Critical Infrastructure Protection Reliability Standard CIP-015-1-Cyber Security-Internal Network Security Monitoring, 79178-79183 [2024-22231]
Download as PDF
79178
Federal Register / Vol. 89, No. 188 / Friday, September 27, 2024 / Proposed Rules
After consideration of all relevant
material presented, including the
information and recommendations
submitted by the Committee and other
available information, USDA has
determined that this proposed rule is
consistent with and will effectuate the
purposes of the Act.
A 30-day comment period is provided
to allow interested persons to respond
to this proposed rule. All written
comments timely received will be
considered before a final determination
is made on this rulemaking.
List of Subjects in 7 CFR Part 945
Marketing agreements, Potatoes,
Reporting and recordkeeping
requirements.
For the reasons set forth in the
preamble, the Agricultural Marketing
Service proposes to amend 7 CFR part
945 as follows:
PART 945—IRISH POTATOES GROWN
IN CERTAIN DESIGNATED COUNTIES
IN IDAHO, AND MALHEUR COUNTY,
OREGON
1. The authority citation for 7 CFR
part 945 continues to read as follows:
■
Authority: 7 U.S.C. 601–674.
■
2. Revise § 945.249 to read as follows:
§ 945.249
Assessment rate.
On and after August 1, 2024, an
assessment rate of $0.003 per
hundredweight is established for IdahoEastern Oregon potatoes.
Erin Morris,
Associate Administrator, Agricultural
Marketing Service.
[FR Doc. 2024–22213 Filed 9–26–24; 8:45 am]
BILLING CODE 3410–02–P
DEPARTMENT OF ENERGY
Federal Energy Regulatory
Commission
18 CFR Part 40
[Docket No. RM24–7–000]
Critical Infrastructure Protection
Reliability Standard CIP–015–1—Cyber
Security—Internal Network Security
Monitoring
Federal Energy Regulatory
Commission.
ACTION: Notice of proposed rulemaking.
lotter on DSK11XQN23PROD with PROPOSALS1
AGENCY:
The Federal Energy
Regulatory Commission (Commission)
proposes to approve proposed
Reliability Standard CIP–015–1 (Cyber
Security—Internal Network Security
SUMMARY:
VerDate Sep<11>2014
16:43 Sep 26, 2024
Jkt 262001
Monitoring), which the North American
Electric Reliability Corporation (NERC),
submitted in response to a Commission
directive. In addition, the Commission
proposes to direct that NERC develop
certain modifications to proposed
Reliability Standard CIP–015–1 to
extend internal network security
monitoring to include electronic access
control or monitoring systems and
physical access control systems outside
of the electronic security perimeter.
DATES: Comments are due November 26,
2024.
ADDRESSES: Comments, identified by
docket number, may be filed in the
following ways. Electronic filing
through https://www.ferc.gov, is
preferred.
• Electronic Filing: Documents must
be filed in acceptable native
applications and print-to-PDF, but not
in scanned or picture format.
• For those unable to file
electronically, comments may be filed
by USPS mail or by hand (including
courier) delivery.
Æ Mail via U.S. Postal Service Only:
Addressed to: Federal Energy
Regulatory Commission, Secretary of the
Commission, 888 First Street NE,
Washington, DC 20426.
Æ Hand (Including Courier) Delivery:
Deliver to: Federal Energy Regulatory
Commission, 12225 Wilkins Avenue,
Rockville, MD 20852.
The Comment Procedures Section of
this document contains more detailed
filing procedures.
FOR FURTHER INFORMATION CONTACT:
Margaret Steiner (Technical
Information), Office of Electric
Reliability, Federal Energy Regulatory
Commission, 888 First Street NE,
Washington, DC 20426, (202) 502
6704, Margaret.Steiner@ferc.gov
Hampden T. Macbeth (Legal
Information), Office of General
Counsel, Federal Energy Regulatory
Commission, 888 First Street NE,
Washington, DC 20426, (202) 502
8957, Hampden.Macbeth@ferc.gov
SUPPLEMENTARY INFORMATION:
1. Pursuant to section 215(d)(2) of the
Federal Power Act (FPA),1 the
Commission proposes to approve
proposed Critical Infrastructure
Protection (CIP) Reliability Standard
CIP–015–1 (Cyber Security—Internal
Network Security Monitoring). The
North American Electric Reliability
Corporation (NERC), the Commissioncertified Electric Reliability
Organization (ERO), submitted the
proposed Reliability Standard for
Commission approval in response to a
1 16
PO 00000
U.S.C. 824o(d)(2).
Frm 00005
Fmt 4702
Sfmt 4702
Commission directive in Order No.
887.2 In addition, pursuant to section
215(d)(5) of the FPA,3 the Commission
proposes to direct that NERC develop
further modifications to Reliability
Standard CIP–015–1, within 12 months
of the effective date of a final rule in this
proceeding, to extend Internal Network
Security Monitoring (INSM) 4 to include
electronic access control or monitoring
systems (EACMS) 5 and physical access
control systems (PACS) 6 outside of the
electronic security perimeter.
2. In Order No. 887, the Commission
directed that NERC develop new or
modified CIP Reliability Standards that
require INSM for CIP-networked
environments for all high impact bulk
electric system (BES) Cyber Systems 7
with and without external routable
connectivity 8 and medium impact BES
Cyber Systems with external routable
connectivity.9 Proposed Reliability
Standard CIP–015–1 is partly responsive
to the Commission’s directives in Order
No. 887 and advances the reliability of
the Bulk-Power System by (1)
2 Internal Network Sec. Monitoring for High &
Medium Impact Bulk Elec. Sys. Cyber Sys., Order
No. 887, 88 FR 8354 (Feb. 9, 2023), 182 FERC
¶ 61,021 (2023).
3 16 U.S.C. 824o(d)(5).
4 INSM is ‘‘a subset of network security
monitoring that is applied within a ‘trust zone,’
such as an electronic security perimeter.’’ Order No.
887, 182 FERC ¶ 61,021 at P 2.
5 EACMS are ‘‘Cyber Assets that perform
electronic access control or electronic access
monitoring of the Electronic Security Perimeter(s)
or BES Cyber Systems. This includes Intermediate
Systems.’’ NERC, Glossary of Terms Used in NERC
Reliability Standards, (July 22, 2024), https://
www.nerc.com/pa/Stand/Glossary%20of%20
Terms/Glossary_of_Terms.pdf (NERC Glossary).
6 PACS are ‘‘Cyber Assets that control, alert, or
log access to the Physical Security Perimeter(s),
exclusive of locally mounted hardware or devices
at the Physical Security Perimeter such as motion
sensors, electronic lock control mechanisms, and
badge readers.’’ Id.
7 NERC defines BES Cyber Systems as ‘‘One or
more BES Cyber Assets logically grouped by a
responsible entity to perform one or more reliability
tasks for a functional entity.’’ See NERC Glossary.
BES Cyber Systems are categorized as high,
medium, or low impact depending on the functions
of the assets housed within each system and the
risk they potentially pose to the reliable operation
of the Bulk-Power System. Reliability Standard
CIP–002–5.1a (BES Cyber System Categorization)
sets forth criteria that registered entities apply to
categorize BES Cyber Systems as high, medium, or
low impact depending on the adverse impact that
loss, compromise, or misuse of those BES Cyber
Systems could have on the reliable operation of the
BES. The impact level (i.e., high, medium, or low)
of BES Cyber Systems, in turn, determines the
applicability of security controls for BES Cyber
Systems that are contained in the remaining CIP
Reliability Standards (i.e., Reliability Standards
CIP–003–8 to CIP–013–1).
8 External routable connectivity is ‘‘[t]he ability to
access a BES Cyber System from a Cyber Asset that
is outside of its associated Electronic Security
Perimeter via a bi-directional routable protocol
connection.’’ NERC Glossary.
9 Order No. 887, 182 FERC ¶ 61,021 at P 49.
E:\FR\FM\27SEP1.SGM
27SEP1
Federal Register / Vol. 89, No. 188 / Friday, September 27, 2024 / Proposed Rules
establishing requirements for INSM for
network traffic inside an electronic
security perimeter, and (2) requiring
INSM for all high impact BES Cyber
Systems with and without external
routable connectivity and medium
impact BES Cyber Systems with
external routable connectivity to ensure
the identification of anomalous network
activity indicating an ongoing attack.10
Accordingly, we propose approving
proposed Reliability Standard CIP–015–
1.
3. Proposed Reliability Standard CIP–
015–1 is not, however, fully responsive
to the Commission’s directive to
implement INSM for the ‘‘CIPnetworked environment.’’ 11 In
particular, the proposed Standard may
not adequately defend against attacks
that circumvent network perimeterbased security controls. Attacks external
to the electronic security perimeter may
compromise systems, such as EACMS or
PACS, and then infiltrate the perimeter
as a trusted communication, thus
limiting the effectiveness of an approach
that employs INSM only within the
electronic security perimeter. The
Commission used the phrase ‘‘CIPnetworked environment’’ in Order No.
887 to be necessarily broader than the
electronic security perimeter.12
Accordingly, to address this reliability
and security gap, the Commission
proposes to direct that NERC develop
modifications to the proposed
Reliability Standard CIP–015–1 to
extend INSM to include EACMS and
PACS outside of the electronic security
perimeter.
I. Background
A. Section 215 and Mandatory
Reliability Standards
lotter on DSK11XQN23PROD with PROPOSALS1
4. Section 215 of the FPA provides
that the Commission may certify an
ERO, the purpose of which is to develop
mandatory and enforceable Reliability
Standards, subject to Commission
review and approval.13 Reliability
Standards may be enforced by the ERO,
subject to Commission oversight, or by
the Commission independently.14
Pursuant to section 215 of the FPA, the
Commission established a process to
10 NERC
Petition at 1, 13.
Order No. 887, 182 FERC ¶ 61,021 at P 1.
12 Id. P 49.
13 16 U.S.C. 824o(c).
14 Id. 824o(e).
11 See
VerDate Sep<11>2014
16:43 Sep 26, 2024
Jkt 262001
select and certify an ERO,15 and
subsequently certified NERC.16
B. Internal Network Security Monitoring
5. INSM is a subset of network
security monitoring that is applied
within a ‘‘trust zone,’’ 17 such as an
electronic security perimeter. The trust
zone applicable to INSM is the CIPnetworked environment for this notice
of proposed rulemaking (NOPR) and
Order No. 887.18 INSM enables
continuing visibility over
communications between networked
devices within a trust zone and
detection of malicious activity that has
circumvented perimeter controls.
Further, INSM facilitates the detection
of anomalous network activity
indicative of an attack in progress, thus
increasing the probability of early
detection and allowing for quicker
mitigation and recovery from an attack.
