Incentives for Advanced Cybersecurity Investment; Cybersecurity Incentives, 60567-60580 [2022-21003]
Download as PDF
lotter on DSK11XQN23PROD with PROPOSALS1
Federal Register / Vol. 87, No. 193 / Thursday, October 6, 2022 / Proposed Rules
names, organization name (if any), and
submitter representative name (if any).
If your comment is not processed
properly because of technical
difficulties, DOE will use this
information to contact you. If DOE
cannot read your comment due to
technical difficulties and cannot contact
you for clarification, DOE may not be
able to consider your comment.
However, your contact information
will be publicly viewable if you include
it in the comment or in any documents
attached to your comment. Any
information that you do not want to be
publicly viewable should not be
included in your comment, nor in any
document attached to your comment. If
this instruction is followed, persons
viewing comments will see only first
and last names, organization names,
correspondence containing comments,
and any documents submitted with the
comments.
Do not submit to www.regulations.gov
information for which disclosure is
restricted by statute, such as trade
secrets and commercial or financial
information (hereinafter referred to as
Confidential Business Information
(‘‘CBI’’)). Comments submitted through
www.regulations.gov cannot be claimed
as CBI. Comments received through the
website will waive any CBI claims for
the information submitted. For
information on submitting CBI, see the
Confidential Business Information
section.
DOE processes submissions made
through www.regulations.gov before
posting. Normally, comments will be
posted within a few days of being
submitted. However, if large volumes of
comments are being processed
simultaneously, your comment may not
be viewable for up to several weeks.
Please keep the comment tracking
number that www.regulations.gov
provides after you have successfully
uploaded your comment.
Submitting comments via email, hand
delivery/courier, or postal mail.
Comments and documents submitted
via email, hand delivery/courier, or
postal mail also will be posted to
www.regulations.gov. If you do not want
your personal contact information to be
publicly viewable, do not include it in
your comment or any accompanying
documents. Instead, provide your
contact information on a cover letter.
Include your first and last names, email
address, telephone number, and
optional mailing address. The cover
letter will not be publicly viewable as
long as it does not include any
comments.
Include contact information each time
you submit comments, data, documents,
VerDate Sep<11>2014
16:43 Oct 05, 2022
Jkt 259001
and other information to DOE. If you
submit via postal mail or hand delivery/
courier, please provide all items on a
CD, if feasible, in which case it is not
necessary to submit printed copies. No
faxes will be accepted.
Comments, data, and other
information submitted to DOE
electronically should be provided in
PDF (preferred), Microsoft Word or
Excel, WordPerfect, or text (ASCII) file
format. Provide documents that are not
secured, written in English and free of
any defects or viruses. Documents
should not contain special characters or
any form of encryption and, if possible,
they should carry the electronic
signature of the author.
Campaign form letters. Please submit
campaign form letters by the originating
organization in batches of between 50 to
500 form letters per PDF or as one form
letter with a list of supporters’ names
compiled into one or more PDFs. This
reduces comment processing and
posting time.
Confidential Business Information.
Pursuant to 10 CFR 1004.11, any person
submitting information that he or she
believes to be confidential and exempt
by law from public disclosure should
submit via email to
MHLF2022STD0023@ee.doe.gov@
ee.doe.gov, two well-marked copies: one
copy of the document marked
confidential including all the
information believed to be confidential,
and one copy of the document marked
‘‘non-confidential’’ with the information
believed to be confidential deleted. DOE
will make its own determination about
the confidential status of the
information and treat it according to its
determination.
It is DOE’s policy that all comments
may be included in the public docket,
without change and as received,
including any personal information
provided in the comments (except
information deemed to be exempt from
public disclosure).
DOE considers public participation to
be a very important part of the process
for developing energy conservation
standards. DOE actively encourages the
participation and interaction of the
public during the comment period in
this process. Interactions with and
between members of the public provide
a balanced discussion of the issues and
assist DOE. Anyone who wishes to be
added to the DOE mailing list to receive
future notices and information about
this process or would like to request a
public meeting should contact
Appliance and Equipment Standards
Program staff at (202) 287–1445 or via
email at
PO 00000
Frm 00013
Fmt 4702
Sfmt 4702
60567
ApplianceStandardsQuestions@
ee.doe.gov.
Signing Authority
This document of the Department of
Energy was signed on September 28,
2022, by Francisco Alejandro Moreno,
Acting Assistant Secretary for Energy
Efficiency and Renewable Energy,
pursuant to delegated authority from the
Secretary of Energy. That document
with the original signature and date is
maintained by DOE. For administrative
purposes only, and in compliance with
requirements of the Office of the Federal
Register, the undersigned DOE Federal
Register Liaison Officer has been
authorized to sign and submit the
document in electronic format for
publication, as an official document of
the Department of Energy. This
administrative process in no way alters
the legal effect of this document upon
publication in the Federal Register.
Signed in Washington, DC, on September
30, 2022.
Treena V. Garrett,
Federal Register Liaison Officer, U.S.
Department of Energy.
[FR Doc. 2022–21696 Filed 10–5–22; 8:45 am]
BILLING CODE 6450–01–P
DEPARTMENT OF ENERGY
Federal Energy Regulatory
Commission
18 CFR Part 35
[Docket Nos. RM22–19–000; RM21–3–000]
Incentives for Advanced Cybersecurity
Investment; Cybersecurity Incentives
Federal Energy Regulatory
Commission, Department of Energy.
ACTION: Notice of proposed rulemaking;
notice terminating proceeding.
AGENCY:
The Federal Energy
Regulatory Commission (Commission)
proposes to revise its regulations to
provide incentive-based rate treatments
for the transmission of electric energy in
interstate commerce and the sale of
electric energy at wholesale in interstate
commerce by utilities for the purpose of
benefitting consumers by encouraging
investments by utilities in advanced
cybersecurity technology and
participation by utilities in
cybersecurity threat information sharing
programs, as directed by the
Infrastructure Investment and Jobs Act
of 2021 (Infrastructure and Jobs Act).
This notice of proposed rulemaking
(NOPR) also terminates the NOPR
proceeding in Docket No. RM21–3–000
SUMMARY:
E:\FR\FM\06OCP1.SGM
06OCP1
60568
Federal Register / Vol. 87, No. 193 / Thursday, October 6, 2022 / Proposed Rules
(December 2020 Cybersecurity
Incentives NOPR).
As of October 6, 2022, the
proposed rule published at 86 FR 8309
on February 5, 2021, is withdrawn.
Comments on this proposed rule are due
November 7, 2022, and reply comments
are due November 21, 2022.
DATES:
Comments, identified by
docket number, may be filed in the
following ways. Electronic filing
through https://www.ferc.gov, is
preferred.
• Electronic Filing: Documents must
be filed in acceptable native
applications and print-to-PDF, but not
in scanned or picture format.
• For those unable to file
electronically, comments may be filed
ADDRESSES:
by USPS mail or by hand (including
courier) delivery.
Æ Mail via U.S. Postal Service Only:
Addressed to: Federal Energy
Regulatory Commission, Secretary of the
Commission, 888 First Street NE,
Washington, DC 20426.
Æ Hand (including courier) Delivery:
Deliver to: Federal Energy Regulatory
Commission, 12225 Wilkins Avenue,
Rockville, MD 20852.
The Comment Procedures Section of
this document contains more detailed
filing procedures.
FOR FURTHER INFORMATION CONTACT:
Kal Ayoub (Technical Information),
Office of Electric Reliability, Federal
Energy Regulatory Commission, 888
First Street NE, Washington, DC
20426, (202) 502–8863, kal.ayoub@
ferc.gov.
David DeFalaise (Technical
Information), Office of Electric
Reliability, Federal Energy Regulatory
Commission, 888 First Street NE,
Washington, DC 20426, (202) 502–
8180, david.defalaise@ferc.gov.
Adam Pollock (Technical Information),
Office of Energy Market Regulation,
Federal Energy Regulatory
Commission, 888 First Street NE,
Washington, DC 20426, (202) 502–
8458, adam.pollock@ferc.gov.
Alan Rukin (Legal Information), Office
of the General Counsel, Federal
Energy Regulatory Commission, 888
First Street NE, Washington, DC
20426, (202) 502–8502, alan.rukin@
ferc.gov.
SUPPLEMENTARY INFORMATION:
Table of Contents
Paragraph
numbers
I. Introduction .........................................................................................................................................................................................
II. Background .........................................................................................................................................................................................
A. Infrastructure Investment and Jobs Act of 2021 .......................................................................................................................
B. Prior Commission Action on Cybersecurity Incentives ...........................................................................................................
C. Advanced Cybersecurity Technology and Information ............................................................................................................
1. Advanced Cybersecurity Technology .................................................................................................................................
2. Advanced Cybersecurity Technology Information ............................................................................................................
D. Cybersecurity Threat Information Sharing Programs ...............................................................................................................
III. Discussion .........................................................................................................................................................................................
A. Proposed Approaches to Request an Incentive ........................................................................................................................
1. Eligibility Criteria ................................................................................................................................................................
2. Proposed Approaches for Evaluating Cybersecurity Expenditure Eligibility ..................................................................
B. Proposed Rate Incentives ...........................................................................................................................................................
1. ROE Adder ...........................................................................................................................................................................
2. Deferral of Certain Cybersecurity Expenses for Rate Recovery .........................................................................................
3. Performance-Based Rates .....................................................................................................................................................
C. Proposed Incentive Implementation ..........................................................................................................................................
1. Cybersecurity ROE Incentive Duration ...............................................................................................................................
2. Regulatory Asset Incentive Duration and Amortization Period ........................................................................................
3. Filing Process .......................................................................................................................................................................
4. Reporting Requirements ......................................................................................................................................................
IV. Information Collection Statement ...................................................................................................................................................
V. Environmental Assessment ...............................................................................................................................................................
VI. Regulatory Flexibility Act ................................................................................................................................................................
VII. Comment Procedures ......................................................................................................................................................................
VIII. Document Availability ...................................................................................................................................................................
lotter on DSK11XQN23PROD with PROPOSALS1
I. Introduction
1. In this NOPR, the Commission
proposes under section 219A of the
Federal Power Act (FPA) 1 to establish
rules for incentive-based rate treatments
for certain voluntary cybersecurity
investments 2 by utilities.3 These rules
1 Infrastructure and Jobs Act, Public Law 117–58,
section 40123, 135 Stat. 429, 951 (to be codified at
16 U.S.C. 824s–1).
2 In this NOPR, the term ‘‘investments’’ in
cybersecurity technology means expenditures that
can be either capitalized costs or expenses.
3 Notwithstanding that Infrastructure and Jobs Act
requires the Commission to offer incentives to
‘‘public utilities,’’ we propose to make rate
incentives available to non-public utilities that have
or will have a rate on file with the Commission,
VerDate Sep<11>2014
16:43 Oct 05, 2022
Jkt 259001
would make incentives available to
utilities that make certain cybersecurity
expenditures that enhance their security
posture by improving their ability to
protect against, detect, respond to, or
recover from a cybersecurity threat and
to utilities that participate in
cybersecurity threat information sharing
programs to the benefit of ratepayers
and national security.
similar to Commission precedent under FPA
section 219, 16 U.S.C. 824s. Therefore, all
references in this NOPR to ‘‘utilities’’ are intended
to include both public utilities and non-public
utilities that have or will have a rate on file with
the Commission.
PO 00000
Frm 00014
Fmt 4702
Sfmt 4702
1034
1036
1036
1039
1040
1040
1042
1042
1043
1043
1044
1046
1051
1054
1056
1059
1060
1060
1062
1063
1065
1067
1072
1072
1074
1075
2. First, we propose a regulatory
framework on how a utility could
qualify for incentives for eligible
cybersecurity expenditures. Under this
framework, we propose that eligible
cybersecurity expenditures must: (1)
materially improve cybersecurity
through either an investment in
advanced cybersecurity technology or
participation in a cybersecurity threat
information sharing program; and (2)
not already be mandated by Critical
Infrastructure Protection (CIP)
Reliability Standards, or local, state, or
Federal law. A utility would seek an
incentive in a filing pursuant to FPA
E:\FR\FM\06OCP1.SGM
06OCP1
Federal Register / Vol. 87, No. 193 / Thursday, October 6, 2022 / Proposed Rules
section 205 4 and the incentive would be
effective no earlier than the date of the
Commission order approving the
incentive request.
3. We propose to evaluate
cybersecurity investments using a list of
pre-qualified expenditures that are
eligible for incentives determined by the
Commission and publicly maintained
on the Commission’s website (PQ List).
With the Commission having evaluated
expenditures to include on the PQ List
in advance, we believe that the PQ List
approach would provide an efficient
and transparent mechanism for
determining appropriate cybersecurity
expenditures that are eligible for
incentives. We propose that any
cybersecurity expenditure that is on the
PQ List would be entitled to a rebuttable
presumption of eligibility for an
incentive. We also discuss and seek
comment on a potential alternative
approach, whereby a utility’s
cybersecurity expenditure would be
evaluated on a case-by-case basis to
determine if it is eligible for an
incentive.
4. Second, we propose two options for
the type of incentive a utility could
receive for an eligible cybersecurity
expenditure: (1) a return on equity
(ROE) adder of 200 basis points; or (2)
deferred cost recovery for certain
cybersecurity expenditures that enables
the utility to defer expenses and include
the unamortized portion in rate base.
5. Third, we propose that any
approved incentive(s) will remain in
effect for five years from the date on
which the cybersecurity investment(s)
enters service or expenses are incurred,
or expire earlier if other conditions
discussed in this NOPR are met before
the end of that five year period. We seek
comment on the proposed duration and
expiration conditions for incentives
granted under this proposal.
6. Finally, we propose that a utility
that has received a cybersecurity
incentive under this section must make
an annual informational filing on June
1, as further discussed herein. The
annual filing should detail the specific
investments that were made pursuant to
the Commission’s approval and the
corresponding FERC account used.5
lotter on DSK11XQN23PROD with PROPOSALS1
II. Background
A. Infrastructure Investment and Jobs
Act of 2021
7. On November 15, 2021, the
Infrastructure and Jobs Act was signed
into law.6 The Infrastructure and Jobs
4 16
U.S.C. 824d.
18 CFR part 141.
6 Infrastructure and Jobs Act, Public Law 117–58,
135 Stat. 429.
5 See
VerDate Sep<11>2014
16:43 Oct 05, 2022
Jkt 259001
Act, in part, directs the Commission to
revise its regulations to establish, by
rule, incentive-based, including
performance-based, rate treatments for
the transmission of electric energy in
interstate commerce and the sale of
electric energy at wholesale in interstate
commerce by public utilities for the
purpose of benefitting consumers by
encouraging investments by public
utilities in advanced cybersecurity
technology 7 and participation by public
utilities in cybersecurity threat
information sharing programs.
8. As an initial step in the process of
revising the Commission’s regulations,
the Infrastructure and Jobs Act directed
the Commission to conduct a study, in
consultation with certain entities,8 to
identify incentive-based rate treatments,
including performance-based rates, for
the jurisdictional transmission and sale
of electric energy that could support
investments in advanced cybersecurity
technology and participation by public
utilities in cybersecurity threat
information sharing programs.9 The
Infrastructure and Jobs Act also required
the Commission to submit a report to
Congress (Report) detailing the results of
the directed study. Following the
passage of the Infrastructure and Jobs
Act, Commission staff consulted with
the specified entities to help identify
incentive-based rate treatments that
could enhance the security posture of
the Bulk-Power System.10
7 FPA section 219A(a)(1) defines the term
advanced cybersecurity technology to mean any
technology, operational capability, or service,
including computer hardware, software, or a related
asset, that enhances the security posture of public
utilities through improvements in the ability to
protect against, detect, respond to, or recover from
a cybersecurity threat. Infrastructure and Jobs Act,
Public Law 117–58, section 40123, 135 Stat. 429,
951 (to be codified at 16 U.S.C. 824s–1(a)(1)). FPA
section 219A(a)(2) defines the term advanced
cybersecurity technology information to mean
information relating to advanced cybersecurity
technology or proposed advanced cybersecurity
technology that is generated by or provided to the
Commission or another Federal agency. Id. at 952
(to be codified at 16 U.S.C. 824s–1(a)(2)).
8 The entities identified in the Infrastructure and
Jobs Act are: Secretary of Energy; North American
Electric Reliability Corporation (NERC); Electricity
Subsector Coordinating Council (ESCC); and
National Association of Regulatory Utility
Commissioners (NARUC).
9 Infrastructure and Jobs Act, Public Law 117–58,
section 40123, 135 Stat. 429, 952 (to be codified at
16 U.S.C. 824s–1(b)).
10 The term Bulk-Power System is defined in FPA
section 215 and refers to: (1) facilities and control
systems necessary for operating an interconnected
electric energy transmission network (or any
portion thereof); and (2) electric energy from
generation facilities needed to maintain
transmission system reliability. 16 U.S.C.
824o(a)(1). With respect to CIP Reliability
Standards, NERC uses the term ‘‘bulk electric
system’’ (BES), which is generally defined as
transmission facilities that are operated at 100 kV
or higher and real power or reactive power
PO 00000
Frm 00015
Fmt 4702
Sfmt 4702
60569
9. On May 13, 2022, the Report was
submitted to Congress.11 The Report,
among other things, outlined prior
Commission efforts to address
incentives for cybersecurity initiatives.
The Report provided information
regarding potential incentive-based rate
treatments and the Commission’s
general ratemaking authority, including
the prior adoption of rate incentives and
performance-based ratemaking in other
contexts. In addition, the Report
discussed challenges associated with
adopting an incentive-based rate
structure to enhance the security
posture of the Bulk-Power System. The
Report noted that, while advanced
technologies that address cybersecurity
threats may be innovative and/or above
and beyond industry standards at one
time, they may subsequently become
conventional, mandatory, or even
antiquated and therefore may be less
deserving of an incentive over time.
B. Prior Commission Action on
Cybersecurity Incentives
10. The Commission began assessing
the potential use of incentives to
improve cybersecurity prior to the
passage of the Infrastructure and Jobs
Act. On June 18, 2020, Commission staff
issued a white paper to explore a
potential framework for providing
transmission incentives to utilities for
cybersecurity investments that produce
significant cybersecurity benefits for
actions taken that exceed the
requirements of the mandatory and
enforceable CIP Reliability Standards.12
Following the issuance of the
Cybersecurity White Paper, the
Commission issued the December 2020
Cybersecurity Incentives NOPR on
December 17, 2020, proposing to allow
utilities to request incentives for certain
cybersecurity investments that go above
and beyond the requirements of the CIP
Reliability Standards.13
11. In the December 2020
Cybersecurity Incentives NOPR, the
Commission proposed two
cybersecurity incentive approaches. The
first approach, referred to as the NERC
CIP Incentives Approach, would have
allowed an entity to receive incentivebased rate treatment for voluntarily
resources connected at 100 kV or higher. See NERC,
Glossary of Terms Used in NERC Reliability
Standards (March 29, 2022), https://www.nerc.com/
files/glossary_of_terms.pdf.
11 FERC, Incentives for Advanced Cybersecurity
Technology Investment (May 2022).
12 FERC, Cybersecurity Incentives Policy White
Paper, Docket No. AD20–19–000, (June 2020)
(Cybersecurity White Paper), https://www.ferc.gov/
sites/default/files/2020-06/notice-cybersecurity.pdf.
13 Cybersecurity Incentives, Notice of Proposed
Rulemaking, 86 FR 8309 (Feb. 5, 2021), 173 FERC
¶ 61,240 (2020).
E:\FR\FM\06OCP1.SGM
06OCP1
60570
Federal Register / Vol. 87, No. 193 / Thursday, October 6, 2022 / Proposed Rules
applying identified CIP Reliability
Standards to facilities that were not
otherwise subject to those requirements.
The second approach, the National
Institute of Standards and Technology
(NIST) Framework Approach, would
have allowed an entity to receive
incentive-based rate treatment for
implementing certain security controls
included in the NIST Framework 14 that
exceed the requirements of the CIP
Reliability Standards.
12. In light of the Congressional
mandate in the Infrastructure and Jobs
Act directing the Commission to
establish cybersecurity incentives, this
NOPR supersedes the December 2020
Cybersecurity Incentives NOPR, and
that proceeding in Docket No. RM21–3–
000 is hereby terminated.
systems, configuration management
systems, anti-malware tools, user
behavior analytic software, event
logging systems, and any system for
access control, identification,
authentication, and/or authorization
control.
15. Cybersecurity services may be
either automated or manual and can
include, but are not limited to, system
installation and maintenance, network
administration, asset management,
threat and vulnerability management,
training, incident response, forensic
investigation, network monitoring, data
sharing, data recovery, disaster
recovery, network restoration, log
analytics, cloud network storage, and
any general cybersecurity consulting
service.
C. Advanced Cybersecurity Technology
and Information
2. Advanced Cybersecurity Technology
Information
16. Advanced cybersecurity
technology information may include,
but is not limited to, plans, policies,
procedures, specifications,
implementation, configuration,
manuals, instructions, accounting,
financials, logs, records, and physical or
electronic access lists related to or
regarding the advanced cybersecurity
technology. Some advanced
cybersecurity technology information
that is provided to the Commission may
constitute critical energy/electric
infrastructure information (CEII).17
lotter on DSK11XQN23PROD with PROPOSALS1
1. Advanced Cybersecurity Technology
13. As noted above, the Infrastructure
and Jobs Act directs the Commission to,
among other things, identify incentivebased rate treatments that could support
investments in advanced cybersecurity
technology. An advanced cybersecurity
technology can be a product and/or a
service.15
14. Cybersecurity products are
generally hardware, software, and
cybersecurity services that can be used
for information technology systems and/
or operational technology 16 systems.
