As seems to happen
frequently when new CIP standards are being developed or existing ones are
being revised by different drafting teams, the situation with CIP-003 is very
confusing now. The "Modifications
to CIP-003" drafting team (2023-04) recently posted for comment the
link to the first draft of the new
CIP-003-11. However, immediately below it they displayed the link to
the first draft of CIP-003-12.
At first glance, it might seem there will be two versions of CIP-003 in effect
soon. Will NERC entities be allowed to choose which one they want to comply
with?
Meanwhile, the "CIP
Modifications" drafting team has also posted CIP-003-12 (which that team
drafted), although they're not soliciting comments on that now. And if you’re
not satisfied with just two new versions competing for your attention, there
are also versions CIP-003-9, CIP-003-10, CIP-003-Y, and CIP-003-A. All of these
are available on one of the two drafting teams’ websites and are still
somewhere in the approval process. Isn’t choice wonderful?
Last week, I tried to make
sense of all this. Below is what I came up with. Note that I’ve divided my
comments into two sections: one describing what the “Modifications to CIP-003”
SDT is doing and the other describing what the “CIP Modifications” SDT is doing.
Spoiler alert: There will never be more than one version of a NERC Reliability
Standard in effect at the same time, although that doesn’t tell us which of these
versions will “win out”, or even whether the ultimate winner won’t be a different
version like CIP-003-13 or CIP-003-14.
Do you have your scorecards
ready? Here we go…the battle of the new CIP-003 versions!
Modifications
to CIP-003 Standards Drafting Team:
- CIP-003-9
was developed in response to questions that came up when CIP-013, the
supply chain security standard, was developed starting in 2016. CIP-013
just applies to medium and high impact BES Cyber Systems. There was
concern at the time (on the part of both NERC and Congressional staff
members) that there needed to be some supply chain controls that applied
to low impact BCS; a survey revealed that the most significant source of supply
chain cybersecurity risk to low impact BCS was remote access by vendors. CIP-003-9
was drafted to address these concerns.
- In 2021, the NERC Low Impact Criteria
Review Team recommended revisions to CIP-003 to require controls for
low impact assets to "authenticate remote users, protect the
authentication information in transit, and detect malicious communications
assets containing low impact BES Cyber Systems with external routable
connectivity." The team recommended that these changes be added to
CIP-003-9, which was already in development.
- Before that could happen, in 2023 FERC
approved CIP-003-9, with an implementation date of April 1, 2026. The FERC-approved
standard includes what’s in CIP-003-8 (the current version, which came
into effect in 2020) plus a new Section 6 in Attachment 1 (on page 23).
That section requires "6.1 One or more method(s) for
determining vendor electronic remote access; 6.2 One or more
method(s) for disabling vendor electronic remote access; and 6.3
One or more method(s) for detecting known or suspected inbound and
outbound malicious communications for vendor electronic remote
access."
- The new CIP-003-11 consists of CIP-003-9
with language added to Attachment 1. Part of that language is just the
vendor remote access language that was in Section 6 of Attachment 1 in
CIP-003-9. The drafting team decided to move that into Section 3, where
the other Electronic Access Controls are addressed.
- The other part of the added language is
what was developed to fulfill the 2021 recommendation in item 2 above; it
was also added to Section 3. That addition reads, “3.1.3 Authenticate
each user prior to permitting access to a network(s) containing low impact
BES Cyber Systems, through which user-initiated electronic access
applicable to Section 3.1 is subsequently permitted; 3.1.4 Protect
user authentication information for user-initiated electronic access
applicable to Section 3.1.3 while in transit between the Cyber Asset
outside the asset containing low impact BES Cyber System(s) and the
authentication system used to meet Section 3.1.3, or the asset containing low impact BES Cyber
System(s)”.
- The fact that the entire set of language
in CIP-003-9 has been incorporated into CIP-003-11 (and also into
CIP-003-12. See below), along with the new language recommended by the Low
Impact Criteria Review Team in 2021, is a sure indication that CIP-009
will not be implemented, even though it has been approved by FERC. In other
words, when FERC approves either CIP-003-11 or CIP-003-12, they will also announce
that CIP-003-9 will not be implemented.[i]
- CIP-003-11 is just entering the comment
period before its first ballot now. Most new or revised CIP standards have
required at least 4 ballots before they've been approved by NERC; after
that, a new standard goes to FERC, which can take 6-18 months to approve
it. Finally, there's the implementation period, which will be 3 years (as
it is in CIP-003-9). In other words, don't look for CIP-003-8 to be
replaced for at least the next 5-6 years.[ii]
Are you a vendor of current or
future cloud-based services or software that would like to figure out an
appropriate strategy for selling to customers subject to NERC CIP compliance? Or
are you a NERC entity that is struggling to understand what your current
options are regarding cloud-based software and services? Please drop me an
email so we can set up a time to discuss this!
Any opinions expressed in this blog post are strictly mine and are not necessarily shared by any of the clients of Tom Alrich LLC. If you would like to comment on what you have read here, I would love to hear from you. Please email me at tom@tomalrich.com.
[i] There was one previous case where a complete set of CIP standards, “CIP version 4”, was approved by FERC, yet one year later FERC approved CIP version 5 and said v4 wouldn’t take effect. I remember that incident quite well. In fact, less than a month before FERC announced they would approve v5, I participated in a webinar sponsored by EnergySec (which drew about 600 attendees) entitled “Get Ready for CIP Version 4!” I call this my “Dewey beats Truman moment”.
[ii] Final
approval of CIP-003-11 might also be delayed because before it comes into
effect, the CIP
changes required to enable full use of the cloud will be developed and ready
to come into effect; so, a new version (CIP-003-13?) may be required, that incorporates
those changes.
No comments:
Post a Comment