visualizing nistir 7628, guidelines for smart grid cyber security · 2019. 7. 17. · visualizing...

8
Visualizing NISTIR 7628, Guidelines for Smart Grid Cyber Security Matthew Harvey; Daniel Long; Karl Reinhard University of Illinois Urbana-Champaign, Dept. of Electrical Engineering AbstractThe National Institute of Standards and Technology Interagency Report (NISITR) 7628, Guidelines for Smart Grid Cyber Security, provides an analytical framework that stakeholders can use to develop effective Smart Grid related characteristics, risks, and vulnerabilities. NISTIR 7628 spans more than 600 pages and is densely packed with technical information drawn from multiple disciplines, which to many readers is difficult to broadly conceptualize and apply. This paper explores methods for visualizing the complexities of NISTIR 7628’s cyber security guidelines for the nascent Smart Grid and aiding readers to better synthesize the information presented. I. INTRODUCTION The United States and other advanced industrial countries around the world have embarked upon a long term effort to modernize their electric power infrastructures. This modernization effort includes applying advanced digital technologies to systems to expand communications and control over very large systems to achieve ever increasing efficiency while maintaining very high reliability. The broad application of digital technologies is accompanied by increased exposure to malicious attacks upon the power grid's digital infrastructures. As the digital infrastructure expands, the exposure to and consequences of compromise also expand. In August of 2010, the National Institute of Standards and Technology (NIST) Computer Security Division published NISTIR 7628, Guidelines for Smart Cyber Security, which expands upon the Smart Grid cyber security principles published in NIST's 2010 Special Publication 1108, NIST Framework and Roadmap for Smart Grid Interoperability Standards. NISTIR 7628 synthesizes the input of more than 500 stakeholder representatives from the private sector (including utilities, vendors, manufacturers, and electric service providers), various standards organizations, academia, regulatory organizations, and federal agencies. The guidelines represent power, computer, information technology, and telecommunications industry perspectives. The document is a first effort to develop a technical, analytical framework needed to inform individuals and organizations responsible for addressing cyber security for Smart Grid systems and its constituent hardware and software components. The document is envisioned as a first step in evolutionary series of documents that will produce standard protocols, interfaces, and technical specifications needed for a secure Smart Grid. The document focuses exclusively on the cyber-security aspects and does not address physical security requirements. II. NISTIR 7628 A. NISTIR Diagrams NISTIR 7628 conceptualized the power grid at the higest level as being composed of seven Domains: marketing, operations, sevice provider, bulk generation, transmission, distribution, and customer as seen in Fig. 1. A Smart Grid domain is a high level grouping of orgainizations, buildings, individuals, systems, devices with similar objectives or functions. Fig. 2 shows 46 actors that comprise the seven domains. Actors are devices, systems, or programs that make decisions and exchange the information necessary for the Smart Grid to function. This actors list is intended to be comprehensive, but not all inclusive, as this model represents diverse real-world organizations that are uniquely purposed and organized . The Logical Reference Model show in Fig. 3 depicts 130 logical interfaces (interactions between actors. The obvious challenge posed by this representation’s complexity is for users to translate its high level abstractions into implementable policies and procedures on their organizations information processing systems (hardware, software, network, etc.) To aid this synthesis, NISTIR 7628 identifies 22 logical Fig. 1 Interactions of Actors in Different Smart Grid Domains through Secure Communications Flows [1] Submitted for publication. Author copy – do not redistribute.

Upload: others

Post on 16-Sep-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Visualizing NISTIR 7628, Guidelines for Smart Grid Cyber Security · 2019. 7. 17. · Visualizing NISTIR 7628, Guidelines for Smart Grid Cyber Security Matthew Harvey; Daniel Long;

Visualizing NISTIR 7628, Guidelines for Smart Grid Cyber Security

Matthew Harvey; Daniel Long; Karl Reinhard University of Illinois Urbana-Champaign, Dept. of Electrical Engineering

Abstract— The National Institute of Standards and Technology Interagency Report (NISITR) 7628, Guidelines for Smart Grid Cyber Security, provides an analytical framework that stakeholders can use to develop effective Smart Grid related characteristics, risks, and vulnerabilities. NISTIR 7628 spans more than 600 pages and is densely packed with technical information drawn from multiple disciplines, which to many readers is difficult to broadly conceptualize and apply. This paper explores methods for visualizing the complexities of NISTIR 7628’s cyber security guidelines for the nascent Smart Grid and aiding readers to better synthesize the information presented.

