PowerWorld & NERC Physical Security CIP-014-01

2y ago
19 Views
2 Downloads
1.74 MB
29 Pages
Last View : 13d ago
Last Download : 6m ago
Upload by : Isobel Thacker
Transcription

PowerWorld & NERC PhysicalSecurity CIP-014-01Tracy RolstadMay 2014 to October 2014

Intro: Tracy Rolstad (Education) United States Navy (1980 to 2003)– Nuclear Power School Various schools too numerous to list University of Idaho– BSEE, 1992 Engineering Advisory Board Member (Present) Naval War College– Diploma, Naval Command and Staff, 1999 Joint Professional Military Education, phase I

Intro: Resume – Avista Corporation Senior Pwr Sys Consultant, System Planning WECC TSS Chair– Utility System Efficiencies Senior Power Systems Analyst– The Bonneville Power Administration Senior Engineer, System Operations– The Joint Warfare Analysis Center EP Senior Analyst, PACOM Chief of Targets Special Technical Operations Action Officer– Nuclear Navy (Attack Submarines) Engineering Watch Supervisor Reactor Operator

Policy: Your Role YOU, the technically educated are:– THE EXPERTS– The first and last line of defense Get the story straight, correct the inaccuracies, and calm thepolicy makers There ARE people & organizations who are:– The Prophets of DoomOR– The Profits of Doom Advocate for your industry– Make sure people get the facts straight!

Policy: Peak Reliability Point of View The Energy Policy Act of 2005 [requires] theestablishment of minimum mandatorystandards of reliability for the U.S. energy sector. Peak has guidance on CIP-014 that will bereleased soon.– WECC TSS input, WECC Compliance input, andDOE Office of Electric Reliability6

How Did We Get Here?Attack Ideas Available on the InternetAttacks on Critical InfrastructureMetcalf 4/16/20131/15/2013“If someone decides to blast a transformer at itsbase as prepper Bryan Smith did, and the oildrains out, then the transformer either burns outcatastrophically, or if the utility is lucky, a softwareroutine notices the problem and shuts thesubstation (or at least the affected portion) system/)Arkansas 9/16/201377

120 rounds7.62x39 mm, 51,000 gallons of oilWhen seconds matter cops are only minutes away

9

10

11

12

Fanning the Flames?Press Reports Fan The Flames and Politics in Action

A Word on Metcalf It was either unsophisticated or sophisticatedlyunsophisticated– Brass left at the scene Cheap Soviet stuff (7.62 x 39 mm)– Noisy No suppressors used. No subsonic ammunition used.– No combined effects munitions used No truly diabolical methods employed– No loss of service to PG&E customers! Pretty ripe for conspiracy theories to be honest14

The Standard (CIP-014-01) Identify Stations on the “List” and IROL– All 500 kV stations– 200 kV to 499 kV with 3 or more lines and where thesummed aggregate of the lines exceed 3000 (seetable for weights):VoltageVoltageValueValueof aofLinea Lineless than 200 kV (notless than 200kV (not applicable)applicable)Weight ValueWeightperValueLine per Line(not applicable)(not applicable)200 kV to 299 kV700300 kV to 499 kV299 kV500200kV kVandtoabove13000700300 kV to 499 kV1300500 kV and above0

Generator Lead in vs Collectors16

Step-by-step to deal with CIP-014-011.2.3.4.Create substationsLoad and apply CIP 014 01.auxDisplay column in substation tableSelect stations1. 499 kV is IN automatically1.Might want to filter the results of the *.aux file to exclude500 kV5. Presumably perform substation outages

Step1a. Create substations Auto insert option

Step1b. Create substations You might consider inserting substationsmanually– X 0.0029 for ZBR B zero? Is this correct for your stations?– What about transformers?– What about proper naming convention?– It really isn’t hard to do to insert manually Populate your latitudes & longitudes as well!– GIC/GMD Standard needs this (i.e. TPL-07)

Step 2. Apply the CIP 014 01.auxSymbol Equivalent DescriptionIIFIf condition Thanks Jamie!ExampleIIf(1 1 2,4,5) 4// Step 1 Custom ExpressionDATA nch:1" "Weight" "iif(x1 499.9, 0, iif(x1 299.9, 1300, iif(x1 199.9, 700, 0)))" "LineMaxNomVolt" "YES"}// Step 2 Calculated FieldDATA ogic,FilterPre]){"Sum of Inter-Substation Weights" "Branch" "CustomExpression" "Sum" "NO " "As Zeros" "Branch" "YES""AND" "NO " SUBDATA Condition SubNum "SubNum:1" 0 Field /SUBDATA }

