labor costs. (1) A public utility that receives incentive-based rate treatment under the Critical Infrastructure Protection Incentive Approach must also describe in its informational filings implementation of the enhanced security controls, as applicable, in all the topics covered by the Critical Infrastructure Protection Reliability Standards. For the first informational filing, the public utility must provide documentation to demonstrate voluntary application of identified Critical Infrastructure Protection Reliability Standards to facilities that are not currently subject to those requirements. For subsequent annual informational filings, the public utility must provide an updated version of the supporting documentation showing any changes from the prior informational filing as well as information on any period of time during the reported year where the public utility ceased to voluntarily apply identified Critical Infrastructure Protection Reliability Standards to facilities that are not currently subject to those requirements. (2) A public utility that receives incentive-based rate treatments under the National Institute of Standards and Technology Framework Approach must also include information that demonstrates: (i) The acquisition and installation of required network components, including confirmation that funds have been expended on the necessary equipment through documentation such as purchase orders, receipts, licensing agreements, and installation documentation with specified time periods; (ii) Attainment of necessary training and personnel, including documentation such as third-party contractor agreements, training program curricula, and official job descriptions; (iii) Network and sensor node recognition optimization through such items as configuration files, system logs, configuration settings, and a description of its location on the affected network; (iv) Incorporation of sensor nodes in the enterprise level incident monitoring and response plan including attesting that the information would be included in operational activities such as incident response plans, playbooks, and Standard Operating Procedures. VerDate Sep<11>2014 16:29 Feb 04, 2021 Jkt 253001 DEPARTMENT OF ENERGY DEPARTMENT OF LABOR Federal Energy Regulatory Commission Office of the Secretary 8325 Cybersecurity Incentives DANLY, Chairman, and GLICK, Commissioner, concurring: 1. Threats to the cybersecurity of the bulk power system are numerous and growing. Ensuring that the system is adequately protected against those threats is an issue of national importance and one that must remain a priority of this Commission. Accordingly, we support this notice of proposed rulemaking (NOPR) as a means for soliciting further comments on whether this particular incentivesbased approach is a just and reasonable and not unduly discriminatory or preferential approach to improving public utilities’ cybersecurity posture. 2. We write separately to highlight two general issues that we believe require additional attention. The first issue is whether the Commission can better address cybersecurity threats by directing NERC to expand its critical infrastructure protection (CIP) standards to require some or all of the investments contemplated in this NOPR. Although we appreciate the appeal of an incentives-based approach, the importance of cybersecurity demands us to at least consider whether we should mandate the best practices contemplated in this NOPR rather than simply trying to induce public utilities to adopt them. 3. The second issue goes to the heart of what the NOPR intends to achieve— whether public utilities are not adopting the contemplated measures because the existing financial incentives are insufficient. We encourage commenters to address whether—and, if so, why— additional measures, such as an elevated ROE or deferred cost recovery, are necessary to incentivize public utilities to adopt additional cybersecurity measures. For these reasons, we respectfully concur. James P. Danly, Chairman. Richard Glick, Commissioner. [FR Doc. 2021–01986 Filed 2–4–21; 8:45 am] BILLING CODE 6717–01–P PO 00000 Frm 00017 Fmt 4702 Sfmt 4702 29 CFR Part 10 Wage and Hour Division 29 CFR Parts 516, 531, 578, 579, and 580 RIN 1235–AA21 Tip Regulations Under the Fair Labor Standards Act (FLSA): Delay of Effective Date Wage and Hour Division, Department of Labor. ACTION: Proposed delay of effective date. AGENCY: In accordance with the Presidential directive as expressed in the memorandum of January 20, 2021 from the Assistant to the President and Chief of Staff, entitled ‘‘Regulatory Freeze Pending Review,’’ this action proposes to delay until April 30, 2021 the effective date of the rule entitled Tip Regulations Under the Fair Labor Standards Act (‘‘Tip Rule’’), published in the Federal Register on December 30, 2020. The rule’s current effective date is March 1, 2021. WHD seeks comments on this proposed delay, which would allow the Wage and Hour Division additional opportunity for review and consideration of the new rule. DATES: Submit written comments on or before February 17, 2021. ADDRESSES: You may submit comments, identified by Regulatory Information Number (RIN) 1235–AA21, by either of the following methods: Electronic Comments: Submit comments through the Federal eRulemaking Portal at https://www.regulations.gov. Follow the instructions for submitting comments. Mail: Address written submissions to Division of Regulations, Legislation, and Interpretation, Wage and Hour Division, U.S. Department of Labor, Room S– 3502, 200 Constitution Avenue NW, Washington, DC 20210. Instructions: Please submit only one copy of your comments by only one method. Commenters submitting file attachments on www.regulations.gov are advised that uploading text-recognized documents— i.e., documents in a native file format or documents which have undergone optical character recognition (OCR)— enable staff at the Department to more easily search and retrieve specific content included in your comment for consideration. Anyone who submits a comment (including duplicate comments) should understand and expect that the comment will become a SUMMARY: E:\FR\FM\05FEP1.SGM 05FEP1

Agencies

[Federal Register Volume 86, Number 23 (Friday, February 5, 2021)]
[Proposed Rules]
[Pages 8309-8325]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2021-01986]


========================================================================
Proposed Rules
                                                Federal Register
________________________________________________________________________

This section of the FEDERAL REGISTER contains notices to the public of 
the proposed issuance of rules and regulations. The purpose of these 
notices is to give interested persons an opportunity to participate in 
the rule making prior to the adoption of the final rules.

========================================================================


Federal Register / Vol. 86, No. 23 / Friday, February 5, 2021 / 
Proposed Rules

[[Page 8309]]



DEPARTMENT OF ENERGY

Federal Energy Regulatory Commission

18 CFR Part 35

[Docket No. RM21-3-000]


Cybersecurity Incentives

AGENCY: Federal Energy Regulatory Commission, Department of Energy.

ACTION: Notice of Proposed Rulemaking.

-----------------------------------------------------------------------

SUMMARY: The Commission is proposing to revise its regulations to 
establish rules for incentive-based rate treatments for voluntary 
cybersecurity investments by a public utility for or in connection with 
the transmission or sale of electric energy subject to the jurisdiction 
of the Commission, and rates or practices affecting or pertaining to 
such rates for the purpose of ensuring the reliability of the Bulk-
Power System.

DATES: Comments are due April 6, 2021. Also, reply comments are due May 
6, 2021.

ADDRESSES: Comments, identified by docket number, may be filed 
electronically at https://www.ferc.gov in acceptable native applications 
and print-to-PDF, but not in scanned or picture format. For those 
unable to file electronically, comments may be filed by mail or may be 
hand-delivered. Mailed comments should be addressed to: Federal Energy 
Regulatory Commission, Secretary of the Commission, 888 First Street 
NE, Washington, DC 20426. Hand-delivered comments should be delivered 
to: Federal Energy Regulatory Commission, 12225 Wilkins Avenue, 
Rockville, Maryland 20852. The Comment Procedures Section of this 
document contains more detailed filing procedures.

FOR FURTHER INFORMATION CONTACT: 
Jessica L. Cockrell (Technical Information), Office of Energy Policy 
and Innovation, Federal Energy Regulatory Commission, 888 First Street 
NE, Washington, DC 20426, (202) 502-8190, [email protected]
Craig W. Barrett (Technical Information), Office of Energy 
Infrastructure Security, Federal Energy Regulatory Commission, 888 
First Street NE, Washington, DC 20426, (202) 502-8830, 
[email protected]
Andr[eacute]s L[oacute]pez Esquerra (Technical Information), Office of 
Electric Reliability, Federal Energy Regulatory Commission, 888 First 
Street NE, Washington, DC 20426, (202) 502-6128, [email protected]
Adam Batenhorst (Legal Information), Office of the General Counsel, 
Federal Energy Regulatory Commission, 888 First Street NE, Washington, 
DC 20426, (202) 502-6150, [email protected]

SUPPLEMENTARY INFORMATION: 

Table of Contents

 
                                                         Paragraph Nos.
 
I. Introduction......................................                  1
II. Background.......................................                  5
    A. Critical Infrastructure Protection Reliability                  5
     Standards.......................................
    B. NIST Framework................................                 10
    C. Transmission Incentives Notice of Inquiry and                  12
     Rulemaking......................................
    D. Cybersecurity Incentives Policy White Paper...                 14
III. Need for Reform.................................                 17
IV. Discussion.......................................                 20
    A. Cybersecurity Incentives Framework............                 20
    B. Applicable Cybersecurity Investments..........                 21
        1. NERC CIP Incentives Approach..............                 22
        2. NIST Framework Approach...................                 32
    C. Incentives for Cybersecurity Investments......                 38
        1. ROE Adder.................................                 38
        2. Regulatory Asset Incentive................                 40
        3. Other Types of Incentives.................                 47
    D. Application Process...........................                 48
        1. NERC CIP Incentives Approach..............                 50
        2. NIST Framework Approach...................                 54
        3. ROE Adder.................................                 57
        4. Regulatory Asset Incentive................                 58
    E. Implementation................................                 59
        1. Incentive Duration........................                 59
        2. Informational Filing and Verification.....                 61
        3. Confidentiality Considerations............                 74
V. Information Collection Statement..................                 76
VI. Environmental Analysis...........................                 92
VII. Regulatory Flexibility Act......................                 93
VIII. Comment Procedures.............................                 97
IX. Document Availability............................                100
 


[[Page 8310]]

I. Introduction

    1. In this Notice of Proposed Rulemaking (NOPR), the Federal Energy 
Regulatory Commission (Commission) proposes under sections 205 and 206 
of the Federal Power Act (FPA) \1\ to establish rules for incentive-
based rate treatments for voluntary cybersecurity investments \2\ by a 
public utility.\3\ These rules would provide cybersecurity incentives 
to public utilities that make certain cybersecurity investments that go 
above and beyond the requirements of the CIP Reliability Standards,\4\ 
and materially enhance the cybersecurity posture of the Bulk-Power 
System \5\ by enhancing the applicants' cybersecurity posture 
substantially above levels required by CIP Reliability Standards, to 
the benefit of ratepayers.
---------------------------------------------------------------------------

    \1\ 16 U.S.C. 824d, 824e.
    \2\ Voluntary cybersecurity investments refer to cybersecurity 
investments not required to meet mandatory North American Electric 
Reliability Corporation (NERC) Critical Infrastructure Protection 
Reliability Standards (CIP Reliability Standards).
    \3\ The proposed incentive-based treatments for cybersecurity 
investments would also be available to non-public utilities to the 
extent that they have Commission-jurisdictional rates.
    \4\ Mandatory Reliability Standards for Critical Infrastructure 
Protection, Order No. 706, 73 FR 7367 (Feb. 7, 2008),122 FERC ] 
61,040, at P 1, order on reh'g and clarification, Order No. 706-A, 
123 FERC ] 61,174 (2008), order on clarification, Order No. 706-B, 
74 FR 12544 (Mar. 25, 2009), 126 FERC ] 61,229, order denying 
clarification, Order No. 706-C, 74 FR 30067 (June 24, 2009), 127 
FERC ] 61,273 (2009).
    \5\ Bulk-Power System is defined by FPA section 215 as 
facilities and control systems necessary for operating an 
interconnected electric energy transmission network (or any portion 
thereof), and electric energy from generation facilities needed to 
maintain transmission system reliability. The term does not include 
facilities used in the local distribution of electric energy. 16 
U.S.C. 825o(a).
---------------------------------------------------------------------------

    2. First, we propose to allow public utilities making certain 
cybersecurity investments to request an increase in the rate of return 
on equity (ROE) applicable to those capital investments. Such 
cybersecurity investments would include investments following specific 
CIP Reliability Standards and/or standards and guidelines from the 
National Institute of Standards and Technology (NIST) \6\ Framework.
---------------------------------------------------------------------------

    \6\ NIST is a part of the U.S. Department of Commerce that 
advances measurement science, standards, and technology. It has 
developed the voluntary Framework for Improving Critical 
Infrastructure Cybersecurity (NIST Framework) to ``address and 
manage cybersecurity risk in a cost-effective way based on business 
and organizational needs without placing additional regulatory 
requirements on businesses.'' NIST, Framework for Improving Critical 
Infrastructure Cybersecurity, at v (Apr. 16, 2018), https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf.
---------------------------------------------------------------------------

    3. Second, we propose to allow a public utility to seek deferred 
cost recovery for certain cybersecurity investments. We propose that 
only expenses for activities that go above and beyond actions required 
to comply with the CIP Reliability Standards be eligible for these 
incentives. Therefore, expenses incurred to comply with mandatory CIP 
Reliability Standards that a public utility incurs on a regular or 
ongoing basis, or that are incurred prior to the incentive request, 
would not be eligible for such regulatory asset treatment. We propose 
to allow deferred cost recovery for three categories of expenses: (1) 
Expenses associated with third-party provision of hardware, software, 
and computing networking services; (2) expenses for training to 
implement new cybersecurity enhancements undertaken pursuant to this 
rule; and (3) other implementation expenses, such as risk assessments 
\7\ by third parties or internal system reviews and initial responses 
to findings of such assessments. In all such cases, eligible costs 
would be limited to costs associated with implementing cybersecurity 
upgrades and would not include ongoing costs including system 
maintenance, surveillance, and other labor costs, either in the form of 
employee salaries or third-party service contracts. Furthermore, we 
propose that the deferred regulatory assets whose costs are typically 
expensed should be amortized over a five-year period.
---------------------------------------------------------------------------

    \7\ NIST, Framework for Improving Critical Infrastructure 
Cybersecurity, Version 1.1, at 26 (Apr. 16, 2018), https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf.
---------------------------------------------------------------------------

    4. Finally, under the proposed regulations, a public utility 
seeking one or more incentive based-rate treatments proposed in the 
NOPR must make a filing for Commission approval pursuant to FPA section 
205 and receive such approval prior to implementing the proposed 
incentives in its Commission-jurisdictional rates.