I. INTRODUCTION The United States and other advanced industrial countries around the world have embarked upon a long term effort to modernize their electric power infrastructures. This modernization effort includes applying advanced digital technologies to systems to expand communications and control over very large systems to achieve ever increasing efficiency while maintaining very high reliability. The broad application of digital technologies is accompanied by increased exposure to malicious attacks upon the power grid's digital infrastructures. As the digital infrastructure expands, the exposure to and consequences of compromise also expand.

In August of 2010, the National Institute of Standards and Technology (NIST) Computer Security Division published NISTIR 7628, Guidelines for Smart Cyber Security, which expands upon the Smart Grid cyber security principles published in NIST's 2010 Special Publication 1108, NIST Framework and Roadmap for Smart Grid Interoperability Standards. NISTIR 7628 synthesizes the input of more than 500 stakeholder representatives from the private sector (including utilities, vendors, manufacturers, and electric service providers), various standards organizations, academia, regulatory organizations, and federal agencies. The guidelines represent power, computer, information technology, and telecommunications industry perspectives. The document is a first effort to develop a technical, analytical framework needed to inform individuals and organizations responsible for addressing cyber security for Smart Grid systems and its constituent hardware and software components. The document is envisioned as a first step in evolutionary series of documents that will produce standard protocols, interfaces, and technical specifications needed for a secure Smart Grid.

The document focuses exclusively on the cyber-security aspects and does not address physical security requirements.

II. NISTIR 7628

A. NISTIR Diagrams NISTIR 7628 conceptualized the power grid at the higest

level as being composed of seven Domains: marketing, operations, sevice provider, bulk generation, transmission, distribution, and customer as seen in Fig. 1. A Smart Grid domain is a high level grouping of orgainizations, buildings, individuals, systems, devices with similar objectives or functions.

Fig. 2 shows 46 actors that comprise the seven domains. Actors are devices, systems, or programs that make decisions and exchange the information necessary for the Smart Grid to function. This actors list is intended to be comprehensive, but not all inclusive, as this model represents diverse real-world organizations that are uniquely purposed and organized . The Logical Reference Model show in Fig. 3 depicts 130 logical interfaces (interactions between actors. The obvious challenge posed by this representation’s complexity is for users to translate its high level abstractions into implementable policies and procedures on their organizations information processing systems (hardware, software, network, etc.)

To aid this synthesis, NISTIR 7628 identifies 22 logical

Fig. 1 Interactions of Actors in Different Smart Grid Domains through Secure Communications Flows [1]

Submitted for publication. Author copy – do not redistribute.

Page 2: Visualizing NISTIR 7628, Guidelines for Smart Grid Cyber Security · 2019. 7. 17. · Visualizing NISTIR 7628, Guidelines for Smart Grid Cyber Security Matthew Harvey; Daniel Long;

interface categories that group logical interfaces based upon similar attributes affecting cyber security requirements; the logical interface categories are listed and described in Table 2-2. The grouping criteria include the three traditional Information Assurance dimensions: confidentiality, integrity,

and availability. Other criteria include domain and logical interface information content. Each logical interface can be thought of as a layer in a three dimensional representation. As an example, Fig. 4 provides a graphical depiction of Logical

Fig. 2 Composite High-level View of the Actors within Each of the Smart Grid Domains [1]

Fig. 3 Logical Reference Model [1]

Page 3: Visualizing NISTIR 7628, Guidelines for Smart Grid Cyber Security · 2019. 7. 17. · Visualizing NISTIR 7628, Guidelines for Smart Grid Cyber Security Matthew Harvey; Daniel Long;

Interface 6, which shows the interfaces between control systems (actors) in organizations in 3 domains.

In addition to the Logical Interface Categories defined in Chapter 2, NISTIR identifies 10 architecturally significant Use Cases that involve different actor and logical interface sets, which have similar complexity and graphical representations. These Use Cases include: advance metering architecture (AMI), Demand Response, Customer Interfaces, Electricity Market, Distribution Automation, Plug-in Hybrid Electric Vehicles (PHEV), Distributed Resources, Transmission Resources, Regional Transmission Operations / Independent System Operators (RTO/ISO), Operations, and Asset Management.