6. INSM is designed to address as
early as possible situations where
perimeter network defenses are
breached by detecting intrusions and
malicious activity within a trust zone.
INSM consists of three stages: (1)
collection; (2) detection; and (3)
analysis. Taken together, these three
stages provide the benefit of early
detection and alerting of intrusions and
malicious activity.19 INSM better
positions an entity to detect an attacker
in the early phases of an attack and
reduces the likelihood that an attacker
can gain a strong foothold, including
operational control, on the target
system. In addition to early detection
and mitigation, INSM may improve
incident response by providing higher
15 Rules Concerning Certification of the Elec.
Reliability Org.; & Procs. for the Establishment,
Approval, & Enforcement of Elec. Reliability
Standards, Order No. 672, 114 FERC ¶ 61,104, order
on reh’g, Order No. 672–A, 114 FERC ¶ 61,328
(2006); see also 18 CFR 39.4(b) (2024).
16 N. Am. Elec. Reliability Corp., 116 FERC
¶ 61,062, order on reh’g and compliance, 117 FERC
¶ 61,126 (2006), aff’d sub nom. Alcoa, Inc. v. FERC,
564 F.3d 1342 (D.C. Cir. 2009).
17 The U.S. Department of Homeland Security,
Cybersecurity and Infrastructure Security Agency
(CISA) defines trust zone as a ‘‘discrete computing
environment designated for information processing,
storage, and/or transmission that share the rigor or
robustness of the applicable security capabilities
necessary to protect the traffic transiting in and out
of a zone and/or the information within the zone.’’
CISA, Trusted Internet Connections 3.0: Reference
Architecture, 2 (July 2020), https://www.cisa.gov/
sites/default/files/publications/CISA_
TIC%203.0%20Vol.%202%20Reference%20
Architecture.pdf.
18 Order No. 887, 182 FERC ¶ 61,021, at P 2.
19 See Chris Sanders & Jason Smith, Applied
Network Security Monitoring, 9–10 (2013); see also
ISACA, Applied Collection Framework: A RiskDriven Approach to Cybersecurity Monitoring (Aug.
18, 2020), https://www.isaca.org/resources/newsand-trends/isaca-now-blog/2020/applied-collectionframework.
PO 00000
Frm 00006
Fmt 4702
Sfmt 4702
79179
quality data about the extent of an attack
internal to a trust zone. Finally, INSM
provides insight into east-west network
traffic 20 happening inside the network
perimeter, which enables a more
comprehensive picture of the extent of
an attack compared to data gathered
from the network perimeter alone.21
C. Order No. 887
7. On January 19, 2023, in Order No.
887, the Commission issued a final rule
that directed that NERC develop ‘‘new
or modified CIP Reliability Standards
requiring INSM for all high impact BES
Cyber Systems with and without
external routable connectivity and
medium impact BES Cyber Systems
with external routable connectivity to
ensure the detection of anomalous
network activity indicative of an attack
in progress.’’ 22 The Commission, noting
that INSM is ‘‘applied within a ‘trust
zone,’ such as an electronic security
perimeter,’’ stated that for the final rule
the applicable trust zone for INSM is the
CIP-networked environment.23
8. The Commission explained that the
currently effective CIP Reliability
Standards focus on preventing
unauthorized access at the electronic
security perimeter and do not require
INSM inside trusted CIP-networked
environments.24 The Commission
determined that this left a reliability gap
when vendors or individuals with
authorized access are deemed
trustworthy but could still introduce a
cybersecurity risk.25 The Commission
then concluded that requirements to
implement ISNM will ‘‘fill a gap in the
20 East-west traffic refers to the communications
among BES Cyber Systems and is the specific type
of network traffic that remains within the network
perimeter. It may refer to communication peer-topeer industrial automation and control systems
devices in a network or to activity between servers
or networks inside a data center, rather than the
data and applications that traverse networks to the
outside world. CISCO, Networking and Security in
Industrial Automation Environments Design Guide,
111 (Aug. 2020), https://www.cisco.com/c/en/us/td/
docs/solutions/Verticals/Industrial_Automation/
IA_Horizontal/DG/Industrial-AutomationDG.pdf;
The President’s National Security
Telecommunications Advisory Committee, Report
to the President on Software-Defined Networking,
E–3 (Aug. 2020), https://www.cisa.gov/sites/default/
files/publications/NSTAC%20SDN%20Report%20
%288-12-20%29.pdf.
21 CISA, CISA Analysis: FY2020 Risk and
Vulnerability Assessments (July 2021), https://
www.cisa.gov/sites/default/files/publications/FY20RVA-Analysis_508C.pdf.
22 Order No. 887, 182 FERC ¶ 61,021 at P 3.
23 Id. P 2.
24 Id. P 20.
25 Id. An attacker could move among devices
inside a trust zone and perform actions such as: (1)
escalate privileges (such as gaining administrator
account privileges through a vulnerability); (2)
move undetected inside the CIP-networked
environment; or (3) execute a virus, ransomware or
another form of unauthorized code. Id. P 19.
E:\FR\FM\27SEP1.SGM
27SEP1
79180
Federal Register / Vol. 89, No. 188 / Friday, September 27, 2024 / Proposed Rules
current suite of CIP Reliability
Standards and improve the
cybersecurity posture of the Bulk-Power
System.’’ 26
9. The Commission directed that
NERC ensure that the new or modified
CIP Reliability Standards address three
security objectives for east-west network
traffic. First, the new or modified CIP
Reliability Standards should address the
need for each responsible entity to
develop a baseline for their network
activity by analyzing for security
purposes their network traffic and data
flows. Second, the new or modified CIP
Reliability Standards should address the
need for responsible entities to monitor
and detect ‘‘unauthorized activity,
connections, devices, network
communication protocols, and
software’’ in the CIP-networked
environment. Third, the new or
modified CIP Reliability Standards
should provide responsible entities with
flexibility in determining how to best
identify anomalous activity with a high
level of confidence, so long as the
methods ensure: (1) logging of network
traffic; (2) maintaining the logs, and
other data collected, regarding network
traffic that are of ‘‘sufficient data fidelity
to draw meaningful conclusions’’ to
investigate an incident; and (3)
maintaining the integrity of the logs and
other data by employing measures that
minimize the likelihood of an attacker
removing evidence of their tactics,
techniques, and procedures.27
lotter on DSK11XQN23PROD with PROPOSALS1
D. NERC Petition and Proposed
Reliability Standard CIP–015–1
10. On June 24, 2024, NERC
submitted for Commission approval
proposed Reliability Standard CIP–015–
1 and the associated violation risk
factors and violation severity levels,
implementation plan, and effective
date.28 NERC states that proposed
Reliability Standard CIP–015–1 is
intended to advance the reliability of
26 Id. P 49 (citing NERC Comments in Response
to Notice of Proposed Rulemaking under Docket No.
RM22–3–000 at 4–5 (current CIP Standards require
‘‘malicious communications monitoring at the
Electronic Access Point on the [electronic security
perimeter], not necessarily monitoring of activity of
those who already have access to the network’’)).
The Bulk-Power System is defined in the FPA as
facilities and control systems necessary for
operating an interconnected electric energy
transmission network (or any portion thereof); and
electric energy from generating facilities needed to
maintain transmission system reliability. The term
does not include facilities used in the local
distribution of electric energy. 16 U.S.C. 824o(a)(1).
27 Order No. 887, 182 FERC ¶ 61,021 at PP 79–80.
28 NERC Petition at 2, 26–28. Proposed Reliability
Standard CIP–015–1 is not attached to this NOPR.
The proposed Reliability Standards are available on
the Commission’s eLibrary document retrieval
system in Docket No. RM24–7–000 and on the
NERC website, www.nerc.com.
VerDate Sep<11>2014
16:43 Sep 26, 2024
Jkt 262001
the Bulk-Power System by providing a
comprehensive suite of forward looking
and objective-based requirements for
INSM.29
11. NERC explains that the proposed
Reliability Standard would address the
directives in Order No. 887 by
establishing three requirements for
responsible entities to implement INSM
systems and processes. Specifically:
• Requirement R1: responsible
entities would be required to implement
process(es) to monitor, detect, and
evaluate anomalous activity in
‘‘networks protected by the Responsible
Entity’s Electronic Security
Perimeter(s)’’ of high impact BES Cyber
Systems and medium impact BES Cyber
Systems with external routable
connectivity.30
• Requirement R2: responsible
entities would be required to implement
process(es) for retaining INSM data
associated with anomalous network
activity as determined by the applicable
responsible entities.
• Requirement R3: responsible
entities would be required to implement
process(es) to protect INSM monitoring
data collected and retained in support of
Requirements R1 and R2 to guard
against the risk of unauthorized deletion
or modification.
According to NERC, Requirement R1
applies to data flows within ‘‘networks
protected by the Responsible Entity’s
Electronic Security Perimeter(s).’’ 31
NERC states that proposed Reliability
Standard CIP–015–1’s scope is
consistent with the plain language of
Order No. 887, which stated that INSM
should apply within a trust zone, ‘‘such
as an electronic security perimeter,’’ and
that the trust zone for INSM is the ‘‘CIPnetworked environment.’’ 32 NERC
states that its approach would provide
the greatest benefits to the reliability of
the Bulk-Power System by focusing
industry’s limited resources on the most
critical environment, ‘‘networks
protected by the Responsible Entity’s
Electronic Security Perimeter.’’ 33
II. Discussion
A. Proposal To Approve Proposed
Reliability Standard CIP–015–1
12. Pursuant to section 215(d)(2) of
the FPA, the Commission proposes to
approve proposed Reliability Standard
CIP–015–1 as just, reasonable, not
unduly discriminatory or preferential,
29 Id.
at 4.
Ex. A (Proposed Reliability Standard CIP–
015–1) at 6.
31 Id.
32 NERC Petition at 16 (quoting Order No. 887,
182 FERC ¶ 61,021 at P 2).
33 Id. at 14, 17.
30 Id.,
PO 00000
Frm 00007
Fmt 4702
Sfmt 4702
and in the public interest. The proposed
Reliability Standard requires
responsible entities to implement INSM
within the electronic security perimeter
for all high impact BES Cyber Systems
with and without external routable
connectivity and medium impact BES
Cyber Systems with external routable
connectivity. Consistent with the
security objectives identified in Order
No. 887, Requirement R1 of the
proposed Standard would require
responsible entities to implement INSM
by mandating the collection, detection,
analysis of and appropriate response to
anomalous activity within the electronic
security perimeter. Proposed Reliability
Standard CIP–015–1, Requirement R2
would require responsible entities to
retain INSM data related to anomalous
activity. Proposed Reliability Standard
CIP–015–1, Requirement R3 would
require responsible entities to protect
INSM data associated with anomalous
network activity.
