Supply Chain Risk Management Reliability Standards, 79794-79804 [2024-22230]

Download as PDF 79794 Federal Register / Vol. 89, No. 190 / Tuesday, October 1, 2024 / Proposed Rules Emmonak VOR/DME and the McGrath VORTAC. As amended, V–510 would extend between the McGrath VORTAC and the Big Lake VORTAC. V–510 [Amended] From McGrath, AK, INT McGrath 121° and Big Lake, AK 294° radials; Big Lake, AK. Regulatory Notices and Analyses Issued in Washington, DC, on September 24, 2024. Frank Lias, Manager, Rules and Regulations Group. The FAA has determined that this proposed regulation only involves an established body of technical regulations for which frequent and routine amendments are necessary to keep them operationally current. It, therefore: (1) is not a ‘‘significant regulatory action’’ under Executive Order 12866; (2) is not a ‘‘significant rule’’ under DOT Regulatory Policies and Procedures (44 FR 11034; February 26, 1979); and (3) does not warrant preparation of a regulatory evaluation as the anticipated impact is so minimal. Since this is a routine matter that will only affect air traffic procedures and air navigation, it is certified that this proposed rule, when promulgated, will not have a significant economic impact on a substantial number of small entities under the criteria of the Regulatory Flexibility Act. Environmental Review This proposal will be subject to an environmental analysis in accordance with FAA Order 1050.1F, ‘‘Environmental Impacts: Policies and Procedures’’ prior to any FAA final regulatory action. List of Subjects in 14 CFR Part 71 Airspace, Incorporation by reference, Navigation (air). The Proposed Amendment In consideration of the foregoing, the Federal Aviation Administration proposes to amend 14 CFR part 71 as follows: PART 71—DESIGNATION OF CLASS A, B, C, D, AND E AIRSPACE AREAS; AIR TRAFFIC SERVICE ROUTES; AND REPORTING POINTS 1. The authority citation for 14 CFR part 71 continues to read as follows: ■ Authority: 49 U.S.C. 106(f), 106(g); 40103, 40113, 40120; E.O. 10854, 24 FR 9565, 3 CFR, 1959–1963 Comp., p. 389. khammond on DSKJM1Z7X2PROD with PROPOSALS § 71.1 [Amended] 2. The incorporation by reference in 14 CFR 71.1 of FAA Order JO 7400.11J, Airspace Designations and Reporting Points, dated July 31, 2024, and effective September 15, 2024, is amended as follows: ■ Paragraph 6010(b) Alaskan VOR Federal Airways. * * * VerDate Sep<11>2014 * * 16:54 Sep 30, 2024 Jkt 265001 * * * * * [FR Doc. 2024–22282 Filed 9–30–24; 8:45 am] BILLING CODE 4910–13–P Simon Slobodnik (Technical Information), Office of Electric Reliability, Federal Energy Regulatory Commission, 888 First Street NE, Washington, DC 20426, (202) 502– 6707, simon.slobodnik@ferc.gov Alexandra Holmes (Legal Information), Office of the General Counsel, Federal Energy Regulatory Commission, 888 First Street NE, Washington, DC 20426, (202) 502–6229, alexandra.holmes@ferc.gov SUPPLEMENTARY INFORMATION: DEPARTMENT OF ENERGY Notice of Proposed Rulemaking Federal Energy Regulatory Commission (Issued September 19, 2024) 1. Pursuant to section 215(d)(5) of the Federal Power Act (FPA),1 the Commission proposes to direct the North American Electric Reliability Corporation (NERC), the Commissioncertified Electric Reliability Organization (ERO), to submit new or modified Reliability Standards within 12 months of the effective date of a final rule that address ongoing risks to the reliability and security of the BulkPower System posed by gaps in the Critical Infrastructure Protection (CIP) Reliability Standards related to supply chain risk management (SCRM) (collectively, the SCRM Reliability Standards).2 Specifically, we propose to direct NERC to develop new or modified Reliability Standards to address the: (A) sufficiency of responsible entities’ SCRM plans related to their (1) identification of, (2) assessment of, and (3) response to supply chain risks, and (B) applicability of SCRM Reliability Standards to protected cyber assets (PCA).3 Our proposed directives in this NOPR are forward-looking and objective-driven.4 2. Although the currently effective SCRM Reliability Standards provide a baseline of protection against supply chain threats, there are increasing 18 CFR Part 40 [Docket No. RM24–4–000] Supply Chain Risk Management Reliability Standards Federal Energy Regulatory Commission, DOE. ACTION: Notice of proposed rulemaking. AGENCY: The Federal Energy Regulatory Commission (Commission) proposes to direct the North American Electric Reliability Corporation, the Commission-certified Electric Reliability Organization, to develop and submit for Commission approval new or modified Reliability Standards that address the: sufficiency of responsible entities’ supply chain risk management plans related to the identification of, assessment of, and response to supply chain risks, and applicability of Reliability Standards’ supply chain protections to protected cyber assets. DATES: Comments are due December 2, 2024. ADDRESSES: Comments, identified by docket number, may be filed in the following ways. Electronic filing through https://www.ferc.gov, is preferred. • Electronic Filing: Documents must be filed in acceptable native applications and print-to-PDF, but not in scanned or picture format. • For those unable to file electronically, comments may be filed by USPS mail or by hand (including courier) delivery. Æ Mail via U.S. Postal Service Only: Addressed to: Federal Energy Regulatory Commission, Secretary of the Commission, 888 First Street NE, Washington, DC 20426. Æ Hand (including courier) delivery: Deliver to: Federal Energy Regulatory Commission, 12225 Wilkins Avenue, Rockville, MD 20852. FOR FURTHER INFORMATION CONTACT: SUMMARY: PO 00000 Frm 00010 Fmt 4702 Sfmt 4702 1 16 U.S.C 824o(d)(5); see also 18 CFR 39.5(f). this notice of proposed rulemaking, the term SCRM Reliability Standards includes Reliability Standards CIP–005–7 (Electronic Security Perimeter(s)), CIP–010–4 (Configuration Change Management and Vulnerability Assessments), and CIP–013–2 (Supply Chain Risk Management). 3 The Glossary of Terms Used in NERC Reliability Standards (NERC Glossary) defines PCAs as ‘‘[o]ne or more Cyber Assets connected using a routable protocol within or on an Electronic Security Perimeter that is not part of the highest impact BES Cyber System within the same Electronic Security Perimeter. . . .’’ The NERC Glossary defines Electronic Security Perimeter as ‘‘[t]he logical border surrounding a network to which BES Cyber Systems are connected using a routable protocol.’’ See NERC, Glossary of Terms Used in NERC Reliability Standards (July 2024), https:// www.nerc.com/pa/Stand/Glossary%20 of%20Terms/Glossary_of_Terms.pdf. 4 See Revised Critical Infrastructure Prot. Reliability Standards, Order No. 829, 81 FR 49878 (July 29, 2016), 156 FERC ¶ 61,050, at P 43 (2016). 2 In E:\FR\FM\01OCP1.SGM 01OCP1 Federal Register / Vol. 89, No. 190 / Tuesday, October 1, 2024 / Proposed Rules opportunities for attacks posed by the global supply chain. As we have observed in prior proceedings, while the global supply chain provides the opportunity for significant customer benefits such as low cost, variety of products, and rapid innovation, it also introduces risk to the security and reliability of the Bulk-Power System by facilitating attacks by adversaries.5 Using the global supply chain, adversaries have inserted counterfeit and malicious software, tampered with hardware, and enabled remote access.6 Based on these known risks, over the last decade, the Commission, other Federal agencies, and the energy industry have focused on SCRM and mitigating cybersecurity risks associated with the supply chain for critical infrastructure. In light of the increasing threat environment and the need for improved mitigation strategies, we have identified significant gaps in the provisions of the SCRM Reliability Standards. Specifically, we preliminarily find that gaps remain in the SCRM Reliability Standards related to the: (A) sufficiency of responsible entities’ SCRM plans related to the (1) identification of, (2) assessment of, and (3) response to supply chain risks, and (B) applicability of SCRM Reliability Standards to PCAs. 3. We believe that directing NERC to address these gaps in the SCRM Reliability Standards will strengthen the reliability and security of the BulkPower System. These reliability gaps present an increasingly urgent threat to the Bulk-Power System that requires timely action. As such, we propose to direct NERC to file new or modified Reliability Standards with the Commission within 12 months of the effective date of a final rule addressing the reliability concerns discussed in this NOPR. We seek comments on all aspects of the proposed directive to NERC, including the appropriate deadline by which NERC would file the new or modified Reliability Standards. khammond on DSKJM1Z7X2PROD with PROPOSALS I. Background A. Legal Authority 4. Section 215 of the FPA provides that the Commission may certify an ERO, the purpose of which is to establish and enforce Reliability Standards, which are subject to Commission review and approval. Reliability Standards may be enforced 5 See, e.g., Id. at PP 11, 25; see also, e.g., Supply Chain Risk Mgmt. Reliability Standards, Order No. 850, 83 FR 53992 (Oct. 26, 2018), 165 FERC ¶ 61,020, at P 2 (2018). 6 See infra n.80 (discussing SolarWinds Orion network management software compromise). VerDate Sep<11>2014 16:54 Sep 30, 2024 Jkt 265001 by the ERO, subject to Commission oversight, or by the Commission independently.7 Pursuant to section 215 of the FPA, the Commission established a process to select and certify an ERO,8 and subsequently certified NERC as the ERO.9 5. The Commission has the authority pursuant to section 215(d)(5) of the FPA and consistent with § 39.5(f) of the Commission’s regulations, upon its own motion or upon complaint, to order the ERO to submit to the Commission a proposed Reliability Standard or a modification to a Reliability Standard that addresses a specific matter if the Commission considers such a new or modified Reliability Standard appropriate to carry out section 215 of the FPA.10 Further, pursuant to § 39.5(g) of the Commission’s regulations, when ordering the ERO to submit to the Commission a proposed or modified Reliability Standard that addresses a specific matter, the Commission may order a deadline by which the ERO must submit such Reliability Standard.11 79795 the supply chain is so complex, it is extremely challenging to identify, assess, and respond to risk. The various processes, practices, and methodologies used to do so are collectively referred to as ‘‘SCRM.’’ SCRM includes implementing processes, tools, or techniques that minimize adverse impacts of adversary attacks.14 C. SCRM Reliability Standards 7. The currently effective SCRM Reliability Standards provide a baseline for supply chain risk protection for high and medium impact bulk electric system (BES) Cyber Systems 15 and various associated systems and assets as outlined in each Standard.16 The SCRM Reliability Standards, except for Reliability Standard CIP–005–7, do not include protections for PCAs.17 8. The SCRM Reliability Standards address four security objectives: (1) software integrity and authenticity to mitigate the risk of software made more vulnerable by the insertion of unauthorized malicious code or software patches into the software; (2) B. Supply Chain Risk Management vendor remote access to mitigate the 6. The supply chain refers to the risk of malicious exploitation of a sequence of processes involved in the software backdoor by addressing production and distribution of, inter responsible entities’ logging and alia, industrial control system hardware, controlling all third-party (i.e., vendor) software, and services.12 Such supply initiated remote access sessions; (3) chains are complex, globally information system planning and distributed, and interconnected systems procurement to ensure that responsible with geographically diverse routes that entities consider the risks associated consist of multiple tiers of suppliers with proposed information system who collectively build components planning and system development necessary to deliver final products to actions and to provide broad customers. Further, the origins of programmatic safeguards to mitigate products or components may be vulnerabilities inserted into Bulk-Power intentionally or inadvertently obscured. Certain foreign suppliers may also be www.dni.gov/files/NCSC/documents/supplychain/ subject to policies or laws that compel Risks_From_Foreign_Adversarial_Exposure.pdf. 14 See NIST, Computer Security Resource those suppliers to covertly provide their Center—Definition of Supply Chain Risk governments with customer data, trade Management, https://csrc.nist.gov/glossary/term/ secrets, and intellectual property supply_chain_risk_management. obtained by embedding spyware or 15 Each BES Cyber System, per Reliability other compromising software in Standard CIP–002–5.1a (BES Cyber System Categorization), is placed into one of three impact products, parts, or services.13 Because 7 16 U.S.C. 824o(e). 8 Rules Concerning Certification of the Elec. Reliability Org. & Procs. for the Establishment, Approval, & Enf’t of Elec. Reliability Standards, Order No. 672, 71 FR 8662 (Feb. 17, 2006), 114 FERC ¶ 61,104, order on reh’g, Order No. 672–A, 71 FR 19814 (Apr. 18, 2006), 114 FERC ¶ 61,328 (2006). 9 N. Am. Elec. Reliability Corp., 116 FERC ¶ 61,062, order on reh’g & compliance, 117 FERC ¶ 61,126 (2006), aff’d sub nom. Alcoa, Inc. v. FERC, 564 F.3d 1342 (D.C. Cir. 2009). 10 16 U.S.C. 824o(d)(5); 18 CFR 39.5(f). 11 18 CFR 39.5(g). 12 See, e.g., Order No. 829, 156 FERC ¶ 61,050 at P 4 (discussing the reliability concerns posed by the supply chain). 13 See Office of the Dir. of Nat’l Intelligence, Protecting Critical Supply Chains: Risks from Foreign Adversarial Exposure (2024), https:// PO 00000 Frm 00011 Fmt 4702 Sfmt 4702 categories, high, medium, or low. The purpose of categorizing BES Cyber Systems is to apply cybersecurity requirements consistently, efficiently, and commensurate with the adverse impact that loss, compromise, or misuse of those systems could have on the reliable operation of the Bulk-Power System. At a minimum, all BES Cyber Systems must be categorized as low impact. See Reliability Standard CIP–002–5.1a (Cyber Security—BES Cyber System Categorization), Attachment 1: Impact rating Criteria, https://nerc.com/pa/Stand/Reliability%20 Standards/CIP-002-5.1a.pdf. 16 Order No. 850, 165 FERC ¶ 61,020; Order No 829, 156 FERC ¶ 61,050 (SCRM Reliability Standards require responsible entities to develop and implement SCRM plans that include supply chain management security controls for industrial control system hardware and software, as well as services associated with Bulk-Power System operations). 17 See Reliability Standard CIP–005–7, Requirements R1 and R2. E:\FR\FM\01OCP1.SGM 01OCP1 79796 Federal Register / Vol. 89, No. 190 / Tuesday, October 1, 2024 / Proposed Rules System software or hardware throughout their life cycle; and (4) vendor risk management and procurement controls to address the risk that entities could enter into contracts with vendors who pose significant risks to their systems, as well as the risk that products procured by a responsible entity fail to meet minimum security criteria.18 1. Reliability Standard CIP–005–7 (Electronic Security Perimeter(s)) 9. Reliability Standard CIP–005–7 is applicable to high impact BES Cyber Systems and their associated PCAs and medium impact BES Cyber Systems with external routable connectivity and their associated PCAs. The Standard requires responsible entities to manage electronic access to their BES Cyber Systems and requires each responsible entity to have one or more methods to determine active vendor remote access sessions and one or more methods to disable vendor remote access. Requirements R2 and R3 of Reliability Standard CIP–005–7 work in tandem with Requirement R1.2.6 of Reliability Standard CIP–013–2, described in more detail below, to address vendor remote access controls in the operational phase. Requirements R2 Parts 2.4 and 2.5 of Reliability Standard CIP–005–7 require one or more methods for determining and disabling, respectively, active vendor remote access sessions, including interactive remote access and system-to-system remote access, taking place on a responsible entity’s system. Requirement R3 is applicable to the electronic access control or monitoring systems 19 and physical access control systems 20 associated with high impact BES Cyber Systems and medium impact BES Cyber Systems with external routable connectivity. Requirement R3 includes Parts 3.1 and 3.2 and addresses remote access controls for electronic access control or monitoring systems and physical access control systems 18 Order No. 829, 156 FERC ¶ 61,050 at P 2. defines electronic access control or monitoring systems as ‘‘Cyber Assets that perform electronic access control or electronic access monitoring of the Electronic Security Perimeter(s) or BES Cyber Systems. This includes Intermediate Systems.’’ See NERC Glossary at 12. In Order No. 850, the Commission directed NERC to include electronic access control or monitoring systems within the scope of the SCRM Reliability Standards. Order No. 850, 165 FERC ¶ 61,020 at P 46. The Commission then later approved those modifications. See N. Am. Elec. Reliability Corp., 174 FERC ¶ 61,193, at P 9 (2021). 20 NERC defines physical access control systems as ‘‘Cyber Assets that control, alert, or log access to the Physical Security Perimeter(s), exclusive of locally mounted hardware or devices at the Physical Security Perimeter such as motion sensors, electronic lock control mechanisms, and badge readers.’’ See NERC Glossary at 22. khammond on DSKJM1Z7X2PROD with PROPOSALS 19 NERC VerDate Sep<11>2014 16:54 Sep 30, 2024 Jkt 265001 associated with high impact BES Cyber Systems and medium impact BES Cyber Systems with external routable connectivity. 2. Reliability Standard CIP–010–4 (Configuration Change Management and Vulnerability Assessments) 10. Reliability Standard CIP–010–4 is applicable to high and medium impact BES Cyber Systems and their associated electronic access control or monitoring systems and physical access control systems and requires responsible entities to prevent and detect unauthorized changes to their BES Cyber Systems. This includes requiring that responsible entities verify the identity and integrity of software and its source, when possible, prior to installation. These steps help reduce the likelihood that an attacker could exploit legitimate vendor patch management processes to deliver compromised software updates or patches to a BES Cyber System. 3. Reliability Standard CIP–013–2 (Supply Chain Risk Management) 11. Reliability Standard CIP–013–2 requires each responsible entity to develop a written SCRM plan for its high and medium impact BES Cyber Systems and their associated electronic access control or monitoring systems and physical access control systems. Reliability Standard CIP–013–2 focuses on the steps that responsible entities must take to consider and address cybersecurity risks from vendor products and services during BES Cyber System planning and procurement.21 The goal of the Standard is to ensure that responsible entities establish organizationally-defined processes that integrate a cybersecurity risk management framework into the system development lifecycle.22 The SCRM plan must include processes for procuring and installing vendor equipment and software; identifying and assessing cybersecurity risks; notification, coordination, and disclosure of known vendor vulnerabilities; and verification of the integrity and authenticity of software and patches provided by vendors for use in the BES Cyber Systems and their associated electronic access control or monitoring systems and physical access control systems. 21 Order No. 850, 165 FERC ¶ 61,020 at P 15. 