Joint FERC-DOE Supply Chain Risk Management Technical Conference; Notice Inviting Post-Technical Conference Comments, 78954-78956 [2022-27965]
Download as PDF
78954
Federal Register / Vol. 87, No. 246 / Friday, December 23, 2022 / Notices
Reliability, (202) 502–6707,
Simon.Slobodnik@ferc.gov
Alan J. Rukin (Legal Information) Office
of General Counsel, (202) 502–8502,
Alan.Rukin@ferc.gov
DEPARTMENT OF ENERGY
Federal Energy Regulatory
Commission
[Docket No. AD22–12–000]
Dated: December 19, 2022.
Debbie-Anne A. Reese,
Deputy Secretary.
TKELLEY on DSK125TN23PROD with NOTICE
Joint FERC–DOE Supply Chain Risk
Management Technical Conference;
Notice Inviting Post-Technical
Conference Comments
Post Technical Conference Questions
On Wednesday, December 7, 2022,
the Federal Energy Regulatory
Commission (Commission) and the U.S.
Department of Energy (DOE) convened a
Joint Supply Chain Risk Management
Technical Conference to discuss supply
chain security challenges related to the
Bulk-Power System, ongoing supply
chain-related activities, and potential
measures to secure the supply chain for
the grid’s hardware, software, computer,
and networking equipment.
All interested persons are invited to
file post-technical conference comments
to address issues raised during the
technical conference identified in the
Supplemental Notice of Technical
Conference issued on December 6, 2022.
For reference, the questions included in
the Supplemental Notice are included
below. Commenters need not answer all
of the questions, but are encouraged to
organize responses using the numbering
and order in the below questions.
Commenters are also invited to
reference material previously filed in
this docket but are encouraged to avoid
repetition or replication of their
previous comments. Comments must be
submitted on or before 60 days from the
date of this Notice.
Comments, identified by docket
number, may be filed electronically or
paper-filed. Electronic filing through
https://www.ferc.gov is preferred.
Documents must be filed in acceptable
native applications and print-to-PDF,
but not in scanned or picture format.
Instructions are available on the
Commission’s website: https://
www.ferc.gov/docs-filing/efiling.asp.
Although the Commission strongly
encourages electronic filing, documents
may also be paper-filed. To paper-file,
submissions sent via the U.S. Postal
Service must be addressed to: Federal
Energy Regulatory Commission, Office
of the Secretary, 888 First Street NE,
Washington, DC 20426. Submissions
sent via any other carrier must be
addressed to: Federal Energy Regulatory
Commission, Office of the Secretary,
12225 Wilkins Avenue, Rockville,
Maryland 20852.
For more information about this
Notice, please contact:
Simon Slobodnik (Technical
Information) Office of Energy
VerDate Sep<11>2014
20:36 Dec 22, 2022
Jkt 259001
I. Supply Chain Risks Facing the BulkPower System
The U.S. energy sector procures
products and services from a globally
distributed, highly complex, and
increasingly interconnected set of
supply chains. Information Technology
(IT) and Operational Technology (OT)
systems enable increased
interconnectivity, process automation,
and remote control. As a result, supply
chain risks will continue to evolve and
likely increase. This panel discussed the
state of supply chain risks from a
national and geopolitical perspective.
Specifically, the panel explored current
supply chain risks to the security of
grid’s hardware, software, computer,
and networking equipment and how
well-resourced campaigns perpetrated
by nation states, such as the SolarWinds
incident, affect supply chain risk for the
electric sector. Panelists discussed the
origins of these risks, their
pervasiveness, the possible impacts they
could have on Bulk-Power System
reliability, and approaches to mitigating
them. The panelists also discussed
challenges associated with supply chain
visibility and covert embedded spyware
or other compromising software or
hardware in suppliers’ products, parts,
or services.
Please address the following
questions:
1. Describe the types of challenges
and risks associated with globally
distributed, highly complex, and
increasingly interconnected supply
chains.
