80_FR_43494 80 FR 43354 - Revised Critical Infrastructure Protection Reliability Standards

80 FR 43354 - Revised Critical Infrastructure Protection Reliability Standards

DEPARTMENT OF ENERGY
Federal Energy Regulatory Commission

Federal Register Volume 80, Issue 140 (July 22, 2015)

Page Range43354-43367
FR Document2015-17920

The Federal Energy Regulatory Commission (Commission) proposes to approve seven critical infrastructure protection (CIP) Reliability Standards: CIP-003-6 (Security Management Controls), CIP-004-6 (Personnel and Training), CIP-006-6 (Physical Security of BES Cyber Systems), CIP-007-6 (Systems Security Management), CIP-009-6 (Recovery Plans for BES Cyber Systems), CIP-010-2 (Configuration Change Management and Vulnerability Assessments), and CIP-011-2 (Information Protection). The North American Electric Reliability Corporation (NERC) submitted the proposed Reliability Standards in response to the Commission's Order No. 791. The proposed Reliability Standards address the cyber security of the bulk electric system and improve upon the current Commission-approved CIP Reliability Standards. In addition, the Commission proposes to direct NERC to develop certain modifications to Reliability Standard CIP-006-6 and to develop requirements addressing supply chain management.

Federal Register, Volume 80 Issue 140 (Wednesday, July 22, 2015)
[Federal Register Volume 80, Number 140 (Wednesday, July 22, 2015)]
[Proposed Rules]
[Pages 43354-43367]
From the Federal Register Online  [www.thefederalregister.org]
[FR Doc No: 2015-17920]


=======================================================================
-----------------------------------------------------------------------

DEPARTMENT OF ENERGY

Federal Energy Regulatory Commission

18 CFR Part 40

[Docket No. RM15-14-000]


Revised Critical Infrastructure Protection Reliability Standards

AGENCY: Federal Energy Regulatory Commission, Energy.

ACTION: Notice of proposed rulemaking.

-----------------------------------------------------------------------

SUMMARY: The Federal Energy Regulatory Commission (Commission) proposes 
to approve seven critical infrastructure protection (CIP) Reliability 
Standards: CIP-003-6 (Security Management Controls), CIP-004-6 
(Personnel and Training), CIP-006-6 (Physical Security of BES Cyber 
Systems), CIP-007-6 (Systems Security Management), CIP-009-6 (Recovery 
Plans for BES Cyber Systems), CIP-010-2 (Configuration Change 
Management and Vulnerability Assessments), and CIP-011-2 (Information 
Protection). The North American Electric Reliability Corporation (NERC) 
submitted the proposed Reliability Standards in response to the 
Commission's Order No. 791. The proposed Reliability Standards address 
the cyber security of the bulk electric system and improve upon the 
current Commission-approved CIP Reliability Standards. In addition, the 
Commission proposes to direct NERC to develop certain modifications to 
Reliability Standard CIP-006-6 and to develop requirements addressing 
supply chain management.

DATES: Comments are due September 21, 2015.

ADDRESSES: Comments, identified by docket number, may be filed in the 
following ways:
     Electronic Filing through http://www.ferc.gov. Documents 
created electronically using word processing software should be filed 
in native applications or print-to-PDF format and not in a scanned 
format.
     Mail/Hand Delivery: Those unable to file electronically 
may mail or hand-deliver comments to: Federal Energy Regulatory 
Commission, Secretary of the Commission, 888 First Street NE., 
Washington, DC 20426.
    Instructions: For detailed instructions on submitting comments and 
additional information on the rulemaking process, see the Comment 
Procedures Section of this document.

FOR FURTHER INFORMATION CONTACT: 

Daniel Phillips (Technical Information), Office of Electric 
Reliability, Federal Energy Regulatory Commission, 888 First Street 
NE., Washington, DC 20426, (202) 502-6387, [email protected].
Kevin Ryan (Legal Information), Office of the General Counsel, Federal 
Energy Regulatory Commission, 888 First Street NE., Washington, DC 
20426, (202) 502-6840 [email protected].

SUPPLEMENTARY INFORMATION: 
    1. Pursuant to section 215 of the Federal Power Act (FPA),\1\ the 
Commission proposes to approve seven critical infrastructure protection 
(CIP) Reliability Standards: CIP-003-6 (Security Management Controls), 
CIP-004-6 (Personnel and Training), CIP-006-6 (Physical Security of BES 
Cyber Systems), CIP-007-6 (Systems Security Management), CIP-009-6 
(Recovery Plans for BES Cyber Systems), CIP-010-2 (Configuration Change 
Management

[[Page 43355]]

and Vulnerability Assessments), and CIP-011-2 (Information Protection). 
The North American Electric Reliability Corporation, the Commission-
certified Electric Reliability Organization (ERO), submitted the 
proposed Reliability Standards in response to Order No. 791.\2\ The 
Commission also proposes to approve NERC's proposed implementation plan 
and violation risk factor and violation severity level assignments. In 
addition, we propose to approve NERC's proposed new or revised 
definitions for inclusion in the NERC Glossary of Terms Used in 
Reliability Standards (NERC Glossary). Further, the Commission proposes 
to approve the retirement of Reliability Standards CIP-003-5, CIP-004-
5.1, CIP-006-5, CIP-007-5, CIP-009-5, CIP-010-1, and CIP-011-1.
---------------------------------------------------------------------------

    \1\ 16 U.S.C. 824o.
    \2\ Version 5 Critical Infrastructure Protection Reliability 
Standards, Order No. 791, 78 FR 72,755 (Dec. 3, 2013), 145 FERC ] 
61,160 (2013), order on clarification and reh'g, Order No. 791-A, 
146 FERC ] 61,188 (2014).
---------------------------------------------------------------------------

    2. The proposed Reliability Standards are designed to mitigate the 
cybersecurity risks to bulk electric system facilities, systems, and 
equipment, which, if destroyed, degraded, or otherwise rendered 
unavailable as a result of a cybersecurity incident, would affect the 
reliable operation of the Bulk-Power System.\3\ As discussed below, we 
believe that the proposed CIP Reliability Standards are just and 
reasonable and address the directives in Order No. 791 by: (1) 
Eliminating the ``identify, assess, and correct'' language in 17 of the 
CIP version 5 Standard requirements; (2) providing enhanced security 
controls for Low Impact assets; (3) providing controls to address the 
risks posed by transient electronic devices (e.g., thumb drives and 
laptop computers); and (4) addressing in an equally effective and 
efficient manner the need for a NERC Glossary definition for the term 
``communication networks.'' Accordingly, we propose to approve the 
proposed CIP Reliability Standards because they improve the base-line 
cybersecurity posture of applicable entities compared to the current 
Commission-approved CIP Reliability Standards.
---------------------------------------------------------------------------

    \3\ See NERC Petition at 3.
---------------------------------------------------------------------------

    3. In addition, pursuant to FPA section 215(d)(5), the Commission 
proposes to direct NERC to develop certain modifications to Reliability 
Standard CIP-006-6. Specifically, while proposed CIP-006-6 would 
require protections for communication networks among a limited group of 
bulk electric system Control Centers, we propose to direct that NERC 
modify Reliability Standard CIP-006-6 to require protections for 
communication network components and data communicated between all bulk 
electric system Control Centers. In addition, we seek comment on the 
sufficiency of the security controls incorporated in the current CIP 
Reliability Standards regarding remote access used in relation to bulk 
electric system communications. Finally, as discussed in more detail 
below, we propose to direct NERC to develop requirements relating to 
supply chain management for industrial control system hardware, 
software, and services.

I. Background

A. Section 215 and Mandatory Reliability Standards

    4. Section 215 of the FPA requires a Commission-certified ERO to 
develop mandatory and enforceable Reliability Standards, subject to 
Commission review and approval. Reliability Standards may be enforced 
by the ERO, subject to Commission oversight, or by the Commission 
independently.\4\ Pursuant to section 215 of the FPA, the Commission 
established a process to select and certify an ERO,\5\ and subsequently 
certified NERC.\6\
---------------------------------------------------------------------------

    \4\ 16 U.S.C. 824o(e).
    \5\ Rules Concerning Certification of the Electric Reliability 
Organization; and Procedures for the Establishment, Approval, and 
Enforcement of Electric Reliability Standards, Order No. 672, FERC 
Stats. & Regs. ] 31,204, order on reh'g, Order No. 672-A, FERC 
Stats. & Regs. ] 31,212 (2006).
    \6\ North American Electric Reliability Corp., 116 FERC ] 
61,062, order on reh'g and compliance, 117 FERC ] 61,126 (2006), 
aff'd sub nom. Alcoa, Inc. v. FERC, 564 F.3d 1342 (D.C. Cir. 2009).
---------------------------------------------------------------------------

B. Order No. 791

    5. On November 22, 2013, in Order No. 791, the Commission approved 
the CIP version 5 Standards (Reliability Standards CIP-002-5 through 
CIP- 009-5, and CIP-010-1 and CIP-011-1).\7\ The Commission determined 
that the CIP version 5 Standards represented an improvement over prior 
iterations of the CIP Reliability Standards because, inter alia, they 
included a revised BES Cyber Asset categorization methodology that 
incorporated mandatory protections for all High, Medium, and Low Impact 
BES Cyber Assets, and because several new security controls improved 
the security posture of responsible entities.\8\ In addition, pursuant 
to section 215(d)(5) of the FPA, the Commission directed NERC to: (1) 
Remove the ``identify, assess, and correct'' language in 17 of the CIP 
Standard requirements; (2) develop enhanced security controls for Low 
Impact assets; (3) develop controls to protect transient electronic 
devices (e.g., thumb drives and laptop computers); (4) create a NERC 
Glossary definition for the term ``communication networks,'' and 
develop new or modified Reliability Standards to protect the 
nonprogrammable components of communications networks.
---------------------------------------------------------------------------

    \7\ Order No. 791, 145 FERC ] 61,160 at P 41.
    \8\ Id.
---------------------------------------------------------------------------

    6. In addition, the Commission directed NERC to conduct a survey of 
Cyber Assets that are included or excluded under the new BES Cyber 
Asset definition and submit an informational filing within one year.\9\ 
Finally, the NOPR directed Commission staff to convene a technical 
conference to examine the technical issues concerning communication 
security, remote access, and the National Institute of Standards and 
Technology (NIST) Risk Management Framework.\10\
---------------------------------------------------------------------------

    \9\ Id. PP 76, 108, 136, 150.
    \10\ Id. P 225.
---------------------------------------------------------------------------

C. Informational Filing

    7. On February 3, 2015, NERC submitted an informational filing 
assessing the results of a survey conducted to identify the scope of 
assets subject to the definition of the term BES Cyber Asset as it is 
applied in the CIP version 5 Standards. NERC states that the results of 
the survey indicate that, in general, the application of the BES Cyber 
Asset definition, and the 15 minute parameter in particular, resulted 
in the identification of BES Cyber Assets consistent with the language 
and intent of the CIP version 5 Standards.\11\ NERC maintained that the 
survey results demonstrate that the definition of BES Cyber Asset 
provides a sound basis for identifying the types of Cyber Assets that 
should be subject to the cyber security protections required by the CIP 
Reliability Standards.\12\
---------------------------------------------------------------------------

    \11\ See NERC Informational Filing, Docket No. RM13-5-000, at 3 
(filed Feb. 3, 2015).
    \12\ Id.
---------------------------------------------------------------------------

D. April 29, 2014 Technical Conference

    8. On April 29, 2014, a staff-led technical conference was held 
pursuant to a directive in Order No. 791.\13\ The topics discussed at 
the technical conference included: (1) The adequacy of the approved CIP 
version 5 Standards' protections for Bulk-Power System data being 
transmitted over data networks; (2) whether additional security 
controls are needed to protect Bulk-Power System communications 
networks, including remote systems access; and (3) the functional 
differences between the respective methods utilized for the 
identification,

[[Page 43356]]

categorization, and specification of appropriate levels of protection 
for cyber assets using the CIP version 5 Standards as compared with 
those employed within the NIST Cybersecurity Framework.
---------------------------------------------------------------------------

    \13\ Order No. 791, 145 FERC ] 61,160 at P 225.
---------------------------------------------------------------------------

    9. With respect to the current state of protection for 
communications networks under the CIP version 5 Standards, some 
panelists opined that the CIP version 5 Standards lack controls to: (1) 
Protect communications outside of the Electronic Security Perimeter; 
(2) protect data in motion; (3) authenticate messages and commands to 
BES Cyber Assets; and (4) protect systems or communications using non 
routable protocols. On the subject of the adequacy of protections for 
Bulk-Power System data under the CIP version 5 Standards, several 
panelists stated that stronger measures, such as encryption, would 
enhance the overall protection for Bulk-Power System communications. 
However, other panelists also stated that encryption was not a 
universal solution because it could cause unacceptable latency (i.e., 
time delay in communications) in certain applications.
    10. Regarding the need for additional security controls for Bulk-
Power System communications, panelists identified a number of 
worthwhile steps that could be explored to enhance remote access. 
Suggestions included the adoption of additional physical security 
controls, integrity checks, encryption (in certain cases), out of 
bounds detection for communications links, and coordination with 
vendors to enhance risk management. In addition, certain panelists 
stated their position that the use of intermediate systems, alone, is 
not sufficient to address remote access concerns.\14\ Several panelists 
identified suggestions that could be explored to enhance protections 
for remote access, including the addition of logical or physical 
controls to provide additional network segmentation behind the 
intermediate systems.\15\
---------------------------------------------------------------------------

    \14\ An Intermediate System is defined as ``A Cyber Asset or 
collection of Cyber Assets performing access control to restrict 
Interactive Remote Access to only authorized users. The Intermediate 
System must not be located inside the Electronic Security 
Perimeter.'' NERC Glossary at 46 (April 29, 2015).
    \15\ See Transcript at pp. 176-177 (Kevin Perry speaking), 177-
178 (Richard Kinas speaking), 178 (Dr. Andrew Wright speaking), 179 
(Andrew Ginter speaking).
---------------------------------------------------------------------------

E. NERC Petition

    11. On February 13, 2015, NERC submitted a petition seeking 
approval of Reliability Standards CIP-003-6, CIP-004-6, CIP-006-6, CIP-
007-6, CIP-009-6, CIP-010-2, and CIP-011-2, as well as the proposed 
implementation plan,\16\ associated violation risk factor and violation 
severity level assignments, proposed new or revised definitions,\17\ 
and retirement of Reliability Standards CIP-003-5, CIP-004-5.1, CIP-
006-5, CIP-007-5, CIP-009-5, CIP-010-1, and CIP-011-1.\18\ NERC states 
that the proposed Reliability Standards are just, reasonable, not 
unduly discriminatory or preferential, and in the public interest 
because they satisfy the factors set forth in Order No. 672 that the 
Commission applies when reviewing a proposed Reliability Standard.\19\ 
NERC maintains that the proposed Reliability Standards ``improve the 
cybersecurity protections required by the CIP Reliability 
Standards[.]'' \20\
---------------------------------------------------------------------------

    \16\ The proposed implementation plan is designed to match the 
effective dates of the proposed Reliability Standards with the 
effective dates of the prior versions of those Reliability Standards 
under the implementation plan of the CIP version 5 Standards.
    \17\ The six new or revised definitions proposed for inclusion 
in the NERC Glossary are: (1) BES Cyber Asset; (2) Protected Cyber 
Asset; (3) Low Impact Electronic Access Point; (4) Low Impact 
External Routable Connectivity; (5) Removable Media; and (6) 
Transient Cyber Asset.
    \18\ The proposed Reliability Standards are available on the 
Commission's eLibrary document retrieval system in Docket No. RM15-
14-000 and on the NERC Web site, www.nerc.com.
    \19\ See NERC Petition at 13 and Exhibit C (citing Order No. 
672, FERC Stats. & Regs. ] 31,204 at PP 323-335).
    \20\ NERC Petition at 4.
---------------------------------------------------------------------------

    12. NERC avers that the proposed CIP Reliability Standards satisfy 
the Commission directives in Order No. 791. Specifically, NERC states 
that the proposed Reliability Standards remove the ``identify, assess, 
and correct'' language, which represents the Commission's preferred 
approach to addressing the underlying directive.\21\ In addition, NERC 
states that the proposed Reliability Standards address the Commission's 
directive regarding a lack of specific controls or objective criteria 
for Low Impact BES Cyber Systems by requiring responsible entities ``to 
implement cybersecurity plans for assets containing Low Impact BES 
Cyber Systems to meet specific security objectives relating to: (i) 
Cybersecurity awareness; (ii) physical security controls; (iii) 
electronic access controls; and (iv) Cyber Security Incident 
response.'' \22\
---------------------------------------------------------------------------

    \21\ Id. at 4, 15.
    \22\ Id. at 5.
---------------------------------------------------------------------------

    13. With regard to the Commission's directive that NERC develop 
specific controls to protect transient electronic devices (e.g., thumb 
drives and laptop computers), NERC explains that the proposed 
Reliability Standards require responsible entities ``to implement 
controls to protect transient devices connected to their high impact 
and medium impact BES Cyber Systems and associated [Protected Cyber 
Assets].'' \23\ In addition, NERC states that the proposed Reliability 
Standards address the protection of communication networks ``by 
requiring entities to implement security controls for nonprogrammable 
components of communication networks at Control Centers with high or 
medium impact BES Cyber Systems.'' \24\ Finally, NERC explains that it 
has not proposed a definition of the term ``communication network'' 
because the term is not used in the CIP Reliability Standards. 
Additionally, NERC states that ``any proposed definition would need to 
be sufficiently broad to encompass all components in a communication 
network as they exist now and in the future.'' \25\ NERC concludes that 
the proposed Reliability Standards ``meet the ultimate security 
objective of protecting communication networks (both programmable and 
nonprogrammable communication network components).'' \26\
---------------------------------------------------------------------------

    \23\ Id. at 6.
    \24\ Id. at 8.
    \25\ Id. at 51-52.
    \26\ Id. at 52.
---------------------------------------------------------------------------

    14. Accordingly, NERC requests that the Commission approve the 
proposed Reliability Standards, the proposed implementation plan, the 
associated violation risk factor and violation severity level 
assignments, and the proposed new and revised definitions. NERC 
requests an effective date for the Reliability Standards of the later 
of April 1, 2016 or the first day of the first calendar quarter that is 
three months after the effective date of the Commission's order 
approving the proposed Reliability Standard, although NERC proposes 
that responsible entities will not have to comply with the requirements 
applicable to Low Impact BES Cyber Systems (CIP-003-6, Requirement R1, 
Part 1.2 and Requirement R2) until April 1, 2017.

II. Discussion

    15. Pursuant to section 215(d)(2) of the FPA, we propose to approve 
Reliability Standards CIP-003-6, CIP-004-6, CIP-006-6, CIP-007-6, CIP-
009-6, CIP-010-2 and CIP-011-2 as just, reasonable, not unduly 
discriminatory or preferential, and in the public interest. In 
addition, pursuant to FPA section 215(d)(5), we propose to direct NERC 
to develop certain modifications to Reliability Standard CIP-006-6 and 
to develop requirements addressing supply chain management.

[[Page 43357]]

    16. The proposed Reliability Standards address the Commission's 
directives from Order No. 791 and are an improvement over the current 
Commission-approved CIP Reliability Standards. Specifically, we propose 
to approve the removal of the ``identify, assess, and correct'' 
language in certain requirements of the CIP version 5 Standards. We 
also propose to approve NERC's submission regarding the protection of 
Low Impact BES Cyber Systems. With regard to the directive to create a 
NERC Glossary definition for the term ``communication networks,'' we 
propose to approve NERC's proposal as an equally effective and 
efficient method to achieve the reliability goal underlying that 
directive in Order No. 791.
    17. The technical controls in proposed Reliability Standard CIP-
006-6, which addresses the protection of non-programmable components of 
communication networks (i.e., network cabling and switches), are 
generally consistent with the type of controls cited by the Commission 
in Order No. 791.\27\ We are concerned, however, that the limited 
applicability of the proposed standard, i.e., BES Cyber Assets within 
the same Electronic Security Perimeter but located outside of a 
Physical Security Perimeter, results in a reliability gap. For the 
reasons discussed below, we propose to direct that NERC modify 
Reliability Standard CIP-006-6 to require physical or logical 
protections for communication network components between all bulk 
electric system Control Centers.
---------------------------------------------------------------------------

    \27\ See Order No. 791, 145 FERC ] 61,160 at P 149.
---------------------------------------------------------------------------

    18. Separately, we are concerned that changes in the bulk electric 
system cyber threat landscape, identified through recent malware 
campaigns targeting supply chain vendors, have highlighted a gap in the 
protections under the CIP Reliability Standards. These malware 
campaigns represent a new type of threat to the reliability of the bulk 
electric system where malicious code can infect the software of 
industrial control systems used by responsible entities. Therefore, we 
propose to direct NERC to develop a new Reliability Standard or 
modified Reliability Standard to provide security controls for supply 
chain management for industrial control system hardware, software, and 
services associated with bulk electric system operations.
    19. We also propose to approve the new or revised definitions for 
inclusion in the NERC Glossary, and seek comment on the proposed 
definition for Low Impact External Routable Connectivity. Depending on 
the comments received, we may direct NERC to develop modifications to 
this definition to eliminate possible ambiguities and ensure that BES 
Cyber Assets receive adequate protection.
    20. In addition, we propose to accept 19 violation risk factor and 
violation severity level assignments associated with the proposed 
Reliability Standards. Finally, we propose to approve NERC's proposed 
implementation plan and effective date. Below, we discuss the following 
matters: (A) Identify, assess, and correct language; (B) enhanced 
security controls for Low Impact assets; (C) protection of Transient 
Devices; (D) protection of bulk electric system communication networks; 
(E) supply chain management; (F) proposed definitions; (G) NERC's 
proposed implementation plan; and (H) proposed violation severity level 
and violation risk factor assignments.