22 Id. PO 00000 Frm 00012 Fmt 4702 Sfmt 4702 D. Ongoing Activities To Mitigate Supply Chain Risks 1. Federal Efforts on SCRM 12. Since approving the SCRM Reliability Standards in 2018, the Commission has continued its focus on identifying additional improvements for addressing the risk posed by the global supply chain. For example, in December of 2022, the Commission convened a joint technical conference with the U.S. Department of Energy to discuss supply chain security challenges, the current SCRM Reliability Standards, and their challenges, gaps, and opportunities for improvement.23 In December of 2023, Commission staff issued a report that included recommendations for users, owners, and operators of the BulkPower System to improve their compliance with CIP Reliability Standards generally, and SCRM specifically.24 Among other things, the 2023 Lessons Learned Report recommended that entities enhance their SCRM programs to include evaluating the risks of existing vendors and developing a plan to mitigate those risks once identified. And in March 2023, the Commission approved modifications to Reliability Standard CIP–003–9 (Security Management Controls), which added new requirements focused on SCRM for low impact BES Cyber Systems.25 13. There has also been recent action in the Federal Government’s broader effort to secure U.S. communications networks and prohibit the use of equipment that could give a foreign adversary the ability to exploit those networks. On May 12, 2021, the President issued Executive Order 14028 on improving the nation’s cybersecurity that directed multiple government agencies to partner with the private sector to enhance cybersecurity through a variety of initiatives.26 Executive Order 14028 requires the Secretary of Commerce and the Director of the National Institute of Standards and Technology (NIST) to create and publish supply chain guidelines that include criteria to evaluate software security, criteria to evaluate security practices of 23 Supply Chain Risk Mgmt. Tech. Conference, Docket No. AD22–12–000 (Dec. 7, 2022), https:// www.ferc.gov/news-events/events/joint-ferc-doesupply-chain-risk-management-technicalconference-12072022. 24 FERC Staff Report, 2023 Lessons Learned from Commission-led CIP Reliability Audits, at 17–19 (Dec. 12, 2023), https://www.ferc.gov/sites/default/ files/2023-12/23_Lessons%20Learned_1211.pdf (2023 Lessons Learned Report). 25 N. Am. Elec. Reliability Corp., 182 FERC ¶ 61,155 (2023). 26 E.O. 14028, 88 FR 26633, 26637 (May 12, 2021). E:\FR\FM\01OCP1.SGM 01OCP1 Federal Register / Vol. 89, No. 190 / Tuesday, October 1, 2024 / Proposed Rules khammond on DSKJM1Z7X2PROD with PROPOSALS software developers and suppliers, and tools or methods to demonstrate conformance with security practices.27 In response to Executive Order 14028, NIST and the Office of Management and Budget (OMB) issued several guidance and memoranda documents to enhance supply chain protections for Federal entities.28 14. Additionally, the Federal Communications Commission (FCC), an independent agency that regulates U.S. interstate and international communications, is also addressing supply chain risks and threats within its jurisdiction. Effective February 6, 2023, the FCC issued a new rule restricting telecommunication and video surveillance equipment produced by entities that pose national security risks from being imported to or sold within the United States.29 Under the rule, the FCC will not issue authorizations for equipment on the ‘‘Covered List’’ that the FCC publishes under the Secure Networks Act.30 On March 8, 2023, the FCC proposed an additional rulemaking seeking input on whether to extend the prohibition to component parts that pose an unacceptable risk to national security.31 27 Id. See also NIST, Improving the Nation’s Cybersecurity: NIST’s Responsibilities Under the May 2021 Executive Order, https://www.nist.gov/itl/ executive-order-14028-improving-nationscybersecurity. 28 E.g., NIST, Secure Software Development Framework (SSDF) Version 1.1 (Feb. 2022), https:// nvlpubs.nist.gov/nistpubs/SpecialPublications/ NIST.SP.800-218.pdf; NIST, Software Supply Chain Security Guidance Under Executive Order 14028 Section 4e (Feb. 2022), https://www.nist.gov/ system/files/documents/2022/02/04/softwaresupply-chain-security-guidance-under-E.O.-14028section-4e.pdf; OMB, Memorandum for the Heads of Executive Departments and Agencies: Protecting Critical Software Through Enhanced Security Measures, M–21–30, 2–3 (Aug. 10, 2021) (OMB Memorandum of August 2021), https:// whitehouse.gov/wp-content/uploads/2021/08/M-2130.pdf (directing Federal agencies to comply with and implement the security measures developed by NIST outlined in the NIST Security Measures for E.O.-Critical Software Use and implement those protections in phases). 29 Under its equipment authorization authority, the FCC requires radio-frequency devices to be authorized by the FCC before being imported or marketed into the United States. 30 FCC, Protecting Against Nat’l Sec. Threats to the Commc’ns Supply Chain Through the Equip. Authorization Program, 88 FR 7592, 7593 (Feb. 6, 2023) (citing Secure Equipment Act of 2021, Pub. L. 117–55, 135 Stat. 423, (Nov. 11, 2021) that requires, among other things, that the FCC publish and periodically update a list of covered equipment that have been determined to pose national security risks and equipment or services produced or provided by entities that meet certain capabilities). 31 FCC, Protecting Against National Security Threats to the Communications Supply Chain Through the Equipment Authorization Program and the Competitive Bidding Program, 88 FR 14312 (Mar. 8, 2023). VerDate Sep<11>2014 16:54 Sep 30, 2024 Jkt 265001 2. NERC Efforts on SCRM 15. Since the Commission directed and then approved the first set of SCRM Reliability Standards, NERC has independently taken additional actions to improve supply chain controls. For example, in 2019, NERC completed a study of supply chain risks including those associated with low impact assets not currently subject to Reliability Standard CIP–013.32 Pursuant to this study, NERC modified Reliability Standard CIP–003 to include supply chain controls for vendor remote access, which the Commission approved in March of 2023.33 16. Separately, stemming in part from cybersecurity events such as the SolarWinds Orion compromise, the NERC Board of Trustees directed NERC staff to complete a review and analysis of the risk posed by low impact BES Cyber Assets and report on whether to modify criteria for determining whether a BES Cyber System be categorized as low impact.34 Based on the resulting Low Impact Criteria Review Report,35 NERC initiated a standards development project to modify Reliability Standard CIP–003. The stated purpose of the project is to further revise CIP–003 to, among other things, improve vendor remote access protections.36 17. Yet another effort regarding supply chain security was NERC’s development of a draft standards authorization request (SAR) to revise Reliability Standard CIP–013–2. On September 20, 2023, NERC staff submitted a draft SAR to the NERC Standards Committee to revise Reliability Standard CIP–013–2.37 The 32 NERC, Supply Chain Risk Assessment: Analysis of Data Collected under the NERC Rules of Procedure Section 1600 Data Request (Dec. 9, 2019), https://www.nerc.com/pa/comp/ SupplyChainRiskMitigationProgramDL/ Supply%20Chain%20Risk%20Assesment%20 Report.pdf. 33 N. Am. Elec. Reliability Corp., 182 FERC ¶ 61,155 (2023). 34 See NERC, Minutes: Board of Trustees, 7 (Feb. 4, 2021), https://www.nerc.com/gov/bot/ Agenda%20highlights%20and%20Mintues %202013/Minutes%20-%20BOT%20Open%20%20Feb%204%202021.pdf. 35 NERC, Low Impact Criteria Review Report: NERC Low Impact Criteria Review Team White Paper (Oct. 2022), https://www.nerc.com/pa/Stand/ Project%202023%2004%20 Modifications%20to%20CIP%20003%20DL/NERC_ LICRT_White_Paper_clean.pdf. 36 NERC, Project 2023–04 Modifications to CIP– 003, https://www.nerc.com/pa/Stand/Pages/Project2023-04-Modifications-to-CIP-003.aspx (stating the purpose and industry need for the modifications to Reliability Standard CIP–003). 37 See NERC, Agenda: Standards Committee Meeting, Agenda Item 6a, 2 (Sept. 20, 2023), https:// www.nerc.com/comm/SC/Agenda%20 Highlights%20and%20Minutes/SC_Agenda_ Package_September_20_2023.pdf (NERC Draft SAR). PO 00000 Frm 00013 Fmt 4702 Sfmt 4702 79797 purpose of the standard development project was to revise ‘‘CIP–013–2 to have complete and accurate assessments of supply chain security risks that reflect actual threat(s) posed to the entity’’ and ‘‘provide triggers on when the supply chain risk assessment(s) must be performed (i.e., planning for procurement, procurement, and installation) and require a response to risks identified.’’ 38 Specifically, the draft SAR project scope was to revise Reliability Standard CIP–013–2 to require entities to: (1) create specific triggers to activate the supply chain risk assessment(s); (2) include the performance of supply chain risk assessment(s) during the different phases of planning for procurement, procurement, installation of equipment/ software/services, and post procurement assessment; (3) include steps to validate the completeness and accuracy of the data, assess the risks, consider the vendor’s mitigation activities, and document and track any residual risks; (4) track and respond to all risks identified; (5) re-assess standing contract risks on a set timeframe; and (6) re-assess time delay installation beyond a set timeframe. The NERC Standards Committee declined to move forward with this SAR and there has been no further activity on this proposed project. 18. In addition to standards development projects, studies, and surveys, and pursuant to a resolution from the NERC Board of Trustees, NERC also initiated a collaborative SCRM program with industry, trade organizations, and key stakeholders to manage the effective mitigation of supply chain risks.39 This program included a study of supply chain risks, communication of those risks to the electric industry, and the development of white papers on topics such as the effectiveness of the SCRM Reliability Standards and SCRM best practices.40 Finally, NERC has also published voluntary security guidelines and whitepapers on topics relevant to supply chain risk management such as 38 Id. 39 See NERC, Proposed Additional Resolutions for Agenda Item 9.a: Cyber Security—Supply Chain Risk Management—CIP–005–6, CIP–010–3, and CIP–013–1: Board of Trustees Meeting (Aug. 10, 2017), https://www.nerc.com/gov/bot/Agenda%20 highlights%20and%20Mintues%202013/ Proposed%20Resolutions%20re%20Supply%20 Chain%20Follow-up%20v2.pdf (NERC SCRM Board Resolution). 40 See NERC, Supply Chain Risk Mitigation Program, https://www.nerc.com/pa/comp/Pages/ Supply-Chain-Risk-Mitigation-Program.aspx. E:\FR\FM\01OCP1.SGM 01OCP1 79798 Federal Register / Vol. 89, No. 190 / Tuesday, October 1, 2024 / Proposed Rules key practices and guidance for responsible entities.41 3. Industry Efforts on SCRM 19. Industry stakeholders have also taken the initiative to develop various guidelines and best practice documents to improve SCRM. For example, the Electric Power Research Institute issued a 2018 report recommending that responsible entities develop and implement supply chain traceability of their systems and components and to consider cloud services as a part of an entity’s supply chain.42 Similarly, Edison Electric Institute released voluntary guidance with model procurement contract language to help responsible entities address cybersecurity supply chain risk with their vendors.43 And the North American Transmission Forum (NATF) developed an ERO-endorsed CIP–013 Implementation Guide,44 as well as several documents pertaining to supply chain risk management that represent approaches that responsible entities may take to comply with Reliability Standard CIP–013 in a systematic and comprehensive manner.45 khammond on DSKJM1Z7X2PROD with PROPOSALS II. Discussion 20. While the SCRM Reliability Standards provide a strong foundation of protection against supply chain threats, we are concerned that there are gaps in the requirements of those Reliability Standards that may lead to a responsible entity’s SCRM plan being insufficient to identify, assess, and respond to SCRM risks. As discussed below, we believe that the SCRM plans required by the currently effective SCRM Reliability Standards are 41 The eight NERC-approved security guidelines include: (1) Cyber Security Risk Management Lifecycle; (2) Open Source Software; (3) Secure Equipment Delivery; (4) Supply Chain Procurement Language; (5) Vendor Incident Response; (6) Vendor Risk Management Lifecycle; (7) Supply Chain Provenance; and (8) Cloud Computing. NERC, Reliability Guidelines, Security Guidelines, Technical Reference Documents, and White Papers, https://www.nerc.com/comm/Pages/Reliability-andSecurity-Guidelines.aspx. 42 Elec. Power Research Inst., Supply Chain Risk Assessment: Final Report (July 2018), https:// www.nerc.com/pa/comp/SupplyChainRisk MitigationProgramDL/EPRI_Supply_Chain_Risk_ Assessment_Final_Report_public.pdf. 43 Edison Elec. Inst., Model Procurement Contract Language Addressing Cybersecurity Supply Chain Risk (Oct. 2022), https://www.eei.org/-/media/ Project/EEI/Documents/Issues-and-Policy/Model-Procurement-Contract.pdf. 44 See NATF, NATF CIP–013 Implementation Guidance: Supply Chain Risk Management Plans (Oct. 2023), https://www.natf.net/industryinitiatives/supply-chain-industry-coordination. 45 Additional NATF documents related to supply chain collaboration are available at https:// www.natf.net/industry-initiatives/supply-chainindustry-coordination. VerDate Sep<11>2014 16:54 Sep 30, 2024 Jkt 265001 insufficient to protect against the myriad of supply chain threats. Further, our concern with the exclusion of PCAs from the SCRM Reliability Standards has grown since initially discussed in Order No. 850. As such, pursuant to section 215(d)(5) of the FPA, we propose to direct NERC to develop new or modified Reliability Standards to address the: (A) sufficiency of responsible entities’ SCRM plans related to the (1) identification of, (2) assessment of, and (3) response to supply chain risks; and (B) applicability of SCRM Reliability Standards to PCAs. 21. We are aware of and appreciate the continuing efforts of NERC, industry, and other Federal agencies to address supply chain risks. In particular, we note that NERC has identified areas for improvement of the SCRM Reliability Standards,46 and NERC and industry continue to develop voluntary guidance or best practices to address supply chain risks. Nonetheless, we do not believe existing efforts sufficiently address known gaps in the SCRM Reliability Standards, and we believe further Commission action is warranted to address them. 22. Similarly, while we view the FCC’s recent actions as beneficial for Bulk-Power System reliability, these actions address only certain aspects of identified supply chain risks. For example, the new FCC rules prohibit import and installation of telecommunications and video surveillance equipment and software produced by a relatively small number of entities. By contrast, the purpose of the SCRM Reliability Standards is to provide risk mitigation against a broader set of potential threats, including risks associated with entities that are not currently banned under the FCC’s authority.47 We therefore believe that it is appropriate to address SCRM gaps that are within our jurisdiction to better protect the security and reliability of the Bulk-Power System. A. Sufficiency of SCRM Plans Related to the Identification of, Assessment of, and Response to Supply Chain Risks 23. As discussed further below, we believe that the lack of clear requirements and criteria in the SCRM Reliability Standards as to how responsible entities should identify, assess, and respond to supply chain risks has left the Bulk-Power System vulnerable to attack. We believe that the proposed directives discussed in this 46 See, e.g., infra n.80 (discussing the Orion software attack); infra n.82 (discussing XZ Utils supply chain attack). 47 See supra n.29. PO 00000 Frm 00014 Fmt 4702 Sfmt 4702 NOPR will address these reliability gaps by providing responsible entities with clear and detailed requirements for what their SCRM plans should include and what their responsibilities are in carrying out those plans. 1. Commission Concerns Regarding Reliability Gaps Within the SCRM Reliability Standards 24. The SCRM Reliability Standards require each responsible entity to develop a SCRM plan to identify and assess supply chain and cybersecurity risks based on certain information collected from its vendors. While providing a baseline of protection, the Reliability Standards do not provide specific requirements as to when and how an entity should identify and assess supply chain risks, nor do the Standards require entities to respond to those risks identified through their SCRM plans. 25. The lack of specific requirements related to the (1) identification of, (2) assessment of, and (3) response to risk is also inconsistent with generally established risk management frameworks. Risk management frameworks generally follow three tenets: identify, assess, and respond.48 A responsible entity’s failure to properly identify and assess supply chain risks could lead to an entity installing vulnerable products and allowing compromise of its systems, ‘‘effectively bypassing security controls established by CIP Reliability Standards.’’ 49 Further, incomplete or inaccurate risk identification may result in entity assessments of the likelihood and potential impact of supply chain risks that do not reflect the actual threat and risk posed to the responsible entity. In the absence of clear criteria, procedures of entities with ad hoc approaches do not include steps to validate the completeness and accuracy of the vendor responses, assess the risks, consider the vendors’ mitigation activities, or respond to any residual risks.50 26. As described in the 2023 Lessons Learned Report, Commission audit staff observed multiple gaps in SCRM. In Fiscal Year 2023, Commission staff 48 For example, the NIST Risk Management Framework includes these three tenants of risk and further breaks them down into a seven-step process that entities can use to manage information security and privacy risk for organizations and systems. NIST, Special Publication 800–37, Revision 2: Risk Management Framework for Information Systems and Organizations, Task R–3, Risk Response at 72 (Dec. 2018), https://nvlpubs.nist.gov/nistpubs/ SpecialPublications/NIST.SP.800-37r2.pdf. (NIST Risk Management Framework). 49 2023 Lessons Learned Report at 17–18. 50 Id. E:\FR\FM\01OCP1.SGM 01OCP1 Federal Register / Vol. 89, No. 190 / Tuesday, October 1, 2024 / Proposed Rules completed non-public audits of several responsible entities to evaluate their compliance with the CIP Reliability Standards. While these audits found that most of the responsible entities were compliant with the SCRM Reliability Standards, there were nevertheless a number of security risks that remained due to the entities’ SCRM processes and procedures.51 27. In particular, staff found a lack of consistency and effectiveness in SCRM plans for evaluating vendors and their supplied equipment and software. While a minority of audited entities had comprehensive vendor risk evaluation processes in place and displayed a consistent application of the risk identification process to each of their vendors, other entities displayed inconsistent and ad hoc vendor risk identification processes. These risk identification processes were typically completed by only using vendor questionnaires.52 Further, using only vendor questionnaires resulted in inconsistency of the information collected and was limited to only ‘‘yes/ no’’ responses regarding the vendors’ security posture. Unlike the approach of relying on a vendor questionnaire, a comprehensive approach may validate the data provided by vendors and consider additional factors (e.g., independent third-party evaluation of products and services) that inform how risks of individual assets impact other assets and systems of assets that reside in the same electronic security perimeter. 28. Commission staff also observed that many SCRM plans did not establish procedures to respond to risks once identified.53 The 2023 Lessons Learned Report documented that audited entities’ SCRM plans did not include processes or procedures to respond to risks identified pursuant to Reliability Standard CIP–013–2, Requirement R1.1.54 A responsible entity has many 51 Id. at 1. at 17–18. 53 Id. Further, many entities did not include processes in their SCRM plans to identify, assess, or respond to risks associated with existing contracts prior to the effective date of the SCRM Reliability Standards, though the Standards neither require entities to respond to risk nor reassess existing contracts. Id. 54 Id. Reliability Standard CIP–013–2, Requirement R1.1, requires entities to develop supply chain cyber security risk management plans that include: [o]ne or more process(es) used in planning for the procurement of BES Cyber Systems and their associated [electronic access control or monitoring systems and physical access control systems] to identify and assess cyber security risk(s) to the Bulk Electric System from vendor products or services resulting from: (i) procuring and installing vendor equipment and software; and (ii) transitions from one vendor(s) to another vendor(s). khammond on DSKJM1Z7X2PROD with PROPOSALS 52 Id. VerDate Sep<11>2014 16:54 Sep 30, 2024 Jkt 265001 options as to how it may respond to risks, including mitigation, acceptance, transfer, or avoidance. Regardless of the chosen option, however, a response typically includes documenting and tracking the risk.55 In instances where a responsible entity has decided that the risk is sufficiently low that no mitigation is required, the entity should document and track its conclusions, such as in a risk register where identified and assessed risks are stored and monitored. As noted in the report, since the SCRM Reliability Standards do not require any action beyond the identification and assessment of risk, responsible entities are not required to take action to respond to or otherwise mitigate identified risks, regardless of severity. Further, staff also found that there were disparities in entity understanding and characterization of risk exposure from existing contracts and vendor relationships that were not fully considered by their supply chain risk management plans, versus those that had complete risk assessments under the parameters required by the criteria in CIP–013. This disparity resulted in entities not having a definitive strategy regarding how they would respond to various risk events posed by potential issues that may arise from existing contracts.56 29. Staff’s observations in the 2023 Lessons Learned report are consistent with gaps identified by NERC staff in its draft SAR proposing to revise Reliability Standard CIP–013–2. Specifically, the draft SAR explained that ‘‘the language in CIP–013–2 Requirement R1 lacks specificity to properly identify, assess, and respond to supply chain security risks.’’ 