FERC Accepts Revisions to Cybersecurity Reliability Standards, Orders Further Revisions

Jan 25, 2016

Reading Time : 6 min

In Order No. 822, FERC accepted NERC’s revisions and also ordered additional revisions to the CIP Version 5 standards. First, FERC directs NERC to make additional revisions to the CIP Version 5 standards addressing the risks posed by transient electronic devices (such as laptops, thumb drives, tablets, and a wide array of diagnostic and testing equipment) to Low Impact Bulk Electric System (BES) Cyber Assets, which include essentially all computer systems associated with the bulk electric system, except control centers, generation facilities and transmission facilities. As discussed below, in Order No. 822, the Commission has accepted revisions addressing risks to Low Impact BES Cyber Assets generally, and also approved revisions that addressed the risk of transient devices to High and Medium Impact BES Cyber Assets. However, the Commission remains concerned about risks posed to Low Impact BES Cyber Assets by transient devices, which is not addressed in the current rules. The Commission’s concerns relating to transient devices and Low Impact BES Cyber Assets was first raised in the NOPR, based on a concern that malware inserted at one substation might propagate unchecked through multiple substations or a utility’s other cyber assets. Although most commenters, including NERC, opposed the addition of controls for transient devices with regard to Low Impact BES Cyber Assets, FERC has concluded that such controls are necessary, since the firewalls prescribed by the current standards may not curb the spread of malicious code. One solution would be for NERC to extend the limitations on transient devices related to High and Medium Impact BES Cyber Assets to Low Impact BES Cyber Assets, but the Commission is not specifically ordering that change.

Additionally, FERC directs NERC to modify its standards relating to communications networks to require protections for communication network components and data used for intra-Control Center communications based on the risk posed to the BES. NERC also is ordered to conduct a “comprehensive study that identifies the strength of the CIP version 5 remote access controls, the risks posed by remote access-related threats and vulnerabilities, and appropriate mitigating controls.” Finally, NERC must develop modifications to its definition for “Low Impact External Routable Connectivity.” 

With regard to one final issue, in the NOPR, the Commission raised the need for security requirements related to the supply chain for hardware, software and computer services. FERC has decided to defer a decision on these issues until after a technical conference scheduled for January 28, 2016.

The changes ordered by FERC in Order No. 791, presented in the NOPR, and approved in Order No. 822 are as follows:

Eliminate “identify, assess and correct” language used in 17 of the CIP Version 5 Standard requirements

The Commission directed the removal of this language on the grounds that it was “overly vague, lacking basic definition and guidance that is needed, for example, to distinguish a successful internal control program from one that is inadequate.”2 The language was included in the original draft of the standards as a move away from a “zero-tolerance” enforcement approach, which was particularly onerous with regard to the cybersecurity standards. In ordering NERC to remove the language, FERC recognized, and approved of, the ultimate goal of moving away from a zero-tolerance model, but suggested that NERC propose modifications that would make the language of the provisions less ambiguous and easier to enforce.

NERC complied by removing the offending language and noted in its Petition3 that its move away from a zero-tolerance approach is now reflected in its Compliance Monitoring and Enforcement Program due to changes made in NERC’s enforcement procedures by the Reliability Assurance Initiative (RAI). The RAI is a broad initiative to move toward a risk-based approach to compliance monitoring and enforcement that started in 2012. NERC believes that changes made by the RAI will “directly accomplish” the goals of the “identify, assess and correct” language,4 in particular, by using risk assessments and incenting utilities to develop internal controls to manage cybersecurity risks, with minor violations being addressed outside a formal enforcement action.

Provide enhanced security controls for Low Impact BES Cyber Assets

In the original version of the CIP Version 5 standards, there was only one standard applicable to Low Impact BES Cyber Assets, namely Reliability Standard CIP-003-5, Requirement R2, which required only very vague and general control measures to protect these assets. As a result, FERC ordered NERC to revise the standard to include specific objective criteria by which to judge the sufficiency of controls for protection of Low Impact BES Cyber Assets, which, FERC suggested, NERC could address by developing specific controls for Low Impact BES Cyber Assets.5