Over the course of 3 years of association with the TCIPG Project and studying NISTIR 7628, we have observed that the document was prepared by experts from three very disparate disciplines: power system engineers, computer and network engineers, and information technologist. There are relatively few experts in these disciplines with overlapping knowledge that bridges the gaps between these disciplines. Consequently, for most readers, the task of making sense of the very detailed and often unfamiliar information is quite daunting.

As a team, we have detailed knowledge of power systems but less knowledge of computer engineering and information management technologies. Therefore, our interest is developing a resource that dramatically accelerates the process of assembling data and information to facilitate synthesizing the complex ideas and relationships necessary to improve cyber security. We believe innovative approaches to visualizing NISTIR 7628’s content would be a big step forward. Further, the user must be able define and adapt the

visualizations appropriate to his own knowledge base and purpose. We also envision the user being able to leverage other resources to seamlessly assemble other information appropriate to their purpose.

III. VISUALIZING NISTIR 7628 Our research vision is to create user controllable visual

representations of the information in NISTIR 7628 to enable cyber security. The interactive interface would enable the user to organize information to provide insights that would otherwise be difficult to reach; this includes controlling the content and detail of information presented. For instance, we envision aiding the identification of common requirements across different Logical Interface Categories and Use Cases by displaying only that information. We also envision aiding the identification of common requirements across different Logical Interface Categories and Use Cases by displaying only that information. We also envision being able to pull-up and drill-into detailed information not a part of the current view – and open and close other related information as needed.

Our first small step to achieving this vision was to explore ways to stack select logical interface categories as distinct data layers. For example, consider the stacked Logical Interface Categories shown in Fig. 5 – an oblique visualization of several logical interface categories from pages taken directly from the document. This is helpful to illustrating the concept, but not very practical from productive use. We have developed two applications to explore implementing our ideas: 1) a web-based HTML application and 2) a MATLAB-based application leveraging 3D graphing capabilities. A. HTML Web Page Visualization

The HTML-based visualization creates a data layer for each of the 22 logical interface categories; See Fig. 6. Users select the interface layers of interest on the list of 22 interface layers. The selected layers are displayed stacked from the straight-on perspective. The user sees the selected overlapping actors and their interfaces. The data layers can easily be toggled on and off with a mouse click making commonalities

Fig. 5 Logical Interface Category 6, Interface between controls in different organizations [1]

Fig. 4 Stacked Logical Interface Categories [1]

Page 4: Visualizing NISTIR 7628, Guidelines for Smart Grid Cyber Security · 2019. 7. 17. · Visualizing NISTIR 7628, Guidelines for Smart Grid Cyber Security Matthew Harvey; Daniel Long;

and differences easy to identify. The web page’s stacked depiction focuses the user’s effort on the data without the tedium of thumbing through 50 pages in the document.

The web page visualization proved to be a good first step. However, from the outset, we know that it would sacrifice some information in the NISTIR’s Logical Interface Category diagrams not easily captured with this approach. For example to see more detail about the interface between two actors, a user would still refer back to the paper document. The absence of the third dimension in the visualization made it difficult for the user to track which actors and interfaces were associated with each interface layer. B. MATLAB Visualization

Our efforts to create the 3D representation using MATLAB were much more complex. The actors and interfaces for each logical interface category are assigned coordinates in the x-y plane. The logical interface categories are assigned coordinates on the z axis; see Fig. 3. Like the HTML model, interface categories of interest can be selected and stacked to focus upon the logical interface layers of interest. An attractive feature of the MATLAB representation is the graphical representation can be rotated in the three axes to gain the best view of the relationships of interest. The biggest feature this model has is the unique ability to rotate the model and visualize it from every angle.

Fig. 7 shows the top layer of the visualization model as represented in MATLAB, the actors portrayed are in the similar locations and color coded to the NISTIR 7628 layouts to minimize confusion as much as possible. The MATLAB

tool allows a unique element to be added to model, which is a three dimensional layer that allows users to see the depth of the NISTIR 7628, something that has never been modeled before.