A. Identify, Assess, and Correct Language

Order No. 791
    21. In the proposed CIP version 5 Standards, NERC included language 
in 17 CIP requirements that would have required responsible entities to 
implement requirements in a manner to ``identify, assess, and correct'' 
deficiencies.\28\ In Order No. 791, the Commission concluded that the 
``identify, assess, and correct'' language proposed by NERC was unclear 
with respect to the obligations it would impose on responsible 
entities, how it would be implemented by responsible entities, and how 
it would be enforced.\29\ The Commission explained that proposed 
Reliability Standards should be clear and unambiguous regarding what is 
required for compliance and who is required to comply.\30\ The 
Commission directed NERC, pursuant to section 215(d)(5) of the FPA, to 
develop modifications to the CIP version 5 Standards to address the 
Commission's concerns with the ``identify, assess, and correct'' 
language. The Commission stated its preference that NERC should remove 
the ``identify, assess, and correct'' language from the 17 CIP version 
5 requirements, while retaining the substantive provisions of those 
requirements.\31\
---------------------------------------------------------------------------

    \28\ Order No. 791, 145 FERC ] 61,160 at P 44.
    \29\ Id. P 67.
    \30\ Id. P 68 (citing Mandatory Reliability Standards for the 
Bulk-Power System, Order No. 693, FERC Stats. & Regs. ] 31,242, at P 
274, order on reh'g, Order No. 693-A, 120 FERC ] 61,053 (2007)).
    \31\ Id. P 67 (citing Order No. 693, FERC Stats. & Regs. ] 
31,242 at P 186).
---------------------------------------------------------------------------

NERC Petition
    22. In its Petition, NERC explains that it has addressed the Order 
No. 791 directive regarding the ``identify, assess, and correct'' 
language by removing the language from the 17 requirements that 
included the language in the CIP version 5 Standards.\32\ NERC states 
that it is addressing the concerns underlying the development of the 
``identify, assess, and correct'' language through ``transformation of 
its [Compliance Monitoring and Enforcement Program] and the 
implementation of a risk-based approach to compliance monitoring and 
enforcement activities.'' \33\ NERC explains that the changes it is 
making to the Compliance Monitoring and Enforcement Program, outside 
the text of a reliability standard, ``directly accomplish the goal of 
the `identify, assess, and correct' language by focusing ERO and 
industry resources on those areas that pose a more-than-minimal risk to 
reliability and helping to improve internal controls.'' \34\
---------------------------------------------------------------------------

    \32\ NERC Petition at 15.
    \33\ Id. at 15-16.
    \34\ Id. at 18.
---------------------------------------------------------------------------

Discussion
    23. NERC's proposal to remove the ``identify, assess, and correct'' 
language from the 17 requirements that included the language in the CIP 
version 5 Standards, while retaining the substantive provisions of 
those requirements, reflects the Commission's preferred approach 
outlined in Order No. 791.\35\ Consistent with the rationale underlying 
the Order No. 791 directive, removing the ``identify, assess, and 
correct'' language avoids the possibility of inconsistent application 
and enforcement of the requirements at issue by eliminating the 
possibility of multiple interpretations of that language.
---------------------------------------------------------------------------

    \35\ Order No. 791, 145 FERC ] 61,160 at P 67.
---------------------------------------------------------------------------

    24. Accordingly, we propose to approve NERC's removal of the 
``identify, assess, and correct'' language from the 17 affected 
requirements.

B. Enhanced Security Controls for Low Impact Assets

Order No. 791
    25. In Order No. 791, the Commission approved NERC's new approach 
to categorizing BES Cyber Systems based on the High, Medium or Low 
Impact that each system could have on the reliable operation of the 
bulk electric system. Specifically, the Commission noted that the new 
tiered approach, ``which requires at least a minimum classification of 
Low Impact for BES

[[Page 43358]]

Cyber Systems, better assures the protection of assets that can cause 
cyber security risks to the bulk electric system.'' \36\ The 
Commission, however, raised concerns that the CIP version 5 Standards 
do not require any specific controls for BES Cyber Systems classified 
as Low Impact, nor do the standards contain clear, objective criteria 
``to judge the sufficiency of the controls ultimately adopted by 
responsible entities for Low Impact BES Cyber Systems.'' \37\ The 
Commission concluded that the lack of objective criteria to evaluate 
any controls adopted under proposed Reliability Standard CIP-003-5, 
Requirement R2 ``introduces an unacceptable level of ambiguity and 
potential inconsistency into the compliance process,'' resulting in an 
unnecessary gap in reliability.\38\ The Commission therefore directed 
NERC, pursuant to section 215(d)(5) of the FPA, to develop 
modifications to the CIP version 5 Standards to address the ambiguity 
and potential for inconsistency in the compliance process created by 
the lack of objective criteria pertaining to Low Impact BES Cyber 
Systems.\39\
---------------------------------------------------------------------------

    \36\ Id. P 87.
    \37\ Id. P 107.
    \38\ Id. P 108.
    \39\ Id. P 108.
---------------------------------------------------------------------------

    26. While not directing NERC to develop specific controls for Low 
Impact BES Cyber Systems, the Commission noted that NERC could address 
the lack of objective criteria in a number of ways, including: (1) 
Requiring specific controls for Low Impact assets, including 
subdividing the assets into different categories with different defined 
controls applicable to each subcategory; (2) developing objective 
criteria against which the controls adopted by responsible entities can 
be compared and measured in order to evaluate their adequacy, including 
subdividing the assets into different categories with different defined 
control objectives applicable to each subcategory; (3) defining with 
greater specificity the processes that responsible entities must have 
for Low Impact facilities under Reliability Standard CIP-003-5, 
Requirement R2; or (4) another equally efficient and effective 
solution.\40\ Finally, the Commission emphasized that however NERC 
decides to address the Commission's concern, ``the criteria NERC 
proposes for evaluating a responsible entities' protections for Low 
Impact facilities should be clear, objective, commensurate with their 
impact on the system, and technically justified.'' \41\
---------------------------------------------------------------------------

    \40\ Id. P 108.
    \41\ Id. P 110.
---------------------------------------------------------------------------

NERC Petition
    27. In its Petition, NERC states that the revised CIP Reliability 
Standards include ``additional specificity regarding the controls that 
responsible entities must implement for protecting their low impact BES 
Cyber Systems.'' \42\ NERC explains that proposed Reliability Standard 
CIP-003-6, Requirement R1 requires responsible entities to develop 
cyber security policies for Low Impact BES Cyber Systems ``to 
communicate management's expectation for cybersecurity across the 
organization.'' \43\ According to NERC, the cyber security policies 
required under proposed Reliability Standard CIP-003-6, Requirement R1 
must include the four subject matter areas addressed by proposed 
Reliability Standard CIP-003-6, Requirement R2, Attachment 1, and must 
be reviewed and approved by the CIP Senior Manager at least once every 
15 calendar months. NERC explains that, while a responsible entity has 
the flexibility to develop either a single comprehensive cyber security 
policy or single high-level umbrella policy with detail provided in 
lower-level documents, ``the purpose of these policies is to 
communicate the responsible entity's management goals, objectives, and 
expectations for the protection of low impact BES Cyber Systems and 
establish a culture of security and compliance across the 
organization.'' \44\
---------------------------------------------------------------------------

    \42\ NERC Petition at 23.
    \43\ Id. at 24.
    \44\ Id. at 32.
---------------------------------------------------------------------------

    28. In addition, NERC explains that proposed Reliability Standard 
CIP-003-6, Requirement R2 requires responsible entities with Low Impact 
BES Cyber Systems to implement controls necessary to meet specific 
security objectives for: (1) Cyber security awareness; (2) physical 
security controls; (3) electronic access controls; and (4) cyber 
security incident response. NERC explains further that while the four 
topics addressed by Reliability Standard CIP-003-6, Requirement R2 are 
the same as those under the CIP version 5 Standards, focusing resources 
on the four identified subject matter areas ``will have the greatest 
cybersecurity benefit for low impact BES Cyber Systems without 
diverting resources necessary for the protection of high and medium 
impact BES Cyber Systems.'' \45\
---------------------------------------------------------------------------

    \45\ Id. at 25.
---------------------------------------------------------------------------

    29. NERC explains further that proposed Reliability Standard CIP-
003-6, Requirement R2 provides responsible entities with flexibility to 
adopt security controls for Low Impact BES Cyber Systems ``in the 
manner that best suits the needs and characteristics of their 
organization, so long as the responsible entity can demonstrate that it 
designed its controls to meet the ultimate security objective.'' \46\ 
NERC states that attempts to overly prescribe specific security 
controls would be problematic and could inhibit the development of 
innovative security controls due to the diversity of Low Impact BES 
Cyber Systems. However, NERC explains that by having responsible 
entities articulate clear security objectives, ``the ERO and the 
Commission will have a basis from which to judge the sufficiency of the 
controls ultimately adopted by a responsible entity.'' \47\
---------------------------------------------------------------------------

    \46\ Id. at 25.
    \47\ Id. at 25.
---------------------------------------------------------------------------

Discussion
    30. We propose to approve proposed Reliability Standard CIP-003-6. 
NERC's proposal satisfies the Commission's Order No. 791 directive by 
providing responsible entities with a list of specific security 
objectives relevant to Low Impact BES Cyber Systems that must be 
addressed through one or more documented cyber security plans. 
Reliability Standard CIP-003-6, Requirement R2 provides clarity 
regarding what is expected for compliance and requires responsible 
entities to implement specific security controls to meet the four 
subject matter areas identified by NERC to address the risks associated 
with Low Impact BES Cyber Systems, providing enhanced protections for 
Low Impact assets.
    31. As noted above, Attachment 1 to revised CIP-003-6, Requirement 
R2 identifies four topics addressed by the requirement, and describes 
the affirmative obligations associated with each topic, including: (1) 
Mandatory reinforcement of cyber security awareness practices at least 
once every 15 calendar months; (2) mandatory physical access controls 
to the asset or locations of the Low Impact BES Cyber Systems within 
the asset and Low Impact BES Cyber System Electronic Access Points, if 
any; (3) mandatory electronic access point protection to permit only 
necessary inbound and outbound bi-directional routable protocol access 
and mandatory authentication for all dialup connectivity that provides 
access to the Low Impact BES Cyber System; and (4) specific information 
to be included in

[[Page 43359]]

incident response plans. We believe that Attachment 1 provides 
sufficient context to evaluate objectively the effectiveness of the 
procedures developed by a responsible entity to implement CIP-003-6 and 
judge the sufficiency of the controls ultimately adopted by a 
responsible entity under its security plans.
    32. Furthermore, we agree that NERC's proposal to use clear 
security objectives in lieu of specific security controls for each Low 
Impact system is reasonable owing to the diversity of assets covered 
under the Low Impact category. With respect to the security subject 
matter areas covered under proposed CIP-003-6, we believe that NERC's 
proposal is reasonable in relation to the risk posed by Low Impact BES 
Cyber Systems, as well as the diversity of systems captured by the Low 
Impact category. Therefore, we propose to approve proposed Reliability 
Standard CIP-003-6.

C. Protection of Transient Devices

Order No. 791
    33. In Order No. 791, the Commission approved the proposed 
definition of BES Cyber Asset that provides, in part, that ``[a] Cyber 
Asset is not a BES Cyber Asset if, for 30 consecutive calendar days or 
less, it is directly connected to a network within an [Electronic 
Security Perimeter], a Cyber Asset within an [Electronic Security 
Perimeter], or to a BES Cyber Asset, and it is used for data transfer, 
vulnerability assessment, maintenance, or troubleshooting purposes.'' 
\48\ While the Commission had requested comment in the CIP version 5 
NOPR on whether the 30 consecutive calendar day qualifier in the 
proposed definition of BES Cyber Asset ``could result in the 
introduction of malicious code or new attack vectors to an otherwise 
trusted and protected system,'' \49\ the Commission concluded, based on 
comments, that ``it would be unduly burdensome to protect transient 
devices in the same manner as BES Cyber Assets because transient 
devices are portable and frequently connected and disconnected from 
systems.'' \50\
---------------------------------------------------------------------------

    \48\ Order No. 791, 145 FERC ] 61,160 at P 132.
    \49\ Version 5 Critical Infrastructure Protection Reliability 
Standards, 143 FERC ] 61,055, at P 78 (2013) (CIP Version 5 NOPR).
    \50\ Order No. 791, 145 FERC ] 61,160 at P 133.
---------------------------------------------------------------------------

    34. While accepting the 30-day exemption in the BES Cyber Asset 
definition, the Commission reiterated its concern whether the 
provisions of the CIP version 5 Standards ``provide adequately robust 
protection from the risks posed by transient devices.'' \51\ Therefore, 
the Commission directed that NERC, pursuant to section 215(d)(5) of the 
FPA, develop either new or modified Reliability Standards to address 
the reliability risks posed by connecting transient devices to BES 
Cyber Assets and Systems. In particular, the Commission stated that it 
expects NERC to consider the following security elements for transient 
devices and removable media: (1) Device authorization as it relates to 
users and locations; (2) software authorization; (3) security patch 
management; (4) malware prevention; (5) detection controls for 
unauthorized physical access to a transient device; and (6) processes 
and procedures for connecting transient devices to systems at different 
security classification levels (i.e., High, Medium, Low Impact).\52\
---------------------------------------------------------------------------

    \51\ Id. P 132.
    \52\ Id. P 136.
---------------------------------------------------------------------------

NERC Petition
    35. In its Petition, NERC states that the revised CIP Reliability 
Standards satisfy the Commission's directive in Order No. 791 by 
requiring that applicable entities: (1) Develop plans and implement 
cybersecurity controls to protect Transient Cyber Assets and Removable 
Media associated with their High Impact and Medium Impact BES Cyber 
Systems and associated Protected Cyber Assets; and (2) train their 
personnel on the risks associated with using Transient Cyber Assets and 
Removable Media. NERC states that the purpose of the proposed revisions 
is to prevent unauthorized access to and use of transient devices, 
mitigate the risk of vulnerabilities associated with unpatched software 
on transient devices, and mitigate the risk of the introduction of 
malicious code on transient devices. NERC explains that the standard 
drafting team determined that the proposed requirements should only 
apply to transient devices associated with High and Medium Impact BES 
Cyber Systems, concluding that ``the application of the proposed 
transient devices requirements to transient devices associated with low 
impact BES Cyber Systems was unnecessary, and likely counterproductive, 
given the risks low impact BES Cyber Systems present to the Bulk 
Electric System.'' \53\
---------------------------------------------------------------------------

    \53\ NERC Petition at 34-35.
---------------------------------------------------------------------------

    36. NERC proposes to add two terms to the NERC Glossary, Transient 
Cyber Asset and Removable Media, to clarify the types of transient 
devices subject to the CIP Reliability Standards. NERC also proposes to 
revise the definitions for BES Cyber Asset and Protected Cyber Asset to 
remove the 30-day exemption as the proposed definition for Transient 
Cyber Assets obviates the need for the 30-day exemption language. NERC 
indicates that, as defined, Transient Cyber Assets and Removable Media 
do not provide reliability services and are not part of the BES Cyber 
System to which they are connected.\54\
---------------------------------------------------------------------------

    \54\ Id. at 36-37.
---------------------------------------------------------------------------

    37. NERC proposes to define Transient Cyber Asset as: ``A Cyber 
Asset that (i) is capable of transmitting or transferring executable 
code, (ii) is not included in a BES Cyber System, (iii) is not a 
Protected Cyber Asset (PCA) and (iv) is directly connected (e.g., using 
Ethernet, serial, Universal Serial Bus, or wireless, including near 
field or Bluetooth communication) for 30 consecutive calendar days or 
less to a BES Cyber Asset, a network within an [Electronic Security 
Perimeter], or a [Protected Cyber Asset].'' NERC explains that examples 
of Transient Cyber Assets include but are not limited to: Diagnostic 
test equipment, packet sniffers, equipment used for BES Cyber System 
maintenance, equipment used for BES Cyber System configuration or 
equipment used to perform vulnerability assessments, and may include 
devices or platforms such as laptops, desktops or tablet computers 
which run applications that support BES Cyber Systems.\55\
---------------------------------------------------------------------------

    \55\ Id. at 36.
---------------------------------------------------------------------------

    38. NERC proposes to define the term Removable Media as: ``Storage 
media that (i) are not Cyber Assets, (ii) are capable of transferring 
executable code, (iii) can be used to store, copy, move, or access 
data, and (iv) are directly connected for 30 consecutive calendar days 
or less to a BES Cyber Asset, a network within an [Electronic Security 
Perimeter] or a Protected Cyber Asset. Examples include but are not 
limited to floppy disks, compact disks, USB flash drives, external hard 
drives and other flash memory cards/drives that contain nonvolatile 
memory.'' \56\
---------------------------------------------------------------------------

    \56\ Id. at 36.
---------------------------------------------------------------------------

    39. NERC explains that proposed Reliability Standard CIP-010-2, 
Requirement R4 requires entities to document and implement a plan for 
managing and protecting Transient Cyber Assets and Removable Media in 
order to protect BES Cyber Systems from the risks associated with 
transient devices. Specifically, Requirement R4 provides that ``[e]ach 
responsible entity for its high impact and medium impact BES Cyber 
Systems and associated Protected Cyber Assets, shall implement, except 
under CIP Exceptional Circumstances, one or more documented plans for 
Transient Cyber

[[Page 43360]]

Assets and Removable Media that include the sections in Attachment 1 
[to the proposed standard].'' NERC indicates that Attachment 1 does not 
prescribe a standard method or set of controls that each entity must 
implement to protect its transient devices, but rather requires 
responsible entities to meet certain security objectives by 
implementing the controls that the responsible entity determines are 
necessary to meet its affirmative obligation to protect BES Cyber 
Systems.\57\
---------------------------------------------------------------------------

    \57\ Id. at 37.
---------------------------------------------------------------------------

    40. NERC further explains that Attachment 1 to CIP-010-2, 
Requirement R4 requires a responsible entity to adopt controls to 
address the following areas: (1) Protections for Transient Cyber Assets 
managed by responsible entities; (2) protections for Transient Cyber 
Assets managed by another party; and (3) protections for Removable 
Media. NERC indicates that these provisions reflect the standard 
drafting team's recognition that the security controls required for a 
particular transient device must account for (1) the functionality of 
that device and (2) whether the responsible entity or a third party 
manages the device. NERC also states that, because Transient Cyber 
Assets and Removable Media have different capabilities, they present 
different levels of risk to the bulk electric system.\58\
---------------------------------------------------------------------------

    \58\ Id. at 38.
---------------------------------------------------------------------------

Discussion
    41. Based on our review, proposed Reliability Standard CIP-010-2 
appears to provide a satisfactory level of security for transient 
devices used at High and Medium Impact BES Cyber Systems. As described 
above, proposed Reliability Standard CIP-010-2, Requirement R4 
addresses the following security elements: (1) Device authorization; 
(2) software authorization; (3) security patch management; (4) malware 
prevention; and (5) unauthorized use. The proposed security controls, 
taken together, constitute a reasonable approach to address the 
reliability objectives outlined by the Commission in Order No. 791. The 
proposed security controls outlined in Attachment 1 should ensure that 
responsible entities apply multiple security controls to provide 
defense-in-depth protection to transient devices (i.e., transient cyber 
assets and removable media) in the High and Medium Impact BES Cyber 
System environments.
    42. We are concerned, however, that NERC's proposed revisions do 
not provide adequate security controls to address the risks posed by 
transient devices used at Low Impact BES Cyber Systems, including Low 
Impact control centers, due to the limited applicability of Requirement 
R4. We believe that this omission may result in a gap in protection for 
Low Impact BES Cyber Systems. For example, malware inserted via a USB 
flash drive at a single Low Impact substation could propagate through a 
network of many substations without encountering a single security 
control under NERC's proposal. In addition, we note that Low Impact 
security controls do not provide for the use of mandatory anti-malware/
antivirus protections within the Low Impact facilities, heightening the 
risk that malware or malicious code could propagate through these 
systems without being detected.
    43. We do not believe that NERC has provided an adequate 
justification to limit the applicability of Reliability Standard CIP-
010-2. In its petition, NERC states that ``the application of the 
proposed transient devices requirements to transient devices associated 
with low impact BES Cyber Systems was unnecessary, and likely 
counterproductive, given the risks low impact BES Cyber Systems present 
to the Bulk Electric System.'' \59\ Essentially, NERC posits that 
resources are better placed in the protection of High and Medium Impact 
devices. The burden of expanding the applicability of Reliability 
Standard CIP-010-2 to transient devices at Low Impact BES Cyber 
Systems, however, is not clear from the information in the record. Nor 
is it clear what information and analysis led NERC to conclude that the 
application of the transient device requirements to Low Impact BES 
Cyber Systems ``was unnecessary.'' \60\ Therefore, we direct NERC to 
provide additional information supporting the proposed limitation in 
Reliability Standard CIP-010-2 to High and Medium Impact BES Cyber 
Systems. Depending on the information provided, we may direct NERC to 
address the potential reliability gap by developing a solution, which 
could include modifying the applicability section of CIP-010-2, 
Requirement R4 to include Low Impact BES Cyber Systems, that 
effectively addresses, and is appropriately tailored to address, the 
risks posed by transient devices to Low Impact BES Cyber Systems.
---------------------------------------------------------------------------

    \59\ NERC Petition at 34-35.
    \60\ Id.
---------------------------------------------------------------------------

D. Protection of Bulk Electric System Communication Networks

Order No. 791
    44. In Order No. 791, the Commission approved a revised definition 
of the NERC Glossary term Cyber Asset, including the removal of the 
phrase ``communication networks.'' In reaching its decision, the 
Commission recognized that maintaining the phrase ``communication 
networks'' in the definition of ``cyber asset'' could cause confusion 
and potentially complicate implementation of the CIP version 5 
Standards ``as many communication network components, such as cabling, 
cannot strictly comply with the CIP Reliability Standards.'' \61\
---------------------------------------------------------------------------

    \61\ Order No. 791, 145 FERC ] 61,160 at P 148.
---------------------------------------------------------------------------

    45. However, while the Commission approved the revised Cyber Asset 
definition, the Commission also directed NERC to create a definition of 
communication networks. Specifically, the Commission stated that 
``[t]he definition of communication networks should define what 
equipment and components should be protected, in light of the statutory 
inclusion of communication networks for the reliable operation of the 
Bulk-Power System.'' \62\
---------------------------------------------------------------------------

    \62\ Id. P 150.
---------------------------------------------------------------------------

    46. The Commission also directed NERC to develop new or modified 
Reliability Standards to address the reliability gap resulting from the 
removal of the phrase ``communication networks'' from the Cyber Asset 
definition. Specifically, the Commission found that a gap in protection 
may exist since the CIP version 5 Standards ``do not address security 
controls needed to protect the nonprogrammable components of 
communication networks.'' \63\ The Commission explained that the new or 
modified Reliability Standards should require appropriate and 
reasonable controls to protect the non-programmable aspects of 
communication networks.\64\ The Commission provided examples of other 
relevant information security standards that address the protection of 
the nonprogrammable aspects of communication networks by requiring, 
among other things, locked wiring closets, disconnected or locked spare 
jacks, protection of cabling by conduit or cable trays, or generally 
emphasizing the protection of communication network cabling from 
interception or damage.\65\
---------------------------------------------------------------------------

    \63\ Id. P 149.
    \64\ Id. P 150.
    \65\ Id. P 149 (referencing NIST SP 800-53 Revision 3, security 
control family Physical and Environmental Protection, Annex 2, page 
54; BSI ISO/IEC (2005). Information technology--Security 
techniques--Information security management systems--Requirements 
(ISO/IEC 27001:2005).British Standards Institute).

