Download:
pdf |
pdf79178
Federal Register / Vol. 89, No. 188 / Friday, September 27, 2024 / Proposed Rules
After consideration of all relevant
material presented, including the
information and recommendations
submitted by the Committee and other
available information, USDA has
determined that this proposed rule is
consistent with and will effectuate the
purposes of the Act.
A 30-day comment period is provided
to allow interested persons to respond
to this proposed rule. All written
comments timely received will be
considered before a final determination
is made on this rulemaking.
List of Subjects in 7 CFR Part 945
Marketing agreements, Potatoes,
Reporting and recordkeeping
requirements.
For the reasons set forth in the
preamble, the Agricultural Marketing
Service proposes to amend 7 CFR part
945 as follows:
PART 945—IRISH POTATOES GROWN
IN CERTAIN DESIGNATED COUNTIES
IN IDAHO, AND MALHEUR COUNTY,
OREGON
1. The authority citation for 7 CFR
part 945 continues to read as follows:
■
Authority: 7 U.S.C. 601–674.
■
2. Revise § 945.249 to read as follows:
§ 945.249
Assessment rate.
On and after August 1, 2024, an
assessment rate of $0.003 per
hundredweight is established for IdahoEastern Oregon potatoes.
Erin Morris,
Associate Administrator, Agricultural
Marketing Service.
[FR Doc. 2024–22213 Filed 9–26–24; 8:45 am]
BILLING CODE 3410–02–P
DEPARTMENT OF ENERGY
Federal Energy Regulatory
Commission
18 CFR Part 40
[Docket No. RM24–7–000]
Critical Infrastructure Protection
Reliability Standard CIP–015–1—Cyber
Security—Internal Network Security
Monitoring
Federal Energy Regulatory
Commission.
ACTION: Notice of proposed rulemaking.
lotter on DSK11XQN23PROD with PROPOSALS1
AGENCY:
The Federal Energy
Regulatory Commission (Commission)
proposes to approve proposed
Reliability Standard CIP–015–1 (Cyber
Security—Internal Network Security
SUMMARY:
VerDate Sep<11>2014
16:43 Sep 26, 2024
Jkt 262001
Monitoring), which the North American
Electric Reliability Corporation (NERC),
submitted in response to a Commission
directive. In addition, the Commission
proposes to direct that NERC develop
certain modifications to proposed
Reliability Standard CIP–015–1 to
extend internal network security
monitoring to include electronic access
control or monitoring systems and
physical access control systems outside
of the electronic security perimeter.
DATES: Comments are due November 26,
2024.
ADDRESSES: Comments, identified by
docket number, may be filed in the
following ways. Electronic filing
through http://www.ferc.gov, is
preferred.
• Electronic Filing: Documents must
be filed in acceptable native
applications and print-to-PDF, but not
in scanned or picture format.
• For those unable to file
electronically, comments may be filed
by USPS mail or by hand (including
courier) delivery.
Æ Mail via U.S. Postal Service Only:
Addressed to: Federal Energy
Regulatory Commission, Secretary of the
Commission, 888 First Street NE,
Washington, DC 20426.
Æ Hand (Including Courier) Delivery:
Deliver to: Federal Energy Regulatory
Commission, 12225 Wilkins Avenue,
Rockville, MD 20852.
The Comment Procedures Section of
this document contains more detailed
filing procedures.
FOR FURTHER INFORMATION CONTACT:
Margaret Steiner (Technical
Information), Office of Electric
Reliability, Federal Energy Regulatory
Commission, 888 First Street NE,
Washington, DC 20426, (202) 502
6704, [email protected]
Hampden T. Macbeth (Legal
Information), Office of General
Counsel, Federal Energy Regulatory
Commission, 888 First Street NE,
Washington, DC 20426, (202) 502
8957, [email protected]
SUPPLEMENTARY INFORMATION:
1. Pursuant to section 215(d)(2) of the
Federal Power Act (FPA),1 the
Commission proposes to approve
proposed Critical Infrastructure
Protection (CIP) Reliability Standard
CIP–015–1 (Cyber Security—Internal
Network Security Monitoring). The
North American Electric Reliability
Corporation (NERC), the Commissioncertified Electric Reliability
Organization (ERO), submitted the
proposed Reliability Standard for
Commission approval in response to a
1 16
PO 00000
U.S.C. 824o(d)(2).
Frm 00005
Fmt 4702
Sfmt 4702
Commission directive in Order No.
887.2 In addition, pursuant to section
215(d)(5) of the FPA,3 the Commission
proposes to direct that NERC develop
further modifications to Reliability
Standard CIP–015–1, within 12 months
of the effective date of a final rule in this
proceeding, to extend Internal Network
Security Monitoring (INSM) 4 to include
electronic access control or monitoring
systems (EACMS) 5 and physical access
control systems (PACS) 6 outside of the
electronic security perimeter.
2. In Order No. 887, the Commission
directed that NERC develop new or
modified CIP Reliability Standards that
require INSM for CIP-networked
environments for all high impact bulk
electric system (BES) Cyber Systems 7
with and without external routable
connectivity 8 and medium impact BES
Cyber Systems with external routable
connectivity.9 Proposed Reliability
Standard CIP–015–1 is partly responsive
to the Commission’s directives in Order
No. 887 and advances the reliability of
the Bulk-Power System by (1)
2 Internal Network Sec. Monitoring for High &
Medium Impact Bulk Elec. Sys. Cyber Sys., Order
No. 887, 88 FR 8354 (Feb. 9, 2023), 182 FERC
¶ 61,021 (2023).
3 16 U.S.C. 824o(d)(5).