13. Implementation of INSM within
the electronic security perimeter will
augment responsible entities’ ability to
detect anomalous or malicious activity
and provide information to assist in
determining an appropriate response
through proposed Reliability Standard
CIP–015–1, Requirements R1, R2, and
R3. The proposed Reliability Standard
improves the security posture of the
industry by providing visibility into
east-west communications absent from
previous Reliability Standards,
improving the probability of detection
for anomalous or malicious activity
within the electronic security perimeter.
14. Notwithstanding the
improvements to security made by the
proposed Standard, as discussed below,
the proposed Reliability Standard does
not fully implement the scope of
protection contemplated in Order No.
887. By restricting the implementation
of INSM to within the electronic
security perimeter, a reliability and
security gap remains by not
implementing INSM for the entire CIPnetworked environment, i.e., outside the
electronic security perimeter inclusive
of EACMS and PACS. To address this
gap, we propose to direct NERC to
develop modifications to the proposed
Reliability Standard to include EACMS
and PACS, thereby protecting the
reliability and security of all trust zones
of the CIP-networked environment. This
approach—proposing to approve a
Reliability Standard as enhancing
protections and as a separate action
under section 215(d)(5) of the FPA
proposing to direct NERC to develop
certain modifications to a Reliability
Standard to address a reliability gap—is
E:\FR\FM\27SEP1.SGM
27SEP1
Federal Register / Vol. 89, No. 188 / Friday, September 27, 2024 / Proposed Rules
consistent with Commission
precedent.34
lotter on DSK11XQN23PROD with PROPOSALS1
B. Scope of the CIP-Networked
Environment
15. NERC’s proposed application of
the term ‘‘CIP-networked environment’’
as limited to assets and systems within
the electronic security perimeter is
overly narrow. Order No. 887 used the
term ‘‘CIP-networked environment’’
purposefully to apply more broadly than
the electronic security perimeter,
specifically to include all assets and
systems to which the CIP standards
apply and may be the targets of attacks.
As explained below, NERC’s petition
does not address that reliability and
security gap because it does not require
implementation of INSM at EACMS and
PACS outside the electronic security
perimeter.
16. Excluding EACMS and PACS from
the term ‘‘CIP-networked environment’’
is inconsistent with generally accepted
approaches to cybersecurity. Under
Reliability Standard CIP–002–5.1a and
fundamental cybersecurity practices,
similar systems within a network are
grouped together to facilitate
management, control, and monitoring of
the networked environment.35 For
example, EACMS are grouped together
to allow for early detection of malicious
activity within the CIP-networked
environment and potentially protect
other grouped systems, such as BES
Cyber Systems, with which the EACMS
communicate. Thus, excluding certain
grouped systems from protections—as is
the case for EACMS and PACS in
Reliability Standard CIP–015–1—leaves
other grouped systems within the CIPnetworked environment at risk. Here,
the BES Cyber Systems would not
benefit from monitoring of east-west
(i.e., lateral) movement within the
grouping of EACMS and PACS, which
allows for early detection of anomalous
34 See e.g., N. Am. Elec. Reliability Corp., 187
FERC ¶ 61,204 (2024) (order approving Reliability
Standard EOP–012–2 because it clarified the
requirements for generator cold weather
preparedness and by making other improvements
and, in addition, directing that NERC submit
modifications to Reliability Standard EOP–012–2 to
address certain concerns); Critical Infrastructure
Prot. Reliability Standard CIP–012–1—Cyber Sec.—
Commc’ns between Control Ctrs., Order No. 866, 85
FR 7197 (Feb. 7, 2020), 170 FERC ¶ 61,031 (2020).
35 Reliability Standard CIP–002.5.1a (BES Cyber
System Categorization) (categorizing EACMS,
PACS, protected cyber assets, and BES Cyber
Systems into groups); see, e.g., Nat’l Sec. Agency,
Network Infrastructure Security Guide, 1, 3–4 (Oct.
2023), https://media.defense.gov/2022/Jun/15/
2003018261/-1/-1/0/CTR_NSA_NETWORK_
INFRASTRUCTURE_SECURITY_GUIDE_
20220615.PDF (recommending the grouping of
similar network systems as a best practice for
overall network security) (NSA Network Security
Guide).
VerDate Sep<11>2014
16:43 Sep 26, 2024
Jkt 262001
or malicious activity.36 Otherwise, for
example, a compromised EACMS
grouping could provide an attacker with
the opportunity to infiltrate other
connected groups, such as BES Cyber
Systems located within the electronic
security perimeter, as an authenticated
user or trusted communication.37
17. National Institute of Standards
and Technology (NIST) guidance states
that INSM monitoring needs to detect
‘‘[a]ny threat that is already inside of a
network [that] can move laterally and
remain undetected for days or even
months.’’ 38 According to the NIST
guidance, east-west (lateral) monitoring
(i.e., INSM) improves the probability of
detection for malicious or anomalous
activity and should not be isolated to
only the most critical trust zones.39
While the terminology of EACMS and
PACS is unique to the CIP Reliability
Standards, these statements from NIST
broadly include the concepts of EACMS
and PACS and support the need for
monitoring.
18. Further, we find NERC’s rationale
for limiting INSM to within the
electronic security perimeter
unpersuasive. First, NERC contends that
36 See CISA, Cybersecurity Advisory: CISA Red
Team Shares Key Findings to Improve Monitoring
and Hardening of Networks, 2, 14 (Feb. 2023),
https://www.cisa.gov/sites/default/files/2023-03/
aa23-059a-cisa_red_team_shares_key_findings_to_
improve_monitoring_and_hardening_of_
networks.pdf (finding that insufficient network
monitoring contributed to a CISA red team avoiding
detection and gaining access to an organization’s
network through lateral movement by leveraging
access to an Active Directory system serving as an
electronic access control system) (CISA
Cybersecurity Advisory); Nat’l Inst. of Standards
and Tech. (NIST), NIST SP 800–215 Guide to a
Secure Enterprise Network Landscape, 5 (Nov.
2022), https://doi.org/10.6028/NIST.SP.800-215
(describing the limitations of a perimeter-based
security approach as not capturing threats from
inside a network that can move laterally and remain
undetected for an extended period of time) (NIST
SP 800–215); NIST, NIST SP 800–82r3 Guide to
Operational Technology (OT) Security, 74 (Sept.
2023), https://nvlpubs.nist.gov/nistpubs/
SpecialPublications/NIST.SP.800-82r3.pdf
(recommending the analyzing of information to
differentiate between known and unknown
communication as a necessary first step in
implementing network security monitoring) (NIST
SP 800–82r3). The term INSM is used by the
Commission in Order No. 887, but the cybersecurity
industry uses the term ‘‘network security
monitoring.’’ Similarly, the CIP Standards use the
terms ‘‘EACMS’’ and ‘‘PACS,’’ which are defined by
the NERC Glossary, while NIST discusses the same
concepts but does not use the same EACMS and
PACS terminology.
37 See CISA Cybersecurity Advisory at 2–6
(describing how a CISA Red Team was able to gain
access to workstations and servers from an Active
Directory system serving as an electronic access
control system, which assisted in lateral movement
to other networks).
38 NIST SP 800–215 at 5.
39 See id. (describing east-west traffic as ‘‘largely
invisible to security teams’’ without INSM and that
a threat inside a network can move east-west and
‘‘remain undetected for days or even months’’).
PO 00000
Frm 00008
Fmt 4702
Sfmt 4702
79181
the devices supporting reliable
operation are contained within the
electronic security perimeter and thus
industry resources are most effectively
focused on data flows within the
electronic security perimeter.40 We
disagree. While the devices directly
supporting the reliable operation of the
Bulk-Power System are located within
the electronic security perimeter, attacks
that threaten reliability can still emanate
from outside the electronic security
perimeter from connected Cyber Assets,
such as EACMS.41
19. Second, NERC avers that requiring
INSM implementation outside the
electronic security perimeter could have
the unintended effect of impeding an
entity’s ability to detect and respond to
threats to their most critical systems due
to alarm and alert fatigue from large
volumes of generated data.42 Extending
INSM implementation to include
EACMS and PACS may generate large
volumes of data; 43 however, we believe
that the data can be managed and that
the security benefits of implementing
INSM outside the electronic security
perimeter outweigh the burden
associated with increased volumes of
data. Defining incident alerting
thresholds and establishing a baseline
for normal network activity can reduce
the potential for alarm and alert
fatigue.44 Restricting INSM to the assets
within the electronic security perimeter
could leave the most critical networks
vulnerable to an attack from outside the
electronic security perimeter. Assets
such as EACMS are high value targets
for an attack because if successfully
compromised, EACMS would allow an
attacker to infiltrate the perimeter as a
trusted communication.45 Further,
40 NERC
Petition at 14.
e.g., CISA Cybersecurity Advisory at 1–2
(a CISA Red Team was able to gain access to
systems adjacent to the organization’s sensitive
business systems (SBSs) by moving laterally from
workstations and servers through an Active
Directory system; Phase I of the attack ended before
the team could implement a viable plan to achieve
access to a SBS).
42 NERC Petition at 14–15 n.45.
43 See NIST SP 800–82r3 at 130 (discussing alert
‘‘noise’’ from typical network traffic that can result
from implementation of network security
monitoring).
44 See id. at 127–128 (recommending that
organizations define incident alert thresholds to
establish an efficient incident detection capability
as not all events and anomalies are malicious or
require investigation and establish alerting
thresholds on baselines of normal network traffic
and data flows to reduce false positive and nuisance
alarms).
45 See, e.g., CISA Cybersecurity Advisory at 14
(finding a CISA red team gained access to an
organization’s network due to the lack of
monitoring on endpoint management systems—
high valued assets—that can include the monitoring
system part of an EACMS).
41 See,
E:\FR\FM\27SEP1.SGM
27SEP1
79182
Federal Register / Vol. 89, No. 188 / Friday, September 27, 2024 / Proposed Rules
declining to extend INSM
implementation to EACMS and PACS
outside the electronic security perimeter
leaves a reliability gap because
responsible entities will lack visibility
into the high percentage of east-west
traffic that occurs within the CIPnetworked environment.46 Monitoring
and alerting of east-west traffic enables
quicker detection of malicious
communications, minimizing potential
harmful effects.47 Additionally, the
collected data serves as invaluable
forensic evidence in the event of an
attempted or successful compromise of
the CIP-networked environment.
20. Third, NERC asserts that requiring
INSM implementation outside the
electronic security perimeter would not
promote security and reliability inside
the CIP-networked environment or that
the cost of doing so would outweigh
associated benefits.48 We disagree.
