NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines

The National Institute of Standards and Technology has issued its first Guidelines for Smart Grid Cyber Security, which includes high-level security requirements, a framework for assessing risks, an evaluation of privacy issues at personal residences, and additional information for businesses and organizations to use as they craft strategies to protect the modernizing power grid from attacks, malicious code, cascading errors and other threats.

The product of two formal public reviews and the focus of numerous workshops and teleconferences over the past 17 months, the three-volume set of guidelines is intended to facilitate organization-specific Smart Grid cyber security strategies focused on prevention, detection, response and recovery.

The new report was prepared by the Cyber Security Working Group (CSWG) of the Smart Grid Interoperability Panel, a public-private partnership launched by NIST with American Recovery and Reinvestment Act funding from the Department of Energy. The guidelines are the second major output of NIST-coordinated efforts to identify and develop standards needed to convert the nation's aging electric grid into an advanced, digital infrastructure with two-way capabilities for communicating
information, controlling equipment and distributing energy.

"These advisory guidelines are a starting point for the sustained national effort that will be required to build a safe, secure and reliable Smart Grid," said George Arnold, NIST's national coordinator for Smart Grid interoperability. "They provide a technical foundation for utilities, hardware and software manufacturers, energy management service providers, and others to build upon. Each organization's implementation of cyber security requirements should evolve as technology advances and new threats to grid security arise."

The report advocates a layered—or "defense in depth"—approach to security. Because cyber security threats are diverse and evolving, the report recommends implementing multiple levels of security.

The guidelines identify 137 interfaces—points of data exchange or other types of interactions within or between different Smart Grid systems and subsystems. These are assigned to one or more of 22 categories on the basis of shared or similar functional and security characteristics. In all, the report details 189 high-level security requirements applicable either to the entire Smart Grid or to particular parts of the grid and associated interface categories.

All three volumes of Guidelines for Smart Grid Cyber Security (NISTIR 7628) can be downloaded at: http://csrc.nist.gov/publications/PubsNISTIRs.html#NIST-IR-7628.

Under the Energy Independence and Security Act of 2007, Congress assigned NIST to coordinate development of a framework that would enable a Smart Grid that is safe, secure and interoperable from end to end. In its January 2010 report, NIST described a high-level conceptual reference model for the Smart Grid, identified existing or emerging standards relevant to the ongoing development of an interoperable Smart Grid, and spelled out several high-priority standards-related gaps and issues that NIST and its partners are now addressing.

Featured

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”