Nrel Ciberseguridad Der
Nrel Ciberseguridad Der
Nrel Ciberseguridad Der
• UL is a global safety science company that has • NREL is a national laboratory of the U.S. Department of Energy,
certified tens of billions of products. Office of Energy Efficiency and Renewable Energy.
• UL has expertise in cybersecurity and safety, global • NREL has about 900 partnerships works with industry, academia
standards and frameworks, IoT security solutions, and government.
and hardware and software-based security • Researchers at NREL work with utilities, vendors, certification
evaluations. labs, and standard development organizations to research,
• As an independent, trusted third party, UL will lead identify, and establish interoperability and cybersecurity
the program to develop the cybersecurity requirements for distributed energy resources.
certification standard. • NREL is supporting this effort with expertise on integrated energy
systems and laboratory evaluation and testing platforms.
NREL | 2
Agenda
Ensure
Differentiate Determine Differentiate
Component System purchase of
products right level of systems
secure
based on Manufacturers security for based on Integrators systems and
security products security
products
Demonstrate Integrate
validation of with existing
security to insecure
customers systems
NREL | 4
The New Security Challenge
Grid and
Enterprise IT
Remote
Access
Office utility
connectivity
Communication
Use of public and Automation
networks
Increasing
usage of IT
components
Field devices
sensors and Illustration by Alfred Hicks, NREL
protection
NREL | 5
Many Standards and Guides Exist – Why a New One?
The UL cybersecurity NISTIR
NIST CSF
certification standard will: 7628
IEC 62443
UL 1741
• Build on past work
• Map and leverage
security requirements IEC 62351-
8,-9,-11,-12 IEEE 1547.3
from industry best
practices for hardware
and software IEEE
C37.240- CTA-2088
• Provide an information 2014
hub for DER Industry
stakeholders UL
CSIP
• Establish “security by Cybersecurity
2030.5 Others
Certification
design” Guide
Standard
mandates
• Establishes security by design
in new DER systems
• Creates an environment
where the baseline security
posture of the DER industry
will be elevated
Benefits of a Cybersecurity
Certification Standard
NREL | 7
Cybersecurity Certification – Why Now?
• Why should we care about developing
DER/IBR cybersecurity certification now?
• Solar is 3% of Today’s Electricity Generation A national or international cybersecurity
• Rooftop and small solar in the Western certification standard can aid industry
Interconnection is approximately 30,000 stakeholders to evaluate and validate the
MW cybersecurity posture of their DER or IBR devices
• This represents about 65% of all solar in the
before they are connected to the electric grid
west, none of which is required to follow
NERC CIP
CNN Reuters
Photo by Dennis Schroeder, NREL 22168
NBC NERC
Nearly half of U.S. electricity could Variable-energy resources
come from solar by 2050, Biden ….continue to be a significant
administration component of new capacityNREL | 8
Lederman, Josh. NBC.com, September 8, 2021. url NREC Planning Committee Meeting, June 6, 2017. url
Solar Futures Study
NREL | 11
Outcomes of Cybersecurity Standards Initiatives (contd.)
Provides a baseline Provides certification Provides engagement Provides three-year-long
for device-level testing through activities to bring program to prepare
security and informs SunSpec-authorized together individuals industry professionals
the development of test labs for product across industry, and military veteran job
a cybersecurity compliancy to CA academia, and seekers for the next
certification standard rule 21 and CSIP government to exchange wave of DER technology
for DER stakeholders standard ideas and learn
NREL | 12
Think Before You Connect
Implement security by design and Incorporate security at the design level
1
practice basic cyber hygiene.
• Change default passwords. Advance security updates and
• Use two-factor authentication. 2 vulnerability management
• Install updates, i.e., authentication,
TLS1.2 or higher, etc.
• Consider security of underlying Build on proven security measures
3
infrastructure during patch
management or remote connection.
Prioritize security measures according
• Monitor both consumer devices and to potential impact
4
vendor-managed devices.
• If possible, add code-signing and roll-
back firmware. Promote transparency across the grid
5
• Use vendors with cyber hygiene.
• DO NOT connect printers or other
similar devices to the operations Connect carefully and deliberately
network. 6
Source: “Strategic Principles for Securing the Internet
NRELof |Things,”
13
U.S. Department of Homeland Security (2016)
Blind spots and
Messaging challenges
+ Blue
forInfographic
electric utilities
Content
NREL | 14
How can state energy offices
support cybersecurity standard
development efforts?
NREL | 15
Understanding DER Systems
NREL | 16
Projected Future
DER Systems
Graphic by NREL
UL and the UL logo are trademarks of UL LLC © 2022. Proprietary & Confidential. NREL | 18
2023 National Electrical Code® (NEC®)
Proposals on Cybersecurity
NREL | 20
Process from OOI to Certification Standard
Research existing Define and translate
standards, guides, and industry needs into Draft the Outline of
competitive technologies requirements for Investigation (OOI).
in the market. inclusion in the standard.
Request an American
Publish the Outline of Circulate draft OOI with
National Standard
Investigation. relevant experts.
designation from ANSI.
Assemble a balanced
committee for a STP edits OOI and votes Draft is published as an
Standards Technical on the draft. ANSI Standard
Panel (STP).
NREL | 21
UL and ISA
NREL | 22
https://www.ul.com/news/ul-joins-isa-global-cybersecurity-alliance-founding-member-advance-industrial-cybersecurity
What
What Needs
NeedsTo
ToBe
BeDone
Done
What Needs To Be Done
NREL | 23
Roadmap of Next Steps
Instead of defending only data channels, NDN secures the data directly by uniquely naming the data
packets and by securely binding those names to the data packets using cryptographic signatures.
Source: https://operantnetworks.com/
Relevant Standards, Guides, and Best Practices
• IEEE C37.240-2014 – IEEE Standard Cybersecurity Requirements for Substation Automation, Protection, and
Control Systems
• NIST SP 800-82 Revision 2: Guide to Industrial Control Systems (ICS) Security
• NIST interagency/internal report 7628: Guidelines for Smart Grid Cybersecurity
• NIST Cybersecurity Framework:
• IEEE 2030.5-2018 – IEEE Standard for Smart Energy Profile Application Protocol
• NERC Reliability Guideline: Cyber Intrusion Guide for System Operators
• IEC 62351: Information Security for Power System Control Operations
• IEC 62443: Industrial Automation and Control Systems Security
• DOE/DHS ES-C2M2: Electricity Subsector Cybersecurity Capability Maturity Model
• DOE/NIST/NERC risk management process: Electricity Subsector Cybersecurity Risk Management Process
Guideline
• SEPA Cybersecurity Working Group: Identify and address the gaps and challenges to ensure the security of
hardware and software, and to create reference cybersecurity policies.