...

808 SABOTAGE REPORTING EVENT 1. Purpose

by user

on
Category: Documents
24

views

Report

Comments

Transcript

808 SABOTAGE REPORTING EVENT 1. Purpose
Operating Policies and Procedures
Emergency System Operations
OPP 808
Issued for consultationssued: 2009-09-02xx-xx
Supersedes : 2008-11-13
808 SABOTAGE EVENT REPORTING
1.
Purpose
To define set out describethe policies and define responsibilities and procedures for identifying and to
identify and reporting confirmed or suspected sabotage events, including acts of cyber sabotage and
cyber sabotage incidentsevents, confirmed or suspected that could affect the safe and reliable operation
of the Alberta Interconnected Electric System (AIES).
2.
Background
“Sabotage event”, as used in this OPP, is as defined in the Alberta Reliability Standard’s Glossaryand
cyber sabotage are interpreted as incidents that prevent the ISO from carrying out its responsibilities,
by affecting the reliable operation of the AIES. Examples would include but are not limited to,
occurrancesoccurrences or resulting circumstances suspected or determined to have been caused by
the deliberate destruction, or damage or degradation of equipment, facilities, computer systems,
communication systems and telecommunication systems used by the ISO, Transmission Facility Owner
(TFO) and Generation Facility Owner (GFO) and Wire Owner (WO).
The process and communication protocol outlined in this OPP will addresses the assessment and
reporting aspects of all confirmed or suspected acts of sabotage or cyber sabotage foronaffecting the
AIES. Thesethey are reportsed to the system controller (SC) may originate from entities internal to
Alberta by . including but not limited to, The entities include ISO staff, TFO, GFO, and WO except
those that only operate facilities below 25kV. External reports may originate from adjacent balancing
authorities or the Western Electric Coordinating Council’s (WECC) Vancouver reliability coordinator
(VRC).
or ISO internal staff.
3.
Policy
•
Sabotage events that arepose, or may pose, a direct threat to the AIESgrid must be reported to
the SC in accordance with this operating policy OPP.
•The ISO will develop procedures to identify, report, and respond to sabotage and cyber sabotage
(confirmed or suspected) including the contact phone numbers for local police and the
RCMP.Applying the methodology of risk-based assessment, the ISO will create a list of critical
assets and will review this list at least annually. The critical assets list will be approved by an ISO
executive or designate.
•When a TFO or GFO suspects or has confirmed that a sabotage incident has occurred following their
procedures or protocols, they will report the occurrence to the SC.
•
The SC, Operations-On-Call (OOC) and the SC, Incident Commander (IC) mustwill follow the
process outlined in Figure 2 and detailed in Section 4 of this OPP to communicate and file
reports on sabotage incidentsevents.
DRAFT 2 Issued for Stakeholder Consultation: 2009-09-10
Page 1 of 7
Emergency System Operations
OPP 808 Sabotage Event Reporting
4.
Responsibilities
4.1
ISO
The ISO mustwill::
•Review and update this OPP contact information in this OPP as required or annually it .
•Maintain a signed and dated record after the annual review of the Critical Assets and Critical
Cyber Assets lists. This record must be approved by an ISO executive or delegate.
•
Provide the SC with the capability to receive information on sabotage events on the
interconnection.
•
Identify, report, and respond to multi-site sabotage events.
•
As necessaryfter a sabotage event has been reported to it, including coordinate the
security information exchange withontact the local police force and the RCMP and the
Alberta Security and Strategic Intelligence Support Team (ASSIST) (see Table 1).
Operations On Call (OOC) must, after it has been notified by the ISO of a sabotage event will:
•
Notify the IC immediately..
•
Take direction from, and assist the IC., and assist the IC with the performance of the IC’s
duties.
Incident Commander (IC must, after it has beening notified by the OOC of a sabotage event)
will:
•
Follow internal protocols established to deal with threats and sabotage events.
•
Consult and coordinate with ISO senior management, ISO sSecurity and staff, and ISO
Ccommunications staff. to in the prepare of all reports and information releases.
•
Use where appropriate, the reference information posted on the NERC web site at
http://www.esisac.com pertaining to Threat and Incident Reporting,, . Referring to the
criteria on for reporting various acts of sabotage on NERC’s website,to and develop the
report for the Vancouver Reliability Coordinator (VRC)VRC/NERC.
•
Draft all reports including the preliminary report to be filed with the VRC.
•
Identify which market participants recipients who will receive the reports and updates
from the ISO??.
System Controller
The SC must after a sabotage event has been reported reportedto it will:
•
Gather details of the sabotage event.when being notified of the incident
•
Notify the OOC immediatelyEscalate immediately within the AESO. Refer to procedure
found in section 5. (Is this not the same as in s. 5(2.) below??
•
Submit the preliminary report developed by the IC to the VRCVRC.
•
Based on the direction of the IC, Communicate information reports and updates to
recipients, received from supplied and identified providedby the IC to the market
participants identified by the IC.to recipients identified to it by the IC.
DRAFT 2 Issued for Stakeholder Consultation: 2009-09-10
Page 2 of 7
Emergency System Operations
OPP 808 Sabotage Event Reporting
4.2
Transmission Facility Owners and , Generation Facility Owners and Wire
Owner s(TFOs and GFOs)
EachThe TFO, or GFO or WO, (except those that only operate facilities below 25kV, ) must
will:
5.
•