---------------------------------------------------------------------------

[[Page 43361]]

NERC Petition
    47. In its petition, NERC states that the standard drafting team 
concluded that it did not need to create a new definition for 
communication networks to address the Commission's concerns. NERC 
explains that the term communication network ``is generally understood 
to encompass both programmable and nonprogrammable components (i.e., a 
communication network includes computer peripherals, terminals, and 
databases as well as communication mediums such as wires).'' \66\ 
Therefore, NERC concludes that any proposed definition of communication 
network ``would need to be sufficiently broad to encompass all 
components in a communication network as they exist now and in the 
future.'' \67\ NERC explains that, based on that conclusion, the 
standard drafting team identified the types of equipment and components 
that responsible entities must protect, and developed reasonable 
controls to secure those components based on the risk they pose to the 
bulk electric system, rather than develop a specific definition.
---------------------------------------------------------------------------

    \66\ NERC Petition at 52 (citing North American Electric 
Reliability Corp., 142 FERC ] 61,203, at PP 13-14 (2013)).
    \67\ Id. at 52.
---------------------------------------------------------------------------

    48. NERC states that the revised CIP Reliability Standards, as 
proposed, address the ultimate security objective of protecting both 
the programmable and nonprogrammable components of communication 
networks.\68\ NERC explains that the proposed standards include 
protections for cables and other nonprogrammable components of 
communication networks through proposed Reliability Standard CIP-006-6, 
Requirement R1, Part 1.10, which augments the existing protections for 
programmable communication components by requiring entities to 
implement various security controls to restrict and manage physical 
access to Physical Security Perimeters.\69\ NERC further states that 
the standard drafting team focused on nonprogrammable communication 
components at control centers with High or Medium Impact BES Cyber 
Systems because those locations present a heightened risk to the Bulk-
Power System, warranting the increased protections.\70\
---------------------------------------------------------------------------

    \68\ Id.
    \69\ Id. at 52-53.
    \70\ Id. at 48.
---------------------------------------------------------------------------

    49. NERC explains that proposed Reliability Standard CIP-006-6, 
Requirement R1, Part 1.10 provides that, for High and Medium Impact BES 
Cyber Systems and their associated Protected Cyber Assets, responsible 
entities must restrict physical access to cabling and other 
nonprogrammable communication components used for connection between 
covered Cyber Assets within the same Electronic Security Perimeter in 
those instances when such cabling and components are located outside of 
a Physical Security Perimeter. NERC explains further that, where 
physical access restrictions to such cabling and components are not 
feasible, Part 1.10 provides that the responsible entity must document 
and implement encryption of data transmitted over such cabling and 
components and/or monitor the status of the communication link composed 
of such cabling and components. Further, pursuant to Part 1.10, a 
responsible entity must issue an alarm or alert in response to detected 
communication failures to the personnel identified in the BES Cyber 
Security Incident response plan within 15 minutes of detection, or 
implement an equally effective logical protection.\71\
---------------------------------------------------------------------------

    \71\ Id. at 48-49.
---------------------------------------------------------------------------

    50. NERC states that proposed Reliability Standard CIP-006-6 
provides flexibility for responsible entities to implement the physical 
security measures that best suit their needs and to account for 
configurations where logical measures are necessary because the entity 
cannot implement physical access restrictions effectively. Responsible 
entities have the discretion as to the type of physical or logical 
protections to implement pursuant to Part 1.10, provided that the 
protections are designed to meet the overall security objective. 
According to NERC, the protections required by Part 1.10 will reduce 
the possibility of tampering and the likelihood that ``man-in-the-
middle'' attacks could compromise the integrity of BES Cyber Systems or 
Protected Cyber Assets at control centers with High or Medium Impact 
BES Cyber Systems.\72\
---------------------------------------------------------------------------

    \72\ Id. at 49-50.
---------------------------------------------------------------------------

    51. NERC explains that proposed Part 1.10 applies only to 
nonprogrammable components outside of a Physical Security Perimeter 
because nonprogrammable components located within a Physical Security 
Perimeter are already subject to physical security protections by 
virtue of their location. NERC further states that Part 1.10 only 
applies to nonprogrammable components used for connection between 
applicable Cyber Assets within the same Electronic Security Perimeter 
because Reliability Standard CIP-005-5 already requires logical 
protections for communications between discrete Electronic Security 
Perimeters.\73\
---------------------------------------------------------------------------

    \73\ Id. at 49.
---------------------------------------------------------------------------

    52. In addition, NERC asserts that the proposed Reliability 
Standards will strengthen the defense-in-depth approach by further 
minimizing the ``attack surface'' of BES Cyber Systems. NERC also 
clarifies that the standard drafting team limited the applicability in 
this manner to clarify that responsible entities are not responsible 
for protecting nonprogrammable communication components outside of the 
responsible entity's control (i.e., components of a telecommunication 
carrier's network).\74\
---------------------------------------------------------------------------

    \74\ Id. at 51.
---------------------------------------------------------------------------

Discussion
    53. We believe that NERC's proposed alternative approach to 
addressing the Commission's Order No. 791 directive regarding the 
definition of communication networks adequately addresses part of the 
underlying concerns set forth in Order No. 791. Proposed Reliability 
Standard CIP-006-6, Requirement R1.10 specifies the types of assets 
subject to mandatory protection by using the existing definitions of 
Electronic Security Perimeter \75\ and Physical Security Perimeter.\76\ 
Proposed Reliability Standard CIP-006-6 addresses protection for non-
programmable components of communication networks, such as network 
cabling and switches, that are located within the same Electronic 
Security Perimeter, but span separate Physical Security Perimeters. 
Specifically, proposed Reliability Standard CIP-006-6 requires 
responsible entities to restrict physical access to cabling and other 
nonprogrammable communication components between BES Cyber Assets 
within the same Electronic Security Perimeter in those instances when 
such cabling and components are located outside of a Physical Security 
Perimeter. Where physical access restrictions to such cabling and 
components is not feasible, Part 1.10 provides that responsible 
entities must document and implement encryption of data transmitted 
over such cabling and components, monitor the status of the

[[Page 43362]]

communication link composed of such cabling and components, or 
implement an equally effective logical protection.
---------------------------------------------------------------------------

    \75\ Electronic Security Perimeter: The logical border 
surrounding a network to which Critical Cyber Assets are connected 
and for which access is controlled. See NERC Glossary at 33.
    \76\ Physical Security Perimeter: The physical, completely 
enclosed (``six-wall'') border surrounding computer rooms, 
telecommunications rooms, operations centers, and other locations in 
which Critical Cyber Assets are housed and for which access is 
controlled. See NERC Glossary at 60.
---------------------------------------------------------------------------

    54. We propose to accept NERC's proposed omission of a definition 
of communication networks based on NERC's explanation that responsible 
entities must develop controls to secure the non-programmable 
components of communication networks based on the risk they pose to the 
bulk electric system, rather than develop a specific definition of 
communication networks to identify assets for protection. NERC's 
proposal is an equally efficient and effective solution to the 
Commission's directive in Order No. 791 that NERC develop a definition 
of communication networks, subject to the proposed modification 
discussed below.
    55. NERC's proposed solution for the protection of nonprogrammable 
components of communication networks, however, does not fully meet the 
intent of the Commission's Order No. 791 directive, resulting in a gap 
in security for bulk electric system communication systems. While the 
technical substance of CIP-006-6, Requirement R1, Part 1.10 appears to 
be adequate, we are concerned that the limited applicability of the 
provision results in limited protection for the nonprogrammable 
components of the communication systems at issue. Specifically, 
proposed CIP-006-6, Requirement R1, Part 1.10 would only apply to 
nonprogrammable components of communication networks within the same 
Electronic Security Perimeter, excluding from protection other 
programmable and non-programmable communication network components that 
may exist outside of a discrete Electronic Security Perimeter.
    56. While NERC asserts that this limitation is justified by the 
controls required under Reliability Standard CIP-005-5, NERC's position 
does not appear to consider that the controls set forth in Reliability 
Standard CIP-005-5 are limited to interactive remote access into an 
Electronic Security Perimeter, and can only be applied on programmable 
electronic devices and data that exists within an Electronic Security 
Perimeter.\77\ This limitation would exclude communication network 
components that may be necessary to facilitate the automated 
transmission of reliability data between bulk electric system Control 
Centers in discrete Electronic Security Perimeters and would also 
exclude real time monitoring data that is used by Reliability 
Coordinators to monitor and assess the operation of their control 
areas. In other words, revised Reliability Standard CIP-006-6, 
Requirement R1 provides mandatory protection against: (1) Physical 
attacks on nonprogrammable equipment; (2) man-in-the-middle attacks; 
and (3) session hijacking attacks within the confines of a bulk 
electric system Control Center, but does not extend protections to 
real-time data passing between Control Centers outside of a facility.
---------------------------------------------------------------------------

    \77\ See Reliability Standard CIP-005-5 (Electronic Security 
Perimeters), Requirement R2.
---------------------------------------------------------------------------

    57. Comments from participants at the April 29, 2014 Technical 
Conference suggest that the Commission should take action to ensure the 
confidentiality, integrity, and availability of sensitive bulk electric 
system data when it is in motion both inside and outside of an 
Electronic Security Perimeter.\78\ We understand that inter-Control 
Center communications play a vital role in maintaining bulk electric 
system reliability and, as a result, we believe that the communication 
links and data used to control and monitor the bulk electric system 
should receive protection under the CIP Reliability Standards.
---------------------------------------------------------------------------

    \78\ See Transcript at pp. 19, 24, 74-75 (Kevin Perry speaking), 
79 (Mikhail Falkovich speaking).
---------------------------------------------------------------------------

    58. We also recognize that third party communication infrastructure 
(e.g., facilities owned by a telecommunications company) cannot 
necessarily be physically protected by responsible entities. This fact, 
however, does not alleviate the need to protect reliability data that 
traverses third party communication infrastructure. Proposed 
Reliability Standard CIP-006-6, Requirement R1, Part 1.10 mandates that 
logical controls, such as encryption and connection link monitoring, be 
applied to cabling and components that cannot be physically restricted 
by the responsible entity. However, similar protections are not 
afforded to communications and data leaving bulk electric system 
Control Centers where they may be intercepted and altered while 
traversing communication networks.
    59. Therefore, pursuant to section 215(d)(5) of the FPA, we propose 
to direct NERC to develop a modification to proposed Reliability 
Standard CIP-006-6 to require responsible entities to implement 
controls to protect, at a minimum, all communication links and 
sensitive bulk electric system data communicated between all bulk 
electric system Control Centers. This includes communication between 
two (or more) Control Centers, but not between a Control Center and 
non-Control Center facilities such as substations. Also, if latency 
concerns mitigate against use of encryption as a logical control for 
any inter-Control Center communications, our understanding is that 
other logical protections are available, and we seek comment on this 
point.
    60. Further, as discussed at the April 29, 2014 technical 
conference, panelists identified suggestions that could be explored to 
enhance protections for remote access, including the addition of 
logical or physical controls to provide additional network segmentation 
behind the intermediate systems. For example, the Commission is 
interested in comments that address the value achieved if the CIP 
standards were to require the incorporation of additional network 
segmentation controls, connection monitoring, and session termination 
controls behind responsible entity intermediate systems. We seek 
comment on whether these or other steps to improve remote access 
protection are needed, and whether the adoption of any additional 
security controls addressing this topic would provide substantial 
reliability and security benefits.

E. Risks Posed by Lack of Controls for Supply Chain Management

    61. The information and communications technology and industrial 
control system supply chains provide hardware, software and operations 
support for computer networks. Such supply chains are complex, globally 
distributed and interconnected systems that have geographically diverse 
routes and consist of multiple tiers of outsourcing. The supply chain 
includes public and private sector entities that depend on each other 
to develop, integrate, and use information and communications 
technology and industrial control system supply chain products and 
services. Thus, the supply chain provides the opportunity for 
significant benefits to customers, including low cost, 
interoperability, rapid innovation, a variety of product features and 
choice.
    62. However, the global supply chain also enables opportunities for 
adversaries to directly or indirectly affect the management or 
operations of companies that may result in risks to the end user. 
Supply chain risks may include the insertion of counterfeits, 
unauthorized production, tampering, theft, or insertion of malicious 
software, as well as poor manufacturing and development practices. To 
address these risks, NIST developed SP 800-161 \79\ to

[[Page 43363]]

provide guidance and controls that can be used to comply with Federal 
Information Processing Standard 199 Standards for Security 
Categorization of Federal Information and Information Systems for 
Federal Government Information Systems.\80\ Similarly, the Department 
of Energy has developed guidance on cybersecurity procurement language 
for energy delivery systems.\81\
---------------------------------------------------------------------------

    \79\ NIST SP 800-161, Supply Chain Risk Management Practices for 
Federal Information Systems and Organizations (April 2015), 
available at: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-161.pdf.
    \80\ Federal Information Processing Standard Publication, 
Standards for Security Categorization of Federal Information and 
Information Systems, available at: http://csrc.nist.gov/publications/fips/fips199/FIPS-PUB-199-final.pdf.
    \81\ Cybersecurity Procurement Language for Energy Delivery 
Systems, April 2014 at page 1. http://www.energy.gov/sites/prod/files/2014/04/f15/CybersecProcurementLanguage-EnergyDeliverySystems_040714_fin.pdf.
---------------------------------------------------------------------------

    63. While the Commission did not address supply chain management in 
Order No. 791, changes in the bulk electric system cyber threat 
landscape identified through recent malware campaigns targeting supply 
chain vendors have highlighted a gap in the protections under the CIP 
Standards. Specifically, in 2014, after Order No. 791 was issued, the 
Industry Control System--Computer Emergency Readiness Team (ICS-CERT) 
reported on two focused malware campaigns.\82\ This new type of malware 
campaign is based on the injection of malware while a product or 
service remains in the control of the hardware or software vendor, 
prior to delivery to the customer.
---------------------------------------------------------------------------

    \82\ ICS-CERT is a division of the Department of Homeland 
Security that works to reduce risks within and across all critical 
infrastructure sectors by partnering with law enforcement agencies 
and the intelligence community. See https://ics-cert.us-cert.gov/alerts/ICS-ALERT-14-176-02A; and https://ics-cert.us-cert.gov/alerts/ICS-ALERT-14-281-01B for ``alert'' information on supply 
chain malware campaigns.
---------------------------------------------------------------------------

    64. We believe that it is reasonable to direct NERC to develop a 
new or modified Reliability Standard to provide security controls for 
supply chain management for industrial control system hardware, 
software, and computing and networking services associated with bulk 
electric system operations. The reliability goal should be to create a 
forward-looking, objective-driven standard that encompasses activities 
in the system development life cycle: from research and development, 
design and manufacturing stages (where applicable), to acquisition, 
delivery, integration, operations, retirement, and eventual disposal of 
the Registered Entity's information and communications technology and 
industrial control system supply chain equipment and services. The 
standard should support and ensure security, integrity, quality, and 
resilience of the supply chain and the future acquisition of products 
and services.
    65. Since security controls for supply chain management will likely 
vary greatly with each responsible entity due to variations in 
individual business practices, the right set of supply chain management 
security controls should accommodate for, among other things, an 
entity's: (1) Procurement process; (2) vendor relations; (3) system 
requirements; (4) information technology implementation; and (5) 
privileged commercial or financial information. The following Supply 
Chain Risk Management controls from NIST SP 800-161 may be 
instructional in the development of any new reliability standard to 
address this security topic: \83\ (1) Access Control Policy and 
Procedures; (2) Security Assessment Authorization; (3) Configuration 
Management; (4) Identification and Authentication; (5) System 
Maintenance Policy and Procedures; (6) Personnel Security Policy and 
Procedures; (7) System and Services Acquisition; (8) Supply Chain 
Protection; and (9) Component Authenticity.\84\
---------------------------------------------------------------------------

    \83\ The listed controls do not reflect a comprehensive scope of 
the proposed standard.
    \84\ See NIST SP 800-161.
---------------------------------------------------------------------------

    66. Therefore, pursuant to section 215(d)(5) of the FPA, we propose 
to direct NERC to develop a new reliability standard or modified 
reliability standard to provide security controls for supply chain 
management for industrial control system hardware, software, and 
services associated with bulk electric system operations. In addition 
to the parameters discussed above, due to the broadness of the topic 
and the individualized nature of many aspects of supply chain 
management, we anticipate that a Reliability Standard pertaining to 
supply chain management security would:
     Respect section 215 jurisdiction by only addressing the 
obligations of registered entities. A reliability standard should not 
directly impose obligations on suppliers, vendors or other entities 
that provide products or services to registered entities.
     Be forward-looking in the sense that the reliability 
standard should not dictate the abrogation or re-negotiation of 
currently-effective contracts with vendors, suppliers or other 
entities.
     Recognize the individualized nature of many aspects of 
supply chain management by setting goals (the ``what''), while allowing 
flexibility in how a registered entity subject to the standard achieves 
that goal (the ``how'').\85\
---------------------------------------------------------------------------

    \85\ See Order No. 672, FERC Stats. & Regs. ] 31,204 at P 260.
---------------------------------------------------------------------------

     Given the types of specialty products involved and 
diversity of acquisition processes, the standard may need to allow 
exceptions, e.g., to meet safety requirements and fill operational gaps 
if no secure products are available.
     Provide enough specificity so that compliance obligations 
are clear and enforceable. In particular, we anticipate that a 
reliability standard that simply requires a registered entity to ``have 
a plan'' addressing supply chain management would not suffice. Rather, 
to adequately address our concerns, we believe that a reliability 
standard should identify specific controls. As discussed above, NIST SP 
800-161 may be instructional in identifying appropriate controls in the 
development of an effective supply chain management reliability 
standard.
    We recognize that developing a supply chain management standard 
would likely be a significant undertaking and require extensive 
engagement with stakeholders to define the scope, content, and timing 
of the standard. Accordingly, to further that stakeholder engagement, 
we seek comment on this proposal, including: (1) The general proposal 
to direct that NERC develop a Reliability Standard to address supply 
chain management; (2) the anticipated features of, and requirements 
that should be included in, such a standard; and (3) a reasonable 
timeframe for development of a standard. We also direct staff, after 
receipt and consideration of those comments, to engage in additional 
outreach to further the Commission's consideration of the need for, and 
scope, content, and timing of, a supply chain management standard.

F. Proposed Definitions

    67. The proposed revised CIP Reliability Standards include six new 
or revised definitions for inclusion in the NERC glossary. NERC's 
proposal includes four new definitions and two revised definitions. 
Specifically, NERC seeks approval for the following terms: (1) BES 
Cyber Asset; (2) Protected Cyber Asset; (3) Low Impact Electronic 
Access Point; (4) Low Impact External Routable Connectivity; (5) 
Removable Media; and (6) Transient Cyber Asset. We propose to approve 
the proposed definitions for inclusion in the NERC Glossary. We also 
seek comment on certain aspects of the proposed definition for Low 
Impact External Routable Connectivity, as discussed below. After 
receiving

[[Page 43364]]

comments, depending on the adequacy of the explanations provided in 
response to our questions, we may direct NERC to develop modifications 
to this definition to eliminate ambiguities and assure that the revised 
CIP Reliability Standards provide adequate protection for the bulk 
electric system.
Definition--Low Impact External Routable Connectivity
    68. In its petition, NERC proposes the following definition for Low 
Impact External Routable Connectivity:

    Direct user-initiated interactive access or a direct device-to-
device connection to a low impact BES Cyber System(s) from a Cyber 
Asset outside the asset containing those low impact BES Cyber 
System(s) via a bidirectional routable protocol connection. Point-
to-point communications between intelligent electronic devices that 
use routable communication protocols for time-sensitive protection 
or control functions between Transmission station or substation 
assets containing low impact BES Cyber Systems are excluded from 
this definition (examples of this communication include. but are not 
limited to, IEC 61850 GOOSE or vendor proprietary protocols).\86\
---------------------------------------------------------------------------

    \86\ NERC Petition at 28.

