ww
w.in
l.g
ov
Critical Infrastructure Protection (CIP)
Presentation at EU sf ―Raising Public Awareness about the Information Society‖
Tallinn, Estonia
14 March 2012
Dr. K. P. AnanthPhone: (208) 757-0590
Email: [email protected]
INL/CON-12-24985
2
Outline
Background on Idaho National Laboratory
What constitutes Critical Infrastructure in the U.S. and why protect it?
Risks and Threats: Cyber threats to Electric Grid, Control Systems and Wireless Communications
Some current approaches for protecting Critical Infrastructures
Proposed Senate Cybersecurity Act of 2012
How can INL and Estonia collaborate?
3
Idaho National Laboratory — Today the Site Supports Three Focused National Missions
Naval Reactors Facility
1400 Employees 1200 EmployeesBusiness Volume $365M
600 EmployeesBusiness Volume $124M
4200 EmployeesBusiness Volume $1B
Idaho National Laboratory — The National Nuclear Laboratory with synergistic capabilities in National & Homeland Security
MISSIONS
• Nuclear Energy
• National & Homeland Security
• Energy & Environment
EMPLOYERS
• 890 square miles, ~4800 ft elevation
• 111 miles of electrical transmission and distribution lines, with isolatable grid
• 6 cellular towers (Wireless Comms –3 fixed, 3 mobile)
• 579 buildings
• Abundant water
• 177 miles of paved roads
• 14 miles of railroad lines
SITE
*
4
Research - Development - Demonstration – Deployment (RDDD)
At INL, We have a history supporting National Missions
• National Reactor Testing Station 1949, INEL 1974, INEEL 1994, INL 2005
• Fuel cycle development and demonstration – reprocessing
• Specific Manufacturing Capability (SMC)
• Design construction testing and operation of 52 unique nuclear reactors, incl. Navy’s Nautilus Submarine Prototype (S1W) Reactor
• Testing Naval Large Caliber Guns
5
Today’s RDDD Programs are of National Importance
Supervisory Control and Data Acquisition (SCADA) Work
Grid Reliability and Security
Cyber Security
Wireless Communications
Nuclear Nonproliferation
Nuclear Counterproliferation
Armor, Explosive Blast Protection
A leader in critical infrastructure protection and homeland security
National & Homeland Security
Energy & Environment
Battery Technology
Bio-fuels and Synfuels
Hybrid Energy Systems
Non-traditional Hydrocarbon use
A leader in developing energy solutions to Idaho and the Region
Nuclear Energy
Advanced Fuel Cycle R&D
Next Generation Nuclear Plant (NGNP)
ATR National Scientific User Facility
Space Nuclear
U.S. National Nuclear Energy Laboratory and an International leader
Homeland Security Presidential Directive (HSPD-7) identifies 18 Critical Infrastructures and Key Resources (CIKR)
• Agriculture and Food
• Banking & Finance
• Chemical
• Commercial Facilities
• Critical Manufacturing
• Dams
• Defense Industrial Base
• Emergency Services
• Energy (production, refining, storage,
distribution of oil/gas/electric power
except nuclear)
6
Manmade or Natural Disasters to any of CIKR would adversely impact the national economy, national security,
public safety and health consequences for its citizens. Furthermore, cascading impacts would affect other
sectors in the country, worsening the situation; and taken to the next level, it could cascade to other nations.
As an example, the Chemical Sector in the U.S. accounts for about $700B in revenue and 800,000 employment,
and Public Health/Health Care accounts for $2 Trillion in revenue and 17M employment . This is
industry-specific without accounting for cascading impacts to other sectors and potentially other Nations.
The 9/11 terrorist incident in the U.S. stands as an example of the adverse impacts in Transportation
and its cascading impacts to other sectors of the economy and other nations as well.