Cybersecurity products can include, but
are not limited to, security information
and event management systems,
intrusion detection systems, anomaly
detection systems, encryption tools,
data loss prevention systems, forensic
toolkits, incident response tools,
imaging tools, network behavior
analysis tools, access management
14 NIST is part of the U.S. Department of
Commerce that advances measurement science,
standards, and technology. It has developed a
voluntary Framework for Improving Critical
Infrastructure Cybersecurity to ‘‘address and
manage cybersecurity risk in a cost-effective way
based on business and organizational needs without
placing additional regulatory requirements on
businesses.’’ NIST, Framework for Improving
Critical Infrastucture Cybersecurity, v (Apr. 16,
2018), https://nvlpubs.nist.gov/nistpubs/CSWP/
NIST.CSWP.04162018.pdf.
15 See supra n.7 (defining advanced cybersecurity
technology).
16 The NIST glossary defines ‘‘operational
technology’’ as ‘‘programmable systems or devices
that interact with the physical environment (or
manage devices that interact with the physical
environment). These systems/devices detect or
cause a direct change through the monitoring and/
or control of devices, processes, and events.
Examples include industrial control systems,
building management systems, fire control systems,
and physical access control mechanisms.’’ NIST,
Computer Security Resource Center, Glossary (Mar.
10, 2022), https://csrc.nist.gov/glossary.
VerDate Sep<11>2014
16:43 Oct 05, 2022
Jkt 259001
D. Cybersecurity Threat Information
Sharing Programs
17. The Infrastructure and Jobs Act
also directs the Commission to identify
incentive-based rate treatments that
could support participation by public
utilities in cybersecurity threat
information sharing programs.
Engagement with the entities as directed
in the Infrastructure and Jobs Act
informed the Commission of the
existing barriers faced by utilities
seeking to participate in these
information sharing programs, which
include the high costs associated with
implementing monitoring technology
and maintenance of sensor technology,
the amount of time and effort required
to share information, incurring fees to
participate in information sharing
programs, and concerns regarding the
confidentiality of the information once
shared.
III. Discussion
18. To implement the statutory
directive in the Infrastructure and Jobs
Act, we propose to revise our
regulations to provide a process for
17 18
PO 00000
CFR 388.113.
Frm 00016
Fmt 4702
Sfmt 4702
utilities to qualify for and then receive
incentive-based rate treatments for
eligible cybersecurity expenditures. For
purposes of this NOPR, an
‘‘expenditure’’ includes both expenses
and capitalized costs associated with
advanced cybersecurity technology and
participation in a cybersecurity threat
information sharing program. We
propose the following approach and
then seek comments on our proposal in
three sections: (1) Proposed Approaches
to Request an Incentive, which
discusses how a utility could qualify for
incentives for eligible cybersecurity
expenditures; (2) Proposed Rate
Incentives, which describes the type of
incentive a utility could receive for an
eligible cybersecurity expenditure; and
(3) Proposed Incentive Implementation,
which discusses proposed duration and
expiration conditions for incentives.
A. Proposed Approaches To Request an
Incentive
19. We propose to add § 35.48(c) to
our regulations to create a framework for
evaluating whether certain
cybersecurity expenditures, including
expenses and capitalized costs, qualify
for an incentive. First, we propose
eligibility criteria to determine whether
a cybersecurity expenditure is eligible
for an incentive. Second, in § 35.48(d)
we propose to use a list of pre-qualified
investments, the PQ List, to identify the
types of cybersecurity expenditures that
the Commission will find eligible for an
incentive. In addition, we seek comment
on whether a case-by-case approach
should be used to evaluate whether
certain cybersecurity expenditures are
eligible for incentives.
1. Eligibility Criteria
20. We propose that the utility
seeking an incentive must demonstrate,
at a minimum, that the expenditure: (1)
would materially improve cybersecurity
through either an investment in
advanced cybersecurity technology or
participation in a cybersecurity threat
information sharing program(s); and (2)
is not already mandated by CIP
Reliability Standards, or otherwise
mandated by local, state, or Federal law.
With respect to the first criterion, we
seek comment on whether, and if so
how, the Commission should evaluate
and ensure that the benefits of the
expenditure exceed the combined costs
of the expenditure and incentive, to
ensure the proposed rates are just and
reasonable. Further, we seek comment
on whether these are the appropriate
criteria and whether there are additional
criteria or limitations that we should
consider (e.g., whether the Commission
should consider an obligation imposed
E:\FR\FM\06OCP1.SGM
06OCP1
Federal Register / Vol. 87, No. 193 / Thursday, October 6, 2022 / Proposed Rules
lotter on DSK11XQN23PROD with PROPOSALS1
by a state commission as a condition for
a merger to be ineligible for an
incentive).
21. Additionally, we propose that, in
determining which cybersecurity
expenditures will materially improve a
utility’s security posture, the
Commission will consider the following
sources: (1) security controls
enumerated in the NIST SP 800–53
‘‘Security and Privacy Controls for
Information Systems and
Organizations’’ catalog; 18 (2) security
controls satisfying an objective found in
the NIST Cybersecurity Framework; 19
(3) a specific recommendation from the
Department of Homeland Security’s
(DHS) Cybersecurity and Infrastructure
Security Agency (CISA) or from the
Department of Energy (DOE); 20 (4) a
specific recommendation from the CISA
Shields Up Campaign; 21 (5)
participation in the DOE Cybersecurity
Risk information Sharing Program
(CRISP) or similar information sharing
program; and/or (6) the Cybersecurity
Capability Maturity Model Domains at
the highest Maturity Indicator Level.22
Using vehicles from DHS, DOE, and
other agencies responsible for
addressing sophisticated and rapidly
evolving cyber threats as qualifiers for
the consideration of incentives would
allow the Commission to benefit from
the expertise of other federal agencies
and help ensure that the cybersecurity
expenditures will be targeted and
effective.
22. We propose that, to be eligible for
incentive-based rate treatment,
cybersecurity expenditures must satisfy
the first two criteria (i.e., materially
improve cybersecurity and not already
mandated). The eligibility criteria
would apply to either of the two
evaluation approaches discussed below
(i.e., the PQ List or the case-by-case
approach). We seek comment on these
criteria, including any potential
refinements, and any other criteria for
incentive eligibility that the
Commission should adopt in the Final
Rule.
18 NIST, Special Publication 800–53, Revision 5,
Security and Privacy Controls for Information
Systems and Organizations, (Dec. 12, 2020), https://
www.nist.gov/privacy-framework/nist-privacyframework-and-cybersecurity-framework-nistspecial-publication-800-53.
19 See NIST, Cybersecurity Framework, https://
www.nist.gov/cyberframework.
20 See, e.g., CISA, National Cyber Awareness
System Alerts, https://www.cisa.gov/uscert/ncas/
alerts.
21 See CISA, Shields Up, https://www.cisa.gov/
shields-up.
22 See DOE, Cybersecurity Capability Maturity
Model, https://www.energy.gov/ceser/cybersecuritycapability-maturity-model-c2m2.
VerDate Sep<11>2014
16:43 Oct 05, 2022
Jkt 259001
2. Proposed Approaches for Evaluating
Cybersecurity Expenditure Eligibility
23. We propose adopting a PQ List
approach, which would use a list of prequalified cybersecurity expenditures,
consistent with the eligibility criteria
that the Commission ultimately adopts.
We also seek comment on the
alternative use of a case-by-case
approach.
24. Under either approach, we
propose that a utility make a filing
pursuant to FPA section 205 for
incentive-based rate treatment for those
expenditures. Consistent with our
precedent for incentives under FPA
section 219, while a utility may first file
a petition for declaratory order to seek
a ruling on its eligibility for an
incentive, a utility still must make a
filing under FPA section 205 for
Commission review of any rate changes.
We propose that the incentive would be
effective no earlier than the date of the
Commission order granting the
incentive under FPA section 205. A
utility should seek CEII treatment, as
appropriate, for any part of its filing
seeking incentives that includes specific
engineering, vulnerability, or detailed
design information about proposed or
existing critical infrastructure.23
a. PQ List Approach
25. We propose to create a PQ List
that identifies expenditures that could
warrant an incentive. Under this
proposal, the PQ List will be codified at
35.48(d) of the Commission’s
regulations and a copy will be posted on
the Commission’s website.
26. We propose that a utility seeking
an incentive would be required to
demonstrate that its cybersecurity
expenditure qualifies as one or more of
the PQ List items. Any cybersecurity
expenditure that is on the PQ List
would be entitled to a rebuttable
presumption of eligibility for an
incentive. Although the PQ List items
would be entitled to a presumption of
eligibility, the utility would still need to
demonstrate, and the Commission
would need to find, that the proposed
rate, inclusive of the incentive, is just
and reasonable. We propose to allow
intervening parties to seek to rebut this
presumption by demonstrating that the
cybersecurity expenditure does not meet
one or more of the eligibility criteria
(e.g., that, given the unique
circumstances of the utility, the
expenditure for which the utility seeks
an incentive would not materially
improve cybersecurity or is otherwise
mandatory for that utility) or the
23 See
18 CFR 388.113; see also 16 U.S.C. 824o–
1.
PO 00000
Frm 00017
Fmt 4702
Sfmt 4702
60571
Commission could make this finding
sua sponte.
27. We believe that this PQ List
approach would provide efficiency and
transparency benefits. With the
Commission having pre-reviewed
potential PQ List items, we believe that
utility-specific incentive filings could be
substantially streamlined compared to
use of a case-by-case approach. We
recognize, however, that this approach
may limit expenditures eligible for
incentives only to those on the PQ List
and would require the Commission to
review and update the PQ List on a
regular basis, which introduces
additional process and may delay the
eligibility of cybersecurity expenditures
for incentives.
i. Initial PQ List
28. We propose to include two
eligible cybersecurity expenditures on
the PQ List initially: (1) expenditures
associated with participation in the DOE
CRISP; 24 and (2) expenditures
associated with internal network
security monitoring within the utility’s
cyber systems, which could include
information technology cyber systems
and/or operational technology cyber
systems, and which could be associated
with cyber systems that may or may not
be subject to the CIP Reliability
Standards. We believe investment in
these cybersecurity expenditures would
materially improve cybersecurity; 25 and
are not already mandated by CIP
Reliability Standards 26 or otherwise
mandated by Federal law. We initially
propose to include CRISP, as its purpose
is to facilitate the timely bi-directional
sharing of unclassified and classified
threat information and to develop
situational awareness tools that enhance
the energy sector’s ability to identify,
prioritize, and coordinate the protection
of critical infrastructure and key
resources.27 However, we seek
comments on whether to include other
24 See DOE, Energy Sector Cybersecurity
Preparedness, https://www.energy.gov/ceser/energysector-cybersecurity-preparedness.
25 E.g., both participation in CRISP and internal
network security monitoring would fall under
recommendations in the NIST SP 800–53 ‘‘Security
and Privacy Controls for Information Systems and
Organizations’’ catalog.
26 We note that, in January 2022, the Commission
issued a NOPR that proposed to require NERC to
develop a mandatory standard regarding internal
network analysis and monitoring technologies for
high and medium impact bulk electric system cyber
systems. Internal Network Security Monitoring for
High and Medium Impact Bulk Electric System
Cyber Systems, Notice of Proposed Rulemaking, 87
FR 4173 (Jan. 27, 2022), 178 FERC ¶ 61,038 (2022)
(2022 INSM NOPR).
27 DOE, Energy Sector Cybersecurity
Preparedness, https://www.energy.gov/ceser/energysector-cybersecurity-preparedness.
E:\FR\FM\06OCP1.SGM
06OCP1
60572
Federal Register / Vol. 87, No. 193 / Thursday, October 6, 2022 / Proposed Rules
information sharing programs on the PQ
List.
29. We propose to include internal
network security monitoring on the PQ
List as we believe that internal network
security monitoring may better position
an entity to detect malicious activity
that has circumvented perimeter
controls.28 Further, while the currently
effective CIP Reliability Standards do
not require internal network security
monitoring, NERC has recognized the
proliferation and usefulness of such
technology.29
30. Although we propose these two
eligible cybersecurity expenditures for
the initial PQ List, there may be other
cybersecurity expenditures that would
meet the statutory requirements and
proposed eligibility criteria. Therefore,
we seek comment on these and any
additional cybersecurity expenditures to
consider for inclusion on the initial PQ
List
ii. Updating the PQ List
31. Considering the rapidly evolving
nature of cybersecurity threats and
solutions, we expect to regularly
evaluate the PQ List and update it as
necessary. The eligibility criteria
described above, or any future eligibility
criteria the Commission adopts, would
guide the Commission’s decision on
what to add, modify, or remove from the
PQ List. As noted above, we propose
that, if a cybersecurity expenditure on
the PQ List becomes mandatory, it
would no longer be eligible for an
incentive as of the effective date of the
mandate.30 The Commission would
update the PQ List by adding, removing,
or modifying cybersecurity
expenditures, as needed, via a
rulemaking, whether sua sponte or in
response to a petition.
b. Case-by-Case Approach
32. Another potential approach is to
permit a utility to file for incentivebased rate treatment for any
28 2022
INSM NOPR at P 11.
e.g., NERC, ERO Enterprise CMEP Practice
Guide: Network Monitoring Sensors, Centralized
Collectors, and Information Sharing (June 4, 2021),
https://www.nerc.com/pa/comp/guidance/
CMEPPracticeGuidesDL/
CMEP%20Practice%20Guide%20%20Network%20Monitoring%20Sensors.pdf
(explaining that NERC developed the guide in
response to a U.S. DOE initiative ‘‘to advance
technologies and systems that will provide cyber
visibility, detection, and response capabilities for
[industrial control systems] of electric utilities.’’ Id.
at 1.).
30 If a particular cybersecurity expenditure
becomes mandatory with respect to a utility, the
provisions of proposed 18 CFR 35.48(f) would
prohibit that utility from continuing to receive an
incentive for the affected cybersecurity expenditure
even if the Commission has not yet updated the PQ
List.
lotter on DSK11XQN23PROD with PROPOSALS1
29 See,
VerDate Sep<11>2014
16:43 Oct 05, 2022
Jkt 259001
cybersecurity expenditure that satisfies
the eligibility criteria discussed above,
i.e., the utility could demonstrate that
the expenditure is voluntary and
materially improves cybersecurity
through either an investment in
advanced cybersecurity technology or
participation in a cybersecurity threat
information sharing program. Under this
approach, the Commission would
review each filing on a case-by-case
basis, to determine whether the
proposed cybersecurity expenditure is
consistent with the eligibility criteria. If
the Commission adopts a case-by-case
approach, there would be no
presumption of eligibility for any given
cybersecurity expenditure. The utility
would bear the full burden to
demonstrate in its filing that its
cybersecurity expenditure meets the
Commission-approved eligibility
criteria, and, similar to the PQ list
approach, demonstrate that its proposed
rate, inclusive of the incentive, is just
and reasonable. We seek comment on
whether and, if so, how the Commission
should implement a case-by-case
approach.
B. Proposed Rate Incentives
33. We propose the following rate
incentives for utilities that make eligible
cybersecurity investments: (1) an ROE
adder of 200 basis points that would be
applied to the incentive-eligible
investments; and (2) deferral of certain
eligible expenses for rate recovery,
enabling them to be part of rate base
such that a return can be earned on the
unamortized portion. We believe both
offer meaningful incentive to encourage
cybersecurity expenditure that improves
a utility’s cybersecurity posture.
Additionally, we seek comment on
whether and how the principles of
performance-based regulation could
apply to utilities with respect to
cybersecurity investments.
34. Under Part II of the FPA, the
Commission has jurisdiction over the
transmission of electric energy in
interstate commerce and the sale of
electric energy at wholesale in interstate
commerce by public utilities.31 With
limited exceptions, transmission rates
are based on the cost of providing
transmission service (cost-of-service
rates). Cost-of-service transmission rates
31 16 U.S.C. 824–824w. Unlike FPA section 219,
titled Transmission Infrastructure Investment,
which gives the Commission the authority to offer
incentives for the transmission of electric energy in
interstate commerce, new FPA section 219A, titled
Incentives for Cybersecurity Investments, gives the
Commission the authority to offer incentives for the
transmission of electric energy in interstate
commerce as well as the sale of electric energy at
wholesale in interstate commerce by public
utilities.
PO 00000
Frm 00018
Fmt 4702
Sfmt 4702
are recovered either through a formula
rate, for which the formula is the rate on
file and most of the inputs change year
to year based on inputs that are
included in the FERC Form No. 1 or
other financial forms,32 or a stated rate
where the rate on file is based on an
approved revenue requirement. Costs
incurred to undertake cybersecurity
activities can be included in various
accounting categories,33 either as inputs
to a formula rate as expenses or plant in
the determination of the revenue
requirement for a stated rate. The
Commission has allowed costs related to
security and reliability that are
recovered through formula rates to
include, for example, transmission plant
(e.g., transmission line upgrades to
harden the system), general and
common plant, (e.g., software and
computers), and administrative and
general costs (e.g., labor and outside
services, including services associated
with utility-wide informational
technology).34 Utilities recover the cost
of expenses as a cost-of-service element
in rates, but do not earn a return on
them. Utilities recover costs of
capitalized investments through
depreciation and earn a return on the
undepreciated amounts over the useful
life of the investment.35
35. Most utility information
technology investments (general and
intangible plant) and expenses
(administrative and general costs)
support functions of the entire utility,
not just the transmission function, and
therefore only a portion of those costs
are allocated to transmission customers,
typically based on wages and salaries
allocators.36
1. ROE Adder
36. We propose to add § 35.48(e)(1) to
the Commission’s regulations to allow a
utility that makes cybersecurity
32 Doswell Ltd. P’ship v. Va. Elec. & Power Co.,
62 FERC ¶ 61,149, at 62,069 (1993).
33 In the Notice of Proposed Rulemaking in Acct.
& Reporting Treatment of Certain Renewable Energy
Assets, 180 FERC ¶ 61,050 (2022), the Commission
proposes new accounts to more clearly specify how
utilities must account for information technology
hardware and software investments.
34 See Boston Edison Co., 109 FERC ¶ 61,300, at
P 40 (2004), order on reh’g, 111 FERC ¶ 61,266
(2005) (accepting proposed modifications to
transmission formula rates to allow recovery of
capitalized software costs incurred to safeguard the
reliability and security of its transmission system).
35 The Commission has also accepted utility
proposals to recover security costs as part of a
utility’s stated (i.e., non-formula) rates. See Pacific
Gas & Elec. Co., 149 FERC ¶ 61,112 (2014); Pacific
Gas & Elec. Co., 146 FERC ¶ 61,034 (2014).
36 See, e.g., Midcontinent Independent System
Operator Attachment O formula rate, 2–3 (stating
that general and intangible plant and administrative
and general costs are allocated to transmission rates
based on a wages and salaries allocator).
E:\FR\FM\06OCP1.SGM
06OCP1
Federal Register / Vol. 87, No. 193 / Thursday, October 6, 2022 / Proposed Rules
lotter on DSK11XQN23PROD with PROPOSALS1
investments that are eligible for
incentives, as more fully described
above, to request an ROE adder of 200
basis points (Cybersecurity ROE
Incentive) that would be applied to the
incentive-eligible investments. Any
incentive granted under this proposal
would be subject to the total base and
incentive return being capped at the top
of the utility’s zone of reasonableness.37
This Cybersecurity ROE Incentive is
intended to encourage utilities to
proactively make additional
investments in cybersecurity systems.
We believe that a 200-basis point ROE
adder may be appropriate to provide a
meaningful incentive to encourage
utilities to improve their systems’
cybersecurity. We recognize that this
amount exceeds the ROE incentives for
transmission facilities that the
Commission typically provides
pursuant to FPA section 219. However,
given the relatively small cost of
cybersecurity investments compared to
conventional transmission projects, a
higher ROE may be necessary to affect
the expenditure decisions of utilities,
without unduly burdening ratepayers.
On balance, we believe that the
Cybersecurity ROE Incentive satisfies
the Congressional directive to benefit
consumers by encouraging: (1)
investments by utilities in advanced
cybersecurity technology; and (2)
participation by utilities in
cybersecurity threat information sharing
programs.
37. We propose that enterprise-wide
investments—which are not specific to
transmission but a portion of which are
recovered through transmission rates—
may also be eligible for the 200 basispoint ROE adder incentive if the
Commission determines that the
investments merit incentives, based on
the eligibility criteria described above.
However, consistent with both
longstanding cost-causation ratemaking
principles 38 and the statutory
requirement that rates inclusive of
incentives be just and reasonable, we
propose that only the conventionally
allocated portion of such investments
37 See, e.g., Emera Me. v. FERC, 854 F.3d 9, 23
(D.C. Cir. 2017) (‘‘The zone of reasonableness
informs FERC’s selection of a just and reasonable
rate.’’); see also Permian Basin, 390 U.S. 747, 767
(1968) (stating that as long as the rate selected by
the Commission is within the zone of
reasonableness, the Commission is not required to
adopt as just and reasonable any particular rate
level).
38 See Old Dominion Elec. Coop. v FERC, 898
F.3d 1254, 1255 (D.C. Cir. 2018), (‘‘For decades, the
Commission and the courts have understood this
requirement to incorporate a ‘‘cost-causation
principle’’—the rates charged for electricity should
reflect the costs of providing it.); see, e.g., Ala. Elec.
Coop., Inc. v. FERC, 684 F.2d 20, 27 (D.C. Cir.
1982).
VerDate Sep<11>2014
16:43 Oct 05, 2022
Jkt 259001
that flows through to cost-of-service
rates on file with the Commission
would be eligible for this rate treatment.
For example, if a utility seeks an
incentive for a cybersecurity investment
that it made to its general plant
facilities, both the underlying
investment and associated incentive
must be allocated based on conventions
of the rates (e.g., the transmission share
using a wages and salaries allocator for
general plant in most transmission costof-service rates). With this limitation,
we seek to ensure that the cybersecurity
incentives policy adheres to the
ratemaking principle of cost-causation
by, for example, limiting a transmission
customer’s share of incentive costs to
the share of such investments that serve
transmission.