II. Background

A. Critical Infrastructure Protection Reliability Standards

    5. On August 8, 2005, Congress enacted the Energy Policy Act of 
2005.\8\ The Energy Policy Act of 2005 added a new section 215 to the 
FPA,\9\ which requires a Commission-certified Electric Reliability 
Organization to develop mandatory and enforceable Reliability 
Standards,\10\ including requirements for cybersecurity protection, 
which are subject to Commission review and approval. Once approved, the 
Reliability Standards may be enforced by the Electric Reliability 
Organization subject to Commission oversight, or the Commission can 
independently enforce Reliability Standards.
---------------------------------------------------------------------------

    \8\ Energy Policy Act of 2005, Pub. L. 109-58, secs. 1261 et 
seq., 119 Stat. 594 (2005).
    \9\ 16 U.S.C. 824o.
    \10\ FPA section 215 defines Reliability Standard as a 
requirement, approved by the Commission, to provide for reliable 
operation of existing bulk-power system facilities, including 
cybersecurity protection, and the design of planned additions or 
modifications to such facilities to the extent necessary to provide 
for reliable operation of the Bulk-Power System. However, the term 
does not include any requirement to enlarge such facilities or to 
construct new transmission capacity or generation capacity. Id. at 
824o(a)(3).
---------------------------------------------------------------------------

    6. On February 3, 2006, the Commission issued Order No. 672,\11\ 
implementing FPA section 215. The Commission subsequently certified 
NERC as the Electric Reliability Organization. The Reliability 
Standards developed by NERC become mandatory and enforceable after 
Commission approval and apply to users, owners, and operators of the 
Bulk-Power System, as set forth in each Reliability Standard.\12\ The 
CIP Reliability Standards require entities to comply with specific 
requirements to safeguard critical cyber assets. These standards are 
results-based and do not specify a technology or method to achieve 
compliance, instead leaving it up to the entity to decide how best to 
comply.
---------------------------------------------------------------------------

    \11\ Rules Concerning Certification of the Elec. Reliability 
Org.; and Procedures for the Establishment, Approval, and Enf't of 
Elec. Reliability Standards, Order No. 672, 71 FR 8661 (Feb. 17, 
2006), 114 FERC ] 61,104, order on reh'g, Order No. 672-A, 71 FR 
19814 (Apr. 28, 2006), 114 FERC ] 61,328 (2006).
    \12\ NERC uses the term ``registered entity'' to identify users, 
owners, and operators of the Bulk-Power System responsible for 
performing specified reliability functions with respect to NERC 
Reliability Standards. See, e.g., Version 4 Critical Infrastructure 
Protection Reliability Standards, Order No. 761, 77 FR 24594 (Apr. 
25, 2012), 139 FERC ] 61,058, at P 46, order denying clarification 
and reh'g, 140 FERC ] 61,109 (2012). Within the NERC Reliability 
Standards are various subsets of entities responsible for performing 
various specified reliability functions. We collectively refer to 
these as ``entities.''
---------------------------------------------------------------------------

    7. On January 18, 2008, the Commission issued Order No. 706,\13\ 
approving the initial eight CIP Reliability Standards, CIP version 1 
Standards, submitted by NERC. Subsequently, the Commission has approved 
multiple versions of the CIP Reliability Standards submitted by NERC, 
partly to address the evolving nature of cyber-related threats to the 
Bulk-Power System. On November 22, 2013, the Commission issued Order 
No. 791,\14\ approving CIP version 5 Standards, the last major revision 
to the CIP Reliability Standards. The CIP version 5 Standards implement 
a tiered approach to categorize assets, identifying them as high, 
medium, or

[[Page 8311]]

low risk to the operation of the Bulk Electric System (BES) \15\ if 
compromised. High impact systems include large control centers. Medium 
impact systems include smaller control centers, ultra-high voltage 
transmission, and large substations and generating facilities. The 
remainder of the BES Cyber Systems \16\ are categorized as low impact 
systems. Most requirements in the CIP Reliability Standards apply to 
high and medium impact systems; however, a technical controls 
requirement in CIP-003, described below, applies only to low impact 
systems. Since 2013, the Commission has approved new and modified CIP 
Reliability Standards that address specific issues such as supply chain 
risk management, cyber incident reporting, communications between 
control centers, and the physical security of critical transmission 
facilities.\17\
---------------------------------------------------------------------------

    \13\ Order No. 706, 122 FERC ] 61,040 at P 1.
    \14\ Version 5 Critical Infrastructure Protection Reliability 
Standards, Order No. 791, 78 FR 72755 (Dec. 13, 2013), 145 FERC ] 
61,160 (2013), order on clarification and reh'g, Order No. 791-A, 
146 FERC ] 61,188 (2014).
    \15\ In general, NERC defines BES to include all Transmission 
Elements operated at 100 kV or higher and Real Power and Reactive 
Power resources connected at 100 kV or higher. This does not include 
facilities used in the local distribution of electric energy. See 
NERC, Bulk Electric System Definition Reference Document, Version 3, 
at page iii (August 2018). In Order No. 693, the Commission found 
that NERC's definition of BES is narrower than the statutory 
definition of Bulk-Power System. The Commission decided to rely on 
the NERC definition of BES to provide certainty regarding the 
applicability of Reliability Standards to specific entities. See 
Mandatory Reliability Standards for the Bulk-Power System, Order No. 
693, 72 FR 16415 (Apr. 4, 2007), 118 FERC ] 61,218, at PP 75, 79, 
491, order on reh'g, Order No. 693-A, 72 FR 49717 (July 25, 2007), 
120 FERC ] 61,053 (2007).
    \16\ NERC defines BES Cyber System as ``[o]ne or more BES Cyber 
Assets logically grouped by a responsible entity to perform one or 
more reliability tasks for a functional entity.'' NERC, Glossary of 
Terms Used in NERC Reliability Standards, at 5 (2020), https://www.nerc.com/files/glossary_of_terms.pdf (NERC Glossary of Terms). 
NERC defines BES Cyber Asset as
    A Cyber Asset that if rendered unavailable, degraded, or misused 
would, within 15 minutes of its required operation, misoperation, or 
non-operation, adversely impact one or more Facilities, systems, or 
equipment, which, if destroyed, degraded, or otherwise rendered 
unavailable when needed, would affect the reliable operation of the 
Bulk Electric System. Redundancy of affected Facilities, systems, 
and equipment shall not be considered when determining adverse 
impact. Each BES Cyber Asset is included in one or more BES Cyber 
Systems.
     Id. at 4.
    \17\ See, e.g., Order No. 791, 78 FR 72755; Revised Critical 
Infrastructure Protection Reliability Standards, Order No. 822, 81 
FR 4177 (Jan. 26, 2016), 154 FERC ] 61,037, reh'g denied, Order No. 
822-A, 156 FERC ] 61,052 (2016); Revised Critical Infrastructure 
Protection Reliability Standard CIP-003-7--Cyber Security--Security 
Management Controls, Order No. 843, 163 FERC ] 61,032 (2018).
---------------------------------------------------------------------------

    8. The CIP Reliability Standards currently consist of 12 standards 
specifying a set of requirements that entities must follow to ensure 
the cyber and physical security of the Bulk-Power System. There are 10 
currently effective cybersecurity standards and one cybersecurity 
standard that has been approved by the Commission and will become 
enforceable on July 1, 2022. There is also one physical security 
standard, which is not the subject of this NOPR:\18\
---------------------------------------------------------------------------

    \18\ CIP-014-2--Physical Security: requires entities to identify 
and protect transmission stations and transmission substations, and 
their associated primary control centers, that, if rendered 
inoperable or damaged as a result of a physical attack, could result 
in instability, uncontrolled separation, or cascading within an 
interconnection.
---------------------------------------------------------------------------

     CIP-002-5.1a Bulk Electric System Cyber System 
Categorization: requires entities to identify and categorize BES Cyber 
Assets for the application of cyber security requirements commensurate 
with the adverse impact that loss, compromise, or misuse of those BES 
Cyber Systems could have on the reliable operation of the BES.
     CIP-003-8 Security Management Controls: Requires entities 
to specify consistent and sustainable security management controls that 
establish responsibility and accountability to protect BES Cyber 
Systems against compromise that could lead to misoperation or 
instability in the BES.
     CIP-004-6 Personnel and Training: Requires entities to 
minimize the risk against compromise that could lead to misoperation or 
instability in the BES from individuals accessing BES Cyber Systems by 
requiring an appropriate level of personnel risk assessment, training, 
and security awareness in support of protecting BES Cyber Systems.
     CIP-005-6 Electronic Security Perimeter(s): Requires 
entities to manage electronic access to BES Cyber Systems by specifying 
a controlled Electronic Security Perimeter in support of protecting BES 
Cyber Systems against compromise that could lead to misoperation or 
instability in the BES.
     CIP-006-6 Physical Security of Bulk Electric System Cyber 
Systems: Requires entities to manage physical access to BES Cyber 
Systems by specifying a physical security plan in support of protecting 
BES Cyber Systems against compromise that could lead to misoperation or 
instability in the BES.
     CIP-007-6 System Security Management: Requires entities to 
manage system security by specifying select technical, operational, and 
procedural requirements in support of protecting BES Cyber Systems 
against compromise that could lead to misoperation or instability in 
the BES.
     CIP-008-5 Incident Reporting and Response Planning: \19\ 
Requires entities to mitigate the risk to the reliable operation of the 
BES as the result of a cybersecurity incident by specifying incident 
response requirements.
---------------------------------------------------------------------------

    \19\ An update to CIP-008-6 Reliability Standard will become 
enforceable on January 1, 2021.
---------------------------------------------------------------------------

     CIP-009-6 Recovery Plans for Bulk Electric System Cyber 
Systems: Requires entities to recover reliability functions performed 
by BES Cyber Systems by specifying recovery plan requirements in 
support of the continued stability, operability, and reliability of the 
BES.
     CIP-010-3 Configuration Change Management and 
Vulnerability Assessments: Requires entities to prevent and detect 
unauthorized changes to BES Cyber Systems by specifying configuration 
change management and vulnerability assessment requirements in support 
of protecting BES Cyber Systems from compromise that could lead to 
misoperation or instability in the BES.
     CIP-011-2 Information Protection: Requires entities to 
prevent unauthorized access to BES Cyber System Information by 
specifying information protection requirements in support of protecting 
BES Cyber Systems against compromise that could lead to misoperation or 
instability in the BES.
     CIP-012-1 Communications between Control Centers: \20\ 
Requires entities to protect the confidentiality and integrity of Real-
time Assessment and Real-time monitoring data transmitted between 
Control Centers.
---------------------------------------------------------------------------

    \20\ CIP-012-1: Communications between Control Centers will be 
subject to enforcement by July 1, 2022.
---------------------------------------------------------------------------

     CIP-013-1 Supply Chain Risk Management: Requires entities 
to mitigate cybersecurity risks to the reliable operation of the BES by 
implementing security controls for supply chain risk management of BES 
Cyber Systems.
    9. The CIP Reliability Standards, viewed as a whole, implement a 
defense-in-depth approach to protecting the security of BES Cyber 
Systems at all impact levels.\21\ The CIP Reliability Standards are 
objective-based and allow entities to choose compliance approaches best 
tailored to their systems.\22\
---------------------------------------------------------------------------

    \21\ Order No. 822, 154 FERC ] 61,037 at 32.
    \22\ Order No. 706, 122 FERC ] 61,040 at 72.
---------------------------------------------------------------------------

B. NIST Framework

    10. The Cybersecurity Enhancement Act of 2014 (Cybersecurity Act) 
\23\ updated the role of the NIST to include identifying and developing 
cybersecurity risk frameworks for voluntary use by critical 
infrastructure owners and operators. Under the Cybersecurity Act, NIST 
must identify a

[[Page 8312]]

prioritized, flexible, repeatable, performance-based, and cost-
effective approach, including information security measures and 
controls, that may be voluntarily adopted by owners and operators of 
critical infrastructure to help them identify, assess, and manage cyber 
risks.\24\
---------------------------------------------------------------------------

    \23\ 15 U.S.C. 272(e)(1)(A)(i).
    \24\ 15 U.S.C. 272 (e)(1)(A)(iii). Security Controls is defined 
as follows: The management, operational, and technical controls 
(i.e., safeguards or countermeasures) prescribed for an information 
system to protect the confidentiality, integrity, and availability 
of the system and its information. NIST, Computer Security Resource 
Center Glossary, https://csrc.nist.gov/glossary/term/security_controls.
---------------------------------------------------------------------------

    11. As noted above, NIST implements the Cybersecurity Act through 
its NIST Framework,\25\ which provides a common organizing structure 
for multiple approaches to cybersecurity by assembling standards, 
guidelines, and practices that are currently working effectively in 
industry.\26\ The Cybersecurity Framework incorporates voluntary 
consensus standards and industry best practices to the fullest extent 
possible.\27\ The NIST Framework consists of three parts: Framework 
Core; Implementation Tiers; and Framework Profiles.\28\ The Framework 
Core is a set of cybersecurity activities, outcomes, and informative 
references that are common across sectors and critical infrastructure. 
Elements of the Framework Core provide detailed guidance for developing 
individual Framework Profiles.\29\ Through use of Framework Profiles, 
the NIST Framework is designed to help an organization to align and 
prioritize its cybersecurity activities with its business/mission 
requirements, risk tolerances, and resources. The Implementation Tiers 
provide a mechanism for an organization to view and understand the 
characteristics of its approach to managing cybersecurity risk, which 
is designed to help in prioritizing and achieving cybersecurity 
objectives.\30\ The Framework Core consists of five concurrent and 
continuous Functions--Identify, Protect, Detect, Respond, and Recover. 
When considered together, these Functions provide a high-level, 
strategic view of the lifecycle of an organization's management of 
cybersecurity risk.\31\
---------------------------------------------------------------------------