Have the ability to receive information about sabotage events on the interconnection.
•
Follow in houseternal procedures for reporting sabotage events to the local police force.
•
Report sabotage events to the SC for situations that may have a significant impact on to
the AIES to the SC. Examples mightmay include but are not limited to situations of
heightened operational awareness or situations that may which result in may a
reconfiguration iresult in the AIES in order to to be reconfigured to maintain system
reliability. Single events of vandalism or minor tampering of less critical components
mustshould be reported to the SCC management on the next business day if the incident
is escalated Report the incident to the SC when they suspect or have confirmed it is
sabotage and escalate the incident within the market participant’sir organization.
System Controller Procedures
When informed of a sabotage incidentevent is reported to itthe SC, , the SC mustwill:
1.
Gather details of the sabotage event and complete as much information in the Sabotage
CyberSystem Sabotage Event Reporting Form or Cyber Sabotage Event Reporting Fform
(Figure 1) as possible.
2.
Notify the OOC immediately.
3.
Take direction from the IC on the information to report to the IC’s identified recipients. There
will beare security issues that must be considered before the SC can file any reports. See Figure 2.
4.
File the preliminary report creatdeveloped by the IC with the VRCVRC. Refer to 4.1 IC
responsibilities.
5.
Log the sabotage event in the Shift Log (see OPP 1301), posting for internal use only.
6.
Disseminate reports and updatesinformation provided by the IC to the market
participantsrecipients that the IC has identified.
This dissemination could be on ADaMS if
the IC directs thatwants all market participants are to be notified or via Global Talk if the IC
directs such information is is only to be shared with eachthe TFO and GFO only.
DRAFT 2 Issued for Stakeholder Consultation: 2009-09-10
Page 3 of 7
Emergency System Operations
OPP 808 Sabotage Event Reporting
6
Figures and Tables
Figure 1
System Sabotage Event Reporting Form
Internal Contact Information
External Contact Information
Recorded by
Name/Title
Date
Organization
Time
Email
7 x 24 Contact Info
What assistance
is required?
Subject
System sabotage (continue on this page)
Cyber sabotage (2nd page)
Date and Time Incident Event
Occurred
Date and Time Incident Event
Resolved
Type of Incident (Where did the incident occur? What was affected?)
Generating station
Generating substation
Transmission substation
Distribution system
Control Centre
Energy Mgmt System
Information Systems
Other
Incident Summary
Damage (What were the consequences of the incidentevent?)
Numbers of systems affected
Nature of loss, if any
System downtime
Estimated incident cost
Additional Comments
Copies Sent To
DRAFT 2 Issued for Stakeholder Consultation: 2009-09-10
Page 4 of 7
Emergency System Operations
OPP 808 Sabotage Event Reporting
Cyber Sabotage Event Reporting Form (continued)
Attack Vector
External
Infected web site
Software download
E-mail attachment
Removable media
(diskette, CD USB drive, etc.)
Other
Primary systems or infrastructure involved
Software affected
(e.g., ABB Ranger, AREVA e-terra)
Operating system and version
(Windows, UNIX, Linux)
Security software
(AntiVirus, IDS/IPS, etc.)
Firewall information
(Type/Version)
Network Equipment
(Make, model and version)
Other
Type of malicious code (include name if known):
Virus
Trojan horse
Worm
Joke program
Other
Operation method (for new malicious code)
Details
Type: Macro, boot memory resident, polymorphic,
self encrypting, stealth
Payload
Software infected
Files erased, modified, deleted, encrypted
Self propagating via e-mail
Detectable changes
Other features
Remediation (How was the incident event resolved?)
Details
Anti-virus product installed or updated
Firewall and/or server-based filtering updated
Software deleted, updated and/or restored
Network traffic rerouted or filtered
Update to security policies
DRAFT 2 Issued for Stakeholder Consultation: 2009-09-10
Page 5 of 7
Emergency System Operations
OPP 808 Sabotage Event Reporting
Figure 2
Sabotage event notification process flow chart
AESO staff
Event
considered
to be
Sabotage
or
Suspected
to be
Sabotage
Reported
by:
Operations on Call
(OOC)
TFO, GFO, WO
System
Controller
Adjacent BA
Director Operations
Integration or designate
IncidentCommander
ISO Executive
Corporate
Security
Communications
VRC
NERC
USA Homeland
Security
Canadian
Government
Agencies
Red solid straight arrows indicate the flow of information from the source to the
Incident Commander
Dash curved lines indicate the flow of information from the Incident Commander to
the VRC/NERC, adjacent balancing authorities, and to recipients
within the AIES, via the SC.
DRAFT 2 Issued for Stakeholder Consultation: 2009-09-10
Page 6 of 7
Emergency System Operations
OPP 808 Sabotage Event Reporting
Table 1
Law enforcement RCMP and Police and Assist contact information
Agency
Contact
Calgary Police Service
911
Alberta Security and Strategic
Intelligence Support Team
(ASSIST)RCMP
Denis Huot Manager 780-427-4973, cell 780-966-4248
[email protected]
Gord Beagle Field Officer 403-592-4062, cell 403-801-7510
[email protected]
Sarah Weis Administrative Support 780-427-5089
[email protected] National Security Investigation Section
Sgt. Terrance Zeniuk or David Bibeau (24/7) 403 292-8705
RCMP Calgary Police Service
National Security Investigation Section
Sgt. Terrance Zeniuk or David Bibeau (24/7) 403 292-8705911
7.
Revision History
Issued
Description
2009-xx-xx
Supersedes 2008-11-13
2008-11-13
Supersedes 2008-05-30; only confidential information changed
2008-05-30
New issue, approved for interim implementation
DRAFT 2 Issued for Stakeholder Consultation: 2009-09-10
Page 7 of 7
Fly UP