    69. NERC explains that the proposed definition describes the 
scenarios where responsible entities are required to apply Low Impact 
access controls under Reliability Standard CIP-003-6, Requirement R2 to 
their Low Impact assets. Specifically, if Low Impact External Routable 
Connectivity is used, a responsible entity must implement a Low Impact 
Electronic Access Point to permit only necessary inbound and outbound 
bidirectional routable protocol access.\87\
---------------------------------------------------------------------------

    \87\ Id. at 29.
---------------------------------------------------------------------------

    70. We seek comment on the following aspects of the proposed 
definition. First, we seek comment on the purpose of the meaning of the 
term ``direct'' in relation to the phrases ``direct user-initiated 
interactive access'' and ``direct device-to-device connection'' within 
the proposed definition. In addition, we seek comment on the 
implementation of the ``layer 7 application layer break'' contained in 
certain reference diagrams in the Guidelines and Technical Basis 
section of proposed Reliability Standard CIP-003-6.\88\ It appears that 
guidance provided in the Guidelines and Technical Basis section of the 
proposed standard may conflict with the plain reading of the term 
``direct.'' We are concerned that a conflict in the reading of the term 
``direct'' could lead to complications in the implementation of the 
proposed CIP Reliability Standards, hindering the adoption of effective 
security controls for Low Impact BES Cyber Assets. Depending upon the 
responses received, we may direct NERC to develop a modification to the 
definition of Low Impact External Routable Connectivity.
---------------------------------------------------------------------------

    \88\ See CIP-003-6 Guidelines and Technical Basis Section, 
Reference Model 6 at p. 39.
---------------------------------------------------------------------------

G. Implementation Plan

    71. NERC's proposed implementation plan for the proposed 
Reliability Standards is designed to match the effective dates of the 
proposed Reliability Standards with the effective dates of the prior 
versions of the related Reliability Standards under the implementation 
plan of the CIP version 5 Standards. NERC states that the purpose of 
this approach is to provide regulatory certainty by limiting the time, 
if any, that the CIP version 5 Standards with the ``identify, assess, 
and correct'' language would be effective. Specifically, pursuant to 
the CIP version 5 implementation plan, the effective date of each of 
the CIP version 5 Standards is April 1, 2016, except for the effective 
date for Requirement R2 of CIP-003-5, which is April 1, 2017. 
Consistent with those dates, the proposed implementation plan provides 
that: (1) each of the proposed reliability Standards shall become 
effective on the later of April 1, 2016 or the first day of the first 
calendar quarter that is three months after the effective date of the 
Commission's order approving the proposed Reliability Standard; and (2) 
responsible entities will not have to comply with the requirements 
applicable to Low Impact BES Cyber Systems (CIP-003-6, Requirement R1, 
Part 1.2 and Requirement R2) until April 1, 2017.\89\
---------------------------------------------------------------------------

    \89\ Id. at 53-54.
---------------------------------------------------------------------------

    72. NERC's proposed implementation plan also includes effective 
dates for the new and modified definitions associated with: (1) 
transient devices (i.e., BES Cyber Asset, Protected Cyber Asset, 
Removable Media, and Transient Cyber Asset); and (2) Low Impact 
controls (i.e., Low Impact Electronic Access Point and Low Impact 
External Routable Connectivity). Specifically, NERC proposes: (1) That 
the definitions associated with transient device become effective on 
the compliance date for Reliability Standard CIP-010-2, Requirement R4; 
and (2) that the definitions addressing the Low Impact controls become 
enforceable on the compliance date for Reliability Standard CIP-003-6, 
Requirement R2. Lastly, NERC proposes that the retirement of 
Reliability Standards CIP-003-5, CIP-004-5.1, CIP-006-5, CIP-007-5, 
CIP-009-5, CIP-010-1 and CIP-011-1 become effective on the effective 
date of the proposed Reliability Standards.\90\
---------------------------------------------------------------------------

    \90\ Id. at 56.
---------------------------------------------------------------------------

    73. We propose to approve NERC's implementation plan for the 
proposed CIP Reliability Standards, as described above.

H. Violation Risk Factor/Violation Severity Level Assignments

    74. NERC requests approval of the violation risk factors and 
violation severity levels assigned to the proposed Reliability 
Standards. Specifically, NERC requests approval of 19 violation risk 
factor and violation severity level assignments associated with the 
proposed Reliability Standards.\91\ We propose to accept these 
violation risk factors and violation severity levels.
---------------------------------------------------------------------------

    \91\ Id., Exhibit E.
---------------------------------------------------------------------------

III. Information Collection Statement

    75. The FERC-725B information collection requirements contained in 
this Proposed Rule are subject to review by the Office of Management 
and Budget (OMB) under section 3507(d) of the Paperwork Reduction Act 
of 1995.\92\ OMB's regulations require approval of certain information 
collection requirements imposed by agency rules.\93\ Upon approval of a 
collection of information, OMB will assign an OMB control number and 
expiration date. Respondents subject to the filing requirements of this 
rule will not be penalized for failing to respond to these collections 
of information unless the collections of information display a valid 
OMB control number. The Commission solicits comments on the 
Commission's need for this information, whether the information will 
have practical utility, the accuracy of the burden estimates, ways to 
enhance the quality, utility, and clarity of the information to be 
collected or retained, and any suggested methods for minimizing 
respondents' burden, including the use of automated information 
techniques.
---------------------------------------------------------------------------

    \92\ 44 U.S.C. 3507(d).
    \93\ 5 CFR 1320.11 (2012).
---------------------------------------------------------------------------

    76. The Commission based its paperwork burden estimates on the 
changes in paperwork burden presented by the proposed CIP Reliability 
Standards as compared to the CIP version 5 Standards. The Commission 
has already addressed the burden of implementing the CIP version 5 
Standards.\94\ As discussed above, the immediate rulemaking addresses 
four areas of modification to the CIP standards: (1) Removal of the 
``identify.

[[Page 43365]]

assess, and correct'' language from 17 CIP requirements; (2) 
development of enhanced security controls for low impact assets; (3) 
development of controls to protect transient devices (e.g. thumb drives 
and laptop computers); and (4) protection of communications networks. 
We do not anticipate that the removal of the ``identify, assess and 
correct'' language will impact the reporting burden, as the substantive 
compliance requirements would remain the same, while NERC indicates 
that the concept behind the deleted language continues to be 
implemented within NERC's compliance function. The development of 
controls to protect transient devices and protection of communication 
networks (as proposed by NERC) have associated reporting burdens that 
will affect a limited number of entities, i.e., those with Medium and 
High Impact BES Cyber Systems. The enhanced security controls for Low 
Impact assets are likely to impose a reporting burden on a much larger 
group of entities.
---------------------------------------------------------------------------

    \94\ See Order No. 791, 145 FERC ] 61,160 at PP 226-244.
---------------------------------------------------------------------------

    77. The NERC Compliance Registry, as of June 2015, identifies 
approximately 1,435 U.S. entities that are subject to mandatory 
compliance with Reliability Standards. Of this total, we estimate that 
1,363 entities will face an increased paperwork burden under the 
proposed CIP Reliability Standards, and we estimate that a majority of 
these entities will have one or more Low Impact assets. In addition, we 
estimate that approximately 23 percent of the entities have assets that 
will be subject to Reliability Standards CIP-006-6 and CIP-010-2. Based 
on these assumptions, we estimate the following reporting burden:

----------------------------------------------------------------------------------------------------------------
                                                                   Total burden    Total burden    Total burden
               Registered entities                   Number of     hours in year   hours in year   hours in year
                                                     entities            1               2               3
----------------------------------------------------------------------------------------------------------------
Entities subject to CIP-006-6 and CIP-010-2 with             313          75,120         130,208         130,208
 Medium and/or High Impact Assets...............
                                                 ---------------------------------------------------------------
    Totals......................................             313          75,120         130,208         130,208
----------------------------------------------------------------------------------------------------------------

    78. The following shows the annual cost burden for each group, 
based on the burden hours in the table above:
     Year 1: Entities subject to CIP-006-6 and CIP-010-2 with 
Medium and/or High Impact Assets: 313 x 240 hours/entity * $76/hour = 
$5,709,120.
     Years 2 and 3: 313 entities x 416 hours/entity * $76/hour 
= $9,895,808 per year.
     The paperwork burden estimate includes costs associated 
with the initial development of a policy to address requirements 
relating to transient devices, as well as the ongoing data collection 
burden. Further, the estimate reflects the assumption that costs 
incurred in year 1 will pertain to policy development, while costs in 
years 2 and 3 will reflect the burden associated with maintaining logs 
and other records to demonstrate ongoing compliance.

----------------------------------------------------------------------------------------------------------------
                                                                   Total burden    Total burden    Total burden
               Registered entities                   Number of     hours in year   hours in year   hours in year
                                                     entities            1               2               3
----------------------------------------------------------------------------------------------------------------
Entities subject to CIP-003-6 with low impact              1,363         163,560         283,504         283,504
 Assets.........................................
                                                 ---------------------------------------------------------------
    Totals......................................           1,363         163,560         283,504         283,504
----------------------------------------------------------------------------------------------------------------

    79. The following shows the annual cost burden for each group, 
based on the burden hours in the table above:
     Year 1: Entities subject to CIP-003-6 with Low Impact 
Assets: 1,363 x 120 hours/entity * $76/hour = $12,430,560.
     Years 2 and 3: 1,363 entities x 208 hours/entity * $76/
hour = $21,546,304 per year.
     The paperwork burden estimate includes costs associated 
with the modification of existing policies to address requirements 
relating to low impact assets, as well as the ongoing data collection 
burden, as set forth in CIP-003-6, Requirements R1.2 and R2, and 
Attachment 1. Further, the estimate reflects the assumption that costs 
incurred in year 1 will pertain to revising existing policies, while 
costs in years 2 and 3 will reflect the burden associated with 
maintaining logs and other records to demonstrate ongoing compliance.
    80. The estimated hourly rate of $76 is the average loaded cost 
(wage plus benefits) of legal services ($129.68 per hour), technical 
employees ($58.17 per hour) and administrative support ($39.12 per 
hour), based on hourly rates and average benefits data from the Bureau 
of Labor Statistics.\95\
---------------------------------------------------------------------------

    \95\ See http://bls.gov/oes/current/naics2_22.htm and http://www.bls.gov/news.release/ecec.nr0.htm. Hourly figures as of June 1, 
2015.
---------------------------------------------------------------------------

    81. Title: Mandatory Reliability Standards, Revised Critical 
Infrastructure Protection Standards.
    Action: Proposed Collection FERC-725B.
    OMB Control No.: 1902-0248.
    Respondents: Businesses or other for-profit institutions; not-for-
profit institutions.
    Frequency of Responses: On Occasion.
    Necessity of the Information: This proposed rule proposes to 
approve the requested modifications to Reliability Standards pertaining 
to critical infrastructure protection. As discussed above, the 
Commission proposes to approve NERC's proposed revised CIP Reliability 
Standards pursuant to section 215(d)(2) of the FPA because they improve 
the currently-effective suite of cyber security CIP Reliability 
Standards.
    Internal Review: The Commission has reviewed the proposed 
Reliability Standards and made a determination that its action is 
necessary to implement section 215 of the FPA.
    82. Interested persons may obtain information on the reporting 
requirements by contacting the following: Federal Energy Regulatory 
Commission, 888 First Street NE., Washington, DC 20426 [Attention: 
Ellen Brown, Office of the Executive Director, email: 
[email protected], phone: (202) 502-8663, fax: (202) 273-0873].
    83. For submitting comments concerning the collection(s) of 
information and the associated burden estimate(s), please send your 
comments to the Commission, and to the Office of Management and Budget, 
Office of

[[Page 43366]]

Information and Regulatory Affairs, Washington, DC 20503 [Attention: 
Desk Officer for the Federal Energy Regulatory Commission, phone: (202) 
395-4638, fax: (202) 395-7285]. For security reasons, comments to OMB 
should be submitted by email to: [email protected]. Comments 
submitted to OMB should include Docket Number RM15-14-000 and OMB 
Control Number 1902-0248.

IV. Regulatory Flexibility Act Analysis

    84. The Regulatory Flexibility Act of 1980 (RFA) generally requires 
a description and analysis of Proposed Rules that will have significant 
economic impact on a substantial number of small entities.\96\ The 
Small Business Administration's (SBA) Office of Size Standards develops 
the numerical definition of a small business.\97\ The SBA revised its 
size standard for electric utilities (effective January 22, 2014) to a 
standard based on the number of employees, including affiliates (from 
the prior standard based on megawatt hour sales).\98\ Proposed 
Reliability Standards CIP-003-6, CIP-004-6, CIP-006-6, CIP-007-6, CIP-
009-6, CIP-010-2, and CIP-011-2 are expected to impose an additional 
burden on 1,363 entities \99\ (reliability coordinators, generator 
operators, generator owners, interchange coordinators or authorities, 
transmission operators, balancing authorities, transmission owners, and 
certain distribution providers).
---------------------------------------------------------------------------

    \96\ 5 U.S.C. 601-12.
    \97\ 13 CFR 121.101 (2013).
    \98\ SBA Final Rule on ``Small Business Size Standards: 
Utilities,'' 78 FR 77343 (Dec. 23, 2013).
    \99\ Public utilities may fall under one of several different 
categories, each with a size threshold based on the company's number 
of employees, including affiliates, the parent company, and 
subsidiaries. For the analysis in this NOPR, we are using a 500 
employee threshold for each affected entity to conduct a 
comprehensive analysis.
---------------------------------------------------------------------------

    85. Of the 1,363 affected entities discussed above, we estimate 
that 444 entities are small entities. We estimate that 399 of these 444 
small entities do not own BES Cyber Assets or BES Cyber Systems that 
are classified as Medium or High Impact and, therefore, will only be 
affected by the proposed modifications to Reliability Standard CIP-003-
6. As discussed above, proposed Reliability Standard CIP-003-6 enhances 
reliability by providing criteria against which NERC and the Commission 
can evaluate the sufficiency of an entity's protections for Low Impact 
BES Cyber Assets. We estimate that each of the 399 small entities to 
whom the proposed modifications to Reliability Standard CIP-003-6 
applies will incur one-time costs of approximately $149,358 per entity 
to implement this standard, as well as the ongoing paperwork burden 
reflected in the Information Collection Statement (approximately 
$15,000 per year per entity). We do not consider the estimated costs 
for these 399 small entities a significant economic impact.
    86. In addition, we estimate that 14 small entities own Medium 
Impact substations and that 31 small transmission operators own Medium 
or High impact control centers. These 45 small entities represent 10.1 
percent of the 444 affected small entities. We estimate that each of 
these 45 small entities may experience an economic impact of $50,000 
per entity in the first year of initial implementation to meet proposed 
Reliability Standard CIP-010-2 and $30,000 in ongoing annual 
costs,\100\ for a total of $110,000 per entity over the first three 
years. Therefore, we estimate that each of these 45 small entities will 
incur a total of $258,654 in costs over the first three years. We 
conclude that 10.1 percent of the total 444 affected small entities 
does not represent a substantial number in terms of the total number of 
regulated small entities.
---------------------------------------------------------------------------

    \100\ Estimated annual cost for year 2 and forward.
---------------------------------------------------------------------------

    87. Based on the above analysis, we propose to certify that the 
proposed Reliability Standards will not have a significant economic 
impact on a substantial number of small entities.

V. Environmental Analysis

    88. The Commission is required to prepare an Environmental 
Assessment or an Environmental Impact Statement for any action that may 
have a significant adverse effect on the human environment.\101\ The 
Commission has categorically excluded certain actions from this 
requirement as not having a significant effect on the human 
environment. Included in the exclusion are rules that are clarifying, 
corrective, or procedural or that do not substantially change the 
effect of the regulations being amended.\102\ The actions proposed 
herein fall within this categorical exclusion in the Commission's 
regulations.
---------------------------------------------------------------------------

    \101\ Regulations Implementing the National Environmental Policy 
Act of 1969, Order No. 486, FERC Stats. & Regs. ] 30,783 (1987).
    \102\ 18 CFR 380.4(a)(2)(ii).
---------------------------------------------------------------------------

VI. Comment Procedures

    89. The Commission invites interested persons to submit comments on 
the matters and issues proposed in this notice to be adopted, including 
any related matters or alternative proposals that commenters may wish 
to discuss. Comments are due September 21, 2015. Comments must refer to 
Docket No. RM15-14-000, and must include the commenter's name, the 
organization they represent, if applicable, and address.
    90. The Commission encourages comments to be filed electronically 
via the eFiling link on the Commission's Web site at http://www.ferc.gov. The Commission accepts most standard word processing 
formats. Documents created electronically using word processing 
software should be filed in native applications or print-to-PDF format 
and not in a scanned format. Commenters filing electronically do not 
need to make a paper filing.
    91. Commenters that are not able to file comments electronically 
must send an original of their comments to: Federal Energy Regulatory 
Commission, Secretary of the Commission, 888 First Street NE., 
Washington, DC 20426.
    92. All comments will be placed in the Commission's public files 
and may be viewed, printed, or downloaded remotely as described in the 
Document Availability section below. Commenters on this proposal are 
not required to serve copies of their comments on other commenters.

VII. Document Availability

    93. In addition to publishing the full text of this document in the 
Federal Register, the Commission provides all interested persons an 
opportunity to view and/or print the contents of this document via the 
Internet through the Commission's Home Page (http://www.ferc.gov) and 
in the Commission's Public Reference Room during normal business hours 
(8:30 a.m. to 5:00 p.m. Eastern time) at 888 First Street NE., Room 2A, 
Washington, DC 20426.
    94. From the Commission's Home Page on the Internet, this 
information is available on eLibrary. The full text of this document is 
available on eLibrary in PDF and Microsoft Word format for viewing, 
printing, and/or downloading. To access this document in eLibrary, type 
the docket number of this document, excluding the last three digits, in 
the docket number field.
    User assistance is available for eLibrary and the Commission's Web 
site during normal business hours from the Commission's Online Support 
at (202) 502-6652 (toll free at 1-866-208-3676) or email at 
[email protected], or the Public Reference Room at (202) 502-
8371, TTY (202) 502-8659. Email the Public Reference Room at 
[email protected].

    By direction of the Commission.


[[Page 43367]]


    Issued: July 16, 2015.
Nathaniel J. Davis, Sr.,
Deputy Secretary.
[FR Doc. 2015-17920 Filed 7-21-15; 8:45 am]
 BILLING CODE 6717-01-P



                                               43354                  Federal Register / Vol. 80, No. 140 / Wednesday, July 22, 2015 / Proposed Rules

                                               the alien merits a favorable exercise of                 approved provisional unlawful presence                Plans for BES Cyber Systems), CIP–010–
                                               discretion.                                              waiver.                                               2 (Configuration Change Management
                                                 (8) Adjudication. USCIS will                              (ii) Waives the alien’s inadmissibility            and Vulnerability Assessments), and
                                               adjudicate a provisional unlawful                        under section 212(a)(9)(B) of the Act                 CIP–011–2 (Information Protection). The
                                               presence waiver application in                           only for purposes of the application for              North American Electric Reliability
                                               accordance with this paragraph and                       an immigrant visa and admission to the                Corporation (NERC) submitted the
                                               section 212(a)(9)(B)(v) of the Act. If                   United States as an immigrant based on                proposed Reliability Standards in
                                               USCIS finds that the alien is not eligible               the approved immigrant visa petition                  response to the Commission’s Order No.
                                               for a provisional unlawful presence                      upon which a provisional unlawful                     791. The proposed Reliability Standards
                                               waiver, or if USCIS determines in its                    presence waiver application is based or               address the cyber security of the bulk
                                               discretion that a waiver is not                          selection by the Department of State to               electric system and improve upon the
                                               warranted, USCIS will deny the waiver                    participate in the Diversity Visa                     current Commission-approved CIP
                                               application. Notwithstanding 8 CFR                       Program under section 203(c) of the Act               Reliability Standards. In addition, the
                                               103.2(b)(16), USCIS may deny an                          for the fiscal year for which the alien               Commission proposes to direct NERC to
                                               application for a provisional unlawful                   registered, with such selection being the             develop certain modifications to
                                               presence waiver without prior issuance                   basis for the alien’s provisional                     Reliability Standard CIP–006–6 and to
                                               of a request for evidence or notice of                   unlawful presence waiver application;                 develop requirements addressing supply
                                               intent to deny.                                          *       *    *     *      *                           chain management.
                                                 (9) Notice of decision. USCIS will                        (14) * * *                                         DATES: Comments are due September
                                               notify the alien and the alien’s attorney                   (i) The Department of State                        21, 2015.
                                               of record or accredited representative of                determines at the time of the immigrant               ADDRESSES: Comments, identified by
                                               the decision in accordance with 8 CFR                    visa interview that the alien is ineligible           docket number, may be filed in the
                                               103.2(b)(19). USCIS may notify the                       to receive an immigrant visa for any                  following ways:
                                               Department of State of the denial of an                  reason other than under section                          • Electronic Filing through http://
                                               application for a provisional unlawful                   212(a)(9)(B)(i)(I) or (II) of the Act;                www.ferc.gov. Documents created
                                               presence waiver. A denial is without                     *       *    *     *      *                           electronically using word processing
                                               prejudice to the alien’s filing another                     (iii) The immigrant visa registration is           software should be filed in native
                                               provisional unlawful presence waiver                     terminated in accordance with section                 applications or print-to-PDF format and
                                               application under this paragraph (e),                    203(g) of the Act, and has not been                   not in a scanned format.
                                               provided the alien meets all of the                      reinstated in accordance with section                    • Mail/Hand Delivery: Those unable
                                               requirements in this part, including that                203(g) of the Act; or                                 to file electronically may mail or hand-
                                               the alien’s case must be pending with                       (iv) The alien, at any time before or              deliver comments to: Federal Energy
                                               the Department of State. An alien also                   after approval of a provisional unlawful              Regulatory Commission, Secretary of the
                                               may elect to file a waiver application                   presence waiver or before an immigrant                Commission, 888 First Street NE.,
                                               under paragraph (a)(1) of this section                   visa is issued, reenters or attempts to               Washington, DC 20426.
                                               after departing the United States,                       reenter the United States without being                  Instructions: For detailed instructions
                                               appearing for his or her immigrant visa                  inspected and admitted or paroled.                    on submitting comments and additional
                                               interview at the U.S. Embassy or                                                                               information on the rulemaking process,
                                                                                                        Jeh Charles Johnson,                                  see the Comment Procedures Section of
                                               consulate abroad, and after the
                                                                                                        Secretary.                                            this document.
                                               Department of State determines the
                                               alien’s admissibility and eligibility for                [FR Doc. 2015–17794 Filed 7–21–15; 8:45 am]           FOR FURTHER INFORMATION CONTACT:
                                               an immigrant visa. Accordingly, denial                   BILLING CODE 9111–97–P
                                                                                                                                                              Daniel Phillips (Technical Information),
                                               of an application for a provisional                                                                               Office of Electric Reliability, Federal
                                               unlawful presence waiver is not a final                                                                           Energy Regulatory Commission, 888
                                               agency action for purposes of section                    DEPARTMENT OF ENERGY                                     First Street NE., Washington, DC
                                               10(c) of the Administrative Procedure                                                                             20426, (202) 502–6387,
                                               Act, 5 U.S.C. 704.                                       Federal Energy Regulatory                                daniel.phillips@ferc.gov.
                                                  (10) Withdrawal of waiver                             Commission                                            Kevin Ryan (Legal Information), Office
                                               applications. An alien may withdraw                                                                               of the General Counsel, Federal
                                               his or her application for a provisional                 18 CFR Part 40                                           Energy Regulatory Commission, 888
                                               unlawful presence waiver at any time                     [Docket No. RM15–14–000]                                 First Street NE., Washington, DC
                                               before USCIS makes a final decision.                                                                              20426, (202) 502–6840 kevin.ryan@
                                               Once the case is withdrawn, USCIS will                   Revised Critical Infrastructure                          ferc.gov.
                                               close the case and notify the alien and                  Protection Reliability Standards                      SUPPLEMENTARY INFORMATION:
                                               his or her attorney or accredited                        AGENCY: Federal Energy Regulatory                        1. Pursuant to section 215 of the
                                               representative. The alien may file a new                 Commission, Energy.                                   Federal Power Act (FPA),1 the
                                               application for a provisional unlawful                                                                         Commission proposes to approve seven
                                                                                                        ACTION: Notice of proposed rulemaking.
                                               presence waiver, in accordance with the                                                                        critical infrastructure protection (CIP)
                                               form instructions and required fees,                     SUMMARY:   The Federal Energy                         Reliability Standards: CIP–003–6
                                               provided that the alien meets all of the                 Regulatory Commission (Commission)                    (Security Management Controls), CIP–
                                               requirements included in this paragraph
Lhorne on DSK7TPTVN1PROD with PROPOSALS




                                                                                                        proposes to approve seven critical                    004–6 (Personnel and Training), CIP–
                                               (e).                                                     infrastructure protection (CIP)                       006–6 (Physical Security of BES Cyber
                                               *      *     *    *    *                                 Reliability Standards: CIP–003–6                      Systems), CIP–007–6 (Systems Security
                                                  (12) * * *                                            (Security Management Controls), CIP–                  Management), CIP–009–6 (Recovery
                                                  (i) * * *                                             004–6 (Personnel and Training), CIP–                  Plans for BES Cyber Systems), CIP–010–
                                                  (C) Is determined to be otherwise                     006–6 (Physical Security of BES Cyber                 2 (Configuration Change Management
                                               eligible for an immigrant visa by the                    Systems), CIP–007–6 (Systems Security
                                               Department of State in light of the                      Management), CIP–009–6 (Recovery                        1 16   U.S.C. 824o.