Step 2a. The IIF Function Immediate If (aka IIF)-OR Inline If (aka IIF)The syntax of the IIf function is as follows:IIf(expr, truepart, falsepart) All three parameters are required:expr is the expression that is to be evaluated.truepart defines what the IIf function returns if the evaluationof expr returns true.falsepart defines what the IIf function returns if the evaluationof expr returns false.21

Step 3. Display Results Review

Step 3a. What stations are in? Check your work!– Stublets to generators ARE counted The *.aux file counts stublets Generator collector buses are NOT to be considered The basics:– Any 500 kV station is in– A 345 kV station with more than 2 lines @ 345 kV– A 230 kV station with more than 4 lines @ 230 kV

Concatenate to Build Substation Outages CONCATENATE("Sub: ", C3) CONCATENATE("Bus ",A3," OPEN")24

Step 4. Use the Auto insert Substations25

Step 4a. Examine the Results26

Step 5. “Rinse & Repeat”27

Stressed Case- Through Flows28

Requirements for Stations on the “List”1. Perform a risk assessment every 30 months to identify:– Substations if damaged could result in instability– Primary Control Center that controls critical substations2. Have a third party verify the risk assessment– Each Transmission Owner shall select an independent verifying entity thatis either (i) a registered Planning Coordinator, Transmission Planner, orReliability Coordinator or (ii) an entity that has transmission planning oranalysis experience.3. Conduct an evaluation of the potential physical threats andvulnerabilities4. Develop and document physical security plans5. Have third party review the evaluation of potential physical threatsand plans29

Step-by-step to deal with CIP-014-01 1. Create substations 2. Load and apply CIP_014_01.aux 3. Display column in substation table 4. Select stations 1. 499 kV is IN automatically 1. Might want to filter the results of the *.aux file t

Related Documents:

CIP -003 -5, CIP -004 -5, CIP -005 -5, CIP -006 -5, CIP -007 -5, CIP -008 -5, CIP -009 -5, CIP -010 -1, . controls to mitigate risk to BES Cyber Systems. This suite of CIP Standards is referred to as the Version 5 CIP Cybe r Security Standards . Most requirement s open with , Each Responsible Entity shall implement one or more documented .

NERC CIP v5/v6 o Overview of Version 5 NERC Cyber Security Standards o Notable differences between Version 3 and Version 5 NERC CIP reliability standards Tools and resources o A few words about “tools” and NERC CIP compliance o Active vulnerability assessment tools o Danger:

This NPCC whitepaper is not intended to replace or supersede the NERC Implementation Guidance for CIP-012-1. 1. This document is intended to accompany and complement the NERC Implementation Guidance for CIP-012-1. NERC Reliability Standard CIP012- -1 is intended to “protect the confid

CIP-005-5 . 4/1/2016: CIP-006-5. 4/1/2016: CIP-007-5. 4/1/2016: CIP-008-5. 4/1/2016: CIP-009-5. 4/1/2016: CIP-010-1. 4/1/2016: CIP-011-1. 4/1/2016: Talk with Texas RE & NRWG February 18, 2016. 3 CIP

NERC CIP-014. Compliance Guide. The purpose of the NERC CIP-014 reliability standard is to protect electrical . facilities from physical attacks that could threaten the stability and operation of the electric grid distribution system. Requirement R5 man

1.3 Physical security of BES Cyber Systems (CIP -006) 1.4 System security management (CIP -007) 1.5 Incident reporting and response planning (CIP -008) 1.6 Recovery plans for BES Cyber Systems (CIP -009) 1.7 Configuration change management and vulnerability ass

Ms. Rayo is a NERC CIP Compliance Program Consultant assisting clients in developing a solid sustainable NERC CIP Program which included a Sabotage Reporting Procedure, Cyber Security Policy, Internal Compliance Program, and othe

Jan 15, 2016 · NERC CIP 14 is accepted as the latest NERC requirement to implement increased security at critical locations within PA’s footprint. As such, this Security Asset Management Strategy is crafted to respond to and implement the NERC CIP 14 security enhanc