2. Describe the difficulties associated
with supply chain visibility and how
origins of products or components may
be obscured.
3. How are foreign-supplied BulkPower System components being
manipulated and is there a particular
phase in the product lifecycle where the
product is manipulated for nefarious
intent?
4. How are these supply chain
challenges and risks currently being
managed?
5. How has the current geopolitical
landscape impacted the energy sector’s
ability to manage supply chain
challenges and risks?
PO 00000
Frm 00042
Fmt 4703
Sfmt 4703
6. How can Sector Risk Management
Agencies and Regulators promote and/
or incentivize supply chain
transparency at the earlier stages of
product development and
manufacturing?
7. Discuss the pathways (e.g.,
voluntary best practices and guidelines,
mandatory standards) that together
could address the current supply chain
challenges and risks?
8. What actions can government take,
both formal regulatory actions and
coordination, to help identify and
mitigate risks from the global supply
chain for the energy sector?
II. Current Supply Chain Risk
Management (SCRM) Reliability
Standards, Implementation Challenges,
Gaps, and Opportunities for
Improvement
It has now been more than six years
since the Commission directed the
development of mandatory Reliability
Standards to address supply chain risks,
and more than two years since the first
set of those tandards became effective.1
As discussed in Panel 1, supply chain
risks have continued to grow in that
time. In light of that evolving threat,
panelists discussed the existing SCRM
Reliability Standards, including: (1)
their effectiveness in securing the BulkPower System; (2) lessons learned from
implementation of the current SCRM
Reliability Standards; and (3) possible
gaps in the currently effective SCRM
Reliability Standards. This panel
provided an opportunity to discuss any
Reliability Standards in development,
and how these new standards will help
enhance security and help address some
of the emerging supply chain threats.
Please address the following
questions:
1. Are the currently effective SCRM
Reliability Standards sufficient to
successfully ensure Bulk-Power System
reliability and security in light of
existing and emerging risks?
2. What requirements in the SCRM
Reliability Standards present
implementation challenges for
registered entities and for vendors?
3. How are implementation challenges
being addressed for utilities and for
vendors?
4. Are there alternative methods for
implementing the SCRM Reliability
Standards that could eliminate
1 The SCRM Reliability Standards include:
Reliability Standards CIP–005–7 (Cyber Security—
Electronic Security Perimeter(s)), Requirements
R2.4, R2.5, R3; CIP–010–4 (Cyber Security—
Configuration Change Management and
Vulnerability Assessments) Requirement R1.6; CIP–
013–2 (Cyber Security—Supply Chain Risk
Management).
E:\FR\FM\23DEN1.SGM
23DEN1
Federal Register / Vol. 87, No. 246 / Friday, December 23, 2022 / Notices
TKELLEY on DSK125TN23PROD with NOTICE
challenges or enhance effectiveness
moving forward?
5. Based on the current and evolving
threat landscape, would the currently
effective SCRM Reliability Standards
benefit from additional mandatory
security control requirements and how
would these additional controls
improve the security of the Bulk-Power
System?
6. Are there currently effective SCRM
criteria or standards that manufacturers
must adhere to in foreign countries that
may be prudent to adopt in the U.S.?
III. The U.S. Department of Energy’s
Energy Cyber Sense Program
Through the Energy Cyber Sense
Program, DOE will provide a
comprehensive approach to securing the
nation’s critical energy infrastructure
and supply chains from cyber threats
with this voluntary program. The
Energy Cyber Sense Program will build
upon direction in Section 40122 of the
Bipartisan Infrastructure Law, as well as
multiple requests from industry,
leveraging existing programs and
technologies, while also initiating new
efforts. Through Energy Cyber Sense,
DOE aims to work with manufacturers
and asset owners to discover, mitigate,
and engineer out cyber vulnerabilities in
digital components in the Energy Sector
Industrial Base critical supply chains.
