Information Security Blog

The (Not) NIST Great Guidance on Smart Grid Assessments

The (Not) NIST Great Guidance on Smart Grid Assessments

21 Flares

21 Flares


×

Not that long ago I bemoaned the fact that there was too much guidance on Smart Grid Security.

So it may seem odd that I’m about to profess admiration for some new guidance, namely the Smart Grid Interoperability Panel (SGIP) “Guide for Assessing the High-Level Security Requirements in NISTIR 7628, Guidelines for Smart Grid Cyber Security”.

The original three volumes of 7628 cover almost 700 pages and were one of the main drivers of my original blog. In fact, I almost didn’t look at the new document after it was sent by a colleague, except that his note that “I think you will actually like this one!” had me intrigued. Well, he was right.

There are two main things that have me optimistic about the document:

  • It focuses on security assessment rather than good practices for security guidelines for implementation. Having been part of comprehensive multi-vendor Smart Grid Security Assessment projects, I know from experience that the approaches taken from various vendors differed dramatically, which notably impacted the amount of assurance that the Utility was receiving. This is good for Utilities in that a standardized approach simplifies the process of selecting a vendor, validating the security assessment work effort, interpreting the security assessment report, and remediating the issues identified. This is good for Smart Grid Security assessment vendors (like us) for the same exact reasons.
  • It leverages a well-vetted approach — NIST 800-53A. This includes everything from scaling the assessment activities based on risk classification to referencing the same NIST 800-53 families and controls to defining the appropriate activities to assess each control. The document could have been called “Using NIST800-53A to Assess Smart Grid Cyber Security.” Rather than adding to the confusion, this approach clarifies it, in that we are beginning to see the harmonization of NIST with Smart Grid Security.

not-nist-doc

The only odd thing about this new document is how often and far it goes towards specifically stating that it is not a NIST document (Yet). It is, however, a valuable adjunct to the NIST guidance. I highly recommend it to anyone charged with enforcing Smart Grid Security.

0


Free Download: A Best Practices Guide to Database Security

database security roadmap

Because data is only as secure as the systems & processes it relies on – a holistic approach to data security is essential. This roadmap is not meant to be exhaustive but rather to stimulate the necessary thought process to put you on the path to good data security.

Is ISO 27001 Right for (Y)our Organization?

iso-27001-webinar

Thinking about ISO 27001 Certification? View our free On-Demand ISO 27001 Webinar

  • How to deal with increasing threats
  • How to manage multiple regulatory requirements
  • How to handle client requests for attestation
  • To validate that significant changes did not have unanticipated results

Free Download: ISO 27001 Implementation Roadmap

ISO 27001 RoadmapHave no fear – our “roadmap” will guide you, step by step, through the entire ISO 27001 process.

Getting to ISO 27001 certification is a process made up of things you already know – and things you may already be doing!

Download: Information Security Attestation Guide

Information Security GuideA Best-Practices Guide to Information Security Attestation

Download our proven Information Security Guide to simplify the process of protecting your data, proving you’re secure and growing your business.

Best Practices for Firing A Network Security Administrator

Firing A Network Security AdministratorWant to know how to fire a Network Admin? Need to know what precautions to take? Firing any employee can be a stressful event. Firing one who has significant knowledge of and privileged access to your Information Technology/Security infrastructure is even more stressful, as the risks are so notable.

Free Whitepaper: Five Best Practices for SIEM

siem-whitepaper

The promise of SIEM is the consolidation of all relevant Security Event Logs from disparate sources into a single unified and normalized data store.

Free Download: ISO 27001 Vendor Selection Toolkit

“ISOOur ISO 27001 Toolkit will help you to select an ISO 27001 consulting firm.
  • Review the Issues Critical to Your Environment
  • "Vet" Vendor Qualifications
  • Compare the Top 3 Vendors
  • Sample RFP Included

Free Whitepaper: Stop Wasting Money on Penetration Testing

penetration-testing-whitepaper

Penetration Testing is most frequently performed to:

  • Substantiate the net effectiveness of a mature control environment
  • Prove to a third party that an environment is secure/trustworthy
  • Quickly assess the security of a less mature control environment (in a sense a technical risk assessment)
  • To validate that significant changes did not have unanticipated results

About the Author:

John Verry (CISA, 27001 Certified Lead Auditor, CCSE, CRISC) is Pivot Point's resident "Security Sherpa". He is lucky enough to spend most of his day helping clients develop a road map to address security, compliance, and attestation requirements.

Add a Comment

21 Flares Twitter 9 Facebook 0 Google+ 1 Pin It Share 0 LinkedIn 7 Reddit 0 StumbleUpon 4 Email -- 21 Flares ×