NERC opted to adopt specific security objectives for Low Impact BES Cyber Assets that require entities to develop and implement documented plans to “(1) regularly reinforce cybersecurity awareness and best practices across the organization; (2) establish protections to control physical access; (3) establish electronic access controls to limit inbound and outbound communication; and (4) implement Cyber Security Incident response plans.”6 However, NERC also opted to leave the specifics up to the responsible entity so that it would have the “flexibility to implement security controls for low impact BES Cyber Systems in the manner that best suits the needs and characteristics of their organization, so long as the responsible entity can demonstrate that it designed its controls to meet the ultimate security objectives.”7

Provide controls to address the risks posed by transient electronic devices used at High and Medium Impact BES Cyber Assets

Transient electronic devices can be easily transported in and out of secure areas.  Such devices are excluded from the standard definition of BES Cyber Asset, because it would be unduly burdensome to treat them in the same way as permanent cyber assets. However, FERC was concerned that such devices were not sufficiently protected under CIP Version 5, and it directed NERC to address the risks these devices might pose to the BES (such as the introduction of viruses or other malicious code).

NERC, in response, revised the CIP standards to require entities to develop plans and implement cybersecurity controls to protect transient devices associated with their High Impact and Medium Impact BES Cyber Assets. These controls include limiting who can use a given device, as well as limiting where, and for what reasons it may be used, and requiring that the software on such devices be kept up to date with security patches (or other methods of addressing the risks of unpatched software). Entities are also required to train their personnel on the risks associated with using transient devices. The rules also address the risks posted by transient devices controlled by a third party, such as a vendor or contractor.

Create an NERC Glossary definition for the term “communication networks” and revise the standards for the protection of nonprogrammable components of communication networks

FERC was concerned that the CIP Version 5 standards did explicitly address security controls needed to protect the nonprogrammable components (such as cabling, wiring, hubs and ports) of communication networks and therefore directed NERC to adopt a definition of “communication networks” that would include these components. In addition, FERC directed NERC to adopt revised reliability standards that would provide for the protection of these components. 

In this case, NERC concluded that it was not necessary to create such a definition, because the term “communication network” is not included in the CIP Version 5 standards. Further, NERC explained that it would be very hard to draft a definition that would be sufficiently broad while remaining accurate. Instead, “the standard drafting team simply identified the types of equipment or components that entities must protect and proposed appropriate and reasonable controls to secure those components based on the risks they present to the Bulk Electric System,”8 noting that this approach will “meet the ultimate security objective of protecting communication networks (both programmable and nonprogrammable communication network components).”9 NERC also revised several standards to address risks specifically concerning nonprogrammable components, requiring, for example, that certain cables be secured, either physically or digitally, to prevent “man-in-the-middle” type attacks. Another revision will require the elimination of unnecessary input/output ports.


1 Version 5 Critical Infrastructure Prot. Reliability Standards, Order No. 791, 78 Fed. Reg. 72,755 (Dec. 3, 2013), 145 FERC ¶ 61,160 (2013), order on clarification and reh’g, Order No. 791-A, 146 FERC ¶ 61,188 (2014).

2 Order No. 791 at P 4.

3 NERC, Petition for Approval of Proposed Critical Infrastructure Protection Reliability Standards CIP-003-6, CIP-004-6, CIP-006-6, CIP-007-6, CIP-009-6, CIP-010-2, and CIP-011-2, Docket No. RM15-14-000 (filed Feb. 13, 2015) (“NERC Petition”).

4 NERC Petition at 5.

5 Order No. 791 at PP 5, 106-08.

6 NERC Petition at 25.

7 Id.

8 NERC Petition at 52.

9 Id.

Share This Insight

Previous Entries

Speaking Energy

April 15, 2025

On April 9, 2025, President Trump issued an executive order (EO)1 directing several federal agencies and subagencies that regulate energy, environmental, and conservation matters,2 including the Federal Energy Regulatory Commission (FERC) and the Department of Energy (DOE), to establish conditional sunset dates for “regulations governing energy production.” The stated objective of the EO is to require agencies to periodically reexamine their regulations to ensure that they continue to serve the public good. For FERC, the order covers regulations promulgated under the Federal Power Act (FPA), the Natural Gas Act (NGA) and the Powerplant and Industrial Fuel Use Act (FUA)3, as amended, while DOE must consider regulations promulgated under the Atomic Energy Act (AEA), the National Appliance Energy Conservation Act, the Energy Policy Act of 1992 (EPAct 1992), the Energy Policy Act of 2005 (EPAct 2005) and the Energy Independence and Security Act of 2007 (EISA), as amended (collectively the Covered Regulations).4 To the extent the DOE has been directed to promulgate regulations under various sections of the NGA, FPA and FUA, and FERC has been directed to promulgate regulations specific to the statutes attributed to the DOE in the EO, the EO is silent. The EO expressly does not apply to those “regulatory permitting regimes authorized by statute.”5

...