4 INSM is ‘‘a subset of network security
monitoring that is applied within a ‘trust zone,’
such as an electronic security perimeter.’’ Order No.
887, 182 FERC ¶ 61,021 at P 2.
5 EACMS are ‘‘Cyber Assets that perform
electronic access control or electronic access
monitoring of the Electronic Security Perimeter(s)
or BES Cyber Systems. This includes Intermediate
Systems.’’ NERC, Glossary of Terms Used in NERC
Reliability Standards, (July 22, 2024), https://
www.nerc.com/pa/Stand/Glossary%20of%20
Terms/Glossary_of_Terms.pdf (NERC Glossary).
6 PACS are ‘‘Cyber Assets that control, alert, or
log access to the Physical Security Perimeter(s),
exclusive of locally mounted hardware or devices
at the Physical Security Perimeter such as motion
sensors, electronic lock control mechanisms, and
badge readers.’’ Id.
7 NERC defines BES Cyber Systems as ‘‘One or
more BES Cyber Assets logically grouped by a
responsible entity to perform one or more reliability
tasks for a functional entity.’’ See NERC Glossary.
BES Cyber Systems are categorized as high,
medium, or low impact depending on the functions
of the assets housed within each system and the
risk they potentially pose to the reliable operation
of the Bulk-Power System. Reliability Standard
CIP–002–5.1a (BES Cyber System Categorization)
sets forth criteria that registered entities apply to
categorize BES Cyber Systems as high, medium, or
low impact depending on the adverse impact that
loss, compromise, or misuse of those BES Cyber
Systems could have on the reliable operation of the
BES. The impact level (i.e., high, medium, or low)
of BES Cyber Systems, in turn, determines the
applicability of security controls for BES Cyber
Systems that are contained in the remaining CIP
Reliability Standards (i.e., Reliability Standards
CIP–003–8 to CIP–013–1).
8 External routable connectivity is ‘‘[t]he ability to
access a BES Cyber System from a Cyber Asset that
is outside of its associated Electronic Security
Perimeter via a bi-directional routable protocol
connection.’’ NERC Glossary.
9 Order No. 887, 182 FERC ¶ 61,021 at P 49.
E:\FR\FM\27SEP1.SGM
27SEP1
Federal Register / Vol. 89, No. 188 / Friday, September 27, 2024 / Proposed Rules
establishing requirements for INSM for
network traffic inside an electronic
security perimeter, and (2) requiring
INSM for all high impact BES Cyber
Systems with and without external
routable connectivity and medium
impact BES Cyber Systems with
external routable connectivity to ensure
the identification of anomalous network
activity indicating an ongoing attack.10
Accordingly, we propose approving
proposed Reliability Standard CIP–015–
1.
3. Proposed Reliability Standard CIP–
015–1 is not, however, fully responsive
to the Commission’s directive to
implement INSM for the ‘‘CIPnetworked environment.’’ 11 In
particular, the proposed Standard may
not adequately defend against attacks
that circumvent network perimeterbased security controls. Attacks external
to the electronic security perimeter may
compromise systems, such as EACMS or
PACS, and then infiltrate the perimeter
as a trusted communication, thus
limiting the effectiveness of an approach
that employs INSM only within the
electronic security perimeter. The
Commission used the phrase ‘‘CIPnetworked environment’’ in Order No.
887 to be necessarily broader than the
electronic security perimeter.12
Accordingly, to address this reliability
and security gap, the Commission
proposes to direct that NERC develop
modifications to the proposed
Reliability Standard CIP–015–1 to
extend INSM to include EACMS and
PACS outside of the electronic security
perimeter.
I. Background
A. Section 215 and Mandatory
Reliability Standards
lotter on DSK11XQN23PROD with PROPOSALS1
4. Section 215 of the FPA provides
that the Commission may certify an
ERO, the purpose of which is to develop
mandatory and enforceable Reliability
Standards, subject to Commission
review and approval.13 Reliability
Standards may be enforced by the ERO,
subject to Commission oversight, or by
the Commission independently.14
Pursuant to section 215 of the FPA, the
Commission established a process to
10 NERC
Petition at 1, 13.
Order No. 887, 182 FERC ¶ 61,021 at P 1.
12 Id. P 49.
13 16 U.S.C. 824o(c).
14 Id. 824o(e).
11 See
VerDate Sep<11>2014
16:43 Sep 26, 2024
Jkt 262001
select and certify an ERO,15 and
subsequently certified NERC.16
B. Internal Network Security Monitoring
5. INSM is a subset of network
security monitoring that is applied
within a ‘‘trust zone,’’ 17 such as an
electronic security perimeter. The trust
zone applicable to INSM is the CIPnetworked environment for this notice
of proposed rulemaking (NOPR) and
Order No. 887.18 INSM enables
continuing visibility over
communications between networked
devices within a trust zone and
detection of malicious activity that has
circumvented perimeter controls.
Further, INSM facilitates the detection
of anomalous network activity
indicative of an attack in progress, thus
increasing the probability of early
detection and allowing for quicker
mitigation and recovery from an attack.
6. INSM is designed to address as
early as possible situations where
perimeter network defenses are
breached by detecting intrusions and
malicious activity within a trust zone.
INSM consists of three stages: (1)
collection; (2) detection; and (3)
analysis. Taken together, these three
stages provide the benefit of early
detection and alerting of intrusions and
malicious activity.19 INSM better
positions an entity to detect an attacker
in the early phases of an attack and
reduces the likelihood that an attacker
can gain a strong foothold, including
operational control, on the target
system. In addition to early detection
and mitigation, INSM may improve
incident response by providing higher
15 Rules Concerning Certification of the Elec.
Reliability Org.; & Procs. for the Establishment,
Approval, & Enforcement of Elec. Reliability
Standards, Order No. 672, 114 FERC ¶ 61,104, order
on reh’g, Order No. 672–A, 114 FERC ¶ 61,328
(2006); see also 18 CFR 39.4(b) (2024).
