美國(guó)能源部發(fā)布建立網(wǎng)絡(luò)彈性能源系統(tǒng)的戰(zhàn)略 -National Cyber-Informed Engineering Strategy_第1頁(yè)
美國(guó)能源部發(fā)布建立網(wǎng)絡(luò)彈性能源系統(tǒng)的戰(zhàn)略 -National Cyber-Informed Engineering Strategy_第2頁(yè)
美國(guó)能源部發(fā)布建立網(wǎng)絡(luò)彈性能源系統(tǒng)的戰(zhàn)略 -National Cyber-Informed Engineering Strategy_第3頁(yè)
美國(guó)能源部發(fā)布建立網(wǎng)絡(luò)彈性能源系統(tǒng)的戰(zhàn)略 -National Cyber-Informed Engineering Strategy_第4頁(yè)
美國(guó)能源部發(fā)布建立網(wǎng)絡(luò)彈性能源系統(tǒng)的戰(zhàn)略 -National Cyber-Informed Engineering Strategy_第5頁(yè)
已閱讀5頁(yè),還剩50頁(yè)未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說(shuō)明:本文檔由用戶(hù)提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

PAGE|1

NationalCyber-InformedEngineeringStrategy

PAGE|2

NationalCyber-InformedEngineeringStrategy

NotefromtheSecretary

Intoday’sincreasinglyinterconnectedworld,America’ssafetyandwell-beingdependoncybersecurity.

That’swhyPresidentBidenconsidershardeningthenationagainstcyberattacksatoppriorityforhisadministration—andonethathasonlygrowninimportanceasthecountryembarksonthebiggestbuildoutofcriticalinfrastructureandmanufacturingcapacityinageneration.

Eachstageofthecleanenergytransformationthatwillbringwithitanopportunityandanimperativetofurtherincreasesecurity,reliability,andresilienceinAmerican’senergysector.TheCyber-InformedEngineering(CIE)Strategyshowsushowwecanseizetheopportunitytoaddressthesechallenges.

Thisframework,grownfromearlierCongressionaldirectionregardingthreatstothenation’senergysector,advocatesforanevolutionaryshiftacrosstheenergyindustryandrelatedinstitutions,includingresearchers,standardsbodies,Federalpartners,andothers.Itsrecommendationsreflectexpertiseandinsightfromenergycompanies,energysystemsandcybersecuritymanufacturers,standardsbodies,researchers,DOENationalLaboratories,andFederalpartnersinthecybersecurityandengineeringmissionspace.Itencouragestheadoptionofa“security-by-design”mindsetwithintheEnergySectorIndustrialBase,whichreferstobuildingcybersecurityintoourenergysystemsattheearliestpossiblestagesratherthantryingtosecurethesecriticalsystemsafterdeployment.ThankstoPresidentBiden’sBipartisanInfrastructureLaw,wecanmatchtheCIEframeworkwithnewinvestmentsincleanenergyinfrastructureandmanufacturingtobeginbuildingmoresecurecleanenergysystemshereathome.

CIEfurtherguidesourcyberworkforcedevelopmentbyhelpingusandourpartnersfocusonthestrategicintersectionbetweencybersecurityandengineering,addressinggapsinhowwetrainengineersandtechniciansandprovidingthemwiththemeanstobuildinsecurityfromthegroundup.Whenourworkforceisproperlyeducatedandsupported,wearebetterpositionedtomanufactureandmaintainthetoolsthathelpuspreventandquicklyrecoverfromcyberattacks.

Thisframeworkoffersusaclearpathforwardtothefutureofenergysecurity,inwhichAmericawillstandattheforefrontofglobalinnovationandcleanenergymanufacturing.FollowingtheCIEstrategywillhelpensurethatourgridisnotonlyresistanttoinitialattacks,butresilientenoughtopreventandmitigatedisruptionstoourenergysupplies,economy,andeverydaylives.

