Physical Security Technical Conference; Notice Inviting Post-Technical Conference Comments, 58260-58262 [2023-18336]
Download as PDF
ddrumheller on DSK120RN23PROD with NOTICES1
58260
Federal Register / Vol. 88, No. 164 / Friday, August 25, 2023 / Notices
Applicants: AEP Texas Inc.
Description: § 205(d) Rate Filing:
AEPTX–SMT McAllen II Generation
Interconnection Agreement to be
effective 7/31/2023.
Filed Date: 8/21/23.
Accession Number: 20230821–5136.
Comment Date: 5 p.m. ET 9/11/23.
Docket Numbers: ER23–2677–000.
Applicants: PJM Interconnection,
L.L.C.
Description: § 205(d) Rate Filing:
Amendment to ISA/CSA, Service
Agreement Nos. 5852/5982; Queue No.
AC2–079 to be effective 10/21/2023.
Filed Date: 8/21/23.
Accession Number: 20230821–5138.
Comment Date: 5 p.m. ET 9/11/23.
Docket Numbers: ER23–2678–000.
Applicants: PJM Interconnection,
L.L.C.
Description: § 205(d) Rate Filing:
Original ISA, Service Agreement No.
7041; Queue No. AE2–092 to be
effective 7/20/2023.
Filed Date: 8/21/23.
Accession Number: 20230821–5150.
Comment Date: 5 p.m. ET 9/11/23.
The filings are accessible in the
Commission’s eLibrary system (https://
elibrary.ferc.gov/idmws/search/
fercgensearch.asp) by querying the
docket number.
Any person desiring to intervene, to
protest, or to answer a complaint in any
of the above proceedings must file in
accordance with Rules 211, 214, or 206
of the Commission’s Regulations (18
CFR 385.211, 385.214, or 385.206) on or
before 5:00 p.m. Eastern time on the
specified comment date. Protests may be
considered, but intervention is
necessary to become a party to the
proceeding.
eFiling is encouraged. More detailed
information relating to filing
requirements, interventions, protests,
service, and qualifying facilities filings
can be found at: https://www.ferc.gov/
docs-filing/efiling/filing-req.pdf. For
other information, call (866) 208–3676
(toll free). For TTY, call (202) 502–8659.
The Commission’s Office of Public
Participation (OPP) supports meaningful
public engagement and participation in
Commission proceedings. OPP can help
members of the public, including
landowners, environmental justice
communities, Tribal members and
others, access publicly available
information and navigate Commission
processes.
For public inquiries and assistance
with making filings such as
interventions, comments, or requests for
rehearing, the public is encouraged to
contact OPP at (202) 502–6595 or OPP@
ferc.gov.
VerDate Sep<11>2014
18:23 Aug 24, 2023
Jkt 259001
Dated: August 21, 2023.
Debbie-Anne A. Reese,
Deputy Secretary.
[FR Doc. 2023–18333 Filed 8–24–23; 8:45 am]
BILLING CODE 6717–01–P
DEPARTMENT OF ENERGY
Federal Energy Regulatory
Commission
[Project No. 10489–020]
City of River Falls Municipal Utilities;
Notice of Availability of Environmental
Assessment
In accordance with the National
Environmental Policy Act of 1969 and
the Federal Energy Regulatory
Commission’s (Commission)
regulations, 18 CFR part 380, the Office
of Energy Projects has reviewed the
application for subsequent license to
continue to operate and maintain the
River Falls Hydroelectric Project
(project). The project is located on the
Kinnickinnic River, in the City of River
Falls (City), Pierce County, Wisconsin.
Commission staff has prepared an
Environmental Assessment (EA) for the
project.
The EA contains the staff’s analysis of
the potential environmental impacts of
the project and concludes that licensing
the project, with appropriate
environmental protective measures,
would not constitute a major federal
action that would significantly affect the
quality of the human environment.