57 The NERC draft SAR further identified that ‘‘Requirement R1.1 does not indicate how to perform risk identification and assess vendor risks effectively,’’ nor does CIP–013–2 ‘‘contain sufficient triggers requiring [the activation of] an entity’s [SCRM] plan.’’ 58 The draft SAR goes on to explain that implementation of SCRM plans is ‘‘wide ranging and variable’’ and that ‘‘the implemented [i]ndustry supply chain risk processes are ambiguous and generally lack rigor for validating the completeness and accuracy of the data, assessing the risks, considering the vendor’s mitigation activities, and documenting and tracking residual risks.’’ 59 Finally, the draft SAR proposed to initiate a 55 See, e.g., NIST Risk Management Framework, Task R–3, Risk Response at 72. 56 2023 Lessons Learned Report at 17. 57 See NERC Draft SAR, Agenda Item 6a, 2. 58 Id. 59 Id. PO 00000 Frm 00015 Fmt 4702 Sfmt 4702 79799 standard development project to revise Reliability Standard ‘‘CIP–013–2 to have complete and accurate assessments of supply chain security risks that reflect actual threat(s) posed to the entity’’ and ‘‘provide triggers on when the supply chain risk assessment(s) must be performed (i.e., planning for procurement, procurement, and installation) and require a response to risks identified.’’ 60 30. In light of these identified gaps, we are concerned that the existing SCRM Reliability Standards lack a detailed and consistent approach for entities to develop adequate SCRM plans related to the (1) identification of, (2) assessment of, and (3) response to supply chain risk. Specifically, we are concerned that the SCRM Reliability Standards lack clear requirements for when responsible entities should perform risk assessments to identify risks and how those risk assessments should be conducted to properly assess risk. Further, we are concerned that the Reliability Standards lack any requirement for an entity to respond to supply chain risks once identified and assessed, regardless of severity. 2. Proposed Directives 31. To address the reliability and security gaps discussed above, we propose to direct NERC pursuant to section 215(d)(5) of the FPA, to develop new or modified Reliability Standards to address the sufficiency of SCRM plans related to the: (1) identification of, (2) assessment of, and (3) response to supply chain risks. a. Identification 32. We propose to direct NERC to submit to the Commission for approval new or modified Reliability Standards that would establish specific timing requirements for a responsible entity to evaluate its equipment and vendors to better identify supply chain risks. Specifically, we propose to direct NERC to establish a maximum time frame between when an entity performs its initial risk assessment during the procurement process and when it installs the equipment. If an entity does not install the equipment or software within the specified time limit, the entity should be required to perform an updated risk assessment prior to installation. As discussed above, we are concerned that the lack of specific requirements in the SCRM Reliability Standards as to when in the procurement and deployment process an entity must apply its SCRM plan to identify supply chain risks can lead to 60 Id. E:\FR\FM\01OCP1.SGM at 26. 01OCP1 79800 Federal Register / Vol. 89, No. 190 / Tuesday, October 1, 2024 / Proposed Rules khammond on DSKJM1Z7X2PROD with PROPOSALS incomplete or inaccurate risk identification that may result in assessments of supply chain risks that do not reflect the actual threat and risk posed to the responsible entity. We seek comment on what factors should be considered in developing a maximum time frame between the initial risk assessment and installation before entities would be required to perform a subsequent risk assessment. We also seek comment on whether this time frame should vary based on certain factors (e.g., equipment type) and the reasons for any proposed time frame variation. 33. Further, to satisfy the Commission directive, the new or modified Reliability Standards must establish periodic requirements for an entity to reassess the risk associated with vendors, products, and services procured under any contracts for supply chain risks that may have developed since the contract commenced. For example, an entity that has a long-term contract with a vendor would be required to conduct a periodic risk assessment of that contract to identify any new or developed supply chain risks since the initial risk assessment. While this requirement would apply to all vendor, product, and service contracts, including existing contracts, we are not proposing to direct NERC to require entities to abrogate or renegotiate contracts with vendors, suppliers, or other entities. 34. We believe this proposed directive is consistent with Order Nos. 829 and 850 and would strengthen SCRM plans identification, assessment, and response to, evolving supply chain risks associated with long-term standing contracts that may not have been contemplated or in existence at the time the contract commenced. We seek comment on factors to be considered in developing a proposed requirement for entities to reassess their supply chain risks of existing contracts with vendors, including the frequency of those assessments and any specific changed circumstances that should trigger the need for a reassessment (e.g., acquisition or merger of an existing supplier). b. Assessment 35. Next, to satisfy the Commission directive, NERC must submit to the Commission for approval new or modified Reliability Standards that require a responsible entity to establish steps in its SCRM plan to validate the completeness and accuracy of information received from vendors during the procurement process to better inform the identification and assessment of supply chain risks VerDate Sep<11>2014 16:54 Sep 30, 2024 Jkt 265001 associated with vendors’ software, hardware, or services. While we are not proposing to require that entities guarantee the accuracy of information provided by their vendors, we do believe that entities should be required to take certain steps to validate such information. 36. For example, the SCRM plan could require an entity to secure from its vendors: (1) a self-attestation addressing all of the risk questions posed by the responsible entity accompanied by any relevant documentation to support the vendors’ claims; or (2) a certification of an assessment from a qualified auditor, assessor, or other reputable third party addressing all risk questions posed by the responsible entity. Upon receipt of a self-attestation, the responsible entity would review and validate vendors’ responses to ensure that it has complete information to ensure a rigorous risk assessment. This could represent a proactive effort to validate the information being provided by a vendor to ensure that the information the entity is using to identify and assess risks is accurate. In the absence of a selfattestation and supporting documentation provided by a vendor to the responsible entity, the responsible entity could instead accept an independent third-party certification that an assessment was conducted by a qualified auditor, assessor, or other reputable third-party addressing all risk questions posed by the responsible entity. 37. We are concerned that a responsible entity’s failure to take any steps to validate a vendor’s information could lead to an entity failing to properly identify or assess risk posed by that vendor and installing vulnerable products that allow compromise of its systems. Further, the lack of validation could result in entities performing risk assessments based on inaccurate or incomplete information which would not reflect the actual threat and risk posed to the responsible entity. We seek comment on what other types of steps an entity could take to validate the data provided by vendors and how burdensome those steps might be. c. Response 38. Finally, we propose to direct NERC to ensure that the new or modified Reliability Standards require that entities establish a process to document, track, and respond to all identified supply chain risks. We are concerned that the existing SCRM Reliability Standards are inadequate to ensure consistent, timely, and appropriate documented responses to PO 00000 Frm 00016 Fmt 4702 Sfmt 4702 identified vendor risks. We believe that the proposed directive would better align with widely accepted risk management frameworks and address the lack of requirements in the SCRM Reliability Standards for entities to respond to risks once they are identified. 39. A responsible entity can respond to risk in a variety of ways, including by taking specific steps to mitigate the identified security risk (e.g., implementing additional security monitoring of the associated asset or software), transferring the identified security risk (e.g., to a security-as-aservice vendor or through cybersecurity insurance), avoiding the security risk (e.g., by not deploying hardware or software associated with an identified risk), or accepting the security risk, in instances where none of the other responses are possible. Regardless of the approach taken, a responsible entity should document and track its actions.61 Documentation should include what cybersecurity controls are in place or will be put in place to manage the risk while maintaining the overall reliability of the responsible entity’s BES Cyber Systems and associated Cyber Assets. For example, a SCRM plan could include defined processes and tasks to respond to the identified and assessed risk, including maintaining documentation, such as those discussed in table E–6 of the NIST Risk Management Framework.62 Specific mitigation steps could be similar to the mitigation requirements described in Reliability Standard CIP–007–6, Requirement R2.63 We seek comment on 61 Mandatory Reliability Standards for Critical Infrastructure Protection, Order No. 706, 73 FR 7368 (Feb. 7, 2008), 122 FERC ¶ 61,040, at P 377 (2008) (discussing Reliability Standard CIP–003–1 requirement for the development and implementation of a security policy, the Commission states that the goal of documentation and justification for an exception to the policy be that there is ‘‘reasoned decision-making, consistency, and subsequent effectiveness in implementing the policy’’ and that the Commission require[s] that the reasoning be documented to ensure that the responsible entity is indeed implementing the security policy as required by Requirement R1 of CIP–003–1.’’). 62 See NIST Risk Management Framework at 136. 63 Reliability Standard CIP–007–6 (Security Configuration Management), Requirement R2 (Security Patch Management). Requirement R2 Part 2.1 requires a patch management process for tracking, evaluation, and installing cyber security patches for applicable Cyber Assets. Requirement R2 Part 2.2 establishes a maximum window of 35 calendar days to evaluate the security patches that have been released for applicability. Building on Parts 2.1 and 2.2, Requirement R2 Part 2.3 requires one of the following actions: (1) apply the applicable patches; (2) create a dated mitigation plan; or (3) revise an existing mitigation plan. Building on Part 2.3, Requirement R2 Part 2.4 requires for each mitigation plan, to implement the plan within a specified timeframe. E:\FR\FM\01OCP1.SGM 01OCP1 Federal Register / Vol. 89, No. 190 / Tuesday, October 1, 2024 / Proposed Rules whether and how a standard documentation process could be developed to ensure entities can properly track identified risks and mitigate those risks according to the entity’s specific risk assessment. 40. We further propose to direct NERC to submit responsive new or revised SCRM Reliability Standards within 12 months of the effective date of a final rule in this proceeding, given NERC has already begun the work to address several of the proposed directives in its 2023 draft SAR 64 which it may be able to leverage to timely address the risks identified in this NOPR. However, while we propose a compliance deadline of 12 months, we also seek comment on whether a longer timeline (e.g., 18 months) is necessary, as we recognize that NERC is currently devoting resources to other standards development projects with Commissionimposed timelines. B. Applicability of SCRM Requirements to PCAs 1. Prior Activity Regarding PCAs khammond on DSKJM1Z7X2PROD with PROPOSALS 41. PCAs are ancillary equipment that reside behind a responsible entity’s electronic access point 65 within the responsible entity’s BES Cyber Systems. Electronic access points, often firewalls, are important lines of defense for BES Cyber Systems that reside at an electronic security perimeter. The likelihood of PCAs’ compromise through the supply chain has increased in recent years. Because PCAs are located within the electronic security perimeter, the exploitation of PCAs directly puts at risk the interconnected BES Cyber Systems housed in the same electronic security perimeter. A supply chain attack could potentially make use of a compromised PCA to bypass the electronic security perimeter to directly attack medium and high impact BES 64 See NERC Draft SAR, Agenda Item 6a (including in its scope to: (1) create specific triggers to activate the supply chain risk assessment(s); (2) include the performance of supply chain risk assessment(s) during the different phases of planning for procurement, procurement of equipment/software/services, installation, and post procurement assessment; (3) include steps to validate the completeness and accuracy of the data, assess the risks, consider the vendor’s mitigation activities, and document and track any residual risks; (4) track and respond to all risks identified; (5) re-assess standing contract risks on a set timeframe; (6) re-assess time delay installation beyond a set timeframe). 65 NERC defines an electronic access point as a ‘‘Cyber Asset interface on an Electronic Security Perimeter that allows routable communication between Cyber Assets outside an Electronic Security Perimeter and Cyber Assets inside an Electronic Security Perimeter.’’ See NERC Glossary at 12. VerDate Sep<11>2014 16:54 Sep 30, 2024 Jkt 265001 Cyber Systems within the same electronic security perimeter. 42. The Commission initially considered the applicability of the SCRM Reliability Standards to PCAs in Order No. 850 but did not direct NERC to include them in the scope of the SCRM Reliability Standards. At that time, the Commission believed it was appropriate to await the findings of the study evaluating cybersecurity supply chain risks presented by low impact BES Cyber Systems, physical access control systems, and PCAs. 66 Reasoning that the likelihood of PCAs being compromised was lower than the likelihood that electronic access control or monitoring systems would be compromised, the Commission accepted NERC’s commitment, as directed by the NERC Board of Trustees, to study the risk of PCAs in greater depth. The Commission expressed its concern, however, that excluding PCAs may leave a gap in the SCRM Reliability Standards and stated that it would be in a better position to consider whether the inclusion of PCAs would be warranted to protect the reliability of the BulkPower System after reviewing NERC’s findings.67 43. In response to the Commission’s directive, NERC submitted its Supply Chain Risk Report in May 2019.68 The report contained recommendations for actions to address risks associated with certain categories of assets including, among others, PCAs.69 The report stated that, due to the variety of assets that may be categorized as PCAs, it was not possible to clearly define a general risk posed by their potential supply chain vulnerabilities.70 As such, NERC staff recommended that, as a best practice, entities should ‘‘evaluate each PCA type on a case-by-case basis to identify any specific risks associated with [SCRM].’’ 71 The NERC Supply Chain Risks Report also assessed the risks to PCAs posed by common mode vulnerabilities and found that as PCAs are ‘‘often the same cyber asset type as many common BES Cyber Assets,’’ they may act as an attack vector to BES Cyber Systems sharing the same electronic security perimeter.72 The report asserts that the SCRM plan required by Reliability Standard CIP– 66 Order No. 850, 165 FERC ¶ 61,020 at PP 66, 67. See also NERC SCRM Board Resolution. 67 Order No. 850, 165 FERC ¶ 61,020 at P 66. 68 NERC, Cyber Security Supply Chain Risks: Staff Report and Recommended Actions, Docket No. RM17–13–000 (May 28, 2019) (NERC Supply Chain Risks Report). 69 Id. at 2. 70 Id. at 21. 71 Id. 72 Id. at 22. PO 00000 Frm 00017 Fmt 4702 Sfmt 4702 79801 013–1, Requirement R1 could be used effectively to mitigate PCA risks for those PCAs ‘‘obtained under the same [SCRM] procurement plan as BES Cyber Systems associated with high and medium impact BES Cyber Systems.’’ 73 With respect to next steps, the report stated that NERC would continue to develop a guideline for entities to use when evaluating their PCAs and when determining what, if any, additional SCRM protections are needed. NERC added that it would also determine whether to collect additional data regarding PCAs.74 NERC has not yet released any additional guideline documents on PCAs associated with SCRM protections, nor has NERC initiated any additional data collection. 2. Commission Concerns Regarding PCAs 44. Under the existing SCRM Reliability Standards, PCAs receive only limited protections. Specifically, while the SCRM Reliability Standards address four categories of SCRM protections: (1) software integrity and authenticity, (2) vendor remote access protections, (3) information system planning, and (4) vendor risk management and procurement controls—PCAs are only subject to the second category: vendor remote access protections. We believe that the additional protections should apply to PCAs to better mitigate the associated risks and close this known security gap. As such, we preliminarily find that addressing such unprotected PCAs within the SCRM Reliability Standards is necessary to maintain the reliability of the Bulk-Power System in light of evolving threats. 45. As mentioned above, the Commission in Order No. 850 considered but ultimately declined to direct that NERC develop SCRM Reliability Standards that apply to PCAs until the Commission could consider NERC’s Board of Trustees-directed study. After reviewing NERC’s findings, we preliminarily find that the risks associated with PCAs warrant their inclusion in the SCRM Reliability Standards. As discussed below, recent sophisticated supply chain incidents such as SolarWinds highlight the vulnerabilities and need to protect PCAs from supply chain threats. The NERC Supply Chain Risks Report submitted in response to the Commission’s directive in Order No. 850 assessed the risks to PCAs posed by common mode vulnerabilities and found that PCAs share the same risk profile as many BES Cyber Assets that are protected under 73 Id. 74 Id. E:\FR\FM\01OCP1.SGM 01OCP1 khammond on DSKJM1Z7X2PROD with PROPOSALS 79802 Federal Register / Vol. 89, No. 190 / Tuesday, October 1, 2024 / Proposed Rules the SCRM Reliability Standards. NERC further found that due to their shared location within an electronic security perimeter, PCAs may be used as an attack vector to BES Cyber Systems. 