This program will provide a better
understanding of the impacts and
dependencies of software and systems
used in the energy sector; illuminate the
digital provenance of subcomponents in
energy systems, hardware, and software;
apply best-in-class testing to discover
and address common mode
vulnerabilities; and provide education
and awareness, across the sector and the
broader supply chain community to
optimize management of supply chain
risks. This panel discussed specific
supply chain risks that Energy Cyber
Sense will address, as well as some of
the programs and technologies DOE will
bring to bear under the program to
address the risks.
Please address the following
questions:
1. How are emerging orders,
standards, and process guidance, such
as Executive Order 14017, Executive
Order 14028, NIST Special Publication
800–161r1, ISA 62443, Reliability
Standard CIP–013–2, and others,
changing how we assess our digital
supply chain?
2. Given the dependence of OT on
application-specific hardware, how
could the inclusion and linkage of
Hardware Bill of Materials (HBOMs)
with Software Bill of Materials (SBOMs)
increase our ability to accurately and
VerDate Sep<11>2014
20:36 Dec 22, 2022
Jkt 259001
effectively assess and mitigate supply
chain risk? To what degree is this
inclusion and linkage of HBOMs with
SBOMs taking place today and what
steps should be taken to fill any
remaining gaps?
3. Given that much of the critical
technology used in the energy sector is
considered legacy technology, how can
manufacturers, vendors, asset owners
and operators, aided by the federal
government, national laboratories, and
other organizations, manage the supply
chain risk from legacy technology? How
can this risk management be
coordinated with newer technologies
that are more likely to receive SBOMs,
HBOMs, and attestations?
4. Where does testing, for example
Cyber Testing for Resilient Industrial
Control Systems (CyTRICS) and thirdparty testing, fit in the universe of
‘‘rigorous and predictable mechanisms
for ensuring that products function
securely, and as intended?’’ 2
5. More than ever, developers are
building applications on open-source
software libraries. How can developers
address the risks inherent with opensource software and how can asset
owners work with vendors to validate
that appropriate open-source risk
management measures have been taken?
6. U.S. energy systems have
significant dependencies on hardware
components, including integrated
circuits and semiconductors, most of
which are manufactured outside of the
US. What tools and technologies are
needed to understand the provenance of
hardware components used in U.S.
energy systems and the risks from
foreign manufacture? How will the
newly passed CHIPS and Science Act
change the risk landscape? What is
needed in terms of regulation,
standards, and other guidance to
strengthen the security of the hardware
component supply chain from cyber and
other risks?
IV. Enhancing the Supply Chain
Security Posture of the Bulk-Power
System
This panel discussed forward-looking
initiatives that can be used to improve
the supply chain security posture of the
Bulk-Power System. These initiatives
could include vendor accreditation
programs, product and service
2 See Exec. Order No. 14028, 86 FR 26633, 26646
(May 12, 2021) (The Executive Order declared that
the security of software used by the Federal
Government is ‘‘vital to the Federal Government’s
ability to perform its critical functions.’’ The
Executive Order further cited a ‘‘pressing need to
implement more rigorous and predictable
mechanisms for ensuring that products function
securely, and as intended.’’)
PO 00000
Frm 00043
Fmt 4703
Sfmt 4703
78955
verification, improved internal supply
chain security capability, third party
services, and private and public
partnerships.
Vendor accreditation can be
established in various ways. One of the
more prominent ways is currently being
explored by the North American
Transmission Forum through its Supply
Chain Security Assessment model and
the associated questionnaire.3 The panel
also explored certain programs and
practices used by utilities to verify the
authenticity and effectiveness of
products and services. Internal supply
chain security capabilities include
hiring people with the appropriate
background and knowledge, while also
developing relevant skills internally,
through training on broad supply chain
topics and applying them to the specific
needs of the organization. Finally, this
panel addressed private and public
partnerships on supply chain security
and how they can facilitate timely
access to information that will help
better identify current and future supply
chain threats to the Bulk-Power System
and best practices to address those risks.
Please address the following
questions:
1. What vendor accreditation
programs currently exist or are in
development? How can entities vet a
vendor in the absence of a vendor
accreditation program?