As well as the depth included in the MATLAB model, the information about each connection and relationship can be stored in the tool and accessed with a simple click of the button. This will allow people to understand and grasp a much larger amount of information with the simplicity of an application. Lacking in the MATLAB model is the clarity within a few aspects. Labeling the current model proved to be quite challenging. We found labels that work from a straight-on perspective can be quite difficult to read from other vantage points and create clutter that obscures important details.

We have presented the tool at several conference events with industry, government, and academic participants – and received very encouraging feedback. C. NetAPT Visualization

NISTIR 7628 provided a conceptual construct for understanding the actors and their interaction. However, the NISTIR 7628 paradigm can provide misleading impressions about the physical implementations of the power grid’s cyber systems. The Network Access Policy Tool (NetAPT) developed at the Information Trust Institute; University of Illinois at Urbana-Champaign provided a contracting graphical view of the actors and their interfaces. NetAPT ingests firewall rule information and uses it to generate a

Fig. 6 HTML Model

Page 5: Visualizing NISTIR 7628, Guidelines for Smart Grid Cyber Security · 2019. 7. 17. · Visualizing NISTIR 7628, Guidelines for Smart Grid Cyber Security Matthew Harvey; Daniel Long;

graphical depiction – a depiction based upon actual system connections and less upon the conceptual functions captured in NISTIR 7628. Fig. 8 provided an example of a prototype power providers system. Now, this depiction has a much different structure than the NISTIR 7628 paradigm would produce. Both representations are valid. This poses interesting lines of investigation leveraging one representation against the other to gain insights that might otherwise not be apparent.

IV. FUTURE EFFORTS While our efforts to date have produced interesting and

useful representations, we recognize that our progress is far from our envisioned functionality. Through our work to-date, we have gained an appreciation for the significant challenges involved.

In the near term, we are seeking off-the-shelf applications that can be adapted to our purposes. Immediate objectives include current and the following desired capabilities to

Label graphical features and easily accommodate interactive perspective changes

Easily zoom-in and pan-out

Increase available information content, while affording the user robust displayed content control

Automatically generate graphic layouts that are both useful and appealing form alternate perspectives

Automatically ingest data to minimize the level of effort required to create, organize, and maintain the underlying “data stores”

A. Conclusions With daily reports of attacks, there is an urgent need to

broadly improve the power grids cyber security posture. The diversity and complexity of the measures environment. Consequently, it is very important that the efforts be placed against the most dangerous threat and vulnerability combinations. This drives the urgent need to understand the requirements established in documents like NISTIR 7628, which are extremely complex. We have demonstrated first steps to producing a graphical depiction that aids synthesizing key insights into the requirements. We have also refined our vision for an application to aid synthesizing complex cyber security information.

REFERENCES [1] NISTIR 7628: Guidelines to Smart Grid Cyber Security, NISTIR 7628,

2010. [2] NetAPT Access Policy Tool. Web. Available:

https://www.perform.illinois.edu/netapt/

Fig. 7 MATLAB Model

Page 6: Visualizing NISTIR 7628, Guidelines for Smart Grid Cyber Security · 2019. 7. 17. · Visualizing NISTIR 7628, Guidelines for Smart Grid Cyber Security Matthew Harvey; Daniel Long;

Fig. 8 TCIPG NetAPT Cyber Network Representation of Utility [2]

Page 7: Visualizing NISTIR 7628, Guidelines for Smart Grid Cyber Security · 2019. 7. 17. · Visualizing NISTIR 7628, Guidelines for Smart Grid Cyber Security Matthew Harvey; Daniel Long;

NIS

TIR

762

8 G

uide

lines

for S

mar

t Grid

Cyb

er S

ecur

ity v

1.0

– A

ug 2

010

Tab

le 2

-2 L

ogic

al In

terf

aces

by

Cat

egor

y

Logi

cal I

nter

face

Cat

egor

y Lo

gica

l Int

erfa

ces

1. In

terfa

ce b

etw

een

cont

rol s

yste

ms

and

equi

pmen

t with

hig

h av

aila

bilit

y, a

nd w

ith

com

pute

and

/or b

andw

idth

con

stra

ints

, for

ex

ampl

e:

Bet

wee

n tra

nsm

issi

on S

CA

DA

and

sub

stat

ion

equi

pmen

t

Bet

wee

n di

strib

utio

n S

CAD

A a

nd h

igh

prio

rity

subs

tatio

n an

d po

le-to

p eq

uipm

ent

B

etw

een

SCA

DA

and

DC

S w

ithin

a p

ower

pl

ant

U3,

U67

, U79

, U81

, U82

, U85

, U10

2, U

117,

U

135,

U13

6, U

137

2. In

terfa

ce b

etw

een

cont

rol s

yste

ms

and

equi

pmen

t with

out h

igh

avai

labi

lity,

but

with

co

mpu

te a

nd/o

r ban

dwid

th c

onst

rain

ts, f

or

exam

ple:

B

etw

een

dist

ribut

ion

SC

ADA

and

low

er

prio

rity

pole

-top

equi

pmen

t

Bet

wee

n po

le-to

p IE

Ds

and

othe

r pol

e-to

p IE

Ds

U3,

U67

, U79

, U81

, U82

, U85

, U10

2, U

117,

U

135,

U13

6, U

137

3. In

terfa

ce b

etw

een

cont

rol s

yste

ms

and

equi

pmen

t with

hig

h av

aila

bilit

y, w

ithou

t com

pute

no

r ban

dwid

th c

onst

rain

ts, f

or e

xam

ple:

Bet

wee

n tra

nsm

issi

on S

CA

DA

and

sub

stat

ion

auto

mat

ion

syst

ems

U3,

U67

, U79

, U81

, U82

, U85

, U10

2, U

117,

U

135,

U13

6, U

137

4. In

terfa

ce b

etw

een

cont

rol s

yste

ms

and

equi

pmen

t with

out h

igh

avai

labi

lity,

with

out

com

pute

nor

ban

dwid

th c

onst

rain

ts, f

or e

xam

ple:

Bet

wee

n di

strib

utio

n S

CAD

A a

nd b

ackb

one

netw

ork-

conn

ecte

d co

llect

or n

odes

for

dist

ribut

ion

pole

-top

IED

s

U3,

U67

, U79

, U81

, U82

, U85

, U10

2, U

117,

U

135,

U13

6, U

137

5. In

terfa

ce b

etw

een

cont

rol s

yste

ms

with

in th

e sa

me

orga

niza

tion,

for e

xam

ple:

Mul

tiple

DM

S sy

stem

s be

long

ing

to th

e sa

me

utilit

y

Bet

wee

n su

bsys

tem

s w

ithin

DC

S a

nd

anci

llary

con

trol s

yste

ms

with

in a

pow

er p

lant

U9,

U27

, U65

, U66

, U89

6. In

terfa

ce b

etw

een

cont

rol s

yste

ms

in d

iffer

ent

orga

niza

tions

, for

exa

mpl

e:

B

etw

een

an R

TO/IS

O E

MS

and

a u

tility

en

ergy

man

agem

ent s

yste

m

U7,

U10

, U13

, U16

, U56

, U74

, U80

, U83

, U87

, U

115,

U11

6

7. In

terfa

ce b

etw

een

back

offi

ce s

yste

ms

unde

r co

mm

on m

anag

emen

t aut

horit

y, fo

r exa

mpl

e:

B

etw

een

a C

usto

mer

Info

rmat

ion

Sys

tem

and

a

Met

er D

ata

Man

agem

ent S

yste

m

U2,

U22

, U26

, U31

, U63

, U96

, U98

, U11

0

27

NIS

TIR

762

8 G

uide

lines

for S

mar

t Grid

Cyb

er S

ecur

ity v

1.0

– A

ug 2

010

Logi

cal I

nter

face

Cat

egor

y Lo

gica

l Int

erfa

ces

8.In

terfa

ce b

etw

een

back

offi

ce s

yste

ms

not

unde

r com

mon

man

agem

ent a

utho

rity,

for

exam

ple:

Bet

wee

n a

third

-par

ty b

illing

sys

tem

and

aut

ility

met

er d

ata

man

agem

ent s

yste

m

U1,

U6,

U15

, U55

9.In

terfa

ce w

ith B

2B c

onne

ctio

ns b

etw

een

syst

ems

usua

lly in

volv

ing

finan

cial

or m

arke

t tra

nsac

tions

, for

exa

mpl

e:

Bet

wee

n a

Ret

ail a

ggre

gato

r and

an

Ene

rgy

Cle

arin

ghou

se

U4,

U17

, U20

, U51

, U52

, U53

, U57

, U58

, U70

, U

72, U

90, U

93, U

97

10.I

nter

face

bet

wee

n co

ntro

l sys

tem

s an

d no

n-co

ntro

l/cor

pora

te s

yste

ms,

for e

xam

ple:

B

etw

een

a W

ork

Man

agem

ent S

yste

m a

nd a

Geo

grap

hic

Info

rmat

ion

Sys

tem

U12

, U30

, U33

, U36

, U59

, U75

, U91

, U10

6,

U11

3, U

114,

U13

1

11.I

nter

face

bet

wee

n se

nsor

s an

d se

nsor

netw

orks

for m

easu

ring

envi

ronm

enta

l pa

ram

eter

s, u

sual

ly s

impl

e se

nsor

dev

ices

with

po

ssib

ly a

nalo

g m

easu

rem

ents

, for

exa

mpl

e:

Bet

wee

n a

tem

pera

ture

sen

sor o

n a

trans

form

er a

nd it

s re

ceiv

er

U11

1

12.I

nter

face

bet

wee

n se

nsor

net

wor

ks a

ndco

ntro

l sys

tem

s, fo

r exa

mpl

e:

Bet

wee

n a

sens

or re

ceiv

er a

nd th

e su

bsta

tion

mas

ter

U10

8, U

112

13.I

nter

face

bet

wee

n sy

stem

s th

at u

se th

e A

MI

netw

ork,

for e

xam

ple:

B

etw

een

MD

MS

and

met

ers

Bet

wee

n LM

S/D

RM

S a

nd C

usto

mer

EM

S

U8,

U21

, U25

, U32

, U95

, U11

9, U

130

14.I

nter

face

bet

wee

n sy

stem

s th

at u

se th

e A

MI

netw

ork

with

hig

h av

aila

bilit

y, fo

r exa

mpl

e:

Bet

wee

n M

DM

S a

nd m

eter

sB

etw

een

LMS

/DR

MS

and

Cus

tom

er E

MS

Bet

wee

n D

MS

App

licat

ions

and

Cus

tom

erD

ER

Bet

wee

n D

MS

App

licat

ions

and

DA

Fie

ldE

quip

men

t

U8,

U21

, U25

, U32

, U95

, U11

9, U

130

15.I

nter

face

bet

wee

n sy

stem

s th

at u

se c

usto

mer

(res

iden

tial,

com

mer

cial

, and

indu

stria

l) si

te

netw

orks

whi

ch in

clud

e:

Bet

wee

n C

usto

mer

EM

S a

nd C

usto

mer

Appl

ianc

es

Bet

wee

n C

usto

mer

EM

S a

nd C

usto

mer

DE

RB

etw

een

Ene

rgy

Ser

vice

Inte

rface

and

PE

V

U42

, U43

, U44

, U45

, U49

, U62

, U12

0, U

124,

U

126,

U12

7

28

Page 8: Visualizing NISTIR 7628, Guidelines for Smart Grid Cyber Security · 2019. 7. 17. · Visualizing NISTIR 7628, Guidelines for Smart Grid Cyber Security Matthew Harvey; Daniel Long;

NIS

TIR

762

8 G

uide

lines

for S

mar

t Grid

Cyb

er S

ecur

ity v

1.0

– A

ug 2

010

Logi

cal I

nter

face

Cat

egor

y Lo

gica

l Int

erfa

ces

16. I

nter

face

bet

wee

n ex

tern

al s

yste

ms

and

the

cust

omer

site

, for

exa

mpl

e:

B

etw

een

Third

Par

ty a

nd H

AN

Gat

eway

Bet

wee

n E

SP a

nd D

ER

Bet

wee

n C

usto

mer

and

CIS

Web

site

U18

, U37

, U38

, U39

, U40

, U88

, U92

, U10

0,

U10

1, U

125

17. I

nter

face

bet

wee

n sy

stem

s an

d m

obile

fiel

d cr

ew la

ptop

s/eq

uipm

ent,

for e

xam

ple:

Bet

wee

n fie

ld c

rew

s an

d G

IS

B

etw

een

field

cre

ws

and

subs

tatio

n eq

uipm

ent

U14

, U29

, U34

, U35

, U99

, U10

4, U

105

18. I

nter

face

bet

wee

n m

eter

ing

equi

pmen

t, fo

r ex

ampl

e:

Bet

wee

n su

b-m

eter

to m

eter

Bet

wee

n P

EV m

eter

and

Ene

rgy

Ser

vice

P

rovi

der

U24

, U41

, U46

, U47

, U48

, U50

, U54

, U60

, U64

, U

128,

U12

9

19. I

nter

face

bet

wee

n op

erat

ions

dec

isio

n su

ppor

t sys

tem

s, fo

r exa

mpl

e:

B

etw

een

WAM

S a

nd IS

O/R

TO

U77

, U78

, U13

4

20. I

nter

face

bet

wee

n en

gine

erin

g/m

aint

enan

ce

syst

ems

and

cont

rol e

quip

men

t, fo

r exa

mpl

e:

B

etw

een

engi

neer

ing

and

subs

tatio

n re

layi

ng

equi

pmen

t for

rela

y se

tting

s

Bet

wee

n en

gine

erin

g an

d po

le-to

p eq

uipm

ent

for m

aint

enan

ce

W

ithin

pow

er p

lant

s

U11

, U10

9

21. I

nter

face

bet

wee

n co

ntro

l sys

tem

s an

d th

eir

vend

ors

for s

tand

ard

mai

nten

ance

and

ser

vice

, fo

r exa

mpl

e:

B

etw

een

SCA

DA

sys

tem

and

its

vend

or

U5

22. I

nter

face

bet

wee

n se

curit

y/ne

twor

k/sy

stem

m

anag

emen

t con

sole

s an

d al

l net

wor

ks a

nd

syst

ems,

for e

xam

ple:

Bet

wee

n a

secu

rity

cons

ole

and

netw

ork

rout

ers,

fire

wal

ls, c

ompu

ter s

yste

ms,

and

ne

twor

k no

des

U13

3 (in

clud

es in

terfa

ces

to a

ctor

s 17

-G

eogr

aphi

c In

form

atio

n S

yste

m, 1

2 –

Dis

tribu

tion

Dat

a C

olle

ctor

, 38

– C

usto

mer

Por

tal,

24 –

C

usto

mer

Ser

vice

Rep

rese

ntat

ive,

23

– C

usto

mer

Info

rmat

ion

Sys

tem

, 21

– A

MI

Hea

dend

, 42

– B

illing

, 44

– Th

ird P

arty

, 43

– E

nerg

y S

ervi

ce P

rovi

der,

41 –

Agg

rega

tor /

Ret

ail

Ene

rgy

Pro

vide

r, 19

– E

nerg

y M

arke

t C

lear

ingh

ouse

, 34

– M

eter

ing

/ Billi

ng /

Util

ity

Bac

k O

ffice

)

29

NIS

TIR

762

8 G

uide

lines

for S

mar

t Grid

Cyb

er S

ecur

ity v

1.0

– A

ug 2

010

2.3.

1Lo

gica

l Int

erfa

ce C

ateg

orie

s 1—

4

Logi

cal I

nter

face

Cat

egor

y 1:

Inte

rfac

e be

twee

n co

ntro

l sys

tem

s an

d eq

uipm

ent w

ith h

igh

avai

labi

lity,

and

with

com

pute

and

/or b

andw

idth

con

stra

ints

Logi

cal I

nter

face

Cat

egor

y 2:

Inte

rfac

e be

twee

n co

ntro

l sys

tem

s an

d eq

uipm

ent w

ithou

t hi

gh a

vaila

bilit

y, b

ut w

ith c

ompu

te a

nd/o

r ban

dwid

th c

onst

rain

ts

Logi

cal I

nter

face

Cat

egor

y 3:

Inte

rfac

e be

twee

n co

ntro

l sys

tem

s an

d eq

uipm

ent w

ith h

igh

avai

labi

lity,

with

out c

ompu

te o

r ban

dwid

th c

onst

rain

ts

Logi

cal I

nter

face

Cat

egor

y 4:

Inte

rfac

e be

twee

n co

ntro

l sys

tem

s an

d eq

uipm

ent w

ithou

t hi

gh a

vaila

bilit

y, w

ithou

t com

pute

or b

andw

idth

con

stra

ints

Logi

cal i

nter

face

cat

egor

ies 1

thro

ugh

4 co

ver c

omm

unic

atio

ns b

etw

een

cont

rol s

yste

ms

(typi

cally

cen

traliz

ed a

pplic

atio

ns su

ch a

s a S

CA

DA

mas

ter s

tatio

n) a

nd e

quip

men

t as w

ell a

s co

mm

unic

atio

ns b

etw

een

equi

pmen

t. Th

e eq

uipm

ent i

s cat

egor

ized

with

or w

ithou

t hig

h av

aila

bilit

y. T

he in

terf

ace

com

mun

icat

ion

chan

nel i

s cat

egor

ized

with

or w

ithou

t com

puta

tiona

l an

d/or

ban

dwid

th c

onst

rain

ts. A

ll ac

tiviti

es in

volv

ed w

ith lo

gica

l int

erfa

ce c

ateg

orie

s 1 th

roug

h 4

are

typi

cally

mac

hine

-to-m

achi

ne a

ctio

ns. F

urth

erm

ore,

com

mun

icat

ion

mod

es a

nd ty

pes a

re

sim

ilar b

etw

een

logi

cal i

nter

face

cat

egor

ies 1

thro

ugh

4 an

d ar

e de

fined

as f

ollo

ws:

Inte

rfac

e D

ata

Com

mun

icat

ion

Mod

e

–N

ear R

eal-T

ime

Freq

uenc

y M

onito

ring

Mod

e (m

s, su

bcyc

le b

ased

on

a 60

Hz

syst

em) (

may

or m

ay n

ot in

clud

e co

ntro

l act

ion

com

mun

icat

ion)

–H

igh

Freq

uenc

y M

onito

ring

Mod

e (2

s 6

0 s s

can

rate

s)

–Lo

w F

requ

ency

Mon

itorin

g M

ode

(sca

n/up

date

rate

s in

exce

ss o

f 1 m

in, f

ile

trans

fers

)

Inte

rfac

e D

ata

Com

mun

icat

ion

Type

–M

onito

ring

and

Con

trol D

ata

for r

eal-t

ime

cont

rol s

yste

m e

nviro

nmen

t (ty

pica

l m

easu

rem

ent a

nd c

ontro

l poi

nts)

–Eq

uipm

ent M

aint

enan

ce a

nd A

naly

sis (

num

erou

s mea

sure

men

ts o

n fie

ld e

quip

men

t th

at is

typi

cally

use

d fo

r pre

vent

ive

mai

nten

ance

and

pos

t ana

lysi

s)

–Eq

uipm

ent M

anag

emen

t Cha

nnel

(rem

ote

mai

nten

ance

of e

quip

men

t)

The

char

acte

ristic

s tha

t var

y be

twee

n an

d di

stin

guis

h ea

ch lo

gica

l int

erfa

ce c

ateg

ory

are

the

avai

labi

lity

requ

irem

ents

for t

he in

terf

ace

and

the

com

puta

tiona

l/com

mun

icat

ions

con

stra

ints

for

the

inte

rfac

e as

follo

ws:

Ava

ilabi

lity

Req

uire

men

ts –

Ava

ilabi

lity

requ

irem

ents

will

var

y be

twee

n th

ese

inte

rfac

es

and

are

driv

en p

rimar

ily b

y th

e po

wer

syst

em a

pplic

atio

n w

hich

the

inte

rfac

e su

ppor

ts

and

not b

y th

e in

terf

ace

itsel

f. Fo

r exa

mpl

e, a

SC

AD

A in

terf

ace

to a

subs

tatio

n or

pol

e-to

p R

TU m

ay h

ave

a H

IGH

ava

ilabi

lity

requ

irem

ent i

n on

e ca

se b

ecau

se it

is su

ppor

ting

criti

cal m

onito

ring

and

switc

hing

func

tions

or a

MO

DER

ATE

to L

OW

ava

ilabi

lity

if su

ppor

ting

an a

sset

-mon

itorin

g ap

plic

atio

n.

30