38. We preliminarily find that the
same expenditure should not be eligible
for both the Cybersecurity ROE
Incentive and the Regulatory Asset
Incentive, discussed below. Given that
regulatory asset treatment may be
approved for costs that are normally
treated as expenses (i.e., as regulatory
assets, discussed below), we
preliminarily find that costs that are
allowed to be deferred as a regulatory
asset should be included in rate base for
determination of the base return but not
for the additional return associated with
the 200-basis point ROE adder.
2. Deferral of Certain Cybersecurity
Expenses for Rate Recovery
39. We propose to add § 35.48(e)(2) to
the Commission’s regulations to allow a
utility that makes cybersecurity
investments that are eligible for
incentives, as more fully described
above, to seek deferred cost recovery.
We believe that, in limited
circumstances, it may be appropriate to
allow a utility to defer recovery of
certain cybersecurity costs that are
generally expensed as they are incurred,
and treat them as regulatory assets,
while also allowing such regulatory
assets to be included in transmission
rate base (Regulatory Asset Incentive).
Many costs associated with
cybersecurity are in the form of
expenses, often to third party vendors,
rather than capital investments.
Moreover, certain cost categories that
companies historically have purchased
and capitalized, such as software, are
now often procured as services with
periodic payments to vendors that are
recorded as expenses. Therefore, to
encourage investment in cybersecurity,
we believe that it may be appropriate to
allow utilities to defer and amortize
eligible costs that are typically recorded
as expenses including those that are
associated with third-party provision of
PO 00000
Frm 00019
Fmt 4702
Sfmt 4702
60573
hardware, software, and computing and
networking services. We propose that
eligible expenses, that would otherwise
be includable in cost-of-service as
current period expenses, may receive an
incentive by deferring such costs as
regulatory assets if they are incurred
after the effective date of the
Commission order granting a utility’s
request for incentives. Additionally, we
seek comment on whether it would be
preferable to permit only 50% of
incentive-eligible expenses to be treated
as regulatory assets.
40. A range of implementation costs
associated with cybersecurity
investments may be eligible for deferred
rate treatment. Such costs may include,
for example, training to implement new
cybersecurity practices and systems.
However, we propose that, to be eligible
for the incentive of deferred cost
recovery, such training costs must be
distinct from costs associated with preexisting training on cybersecurity
practices. Another potentially eligible
implementation cost may be internal
system evaluations and assessments or
analyses by third parties described
above, to the extent that they are
associated with a capitalizable item and
are part of eligible capitalizable
expenses. We propose that any
implementation costs that are not
conventionally booked as plant and thus
capitalized can be considered for
deferral as a regulatory asset. Recurring
costs may be eligible for deferral as a
regulatory asset and include, for
example, subscriptions, service
agreements, and post-implementation
training costs. Specifically, they may
include ongoing dues for participation
by utilities in cybersecurity threat
information sharing programs that
satisfy the Commission’s incentive
eligibility criteria described above.
41. Because FPA section 219A(c)(2)
directs the Commission to offer
incentives to encourage participation by
public utilities in cybersecurity threat
information sharing programs, we seek
comment on whether we should allow
utilities who are already participating in
an eligible cybersecurity threat
information sharing program to seek to
recover this incentive.
42. We note that the Commission’s
rules and regulations in the Uniform
System of Accounts 39 already require
public utilities to maintain records
supporting any entries to the regulatory
asset account so that the public utility
can furnish full information as to the
nature and amount of, and justification
39 See 18 CFR part 101, Account Definition
Account 182.3, Other Regulatory Assets, paragraph
D.
E:\FR\FM\06OCP1.SGM
06OCP1
60574
Federal Register / Vol. 87, No. 193 / Thursday, October 6, 2022 / Proposed Rules
for, each regulatory asset recorded in the
account. Therefore, pursuant to our
existing regulations, utilities must
maintain sufficient records to support
the distinction of any expenditures that
are afforded incentive-based rate
treatment.40
43. Additionally, consistent with the
proposal for the Cybersecurity ROE
Incentive for eligible cybersecurity
capital investments, we propose that
only directly assigned transmission
costs or the conventionally allocated
portion of enterprise-wide expenses
(e.g., using the wages and salaries
allocator) would be eligible for the
Regulatory Asset Incentive in
transmission rates.
3. Performance-Based Rates
44. Section 219A(c) of the FPA directs
the Commission to establish incentivebased, including performance-based,
rate treatments. Performance-based rate
treatments can potentially reward
utilities for achieving stated goals, as
opposed to specific actions that only
contribute to those goals. Because it is
difficult to directly observe the level of
effort a utility expends on ensuring
cybersecurity, performance-based
regulation could theoretically provide a
valuable tool to motivate utilities to
maintain and operate their systems
reliably and efficiently. Performancebased ratemaking can take multiple
forms, but ultimately requires the ability
to measure and tie rate treatments to
actual performance.
45. We seek comment on
performance-based rates and whether
and how the principles of performancebased regulation could apply to utilities
with respect to cybersecurity
investments.41 We seek comment on
specific cybersecurity performance
metrics that could be subject to a
performance standard. In particular, we
seek comment on whether any widely
accepted metrics for cybersecurity
performance could lend themselves to
be benchmarks needed for performancebased rates, or whether new appropriate
metrics could be developed. We further
seek comment on what rate mechanisms
could accompany such metrics. We ask
that any proposed mechanisms: (1) rely
on cybersecurity performance
lotter on DSK11XQN23PROD with PROPOSALS1
40 Id.
41 Consistent with Order No. 679, which
implemented FPA section 219, we interpret
‘‘incentive-based, including performance-based,
rate treatments’’ in FPA section 219A to require the
Commission to consider performance-based rates as
an option among incentive ratemaking treatments.
Promoting Transmission Inv. through Pricing
Reform, Order No. 679, 71 FR 43293 (July 31, 2006),
116 FERC ¶ 61,057 (2006), order on reh’g, Order No.
679–A, 117 FERC ¶ 61,345 (2006), order on reh’g,
119 FERC ¶ 61,062 (2007).
VerDate Sep<11>2014
16:43 Oct 05, 2022
Jkt 259001
benchmarks and not expenditures or
practices; and (2) consider ratepayer
impacts, given the relatively small costs
of cybersecurity expenditures compared
to utilities’ overall cost-of-service.
C. Proposed Incentive Implementation
1. Cybersecurity ROE Incentive Duration
46. We propose to add § 35.48(f)(1) to
the Commission’s regulations to allow a
utility granted a Cybersecurity ROE
Incentive to receive that incentive until
the earliest of: (1) the conclusion of the
depreciation life of the underlying asset;
(2) five years from when the
cybersecurity investment(s) enter
service; 42 (3) the time that the
investment(s) or activities that serve as
the basis of that incentive become
mandatory pursuant to a Reliability
Standard approved by the Commission,
or local, state, or Federal law; or (4) the
recipient no longer meets the
requirements for receiving the incentive.
Incentive-eligible cybersecurity
investments primarily include
equipment or system modifications that
typically have short depreciation lives,
as opposed to long-lived assets like
physical structures. Thus, we believe
that most cybersecurity incentives
granted under this rulemaking would
remain in effect until the conclusion of
the depreciation life of the underlying
asset. However, for investments with
useful lives exceeding five years, we
propose that the incentive end at the
conclusion of five years from the time
that the asset receiving the cybersecurity
incentive entered service. The vast
majority of information technologyrelated investments feature expected
useful lives and corresponding cost-ofservice depreciation rates of no longer
than five years. Consequently, we
preliminarily find that five years is a
reasonable expected life to encourage
utilities to make an investment and to
ensure just and reasonable rates.
However, we seek comment on whether
the proposed duration should be three
years instead of five years.
2. Regulatory Asset Incentive Duration
and Amortization Period
47. We propose to add § 35.48(f)(3)(i)
to the Commission’s regulations to
specify that a utility granted the
Regulatory Asset Incentive must
amortize the regulatory asset over five
years.43 We believe that this may reflect
the generally short-lived nature of
cybersecurity activities and corresponds
42 For participation in an information sharing
program, the ‘‘investment’’ would recur annually.
43 As noted above, the investment for
participation in an information sharing program
would recur annually.
PO 00000
Frm 00020
Fmt 4702
Sfmt 4702
to the depreciation rates for investments
described above. This period generally
corresponds to the expected useful life
and corresponding cost-of-service
amortization period of cybersecurity
investments.
48. We also propose to add
§ 35.48(f)(3)(ii) to the Commission’s
regulations to specify that a utility
granted the Regulatory Asset Incentive
may defer eligible expenses for up to
five years from the date of Commission
approval of the incentive. Under this
provision, we propose that eligible
expenses incurred for five years could
be added to the regulatory asset that is
allowed in rate base and amortized over
five subsequent years, as discussed
above.44 We preliminarily find that this
limit is appropriate, given the
potentially indefinite nature of certain
expenses. Such a limit also reflects that
cybersecurity risks and solutions evolve
over time and matches the five-year
maximum duration of the Cybersecurity
ROE Incentive discussed above. We
preliminarily find that a five-year limit
appropriately balances the goal of
providing an incentive of a sufficient
size to encourage utilities to make
eligible improvements in their
cybersecurity posture with the
requirement to protect ratepayers.
49. However, we propose to make an
exception to this sunsetting provision
for eligible cybersecurity threat
information sharing programs. FPA
section 219A(c)(2) directs the
Commission to provide incentives for
participation in cybersecurity threat
information sharing programs. We find
that participation in such cybersecurity
threat information sharing programs,
which provide participants with
ongoing updates about active
cybersecurity threats and are therefore
distinct from discrete cybersecurity
investments that may become obsolete
with the passage of time, warrants a
different incentive treatment than other
investments. Consequently, we propose
that utilities be able to continue
deferring these expenses and including
them in their rate base for each annual
tranche of expenses, for as long as: (1)
the utility continues incurring costs for
its participation in the program; and (2)
the program remains eligible for
incentives.
44 We propose that, in their FPA section 205
filings, incentive recipients must include notes to
their formula rates specifying the Commission
order(s) which approved the incentive and stating
that the associated regulatory asset incentive must
terminate in the earlier of: (1) five years from the
date of the later of the Commission approving the
incentive or the expense being incurred; and (2) the
expenditure becoming mandatory.
E:\FR\FM\06OCP1.SGM
06OCP1
Federal Register / Vol. 87, No. 193 / Thursday, October 6, 2022 / Proposed Rules
lotter on DSK11XQN23PROD with PROPOSALS1
3. Filing Process
50. We propose to add § 35.48(g) to
the Commission’s regulations to require
a utility’s request for one or more
incentive-based rate treatments to be
made in a filing pursuant to FPA section
205.45 As proposed, such a request must
include a detailed explanation of how
the utility plans to implement one or
both of the proposed incentive
approaches and the requested rate
treatment. We propose that utilities
provide detail on the expenditures for
which they seek incentives, and show
how its cybersecurity-related
expenditure(s) meet the eligibility
requirements, as described in more
detail below.
51. In addition, under § 35.48(g) of the
proposed regulation, a utility seeking
one or more incentive-based rate
treatments must receive Commission
approval prior to implementing any
incentive in its rate on file with the
Commission.46 In order to effectuate an
incentive in rates, utilities would need
to propose in their FPA section 205
filing conforming revisions to their
formula rates, as appropriate, to reflect
incentive rate treatment granted
pursuant to these proposed
regulations.47
52. Filings under the PQ List
approach must provide evidence that
the utility has made one or more prequalified cybersecurity expenditures
and otherwise complies with all
appropriate requirements.
53. A utility requesting the
Cybersecurity ROE Incentive must
provide the anticipated cost of the
capital investment and the identity of
the rate schedule(s) on file with the
Commission under which it will recover
the increased ROE. Alternatively, a
utility requesting the Regulatory Asset
Incentive must provide a description of
the covered expense(s), including
whether the expense(s) are associated
with the third-party provision of
hardware, software, and computing
network services or incurred for training
to implement network analysis and
monitoring programs, as well as an
45 As discussed in section III.A.2., consistent with
our precedent for incentives under FPA section 219,
while a utility may first file a petition for
declaratory order to seek a ruling on its eligibility
for an incentive, a utility still must make a filing
under FPA section 205 for Commission review of
any rate changes.
46 We note that FPA section 219A(e)(2) expressly
prohibits unjust and unreasonable double recovery
for advanced cybersecurity technology.
47 Utilities with stated rates may file under FPA
section 205 to seek incentives as part of a larger rate
case or make a request for single issue ratemaking,
which the Commission will evaluate on a case-bycase basis to ensure that the rate, inclusive of the
incentive, is just and reasonable.
VerDate Sep<11>2014
16:43 Oct 05, 2022
Jkt 259001
estimate of the cost of such expense(s)
and when the cost is expected to be
incurred.
4. Reporting Requirements
54. In order to ensure that a utility
receiving incentive rate treatment has
implemented the requirements of the
incentive and to ensure that it continues
to adhere to the requirements, we
propose to add § 35.48(h) of the
Commission’s regulations to require
utilities to submit informational reports
to the Commission for the duration of
the incentive.
55. A utility that has received
cybersecurity incentives under this
section must make an annual
informational filing by June 1, provided
that the utility has received
Commission-approval for the incentive
at least 60 days prior to June 1 of that
year. Utilities that receive Commissionapproval for an incentive later than 60
days prior to June 1 would be required
to submit an annual informational filing
beginning on June 1 of the following
year.48 The annual filing should detail
the specific investments, if any, as of
that date, that were made pursuant to
the Commission’s approval and the
corresponding FERC account for which
expenditures are booked. For recipients
of the Cybersecurity ROE Incentive,
each annual informational filing should
describe the parts of its network that it
upgraded in addition to the nature and
cost of the various investments. For
recipients of the Regulatory Asset
Incentive, each annual informational
filing should describe such expenses in
sufficient detail to demonstrate that
such expenses are specifically related to
the eligible cybersecurity investment
underlying the incentives and not for
ongoing services including system
maintenance, surveillance, and other
labor costs.
56. The Commission may also
conduct periodic verification to assess
cybersecurity investments and expenses
for which it has approved incentives.
The Commission could perform such
verifications through multiple means
(i.e., directing further informational
filings, audits, etc.). The annual
informational filings will inform the
Commission on how and when any
additional verification is warranted.
IV. Information Collection Statement
57. The information collection
requirements contained in this NOPR
are subject to review by the Office of
Management and Budget (OMB) under
48 If a utility first receives Commission-approval
for the incentive on April 1 or later, the initial
annual informational filing would be due on June
1 of the following year.
PO 00000
Frm 00021
Fmt 4702
Sfmt 4702
60575
the Paperwork Reduction Act of 1995 at
44 U.S.C. 3507(d). OMB’s regulations
require approval of certain information
collection requirements imposed by
agency rules.49 Upon approval of a
collection of information, OMB will
assign an OMB control number and
expiration date. Respondents subject to
the filing requirements of this proposed
rule will not be penalized for failing to
respond to this collection of information
unless the collection of information
displays a valid OMB Control Number.
This NOPR would establish the
Commission’s regulations with respect
to the implementation of the
Infrastructure and Job Act.50
58. Interested persons may obtain
information on the reporting
requirements by contacting Ellen
Brown, Office of the Executive Director,
Federal Energy Regulatory Commission,
888 First Street NE, Washington, DC
20426, via email (DataClearance@
ferc.gov) or telephone ((202) 502–8663).
59. The Commission solicits
comments on this collection of
information within 60 days of the
publication of this NOPR in the Federal
Register. Public comments may include,
but are not limited to, following topics:
the Commission’s need for this
information, whether the information
will have practical utility, the accuracy
of the burden estimates, ways to
enhance the quality, utility, and clarity
of the information to be collected or
retained, and any suggested methods for
minimizing respondents’ burden,
including the use of automated
information techniques.
60. Please send comments concerning
the collection of information and the
associated burden estimates to: OMB
through www.reginfo.gov/public/do/
PRAMain, Attention: Federal Energy
Regulatory Commission Desk Officer.
Please identify the OMB Control
Number 1902–0248 in the subject line.
61. Instructions: OMB submissions
must be formatted and filed in
accordance with submission guidelines
at: www.reginfo.gov/public/do/
PRAMain; using the search function
under the ‘‘Currently Under Review
field,’’ select Federal Energy Regulatory
Commission, click ‘‘submit,’’ and select
‘‘comment’’ to the right of the subject
collection.
62. Title: FERC–725B, Incentives for
Advanced Cybersecurity Investment.
63. Action: Proposed revision of
FERC–725B.
64. OMB Control No.: 1902–0248.
49 5
CFR 1320.11.
Law 117–55, 135 Stat. 951 (2021) (to be
codified at 16 U.S.C. 824s–1).
50 Public
E:\FR\FM\06OCP1.SGM
06OCP1
60576
Federal Register / Vol. 87, No. 193 / Thursday, October 6, 2022 / Proposed Rules
65. Respondents for this Rulemaking:
Public utilities and non-public utilities
that have or will have a rate on file with
the Commission.
66. Frequency of Information
Collection:
(1) On occasion: Voluntary filings
seeking incentive-based rate treatment
for cybersecurity expenditures; and
(2) Annually: A informational filing
on June 1 of each year, required of
entities that have been granted
incentive-based rate treatment for
cybersecurity expenditures.
67. Abstract: The NOPR would
provide that a utility may seek
incentive-based rate treatment for
cybersecurity investments by making a
rate filing in accordance with section
205 of the FPA. The NOPR states that
one approach the Commission may use
in evaluating such a filing is to consider
whether prospective cybersecurity
investments would match one of the
types of investments listed at proposed
18 CFR 35.48(d). The NOPR refers to
this list of pre-qualified expenditures
that are eligible for incentives as the
‘‘PQ List.’’ The Commission proposes
that any cybersecurity expenditure that
is on the PQ List would be entitled to
a rebuttable presumption of eligibility
for an incentive.
The NOPR also discusses and seeks
comment on a potential alternative
approach, in which a utility’s
cybersecurity expenditure would be
evaluated on a case-by-case basis to
determine if it is eligible for an
incentive. Under that approach, the
utility would need to demonstrate that
the prospective investment is voluntary
and would materially improve
cybersecurity through either an
investment in advanced cybersecurity
technology or participation in
cybersecurity threat information sharing
program. Under either approach, the
utility would need to demonstrate that
its rate, inclusive of the incentive, is just
and reasonable.
68. The NOPR also would provide
that a utility that is granted incentivebased rate treatment must submit an
annual informational filing to the
Commission by June 1 of each year,
provided that the utility has received
Commission approval of the incentive at
least 60 days prior to June 1 of that year.
Utilities that receive Commission
approval of an incentive later than 60
days prior to June 1 would be required
to submit an annual informational filing
beginning on June 1 of the following
year. The informational filing must
describe the specific investments, if any,
as of that date, that were made pursuant
to the Commission’s approval and the
corresponding FERC account for which
expenditures are booked. For incentives
where the Commission allows deferral
of expenses, annual informational
filings should describe such expenses in
sufficient detail to demonstrate that
such expenses are specifically related to
the cybersecurity investment for which
the incentive was granted, and not for
ongoing services including system
maintenance, surveillance, and other
labor costs.
69. Necessity of Information: Required
to obtain or retain benefits.
70. Internal Review: The Commission
has reviewed the changes and has
determined that such changes are
necessary. These requirements conform
to the Commission’s need for efficient
information collection, communication,
and management within the energy
industry. The Commission has specific,
objective support for the burden
estimates associated with the
information collection requirements.
71. The NERC Compliance Registry,
as of August 5, 2022, identifies
approximately 1,669 utilities, both
public and non-public, in the U.S. that
would be eligible for this proposed
incentive and rate treatment. The
Commission estimates that the NOPR
may affect the burden 51 and cost 52 as
follows:
FERC–725B—PROPOSED CHANGES IN NOPR IN DOCKET NO. RM22–19–000
B.
Number of
respondents
A.
Area of modification
C.
Annual
estimated
number of
responses per
respondent
D.
Annual
estimated
number of
responses
E.
Average burden
hours & cost
($) per response
(Column B ×
Column C)
(Column D × Column E)
Voluntary filing seeking incentive rate
treatment for cybersecurity investment. Proposed 18 CFR 35.48(b).
Annual informational filing required
where Commission has granted incentive rate treatment. Proposed 18
CFR 35.48(h).
50
1
50
80 hours; $7,280 ...
4,000 hours; $364,000.
50
1
50
40 hours; $3,640 ...
2,000 hours; $182,000.
Totals ...............................................
........................
........................
........................
................................
6,000 hours; $546,000.
V. Environmental Assessment
lotter on DSK11XQN23PROD with PROPOSALS1
F.
Total estimated
burden hours & total
estimated cost
($)
72. The Commission is required to
prepare an Environmental Assessment
or an Environmental Impact Statement
for any action that may have a
significant adverse effect on the human
51 ‘‘Burden’’ is the total time, effort, or financial
resources expended by persons to generate,
maintain, retain, or disclose or provide information
to or for a Federal agency. For further explanation
of what is included in the information collection
burden, refer to 5 CFR 1320.3.
VerDate Sep<11>2014
17:52 Oct 05, 2022
Jkt 259001
environment.53 The Commission has
categorically excluded certain actions
from this requirement as not having a
significant effect on the human
environment. Included in the exclusion
are rules that are clarifying, corrective,
or procedural or that do not
substantially change the effect of the
regulations being amended.54 The
actions proposed herein fall within this
categorical exclusion in the
Commission’s regulations.
52 Commission staff estimates that respondents’
hourly wages (including benefits) are comparable to
those of FERC employees in Fiscal Year 2022.
Therefore, the hourly cost used in this analysis is
$91 and $188,992 annually.