I’dliketooffermydeepgratitudeandappreciationfortheSecuringEnergyInfrastructureExecutiveTaskForce(SEIETF)whohelpedustakeacriticalstepforwardbyleadingthedevelopmentoftheCIEstrategy.Thework,however,continues.Itwilltakeclosecollaborationbetweengovernmentandindustrytoensureenergysystemsofthefuturearedesignedandbuiltforsecurityandreliability.Aswe

PAGE|3

NationalCyber-InformedEngineeringStrategy

pursueourtransitiontoacompletelycleanenergysector,wewillkeepsecurityandreliabilityfrontandcenter,andwillneedtostandshoulder-to-shoulderwithourinter-agencypartnersattheCybersecurityandInfrastructureSecurityAgency(CISA),NationalInstituteforStandardsandTechnology(NIST),andmoretoensurethisCIEstrategyisimplementedtoaddresscurrentandfuturethreatlandscapes.Together,wewillsecureourenergysectoranddeliverastronger,cleanerfuture.

JenniferGranholm

Secretary

U.S.DepartmentofEnergy

PAGE|4

NationalCyber-InformedEngineeringStrategy

NotefromtheDirector

TheU.S.energysectorfacesever-evolvingcybersecuritythreats.Accordingtothe2022OfficeoftheDirectorofNationalIntelligence(DNI)AnnualThreatAssessment1,ouradversariesmaintaincapabilitiestolaunchcyberattacksthatcoulddisruptcriticalinfrastructure,includingindustrialcontrolsystemsintheU.S.energysector.Cybersecurityattacksoncriticalinfrastructureareparticularlyconsequentialandensuringthesecurity,reliability,andresilienceofthesesystemsisatoppriorityfortheU.S.DepartmentofEnergy’s(DOE)OfficeofCybersecurity,EnergySecurity,andEmergencyResponse(CESER)anditspartnersingovernmentandtheprivatesector.

Thiswilltakeaconcerted,collaborativeeffortbetweengovernmentandindustrytoensureenergysystemsofthefuturearebuiltsecurelytoprovidereliableenergytothenation.Buildingenergysystemssecurelybydesignmeansensuringallphasesoftheenergysystemlifecycle–fromdesignanddevelopmenttoinstallationandoperation–aresecureandcanquicklyrecoverfromcyberattacks.Thenationnowhasanunprecedentedopportunitytoshapethecybersecurityofourmostcriticalinfrastructurefordecadestocome.

ThereleaseoftheCyber-InformedEngineering(CIE)supportsCESER’sfivepriorities.Thoseprioritiesinclude:1)Strengtheningthevisibilityofcyberthreatsinenergysystems;2)Addressingsupplychainrisks;3)Promotingsecurity-andresilience-by-design;4)BuildingcyberandresiliencecapacityintheprivatesectorandtheState,local,territorial,andtribalcommunities;and5)Beingpreparedtorespondinpartnershipwithourgovernmentandindustrypartnerswhenacyberincidentoccursintheenergysector.CIE,inmanyways,cutsacrossallthoseprioritiesthroughitsfivepillars:awareness,education,development,currentinfrastructure,andfutureinfrastructure.

CIEisanemergingframework,originatedbytheNationalLaboratoriesandadvancedbyDOE,tobuildcybersecurityintothenation’senergysystemsattheearliestpossiblestagesratherthantryingtosecurethesecriticalsystemsafterdeployment.CESERleadsDOE’seffortstoimplementCIEtoprotectcriticalenergyinfrastructureassetsandleveragesexpertiseofitsintra-agencypartners.Forexample,CESERworkscloselywithofficesacrosstheDepartmentsuchastheOfficeofEnergyEfficiencyandRenewableEnergy,theOfficeofElectricity,theOfficeofIntelligenceandCounterintelligence,andotherstoensurecybersecurityisbuiltintoenergysystemsoftodayandintothefuture.