16 N. Am. Elec. Reliability Corp., 116 FERC
¶ 61,062, order on reh’g and compliance, 117 FERC
¶ 61,126 (2006), aff’d sub nom. Alcoa, Inc. v. FERC,
564 F.3d 1342 (D.C. Cir. 2009).
17 The U.S. Department of Homeland Security,
Cybersecurity and Infrastructure Security Agency
(CISA) defines trust zone as a ‘‘discrete computing
environment designated for information processing,
storage, and/or transmission that share the rigor or
robustness of the applicable security capabilities
necessary to protect the traffic transiting in and out
of a zone and/or the information within the zone.’’
CISA, Trusted Internet Connections 3.0: Reference
Architecture, 2 (July 2020), https://www.cisa.gov/
sites/default/files/publications/CISA_
TIC%203.0%20Vol.%202%20Reference%20
Architecture.pdf.
18 Order No. 887, 182 FERC ¶ 61,021, at P 2.
19 See Chris Sanders & Jason Smith, Applied
Network Security Monitoring, 9–10 (2013); see also
ISACA, Applied Collection Framework: A RiskDriven Approach to Cybersecurity Monitoring (Aug.
18, 2020), https://www.isaca.org/resources/newsand-trends/isaca-now-blog/2020/applied-collectionframework.
PO 00000
Frm 00006
Fmt 4702
Sfmt 4702
79179
quality data about the extent of an attack
internal to a trust zone. Finally, INSM
provides insight into east-west network
traffic 20 happening inside the network
perimeter, which enables a more
comprehensive picture of the extent of
an attack compared to data gathered
from the network perimeter alone.21
C. Order No. 887
7. On January 19, 2023, in Order No.
887, the Commission issued a final rule
that directed that NERC develop ‘‘new
or modified CIP Reliability Standards
requiring INSM for all high impact BES
Cyber Systems with and without
external routable connectivity and
medium impact BES Cyber Systems
with external routable connectivity to
ensure the detection of anomalous
network activity indicative of an attack
in progress.’’ 22 The Commission, noting
that INSM is ‘‘applied within a ‘trust
zone,’ such as an electronic security
perimeter,’’ stated that for the final rule
the applicable trust zone for INSM is the
CIP-networked environment.23
8. The Commission explained that the
currently effective CIP Reliability
Standards focus on preventing
unauthorized access at the electronic
security perimeter and do not require
INSM inside trusted CIP-networked
environments.24 The Commission
determined that this left a reliability gap
when vendors or individuals with
authorized access are deemed
trustworthy but could still introduce a
cybersecurity risk.25 The Commission
then concluded that requirements to
implement ISNM will ‘‘fill a gap in the
20 East-west traffic refers to the communications
among BES Cyber Systems and is the specific type
of network traffic that remains within the network
perimeter. It may refer to communication peer-topeer industrial automation and control systems
devices in a network or to activity between servers
or networks inside a data center, rather than the
data and applications that traverse networks to the
outside world. CISCO, Networking and Security in
Industrial Automation Environments Design Guide,
111 (Aug. 2020), https://www.cisco.com/c/en/us/td/
docs/solutions/Verticals/Industrial_Automation/
IA_Horizontal/DG/Industrial-AutomationDG.pdf;
The President’s National Security
Telecommunications Advisory Committee, Report
to the President on Software-Defined Networking,
E–3 (Aug. 2020), https://www.cisa.gov/sites/default/
files/publications/NSTAC%20SDN%20Report%20
%288-12-20%29.pdf.
21 CISA, CISA Analysis: FY2020 Risk and
Vulnerability Assessments (July 2021), https://
www.cisa.gov/sites/default/files/publications/FY20RVA-Analysis_508C.pdf.
22 Order No. 887, 182 FERC ¶ 61,021 at P 3.
23 Id. P 2.
24 Id. P 20.
25 Id. An attacker could move among devices
inside a trust zone and perform actions such as: (1)
escalate privileges (such as gaining administrator
account privileges through a vulnerability); (2)
move undetected inside the CIP-networked
environment; or (3) execute a virus, ransomware or
another form of unauthorized code. Id. P 19.
E:\FR\FM\27SEP1.SGM
27SEP1
79180
Federal Register / Vol. 89, No. 188 / Friday, September 27, 2024 / Proposed Rules
current suite of CIP Reliability
Standards and improve the
cybersecurity posture of the Bulk-Power
System.’’ 26
9. The Commission directed that
NERC ensure that the new or modified
CIP Reliability Standards address three
security objectives for east-west network
traffic. First, the new or modified CIP
Reliability Standards should address the
need for each responsible entity to
develop a baseline for their network
activity by analyzing for security
purposes their network traffic and data
flows. Second, the new or modified CIP
Reliability Standards should address the
need for responsible entities to monitor
and detect ‘‘unauthorized activity,
connections, devices, network
communication protocols, and
software’’ in the CIP-networked
environment. Third, the new or
modified CIP Reliability Standards
should provide responsible entities with
flexibility in determining how to best
identify anomalous activity with a high
level of confidence, so long as the
methods ensure: (1) logging of network
traffic; (2) maintaining the logs, and
other data collected, regarding network
traffic that are of ‘‘sufficient data fidelity
to draw meaningful conclusions’’ to
investigate an incident; and (3)
maintaining the integrity of the logs and
other data by employing measures that
minimize the likelihood of an attacker
removing evidence of their tactics,
techniques, and procedures.27
lotter on DSK11XQN23PROD with PROPOSALS1
D. NERC Petition and Proposed
Reliability Standard CIP–015–1
10. On June 24, 2024, NERC
submitted for Commission approval
proposed Reliability Standard CIP–015–
1 and the associated violation risk
factors and violation severity levels,
implementation plan, and effective
date.28 NERC states that proposed
Reliability Standard CIP–015–1 is
intended to advance the reliability of
26 Id. P 49 (citing NERC Comments in Response
to Notice of Proposed Rulemaking under Docket No.