53 Reg’ls. Implementing the Nat’l. Env’nt. Pol’y
Act, Order No. 486, 52 FR 47897 (Dec. 17, 1987),
FERC Stats. & Regs. Preambles 1986–1990 ¶ 30,783
(1987) (cross-referenced at 41 FERC ¶ 61,284).
54 18 CFR 380.4(a)(2)(ii).
PO 00000
Frm 00022
Fmt 4702
Sfmt 4702
E:\FR\FM\06OCP1.SGM
06OCP1
lotter on DSK11XQN23PROD with PROPOSALS1
Federal Register / Vol. 87, No. 193 / Thursday, October 6, 2022 / Proposed Rules
VI. Regulatory Flexibility Act
VII. Comment Procedures
73. The Regulatory Flexibility Act of
1980 55 generally requires a description
and analysis of proposed rules that will
have significant economic impact on a
substantial number of small entities.
The Small Business Administration
(SBA) sets the threshold for what
constitutes a small business. Under
SBA’s size standards,56 transmission
owners all fall under the category of
Electric Bulk Power Transmission and
Control (NAICS code 221121), with a
size threshold of 500 employees
(including the entity and its
associates).57 The NERC Compliance
Registry, as of August 5, 2022, identifies
approximately 1,669 utilities, both
public and non-public, in the U.S. that
potentially would be affected by the
voluntary information collection
associated with the proposed incentive
and rate treatment in this NOPR. Based
on the Compliance Registry, we have
reviewed a randomly selected sample of
92 entities, and we have determined
that approximately 80% of the listed
entities are small entities (i.e., with
fewer than 500 employees).
74. Regarding information collection
activities, we estimate an average onetime cost of $7,280 for each of 50 new
filers, and an average annual cost of
$3,640 for each of 50 continuing
recipients of rate incentives.
75. According to SBA guidance, the
determination of significance of impact
‘‘should be seen as relative to the size
of the business, the size of the
competitor’s business, the number of
filers received annually, and the impact
this regulation has on larger
competitors.’’ 58
76. Moreover, this NOPR involves
voluntary actions by utilities for the
purpose of benefitting consumers by
encouraging investments by utilities in
advanced cybersecurity technology and
participation by utilities in
cybersecurity threat information sharing
programs. The proposal does not
mandate or require action by any utility.
As a result, we certify that the proposals
in this NOPR will not have a significant
economic impact on a substantial
number of small entities.
77. The Commission invites interested
persons to submit comments on the
matters and issues proposed in this
NOPR to be adopted, including any
related matters or alternative proposals
that commenters may wish to discuss.
Comments are due 30 days after the date
of publication in the Federal Register,
and reply comments are due 45 days
after the date of publication in the
Federal Register. Any comment must
refer to Docket No. RM22–19–000, and
must include the commenter’s name,
the organization it represents, if
applicable, and its address in its
comments. All comments will be placed
in the Commission’s public files and
may be viewed, printed, or downloaded
remotely as described in the Document
Availability section below. Commenters
on this proposal are not required to
serve copies of their comments on other
commenters.
78. The Commission encourages
comments to be filed electronically via
the eFiling link on the Commission’s
website at https://www.ferc.gov. The
Commission accepts most standard
word processing formats. Documents
created electronically using word
processing software must be filed in
native applications or print-to-PDF
format and not in a scanned format.
Commenters filing electronically do not
need to make a paper filing.
79. Commenters that are not able to
file comments electronically may file an
original of their comments by USPS
mail or by courier-or other delivery
services. For submission sent via USPS
only, filings should be mailed to:
Federal Energy Regulatory Commission,
Office of the Secretary, 888 First Street
NE, Washington, DC 20426. Submission
of filings other than by USPS should be
delivered to: Federal Energy Regulatory
Commission, 12225 Wilkins Avenue,
Rockville, MD 20852.
55 5
U.S.C. 601–612.
CFR 121.201.
57 The threshold for the number of employees
indicates the maximum allowed for a concern and
its affiliates to be considered small.
58 U.S. Small Business Administration, A Guide
for Government Agencies How to Comply with the
Regulatory Flexibility Act, 18 (May 2012), https://
www.sba.gov/sites/default/files/advocacy/rfaguide_
0512_0.pdf.
56 13
VerDate Sep<11>2014
16:43 Oct 05, 2022
Jkt 259001
VIII. Document Availability
80. In addition to publishing the full
text of this document in the Federal
Register, the Commission provides all
interested persons with an opportunity
to view and/or print the contents of this
document via the internet through the
Commission’s Home Page (https://
www.ferc.gov).
81. From the Commission’s Home
Page on the internet, this information is
available on eLibrary. The full text of
this document is available on eLibrary
in PDF and Microsoft Word format for
viewing, printing, and/or downloading.
To access this document in eLibrary,
type the docket number excluding the
PO 00000
Frm 00023
Fmt 4702
Sfmt 4702
60577
last three digits of this number in the
docket number field.
82. User assistance is available for
eLibrary and the Commission’s website
during normal business hours from the
Commission’s Online Support at 202–
502–6652 (toll free at 1–866–208–3676)
or email at ferconlinesupport@ferc.gov,
or the Public Reference Room at (202)
502–8371, TTY (202) 502–8659. Email
the Public Reference Room at
public.referenceroom@ferc.gov.
List of Subjects in 18 CFR Part 35
Electric power rates, Electric utilities,
Reporting and recordkeeping
requirements.
By direction of the Commission.
Commissioner Phillips is concurring with a
separate statement attached.
Issued: September 22, 2022.
Debbie-Anne A. Reese,
Deputy Secretary.
In consideration of the foregoing, the
Commission proposes to amend part 35,
chapter I, title 18, Code of Federal
Regulations, as follows:
PART 35—FILING OF RATE
SCHEDULES AND TARIFFS
1. The authority citation for part 35
continues to read as follows:
■
Authority: 16 U.S.C. 791a–825r, 2601–
2645; 31 U.S.C. 9701; 42 U.S.C. 7101–7352.
2. Add subpart K, consisting of
§ 35.48, to read as follows:
■
Subpart K—Cybersecurity Investment
Provisions
§ 35.48
Cybersecurity investment.
(a) Purpose. This section establishes
rules for incentive-based rate treatments
for utilities that voluntarily make
cybersecurity investments as described
in this section.
(b) Incentive-based rate treatment for
cybersecurity investment. The
Commission will authorize incentivebased rate treatment for a utility that
voluntarily makes an investment in
advanced cybersecurity technology and
for a utility that voluntarily participates
in a cybersecurity threat information
sharing program under this section.
Incentive-based rate treatment is
available to both public and non-public
utilities that have or will have a rate on
file with the Commission. A utility may
request incentive-based rate treatment
for an eligible cybersecurity investment
that meets the eligibility criteria set
forth in paragraph (c) of this section.
(c) Eligibility criteria. A utility may
receive incentive-based rate treatment
for a cybersecurity investment that:
(1) Materially improves cybersecurity
through either investment in advanced
E:\FR\FM\06OCP1.SGM
06OCP1
lotter on DSK11XQN23PROD with PROPOSALS1
60578
Federal Register / Vol. 87, No. 193 / Thursday, October 6, 2022 / Proposed Rules
cybersecurity technology or
participation in a cybersecurity threat
information sharing program; and
(2) Is not already mandated by the
mandatory and enforceable Critical
Infrastructure Protection Reliability
Standards as maintained by the Electric
Reliability Organization, or otherwise
mandated by local, state, or Federal law.
A utility may receive incentive-based
rate treatment for the investment
pursuant to paragraphs (d) through (h)
of this section.
(d) Pre-qualified cybersecurity
expenditure. A utility must demonstrate
that a cybersecurity expenditure
qualifies as one or more of the prequalified cybersecurity expenditures
identified by the Commission pursuant
to this paragraph (d). A utility should
seek critical energy/electric
infrastructure information treatment
with the Commission, as appropriate,
for any part of its filing seeking
incentive-based rate treatment that has
specific engineering, vulnerability, or
detailed design information about
proposed or existing critical
infrastructure. Pre-qualified
cybersecurity expenditures include:
(1) Expenditures associated with
participation in the Department of
Energy’s Cybersecurity Risk Information
Sharing Program.
(2) Expenditures associated with
internal network security monitoring
within the utility’s cyber systems.
(e) Types of incentive-based rate
treatment for cybersecurity investment.
For purposes of paragraph (b) of this
section, incentive-based rate treatment
shall mean either of the following:
(1) An increase in rate of return on
equity of 200 basis points that would be
applied to the incentive-eligible
investment; or
(2) Deferral of expenses as a
regulatory asset;
(f) Incentive duration. (1) A return on
equity incentive-based rate treatment
approved pursuant to this section shall
last no longer than the earliest of:
(i) The depreciation life of the
underlying asset;
(ii) Five years from when the
cybersecurity investment enters service;
(iii) When the cybersecurity
investment or activity that serves as the
basis of that incentive becomes
mandatory; or
(iv) When the utility no longer meets
the requirements for receiving the
incentive.
(2) An incentive granted for
participation in a qualified
cybersecurity threat information sharing
program will not be subject to a sunset,
such that a utility participating in a
qualified cybersecurity threat
VerDate Sep<11>2014
16:43 Oct 05, 2022
Jkt 259001
information sharing program is eligible
to continue deferring expenses
associated with membership, which for
each year would be amortized over the
next five years, for as long as it is a
member and participation is not
mandatory.
(3) A deferred regulatory asset whose
costs are typically expensed should be:
(i) Amortized over a five-year period;
and
(ii) Limited to expenses incurred in
the first five years following
Commission approval of the incentive.
(g) Incentive applications. For the
purpose of paragraphs (b) and (c) of this
section, a utility’s request for one or
more incentive based-rate treatments, to
be made in a filing pursuant to section
205 of the Federal Power Act, must
include a detailed explanation of the
proposed rate treatment and include the
following information:
(1) Evidence that it has made one or
more pre-qualified cybersecurity
expenditures and otherwise complies
with all requirements of this section.
(2) For applications requesting an
increase in rate of return on equity of
200 basis points:
(i) The anticipated cost of the capital
investment; and
(ii) The identity of the rate schedule(s)
on file or to be filed with the
Commission under which it will recover
the increased return on equity.
(3) For applications requesting
deferred cost recovery:
(i) A description of any expenses,
including whether the expenses are:
(A) Expenses associated with thirdparty provision of hardware, software,
and computing networking services;
and/or
(B) Expenses for training to
implement network analysis and
monitoring programs;
(ii) Estimates of the cost of such
expenses; and
(iii) When the costs are expected to be
incurred.
(h) Reporting requirements. A utility
that has received an incentive under
this section must make an annual
informational filing on June 1, provided
that the utility has received
Commission-approval for the incentive
at least 60 days prior to June 1 of that
year. The annual filing should detail the
specific investments that were made
pursuant to the Commission’s approval
and the corresponding FERC account
used. A utility that has received an
incentive under this section must
describe any parts of its network that it
upgraded in addition to the nature and
cost of the various investments. For
incentives where the Commission
allows deferral of expenses, annual
PO 00000
Frm 00024
Fmt 4702
Sfmt 4702
informational filings should describe
such expenses in sufficient detail to
demonstrate that such expenses are
specifically related to the cybersecurity
investment granted incentives and not
for ongoing services including system
maintenance, surveillance, and other
labor costs.
Note: The following appendix will not
appear in the Code of Federal Regulations.
UNITED STATES OF AMERICA
FEDERAL ENERGY REGULATORY
COMMISSION
Incentives for Advanced Cybersecurity
Investment, Docket Nos. RM22–19–
000, RM21–3–000
PHILLIPS, Commissioner, concurring:
1. I concur in today’s Notice of
Proposed Rulemaking 1 to highlight the
importance of today’s action and to
encourage stakeholder comment in
certain areas. In today’s highly
interconnected world, the nation’s
security and economic well-being
depends on reliable and cyber-resilient
energy infrastructure. This is why it is
critical that we continue to build upon
the mandatory framework that the
industry has already identified through
the North American Electric Reliability
Corporation (NERC) Critical
Infrastructure Protection (CIP)
standards. But, these mandatory CIP
standards are just a baseline and can
take years to implement. Recent cyberattacks in Ukraine and here at home
remind us of the constant threat of
foreign and domestic attacks on our
critical infrastructure, and the need for
advanced and innovative technology
and threat information sharing programs
for emerging threats. Therefore, I fully
support this action we are taking under
section 219A of the Federal Power Act
(FPA) 2 to encourage utilities to
proactively make additional
cybersecurity investments in their
systems.
2. There are significant costs when
there is a cybersecurity breach on the
electric or gas system. Not only are
consumers impacted by loss of service,
but the recovery costs are significant.
For example, the Colonial Pipeline
cybersecurity breach effectively shut
down half of the country’s fuel supply,
and even though the pipeline invested
$200 million dollars over five years to
contain a potential attack,3 Colonial
1 Incentives for Advanced Cybersecurity
Investment, 180 FERC ¶ 61,189 (2022) (NOPR).
2 16 U.S.C. 824s–1.
3 See Cyber Threats in the Pipeline: Using
Lessons from the Colonial Ransomware Attack to
Defend Critical Infrastructure, Hearing Before the
Committee on Homeland Security, 117th Cong.
(2021) (Statement of Joseph A. Blount).
E:\FR\FM\06OCP1.SGM
06OCP1
Federal Register / Vol. 87, No. 193 / Thursday, October 6, 2022 / Proposed Rules
lotter on DSK11XQN23PROD with PROPOSALS1
Pipeline still spent millions more to
recover from the event in 2021.4
3. This NOPR serves as a critical step
to incent public and non-public utilities
to make urgent cybersecurity
investments in advanced technology.
First, the NOPR proposes to incentivize
expenditures that materially improve
the cybersecurity posture of utilities.5
Second, the NOPR provides that those
cybersecurity investments must not
already ‘‘be mandated by [CIP]
Reliability Standards, or local, state, of
federal law.’’ 6 Third, the NOPR
proposes that the Commission either use
a pre-qualified (PQ) list of approved
cybersecurity expenditures, where any
expenditures that meet the list would be
entitled to a rebuttable presumption that
the utility is eligible for an incentive,7
or that the Commission assess
expenditures on a case-by-case basis.8
Lastly, the NOPR proposes that if a
utility meets the requirements for an
incentive, it could either receive a
return on equity (ROE) adder of 200
basis points or deferred cost recovery for
expenditures that enables the utility to
defer expenses and include the
unamortized portion in rate base.9 All of
these items are essential to improving
utilities’ ability to protect, detect,
respond to, and recover from a
cybersecurity threat.
4. Specifically, I am interested in
feedback on whether the proposed PQ
list is broad enough to include all
expenditures that may warrant
incentives. As proposed, if an expense
is associated with participation in the
Cybersecurity Risk Sharing Program
(CRISP) 10 or if an expenditure is
associated with internal network
security monitoring within the utility’s
cyber systems,11 there would be a
4 See Everhart v. Colonial Pipeline Company,
2022 WL 3699967, (N.D. Ga. 2022) (‘‘Colonial paid
the cybercriminals . . . a $4.4 million ransom in
return for a decryption tool that allowed Colonial
to retrieve the encrypted or locked data.’’).
5 NOPR at PP 2, 20, 22.
6 NOPR at PP 2, 22.
7 NOPR at PP 3, 19; see infra at PP 4–5.
8 NOPR at PP 3, 19, 22–23.
9 NOPR at PP 4, 34, 37.
10 Co-funded by the Department of Energy (DOE)
and industry and managed by E–ISAC, CRISP is a
public-private partnership that enables and
manages the near real-time sharing of IT network
information between electricity utilities and key
DOE resources. The purpose of CRISP is to enable
collaboration among energy sector partners to
facilitate the timely bi-directional sharing of
unclassified and classified threat information and to
develop situational awareness tools that enhance
the energy sector’s ability to identify, prioritize, and
coordinate the protection of critical infrastructure.
11 The Commission issued a NOPR that proposed
to direct NERC to develop a mandatory standard
regarding internal network security monitoring in
the context of high and medium impact bulk
electric system. See Internal Network Security
VerDate Sep<11>2014
16:43 Oct 05, 2022
Jkt 259001
rebuttable presumption that that
expense is entitled to an incentive. I
agree that each eligible cybersecurity
expenditure on the PQ list should have
a single, clear, and non-trivial
benchmark that must be met for a utility
to qualify for incentive rate treatment.
But, the proposed PQ list is limited. For
example, 75% of electricity customers
in the continental U.S. are served by
investor-owned utilities that already
participate in CRISP,12 which
demonstrates the limited potential
benefits from this incentive. Under the
NOPR proposal, it is unclear whether a
utility that already participates in CRISP
could receive an incentive for future
subscription costs for continued CRISP
participation. I encourage comments on
whether any final rule should clarify
that such continued CRISP participation
is indeed entitled to an incentive.
5. I also recognize that a case-by-case
approach, as opposed to the proposed
PQ list, would be more adaptable and
less prescriptive, allowing a variety of
solutions that utilities could potentially
tailor to their specific situations.
However, given the diverse and
evolving nature of cybersecurity
activities, this option could be very
time-consuming and administratively
inefficient. Thus, I believe that an
expanded PQ list is a reasonable
approach that would satisfy the
applicable statutory directives while
providing a high degree of certainty for
regulated entities. I urge all interested
stakeholders to provide comments on
whether the Commission should widen
the PQ list’s universe of potential
expenditures. I especially encourage
stakeholders to comment on whether
the Commission should consider
external penetration tests, a security
awareness program, a patch
management program, and/or the
capability to disconnect operational
technology from the information
technology network for the PQ list.
6. I also want to underscore the need
for utilities to conduct analyses of
electric and gas interdependencies, and
how such actions would benefit
cybersecurity on the bulk electric
system. I fully recognize that FPA
section 219A states that the Commission
can establish ‘‘incentive-based,
including performance-based, rate
treatments for the transmission of
electric energy in interstate
commerce,’’ 13 and the Infrastructure
Monitoring for High and Medium Impact Bulk
Electric System Cyber Systems, 178 FERC ¶ 61,038
(2022).
12 See Energy Sector Cybersecurity Preparedness,
available at: https://www.energy.gov/ceser/energysector-cybersecurity-preparedness.
13 16 U.S.C. 824s–1(c) (emphasis added).
PO 00000
Frm 00025
Fmt 4702
Sfmt 4702
60579
Act only modified section 219 regarding
incentives and not the Natural Gas Act
(NGA).14 However, electric and gas
companies are especially vulnerable to
cyberattacks, particularly because
utilities that use both sources have an
expansive and increasing attack surface,
arising from their geographic and
organizational complexity. Indeed, the
electric and gas sector’s unique
interdependencies increase their
vulnerability to exploitation, which can
include the commandeering of the
operational-technology system to stop
energy infrastructure from working at
times when consumers most need it. To
the extent we can identify the need for
cybersecurity information sharing
between the natural gas and electric
systems, and incentivize participation
in such a program, I encourage
stakeholder comment.
7. I further urge stakeholders to
comment on whether the proposed
duration of the incentives is sufficient
and whether a 200-basis point adder is
reasonable, as the NOPR
contemplates.15 To be clear, I do not
support open-ended or permanent cyber
incentives. I believe the 5-year proposed
duration and the 200-basis point adder
are adequate to properly incent utilities.
Unlike expenses in the traditional
transmission incentives context,16 the
dollar amounts in cybersecurity
investments are typically small. Yet, the
benefits of additional, advanced
cybersecurity investments cannot be
ignored. Offering anything less than
what is proposed would likely be
14 The Infrastructure Investment and Jobs Act
(Infrastructure Act) modified Section 219 of the
FPA regarding electric energy rate treatments and
directed the Commission to consider incentives for
the transmission of electric energy regarding
cybersecurity. Section 219 did not, however,
explicitly reference or modify the NGA regarding
gas incentives.
15 NOPR at PP 4, 33, 36–37; see, e.g., Initial
Comments of Edison Electric Institute., Docket No.
RM21–3–000, at 2 (filed April 6, 2021) (‘‘EEI agrees
that given the relatively low dollar amounts
associated with cybersecurity investments . . . the
proposed 200 basis point cap is reasonable.’’);
Comments of MISO Transmission Owners, Docket
No. RM21–3–000, at 9 (filed April 6, 2021)
(explaining why inclusion of enterprise-wide costs
is appropriate to incent investment in critical
facilities).
16 Brattle-Grid Strategies Oct. 2021 Report at 2
(citing Johannes Pfeifenberger & John Tsoukalis,
The Brattle Group, Transmission Investment Needs
and Challenges, at slide 2 (June 1, 2021), https://
www.brattle.com/wp-content/uploads/2021/10/
Transmission-Investment-Needs-andChallenges.pdf); Johannes Pfeifenberger et al., The
Brattle Group, Cost Savings Offered by Competition
in Electric Transmission: Experience to Date and
the Potential for Additional Customer Value, at 2–
3 & fig.1 (Apr. 2019), available at: https://
www.brattle.com/wp-content/uploads/2021/05/
16726_cost_savings_offered_by_competition_in_
electric_transmission.pdf (Brattle Apr. 2019
Competition Report).
E:\FR\FM\06OCP1.SGM
06OCP1
60580
Federal Register / Vol. 87, No. 193 / Thursday, October 6, 2022 / Proposed Rules
insufficient to incent any action by
utilities, as required by Congress.
Therefore, commenters should provide
specific, compelling reasons if they
oppose the NOPR proposal regarding
the duration of the incentive and the
amount added to a utility’s ROE.
8. Finally, I note that for years now,
the White House, the U.S. Congress, and
senior government leaders have
sounded the alarm on increasing
cybersecurity threats and their
sophistication.17 I also note that the
Commission began assessing the
potential use of incentives to improve
cybersecurity prior to the passage of the
Infrastructure Act.18 While we are
terminating the proceeding in Docket
No. RM21–3–000, I am heartened that
the Commission remains committed to
this issue. I look forward to examining
all the comments as we seek to issue a
final rule around these topics.