                                          VerDate Sep<11>2014   15:08 Jul 21, 2015   Jkt 235001   PO 00000   Frm 00017   Fmt 4702   Sfmt 4702   E:\FR\FM\22JYP1.SGM    22JYP1


                                                                      Federal Register / Vol. 80, No. 140 / Wednesday, July 22, 2015 / Proposed Rules                                                    43355

                                               and Vulnerability Assessments), and                      Reliability Standard CIP–006–6 to                       Low Impact assets; (3) develop controls
                                               CIP–011–2 (Information Protection). The                  require protections for communication                   to protect transient electronic devices
                                               North American Electric Reliability                      network components and data                             (e.g., thumb drives and laptop
                                               Corporation, the Commission-certified                    communicated between all bulk electric                  computers); (4) create a NERC Glossary
                                               Electric Reliability Organization (ERO),                 system Control Centers. In addition, we                 definition for the term ‘‘communication
                                               submitted the proposed Reliability                       seek comment on the sufficiency of the                  networks,’’ and develop new or
                                               Standards in response to Order No.                       security controls incorporated in the                   modified Reliability Standards to
                                               791.2 The Commission also proposes to                    current CIP Reliability Standards                       protect the nonprogrammable
                                               approve NERC’s proposed                                  regarding remote access used in relation                components of communications
                                               implementation plan and violation risk                   to bulk electric system communications.                 networks.
                                               factor and violation severity level                      Finally, as discussed in more detail                       6. In addition, the Commission
                                               assignments. In addition, we propose to                  below, we propose to direct NERC to                     directed NERC to conduct a survey of
                                               approve NERC’s proposed new or                           develop requirements relating to supply                 Cyber Assets that are included or
                                               revised definitions for inclusion in the                 chain management for industrial control                 excluded under the new BES Cyber
                                               NERC Glossary of Terms Used in                           system hardware, software, and                          Asset definition and submit an
                                               Reliability Standards (NERC Glossary).                   services.                                               informational filing within one year.9
                                               Further, the Commission proposes to                                                                              Finally, the NOPR directed Commission
                                               approve the retirement of Reliability                    I. Background                                           staff to convene a technical conference
                                               Standards CIP–003–5, CIP–004–5.1,                        A. Section 215 and Mandatory                            to examine the technical issues
                                               CIP–006–5, CIP–007–5, CIP–009–5, CIP–                    Reliability Standards                                   concerning communication security,
                                               010–1, and CIP–011–1.                                                                                            remote access, and the National Institute
                                                  2. The proposed Reliability Standards                   4. Section 215 of the FPA requires a                  of Standards and Technology (NIST)
                                               are designed to mitigate the                             Commission-certified ERO to develop                     Risk Management Framework.10
                                               cybersecurity risks to bulk electric                     mandatory and enforceable Reliability
                                                                                                        Standards, subject to Commission                        C. Informational Filing
                                               system facilities, systems, and
                                               equipment, which, if destroyed,                          review and approval. Reliability                          7. On February 3, 2015, NERC
                                               degraded, or otherwise rendered                          Standards may be enforced by the ERO,                   submitted an informational filing
                                               unavailable as a result of a cybersecurity               subject to Commission oversight, or by                  assessing the results of a survey
                                               incident, would affect the reliable                      the Commission independently.4                          conducted to identify the scope of assets
                                               operation of the Bulk-Power System.3                     Pursuant to section 215 of the FPA, the                 subject to the definition of the term BES
                                               As discussed below, we believe that the                  Commission established a process to                     Cyber Asset as it is applied in the CIP
                                               proposed CIP Reliability Standards are                   select and certify an ERO,5 and                         version 5 Standards. NERC states that
                                               just and reasonable and address the                      subsequently certified NERC.6                           the results of the survey indicate that, in
                                               directives in Order No. 791 by: (1)                                                                              general, the application of the BES
                                                                                                        B. Order No. 791
                                               Eliminating the ‘‘identify, assess, and                                                                          Cyber Asset definition, and the 15
                                               correct’’ language in 17 of the CIP                         5. On November 22, 2013, in Order                    minute parameter in particular, resulted
                                               version 5 Standard requirements; (2)                     No. 791, the Commission approved the                    in the identification of BES Cyber Assets
                                               providing enhanced security controls                     CIP version 5 Standards (Reliability                    consistent with the language and intent
                                               for Low Impact assets; (3) providing                     Standards CIP–002–5 through CIP–                        of the CIP version 5 Standards.11 NERC
                                               controls to address the risks posed by                   009–5, and CIP–010–1 and CIP–011–1).7                   maintained that the survey results
                                               transient electronic devices (e.g., thumb                The Commission determined that the                      demonstrate that the definition of BES
                                               drives and laptop computers); and (4)                    CIP version 5 Standards represented an                  Cyber Asset provides a sound basis for
                                               addressing in an equally effective and                   improvement over prior iterations of the                identifying the types of Cyber Assets
                                               efficient manner the need for a NERC                     CIP Reliability Standards because, inter                that should be subject to the cyber
                                               Glossary definition for the term                         alia, they included a revised BES Cyber                 security protections required by the CIP
                                               ‘‘communication networks.’’                              Asset categorization methodology that                   Reliability Standards.12
                                               Accordingly, we propose to approve the                   incorporated mandatory protections for
                                                                                                                                                                D. April 29, 2014 Technical Conference
                                               proposed CIP Reliability Standards                       all High, Medium, and Low Impact BES
                                               because they improve the base-line                       Cyber Assets, and because several new                     8. On April 29, 2014, a staff-led
                                               cybersecurity posture of applicable                      security controls improved the security                 technical conference was held pursuant
                                               entities compared to the current                         posture of responsible entities.8 In                    to a directive in Order No. 791.13 The
                                               Commission-approved CIP Reliability                      addition, pursuant to section 215(d)(5)                 topics discussed at the technical
                                               Standards.                                               of the FPA, the Commission directed                     conference included: (1) The adequacy
                                                  3. In addition, pursuant to FPA                       NERC to: (1) Remove the ‘‘identify,                     of the approved CIP version 5
                                               section 215(d)(5), the Commission                        assess, and correct’’ language in 17 of                 Standards’ protections for Bulk-Power
                                               proposes to direct NERC to develop                       the CIP Standard requirements; (2)                      System data being transmitted over data
                                               certain modifications to Reliability                     develop enhanced security controls for                  networks; (2) whether additional
                                               Standard CIP–006–6. Specifically, while                                                                          security controls are needed to protect
                                               proposed CIP–006–6 would require                              4 16
                                                                                                                U.S.C. 824o(e).                                 Bulk-Power System communications
                                               protections for communication                                 5 Rules
                                                                                                                   Concerning Certification of the Electric     networks, including remote systems
                                               networks among a limited group of bulk                   Reliability Organization; and Procedures for the        access; and (3) the functional
                                                                                                        Establishment, Approval, and Enforcement of             differences between the respective
Lhorne on DSK7TPTVN1PROD with PROPOSALS




                                               electric system Control Centers, we                      Electric Reliability Standards, Order No. 672, FERC
                                               propose to direct that NERC modify                       Stats. & Regs. ¶ 31,204, order on reh’g, Order No.      methods utilized for the identification,
                                                                                                        672–A, FERC Stats. & Regs. ¶ 31,212 (2006).
                                                                                                          6 North American Electric Reliability Corp., 116        9 Id.
                                                                                                                                                                      PP 76, 108, 136, 150.
                                                 2 Version 5 Critical Infrastructure Protection
                                                                                                        FERC ¶ 61,062, order on reh’g and compliance, 117         10 Id.P 225.
                                               Reliability Standards, Order No. 791, 78 FR 72,755
                                               (Dec. 3, 2013), 145 FERC ¶ 61,160 (2013), order on       FERC ¶ 61,126 (2006), aff’d sub nom. Alcoa, Inc. v.      11 See NERC Informational Filing, Docket No.

                                               clarification and reh’g, Order No. 791–A, 146 FERC       FERC, 564 F.3d 1342 (D.C. Cir. 2009).                   RM13–5–000, at 3 (filed Feb. 3, 2015).
                                               ¶ 61,188 (2014).                                           7 Order No. 791, 145 FERC ¶ 61,160 at P 41.            12 Id.
                                                 3 See NERC Petition at 3.                                8 Id.                                                  13 Order No. 791, 145 FERC ¶ 61,160 at P 225.




                                          VerDate Sep<11>2014   15:08 Jul 21, 2015   Jkt 235001   PO 00000     Frm 00018   Fmt 4702   Sfmt 4702   E:\FR\FM\22JYP1.SGM     22JYP1


                                               43356                  Federal Register / Vol. 80, No. 140 / Wednesday, July 22, 2015 / Proposed Rules

                                               categorization, and specification of                     plan,16 associated violation risk factor                connected to their high impact and
                                               appropriate levels of protection for                     and violation severity level assignments,               medium impact BES Cyber Systems and
                                               cyber assets using the CIP version 5                     proposed new or revised definitions,17                  associated [Protected Cyber Assets].’’ 23
                                               Standards as compared with those                         and retirement of Reliability Standards                 In addition, NERC states that the
                                               employed within the NIST                                 CIP–003–5, CIP–004–5.1, CIP–006–5,                      proposed Reliability Standards address
                                               Cybersecurity Framework.                                 CIP–007–5, CIP–009–5, CIP–010–1, and                    the protection of communication
                                                  9. With respect to the current state of               CIP–011–1.18 NERC states that the                       networks ‘‘by requiring entities to
                                               protection for communications                            proposed Reliability Standards are just,                implement security controls for
                                               networks under the CIP version 5                         reasonable, not unduly discriminatory                   nonprogrammable components of
                                               Standards, some panelists opined that                    or preferential, and in the public                      communication networks at Control
                                               the CIP version 5 Standards lack                         interest because they satisfy the factors               Centers with high or medium impact
                                               controls to: (1) Protect communications                  set forth in Order No. 672 that the                     BES Cyber Systems.’’ 24 Finally, NERC
                                               outside of the Electronic Security                       Commission applies when reviewing a                     explains that it has not proposed a
                                               Perimeter; (2) protect data in motion; (3)               proposed Reliability Standard.19 NERC                   definition of the term ‘‘communication
                                               authenticate messages and commands to                    maintains that the proposed Reliability                 network’’ because the term is not used
                                               BES Cyber Assets; and (4) protect                        Standards ‘‘improve the cybersecurity                   in the CIP Reliability Standards.
                                               systems or communications using non                      protections required by the CIP                         Additionally, NERC states that ‘‘any
                                               routable protocols. On the subject of the                Reliability Standards[.]’’ 20                           proposed definition would need to be
                                               adequacy of protections for Bulk-Power                     12. NERC avers that the proposed CIP                  sufficiently broad to encompass all
                                               System data under the CIP version 5                      Reliability Standards satisfy the                       components in a communication
                                               Standards, several panelists stated that                 Commission directives in Order No.                      network as they exist now and in the
                                               stronger measures, such as encryption,                   791. Specifically, NERC states that the                 future.’’ 25 NERC concludes that the
                                               would enhance the overall protection                     proposed Reliability Standards remove                   proposed Reliability Standards ‘‘meet
                                               for Bulk-Power System                                    the ‘‘identify, assess, and correct’’                   the ultimate security objective of
                                               communications. However, other                           language, which represents the                          protecting communication networks
                                               panelists also stated that encryption was                Commission’s preferred approach to                      (both programmable and
                                               not a universal solution because it could                addressing the underlying directive.21                  nonprogrammable communication
                                               cause unacceptable latency (i.e., time                   In addition, NERC states that the                       network components).’’ 26
                                               delay in communications) in certain                      proposed Reliability Standards address                     14. Accordingly, NERC requests that
                                               applications.                                            the Commission’s directive regarding a                  the Commission approve the proposed
                                                  10. Regarding the need for additional                 lack of specific controls or objective                  Reliability Standards, the proposed
                                               security controls for Bulk-Power System                  criteria for Low Impact BES Cyber                       implementation plan, the associated
                                               communications, panelists identified a                   Systems by requiring responsible                        violation risk factor and violation
                                               number of worthwhile steps that could                    entities ‘‘to implement cybersecurity                   severity level assignments, and the
                                               be explored to enhance remote access.                    plans for assets containing Low Impact                  proposed new and revised definitions.
                                               Suggestions included the adoption of                     BES Cyber Systems to meet specific                      NERC requests an effective date for the
                                               additional physical security controls,                   security objectives relating to: (i)                    Reliability Standards of the later of
                                               integrity checks, encryption (in certain                 Cybersecurity awareness; (ii) physical                  April 1, 2016 or the first day of the first
                                               cases), out of bounds detection for                      security controls; (iii) electronic access              calendar quarter that is three months
                                               communications links, and coordination                   controls; and (iv) Cyber Security                       after the effective date of the
                                               with vendors to enhance risk                                                                                     Commission’s order approving the
                                                                                                        Incident response.’’ 22
                                               management. In addition, certain                           13. With regard to the Commission’s                   proposed Reliability Standard, although
                                               panelists stated their position that the                 directive that NERC develop specific                    NERC proposes that responsible entities
                                               use of intermediate systems, alone, is                   controls to protect transient electronic                will not have to comply with the
                                               not sufficient to address remote access                  devices (e.g., thumb drives and laptop                  requirements applicable to Low Impact
                                               concerns.14 Several panelists identified                 computers), NERC explains that the                      BES Cyber Systems (CIP–003–6,
                                               suggestions that could be explored to                    proposed Reliability Standards require                  Requirement R1, Part 1.2 and
                                               enhance protections for remote access,                                                                           Requirement R2) until April 1, 2017.
                                                                                                        responsible entities ‘‘to implement
                                               including the addition of logical or
                                                                                                        controls to protect transient devices                   II. Discussion
                                               physical controls to provide additional
                                               network segmentation behind the                               16 The
                                                                                                                  proposed implementation plan is designed         15. Pursuant to section 215(d)(2) of
                                               intermediate systems.15                                  to match the effective dates of the proposed            the FPA, we propose to approve
                                                                                                        Reliability Standards with the effective dates of the   Reliability Standards CIP–003–6, CIP–
                                               E. NERC Petition                                         prior versions of those Reliability Standards under
                                                                                                        the implementation plan of the CIP version 5
                                                                                                                                                                004–6, CIP–006–6, CIP–007–6, CIP–
                                                 11. On February 13, 2015, NERC                                                                                 009–6, CIP–010–2 and CIP–011–2 as
                                               submitted a petition seeking approval of                 Standards.
                                                                                                          17 The six new or revised definitions proposed for    just, reasonable, not unduly
                                               Reliability Standards CIP–003–6, CIP–                    inclusion in the NERC Glossary are: (1) BES Cyber       discriminatory or preferential, and in
                                               004–6, CIP–006–6, CIP–007–6, CIP–                        Asset; (2) Protected Cyber Asset; (3) Low Impact        the public interest. In addition,
                                               009–6, CIP–010–2, and CIP–011–2, as                      Electronic Access Point; (4) Low Impact External
                                                                                                                                                                pursuant to FPA section 215(d)(5), we
                                               well as the proposed implementation                      Routable Connectivity; (5) Removable Media; and
                                                                                                        (6) Transient Cyber Asset.                              propose to direct NERC to develop
                                                                                                          18 The proposed Reliability Standards are             certain modifications to Reliability
Lhorne on DSK7TPTVN1PROD with PROPOSALS




                                                 14 An Intermediate System is defined as ‘‘A Cyber
                                                                                                        available on the Commission’s eLibrary document         Standard CIP–006–6 and to develop
                                               Asset or collection of Cyber Assets performing
                                                                                                        retrieval system in Docket No. RM15–14–000 and
                                               access control to restrict Interactive Remote Access
                                                                                                        on the NERC Web site, www.nerc.com.
                                                                                                                                                                requirements addressing supply chain
                                               to only authorized users. The Intermediate System          19 See NERC Petition at 13 and Exhibit C (citing      management.
                                               must not be located inside the Electronic Security
                                               Perimeter.’’ NERC Glossary at 46 (April 29, 2015).       Order No. 672, FERC Stats. & Regs. ¶ 31,204 at PP
                                                 15 See Transcript at pp. 176–177 (Kevin Perry          323–335).                                                 23 Id. at 6.
                                                                                                          20 NERC Petition at 4.                                  24 Id. at 8.
                                               speaking), 177–178 (Richard Kinas speaking), 178
                                                                                                          21 Id. at 4, 15.                                        25 Id. at 51–52.
                                               (Dr. Andrew Wright speaking), 179 (Andrew Ginter
                                               speaking).                                                 22 Id. at 5.                                            26 Id. at 52.




                                          VerDate Sep<11>2014   15:08 Jul 21, 2015   Jkt 235001   PO 00000     Frm 00019   Fmt 4702   Sfmt 4702   E:\FR\FM\22JYP1.SGM   22JYP1


                                                                        Federal Register / Vol. 80, No. 140 / Wednesday, July 22, 2015 / Proposed Rules                                                     43357

                                                  16. The proposed Reliability                            comments received, we may direct                        NERC Petition
                                               Standards address the Commission’s                         NERC to develop modifications to this                      22. In its Petition, NERC explains that
                                               directives from Order No. 791 and are                      definition to eliminate possible                        it has addressed the Order No. 791
                                               an improvement over the current                            ambiguities and ensure that BES Cyber                   directive regarding the ‘‘identify, assess,
                                               Commission-approved CIP Reliability                        Assets receive adequate protection.                     and correct’’ language by removing the
                                               Standards. Specifically, we propose to                        20. In addition, we propose to accept                language from the 17 requirements that
                                               approve the removal of the ‘‘identify,                     19 violation risk factor and violation                  included the language in the CIP version
                                               assess, and correct’’ language in certain                  severity level assignments associated                   5 Standards.32 NERC states that it is
                                               requirements of the CIP version 5                                                                                  addressing the concerns underlying the
                                                                                                          with the proposed Reliability Standards.
                                               Standards. We also propose to approve                                                                              development of the ‘‘identify, assess,
                                                                                                          Finally, we propose to approve NERC’s
                                               NERC’s submission regarding the
                                                                                                          proposed implementation plan and                        and correct’’ language through
                                               protection of Low Impact BES Cyber
                                                                                                          effective date. Below, we discuss the                   ‘‘transformation of its [Compliance
                                               Systems. With regard to the directive to
                                                                                                          following matters: (A) Identify, assess,                Monitoring and Enforcement Program]
                                               create a NERC Glossary definition for
                                                                                                          and correct language; (B) enhanced                      and the implementation of a risk-based
                                               the term ‘‘communication networks,’’
                                                                                                          security controls for Low Impact assets;                approach to compliance monitoring and
                                               we propose to approve NERC’s proposal
                                                                                                          (C) protection of Transient Devices; (D)                enforcement activities.’’ 33 NERC
                                               as an equally effective and efficient
                                                                                                          protection of bulk electric system                      explains that the changes it is making to
                                               method to achieve the reliability goal
                                                                                                          communication networks; (E) supply                      the Compliance Monitoring and
                                               underlying that directive in Order No.
                                                                                                          chain management; (F) proposed                          Enforcement Program, outside the text
                                               791.
                                                  17. The technical controls in                           definitions; (G) NERC’s proposed                        of a reliability standard, ‘‘directly
                                               proposed Reliability Standard CIP–006–                     implementation plan; and (H) proposed                   accomplish the goal of the ‘identify,
                                               6, which addresses the protection of                       violation severity level and violation                  assess, and correct’ language by focusing
                                               non-programmable components of                             risk factor assignments.                                ERO and industry resources on those
                                               communication networks (i.e., network                                                                              areas that pose a more-than-minimal
                                                                                                          A. Identify, Assess, and Correct                        risk to reliability and helping to
                                               cabling and switches), are generally                       Language
                                               consistent with the type of controls                                                                               improve internal controls.’’ 34
                                               cited by the Commission in Order No.                       Order No. 791                                           Discussion
                                               791.27 We are concerned, however, that
                                               the limited applicability of the proposed                     21. In the proposed CIP version 5                       23. NERC’s proposal to remove the
                                               standard, i.e., BES Cyber Assets within                    Standards, NERC included language in                    ‘‘identify, assess, and correct’’ language
                                               the same Electronic Security Perimeter                     17 CIP requirements that would have                     from the 17 requirements that included
                                               but located outside of a Physical                          required responsible entities to                        the language in the CIP version 5
                                               Security Perimeter, results in a                           implement requirements in a manner to                   Standards, while retaining the
                                               reliability gap. For the reasons                           ‘‘identify, assess, and correct’’                       substantive provisions of those
                                               discussed below, we propose to direct                      deficiencies.28 In Order No. 791, the                   requirements, reflects the Commission’s
                                               that NERC modify Reliability Standard                      Commission concluded that the                           preferred approach outlined in Order
                                               CIP–006–6 to require physical or logical                   ‘‘identify, assess, and correct’’ language              No. 791.35 Consistent with the rationale
                                               protections for communication network                      proposed by NERC was unclear with                       underlying the Order No. 791 directive,
                                               components between all bulk electric                       respect to the obligations it would                     removing the ‘‘identify, assess, and
                                               system Control Centers.                                    impose on responsible entities, how it                  correct’’ language avoids the possibility
                                                  18. Separately, we are concerned that                   would be implemented by responsible                     of inconsistent application and
                                               changes in the bulk electric system                        entities, and how it would be                           enforcement of the requirements at issue
                                               cyber threat landscape, identified                         enforced.29 The Commission explained                    by eliminating the possibility of
                                               through recent malware campaigns                           that proposed Reliability Standards                     multiple interpretations of that
                                               targeting supply chain vendors, have                       should be clear and unambiguous                         language.
                                               highlighted a gap in the protections                       regarding what is required for                             24. Accordingly, we propose to
                                               under the CIP Reliability Standards.                       compliance and who is required to                       approve NERC’s removal of the
                                               These malware campaigns represent a                        comply.30 The Commission directed                       ‘‘identify, assess, and correct’’ language
                                               new type of threat to the reliability of                   NERC, pursuant to section 215(d)(5) of                  from the 17 affected requirements.
                                               the bulk electric system where                             the FPA, to develop modifications to the                B. Enhanced Security Controls for Low
                                               malicious code can infect the software                     CIP version 5 Standards to address the                  Impact Assets
                                               of industrial control systems used by                      Commission’s concerns with the
                                               responsible entities. Therefore, we                        ‘‘identify, assess, and correct’’ language.             Order No. 791
                                               propose to direct NERC to develop a                        The Commission stated its preference                       25. In Order No. 791, the Commission
                                               new Reliability Standard or modified                       that NERC should remove the ‘‘identify,                 approved NERC’s new approach to
                                               Reliability Standard to provide security                   assess, and correct’’ language from the                 categorizing BES Cyber Systems based
                                               controls for supply chain management                       17 CIP version 5 requirements, while                    on the High, Medium or Low Impact
                                               for industrial control system hardware,                    retaining the substantive provisions of                 that each system could have on the
                                               software, and services associated with                     those requirements.31                                   reliable operation of the bulk electric
                                               bulk electric system operations.                                                                                   system. Specifically, the Commission
Lhorne on DSK7TPTVN1PROD with PROPOSALS




                                                  19. We also propose to approve the                           28 Order
                                                                                                                      No. 791, 145 FERC ¶ 61,160 at P 44.         noted that the new tiered approach,
                                               new or revised definitions for inclusion                        29 Id.
                                                                                                                   P 67.                                          ‘‘which requires at least a minimum
                                               in the NERC Glossary, and seek                               30 Id. P 68 (citing Mandatory Reliability
                                                                                                                                                                  classification of Low Impact for BES
                                               comment on the proposed definition for                     Standards for the Bulk-Power System, Order No.
                                                                                                          693, FERC Stats. & Regs. ¶ 31,242, at P 274, order
                                               Low Impact External Routable                               on reh’g, Order No. 693–A, 120 FERC ¶ 61,053
                                                                                                                                                                    32 NERC    Petition at 15.
                                               Connectivity. Depending on the                             (2007)).                                                  33 Id. at 15–16.
                                                                                                            31 Id. P 67 (citing Order No. 693, FERC Stats. &        34 Id. at 18.
                                                 27 See   Order No. 791, 145 FERC ¶ 61,160 at P 149.      Regs. ¶ 31,242 at P 186).                                 35 Order No. 791, 145 FERC ¶ 61,160 at P 67.