Read More

Speaking Energy

April 10, 2025

On April 8, 2025, President Trump issued an Executive Order (EO) directing the Department of Energy (DOE) to take steps to expand the use of its emergency authority under Federal Power Act (FPA) Section 202(c) to require the retention of generation resources deemed necessary to maintain resource adequacy within at risk-regions of the bulk power system regulated by the Federal Energy Regulatory Commission (FERC).1 The EO appears to envision a more active role for DOE in overseeing and supporting the resource adequacy of the grid that deviates from the historic use of Section 202(c) and touches on issues at the intersection of state and federal authority over resource planning.

...

Read More

Speaking Energy

March 10, 2025

On March 5, 2025, the United States Department of Energy (DOE) approved Golden Pass LNG Terminal LLC’s (GPLNG) request to extend a deadline to begin exporting liquefied natural gas (LNG) from its terminal facility currently under construction in Sabine Pass, Texas for 18 months, from September 30, 2025, to March 31, 2027 (the Order). The Order amends GPLNG’s two existing long-term orders authorizing the export of domestically produced LNG to countries with which the United States does and does not have free trade agreements (FTA).1  The Order does not amend the authorizations’ end date, which remains December 31, 2050. Under section 3 of the Natural Gas Act (NGA), the DOE may authorize exports to non-FTA countries following completion of a “public interest” review, whereas exports to FTA countries are deemed to be in the public interest and the DOE is directed to issue authorizations without modification or delay.

...

Read More

Speaking Energy

March 4, 2025

Join projects & energy transition partner Shariff Barakat at Infocast’s Solar & Wind, where he will moderate the “Tax Equity Market Dynamics” panel.

...

Read More

Speaking Energy

February 13, 2025

Oil & gas companies continue to identify and capitalize on opportunities related to the deployment of new energy technologies, with their approaches broadly maturing and coalescing around maximizing synergies, leveraging available subsidies and responding to regulatory drivers.

...

Read More

Speaking Energy

February 11, 2025

On January 30, 2025, the Federal Energy Regulatory Commission (FERC or the Commission) approved a Stipulation and Consent Agreement (Agreement) between the Office of Enforcement (OE) and Stronghold Digital Mining Inc. (Stronghold) resolving an investigation into whether Stronghold had violated the PJM Interconnection, L.L.C. (PJM) tariff and Commission regulations by limiting the quantity of energy made available to the market to serve a co-located Bitcoin mining operation.1 This order appears to be the first instance of a public enforcement action involving co-located load and generation and comes at a time when both FERC and market operators2 are scrutinizing the treatment of co-located load due to the rapid increase in demand associated with data center development.

...

Read More

Speaking Energy

February 5, 2025

2024 was about post-consolidation deal flow and a steady uptick in activity across the oil & gas market. This year, mergers & acquisitions (M&A) activity looks set to take on a different tone as major consolidation plays bed down.

...

Read More

Speaking Energy

January 30, 2025

The oil & gas industry is experiencing a capital resurgence, driven by stabilizing interest rates and renewed attention from institutional investors. Private equity is leading the charge with private credit filling the void in traditional energy finance and hybrid capital instruments gaining in popularity. Family offices are also playing a crucial role, providing long-term, flexible investments.

...

Read More

© 2025 Akin Gump Strauss Hauer & Feld LLP. All rights reserved. Attorney advertising. This document is distributed for informational use only; it does not constitute legal advice and should not be used as such. Prior results do not guarantee a similar outcome. Akin is the practicing name of Akin Gump LLP, a New York limited liability partnership authorized and regulated by the Solicitors Regulation Authority under number 267321. A list of the partners is available for inspection at Eighth Floor, Ten Bishops Square, London E1 6EG. For more information about Akin Gump LLP, Akin Gump Strauss Hauer & Feld LLP and other associated entities under which the Akin Gump network operates worldwide, please see our Legal Notices page.