The Commission provides all
interested persons with an opportunity
to view and/or print the EA via the
internet through the Commission’s
Home Page (https://www.ferc.gov/), using
the ‘‘eLibrary’’ link. Enter the docket
number, excluding the last three digits
in the docket number field, to access the
document. For assistance, contact FERC
Online Support at
FERCOnlineSupport@ferc.gov, or tollfree at (866) 208–3676, or for TTY, (202)
502–8659.
You may also register online at
https://ferconline.ferc.gov/FERCOnline.
aspx to be notified via email of new
filings and issuances related to this or
other pending projects. For assistance,
contact FERC Online Support.
Any comments should be filed within
45 days from the date of this notice.
The Commission strongly encourages
electronic filing. Please file comments
using the Commission’s eFiling system
at https://www.ferc.gov/docs-filing/
efiling.asp. Commenters can submit
brief comments up to 6,000 characters,
without prior registration, using the
eComment system at https://
PO 00000
Frm 00027
Fmt 4703
Sfmt 4703
www.ferc.gov/docs-filing/
ecomment.asp. You must include your
name and contact information at the end
of your comments. For assistance,
please contact FERC Online Support. In
lieu of electronic filing, you may submit
a paper copy. Submissions sent via the
U.S. Postal Service must be addressed
to: Kimberly D. Bose, Secretary, Federal
Energy Regulatory Commission, 888
First Street NE, Room 1A, Washington,
DC 20426. Submissions sent via any
other carrier must be addressed to:
Kimberly D. Bose, Secretary, Federal
Energy Regulatory Commission, 12225
Wilkins Avenue, Rockville, Maryland
20852. The first page of any filing
should include docket number P–
10489–020.
For further information, contact
Michael Davis at 202–502–8339 or
michael.davis@ferc.gov.
Dated: August 21, 2023.
Kimberly D. Bose,
Secretary.
[FR Doc. 2023–18392 Filed 8–24–23; 8:45 am]
BILLING CODE 6717–01–P
DEPARTMENT OF ENERGY
Federal Energy Regulatory
Commission
[Docket No. RD23–2–000]
Physical Security Technical
Conference; Notice Inviting PostTechnical Conference Comments
On Thursday, August 10, 2023, the
Federal Energy Regulatory Commission
(Commission) and the North American
Electric Reliability Corporation (NERC)
convened a Physical Security Technical
Conference to discuss physical security
of the Bulk-Power System, including the
adequacy of existing physical security
controls, challenges, and solutions.
All interested persons are invited to
file post-technical conference comments
to address issues raised during the
technical conference identified in the
Final Notice of Joint Technical
Conference issued on August 3, 2022.
For reference, the questions included in
the Final Notice are included below,
and supplemental questions appear in
italics. Commenters need not answer all
of the questions but are encouraged to
organize responses using the numbering
and order in the below questions.
Commenters are also invited to
reference material previously filed in
this docket but are encouraged to avoid
repetition or replication of their
previous comments. Comments must be
submitted on or before 30 days from the
date of this Notice.
E:\FR\FM\25AUN1.SGM
25AUN1
Federal Register / Vol. 88, No. 164 / Friday, August 25, 2023 / Notices
Comments, identified by docket
number, may be filed electronically or
paper-filed. Electronic filing through
https://www.ferc.gov is preferred.
Documents must be filed in acceptable
native applications and print-to-PDF,
but not in scanned or picture format.
Instructions are available on the
Commission’s website: https://
www.ferc.gov/docs-filing/efiling.asp.
Although the Commission strongly
encourages electronic filing, documents
may also be paper-filed. To paper-file,
submissions sent via the U.S. Postal
Service must be addressed to: Federal
Energy Regulatory Commission, Office
of the Secretary, 888 First Street NE,
Washington, DC 20426. Submissions
sent via any other carrier must be
addressed to: Federal Energy Regulatory
Commission, Office of the Secretary,
12225 Wilkins Avenue, Rockville,
Maryland 20852.