RM22–3–000 at 4–5 (current CIP Standards require
‘‘malicious communications monitoring at the
Electronic Access Point on the [electronic security
perimeter], not necessarily monitoring of activity of
those who already have access to the network’’)).
The Bulk-Power System is defined in the FPA as
facilities and control systems necessary for
operating an interconnected electric energy
transmission network (or any portion thereof); and
electric energy from generating facilities needed to
maintain transmission system reliability. The term
does not include facilities used in the local
distribution of electric energy. 16 U.S.C. 824o(a)(1).
27 Order No. 887, 182 FERC ¶ 61,021 at PP 79–80.
28 NERC Petition at 2, 26–28. Proposed Reliability
Standard CIP–015–1 is not attached to this NOPR.
The proposed Reliability Standards are available on
the Commission’s eLibrary document retrieval
system in Docket No. RM24–7–000 and on the
NERC website, www.nerc.com.
VerDate Sep<11>2014
16:43 Sep 26, 2024
Jkt 262001
the Bulk-Power System by providing a
comprehensive suite of forward looking
and objective-based requirements for
INSM.29
11. NERC explains that the proposed
Reliability Standard would address the
directives in Order No. 887 by
establishing three requirements for
responsible entities to implement INSM
systems and processes. Specifically:
• Requirement R1: responsible
entities would be required to implement
process(es) to monitor, detect, and
evaluate anomalous activity in
‘‘networks protected by the Responsible
Entity’s Electronic Security
Perimeter(s)’’ of high impact BES Cyber
Systems and medium impact BES Cyber
Systems with external routable
connectivity.30
• Requirement R2: responsible
entities would be required to implement
process(es) for retaining INSM data
associated with anomalous network
activity as determined by the applicable
responsible entities.
• Requirement R3: responsible
entities would be required to implement
process(es) to protect INSM monitoring
data collected and retained in support of
Requirements R1 and R2 to guard
against the risk of unauthorized deletion
or modification.
According to NERC, Requirement R1
applies to data flows within ‘‘networks
protected by the Responsible Entity’s
Electronic Security Perimeter(s).’’ 31
NERC states that proposed Reliability
Standard CIP–015–1’s scope is
consistent with the plain language of
Order No. 887, which stated that INSM
should apply within a trust zone, ‘‘such
as an electronic security perimeter,’’ and
that the trust zone for INSM is the ‘‘CIPnetworked environment.’’ 32 NERC
states that its approach would provide
the greatest benefits to the reliability of
the Bulk-Power System by focusing
industry’s limited resources on the most
critical environment, ‘‘networks
protected by the Responsible Entity’s
Electronic Security Perimeter.’’ 33
II. Discussion
A. Proposal To Approve Proposed
Reliability Standard CIP–015–1
12. Pursuant to section 215(d)(2) of
the FPA, the Commission proposes to
approve proposed Reliability Standard
CIP–015–1 as just, reasonable, not
unduly discriminatory or preferential,
29 Id.
at 4.
Ex. A (Proposed Reliability Standard CIP–
015–1) at 6.
31 Id.
32 NERC Petition at 16 (quoting Order No. 887,
182 FERC ¶ 61,021 at P 2).
33 Id. at 14, 17.
30 Id.,
PO 00000
Frm 00007
Fmt 4702
Sfmt 4702
and in the public interest. The proposed
Reliability Standard requires
responsible entities to implement INSM
within the electronic security perimeter
for all high impact BES Cyber Systems
with and without external routable
connectivity and medium impact BES
Cyber Systems with external routable
connectivity. Consistent with the
security objectives identified in Order
No. 887, Requirement R1 of the
proposed Standard would require
responsible entities to implement INSM
by mandating the collection, detection,
analysis of and appropriate response to
anomalous activity within the electronic
security perimeter. Proposed Reliability
Standard CIP–015–1, Requirement R2
would require responsible entities to
retain INSM data related to anomalous
activity. Proposed Reliability Standard
CIP–015–1, Requirement R3 would
require responsible entities to protect
INSM data associated with anomalous
network activity.
13. Implementation of INSM within
the electronic security perimeter will
augment responsible entities’ ability to
detect anomalous or malicious activity
and provide information to assist in
determining an appropriate response
through proposed Reliability Standard
CIP–015–1, Requirements R1, R2, and
R3. The proposed Reliability Standard
improves the security posture of the
industry by providing visibility into
east-west communications absent from
previous Reliability Standards,
improving the probability of detection
for anomalous or malicious activity
within the electronic security perimeter.
14. Notwithstanding the
improvements to security made by the
proposed Standard, as discussed below,
the proposed Reliability Standard does
not fully implement the scope of
protection contemplated in Order No.