EACMS and PACS are integral to the
effective operation of BES Cyber
Systems within the electronic security
perimeter in providing services, such as
centralized authentication,
authorization, and monitoring, and
serving as the access point to the
electronic security perimeter.49 These
assets are valued targets for an attacker
and illustrate the need for a defense-indepth strategy for cybersecurity.50
Implementing INSM outside the
electronic security perimeter provides
significant benefits in monitoring,
detecting, and collecting malicious code
or anomalous activity from attackers
moving east-west within the EACMS or
PACS network segments of the CIPnetworked environment and is a
fundamental cybersecurity practice.51
C. Proposed Directive
21. Pursuant to section 215(d)(5) of
the FPA, the Commission proposes to
direct NERC to develop modifications to
proposed Reliability Standard CIP–015–
1 that would extend INSM to include
EACMS and PACS outside the
electronic security perimeter. We also
propose directing NERC to submit the
revised Reliability Standard for
Commission approval within 12 months
of the effective date of a final rule in this
proceeding. We seek comment on all
aspects of this proposal.
III. Information Collection Statement
22. The FERC–725B information
collection requirements are subject to
review by the Office of Management and
Budget (OMB) under section 3507(d) of
the Paperwork Reduction Act of 1995.
OMB’s regulations require approval of
certain information collection
requirements imposed by agency rules.
Upon approval of a collection of
information, OMB will assign an OMB
control number and expiration date.
Respondents subject to the filing
requirements will not be penalized for
failing to respond to these collections of
information unless the collections of
information display a valid OMB
control number. The Commission
solicits comments on the need for this
information, whether the information
will have practical utility, the accuracy
of the burden estimates, ways to
enhance the quality, utility, and clarity
of the information to be collected or
retained, and any suggested methods for
minimizing respondents’ burden,
including the use of automated
information techniques.
23. The Commission bases its
paperwork burden estimates on the
additional paperwork burden presented
by the proposed revision to Reliability
Standard CIP–015–1 as this is a new
proposed Reliability Standard.
Reliability Standards are objective-based
and allow entities to choose compliance
approaches best tailored to their
systems. The NERC Compliance
Registry, as of July 2024, identifies
approximately 1,636 unique U.S.
entities that are subject to mandatory
compliance with CIP Reliability
Standards. Of this total, we estimate that
400 entities will face an increased
paperwork burden under proposed
Reliability Standard CIP–015–1. Based
on these assumptions, we estimate the
following reporting burden:
ANNUAL CHANGES PROPOSED BY THE NOPR IN DOCKET NO. RM24–7–000 52
Number of
respondents
Annual
number of
responses
per
respondent
Total
number of
responses
Average burden &
cost per
response 53
Total annual
burden hours &
total annual cost
Cost per
respondent
($)
(1)
(2)
(1) * (2) = (3)
(4)
(3) * (4) = (5)
(5) ÷ (1)
Create one or more documented process(es) (R1)
Create documentation detailing network data
feed(s) and reason (R1.1).
Create documentation of: anomalous events and
baseline used to detect anomalous events (R1.2).
Create documentation of methods to: evaluate
anomalous activity; response to detected activity;
and escalation process(es) (R1.3).
Create documentation of: data retention process(es); system configuration(s), or system-generated report(s) (R2).
Create documentation of how the collected data is
being protected (R3).
lotter on DSK11XQN23PROD with PROPOSALS1
Total burden for FERC–725B(5) under CIP–
015–1.
46 NIST states that over 75% of network traffic is
now east-west or server-to-server, i.e., traffic that is
not covered by a perimeter-based defense approach.
See NIST SP 800–215 at 5.
47 See id. at 5.
48 NERC Petition at 15–16 n.46.
49 NERC, Lessons Learned: CIP Version 5
Transition Program (Sept. 2015), https://
www.nerc.com/pa/CI/tpv5impmntnstdy/LL_
EACMS_Mixed_Trust_Authentication_Sep_10_
2015_clean.pdf.
VerDate Sep<11>2014
16:43 Sep 26, 2024
Jkt 262001
400
400
1
1
400
400
40 hrs.; $3,880 .......
60 hrs.; $5,820 .......
16,000 hrs.; $1,552,000 .....
24,000 hrs.; $2,328,000 .....
$3,880
5,820
400
1
400
60 hrs.; $5,820 .......
24,000 hrs.; $2,328,000 .....
5,820
400
1
400
60 hrs.; $5,820 .......
24,000 hrs.; $2,328,000 .....
5,820
400
1
400
60 hrs.; $5,820 .......
24,000 hrs.; $2,328,000 .....
5,820
400
1
400
60 hrs.; $5,820 .......
24,000 hrs.; $2,328,000 .....
5,820
....................
....................
2,400
.................................
136,000 hrs.; $13,192,000
50 See,
e.g., CISA Cybersecurity Advisory at 2–6,
14.
51 See
NIST SP 800–215 at 5; NSA Network
Security Guide at 3.
52 The paperwork burden estimate includes costs
associated with the initial development of a policy
to address the requirements.
53 This burden applies in Year One to Year Three.
The hourly cost for wages is based in part on the
average of the occupational categories from the
Bureau of Labor Statistics website (https://
PO 00000
Frm 00009
Fmt 4702
Sfmt 4702
32,980
www.bls.gov/oes/current/naics2_22.htm) plus
benefits:
Legal (Occupation Code: 23–0000): $162.66.
Electrical Engineer (Occupation Code: 17–2071):
$79.31.
Office and Administrative Support (Occupation
Code: 43–0000): $48.59.
($162.66 + $79.31 + $48.59) ÷ 3 = $96.85.
The figure is rounded to $97.00 for use in
calculating wage figures in this NOPR.
E:\FR\FM\27SEP1.SGM
27SEP1
lotter on DSK11XQN23PROD with PROPOSALS1
Federal Register / Vol. 89, No. 188 / Friday, September 27, 2024 / Proposed Rules
24. The responses and burden hours
for Years 1–3 will total respectively as
follows:
• Year 1–3 each: 2,400 responses;
136,000 hours.
• The annual cost burden for each
year One to Three is $13,192,000.
25. Title: Mandatory Reliability
Standards, Revised Critical
Infrastructure Protection Reliability
Standards.
Action: Revision to FERC–725B
information collection.
OMB Control No.: 1902–0248.
Respondents: Businesses or other forprofit institutions; not-for-profit
institutions.
Frequency of Responses: On
Occasion.
Necessity of the Information: This
NOPR proposes to approve the
requested modifications to Reliability
Standards pertaining to critical
infrastructure protection. As discussed
above, the Commission proposes to
approve proposed Reliability Standard
CIP–015–1 pursuant to section 215(d)(2)
of the FPA because it improves upon the
currently-effective suite of cybersecurity
CIP Reliability Standards.
Internal Review: The Commission has
reviewed the proposed Reliability
Standard and made a determination that
its action is necessary to implement
section 215 of the FPA. Interested
persons may obtain information on the
reporting requirements by contacting
the following: Federal Energy
Regulatory Commission, 888 First Street
NE, Washington, DC 20426 [Attention:
Kayla Williams, Office of the Executive
Director, email: DataClearance@
ferc.gov, phone: (202) 502–8663, fax:
(202) 273–0873].
26. For submitting comments
concerning the collection(s) of
information and the associated burden
estimate(s), please send your comments
to the Commission, and to the Office of
Management and Budget, Office of
Information and Regulatory Affairs,
Washington, DC 20503 [Attention: Desk
Officer for the Federal Energy
Regulatory Commission, phone: (202)
395–4638, fax: (202) 395–7285]. For
security reasons, comments to OMB
should be submitted by email to: oira_
submission@omb.eop.gov. Comments
submitted to OMB should include
Docket Number RM24–7–000 and OMB
Control Number 1902–0248.
IV. Environmental Analysis
27. The Commission is required to
prepare an Environmental Assessment
or an Environmental Impact Statement
for any action that may have a
significant adverse effect on the human
VerDate Sep<11>2014
16:43 Sep 26, 2024
Jkt 262001
environment.54 The Commission has
categorically excluded certain actions
from this requirement as not having a
significant effect on the human
environment. Included in the exclusion
are rules that are clarifying, corrective,
or procedural or that do not
substantially change the effect of the
regulations being amended.55 The
action proposed herein falls within this
categorical exclusion in the
Commission’s regulations.
V. Regulatory Flexibility Act
Certification
28. The Regulatory Flexibility Act of
1980 (RFA) 56 generally requires a
description and analysis of proposed
rules that will have significant
economic impact on a substantial
number of small entities. The Small
Business Administration’s (SBA) Office
of Size Standards develops the
numerical definition of a small
business.57 The SBA revised its size
standard for electric utilities (effective
March 17, 2023) to a standard based on
the number of employees, including
affiliates (from the prior standard based
on megawatt hour sales).58 The
Commission believes that because the
obligations imposed upon industry are
directed at only entities that own or
operate high impact BES Cyber Systems
with or without external routable
connectivity or medium impact BES
Cyber Systems with external routable
connectivity that there are no entities
that meet the SBA revised standard for
electric utilities. Therefore, the
Commission certifies that this NOPR
will not have a significant economic
impact on a substantial number of small
entities. Accordingly, no regulatory
flexibility analysis is required.
VI. Comment Procedures
29. The Commission invites interested
persons to submit comments on the
matters and issues proposed in this
notice to be adopted, including any
related matters or alternative proposals
that commenters may wish to discuss.
Comments are due November 26, 2024.
Comments must refer to Docket No.
RM24–7–000, and must include the
commenter’s name, the organization
they represent, if applicable, and their
address in their comments.
30. All comments will be placed in
the Commission’s public files and may
54 Reguls. Implementing the Nat’l Envtl Pol’y Act,
Order No. 486, 52 FR 47897 (Dec. 17, 1987), FERC
Stats. & Regs. Preambles 1986–1990 ¶ 30,783 (1987)
(cross-referenced at 41 FERC ¶ 61,284).
55 18 CFR 380.4(a)(2)(ii).
56 5 U.S.C. 601–612.
57 13 CFR 121.101.
58 13 CFR 121.201, Subsector 221 (Utilities).
PO 00000
Frm 00010
Fmt 4702
Sfmt 9990
79183
be viewed, printed, or downloaded
remotely as described in the Document
Availability section below. Commenters
on this proposal are not required to
serve copies of their comments on other
commenters.
31. The Commission encourages
comments to be filed electronically via
the eFiling link on the Commission’s
website at https://www.ferc.gov. The
Commission accepts most standard
word processing formats. Documents
created electronically using word
processing software must be filed in
native applications or print-to-PDF
format and not in a scanned format.
Commenters filing electronically do not
need to make a paper filing.
32. Commenters that are not able to
file comments electronically may file an
original of their comment by USPS mail
or by courier or other delivery services.