For more information about this
Notice, please contact:
Terrance Clingan (Technical
Information), Office of Energy
Reliability, (202) 502–8823,
Terrance.Clingan@ferc.gov
Leigh Anne Faugust (Legal Information),
Office of General Counsel, (202) 502–
6396, Leigh.Faugust@ferc.gov
Dated: August 21, 2023.
Debbie-Anne A. Reese,
Deputy Secretary.
Post Technical Conference Questions
We are seeking comments on the
topics discussed during the technical
conference held on August 10, 2023,
including responses to the questions
listed in the Final Notice issued in this
proceeding on August 3, 2023, as well
as supplemental questions developed by
Commission staff post-conference. The
questions from the agenda and the
supplemental questions are included
below.
ddrumheller on DSK120RN23PROD with NOTICES1
Panel 1: Effectiveness of Reliability
Standard CIP–014–3
This panel explored the facilities
subject to Reliability Standard CIP–014–
3. While the NERC report filed with the
Commission did not recommend
revising the applicability section of the
Standard at this time, the report
determined that this could change based
on additional information. Panelists
discussed whether the applicability
section of Reliability Standard CIP–014–
3 identifies the appropriate facilities to
mitigate physical security risks to better
assure reliable operation of the BulkPower System. Panelists also discussed
whether additional type(s) of substation
configurations should be studied to
VerDate Sep<11>2014
18:23 Aug 24, 2023
Jkt 259001
determine risks and the possible need
for required protections.
Please address the following
questions:
1. Is the applicability section of CIP–
014–3 properly determining
transmission station/substations to be
assessed for instability, uncontrolled
separation or cascading within the
Interconnection? Specifically, are the
correct facilities being assessed and
what topology or characteristics should
the applicable facilities have to be
subject to CIP–014–3? For example, are
there criteria other than those in Section
4.1.1 of CIP–014–3, such as connected
to two vs. three other station/substations
and exceeding the aggregated weighted
value of 3,000, changing the weighting
value of the table in the applicability
section, or including lower transmission
voltages?
2. Given the changing threat
landscape, are there specific
transmission station/substation
configurations that should be included
in the applicability section of CIP–014–
3, including combinations of stations/
substations to represent coordinated
attacks on multiple facilities? What
would they be and why?
3. What other assessments (e.g., a
TPL–001 planning assessment) may be
used to identify an at-risk facility or
group of facilities that should be
considered for applicability under CIP–
014–3? How stringent are those
assessments? Describe any procedural
differences between those other
assessments and the CIP–014–3 R1 Risk
Assessment. Should CIP–014–3 apply to
entities other than those transmission
owners to which 4.1.1 applies or
transmission operators to which 4.1.2
applies?
4. Should potential load loss or
generation loss be considered? If so,
why, and how would potential impact
be determined (e.g., how would
potential load loss be determined in
advance of running an assessment?)?
5. Should facilities that perform
physical security monitoring functions
that are not currently subject to CIP–
014–3 (e.g., security operation centers)
be covered by CIP–014–3 as well? If so,
what criteria should be used?
6. Are there additional studies that
could be performed—either by industry,
the ERO Enterprise, the national labs, or
others—that could be used to determine
whether there are unidentified CIP–014
‘‘critical’’ transmission stations and
transmission substations? Are there
additional studies that would help
determine whether the applicability
section of the standard requires
expansion to identify those transmission
substations/stations that if lost or
PO 00000
Frm 00028
Fmt 4703
Sfmt 4703
58261
rendered inoperable would result in
instability, uncontrolled separation or
cascading within an Interconnection.
7. How should extreme conditions be
considered when identifying ‘‘critical’’
transmission substations/stations such
as extended extreme weather events or
disasters such as wildfires that weaken
the resiliency of the Bulk-Power System?