887. By restricting the implementation
of INSM to within the electronic
security perimeter, a reliability and
security gap remains by not
implementing INSM for the entire CIPnetworked environment, i.e., outside the
electronic security perimeter inclusive
of EACMS and PACS. To address this
gap, we propose to direct NERC to
develop modifications to the proposed
Reliability Standard to include EACMS
and PACS, thereby protecting the
reliability and security of all trust zones
of the CIP-networked environment. This
approach—proposing to approve a
Reliability Standard as enhancing
protections and as a separate action
under section 215(d)(5) of the FPA
proposing to direct NERC to develop
certain modifications to a Reliability
Standard to address a reliability gap—is
E:\FR\FM\27SEP1.SGM
27SEP1
Federal Register / Vol. 89, No. 188 / Friday, September 27, 2024 / Proposed Rules
consistent with Commission
precedent.34
lotter on DSK11XQN23PROD with PROPOSALS1
B. Scope of the CIP-Networked
Environment
15. NERC’s proposed application of
the term ‘‘CIP-networked environment’’
as limited to assets and systems within
the electronic security perimeter is
overly narrow. Order No. 887 used the
term ‘‘CIP-networked environment’’
purposefully to apply more broadly than
the electronic security perimeter,
specifically to include all assets and
systems to which the CIP standards
apply and may be the targets of attacks.
As explained below, NERC’s petition
does not address that reliability and
security gap because it does not require
implementation of INSM at EACMS and
PACS outside the electronic security
perimeter.
16. Excluding EACMS and PACS from
the term ‘‘CIP-networked environment’’
is inconsistent with generally accepted
approaches to cybersecurity. Under
Reliability Standard CIP–002–5.1a and
fundamental cybersecurity practices,
similar systems within a network are
grouped together to facilitate
management, control, and monitoring of
the networked environment.35 For
example, EACMS are grouped together
to allow for early detection of malicious
activity within the CIP-networked
environment and potentially protect
other grouped systems, such as BES
Cyber Systems, with which the EACMS
communicate. Thus, excluding certain
grouped systems from protections—as is
the case for EACMS and PACS in
Reliability Standard CIP–015–1—leaves
other grouped systems within the CIPnetworked environment at risk. Here,
the BES Cyber Systems would not
benefit from monitoring of east-west
(i.e., lateral) movement within the
grouping of EACMS and PACS, which
allows for early detection of anomalous
34 See e.g., N. Am. Elec. Reliability Corp., 187
FERC ¶ 61,204 (2024) (order approving Reliability
Standard EOP–012–2 because it clarified the
requirements for generator cold weather
preparedness and by making other improvements
and, in addition, directing that NERC submit
modifications to Reliability Standard EOP–012–2 to
address certain concerns); Critical Infrastructure
Prot. Reliability Standard CIP–012–1—Cyber Sec.—
Commc’ns between Control Ctrs., Order No. 866, 85
FR 7197 (Feb. 7, 2020), 170 FERC ¶ 61,031 (2020).
35 Reliability Standard CIP–002.5.1a (BES Cyber
System Categorization) (categorizing EACMS,
PACS, protected cyber assets, and BES Cyber
Systems into groups); see, e.g., Nat’l Sec. Agency,
Network Infrastructure Security Guide, 1, 3–4 (Oct.
2023), https://media.defense.gov/2022/Jun/15/
2003018261/-1/-1/0/CTR_NSA_NETWORK_
INFRASTRUCTURE_SECURITY_GUIDE_
20220615.PDF (recommending the grouping of
similar network systems as a best practice for
overall network security) (NSA Network Security
Guide).
VerDate Sep<11>2014
16:43 Sep 26, 2024
Jkt 262001
or malicious activity.36 Otherwise, for
example, a compromised EACMS
grouping could provide an attacker with
the opportunity to infiltrate other
connected groups, such as BES Cyber
Systems located within the electronic
security perimeter, as an authenticated
user or trusted communication.37
17. National Institute of Standards
and Technology (NIST) guidance states
that INSM monitoring needs to detect
‘‘[a]ny threat that is already inside of a
network [that] can move laterally and
remain undetected for days or even
months.’’ 38 According to the NIST
guidance, east-west (lateral) monitoring
(i.e., INSM) improves the probability of
detection for malicious or anomalous
activity and should not be isolated to
only the most critical trust zones.39
While the terminology of EACMS and
PACS is unique to the CIP Reliability
Standards, these statements from NIST
broadly include the concepts of EACMS
and PACS and support the need for
monitoring.
18. Further, we find NERC’s rationale
for limiting INSM to within the
electronic security perimeter
unpersuasive. First, NERC contends that
36 See CISA, Cybersecurity Advisory: CISA Red
Team Shares Key Findings to Improve Monitoring
and Hardening of Networks, 2, 14 (Feb. 2023),
https://www.cisa.gov/sites/default/files/2023-03/
aa23-059a-cisa_red_team_shares_key_findings_to_
improve_monitoring_and_hardening_of_
networks.pdf (finding that insufficient network
monitoring contributed to a CISA red team avoiding
detection and gaining access to an organization’s
network through lateral movement by leveraging
access to an Active Directory system serving as an
electronic access control system) (CISA
Cybersecurity Advisory); Nat’l Inst. of Standards
and Tech. (NIST), NIST SP 800–215 Guide to a
Secure Enterprise Network Landscape, 5 (Nov.
2022), https://doi.org/10.6028/NIST.SP.800-215
(describing the limitations of a perimeter-based
security approach as not capturing threats from
inside a network that can move laterally and remain
undetected for an extended period of time) (NIST
SP 800–215); NIST, NIST SP 800–82r3 Guide to
Operational Technology (OT) Security, 74 (Sept.