For submission sent via USPS only,
filings should be mailed to: Federal
Energy Regulatory Commission, Office
of the Secretary, 888 First Street NE,
Washington, DC 20426. Submission of
filings other than by USPS should be
delivered to: Federal Energy Regulatory
Commission, 12225 Wilkins Avenue,
Rockville, MD 20852.
VII. Document Availability
33. In addition to publishing the full
text of this document in the Federal
Register, the Commission provides all
interested persons an opportunity to
view and/or print the contents of this
document via the internet through the
Commission’s Home Page (https://
www.ferc.gov).
34. From the Commission’s Home
Page on the internet, this information is
available on eLibrary. The full text of
this document is available on eLibrary
in PDF and Microsoft Word format for
viewing, printing, and/or downloading.
To access this document in eLibrary,
type the docket number excluding the
last three digits of this document in the
docket number field.
35. User assistance is available for
eLibrary and the Commission’s website
during normal business hours from
FERC Online Support at 202–502–6652
(toll free at 1–866–208–3676) or email at
ferconlinesupport@ferc.gov, or the
Public Reference Room at (202) 502–
8371, TTY (202) 502–8659. Email the
Public Reference Room at
public.referenceroom@ferc.gov.
By direction of the Commission.
Issued: September 19, 2024.
Debbie-Anne A. Reese,
Acting Secretary.
[FR Doc. 2024–22231 Filed 9–26–24; 8:45 am]
BILLING CODE 6717–01–P
E:\FR\FM\27SEP1.SGM
27SEP1
Agencies
[Federal Register Volume 89, Number 188 (Friday, September 27, 2024)]
[Proposed Rules]
[Pages 79178-79183]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2024-22231]
=======================================================================
-----------------------------------------------------------------------
DEPARTMENT OF ENERGY
Federal Energy Regulatory Commission
18 CFR Part 40
[Docket No. RM24-7-000]
Critical Infrastructure Protection Reliability Standard CIP-015-
1--Cyber Security--Internal Network Security Monitoring
AGENCY: Federal Energy Regulatory Commission.
ACTION: Notice of proposed rulemaking.
-----------------------------------------------------------------------
SUMMARY: The Federal Energy Regulatory Commission (Commission) proposes
to approve proposed Reliability Standard CIP-015-1 (Cyber Security--
Internal Network Security Monitoring), which the North American
Electric Reliability Corporation (NERC), submitted in response to a
Commission directive. In addition, the Commission proposes to direct
that NERC develop certain modifications to proposed Reliability
Standard CIP-015-1 to extend internal network security monitoring to
include electronic access control or monitoring systems and physical
access control systems outside of the electronic security perimeter.
DATES: Comments are due November 26, 2024.
ADDRESSES: Comments, identified by docket number, may be filed in the
following ways. Electronic filing through https://www.ferc.gov, is
preferred.
Electronic Filing: Documents must be filed in acceptable
native applications and print-to-PDF, but not in scanned or picture
format.
For those unable to file electronically, comments may be
filed by USPS mail or by hand (including courier) delivery.
[cir] Mail via U.S. Postal Service Only: Addressed to: Federal
Energy Regulatory Commission, Secretary of the Commission, 888 First
Street NE, Washington, DC 20426.
[cir] Hand (Including Courier) Delivery: Deliver to: Federal Energy
Regulatory Commission, 12225 Wilkins Avenue, Rockville, MD 20852.
The Comment Procedures Section of this document contains more
detailed filing procedures.
FOR FURTHER INFORMATION CONTACT:
Margaret Steiner (Technical Information), Office of Electric
Reliability, Federal Energy Regulatory Commission, 888 First Street NE,
Washington, DC 20426, (202) 502 6704, [email protected]
Hampden T. Macbeth (Legal Information), Office of General Counsel,
Federal Energy Regulatory Commission, 888 First Street NE, Washington,
DC 20426, (202) 502 8957, [email protected]
SUPPLEMENTARY INFORMATION:
1. Pursuant to section 215(d)(2) of the Federal Power Act (FPA),\1\
the Commission proposes to approve proposed Critical Infrastructure
Protection (CIP) Reliability Standard CIP-015-1 (Cyber Security--
Internal Network Security Monitoring). The North American Electric
Reliability Corporation (NERC), the Commission-certified Electric
Reliability Organization (ERO), submitted the proposed Reliability
Standard for Commission approval in response to a Commission directive
in Order No. 887.\2\ In addition, pursuant to section 215(d)(5) of the
FPA,\3\ the Commission proposes to direct that NERC develop further
modifications to Reliability Standard CIP-015-1, within 12 months of
the effective date of a final rule in this proceeding, to extend
Internal Network Security Monitoring (INSM) \4\ to include electronic
access control or monitoring systems (EACMS) \5\ and physical access
control systems (PACS) \6\ outside of the electronic security
perimeter.
---------------------------------------------------------------------------
\1\ 16 U.S.C. 824o(d)(2).
\2\ Internal Network Sec. Monitoring for High & Medium Impact
Bulk Elec. Sys. Cyber Sys., Order No. 887, 88 FR 8354 (Feb. 9,
2023), 182 FERC ] 61,021 (2023).
\3\ 16 U.S.C. 824o(d)(5).
\4\ INSM is ``a subset of network security monitoring that is
applied within a `trust zone,' such as an electronic security
perimeter.'' Order No. 887, 182 FERC ] 61,021 at P 2.
\5\ EACMS are ``Cyber Assets that perform electronic access
control or electronic access monitoring of the Electronic Security
Perimeter(s) or BES Cyber Systems. This includes Intermediate
Systems.'' NERC, Glossary of Terms Used in NERC Reliability
Standards, (July 22, 2024), https://www.nerc.com/pa/Stand/Glossary%20of%20Terms/Glossary_of_Terms.pdf (NERC Glossary).
\6\ PACS are ``Cyber Assets that control, alert, or log access
to the Physical Security Perimeter(s), exclusive of locally mounted
hardware or devices at the Physical Security Perimeter such as
motion sensors, electronic lock control mechanisms, and badge
readers.'' Id.
---------------------------------------------------------------------------
2. In Order No. 887, the Commission directed that NERC develop new
or modified CIP Reliability Standards that require INSM for CIP-
networked environments for all high impact bulk electric system (BES)
Cyber Systems \7\ with and without external routable connectivity \8\
and medium impact BES Cyber Systems with external routable
connectivity.\9\ Proposed Reliability Standard CIP-015-1 is partly
responsive to the Commission's directives in Order No. 887 and advances
the reliability of the Bulk-Power System by (1)
[[Page 79179]]
establishing requirements for INSM for network traffic inside an
electronic security perimeter, and (2) requiring INSM for all high
impact BES Cyber Systems with and without external routable
connectivity and medium impact BES Cyber Systems with external routable
connectivity to ensure the identification of anomalous network activity
indicating an ongoing attack.\10\ Accordingly, we propose approving
proposed Reliability Standard CIP-015-1.
---------------------------------------------------------------------------
\7\ NERC defines BES Cyber Systems as ``One or more BES Cyber
Assets logically grouped by a responsible entity to perform one or
more reliability tasks for a functional entity.'' See NERC Glossary.
BES Cyber Systems are categorized as high, medium, or low impact
depending on the functions of the assets housed within each system
and the risk they potentially pose to the reliable operation of the
Bulk-Power System. Reliability Standard CIP-002-5.1a (BES Cyber
System Categorization) sets forth criteria that registered entities
apply to categorize BES Cyber Systems as high, medium, or low impact
depending on the adverse impact that loss, compromise, or misuse of
those BES Cyber Systems could have on the reliable operation of the
BES. The impact level (i.e., high, medium, or low) of BES Cyber
Systems, in turn, determines the applicability of security controls
for BES Cyber Systems that are contained in the remaining CIP
Reliability Standards (i.e., Reliability Standards CIP-003-8 to CIP-
013-1).
\8\ External routable connectivity is ``[t]he ability to access
a BES Cyber System from a Cyber Asset that is outside of its
associated Electronic Security Perimeter via a bi-directional
routable protocol connection.'' NERC Glossary.
\9\ Order No. 887, 182 FERC ] 61,021 at P 49.
\10\ NERC Petition at 1, 13.
---------------------------------------------------------------------------
3. Proposed Reliability Standard CIP-015-1 is not, however, fully
responsive to the Commission's directive to implement INSM for the
``CIP-networked environment.'' \11\ In particular, the proposed
Standard may not adequately defend against attacks that circumvent
network perimeter-based security controls. Attacks external to the
electronic security perimeter may compromise systems, such as EACMS or
PACS, and then infiltrate the perimeter as a trusted communication,
thus limiting the effectiveness of an approach that employs INSM only
within the electronic security perimeter. The Commission used the
phrase ``CIP-networked environment'' in Order No. 887 to be necessarily
broader than the electronic security perimeter.\12\ Accordingly, to
address this reliability and security gap, the Commission proposes to
direct that NERC develop modifications to the proposed Reliability
Standard CIP-015-1 to extend INSM to include EACMS and PACS outside of
the electronic security perimeter.
---------------------------------------------------------------------------
\11\ See Order No. 887, 182 FERC ] 61,021 at P 1.
\12\ Id. P 49.
---------------------------------------------------------------------------
I. Background
A. Section 215 and Mandatory Reliability Standards
4. Section 215 of the FPA provides that the Commission may certify
an ERO, the purpose of which is to develop mandatory and enforceable
Reliability Standards, subject to Commission review and approval.\13\
Reliability Standards may be enforced by the ERO, subject to Commission
oversight, or by the Commission independently.\14\ Pursuant to section
215 of the FPA, the Commission established a process to select and
certify an ERO,\15\ and subsequently certified NERC.\16\
---------------------------------------------------------------------------
\13\ 16 U.S.C. 824o(c).
\14\ Id. 824o(e).
\15\ Rules Concerning Certification of the Elec. Reliability
Org.; & Procs. for the Establishment, Approval, & Enforcement of
Elec. Reliability Standards, Order No. 672, 114 FERC ] 61,104, order
on reh'g, Order No. 672-A, 114 FERC ] 61,328 (2006); see also 18 CFR
39.4(b) (2024).
\16\ N. Am. Elec. Reliability Corp., 116 FERC ] 61,062, order on
reh'g and compliance, 117 FERC ] 61,126 (2006), aff'd sub nom.
Alcoa, Inc. v. FERC, 564 F.3d 1342 (D.C. Cir. 2009).
---------------------------------------------------------------------------
B. Internal Network Security Monitoring
5. INSM is a subset of network security monitoring that is applied
within a ``trust zone,'' \17\ such as an electronic security perimeter.