46. Responsible entities that have robust processes for the identification and assessment of SCRM risks associated with PCAs are better protected against the unintentional procurement and installation of unsecure equipment or software that could serve as a potential attack vector to compromise medium or high impact BES Cyber Systems residing in the same electronic security perimeter. The Commission reasoned in Order No. 829 that without integrity and authenticity controls: (1) attackers could exploit the legitimate vendor patch management process to deliver compromised software updates or patches to applicable systems; 75 and (2) vendor credentials could be stolen and used to access a BES Cyber System without the responsible entities knowledge and traverse over an unmonitored connection into a responsible entity’s BES Cyber System.76 Responsible entities could unintentionally have procured and installed unsecure equipment or software and may fail to meet minimum security criteria.77 47. Upon reviewing NERC’s report and gaining a better understanding of the risk profile associated with PCAs since Order No. 850, we believe that our reasoning as applied to BES Cyber Systems in Order No. 829 supports the inclusion of PCAs under the protection of the SCRM Reliability Standards because these assets also reside within the same electronic security perimeter as BES Cyber Systems. Accordingly, we believe that all assets within an electronic security perimeter should be assessed for supply chain risk. 48. Moreover, we are not persuaded by the NERC report which demurred from recommending additional SCRM Reliability Standard protections for PCAs. While the NERC report recognized the risks associated with PCAs, it asserted that it is not possible to clearly define a general risk to the Bulk-Power System in the event PCAs are compromised.78 NERC did not recommend revising the SCRM Reliability Standards to include PCAs and instead recommended that entities evaluate PCAs on a voluntary, case-bycase basis for supply chain risks. While we agree with the NERC report that a wide range of assets fall under the 75 Order No. 829, 156 FERC ¶ 61,050 at P 49. P 52. 77 Id. PP 57, 60. 78 NERC Supply Chain Risks Report at 21. 76 Id. VerDate Sep<11>2014 16:54 Sep 30, 2024 Jkt 265001 category of PCA, we also believe that such a wide range of assets allows for a wide range of vulnerabilities, therefore proportionately increasing the risk associated with PCAs as an asset class. We further acknowledge that each PCA type may have a different risk profile based on how it interacts with BES Cyber Systems and their impact on the Bulk-Power System that may present unique challenges during risk assessment. However, because PCAs are a clearly defined class of assets, we are not persuaded that the inability to quantify the risk that PCAs present as an asset class renders infeasible the ability to develop a Reliability Standard that addresses the known SCRM risks associated with PCAs. 49. We do, however, agree with NERC’s assessment in its report regarding the risk posed by common mode vulnerabilities of unprotected PCAs, i.e., that they are often the same Cyber Asset type as many common BES Cyber Assets and that they may act as an attack vector to BES Cyber Systems sharing the same electronic security perimeter. For example, SolarWinds’ Orion software, an enterprise infrastructure monitoring and management platform, was famously compromised by a foreign state actor in 2020. This software would likely be categorized as a PCA if used by a responsible entity and deployed inside an electronic security perimeter.79 While NERC found that this event did not materially or adversely impact BulkPower System operations, a subsequent compromise impacting PCAs could have more severe consequences in the future, including material, adverse impacts on Bulk-Power System operations.80 Similarly, the XZ Utils supply chain attack demonstrates another close call where PCAs could have been affected if the compromise had not been discovered and detected before further exploitation occurred.81 Thus, 79 FERC Staff and the Electricity Information and Analysis Sharing Center, SolarWinds and Related Supply Chain Compromise (July 6, 2021), https:// www.nerc.com/pa/CI/ESISAC/Documents/ SolarWinds%20and%20 Related%20Supply%20Chain%20Compromise%20 White%20Paper.pdf. 80 Robert Walton, NERC finding 25% of utilities exposed to SolarWinds hack indicates growing ICS vulnerabilities, analysts say, Utility Dive (Apr. 15, 2021), https://www.utilitydive.com/news/nercfinding-25-of-utilities-exposed-to-solarwinds-hackindicates-growing/598449/. 81 In this supply chain attack, an unidentified threat actor used social engineering to become an authorized maintainer of XZ Utils, a widely used data compression and decompression library found on many Linux systems. The threat actor then inserted a backdoor into legitimate software updates that would allow them to bypass Secure Shell Protocol authentication and conduct remote code execution on any infected device connected to the PO 00000 Frm 00018 Fmt 4702 Sfmt 4702 addressing supply chain risk of unprotected PCAs that may perform security-critical functions or pose similar significant potential for harm if compromised is critical to maintaining the security of an electronic security perimeter and would improve an entity’s overall security posture. 50. We also agree with NERC’s assertion that the supply chain risks associated with PCAs could be mitigated if responsible entities include PCAs in their existing SCRM plans that inform the procurement of medium and high impact BES Cyber Systems.82 We do not agree, however, that this should be done on a voluntary basis since many PCAs have a similar risk profile to BES Cyber Systems. Finally, we note that applying supply chain protections to PCAs is consistent with risk management practices required for Federal agencies. Specifically, extending supply chain related protections to PCAs aligns with the OMB Memorandum of August 2021 and its phased implementation strategy by ensuring that all software, especially those performing security-critical functions, is fortified against supply chain risks.83 By proactively evaluating the supply chain risks posed by PCAs, the electric sector can address the risk of supply chain attacks, which have been exemplified by incidents like the SolarWinds breach. The OMB Memorandum of August 2021 provides instructions and creates a phased implementation plan for Federal agencies to adopt the security measures required by Executive Order 14028. Included in the initial phase of implementation are software applications that provide network monitoring and configuration services (e.g., PCAs).84 This directive, while binding only on Federal agencies, further supports the extension of SCRM protective measures to PCAs. PCAs, if compromised, could serve as conduits for adversaries to infiltrate BES Cyber Systems, potentially leading to breaches originating from within the electronic security perimeters. 3. Proposed Directives 51. For the reasons set forth above, we preliminarily find that the existing SCRM Reliability Standards are internet. See Cybersecurity and Infrastructure Security Agency, Reported Supply Chain Compromise Affecting XZ Utils Data Compression Library, CVE–2024–3094 (Mar. 29, 2024), https:// www.cisa.gov/news-events/alerts/2024/03/29/ reported-supply-chain-compromise-affecting-xzutils-data-compression-library-cve-2024-3094. 82 NERC Supply Chain Risks Report at 22. 83 See supra n.28. 84 See id. E:\FR\FM\01OCP1.SGM 01OCP1 khammond on DSKJM1Z7X2PROD with PROPOSALS Federal Register / Vol. 89, No. 190 / Tuesday, October 1, 2024 / Proposed Rules inadequate to ensure that PCAs are sufficiently protected from supply chain risk. Because PCAs represent an attack vector to BES Cyber Systems contained within the same electronic security perimeter as the PCAs, the Commission’s concern about the threat that these unprotected assets present to the security and reliability of the BulkPower System has grown since initially discussed in Order No. 850. As discussed above, these risks are highlighted by recent sophisticated incidents such as the SolarWinds software vulnerability and the XZ Utils supply chain attack. While the current SCRM Reliability Standards require entities to protect PCAs’ vendor remote access management, the Reliability Standards should provide a comprehensive protection of PCAs. 52. Accordingly, we propose to direct NERC, pursuant to section 215(d)(5) of the FPA, to modify the SCRM Reliability Standards to include PCAs as applicable assets. Further, we propose to direct NERC to protect PCAs from supply chain risk at the same level as other assets inside an electronic security perimeter (i.e., high and medium impact BES Cyber Systems, electronic access control or monitoring systems, and physical access control systems located inside an electronic security perimeter). Given the broad range of assets that may be categorized as PCAs, we seek comment on potential comprehensive and scalable approaches that could be implemented for identifying and assessing supply chain risks posed by PCAs. Comments on such approaches may inform our directives in a final rule and may also provide valuable input for a possible future NERC standard drafting team tasked with developing directed modifications. Finally, we propose to direct NERC to submit these modifications within 12 months of the effective date of a final rule in this proceeding. respond to this collection of information unless the collection of information displays a valid OMB control number. Comments are solicited on the Commission’s need for the information proposed to be reported, whether the information will have practical utility, ways to enhance the quality, utility, and clarity of the information to be collected, and any suggested methods for minimizing the respondent’s burden, including the use of automated information techniques. 54. The proposal to direct NERC to develop new, or to modify existing, reliability standards (and the corresponding burden) are covered by, and already included in, the existing OMB-approved information collection FERC–725 (Certification of Electric Reliability Organization; Procedures for Electric Reliability Standards; OMB Control No. 1902–0225),87 under Reliability Standards Development.88 The reporting requirements in FERC– 725 include the ERO’s overall responsibility for developing Reliability Standards, such as any Reliability Standards that relate to supply chain risk management. III. Information Collection Statement 53. The information collection requirements contained in this notice of proposed rulemaking are subject to review by the OMB under section 3507(d) of the Paperwork Reduction Act of 1995.85 OMB’s regulations require approval of certain information collection requirements imposed by agency rules.86 Upon approval of a collection of information, OMB will assign an OMB control number and expiration date. Respondents subject to the filing requirements of this proposed rule will not be penalized for failing to V. Regulatory Flexibility Act 57. The Regulatory Flexibility Act of 1980 (RFA) 91 generally requires a 85 44 86 5 U.S.C. 3507(d). CFR 1320.11. VerDate Sep<11>2014 16:54 Sep 30, 2024 Jkt 265001 IV. Environmental Analysis 55. The Commission is required to prepare an Environmental Assessment or an Environmental Impact Statement for any action that may have a significant adverse effect on the human environment.89 56. The Commission has categorically excluded certain actions from this requirement as not having a significant effect on the human environment. Included in the exclusion are rules that are clarifying, corrective, or procedural or that do not substantially change the effect of the regulations being amended.90 The actions proposed herein fall within this categorical exclusion in the Commission’s regulations. 87 Another item for FERC–725 is pending review at this time, and only one item per OMB Control No. can be pending OMB review at a time. In order to submit this NOPR timely to OMB, we are using FERC–725(1B) (a temporary, placeholder information collection number). 88 Reliability Standards development as described in FERC–725 covers standards development initiated by NERC, the Regional Entities, and industry, as well as standards the Commission may direct NERC to develop or modify. 89 Reguls. Implementing the Nat’l Env’t Pol’y Act, Order No. 486, 52 FR 47897 (Dec. 17, 1987), FERC Stats. & Regs. ¶ 30,783 (1987) (cross-referenced at 41 FERC ¶ 61,284). 90 18 CFR 380.4(a)(2)(ii) (2021). 91 5 U.S.C. 601–612. PO 00000 Frm 00019 Fmt 4702 Sfmt 4702 79803 description and analysis of proposed rules that will have significant economic impact on a substantial number of small entities. 58. We are proposing only to direct NERC, the Commission-certified ERO, to develop modified Reliability Standards to improve the sufficiency of the SCRM Plans required by CIP–013–2, and to protect PCAs under the SCRM Reliability Standards. These Standards are only applicable to high and medium impact BES Cyber Systems and their associated systems such as electronic access control or monitoring systems and physical access control systems.92 Therefore, this NOPR will not have a significant or substantial impact on entities other than NERC. Consequently, the Commission certifies that this NOPR will not have a significant economic impact on a substantial number of small entities. 59. Any Reliability Standards proposed by NERC in compliance with this rulemaking will be considered by the Commission in future proceedings. As part of any future proceedings, the Commission will make determinations pertaining to the RFA based on the content of the Reliability Standards proposed by NERC. VI. Comment Procedures 60. The Commission invites interested persons to submit comments on the matters and issues proposed in this rulemaking to be adopted, including any related matters or alternative proposals that commenters may wish to discuss. Comments are due December 2, 2024. Comments must refer to Docket No. RM24–4–000, and must include the commenter’s name, the organization they represent, if applicable, and their address in their comments. All comments will be placed in the Commission’s public files and may be viewed, printed, or downloaded remotely as described in the Document Availability section below. Commenters on this proposal are not required to serve copies of their comments on other commenters. 61. The Commission encourages comments to be filed electronically via the eFiling link on the Commission’s website at https://www.ferc.gov. The Commission accepts most standard word processing formats. Documents 92 Cf. Cyber Security Incident Reporting Reliability Standards, Notice of Proposed Rulemaking, 82 FR 61499 (Dec. 28, 2017), 161 FERC ¶ 61,291 (2017) (proposing to direct NERC to develop and submit modifications to the Reliability Standards to improve mandatory reporting of Cyber Security Incidents, including incidents that might facilitate subsequent efforts to harm the reliable operation of the Bulk-Power System). E:\FR\FM\01OCP1.SGM 01OCP1 79804 Federal Register / Vol. 89, No. 190 / Tuesday, October 1, 2024 / Proposed Rules created electronically using word processing software must be filed in native applications or print-to-PDF format and not in a scanned format. Commenters filing electronically do not need to make a paper filing. 62. Commenters that are not able to file comments electronically may file an original of their comment by USPS mail or by courier-or other delivery services. For submission sent via USPS only, filings should be mailed to: Federal Energy Regulatory Commission, Office of the Secretary, 888 First Street NE, Washington, DC 20426. Submission of filings other than by USPS should be delivered to: Federal Energy Regulatory Commission, 12225 Wilkins Avenue, Rockville, MD 20852. VII. Document Availability 63. In addition to publishing the full text of this document in the Federal Register, the Commission provides all interested persons an opportunity to view and/or print the contents of this document via the internet through the Commission’s Home Page (https:// www.ferc.gov). From the Commission’s Home Page on the internet, this information is available on eLibrary. The full text of this document is available on eLibrary in .pdf and Microsoft Word format for viewing, printing, and/or downloading. To access this document in eLibrary, type the docket number excluding the last three digits of this document in the docket number field. 64. User assistance is available for eLibrary and the Commission’s website during normal business hours from FERC Online Support at (202) 502–6652 (toll free at 1–866–208–3676) or email at ferconlinesupport@ferc.gov, or the Public Reference Room at (202) 502– 8371, TTY (202)502–8659. Email the Public Reference Room at public.referenceroom@ferc.gov. By direction of the Commission. Dated: September 19, 2024. Debbie-Anne A. Reese, Acting Secretary. [FR Doc. 2024–22230 Filed 9–30–24; 8:45 am] khammond on DSKJM1Z7X2PROD with PROPOSALS BILLING CODE 6717–01–P VerDate Sep<11>2014 16:54 Sep 30, 2024 Jkt 265001 Ms. Merlyn Jenkins, phone number: (703) 681–7346, mailing address: Office of the Secretary of Defense for Health Affairs, Health Resources Management and Policy, 1200 Defense Pentagon, Washington, DC 20301–1200; email address: mailto:merlyn.jenkins.civ@ health.mil. FOR FURTHER INFORMATION CONTACT: DEPARTMENT OF DEFENSE Office of the Secretary 32 CFR Part 220 [Docket ID: DoD–2022–HA–0054] RIN 0720–AB87 Medical Billing for Healthcare Services Provided by Department of Defense Military Medical Treatment Facilities to Civilian Non-Beneficiaries Defense Health Agency (DHA), Department of Defense (DoD). ACTION: Proposed rule. AGENCY: As required by the James M. Inhofe National Defense Authorization Act for Fiscal Year 2023 (NDAA–23), this document proposes to reduce financial harm to civilians who are not covered beneficiaries of the Military Health System (MHS), and who receive healthcare services at DoD military medical treatment facilities (MTF). The rulemaking, once finalized, will implement the MHS Modified Payment and Waiver Program (MPWP) through which the DoD will apply a sliding fee scale and/or a catastrophic fee waiver to medical invoices of certain nonbeneficiaries and will accept payments from health insurers of nonbeneficiaries as full payment except for copays, coinsurance, deductibles, nominal fees and non-covered services. DATES: This rulemaking, once finalized, will apply to non-beneficiary patient medical care provided on or after June 21, 2023. Comments to this proposed rule are being accepted and must be received by December 2, 2024. ADDRESSES: You may submit comments, identified by docket number and/or Regulation Identifier Number (RIN) number and title, by any of the following methods: • Federal eRulemaking Portal: https://www.regulations.gov. Follow the instructions for submitting comments. • Mail: Department of Defense, Office of the Assistant to the Secretary of Defense for Privacy, Civil Liberties, and Transparency, Regulatory Directorate, 4800 Mark Center Drive, Attn: Mailbox 24, Suite 08D09, Alexandria, VA 22350– 1700. Instructions: All submissions received must include the agency name and docket number or RIN. The general policy for comments is to make these submissions available for public viewing at https://www.regulations.gov as they are received without change, including any personal identifiers or contact information. SUMMARY: PO 00000 Frm 00020 Fmt 4702 Sfmt 4702 The NDAA–23 also grants the Director of DHA discretionary authority to waive assessment of medical fees of nonbeneficiaries when the healthcare provided enhances the knowledge, skills, and abilities (KSAs) of healthcare providers, as determined by the Director of DHA. The DHA is proposing to implement the amendments to 10 U.S.C. 1079b enacted through the NDAA–23. By statute (Pub. L. 117–263, div. A, title VII, § 716(c), Dec. 23, 2022, 136 Stat. 2661), the sliding fee scale and/or catastrophic fee waivers apply to bills for healthcare services provided at MTFs on or after June 21, 2023. SUPPLEMENTARY INFORMATION: I. Background and Authority Title 10, United States Code (U.S.C.), section 1073d requires the Department of Defense (DoD) to maintain MTFs for the purposes of supporting the medical readiness of the armed forces and the readiness of deployable medical personnel. To maintain medical currency and bolster the KSAs of DoD healthcare providers, the DoD renders emergency, trauma, and other medical services to beneficiaries of the MHS which consist of service members and former service members, and their dependents. The MHS may provide healthcare services to other individuals who are not eligible beneficiaries, in certain circumstances, as authorized by law, and typically on a reimbursable basis (Pub. L. 114–328, 717(c), Dec. 23, 2016, as amended (10 U.S.C. 1071 note); and § 1074(c)). Proposed rules implementing DoD’s authority under 10 U.S.C. 1095 and related provisions of law to compute reasonable charges for inpatient and ambulatory (outpatient) care provided by MTFs, including charges for pharmaceuticals, durable medical equipment, supplies, immunizations, injections, or other medications, are at 32 CFR part 220, last updated on August 20, 2020 (55 FR 21742–21750). Medical billing is structured under three existing healthcare cost recovery programs: Third Party Collections (10 U.S.C. 1095); Medical Services Account (10 U.S.C. 1079b, 1085, and 1104); and Medical Affirmative Claims (42 U.S.C. 2651–2653). The rates used for billing are modeled after the rates published by E:\FR\FM\01OCP1.SGM 01OCP1