For these reasons, I respectfully
concur.
Willie L. Phillips
Commissioner
[FR Doc. 2022–21003 Filed 10–5–22; 8:45 am]
lotter on DSK11XQN23PROD with PROPOSALS1
BILLING CODE 6717–01–P
17 For example, President Biden told utilities and
other companies that ‘‘critical infrastructure owners
and operators must accelerate efforts to lock their
digital doors.’’ See Statement by President Biden on
Our Nation’s Cybersecurity, available at: https://
www.whitehouse.gov/briefing-room/statementsreleases/2022/03/21/statement-by-president-bidenon-our-nations-cybersecurity. President Biden has
also since announced an executive order on
cybersecurity and is using funds from the
Infrastructure Act to provide grants to state, local,
and territorial governments as they respond to cyber
threats. See Exec. Order No. 14,028, 86 FR 26633
(2021). Former President Obama declared that
cybersecurity threats are ‘‘the most serious
economic and national security challenge[ ] we face
as a nation’’ and that ‘‘America’s economic
prosperity . . . will depend on cybersecurity.’’ See
National Security Council, Cyber Security, available
at: https://www.whitehouse.gov/administration/eop/
nsc/cybersecurity. Former Defense Secretary Leon
Panetta warned that the country is ‘‘increasingly
vulnerable to foreign computer hackers who could
dismantle the nation’s power grid.’’ See Elizabeth
Bumiller and Thom Shanker, Panetta Warns of Dire
Threat of Cyberattacks on U.S., The New York
Times, October 11, 2021, available at: https://
www.nytimes.com/2012/10/12/world/panettawarns-of-dire-threat-ofcyberattack.html?pagewanted=all.
18 See, e.g., FERC, Cybersecurity Incentives Policy
White Paper, Docket No. AD20–19–000, (June
2020), available at: https://www.ferc.gov/sites/
default/files/2020-06/notice-cybersecurity.pdf
(discussing the potential new framework for
providing transmission incentives to utilities for
cybersecurity investments); Cybersecurity
Incentives, 87 FR 4173 (Jan. 27, 2021), 173 FERC
¶ 61,240 (2020) (proposing to allow utilities to
request incentives for certain cybersecurity
investments that go above and beyond the
requirements of the CIP reliability standards). This
NOPR supersedes the Cybersecurity Incentives
NOPR, but it illustrates my colleagues’ commitment
to building out a more resilient electric system.
VerDate Sep<11>2014
16:43 Oct 05, 2022
Jkt 259001
DEPARTMENT OF THE INTERIOR
Fish and Wildlife Service
50 CFR Part 17
[Docket No. FWS–R4–ES–2021–0166;
FF09E21000 FXES1111090FEDR 223]
RIN 1018–BE91
Endangered and Threatened Wildlife
and Plants; Designation of Critical
Habitat for Louisiana Pinesnake
Fish and Wildlife Service,
Interior.
ACTION: Proposed rule.
AGENCY:
We, the U.S. Fish and
Wildlife Service (Service), propose to
designate critical habitat for the
Louisiana pinesnake (Pituophis
ruthveni) under the Endangered Species
Act of 1973, as amended (Act). In total,
approximately 209,520 acres (84,790
hectares) in Bienville, Grant, Rapides,
and Vernon parishes, Louisiana, and in
Newton, Angelina, and Jasper Counties,
Texas, fall within the boundaries of the
proposed critical habitat designation.
We also announce the availability of a
draft economic analysis of the proposed
designation of critical habitat for the
Louisiana pinesnake.
DATES: We will accept comments
received or postmarked on or before
December 5, 2022. Comments submitted
electronically using the Federal
eRulemaking Portal (see ADDRESSES,
below) must be received by 11:59 p.m.
Eastern Time on the closing date. We
must receive requests for a public
hearing, in writing, at the address
shown in FOR FURTHER INFORMATION
CONTACT by November 21, 2022.
ADDRESSES:
Written comments: You may submit
comments by one of the following
methods:
(1) Electronically: Go to the Federal
eRulemaking Portal: https://
www.regulations.gov. In the Search box,
enter FWS–R4–ES–2021–0166, which is
the docket number for this rulemaking.
Then, click on the Search button. On the
resulting page, in the panel on the left
side of the screen, under the Document
Type heading, check the Proposed Rule
box to locate this document. You may
submit a comment by clicking on
‘‘Comment.’’
(2) By hard copy: Submit by U.S. mail
to: Public Comments Processing, Attn:
FWS–R4–ES–2021–0166, U.S. Fish and
Wildlife Service, MS: PRB/3W, 5275
Leesburg Pike, Falls Church, VA 22041–
3803.
We request that you send comments
only by the methods described above.
SUMMARY:
PO 00000
Frm 00026
Fmt 4702
Sfmt 4702
We will post all comments on https://
www.regulations.gov. This generally
means that we will post any personal
information you provide us (see
Information Requested, below, for more
information).
Availability of supporting materials:
The coordinates or plot points or both
from which the maps are generated are
included in the decision file for this
proposed critical habitat designation
and are available at https://
www.regulations.gov under Docket No.
FWS–R4–ES–2021–0166 and on the
Service’s website, at https://
www.fws.gov/office/louisianaecological-services/library. Additional
supporting information that we
developed for this proposed critical
habitat designation will be available on
the Service’s website, at https://
www.regulations.gov, or both.
FOR FURTHER INFORMATION CONTACT:
Brigette Firmin, Deputy Field
Supervisor, U.S. Fish and Wildlife
Service, Louisiana Ecological Services
Field Office, 200 Dulles Drive, Lafayette,
LA 70506; telephone 337–291–3100.
Individuals in the United States who are
deaf, deafblind, hard of hearing, or have
a speech disability may dial 711 (TTY,
TDD, or TeleBraille) to access
telecommunications relay services.
Individuals outside the United States
should use the relay services offered
within their country to make
international calls to the point-ofcontact in the United States.
SUPPLEMENTARY INFORMATION:
Executive Summary
Why we need to publish a rule. Under
the Endangered Species Act, any species
that is determined to be an endangered
or threatened species requires critical
habitat to be designated, to the
maximum extent prudent and
determinable. Designation and revisions
of critical habitat can only be completed
by issuing a rule through the
Administrative Procedure Act
rulemaking process.
What this document does. We
propose to designate critical habitat for
the Louisiana pinesnake, which is listed
as a threatened species.
The basis for our action. Section
4(a)(3) of the Act requires the Secretary
of the Interior (Secretary) to designate
critical habitat concurrent with listing,
to the maximum extent prudent and
determinable. Section 3(5)(A) of the Act
defines critical habitat as (i) the specific
areas within the geographical area
occupied by the species, at the time it
is listed, on which are found those
physical or biological features (I)
essential to the conservation of the
E:\FR\FM\06OCP1.SGM
06OCP1
Agencies
[Federal Register Volume 87, Number 193 (Thursday, October 6, 2022)]
[Proposed Rules]
[Pages 60567-60580]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2022-21003]
=======================================================================
-----------------------------------------------------------------------
DEPARTMENT OF ENERGY
Federal Energy Regulatory Commission
18 CFR Part 35
[Docket Nos. RM22-19-000; RM21-3-000]
Incentives for Advanced Cybersecurity Investment; Cybersecurity
Incentives
AGENCY: Federal Energy Regulatory Commission, Department of Energy.
ACTION: Notice of proposed rulemaking; notice terminating proceeding.
-----------------------------------------------------------------------
SUMMARY: The Federal Energy Regulatory Commission (Commission) proposes
to revise its regulations to provide incentive-based rate treatments
for the transmission of electric energy in interstate commerce and the
sale of electric energy at wholesale in interstate commerce by
utilities for the purpose of benefitting consumers by encouraging
investments by utilities in advanced cybersecurity technology and
participation by utilities in cybersecurity threat information sharing
programs, as directed by the Infrastructure Investment and Jobs Act of
2021 (Infrastructure and Jobs Act). This notice of proposed rulemaking
(NOPR) also terminates the NOPR proceeding in Docket No. RM21-3-000
[[Page 60568]]
(December 2020 Cybersecurity Incentives NOPR).
DATES: As of October 6, 2022, the proposed rule published at 86 FR 8309
on February 5, 2021, is withdrawn. Comments on this proposed rule are
due November 7, 2022, and reply comments are due November 21, 2022.
ADDRESSES: Comments, identified by docket number, may be filed in the
following ways. Electronic filing through https://www.ferc.gov, is
preferred.
Electronic Filing: Documents must be filed in acceptable
native applications and print-to-PDF, but not in scanned or picture
format.
For those unable to file electronically, comments may be
filed by USPS mail or by hand (including courier) delivery.
[cir] Mail via U.S. Postal Service Only: Addressed to: Federal
Energy Regulatory Commission, Secretary of the Commission, 888 First
Street NE, Washington, DC 20426.
[cir] Hand (including courier) Delivery: Deliver to: Federal Energy
Regulatory Commission, 12225 Wilkins Avenue, Rockville, MD 20852.
The Comment Procedures Section of this document contains more
detailed filing procedures.
FOR FURTHER INFORMATION CONTACT:
Kal Ayoub (Technical Information), Office of Electric Reliability,
Federal Energy Regulatory Commission, 888 First Street NE, Washington,
DC 20426, (202) 502-8863, [email protected].
David DeFalaise (Technical Information), Office of Electric
Reliability, Federal Energy Regulatory Commission, 888 First Street NE,
Washington, DC 20426, (202) 502-8180, [email protected].
Adam Pollock (Technical Information), Office of Energy Market
Regulation, Federal Energy Regulatory Commission, 888 First Street NE,
Washington, DC 20426, (202) 502-8458, [email protected].
Alan Rukin (Legal Information), Office of the General Counsel, Federal
Energy Regulatory Commission, 888 First Street NE, Washington, DC
20426, (202) 502-8502, [email protected].
SUPPLEMENTARY INFORMATION:
Table of Contents
Paragraph
numbers
I. Introduction............................................ 1034
II. Background............................................. 1036
A. Infrastructure Investment and Jobs Act of 2021...... 1036
B. Prior Commission Action on Cybersecurity Incentives. 1039
C. Advanced Cybersecurity Technology and Information... 1040
1. Advanced Cybersecurity Technology............... 1040
2. Advanced Cybersecurity Technology Information... 1042
D. Cybersecurity Threat Information Sharing Programs... 1042
III. Discussion............................................ 1043
A. Proposed Approaches to Request an Incentive......... 1043
1. Eligibility Criteria............................ 1044
2. Proposed Approaches for Evaluating Cybersecurity 1046
Expenditure Eligibility...........................
B. Proposed Rate Incentives............................ 1051
1. ROE Adder....................................... 1054
2. Deferral of Certain Cybersecurity Expenses for 1056
Rate Recovery.....................................
3. Performance-Based Rates......................... 1059
C. Proposed Incentive Implementation................... 1060
1. Cybersecurity ROE Incentive Duration............ 1060
2. Regulatory Asset Incentive Duration and 1062
Amortization Period...............................
3. Filing Process.................................. 1063
4. Reporting Requirements.......................... 1065
IV. Information Collection Statement....................... 1067
V. Environmental Assessment................................ 1072
VI. Regulatory Flexibility Act............................. 1072
VII. Comment Procedures.................................... 1074
VIII. Document Availability................................ 1075
I. Introduction
1. In this NOPR, the Commission proposes under section 219A of the
Federal Power Act (FPA) \1\ to establish rules for incentive-based rate
treatments for certain voluntary cybersecurity investments \2\ by
utilities.\3\ These rules would make incentives available to utilities
that make certain cybersecurity expenditures that enhance their
security posture by improving their ability to protect against, detect,
respond to, or recover from a cybersecurity threat and to utilities
that participate in cybersecurity threat information sharing programs
to the benefit of ratepayers and national security.
---------------------------------------------------------------------------
\1\ Infrastructure and Jobs Act, Public Law 117-58, section
40123, 135 Stat. 429, 951 (to be codified at 16 U.S.C. 824s-1).
\2\ In this NOPR, the term ``investments'' in cybersecurity
technology means expenditures that can be either capitalized costs
or expenses.
\3\ Notwithstanding that Infrastructure and Jobs Act requires
the Commission to offer incentives to ``public utilities,'' we
propose to make rate incentives available to non-public utilities
that have or will have a rate on file with the Commission, similar
to Commission precedent under FPA section 219, 16 U.S.C. 824s.
Therefore, all references in this NOPR to ``utilities'' are intended
to include both public utilities and non-public utilities that have
or will have a rate on file with the Commission.
---------------------------------------------------------------------------
2. First, we propose a regulatory framework on how a utility could
qualify for incentives for eligible cybersecurity expenditures. Under
this framework, we propose that eligible cybersecurity expenditures
must: (1) materially improve cybersecurity through either an investment
in advanced cybersecurity technology or participation in a
cybersecurity threat information sharing program; and (2) not already
be mandated by Critical Infrastructure Protection (CIP) Reliability
Standards, or local, state, or Federal law. A utility would seek an
incentive in a filing pursuant to FPA
[[Page 60569]]
section 205 \4\ and the incentive would be effective no earlier than
the date of the Commission order approving the incentive request.
---------------------------------------------------------------------------
\4\ 16 U.S.C. 824d.
---------------------------------------------------------------------------
3. We propose to evaluate cybersecurity investments using a list of
pre-qualified expenditures that are eligible for incentives determined
by the Commission and publicly maintained on the Commission's website
(PQ List). With the Commission having evaluated expenditures to include
on the PQ List in advance, we believe that the PQ List approach would
provide an efficient and transparent mechanism for determining
appropriate cybersecurity expenditures that are eligible for
incentives. We propose that any cybersecurity expenditure that is on
the PQ List would be entitled to a rebuttable presumption of
eligibility for an incentive. We also discuss and seek comment on a
potential alternative approach, whereby a utility's cybersecurity
expenditure would be evaluated on a case-by-case basis to determine if
it is eligible for an incentive.
4. Second, we propose two options for the type of incentive a
utility could receive for an eligible cybersecurity expenditure: (1) a
return on equity (ROE) adder of 200 basis points; or (2) deferred cost
recovery for certain cybersecurity expenditures that enables the
utility to defer expenses and include the unamortized portion in rate
base.
5. Third, we propose that any approved incentive(s) will remain in
effect for five years from the date on which the cybersecurity
investment(s) enters service or expenses are incurred, or expire
earlier if other conditions discussed in this NOPR are met before the
end of that five year period. We seek comment on the proposed duration
and expiration conditions for incentives granted under this proposal.
6. Finally, we propose that a utility that has received a
cybersecurity incentive under this section must make an annual
informational filing on June 1, as further discussed herein. The annual
filing should detail the specific investments that were made pursuant
to the Commission's approval and the corresponding FERC account
used.\5\
---------------------------------------------------------------------------
\5\ See 18 CFR part 141.
---------------------------------------------------------------------------
II. Background
A. Infrastructure Investment and Jobs Act of 2021
7. On November 15, 2021, the Infrastructure and Jobs Act was signed
into law.\6\ The Infrastructure and Jobs Act, in part, directs the
Commission to revise its regulations to establish, by rule, incentive-
based, including performance-based, rate treatments for the
transmission of electric energy in interstate commerce and the sale of
electric energy at wholesale in interstate commerce by public utilities
for the purpose of benefitting consumers by encouraging investments by
public utilities in advanced cybersecurity technology \7\ and
participation by public utilities in cybersecurity threat information
sharing programs.
---------------------------------------------------------------------------
\6\ Infrastructure and Jobs Act, Public Law 117-58, 135 Stat.
429.
\7\ FPA section 219A(a)(1) defines the term advanced
cybersecurity technology to mean any technology, operational
capability, or service, including computer hardware, software, or a
related asset, that enhances the security posture of public
utilities through improvements in the ability to protect against,
detect, respond to, or recover from a cybersecurity threat.
Infrastructure and Jobs Act, Public Law 117-58, section 40123, 135
Stat. 429, 951 (to be codified at 16 U.S.C. 824s-1(a)(1)). FPA
section 219A(a)(2) defines the term advanced cybersecurity
technology information to mean information relating to advanced
cybersecurity technology or proposed advanced cybersecurity
technology that is generated by or provided to the Commission or
another Federal agency. Id. at 952 (to be codified at 16 U.S.C.
824s-1(a)(2)).
---------------------------------------------------------------------------
8. As an initial step in the process of revising the Commission's
regulations, the Infrastructure and Jobs Act directed the Commission to
conduct a study, in consultation with certain entities,\8\ to identify
incentive-based rate treatments, including performance-based rates, for
the jurisdictional transmission and sale of electric energy that could
support investments in advanced cybersecurity technology and
participation by public utilities in cybersecurity threat information
sharing programs.\9\ The Infrastructure and Jobs Act also required the
Commission to submit a report to Congress (Report) detailing the
results of the directed study. Following the passage of the
Infrastructure and Jobs Act, Commission staff consulted with the
specified entities to help identify incentive-based rate treatments
that could enhance the security posture of the Bulk-Power System.\10\
---------------------------------------------------------------------------
\8\ The entities identified in the Infrastructure and Jobs Act
are: Secretary of Energy; North American Electric Reliability
Corporation (NERC); Electricity Subsector Coordinating Council
(ESCC); and National Association of Regulatory Utility Commissioners
(NARUC).
\9\ Infrastructure and Jobs Act, Public Law 117-58, section
40123, 135 Stat. 429, 952 (to be codified at 16 U.S.C. 824s-1(b)).
\10\ The term Bulk-Power System is defined in FPA section 215
and refers to: (1) facilities and control systems necessary for
operating an interconnected electric energy transmission network (or
any portion thereof); and (2) electric energy from generation
facilities needed to maintain transmission system reliability. 16
U.S.C. 824o(a)(1). With respect to CIP Reliability Standards, NERC
uses the term ``bulk electric system'' (BES), which is generally
defined as transmission facilities that are operated at 100 kV or
higher and real power or reactive power resources connected at 100
kV or higher. See NERC, Glossary of Terms Used in NERC Reliability
Standards (March 29, 2022), https://www.nerc.com/files/glossary_of_terms.pdf.
---------------------------------------------------------------------------
9. On May 13, 2022, the Report was submitted to Congress.\11\ The
Report, among other things, outlined prior Commission efforts to
address incentives for cybersecurity initiatives. The Report provided
information regarding potential incentive-based rate treatments and the
Commission's general ratemaking authority, including the prior adoption
of rate incentives and performance-based ratemaking in other contexts.
In addition, the Report discussed challenges associated with adopting
an incentive-based rate structure to enhance the security posture of
the Bulk-Power System. The Report noted that, while advanced
technologies that address cybersecurity threats may be innovative and/
or above and beyond industry standards at one time, they may
subsequently become conventional, mandatory, or even antiquated and
therefore may be less deserving of an incentive over time.
---------------------------------------------------------------------------
\11\ FERC, Incentives for Advanced Cybersecurity Technology
Investment (May 2022).
---------------------------------------------------------------------------
B. Prior Commission Action on Cybersecurity Incentives
10. The Commission began assessing the potential use of incentives
to improve cybersecurity prior to the passage of the Infrastructure and
Jobs Act. On June 18, 2020, Commission staff issued a white paper to
explore a potential framework for providing transmission incentives to
utilities for cybersecurity investments that produce significant
cybersecurity benefits for actions taken that exceed the requirements
of the mandatory and enforceable CIP Reliability Standards.\12\
Following the issuance of the Cybersecurity White Paper, the Commission
issued the December 2020 Cybersecurity Incentives NOPR on December 17,
2020, proposing to allow utilities to request incentives for certain
cybersecurity investments that go above and beyond the requirements of
the CIP Reliability Standards.\13\
---------------------------------------------------------------------------
\12\ FERC, Cybersecurity Incentives Policy White Paper, Docket
No. AD20-19-000, (June 2020) (Cybersecurity White Paper), https://www.ferc.gov/sites/default/files/2020-06/notice-cybersecurity.pdf.
\13\ Cybersecurity Incentives, Notice of Proposed Rulemaking, 86
FR 8309 (Feb. 5, 2021), 173 FERC ] 61,240 (2020).
---------------------------------------------------------------------------
11. In the December 2020 Cybersecurity Incentives NOPR, the
Commission proposed two cybersecurity incentive approaches. The first
approach, referred to as the NERC CIP Incentives Approach, would have
allowed an entity to receive incentive-based rate treatment for
voluntarily
[[Page 60570]]
applying identified CIP Reliability Standards to facilities that were
not otherwise subject to those requirements. The second approach, the
National Institute of Standards and Technology (NIST) Framework
Approach, would have allowed an entity to receive incentive-based rate
treatment for implementing certain security controls included in the
NIST Framework \14\ that exceed the requirements of the CIP Reliability
Standards.
---------------------------------------------------------------------------
\14\ NIST is part of the U.S. Department of Commerce that
advances measurement science, standards, and technology. It has
developed a voluntary Framework for Improving Critical
Infrastructure Cybersecurity to ``address and manage cybersecurity
risk in a cost-effective way based on business and organizational
needs without placing additional regulatory requirements on
businesses.'' NIST, Framework for Improving Critical Infrastucture
Cybersecurity, v (Apr. 16, 2018), https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf.
---------------------------------------------------------------------------
12. In light of the Congressional mandate in the Infrastructure and
Jobs Act directing the Commission to establish cybersecurity
incentives, this NOPR supersedes the December 2020 Cybersecurity
Incentives NOPR, and that proceeding in Docket No. RM21-3-000 is hereby
terminated.
C. Advanced Cybersecurity Technology and Information
1. Advanced Cybersecurity Technology
13. As noted above, the Infrastructure and Jobs Act directs the
Commission to, among other things, identify incentive-based rate
treatments that could support investments in advanced cybersecurity
technology. An advanced cybersecurity technology can be a product and/
or a service.\15\
---------------------------------------------------------------------------
\15\ See supra n.7 (defining advanced cybersecurity technology).