                                          VerDate Sep<11>2014     15:08 Jul 21, 2015   Jkt 235001   PO 00000     Frm 00020   Fmt 4702   Sfmt 4702   E:\FR\FM\22JYP1.SGM   22JYP1


                                               43358                   Federal Register / Vol. 80, No. 140 / Wednesday, July 22, 2015 / Proposed Rules

                                               Cyber Systems, better assures the                         impact on the system, and technically                          29. NERC explains further that
                                               protection of assets that can cause cyber                 justified.’’ 41                                             proposed Reliability Standard CIP–003–
                                               security risks to the bulk electric                                                                                   6, Requirement R2 provides responsible
                                                                                                         NERC Petition
                                               system.’’ 36 The Commission, however,                                                                                 entities with flexibility to adopt security
                                               raised concerns that the CIP version 5                       27. In its Petition, NERC states that                    controls for Low Impact BES Cyber
                                               Standards do not require any specific                     the revised CIP Reliability Standards                       Systems ‘‘in the manner that best suits
                                               controls for BES Cyber Systems                            include ‘‘additional specificity                            the needs and characteristics of their
                                               classified as Low Impact, nor do the                      regarding the controls that responsible                     organization, so long as the responsible
                                               standards contain clear, objective                        entities must implement for protecting                      entity can demonstrate that it designed
                                               criteria ‘‘to judge the sufficiency of the                their low impact BES Cyber Systems.’’ 42                    its controls to meet the ultimate security
                                               controls ultimately adopted by                            NERC explains that proposed Reliability                     objective.’’ 46 NERC states that attempts
                                               responsible entities for Low Impact BES                   Standard CIP–003–6, Requirement R1                          to overly prescribe specific security
                                               Cyber Systems.’’ 37 The Commission                        requires responsible entities to develop                    controls would be problematic and
                                               concluded that the lack of objective                      cyber security policies for Low Impact                      could inhibit the development of
                                               criteria to evaluate any controls adopted                 BES Cyber Systems ‘‘to communicate                          innovative security controls due to the
                                               under proposed Reliability Standard                       management’s expectation for                                diversity of Low Impact BES Cyber
                                               CIP–003–5, Requirement R2 ‘‘introduces                    cybersecurity across the                                    Systems. However, NERC explains that
                                               an unacceptable level of ambiguity and                    organization.’’ 43 According to NERC,                       by having responsible entities articulate
                                               potential inconsistency into the                          the cyber security policies required                        clear security objectives, ‘‘the ERO and
                                               compliance process,’’ resulting in an                     under proposed Reliability Standard                         the Commission will have a basis from
                                               unnecessary gap in reliability.38 The                     CIP–003–6, Requirement R1 must                              which to judge the sufficiency of the
                                               Commission therefore directed NERC,                       include the four subject matter areas                       controls ultimately adopted by a
                                               pursuant to section 215(d)(5) of the                      addressed by proposed Reliability                           responsible entity.’’ 47
                                               FPA, to develop modifications to the                      Standard CIP–003–6, Requirement R2,                         Discussion
                                               CIP version 5 Standards to address the                    Attachment 1, and must be reviewed                             30. We propose to approve proposed
                                               ambiguity and potential for                               and approved by the CIP Senior                              Reliability Standard CIP–003–6. NERC’s
                                               inconsistency in the compliance process                   Manager at least once every 15 calendar                     proposal satisfies the Commission’s
                                               created by the lack of objective criteria                 months. NERC explains that, while a                         Order No. 791 directive by providing
                                               pertaining to Low Impact BES Cyber                        responsible entity has the flexibility to                   responsible entities with a list of
                                               Systems.39                                                develop either a single comprehensive                       specific security objectives relevant to
                                                  26. While not directing NERC to                        cyber security policy or single high-                       Low Impact BES Cyber Systems that
                                               develop specific controls for Low                         level umbrella policy with detail                           must be addressed through one or more
                                               Impact BES Cyber Systems, the                             provided in lower-level documents,                          documented cyber security plans.
                                               Commission noted that NERC could                          ‘‘the purpose of these policies is to                       Reliability Standard CIP–003–6,
                                               address the lack of objective criteria in                 communicate the responsible entity’s                        Requirement R2 provides clarity
                                               a number of ways, including: (1)                          management goals, objectives, and                           regarding what is expected for
                                               Requiring specific controls for Low                       expectations for the protection of low                      compliance and requires responsible
                                               Impact assets, including subdividing the                  impact BES Cyber Systems and establish                      entities to implement specific security
                                               assets into different categories with                     a culture of security and compliance                        controls to meet the four subject matter
                                               different defined controls applicable to                  across the organization.’’ 44                               areas identified by NERC to address the
                                               each subcategory; (2) developing                             28. In addition, NERC explains that                      risks associated with Low Impact BES
                                               objective criteria against which the                      proposed Reliability Standard CIP–003–                      Cyber Systems, providing enhanced
                                               controls adopted by responsible entities                  6, Requirement R2 requires responsible                      protections for Low Impact assets.
                                               can be compared and measured in order                     entities with Low Impact BES Cyber                             31. As noted above, Attachment 1 to
                                               to evaluate their adequacy, including                     Systems to implement controls                               revised CIP–003–6, Requirement R2
                                               subdividing the assets into different                     necessary to meet specific security                         identifies four topics addressed by the
                                               categories with different defined control                 objectives for: (1) Cyber security                          requirement, and describes the
                                               objectives applicable to each                             awareness; (2) physical security                            affirmative obligations associated with
                                               subcategory; (3) defining with greater                    controls; (3) electronic access controls;                   each topic, including: (1) Mandatory
                                               specificity the processes that                            and (4) cyber security incident response.                   reinforcement of cyber security
                                               responsible entities must have for Low                    NERC explains further that while the                        awareness practices at least once every
                                               Impact facilities under Reliability                       four topics addressed by Reliability                        15 calendar months; (2) mandatory
                                               Standard CIP–003–5, Requirement R2;                       Standard CIP–003–6, Requirement R2                          physical access controls to the asset or
                                               or (4) another equally efficient and                      are the same as those under the CIP                         locations of the Low Impact BES Cyber
                                               effective solution.40 Finally, the                        version 5 Standards, focusing resources                     Systems within the asset and Low
                                               Commission emphasized that however                        on the four identified subject matter                       Impact BES Cyber System Electronic
                                               NERC decides to address the                               areas ‘‘will have the greatest                              Access Points, if any; (3) mandatory
                                               Commission’s concern, ‘‘the criteria                      cybersecurity benefit for low impact                        electronic access point protection to
                                               NERC proposes for evaluating a                            BES Cyber Systems without diverting                         permit only necessary inbound and
                                               responsible entities’ protections for Low                 resources necessary for the protection of                   outbound bi-directional routable
Lhorne on DSK7TPTVN1PROD with PROPOSALS




                                               Impact facilities should be clear,                        high and medium impact BES Cyber                            protocol access and mandatory
                                               objective, commensurate with their                        Systems.’’ 45                                               authentication for all dialup
                                                                                                                                                                     connectivity that provides access to the
                                                 36 Id. P 87.                                                 41 Id. P 110.                                          Low Impact BES Cyber System; and (4)
                                                 37 Id. P 107.                                                42 NERC    Petition at 23.                             specific information to be included in
                                                 38 Id. P 108.                                                43 Id. at 24.
                                                 39 Id. P 108.                                                44 Id. at 32.                                            46 Id.   at 25.
                                                 40 Id. P 108.                                                45 Id. at 25.                                            47 Id.   at 25.



                                          VerDate Sep<11>2014    15:08 Jul 21, 2015   Jkt 235001   PO 00000     Frm 00021     Fmt 4702     Sfmt 4702   E:\FR\FM\22JYP1.SGM   22JYP1


                                                                      Federal Register / Vol. 80, No. 140 / Wednesday, July 22, 2015 / Proposed Rules                                              43359

                                               incident response plans. We believe that                 Therefore, the Commission directed that                 as the proposed definition for Transient
                                               Attachment 1 provides sufficient                         NERC, pursuant to section 215(d)(5) of                  Cyber Assets obviates the need for the
                                               context to evaluate objectively the                      the FPA, develop either new or                          30-day exemption language. NERC
                                               effectiveness of the procedures                          modified Reliability Standards to                       indicates that, as defined, Transient
                                               developed by a responsible entity to                     address the reliability risks posed by                  Cyber Assets and Removable Media do
                                               implement CIP–003–6 and judge the                        connecting transient devices to BES                     not provide reliability services and are
                                               sufficiency of the controls ultimately                   Cyber Assets and Systems. In particular,                not part of the BES Cyber System to
                                               adopted by a responsible entity under                    the Commission stated that it expects                   which they are connected.54
                                               its security plans.                                      NERC to consider the following security                    37. NERC proposes to define
                                                  32. Furthermore, we agree that                        elements for transient devices and                      Transient Cyber Asset as: ‘‘A Cyber
                                               NERC’s proposal to use clear security                    removable media: (1) Device                             Asset that (i) is capable of transmitting
                                               objectives in lieu of specific security                  authorization as it relates to users and                or transferring executable code, (ii) is
                                               controls for each Low Impact system is                   locations; (2) software authorization; (3)              not included in a BES Cyber System,
                                               reasonable owing to the diversity of                     security patch management; (4) malware                  (iii) is not a Protected Cyber Asset (PCA)
                                               assets covered under the Low Impact                      prevention; (5) detection controls for                  and (iv) is directly connected (e.g., using
                                               category. With respect to the security                   unauthorized physical access to a                       Ethernet, serial, Universal Serial Bus, or
                                               subject matter areas covered under                       transient device; and (6) processes and                 wireless, including near field or
                                               proposed CIP–003–6, we believe that                      procedures for connecting transient                     Bluetooth communication) for 30
                                               NERC’s proposal is reasonable in                         devices to systems at different security                consecutive calendar days or less to a
                                               relation to the risk posed by Low Impact                 classification levels (i.e., High, Medium,              BES Cyber Asset, a network within an
                                               BES Cyber Systems, as well as the                        Low Impact).52                                          [Electronic Security Perimeter], or a
                                               diversity of systems captured by the                                                                             [Protected Cyber Asset].’’ NERC
                                                                                                        NERC Petition                                           explains that examples of Transient
                                               Low Impact category. Therefore, we
                                               propose to approve proposed Reliability                     35. In its Petition, NERC states that                Cyber Assets include but are not limited
                                               Standard CIP–003–6.                                      the revised CIP Reliability Standards                   to: Diagnostic test equipment, packet
                                                                                                        satisfy the Commission’s directive in                   sniffers, equipment used for BES Cyber
                                               C. Protection of Transient Devices                       Order No. 791 by requiring that                         System maintenance, equipment used
                                               Order No. 791                                            applicable entities: (1) Develop plans                  for BES Cyber System configuration or
                                                                                                        and implement cybersecurity controls to                 equipment used to perform
                                                  33. In Order No. 791, the Commission
                                                                                                        protect Transient Cyber Assets and                      vulnerability assessments, and may
                                               approved the proposed definition of
                                                                                                        Removable Media associated with their                   include devices or platforms such as
                                               BES Cyber Asset that provides, in part,
                                                                                                        High Impact and Medium Impact BES                       laptops, desktops or tablet computers
                                               that ‘‘[a] Cyber Asset is not a BES Cyber
                                                                                                        Cyber Systems and associated Protected                  which run applications that support
                                               Asset if, for 30 consecutive calendar
                                                                                                        Cyber Assets; and (2) train their                       BES Cyber Systems.55
                                               days or less, it is directly connected to
                                                                                                        personnel on the risks associated with                     38. NERC proposes to define the term
                                               a network within an [Electronic Security
                                                                                                        using Transient Cyber Assets and                        Removable Media as: ‘‘Storage media
                                               Perimeter], a Cyber Asset within an                      Removable Media. NERC states that the                   that (i) are not Cyber Assets, (ii) are
                                               [Electronic Security Perimeter], or to a                 purpose of the proposed revisions is to                 capable of transferring executable code,
                                               BES Cyber Asset, and it is used for data                 prevent unauthorized access to and use                  (iii) can be used to store, copy, move, or
                                               transfer, vulnerability assessment,                      of transient devices, mitigate the risk of              access data, and (iv) are directly
                                               maintenance, or troubleshooting                          vulnerabilities associated with                         connected for 30 consecutive calendar
                                               purposes.’’ 48 While the Commission                      unpatched software on transient                         days or less to a BES Cyber Asset, a
                                               had requested comment in the CIP                         devices, and mitigate the risk of the                   network within an [Electronic Security
                                               version 5 NOPR on whether the 30                         introduction of malicious code on                       Perimeter] or a Protected Cyber Asset.
                                               consecutive calendar day qualifier in                    transient devices. NERC explains that                   Examples include but are not limited to
                                               the proposed definition of BES Cyber                     the standard drafting team determined                   floppy disks, compact disks, USB flash
                                               Asset ‘‘could result in the introduction                 that the proposed requirements should                   drives, external hard drives and other
                                               of malicious code or new attack vectors                  only apply to transient devices                         flash memory cards/drives that contain
                                               to an otherwise trusted and protected                    associated with High and Medium                         nonvolatile memory.’’ 56
                                               system,’’ 49 the Commission concluded,                   Impact BES Cyber Systems, concluding                       39. NERC explains that proposed
                                               based on comments, that ‘‘it would be                    that ‘‘the application of the proposed                  Reliability Standard CIP–010–2,
                                               unduly burdensome to protect transient                   transient devices requirements to                       Requirement R4 requires entities to
                                               devices in the same manner as BES                        transient devices associated with low                   document and implement a plan for
                                               Cyber Assets because transient devices                   impact BES Cyber Systems was                            managing and protecting Transient
                                               are portable and frequently connected                    unnecessary, and likely                                 Cyber Assets and Removable Media in
                                               and disconnected from systems.’’ 50                      counterproductive, given the risks low                  order to protect BES Cyber Systems
                                                  34. While accepting the 30-day
                                                                                                        impact BES Cyber Systems present to                     from the risks associated with transient
                                               exemption in the BES Cyber Asset
                                                                                                        the Bulk Electric System.’’ 53                          devices. Specifically, Requirement R4
                                               definition, the Commission reiterated its                   36. NERC proposes to add two terms                   provides that ‘‘[e]ach responsible entity
                                               concern whether the provisions of the                    to the NERC Glossary, Transient Cyber                   for its high impact and medium impact
                                               CIP version 5 Standards ‘‘provide                        Asset and Removable Media, to clarify                   BES Cyber Systems and associated
                                               adequately robust protection from the
Lhorne on DSK7TPTVN1PROD with PROPOSALS




                                                                                                        the types of transient devices subject to               Protected Cyber Assets, shall
                                               risks posed by transient devices.’’ 51                   the CIP Reliability Standards. NERC also                implement, except under CIP
                                                 48 Order
                                                                                                        proposes to revise the definitions for                  Exceptional Circumstances, one or more
                                                           No. 791, 145 FERC ¶ 61,160 at P 132.
                                                 49 Version  5 Critical Infrastructure Protection
                                                                                                        BES Cyber Asset and Protected Cyber                     documented plans for Transient Cyber
                                               Reliability Standards, 143 FERC ¶ 61,055, at P 78        Asset to remove the 30-day exemption
                                               (2013) (CIP Version 5 NOPR).                                                                                       54 Id. at 36–37.
                                                 50 Order No. 791, 145 FERC ¶ 61,160 at P 133.               52 Id.
                                                                                                                  P 136.                                          55 Id. at 36.
                                                 51 Id. P 132.                                               53 NERC Petition at 34–35.                           56 Id. at 36.




                                          VerDate Sep<11>2014   15:08 Jul 21, 2015   Jkt 235001   PO 00000     Frm 00022   Fmt 4702   Sfmt 4702   E:\FR\FM\22JYP1.SGM   22JYP1


                                               43360                     Federal Register / Vol. 80, No. 140 / Wednesday, July 22, 2015 / Proposed Rules

                                               Assets and Removable Media that                             address the risks posed by transient                     D. Protection of Bulk Electric System
                                               include the sections in Attachment 1 [to                    devices used at Low Impact BES Cyber                     Communication Networks
                                               the proposed standard].’’ NERC                              Systems, including Low Impact control                    Order No. 791
                                               indicates that Attachment 1 does not                        centers, due to the limited applicability
                                               prescribe a standard method or set of                       of Requirement R4. We believe that this                     44. In Order No. 791, the Commission
                                               controls that each entity must                              omission may result in a gap in                          approved a revised definition of the
                                               implement to protect its transient                          protection for Low Impact BES Cyber                      NERC Glossary term Cyber Asset,
                                               devices, but rather requires responsible                    Systems. For example, malware inserted                   including the removal of the phrase
                                               entities to meet certain security                           via a USB flash drive at a single Low                    ‘‘communication networks.’’ In reaching
                                               objectives by implementing the controls                                                                              its decision, the Commission recognized
                                                                                                           Impact substation could propagate
                                               that the responsible entity determines                                                                               that maintaining the phrase
                                                                                                           through a network of many substations
                                               are necessary to meet its affirmative                                                                                ‘‘communication networks’’ in the
                                               obligation to protect BES Cyber                             without encountering a single security
                                                                                                                                                                    definition of ‘‘cyber asset’’ could cause
                                               Systems.57                                                  control under NERC’s proposal. In                        confusion and potentially complicate
                                                 40. NERC further explains that                            addition, we note that Low Impact                        implementation of the CIP version 5
                                               Attachment 1 to CIP–010–2,                                  security controls do not provide for the                 Standards ‘‘as many communication
                                               Requirement R4 requires a responsible                       use of mandatory anti-malware/                           network components, such as cabling,
                                               entity to adopt controls to address the                     antivirus protections within the Low                     cannot strictly comply with the CIP
                                               following areas: (1) Protections for                        Impact facilities, heightening the risk                  Reliability Standards.’’ 61
                                               Transient Cyber Assets managed by                           that malware or malicious code could                        45. However, while the Commission
                                               responsible entities; (2) protections for                   propagate through these systems                          approved the revised Cyber Asset
                                               Transient Cyber Assets managed by                           without being detected.                                  definition, the Commission also
                                               another party; and (3) protections for                         43. We do not believe that NERC has                   directed NERC to create a definition of
                                               Removable Media. NERC indicates that                                                                                 communication networks. Specifically,
                                                                                                           provided an adequate justification to
                                               these provisions reflect the standard                                                                                the Commission stated that ‘‘[t]he
                                                                                                           limit the applicability of Reliability
                                               drafting team’s recognition that the                                                                                 definition of communication networks
                                               security controls required for a                            Standard CIP–010–2. In its petition,
                                                                                                           NERC states that ‘‘the application of the                should define what equipment and
                                               particular transient device must account                                                                             components should be protected, in
                                               for (1) the functionality of that device                    proposed transient devices requirements
                                                                                                                                                                    light of the statutory inclusion of
                                               and (2) whether the responsible entity                      to transient devices associated with low
                                                                                                                                                                    communication networks for the
                                               or a third party manages the device.                        impact BES Cyber Systems was
                                                                                                                                                                    reliable operation of the Bulk-Power
                                               NERC also states that, because Transient                    unnecessary, and likely
                                                                                                                                                                    System.’’ 62
                                               Cyber Assets and Removable Media                            counterproductive, given the risks low                      46. The Commission also directed
                                               have different capabilities, they present                   impact BES Cyber Systems present to                      NERC to develop new or modified
                                               different levels of risk to the bulk                        the Bulk Electric System.’’ 59                           Reliability Standards to address the
                                               electric system.58                                          Essentially, NERC posits that resources                  reliability gap resulting from the
                                                                                                           are better placed in the protection of                   removal of the phrase ‘‘communication
                                               Discussion
                                                                                                           High and Medium Impact devices. The                      networks’’ from the Cyber Asset
                                                  41. Based on our review, proposed                        burden of expanding the applicability of                 definition. Specifically, the Commission
                                               Reliability Standard CIP–010–2 appears                      Reliability Standard CIP–010–2 to                        found that a gap in protection may exist
                                               to provide a satisfactory level of security                 transient devices at Low Impact BES                      since the CIP version 5 Standards ‘‘do
                                               for transient devices used at High and                      Cyber Systems, however, is not clear                     not address security controls needed to
                                               Medium Impact BES Cyber Systems. As
                                                                                                           from the information in the record. Nor                  protect the nonprogrammable
                                               described above, proposed Reliability
                                                                                                           is it clear what information and analysis                components of communication
                                               Standard CIP–010–2, Requirement R4
                                                                                                           led NERC to conclude that the                            networks.’’ 63 The Commission
                                               addresses the following security
                                                                                                           application of the transient device                      explained that the new or modified
                                               elements: (1) Device authorization; (2)
                                                                                                           requirements to Low Impact BES Cyber                     Reliability Standards should require
                                               software authorization; (3) security
                                                                                                           Systems ‘‘was unnecessary.’’ 60                          appropriate and reasonable controls to
                                               patch management; (4) malware
                                                                                                           Therefore, we direct NERC to provide                     protect the non-programmable aspects
                                               prevention; and (5) unauthorized use.
                                                                                                           additional information supporting the                    of communication networks.64 The
                                               The proposed security controls, taken
                                                                                                           proposed limitation in Reliability                       Commission provided examples of other
                                               together, constitute a reasonable
                                                                                                           Standard CIP–010–2 to High and                           relevant information security standards
                                               approach to address the reliability
                                                                                                           Medium Impact BES Cyber Systems.                         that address the protection of the
                                               objectives outlined by the Commission
                                                                                                           Depending on the information provided,                   nonprogrammable aspects of
                                               in Order No. 791. The proposed security
                                                                                                                                                                    communication networks by requiring,
                                               controls outlined in Attachment 1                           we may direct NERC to address the
                                                                                                                                                                    among other things, locked wiring
                                               should ensure that responsible entities                     potential reliability gap by developing a
                                                                                                                                                                    closets, disconnected or locked spare
                                               apply multiple security controls to                         solution, which could include
                                                                                                                                                                    jacks, protection of cabling by conduit
                                               provide defense-in-depth protection to                      modifying the applicability section of                   or cable trays, or generally emphasizing
                                               transient devices (i.e., transient cyber                    CIP–010–2, Requirement R4 to include                     the protection of communication
                                               assets and removable media) in the High                     Low Impact BES Cyber Systems, that                       network cabling from interception or
Lhorne on DSK7TPTVN1PROD with PROPOSALS