    \25\ Version 1.0 of the NIST Framework was released in 2014, and 
subsequently replaced with version 1.1 in 2018.
    \26\ NIST, Framework for Improving Critical Infrastructure 
Cybersecurity, Version 1.1, at v (Apr. 16, 2018), https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf.
    \27\ See Executive Order No. 13636, Improving Critical 
Infrastructure Cybersecurity, 78 FR 11737 (Feb. 19, 2013).
    \28\ NIST Framework at v.
    \29\ Id.
    \30\ Id.
    \31\ Id. at 3.
---------------------------------------------------------------------------

C. Transmission Incentives Notice of Inquiry and Rulemaking

    12. On March 21, 2019, the Commission issued a Notice of Inquiry 
seeking comment on the scope and implementation of its electric 
transmission incentives policy \32\ to ensure that the policy continues 
to satisfy its obligations under FPA section 219.\33\ The Notice of 
Inquiry included numerous questions regarding the Commission's approach 
to, and the objectives of, its transmission incentives policy; the 
mechanics and implementation of a transmission incentives policy; and 
metrics for evaluating the effectiveness of transmission incentives. As 
related to this proceeding, the Commission requested comment on whether 
it should incent physical and cybersecurity enhancements at 
transmission facilities and, if so, what types of security investments 
should qualify for transmission incentives.\34\
---------------------------------------------------------------------------

    \32\ Inquiry Regarding the Commission's Electric Transmission 
Incentives Policy, 166 FERC ] 61,208 (2019) (2019 Notice of 
Inquiry).
    \33\ 16 U.S.C. 824s.
    \34\ 2019 Notice of Inquiry, 166 FERC ] 61,208 at P 27.
---------------------------------------------------------------------------

    13. On March 20, 2020, the Commission issued a Notice of Proposed 
Rulemaking on several topics considered in the 2019 Notice of 
Inquiry.\35\ In the Transmission Incentives NOPR, the Commission 
acknowledged that, although reliability is clearly delineated as a 
benefit to be promoted by transmission incentives, there are differing 
mandates for promoting reliability under FPA sections 215 and 219. 
Further, the Commission stated that cybersecurity is an important part 
of reliability and indicated that it would address cybersecurity 
incentives independently in a separate, future proceeding.\36\
---------------------------------------------------------------------------

    \35\ Electric Transmission Incentives Policy Under Section 219 
of the Federal Power Act, 85 FR 18784 (Apr. 2, 2020), 170 FERC ] 
61,204, errata notice, 171 FERC ] 61,072 (2020) (Transmission 
Incentives NOPR).
    \36\ 2019 Notice of Inquiry, 166 FERC ] 61,208 at P 5.
---------------------------------------------------------------------------

D. Cybersecurity Incentives Policy White Paper

    14. On June 18, 2020, Commission staff issued a white paper to 
explore a new framework for providing transmission incentives to public 
utilities for cybersecurity investments that produce significant 
cybersecurity benefits for actions taken that exceed the requirements 
of the CIP Reliability Standards.\37\ In the White Paper, Commission 
staff discussed augmenting the current CIP Reliability Standards under 
FPA section 215 with an incentive-based framework under FPA section 219 
that encourages public utilities to undertake cybersecurity investments 
on a voluntary basis. Commission staff reasoned that this framework 
would incent a public utility to adopt best practices to protect its 
own transmission system as well as improve the security of the BES. 
Further, Commission staff stated that the framework could allow the 
electric industry to be more agile in monitoring and responding to new 
and evolving cybersecurity threats, to identify and respond to a wider 
range of threats, and to address threats with comprehensive and more 
effective solutions. Commission staff reasoned that an incentive-based 
framework would allow a public utility to tailor its request for 
incentives to the potential challenges it faces and take responsive 
action. Commission staff explained that, in the future, these voluntary 
actions taken by public utilities, if proven beneficial, could be the 
basis of future CIP Reliability Standards that would be mandatory.\38\
---------------------------------------------------------------------------

    \37\ Cybersecurity Incentives Policy White Paper, Notice of 
White Paper, Docket No. AD20-19-000 (issued June 18, 2020) (White 
Paper).
    \38\ Id. at 12-13.
---------------------------------------------------------------------------

    15. Commission staff stated that providing transmission incentives 
for cybersecurity investments would require a new framework for the 
Commission to evaluate requests from public utilities for transmission 
incentives. Commission staff opined that a first necessary step would 
be to establish approaches that examine the effectiveness of 
cybersecurity investments in enabling the public utility to achieve a 
level of protection that exceeds the CIP Reliability Standards and also 
enhances the security of its transmission system. Commission staff 
stated that a public utility would then be able to identify the 
cybersecurity investments for which it seeks transmission incentives 
with the Commission evaluating such transmission incentive requests.
    16. In the White Paper, Commission staff provided two potential 
approaches for identifying cybersecurity investments eligible for 
transmission incentives. The first approach was based on a public 
utility voluntarily applying certain CIP Reliability Standard 
requirements to transmission facilities that are not subject to those 
requirements, e.g., applying all requirements applicable to medium or

[[Page 8313]]

high impact systems to low impact systems. The second approach was 
based on a public utility voluntarily implementing portions of the NIST 
Framework. Commission staff suggested that the two approaches could be 
used independently or in combination.\39\
---------------------------------------------------------------------------

    \39\ Commission staff noted that, under this potential approach, 
although a public utility could request a combination of incentives 
for its facility containing multiple assets, each individual asset 
would be eligible for only one cybersecurity incentive at a time.
---------------------------------------------------------------------------

III. Need for Reform

    17. We recognize that the energy sector faces numerous and complex 
cybersecurity challenges. These growing threats come at a time of both 
great change in the operation of the transmission system and an 
increase in the number and nature of attack methods.\40\ Encouraging 
utilities to address cybersecurity of the Bulk-Power System is uniquely 
important given the degree to which components of the Bulk-Power System 
are digitally interconnected with one another and the ever-expanding 
risks posed by adversaries create challenges for those tasked with 
defending those interconnections from cyber exploitation. In addition, 
a cybersecurity breach could have exponential effects on the Bulk-Power 
System. As the operating environment continues to change, there is the 
potential for increased vulnerabilities and amplification of 
cybersecurity threats to the Bulk-Power System. For example, as the 
Commission has previously explained, the global supply chain affords 
significant benefits to customers, including low cost, 
interoperability, rapid innovation, and a variety of product 
features.\41\ Despite these benefits, the global supply chain creates 
opportunities for adversaries to directly or indirectly affect the 
management or operation of companies with potential risks to end users 
that could introduce new unintended threats to the system and 
necessitate rapid mitigating actions.\42\ Further, the COVID-19 
national emergency \43\ prompted many organizations to revise their 
operations to support an increased number of remote workers. The rapid 
expansion of teleworking capabilities revealed potential 
vulnerabilities, and some identified cybersecurity events specifically 
targeting remote access network equipment.\44\ It is important that 
public utilities make cybersecurity investments to quickly and 
effectively address these cybersecurity challenges as well as other 
emerging threats. Therefore, the Commission has concluded that, given 
the unique importance of protecting the cybersecurity of the Bulk-Power 
System, it is appropriate to provide incentives for public utility 
cybersecurity investment as proposed in this NOPR.
---------------------------------------------------------------------------

    \40\ See, e.g., Eversource Energy Serv. Co., Comments, Docket 
No. Public Law 19-3-000, at 29-30 (filed June 26, 2019) (noting that 
market operations are becoming increasingly more complex at the same 
time that there is an increasing cybersecurity threat to the 
operation and control of the transmission system).
    \41\ See, e.g. Revised Critical Infrastructure Protection 
Reliability Standards, Notice of Proposed Rulemaking, 80 FR 43354, 
152 FERC ] 61,054, at PP 61-62 (2015).
    \42\ Supply Chain Risk Management Reliability Standards, Order 
No. 850, 165 FERC ] 61,020, at P 2 (2018).
    \43\ The Secretary of Health and Human Services declared a 
public health emergency on January 31, 2020, under section 319 of 
the Public Health Service Act (42 U.S.C. 247d), in response to 
COVID-19.
    \44\ Cybersecurity and Infrastructure Security Agency, National 
Cyber Awareness System Alerts, COVID-19 Exploited by Malicious Cyber 
Actors (Alert AA20-099A) (Apr. 8, 2020), https://us-cert.cisa.gov/
ncas/alerts/
aa20099a#:~:text=Both%20CISA%20and%20NCSC%20are,threat%20to%20individ
uals%20and%20organizations.
---------------------------------------------------------------------------

    18. Section 215 of the FPA and the CIP Reliability Standards 
promulgated under that statute have served as the Commission's primary 
tools for mandating changes to cybersecurity practices within the 
electric sector. As required by FPA section 215, the Commission's 
mandatory CIP Reliability Standards provide for the reliable operation 
of the Bulk-Power System.\45\ Although the CIP Reliability Standards 
offer protection of the BES \46\ and improve the baseline cybersecurity 
posture of entities,\47\ they have certain limitations. For example, it 
can take many months for a new Reliability Standard to be developed 
and, once approved, it may be several more months or years before a 
Reliability Standard is fully implemented and enforceable.\48\ Further, 
the Bulk-Power System relies on the interdependence of connected 
networks and equipment; because the CIP Reliability Standards apply to 
BES facilities, which are generally 100 kV or higher as identified in 
CIP-002, not all cybersecurity systems are covered by these standards. 
Thus, while there are limits to how quickly CIP Reliability Standards 
can become mandatory and enforceable as well as limits to what the CIP 
Reliability Standards can cover, the cybersecurity threats public 
utilities face evolve and arise on their own timeframe. For these 
reasons, we believe that an effective strategy against emerging 
cybersecurity threats includes not only requiring public utilities to 
comply with the mandatory CIP Reliability Standards but also 
encouraging public utilities to make cybersecurity investments in 
addition to those required by the CIP Reliability Standards. We propose 
to do this by providing incentives to public utilities that voluntarily 
make certain cybersecurity investments above and beyond those 
investments required by the CIP Reliability Standards. The Commission 
proposes taking a two-prong approach to cybersecurity, which includes 
both mandatory CIP Reliability Standards and a cybersecurity incentives 
framework. This approach would encourage public utilities to increase 
the protection of their systems against cybersecurity threats. 
Currently, public utilities may not have the appropriate economic 
incentives to invest in cybersecurity measures that go above and beyond 
the mandatory CIP Reliability Standards. The cybersecurity incentives 
outlined in this NOPR strive to incent public utilities to use known, 
effective, and dynamic solutions to cybersecurity threats for the 
benefit of ratepayers.
---------------------------------------------------------------------------

    \45\ FPA section 215(a)(3) provides that the term reliability 
standard means a requirement, approved by the Commission under this 
section, to provide for reliable operation of the bulk-power system.
    \46\ Order No. 791, 145 FERC ] 61,160 at PP 2, 41.
    \47\ Order No. 822, 154 FERC ] 61,037 at 2.
    \48\ See, e.g., Am. Elec. Power, Inc., Comments, Docket No. 
PL19-3-000, at 13-14 (filed June 26, 2019) (noting that there is a 
potential gap between the dynamic threats faced by the energy 
industry and the CIP Reliability Standards development and 
compliance process, which sets the rules for minimum compliance).
---------------------------------------------------------------------------

    19. Given that cybersecurity investments can be made to more than a 
public utility's transmission system, we find that basing our 
incentives framework under this proposal on our transmission incentives 
authority under FPA section 219, as considered in the White Paper, may 
unnecessarily limit the application of an effective cybersecurity 
incentives framework and, thereby, limit possible cybersecurity 
investment. Creating an incentive-based approach under FPA sections 205 
and 206 that encourages public utilities to undertake cybersecurity 
investments on a voluntary basis that are above and beyond the 
requirements of the mandatory CIP Reliability Standards better ensures 
secure service for ratepayers. This approach would incent a public 
utility to adopt cybersecurity practices that would not only better 
protect its own systems but also improve the security of the Bulk-Power 
System. For example, the expansion of network monitoring provides the 
potential integration of all aspects of Bulk-Power System security to 
include physical access control, equipment status indicators, and 
system performance monitoring. This provides

[[Page 8314]]

for improved incident response time, pre-emptive planning, and system 
optimization. Further, relying on FPA sections 205 and 206 would allow 
public utilities to be more agile in monitoring and responding to new 
and unanticipated cybersecurity threats, to identify and respond to a 
wider range of threats, and to address threats with comprehensive and 
more effective solutions. An incentive-based approach allows a public 
utility to tailor its request for incentives to the potential 
challenges and responsive actions that it faces. Finally, while we 
recognize that granting incentives to a public utility under this 
proposal will have an impact on the public utility's rates, we believe 
that such impact, over time, will be outweighed by the public utility 
having a more secure grid and services for the benefit of ratepayers.

