RSI Security

Which Industries are Most Impacted by NERC CIP?

The North American Electric Reliability Corporation (NERC) is a not-for-profit international regulatory authority that ensures the security of bulk power systems (BPS) across all of North America. NERC’s primary responsibilities include defining and enforcing standards that safeguard against physical, cyber, and other threats. These protections keep power flowing to all North American populations.

In other words, they keep society functioning as expected.

For cybersecurity in particular NERC’s Critical Infrastructure Protection (CIP) Reliability Standards provide a framework for protecting Critical Cyber Assets. Compliance with the CIP standards is essential for all owners, operators, and users of the BPS. But compliance requirements vary widely, so many businesses across different industries seek Compliance consultation to help keep themselves protected.

This guide will break down everything you need to know about which industries are most impacted and how to prevent risks through compliance.

 

Industries and Entities Most Impacted

Since the BPS is the source of all power across North America it’s no exaggeration to say that every energy user is impacted by NERC. But the NERC CIP high impact practices are most important for the industries directly involved with the BPS. Beyond these end-consumers are also impacted indirectly, and risks trickle down to all parties involved.

 

Direct Impact: BPS Owners, Operators, and Users

The industries most directly affected by NERC CIP standards are those that make up the BPS—power and infrastructure. In practical terms this includes every party involved with the electric grid and power systems across North America.

According to the US Department of Energy, the electric system and power grid break down into three main areas or industries:

  1. Generation
  2. Transmission
  3. Distribution

Electricity is generated by converting other renewable and non-renewable primary energy sources into electrical charge. Then, it’s transmitted across the nation and distributed to its various end-users.

Ownership of these industries is spread across a wide variety of entities:

Beyond ownership management of the grid comes down to even more disparate parties. Two of the most important entities that run the grid are:

  1. Independent system operators (ISOs)
  2. Regional transmission organizations (RTOs).

Ownership, operation, and use of the BPS are distributed to individual entities’ Bulk Electric Systems (BES) and corresponding assets.

The NERC CIP standards apply to all these entities involved across these industries, except for those involved with the local-level distribution. Thus there are many different stakeholders across private and public sectors who are directly impacted on the production side of electrical power.

However, the end-users of electrical energy on the consumer side are also impacted indirectly.

 

 

Indirect Impact: All Users of Electricity

The power grid—which NERC was created to protect—serves over 400 million people across the US, Canada, and Mexico. And every single power user could potentially feel the impacts of a security breach. So, all these individuals are impacted by the NERC CIP.

In the US alone the Department of Energy estimates that there are over 140 million such parties, broken down into the following categories:

These end-users don’t bear the burden of implementing standards, nor would they ever face a NERC CIP background check. However, the effects of security breaches for energy suppliers can trickle down and have significant impacts on the lives of everyone.

Risks Faced by Those Impacted

Like any organization, those involved in the BPS industries face a variety of operational risks. These include but are not limited to:

Cybercrime is one of the most unpredictable sources of risk, particularly as attacks become increasingly sophisticated with each advancement in technology. Today, hackers employ a number of general and targeted schemes to gain access to an organization’s digital files and networks. Valuable data, like employees’ or client’s financial information, can be leveraged directly for fraud or indirectly for extortion.

These vulnerabilities also compound with the other sources of risk. An accident or a physical disaster could compromise physical or digital security, creating even more vulnerabilities for hackers to exploit.

For the BPS in particular the threat isn’t simply limited to immediate financial loss; there’s also power outages to consider, which could impact nearby institutions, such as hospitals or senior living communities. Given how dependent the vast majority of social services are upon consistent power supply, even a momentary outage can have long lasting ramifications.

To ensure the safety and security of all of North America all BPS owners, operators, and users must comply with NERC CIP standards.

 

How the NERC CIP Framework Helps

NERC’s mission is to safeguard all parties listed above through the development and enforcement of universal standards. These standards are:

  1. Developed through a process that’s driven by industry-wide consensus
  2. Accredited by the American National Standards Institute (ANSI)
  3. Guided by a set of shared Reliability Principles and Market Principles

Overall, the NERC CIP standards exist in order to help the wide variety of interconnected businesses across the industries streamline and unify their security protocols.

 

The CIP Standards

The Standards Committee (SC) continuously assesses and modifies existing standards, generates new standards, and eliminates those that are no longer applicable.

Of all the CIP standards 11 are subject to enforcement. The first 10 involve cybersecurity primarily, whereas the final one involves physical security. Here’s a breakdown of each, with language adapted from linked PDFs for each standard:

This system of standards protects against misoperation or instability, resulting from a physical or cyberattack. In addition to the 11 currently-enforceable standards, there are five scheduled for future enforcement. There are also 74 inactive standards and one pending inactive status. You can find detailed information on each on the official master list of NERC CIP standards.

With such a wide variety of standards—both new and old—following the correct rules is not always straightforward. Enforcement is needed to ensure entities are compliant.

Compliance

Compliance is both monitored and enforced by Regional Entities. Through assessment, investigation, evaluation, and auditing these agents determine degrees of compliance or violations thereof. Each standard establishes a general action or behavior that’s expected.

These general standards break down into particular requirements for all responsible entities; these are labeled “R1,” “R2,” etc. for each standard. In addition, the requirements are different for relevant “Applicable Systems,” as not all systems need to follow the same protocols in the same ways. The execution of these requirements varies depending on the system in question, as well as the particular measures (labeled “M1,” etc.) specified.

For example, CIP-004-6: Personnel & Training breaks down into a total of 5 requirements. Of those, each has its own corresponding measurements. Some of these requirements are simpler—with just one part—whereas others are more complex, containing multiple parts:

While the specific requirement already goes into more detail than the general standard, the individual parts detail how to follow it. The measures then explain how to prove you’re following it. For example, measures specified for R2 part 2.1 include proof points of evidence like:

These specifications only scratch the surface of the complexity across all the standards. Furthermore, they feed into other specifications that are used to justify and administer enforcement.

Due to the sheer depth and breadth of these standards, most organizations require the help of experts to maintain compliance.

 

Enforcement

Enforcement depends on many variables related to the measurements above. Evidence retention and audit procedures vary depending by standard, but all include Violation Severity Levels (VSL). These levels enable uniform protocols for administering punishments, such as sanctions. These punishments scale according to Violation Risk Factors (VRF) as well as frequency and severity of violations.

For example, the Table of Compliance Elements for CIP-008-5: Incident Reporting and Response Planning includes variables for all three requirements of the Standard. Although they’re all rated “Lower” VRF, there are differences in VSL:

Given the extreme complexity of all the rules, it’s no wonder many organizations have trouble keeping track of compliance. The best way to ensure that your organization avoids enforcement and remains compliant is to seek out professional help.

 

Professionalize your Cybersecurity

If you’re an owner, operator, or user of BPS, you need to make sure you’re complying with the NERC CIP standards. Whether you’re involved in generation, transmission, or distribution of bulk power, these standards and the risks they prevent impact you directly.

Here at RSI Security, our mission is to help you secure your success by bolstering your cyber defenses up to and beyond all relevant requirements. One of the many services we offer is comprehensive NERC compliance analysis and certification. We’ve worked with countless NERC entities to ensure they’re compliant and secure, avoiding both the hassle of sanctions and the very real threats these standards are meant to prevent.

Our team of experts can help with all stages of compliance. Once we get to know your business, we’ll assess your strengths and weaknesses from a cybersecurity perspective and facilitate your adoption of all relevant practices. We equip you with the tools and knowledge to keep yourself safe moving forward.

For NERC compliance and all your cybersecurity needs contact RSI today!

 

 

Exit mobile version