---------------------------------------------------------------------------
14. Cybersecurity products are generally hardware, software, and
cybersecurity services that can be used for information technology
systems and/or operational technology \16\ systems. Cybersecurity
products can include, but are not limited to, security information and
event management systems, intrusion detection systems, anomaly
detection systems, encryption tools, data loss prevention systems,
forensic toolkits, incident response tools, imaging tools, network
behavior analysis tools, access management systems, configuration
management systems, anti-malware tools, user behavior analytic
software, event logging systems, and any system for access control,
identification, authentication, and/or authorization control.
---------------------------------------------------------------------------
\16\ The NIST glossary defines ``operational technology'' as
``programmable systems or devices that interact with the physical
environment (or manage devices that interact with the physical
environment). These systems/devices detect or cause a direct change
through the monitoring and/or control of devices, processes, and
events. Examples include industrial control systems, building
management systems, fire control systems, and physical access
control mechanisms.'' NIST, Computer Security Resource Center,
Glossary (Mar. 10, 2022), https://csrc.nist.gov/glossary.
---------------------------------------------------------------------------
15. Cybersecurity services may be either automated or manual and
can include, but are not limited to, system installation and
maintenance, network administration, asset management, threat and
vulnerability management, training, incident response, forensic
investigation, network monitoring, data sharing, data recovery,
disaster recovery, network restoration, log analytics, cloud network
storage, and any general cybersecurity consulting service.
2. Advanced Cybersecurity Technology Information
16. Advanced cybersecurity technology information may include, but
is not limited to, plans, policies, procedures, specifications,
implementation, configuration, manuals, instructions, accounting,
financials, logs, records, and physical or electronic access lists
related to or regarding the advanced cybersecurity technology. Some
advanced cybersecurity technology information that is provided to the
Commission may constitute critical energy/electric infrastructure
information (CEII).\17\
---------------------------------------------------------------------------
\17\ 18 CFR 388.113.
---------------------------------------------------------------------------
D. Cybersecurity Threat Information Sharing Programs
17. The Infrastructure and Jobs Act also directs the Commission to
identify incentive-based rate treatments that could support
participation by public utilities in cybersecurity threat information
sharing programs. Engagement with the entities as directed in the
Infrastructure and Jobs Act informed the Commission of the existing
barriers faced by utilities seeking to participate in these information
sharing programs, which include the high costs associated with
implementing monitoring technology and maintenance of sensor
technology, the amount of time and effort required to share
information, incurring fees to participate in information sharing
programs, and concerns regarding the confidentiality of the information
once shared.
III. Discussion
18. To implement the statutory directive in the Infrastructure and
Jobs Act, we propose to revise our regulations to provide a process for
utilities to qualify for and then receive incentive-based rate
treatments for eligible cybersecurity expenditures. For purposes of
this NOPR, an ``expenditure'' includes both expenses and capitalized
costs associated with advanced cybersecurity technology and
participation in a cybersecurity threat information sharing program. We
propose the following approach and then seek comments on our proposal
in three sections: (1) Proposed Approaches to Request an Incentive,
which discusses how a utility could qualify for incentives for eligible
cybersecurity expenditures; (2) Proposed Rate Incentives, which
describes the type of incentive a utility could receive for an eligible
cybersecurity expenditure; and (3) Proposed Incentive Implementation,
which discusses proposed duration and expiration conditions for
incentives.
A. Proposed Approaches To Request an Incentive
19. We propose to add Sec. 35.48(c) to our regulations to create a
framework for evaluating whether certain cybersecurity expenditures,
including expenses and capitalized costs, qualify for an incentive.
First, we propose eligibility criteria to determine whether a
cybersecurity expenditure is eligible for an incentive. Second, in
Sec. 35.48(d) we propose to use a list of pre-qualified investments,
the PQ List, to identify the types of cybersecurity expenditures that
the Commission will find eligible for an incentive. In addition, we
seek comment on whether a case-by-case approach should be used to
evaluate whether certain cybersecurity expenditures are eligible for
incentives.
1. Eligibility Criteria
20. We propose that the utility seeking an incentive must
demonstrate, at a minimum, that the expenditure: (1) would materially
improve cybersecurity through either an investment in advanced
cybersecurity technology or participation in a cybersecurity threat
information sharing program(s); and (2) is not already mandated by CIP
Reliability Standards, or otherwise mandated by local, state, or
Federal law. With respect to the first criterion, we seek comment on
whether, and if so how, the Commission should evaluate and ensure that
the benefits of the expenditure exceed the combined costs of the
expenditure and incentive, to ensure the proposed rates are just and
reasonable. Further, we seek comment on whether these are the
appropriate criteria and whether there are additional criteria or
limitations that we should consider (e.g., whether the Commission
should consider an obligation imposed
[[Page 60571]]
by a state commission as a condition for a merger to be ineligible for
an incentive).
21. Additionally, we propose that, in determining which
cybersecurity expenditures will materially improve a utility's security
posture, the Commission will consider the following sources: (1)
security controls enumerated in the NIST SP 800-53 ``Security and
Privacy Controls for Information Systems and Organizations'' catalog;
\18\ (2) security controls satisfying an objective found in the NIST
Cybersecurity Framework; \19\ (3) a specific recommendation from the
Department of Homeland Security's (DHS) Cybersecurity and
Infrastructure Security Agency (CISA) or from the Department of Energy
(DOE); \20\ (4) a specific recommendation from the CISA Shields Up
Campaign; \21\ (5) participation in the DOE Cybersecurity Risk
information Sharing Program (CRISP) or similar information sharing
program; and/or (6) the Cybersecurity Capability Maturity Model Domains
at the highest Maturity Indicator Level.\22\ Using vehicles from DHS,
DOE, and other agencies responsible for addressing sophisticated and
rapidly evolving cyber threats as qualifiers for the consideration of
incentives would allow the Commission to benefit from the expertise of
other federal agencies and help ensure that the cybersecurity
expenditures will be targeted and effective.
---------------------------------------------------------------------------
\18\ NIST, Special Publication 800-53, Revision 5, Security and
Privacy Controls for Information Systems and Organizations, (Dec.
12, 2020), https://www.nist.gov/privacy-framework/nist-privacy-framework-and-cybersecurity-framework-nist-special-publication-800-53.
\19\ See NIST, Cybersecurity Framework, https://www.nist.gov/cyberframework.
\20\ See, e.g., CISA, National Cyber Awareness System Alerts,
https://www.cisa.gov/uscert/ncas/alerts.
\21\ See CISA, Shields Up, https://www.cisa.gov/shields-up.
\22\ See DOE, Cybersecurity Capability Maturity Model, https://www.energy.gov/ceser/cybersecurity-capability-maturity-model-c2m2.
---------------------------------------------------------------------------
22. We propose that, to be eligible for incentive-based rate
treatment, cybersecurity expenditures must satisfy the first two
criteria (i.e., materially improve cybersecurity and not already
mandated). The eligibility criteria would apply to either of the two
evaluation approaches discussed below (i.e., the PQ List or the case-
by-case approach). We seek comment on these criteria, including any
potential refinements, and any other criteria for incentive eligibility
that the Commission should adopt in the Final Rule.
2. Proposed Approaches for Evaluating Cybersecurity Expenditure
Eligibility
23. We propose adopting a PQ List approach, which would use a list
of pre-qualified cybersecurity expenditures, consistent with the
eligibility criteria that the Commission ultimately adopts. We also
seek comment on the alternative use of a case-by-case approach.
24. Under either approach, we propose that a utility make a filing
pursuant to FPA section 205 for incentive-based rate treatment for
those expenditures. Consistent with our precedent for incentives under
FPA section 219, while a utility may first file a petition for
declaratory order to seek a ruling on its eligibility for an incentive,
a utility still must make a filing under FPA section 205 for Commission
review of any rate changes. We propose that the incentive would be
effective no earlier than the date of the Commission order granting the
incentive under FPA section 205. A utility should seek CEII treatment,
as appropriate, for any part of its filing seeking incentives that
includes specific engineering, vulnerability, or detailed design
information about proposed or existing critical infrastructure.\23\
---------------------------------------------------------------------------
\23\ See 18 CFR 388.113; see also 16 U.S.C. 824o-1.
---------------------------------------------------------------------------
a. PQ List Approach
25. We propose to create a PQ List that identifies expenditures
that could warrant an incentive. Under this proposal, the PQ List will
be codified at 35.48(d) of the Commission's regulations and a copy will
be posted on the Commission's website.
26. We propose that a utility seeking an incentive would be
required to demonstrate that its cybersecurity expenditure qualifies as
one or more of the PQ List items. Any cybersecurity expenditure that is
on the PQ List would be entitled to a rebuttable presumption of
eligibility for an incentive. Although the PQ List items would be
entitled to a presumption of eligibility, the utility would still need
to demonstrate, and the Commission would need to find, that the
proposed rate, inclusive of the incentive, is just and reasonable. We
propose to allow intervening parties to seek to rebut this presumption
by demonstrating that the cybersecurity expenditure does not meet one
or more of the eligibility criteria (e.g., that, given the unique
circumstances of the utility, the expenditure for which the utility
seeks an incentive would not materially improve cybersecurity or is
otherwise mandatory for that utility) or the Commission could make this
finding sua sponte.
27. We believe that this PQ List approach would provide efficiency
and transparency benefits. With the Commission having pre-reviewed
potential PQ List items, we believe that utility-specific incentive
filings could be substantially streamlined compared to use of a case-
by-case approach. We recognize, however, that this approach may limit
expenditures eligible for incentives only to those on the PQ List and
would require the Commission to review and update the PQ List on a
regular basis, which introduces additional process and may delay the
eligibility of cybersecurity expenditures for incentives.
i. Initial PQ List
28. We propose to include two eligible cybersecurity expenditures
on the PQ List initially: (1) expenditures associated with
participation in the DOE CRISP; \24\ and (2) expenditures associated
with internal network security monitoring within the utility's cyber
systems, which could include information technology cyber systems and/
or operational technology cyber systems, and which could be associated
with cyber systems that may or may not be subject to the CIP
Reliability Standards. We believe investment in these cybersecurity
expenditures would materially improve cybersecurity; \25\ and are not
already mandated by CIP Reliability Standards \26\ or otherwise
mandated by Federal law. We initially propose to include CRISP, as its
purpose is to facilitate the timely bi-directional sharing of
unclassified and classified threat information and to develop
situational awareness tools that enhance the energy sector's ability to
identify, prioritize, and coordinate the protection of critical
infrastructure and key resources.\27\ However, we seek comments on
whether to include other
[[Page 60572]]
information sharing programs on the PQ List.
---------------------------------------------------------------------------
\24\ See DOE, Energy Sector Cybersecurity Preparedness, https://www.energy.gov/ceser/energy-sector-cybersecurity-preparedness.
\25\ E.g., both participation in CRISP and internal network
security monitoring would fall under recommendations in the NIST SP
800-53 ``Security and Privacy Controls for Information Systems and
Organizations'' catalog.
\26\ We note that, in January 2022, the Commission issued a NOPR
that proposed to require NERC to develop a mandatory standard
regarding internal network analysis and monitoring technologies for
high and medium impact bulk electric system cyber systems. Internal
Network Security Monitoring for High and Medium Impact Bulk Electric
System Cyber Systems, Notice of Proposed Rulemaking, 87 FR 4173
(Jan. 27, 2022), 178 FERC ] 61,038 (2022) (2022 INSM NOPR).
\27\ DOE, Energy Sector Cybersecurity Preparedness, https://www.energy.gov/ceser/energy-sector-cybersecurity-preparedness.
---------------------------------------------------------------------------
29. We propose to include internal network security monitoring on
the PQ List as we believe that internal network security monitoring may
better position an entity to detect malicious activity that has
circumvented perimeter controls.\28\ Further, while the currently
effective CIP Reliability Standards do not require internal network
security monitoring, NERC has recognized the proliferation and
usefulness of such technology.\29\
---------------------------------------------------------------------------
\28\ 2022 INSM NOPR at P 11.
\29\ See, e.g., NERC, ERO Enterprise CMEP Practice Guide:
Network Monitoring Sensors, Centralized Collectors, and Information
Sharing (June 4, 2021), https://www.nerc.com/pa/comp/guidance/CMEPPracticeGuidesDL/CMEP%20Practice%20Guide%20-%20Network%20Monitoring%20Sensors.pdf (explaining that NERC
developed the guide in response to a U.S. DOE initiative ``to
advance technologies and systems that will provide cyber visibility,
detection, and response capabilities for [industrial control
systems] of electric utilities.'' Id. at 1.).
---------------------------------------------------------------------------
30. Although we propose these two eligible cybersecurity
expenditures for the initial PQ List, there may be other cybersecurity
expenditures that would meet the statutory requirements and proposed
eligibility criteria. Therefore, we seek comment on these and any
additional cybersecurity expenditures to consider for inclusion on the
initial PQ List
ii. Updating the PQ List
31. Considering the rapidly evolving nature of cybersecurity
threats and solutions, we expect to regularly evaluate the PQ List and
update it as necessary. The eligibility criteria described above, or
any future eligibility criteria the Commission adopts, would guide the
Commission's decision on what to add, modify, or remove from the PQ
List. As noted above, we propose that, if a cybersecurity expenditure
on the PQ List becomes mandatory, it would no longer be eligible for an
incentive as of the effective date of the mandate.\30\ The Commission
would update the PQ List by adding, removing, or modifying
cybersecurity expenditures, as needed, via a rulemaking, whether sua
sponte or in response to a petition.
---------------------------------------------------------------------------
\30\ If a particular cybersecurity expenditure becomes mandatory
with respect to a utility, the provisions of proposed 18 CFR
35.48(f) would prohibit that utility from continuing to receive an
incentive for the affected cybersecurity expenditure even if the
Commission has not yet updated the PQ List.
---------------------------------------------------------------------------
b. Case-by-Case Approach
32. Another potential approach is to permit a utility to file for
incentive-based rate treatment for any cybersecurity expenditure that
satisfies the eligibility criteria discussed above, i.e., the utility
could demonstrate that the expenditure is voluntary and materially
improves cybersecurity through either an investment in advanced
cybersecurity technology or participation in a cybersecurity threat
information sharing program. Under this approach, the Commission would
review each filing on a case-by-case basis, to determine whether the
proposed cybersecurity expenditure is consistent with the eligibility
criteria. If the Commission adopts a case-by-case approach, there would
be no presumption of eligibility for any given cybersecurity
expenditure. The utility would bear the full burden to demonstrate in
its filing that its cybersecurity expenditure meets the Commission-
approved eligibility criteria, and, similar to the PQ list approach,
demonstrate that its proposed rate, inclusive of the incentive, is just
and reasonable. We seek comment on whether and, if so, how the
Commission should implement a case-by-case approach.
B. Proposed Rate Incentives
33. We propose the following rate incentives for utilities that
make eligible cybersecurity investments: (1) an ROE adder of 200 basis
points that would be applied to the incentive-eligible investments; and
(2) deferral of certain eligible expenses for rate recovery, enabling
them to be part of rate base such that a return can be earned on the
unamortized portion. We believe both offer meaningful incentive to
encourage cybersecurity expenditure that improves a utility's
cybersecurity posture. Additionally, we seek comment on whether and how
the principles of performance-based regulation could apply to utilities
with respect to cybersecurity investments.
34. Under Part II of the FPA, the Commission has jurisdiction over
the transmission of electric energy in interstate commerce and the sale
of electric energy at wholesale in interstate commerce by public
utilities.\31\ With limited exceptions, transmission rates are based on
the cost of providing transmission service (cost-of-service rates).
Cost-of-service transmission rates are recovered either through a
formula rate, for which the formula is the rate on file and most of the
inputs change year to year based on inputs that are included in the
FERC Form No. 1 or other financial forms,\32\ or a stated rate where
the rate on file is based on an approved revenue requirement. Costs
incurred to undertake cybersecurity activities can be included in
various accounting categories,\33\ either as inputs to a formula rate
as expenses or plant in the determination of the revenue requirement
for a stated rate. The Commission has allowed costs related to security
and reliability that are recovered through formula rates to include,
for example, transmission plant (e.g., transmission line upgrades to
harden the system), general and common plant, (e.g., software and
computers), and administrative and general costs (e.g., labor and
outside services, including services associated with utility-wide
informational technology).\34\ Utilities recover the cost of expenses
as a cost-of-service element in rates, but do not earn a return on
them. Utilities recover costs of capitalized investments through
depreciation and earn a return on the undepreciated amounts over the
useful life of the investment.\35\
---------------------------------------------------------------------------
\31\ 16 U.S.C. 824-824w. Unlike FPA section 219, titled
Transmission Infrastructure Investment, which gives the Commission
the authority to offer incentives for the transmission of electric
energy in interstate commerce, new FPA section 219A, titled
Incentives for Cybersecurity Investments, gives the Commission the
authority to offer incentives for the transmission of electric
energy in interstate commerce as well as the sale of electric energy
at wholesale in interstate commerce by public utilities.
\32\ Doswell Ltd. P'ship v. Va. Elec. & Power Co., 62 FERC ]
61,149, at 62,069 (1993).
\33\ In the Notice of Proposed Rulemaking in Acct. & Reporting
Treatment of Certain Renewable Energy Assets, 180 FERC ] 61,050
(2022), the Commission proposes new accounts to more clearly specify
how utilities must account for information technology hardware and
software investments.
\34\ See Boston Edison Co., 109 FERC ] 61,300, at P 40 (2004),
order on reh'g, 111 FERC ] 61,266 (2005) (accepting proposed
modifications to transmission formula rates to allow recovery of
capitalized software costs incurred to safeguard the reliability and
security of its transmission system).
\35\ The Commission has also accepted utility proposals to
recover security costs as part of a utility's stated (i.e., non-
formula) rates. See Pacific Gas & Elec. Co., 149 FERC ] 61,112
(2014); Pacific Gas & Elec. Co., 146 FERC ] 61,034 (2014).
---------------------------------------------------------------------------
35. Most utility information technology investments (general and
intangible plant) and expenses (administrative and general costs)
support functions of the entire utility, not just the transmission
function, and therefore only a portion of those costs are allocated to
transmission customers, typically based on wages and salaries
allocators.\36\
---------------------------------------------------------------------------
\36\ See, e.g., Midcontinent Independent System Operator
Attachment O formula rate, 2-3 (stating that general and intangible
plant and administrative and general costs are allocated to
transmission rates based on a wages and salaries allocator).
---------------------------------------------------------------------------
1. ROE Adder
36. We propose to add Sec. 35.48(e)(1) to the Commission's
regulations to allow a utility that makes cybersecurity
[[Page 60573]]
investments that are eligible for incentives, as more fully described
above, to request an ROE adder of 200 basis points (Cybersecurity ROE
Incentive) that would be applied to the incentive-eligible investments.
Any incentive granted under this proposal would be subject to the total
base and incentive return being capped at the top of the utility's zone
of reasonableness.\37\ This Cybersecurity ROE Incentive is intended to
encourage utilities to proactively make additional investments in
cybersecurity systems. We believe that a 200-basis point ROE adder may
be appropriate to provide a meaningful incentive to encourage utilities
to improve their systems' cybersecurity. We recognize that this amount
exceeds the ROE incentives for transmission facilities that the
Commission typically provides pursuant to FPA section 219. However,
given the relatively small cost of cybersecurity investments compared
to conventional transmission projects, a higher ROE may be necessary to
affect the expenditure decisions of utilities, without unduly burdening
ratepayers. On balance, we believe that the Cybersecurity ROE Incentive
satisfies the Congressional directive to benefit consumers by
encouraging: (1) investments by utilities in advanced cybersecurity
technology; and (2) participation by utilities in cybersecurity threat
information sharing programs.
---------------------------------------------------------------------------
\37\ See, e.g., Emera Me. v. FERC, 854 F.3d 9, 23 (D.C. Cir.
2017) (``The zone of reasonableness informs FERC's selection of a
just and reasonable rate.''); see also Permian Basin, 390 U.S. 747,
767 (1968) (stating that as long as the rate selected by the
Commission is within the zone of reasonableness, the Commission is
not required to adopt as just and reasonable any particular rate
level).
---------------------------------------------------------------------------
37. We propose that enterprise-wide investments--which are not
specific to transmission but a portion of which are recovered through
transmission rates--may also be eligible for the 200 basis-point ROE
adder incentive if the Commission determines that the investments merit
incentives, based on the eligibility criteria described above. However,
consistent with both longstanding cost-causation ratemaking principles
\38\ and the statutory requirement that rates inclusive of incentives
be just and reasonable, we propose that only the conventionally
allocated portion of such investments that flows through to cost-of-
service rates on file with the Commission would be eligible for this
rate treatment. For example, if a utility seeks an incentive for a
cybersecurity investment that it made to its general plant facilities,
both the underlying investment and associated incentive must be
allocated based on conventions of the rates (e.g., the transmission
share using a wages and salaries allocator for general plant in most
transmission cost-of-service rates). With this limitation, we seek to
ensure that the cybersecurity incentives policy adheres to the
ratemaking principle of cost-causation by, for example, limiting a
transmission customer's share of incentive costs to the share of such
investments that serve transmission.
---------------------------------------------------------------------------
\38\ See Old Dominion Elec. Coop. v FERC, 898 F.3d 1254, 1255
(D.C. Cir. 2018), (``For decades, the Commission and the courts have
understood this requirement to incorporate a ``cost-causation
principle''--the rates charged for electricity should reflect the
costs of providing it.); see, e.g., Ala. Elec. Coop., Inc. v. FERC,
684 F.2d 20, 27 (D.C. Cir. 1982).
---------------------------------------------------------------------------
38. We preliminarily find that the same expenditure should not be
eligible for both the Cybersecurity ROE Incentive and the Regulatory
Asset Incentive, discussed below. Given that regulatory asset treatment
may be approved for costs that are normally treated as expenses (i.e.,
as regulatory assets, discussed below), we preliminarily find that
costs that are allowed to be deferred as a regulatory asset should be
included in rate base for determination of the base return but not for
the additional return associated with the 200-basis point ROE adder.