IV. Discussion

A. Cybersecurity Incentives Framework

    20. Pursuant to FPA sections 205 and 206,\49\ we propose to add 
Sec.  35.48 to the Commission's regulations to establish rules to 
provide incentive-based rate treatments for voluntary cybersecurity 
investments made by a public utility for or in connection with the 
transmission or sale of electric energy subject to the jurisdiction of 
the Commission. FPA sections 205 and 206 give the Commission authority 
over the rates of a public utility for or in connection with the 
transmission or sale of electric energy subject to the Commission's 
jurisdiction.\50\ The Commission's FPA section 205 and 206 authority is 
broader than the Commission's authority under FPA section 219. FPA 
section 219 requires the Commission to issue a rule that provides 
incentive rate treatment for the transmission of electric energy in 
interstate commerce by public utilities for the purpose of benefitting 
consumers by ensuring reliability and reducing the cost of delivered 
power by reducing transmission congestion.\51\ However, in this NOPR 
the Commission is proposing to provide incentives for a different 
purpose under a different section of the FPA: To provide incentives for 
cybersecurity investment not only in transmission facilities but also 
for cybersecurity investment in information technology and operational 
technology \52\ networks that a public utility uses to provide other 
jurisdictional services. Reliance on FPA sections 205 and 206, 
therefore, allows for a more comprehensive way to encourage 
cybersecurity investment than is available under FPA section 219. We 
believe that this comprehensive approach is warranted because 
cybersecurity threats to a public utility's system can come in a 
variety of forms, such as through a public utility's information 
technology and management systems, and not just through a public 
utility's systems that directly operate its transmission facilities. In 
addition, the means a public utility may need to use to protect against 
cybersecurity intrusions that may harm its jurisdictional system may 
not be limited to steps to protect the public utility's systems that 
run its transmission assets. Incentive ratemaking to encourage 
cybersecurity investments for not only those systems that are used to 
directly operate a public utility's transmission system but also other 
systems used for the provision of jurisdictional services is consistent 
with our general ratemaking authority under FPA sections 205 and 206 
under which we may depart from cost-of-service ratemaking.\53\ We 
believe that this action is appropriate to facilitate increased 
cybersecurity investment, and that the resulting rates will be just and 
reasonable.
---------------------------------------------------------------------------

    \49\ 16 U.S.C. 824d(a).
    \50\ 16 U.S.C. 824d(a) (FPA section 205(a) provides that all 
rates and charges made, demanded, or received by any public utility 
for or in connection with the transmission or sale of electric 
energy subject to the jurisdiction of the Commission, and all rules 
and regulations affecting or pertaining to such rates or charges 
shall be just and reasonable); see also FERC v. Elec. Power Supply 
Ass'n, 136 S. Ct. 760, 774 (2016) (stating the Commission's FPA 
section 205 and 206 jurisdiction extends to practices that directly 
affect Commission-jurisdictional rates and that are not otherwise 
expressly excluded from the Commission's jurisdiction).
    \51\ 16 U.S.C. 824s(a).
    \52\ Operational technology is defined as programmable systems 
or devices that interact with the physical environment (or manage 
devices that interact with the physical environment). These systems/
devices detect or cause a direct change through the monitoring and/
or control of devices, processes, and events. Examples include 
industrial control systems, building management systems, fire 
control systems, and physical access control mechanisms. NIST, 
Computer Security Resource Center Glossary, https://csrc.nist.gov/glossary/term/operational_technology.
    \53\ Incentive Ratemaking for Interstate Natural Gas Pipelines, 
Oil Pipelines, & Elec. Utilities, 61 FERC ] 61,168, at 61,594 
(1992); see also Farmers Union Cent. Exchange, Inc. v. FERC, 734 
F.2d 1486, 1503-04 (D.C. Cir. 1984) (``In some circumstances, the 
contrasting or changing characteristics of regulated industries may 
justify the agency's decision to take a new approach to the 
determination of `just and reasonable' rates.'').
---------------------------------------------------------------------------

B. Applicable Cybersecurity Investments

    21. We propose to add Sec.  35.48(b) to the Commission's 
regulations to authorize incentive-based rate treatments for a public 
utility that makes voluntary cybersecurity investments in the Bulk-
Power System, provided that the proposed incentive is just and 
reasonable and not unduly discriminatory or preferential.
1. NERC CIP Incentives Approach
    22. We propose to add Sec.  35.48(b)(1) to the Commission's 
regulations to provide that a public utility may receive incentive rate 
treatment for voluntarily applying identified CIP Reliability Standards 
to facilities that are not currently subject to those requirements 
(NERC CIP Incentives Approach). Using the existing CIP Reliability 
Standards as a framework for providing cybersecurity incentives allows 
the Commission to leverage an existing set of baseline cybersecurity 
requirements. Further, public utilities and the Commission are already 
familiar with the CIP Reliability Standards and encouraging public 
utilities to voluntarily apply known standards to additional facilities 
will establish a benchmark for determining eligibility for an 
incentive.
    23. As discussed above, CIP-002 (Bulk Electric System Cyber System 
Categorization) implements a tiered approach to categorizing assets, 
requiring an entity to categorize its cyber assets as high, medium, or 
low risk to the reliable operation of the BES if compromised. These 
impact ratings determine which requirements in the CIP Reliability 
Standards CIP-003 though CIP-013 apply to BES Cyber Systems.
    24. The CIP version 5 Standards became enforceable for high and 
medium impact BES Cyber Systems on July 1, 2016, and the CIP 
Reliability Standards applicable to low impact BES Cyber Systems became 
enforceable on April 1, 2020. In approving the CIP version 5 Standards, 
the Commission determined that ``categorizing BES Cyber Systems based 
on their low, medium, or high impact on the reliable operation of the 
BES, with all BES Cyber Systems being categorized as at least low 
impact, offers more comprehensive protection of the bulk electric 
system'' and that ``the new cybersecurity controls improve the security 
posture of responsible entities.'' \54\
---------------------------------------------------------------------------

    \54\ Order No. 791, 145 FERC ] 61,160 at P2.
---------------------------------------------------------------------------

    25. We propose two ways for a public utility to demonstrate that it 
is eligible for a cybersecurity incentive through voluntary investment 
in applying the requirements of the CIP Reliability Standards to 
additional facilities. Public utilities that choose to request the 
proposed incentives under the NERC CIP Incentives Approach will receive 
a rebuttable presumption that the investments materially enhance the 
security posture of the Bulk-Power System by enhancing the applicants'

[[Page 8315]]

cybersecurity posture substantially above levels required by CIP 
Reliability Standards to merit an incentive for such cybersecurity 
investments.\55\
---------------------------------------------------------------------------

    \55\ We do not propose that NERC will have any role in 
monitoring or reviewing the implementation of voluntary incentives 
or otherwise participating in this incentives program.
---------------------------------------------------------------------------

a. Med/High Incentive
    26. We propose to add Sec.  35.48(b)(1)(i) to the Commission's 
regulations to allow a public utility to receive incentive rate 
treatment for voluntarily applying the requirements for medium or high 
impact systems to low impact systems, and/or the requirements for high 
impact systems to medium impact systems (Med/High Incentive).
    27. Under the Med/High Incentive, a public utility seeking a 
cybersecurity incentive for a facility that is classified as a low 
impact BES Cyber System would invest in ways to make that facility meet 
all the requirement and sub-requirement protections applicable to 
medium or high impact BES Cyber Systems. Also, under the Med/High 
incentive, a public utility seeking a cybersecurity incentive for a 
facility classified as a medium impact BES Cyber System would invest in 
ways to make that facility meet all the requirement and sub-requirement 
protections applicable to high impact BES Cyber Systems. The public 
utility could choose to apply the medium and/or high impact 
requirements to some or all of its low or medium impact BES Cyber 
Systems, and would receive incentives only for the investments it makes 
to apply the more stringent protections.
b. Hub-Spoke Incentive
    28. We propose to add Sec.  35.48(b)(1)(ii) to the Commission's 
regulations to allow a public utility to receive incentive rate 
treatment for voluntarily ensuring that all external routable 
connectivity \56\ to and from the low impact system connect to a high 
or medium impact BES Cyber System (Hub-Spoke Incentive). Under the Hub-
Spoke Incentive, a public utility is eligible for incentives if its 
investment applies CIP Reliability Standard security controls inherited 
from a high or medium impact BES Cyber System at locations containing 
low impact BES Cyber Systems by ensuring all external routable 
connectivity to and from the low impact system connect to a high or 
medium impact BES Cyber System.
---------------------------------------------------------------------------

    \56\ NERC defines external routable connectivity as ``the 
ability to access a BES Cyber System from a Cyber Asset that is 
outside of its associated Electronic Security Perimeter via a bi-
directional routable protocol connection.'' NERC, Glossary of Terms 
Used in NERC reliability Standards (2020), https://www.nerc.com/files/glossary_of_terms.pdf.
---------------------------------------------------------------------------

    29. Under the Hub-Spoke Incentive, all the cyber communications to 
and from a low impact system location must connect to a medium or high 
impact BES Cyber System and the cyber communication security controls 
required for the medium or high impact BES Cyber System must be 
implemented on the low impact system.\57\ Therefore, the cyber 
communication would be protected at a higher security level before 
being transmitted to or received by the low impact BES Cyber System. 
Thus, low impact BES Cyber Systems would inherit the higher security 
posture of either the medium or high impact controls.
---------------------------------------------------------------------------

    \57\ See proposed Sec.  35.48(b)(1)(ii).
---------------------------------------------------------------------------

c. Other Considerations
    30. Nothing in this proposal modifies a public utility's obligation 
to comply with all the mandatory NERC Reliability Standard obligations 
for its low, medium, and high impact BES Cyber Systems. A public 
utility requesting incentive rate treatment for voluntarily applying 
the CIP Reliability Standards requirements, as discussed above, will 
not be subject to penalties from the Commission for failing to 
voluntarily follow the CIP Reliability Standards. However, if the 
Commission approves a public utility's request for cybersecurity 
incentives pursuant to either the Med/High or Hub-Spoke Incentive and 
the public utility subsequently ceases to implement the CIP Reliability 
Standards consistent with the order approving the application, we 
propose that the public utility would not be able to receive the 
incentive for the period during which it is not implementing the CIP 
Reliability Standards consistent with the order approving the 
application.
    31. Additionally, since the NERC CIP Incentives Approach is based 
on a public utility making voluntary cybersecurity investments based on 
the CIP Reliability Standards as they exist at the time of the 
investment, we propose that the determination of the types of 
cybersecurity incentives that a public utility would be eligible for 
would reflect the currently enforceable version of the CIP Reliability 
Standards at the time the public utility submits a request for 
incentives. As discussed in section IV.E.1 (Incentive Duration), where 
NERC publicly announces that it is considering making certain 
cybersecurity activities or investments mandatory through issuing a 
standard authorization request,\58\ a public utility would still be 
eligible to receive incentives until the requirements become mandatory 
and enforceable.
---------------------------------------------------------------------------

    \58\ A standard authorization request is the form used to 
document the scope and reliability benefit of a proposed project for 
one or more new or modified Reliability Standards or definitions, as 
well as document the benefit of retiring one or more approved 
Reliability Standards. NERC, Standard Authorization Request (SAR), 
https://www.nerc.com/pa/Stand/Pages/SARs.aspx.
---------------------------------------------------------------------------

2. NIST Framework Approach
    32. We propose to add Sec.  35.48(b)(2) to the Commission's 
regulations to provide that a public utility may receive incentive rate 
treatment for implementing certain security controls included in the 
NIST Framework (NIST Framework Approach). The Commission would evaluate 
a public utility's application for cybersecurity investments that 
implement security controls in the NIST Framework to determine whether 
the cybersecurity investments go above and beyond the CIP Reliability 
Standards and are eligible for incentives. Through the NIST Framework 
Approach, public utilities have the flexibility of non-prescriptive 
implementation options to go above and beyond the CIP Reliability 
Standards.
    33. Although the NIST Framework contains many types of security 
controls, we propose to limit eligibility for cybersecurity incentives 
to the types of controls that are most likely to provide a significant 
benefit to the cybersecurity of Commission-jurisdictional transmission 
facilities, not just the BES. In the White Paper, Commission staff 
identified five types of security controls included in the NIST 
Framework that may be considered for incentives under the NIST 
Framework approach: (1) Automated and continuous monitoring; (2) access 
control; (3) data protection; (4) incident response; and (5) physical 
security of cyber systems. Commission staff also acknowledged that, 
given the continuous and rapid changes in cybersecurity risks, the 
Commission may need to periodically update the types of security 
controls eligible for incentives.\59\ In proposing the NIST Framework 
Approach, we propose to initially only consider incentives that fall 
within the first type of security controls, automated and continuous 
monitoring. For example, continuous monitoring tools that utilize 
automated features for pulling information from a variety of sources or 
that allow for data consolidation into Security Information and Event 
Management tools would

[[Page 8316]]

qualify as automated and continuous monitoring security controls.\60\ 
While this will limit the NIST Framework security controls eligible for 
incentives at this time, the Commission considers this to be an 
important next step in encouraging cybersecurity investments and may 
consider additional security control types in the future.
---------------------------------------------------------------------------

    \59\ White Paper at 19.
    \60\ NIST, Information Security Continuous Monitoring for 
Federal Information Systems and Organizations, NIST Special 
Publication 800-137, at 13 (Sep. 2011), https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-137.pdf.
---------------------------------------------------------------------------

    34. Under this proposal, one example of an investment that could 
warrant an incentive as automated and continuous monitoring would be 
for a public utility to install a dynamic asset management program to 
improve its ability to quickly detect and address new or previously 
unknown equipment on its network. Unknown and unattended equipment can 
present significant vulnerabilities and threats to both the information 
technology and operational technology networks. Implementing a process 
that automatically and continuously scans the current inventory of 
hardware and software across both the information technology and 
operational technology networks can identify, block, log and report any 
unauthorized access.
    35. Another example of an automated and continuous monitoring 
investment eligible for an incentive is the implementation of a dynamic 
file analysis program or a ``sandbox.'' One deployment of a sandbox is 
as an automated malware detection environment that continuously scans 
email attachments and weblinks in the corporate email system for 
malicious code. When malicious code is detected, a sandbox blocks 
delivery to the end user in real time and automatically issues an alert 
to the security team. Malicious code deployed in the sandbox will 
potentially be activated when placed there, but it will be isolated 
from the information technology and operational technology networks, 
thereby protecting the networks while alerting the public utility to 
the threat. The deployment of sandboxes enhances the ability of a 
public utility to detect and prevent the delivery of malicious code, 
disrupts social engineering attacks on users, and tests software for 
dangerous behavior. Further, the ability to perform post-incident 
forensic triage and analysis enables public utilities to establish the 
root causes of an event, identify related vulnerabilities, and mitigate 
associated risks in an expedited manner to optimize long-term 
operational capabilities.
    36. As discussed below, public utilities seeking an incentive under 
this approach would need to show how a cybersecurity investment, for 
example, in physical components, software, licensing for cybersecurity 
enhancements as well as operational costs such as contracts with 
security providers, third-party incident responders, and third-party 
security operations centers, allows the public utility to meet NIST 
Framework security controls, as identified above, will go above and 
beyond the requirements of the CIP Reliability Standards, and 
materially enhance the current cybersecurity posture of the Bulk-Power 
System by enhancing the applicants' cybersecurity posture substantially 
above levels required by CIP Reliability Standards, to the benefit of 
ratepayers. As the Commission evaluates incentive applications, we will 
remain cognizant of ongoing changes to the CIP Reliability Standards, 
the NIST Framework, and underlying referenced security controls.
    37. As with the NERC CIP Incentives Approach, if a public utility 
ceases to maintain the cybersecurity posture associated with the 
Commission's order approving its NIST Framework Approach incentives 
application, the public utility would not be able to receive the 
incentive for the period during which it is not implementing the CIP 
Reliability Standards as described in the Commission's order approving 
its application.