• Government Facilities
• Information Technology
• National Monuments
• Nuclear Reactors
• Postal & Shipping
• Public Health
• Telecommunications
• Transportation
• Water (Drinking Water, Wastewater
systems
7
INL’s three critical enabling technology platforms cut through all 18 Infrastructure Sectors
Electricity
Computers/Wireless Comms
Control Systems
Threats can range from Economic Cyber Espionage to Data/Credit Card theft, stealing funds from Automated Teller
Machines, and Modern Warfare with Cyber attacks --- caused by individuals, terrorists, Nation states.
Markets and Operations
Generation
Transmission Distribution Customer Use
Today’s Electric Grid: One-way flow of electricity
2-way flow of electricity and information
Electric Grid Protection
―Smart Grid‖ = Electric Grid + Intelligence
• Integrates Renewables (e.g., wind, solar)
• Better Demand Supply Management
• Reduce Peaking
• Two-Way flow of Power & Information
• Automated Management, Operation, Control
8Figures courtesy of EPRI
Threats to the Electric Grid
• Legacy SCADA system vulnerabilities
• Integration of new IT and networking technologies add security challenges
• Limited cyber security controls currently in place
– Specified for bulk power distribution and metering
• Deliberate attacks (disgruntled employees, industrial espionage, unfriendly states, terrorists, and EMP)
• Inadvertent threats (equipment failures, user errors)
• Natural phenomena (disasters, solar activity)
9
Vulnerabilities might allow an attacker to penetrate a network, gain access to control software,
or alter load conditions to destabilize the grid in unpredictable ways
Electric Grid R&D Test & Evaluation at INL
INL Power Infrastructure:
• 62 Mile dual fed, 138kV
Transmission loop
• 7 Substations
• 3 Commercial feeds
• Ability to isolate portions of grid
for specialized testing
• Real-time grid monitoring and
control through centralized
SCADA operations center
• Power Simulation using Real
Time Digital Simulator (RTDS)
• Protection & Restoration
Staff with both R&D and
Utility Sector Experience
10
11
We operate DOE/OE’s National Supervisory Control & Data Acquisition (SCADA) Test Bed for the Energy Sector
Capabilities:• Conduct Assessments at INL and Asset
Owner Sites
• Research and Development
• Training and outreach
• Subject matter experts
12
We support Control System Challenges in Critical Infrastructures through DHS ICS-CERT Program, a National Program
Industrial Control Systems Cyber Emergency Response Team
• Provides situational awareness in the form of actionable information
• Conducts vulnerability and malware analysis
• Responds to and analyzes control systems related incidents
• Partners with federal, international and private sector to secure control systems
13
Outreach to Industry/Federal Entities Through Training is a Significant Element of the DHS, DOE Programs
• Share vulnerability and mitigation information with industry and government
• Conduct Red Team/Blue Team advanced training sessions
• Permanent Training Facility in Idaho Falls
– Classroom supports up to 42 students at a time
– Segregated areas for Red Team/
Blue Team
– Integrated substation with chemical plant
– Trained over 4,000 incl. asset owners, vendors, and Feds since 2007
14
With increased interest in Broadband applications, several new challenges have emerged. NTIA and FCC have jurisdiction over the Spectrum.
Wireless Communication: Global Advances Create Security-related Challenges & INL is Focused on Addressing Them• Major Trends:
– Ubiquitous, global broadband communications
– Wireless centric access and vanishing wireline
– Proliferation of Wireless Devices– IP protocol centric communications– Open Access environment
• Limitations in Spectrum– Little available spectrum in the U.S.– Spectrum usage 17%
INL’s Communications Range has unique attributes well suited to address current/ emerging National challenges (Security and Public Safety)
Isolated Location and Spectrum Management
• NTIA approved wireless experimental station, with local
spectrum management
• Low RF Noise background
• No Military Bases/ International Airports nearby
Full Scale Communications Networks
• GSM & UMTS Cellular + CDMA networks
• WiMAX, Mobile & Fixed networks
• WiFi / VoIP network isolated from the Internet
• State-of-the-art Network Operations Center (NOC)
Industry and Scientific Expertise
• Cellular, UHF, HF
• Power Grid, Cyber security, Control Systems
• In-house design, Operations, Maintenance, Engineering
• Cellular Design, Software and Hardware development
15
With Industry and DOD-experienced staff, INL supports critical national missions.