Asapowersystemsengineer,Iknowhowcriticalitistoensurethatcybersecurityisbuiltintostandardsusedtodesignenergysystemsofthefuture.Tothatend,wewillneedpartnerswithstandardsbodiessuchastheInstituteofElectricalandElectronicsEngineers(IEEE)andtheInternationalElectrotechnical

1OfficeoftheDirectorofNationalIntelligence,AnnualThreatAssessmentoftheU.S.IntelligenceCommunity(April2022),4-24.

/files/ODNI/documents/assessments/ATA-2022-Unclassified-Report.pdf

.

PAGE|5

NationalCyber-InformedEngineeringStrategy

Commission,educatorsandresearchersinacademia,andmanyotherstohelpuschampiontheCIEprinciples.Weneedtoensurethatcybersecurityissynonymouswithreliabilityandsafetyinstandardsdevelopmentworkinggroupsandinthehallwaysofengineeringcollegestoensurewearesuccessful.Wecanaccomplishmuchmorewhenwetackletheseissuescollaboratively.

Further,whileDOEisleadingthiseffortfromanenergyindustryperspective,theoverallapproachwillrequireclosecollaborationandsignificantworkwithitsinter-agencypartnersattheCybersecurityandInfrastructureSecurityAgency(CISA),NationalInstituteforStandardsandTechnology(NIST),andotherstoensuretheCIErecommendationshereinareimplementedacrossthecountrytoaddressthecurrentandfuturethreatlandscapes.

IextendmythankstotheSecuringEnergyInfrastructureExecutiveTaskForceandIdahoNationalLaboratorywhowereinstrumentalinthedevelopmentofthestrategy.TherecommendationshereinreflecttheexpertiseofEnergySectorIndustrialBase(ESIB)stakeholderscomprisedofenergycompanies,manufacturers,standardsbodies,researchers,DOENationalLaboratories,andFederalpartnersinthecybersecurityandengineeringmissionspace.

PueshKumar

Director

OfficeofCybersecurity,EnergySecurity,andEmergencyResponse(CESER)

U.S.DepartmentofEnergy

PAGE|6

NationalCyber-InformedEngineeringStrategy

TABLEOFCONTENTS

NOTEFROMTHESECRETARY 2

NOTEFROMTHEDIRECTOR 4

EXECUTIVESUMMARY 7

CIEInPractice:ExamplesofEngineeringDecisionsInformedbyCyberRisks 9

INTRODUCTION 10

DefiningtheProblem 11

PrinciplesofCIE 12

KEYPREMISESOFTHENATIONALCIESTRATEGY 15

STRATEGICPILLARSANDRECOMMENDEDACTIONS 16

THECIESTRATEGYASAMODELFOROTHERCRITICALINFRASTRUCTURESECTORS 31

NEXTSTEPS 32

APPENDIXA:SECURINGENERGYINFRASTRUCTUREEXECUTIVETASKFORCEPARTICIPANTS 33

SeniorExecutiveGroup 33

SeniorTechnicalGroup 34

TechnicalProjectTeam:NationalCIEStrategy 35

APPENDIXB:EXAMPLESOFCIEIMPLEMENTATION 36

Consequence-drivenCyber-informedEngineering(CCE) 36

IntegratingCIEintoNuclearMicroreactorDesign 37

CybersecurityfortheOperationalTechnologyEnvironment(CyOTE?) 37

CIEinEducation 37

PAGE|7

NationalCyber-InformedEngineeringStrategy

Cyber-informedengineering(CIE)offersanopportunityto“engineerout”somecyberriskacrosstheentiredeviceorsystemlifecycle,startingfromtheearliestpossiblephaseofdesign—themostoptimaltimetointroducebothlowcostandeffectivecybersecurityapproaches.

CIEisanemergingmethodtointegratecybersecurityconsiderationsintotheconception,design,development,andoperationofanyphysicalsystemthathasdigitalconnectivity,monitoring,orcontrol.CIEapproachesusedesigndecisionsandengineeringcontrolstomitigateoreveneliminateavenuesforcyber-enabledattack,orreducetheconsequenceswhenanattackoccurs.