C. Incentives for Cybersecurity Investments

1. ROE Adder
    38. We propose to add Sec.  35.48(c)(1) to the Commission's 
regulations to allow a public utility that makes eligible cybersecurity 
capital investments, as more fully described above, to request an ROE 
adder of 200 basis points (Cybersecurity ROE Incentives) for those 
eligible cybersecurity investments. This ROE incentive will encourage 
public utilities to proactively make additional investments in 
cybersecurity systems. We believe that such a 200-basis point adder is 
appropriate to provide a meaningful incentive to encourage public 
utilities to improve their systems' cybersecurity. For example, we note 
that given the relatively small size of such investments, compared to 
conventional transmission projects, the dollar amounts provided under 
the incentives should not have a burdensome effect on the public 
utility's rates. Yet, the benefit to the system, and ultimately to rate 
payers, by this additional investment will provide additional 
cybersecurity protections that could have a large impact on the public 
utility's system by allowing it to better detect and address 
cybersecurity threats to the Bulk-Power System. The total cybersecurity 
incentives requested would be capped at the zone of reasonableness.\61\ 
Additionally, we find that the same expenditures should not be eligible 
for both the Cybersecurity ROE Incentives and the Regulatory Asset 
Incentives discussed below. Given that regulatory asset treatment is 
available to costs that are normally treated as expenses, as discussed 
below, we believe that it is unnecessary to incent investment to also 
enable deferred costs that would otherwise be expensed to receive this 
200 basis-point incentive. We propose that public utilities only be 
eligible to receive the Cybersecurity ROE Incentive as a cybersecurity 
incentive for capital investments.
---------------------------------------------------------------------------

    \61\ In the Transmission Incentives NOPR the Commission proposes 
that, under FPA section 219, the Commission may approve a rate that 
exceeds the zone of reasonableness to further the purposes of that 
statutory provision. In this NOPR, however, the Commission is acting 
under FPA sections 205 and 206.
---------------------------------------------------------------------------

    39. Transmission-specific investments based on the NERC CIP 
Incentives Approach and the NIST Framework Approach may be eligible for 
the Cybersecurity ROE Incentive under this NOPR. In addition, we 
propose that enterprise-wide costs--which are not specific to 
transmission but a portion of which are recovered through transmission 
rates--may also be eligible for incentives if the applicant can 
demonstrate how the investment will materially enhance the security 
posture of the Bulk-Power System by enhancing the applicants' 
cybersecurity posture substantially above levels required by CIP 
Reliability Standards, to the benefit of ratepayers. While 
cybersecurity systems that are not subject to the CIP Reliability 
Standards may be less critical to reliable operations, compromise of 
these systems may nevertheless allow access to more critical systems 
and therefore we believe that incentivizing the enhanced protection of 
these systems is important to the reliability of the Bulk-Power-
System.\62\ Only the conventionally allocated portion of such 
investments that flows through to Commission jurisdictional cost-of-
service rates will be eligible for this rate treatment. For instance, 
if a public utility seeks an incentive for cybersecurity investment 
that it made to its general plant

[[Page 8317]]

facilities, both the underlying investments and associated incentives 
must be allocated based on conventions of the rates (e.g., the 
transmission share using a wages and salaries allocator for general 
plant in most transmission cost of service rates). With this 
limitation, we seek to ensure that the cybersecurity incentives policy 
adheres to the ratemaking principles of beneficiary pays and cost-
causality by limiting a transmission customer's share of incentive 
costs to the share of such investments that serve (and is traditionally 
allocated to) transmission. We note that the Commission's rules and 
regulations in the Uniform System of Accounts \63\ already require 
public utilities to maintain records supporting any entries to the 
regulatory asset account so that the utility can furnish full 
information as to the nature and amount of, and justification for, each 
regulatory asset recorded in the account. Therefore, pursuant to our 
existing regulations, public utilities must maintain sufficient records 
to support the distinction of any expenses that are afforded 
incentivized treatment.\64\
---------------------------------------------------------------------------

    \62\ For example, WANNACRY attacked specific servers that were 
vulnerable and once the attacker gained access to the server, the 
attacker moved to other internal systems to complete the attack. 
See, NCCIC, Fact Sheet, What is Wannacry/Wanacryptor?, https://us-cert.cisa.gov/sites/default/files/FactSheets/NCCIC%20ICS_FactSheet_WannaCry_Ransomware_S508C.pdf.
    \63\ See 18 CFR part 101, Account Definition Account 182.3, 
Other Regulatory Assets, paragraph D.
    \64\ Id.
---------------------------------------------------------------------------

2. Regulatory Asset Incentive
    40. We propose to add Sec.  35.48(c)(2) to the Commission's 
regulations to allow a public utility to seek deferred cost recovery 
pursuant to this NOPR. We believe that, in limited circumstances, it 
may be appropriate to allow a public utility to defer recovery of 
certain cybersecurity costs that are generally expensed as incurred, 
and treat them as regulatory assets, while also allowing such 
regulatory assets to be included in transmission rate base (Regulatory 
Asset Incentive). Such expenses must be associated with the NERC CIP 
Incentives Approach or the NIST Framework Approach investments that 
receive Commission approval for ROE incentives. Like the provision of 
ROE incentives, discussed above, we propose that only expenses for 
activities that go above and beyond the CIP Reliability Standards, as 
discussed above, be eligible for incentives. Under this proposal, 
expenses that are mandatory, that a public utility incurs on a regular 
or ongoing basis, or that are incurred prior to the incentive request, 
would not be eligible for such regulatory asset treatment.
    41. More specifically, to implement proposed Sec.  35.48(c)(2) of 
the Commission's regulations, we propose to allow deferred cost 
recovery for three categories of expenses: (1) Expenses associated with 
third-party provision of hardware, software, and computing networking 
services; (2) expenses for training to implement new cybersecurity 
enhancements undertaken pursuant to this rule; and (3) other 
implementation expenses, such as system assessments by third parties or 
internal system reviews and initial responses to findings of such 
assessments. In all such cases, eligible costs are limited to costs 
associated with implementing cybersecurity upgrades and do not include 
ongoing costs including system maintenance, surveillance, and other 
labor costs, either in the form of employee salaries or third-party 
service contracts.
    42. Regarding the first category, certain cost categories, such as 
software, that companies traditionally purchased and could capitalize, 
are now often procured as services with periodic payments to vendors 
that is updated as needed. Therefore, to encourage investment in 
cybersecurity, we believe that it would be appropriate to allow public 
utilities to defer and amortize eligible costs that are typically 
recorded as expense that are associated with third party provision of 
hardware, software, and computing and networking services. Pursuant to 
our existing regulations, public utilities must maintain sufficient 
records to support the distinction of any expenses that are afforded 
incentivized treatment.\65\
---------------------------------------------------------------------------

    \65\ Id.
---------------------------------------------------------------------------

    43. Regarding the second category, in response to the White Paper, 
many commenters stated that training is central to improving 
cybersecurity. We agree that such training is critical to successful 
implementation of cybersecurity enhancements. Therefore, we propose to 
allow public utilities to request the Regulatory Asset Incentive for 
training expenses associated with cybersecurity investments made 
pursuant to this rule. However, ongoing training expenses, which many 
organizations provide to employees regularly, would not be eligible 
because such training is an ongoing rather than implementation type of 
operating expense for the implementation we seek to incentivize. 
Pursuant to our existing regulations, public utilities must maintain 
sufficient records to support the distinction of any training expenses 
that are afforded incentivized treatment.\66\
---------------------------------------------------------------------------

    \66\ Id.
---------------------------------------------------------------------------

    44. Regarding the third category, we believe that there may be 
large one-time expenses associated with implementing cybersecurity 
upgrades. These may include unusually large internal system evaluations 
and assessments or analyses by third parties. These expenses may be 
large relative to the size of the capital investments associated with 
the cybersecurity upgrades and essential to their proper 
implementation. We propose that such expenses not include regularly 
scheduled activities that would occur irrespective of the cybersecurity 
upgrades. Pursuant to our existing regulations, public utilities must 
maintain sufficient records to support the distinction of any expenses 
that are afforded incentivized treatment.
    45. Additionally, consistent with the proposal for the ROE 
incentive for eligible cybersecurity capital investments, only directly 
assigned transmission costs or the conventionally allocated (i.e., 
using the wages and salaries allocator) portion of enterprise-wide 
expenses would be eligible the Regulatory Asset Incentive. Applicants 
would be required under proposed Sec.  35.48(b) to demonstrate that any 
enterprise-wide expenses for which they seek this treatment materially 
enhances the cybersecurity of the Bulk-Power System by enhancing the 
applicants' cybersecurity posture substantially above levels required 
by CIP Reliability Standards, to the benefit of ratepayers.
    46. Finally, we propose in Sec.  35.48(d)(2) that deferred 
regulatory assets whose costs are typically expensed should be 
amortized over a five-year period. We believe that this duration will 
allow incentive recipients a reasonable amount of time to earn a return 
on expenditures for which no return is normally allowed. Moreover, the 
proposed amortization period generally corresponds to the short 
lifespan and depreciation rates of cybersecurity investments.
3. Other Types of Incentives
    47. In this NOPR, we are proposing to grant ROE and deferred cost 
recovery incentives. Nonetheless, we recognize that other incentives, 
such as construction work in progress, may be warranted to encourage 
investment in cybersecurity if adequately supported. To maintain 
flexibility under this proposal for other types of incentives under 
these new regulations, we propose to add Sec.  35.48(c)(3) to the 
Commission's regulations that provides the Commission additional 
flexibility to grant a public utility any other incentives, pursuant to 
the requirements of this section, that the Commission deems to be just 
and reasonable and not unduly discriminatory or preferential for 
investments undertaken pursuant to

[[Page 8318]]

this rule.\67\ We propose to consider applications for other 
cybersecurity incentives on a case-by-case basis to determine if they 
are just and reasonable and not unduly discriminatory or preferential 
under FPA section 205.
---------------------------------------------------------------------------

    \67\ We note that the Commission adopted similar flexibility and 
language to consider other proposals in Sec.  35.35(d)(viii) of the 
Commission's rules and regulations in Order No. 679. See 18 CFR 
35.35(d)(1)(viii); Promoting Transmission Investment through Pricing 
Reform, Order No. 679, 71 FR 43293 (Jul. 31, 2006), 116 FERC ] 
61,057 (2006), order on reh'g, Order No. 679-A, 72 FR 1152 (Jan. 10, 
2007), 117 FERC ] 61,345 (2006), order on reh'g 119 FERC ] 61,062 
(2007).
---------------------------------------------------------------------------

D. Application Process

    48. Proposed Sec.  35.48(e) of the Commission's regulations would 
require a public utility's request for one or more incentive based-rate 
treatments to be made in a filing pursuant to FPA section 205. As 
proposed, such a request must include a detailed explanation of how the 
public utility plans to implement one or both of the proposed incentive 
approaches and the requested rate treatment. We propose that applicants 
provide detail on the investments or expenses for which they seek 
incentives, as described in more detail below. An applicant would make 
a filing showing how its project(s) meet the eligibility requirements 
described below. In proposing what showing an applicant must make, we 
balance the need for sufficient information to determine if an 
applicant is eligible for the incentive against the risk of the 
applicant providing potentially sensitive information on cybersecurity 
vulnerabilities in its application. We discuss confidentiality concerns 
further in section IV.E.3 (Confidentiality Considerations).
    49. Finally, under Sec.  35.48(e) of the proposed regulations, a 
public utility seeking one or more incentive based-rate treatments 
proposed in the NOPR must make a filing for Commission approval 
pursuant to FPA section 205 and receive such approval prior to 
implementing the proposed incentives in its Commission-jurisdictional 
rates. In order to effectuate the incentives in rates, public utilities 
would need to propose in their FPA section 205 filing conforming 
revisions to their formula rates, as appropriate, to reflect incentive 
rate treatment granted pursuant to these proposed regulations.\68\
---------------------------------------------------------------------------

    \68\ Public utilities with stated rates may file under FPA 
section 205 to seek incentives as part of a larger rate case or make 
a request for single issue ratemaking, which the Commission will 
evaluate on a case-by-case basis.
---------------------------------------------------------------------------