2. Deferral of Certain Cybersecurity Expenses for Rate Recovery
39. We propose to add Sec. 35.48(e)(2) to the Commission's
regulations to allow a utility that makes cybersecurity investments
that are eligible for incentives, as more fully described above, to
seek deferred cost recovery. We believe that, in limited circumstances,
it may be appropriate to allow a utility to defer recovery of certain
cybersecurity costs that are generally expensed as they are incurred,
and treat them as regulatory assets, while also allowing such
regulatory assets to be included in transmission rate base (Regulatory
Asset Incentive). Many costs associated with cybersecurity are in the
form of expenses, often to third party vendors, rather than capital
investments. Moreover, certain cost categories that companies
historically have purchased and capitalized, such as software, are now
often procured as services with periodic payments to vendors that are
recorded as expenses. Therefore, to encourage investment in
cybersecurity, we believe that it may be appropriate to allow utilities
to defer and amortize eligible costs that are typically recorded as
expenses including those that are associated with third-party provision
of hardware, software, and computing and networking services. We
propose that eligible expenses, that would otherwise be includable in
cost-of-service as current period expenses, may receive an incentive by
deferring such costs as regulatory assets if they are incurred after
the effective date of the Commission order granting a utility's request
for incentives. Additionally, we seek comment on whether it would be
preferable to permit only 50% of incentive-eligible expenses to be
treated as regulatory assets.
40. A range of implementation costs associated with cybersecurity
investments may be eligible for deferred rate treatment. Such costs may
include, for example, training to implement new cybersecurity practices
and systems. However, we propose that, to be eligible for the incentive
of deferred cost recovery, such training costs must be distinct from
costs associated with pre-existing training on cybersecurity practices.
Another potentially eligible implementation cost may be internal system
evaluations and assessments or analyses by third parties described
above, to the extent that they are associated with a capitalizable item
and are part of eligible capitalizable expenses. We propose that any
implementation costs that are not conventionally booked as plant and
thus capitalized can be considered for deferral as a regulatory asset.
Recurring costs may be eligible for deferral as a regulatory asset and
include, for example, subscriptions, service agreements, and post-
implementation training costs. Specifically, they may include ongoing
dues for participation by utilities in cybersecurity threat information
sharing programs that satisfy the Commission's incentive eligibility
criteria described above.
41. Because FPA section 219A(c)(2) directs the Commission to offer
incentives to encourage participation by public utilities in
cybersecurity threat information sharing programs, we seek comment on
whether we should allow utilities who are already participating in an
eligible cybersecurity threat information sharing program to seek to
recover this incentive.
42. We note that the Commission's rules and regulations in the
Uniform System of Accounts \39\ already require public utilities to
maintain records supporting any entries to the regulatory asset account
so that the public utility can furnish full information as to the
nature and amount of, and justification
[[Page 60574]]
for, each regulatory asset recorded in the account. Therefore, pursuant
to our existing regulations, utilities must maintain sufficient records
to support the distinction of any expenditures that are afforded
incentive-based rate treatment.\40\
---------------------------------------------------------------------------
\39\ See 18 CFR part 101, Account Definition Account 182.3,
Other Regulatory Assets, paragraph D.
\40\ Id.
---------------------------------------------------------------------------
43. Additionally, consistent with the proposal for the
Cybersecurity ROE Incentive for eligible cybersecurity capital
investments, we propose that only directly assigned transmission costs
or the conventionally allocated portion of enterprise-wide expenses
(e.g., using the wages and salaries allocator) would be eligible for
the Regulatory Asset Incentive in transmission rates.
3. Performance-Based Rates
44. Section 219A(c) of the FPA directs the Commission to establish
incentive-based, including performance-based, rate treatments.
Performance-based rate treatments can potentially reward utilities for
achieving stated goals, as opposed to specific actions that only
contribute to those goals. Because it is difficult to directly observe
the level of effort a utility expends on ensuring cybersecurity,
performance-based regulation could theoretically provide a valuable
tool to motivate utilities to maintain and operate their systems
reliably and efficiently. Performance-based ratemaking can take
multiple forms, but ultimately requires the ability to measure and tie
rate treatments to actual performance.
45. We seek comment on performance-based rates and whether and how
the principles of performance-based regulation could apply to utilities
with respect to cybersecurity investments.\41\ We seek comment on
specific cybersecurity performance metrics that could be subject to a
performance standard. In particular, we seek comment on whether any
widely accepted metrics for cybersecurity performance could lend
themselves to be benchmarks needed for performance-based rates, or
whether new appropriate metrics could be developed. We further seek
comment on what rate mechanisms could accompany such metrics. We ask
that any proposed mechanisms: (1) rely on cybersecurity performance
benchmarks and not expenditures or practices; and (2) consider
ratepayer impacts, given the relatively small costs of cybersecurity
expenditures compared to utilities' overall cost-of-service.
---------------------------------------------------------------------------
\41\ Consistent with Order No. 679, which implemented FPA
section 219, we interpret ``incentive-based, including performance-
based, rate treatments'' in FPA section 219A to require the
Commission to consider performance-based rates as an option among
incentive ratemaking treatments. Promoting Transmission Inv. through
Pricing Reform, Order No. 679, 71 FR 43293 (July 31, 2006), 116 FERC
] 61,057 (2006), order on reh'g, Order No. 679-A, 117 FERC ] 61,345
(2006), order on reh'g, 119 FERC ] 61,062 (2007).
---------------------------------------------------------------------------
C. Proposed Incentive Implementation
1. Cybersecurity ROE Incentive Duration
46. We propose to add Sec. 35.48(f)(1) to the Commission's
regulations to allow a utility granted a Cybersecurity ROE Incentive to
receive that incentive until the earliest of: (1) the conclusion of the
depreciation life of the underlying asset; (2) five years from when the
cybersecurity investment(s) enter service; \42\ (3) the time that the
investment(s) or activities that serve as the basis of that incentive
become mandatory pursuant to a Reliability Standard approved by the
Commission, or local, state, or Federal law; or (4) the recipient no
longer meets the requirements for receiving the incentive. Incentive-
eligible cybersecurity investments primarily include equipment or
system modifications that typically have short depreciation lives, as
opposed to long-lived assets like physical structures. Thus, we believe
that most cybersecurity incentives granted under this rulemaking would
remain in effect until the conclusion of the depreciation life of the
underlying asset. However, for investments with useful lives exceeding
five years, we propose that the incentive end at the conclusion of five
years from the time that the asset receiving the cybersecurity
incentive entered service. The vast majority of information technology-
related investments feature expected useful lives and corresponding
cost-of-service depreciation rates of no longer than five years.
Consequently, we preliminarily find that five years is a reasonable
expected life to encourage utilities to make an investment and to
ensure just and reasonable rates. However, we seek comment on whether
the proposed duration should be three years instead of five years.
---------------------------------------------------------------------------
\42\ For participation in an information sharing program, the
``investment'' would recur annually.
---------------------------------------------------------------------------
2. Regulatory Asset Incentive Duration and Amortization Period
47. We propose to add Sec. 35.48(f)(3)(i) to the Commission's
regulations to specify that a utility granted the Regulatory Asset
Incentive must amortize the regulatory asset over five years.\43\ We
believe that this may reflect the generally short-lived nature of
cybersecurity activities and corresponds to the depreciation rates for
investments described above. This period generally corresponds to the
expected useful life and corresponding cost-of-service amortization
period of cybersecurity investments.
---------------------------------------------------------------------------
\43\ As noted above, the investment for participation in an
information sharing program would recur annually.
---------------------------------------------------------------------------
48. We also propose to add Sec. 35.48(f)(3)(ii) to the
Commission's regulations to specify that a utility granted the
Regulatory Asset Incentive may defer eligible expenses for up to five
years from the date of Commission approval of the incentive. Under this
provision, we propose that eligible expenses incurred for five years
could be added to the regulatory asset that is allowed in rate base and
amortized over five subsequent years, as discussed above.\44\ We
preliminarily find that this limit is appropriate, given the
potentially indefinite nature of certain expenses. Such a limit also
reflects that cybersecurity risks and solutions evolve over time and
matches the five-year maximum duration of the Cybersecurity ROE
Incentive discussed above. We preliminarily find that a five-year limit
appropriately balances the goal of providing an incentive of a
sufficient size to encourage utilities to make eligible improvements in
their cybersecurity posture with the requirement to protect ratepayers.
---------------------------------------------------------------------------
\44\ We propose that, in their FPA section 205 filings,
incentive recipients must include notes to their formula rates
specifying the Commission order(s) which approved the incentive and
stating that the associated regulatory asset incentive must
terminate in the earlier of: (1) five years from the date of the
later of the Commission approving the incentive or the expense being
incurred; and (2) the expenditure becoming mandatory.
---------------------------------------------------------------------------
49. However, we propose to make an exception to this sunsetting
provision for eligible cybersecurity threat information sharing
programs. FPA section 219A(c)(2) directs the Commission to provide
incentives for participation in cybersecurity threat information
sharing programs. We find that participation in such cybersecurity
threat information sharing programs, which provide participants with
ongoing updates about active cybersecurity threats and are therefore
distinct from discrete cybersecurity investments that may become
obsolete with the passage of time, warrants a different incentive
treatment than other investments. Consequently, we propose that
utilities be able to continue deferring these expenses and including
them in their rate base for each annual tranche of expenses, for as
long as: (1) the utility continues incurring costs for its
participation in the program; and (2) the program remains eligible for
incentives.
[[Page 60575]]
3. Filing Process
50. We propose to add Sec. 35.48(g) to the Commission's
regulations to require a utility's request for one or more incentive-
based rate treatments to be made in a filing pursuant to FPA section
205.\45\ As proposed, such a request must include a detailed
explanation of how the utility plans to implement one or both of the
proposed incentive approaches and the requested rate treatment. We
propose that utilities provide detail on the expenditures for which
they seek incentives, and show how its cybersecurity-related
expenditure(s) meet the eligibility requirements, as described in more
detail below.
---------------------------------------------------------------------------
\45\ As discussed in section III.A.2., consistent with our
precedent for incentives under FPA section 219, while a utility may
first file a petition for declaratory order to seek a ruling on its
eligibility for an incentive, a utility still must make a filing
under FPA section 205 for Commission review of any rate changes.
---------------------------------------------------------------------------
51. In addition, under Sec. 35.48(g) of the proposed regulation, a
utility seeking one or more incentive-based rate treatments must
receive Commission approval prior to implementing any incentive in its
rate on file with the Commission.\46\ In order to effectuate an
incentive in rates, utilities would need to propose in their FPA
section 205 filing conforming revisions to their formula rates, as
appropriate, to reflect incentive rate treatment granted pursuant to
these proposed regulations.\47\
---------------------------------------------------------------------------
\46\ We note that FPA section 219A(e)(2) expressly prohibits
unjust and unreasonable double recovery for advanced cybersecurity
technology.
\47\ Utilities with stated rates may file under FPA section 205
to seek incentives as part of a larger rate case or make a request
for single issue ratemaking, which the Commission will evaluate on a
case-by-case basis to ensure that the rate, inclusive of the
incentive, is just and reasonable.
---------------------------------------------------------------------------
52. Filings under the PQ List approach must provide evidence that
the utility has made one or more pre-qualified cybersecurity
expenditures and otherwise complies with all appropriate requirements.
53. A utility requesting the Cybersecurity ROE Incentive must
provide the anticipated cost of the capital investment and the identity
of the rate schedule(s) on file with the Commission under which it will
recover the increased ROE. Alternatively, a utility requesting the
Regulatory Asset Incentive must provide a description of the covered
expense(s), including whether the expense(s) are associated with the
third-party provision of hardware, software, and computing network
services or incurred for training to implement network analysis and
monitoring programs, as well as an estimate of the cost of such
expense(s) and when the cost is expected to be incurred.
4. Reporting Requirements
54. In order to ensure that a utility receiving incentive rate
treatment has implemented the requirements of the incentive and to
ensure that it continues to adhere to the requirements, we propose to
add Sec. 35.48(h) of the Commission's regulations to require utilities
to submit informational reports to the Commission for the duration of
the incentive.
55. A utility that has received cybersecurity incentives under this
section must make an annual informational filing by June 1, provided
that the utility has received Commission-approval for the incentive at
least 60 days prior to June 1 of that year. Utilities that receive
Commission-approval for an incentive later than 60 days prior to June 1
would be required to submit an annual informational filing beginning on
June 1 of the following year.\48\ The annual filing should detail the
specific investments, if any, as of that date, that were made pursuant
to the Commission's approval and the corresponding FERC account for
which expenditures are booked. For recipients of the Cybersecurity ROE
Incentive, each annual informational filing should describe the parts
of its network that it upgraded in addition to the nature and cost of
the various investments. For recipients of the Regulatory Asset
Incentive, each annual informational filing should describe such
expenses in sufficient detail to demonstrate that such expenses are
specifically related to the eligible cybersecurity investment
underlying the incentives and not for ongoing services including system
maintenance, surveillance, and other labor costs.
---------------------------------------------------------------------------
\48\ If a utility first receives Commission-approval for the
incentive on April 1 or later, the initial annual informational
filing would be due on June 1 of the following year.
---------------------------------------------------------------------------
56. The Commission may also conduct periodic verification to assess
cybersecurity investments and expenses for which it has approved
incentives. The Commission could perform such verifications through
multiple means (i.e., directing further informational filings, audits,
etc.). The annual informational filings will inform the Commission on
how and when any additional verification is warranted.
IV. Information Collection Statement
57. The information collection requirements contained in this NOPR
are subject to review by the Office of Management and Budget (OMB)
under the Paperwork Reduction Act of 1995 at 44 U.S.C. 3507(d). OMB's
regulations require approval of certain information collection
requirements imposed by agency rules.\49\ Upon approval of a collection
of information, OMB will assign an OMB control number and expiration
date. Respondents subject to the filing requirements of this proposed
rule will not be penalized for failing to respond to this collection of
information unless the collection of information displays a valid OMB
Control Number. This NOPR would establish the Commission's regulations
with respect to the implementation of the Infrastructure and Job
Act.\50\
---------------------------------------------------------------------------
\49\ 5 CFR 1320.11.
\50\ Public Law 117-55, 135 Stat. 951 (2021) (to be codified at
16 U.S.C. 824s-1).
---------------------------------------------------------------------------
58. Interested persons may obtain information on the reporting
requirements by contacting Ellen Brown, Office of the Executive
Director, Federal Energy Regulatory Commission, 888 First Street NE,
Washington, DC 20426, via email ([email protected]) or telephone
((202) 502-8663).
59. The Commission solicits comments on this collection of
information within 60 days of the publication of this NOPR in the
Federal Register. Public comments may include, but are not limited to,
following topics: the Commission's need for this information, whether
the information will have practical utility, the accuracy of the burden
estimates, ways to enhance the quality, utility, and clarity of the
information to be collected or retained, and any suggested methods for
minimizing respondents' burden, including the use of automated
information techniques.
60. Please send comments concerning the collection of information
and the associated burden estimates to: OMB through www.reginfo.gov/public/do/PRAMain, Attention: Federal Energy Regulatory Commission Desk
Officer. Please identify the OMB Control Number 1902-0248 in the
subject line.
61. Instructions: OMB submissions must be formatted and filed in
accordance with submission guidelines at: www.reginfo.gov/public/do/PRAMain; using the search function under the ``Currently Under Review
field,'' select Federal Energy Regulatory Commission, click ``submit,''
and select ``comment'' to the right of the subject collection.
62. Title: FERC-725B, Incentives for Advanced Cybersecurity
Investment.
63. Action: Proposed revision of FERC-725B.
64. OMB Control No.: 1902-0248.
[[Page 60576]]
65. Respondents for this Rulemaking: Public utilities and non-
public utilities that have or will have a rate on file with the
Commission.
66. Frequency of Information Collection:
(1) On occasion: Voluntary filings seeking incentive-based rate
treatment for cybersecurity expenditures; and
(2) Annually: A informational filing on June 1 of each year,
required of entities that have been granted incentive-based rate
treatment for cybersecurity expenditures.
67. Abstract: The NOPR would provide that a utility may seek
incentive-based rate treatment for cybersecurity investments by making
a rate filing in accordance with section 205 of the FPA. The NOPR
states that one approach the Commission may use in evaluating such a
filing is to consider whether prospective cybersecurity investments
would match one of the types of investments listed at proposed 18 CFR
35.48(d). The NOPR refers to this list of pre-qualified expenditures
that are eligible for incentives as the ``PQ List.'' The Commission
proposes that any cybersecurity expenditure that is on the PQ List
would be entitled to a rebuttable presumption of eligibility for an
incentive.
The NOPR also discusses and seeks comment on a potential
alternative approach, in which a utility's cybersecurity expenditure
would be evaluated on a case-by-case basis to determine if it is
eligible for an incentive. Under that approach, the utility would need
to demonstrate that the prospective investment is voluntary and would
materially improve cybersecurity through either an investment in
advanced cybersecurity technology or participation in cybersecurity
threat information sharing program. Under either approach, the utility
would need to demonstrate that its rate, inclusive of the incentive, is
just and reasonable.
68. The NOPR also would provide that a utility that is granted
incentive-based rate treatment must submit an annual informational
filing to the Commission by June 1 of each year, provided that the
utility has received Commission approval of the incentive at least 60
days prior to June 1 of that year. Utilities that receive Commission
approval of an incentive later than 60 days prior to June 1 would be
required to submit an annual informational filing beginning on June 1
of the following year. The informational filing must describe the
specific investments, if any, as of that date, that were made pursuant
to the Commission's approval and the corresponding FERC account for
which expenditures are booked. For incentives where the Commission
allows deferral of expenses, annual informational filings should
describe such expenses in sufficient detail to demonstrate that such
expenses are specifically related to the cybersecurity investment for
which the incentive was granted, and not for ongoing services including
system maintenance, surveillance, and other labor costs.
69. Necessity of Information: Required to obtain or retain
benefits.
70. Internal Review: The Commission has reviewed the changes and
has determined that such changes are necessary. These requirements
conform to the Commission's need for efficient information collection,
communication, and management within the energy industry. The
Commission has specific, objective support for the burden estimates
associated with the information collection requirements.
71. The NERC Compliance Registry, as of August 5, 2022, identifies
approximately 1,669 utilities, both public and non-public, in the U.S.
that would be eligible for this proposed incentive and rate treatment.
The Commission estimates that the NOPR may affect the burden \51\ and
cost \52\ as follows:
---------------------------------------------------------------------------
\51\ ``Burden'' is the total time, effort, or financial
resources expended by persons to generate, maintain, retain, or
disclose or provide information to or for a Federal agency. For
further explanation of what is included in the information
collection burden, refer to 5 CFR 1320.3.
\52\ Commission staff estimates that respondents' hourly wages
(including benefits) are comparable to those of FERC employees in
Fiscal Year 2022. Therefore, the hourly cost used in this analysis
is $91 and $188,992 annually.
FERC-725B--Proposed Changes in NOPR in Docket No. RM22-19-000
--------------------------------------------------------------------------------------------------------------------------------------------------------
C. Annual
estimated D. Annual E. Average burden hours
A. Area of modification B. Number of number of estimated & cost ($) per F. Total estimated burden hours & total
respondents responses per number of response estimated cost ($)
respondent responses
(Column B x (Column D x Column E)
Column C)
--------------------------------------------------------------------------------------------------------------------------------------------------------
Voluntary filing seeking incentive 50 1 50 80 hours; $7,280....... 4,000 hours; $364,000.
rate treatment for cybersecurity
investment. Proposed 18 CFR
35.48(b).
Annual informational filing required 50 1 50 40 hours; $3,640....... 2,000 hours; $182,000.
where Commission has granted
incentive rate treatment. Proposed
18 CFR 35.48(h).
-------------------------------------------------------------------------------------------------------------------
Totals.......................... .............. .............. .............. ....................... 6,000 hours; $546,000.
--------------------------------------------------------------------------------------------------------------------------------------------------------
V. Environmental Assessment
72. The Commission is required to prepare an Environmental
Assessment or an Environmental Impact Statement for any action that may
have a significant adverse effect on the human environment.\53\ The
Commission has categorically excluded certain actions from this
requirement as not having a significant effect on the human
environment. Included in the exclusion are rules that are clarifying,
corrective, or procedural or that do not substantially change the
effect of the regulations being amended.\54\ The actions proposed
herein fall within this categorical exclusion in the Commission's
regulations.
---------------------------------------------------------------------------
\53\ Reg'ls. Implementing the Nat'l. Env'nt. Pol'y Act, Order
No. 486, 52 FR 47897 (Dec. 17, 1987), FERC Stats. & Regs. Preambles
1986-1990 ] 30,783 (1987) (cross-referenced at 41 FERC ] 61,284).
\54\ 18 CFR 380.4(a)(2)(ii).
---------------------------------------------------------------------------
[[Page 60577]]
VI. Regulatory Flexibility Act
73. The Regulatory Flexibility Act of 1980 \55\ generally requires
a description and analysis of proposed rules that will have significant
economic impact on a substantial number of small entities. The Small
Business Administration (SBA) sets the threshold for what constitutes a
small business. Under SBA's size standards,\56\ transmission owners all
fall under the category of Electric Bulk Power Transmission and Control
(NAICS code 221121), with a size threshold of 500 employees (including
the entity and its associates).\57\ The NERC Compliance Registry, as of
August 5, 2022, identifies approximately 1,669 utilities, both public
and non-public, in the U.S. that potentially would be affected by the
voluntary information collection associated with the proposed incentive
and rate treatment in this NOPR. Based on the Compliance Registry, we
have reviewed a randomly selected sample of 92 entities, and we have
determined that approximately 80% of the listed entities are small
entities (i.e., with fewer than 500 employees).