ExecutiveSummary

ThePersistentCybersecurityChallenge

Theindustrialcontrolsystemsthatoperatecriticalenergyinfrastructurefaceincreasinglysevereandsophisticatedcyberattacksfromdeterminedadversaries.Toavoiddisruptionstothenation’scriticalenergyfunctions,energysystemsmustbeengineeredtowithstandintentionalcybercompromise,exploitation,andmisuse.

Whiletraditionalengineeringincludesconsiderablesafetyandfailuremodeanalysis,theseriskmanagementapproachesrarelyaddresstherisksintroducedbyanintelligentandcapableadversarywiththegoalofdenying,disrupting,ordestroyingacriticalfunctionusingcybermeans.Mostcybersecuritysolutionsare“boltedon”lateintheengineeringlifecycle,ratherthanintrinsicallybuiltintothesystemdesign.

TheOpportunityofCyber-InformedEngineering

NationalCIEStrategyDirective

EnactedintolawonDecember20,2019,Section5726oftheNationalDefenseAuthorizationActforFiscalYear2020directedtheSecretaryofEnergytoestablishagovernment-industryworkinggrouptoaccomplishaseriesoftasks,includingtodevelopanationalcyber-informedengineeringstrategytoisolateanddefendenergyinfrastructurefromsecurityvulnerabilitiesandexploitsinthemostcriticalsystems.TheSecuringEnergyInfrastructureExecutiveTaskForcedevelopedthisNationalCIEStrategyforadoptionbytheDepartmentofEnergy.

Whilespecializedinformationtechnology(IT)andoperationaltechnology(OT)cybersecurityexpertsbringstrongcybersecuritycapabilitiestosecuringtoday’senergysystems,manyoftheengineersandtechnicianswhodesignandoperatetheseenergysystemscurrentlylacksufficientcybersecurityeducationandtrainingtoengineersystemsforcybersecurityfromtheoutset,inthesamewaytheyengineerthesesystemsforsafety.

ANationalCIEStrategyforEnergy

Pursuanttocongressionaldirection,2theU.S.DepartmentofEnergyandtheSecuringEnergyInfrastructureExecutiveTaskForcehavedevelopedastrategytoenabletheenergysectortoleadthenationinincorporatingCIEintothedesignandoperationofinfrastructuresystemsthatrelyondigitalmonitoringorcontrols.

2Section5726oftheNationalDefenseAuthorizationActforFiscalYear2020.

PAGE|8

NationalCyber-InformedEngineeringStrategy

TheNationalCIEStrategyisbuiltonfiveintegratedpillars(see

Figure1)

,offeringasetofrecommendationstoincorporateCIEasacommonpracticeacrosstheenergysector.Together,theseapproachesprovidethebodyofknowledge,thediverseandexpandedworkforce,andtheengineeringandmanufacturingcapacitytoapplyCIEtotoday’senergyinfrastructure,andtoengineerfutureenergysystemstoeliminateorreducetheabilityofacyber-enabledattacktosucceed.

Figure1.NationalCyber-InformedEngineeringStrategy

CIEprovidesthebasisandapproachforinstitutingacultureofcybersecuritywithintheenergyindustry,akintotheindustry’sstrongcultureofsafety.Leadingthisculturalshiftwillbetheengineers,industrialcontrolsystemtechnicians,cybersecurityprofessionals,manufacturers,andownersandoperatorsintheEnergySectorIndustrialBase.TheNationalCIEStrategypillarsprovideastrong,integratedfoundationtoacceleratethisculturalshift.ThenextstepinmovingCIEforwardwillbetoconveneabroadsetofstakeholderstodevelopdetailedimplementationplansforeachpillarofthestrategy.