2023), https://nvlpubs.nist.gov/nistpubs/
SpecialPublications/NIST.SP.800-82r3.pdf
(recommending the analyzing of information to
differentiate between known and unknown
communication as a necessary first step in
implementing network security monitoring) (NIST
SP 800–82r3). The term INSM is used by the
Commission in Order No. 887, but the cybersecurity
industry uses the term ‘‘network security
monitoring.’’ Similarly, the CIP Standards use the
terms ‘‘EACMS’’ and ‘‘PACS,’’ which are defined by
the NERC Glossary, while NIST discusses the same
concepts but does not use the same EACMS and
PACS terminology.
37 See CISA Cybersecurity Advisory at 2–6
(describing how a CISA Red Team was able to gain
access to workstations and servers from an Active
Directory system serving as an electronic access
control system, which assisted in lateral movement
to other networks).
38 NIST SP 800–215 at 5.
39 See id. (describing east-west traffic as ‘‘largely
invisible to security teams’’ without INSM and that
a threat inside a network can move east-west and
‘‘remain undetected for days or even months’’).
PO 00000
Frm 00008
Fmt 4702
Sfmt 4702
79181
the devices supporting reliable
operation are contained within the
electronic security perimeter and thus
industry resources are most effectively
focused on data flows within the
electronic security perimeter.40 We
disagree. While the devices directly
supporting the reliable operation of the
Bulk-Power System are located within
the electronic security perimeter, attacks
that threaten reliability can still emanate
from outside the electronic security
perimeter from connected Cyber Assets,
such as EACMS.41
19. Second, NERC avers that requiring
INSM implementation outside the
electronic security perimeter could have
the unintended effect of impeding an
entity’s ability to detect and respond to
threats to their most critical systems due
to alarm and alert fatigue from large
volumes of generated data.42 Extending
INSM implementation to include
EACMS and PACS may generate large
volumes of data; 43 however, we believe
that the data can be managed and that
the security benefits of implementing
INSM outside the electronic security
perimeter outweigh the burden
associated with increased volumes of
data. Defining incident alerting
thresholds and establishing a baseline
for normal network activity can reduce
the potential for alarm and alert
fatigue.44 Restricting INSM to the assets
within the electronic security perimeter
could leave the most critical networks
vulnerable to an attack from outside the
electronic security perimeter. Assets
such as EACMS are high value targets
for an attack because if successfully
compromised, EACMS would allow an
attacker to infiltrate the perimeter as a
trusted communication.45 Further,
40 NERC
Petition at 14.
e.g., CISA Cybersecurity Advisory at 1–2
(a CISA Red Team was able to gain access to
systems adjacent to the organization’s sensitive
business systems (SBSs) by moving laterally from
workstations and servers through an Active
Directory system; Phase I of the attack ended before
the team could implement a viable plan to achieve
access to a SBS).
42 NERC Petition at 14–15 n.45.
43 See NIST SP 800–82r3 at 130 (discussing alert
‘‘noise’’ from typical network traffic that can result
from implementation of network security
monitoring).
44 See id. at 127–128 (recommending that
organizations define incident alert thresholds to
establish an efficient incident detection capability
as not all events and anomalies are malicious or
require investigation and establish alerting
thresholds on baselines of normal network traffic
and data flows to reduce false positive and nuisance
alarms).
45 See, e.g., CISA Cybersecurity Advisory at 14
(finding a CISA red team gained access to an
organization’s network due to the lack of
monitoring on endpoint management systems—
high valued assets—that can include the monitoring
system part of an EACMS).
41 See,
E:\FR\FM\27SEP1.SGM
27SEP1
79182
Federal Register / Vol. 89, No. 188 / Friday, September 27, 2024 / Proposed Rules
declining to extend INSM
implementation to EACMS and PACS
outside the electronic security perimeter
leaves a reliability gap because
responsible entities will lack visibility
into the high percentage of east-west
traffic that occurs within the CIPnetworked environment.46 Monitoring
and alerting of east-west traffic enables
quicker detection of malicious
communications, minimizing potential
harmful effects.47 Additionally, the
collected data serves as invaluable
forensic evidence in the event of an
attempted or successful compromise of
the CIP-networked environment.
20. Third, NERC asserts that requiring
INSM implementation outside the
electronic security perimeter would not
promote security and reliability inside
the CIP-networked environment or that
the cost of doing so would outweigh
associated benefits.48 We disagree.
EACMS and PACS are integral to the
effective operation of BES Cyber
Systems within the electronic security
perimeter in providing services, such as
centralized authentication,
authorization, and monitoring, and
serving as the access point to the
electronic security perimeter.49 These
assets are valued targets for an attacker
and illustrate the need for a defense-indepth strategy for cybersecurity.50
Implementing INSM outside the
electronic security perimeter provides
significant benefits in monitoring,
detecting, and collecting malicious code
or anomalous activity from attackers
moving east-west within the EACMS or
PACS network segments of the CIPnetworked environment and is a
fundamental cybersecurity practice.51
C. Proposed Directive
21. Pursuant to section 215(d)(5) of
the FPA, the Commission proposes to
direct NERC to develop modifications to
proposed Reliability Standard CIP–015–
1 that would extend INSM to include
EACMS and PACS outside the
electronic security perimeter. We also
propose directing NERC to submit the
revised Reliability Standard for
Commission approval within 12 months
of the effective date of a final rule in this
proceeding. We seek comment on all
aspects of this proposal.
III. Information Collection Statement
22. The FERC–725B information
collection requirements are subject to
review by the Office of Management and
Budget (OMB) under section 3507(d) of
the Paperwork Reduction Act of 1995.
OMB’s regulations require approval of
certain information collection
requirements imposed by agency rules.