1. NERC CIP Incentives Approach
    50. To implement proposed Sec.  35.48(b) of the Commission's 
regulations, for capital investments, we propose that an applicant 
describe the proposed investments as well as their anticipated cost, 
completion date and geographic location. An applicant would also 
describe how the proposed investment meets the description of the Med/
High Incentive and/or the Hub-Spoke Incentive.
    51. We propose that applicants describe the implementation and 
method of continuing adherence to the actions required to obtain and 
maintain the incentive, as described in Sec.  35.48(e)(1) of the 
proposed regulations. The applicant would include in its application, 
at a minimum, an identification of the scope of assets for which the 
public utility is requesting the incentive, and the associated BES 
Cyber Systems that will be protected. Specifically, an applicant would 
include a list of BES assets for which the public utility is requesting 
the incentive, the geographical location of the BES assets, the 
function they support, the incentive method the public utility is 
requesting for each of the BES assets, the current impact ratings of 
the BES assets and the impact level(s) that the assets now meet as a 
result of the investment, and a list of BES Cyber Systems associated 
with each of the BES assets including details on their use.
    52. Unlike conventional transmission investments, which entail 
completion of a physical transmission project, investments under the 
NERC CIP Incentives Approach seek to bring BES assets otherwise not 
required to be subject to certain cybersecurity requirements to a 
higher cybersecurity level, and that higher level must be maintained 
for it to continue to provide ratepayer benefits. Consequently, the 
Commission proposes that, if an investment that receives a Med/High 
Incentive or Hub-Spoke Incentive ceases to meet the requirements of 
that incentive, the public utility would be required to update its 
cost-of-service rates to reflect this change. In addition, the 
Commission or third parties may initiate FPA section 206 proceedings to 
revoke such incentives.
    53. In Order No. 791, the Commission recognized that categorizing 
BES Cyber Systems based on their low, medium, or high impact on the 
reliable operation of the BES, with all BES Cyber Systems being 
categorized as at least low impact, offers more comprehensive 
protection of the BES than the prior CIP Reliability Standards.\69\ The 
Commission also acknowledged that CIP version 5 Standards offer new 
cybersecurity controls that will improve the overall security posture 
of responsible entities.\70\ Given the Commission's experience with the 
CIP Reliability Standards, we propose that an asset-by-asset showing of 
benefits is unnecessary because, though the benefits of upgrades may 
vary by system, we believe that all upgrades based on the NERC CIP 
Incentives Approach materially enhance the cybersecurity posture of the 
Bulk-Power System by enhancing the applicants' cybersecurity posture 
substantially above levels required by CIP Reliability Standards, to 
the benefit of ratepayers, and warrant incentives. Thus, we propose 
that a public utility seeking incentives under the NERC CIP Incentives 
Approach and that provides the information required under this 
application process receive a rebuttable presumption that the 
cybersecurity investments materially enhance the cybersecurity of the 
Bulk-Power System by enhancing the applicants' cybersecurity posture 
substantially above levels required by CIP Reliability Standards to 
merit an incentive.
---------------------------------------------------------------------------

    \69\ Order No. 791, 145 FERC ] 61,160 at P 41.
    \70\ Id.
---------------------------------------------------------------------------

2. NIST Framework Approach
    54. In contrast to applications for incentives based on the NERC 
CIP Incentives Approach, we propose that a public utility seeking 
incentives for cybersecurity investments under the NIST Framework 
Approach would not be entitled to a rebuttable presumption and instead 
must provide additional information showing that the proposed 
investment materially enhances the cybersecurity posture of the Bulk-
Power System by enhancing the applicants' cybersecurity posture 
substantially above levels required by CIP Reliability Standards. 
However, we request comments on what demonstration an applicant should 
be required to make to show that its NIST Framework Approach 
investments merit incentives under the FPA section 205 just and 
reasonable standard.
    55. Depending on a public utility's existing attributes; namely the 
hardware, system configuration, and operating practices that contribute 
to its overall cybersecurity posture, and the specific characteristics 
of the proposed cybersecurity investments, proposed cybersecurity 
investments may or may not materially enhance the cybersecurity posture 
of the Bulk-Power System by enhancing the applicants' cybersecurity 
posture substantially above levels required by CIP Reliability 
Standards to warrant incentives. Under Sec.  35.48(e)(2) of the 
Commission's regulations, we propose that an

[[Page 8319]]

applicant must describe its current cybersecurity posture, desired 
cybersecurity posture, and the quantified risk factors being addressed 
through the proposed incentive actions. An application must include 
full and detailed explanations of how proposed cybersecurity 
investments will materially enhance the cybersecurity of the Bulk-Power 
System by enhancing the applicants' cybersecurity posture substantially 
above levels required by CIP Reliability Standards, to the benefit of 
ratepayers. In assessing whether an application meets the standard for 
granting incentives under this NOPR, we propose that the Commission 
would review the stated expenditures and level of risk mitigated in 
comparison to the public utility's pre-incentivized network 
configuration. This judgement will be made on a case-by-case basis. The 
application would need to detail the specific components to be 
installed, network deployment, sensor configuration, and enterprise 
data incorporation as described in the four-step review process, 
discussed below.
    56. Consistent with incentive requests under the NERC CIP 
Incentives Approach, an applicant seeking incentives under the NIST 
Framework Approach would be required to provide detail on the 
investments or expenses for which it seeks incentives. For capital 
investments, applicants would describe: (1) The required network 
components; (2) how the sensors connect to the network; (3) how the 
sensors deployment recognizes the specific attributes of the network; 
(4) the costs of all investments; and (5) when the costs are expected 
to be incurred.
3. ROE Adder
    57. Under Sec.  35.48(e)(3) of the proposed regulations, applicants 
requesting an ROE adder of 200 basis points must include the 
anticipated cost of the capital investment and identify the Commission-
jurisdictional rate schedules under which they will recover the ROE 
adder.
4. Regulatory Asset Incentive
    58. For expenses that the applicant seeks to receive regulatory 
asset treatment associated with either ROE incentive-eligible projects 
based on either the NERC CIP Incentives Approach or the NIST Framework 
Approach, under Sec.  35.48(e)(4) of the proposed regulations, the 
applicant must describe and estimate the nature of such expenses, their 
costs, and when they are expected to be incurred.\71\ Applicants would 
be expected to provide a narrative explanation of how such expenses 
meet the description of the Med/High Incentive, the Hub-Spoke Incentive 
and/or the NIST Framework Approach. Applicants would then describe 
whether the expenses are: (1) Expenses associated with third-party 
provision of hardware, software, and computing networking services; (2) 
expenses for training to implement new cybersecurity enhancements; or 
(3) other transition expenses, such as risk assessments \72\ by third 
parties or internal system reviews, and initial responses to findings 
of such assessments. An applicant would also be required to describe 
the cost, location, and timing of all eligible capital investments and 
the cost and timing of all deferred expenses.
---------------------------------------------------------------------------

    \71\ We reiterate that applicants' ongoing costs of operating a 
more cybersecure system are not eligible for such incentive 
treatment under this NOPR.
    \72\ NIST, Framework for Improving Critical Infrastructure 
Cybersecurity, Version 1.1, at 26 (Apr. 16, 2018), https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf.
---------------------------------------------------------------------------

E. Implementation

1. Incentive Duration
    59. We propose to add Sec.  35.48(d) to the Commission's 
regulations to allow a public utility granted an incentive under this 
NOPR to receive that incentive for the lesser of: (1) The depreciation 
life of the underlying asset; (2) 10 years from when the cybersecurity 
improvements enter service; (3) when the investments or activities that 
serve as the basis of that incentive become mandatory pursuant to a 
Reliability Standard approved by the Commission; or (4) when the public 
utility no longer meets the requirements for receiving the 
incentive.\73\ We are seeking to incentivize cybersecurity assets that 
primarily include equipment or system modifications that typically have 
short depreciation lives. The cybersecurity incentives identified in 
this NOPR are intended to apply to technology and systems investments 
and not to more long-lived assets like physical structures. Thus, we 
believe that most public utilities granted cybersecurity incentives 
under this NOPR should receive those incentives for the depreciation 
life of the asset. However, for investments with useful lives exceeding 
10 years, we propose that the incentive end at the conclusion of 10 
years from when the cybersecurity incentives enter service. Although it 
is possible that specific components of cybersecurity investments may 
feature longer useful lives than 10 years, given the evolving nature of 
cybersecurity threats, we find that 10 years is a reasonable 
expectation of the principal benefits of the cybersecurity investments, 
which should correspond to the investment duration.
---------------------------------------------------------------------------

    \73\ FPA section 205 filings revising cost of service rates to 
implement incentives must contain language limiting incentive 
duration to the lesser of these three eventualities.
---------------------------------------------------------------------------

    60. In addition, we propose that, where cybersecurity investments 
are mandatory, cybersecurity incentives are inappropriate and would 
only serve to increase ratepayer costs. However, where NERC publicly 
announces that it is considering making certain cybersecurity 
activities or investments mandatory, through issuing a standard 
authorization request, public utilities may receive incentives until 
the requirements become mandatory. For a public utility that requests 
regulatory asset treatment for costs normally recorded to expenses, if 
such expenditures become mandatory, we propose that the public utility 
must recover the unamortized portion of expenses through expenses in 
rates with no further earning of an incentive return on the regulatory 
asset.
2. Informational Filing and Verification
    61. In order to ensure that a public utility receiving incentive 
rate treatment has implemented the requirements for the incentive and 
to ensure that it continues to adhere to these requirements, we propose 
to add Sec.  35.48(f) to the Commission's regulations to require public 
utilities to submit annual informational filings with the 
Commission.\74\ We propose specific reporting requirements for each of 
the NERC CIP Incentives Approach and the NIST Framework Approach below.
---------------------------------------------------------------------------

    \74\ These reporting requirements also apply to non-public 
utilities that receive cybersecurity incentives through their 
Commission-jurisdictional rates.
---------------------------------------------------------------------------

    62. The Transmission Incentives NOPR proposes additional reporting 
requirements for recipients of transmission incentives under FPA 
section 219.\75\ Such additional reporting is likewise appropriate for 
cybersecurity upgrades receiving incentives. Accordingly, we propose to 
add Sec.  35.48(f) to require that, within 120 days of the completion 
of cybersecurity upgrades for which an applicant is granted incentives, 
an incentives recipient must make an informational filing and 
subsequent informational filings annually thereafter. The annual 
informational filings must detail the specific investments that were 
made

[[Page 8320]]

pursuant to the Commission's approval and the corresponding FERC 
account(s) used. In addition, the annual informational filings must 
describe what parts of its network were upgraded or expanded (i.e., 
which substations, control centers, automated and continuous monitoring 
equipment) in addition to the nature (i.e., describing hardware 
purchase) and actual cost of the various capital investments. For 
incentives where the Commission allows deferral of expenses as 
regulatory assets, annual informational filings should describe such 
expenses in sufficient detail to demonstrate that such expenses are 
specifically related to implementing the cybersecurity incentives 
described in this NOPR and not for ongoing costs including system 
maintenance, surveillance, and other labor costs, either in the form of 
employee salaries or third-party service contracts.
---------------------------------------------------------------------------

    \75\ Transmission Incentives NOPR, 166 FERC ] 61,208 at P 115.
---------------------------------------------------------------------------

    63. We preliminarily find that the proposed reporting requirements 
are necessary to provide the Commission with an understanding of the 
costs of various types of cybersecurity investments in order to more 
precisely target future incentives or other policies. However, based on 
the qualities of such investments, as well as the likely higher 
sensitivity of the information, we propose to require different 
reporting requirements under this proposal than those proposed under 
the Transmission Incentives NOPR.
    64. Several aspects of cybersecurity necessitate reporting 
different information that the Commission has required for conventional 
transmission facilities receiving incentives pursuant to FPA section 
219. First, cybersecurity investments are not observable. Unlike 
conventional transmission facilities, such as a new transmission line, 
it is not readily apparent if, and when, such investments are completed 
and serving customers. Therefore, it is important to confirm the 
completion of cybersecurity investments by establishing additional 
reporting requirements. Second, certain cybersecurity investments may 
require public utilities to undertake subsequent actions or make 
expenditures to maintain the status for which they receive incentives. 
Annual reports enable public utilities to demonstrate that they have 
undertaken such actions or expenditures.
    65. Finally, we propose that both the initial and annual 
informational filings provide a summary of the costs incurred to 
achieve the higher level of security, including supporting 
documentation that provides a narrative explanation of the nature of 
the expenses proposed for deferred cost recovery, and inclusion in rate 
base as a regulatory asset, including the specific accounts (under the 
Commission's Uniform System of Accounts) initially charged for the 
incurred expenses.
    66. Also, the Commission may conduct periodic verification to 
assess cybersecurity investments and expenses for which it has approved 
incentives. The Commission could perform such verifications through 
multiple means (i.e., directing further informational filings, audits, 
etc.). The annual informational filings will inform the Commission on 
how and when the additional verification is warranted.
a. NERC CIP Incentives Approach
    67. To demonstrate that a public utility has implemented the 
requirements for the Med/High incentive and to ensure that the 
recipient continues to adhere to these requirements, we propose that 
the informational filing would describe implementation of the enhanced 
security controls, as applicable, in all the topics covered by the CIP 
Reliability Standards. Below is a table of currently effective and 
Commission-approved CIP Reliability Standards and examples of 
supporting documentation a public utility may provide to demonstrate 
incentive adherence to each CIP Reliability Standard. For the first 
informational filing, we would expect the public utility to provide 
documents, as indicated below, plus any additional documentation needed 
to demonstrate voluntary application of identified CIP Reliability 
Standards to facilities that are not currently subject to those 
requirements.\76\ For each subsequent annual informational filing, the 
public utility would only need to provide an updated version of the 
supporting documentation showing any changes from the prior 
informational filing as well as information on any period of time 
during the reported year where the public utility ceased to voluntarily 
apply identified CIP Reliability Standards to facilities that are not 
currently subject to those requirements.
---------------------------------------------------------------------------

    \76\ The information requested is similar to the information 
FERC staff reviews during a NERC CIP Reliability Standards audit.
    \77\ CIP-002 actions are not eligible for the incentive since it 
is a mandatory requirement for all BES assets.
    \78\ CIP-012-1: Communications between Control Centers will be 
subject to enforcement on July 1, 2022.

                           Supporting Documentation Demonstrating Incentive Adherence
----------------------------------------------------------------------------------------------------------------
                 Topic                             Standard                           Documentation
----------------------------------------------------------------------------------------------------------------
BES Cyber System Categorization.......  CIP-002 \77\..................  List of the categorization of BES Cyber
                                                                         Systems included in the incentive.
Management Controls...................  CIP-003.......................  Senior Management approval of revised
                                                                         cyber security policies; updates to
                                                                         delegation procedures.
Personnel and Training................  CIP-004.......................  Cyber security training program and
                                                                         quarterly reinforcement; personnel risk
                                                                         assessment program; access management
                                                                         program, and timely access revocation
                                                                         processes.
Electronic Security Perimeters........  CIP-005.......................  Establishment of ESPs and management of
                                                                         electronic access points; remote access
                                                                         management.
Physical Security of BES Cyber Systems  CIP-006.......................  Physical security plans; visitor control
                                                                         program; PACS maintenance and testing
                                                                         procedures.
Systems Security Management...........  CIP-007.......................  Ports and services management; security
                                                                         patch management; malicious code
                                                                         prevention methods; security event
                                                                         monitoring; system access controls.
Incident Reporting and Response.......  CIP-008.......................  Cyber security incident response plan,
                                                                         implementation, and testing procedures.
Backup and Recovery Plans.............  CIP-009.......................  System recovery plans, implementation,
                                                                         and testing procedures.
Configuration Change Management.......  CIP-010.......................  System baseline configurations;
                                                                         configuration monitoring; vulnerability
                                                                         assessment processes.
Information Protection................  CIP-011.......................  Information protection procedures; cyber
                                                                         asset reuse and disposal methods.
Communications between Control Centers  CIP-012 \78\..................  Plans mitigating the risks posed by
                                                                         unauthorized disclosure and
                                                                         unauthorized modification of Real-time
                                                                         Assessment and Real-time monitoring
                                                                         data while being transmitted between
                                                                         any applicable Control Centers; and
                                                                         evidence of the associated security
                                                                         protections implemented and used.