Agencies

[Federal Register Volume 89, Number 190 (Tuesday, October 1, 2024)]
[Proposed Rules]
[Pages 79794-79804]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2024-22230]


=======================================================================
-----------------------------------------------------------------------

DEPARTMENT OF ENERGY

Federal Energy Regulatory Commission

18 CFR Part 40

[Docket No. RM24-4-000]


Supply Chain Risk Management Reliability Standards

AGENCY: Federal Energy Regulatory Commission, DOE.

ACTION: Notice of proposed rulemaking.

-----------------------------------------------------------------------

SUMMARY: The Federal Energy Regulatory Commission (Commission) proposes 
to direct the North American Electric Reliability Corporation, the 
Commission-certified Electric Reliability Organization, to develop and 
submit for Commission approval new or modified Reliability Standards 
that address the: sufficiency of responsible entities' supply chain 
risk management plans related to the identification of, assessment of, 
and response to supply chain risks, and applicability of Reliability 
Standards' supply chain protections to protected cyber assets.

DATES: Comments are due December 2, 2024.

ADDRESSES: Comments, identified by docket number, may be filed in the 
following ways. Electronic filing through https://www.ferc.gov, is 
preferred.
     Electronic Filing: Documents must be filed in acceptable 
native applications and print-to-PDF, but not in scanned or picture 
format.
     For those unable to file electronically, comments may be 
filed by USPS mail or by hand (including courier) delivery.
    [cir] Mail via U.S. Postal Service Only: Addressed to: Federal 
Energy Regulatory Commission, Secretary of the Commission, 888 First 
Street NE, Washington, DC 20426.
    [cir] Hand (including courier) delivery: Deliver to: Federal Energy 
Regulatory Commission, 12225 Wilkins Avenue, Rockville, MD 20852.

FOR FURTHER INFORMATION CONTACT: 
Simon Slobodnik (Technical Information), Office of Electric 
Reliability, Federal Energy Regulatory Commission, 888 First Street NE, 
Washington, DC 20426, (202) 502-6707, [email protected]
Alexandra Holmes (Legal Information), Office of the General Counsel, 
Federal Energy Regulatory Commission, 888 First Street NE, Washington, 
DC 20426, (202) 502-6229, [email protected]

SUPPLEMENTARY INFORMATION:

Notice of Proposed Rulemaking

(Issued September 19, 2024)

    1. Pursuant to section 215(d)(5) of the Federal Power Act (FPA),\1\ 
the Commission proposes to direct the North American Electric 
Reliability Corporation (NERC), the Commission-certified Electric 
Reliability Organization (ERO), to submit new or modified Reliability 
Standards within 12 months of the effective date of a final rule that 
address ongoing risks to the reliability and security of the Bulk-Power 
System posed by gaps in the Critical Infrastructure Protection (CIP) 
Reliability Standards related to supply chain risk management (SCRM) 
(collectively, the SCRM Reliability Standards).\2\ Specifically, we 
propose to direct NERC to develop new or modified Reliability Standards 
to address the: (A) sufficiency of responsible entities' SCRM plans 
related to their (1) identification of, (2) assessment of, and (3) 
response to supply chain risks, and (B) applicability of SCRM 
Reliability Standards to protected cyber assets (PCA).\3\ Our proposed 
directives in this NOPR are forward-looking and objective-driven.\4\
---------------------------------------------------------------------------

    \1\ 16 U.S.C 824o(d)(5); see also 18 CFR 39.5(f).
    \2\ In this notice of proposed rulemaking, the term SCRM 
Reliability Standards includes Reliability Standards CIP-005-7 
(Electronic Security Perimeter(s)), CIP-010-4 (Configuration Change 
Management and Vulnerability Assessments), and CIP-013-2 (Supply 
Chain Risk Management).
    \3\ The Glossary of Terms Used in NERC Reliability Standards 
(NERC Glossary) defines PCAs as ``[o]ne or more Cyber Assets 
connected using a routable protocol within or on an Electronic 
Security Perimeter that is not part of the highest impact BES Cyber 
System within the same Electronic Security Perimeter. . . .'' The 
NERC Glossary defines Electronic Security Perimeter as ``[t]he 
logical border surrounding a network to which BES Cyber Systems are 
connected using a routable protocol.'' See NERC, Glossary of Terms 
Used in NERC Reliability Standards (July 2024), https://www.nerc.com/pa/Stand/Glossary%20of%20Terms/Glossary_of_Terms.pdf.
    \4\ See Revised Critical Infrastructure Prot. Reliability 
Standards, Order No. 829, 81 FR 49878 (July 29, 2016), 156 FERC ] 
61,050, at P 43 (2016).
---------------------------------------------------------------------------

    2. Although the currently effective SCRM Reliability Standards 
provide a baseline of protection against supply chain threats, there 
are increasing

[[Page 79795]]

opportunities for attacks posed by the global supply chain. As we have 
observed in prior proceedings, while the global supply chain provides 
the opportunity for significant customer benefits such as low cost, 
variety of products, and rapid innovation, it also introduces risk to 
the security and reliability of the Bulk-Power System by facilitating 
attacks by adversaries.\5\ Using the global supply chain, adversaries 
have inserted counterfeit and malicious software, tampered with 
hardware, and enabled remote access.\6\ Based on these known risks, 
over the last decade, the Commission, other Federal agencies, and the 
energy industry have focused on SCRM and mitigating cybersecurity risks 
associated with the supply chain for critical infrastructure. In light 
of the increasing threat environment and the need for improved 
mitigation strategies, we have identified significant gaps in the 
provisions of the SCRM Reliability Standards. Specifically, we 
preliminarily find that gaps remain in the SCRM Reliability Standards 
related to the: (A) sufficiency of responsible entities' SCRM plans 
related to the (1) identification of, (2) assessment of, and (3) 
response to supply chain risks, and (B) applicability of SCRM 
Reliability Standards to PCAs.
---------------------------------------------------------------------------

    \5\ See, e.g., Id. at PP 11, 25; see also, e.g., Supply Chain 
Risk Mgmt. Reliability Standards, Order No. 850, 83 FR 53992 (Oct. 
26, 2018), 165 FERC ] 61,020, at P 2 (2018).
    \6\ See infra n.80 (discussing SolarWinds Orion network 
management software compromise).
---------------------------------------------------------------------------

    3. We believe that directing NERC to address these gaps in the SCRM 
Reliability Standards will strengthen the reliability and security of 
the Bulk-Power System. These reliability gaps present an increasingly 
urgent threat to the Bulk-Power System that requires timely action. As 
such, we propose to direct NERC to file new or modified Reliability 
Standards with the Commission within 12 months of the effective date of 
a final rule addressing the reliability concerns discussed in this 
NOPR. We seek comments on all aspects of the proposed directive to 
NERC, including the appropriate deadline by which NERC would file the 
new or modified Reliability Standards.

I. Background

A. Legal Authority

    4. Section 215 of the FPA provides that the Commission may certify 
an ERO, the purpose of which is to establish and enforce Reliability 
Standards, which are subject to Commission review and approval. 
Reliability Standards may be enforced by the ERO, subject to Commission 
oversight, or by the Commission independently.\7\ Pursuant to section 
215 of the FPA, the Commission established a process to select and 
certify an ERO,\8\ and subsequently certified NERC as the ERO.\9\
---------------------------------------------------------------------------

    \7\ 16 U.S.C. 824o(e).
    \8\ Rules Concerning Certification of the Elec. Reliability Org. 
& Procs. for the Establishment, Approval, & Enf't of Elec. 
Reliability Standards, Order No. 672, 71 FR 8662 (Feb. 17, 2006), 
114 FERC ] 61,104, order on reh'g, Order No. 672-A, 71 FR 19814 
(Apr. 18, 2006), 114 FERC ] 61,328 (2006).
    \9\ N. Am. Elec. Reliability Corp., 116 FERC ] 61,062, order on 
reh'g & compliance, 117 FERC ] 61,126 (2006), aff'd sub nom. Alcoa, 
Inc. v. FERC, 564 F.3d 1342 (D.C. Cir. 2009).
---------------------------------------------------------------------------

    5. The Commission has the authority pursuant to section 215(d)(5) 
of the FPA and consistent with Sec.  39.5(f) of the Commission's 
regulations, upon its own motion or upon complaint, to order the ERO to 
submit to the Commission a proposed Reliability Standard or a 
modification to a Reliability Standard that addresses a specific matter 
if the Commission considers such a new or modified Reliability Standard 
appropriate to carry out section 215 of the FPA.\10\ Further, pursuant 
to Sec.  39.5(g) of the Commission's regulations, when ordering the ERO 
to submit to the Commission a proposed or modified Reliability Standard 
that addresses a specific matter, the Commission may order a deadline 
by which the ERO must submit such Reliability Standard.\11\
---------------------------------------------------------------------------

    \10\ 16 U.S.C. 824o(d)(5); 18 CFR 39.5(f).
    \11\ 18 CFR 39.5(g).
---------------------------------------------------------------------------

B. Supply Chain Risk Management

    6. The supply chain refers to the sequence of processes involved in 
the production and distribution of, inter alia, industrial control 
system hardware, software, and services.\12\ Such supply chains are 
complex, globally distributed, and interconnected systems with 
geographically diverse routes that consist of multiple tiers of 
suppliers who collectively build components necessary to deliver final 
products to customers. Further, the origins of products or components 
may be intentionally or inadvertently obscured. Certain foreign 
suppliers may also be subject to policies or laws that compel those 
suppliers to covertly provide their governments with customer data, 
trade secrets, and intellectual property obtained by embedding spyware 
or other compromising software in products, parts, or services.\13\ 
Because the supply chain is so complex, it is extremely challenging to 
identify, assess, and respond to risk. The various processes, 
practices, and methodologies used to do so are collectively referred to 
as ``SCRM.'' SCRM includes implementing processes, tools, or techniques 
that minimize adverse impacts of adversary attacks.\14\
---------------------------------------------------------------------------

    \12\ See, e.g., Order No. 829, 156 FERC ] 61,050 at P 4 
(discussing the reliability concerns posed by the supply chain).
    \13\ See Office of the Dir. of Nat'l Intelligence, Protecting 
Critical Supply Chains: Risks from Foreign Adversarial Exposure 
(2024), https://www.dni.gov/files/NCSC/documents/supplychain/Risks_From_Foreign_Adversarial_Exposure.pdf.
    \14\ See NIST, Computer Security Resource Center--Definition of 
Supply Chain Risk Management, https://csrc.nist.gov/glossary/term/supply_chain_risk_management.
---------------------------------------------------------------------------

C. SCRM Reliability Standards

    7. The currently effective SCRM Reliability Standards provide a 
baseline for supply chain risk protection for high and medium impact 
bulk electric system (BES) Cyber Systems \15\ and various associated 
systems and assets as outlined in each Standard.\16\ The SCRM 
Reliability Standards, except for Reliability Standard CIP-005-7, do 
not include protections for PCAs.\17\
---------------------------------------------------------------------------

    \15\ Each BES Cyber System, per Reliability Standard CIP-002-
5.1a (BES Cyber System Categorization), is placed into one of three 
impact categories, high, medium, or low. The purpose of categorizing 
BES Cyber Systems is to apply cybersecurity requirements 
consistently, efficiently, and commensurate with the adverse impact 
that loss, compromise, or misuse of those systems could have on the 
reliable operation of the Bulk-Power System. At a minimum, all BES 
Cyber Systems must be categorized as low impact. See Reliability 
Standard CIP-002-5.1a (Cyber Security--BES Cyber System 
Categorization), Attachment 1: Impact rating Criteria, https://nerc.com/pa/Stand/Reliability%20Standards/CIP-002-5.1a.pdf.
    \16\ Order No. 850, 165 FERC ] 61,020; Order No 829, 156 FERC ] 
61,050 (SCRM Reliability Standards require responsible entities to 
develop and implement SCRM plans that include supply chain 
management security controls for industrial control system hardware 
and software, as well as services associated with Bulk-Power System 
operations).
    \17\ See Reliability Standard CIP-005-7, Requirements R1 and R2.
---------------------------------------------------------------------------

    8. The SCRM Reliability Standards address four security objectives: 
(1) software integrity and authenticity to mitigate the risk of 
software made more vulnerable by the insertion of unauthorized 
malicious code or software patches into the software; (2) vendor remote 
access to mitigate the risk of malicious exploitation of a software 
backdoor by addressing responsible entities' logging and controlling 
all third-party (i.e., vendor) initiated remote access sessions; (3) 
information system planning and procurement to ensure that responsible 
entities consider the risks associated with proposed information system 
planning and system development actions and to provide broad 
programmatic safeguards to mitigate vulnerabilities inserted into Bulk-
Power

[[Page 79796]]

System software or hardware throughout their life cycle; and (4) vendor 
risk management and procurement controls to address the risk that 
entities could enter into contracts with vendors who pose significant 
risks to their systems, as well as the risk that products procured by a 
responsible entity fail to meet minimum security criteria.\18\
---------------------------------------------------------------------------

    \18\ Order No. 829, 156 FERC ] 61,050 at P 2.
---------------------------------------------------------------------------

1. Reliability Standard CIP-005-7 (Electronic Security Perimeter(s))
    9. Reliability Standard CIP-005-7 is applicable to high impact BES 
Cyber Systems and their associated PCAs and medium impact BES Cyber 
Systems with external routable connectivity and their associated PCAs. 
The Standard requires responsible entities to manage electronic access 
to their BES Cyber Systems and requires each responsible entity to have 
one or more methods to determine active vendor remote access sessions 
and one or more methods to disable vendor remote access. Requirements 
R2 and R3 of Reliability Standard CIP-005-7 work in tandem with 
Requirement R1.2.6 of Reliability Standard CIP-013-2, described in more 
detail below, to address vendor remote access controls in the 
operational phase. Requirements R2 Parts 2.4 and 2.5 of Reliability 
Standard CIP-005-7 require one or more methods for determining and 
disabling, respectively, active vendor remote access sessions, 
including interactive remote access and system-to-system remote access, 
taking place on a responsible entity's system. Requirement R3 is 
applicable to the electronic access control or monitoring systems \19\ 
and physical access control systems \20\ associated with high impact 
BES Cyber Systems and medium impact BES Cyber Systems with external 
routable connectivity. Requirement R3 includes Parts 3.1 and 3.2 and 
addresses remote access controls for electronic access control or 
monitoring systems and physical access control systems associated with 
high impact BES Cyber Systems and medium impact BES Cyber Systems with 
external routable connectivity.
---------------------------------------------------------------------------

    \19\ NERC defines electronic access control or monitoring 
systems as ``Cyber Assets that perform electronic access control or 
electronic access monitoring of the Electronic Security Perimeter(s) 
or BES Cyber Systems. This includes Intermediate Systems.'' See NERC 
Glossary at 12. In Order No. 850, the Commission directed NERC to 
include electronic access control or monitoring systems within the 
scope of the SCRM Reliability Standards. Order No. 850, 165 FERC ] 
61,020 at P 46. The Commission then later approved those 
modifications. See N. Am. Elec. Reliability Corp., 174 FERC ] 
61,193, at P 9 (2021).
    \20\ NERC defines physical access control systems as ``Cyber 
Assets that control, alert, or log access to the Physical Security 
Perimeter(s), exclusive of locally mounted hardware or devices at 
the Physical Security Perimeter such as motion sensors, electronic 
lock control mechanisms, and badge readers.'' See NERC Glossary at 
22.
---------------------------------------------------------------------------

2. Reliability Standard CIP-010-4 (Configuration Change Management and 
Vulnerability Assessments)
    10. Reliability Standard CIP-010-4 is applicable to high and medium 
impact BES Cyber Systems and their associated electronic access control 
or monitoring systems and physical access control systems and requires 
responsible entities to prevent and detect unauthorized changes to 
their BES Cyber Systems. This includes requiring that responsible 
entities verify the identity and integrity of software and its source, 
when possible, prior to installation. These steps help reduce the 
likelihood that an attacker could exploit legitimate vendor patch 
management processes to deliver compromised software updates or patches 
to a BES Cyber System.
3. Reliability Standard CIP-013-2 (Supply Chain Risk Management)
    11. Reliability Standard CIP-013-2 requires each responsible entity 
to develop a written SCRM plan for its high and medium impact BES Cyber 
Systems and their associated electronic access control or monitoring 
systems and physical access control systems. Reliability Standard CIP-
013-2 focuses on the steps that responsible entities must take to 
consider and address cybersecurity risks from vendor products and 
services during BES Cyber System planning and procurement.\21\ The goal 
of the Standard is to ensure that responsible entities establish 
organizationally-defined processes that integrate a cybersecurity risk 
management framework into the system development lifecycle.\22\ The 
SCRM plan must include processes for procuring and installing vendor 
equipment and software; identifying and assessing cybersecurity risks; 
notification, coordination, and disclosure of known vendor 
vulnerabilities; and verification of the integrity and authenticity of 
software and patches provided by vendors for use in the BES Cyber 
Systems and their associated electronic access control or monitoring 
systems and physical access control systems.
---------------------------------------------------------------------------