2. What are the challenges, benefits,
and risks associated with utilizing thirdparty services for maintaining a supply
chain risk management program?
3. What are the best practices and
other guidance for security evaluation of
vendors?
4. What programs and practices are
currently in use to ensure product and
service integrity?
5. What processes are used to test
products prior to implementation?
6. What is the right balance between
vendor and product security and cost?
Is there a point of diminishing returns?
7. What are effective strategies for
recruiting personnel with the
appropriate background and SCRM
skills to strengthen internal security
practices? How do you provide the
training necessary to further develop the
skills specific to your unique
organizational challenges?
8. What are the best ways to
meaningfully assimilate SBOM
information and what subsequent
analyses can be done to strengthen
internal security practices?
3 North American Transmission Forum, Supply
Chain Cyber Security Industry Coordination,
https://www.natf.net/industry-initiatives/supplychain-industry-coordination.
E:\FR\FM\23DEN1.SGM
23DEN1
78956
Federal Register / Vol. 87, No. 246 / Friday, December 23, 2022 / Notices
9. How can the industry keep
informed of the latest supply chain
compromises? How do entities currently
respond to these compromises to keep
their systems secure? Are there ways to
improve these responses? What actions
can government take, both formal
regulatory actions and coordination, to
help keep industry informed of supply
chain compromises and to facilitate
effective responses?
10. What key risk factors do entities
need to consider prior to leveraging
third party services and how should
those risk factors be balanced with an
entity’s organizational policy? What
SCRM controls do you have in place to
ensure your systems and products have
a reduced risk of compromise? Please
discuss any challenges that you have
experienced as well as successes.
11. How should government and
industry prioritize and coordinate
federal cross-agency and private sector
collaboration and activities regarding
SCRM?
[FR Doc. 2022–27965 Filed 12–22–22; 8:45 am]
BILLING CODE 6717–01–P
DEPARTMENT OF ENERGY
Federal Energy Regulatory
Commission
[Docket No. CD23–4–000]
Town of Carbondale, Colorado; Notice
of Preliminary Determination of a
Qualifying Conduit Hydropower
Facility and Soliciting Comments and
Motions To Intervene
On December 15, 2022, the Town of
Carbondale, Colorado, filed a notice of
intent to construct a qualifying conduit
hydropower facility, pursuant to section
30 of the Federal Power Act (FPA). The
proposed Town of Carbondale Nettle
Creek Water Distribution Pump Back
Hydro Project would have an installed
capacity of 7.6 kilowatts (kW), and
would be located along a pipeline
within the applicant’s municipal water
supply system near the Town of
Carbondale, Pitkin County, Colorado.
Applicant Contact: Mark O’Meara,
Utility Director, Town of Carbondale,
511 Colorado Avenue, Carbondale, CO
81623, 970–963–3140, momeara@
carbondaleco.net.
FERC Contact: Christopher Chaney,
202–502–6778, christopher.chaney@
ferc.gov.
Qualifying Conduit Hydropower
Facility Description: The project would
consist of: (1) a 7.6-kW pump as turbine
generating unit to be installed within an
existing vault, (2) intake and discharge
pipes connecting to the existing water
supply pipeline, and (3) appurtenant
facilities. The proposed project would
have an estimated annual generation of
approximately 66,500 kilowatt-hours.
A qualifying conduit hydropower
facility is one that is determined or
deemed to meet all the criteria shown in
the table below.
TABLE 1—CRITERIA FOR QUALIFYING CONDUIT HYDROPOWER FACILITY
Statutory provision
Description
Satisfies
(Y/N)
FPA 30(a)(3)(A) ........................................
The conduit the facility uses is a tunnel, canal, pipeline, aqueduct, flume, ditch, or
similar manmade water conveyance that is operated for the distribution of water
for agricultural, municipal, or industrial consumption and not primarily for the generation of electricity.
The facility is constructed, operated, or maintained for the generation of electric
power and uses for such generation only the hydroelectric potential of a non-federally owned conduit.