Panel 2: Minimum Level of Physical
Protection
This panel discussed the reliability
goal to be achieved and based on that
goal, what, if any, mandatory minimum
resiliency or security protections should
be required against facility attacks, e.g.,
site hardening, ballistic protection, etc.
This panel discussed the scope of
reliability, resilience, and security
measures that are inclusive of a robust,
effective, and risk-informed approach to
reducing physical security risks. The
panel also considered whether any
minimum protections should be tiered
and discuss the appropriate criteria for
a tiered approach.
Please address the following
questions:
1. What is our reliability goal? What
are we protecting against to ensure grid
reliability beyond what is required in
the current standards?
a. What are the specific physical
security threats (both current and
emerging) to all stations/substations on
the bulk electric system?
b. As threats are continually evolving,
how can we identify those specific
threats?
c. How do threats vary across all
stations/substations on the bulk electric
system? How would defenses against
those threats vary? To what extent
should simultaneous attacks at multiple
sites be considered?
2. Do we need mandatory minimum
protections? If so, what should they be?
a. Should there be flexible criteria or
a bright line?
b. Should minimum protections be
tiered (i.e., stations/substations receive
varying levels of protection according to
their importance to the grid)? How
should importance be quantified for
these protections?
c. Should minimum protections be
based on preventing instability,
uncontrolled separation, or cascading or
preventing loss of service to customers
(e.g., as in Moore County, NC)? If
minimum protections were to be based
on something other than the instability,
uncontrolled separation, or cascading,
what burden would that have on various
registered entities? If the focus is on loss
of service, is it necessary to have state
and local jurisdictions involved to
E:\FR\FM\25AUN1.SGM
25AUN1
58262
Federal Register / Vol. 88, No. 164 / Friday, August 25, 2023 / Notices
ddrumheller on DSK120RN23PROD with NOTICES1
implement a minimum set of
protections?
d. In what areas should any minimum
protections be focused?
i. Detection?
ii. Assessment?
iii. Response?
3. To what extent would minimum
protections help mitigate the likelihood
and/or reliability impact of
simultaneous, multi-site attacks?
4. To what extent would the
placement of basic security-related data
recording devices and associated
equipment at stations/substations
(varying based on the criticality of the
stations/substations as determined by
the transmission owner) to allow for an
assessment of damage and the
collection of evidence in the event of an
attack provide any security benefit?
Such devices and equipment could
possibly provide alarms in real time to
operating centers or merely be reviewed
on demand when a singular disturbance
alarm is sent to an operating center.
5. Are there basic levels of protection
that all Bulk-Power System facilities
use, such as fencing? Would minimum
improvements to these protections, such
as adding better security requirements
to the present public safety
requirements, better deter attacks?
6. Given the increasing number and
severity of physical security threats and
perpetrated attacks:
i. Should transmission owners
annually evaluate evolving physical
threats and implement corresponding
security measures for CIP–014 critical
facilities?
ii. What criteria should be considered
in evaluating the impact of evolving
threats and appropriate protections
(e.g., criticality of load, likely duration
of outage, location of station/
substation)?
iii. How should transmission owners
prioritize security measures for facilities
that are not CIP–014 critical facilities?
For example, should transmission
owners document and implement a
tiered approach to protecting bulk
electric system (i.e., 100 kV and above)
stations and substations based on
criteria characterizing the level of
impact (high(i.e., CIP–014 critical),
medium, or low), similar to CIP–002–
5.1a?
Panel 3: Best Practices and Operational
Preparedness
This panel discussed physical
security best practices for prevention,
protection, response, and recovery. The
discussion included asset management
strategies to prepare, incident training
preparedness and response, and
research and development needs.
VerDate Sep<11>2014
18:23 Aug 24, 2023
Jkt 259001
Please address the following
questions:
1. What is the physical security threat
landscape for each of your companies?
What best practices have been
implemented to mitigate the risks and
vulnerabilities of physical attacks on
energy infrastructure?