    \21\ Order No. 850, 165 FERC ] 61,020 at P 15.
    \22\ Id.
---------------------------------------------------------------------------

D. Ongoing Activities To Mitigate Supply Chain Risks

1. Federal Efforts on SCRM
    12. Since approving the SCRM Reliability Standards in 2018, the 
Commission has continued its focus on identifying additional 
improvements for addressing the risk posed by the global supply chain. 
For example, in December of 2022, the Commission convened a joint 
technical conference with the U.S. Department of Energy to discuss 
supply chain security challenges, the current SCRM Reliability 
Standards, and their challenges, gaps, and opportunities for 
improvement.\23\ In December of 2023, Commission staff issued a report 
that included recommendations for users, owners, and operators of the 
Bulk-Power System to improve their compliance with CIP Reliability 
Standards generally, and SCRM specifically.\24\ Among other things, the 
2023 Lessons Learned Report recommended that entities enhance their 
SCRM programs to include evaluating the risks of existing vendors and 
developing a plan to mitigate those risks once identified. And in March 
2023, the Commission approved modifications to Reliability Standard 
CIP-003-9 (Security Management Controls), which added new requirements 
focused on SCRM for low impact BES Cyber Systems.\25\
---------------------------------------------------------------------------

    \23\ Supply Chain Risk Mgmt. Tech. Conference, Docket No. AD22-
12-000 (Dec. 7, 2022), https://www.ferc.gov/news-events/events/joint-ferc-doe-supply-chain-risk-management-technical-conference-12072022.
    \24\ FERC Staff Report, 2023 Lessons Learned from Commission-led 
CIP Reliability Audits, at 17-19 (Dec. 12, 2023), https://www.ferc.gov/sites/default/files/2023-12/23_Lessons%20Learned_1211.pdf (2023 Lessons Learned Report).
    \25\ N. Am. Elec. Reliability Corp., 182 FERC ] 61,155 (2023).
---------------------------------------------------------------------------

    13. There has also been recent action in the Federal Government's 
broader effort to secure U.S. communications networks and prohibit the 
use of equipment that could give a foreign adversary the ability to 
exploit those networks. On May 12, 2021, the President issued Executive 
Order 14028 on improving the nation's cybersecurity that directed 
multiple government agencies to partner with the private sector to 
enhance cybersecurity through a variety of initiatives.\26\ Executive 
Order 14028 requires the Secretary of Commerce and the Director of the 
National Institute of Standards and Technology (NIST) to create and 
publish supply chain guidelines that include criteria to evaluate 
software security, criteria to evaluate security practices of

[[Page 79797]]

software developers and suppliers, and tools or methods to demonstrate 
conformance with security practices.\27\ In response to Executive Order 
14028, NIST and the Office of Management and Budget (OMB) issued 
several guidance and memoranda documents to enhance supply chain 
protections for Federal entities.\28\
---------------------------------------------------------------------------

    \26\ E.O. 14028, 88 FR 26633, 26637 (May 12, 2021).
    \27\ Id. See also NIST, Improving the Nation's Cybersecurity: 
NIST's Responsibilities Under the May 2021 Executive Order, https://www.nist.gov/itl/executive-order-14028-improving-nations-cybersecurity.
    \28\ E.g., NIST, Secure Software Development Framework (SSDF) 
Version 1.1 (Feb. 2022), https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-218.pdf; NIST, Software Supply Chain 
Security Guidance Under Executive Order 14028 Section 4e (Feb. 
2022), https://www.nist.gov/system/files/documents/2022/02/04/software-supply-chain-security-guidance-under-E.O.-14028-section-4e.pdf; OMB, Memorandum for the Heads of Executive Departments and 
Agencies: Protecting Critical Software Through Enhanced Security 
Measures, M-21-30, 2-3 (Aug. 10, 2021) (OMB Memorandum of August 
2021), https://whitehouse.gov/wp-content/uploads/2021/08/M-21-30.pdf 
(directing Federal agencies to comply with and implement the 
security measures developed by NIST outlined in the NIST Security 
Measures for E.O.-Critical Software Use and implement those 
protections in phases).
---------------------------------------------------------------------------

    14. Additionally, the Federal Communications Commission (FCC), an 
independent agency that regulates U.S. interstate and international 
communications, is also addressing supply chain risks and threats 
within its jurisdiction. Effective February 6, 2023, the FCC issued a 
new rule restricting telecommunication and video surveillance equipment 
produced by entities that pose national security risks from being 
imported to or sold within the United States.\29\ Under the rule, the 
FCC will not issue authorizations for equipment on the ``Covered List'' 
that the FCC publishes under the Secure Networks Act.\30\ On March 8, 
2023, the FCC proposed an additional rulemaking seeking input on 
whether to extend the prohibition to component parts that pose an 
unacceptable risk to national security.\31\
---------------------------------------------------------------------------

    \29\ Under its equipment authorization authority, the FCC 
requires radio-frequency devices to be authorized by the FCC before 
being imported or marketed into the United States.
    \30\ FCC, Protecting Against Nat'l Sec. Threats to the Commc'ns 
Supply Chain Through the Equip. Authorization Program, 88 FR 7592, 
7593 (Feb. 6, 2023) (citing Secure Equipment Act of 2021, Pub. L. 
117-55, 135 Stat. 423, (Nov. 11, 2021) that requires, among other 
things, that the FCC publish and periodically update a list of 
covered equipment that have been determined to pose national 
security risks and equipment or services produced or provided by 
entities that meet certain capabilities).
    \31\ FCC, Protecting Against National Security Threats to the 
Communications Supply Chain Through the Equipment Authorization 
Program and the Competitive Bidding Program, 88 FR 14312 (Mar. 8, 
2023).
---------------------------------------------------------------------------

2. NERC Efforts on SCRM
    15. Since the Commission directed and then approved the first set 
of SCRM Reliability Standards, NERC has independently taken additional 
actions to improve supply chain controls. For example, in 2019, NERC 
completed a study of supply chain risks including those associated with 
low impact assets not currently subject to Reliability Standard CIP-
013.\32\ Pursuant to this study, NERC modified Reliability Standard 
CIP-003 to include supply chain controls for vendor remote access, 
which the Commission approved in March of 2023.\33\
---------------------------------------------------------------------------

    \32\ NERC, Supply Chain Risk Assessment: Analysis of Data 
Collected under the NERC Rules of Procedure Section 1600 Data 
Request (Dec. 9, 2019), https://www.nerc.com/pa/comp/SupplyChainRiskMitigationProgramDL/Supply%20Chain%20Risk%20Assesment%20Report.pdf.
    \33\ N. Am. Elec. Reliability Corp., 182 FERC ] 61,155 (2023).
---------------------------------------------------------------------------

    16. Separately, stemming in part from cybersecurity events such as 
the SolarWinds Orion compromise, the NERC Board of Trustees directed 
NERC staff to complete a review and analysis of the risk posed by low 
impact BES Cyber Assets and report on whether to modify criteria for 
determining whether a BES Cyber System be categorized as low 
impact.\34\ Based on the resulting Low Impact Criteria Review 
Report,\35\ NERC initiated a standards development project to modify 
Reliability Standard CIP-003. The stated purpose of the project is to 
further revise CIP-003 to, among other things, improve vendor remote 
access protections.\36\
---------------------------------------------------------------------------

    \34\ See NERC, Minutes: Board of Trustees, 7 (Feb. 4, 2021), 
https://www.nerc.com/gov/bot/Agenda%20highlights%20and%20Mintues%202013/Minutes%20-%20BOT%20Open%20-%20Feb%204%202021.pdf.
    \35\ NERC, Low Impact Criteria Review Report: NERC Low Impact 
Criteria Review Team White Paper (Oct. 2022), https://www.nerc.com/pa/Stand/Project%202023%2004%20Modifications%20to%20CIP%20003%20DL/NERC_LICRT_White_Paper_clean.pdf.
    \36\ NERC, Project 2023-04 Modifications to CIP-003, https://www.nerc.com/pa/Stand/Pages/Project-2023-04-Modifications-to-CIP-003.aspx (stating the purpose and industry need for the 
modifications to Reliability Standard CIP-003).
---------------------------------------------------------------------------

    17. Yet another effort regarding supply chain security was NERC's 
development of a draft standards authorization request (SAR) to revise 
Reliability Standard CIP-013-2. On September 20, 2023, NERC staff 
submitted a draft SAR to the NERC Standards Committee to revise 
Reliability Standard CIP-013-2.\37\ The purpose of the standard 
development project was to revise ``CIP-013-2 to have complete and 
accurate assessments of supply chain security risks that reflect actual 
threat(s) posed to the entity'' and ``provide triggers on when the 
supply chain risk assessment(s) must be performed (i.e., planning for 
procurement, procurement, and installation) and require a response to 
risks identified.'' \38\ Specifically, the draft SAR project scope was 
to revise Reliability Standard CIP-013-2 to require entities to: (1) 
create specific triggers to activate the supply chain risk 
assessment(s); (2) include the performance of supply chain risk 
assessment(s) during the different phases of planning for procurement, 
procurement, installation of equipment/software/services, and post 
procurement assessment; (3) include steps to validate the completeness 
and accuracy of the data, assess the risks, consider the vendor's 
mitigation activities, and document and track any residual risks; (4) 
track and respond to all risks identified; (5) re-assess standing 
contract risks on a set timeframe; and (6) re-assess time delay 
installation beyond a set timeframe. The NERC Standards Committee 
declined to move forward with this SAR and there has been no further 
activity on this proposed project.
---------------------------------------------------------------------------

    \37\ See NERC, Agenda: Standards Committee Meeting, Agenda Item 
6a, 2 (Sept. 20, 2023), https://www.nerc.com/comm/SC/Agenda%20Highlights%20and%20Minutes/SC_Agenda_Package_September_20_2023.pdf (NERC Draft SAR).
    \38\ Id.
---------------------------------------------------------------------------

    18. In addition to standards development projects, studies, and 
surveys, and pursuant to a resolution from the NERC Board of Trustees, 
NERC also initiated a collaborative SCRM program with industry, trade 
organizations, and key stakeholders to manage the effective mitigation 
of supply chain risks.\39\ This program included a study of supply 
chain risks, communication of those risks to the electric industry, and 
the development of white papers on topics such as the effectiveness of 
the SCRM Reliability Standards and SCRM best practices.\40\ Finally, 
NERC has also published voluntary security guidelines and whitepapers 
on topics relevant to supply chain risk management such as

[[Page 79798]]

key practices and guidance for responsible entities.\41\
---------------------------------------------------------------------------

    \39\ See NERC, Proposed Additional Resolutions for Agenda Item 
9.a: Cyber Security--Supply Chain Risk Management--CIP-005-6, CIP-
010-3, and CIP-013-1: Board of Trustees Meeting (Aug. 10, 2017), 
https://www.nerc.com/gov/bot/Agenda%20highlights%20and%20Mintues%202013/Proposed%20Resolutions%20re%20Supply%20Chain%20Follow-up%20v2.pdf 
(NERC SCRM Board Resolution).
    \40\ See NERC, Supply Chain Risk Mitigation Program, https://www.nerc.com/pa/comp/Pages/Supply-Chain-Risk-Mitigation-Program.aspx.
    \41\ The eight NERC-approved security guidelines include: (1) 
Cyber Security Risk Management Lifecycle; (2) Open Source Software; 
(3) Secure Equipment Delivery; (4) Supply Chain Procurement 
Language; (5) Vendor Incident Response; (6) Vendor Risk Management 
Lifecycle; (7) Supply Chain Provenance; and (8) Cloud Computing. 
NERC, Reliability Guidelines, Security Guidelines, Technical 
Reference Documents, and White Papers, https://www.nerc.com/comm/Pages/Reliability-and-Security-Guidelines.aspx.
---------------------------------------------------------------------------

3. Industry Efforts on SCRM
    19. Industry stakeholders have also taken the initiative to develop 
various guidelines and best practice documents to improve SCRM. For 
example, the Electric Power Research Institute issued a 2018 report 
recommending that responsible entities develop and implement supply 
chain traceability of their systems and components and to consider 
cloud services as a part of an entity's supply chain.\42\ Similarly, 
Edison Electric Institute released voluntary guidance with model 
procurement contract language to help responsible entities address 
cybersecurity supply chain risk with their vendors.\43\ And the North 
American Transmission Forum (NATF) developed an ERO-endorsed CIP-013 
Implementation Guide,\44\ as well as several documents pertaining to 
supply chain risk management that represent approaches that responsible 
entities may take to comply with Reliability Standard CIP-013 in a 
systematic and comprehensive manner.\45\
---------------------------------------------------------------------------

    \42\ Elec. Power Research Inst., Supply Chain Risk Assessment: 
Final Report (July 2018), https://www.nerc.com/pa/comp/SupplyChainRiskMitigationProgramDL/EPRI_Supply_Chain_Risk_Assessment_Final_Report_public.pdf.
    \43\ Edison Elec. Inst., Model Procurement Contract Language 
Addressing Cybersecurity Supply Chain Risk (Oct. 2022), https://
www.eei.org/-/media/Project/EEI/Documents/Issues-and-Policy/Model_
Procurement-Contract.pdf.
    \44\ See NATF, NATF CIP-013 Implementation Guidance: Supply 
Chain Risk Management Plans (Oct. 2023), https://www.natf.net/industry-initiatives/supply-chain-industry-coordination.
    \45\ Additional NATF documents related to supply chain 
collaboration are available at https://www.natf.net/industry-initiatives/supply-chain-industry-coordination.
---------------------------------------------------------------------------

II. Discussion

    20. While the SCRM Reliability Standards provide a strong 
foundation of protection against supply chain threats, we are concerned 
that there are gaps in the requirements of those Reliability Standards 
that may lead to a responsible entity's SCRM plan being insufficient to 
identify, assess, and respond to SCRM risks. As discussed below, we 
believe that the SCRM plans required by the currently effective SCRM 
Reliability Standards are insufficient to protect against the myriad of 
supply chain threats. Further, our concern with the exclusion of PCAs 
from the SCRM Reliability Standards has grown since initially discussed 
in Order No. 850. As such, pursuant to section 215(d)(5) of the FPA, we 
propose to direct NERC to develop new or modified Reliability Standards 
to address the: (A) sufficiency of responsible entities' SCRM plans 
related to the (1) identification of, (2) assessment of, and (3) 
response to supply chain risks; and (B) applicability of SCRM 
Reliability Standards to PCAs.
    21. We are aware of and appreciate the continuing efforts of NERC, 
industry, and other Federal agencies to address supply chain risks. In 
particular, we note that NERC has identified areas for improvement of 
the SCRM Reliability Standards,\46\ and NERC and industry continue to 
develop voluntary guidance or best practices to address supply chain 
risks. Nonetheless, we do not believe existing efforts sufficiently 
address known gaps in the SCRM Reliability Standards, and we believe 
further Commission action is warranted to address them.
---------------------------------------------------------------------------

    \46\ See, e.g., infra n.80 (discussing the Orion software 
attack); infra n.82 (discussing XZ Utils supply chain attack).
---------------------------------------------------------------------------

    22. Similarly, while we view the FCC's recent actions as beneficial 
for Bulk-Power System reliability, these actions address only certain 
aspects of identified supply chain risks. For example, the new FCC 
rules prohibit import and installation of telecommunications and video 
surveillance equipment and software produced by a relatively small 
number of entities. By contrast, the purpose of the SCRM Reliability 
Standards is to provide risk mitigation against a broader set of 
potential threats, including risks associated with entities that are 
not currently banned under the FCC's authority.\47\ We therefore 
believe that it is appropriate to address SCRM gaps that are within our 
jurisdiction to better protect the security and reliability of the 
Bulk-Power System.
---------------------------------------------------------------------------

    \47\ See supra n.29.
---------------------------------------------------------------------------

A. Sufficiency of SCRM Plans Related to the Identification of, 
Assessment of, and Response to Supply Chain Risks

    23. As discussed further below, we believe that the lack of clear 
requirements and criteria in the SCRM Reliability Standards as to how 
responsible entities should identify, assess, and respond to supply 
chain risks has left the Bulk-Power System vulnerable to attack. We 
believe that the proposed directives discussed in this NOPR will 
address these reliability gaps by providing responsible entities with 
clear and detailed requirements for what their SCRM plans should 
include and what their responsibilities are in carrying out those 
plans.
1. Commission Concerns Regarding Reliability Gaps Within the SCRM 
Reliability Standards
    24. The SCRM Reliability Standards require each responsible entity 
to develop a SCRM plan to identify and assess supply chain and 
cybersecurity risks based on certain information collected from its 
vendors. While providing a baseline of protection, the Reliability 
Standards do not provide specific requirements as to when and how an 
entity should identify and assess supply chain risks, nor do the 
Standards require entities to respond to those risks identified through 
their SCRM plans.
    25. The lack of specific requirements related to the (1) 
identification of, (2) assessment of, and (3) response to risk is also 
inconsistent with generally established risk management frameworks. 
Risk management frameworks generally follow three tenets: identify, 
assess, and respond.\48\ A responsible entity's failure to properly 
identify and assess supply chain risks could lead to an entity 
installing vulnerable products and allowing compromise of its systems, 
``effectively bypassing security controls established by CIP 
Reliability Standards.'' \49\ Further, incomplete or inaccurate risk 
identification may result in entity assessments of the likelihood and 
potential impact of supply chain risks that do not reflect the actual 
threat and risk posed to the responsible entity. In the absence of 
clear criteria, procedures of entities with ad hoc approaches do not 
include steps to validate the completeness and accuracy of the vendor 
responses, assess the risks, consider the vendors' mitigation 
activities, or respond to any residual risks.\50\
---------------------------------------------------------------------------

    \48\ For example, the NIST Risk Management Framework includes 
these three tenants of risk and further breaks them down into a 
seven-step process that entities can use to manage information 
security and privacy risk for organizations and systems. NIST, 
Special Publication 800-37, Revision 2: Risk Management Framework 
for Information Systems and Organizations, Task R-3, Risk Response 
at 72 (Dec. 2018), https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf. (NIST Risk Management 
Framework).
    \49\ 2023 Lessons Learned Report at 17-18.
    \50\ Id.
---------------------------------------------------------------------------