The trust zone applicable to INSM is the CIP-networked environment for
this notice of proposed rulemaking (NOPR) and Order No. 887.\18\ INSM
enables continuing visibility over communications between networked
devices within a trust zone and detection of malicious activity that
has circumvented perimeter controls. Further, INSM facilitates the
detection of anomalous network activity indicative of an attack in
progress, thus increasing the probability of early detection and
allowing for quicker mitigation and recovery from an attack.
---------------------------------------------------------------------------
\17\ The U.S. Department of Homeland Security, Cybersecurity and
Infrastructure Security Agency (CISA) defines trust zone as a
``discrete computing environment designated for information
processing, storage, and/or transmission that share the rigor or
robustness of the applicable security capabilities necessary to
protect the traffic transiting in and out of a zone and/or the
information within the zone.'' CISA, Trusted Internet Connections
3.0: Reference Architecture, 2 (July 2020), https://www.cisa.gov/sites/default/files/publications/CISA_TIC%203.0%20Vol.%202%20Reference%20Architecture.pdf.
\18\ Order No. 887, 182 FERC ] 61,021, at P 2.
---------------------------------------------------------------------------
6. INSM is designed to address as early as possible situations
where perimeter network defenses are breached by detecting intrusions
and malicious activity within a trust zone. INSM consists of three
stages: (1) collection; (2) detection; and (3) analysis. Taken
together, these three stages provide the benefit of early detection and
alerting of intrusions and malicious activity.\19\ INSM better
positions an entity to detect an attacker in the early phases of an
attack and reduces the likelihood that an attacker can gain a strong
foothold, including operational control, on the target system. In
addition to early detection and mitigation, INSM may improve incident
response by providing higher quality data about the extent of an attack
internal to a trust zone. Finally, INSM provides insight into east-west
network traffic \20\ happening inside the network perimeter, which
enables a more comprehensive picture of the extent of an attack
compared to data gathered from the network perimeter alone.\21\
---------------------------------------------------------------------------
\19\ See Chris Sanders & Jason Smith, Applied Network Security
Monitoring, 9-10 (2013); see also ISACA, Applied Collection
Framework: A Risk-Driven Approach to Cybersecurity Monitoring (Aug.
18, 2020), https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2020/applied-collection-framework.
\20\ East-west traffic refers to the communications among BES
Cyber Systems and is the specific type of network traffic that
remains within the network perimeter. It may refer to communication
peer-to-peer industrial automation and control systems devices in a
network or to activity between servers or networks inside a data
center, rather than the data and applications that traverse networks
to the outside world. CISCO, Networking and Security in Industrial
Automation Environments Design Guide, 111 (Aug. 2020), https://www.cisco.com/c/en/us/td/docs/solutions/Verticals/Industrial_Automation/IA_Horizontal/DG/Industrial-AutomationDG.pdf;
The President's National Security Telecommunications Advisory
Committee, Report to the President on Software-Defined Networking,
E-3 (Aug. 2020), https://www.cisa.gov/sites/default/files/publications/NSTAC%20SDN%20Report%20%288-12-20%29.pdf.
\21\ CISA, CISA Analysis: FY2020 Risk and Vulnerability
Assessments (July 2021), https://www.cisa.gov/sites/default/files/publications/FY20-RVA-Analysis_508C.pdf.
---------------------------------------------------------------------------
C. Order No. 887
7. On January 19, 2023, in Order No. 887, the Commission issued a
final rule that directed that NERC develop ``new or modified CIP
Reliability Standards requiring INSM for all high impact BES Cyber
Systems with and without external routable connectivity and medium
impact BES Cyber Systems with external routable connectivity to ensure
the detection of anomalous network activity indicative of an attack in
progress.'' \22\ The Commission, noting that INSM is ``applied within a
`trust zone,' such as an electronic security perimeter,'' stated that
for the final rule the applicable trust zone for INSM is the CIP-
networked environment.\23\
---------------------------------------------------------------------------
\22\ Order No. 887, 182 FERC ] 61,021 at P 3.
\23\ Id. P 2.
---------------------------------------------------------------------------
8. The Commission explained that the currently effective CIP
Reliability Standards focus on preventing unauthorized access at the
electronic security perimeter and do not require INSM inside trusted
CIP-networked environments.\24\ The Commission determined that this
left a reliability gap when vendors or individuals with authorized
access are deemed trustworthy but could still introduce a cybersecurity
risk.\25\ The Commission then concluded that requirements to implement
ISNM will ``fill a gap in the
[[Page 79180]]
current suite of CIP Reliability Standards and improve the
cybersecurity posture of the Bulk-Power System.'' \26\
---------------------------------------------------------------------------
\24\ Id. P 20.
\25\ Id. An attacker could move among devices inside a trust
zone and perform actions such as: (1) escalate privileges (such as
gaining administrator account privileges through a vulnerability);
(2) move undetected inside the CIP-networked environment; or (3)
execute a virus, ransomware or another form of unauthorized code.
Id. P 19.
\26\ Id. P 49 (citing NERC Comments in Response to Notice of
Proposed Rulemaking under Docket No. RM22-3-000 at 4-5 (current CIP
Standards require ``malicious communications monitoring at the
Electronic Access Point on the [electronic security perimeter], not
necessarily monitoring of activity of those who already have access
to the network'')). The Bulk-Power System is defined in the FPA as
facilities and control systems necessary for operating an
interconnected electric energy transmission network (or any portion
thereof); and electric energy from generating facilities needed to
maintain transmission system reliability. The term does not include
facilities used in the local distribution of electric energy. 16
U.S.C. 824o(a)(1).
---------------------------------------------------------------------------
9. The Commission directed that NERC ensure that the new or
modified CIP Reliability Standards address three security objectives
for east-west network traffic. First, the new or modified CIP
Reliability Standards should address the need for each responsible
entity to develop a baseline for their network activity by analyzing
for security purposes their network traffic and data flows. Second, the
new or modified CIP Reliability Standards should address the need for
responsible entities to monitor and detect ``unauthorized activity,
connections, devices, network communication protocols, and software''
in the CIP-networked environment. Third, the new or modified CIP
Reliability Standards should provide responsible entities with
flexibility in determining how to best identify anomalous activity with
a high level of confidence, so long as the methods ensure: (1) logging
of network traffic; (2) maintaining the logs, and other data collected,
regarding network traffic that are of ``sufficient data fidelity to
draw meaningful conclusions'' to investigate an incident; and (3)
maintaining the integrity of the logs and other data by employing
measures that minimize the likelihood of an attacker removing evidence
of their tactics, techniques, and procedures.\27\
---------------------------------------------------------------------------
\27\ Order No. 887, 182 FERC ] 61,021 at PP 79-80.
---------------------------------------------------------------------------
D. NERC Petition and Proposed Reliability Standard CIP-015-1
10. On June 24, 2024, NERC submitted for Commission approval
proposed Reliability Standard CIP-015-1 and the associated violation
risk factors and violation severity levels, implementation plan, and
effective date.\28\ NERC states that proposed Reliability Standard CIP-
015-1 is intended to advance the reliability of the Bulk-Power System
by providing a comprehensive suite of forward looking and objective-
based requirements for INSM.\29\
---------------------------------------------------------------------------
\28\ NERC Petition at 2, 26-28. Proposed Reliability Standard
CIP-015-1 is not attached to this NOPR. The proposed Reliability
Standards are available on the Commission's eLibrary document
retrieval system in Docket No. RM24-7-000 and on the NERC website,
www.nerc.com.
\29\ Id. at 4.
---------------------------------------------------------------------------
11. NERC explains that the proposed Reliability Standard would
address the directives in Order No. 887 by establishing three
requirements for responsible entities to implement INSM systems and
processes. Specifically:
Requirement R1: responsible entities would be required to
implement process(es) to monitor, detect, and evaluate anomalous
activity in ``networks protected by the Responsible Entity's Electronic
Security Perimeter(s)'' of high impact BES Cyber Systems and medium
impact BES Cyber Systems with external routable connectivity.\30\
---------------------------------------------------------------------------
\30\ Id., Ex. A (Proposed Reliability Standard CIP-015-1) at 6.
---------------------------------------------------------------------------
Requirement R2: responsible entities would be required to
implement process(es) for retaining INSM data associated with anomalous
network activity as determined by the applicable responsible entities.
Requirement R3: responsible entities would be required to
implement process(es) to protect INSM monitoring data collected and
retained in support of Requirements R1 and R2 to guard against the risk
of unauthorized deletion or modification.
According to NERC, Requirement R1 applies to data flows within
``networks protected by the Responsible Entity's Electronic Security
Perimeter(s).'' \31\ NERC states that proposed Reliability Standard
CIP-015-1's scope is consistent with the plain language of Order No.
887, which stated that INSM should apply within a trust zone, ``such as
an electronic security perimeter,'' and that the trust zone for INSM is
the ``CIP-networked environment.'' \32\ NERC states that its approach
would provide the greatest benefits to the reliability of the Bulk-
Power System by focusing industry's limited resources on the most
critical environment, ``networks protected by the Responsible Entity's
Electronic Security Perimeter.'' \33\
---------------------------------------------------------------------------
\31\ Id.
\32\ NERC Petition at 16 (quoting Order No. 887, 182 FERC ]
61,021 at P 2).
\33\ Id. at 14, 17.
---------------------------------------------------------------------------
II. Discussion
A. Proposal To Approve Proposed Reliability Standard CIP-015-1
12. Pursuant to section 215(d)(2) of the FPA, the Commission
proposes to approve proposed Reliability Standard CIP-015-1 as just,
reasonable, not unduly discriminatory or preferential, and in the
public interest. The proposed Reliability Standard requires responsible
entities to implement INSM within the electronic security perimeter for
all high impact BES Cyber Systems with and without external routable
connectivity and medium impact BES Cyber Systems with external routable
connectivity. Consistent with the security objectives identified in
Order No. 887, Requirement R1 of the proposed Standard would require
responsible entities to implement INSM by mandating the collection,
detection, analysis of and appropriate response to anomalous activity
within the electronic security perimeter. Proposed Reliability Standard
CIP-015-1, Requirement R2 would require responsible entities to retain
INSM data related to anomalous activity. Proposed Reliability Standard
CIP-015-1, Requirement R3 would require responsible entities to protect
INSM data associated with anomalous network activity.
13. Implementation of INSM within the electronic security perimeter
will augment responsible entities' ability to detect anomalous or
malicious activity and provide information to assist in determining an
appropriate response through proposed Reliability Standard CIP-015-1,
Requirements R1, R2, and R3. The proposed Reliability Standard improves
the security posture of the industry by providing visibility into east-
west communications absent from previous Reliability Standards,
improving the probability of detection for anomalous or malicious
activity within the electronic security perimeter.
