I was quite
excited when I got RF’s latest newsletter yesterday, since I knew that Lew
Folkerth was going to have his (alleged) last article on CIP-013 in it. I read
it thoroughly this morning, and I have to say this is the best of his articles
on CIP-013 so far. What’s also good news is that, in writing the article, he
realized he was going to have to separate it into two (this has happened to me
a number of times also).
In this
article, Lew planned to write about CIP-005 R1.4 and R1.5, and CIP-010 R1.6 –
which are three new requirement parts that will become enforceable on July 1,
2020, the same day as CIP-013-1 becomes enforceable. But he ended up devoting
the entire article to just the CIP-005 parts; the CIP-010 part will be the
subject of the next one. He implies this will be the last of his CIP-013/supply
chain risk management articles, but I certainly hope it won’t be – there’s a
lot more that can be said about this.
You can find
the article by going to RF’s home page and finding the May-June 2019
newsletter, then clicking on “The Lighthouse” in the table of contents.
However, Lew gave the article by itself to me in PDF format, and I’ll be glad
to send that to you if you want to drop me an email at the address below. In
fact, for a limited time, Lew has made available a single PDF including all
four of his CIP-013 articles so far, and he is offering that for the same price as this article by itself -
$0.00 (US)! You should act now to take advantage of this incredible offer! No
salesman will call…
As I started
reading the article, I was struck by one point after another that I hadn’t
realized, and I started writing them all down. After writing down about 4 or 5,
I realized I might as well just let you read the paper to get the rest, but
here are the most important takeaways I got out of Lew’s article:
- I admit that I had a fairly low opinion of the new
requirement parts that the CIP-013 drafting team added to CIP-005-6 R2 and
CIP-010-3 R1. This was because I thought of these as new prescriptive requirements
that would conflict with the risk-based, objectives-based nature of
CIP-013. I explained that in this
post (and the earlier one linked in it). But reading Lew’s article made it
very clear to me that CIP-005-6 R2.4 and R2.5 are objectives-based, since
they give you an objective to achieve, and don’t specify how you need to
achieve it.
- However, are these two requirement parts also risk-based?
My answer to that is yes, even though the word “risk” isn’t to be found
anywhere in them. In determining how you will comply with the two requirement
parts (that is, what technologies or procedures you should deploy), you
certainly should take risk into account. You should never put a $50 lock
on a $10 bike, and you shouldn’t, for example, implement and tune a layer
three firewall just for compliance with R2.5, unless the likelihood and/or
impact of a compromised remote access session being allowed to continue are
significant.
- A good indication that these parts are risk-based is found
on page 15, where Lew discusses how you can categorize, classify and prioritize
different types of communications traffic – and, of course, apply
different controls to different traffic depending on its category,
classification and priority. You simply can’t do this in a prescriptive
requirement like CIP-007 R2 or CIP-010 R1, where you have to do the same
things to every component of a Medium or High BES Cyber System, or risk
getting your head cut off.
- Lew’s item 2 on page 15 points out that these requirement
parts include undefined terms, which I take to include “determine”, “system-to-system”,
“disable”, and – the most glaring omission of all in CIP-013 - “vendor”. Of
course, these are hardly the first cases of undefined terms in the CIP
standards. CIP v5 included many undefined terms, including “generation”, “station”
and “substation” in CIP-002 R1 Attachment 1, as well as terms like “programmable”
(in the Cyber Asset definition), “affect the reliable operation of the BES”
(in the BES Cyber Asset definition), “adverse impact” (in the BES Cyber
Asset definition), “associated with” (in CIP-002 R1 Attachment 1), “security
patch” (in CIP-007 R2), and “custom software” (in CIP-010 R1); so this is
hardly a new development. I certainly understand there are very good
reasons why all of these terms were left undefined, but on the other hand
some people at NERC and elsewhere talk about the CIP standards as if they
were clear as day, so that if entities are confused and get violations, it
must be because they just aren’t trying hard enough. This is far from
being true.
- Lew’s point about these undefined terms in CIP-005-6 R1.4
and R1.5 is exactly the point he made in
2014, as it began to become clear that there would never be clear
answers to most of the ambiguities, implicit requirements and undefined
terms in CIP v5: It’s up to the entity to a) look at all the available
guidelines, guidance, etc. and then b) determine and document for themselves how they are interpreting these
questions and definitions (although in his article he suggests that the entity
should “use commonly accepted definitions”. It would be nice if there were commonly accepted definitions
for these terms, but in most cases there simply is none).
- In item 3 on page 14, Lew notes that all data
communications, including dial-up and serial, need to be included in the
scope of CIP-005-6 R2.4 and R2.5 – not just routable communications. This
might seem to some people to constitute a huge increase in scope in
itself, but keep in mind that the fact that these are risk-based
requirements is your friend. Given that there has never been a successful
cyberattack over serial communications, the likelihood of such attacks is
extremely low, meaning the risk is extremely low – so you just don’t have
to make the same effort to remediate risks in serial communications as you
do for routable communications (I’ll admit that the risks posed by dial-up
communications are much higher, which is why so many entities have already
mitigated that risk by not allowing dial-up at all).
- In item 4 on page 14, Lew says “In my opinion,
identification of malicious remote access sessions and disabling of such
access should be achieved in seconds or minutes, not hours or days.” This
might seem like a requirement to write blank checks to the current
preferred suppliers of whiz-bang devices that purport to do this, but
again you need to keep in mind that this all depends on the risk posed by
the communications. For example, if we’re talking about a high-voltage
substation that feeds all of downtown Manhattan, this might be the right
approach. But if we’re talking about a relatively low-voltage substation
serving mostly rural areas outside of Manhattan, Kansas, it might be
overkill.
- Lew points out in item 5 on page 14 that, since the word “vendor”
is undefined in R2.5, which says “Have one or more method(s) to disable
active vendor remote access…”, you are better off not trying to split
hairs on the definition, but simply apply the same controls to all
communications into and out of an ESP at a Medium or High impact asset.
- Lew’s item 6 on page 14 contains some very good
observations on incident response plans, for the case where you do detect
some suspected malicious communications into an in-scope ESP.
- My final observation (besides to say that you need to read
the whole article, and carefully!) is on the paragraph titled “Response
Planning” at the bottom of page 17. There, Lew makes the excellent point
that your response to detected improper access to Medium or High impact
BCS should involve “manually-initiated automated processes”. I’ll let you
read the details, but this is really good advice, and might be a good
principle for securing ICS in general.
Any opinions expressed in this blog post are strictly mine
and are not necessarily shared by any of the clients of Tom Alrich LLC.
If you would like to comment on what you have read here, I
would love to hear from you. Please email me at tom@tomalrich.com. Please keep in mind that
if you’re a NERC entity, Tom Alrich LLC can help you with NERC CIP issues or
challenges like what is discussed in this post – especially on compliance with
CIP-013. To discuss this, you can email me at the same address.
No comments:
Post a Comment