2. What asset management and
preparedness best practices have your
member companies implemented to
prevent, protect against, respond to, and
recover from physical attacks on their
energy infrastructure?
3. What research and development
efforts are underway or needed for
understanding and mitigating physical
security risks to critical energy electrical
infrastructure?
4. What research and development
efforts, including the development of
tools, would you like to see the National
Labs undertake to assist your companies
in addressing physical threats to your
critical electrical infrastructure?
5. What do you need or would like to
see from the energy industry to improve
your ability and accuracy in addressing
physical security risks to critical energy
electrical infrastructure?
6. What best practices are in place to
accelerate electric utility situational
awareness of an incident and to involve
local jurisdiction responders?
7. What can the federal and state
regulators do to assist the energy
industry in improving their physical
security posture?
8. What training improvements can
NERC and the Regional Entities
implement to system operators to aid in
real-time identification and recovery
procedures from physical attacks?
9. What changes could be made to
improve information sharing between
the federal government and industry?
10. How do these best practices
comport with the objectives of CIP–014–
3?
Panel 4: Grid Planning To Respond to
and Recover From Physical and Cyber
Security Threats and Potential
Obstacles
This panel explored planning to
respond to and recovery from physical
and cyber security threats and potential
obstacles to developing and
implementing such plans. This
discussion focused on how best to
integrate cyber and physical security
with engineering, particularly in the
planning phase. The panel discussed
whether critical stations could be
reduced through best practices and how
to determine whether to mitigate the
risk of a critical station or protect it.
Finally, the panel considered the
implications of the changing resource
PO 00000
Frm 00029
Fmt 4703
Sfmt 9990
mix on vulnerability of the grid and its
resilience to disruptions.
Please address the following
questions:
1. How can cyber and physical
security be integrated with engineering,
particularly planning? What aspects of
cyber and physical security need to be
incorporated into the transmission
planning process?
2. What modifications could be made
to TPL–001 to bring in broader attack
focus (e.g., coordinated attack)? What
sensitivities or examined contingencies
might help identify vulnerabilities to
grid attacks?
3. Currently, if a CIP–014–3 R1
assessment deems a transmission
station/substation as ‘‘critical’’ that
station/substation must be physically
protected. Are there best practices for
reconfiguring facilities so as to reduce
the criticality of stations/substations?
4. When prioritizing resources, how
should entities determine which
‘‘critical’’ stations/substations to remove
from the list and which to protect? If the
project is extensive and may have a long
lead time to construct, to what degree
does the station/substation need to be
protected during the interim period?
5. How will the development of the
grid to accommodate the
interconnection of future renewable
generation affect the resilience of the
grid to attack? Will the presence of
future additional renewable generation
itself add to or detract from the
resilience of the grid to physical attack?
6. What are the obstacles to
developing a more resilient grid? What
strategies can be used to address these
obstacles?
a. Cost?
b. Siting?
c. Regulatory Barriers?
d. Staffing/training?
7. How can transmission owners
better work with state commissions on
physical security? For example, are
there opportunities to better work
together as part of approval processes
for projects (e.g., applications for
certificates of public convenience and
necessity)?
8. How can security protections be
better integrated into the planning,
engineering, and construction of
projects that improve the security of the
grid and overall performance and
resilience, while keeping critical energy
infrastructure information from being
inappropriately released?
[FR Doc. 2023–18336 Filed 8–24–23; 8:45 am]
BILLING CODE 6717–01–P
E:\FR\FM\25AUN1.SGM
25AUN1
Agencies
[Federal Register Volume 88, Number 164 (Friday, August 25, 2023)]
[Notices]
[Pages 58260-58262]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2023-18336]
-----------------------------------------------------------------------
DEPARTMENT OF ENERGY
Federal Energy Regulatory Commission
[Docket No. RD23-2-000]
Physical Security Technical Conference; Notice Inviting Post-
Technical Conference Comments
On Thursday, August 10, 2023, the Federal Energy Regulatory
Commission (Commission) and the North American Electric Reliability
Corporation (NERC) convened a Physical Security Technical Conference to
discuss physical security of the Bulk-Power System, including the
adequacy of existing physical security controls, challenges, and
solutions.