The facility has an installed capacity that does not exceed 40 megawatts ................
On or before August 9, 2013, the facility is not licensed, or exempted from the licensing requirements of Part I of the FPA.
Y
FPA 30(a)(3)(C)(i) .....................................
TKELLEY on DSK125TN23PROD with NOTICE
FPA 30(a)(3)(C)(ii) ....................................
FPA 30(a)(3)(C)(iii) ...................................
Preliminary Determination: The
proposed Town of Carbondale Nettle
Creek Water Distribution Pump Back
Hydro Project will not alter the primary
purpose of the conduit, which is for
municipal water supply. Therefore,
based upon the above criteria,
Commission staff preliminarily
determines that the operation of the
project described above satisfies the
requirements for a qualifying conduit
hydropower facility, which is not
required to be licensed or exempted
from licensing.
Comments and Motions To Intervene:
Deadline for filing comments contesting
whether the facility meets the qualifying
criteria is 30 days from the issuance
date of this notice. Deadline for filing
motions to intervene is 30 days from the
issuance date of this notice.
Anyone may submit comments or a
motion to intervene in accordance with
the requirements of Rules of Practice
and Procedure, 18 CFR 385.210 and
VerDate Sep<11>2014
20:36 Dec 22, 2022
Jkt 259001
385.214. Any motions to intervene must
be received on or before the specified
deadline date for the particular
proceeding.
Filing and Service of Responsive
Documents: All filings must (1) bear in
all capital letters the ‘‘COMMENTS
CONTESTING QUALIFICATION FOR A
CONDUIT HYDROPOWER FACILITY’’
or ‘‘MOTION TO INTERVENE,’’ as
applicable; (2) state in the heading the
name of the applicant and the project
number of the application to which the
filing responds; (3) state the name,
address, and telephone number of the
person filing; and (4) otherwise comply
with the requirements of sections
385.2001 through 385.2005 of the
Commission’s regulations.1 All
comments contesting Commission staff’s
preliminary determination that the
facility meets the qualifying criteria
must set forth their evidentiary basis.
1 18
PO 00000
CFR 385.2001–2005 (2021).
Frm 00044
Fmt 4703
Sfmt 4703
Y
Y
Y
The Commission strongly encourages
electronic filing. Please file motions to
intervene and comments using the
Commission’s eFiling system at https://
www.ferc.gov/docs-filing/efiling.asp.
Commenters can submit brief comments
up to 6,000 characters, without prior
registration, using the eComment system
at https://www.ferc.gov/docs-filing/
ecomment.asp. You must include your
name and contact information at the end
of your comments. For assistance,
please contact FERC Online Support at
FERCOnlineSupport@ferc.gov, (866)
208–3676 (toll free), or (202) 502–8659
(TTY). In lieu of electronic filing, you
may send a paper copy. Submissions
sent via the U.S. Postal Service must be
addressed to: Kimberly D. Bose,
Secretary, Federal Energy Regulatory
Commission, 888 First Street NE, Room
1A, Washington, DC 20426.
Submissions sent via any other carrier
must be addressed to: Kimberly D. Bose,
Secretary, Federal Energy Regulatory
E:\FR\FM\23DEN1.SGM
23DEN1
Agencies
[Federal Register Volume 87, Number 246 (Friday, December 23, 2022)]
[Notices]
[Pages 78954-78956]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2022-27965]
[[Page 78954]]
-----------------------------------------------------------------------
DEPARTMENT OF ENERGY
Federal Energy Regulatory Commission
[Docket No. AD22-12-000]
Joint FERC-DOE Supply Chain Risk Management Technical Conference;
Notice Inviting Post-Technical Conference Comments
On Wednesday, December 7, 2022, the Federal Energy Regulatory
Commission (Commission) and the U.S. Department of Energy (DOE)
convened a Joint Supply Chain Risk Management Technical Conference to
discuss supply chain security challenges related to the Bulk-Power
System, ongoing supply chain-related activities, and potential measures
to secure the supply chain for the grid's hardware, software, computer,
and networking equipment.