---------------------------------------------------------------------------
\55\ 5 U.S.C. 601-612.
\56\ 13 CFR 121.201.
\57\ The threshold for the number of employees indicates the
maximum allowed for a concern and its affiliates to be considered
small.
---------------------------------------------------------------------------
74. Regarding information collection activities, we estimate an
average one-time cost of $7,280 for each of 50 new filers, and an
average annual cost of $3,640 for each of 50 continuing recipients of
rate incentives.
75. According to SBA guidance, the determination of significance of
impact ``should be seen as relative to the size of the business, the
size of the competitor's business, the number of filers received
annually, and the impact this regulation has on larger competitors.''
\58\
---------------------------------------------------------------------------
\58\ U.S. Small Business Administration, A Guide for Government
Agencies How to Comply with the Regulatory Flexibility Act, 18 (May
2012), https://www.sba.gov/sites/default/files/advocacy/rfaguide_0512_0.pdf.
---------------------------------------------------------------------------
76. Moreover, this NOPR involves voluntary actions by utilities for
the purpose of benefitting consumers by encouraging investments by
utilities in advanced cybersecurity technology and participation by
utilities in cybersecurity threat information sharing programs. The
proposal does not mandate or require action by any utility. As a
result, we certify that the proposals in this NOPR will not have a
significant economic impact on a substantial number of small entities.
VII. Comment Procedures
77. The Commission invites interested persons to submit comments on
the matters and issues proposed in this NOPR to be adopted, including
any related matters or alternative proposals that commenters may wish
to discuss. Comments are due 30 days after the date of publication in
the Federal Register, and reply comments are due 45 days after the date
of publication in the Federal Register. Any comment must refer to
Docket No. RM22-19-000, and must include the commenter's name, the
organization it represents, if applicable, and its address in its
comments. All comments will be placed in the Commission's public files
and may be viewed, printed, or downloaded remotely as described in the
Document Availability section below. Commenters on this proposal are
not required to serve copies of their comments on other commenters.
78. The Commission encourages comments to be filed electronically
via the eFiling link on the Commission's website at https://www.ferc.gov. The Commission accepts most standard word processing
formats. Documents created electronically using word processing
software must be filed in native applications or print-to-PDF format
and not in a scanned format. Commenters filing electronically do not
need to make a paper filing.
79. Commenters that are not able to file comments electronically
may file an original of their comments by USPS mail or by courier-or
other delivery services. For submission sent via USPS only, filings
should be mailed to: Federal Energy Regulatory Commission, Office of
the Secretary, 888 First Street NE, Washington, DC 20426. Submission of
filings other than by USPS should be delivered to: Federal Energy
Regulatory Commission, 12225 Wilkins Avenue, Rockville, MD 20852.
VIII. Document Availability
80. In addition to publishing the full text of this document in the
Federal Register, the Commission provides all interested persons with
an opportunity to view and/or print the contents of this document via
the internet through the Commission's Home Page (https://www.ferc.gov).
81. From the Commission's Home Page on the internet, this
information is available on eLibrary. The full text of this document is
available on eLibrary in PDF and Microsoft Word format for viewing,
printing, and/or downloading. To access this document in eLibrary, type
the docket number excluding the last three digits of this number in the
docket number field.
82. User assistance is available for eLibrary and the Commission's
website during normal business hours from the Commission's Online
Support at 202-502-6652 (toll free at 1-866-208-3676) or email at
[email protected], or the Public Reference Room at (202) 502-
8371, TTY (202) 502-8659. Email the Public Reference Room at
[email protected].
List of Subjects in 18 CFR Part 35
Electric power rates, Electric utilities, Reporting and
recordkeeping requirements.
By direction of the Commission. Commissioner Phillips is
concurring with a separate statement attached.
Issued: September 22, 2022.
Debbie-Anne A. Reese,
Deputy Secretary.
In consideration of the foregoing, the Commission proposes to amend
part 35, chapter I, title 18, Code of Federal Regulations, as follows:
PART 35--FILING OF RATE SCHEDULES AND TARIFFS
0
1. The authority citation for part 35 continues to read as follows:
Authority: 16 U.S.C. 791a-825r, 2601-2645; 31 U.S.C. 9701; 42
U.S.C. 7101-7352.
0
2. Add subpart K, consisting of Sec. 35.48, to read as follows:
Subpart K--Cybersecurity Investment Provisions
Sec. 35.48 Cybersecurity investment.
(a) Purpose. This section establishes rules for incentive-based
rate treatments for utilities that voluntarily make cybersecurity
investments as described in this section.
(b) Incentive-based rate treatment for cybersecurity investment.
The Commission will authorize incentive-based rate treatment for a
utility that voluntarily makes an investment in advanced cybersecurity
technology and for a utility that voluntarily participates in a
cybersecurity threat information sharing program under this section.
Incentive-based rate treatment is available to both public and non-
public utilities that have or will have a rate on file with the
Commission. A utility may request incentive-based rate treatment for an
eligible cybersecurity investment that meets the eligibility criteria
set forth in paragraph (c) of this section.
(c) Eligibility criteria. A utility may receive incentive-based
rate treatment for a cybersecurity investment that:
(1) Materially improves cybersecurity through either investment in
advanced
[[Page 60578]]
cybersecurity technology or participation in a cybersecurity threat
information sharing program; and
(2) Is not already mandated by the mandatory and enforceable
Critical Infrastructure Protection Reliability Standards as maintained
by the Electric Reliability Organization, or otherwise mandated by
local, state, or Federal law. A utility may receive incentive-based
rate treatment for the investment pursuant to paragraphs (d) through
(h) of this section.
(d) Pre-qualified cybersecurity expenditure. A utility must
demonstrate that a cybersecurity expenditure qualifies as one or more
of the pre-qualified cybersecurity expenditures identified by the
Commission pursuant to this paragraph (d). A utility should seek
critical energy/electric infrastructure information treatment with the
Commission, as appropriate, for any part of its filing seeking
incentive-based rate treatment that has specific engineering,
vulnerability, or detailed design information about proposed or
existing critical infrastructure. Pre-qualified cybersecurity
expenditures include:
(1) Expenditures associated with participation in the Department of
Energy's Cybersecurity Risk Information Sharing Program.
(2) Expenditures associated with internal network security
monitoring within the utility's cyber systems.
(e) Types of incentive-based rate treatment for cybersecurity
investment. For purposes of paragraph (b) of this section, incentive-
based rate treatment shall mean either of the following:
(1) An increase in rate of return on equity of 200 basis points
that would be applied to the incentive-eligible investment; or
(2) Deferral of expenses as a regulatory asset;
(f) Incentive duration. (1) A return on equity incentive-based rate
treatment approved pursuant to this section shall last no longer than
the earliest of:
(i) The depreciation life of the underlying asset;
(ii) Five years from when the cybersecurity investment enters
service;
(iii) When the cybersecurity investment or activity that serves as
the basis of that incentive becomes mandatory; or
(iv) When the utility no longer meets the requirements for
receiving the incentive.
(2) An incentive granted for participation in a qualified
cybersecurity threat information sharing program will not be subject to
a sunset, such that a utility participating in a qualified
cybersecurity threat information sharing program is eligible to
continue deferring expenses associated with membership, which for each
year would be amortized over the next five years, for as long as it is
a member and participation is not mandatory.
(3) A deferred regulatory asset whose costs are typically expensed
should be:
(i) Amortized over a five-year period; and
(ii) Limited to expenses incurred in the first five years following
Commission approval of the incentive.
(g) Incentive applications. For the purpose of paragraphs (b) and
(c) of this section, a utility's request for one or more incentive
based-rate treatments, to be made in a filing pursuant to section 205
of the Federal Power Act, must include a detailed explanation of the
proposed rate treatment and include the following information:
(1) Evidence that it has made one or more pre-qualified
cybersecurity expenditures and otherwise complies with all requirements
of this section.
(2) For applications requesting an increase in rate of return on
equity of 200 basis points:
(i) The anticipated cost of the capital investment; and
(ii) The identity of the rate schedule(s) on file or to be filed
with the Commission under which it will recover the increased return on
equity.
(3) For applications requesting deferred cost recovery:
(i) A description of any expenses, including whether the expenses
are:
(A) Expenses associated with third-party provision of hardware,
software, and computing networking services; and/or
(B) Expenses for training to implement network analysis and
monitoring programs;
(ii) Estimates of the cost of such expenses; and
(iii) When the costs are expected to be incurred.
(h) Reporting requirements. A utility that has received an
incentive under this section must make an annual informational filing
on June 1, provided that the utility has received Commission-approval
for the incentive at least 60 days prior to June 1 of that year. The
annual filing should detail the specific investments that were made
pursuant to the Commission's approval and the corresponding FERC
account used. A utility that has received an incentive under this
section must describe any parts of its network that it upgraded in
addition to the nature and cost of the various investments. For
incentives where the Commission allows deferral of expenses, annual
informational filings should describe such expenses in sufficient
detail to demonstrate that such expenses are specifically related to
the cybersecurity investment granted incentives and not for ongoing
services including system maintenance, surveillance, and other labor
costs.
Note: The following appendix will not appear in the Code of
Federal Regulations.
UNITED STATES OF AMERICA
FEDERAL ENERGY REGULATORY COMMISSION
Incentives for Advanced Cybersecurity Investment, Docket Nos. RM22-19-
000, RM21-3-000
PHILLIPS, Commissioner, concurring:
1. I concur in today's Notice of Proposed Rulemaking \1\ to
highlight the importance of today's action and to encourage stakeholder
comment in certain areas. In today's highly interconnected world, the
nation's security and economic well-being depends on reliable and
cyber-resilient energy infrastructure. This is why it is critical that
we continue to build upon the mandatory framework that the industry has
already identified through the North American Electric Reliability
Corporation (NERC) Critical Infrastructure Protection (CIP) standards.
But, these mandatory CIP standards are just a baseline and can take
years to implement. Recent cyber-attacks in Ukraine and here at home
remind us of the constant threat of foreign and domestic attacks on our
critical infrastructure, and the need for advanced and innovative
technology and threat information sharing programs for emerging
threats. Therefore, I fully support this action we are taking under
section 219A of the Federal Power Act (FPA) \2\ to encourage utilities
to proactively make additional cybersecurity investments in their
systems.
---------------------------------------------------------------------------
\1\ Incentives for Advanced Cybersecurity Investment, 180 FERC ]
61,189 (2022) (NOPR).
\2\ 16 U.S.C. 824s-1.
---------------------------------------------------------------------------
2. There are significant costs when there is a cybersecurity breach
on the electric or gas system. Not only are consumers impacted by loss
of service, but the recovery costs are significant. For example, the
Colonial Pipeline cybersecurity breach effectively shut down half of
the country's fuel supply, and even though the pipeline invested $200
million dollars over five years to contain a potential attack,\3\
Colonial
[[Page 60579]]
Pipeline still spent millions more to recover from the event in
2021.\4\
---------------------------------------------------------------------------
\3\ See Cyber Threats in the Pipeline: Using Lessons from the
Colonial Ransomware Attack to Defend Critical Infrastructure,
Hearing Before the Committee on Homeland Security, 117th Cong.
(2021) (Statement of Joseph A. Blount).
\4\ See Everhart v. Colonial Pipeline Company, 2022 WL 3699967,
(N.D. Ga. 2022) (``Colonial paid the cybercriminals . . . a $4.4
million ransom in return for a decryption tool that allowed Colonial
to retrieve the encrypted or locked data.'').
---------------------------------------------------------------------------
3. This NOPR serves as a critical step to incent public and non-
public utilities to make urgent cybersecurity investments in advanced
technology. First, the NOPR proposes to incentivize expenditures that
materially improve the cybersecurity posture of utilities.\5\ Second,
the NOPR provides that those cybersecurity investments must not already
``be mandated by [CIP] Reliability Standards, or local, state, of
federal law.'' \6\ Third, the NOPR proposes that the Commission either
use a pre-qualified (PQ) list of approved cybersecurity expenditures,
where any expenditures that meet the list would be entitled to a
rebuttable presumption that the utility is eligible for an
incentive,\7\ or that the Commission assess expenditures on a case-by-
case basis.\8\ Lastly, the NOPR proposes that if a utility meets the
requirements for an incentive, it could either receive a return on
equity (ROE) adder of 200 basis points or deferred cost recovery for
expenditures that enables the utility to defer expenses and include the
unamortized portion in rate base.\9\ All of these items are essential
to improving utilities' ability to protect, detect, respond to, and
recover from a cybersecurity threat.
---------------------------------------------------------------------------
\5\ NOPR at PP 2, 20, 22.
\6\ NOPR at PP 2, 22.
\7\ NOPR at PP 3, 19; see infra at PP 4-5.
\8\ NOPR at PP 3, 19, 22-23.
\9\ NOPR at PP 4, 34, 37.
---------------------------------------------------------------------------
4. Specifically, I am interested in feedback on whether the
proposed PQ list is broad enough to include all expenditures that may
warrant incentives. As proposed, if an expense is associated with
participation in the Cybersecurity Risk Sharing Program (CRISP) \10\ or
if an expenditure is associated with internal network security
monitoring within the utility's cyber systems,\11\ there would be a
rebuttable presumption that that expense is entitled to an incentive. I
agree that each eligible cybersecurity expenditure on the PQ list
should have a single, clear, and non-trivial benchmark that must be met
for a utility to qualify for incentive rate treatment. But, the
proposed PQ list is limited. For example, 75% of electricity customers
in the continental U.S. are served by investor-owned utilities that
already participate in CRISP,\12\ which demonstrates the limited
potential benefits from this incentive. Under the NOPR proposal, it is
unclear whether a utility that already participates in CRISP could
receive an incentive for future subscription costs for continued CRISP
participation. I encourage comments on whether any final rule should
clarify that such continued CRISP participation is indeed entitled to
an incentive.
---------------------------------------------------------------------------
\10\ Co-funded by the Department of Energy (DOE) and industry
and managed by E-ISAC, CRISP is a public-private partnership that
enables and manages the near real-time sharing of IT network
information between electricity utilities and key DOE resources. The
purpose of CRISP is to enable collaboration among energy sector
partners to facilitate the timely bi-directional sharing of
unclassified and classified threat information and to develop
situational awareness tools that enhance the energy sector's ability
to identify, prioritize, and coordinate the protection of critical
infrastructure.
\11\ The Commission issued a NOPR that proposed to direct NERC
to develop a mandatory standard regarding internal network security
monitoring in the context of high and medium impact bulk electric
system. See Internal Network Security Monitoring for High and Medium
Impact Bulk Electric System Cyber Systems, 178 FERC ] 61,038 (2022).
\12\ See Energy Sector Cybersecurity Preparedness, available at:
https://www.energy.gov/ceser/energy-sector-cybersecurity-preparedness.
---------------------------------------------------------------------------
5. I also recognize that a case-by-case approach, as opposed to the
proposed PQ list, would be more adaptable and less prescriptive,
allowing a variety of solutions that utilities could potentially tailor
to their specific situations. However, given the diverse and evolving
nature of cybersecurity activities, this option could be very time-
consuming and administratively inefficient. Thus, I believe that an
expanded PQ list is a reasonable approach that would satisfy the
applicable statutory directives while providing a high degree of
certainty for regulated entities. I urge all interested stakeholders to
provide comments on whether the Commission should widen the PQ list's
universe of potential expenditures. I especially encourage stakeholders
to comment on whether the Commission should consider external
penetration tests, a security awareness program, a patch management
program, and/or the capability to disconnect operational technology
from the information technology network for the PQ list.
6. I also want to underscore the need for utilities to conduct
analyses of electric and gas interdependencies, and how such actions
would benefit cybersecurity on the bulk electric system. I fully
recognize that FPA section 219A states that the Commission can
establish ``incentive-based, including performance-based, rate
treatments for the transmission of electric energy in interstate
commerce,'' \13\ and the Infrastructure Act only modified section 219
regarding incentives and not the Natural Gas Act (NGA).\14\ However,
electric and gas companies are especially vulnerable to cyberattacks,
particularly because utilities that use both sources have an expansive
and increasing attack surface, arising from their geographic and
organizational complexity. Indeed, the electric and gas sector's unique
interdependencies increase their vulnerability to exploitation, which
can include the commandeering of the operational-technology system to
stop energy infrastructure from working at times when consumers most
need it. To the extent we can identify the need for cybersecurity
information sharing between the natural gas and electric systems, and
incentivize participation in such a program, I encourage stakeholder
comment.
---------------------------------------------------------------------------
\13\ 16 U.S.C. 824s-1(c) (emphasis added).
\14\ The Infrastructure Investment and Jobs Act (Infrastructure
Act) modified Section 219 of the FPA regarding electric energy rate
treatments and directed the Commission to consider incentives for
the transmission of electric energy regarding cybersecurity. Section
219 did not, however, explicitly reference or modify the NGA
regarding gas incentives.
---------------------------------------------------------------------------
7. I further urge stakeholders to comment on whether the proposed
duration of the incentives is sufficient and whether a 200-basis point
adder is reasonable, as the NOPR contemplates.\15\ To be clear, I do
not support open-ended or permanent cyber incentives. I believe the 5-
year proposed duration and the 200-basis point adder are adequate to
properly incent utilities. Unlike expenses in the traditional
transmission incentives context,\16\ the dollar amounts in
cybersecurity investments are typically small. Yet, the benefits of
additional, advanced cybersecurity investments cannot be ignored.
Offering anything less than what is proposed would likely be
[[Page 60580]]
insufficient to incent any action by utilities, as required by
Congress. Therefore, commenters should provide specific, compelling
reasons if they oppose the NOPR proposal regarding the duration of the
incentive and the amount added to a utility's ROE.
---------------------------------------------------------------------------
\15\ NOPR at PP 4, 33, 36-37; see, e.g., Initial Comments of
Edison Electric Institute., Docket No. RM21-3-000, at 2 (filed April
6, 2021) (``EEI agrees that given the relatively low dollar amounts
associated with cybersecurity investments . . . the proposed 200
basis point cap is reasonable.''); Comments of MISO Transmission
Owners, Docket No. RM21-3-000, at 9 (filed April 6, 2021)
(explaining why inclusion of enterprise-wide costs is appropriate to
incent investment in critical facilities).
\16\ Brattle-Grid Strategies Oct. 2021 Report at 2 (citing
Johannes Pfeifenberger & John Tsoukalis, The Brattle Group,
Transmission Investment Needs and Challenges, at slide 2 (June 1,
2021), https://www.brattle.com/wp-content/uploads/2021/10/Transmission-Investment-Needs-and-Challenges.pdf); Johannes
Pfeifenberger et al., The Brattle Group, Cost Savings Offered by
Competition in Electric Transmission: Experience to Date and the
Potential for Additional Customer Value, at 2-3 & fig.1 (Apr. 2019),
available at: https://www.brattle.com/wp-content/uploads/2021/05/16726_cost_savings_offered_by_competition_in_electric_transmission.pdf (Brattle Apr. 2019 Competition Report).
---------------------------------------------------------------------------
8. Finally, I note that for years now, the White House, the U.S.
Congress, and senior government leaders have sounded the alarm on
increasing cybersecurity threats and their sophistication.\17\ I also
note that the Commission began assessing the potential use of
incentives to improve cybersecurity prior to the passage of the
Infrastructure Act.\18\ While we are terminating the proceeding in
Docket No. RM21-3-000, I am heartened that the Commission remains
committed to this issue. I look forward to examining all the comments
as we seek to issue a final rule around these topics.
---------------------------------------------------------------------------
\17\ For example, President Biden told utilities and other
companies that ``critical infrastructure owners and operators must
accelerate efforts to lock their digital doors.'' See Statement by
President Biden on Our Nation's Cybersecurity, available at: https://www.whitehouse.gov/briefing-room/statements-releases/2022/03/21/statement-by-president-biden-on-our-nations-cybersecurity. President
Biden has also since announced an executive order on cybersecurity
and is using funds from the Infrastructure Act to provide grants to
state, local, and territorial governments as they respond to cyber
threats. See Exec. Order No. 14,028, 86 FR 26633 (2021). Former
President Obama declared that cybersecurity threats are ``the most
serious economic and national security challenge[ ] we face as a
nation'' and that ``America's economic prosperity . . . will depend
on cybersecurity.'' See National Security Council, Cyber Security,
available at: https://www.whitehouse.gov/administration/eop/nsc/cybersecurity. Former Defense Secretary Leon Panetta warned that the
country is ``increasingly vulnerable to foreign computer hackers who
could dismantle the nation's power grid.'' See Elizabeth Bumiller
and Thom Shanker, Panetta Warns of Dire Threat of Cyberattacks on
U.S., The New York Times, October 11, 2021, available at: https://www.nytimes.com/2012/10/12/world/panetta-warns-of-dire-threat-of-cyberattack.html?pagewanted=all.
\18\ See, e.g., FERC, Cybersecurity Incentives Policy White
Paper, Docket No. AD20-19-000, (June 2020), available at: https://www.ferc.gov/sites/default/files/2020-06/notice-cybersecurity.pdf
(discussing the potential new framework for providing transmission
incentives to utilities for cybersecurity investments);
Cybersecurity Incentives, 87 FR 4173 (Jan. 27, 2021), 173 FERC ]
61,240 (2020) (proposing to allow utilities to request incentives
for certain cybersecurity investments that go above and beyond the
requirements of the CIP reliability standards). This NOPR supersedes
the Cybersecurity Incentives NOPR, but it illustrates my colleagues'
commitment to building out a more resilient electric system.
---------------------------------------------------------------------------
For these reasons, I respectfully concur.
Willie L. Phillips
Commissioner
[FR Doc. 2022-21003 Filed 10-5-22; 8:45 am]
BILLING CODE 6717-01-P