                                               and Medium Impact BES Cyber System                          effectively addresses, and is                            damage.65
                                               environments.                                               appropriately tailored to address, the
                                                  42. We are concerned, however, that                      risks posed by transient devices to Low                    61 Order   No. 791, 145 FERC ¶ 61,160 at P 148.
                                               NERC’s proposed revisions do not                            Impact BES Cyber Systems.                                  62 Id.  P 150.
                                               provide adequate security controls to                                                                                   63 Id. P 149.
                                                                                                                                                                       64 Id. P 150.
                                                 57 Id.                                                         59 NERC   Petition at 34–35.
                                                          at 37.                                                                                                       65 Id. P 149 (referencing NIST SP 800–53 Revision
                                                 58 Id.   at 38.                                                60 Id.                                              3, security control family Physical and



                                          VerDate Sep<11>2014      15:08 Jul 21, 2015   Jkt 235001   PO 00000     Frm 00023    Fmt 4702   Sfmt 4702   E:\FR\FM\22JYP1.SGM   22JYP1


                                                                      Federal Register / Vol. 80, No. 140 / Wednesday, July 22, 2015 / Proposed Rules                                                       43361

                                               NERC Petition                                            Requirement R1, Part 1.10 provides that,                   already requires logical protections for
                                                  47. In its petition, NERC states that                 for High and Medium Impact BES Cyber                       communications between discrete
                                               the standard drafting team concluded                     Systems and their associated Protected                     Electronic Security Perimeters.73
                                               that it did not need to create a new                     Cyber Assets, responsible entities must                       52. In addition, NERC asserts that the
                                               definition for communication networks                    restrict physical access to cabling and                    proposed Reliability Standards will
                                               to address the Commission’s concerns.                    other nonprogrammable communication                        strengthen the defense-in-depth
                                               NERC explains that the term                              components used for connection                             approach by further minimizing the
                                               communication network ‘‘is generally                     between covered Cyber Assets within                        ‘‘attack surface’’ of BES Cyber Systems.
                                               understood to encompass both                             the same Electronic Security Perimeter                     NERC also clarifies that the standard
                                               programmable and nonprogrammable                         in those instances when such cabling                       drafting team limited the applicability
                                               components (i.e., a communication                        and components are located outside of                      in this manner to clarify that
                                               network includes computer peripherals,                   a Physical Security Perimeter. NERC                        responsible entities are not responsible
                                               terminals, and databases as well as                      explains further that, where physical                      for protecting nonprogrammable
                                               communication mediums such as                            access restrictions to such cabling and                    communication components outside of
                                               wires).’’ 66 Therefore, NERC concludes                   components are not feasible, Part 1.10                     the responsible entity’s control (i.e.,
                                               that any proposed definition of                          provides that the responsible entity                       components of a telecommunication
                                               communication network ‘‘would need                       must document and implement                                carrier’s network).74
                                               to be sufficiently broad to encompass all                encryption of data transmitted over such                   Discussion
                                               components in a communication                            cabling and components and/or monitor
                                                                                                        the status of the communication link                          53. We believe that NERC’s proposed
                                               network as they exist now and in the                                                                                alternative approach to addressing the
                                               future.’’ 67 NERC explains that, based on                composed of such cabling and
                                                                                                        components. Further, pursuant to Part                      Commission’s Order No. 791 directive
                                               that conclusion, the standard drafting                                                                              regarding the definition of
                                               team identified the types of equipment                   1.10, a responsible entity must issue an
                                                                                                        alarm or alert in response to detected                     communication networks adequately
                                               and components that responsible                                                                                     addresses part of the underlying
                                               entities must protect, and developed                     communication failures to the personnel
                                                                                                        identified in the BES Cyber Security                       concerns set forth in Order No. 791.
                                               reasonable controls to secure those                                                                                 Proposed Reliability Standard CIP–006–
                                               components based on the risk they pose                   Incident response plan within 15
                                                                                                        minutes of detection, or implement an                      6, Requirement R1.10 specifies the types
                                               to the bulk electric system, rather than                                                                            of assets subject to mandatory
                                               develop a specific definition.                           equally effective logical protection.71
                                                                                                           50. NERC states that proposed                           protection by using the existing
                                                  48. NERC states that the revised CIP                                                                             definitions of Electronic Security
                                               Reliability Standards, as proposed,                      Reliability Standard CIP–006–6
                                                                                                        provides flexibility for responsible                       Perimeter 75 and Physical Security
                                               address the ultimate security objective                                                                             Perimeter.76 Proposed Reliability
                                               of protecting both the programmable                      entities to implement the physical
                                                                                                        security measures that best suit their                     Standard CIP–006–6 addresses
                                               and nonprogrammable components of                                                                                   protection for non-programmable
                                               communication networks.68 NERC                           needs and to account for configurations
                                                                                                        where logical measures are necessary                       components of communication
                                               explains that the proposed standards                                                                                networks, such as network cabling and
                                                                                                        because the entity cannot implement
                                               include protections for cables and other                                                                            switches, that are located within the
                                                                                                        physical access restrictions effectively.
                                               nonprogrammable components of                                                                                       same Electronic Security Perimeter, but
                                                                                                        Responsible entities have the discretion
                                               communication networks through                                                                                      span separate Physical Security
                                                                                                        as to the type of physical or logical
                                               proposed Reliability Standard CIP–006–                                                                              Perimeters. Specifically, proposed
                                                                                                        protections to implement pursuant to
                                               6, Requirement R1, Part 1.10, which                                                                                 Reliability Standard CIP–006–6 requires
                                                                                                        Part 1.10, provided that the protections
                                               augments the existing protections for                                                                               responsible entities to restrict physical
                                                                                                        are designed to meet the overall security
                                               programmable communication                                                                                          access to cabling and other
                                                                                                        objective. According to NERC, the
                                               components by requiring entities to                                                                                 nonprogrammable communication
                                                                                                        protections required by Part 1.10 will
                                               implement various security controls to                                                                              components between BES Cyber Assets
                                                                                                        reduce the possibility of tampering and
                                               restrict and manage physical access to                   the likelihood that ‘‘man-in-the-middle’’                  within the same Electronic Security
                                               Physical Security Perimeters.69 NERC                     attacks could compromise the integrity                     Perimeter in those instances when such
                                               further states that the standard drafting                of BES Cyber Systems or Protected                          cabling and components are located
                                               team focused on nonprogrammable                          Cyber Assets at control centers with                       outside of a Physical Security Perimeter.
                                               communication components at control                      High or Medium Impact BES Cyber                            Where physical access restrictions to
                                               centers with High or Medium Impact                       Systems.72                                                 such cabling and components is not
                                               BES Cyber Systems because those                             51. NERC explains that proposed Part                    feasible, Part 1.10 provides that
                                               locations present a heightened risk to                   1.10 applies only to nonprogrammable                       responsible entities must document and
                                               the Bulk-Power System, warranting the                    components outside of a Physical                           implement encryption of data
                                               increased protections.70                                 Security Perimeter because                                 transmitted over such cabling and
                                                  49. NERC explains that proposed                       nonprogrammable components located                         components, monitor the status of the
                                               Reliability Standard CIP–006–6,                          within a Physical Security Perimeter are
                                                                                                        already subject to physical security                         73 Id.at 49.
                                               Environmental Protection, Annex 2, page 54; BSI                                                                       74 Id.at 51.
                                               ISO/IEC (2005). Information technology—Security          protections by virtue of their location.
                                                                                                                                                                     75 Electronic Security Perimeter: The logical
                                               techniques—Information security management               NERC further states that Part 1.10 only
                                                                                                                                                                   border surrounding a network to which Critical
Lhorne on DSK7TPTVN1PROD with PROPOSALS




                                               systems—Requirements (ISO/IEC                            applies to nonprogrammable                                 Cyber Assets are connected and for which access is
                                               27001:2005).British Standards Institute).                components used for connection
                                                 66 NERC Petition at 52 (citing North American
                                                                                                                                                                   controlled. See NERC Glossary at 33.
                                               Electric Reliability Corp., 142 FERC ¶ 61,203, at PP
                                                                                                        between applicable Cyber Assets within                       76 Physical Security Perimeter: The physical,

                                                                                                        the same Electronic Security Perimeter                     completely enclosed (‘‘six-wall’’) border
                                               13–14 (2013)).
                                                                                                                                                                   surrounding computer rooms, telecommunications
                                                 67 Id. at 52.                                          because Reliability Standard CIP–005–5                     rooms, operations centers, and other locations in
                                                 68 Id.
                                                                                                                                                                   which Critical Cyber Assets are housed and for
                                                 69 Id. at 52–53.                                            71 Id.   at 48–49.                                    which access is controlled. See NERC Glossary at
                                                 70 Id. at 48.                                               72 Id.   at 49–50.                                    60.



                                          VerDate Sep<11>2014   15:08 Jul 21, 2015   Jkt 235001   PO 00000     Frm 00024      Fmt 4702   Sfmt 4702   E:\FR\FM\22JYP1.SGM   22JYP1


                                               43362                  Federal Register / Vol. 80, No. 140 / Wednesday, July 22, 2015 / Proposed Rules

                                               communication link composed of such                      operation of their control areas. In other              encryption as a logical control for any
                                               cabling and components, or implement                     words, revised Reliability Standard CIP–                inter-Control Center communications,
                                               an equally effective logical protection.                 006–6, Requirement R1 provides                          our understanding is that other logical
                                                  54. We propose to accept NERC’s                       mandatory protection against: (1)                       protections are available, and we seek
                                               proposed omission of a definition of                     Physical attacks on nonprogrammable                     comment on this point.
                                               communication networks based on                          equipment; (2) man-in-the-middle                          60. Further, as discussed at the April
                                               NERC’s explanation that responsible                      attacks; and (3) session hijacking attacks              29, 2014 technical conference, panelists
                                               entities must develop controls to secure                 within the confines of a bulk electric                  identified suggestions that could be
                                               the non-programmable components of                       system Control Center, but does not                     explored to enhance protections for
                                               communication networks based on the                      extend protections to real-time data                    remote access, including the addition of
                                               risk they pose to the bulk electric                      passing between Control Centers outside                 logical or physical controls to provide
                                               system, rather than develop a specific                   of a facility.                                          additional network segmentation behind
                                               definition of communication networks                        57. Comments from participants at the                the intermediate systems. For example,
                                               to identify assets for protection. NERC’s                April 29, 2014 Technical Conference                     the Commission is interested in
                                               proposal is an equally efficient and                     suggest that the Commission should                      comments that address the value
                                               effective solution to the Commission’s                   take action to ensure the confidentiality,              achieved if the CIP standards were to
                                               directive in Order No. 791 that NERC                     integrity, and availability of sensitive                require the incorporation of additional
                                               develop a definition of communication                    bulk electric system data when it is in                 network segmentation controls,
                                               networks, subject to the proposed                        motion both inside and outside of an                    connection monitoring, and session
                                               modification discussed below.                            Electronic Security Perimeter.78 We                     termination controls behind responsible
                                                  55. NERC’s proposed solution for the                  understand that inter-Control Center                    entity intermediate systems. We seek
                                               protection of nonprogrammable                            communications play a vital role in                     comment on whether these or other
                                               components of communication                              maintaining bulk electric system                        steps to improve remote access
                                               networks, however, does not fully meet                   reliability and, as a result, we believe                protection are needed, and whether the
                                               the intent of the Commission’s Order                     that the communication links and data                   adoption of any additional security
                                               No. 791 directive, resulting in a gap in                 used to control and monitor the bulk                    controls addressing this topic would
                                               security for bulk electric system                        electric system should receive                          provide substantial reliability and
                                               communication systems. While the                         protection under the CIP Reliability                    security benefits.
                                               technical substance of CIP–006–6,                        Standards.
                                               Requirement R1, Part 1.10 appears to be                     58. We also recognize that third party               E. Risks Posed by Lack of Controls for
                                               adequate, we are concerned that the                      communication infrastructure (e.g.,                     Supply Chain Management
                                               limited applicability of the provision                   facilities owned by a                                      61. The information and
                                               results in limited protection for the                    telecommunications company) cannot                      communications technology and
                                               nonprogrammable components of the                        necessarily be physically protected by                  industrial control system supply chains
                                               communication systems at issue.                          responsible entities. This fact, however,               provide hardware, software and
                                               Specifically, proposed CIP–006–6,                        does not alleviate the need to protect                  operations support for computer
                                               Requirement R1, Part 1.10 would only                     reliability data that traverses third party             networks. Such supply chains are
                                               apply to nonprogrammable components                      communication infrastructure. Proposed                  complex, globally distributed and
                                               of communication networks within the                     Reliability Standard CIP–006–6,                         interconnected systems that have
                                               same Electronic Security Perimeter,                      Requirement R1, Part 1.10 mandates                      geographically diverse routes and
                                               excluding from protection other                          that logical controls, such as encryption               consist of multiple tiers of outsourcing.
                                               programmable and non-programmable                        and connection link monitoring, be                      The supply chain includes public and
                                               communication network components                         applied to cabling and components that                  private sector entities that depend on
                                               that may exist outside of a discrete                     cannot be physically restricted by the                  each other to develop, integrate, and use
                                               Electronic Security Perimeter.                           responsible entity. However, similar                    information and communications
                                                  56. While NERC asserts that this                      protections are not afforded to                         technology and industrial control
                                               limitation is justified by the controls                  communications and data leaving bulk                    system supply chain products and
                                               required under Reliability Standard                      electric system Control Centers where                   services. Thus, the supply chain
                                               CIP–005–5, NERC’s position does not                      they may be intercepted and altered                     provides the opportunity for significant
                                               appear to consider that the controls set                 while traversing communication                          benefits to customers, including low
                                               forth in Reliability Standard CIP–005–5                  networks.                                               cost, interoperability, rapid innovation,
                                               are limited to interactive remote access                    59. Therefore, pursuant to section                   a variety of product features and choice.
                                               into an Electronic Security Perimeter,                   215(d)(5) of the FPA, we propose to                        62. However, the global supply chain
                                               and can only be applied on                               direct NERC to develop a modification                   also enables opportunities for
                                               programmable electronic devices and                      to proposed Reliability Standard CIP–                   adversaries to directly or indirectly
                                               data that exists within an Electronic                    006–6 to require responsible entities to                affect the management or operations of
                                               Security Perimeter.77 This limitation                    implement controls to protect, at a                     companies that may result in risks to the
                                               would exclude communication network                      minimum, all communication links and                    end user. Supply chain risks may
                                               components that may be necessary to                      sensitive bulk electric system data                     include the insertion of counterfeits,
                                               facilitate the automated transmission of                 communicated between all bulk electric                  unauthorized production, tampering,
                                               reliability data between bulk electric                   system Control Centers. This includes                   theft, or insertion of malicious software,
Lhorne on DSK7TPTVN1PROD with PROPOSALS




                                               system Control Centers in discrete                       communication between two (or more)                     as well as poor manufacturing and
                                               Electronic Security Perimeters and                       Control Centers, but not between a                      development practices. To address these
                                               would also exclude real time monitoring                  Control Center and non-Control Center                   risks, NIST developed SP 800–161 79 to
                                               data that is used by Reliability                         facilities such as substations. Also, if                  79 NIST SP 800–161, Supply Chain Risk
                                               Coordinators to monitor and assess the                   latency concerns mitigate against use of                Management Practices for Federal Information
                                                                                                                                                                Systems and Organizations (April 2015), available
                                                 77 See Reliability Standard CIP–005–5 (Electronic        78 See Transcript at pp. 19, 24, 74–75 (Kevin Perry   at: http://nvlpubs.nist.gov/nistpubs/
                                               Security Perimeters), Requirement R2.                    speaking), 79 (Mikhail Falkovich speaking).             SpecialPublications/NIST.SP.800-161.pdf.



                                          VerDate Sep<11>2014   15:08 Jul 21, 2015   Jkt 235001   PO 00000   Frm 00025   Fmt 4702   Sfmt 4702   E:\FR\FM\22JYP1.SGM   22JYP1


                                                                      Federal Register / Vol. 80, No. 140 / Wednesday, July 22, 2015 / Proposed Rules                                                   43363

                                               provide guidance and controls that can                   supply chain and the future acquisition               standard achieves that goal (the
                                               be used to comply with Federal                           of products and services.                             ‘‘how’’).85
                                               Information Processing Standard 199                         65. Since security controls for supply                • Given the types of specialty
                                               Standards for Security Categorization of                 chain management will likely vary                     products involved and diversity of
                                               Federal Information and Information                      greatly with each responsible entity due              acquisition processes, the standard may
                                               Systems for Federal Government                           to variations in individual business                  need to allow exceptions, e.g., to meet
                                               Information Systems.80 Similarly, the                    practices, the right set of supply chain              safety requirements and fill operational
                                               Department of Energy has developed                       management security controls should                   gaps if no secure products are available.
                                               guidance on cybersecurity procurement                                                                             • Provide enough specificity so that
                                                                                                        accommodate for, among other things,
                                               language for energy delivery systems.81                                                                        compliance obligations are clear and
                                                                                                        an entity’s: (1) Procurement process; (2)
                                                 63. While the Commission did not                                                                             enforceable. In particular, we anticipate
                                                                                                        vendor relations; (3) system
                                               address supply chain management in                                                                             that a reliability standard that simply
                                                                                                        requirements; (4) information
                                               Order No. 791, changes in the bulk                                                                             requires a registered entity to ‘‘have a
                                                                                                        technology implementation; and (5)
                                               electric system cyber threat landscape                                                                         plan’’ addressing supply chain
                                                                                                        privileged commercial or financial
                                               identified through recent malware                                                                              management would not suffice. Rather,
                                                                                                        information. The following Supply
                                               campaigns targeting supply chain                                                                               to adequately address our concerns, we
                                                                                                        Chain Risk Management controls from
                                               vendors have highlighted a gap in the                                                                          believe that a reliability standard should
                                                                                                        NIST SP 800–161 may be instructional
                                               protections under the CIP Standards.                                                                           identify specific controls. As discussed
                                                                                                        in the development of any new
                                               Specifically, in 2014, after Order No.                                                                         above, NIST SP 800–161 may be
                                                                                                        reliability standard to address this
                                               791 was issued, the Industry Control                                                                           instructional in identifying appropriate
                                                                                                        security topic: 83 (1) Access Control
                                               System—Computer Emergency                                                                                      controls in the development of an
                                               Readiness Team (ICS–CERT) reported                       Policy and Procedures; (2) Security                   effective supply chain management
                                               on two focused malware campaigns.82                      Assessment Authorization; (3)                         reliability standard.
                                                                                                        Configuration Management; (4)                            We recognize that developing a
                                               This new type of malware campaign is
                                                                                                        Identification and Authentication; (5)                supply chain management standard
                                               based on the injection of malware while
                                                                                                        System Maintenance Policy and                         would likely be a significant
                                               a product or service remains in the
                                                                                                        Procedures; (6) Personnel Security                    undertaking and require extensive
                                               control of the hardware or software
                                                                                                        Policy and Procedures; (7) System and                 engagement with stakeholders to define
                                               vendor, prior to delivery to the
                                                                                                        Services Acquisition; (8) Supply Chain                the scope, content, and timing of the
                                               customer.
                                                 64. We believe that it is reasonable to                Protection; and (9) Component                         standard. Accordingly, to further that
                                               direct NERC to develop a new or                          Authenticity.84                                       stakeholder engagement, we seek
                                               modified Reliability Standard to provide                    66. Therefore, pursuant to section                 comment on this proposal, including:
                                               security controls for supply chain                       215(d)(5) of the FPA, we propose to                   (1) The general proposal to direct that
                                               management for industrial control                        direct NERC to develop a new reliability              NERC develop a Reliability Standard to
                                               system hardware, software, and                           standard or modified reliability                      address supply chain management; (2)
                                               computing and networking services                        standard to provide security controls for             the anticipated features of, and
                                               associated with bulk electric system                     supply chain management for industrial                requirements that should be included
                                               operations. The reliability goal should                  control system hardware, software, and                in, such a standard; and (3) a reasonable
                                               be to create a forward-looking, objective-               services associated with bulk electric                timeframe for development of a
                                               driven standard that encompasses                         system operations. In addition to the                 standard. We also direct staff, after
                                               activities in the system development life                parameters discussed above, due to the                receipt and consideration of those
                                               cycle: from research and development,                    broadness of the topic and the                        comments, to engage in additional
                                               design and manufacturing stages (where                   individualized nature of many aspects                 outreach to further the Commission’s
                                               applicable), to acquisition, delivery,                   of supply chain management, we                        consideration of the need for, and scope,
                                               integration, operations, retirement, and                 anticipate that a Reliability Standard                content, and timing of, a supply chain
                                               eventual disposal of the Registered                      pertaining to supply chain management                 management standard.
                                               Entity’s information and                                 security would:
                                                                                                                                                              F. Proposed Definitions
                                               communications technology and                               • Respect section 215 jurisdiction by
                                               industrial control system supply chain                   only addressing the obligations of                      67. The proposed revised CIP
                                               equipment and services. The standard                     registered entities. A reliability standard           Reliability Standards include six new or
                                               should support and ensure security,                      should not directly impose obligations                revised definitions for inclusion in the
                                               integrity, quality, and resilience of the                on suppliers, vendors or other entities               NERC glossary. NERC’s proposal
                                                                                                        that provide products or services to                  includes four new definitions and two
                                                  80 Federal Information Processing Standard
                                                                                                        registered entities.                                  revised definitions. Specifically, NERC
                                               Publication, Standards for Security Categorization                                                             seeks approval for the following terms:
                                               of Federal Information and Information Systems,             • Be forward-looking in the sense that             (1) BES Cyber Asset; (2) Protected Cyber
                                               available at: http://csrc.nist.gov/publications/fips/    the reliability standard should not                   Asset; (3) Low Impact Electronic Access
                                               fips199/FIPS-PUB-199-final.pdf.                          dictate the abrogation or re-negotiation
                                                  81 Cybersecurity Procurement Language for                                                                   Point; (4) Low Impact External Routable
                                               Energy Delivery Systems, April 2014 at page 1.
                                                                                                        of currently-effective contracts with                 Connectivity; (5) Removable Media; and
                                               http://www.energy.gov/sites/prod/files/2014/04/f15/      vendors, suppliers or other entities.                 (6) Transient Cyber Asset. We propose
                                               CybersecProcurementLanguage-                                • Recognize the individualized nature              to approve the proposed definitions for
                                               EnergyDeliverySystems_040714_fin.pdf.
Lhorne on DSK7TPTVN1PROD with PROPOSALS




                                                  82 ICS–CERT is a division of the Department of        of many aspects of supply chain                       inclusion in the NERC Glossary. We also
                                               Homeland Security that works to reduce risks             management by setting goals (the                      seek comment on certain aspects of the
                                               within and across all critical infrastructure sectors    ‘‘what’’), while allowing flexibility in              proposed definition for Low Impact
                                               by partnering with law enforcement agencies and          how a registered entity subject to the                External Routable Connectivity, as
                                               the intelligence community. See https://ics-cert.us-
                                               cert.gov/alerts/ICS-ALERT-14-176-02A; and https://                                                             discussed below. After receiving
                                                                                                          83 The listed controls do not reflect a
                                               ics-cert.us-cert.gov/alerts/ICS-ALERT-14-281-01B
                                               for ‘‘alert’’ information on supply chain malware        comprehensive scope of the proposed standard.           85 See Order No. 672, FERC Stats. & Regs.