All interested persons are invited to file post-technical
conference comments to address issues raised during the technical
conference identified in the Supplemental Notice of Technical
Conference issued on December 6, 2022. For reference, the questions
included in the Supplemental Notice are included below. Commenters need
not answer all of the questions, but are encouraged to organize
responses using the numbering and order in the below questions.
Commenters are also invited to reference material previously filed in
this docket but are encouraged to avoid repetition or replication of
their previous comments. Comments must be submitted on or before 60
days from the date of this Notice.
Comments, identified by docket number, may be filed electronically
or paper-filed. Electronic filing through https://www.ferc.gov is
preferred. Documents must be filed in acceptable native applications
and print-to-PDF, but not in scanned or picture format. Instructions
are available on the Commission's website: https://www.ferc.gov/docs-filing/efiling.asp.
Although the Commission strongly encourages electronic filing,
documents may also be paper-filed. To paper-file, submissions sent via
the U.S. Postal Service must be addressed to: Federal Energy Regulatory
Commission, Office of the Secretary, 888 First Street NE, Washington,
DC 20426. Submissions sent via any other carrier must be addressed to:
Federal Energy Regulatory Commission, Office of the Secretary, 12225
Wilkins Avenue, Rockville, Maryland 20852.
For more information about this Notice, please contact:
Simon Slobodnik (Technical Information) Office of Energy Reliability,
(202) 502-6707, [email protected]
Alan J. Rukin (Legal Information) Office of General Counsel, (202) 502-
8502, [email protected]
Dated: December 19, 2022.
Debbie-Anne A. Reese,
Deputy Secretary.
Post Technical Conference Questions
I. Supply Chain Risks Facing the Bulk-Power System
The U.S. energy sector procures products and services from a
globally distributed, highly complex, and increasingly interconnected
set of supply chains. Information Technology (IT) and Operational
Technology (OT) systems enable increased interconnectivity, process
automation, and remote control. As a result, supply chain risks will
continue to evolve and likely increase. This panel discussed the state
of supply chain risks from a national and geopolitical perspective.
Specifically, the panel explored current supply chain risks to the
security of grid's hardware, software, computer, and networking
equipment and how well-resourced campaigns perpetrated by nation
states, such as the SolarWinds incident, affect supply chain risk for
the electric sector. Panelists discussed the origins of these risks,
their pervasiveness, the possible impacts they could have on Bulk-Power
System reliability, and approaches to mitigating them. The panelists
also discussed challenges associated with supply chain visibility and
covert embedded spyware or other compromising software or hardware in
suppliers' products, parts, or services.
Please address the following questions:
1. Describe the types of challenges and risks associated with
globally distributed, highly complex, and increasingly interconnected
supply chains.
2. Describe the difficulties associated with supply chain
visibility and how origins of products or components may be obscured.
3. How are foreign-supplied Bulk-Power System components being
manipulated and is there a particular phase in the product lifecycle
where the product is manipulated for nefarious intent?
4. How are these supply chain challenges and risks currently being
managed?
5. How has the current geopolitical landscape impacted the energy
sector's ability to manage supply chain challenges and risks?
6. How can Sector Risk Management Agencies and Regulators promote
and/or incentivize supply chain transparency at the earlier stages of
product development and manufacturing?
7. Discuss the pathways (e.g., voluntary best practices and
guidelines, mandatory standards) that together could address the
current supply chain challenges and risks?
8. What actions can government take, both formal regulatory actions
and coordination, to help identify and mitigate risks from the global
supply chain for the energy sector?