WhilethisNationalCyber-InformedEngineeringStrategyhasbeendevelopedfortheenergysector,itcanserveasaleverageablemodelforothercriticalinfrastructuresectorstoadoptandincorporateCIEintoindustrypractices.CIEconceptsandstrategiesincludefoundationalengineeringprinciplesthatapplytoalltypesofengineeringforcriticalinfrastructure.EmbeddingCIEmethodsintotheeducationandcredentialingofthenation’snextgenerationofengineersandindustrialcontrolsystemtechnicianswillcreateacyber-awareworkforcethatcandesignandmanufactureresilientinfrastructuresystemsacrosssectors.

PAGE|9

NationalCyber-InformedEngineeringStrategy

CIEInPractice:ExamplesofEngineeringDecisionsInformedbyCyberRisks

CIEguidesanengineeringteamtoconsiderandmitigatethepotentialforcybercompromisethroughouttheengineeringdesignlifecycle,leveragingengineeringsolutionstolimitthepathwaysforcybersabotage,exploitation,theft,andmisusewithinthesystem.

InafullymatureCIEdesign,requirementswouldbedevelopedtodescribenotonlyexpectationsforhowthesystemwouldfunction,butalsospecifichigh-consequencecyberimpactswhichmustbepreventedwithinthesystemdesign.Duringthedesignprocess,theteamwouldmakeaffirmativedecisionsabouthowtobestaccomplishthoserequirements,whetherbyenactingmanualengineeringcontrols,limitingdigitalfunctionality,employingoperationalcybersecuritysolutions,orenactingmonitoringschemes,orcombinationsofalltheabove.Theriskofafuturecybercompromisewouldbetrackedanddiminishedasafundamentalengineeringrisk.

Whatdoesthismeanintoday’spractice?ThefollowinghypotheticalscenarioshighlightthetypesofdesignchangesandengineeringdecisionsthatcouldresultfromapplyingCIEduringthedesignandbuildprocess:

?A60-percentdesignreviewofagreenfieldwatertreatmentplantrevealsthatthedesignengineerreplacedthemanualhand-off-autoswitches—whichallowoperationsstafftoruntheplantmanually—withanetwork-basedcommunicationdevicewithoutmanualoverrides.Theteamelectstoundothismodification,justifyingthehighercostofconstructionwiththebenefitofassuredmanualcontrolsintheeventofacybercompromise.

?Adesignteamnotesthatthevibrationtripsensorforagasturbineisaddressableonthesameoperationaltechnologynetworkwiththeturbine,andthus,couldbecompromisedalongwiththeturbinebyanadversarywhogainsaccesstothenetwork.Becausethissensorisasafetyfeaturefortheturbine,theteamchoosestodeployitonanisolatednetwork—sothatitismoreinaccessibletocyberadversaries—andtoemployahigherlevelofsecuritycontrols,includingamonitoringsystem,toheightenawarenessofnetworkanomaliesaffectingthesensor.

?Acyberexerciserevealsthepotentialforadigitalcontrollertobeusedtosupplyaharmfulamountoftreatmentchemicalsintoaprocess,potentiallycausingdamagetoplantequipment.Theengineeringteamisunabletoremovethecontrollerfromserviceortoenactmanualoverrides,sotheychoosetoadoptanengineeringcontrollimitingthechemicalavailabletotheprocesstoanamountbelowtheharmfullevel.ThiscontrolisenactedthroughphysicalchangestothedispensingtankanddocumentedintheStandardOperatingProcedures.

?Duringthevalueengineeringprocessforawastewatertreatmentplantcontrolsystem,thedesignteamdecidedtosavemoneybyremovingredundanthardwiredcontrolsandreplacingthemwithdigitalinput/outputsfromtheindustrialcontroller.Duringareview,theengineeringteamnotedthatthisdecisionwouldremoveallmanualoperatingcapabilitiesfromthepumps,meaningasuccessfulransomwareattackonthecontrolsystemcouldleavethepumpsinoperable,resultinginpotentialspillsandequipmentdamage.Theprojectownerelectedtoabsorbtheadditionalcostinordertoensurethepotentialformanualcontrolsintheeventofacyberattack.