Upon approval of a collection of
information, OMB will assign an OMB
control number and expiration date.
Respondents subject to the filing
requirements will not be penalized for
failing to respond to these collections of
information unless the collections of
information display a valid OMB
control number. The Commission
solicits comments on the need for this
information, whether the information
will have practical utility, the accuracy
of the burden estimates, ways to
enhance the quality, utility, and clarity
of the information to be collected or
retained, and any suggested methods for
minimizing respondents’ burden,
including the use of automated
information techniques.
23. The Commission bases its
paperwork burden estimates on the
additional paperwork burden presented
by the proposed revision to Reliability
Standard CIP–015–1 as this is a new
proposed Reliability Standard.
Reliability Standards are objective-based
and allow entities to choose compliance
approaches best tailored to their
systems. The NERC Compliance
Registry, as of July 2024, identifies
approximately 1,636 unique U.S.
entities that are subject to mandatory
compliance with CIP Reliability
Standards. Of this total, we estimate that
400 entities will face an increased
paperwork burden under proposed
Reliability Standard CIP–015–1. Based
on these assumptions, we estimate the
following reporting burden:
ANNUAL CHANGES PROPOSED BY THE NOPR IN DOCKET NO. RM24–7–000 52
Number of
respondents
Annual
number of
responses
per
respondent
Total
number of
responses
Average burden &
cost per
response 53
Total annual
burden hours &
total annual cost
Cost per
respondent
($)
(1)
(2)
(1) * (2) = (3)
(4)
(3) * (4) = (5)
(5) ÷ (1)
Create one or more documented process(es) (R1)
Create documentation detailing network data
feed(s) and reason (R1.1).
Create documentation of: anomalous events and
baseline used to detect anomalous events (R1.2).
Create documentation of methods to: evaluate
anomalous activity; response to detected activity;
and escalation process(es) (R1.3).
Create documentation of: data retention process(es); system configuration(s), or system-generated report(s) (R2).
Create documentation of how the collected data is
being protected (R3).
lotter on DSK11XQN23PROD with PROPOSALS1
Total burden for FERC–725B(5) under CIP–
015–1.
46 NIST states that over 75% of network traffic is
now east-west or server-to-server, i.e., traffic that is
not covered by a perimeter-based defense approach.
See NIST SP 800–215 at 5.
47 See id. at 5.
48 NERC Petition at 15–16 n.46.
49 NERC, Lessons Learned: CIP Version 5
Transition Program (Sept. 2015), https://
www.nerc.com/pa/CI/tpv5impmntnstdy/LL_
EACMS_Mixed_Trust_Authentication_Sep_10_
2015_clean.pdf.
VerDate Sep<11>2014
16:43 Sep 26, 2024
Jkt 262001
400
400
1
1
400
400
40 hrs.; $3,880 .......
60 hrs.; $5,820 .......
16,000 hrs.; $1,552,000 .....
24,000 hrs.; $2,328,000 .....
$3,880
5,820
400
1
400
60 hrs.; $5,820 .......
24,000 hrs.; $2,328,000 .....
5,820
400
1
400
60 hrs.; $5,820 .......
24,000 hrs.; $2,328,000 .....
5,820
400
1
400
60 hrs.; $5,820 .......
24,000 hrs.; $2,328,000 .....
5,820
400
1
400
60 hrs.; $5,820 .......
24,000 hrs.; $2,328,000 .....
5,820
....................
....................
2,400
.................................
136,000 hrs.; $13,192,000
50 See,
e.g., CISA Cybersecurity Advisory at 2–6,
14.
51 See
NIST SP 800–215 at 5; NSA Network
Security Guide at 3.
52 The paperwork burden estimate includes costs
associated with the initial development of a policy
to address the requirements.
53 This burden applies in Year One to Year Three.
The hourly cost for wages is based in part on the
average of the occupational categories from the
Bureau of Labor Statistics website (http://
PO 00000
Frm 00009
Fmt 4702
Sfmt 4702
32,980
www.bls.gov/oes/current/naics2_22.htm) plus
benefits:
Legal (Occupation Code: 23–0000): $162.66.
Electrical Engineer (Occupation Code: 17–2071):
$79.31.
Office and Administrative Support (Occupation
Code: 43–0000): $48.59.
($162.66 + $79.31 + $48.59) ÷ 3 = $96.85.
The figure is rounded to $97.00 for use in
calculating wage figures in this NOPR.
E:\FR\FM\27SEP1.SGM
27SEP1
lotter on DSK11XQN23PROD with PROPOSALS1
Federal Register / Vol. 89, No. 188 / Friday, September 27, 2024 / Proposed Rules
24. The responses and burden hours
for Years 1–3 will total respectively as
follows:
• Year 1–3 each: 2,400 responses;
136,000 hours.
• The annual cost burden for each
year One to Three is $13,192,000.
25. Title: Mandatory Reliability
Standards, Revised Critical
Infrastructure Protection Reliability
Standards.
Action: Revision to FERC–725B
information collection.
OMB Control No.: 1902–0248.
Respondents: Businesses or other forprofit institutions; not-for-profit
institutions.
Frequency of Responses: On
Occasion.
Necessity of the Information: This
NOPR proposes to approve the
requested modifications to Reliability
Standards pertaining to critical
infrastructure protection. As discussed
above, the Commission proposes to
approve proposed Reliability Standard
CIP–015–1 pursuant to section 215(d)(2)
of the FPA because it improves upon the
currently-effective suite of cybersecurity
CIP Reliability Standards.