[[Page 8321]]

 
Supply Chain Risk Management..........  CIP-013.......................  Supply chain security risk management
                                                                         plan, implementation, and testing
                                                                         procedures.
----------------------------------------------------------------------------------------------------------------

    68. To demonstrate that a public utility has implemented the 
requirements for the Hub-Spoke incentive, we propose that the 
informational filing describe the reconfiguration and assets added to 
the communication paths to/from locations containing low impact BES 
Cyber Systems. For the first annual informational filing, we propose 
that the public utility provide documents demonstrating these changes. 
For any subsequent annual informational filing, the public utility 
would only need to provide an updated version of any supporting 
documentation if a change occurred for the previous informational 
filing, as well as information on any failure to maintain the 
communication paths, and any mitigating actions the public utility 
undertook to resolve the problem.
b. NIST Framework Approach
    69. We propose that the reporting requirements to implement 
proposed Sec.  35.48(f) of its regulations for the NIST Framework 
Approach differ from those under the NERC CIP Incentives Approach. The 
Commission would review the informational filings to determine if the 
proposed changes meet the requirements for incentives by focusing on 
four areas: Acquisition and installation, system connectivity, security 
application, and relevance to entity monitoring/response actions. For 
each subsequent annual informational filing, the public utility would 
only need to provide an updated version of the supporting documentation 
showing any changes from the prior informational filing, as well as 
information on any period of time during the reported year where the 
public utility ceased to continuously implement specific requirements 
consistent with the Commission's order approving the application.
    70. Step 1 of the review process addresses the acquisition and 
installation of required network components (i.e., high-fidelity 
sensors) that meet the proposed security enhancements subject to 
incentives. The Commission would require a public utility to confirm 
that funds have been expended on the necessary equipment through 
documentation such as purchase orders, receipts, licensing agreements, 
and installation documentation with specified time periods.
    71. Step 2 of the review process addresses the attainment of 
necessary training and personnel for the implementation of the 
incentivized action. Training and additional personnel must be 
necessary and limited to the implementation of the cybersecurity 
equipment within the affected networks. The Commission would require a 
public utility to verify training and personnel actions through 
documentation such as third-party contractor agreements, training 
program curricula, and official job descriptions.
    72. Step 3 of the review process addresses network and sensor node 
recognition optimization of system deployment, and strategic 
configuration. This step describes how the sensors are connected to a 
network and how they substantively improve the visibility and security 
of the affected networks. The public utility could demonstrate this 
network and sensor node recognition through such items as configuration 
files, system logs, configuration settings, and a description of its 
location on the affected network.
    73. Step 4 of the review process addresses the incorporation of 
sensor nodes in the enterprise level incident monitoring and response 
plan. This step verifies that the incentivized action is being 
incorporated into monitoring and response actions to impact overall 
network security. The utility would need to attest that the information 
would be included in operational activities such as incident response 
plans, playbooks, and Standard Operating Procedures.
3. Confidentiality Considerations
    74. We recognize that the Commission's cybersecurity incentives 
policy must balance the need to maintain the confidentiality of 
cybersecurity systems and protocols with the need for transparency in 
rates when awarding incentive rates to public utilities for 
cybersecurity investments. The Commission balances these considerations 
through its confidential \79\ and Critical Energy/Electric 
Infrastructure Information (CEII) filing regulations.\80\ These 
regulations recognize that intervenors in a Commission proceeding, such 
as a proceeding establishing incentive rates, may need access to 
information that the applicant believes should be withheld from 
disclosure to the general public, in order to participate effectively 
in the proceeding. Therefore, the Commission's regulations provide for 
any person who is a participant in a proceeding or has filed a motion 
to intervene or notice of intervention to make a written request to the 
filer for a copy of the complete, non-public version of the document.
---------------------------------------------------------------------------

    \79\ Section 388.112 of the Commission's regulations specifies 
that any person submitting a document to the Commission may request 
privileged treatment for some or all of the information contained in 
a particular document that it claims is exempt from the mandatory 
public disclosure requirements of the Freedom of Information Act and 
that should be withheld from public disclosure. In particular, Sec.  
388.112(b)(2) sets forth procedures for filing and obtaining access 
to material that is filed as privileged in any proceeding to which a 
right to intervention exists and specifies that if a person files 
material as privileged in such proceeding, that person must include 
a proposed form of protective agreement with the filing, or identify 
a protective agreement that has already been filed in the proceeding 
that applies to the filed material. 18 CFR 388.112.
    \80\ Section 388.113 governs the procedures for submitting, 
designating, handling, sharing, and disseminating CEII submitted to 
or generated by the Commission. Section 388.113(d)(1)(iii) provides 
for the person filing material as CEII in a proceeding to which a 
right to intervention exists to include a proposed form of 
protective agreement. 18 CFR 388.113.
---------------------------------------------------------------------------

    75. Accordingly, we propose that, if a public utility applying for 
incentive rate treatment under this rule is concerned that the 
information contained in an application for incentives could lead to 
the disclosure of confidential information or CEII related to its 
cybersecurity systems, the public utility could request protection of 
its information pursuant to these procedures. The Commission's 
practice, however, is not to allow for the filing of an FPA section 205 
rate application under seal. Under this proposal, to the extent an 
applicant seeks confidential treatment, we expect that the applicant's 
request for such treatment will be specific and limited. If an 
applicant requests portions of the application be protected, we expect 
that the public portion of an application should contain sufficient 
information for ratepayers to judge the rate impact and scope of the 
proposed incentives, including the general approach adopted. The 
Commission will address such requests

[[Page 8322]]

for protection on a case by case basis.\81\ We request comments on the 
specific and limited types of information that would be appropriate for 
applicants to shield from public disclosure, and any other specific 
modifications or additions to the Commission's generally applicable 
filing regulations that may be appropriate for the incentives filings 
proposed in this NOPR.
---------------------------------------------------------------------------

    \81\ An applicant or any other person may object to disclosure 
generally or to a particular requester, and in such cases the non-
public document will not be provided to the requester until ordered 
by the Commission or a decisional authority. 18 CFR 
388.112(b)(2)(iv), 388.113(g)(4).
---------------------------------------------------------------------------

V. Information Collection Statement

    76. The information collection requirements contained in this NOPR 
are subject to review by the Office of Management and Budget (OMB) 
under section 3507(d) of the Paperwork Reduction Act of 1995.\82\ OMB's 
regulations require approval of certain information collection 
requirements imposed by agency rules.\83\ Upon approval of a collection 
of information, OMB will assign an OMB control number and expiration 
date. Respondents subject to the filing requirements of this rule will 
not be penalized for failing to respond to these collections of 
information unless the collections of information display a valid OMB 
control number.
---------------------------------------------------------------------------

    \82\ 44 U.S.C. 3507(d).
    \83\ 5 CFR 1320.11.
---------------------------------------------------------------------------

    77. This NOPR will establish the Commission's regulations and 
policy with respect to the mechanics and implementation of the 
Commission's cybersecurity incentives policy and will require an annual 
report from the recipients of cybersecurity incentives in order to 
demonstrate compliance with the Commission's cybersecurity incentives 
regulations and policy.
    78. Interested persons may obtain information on the reporting 
requirements by contacting Ellen Brown, Office of the Executive 
Director, Federal Energy Regulatory Commission, 888 First Street NE, 
Washington, DC 20426 via email ([email protected]) or telephone 
((202) 502-8663).
    79. The Commission solicits comments on the Commission's need for 
this information, whether the information will have practical utility, 
the accuracy of the burden estimates, ways to enhance the quality, 
utility, and clarity of the information to be collected or retained, 
and any suggested methods for minimizing respondents' burden, including 
the use of automated information techniques.
    80. Please send comments concerning the collection of information 
and the associated burden estimates to: Office of Information and 
Regulatory Affairs, Office of Management and Budget, 725 17th Street 
NW, Washington, DC 20503 [Attention: Desk Officer for the Federal 
Energy Regulatory Commission]. Due to security concerns, comments 
should be sent electronically to the following email address: 
[email protected]. Comments submitted to OMB should refer to 
OMB Control Nos.
    81. Please submit a copy of your comments on the information 
collections to the Commission via the eFiling link on the Commission's 
website at https://www.ferc.gov. If you are not able to file comments 
electronically, please send a copy of your comments to: Federal Energy 
Regulatory Commission, Secretary of the Commission, 888 First Street 
NE, Washington, DC 20426. Comments on the information collection that 
are sent to FERC should refer to RM21-3-000.
    82. Title: Report of Cybersecurity Incentives Investment Activity.
    83. Action: Proposed revision of collections of information in 
accordance with RM21-XX-000.
    84. OMB Control Nos.: 1902-0248 (FERC-725B).
    85. Respondents for this Rulemaking: Public Utilities that seek 
incentive-based rate treatment for cybersecurity projects.
    86. Frequency of Information Collection: Annually beginning with 
the calendar year the Commission grants incentive-based rate treatment.
    87. Necessity of Information: Required to obtain or retain 
benefits.
    88. Internal Review: The Commission has reviewed the changes and 
has determined that such changes are necessary. These requirements 
conform to the Commission's need for efficient information collection, 
communication, and management within the energy industry. The 
Commission has specific, objective support for the burden estimates 
associated with the information collection requirements.
    89. The NERC Compliance Registry, as of October 02, 2020, 
identifies approximately 319 Transmission Owners in the U.S. that are 
subject to this proposed rulemaking.
    90. The Commission estimates that the NOPR would affect the burden 
\84\ and cost \85\ as follows:
---------------------------------------------------------------------------

    \84\ ``Burden'' is the total time, effort, or financial 
resources expended by persons to generate, maintain, retain, or 
disclose or provide information to or for a Federal agency. For 
further explanation of what is included in the information 
collection burden, refer to 5 CFR 1320.3.
    \85\ Commission staff estimates that respondents' hourly wages 
(including benefits) are comparable to those of FERC employees. 
Therefore, the hourly cost used in this analysis is $83.00 ($172,329 
per year).

                                                    Proposed Changes in NOPR in Docket No. RM21-3-000
--------------------------------------------------------------------------------------------------------------------------------------------------------
                   A                            B               C               D                          E                               F
Area of modification                          Number of          Annual          Annual  Average burden hours and cost per     Total estimated burden
                                            respondents       estimated       estimated   response.                             hours and total
                                                              number of       number of                                         estimated cost
                                                          responses per       responses                                        (column D x column E)
                                                             respondent     (column B x
                                                                              column C)
--------------------------------------------------------------------------------------------------------------------------------------------------------
                                                 Report of Cybersecurity Incentives Investment Activity
--------------------------------------------------------------------------------------------------------------------------------------------------------
Additional filers of Report of                       20               1              20  80 hours; $6,640....................  1,600 hours; $132,800.
 Cybersecurity Incentives Investment
 Activity (Annually and Ongoing).
Critical Infrastructure Protection              223,875               1         223,875  9.13 hours; $757.44.................  2,043,026 hours;
 Reliability Standards for FERC-725B                                                                                            $169,571,158.
 (unchanged).
                                        ----------------------------------------------------------------------------------------------------------------
    Total..............................  ..............  ..............         223,895  ....................................  2,044,626 hours;
                                                                                                                                $169,703,958.
--------------------------------------------------------------------------------------------------------------------------------------------------------

    91. For the purposes of estimating burden in this NOPR, in the 
table above, we conservatively estimate annual numbers of the different 
possible cybersecurity incentive requests as similar to the historical 
high experienced for incentives Orders issued under Section 219. For 
example, to date, the Commission has received

[[Page 8323]]

approximately 110 incentive requests since Order No. 679 was issued in 
2006, and has issued an average of 8 incentives Orders per year, with a 
single year high of 21 incentive Orders issued. This estimate is 
consistent with our expectation that the cybersecurity incentives are 
likely to attract significant interest from the industry. We seek 
comment on the estimates in the table above regarding the number of 
incentive requests.