PAGE|10

NationalCyber-InformedEngineeringStrategy

Today,engineersandindustrialcontrolsystemtechniciansbuildenergysystemswithspecificgoalsforsafety,reliability,andfunctionality.Whilesystemsengineeringincludesconsiderablesafetyandfailuremodeanalysis,cybersecurityrisksareoftennotspecificallyaddressed—particularlytherisksofintentionalcybercompromise,exploitation,andmisuse.Simplyput,traditionalengineeringriskmanagementapproachesrarelyaddresstherisksintroducedbyanintelligentandcapableadversarywiththegoalofhigh-consequencecyber-enabledimpacts.4

Asaresult,mostcybersecuritysolutionsareintroducedlateintheengineeringlifecycle,ifatall,providinginadequateandmorecostlyprotectionforthenation’senergyindustrialcontrolsystems(ICS).This

Introduction

Currently,cybersecurityformostcriticalinfrastructurecontrolsystemsisaddressedseparatelyfromsystemdesignandengineering.Thisgaphasresultedinanever-growinglistofadditivesecuritytechnologiesthatareintroducedafterthefacttomitigatecybervulnerabilities.Addingsecuritytechnologiesafterthefactismorecostlyandlesseffective.Whatifcriticalenergyinfrastructuresystemsweredesignedandoperatedwithcybersecuritybuiltin,ratherthanboltedonafterdeployment?CIEprovidesawaytogreatlyreduce,andinsomecaseseliminate,cyberrisksfromtheoutsetandincreaseoverallefficiencyandeffectiveness.

CIEisanemergingapproachthataimstointegratecybersecurityconsiderationsintotheconception,design,build,andoperationofanyphysicalsystemthathasdigitalconnectivity,monitoring,orcontrol.3CIEcanbebroadlydefinedas:Theinclusionofcybersecurityconsiderationsasafoundationalelementofengineeringriskmanagementforanyfunctionaidedbydigitaltechnology.

CIELinkagetoZeroTrustandSecurebyDesign

Cyber-informedengineeringembraces“securebydesign”and“zerotrust”softwaresecuritystrategies,andexpandstheseconceptsbeyondsoftwareengineeringtotheengineeringofcyber-physicalsystems.

Secure-by-designsoftwaredevelopmentshiftsthesecurityfocusfromfindingandpatchingvulnerabilitiestoeliminatingdesignflawsinthearchitectureofasoftwaresystem.CIEexpandsthisconcepttobuildsecurearchitecturesintophysicalinfrastructuresystemsthathavedigitalaccessorcontrol.

Azero-trustarchitectureremovesanyimplicittrustfromdevicesoruseraccounts,movingawayfromtheconceptofasecurityperimeterthatkeepsattackersout.CIEembodiesthisapproachbyassumingthatcompromiseislikely,anddeployingresilientlayereddefensesthatminimizetheconsequencespossiblewhenanassetorcredentialiscompromised.

CIErepresentstheDepartmentofEnergy’sstrategyforimplementingtheseapproachesintoenergyinfrastructure.

approachmissessignificantopportunitiesto“engineerout”cyberrisk—thatis,usingearlydesigndecisionsandengineeringcontrolstomitigateoreveneliminateavenuesforcyber-enabledattack,orreducetheconsequenceswhenanattackoccurs.CIEembracesmanycomplementarysecurityapproachestoday,suchas“zerotrust”and“securebydesign,”conceptuallyextendingthembeyondapplicationtosoftwaresystemstoincludeapplicationtocyber-physicalinfrastructure.

CIEproposesashiftinfocusinthewaythenation’sengineers,controlsystemtechnicians,manufacturers,andoperatorsapproachsecurityinenergysystemsdesign.Researchersbegantodefine

3SeemoreinformationonCIEat

/cie

.

4High-consequenceimpacts,achievedusingcybermeans,thatmaydisruptenergysectorfunctionsthatarecriticaltothenation.