All interested persons are invited to file post-technical
conference comments to address issues raised during the technical
conference identified in the Final Notice of Joint Technical Conference
issued on August 3, 2022. For reference, the questions included in the
Final Notice are included below, and supplemental questions appear in
italics. Commenters need not answer all of the questions but are
encouraged to organize responses using the numbering and order in the
below questions. Commenters are also invited to reference material
previously filed in this docket but are encouraged to avoid repetition
or replication of their previous comments. Comments must be submitted
on or before 30 days from the date of this Notice.
[[Page 58261]]
Comments, identified by docket number, may be filed electronically
or paper-filed. Electronic filing through https://www.ferc.gov is
preferred. Documents must be filed in acceptable native applications
and print-to-PDF, but not in scanned or picture format. Instructions
are available on the Commission's website: https://www.ferc.gov/docs-filing/efiling.asp.
Although the Commission strongly encourages electronic filing,
documents may also be paper-filed. To paper-file, submissions sent via
the U.S. Postal Service must be addressed to: Federal Energy Regulatory
Commission, Office of the Secretary, 888 First Street NE, Washington,
DC 20426. Submissions sent via any other carrier must be addressed to:
Federal Energy Regulatory Commission, Office of the Secretary, 12225
Wilkins Avenue, Rockville, Maryland 20852.
For more information about this Notice, please contact:
Terrance Clingan (Technical Information), Office of Energy Reliability,
(202) 502-8823, [email protected]
Leigh Anne Faugust (Legal Information), Office of General Counsel,
(202) 502-6396, [email protected]
Dated: August 21, 2023.
Debbie-Anne A. Reese,
Deputy Secretary.
Post Technical Conference Questions
We are seeking comments on the topics discussed during the
technical conference held on August 10, 2023, including responses to
the questions listed in the Final Notice issued in this proceeding on
August 3, 2023, as well as supplemental questions developed by
Commission staff post-conference. The questions from the agenda and the
supplemental questions are included below.
Panel 1: Effectiveness of Reliability Standard CIP-014-3
This panel explored the facilities subject to Reliability Standard
CIP-014-3. While the NERC report filed with the Commission did not
recommend revising the applicability section of the Standard at this
time, the report determined that this could change based on additional
information. Panelists discussed whether the applicability section of
Reliability Standard CIP-014-3 identifies the appropriate facilities to
mitigate physical security risks to better assure reliable operation of
the Bulk-Power System. Panelists also discussed whether additional
type(s) of substation configurations should be studied to determine
risks and the possible need for required protections.
Please address the following questions:
1. Is the applicability section of CIP-014-3 properly determining
transmission station/substations to be assessed for instability,
uncontrolled separation or cascading within the Interconnection?
Specifically, are the correct facilities being assessed and what
topology or characteristics should the applicable facilities have to be
subject to CIP-014-3? For example, are there criteria other than those
in Section 4.1.1 of CIP-014-3, such as connected to two vs. three other
station/substations and exceeding the aggregated weighted value of
3,000, changing the weighting value of the table in the applicability
section, or including lower transmission voltages?
2. Given the changing threat landscape, are there specific
transmission station/substation configurations that should be included
in the applicability section of CIP-014-3, including combinations of
stations/substations to represent coordinated attacks on multiple
facilities? What would they be and why?
3. What other assessments (e.g., a TPL-001 planning assessment) may
be used to identify an at-risk facility or group of facilities that
should be considered for applicability under CIP-014-3? How stringent
are those assessments? Describe any procedural differences between
those other assessments and the CIP-014-3 R1 Risk Assessment. Should
CIP-014-3 apply to entities other than those transmission owners to
which 4.1.1 applies or transmission operators to which 4.1.2 applies?