VI. Environmental Analysis

    92. The Commission is required to prepare an Environmental 
Assessment or an Environmental Impact Statement for any action that may 
have a significant adverse effect on the human environment.\86\ We 
conclude that neither an Environmental Assessment nor an Environmental 
Impact Statement is required for this proposed rule under Sec.  
380.4(a)(15) of the Commission's regulations, which provides a 
categorical exemption for approval of actions under FPA sections 205 
and 206 relating to the filing of schedules containing all rates and 
charges for the transmission or sale of electric energy subject to the 
Commission's jurisdiction, plus the classification, practices, 
contracts, and regulations that affect rates, charges, classification, 
and services.\87\
---------------------------------------------------------------------------

    \86\ Regulations Implementing the National Environmental Policy 
Act of 1969, Order No. 486, 52 FR 47897 (Dec. 17, 1987), FERC Stats. 
& Regs. Preambles 1986-1990 ] 30,783 (1987) (cross referenced at 41 
FERC ] 61,284).
    \87\ 18 CFR 380.4(a)(15).
---------------------------------------------------------------------------

VII. Regulatory Flexibility Act

    93. The Regulatory Flexibility Act of 1980 \88\ generally requires 
a description and analysis of proposed and final rules that will have 
significant economic impact on a substantial number of small entities. 
The Small Business Administration (SBA) sets the threshold for what 
constitutes a small business. Under SBA's size standards,\89\ 
Transmission owners all fall under the category of Electric Bulk Power 
Transmission and Control (NAICS code 221121), with a size threshold of 
500 employees (including the entity and its associates).\90\
---------------------------------------------------------------------------

    \88\ 5 U.S.C. 601-612.
    \89\ 13 CFR 121.201
    \90\ The threshold for the number of employees indicates the 
maximum allowed for a concern and its affiliates to be considered 
small.
---------------------------------------------------------------------------

    94. We estimate that 319 transmission owners are reported in the 
NERC registry. Using the list of Transmission Owners from the NERC 
Registry (dated October 2, 2020), we estimate that approximately 6% of 
those entities may file for incentives.
    95. We estimate additional annual costs associated with the NOPR 
(as shown in the table above) of:
     $6,640 per filer for 20 new filers.
     These costs are only incurred on a voluntary basis.
    96. Therefore, the estimated additional annual cost per entity 
ranges from $0 to $132,800. According to SBA guidance, the 
determination of significance of impact ``should be seen as relative to 
the size of the business, the size of the competitor's business, the 
number of filers received annually (20), and the impact this regulation 
has on larger competitors.'' \91\ We do not consider the estimated cost 
to be a significant economic impact. As a result, we certify that the 
proposals in this NOPR will not have a significant economic impact on a 
substantial number of small entities.
---------------------------------------------------------------------------

    \91\ U.S. Small Business Administration, A Guide for Government 
Agencies How to Comply with the Regulatory Flexibility Act, at 18 
(May 2012), https://www.sba.gov/sites/default/files/advocacy/rfaguide_0512_0.pdf.
---------------------------------------------------------------------------

VIII. Comment Procedures

    97. The Commission invites interested persons to submit comments on 
the matters and issues proposed in this notice to be adopted, including 
any related matters or alternative proposals that commenters may wish 
to discuss. Comments are due April 6, 2021. Also, reply comments are 
due May 6, 2021. Comments must refer to Docket No. RM20-3-000, and must 
include the commenter's name, the organization they represent, if 
applicable, and their address in their comments.
    98. The Commission encourages comments to be filed electronically 
via the eFiling link on the Commission's website at https://www.ferc.gov. The Commission accepts most standard word processing 
formats. Documents created electronically using word processing 
software should be filed in native applications or print-to-PDF format 
and not in a scanned format. Commenters filing electronically do not 
need to make a paper filing.
    99. Commenters that are not able to file comments electronically 
may mail or hand-deliver an original of their comments. Mailed comments 
should be addressed to: Federal Energy Regulatory Commission, Secretary 
of the Commission, 888 First Street NE, Washington, DC 20426. Hand-
delivered comments should be delivered to: Federal Energy Regulatory 
Commission, 12225 Wilkins Avenue, Rockville, Maryland 20852. All 
comments will be placed in the Commission's public files and may be 
viewed, printed, or downloaded remotely as described in the Document 
Availability section below. Commenters on this proposal are not 
required to serve copies of their comments on other commenters.

IX. Document Availability

    100. In addition to publishing the full text of this document in 
the Federal Register, the Commission provides all interested persons an 
opportunity to view and/or print the contents of this document via the 
internet through the Commission's Home Page (https://www.ferc.gov). At 
this time, the Commission has suspended access to the Commission's 
Public Reference Room due to the President's March 13, 2020 
proclamation declaring a National Emergency concerning the Novel 
Coronavirus Disease (COVID-19).
    101. From the Commission's Home Page on the internet, this 
information is available on eLibrary. The full text of this document is 
available on eLibrary in PDF and Microsoft Word format for viewing, 
printing, and/or downloading. To access this document in eLibrary, type 
the docket number excluding the last three digits of this document in 
the docket number field.
    102. User assistance is available for eLibrary and the Commission's 
website during normal business hours from the Commission's Online 
Support at 202-502-6652 (toll free at 1-866-208-3676) or email at 
[email protected], or the Public Reference Room at (202) 502-
8371, TTY (202) 502-8659. Email the Public Reference Room at 
[email protected].

List of Subjects in 18 CFR Part 35

    Electric power rates, Electric utilities, Reporting and 
recordkeeping requirements.

    By direction of the Commission. Chairman Danly and Commissioner 
Glick are concurring with a joint separate statement attached. 
Commissioner Clements is not participating.

    Issued: December 17, 2020.
Kimberly D. Bose,
Secretary.

    In consideration of the foregoing, the Commission is proposing to 
amend part 35, chapter I, title 18, Code of Federal Regulations, as 
follows.

PART 35--FILING OF RATE SCHEDULES AND TARIFFS

0
1. The authority citation for part 35 continues to read as follows:

    Authority: 16 U.S.C. 791a-825r, 2601-2645; 31 U.S.C. 9701; 42 
U.S.C. 7101-7352.

0
2. Section 35.48 is added to read as follows:

[[Page 8324]]

Subpart K--Cybersecurity Investment Provisions


Sec.  35.48  Cybersecurity investment.

    (a) Purpose. This section establishes rules for incentive-based 
rate treatments for voluntarily making cybersecurity investments by a 
public utility as described in this subpart.
    (b) Incentive-based rate treatments for cybersecurity investment. 
The Commission will authorize incentive-based rate treatments for a 
public utility that makes cybersecurity investments under this subpart 
that materially enhance the cybersecurity posture of the Bulk-Power 
System by enhancing the applicants' cybersecurity posture substantially 
above levels required by Critical Infrastructure Protection Reliability 
Standards, provided that the proposed incentive is just and reasonable 
and not unduly discriminatory or preferential. A public utility may 
request one or both of the following incentive approaches for those 
eligible cybersecurity investments:
    (1) Critical Infrastructure Protection Incentive Approach. A public 
utility may receive incentive rate treatment for voluntarily applying 
Critical Infrastructure Protection Reliability Standards to bulk 
electric system facilities that are not currently subject to those 
requirements. A public utility will receive a rebuttable presumption 
that the investments made pursuant to this Critical Infrastructure 
Protection Incentive Approach materially enhance the cybersecurity 
posture of the Bulk-Power System to merit an incentive for such 
cybersecurity investments. A public utility may receive incentive rate 
treatment for the investments as follows:
    (i) Increasing the Critical Infrastructure Protection Reliability 
Standard security controls for facilities identified as low or medium 
impact bulk electric system Cyber Systems by applying the requirements 
for medium or high impact systems to low impact systems, and/or the 
requirements for high impact systems to medium impact systems; or
    (ii) Ensuring all external routable connectivity to and from the 
low impact system connect to a high or medium impact bulk electric 
system Cyber System and the cyber communication security controls 
required for the medium or high impact bulk electric system Cyber 
System must be implemented on the low impact system.
    (2) National Institute of Standards and Technology Framework 
Approach. A public utility may receive incentive rate treatment for 
implementing certain security controls, identified from time to time 
through a Commission issuance, that are included in the National 
Institute of Standards and Technology Framework.
    (c) Types of incentive-based rate treatments for cybersecurity 
investment. For purposes of paragraph (b) of this section, incentive-
based rate treatment shall be for those eligible cybersecurity 
investments and means any of the following:
    (1) An increase in rate of return on equity of 200 basis points;
    (2) Deferred cost recovery; or
    (3) Any other incentives approved by the Commission, pursuant to 
the requirements of this section that are deemed to be just and 
reasonable and not unduly discriminatory or preferential.
    (d) Incentive duration.
    (1) A return on equity incentive rate treatment approved pursuant 
to this section may last the earlier of:
    (i) The depreciation life of the underlying asset;
    (ii) 10 years from when the cybersecurity improvements enter 
service;
    (iii) when the investments or activities that serve as the basis of 
that incentive become mandatory pursuant to a Reliability Standard 
approved by the Commission;
    (iv) or when the public utility no longer meets the requirements 
for receiving the incentive.
    (2) A deferred regulatory asset whose costs are typically expensed 
should be amortized over a five-year period.
    (e) Incentive Applications. For the purpose of paragraphs (b) and 
(c) of this section, a public utility's request for one or more 
incentive based-rate treatments, to be made in a filing pursuant to 
section 205 of the Federal Power Act, must include a detailed 
explanation of the proposed rate treatment and include the following 
information:
    (1) For applications under the Critical Infrastructure Protection 
Incentive Approach:
    (i) The Bulk Electric System assets for which the public utility is 
requesting the incentive;
    (ii) The geographical location of the Bulk Electric System assets;
    (iii) The function the Bulk Electric System assets support;
    (iv) The incentive method the public utility is requesting for each 
of the Bulk Electric System assets;
    (v) The current and new impact ratings of the Bulk Electric System 
assets if they change because of the incentive; and
    (vi) A list of the Bulk Electric System Cyber Systems associated 
with each of the Bulk Electric System assets including details on their 
use.
    (2) For applications under the National Institute of Standards and 
Technology Framework Approach:
    (i) A description of the public utility's current cybersecurity 
posture;
    (ii) A description of the public utility's desired cybersecurity 
posture;
    (iii) A description of the quantified risk factors being addressed 
through the proposed incentive actions.
    (3) For applications requesting an increase in rate of return on 
equity of 200 basis points:
    (i) The anticipated cost of the capital investment; and
    (ii) The identity of the Commission jurisdictional rate schedule(s) 
under which it will recover the increased return on equity.
    (4) For applications requesting deferred cost recovery:
    (i) A description of any expenses, including whether the expenses 
are:
    (A) Expenses associated with third-party provision of hardware, 
software, and computing networking services;
    (B) Expenses for training to implement new cybersecurity 
enhancements; or
    (C) Other transition expenses, such as risk assessments by third 
parties or internal system reviews, and initial responses to findings 
of such assessments.
    (ii) Estimates of the cost of such expenses;
    (iii) When the costs are expected to be incurred;
    (iv) A narrative explanation of how the expenses meet the requested 
Critical Infrastructure Protection Incentive Approach or National 
Institute of Standards and Technology Framework Approach.
    (f) Reporting requirements. A public utility that has received 
cybersecurity incentives under this section must, within 120 days of 
completion of upgrades for which it receives incentives, make an 
informational filing and must make subsequent informational filings 
annually thereafter detailing the specific investments that were made 
pursuant to the Commission's approval and the corresponding FERC 
account used. An incentive recipient must describe the parts of its 
network that it upgraded in addition to the nature and cost of the 
various capital investments. For incentives where the Commission allows 
deferral of expenses, annual informational filings should describe such 
expenses in sufficient detail to demonstrate that such expenses are 
specifically related to the cybersecurity investment granted incentives 
and not for ongoing services including system

[[Page 8325]]

maintenance, surveillance, and other labor costs.
    (1) A public utility that receives incentive-based rate treatment 
under the Critical Infrastructure Protection Incentive Approach must 
also describe in its informational filings implementation of the 
enhanced security controls, as applicable, in all the topics covered by 
the Critical Infrastructure Protection Reliability Standards. For the 
first informational filing, the public utility must provide 
documentation to demonstrate voluntary application of identified 
Critical Infrastructure Protection Reliability Standards to facilities 
that are not currently subject to those requirements. For subsequent 
annual informational filings, the public utility must provide an 
updated version of the supporting documentation showing any changes 
from the prior informational filing as well as information on any 
period of time during the reported year where the public utility ceased 
to voluntarily apply identified Critical Infrastructure Protection 
Reliability Standards to facilities that are not currently subject to 
those requirements.
    (2) A public utility that receives incentive-based rate treatments 
under the National Institute of Standards and Technology Framework 
Approach must also include information that demonstrates:
    (i) The acquisition and installation of required network 
components, including confirmation that funds have been expended on the 
necessary equipment through documentation such as purchase orders, 
receipts, licensing agreements, and installation documentation with 
specified time periods;
    (ii) Attainment of necessary training and personnel, including 
documentation such as third-party contractor agreements, training 
program curricula, and official job descriptions;
    (iii) Network and sensor node recognition optimization through such 
items as configuration files, system logs, configuration settings, and 
a description of its location on the affected network;
    (iv) Incorporation of sensor nodes in the enterprise level incident 
monitoring and response plan including attesting that the information 
would be included in operational activities such as incident response 
plans, playbooks, and Standard Operating Procedures.

DEPARTMENT OF ENERGY

Federal Energy Regulatory Commission

Cybersecurity Incentives

DANLY, Chairman, and GLICK, Commissioner, concurring:
    1. Threats to the cybersecurity of the bulk power system are 
numerous and growing. Ensuring that the system is adequately protected 
against those threats is an issue of national importance and one that 
must remain a priority of this Commission. Accordingly, we support this 
notice of proposed rulemaking (NOPR) as a means for soliciting further 
comments on whether this particular incentives-based approach is a just 
and reasonable and not unduly discriminatory or preferential approach 
to improving public utilities' cybersecurity posture.
    2. We write separately to highlight two general issues that we 
believe require additional attention. The first issue is whether the 
Commission can better address cybersecurity threats by directing NERC 
to expand its critical infrastructure protection (CIP) standards to 
require some or all of the investments contemplated in this NOPR. 
Although we appreciate the appeal of an incentives-based approach, the 
importance of cybersecurity demands us to at least consider whether we 
should mandate the best practices contemplated in this NOPR rather than 
simply trying to induce public utilities to adopt them.
    3. The second issue goes to the heart of what the NOPR intends to 
achieve--whether public utilities are not adopting the contemplated 
measures because the existing financial incentives are insufficient. We 
encourage commenters to address whether--and, if so, why--additional 
measures, such as an elevated ROE or deferred cost recovery, are 
necessary to incentivize public utilities to adopt additional 
cybersecurity measures.
    For these reasons, we respectfully concur.

James P. Danly,

Chairman.

Richard Glick,

Commissioner.

[FR Doc. 2021-01986 Filed 2-4-21; 8:45 am]
BILLING CODE 6717-01-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.