    26. As described in the 2023 Lessons Learned Report, Commission 
audit staff observed multiple gaps in SCRM. In Fiscal Year 2023, 
Commission staff

[[Page 79799]]

completed non-public audits of several responsible entities to evaluate 
their compliance with the CIP Reliability Standards. While these audits 
found that most of the responsible entities were compliant with the 
SCRM Reliability Standards, there were nevertheless a number of 
security risks that remained due to the entities' SCRM processes and 
procedures.\51\
---------------------------------------------------------------------------

    \51\ Id. at 1.
---------------------------------------------------------------------------

    27. In particular, staff found a lack of consistency and 
effectiveness in SCRM plans for evaluating vendors and their supplied 
equipment and software. While a minority of audited entities had 
comprehensive vendor risk evaluation processes in place and displayed a 
consistent application of the risk identification process to each of 
their vendors, other entities displayed inconsistent and ad hoc vendor 
risk identification processes. These risk identification processes were 
typically completed by only using vendor questionnaires.\52\ Further, 
using only vendor questionnaires resulted in inconsistency of the 
information collected and was limited to only ``yes/no'' responses 
regarding the vendors' security posture. Unlike the approach of relying 
on a vendor questionnaire, a comprehensive approach may validate the 
data provided by vendors and consider additional factors (e.g., 
independent third-party evaluation of products and services) that 
inform how risks of individual assets impact other assets and systems 
of assets that reside in the same electronic security perimeter.
---------------------------------------------------------------------------

    \52\ Id. at 17-18.
---------------------------------------------------------------------------

    28. Commission staff also observed that many SCRM plans did not 
establish procedures to respond to risks once identified.\53\ The 2023 
Lessons Learned Report documented that audited entities' SCRM plans did 
not include processes or procedures to respond to risks identified 
pursuant to Reliability Standard CIP-013-2, Requirement R1.1.\54\ A 
responsible entity has many options as to how it may respond to risks, 
including mitigation, acceptance, transfer, or avoidance. Regardless of 
the chosen option, however, a response typically includes documenting 
and tracking the risk.\55\ In instances where a responsible entity has 
decided that the risk is sufficiently low that no mitigation is 
required, the entity should document and track its conclusions, such as 
in a risk register where identified and assessed risks are stored and 
monitored. As noted in the report, since the SCRM Reliability Standards 
do not require any action beyond the identification and assessment of 
risk, responsible entities are not required to take action to respond 
to or otherwise mitigate identified risks, regardless of severity. 
Further, staff also found that there were disparities in entity 
understanding and characterization of risk exposure from existing 
contracts and vendor relationships that were not fully considered by 
their supply chain risk management plans, versus those that had 
complete risk assessments under the parameters required by the criteria 
in CIP-013. This disparity resulted in entities not having a definitive 
strategy regarding how they would respond to various risk events posed 
by potential issues that may arise from existing contracts.\56\
---------------------------------------------------------------------------

    \53\ Id. Further, many entities did not include processes in 
their SCRM plans to identify, assess, or respond to risks associated 
with existing contracts prior to the effective date of the SCRM 
Reliability Standards, though the Standards neither require entities 
to respond to risk nor reassess existing contracts. Id.
    \54\ Id. Reliability Standard CIP-013-2, Requirement R1.1, 
requires entities to develop supply chain cyber security risk 
management plans that include:
    [o]ne or more process(es) used in planning for the procurement 
of BES Cyber Systems and their associated [electronic access control 
or monitoring systems and physical access control systems] to 
identify and assess cyber security risk(s) to the Bulk Electric 
System from vendor products or services resulting from: (i) 
procuring and installing vendor equipment and software; and (ii) 
transitions from one vendor(s) to another vendor(s).
    \55\ See, e.g., NIST Risk Management Framework, Task R-3, Risk 
Response at 72.
    \56\ 2023 Lessons Learned Report at 17.
---------------------------------------------------------------------------

    29. Staff's observations in the 2023 Lessons Learned report are 
consistent with gaps identified by NERC staff in its draft SAR 
proposing to revise Reliability Standard CIP-013-2. Specifically, the 
draft SAR explained that ``the language in CIP-013-2 Requirement R1 
lacks specificity to properly identify, assess, and respond to supply 
chain security risks.'' \57\ The NERC draft SAR further identified that 
``Requirement R1.1 does not indicate how to perform risk identification 
and assess vendor risks effectively,'' nor does CIP-013-2 ``contain 
sufficient triggers requiring [the activation of] an entity's [SCRM] 
plan.'' \58\ The draft SAR goes on to explain that implementation of 
SCRM plans is ``wide ranging and variable'' and that ``the implemented 
[i]ndustry supply chain risk processes are ambiguous and generally lack 
rigor for validating the completeness and accuracy of the data, 
assessing the risks, considering the vendor's mitigation activities, 
and documenting and tracking residual risks.'' \59\ Finally, the draft 
SAR proposed to initiate a standard development project to revise 
Reliability Standard ``CIP-013-2 to have complete and accurate 
assessments of supply chain security risks that reflect actual 
threat(s) posed to the entity'' and ``provide triggers on when the 
supply chain risk assessment(s) must be performed (i.e., planning for 
procurement, procurement, and installation) and require a response to 
risks identified.'' \60\
---------------------------------------------------------------------------

    \57\ See NERC Draft SAR, Agenda Item 6a, 2.
    \58\ Id.
    \59\ Id.
    \60\ Id. at 26.
---------------------------------------------------------------------------

    30. In light of these identified gaps, we are concerned that the 
existing SCRM Reliability Standards lack a detailed and consistent 
approach for entities to develop adequate SCRM plans related to the (1) 
identification of, (2) assessment of, and (3) response to supply chain 
risk. Specifically, we are concerned that the SCRM Reliability 
Standards lack clear requirements for when responsible entities should 
perform risk assessments to identify risks and how those risk 
assessments should be conducted to properly assess risk. Further, we 
are concerned that the Reliability Standards lack any requirement for 
an entity to respond to supply chain risks once identified and 
assessed, regardless of severity.
2. Proposed Directives
    31. To address the reliability and security gaps discussed above, 
we propose to direct NERC pursuant to section 215(d)(5) of the FPA, to 
develop new or modified Reliability Standards to address the 
sufficiency of SCRM plans related to the: (1) identification of, (2) 
assessment of, and (3) response to supply chain risks.
a. Identification
    32. We propose to direct NERC to submit to the Commission for 
approval new or modified Reliability Standards that would establish 
specific timing requirements for a responsible entity to evaluate its 
equipment and vendors to better identify supply chain risks. 
Specifically, we propose to direct NERC to establish a maximum time 
frame between when an entity performs its initial risk assessment 
during the procurement process and when it installs the equipment. If 
an entity does not install the equipment or software within the 
specified time limit, the entity should be required to perform an 
updated risk assessment prior to installation. As discussed above, we 
are concerned that the lack of specific requirements in the SCRM 
Reliability Standards as to when in the procurement and deployment 
process an entity must apply its SCRM plan to identify supply chain 
risks can lead to

[[Page 79800]]

incomplete or inaccurate risk identification that may result in 
assessments of supply chain risks that do not reflect the actual threat 
and risk posed to the responsible entity. We seek comment on what 
factors should be considered in developing a maximum time frame between 
the initial risk assessment and installation before entities would be 
required to perform a subsequent risk assessment. We also seek comment 
on whether this time frame should vary based on certain factors (e.g., 
equipment type) and the reasons for any proposed time frame variation.
    33. Further, to satisfy the Commission directive, the new or 
modified Reliability Standards must establish periodic requirements for 
an entity to reassess the risk associated with vendors, products, and 
services procured under any contracts for supply chain risks that may 
have developed since the contract commenced. For example, an entity 
that has a long-term contract with a vendor would be required to 
conduct a periodic risk assessment of that contract to identify any new 
or developed supply chain risks since the initial risk assessment. 
While this requirement would apply to all vendor, product, and service 
contracts, including existing contracts, we are not proposing to direct 
NERC to require entities to abrogate or renegotiate contracts with 
vendors, suppliers, or other entities.
    34. We believe this proposed directive is consistent with Order 
Nos. 829 and 850 and would strengthen SCRM plans identification, 
assessment, and response to, evolving supply chain risks associated 
with long-term standing contracts that may not have been contemplated 
or in existence at the time the contract commenced. We seek comment on 
factors to be considered in developing a proposed requirement for 
entities to reassess their supply chain risks of existing contracts 
with vendors, including the frequency of those assessments and any 
specific changed circumstances that should trigger the need for a 
reassessment (e.g., acquisition or merger of an existing supplier).
b. Assessment
    35. Next, to satisfy the Commission directive, NERC must submit to 
the Commission for approval new or modified Reliability Standards that 
require a responsible entity to establish steps in its SCRM plan to 
validate the completeness and accuracy of information received from 
vendors during the procurement process to better inform the 
identification and assessment of supply chain risks associated with 
vendors' software, hardware, or services. While we are not proposing to 
require that entities guarantee the accuracy of information provided by 
their vendors, we do believe that entities should be required to take 
certain steps to validate such information.
    36. For example, the SCRM plan could require an entity to secure 
from its vendors: (1) a self-attestation addressing all of the risk 
questions posed by the responsible entity accompanied by any relevant 
documentation to support the vendors' claims; or (2) a certification of 
an assessment from a qualified auditor, assessor, or other reputable 
third party addressing all risk questions posed by the responsible 
entity. Upon receipt of a self-attestation, the responsible entity 
would review and validate vendors' responses to ensure that it has 
complete information to ensure a rigorous risk assessment. This could 
represent a proactive effort to validate the information being provided 
by a vendor to ensure that the information the entity is using to 
identify and assess risks is accurate. In the absence of a self-
attestation and supporting documentation provided by a vendor to the 
responsible entity, the responsible entity could instead accept an 
independent third-party certification that an assessment was conducted 
by a qualified auditor, assessor, or other reputable third-party 
addressing all risk questions posed by the responsible entity.
    37. We are concerned that a responsible entity's failure to take 
any steps to validate a vendor's information could lead to an entity 
failing to properly identify or assess risk posed by that vendor and 
installing vulnerable products that allow compromise of its systems. 
Further, the lack of validation could result in entities performing 
risk assessments based on inaccurate or incomplete information which 
would not reflect the actual threat and risk posed to the responsible 
entity. We seek comment on what other types of steps an entity could 
take to validate the data provided by vendors and how burdensome those 
steps might be.
c. Response
    38. Finally, we propose to direct NERC to ensure that the new or 
modified Reliability Standards require that entities establish a 
process to document, track, and respond to all identified supply chain 
risks. We are concerned that the existing SCRM Reliability Standards 
are inadequate to ensure consistent, timely, and appropriate documented 
responses to identified vendor risks. We believe that the proposed 
directive would better align with widely accepted risk management 
frameworks and address the lack of requirements in the SCRM Reliability 
Standards for entities to respond to risks once they are identified.
    39. A responsible entity can respond to risk in a variety of ways, 
including by taking specific steps to mitigate the identified security 
risk (e.g., implementing additional security monitoring of the 
associated asset or software), transferring the identified security 
risk (e.g., to a security-as-a-service vendor or through cybersecurity 
insurance), avoiding the security risk (e.g., by not deploying hardware 
or software associated with an identified risk), or accepting the 
security risk, in instances where none of the other responses are 
possible. Regardless of the approach taken, a responsible entity should 
document and track its actions.\61\ Documentation should include what 
cybersecurity controls are in place or will be put in place to manage 
the risk while maintaining the overall reliability of the responsible 
entity's BES Cyber Systems and associated Cyber Assets. For example, a 
SCRM plan could include defined processes and tasks to respond to the 
identified and assessed risk, including maintaining documentation, such 
as those discussed in table E-6 of the NIST Risk Management 
Framework.\62\ Specific mitigation steps could be similar to the 
mitigation requirements described in Reliability Standard CIP-007-6, 
Requirement R2.\63\ We seek comment on

[[Page 79801]]

whether and how a standard documentation process could be developed to 
ensure entities can properly track identified risks and mitigate those 
risks according to the entity's specific risk assessment.
---------------------------------------------------------------------------

    \61\ Mandatory Reliability Standards for Critical Infrastructure 
Protection, Order No. 706, 73 FR 7368 (Feb. 7, 2008), 122 FERC ] 
61,040, at P 377 (2008) (discussing Reliability Standard CIP-003-1 
requirement for the development and implementation of a security 
policy, the Commission states that the goal of documentation and 
justification for an exception to the policy be that there is 
``reasoned decision-making, consistency, and subsequent 
effectiveness in implementing the policy'' and that the Commission 
require[s] that the reasoning be documented to ensure that the 
responsible entity is indeed implementing the security policy as 
required by Requirement R1 of CIP-003-1.'').
    \62\ See NIST Risk Management Framework at 136.
    \63\ Reliability Standard CIP-007-6 (Security Configuration 
Management), Requirement R2 (Security Patch Management). Requirement 
R2 Part 2.1 requires a patch management process for tracking, 
evaluation, and installing cyber security patches for applicable 
Cyber Assets. Requirement R2 Part 2.2 establishes a maximum window 
of 35 calendar days to evaluate the security patches that have been 
released for applicability. Building on Parts 2.1 and 2.2, 
Requirement R2 Part 2.3 requires one of the following actions: (1) 
apply the applicable patches; (2) create a dated mitigation plan; or 
(3) revise an existing mitigation plan. Building on Part 2.3, 
Requirement R2 Part 2.4 requires for each mitigation plan, to 
implement the plan within a specified timeframe.
---------------------------------------------------------------------------

    40. We further propose to direct NERC to submit responsive new or 
revised SCRM Reliability Standards within 12 months of the effective 
date of a final rule in this proceeding, given NERC has already begun 
the work to address several of the proposed directives in its 2023 
draft SAR \64\ which it may be able to leverage to timely address the 
risks identified in this NOPR. However, while we propose a compliance 
deadline of 12 months, we also seek comment on whether a longer 
timeline (e.g., 18 months) is necessary, as we recognize that NERC is 
currently devoting resources to other standards development projects 
with Commission-imposed timelines.
---------------------------------------------------------------------------

    \64\ See NERC Draft SAR, Agenda Item 6a (including in its scope 
to: (1) create specific triggers to activate the supply chain risk 
assessment(s); (2) include the performance of supply chain risk 
assessment(s) during the different phases of planning for 
procurement, procurement of equipment/software/services, 
installation, and post procurement assessment; (3) include steps to 
validate the completeness and accuracy of the data, assess the 
risks, consider the vendor's mitigation activities, and document and 
track any residual risks; (4) track and respond to all risks 
identified; (5) re-assess standing contract risks on a set 
timeframe; (6) re-assess time delay installation beyond a set 
timeframe).
---------------------------------------------------------------------------

B. Applicability of SCRM Requirements to PCAs

1. Prior Activity Regarding PCAs
    41. PCAs are ancillary equipment that reside behind a responsible 
entity's electronic access point \65\ within the responsible entity's 
BES Cyber Systems. Electronic access points, often firewalls, are 
important lines of defense for BES Cyber Systems that reside at an 
electronic security perimeter. The likelihood of PCAs' compromise 
through the supply chain has increased in recent years. Because PCAs 
are located within the electronic security perimeter, the exploitation 
of PCAs directly puts at risk the interconnected BES Cyber Systems 
housed in the same electronic security perimeter. A supply chain attack 
could potentially make use of a compromised PCA to bypass the 
electronic security perimeter to directly attack medium and high impact 
BES Cyber Systems within the same electronic security perimeter.
---------------------------------------------------------------------------

    \65\ NERC defines an electronic access point as a ``Cyber Asset 
interface on an Electronic Security Perimeter that allows routable 
communication between Cyber Assets outside an Electronic Security 
Perimeter and Cyber Assets inside an Electronic Security 
Perimeter.'' See NERC Glossary at 12.
---------------------------------------------------------------------------

    42. The Commission initially considered the applicability of the 
SCRM Reliability Standards to PCAs in Order No. 850 but did not direct 
NERC to include them in the scope of the SCRM Reliability Standards. At 
that time, the Commission believed it was appropriate to await the 
findings of the study evaluating cybersecurity supply chain risks 
presented by low impact BES Cyber Systems, physical access control 
systems, and PCAs. \66\ Reasoning that the likelihood of PCAs being 
compromised was lower than the likelihood that electronic access 
control or monitoring systems would be compromised, the Commission 
accepted NERC's commitment, as directed by the NERC Board of Trustees, 
to study the risk of PCAs in greater depth. The Commission expressed 
its concern, however, that excluding PCAs may leave a gap in the SCRM 
Reliability Standards and stated that it would be in a better position 
to consider whether the inclusion of PCAs would be warranted to protect 
the reliability of the Bulk-Power System after reviewing NERC's 
findings.\67\
---------------------------------------------------------------------------

    \66\ Order No. 850, 165 FERC ] 61,020 at PP 66, 67. See also 
NERC SCRM Board Resolution.
    \67\ Order No. 850, 165 FERC ] 61,020 at P 66.
---------------------------------------------------------------------------

    43. In response to the Commission's directive, NERC submitted its 
Supply Chain Risk Report in May 2019.\68\ The report contained 
recommendations for actions to address risks associated with certain 
categories of assets including, among others, PCAs.\69\ The report 
stated that, due to the variety of assets that may be categorized as 
PCAs, it was not possible to clearly define a general risk posed by 
their potential supply chain vulnerabilities.\70\ As such, NERC staff 
recommended that, as a best practice, entities should ``evaluate each 
PCA type on a case-by-case basis to identify any specific risks 
associated with [SCRM].'' \71\ The NERC Supply Chain Risks Report also 
assessed the risks to PCAs posed by common mode vulnerabilities and 
found that as PCAs are ``often the same cyber asset type as many common 
BES Cyber Assets,'' they may act as an attack vector to BES Cyber 
Systems sharing the same electronic security perimeter.\72\
---------------------------------------------------------------------------