Some Current Approaches to CIP
16
• Protection of Proprietary
information
• Privacy rights of
individuals
• Sharing of information
while protecting it from
―bad actors‖
• Insider Threats
Workforce Development
‒ Training / Outreach (Basic Training, Intermediate, Advanced
(Red Team/Blue Team)
‒ Cyber Security evaluation tools (CSET) & Curriculum
Development)
‒ On site assessments (evaluate network and cyber
protection / practices; in depth assessment when
penetrated, INL Malware Analysis)
Knowledge Management
‒ Passing on Threat Bulletins
‒ Help Center
Standards Development
‒ Industry Association
‒ NIST
‒ Vendor Groups
‒ Federal Agencies
Partnership Between Industry & Government(There is an Industry-Specific representative for each of the 18 Sectors.)
Some Current Approaches to CIP
17
Intra Industry
• Protection of Proprietary
information
• Privacy rights
• Sharing of information
while protecting it from
―bad actors‖
• Insider Threats
‒ Industry Association (Cyber Security Concerns/Trends,
Benchmarking, Best Practices)
‒ Company-to-Company (By mutual agreement)
‒ Industry Sector Representative to Government (Describe
Challenges / Assistance Needed)
• Vendor (Qualifications/Selection/Procurement)
• Threat Information
• Assistance, as needed
• Continuing dialogue for situational awareness
Transnational
• Cyber Security Conferences /
Meetings
• Technical Collaborations / Staff
Exchanges
• Benchmarking
• Information Sharing
The Proposed Cybersecurity Act of 2012To ensure the federal government and the private sector take the necessary steps to secure our nation, the
Cybersecurity Act of 2012 would do the following:
• Determine the Greatest Cyber Vulnerabilities. Secretary of Homeland Security, Private sector and Intelligence Community conduct
risk assessments to determine sectors subject to greatest and most immediate cyber risks.
• Protect Our Most Critical Infrastructure. Authorize Secretary of Homeland Security, with the private sector, to determine
cybersecurity performance requirements based upon the risk assessments. The bill would cover most critical systems/assets in a given sector,
only if they are not already secured.
• Protect and Promote Innovation. Owners of “covered critical infrastructure” would have flexibility to meet the cybersecurity
performance requirements. The bill would prohibit government from regulating design or development of information technology products.
• Improve Information Sharing While Protecting Privacy and Civil Liberties. Provide a responsible framework for sharing of
cyber threat information between federal government and private sector, and within the private sector, while ensuring appropriate measures
and oversight to protect privacy, preserve civil liberties.
• Improve the Security of the Federal Government’s Networks. Amend the Federal Information Security Management Act
(FISMA) to develop a comprehensive acquisition risk management strategy. Move from culture of compliance to culture of security by giving
Department of Homeland Security (DHS) authority to streamline reporting requirements/reduce paperwork through monitoring and risk
assessment. Emphasize “red team” exercises and operational testing so federal agencies are aware of their networks’ vulnerabilities. Direct
OMB to develop security requirements and best practices for federal IT contracts and ensure agencies make informed decisions when
purchasing IT products/services.
• Clarify the Roles of Federal Agencies. Clarify and improve federal efforts to address cyber threats. Strengthen critical partnership
between the Department of Defense and the DHS. Consolidate cyber offices at DHS to unified National Center for Cybersecurity and
Communications for protecting the networks of federal civilian agencies and critical infrastructure without duplication.
• Strengthen the Cybersecurity Workforce. Reform how Cybersecurity personnel are recruited, hired, and trained so federal
government has necessary talent to lead and manage the protection of its own networks.
• Coordinate Cybersecurity Research and Development. Provide for a coordinated cybersecurity R&D program to advance
development of new technologies to secure our nation from ever‐evolving cyber threats. 18