Protecting the Cyber Side

Companies required to manage property access, as well as secure facilities

Vandalism, theft and acts of terrorism in recent years have motivated the electric generation and transmission industry to seek viable security solutions. Companies must secure their facilities and protect their physical and electronic assets while managing access to their properties state-to-state over geographically widespread regions.

Recognizing the serious impact to the local and national economy, and to people's lives, when the power goes off, ITC Holdings makes it a priority to protect the transmission grid and provide efficient, reliable energy to its customers. ITC's vision is to have highly effective processes and procedures in place that meet or exceed the new government security standards.

A New Approach

Robert Blickensdorf, ITC's security manager, is responsible for project management as it relates to the installation, maintenance and operation of physical security at ITC facilities. He serves as the liaison between ITC, local law enforcement and other security organizations within the industry.

"ITC corporate leaders realize the importance of protecting our physical and electronic assets, and have been very supportive of our security initiatives," Blickensdorf said.

Facing an overwhelming array of choices and costs, ITC developed a risk-based methodology for pursuing a balanced approach to their security goals. ITC had to determine the type of physical security that would best serve each location, install and integrate the necessary security devices, and maintain and monitor the effectiveness of the system.

Facing threats of vandalism and theft due to the high price of copper and other metals on the open market, ITC adopted measures to prevent someone from accessing one of its sites with the intent of stealing metal and, in the process, causing damage that affects the reliability of the system or the safety of employees and contractors. Vulnerability is heightened at ITC's remote sites because of their isolation. In an effort to address these concerns, the company installed security equipment to prevent vandalism or theft at these sites.

"We do not want to give any individual or organization the opportunity to sabotage the system, because the impact is too far reaching," Blickensdorf said.

ITC's physical security projects encompass ITC headquarters, substations and warehouses. In addition to the live cameras and alarm system, the company has installed perimeter fence intrusion monitors, photobeam towers, infrared illumination devices, motiondetection towers and other physical security equipment at strategic locations. It also has an integrated online access card system installed throughout its facilities. Alarm information is quickly transmitted to the security command center for action.

Meeting the Standards

The Federal Energy Regulatory Commission and the North American Electric Reliability Corp. have established security standards to prevent electronic and physical attacks that could cripple the energy industry, which is a critical part of the nation's infrastructure.

In January 2008, critical infrastructure protection reliability standards were approved for the purpose of protecting the physical security of critical cyber assets. CIP Standard 006-1 "requires a responsible entity to create and maintain a physical security plan that ensures that all cyber assets within an electronic security perimeter also reside within an identified physical security perimeter. The physical security plan ... must contain processes for identifying, controlling and monitoring all access points and authorization requests. The logging of physical access must occur at all times, and the information logged must be sufficient to uniquely identify individuals."

Logistic challenges confronted ITC in developing a strategy for meeting the CIP Reliability Standards. As officials began to tackle these issues, they looked for a secure access control system that would provide the flexibility they needed. Most importantly, the company needed a system that could bring key control and an audit trail to its remote sites without requiring power at the lock.

"We required a system that could eliminate the risks associated with the duplication of keys and assist us with CIP compliance by tracking contractors and employees that go into locations that contain critical cyber assets," Blickensdorf said.

They were looking for a product that also could be integrated with the security equipment and systems they already had in place. The use of the electronic key has eliminated issues that ITC experienced in the past with mechanical keys.

"With the new restrictive electronic key in the field, we have accountability and an electronic record of where the key has been used, how it has been used and by whom," Blickensdorf said.

Each electronic key is set with an automatic expiration date to reduce the risks associated with lost keys. If a key is missing, ITC can quickly deactivate the key or let the key automatically expire.

The Key to Security

"Everyone in the industry is working toward CIP compliance," Blickensdorf said. "The electronic lock system assists us with compliance to CIP standards by tracking people who go into locations that contain critical cyber assets."

An electronic lock allows officials to download information about the lock and determine who recently accessed it. Each authorized user's key is programmed to access selected locks at specific locations and only during certain times of the day. The electronic locks and keys audit openings and attempts to enter areas that protect electronic data and equipment.

"The electronic lock system provides a two-pronged approach to controlling physical access to our electronic assets," Blickensdorf said. "First, we can control who we issue a key to and how the key is to be used by that person. Second, we can track that person's activity at the different sites."

By partnering with a capable access control system integrator and taking advantage of today's advances in security technology, ITC has integrated security systems that will continue to provide the physical security and accountability it requires. As government standards evolve and new security threats emerge, ITC is in a strong position to respond quickly and decisively.

This article originally appeared in the issue of .

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Digital Access in the Workplace

    It is simple to set up a unified, robust access control solution for one tenant leasing one building. It is even easier if the tenant owns the property. But what is involved when multiple companies lease space in a building? And what about companies that have multiple buildings in the same city or locations across various regions in the country and the world? Read Now

  • Cloud and Hybrid Adoption on the Rise

    The physical security industry is experiencing a time of great transformation. Cloud connectivity is accelerating, and more organizations are choosing to blend on-premises and cloud-based solutions. This transformation is affecting all aspects of security, including access control. In the Genetec annual State of Physical Security Survey, it was access control that topped the list of new technologies end-users planned to focus on in 2024. Read Now

  • Texas City Replaces Locks on Intelligent Traffic Cabinets With More Secure Option

    The Transportation Services and Mobility department for the city of Grand Prairie, Texas recently completed a substantial project to replace the locks on their Intelligent Traffic Cabinets with a better and more secure choice. Turns out what they needed was only a few miles away with ALCEA’s Traffic Cabinet Locking Solution powered by ABLOY technology. Read Now

Featured Cybersecurity

Webinars

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3