    \68\ NERC, Cyber Security Supply Chain Risks: Staff Report and 
Recommended Actions, Docket No. RM17-13-000 (May 28, 2019) (NERC 
Supply Chain Risks Report).
    \69\ Id. at 2.
    \70\ Id. at 21.
    \71\ Id.
    \72\ Id. at 22.
---------------------------------------------------------------------------

    The report asserts that the SCRM plan required by Reliability 
Standard CIP-013-1, Requirement R1 could be used effectively to 
mitigate PCA risks for those PCAs ``obtained under the same [SCRM] 
procurement plan as BES Cyber Systems associated with high and medium 
impact BES Cyber Systems.'' \73\ With respect to next steps, the report 
stated that NERC would continue to develop a guideline for entities to 
use when evaluating their PCAs and when determining what, if any, 
additional SCRM protections are needed. NERC added that it would also 
determine whether to collect additional data regarding PCAs.\74\ NERC 
has not yet released any additional guideline documents on PCAs 
associated with SCRM protections, nor has NERC initiated any additional 
data collection.
---------------------------------------------------------------------------

    \73\ Id.
    \74\ Id.
---------------------------------------------------------------------------

2. Commission Concerns Regarding PCAs
    44. Under the existing SCRM Reliability Standards, PCAs receive 
only limited protections. Specifically, while the SCRM Reliability 
Standards address four categories of SCRM protections: (1) software 
integrity and authenticity, (2) vendor remote access protections, (3) 
information system planning, and (4) vendor risk management and 
procurement controls--PCAs are only subject to the second category: 
vendor remote access protections. We believe that the additional 
protections should apply to PCAs to better mitigate the associated 
risks and close this known security gap. As such, we preliminarily find 
that addressing such unprotected PCAs within the SCRM Reliability 
Standards is necessary to maintain the reliability of the Bulk-Power 
System in light of evolving threats.
    45. As mentioned above, the Commission in Order No. 850 considered 
but ultimately declined to direct that NERC develop SCRM Reliability 
Standards that apply to PCAs until the Commission could consider NERC's 
Board of Trustees-directed study. After reviewing NERC's findings, we 
preliminarily find that the risks associated with PCAs warrant their 
inclusion in the SCRM Reliability Standards. As discussed below, recent 
sophisticated supply chain incidents such as SolarWinds highlight the 
vulnerabilities and need to protect PCAs from supply chain threats. The 
NERC Supply Chain Risks Report submitted in response to the 
Commission's directive in Order No. 850 assessed the risks to PCAs 
posed by common mode vulnerabilities and found that PCAs share the same 
risk profile as many BES Cyber Assets that are protected under

[[Page 79802]]

the SCRM Reliability Standards. NERC further found that due to their 
shared location within an electronic security perimeter, PCAs may be 
used as an attack vector to BES Cyber Systems.
    46. Responsible entities that have robust processes for the 
identification and assessment of SCRM risks associated with PCAs are 
better protected against the unintentional procurement and installation 
of unsecure equipment or software that could serve as a potential 
attack vector to compromise medium or high impact BES Cyber Systems 
residing in the same electronic security perimeter. The Commission 
reasoned in Order No. 829 that without integrity and authenticity 
controls: (1) attackers could exploit the legitimate vendor patch 
management process to deliver compromised software updates or patches 
to applicable systems; \75\ and (2) vendor credentials could be stolen 
and used to access a BES Cyber System without the responsible entities 
knowledge and traverse over an unmonitored connection into a 
responsible entity's BES Cyber System.\76\ Responsible entities could 
unintentionally have procured and installed unsecure equipment or 
software and may fail to meet minimum security criteria.\77\
---------------------------------------------------------------------------

    \75\ Order No. 829, 156 FERC ] 61,050 at P 49.
    \76\ Id. P 52.
    \77\ Id. PP 57, 60.
---------------------------------------------------------------------------

    47. Upon reviewing NERC's report and gaining a better understanding 
of the risk profile associated with PCAs since Order No. 850, we 
believe that our reasoning as applied to BES Cyber Systems in Order No. 
829 supports the inclusion of PCAs under the protection of the SCRM 
Reliability Standards because these assets also reside within the same 
electronic security perimeter as BES Cyber Systems. Accordingly, we 
believe that all assets within an electronic security perimeter should 
be assessed for supply chain risk.
    48. Moreover, we are not persuaded by the NERC report which 
demurred from recommending additional SCRM Reliability Standard 
protections for PCAs. While the NERC report recognized the risks 
associated with PCAs, it asserted that it is not possible to clearly 
define a general risk to the Bulk-Power System in the event PCAs are 
compromised.\78\ NERC did not recommend revising the SCRM Reliability 
Standards to include PCAs and instead recommended that entities 
evaluate PCAs on a voluntary, case-by-case basis for supply chain 
risks. While we agree with the NERC report that a wide range of assets 
fall under the category of PCA, we also believe that such a wide range 
of assets allows for a wide range of vulnerabilities, therefore 
proportionately increasing the risk associated with PCAs as an asset 
class. We further acknowledge that each PCA type may have a different 
risk profile based on how it interacts with BES Cyber Systems and their 
impact on the Bulk-Power System that may present unique challenges 
during risk assessment. However, because PCAs are a clearly defined 
class of assets, we are not persuaded that the inability to quantify 
the risk that PCAs present as an asset class renders infeasible the 
ability to develop a Reliability Standard that addresses the known SCRM 
risks associated with PCAs.
---------------------------------------------------------------------------

    \78\ NERC Supply Chain Risks Report at 21.
---------------------------------------------------------------------------

    49. We do, however, agree with NERC's assessment in its report 
regarding the risk posed by common mode vulnerabilities of unprotected 
PCAs, i.e., that they are often the same Cyber Asset type as many 
common BES Cyber Assets and that they may act as an attack vector to 
BES Cyber Systems sharing the same electronic security perimeter. For 
example, SolarWinds' Orion software, an enterprise infrastructure 
monitoring and management platform, was famously compromised by a 
foreign state actor in 2020. This software would likely be categorized 
as a PCA if used by a responsible entity and deployed inside an 
electronic security perimeter.\79\ While NERC found that this event did 
not materially or adversely impact Bulk-Power System operations, a 
subsequent compromise impacting PCAs could have more severe 
consequences in the future, including material, adverse impacts on 
Bulk-Power System operations.\80\ Similarly, the XZ Utils supply chain 
attack demonstrates another close call where PCAs could have been 
affected if the compromise had not been discovered and detected before 
further exploitation occurred.\81\ Thus, addressing supply chain risk 
of unprotected PCAs that may perform security-critical functions or 
pose similar significant potential for harm if compromised is critical 
to maintaining the security of an electronic security perimeter and 
would improve an entity's overall security posture.
---------------------------------------------------------------------------

    \79\ FERC Staff and the Electricity Information and Analysis 
Sharing Center, SolarWinds and Related Supply Chain Compromise (July 
6, 2021), https://www.nerc.com/pa/CI/ESISAC/Documents/SolarWinds%20and%20Related%20Supply%20Chain%20Compromise%20White%20Paper.pdf.
    \80\ Robert Walton, NERC finding 25% of utilities exposed to 
SolarWinds hack indicates growing ICS vulnerabilities, analysts say, 
Utility Dive (Apr. 15, 2021), https://www.utilitydive.com/news/nerc-finding-25-of-utilities-exposed-to-solarwinds-hack-indicates-growing/598449/.
    \81\ In this supply chain attack, an unidentified threat actor 
used social engineering to become an authorized maintainer of XZ 
Utils, a widely used data compression and decompression library 
found on many Linux systems. The threat actor then inserted a 
backdoor into legitimate software updates that would allow them to 
bypass Secure Shell Protocol authentication and conduct remote code 
execution on any infected device connected to the internet. See 
Cybersecurity and Infrastructure Security Agency, Reported Supply 
Chain Compromise Affecting XZ Utils Data Compression Library, CVE-
2024-3094 (Mar. 29, 2024), https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094.
---------------------------------------------------------------------------

    50. We also agree with NERC's assertion that the supply chain risks 
associated with PCAs could be mitigated if responsible entities include 
PCAs in their existing SCRM plans that inform the procurement of medium 
and high impact BES Cyber Systems.\82\ We do not agree, however, that 
this should be done on a voluntary basis since many PCAs have a similar 
risk profile to BES Cyber Systems. Finally, we note that applying 
supply chain protections to PCAs is consistent with risk management 
practices required for Federal agencies. Specifically, extending supply 
chain related protections to PCAs aligns with the OMB Memorandum of 
August 2021 and its phased implementation strategy by ensuring that all 
software, especially those performing security-critical functions, is 
fortified against supply chain risks.\83\ By proactively evaluating the 
supply chain risks posed by PCAs, the electric sector can address the 
risk of supply chain attacks, which have been exemplified by incidents 
like the SolarWinds breach. The OMB Memorandum of August 2021 provides 
instructions and creates a phased implementation plan for Federal 
agencies to adopt the security measures required by Executive Order 
14028. Included in the initial phase of implementation are software 
applications that provide network monitoring and configuration services 
(e.g., PCAs).\84\ This directive, while binding only on Federal 
agencies, further supports the extension of SCRM protective measures to 
PCAs. PCAs, if compromised, could serve as conduits for adversaries to 
infiltrate BES Cyber Systems, potentially leading to breaches 
originating from within the electronic security perimeters.
---------------------------------------------------------------------------

    \82\ NERC Supply Chain Risks Report at 22.
    \83\ See supra n.28.
    \84\ See id.
---------------------------------------------------------------------------

3. Proposed Directives
    51. For the reasons set forth above, we preliminarily find that the 
existing SCRM Reliability Standards are

[[Page 79803]]

inadequate to ensure that PCAs are sufficiently protected from supply 
chain risk. Because PCAs represent an attack vector to BES Cyber 
Systems contained within the same electronic security perimeter as the 
PCAs, the Commission's concern about the threat that these unprotected 
assets present to the security and reliability of the Bulk-Power System 
has grown since initially discussed in Order No. 850. As discussed 
above, these risks are highlighted by recent sophisticated incidents 
such as the SolarWinds software vulnerability and the XZ Utils supply 
chain attack. While the current SCRM Reliability Standards require 
entities to protect PCAs' vendor remote access management, the 
Reliability Standards should provide a comprehensive protection of 
PCAs.
    52. Accordingly, we propose to direct NERC, pursuant to section 
215(d)(5) of the FPA, to modify the SCRM Reliability Standards to 
include PCAs as applicable assets. Further, we propose to direct NERC 
to protect PCAs from supply chain risk at the same level as other 
assets inside an electronic security perimeter (i.e., high and medium 
impact BES Cyber Systems, electronic access control or monitoring 
systems, and physical access control systems located inside an 
electronic security perimeter). Given the broad range of assets that 
may be categorized as PCAs, we seek comment on potential comprehensive 
and scalable approaches that could be implemented for identifying and 
assessing supply chain risks posed by PCAs. Comments on such approaches 
may inform our directives in a final rule and may also provide valuable 
input for a possible future NERC standard drafting team tasked with 
developing directed modifications. Finally, we propose to direct NERC 
to submit these modifications within 12 months of the effective date of 
a final rule in this proceeding.

III. Information Collection Statement

    53. The information collection requirements contained in this 
notice of proposed rulemaking are subject to review by the OMB under 
section 3507(d) of the Paperwork Reduction Act of 1995.\85\ OMB's 
regulations require approval of certain information collection 
requirements imposed by agency rules.\86\ Upon approval of a collection 
of information, OMB will assign an OMB control number and expiration 
date. Respondents subject to the filing requirements of this proposed 
rule will not be penalized for failing to respond to this collection of 
information unless the collection of information displays a valid OMB 
control number. Comments are solicited on the Commission's need for the 
information proposed to be reported, whether the information will have 
practical utility, ways to enhance the quality, utility, and clarity of 
the information to be collected, and any suggested methods for 
minimizing the respondent's burden, including the use of automated 
information techniques.
---------------------------------------------------------------------------

    \85\ 44 U.S.C. 3507(d).
    \86\ 5 CFR 1320.11.
---------------------------------------------------------------------------

    54. The proposal to direct NERC to develop new, or to modify 
existing, reliability standards (and the corresponding burden) are 
covered by, and already included in, the existing OMB-approved 
information collection FERC-725 (Certification of Electric Reliability 
Organization; Procedures for Electric Reliability Standards; OMB 
Control No. 1902-0225),\87\ under Reliability Standards 
Development.\88\ The reporting requirements in FERC-725 include the 
ERO's overall responsibility for developing Reliability Standards, such 
as any Reliability Standards that relate to supply chain risk 
management.
---------------------------------------------------------------------------

    \87\ Another item for FERC-725 is pending review at this time, 
and only one item per OMB Control No. can be pending OMB review at a 
time. In order to submit this NOPR timely to OMB, we are using FERC-
725(1B) (a temporary, placeholder information collection number).
    \88\ Reliability Standards development as described in FERC-725 
covers standards development initiated by NERC, the Regional 
Entities, and industry, as well as standards the Commission may 
direct NERC to develop or modify.
---------------------------------------------------------------------------

IV. Environmental Analysis

    55. The Commission is required to prepare an Environmental 
Assessment or an Environmental Impact Statement for any action that may 
have a significant adverse effect on the human environment.\89\
---------------------------------------------------------------------------

    \89\ Reguls. Implementing the Nat'l Env't Pol'y Act, Order No. 
486, 52 FR 47897 (Dec. 17, 1987), FERC Stats. & Regs. ] 30,783 
(1987) (cross-referenced at 41 FERC ] 61,284).
---------------------------------------------------------------------------

    56. The Commission has categorically excluded certain actions from 
this requirement as not having a significant effect on the human 
environment. Included in the exclusion are rules that are clarifying, 
corrective, or procedural or that do not substantially change the 
effect of the regulations being amended.\90\ The actions proposed 
herein fall within this categorical exclusion in the Commission's 
regulations.
---------------------------------------------------------------------------

    \90\ 18 CFR 380.4(a)(2)(ii) (2021).
---------------------------------------------------------------------------

V. Regulatory Flexibility Act

    57. The Regulatory Flexibility Act of 1980 (RFA) \91\ generally 
requires a description and analysis of proposed rules that will have 
significant economic impact on a substantial number of small entities.
---------------------------------------------------------------------------

    \91\ 5 U.S.C. 601-612.
---------------------------------------------------------------------------

    58. We are proposing only to direct NERC, the Commission-certified 
ERO, to develop modified Reliability Standards to improve the 
sufficiency of the SCRM Plans required by CIP-013-2, and to protect 
PCAs under the SCRM Reliability Standards. These Standards are only 
applicable to high and medium impact BES Cyber Systems and their 
associated systems such as electronic access control or monitoring 
systems and physical access control systems.\92\ Therefore, this NOPR 
will not have a significant or substantial impact on entities other 
than NERC. Consequently, the Commission certifies that this NOPR will 
not have a significant economic impact on a substantial number of small 
entities.
---------------------------------------------------------------------------

    \92\ Cf. Cyber Security Incident Reporting Reliability 
Standards, Notice of Proposed Rulemaking, 82 FR 61499 (Dec. 28, 
2017), 161 FERC ] 61,291 (2017) (proposing to direct NERC to develop 
and submit modifications to the Reliability Standards to improve 
mandatory reporting of Cyber Security Incidents, including incidents 
that might facilitate subsequent efforts to harm the reliable 
operation of the Bulk-Power System).
---------------------------------------------------------------------------

    59. Any Reliability Standards proposed by NERC in compliance with 
this rulemaking will be considered by the Commission in future 
proceedings. As part of any future proceedings, the Commission will 
make determinations pertaining to the RFA based on the content of the 
Reliability Standards proposed by NERC.

VI. Comment Procedures

    60. The Commission invites interested persons to submit comments on 
the matters and issues proposed in this rulemaking to be adopted, 
including any related matters or alternative proposals that commenters 
may wish to discuss. Comments are due December 2, 2024. Comments must 
refer to Docket No. RM24-4-000, and must include the commenter's name, 
the organization they represent, if applicable, and their address in 
their comments. All comments will be placed in the Commission's public 
files and may be viewed, printed, or downloaded remotely as described 
in the Document Availability section below. Commenters on this proposal 
are not required to serve copies of their comments on other commenters.
    61. The Commission encourages comments to be filed electronically 
via the eFiling link on the Commission's website at https://www.ferc.gov. The Commission accepts most standard word processing 
formats. Documents

[[Page 79804]]

created electronically using word processing software must be filed in 
native applications or print-to-PDF format and not in a scanned format. 
Commenters filing electronically do not need to make a paper filing.
    62. Commenters that are not able to file comments electronically 
may file an original of their comment by USPS mail or by courier-or 
other delivery services. For submission sent via USPS only, filings 
should be mailed to: Federal Energy Regulatory Commission, Office of 
the Secretary, 888 First Street NE, Washington, DC 20426. Submission of 
filings other than by USPS should be delivered to: Federal Energy 
Regulatory Commission, 12225 Wilkins Avenue, Rockville, MD 20852.

VII. Document Availability

    63. In addition to publishing the full text of this document in the 
Federal Register, the Commission provides all interested persons an 
opportunity to view and/or print the contents of this document via the 
internet through the Commission's Home Page (https://www.ferc.gov). 
From the Commission's Home Page on the internet, this information is 
available on eLibrary. The full text of this document is available on 
eLibrary in .pdf and Microsoft Word format for viewing, printing, and/
or downloading. To access this document in eLibrary, type the docket 
number excluding the last three digits of this document in the docket 
number field.
    64. User assistance is available for eLibrary and the Commission's 
website during normal business hours from FERC Online Support at (202) 
502-6652 (toll free at 1-866-208-3676) or email at 
[email protected], or the Public Reference Room at (202) 502-
8371, TTY (202)502-8659. Email the Public Reference Room at 
[email protected].

    By direction of the Commission.

    Dated: September 19, 2024.
Debbie-Anne A. Reese,
Acting Secretary.
[FR Doc. 2024-22230 Filed 9-30-24; 8:45 am]
BILLING CODE 6717-01-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.