II. Current Supply Chain Risk Management (SCRM) Reliability Standards,
Implementation Challenges, Gaps, and Opportunities for Improvement
It has now been more than six years since the Commission directed
the development of mandatory Reliability Standards to address supply
chain risks, and more than two years since the first set of those
tandards became effective.\1\ As discussed in Panel 1, supply chain
risks have continued to grow in that time. In light of that evolving
threat, panelists discussed the existing SCRM Reliability Standards,
including: (1) their effectiveness in securing the Bulk-Power System;
(2) lessons learned from implementation of the current SCRM Reliability
Standards; and (3) possible gaps in the currently effective SCRM
Reliability Standards. This panel provided an opportunity to discuss
any Reliability Standards in development, and how these new standards
will help enhance security and help address some of the emerging supply
chain threats.
---------------------------------------------------------------------------
\1\ The SCRM Reliability Standards include: Reliability
Standards CIP-005-7 (Cyber Security--Electronic Security
Perimeter(s)), Requirements R2.4, R2.5, R3; CIP-010-4 (Cyber
Security--Configuration Change Management and Vulnerability
Assessments) Requirement R1.6; CIP-013-2 (Cyber Security--Supply
Chain Risk Management).
---------------------------------------------------------------------------
Please address the following questions:
1. Are the currently effective SCRM Reliability Standards
sufficient to successfully ensure Bulk-Power System reliability and
security in light of existing and emerging risks?
2. What requirements in the SCRM Reliability Standards present
implementation challenges for registered entities and for vendors?
3. How are implementation challenges being addressed for utilities
and for vendors?
4. Are there alternative methods for implementing the SCRM
Reliability Standards that could eliminate
[[Page 78955]]
challenges or enhance effectiveness moving forward?
5. Based on the current and evolving threat landscape, would the
currently effective SCRM Reliability Standards benefit from additional
mandatory security control requirements and how would these additional
controls improve the security of the Bulk-Power System?
6. Are there currently effective SCRM criteria or standards that
manufacturers must adhere to in foreign countries that may be prudent
to adopt in the U.S.?
III. The U.S. Department of Energy's Energy Cyber Sense Program
Through the Energy Cyber Sense Program, DOE will provide a
comprehensive approach to securing the nation's critical energy
infrastructure and supply chains from cyber threats with this voluntary
program. The Energy Cyber Sense Program will build upon direction in
Section 40122 of the Bipartisan Infrastructure Law, as well as multiple
requests from industry, leveraging existing programs and technologies,
while also initiating new efforts. Through Energy Cyber Sense, DOE aims
to work with manufacturers and asset owners to discover, mitigate, and
engineer out cyber vulnerabilities in digital components in the Energy
Sector Industrial Base critical supply chains. This program will
provide a better understanding of the impacts and dependencies of
software and systems used in the energy sector; illuminate the digital
provenance of subcomponents in energy systems, hardware, and software;
apply best-in-class testing to discover and address common mode
vulnerabilities; and provide education and awareness, across the sector
and the broader supply chain community to optimize management of supply
chain risks. This panel discussed specific supply chain risks that
Energy Cyber Sense will address, as well as some of the programs and
technologies DOE will bring to bear under the program to address the
risks.
Please address the following questions:
1. How are emerging orders, standards, and process guidance, such
as Executive Order 14017, Executive Order 14028, NIST Special
Publication 800-161r1, ISA 62443, Reliability Standard CIP-013-2, and
others, changing how we assess our digital supply chain?
2. Given the dependence of OT on application-specific hardware, how
could the inclusion and linkage of Hardware Bill of Materials (HBOMs)
with Software Bill of Materials (SBOMs) increase our ability to
accurately and effectively assess and mitigate supply chain risk? To
what degree is this inclusion and linkage of HBOMs with SBOMs taking
place today and what steps should be taken to fill any remaining gaps?
3. Given that much of the critical technology used in the energy
sector is considered legacy technology, how can manufacturers, vendors,
asset owners and operators, aided by the federal government, national
laboratories, and other organizations, manage the supply chain risk
from legacy technology? How can this risk management be coordinated
with newer technologies that are more likely to receive SBOMs, HBOMs,
and attestations?