14. Notwithstanding the improvements to security made by the
proposed Standard, as discussed below, the proposed Reliability
Standard does not fully implement the scope of protection contemplated
in Order No. 887. By restricting the implementation of INSM to within
the electronic security perimeter, a reliability and security gap
remains by not implementing INSM for the entire CIP-networked
environment, i.e., outside the electronic security perimeter inclusive
of EACMS and PACS. To address this gap, we propose to direct NERC to
develop modifications to the proposed Reliability Standard to include
EACMS and PACS, thereby protecting the reliability and security of all
trust zones of the CIP-networked environment. This approach--proposing
to approve a Reliability Standard as enhancing protections and as a
separate action under section 215(d)(5) of the FPA proposing to direct
NERC to develop certain modifications to a Reliability Standard to
address a reliability gap--is
[[Page 79181]]
consistent with Commission precedent.\34\
---------------------------------------------------------------------------
\34\ See e.g., N. Am. Elec. Reliability Corp., 187 FERC ] 61,204
(2024) (order approving Reliability Standard EOP-012-2 because it
clarified the requirements for generator cold weather preparedness
and by making other improvements and, in addition, directing that
NERC submit modifications to Reliability Standard EOP-012-2 to
address certain concerns); Critical Infrastructure Prot. Reliability
Standard CIP-012-1--Cyber Sec.--Commc'ns between Control Ctrs.,
Order No. 866, 85 FR 7197 (Feb. 7, 2020), 170 FERC ] 61,031 (2020).
---------------------------------------------------------------------------
B. Scope of the CIP-Networked Environment
15. NERC's proposed application of the term ``CIP-networked
environment'' as limited to assets and systems within the electronic
security perimeter is overly narrow. Order No. 887 used the term ``CIP-
networked environment'' purposefully to apply more broadly than the
electronic security perimeter, specifically to include all assets and
systems to which the CIP standards apply and may be the targets of
attacks. As explained below, NERC's petition does not address that
reliability and security gap because it does not require implementation
of INSM at EACMS and PACS outside the electronic security perimeter.
16. Excluding EACMS and PACS from the term ``CIP-networked
environment'' is inconsistent with generally accepted approaches to
cybersecurity. Under Reliability Standard CIP-002-5.1a and fundamental
cybersecurity practices, similar systems within a network are grouped
together to facilitate management, control, and monitoring of the
networked environment.\35\ For example, EACMS are grouped together to
allow for early detection of malicious activity within the CIP-
networked environment and potentially protect other grouped systems,
such as BES Cyber Systems, with which the EACMS communicate. Thus,
excluding certain grouped systems from protections--as is the case for
EACMS and PACS in Reliability Standard CIP-015-1--leaves other grouped
systems within the CIP-networked environment at risk. Here, the BES
Cyber Systems would not benefit from monitoring of east-west (i.e.,
lateral) movement within the grouping of EACMS and PACS, which allows
for early detection of anomalous or malicious activity.\36\ Otherwise,
for example, a compromised EACMS grouping could provide an attacker
with the opportunity to infiltrate other connected groups, such as BES
Cyber Systems located within the electronic security perimeter, as an
authenticated user or trusted communication.\37\
---------------------------------------------------------------------------
\35\ Reliability Standard CIP-002.5.1a (BES Cyber System
Categorization) (categorizing EACMS, PACS, protected cyber assets,
and BES Cyber Systems into groups); see, e.g., Nat'l Sec. Agency,
Network Infrastructure Security Guide, 1, 3-4 (Oct. 2023), https://media.defense.gov/2022/Jun/15/2003018261/-1/-1/0/CTR_NSA_NETWORK_INFRASTRUCTURE_SECURITY_GUIDE_20220615.PDF
(recommending the grouping of similar network systems as a best
practice for overall network security) (NSA Network Security Guide).
\36\ See CISA, Cybersecurity Advisory: CISA Red Team Shares Key
Findings to Improve Monitoring and Hardening of Networks, 2, 14
(Feb. 2023), https://www.cisa.gov/sites/default/files/2023-03/aa23-059a-cisa_red_team_shares_key_findings_to_improve_monitoring_and_hardening_of_networks.pdf (finding that insufficient network monitoring
contributed to a CISA red team avoiding detection and gaining access
to an organization's network through lateral movement by leveraging
access to an Active Directory system serving as an electronic access
control system) (CISA Cybersecurity Advisory); Nat'l Inst. of
Standards and Tech. (NIST), NIST SP 800-215 Guide to a Secure
Enterprise Network Landscape, 5 (Nov. 2022), https://doi.org/10.6028/NIST.SP.800-215 (describing the limitations of a perimeter-
based security approach as not capturing threats from inside a
network that can move laterally and remain undetected for an
extended period of time) (NIST SP 800-215); NIST, NIST SP 800-82r3
Guide to Operational Technology (OT) Security, 74 (Sept. 2023),
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r3.pdf (recommending the analyzing of information to differentiate
between known and unknown communication as a necessary first step in
implementing network security monitoring) (NIST SP 800-82r3). The
term INSM is used by the Commission in Order No. 887, but the
cybersecurity industry uses the term ``network security
monitoring.'' Similarly, the CIP Standards use the terms ``EACMS''
and ``PACS,'' which are defined by the NERC Glossary, while NIST
discusses the same concepts but does not use the same EACMS and PACS
terminology.
\37\ See CISA Cybersecurity Advisory at 2-6 (describing how a
CISA Red Team was able to gain access to workstations and servers
from an Active Directory system serving as an electronic access
control system, which assisted in lateral movement to other
networks).
---------------------------------------------------------------------------
17. National Institute of Standards and Technology (NIST) guidance
states that INSM monitoring needs to detect ``[a]ny threat that is
already inside of a network [that] can move laterally and remain
undetected for days or even months.'' \38\ According to the NIST
guidance, east-west (lateral) monitoring (i.e., INSM) improves the
probability of detection for malicious or anomalous activity and should
not be isolated to only the most critical trust zones.\39\ While the
terminology of EACMS and PACS is unique to the CIP Reliability
Standards, these statements from NIST broadly include the concepts of
EACMS and PACS and support the need for monitoring.
---------------------------------------------------------------------------
\38\ NIST SP 800-215 at 5.
\39\ See id. (describing east-west traffic as ``largely
invisible to security teams'' without INSM and that a threat inside
a network can move east-west and ``remain undetected for days or
even months'').
---------------------------------------------------------------------------
18. Further, we find NERC's rationale for limiting INSM to within
the electronic security perimeter unpersuasive. First, NERC contends
that the devices supporting reliable operation are contained within the
electronic security perimeter and thus industry resources are most
effectively focused on data flows within the electronic security
perimeter.\40\ We disagree. While the devices directly supporting the
reliable operation of the Bulk-Power System are located within the
electronic security perimeter, attacks that threaten reliability can
still emanate from outside the electronic security perimeter from
connected Cyber Assets, such as EACMS.\41\
---------------------------------------------------------------------------
\40\ NERC Petition at 14.
\41\ See, e.g., CISA Cybersecurity Advisory at 1-2 (a CISA Red
Team was able to gain access to systems adjacent to the
organization's sensitive business systems (SBSs) by moving laterally
from workstations and servers through an Active Directory system;
Phase I of the attack ended before the team could implement a viable
plan to achieve access to a SBS).
---------------------------------------------------------------------------
19. Second, NERC avers that requiring INSM implementation outside
the electronic security perimeter could have the unintended effect of
impeding an entity's ability to detect and respond to threats to their
most critical systems due to alarm and alert fatigue from large volumes
of generated data.\42\ Extending INSM implementation to include EACMS
and PACS may generate large volumes of data; \43\ however, we believe
that the data can be managed and that the security benefits of
implementing INSM outside the electronic security perimeter outweigh
the burden associated with increased volumes of data. Defining incident
alerting thresholds and establishing a baseline for normal network
activity can reduce the potential for alarm and alert fatigue.\44\
Restricting INSM to the assets within the electronic security perimeter
could leave the most critical networks vulnerable to an attack from
outside the electronic security perimeter. Assets such as EACMS are
high value targets for an attack because if successfully compromised,
EACMS would allow an attacker to infiltrate the perimeter as a trusted
communication.\45\ Further,
[[Page 79182]]
declining to extend INSM implementation to EACMS and PACS outside the
electronic security perimeter leaves a reliability gap because
responsible entities will lack visibility into the high percentage of
east-west traffic that occurs within the CIP-networked environment.\46\
Monitoring and alerting of east-west traffic enables quicker detection
of malicious communications, minimizing potential harmful effects.\47\
Additionally, the collected data serves as invaluable forensic evidence
in the event of an attempted or successful compromise of the CIP-
networked environment.
---------------------------------------------------------------------------
\42\ NERC Petition at 14-15 n.45.
\43\ See NIST SP 800-82r3 at 130 (discussing alert ``noise''
from typical network traffic that can result from implementation of
network security monitoring).
\44\ See id. at 127-128 (recommending that organizations define
incident alert thresholds to establish an efficient incident
detection capability as not all events and anomalies are malicious
or require investigation and establish alerting thresholds on
baselines of normal network traffic and data flows to reduce false
positive and nuisance alarms).
\45\ See, e.g., CISA Cybersecurity Advisory at 14 (finding a
CISA red team gained access to an organization's network due to the
lack of monitoring on endpoint management systems--high valued
assets--that can include the monitoring system part of an EACMS).
\46\ NIST states that over 75% of network traffic is now east-
west or server-to-server, i.e., traffic that is not covered by a
perimeter-based defense approach. See NIST SP 800-215 at 5.
\47\ See id. at 5.
---------------------------------------------------------------------------
20. Third, NERC asserts that requiring INSM implementation outside
the electronic security perimeter would not promote security and
reliability inside the CIP-networked environment or that the cost of
doing so would outweigh associated benefits.\48\ We disagree. EACMS and
PACS are integral to the effective operation of BES Cyber Systems
within the electronic security perimeter in providing services, such as
centralized authentication, authorization, and monitoring, and serving
as the access point to the electronic security perimeter.\49\ These
assets are valued targets for an attacker and illustrate the need for a
defense-in-depth strategy for cybersecurity.\50\ Implementing INSM
outside the electronic security perimeter provides significant benefits
in monitoring, detecting, and collecting malicious code or anomalous
activity from attackers moving east-west within the EACMS or PACS
network segments of the CIP-networked environment and is a fundamental
cybersecurity practice.\51\
---------------------------------------------------------------------------
\48\ NERC Petition at 15-16 n.46.
\49\ NERC, Lessons Learned: CIP Version 5 Transition Program
(Sept. 2015), https://www.nerc.com/pa/CI/tpv5impmntnstdy/LL_EACMS_Mixed_Trust_Authentication_Sep_10_2015_clean.pdf.