PAGE|11

NationalCyber-InformedEngineeringStrategy

Theadoptionofdigitaltechnologyintocriticaloperationalandengineeringfunctionscanintroducevulnerabilitiesthatcouldcompromisetheavailability,integrity,trustworthiness,orauthenticityofthecomplexcontrolsystemsservingthosefunctions.Unlesscybersecurityrisksareexplicitlyconsideredwithincurrentapproachestohazardevaluation,6thesevulnerabilitiesarenottypicallycaptured,missingcriticalopportunitiestoreduceoreliminatethemduringengineeringanddesign.Theengineerswhooversee,invent,design,create,install,maintain,anddisposeofthesecomplexcyber-physicalsystemsmaylackthenecessaryrequirements,context,7education,practices,andtools(inorderofdescendingimportance)toidentify,understand,andmitigatetheserisks.Instead,engineersandthetechnicianswhosupportthemtoooftenrelyontheexternalapplicationofcybersecuritymeasuresbyspecializedpractitionerslateinthesystemimplementationlifecycle.Thiscurrentstate

theCIEapproachin2017.5intheinterveningyears,thefederalgovernmenthassupportedseveraleffortsthatreducecyberriskstothenationbyapplyingCIEprinciplestocriticalenergyinfrastructureandnewsystemdesigns.However,thereisnotyetamatureengineeringdisciplineforidentifyingandaddressingcybersecurityriskearlyinintheconceptanddesignphases.TherearealsofewcommonlyappliedstandardsorguidelinestoperformsystemsengineeringriskmanagementforICScybersecurityrisksthroughoutthesystemslifecycle.

CIEremainsapromisingapproachthatisnotyetwidelyknown,understood,orimplemented.ThisNationalCIEStrategyoffersanintegratedsetofrecommendationstobringabouttheawareness,education,andresourcestointegrateCIEasacommonpracticewithintheEnergySectorIndustrialBase.

DefiningtheProblem

Engineers—andthetechnicianswhosupporttheengineeringprocess—arecriticaltothedesign,implementation,andsecureoperationofcomplexenergyinfrastructureandcontrolsystems.Eveninthiscriticalrole,engineersoftenlacktraining,abodyofknowledge,andotherreinforcementofcybersecuritypracticestoeffectivelyaddresscyberthreatsinenergyinfrastructure.Giventhecurrentandincreasingcriticalityofdigitalcontrolsystemswithincriticalenergyinfrastructure,thisisaprioritygapthatmustbeaddressedbytheengineeringcommunityandthenation.

CurrentState

AlignmentofCIEwithIndustryStandardsandGuidelines

TheNationalCIEStrategywillinformtheevolutionandmaturationofindustrystandardsandguidelinestoalignwithCIEprinciplesandprovidemanufacturersandassetownerswithessentialtoolstodemonstratetheiradoptionofCIE.RecentguidanceshowsstrongalignmentwithCIE.AlignmentwithCIEcanbeanearlytargetforthestandardsspecificationactivitiesrecommendedintheDevelopmentpillar.ExamplesincludetheInternationalSocietyofAutomation(ISA)/InternationalElectrotechnicalCommission(IEC)62443seriesofstandards,theNationalInstituteofStandardsandTechnology(NIST)SP800-160guideline,andtheSAEInternationalG-32Cyber-PhysicalSystemsSecurityCommitteestandardswork.

5RobertS.Anderson,JacobBenjamin,VirginiaL.Wright,LuisQuinones,andJonathanPaz,Cyber-InformedEngineering,IdahoNationalLaboratory,2017.

doi:10.2172/1369373

.

6Suchas:failuremodeseffectsanalysis(FMEA),What-Ifanalysis,hazardandoperabilitystudy(HAZOP),faulttreeanalysis(FTA),andeventtreeanalysis(ETA).

7Contextreferstothebroaderenvironmentinwhich

溫馨提示

  • 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶(hù)所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶(hù)上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶(hù)上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶(hù)因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

最新文檔

評(píng)論

0/150

提交評(píng)論