Internal Review: The Commission has
reviewed the proposed Reliability
Standard and made a determination that
its action is necessary to implement
section 215 of the FPA. Interested
persons may obtain information on the
reporting requirements by contacting
the following: Federal Energy
Regulatory Commission, 888 First Street
NE, Washington, DC 20426 [Attention:
Kayla Williams, Office of the Executive
Director, email: DataClearance@
ferc.gov, phone: (202) 502–8663, fax:
(202) 273–0873].
26. For submitting comments
concerning the collection(s) of
information and the associated burden
estimate(s), please send your comments
to the Commission, and to the Office of
Management and Budget, Office of
Information and Regulatory Affairs,
Washington, DC 20503 [Attention: Desk
Officer for the Federal Energy
Regulatory Commission, phone: (202)
395–4638, fax: (202) 395–7285]. For
security reasons, comments to OMB
should be submitted by email to: oira_
[email protected]. Comments
submitted to OMB should include
Docket Number RM24–7–000 and OMB
Control Number 1902–0248.
IV. Environmental Analysis
27. The Commission is required to
prepare an Environmental Assessment
or an Environmental Impact Statement
for any action that may have a
significant adverse effect on the human
VerDate Sep<11>2014
16:43 Sep 26, 2024
Jkt 262001
environment.54 The Commission has
categorically excluded certain actions
from this requirement as not having a
significant effect on the human
environment. Included in the exclusion
are rules that are clarifying, corrective,
or procedural or that do not
substantially change the effect of the
regulations being amended.55 The
action proposed herein falls within this
categorical exclusion in the
Commission’s regulations.
V. Regulatory Flexibility Act
Certification
28. The Regulatory Flexibility Act of
1980 (RFA) 56 generally requires a
description and analysis of proposed
rules that will have significant
economic impact on a substantial
number of small entities. The Small
Business Administration’s (SBA) Office
of Size Standards develops the
numerical definition of a small
business.57 The SBA revised its size
standard for electric utilities (effective
March 17, 2023) to a standard based on
the number of employees, including
affiliates (from the prior standard based
on megawatt hour sales).58 The
Commission believes that because the
obligations imposed upon industry are
directed at only entities that own or
operate high impact BES Cyber Systems
with or without external routable
connectivity or medium impact BES
Cyber Systems with external routable
connectivity that there are no entities
that meet the SBA revised standard for
electric utilities. Therefore, the
Commission certifies that this NOPR
will not have a significant economic
impact on a substantial number of small
entities. Accordingly, no regulatory
flexibility analysis is required.
VI. Comment Procedures
29. The Commission invites interested
persons to submit comments on the
matters and issues proposed in this
notice to be adopted, including any
related matters or alternative proposals
that commenters may wish to discuss.
Comments are due November 26, 2024.
Comments must refer to Docket No.
RM24–7–000, and must include the
commenter’s name, the organization
they represent, if applicable, and their
address in their comments.
30. All comments will be placed in
the Commission’s public files and may
54 Reguls. Implementing the Nat’l Envtl Pol’y Act,
Order No. 486, 52 FR 47897 (Dec. 17, 1987), FERC
Stats. & Regs. Preambles 1986–1990 ¶ 30,783 (1987)
(cross-referenced at 41 FERC ¶ 61,284).
55 18 CFR 380.4(a)(2)(ii).
56 5 U.S.C. 601–612.
57 13 CFR 121.101.
58 13 CFR 121.201, Subsector 221 (Utilities).
PO 00000
Frm 00010
Fmt 4702
Sfmt 9990
79183
be viewed, printed, or downloaded
remotely as described in the Document
Availability section below. Commenters
on this proposal are not required to
serve copies of their comments on other
commenters.
31. The Commission encourages
comments to be filed electronically via
the eFiling link on the Commission’s
website at http://www.ferc.gov. The
Commission accepts most standard
word processing formats. Documents
created electronically using word
processing software must be filed in
native applications or print-to-PDF
format and not in a scanned format.
Commenters filing electronically do not
need to make a paper filing.
32. Commenters that are not able to
file comments electronically may file an
original of their comment by USPS mail
or by courier or other delivery services.
For submission sent via USPS only,
filings should be mailed to: Federal
Energy Regulatory Commission, Office
of the Secretary, 888 First Street NE,
Washington, DC 20426. Submission of
filings other than by USPS should be
delivered to: Federal Energy Regulatory
Commission, 12225 Wilkins Avenue,
Rockville, MD 20852.
VII. Document Availability
33. In addition to publishing the full
text of this document in the Federal
Register, the Commission provides all
interested persons an opportunity to
view and/or print the contents of this
document via the internet through the
Commission’s Home Page (http://
www.ferc.gov).
34. From the Commission’s Home
Page on the internet, this information is
available on eLibrary. The full text of
this document is available on eLibrary
in PDF and Microsoft Word format for
viewing, printing, and/or downloading.
To access this document in eLibrary,
type the docket number excluding the
last three digits of this document in the
docket number field.
35. User assistance is available for
eLibrary and the Commission’s website
during normal business hours from
FERC Online Support at 202–502–6652
(toll free at 1–866–208–3676) or email at
[email protected], or the
Public Reference Room at (202) 502–
8371, TTY (202) 502–8659. Email the
Public Reference Room at
[email protected].
By direction of the Commission.
Issued: September 19, 2024.
Debbie-Anne A. Reese,
Acting Secretary.
[FR Doc. 2024–22231 Filed 9–26–24; 8:45 am]
BILLING CODE 6717–01–P
E:\FR\FM\27SEP1.SGM
27SEP1
File Type | application/pdf |
File Modified | 2024-09-27 |
File Created | 2024-09-27 |