\50\ See, e.g., CISA Cybersecurity Advisory at 2-6, 14.
\51\ See NIST SP 800-215 at 5; NSA Network Security Guide at 3.
---------------------------------------------------------------------------
C. Proposed Directive
21. Pursuant to section 215(d)(5) of the FPA, the Commission
proposes to direct NERC to develop modifications to proposed
Reliability Standard CIP-015-1 that would extend INSM to include EACMS
and PACS outside the electronic security perimeter. We also propose
directing NERC to submit the revised Reliability Standard for
Commission approval within 12 months of the effective date of a final
rule in this proceeding. We seek comment on all aspects of this
proposal.
III. Information Collection Statement
22. The FERC-725B information collection requirements are subject
to review by the Office of Management and Budget (OMB) under section
3507(d) of the Paperwork Reduction Act of 1995. OMB's regulations
require approval of certain information collection requirements imposed
by agency rules. Upon approval of a collection of information, OMB will
assign an OMB control number and expiration date. Respondents subject
to the filing requirements will not be penalized for failing to respond
to these collections of information unless the collections of
information display a valid OMB control number. The Commission solicits
comments on the need for this information, whether the information will
have practical utility, the accuracy of the burden estimates, ways to
enhance the quality, utility, and clarity of the information to be
collected or retained, and any suggested methods for minimizing
respondents' burden, including the use of automated information
techniques.
23. The Commission bases its paperwork burden estimates on the
additional paperwork burden presented by the proposed revision to
Reliability Standard CIP-015-1 as this is a new proposed Reliability
Standard. Reliability Standards are objective-based and allow entities
to choose compliance approaches best tailored to their systems. The
NERC Compliance Registry, as of July 2024, identifies approximately
1,636 unique U.S. entities that are subject to mandatory compliance
with CIP Reliability Standards. Of this total, we estimate that 400
entities will face an increased paperwork burden under proposed
Reliability Standard CIP-015-1. Based on these assumptions, we estimate
the following reporting burden:
---------------------------------------------------------------------------
\52\ The paperwork burden estimate includes costs associated
with the initial development of a policy to address the
requirements.
\53\ This burden applies in Year One to Year Three.
The hourly cost for wages is based in part on the average of the
occupational categories from the Bureau of Labor Statistics website
(https://www.bls.gov/oes/current/naics2_22.htm) plus benefits:
Legal (Occupation Code: 23-0000): $162.66.
Electrical Engineer (Occupation Code: 17-2071): $79.31.
Office and Administrative Support (Occupation Code: 43-0000):
$48.59.
($162.66 + $79.31 + $48.59) / 3 = $96.85.
The figure is rounded to $97.00 for use in calculating wage
figures in this NOPR.
Annual Changes Proposed by the NOPR in Docket No. RM24-7-000 \52\
--------------------------------------------------------------------------------------------------------------------------------------------------------
Annual
number of Cost per
Number of responses Total number Average burden & cost per Total annual burden hours & total respondent
respondents per of responses response \53\ annual cost ($)
respondent
(1) (2) (1) * (2) = (4)....................... (3) * (4) = (5)................... (5) / (1)
(3)
--------------------------------------------------------------------------------------------------------------------------------------------------------
Create one or more documented 400 1 400 40 hrs.; $3,880........... 16,000 hrs.; $1,552,000........... $3,880
process(es) (R1).
Create documentation detailing 400 1 400 60 hrs.; $5,820........... 24,000 hrs.; $2,328,000........... 5,820
network data feed(s) and reason
(R1.1).
Create documentation of: anomalous 400 1 400 60 hrs.; $5,820........... 24,000 hrs.; $2,328,000........... 5,820
events and baseline used to
detect anomalous events (R1.2).
Create documentation of methods 400 1 400 60 hrs.; $5,820........... 24,000 hrs.; $2,328,000........... 5,820
to: evaluate anomalous activity;
response to detected activity;
and escalation process(es) (R1.3).
Create documentation of: data 400 1 400 60 hrs.; $5,820........... 24,000 hrs.; $2,328,000........... 5,820
retention process(es); system
configuration(s), or system-
generated report(s) (R2).
Create documentation of how the 400 1 400 60 hrs.; $5,820........... 24,000 hrs.; $2,328,000........... 5,820
collected data is being protected
(R3).
---------------------------------------------------------------------------------------------------------------------
Total burden for FERC-725B(5) ........... ........... 2,400 .......................... 136,000 hrs.; $13,192,000......... 32,980
under CIP-015-1.
--------------------------------------------------------------------------------------------------------------------------------------------------------
[[Page 79183]]
24. The responses and burden hours for Years 1-3 will total
respectively as follows:
Year 1-3 each: 2,400 responses; 136,000 hours.
The annual cost burden for each year One to Three is
$13,192,000.
25. Title: Mandatory Reliability Standards, Revised Critical
Infrastructure Protection Reliability Standards.
Action: Revision to FERC-725B information collection.
OMB Control No.: 1902-0248.
Respondents: Businesses or other for-profit institutions; not-for-
profit institutions.
Frequency of Responses: On Occasion.
Necessity of the Information: This NOPR proposes to approve the
requested modifications to Reliability Standards pertaining to critical
infrastructure protection. As discussed above, the Commission proposes
to approve proposed Reliability Standard CIP-015-1 pursuant to section
215(d)(2) of the FPA because it improves upon the currently-effective
suite of cybersecurity CIP Reliability Standards.
Internal Review: The Commission has reviewed the proposed
Reliability Standard and made a determination that its action is
necessary to implement section 215 of the FPA. Interested persons may
obtain information on the reporting requirements by contacting the
following: Federal Energy Regulatory Commission, 888 First Street NE,
Washington, DC 20426 [Attention: Kayla Williams, Office of the
Executive Director, email: [email protected], phone: (202) 502-
8663, fax: (202) 273-0873].
26. For submitting comments concerning the collection(s) of
information and the associated burden estimate(s), please send your
comments to the Commission, and to the Office of Management and Budget,
Office of Information and Regulatory Affairs, Washington, DC 20503
[Attention: Desk Officer for the Federal Energy Regulatory Commission,
phone: (202) 395-4638, fax: (202) 395-7285]. For security reasons,
comments to OMB should be submitted by email to:
[email protected]. Comments submitted to OMB should include
Docket Number RM24-7-000 and OMB Control Number 1902-0248.
IV. Environmental Analysis
27. The Commission is required to prepare an Environmental
Assessment or an Environmental Impact Statement for any action that may
have a significant adverse effect on the human environment.\54\ The
Commission has categorically excluded certain actions from this
requirement as not having a significant effect on the human
environment. Included in the exclusion are rules that are clarifying,
corrective, or procedural or that do not substantially change the
effect of the regulations being amended.\55\ The action proposed herein
falls within this categorical exclusion in the Commission's
regulations.
---------------------------------------------------------------------------
\54\ Reguls. Implementing the Nat'l Envtl Pol'y Act, Order No.
486, 52 FR 47897 (Dec. 17, 1987), FERC Stats. & Regs. Preambles
1986-1990 ] 30,783 (1987) (cross-referenced at 41 FERC ] 61,284).
\55\ 18 CFR 380.4(a)(2)(ii).
---------------------------------------------------------------------------
V. Regulatory Flexibility Act Certification
28. The Regulatory Flexibility Act of 1980 (RFA) \56\ generally
requires a description and analysis of proposed rules that will have
significant economic impact on a substantial number of small entities.
The Small Business Administration's (SBA) Office of Size Standards
develops the numerical definition of a small business.\57\ The SBA
revised its size standard for electric utilities (effective March 17,
2023) to a standard based on the number of employees, including
affiliates (from the prior standard based on megawatt hour sales).\58\
The Commission believes that because the obligations imposed upon
industry are directed at only entities that own or operate high impact
BES Cyber Systems with or without external routable connectivity or
medium impact BES Cyber Systems with external routable connectivity
that there are no entities that meet the SBA revised standard for
electric utilities. Therefore, the Commission certifies that this NOPR
will not have a significant economic impact on a substantial number of
small entities. Accordingly, no regulatory flexibility analysis is
required.
---------------------------------------------------------------------------
\56\ 5 U.S.C. 601-612.
\57\ 13 CFR 121.101.
\58\ 13 CFR 121.201, Subsector 221 (Utilities).
---------------------------------------------------------------------------
VI. Comment Procedures
29. The Commission invites interested persons to submit comments on
the matters and issues proposed in this notice to be adopted, including
any related matters or alternative proposals that commenters may wish
to discuss. Comments are due November 26, 2024. Comments must refer to
Docket No. RM24-7-000, and must include the commenter's name, the
organization they represent, if applicable, and their address in their
comments.
30. All comments will be placed in the Commission's public files
and may be viewed, printed, or downloaded remotely as described in the
Document Availability section below. Commenters on this proposal are
not required to serve copies of their comments on other commenters.
31. The Commission encourages comments to be filed electronically
via the eFiling link on the Commission's website at https://www.ferc.gov. The Commission accepts most standard word processing
formats. Documents created electronically using word processing
software must be filed in native applications or print-to-PDF format
and not in a scanned format. Commenters filing electronically do not
need to make a paper filing.
32. Commenters that are not able to file comments electronically
may file an original of their comment by USPS mail or by courier or
other delivery services. For submission sent via USPS only, filings
should be mailed to: Federal Energy Regulatory Commission, Office of
the Secretary, 888 First Street NE, Washington, DC 20426. Submission of
filings other than by USPS should be delivered to: Federal Energy
Regulatory Commission, 12225 Wilkins Avenue, Rockville, MD 20852.
VII. Document Availability
33. In addition to publishing the full text of this document in the
Federal Register, the Commission provides all interested persons an
opportunity to view and/or print the contents of this document via the
internet through the Commission's Home Page (https://www.ferc.gov).
34. From the Commission's Home Page on the internet, this
information is available on eLibrary. The full text of this document is
available on eLibrary in PDF and Microsoft Word format for viewing,
printing, and/or downloading. To access this document in eLibrary, type
the docket number excluding the last three digits of this document in
the docket number field.
35. User assistance is available for eLibrary and the Commission's
website during normal business hours from FERC Online Support at 202-
502-6652 (toll free at 1-866-208-3676) or email at
[email protected], or the Public Reference Room at (202) 502-
8371, TTY (202) 502-8659. Email the Public Reference Room at
[email protected].
By direction of the Commission.
Issued: September 19, 2024.
Debbie-Anne A. Reese,
Acting Secretary.
[FR Doc. 2024-22231 Filed 9-26-24; 8:45 am]
BILLING CODE 6717-01-P