4. Should potential load loss or generation loss be considered? If
so, why, and how would potential impact be determined (e.g., how would
potential load loss be determined in advance of running an
assessment?)?
5. Should facilities that perform physical security monitoring
functions that are not currently subject to CIP-014-3 (e.g., security
operation centers) be covered by CIP-014-3 as well? If so, what
criteria should be used?
6. Are there additional studies that could be performed--either by
industry, the ERO Enterprise, the national labs, or others--that could
be used to determine whether there are unidentified CIP-014
``critical'' transmission stations and transmission substations? Are
there additional studies that would help determine whether the
applicability section of the standard requires expansion to identify
those transmission substations/stations that if lost or rendered
inoperable would result in instability, uncontrolled separation or
cascading within an Interconnection.
7. How should extreme conditions be considered when identifying
``critical'' transmission substations/stations such as extended extreme
weather events or disasters such as wildfires that weaken the
resiliency of the Bulk-Power System?
Panel 2: Minimum Level of Physical Protection
This panel discussed the reliability goal to be achieved and based
on that goal, what, if any, mandatory minimum resiliency or security
protections should be required against facility attacks, e.g., site
hardening, ballistic protection, etc. This panel discussed the scope of
reliability, resilience, and security measures that are inclusive of a
robust, effective, and risk-informed approach to reducing physical
security risks. The panel also considered whether any minimum
protections should be tiered and discuss the appropriate criteria for a
tiered approach.
Please address the following questions:
1. What is our reliability goal? What are we protecting against to
ensure grid reliability beyond what is required in the current
standards?
a. What are the specific physical security threats (both current
and emerging) to all stations/substations on the bulk electric system?
b. As threats are continually evolving, how can we identify those
specific threats?
c. How do threats vary across all stations/substations on the bulk
electric system? How would defenses against those threats vary? To what
extent should simultaneous attacks at multiple sites be considered?
2. Do we need mandatory minimum protections? If so, what should
they be?
a. Should there be flexible criteria or a bright line?
b. Should minimum protections be tiered (i.e., stations/substations
receive varying levels of protection according to their importance to
the grid)? How should importance be quantified for these protections?
c. Should minimum protections be based on preventing instability,
uncontrolled separation, or cascading or preventing loss of service to
customers (e.g., as in Moore County, NC)? If minimum protections were
to be based on something other than the instability, uncontrolled
separation, or cascading, what burden would that have on various
registered entities? If the focus is on loss of service, is it
necessary to have state and local jurisdictions involved to
[[Page 58262]]
implement a minimum set of protections?
d. In what areas should any minimum protections be focused?
i. Detection?
ii. Assessment?
iii. Response?
3. To what extent would minimum protections help mitigate the
likelihood and/or reliability impact of simultaneous, multi-site
attacks?
4. To what extent would the placement of basic security-related
data recording devices and associated equipment at stations/substations
(varying based on the criticality of the stations/substations as
determined by the transmission owner) to allow for an assessment of
damage and the collection of evidence in the event of an attack provide
any security benefit? Such devices and equipment could possibly provide
alarms in real time to operating centers or merely be reviewed on
demand when a singular disturbance alarm is sent to an operating
center.
5. Are there basic levels of protection that all Bulk-Power System
facilities use, such as fencing? Would minimum improvements to these
protections, such as adding better security requirements to the present
public safety requirements, better deter attacks?
6. Given the increasing number and severity of physical security
threats and perpetrated attacks:
i. Should transmission owners annually evaluate evolving physical
threats and implement corresponding security measures for CIP-014
critical facilities?
ii. What criteria should be considered in evaluating the impact of
evolving threats and appropriate protections (e.g., criticality of
load, likely duration of outage, location of station/substation)?
iii. How should transmission owners prioritize security measures
for facilities that are not CIP-014 critical facilities? For example,
should transmission owners document and implement a tiered approach to
protecting bulk electric system (i.e., 100 kV and above) stations and
substations based on criteria characterizing the level of impact
(high(i.e., CIP-014 critical), medium, or low), similar to CIP-002-
5.1a?