4. Where does testing, for example Cyber Testing for Resilient
Industrial Control Systems (CyTRICS) and third-party testing, fit in
the universe of ``rigorous and predictable mechanisms for ensuring that
products function securely, and as intended?'' \2\
---------------------------------------------------------------------------
\2\ See Exec. Order No. 14028, 86 FR 26633, 26646 (May 12, 2021)
(The Executive Order declared that the security of software used by
the Federal Government is ``vital to the Federal Government's
ability to perform its critical functions.'' The Executive Order
further cited a ``pressing need to implement more rigorous and
predictable mechanisms for ensuring that products function securely,
and as intended.'')
---------------------------------------------------------------------------
5. More than ever, developers are building applications on open-
source software libraries. How can developers address the risks
inherent with open-source software and how can asset owners work with
vendors to validate that appropriate open-source risk management
measures have been taken?
6. U.S. energy systems have significant dependencies on hardware
components, including integrated circuits and semiconductors, most of
which are manufactured outside of the US. What tools and technologies
are needed to understand the provenance of hardware components used in
U.S. energy systems and the risks from foreign manufacture? How will
the newly passed CHIPS and Science Act change the risk landscape? What
is needed in terms of regulation, standards, and other guidance to
strengthen the security of the hardware component supply chain from
cyber and other risks?
IV. Enhancing the Supply Chain Security Posture of the Bulk-Power
System
This panel discussed forward-looking initiatives that can be used
to improve the supply chain security posture of the Bulk-Power System.
These initiatives could include vendor accreditation programs, product
and service verification, improved internal supply chain security
capability, third party services, and private and public partnerships.
Vendor accreditation can be established in various ways. One of the
more prominent ways is currently being explored by the North American
Transmission Forum through its Supply Chain Security Assessment model
and the associated questionnaire.\3\ The panel also explored certain
programs and practices used by utilities to verify the authenticity and
effectiveness of products and services. Internal supply chain security
capabilities include hiring people with the appropriate background and
knowledge, while also developing relevant skills internally, through
training on broad supply chain topics and applying them to the specific
needs of the organization. Finally, this panel addressed private and
public partnerships on supply chain security and how they can
facilitate timely access to information that will help better identify
current and future supply chain threats to the Bulk-Power System and
best practices to address those risks.
---------------------------------------------------------------------------
\3\ North American Transmission Forum, Supply Chain Cyber
Security Industry Coordination, https://www.natf.net/industry-initiatives/supply-chain-industry-coordination.
---------------------------------------------------------------------------
Please address the following questions:
1. What vendor accreditation programs currently exist or are in
development? How can entities vet a vendor in the absence of a vendor
accreditation program?
2. What are the challenges, benefits, and risks associated with
utilizing third-party services for maintaining a supply chain risk
management program?
3. What are the best practices and other guidance for security
evaluation of vendors?
4. What programs and practices are currently in use to ensure
product and service integrity?
5. What processes are used to test products prior to
implementation?
6. What is the right balance between vendor and product security
and cost? Is there a point of diminishing returns?
7. What are effective strategies for recruiting personnel with the
appropriate background and SCRM skills to strengthen internal security
practices? How do you provide the training necessary to further develop
the skills specific to your unique organizational challenges?
8. What are the best ways to meaningfully assimilate SBOM
information and what subsequent analyses can be done to strengthen
internal security practices?
[[Page 78956]]
9. How can the industry keep informed of the latest supply chain
compromises? How do entities currently respond to these compromises to
keep their systems secure? Are there ways to improve these responses?
What actions can government take, both formal regulatory actions and
coordination, to help keep industry informed of supply chain
compromises and to facilitate effective responses?
10. What key risk factors do entities need to consider prior to
leveraging third party services and how should those risk factors be
balanced with an entity's organizational policy? What SCRM controls do
you have in place to ensure your systems and products have a reduced
risk of compromise? Please discuss any challenges that you have
experienced as well as successes.
11. How should government and industry prioritize and coordinate
federal cross-agency and private sector collaboration and activities
regarding SCRM?
[FR Doc. 2022-27965 Filed 12-22-22; 8:45 am]
BILLING CODE 6717-01-P