Panel 3: Best Practices and Operational Preparedness
This panel discussed physical security best practices for
prevention, protection, response, and recovery. The discussion included
asset management strategies to prepare, incident training preparedness
and response, and research and development needs.
Please address the following questions:
1. What is the physical security threat landscape for each of your
companies? What best practices have been implemented to mitigate the
risks and vulnerabilities of physical attacks on energy infrastructure?
2. What asset management and preparedness best practices have your
member companies implemented to prevent, protect against, respond to,
and recover from physical attacks on their energy infrastructure?
3. What research and development efforts are underway or needed for
understanding and mitigating physical security risks to critical energy
electrical infrastructure?
4. What research and development efforts, including the development
of tools, would you like to see the National Labs undertake to assist
your companies in addressing physical threats to your critical
electrical infrastructure?
5. What do you need or would like to see from the energy industry
to improve your ability and accuracy in addressing physical security
risks to critical energy electrical infrastructure?
6. What best practices are in place to accelerate electric utility
situational awareness of an incident and to involve local jurisdiction
responders?
7. What can the federal and state regulators do to assist the
energy industry in improving their physical security posture?
8. What training improvements can NERC and the Regional Entities
implement to system operators to aid in real-time identification and
recovery procedures from physical attacks?
9. What changes could be made to improve information sharing
between the federal government and industry?
10. How do these best practices comport with the objectives of CIP-
014-3?
Panel 4: Grid Planning To Respond to and Recover From Physical and
Cyber Security Threats and Potential Obstacles
This panel explored planning to respond to and recovery from
physical and cyber security threats and potential obstacles to
developing and implementing such plans. This discussion focused on how
best to integrate cyber and physical security with engineering,
particularly in the planning phase. The panel discussed whether
critical stations could be reduced through best practices and how to
determine whether to mitigate the risk of a critical station or protect
it. Finally, the panel considered the implications of the changing
resource mix on vulnerability of the grid and its resilience to
disruptions.
Please address the following questions:
1. How can cyber and physical security be integrated with
engineering, particularly planning? What aspects of cyber and physical
security need to be incorporated into the transmission planning
process?
2. What modifications could be made to TPL-001 to bring in broader
attack focus (e.g., coordinated attack)? What sensitivities or examined
contingencies might help identify vulnerabilities to grid attacks?
3. Currently, if a CIP-014-3 R1 assessment deems a transmission
station/substation as ``critical'' that station/substation must be
physically protected. Are there best practices for reconfiguring
facilities so as to reduce the criticality of stations/substations?
4. When prioritizing resources, how should entities determine which
``critical'' stations/substations to remove from the list and which to
protect? If the project is extensive and may have a long lead time to
construct, to what degree does the station/substation need to be
protected during the interim period?
5. How will the development of the grid to accommodate the
interconnection of future renewable generation affect the resilience of
the grid to attack? Will the presence of future additional renewable
generation itself add to or detract from the resilience of the grid to
physical attack?
6. What are the obstacles to developing a more resilient grid? What
strategies can be used to address these obstacles?
a. Cost?
b. Siting?
c. Regulatory Barriers?
d. Staffing/training?
7. How can transmission owners better work with state commissions
on physical security? For example, are there opportunities to better
work together as part of approval processes for projects (e.g.,
applications for certificates of public convenience and necessity)?
8. How can security protections be better integrated into the
planning, engineering, and construction of projects that improve the
security of the grid and overall performance and resilience, while
keeping critical energy infrastructure information from being
inappropriately released?
[FR Doc. 2023-18336 Filed 8-24-23; 8:45 am]
BILLING CODE 6717-01-P