                                               campaigns.                                                 84 See NIST SP 800–161.                             ¶ 31,204 at P 260.



                                          VerDate Sep<11>2014   15:08 Jul 21, 2015   Jkt 235001   PO 00000   Frm 00026   Fmt 4702   Sfmt 4702   E:\FR\FM\22JYP1.SGM   22JYP1


                                               43364                  Federal Register / Vol. 80, No. 140 / Wednesday, July 22, 2015 / Proposed Rules

                                               comments, depending on the adequacy                      the proposed CIP Reliability Standards,                    009–5, CIP–010–1 and CIP–011–1
                                               of the explanations provided in                          hindering the adoption of effective                        become effective on the effective date of
                                               response to our questions, we may                        security controls for Low Impact BES                       the proposed Reliability Standards.90
                                               direct NERC to develop modifications to                  Cyber Assets. Depending upon the                             73. We propose to approve NERC’s
                                               this definition to eliminate ambiguities                 responses received, we may direct                          implementation plan for the proposed
                                               and assure that the revised CIP                          NERC to develop a modification to the                      CIP Reliability Standards, as described
                                               Reliability Standards provide adequate                   definition of Low Impact External                          above.
                                               protection for the bulk electric system.                 Routable Connectivity.                                     H. Violation Risk Factor/Violation
                                               Definition—Low Impact External                           G. Implementation Plan                                     Severity Level Assignments
                                               Routable Connectivity                                       71. NERC’s proposed implementation                         74. NERC requests approval of the
                                                 68. In its petition, NERC proposes the                 plan for the proposed Reliability                          violation risk factors and violation
                                               following definition for Low Impact                      Standards is designed to match the                         severity levels assigned to the proposed
                                               External Routable Connectivity:                          effective dates of the proposed                            Reliability Standards. Specifically,
                                                                                                        Reliability Standards with the effective                   NERC requests approval of 19 violation
                                                 Direct user-initiated interactive access or a
                                               direct device-to-device connection to a low              dates of the prior versions of the related                 risk factor and violation severity level
                                               impact BES Cyber System(s) from a Cyber                  Reliability Standards under the                            assignments associated with the
                                               Asset outside the asset containing those low             implementation plan of the CIP version                     proposed Reliability Standards.91 We
                                               impact BES Cyber System(s) via a                         5 Standards. NERC states that the                          propose to accept these violation risk
                                               bidirectional routable protocol connection.              purpose of this approach is to provide                     factors and violation severity levels.
                                               Point-to-point communications between                    regulatory certainty by limiting the time,
                                               intelligent electronic devices that use                                                                             III. Information Collection Statement
                                                                                                        if any, that the CIP version 5 Standards
                                               routable communication protocols for time-                                                                             75. The FERC–725B information
                                                                                                        with the ‘‘identify, assess, and correct’’
                                               sensitive protection or control functions                                                                           collection requirements contained in
                                               between Transmission station or substation               language would be effective.
                                                                                                        Specifically, pursuant to the CIP version                  this Proposed Rule are subject to review
                                               assets containing low impact BES Cyber
                                               Systems are excluded from this definition                5 implementation plan, the effective                       by the Office of Management and
                                               (examples of this communication include.                 date of each of the CIP version 5                          Budget (OMB) under section 3507(d) of
                                               but are not limited to, IEC 61850 GOOSE or               Standards is April 1, 2016, except for                     the Paperwork Reduction Act of 1995.92
                                               vendor proprietary protocols).86                         the effective date for Requirement R2 of                   OMB’s regulations require approval of
                                                  69. NERC explains that the proposed                   CIP–003–5, which is April 1, 2017.                         certain information collection
                                               definition describes the scenarios where                 Consistent with those dates, the                           requirements imposed by agency
                                               responsible entities are required to                     proposed implementation plan provides                      rules.93 Upon approval of a collection of
                                                                                                        that: (1) each of the proposed reliability                 information, OMB will assign an OMB
                                               apply Low Impact access controls under
                                                                                                        Standards shall become effective on the                    control number and expiration date.
                                               Reliability Standard CIP–003–6,
                                                                                                        later of April 1, 2016 or the first day of                 Respondents subject to the filing
                                               Requirement R2 to their Low Impact
                                                                                                        the first calendar quarter that is three                   requirements of this rule will not be
                                               assets. Specifically, if Low Impact
                                                                                                        months after the effective date of the                     penalized for failing to respond to these
                                               External Routable Connectivity is used,
                                                                                                        Commission’s order approving the                           collections of information unless the
                                               a responsible entity must implement a
                                                                                                        proposed Reliability Standard; and (2)                     collections of information display a
                                               Low Impact Electronic Access Point to
                                                                                                        responsible entities will not have to                      valid OMB control number. The
                                               permit only necessary inbound and
                                                                                                        comply with the requirements                               Commission solicits comments on the
                                               outbound bidirectional routable
                                                                                                        applicable to Low Impact BES Cyber                         Commission’s need for this information,
                                               protocol access.87                                                                                                  whether the information will have
                                                  70. We seek comment on the                            Systems (CIP–003–6, Requirement R1,
                                                                                                        Part 1.2 and Requirement R2) until                         practical utility, the accuracy of the
                                               following aspects of the proposed
                                                                                                        April 1, 2017.89                                           burden estimates, ways to enhance the
                                               definition. First, we seek comment on
                                                                                                           72. NERC’s proposed implementation                      quality, utility, and clarity of the
                                               the purpose of the meaning of the term
                                                                                                        plan also includes effective dates for the                 information to be collected or retained,
                                               ‘‘direct’’ in relation to the phrases
                                                                                                        new and modified definitions associated                    and any suggested methods for
                                               ‘‘direct user-initiated interactive access’’
                                                                                                        with: (1) transient devices (i.e., BES                     minimizing respondents’ burden,
                                               and ‘‘direct device-to-device
                                                                                                        Cyber Asset, Protected Cyber Asset,                        including the use of automated
                                               connection’’ within the proposed                                                                                    information techniques.
                                               definition. In addition, we seek                         Removable Media, and Transient Cyber
                                                                                                        Asset); and (2) Low Impact controls (i.e.,                    76. The Commission based its
                                               comment on the implementation of the                                                                                paperwork burden estimates on the
                                               ‘‘layer 7 application layer break’’                      Low Impact Electronic Access Point and
                                                                                                        Low Impact External Routable                               changes in paperwork burden presented
                                               contained in certain reference diagrams                                                                             by the proposed CIP Reliability
                                               in the Guidelines and Technical Basis                    Connectivity). Specifically, NERC
                                                                                                        proposes: (1) That the definitions                         Standards as compared to the CIP
                                               section of proposed Reliability Standard                                                                            version 5 Standards. The Commission
                                               CIP–003–6.88 It appears that guidance                    associated with transient device become
                                                                                                        effective on the compliance date for                       has already addressed the burden of
                                               provided in the Guidelines and                                                                                      implementing the CIP version 5
                                               Technical Basis section of the proposed                  Reliability Standard CIP–010–2,
                                                                                                        Requirement R4; and (2) that the                           Standards.94 As discussed above, the
                                               standard may conflict with the plain                                                                                immediate rulemaking addresses four
                                               reading of the term ‘‘direct.’’ We are                   definitions addressing the Low Impact
                                                                                                                                                                   areas of modification to the CIP
Lhorne on DSK7TPTVN1PROD with PROPOSALS




                                               concerned that a conflict in the reading                 controls become enforceable on the
                                                                                                        compliance date for Reliability Standard                   standards: (1) Removal of the ‘‘identify.
                                               of the term ‘‘direct’’ could lead to
                                               complications in the implementation of                   CIP–003–6, Requirement R2. Lastly,                           90 Id.at 56.
                                                                                                        NERC proposes that the retirement of                         91 Id.,Exhibit E.
                                                 86 NERC   Petition at 28.                              Reliability Standards CIP–003–5, CIP–                        92 44 U.S.C. 3507(d).
                                                 87 Id.at 29.                                           004–5.1, CIP–006–5, CIP–007–5, CIP–                          93 5 CFR 1320.11 (2012).
                                                 88 See CIP–003–6 Guidelines and Technical Basis                                                                     94 See Order No. 791, 145 FERC ¶ 61,160 at PP

                                               Section, Reference Model 6 at p. 39.                          89 Id.   at 53–54.                                    226–244.



                                          VerDate Sep<11>2014   15:08 Jul 21, 2015   Jkt 235001   PO 00000     Frm 00027      Fmt 4702   Sfmt 4702   E:\FR\FM\22JYP1.SGM   22JYP1


                                                                              Federal Register / Vol. 80, No. 140 / Wednesday, July 22, 2015 / Proposed Rules                                                                  43365

                                               assess, and correct’’ language from 17                                     NERC’s compliance function. The                                are subject to mandatory compliance
                                               CIP requirements; (2) development of                                       development of controls to protect                             with Reliability Standards. Of this total,
                                               enhanced security controls for low                                         transient devices and protection of                            we estimate that 1,363 entities will face
                                               impact assets; (3) development of                                          communication networks (as proposed                            an increased paperwork burden under
                                               controls to protect transient devices (e.g.                                by NERC) have associated reporting                             the proposed CIP Reliability Standards,
                                               thumb drives and laptop computers);                                        burdens that will affect a limited                             and we estimate that a majority of these
                                               and (4) protection of communications                                       number of entities, i.e., those with                           entities will have one or more Low
                                               networks. We do not anticipate that the                                    Medium and High Impact BES Cyber                               Impact assets. In addition, we estimate
                                               removal of the ‘‘identify, assess and                                      Systems. The enhanced security                                 that approximately 23 percent of the
                                               correct’’ language will impact the                                         controls for Low Impact assets are likely                      entities have assets that will be subject
                                               reporting burden, as the substantive                                       to impose a reporting burden on a much                         to Reliability Standards CIP–006–6 and
                                               compliance requirements would remain                                       larger group of entities.                                      CIP–010–2. Based on these assumptions,
                                               the same, while NERC indicates that the                                       77. The NERC Compliance Registry,
                                               concept behind the deleted language                                        as of June 2015, identifies                                    we estimate the following reporting
                                               continues to be implemented within                                         approximately 1,435 U.S. entities that                         burden:

                                                                                                                                                                                       Total burden       Total burden    Total burden
                                                                                                                                                                       Number of
                                                                                          Registered entities                                                                          hours in year      hours in year   hours in year
                                                                                                                                                                        entities             1                  2               3

                                               Entities subject to CIP–006–6 and CIP–010–2 with Medium and/or High Im-
                                                 pact Assets ...................................................................................................                 313             75,120        130,208         130,208

                                                     Totals ........................................................................................................             313             75,120        130,208         130,208



                                                 78. The following shows the annual                                         • Years 2 and 3: 313 entities × 416                          collection burden. Further, the estimate
                                               cost burden for each group, based on the                                   hours/entity * $76/hour = $9,895,808                           reflects the assumption that costs
                                               burden hours in the table above:                                           per year.                                                      incurred in year 1 will pertain to policy
                                                                                                                            • The paperwork burden estimate                              development, while costs in years 2 and
                                                 • Year 1: Entities subject to CIP–006–
                                                                                                                          includes costs associated with the initial                     3 will reflect the burden associated with
                                               6 and CIP–010–2 with Medium and/or
                                                                                                                          development of a policy to address                             maintaining logs and other records to
                                               High Impact Assets: 313 × 240 hours/                                       requirements relating to transient
                                               entity * $76/hour = $5,709,120.                                                                                                           demonstrate ongoing compliance.
                                                                                                                          devices, as well as the ongoing data

                                                                                                                                                                                       Total burden       Total burden    Total burden
                                                                                                                                                                       Number of
                                                                                          Registered entities                                                                          hours in year      hours in year   hours in year
                                                                                                                                                                        entities             1                  2               3

                                               Entities subject to CIP–003–6 with low impact Assets ...................................                                        1,363         163,560           283,504         283,504

                                                     Totals ........................................................................................................           1,363         163,560           283,504         283,504



                                                  79. The following shows the annual                                      benefits) of legal services ($129.68 per                       approve NERC’s proposed revised CIP
                                               cost burden for each group, based on the                                   hour), technical employees ($58.17 per                         Reliability Standards pursuant to
                                               burden hours in the table above:                                           hour) and administrative support                               section 215(d)(2) of the FPA because
                                                  • Year 1: Entities subject to CIP–003–                                  ($39.12 per hour), based on hourly rates                       they improve the currently-effective
                                               6 with Low Impact Assets: 1,363 × 120                                      and average benefits data from the                             suite of cyber security CIP Reliability
                                               hours/entity * $76/hour = $12,430,560.                                     Bureau of Labor Statistics.95                                  Standards.
                                                  • Years 2 and 3: 1,363 entities × 208                                     81. Title: Mandatory Reliability                               Internal Review: The Commission has
                                               hours/entity * $76/hour = $21,546,304                                      Standards, Revised Critical                                    reviewed the proposed Reliability
                                               per year.                                                                  Infrastructure Protection Standards.                           Standards and made a determination
                                                  • The paperwork burden estimate                                           Action: Proposed Collection FERC–                            that its action is necessary to implement
                                               includes costs associated with the                                         725B.                                                          section 215 of the FPA.
                                               modification of existing policies to                                         OMB Control No.: 1902–0248.                                    82. Interested persons may obtain
                                               address requirements relating to low                                         Respondents: Businesses or other for-                        information on the reporting
                                               impact assets, as well as the ongoing                                      profit institutions; not-for-profit                            requirements by contacting the
                                               data collection burden, as set forth in                                    institutions.                                                  following: Federal Energy Regulatory
                                                                                                                            Frequency of Responses: On
                                               CIP–003–6, Requirements R1.2 and R2,                                                                                                      Commission, 888 First Street NE.,
                                                                                                                          Occasion.
                                               and Attachment 1. Further, the estimate                                                                                                   Washington, DC 20426 [Attention: Ellen
                                                                                                                            Necessity of the Information: This
                                               reflects the assumption that costs                                         proposed rule proposes to approve the                          Brown, Office of the Executive Director,
Lhorne on DSK7TPTVN1PROD with PROPOSALS




                                               incurred in year 1 will pertain to                                         requested modifications to Reliability                         email: DataClearance@ferc.gov, phone:
                                               revising existing policies, while costs in                                 Standards pertaining to critical                               (202) 502–8663, fax: (202) 273–0873].
                                               years 2 and 3 will reflect the burden                                                                                                       83. For submitting comments
                                                                                                                          infrastructure protection. As discussed
                                               associated with maintaining logs and                                                                                                      concerning the collection(s) of
                                                                                                                          above, the Commission proposes to
                                               other records to demonstrate ongoing                                                                                                      information and the associated burden
                                               compliance.                                                                  95 See http://bls.gov/oes/current/naics2_22.htm              estimate(s), please send your comments
                                                  80. The estimated hourly rate of $76                                    and http://www.bls.gov/news.release/ecec.nr0.htm.              to the Commission, and to the Office of
                                               is the average loaded cost (wage plus                                      Hourly figures as of June 1, 2015.                             Management and Budget, Office of


                                          VerDate Sep<11>2014        15:08 Jul 21, 2015        Jkt 235001       PO 00000        Frm 00028       Fmt 4702       Sfmt 4702   E:\FR\FM\22JYP1.SGM   22JYP1


                                               43366                  Federal Register / Vol. 80, No. 140 / Wednesday, July 22, 2015 / Proposed Rules

                                               Information and Regulatory Affairs,                      costs of approximately $149,358 per                       Comments must refer to Docket No.
                                               Washington, DC 20503 [Attention: Desk                    entity to implement this standard, as                     RM15–14–000, and must include the
                                               Officer for the Federal Energy                           well as the ongoing paperwork burden                      commenter’s name, the organization
                                               Regulatory Commission, phone: (202)                      reflected in the Information Collection                   they represent, if applicable, and
                                               395–4638, fax: (202) 395–7285]. For                      Statement (approximately $15,000 per                      address.
                                               security reasons, comments to OMB                        year per entity). We do not consider the                     90. The Commission encourages
                                               should be submitted by email to: oira_                   estimated costs for these 399 small                       comments to be filed electronically via
                                               submission@omb.eop.gov. Comments                         entities a significant economic impact.                   the eFiling link on the Commission’s
                                               submitted to OMB should include                             86. In addition, we estimate that 14
                                                                                                                                                                  Web site at http://www.ferc.gov. The
                                               Docket Number RM15–14–000 and                            small entities own Medium Impact
                                                                                                                                                                  Commission accepts most standard
                                               OMB Control Number 1902–0248.                            substations and that 31 small
                                                                                                                                                                  word processing formats. Documents
                                                                                                        transmission operators own Medium or
                                               IV. Regulatory Flexibility Act Analysis                                                                            created electronically using word
                                                                                                        High impact control centers. These 45
                                                  84. The Regulatory Flexibility Act of                                                                           processing software should be filed in
                                                                                                        small entities represent 10.1 percent of
                                               1980 (RFA) generally requires a                                                                                    native applications or print-to-PDF
                                                                                                        the 444 affected small entities. We
                                               description and analysis of Proposed                                                                               format and not in a scanned format.
                                                                                                        estimate that each of these 45 small
                                               Rules that will have significant                                                                                   Commenters filing electronically do not
                                                                                                        entities may experience an economic
                                               economic impact on a substantial                         impact of $50,000 per entity in the first                 need to make a paper filing.
                                               number of small entities.96 The Small                    year of initial implementation to meet                       91. Commenters that are not able to
                                               Business Administration’s (SBA) Office                   proposed Reliability Standard CIP–010–                    file comments electronically must send
                                               of Size Standards develops the                           2 and $30,000 in ongoing annual                           an original of their comments to:
                                               numerical definition of a small                          costs,100 for a total of $110,000 per                     Federal Energy Regulatory Commission,
                                               business.97 The SBA revised its size                     entity over the first three years.                        Secretary of the Commission, 888 First
                                               standard for electric utilities (effective               Therefore, we estimate that each of                       Street NE., Washington, DC 20426.
                                               January 22, 2014) to a standard based on                 these 45 small entities will incur a total                   92. All comments will be placed in
                                               the number of employees, including                       of $258,654 in costs over the first three                 the Commission’s public files and may
                                               affiliates (from the prior standard based                years. We conclude that 10.1 percent of                   be viewed, printed, or downloaded
                                               on megawatt hour sales).98 Proposed                      the total 444 affected small entities does                remotely as described in the Document
                                               Reliability Standards CIP–003–6, CIP–                    not represent a substantial number in                     Availability section below. Commenters
                                               004–6, CIP–006–6, CIP–007–6, CIP–                        terms of the total number of regulated                    on this proposal are not required to
                                               009–6, CIP–010–2, and CIP–011–2 are                      small entities.                                           serve copies of their comments on other
                                               expected to impose an additional                            87. Based on the above analysis, we                    commenters.
                                               burden on 1,363 entities 99 (reliability                 propose to certify that the proposed
                                               coordinators, generator operators,                       Reliability Standards will not have a                     VII. Document Availability
                                               generator owners, interchange                            significant economic impact on a
                                               coordinators or authorities, transmission                substantial number of small entities.                       93. In addition to publishing the full
                                               operators, balancing authorities,                                                                                  text of this document in the Federal
                                                                                                        V. Environmental Analysis                                 Register, the Commission provides all
                                               transmission owners, and certain
                                               distribution providers).                                   88. The Commission is required to                       interested persons an opportunity to
                                                  85. Of the 1,363 affected entities                    prepare an Environmental Assessment                       view and/or print the contents of this
                                               discussed above, we estimate that 444                    or an Environmental Impact Statement                      document via the Internet through the
                                               entities are small entities. We estimate                 for any action that may have a                            Commission’s Home Page (http://
                                               that 399 of these 444 small entities do                  significant adverse effect on the human                   www.ferc.gov) and in the Commission’s
                                               not own BES Cyber Assets or BES Cyber                    environment.101 The Commission has                        Public Reference Room during normal
                                               Systems that are classified as Medium                    categorically excluded certain actions                    business hours (8:30 a.m. to 5:00 p.m.
                                               or High Impact and, therefore, will only                 from this requirement as not having a                     Eastern time) at 888 First Street NE.,
                                               be affected by the proposed                              significant effect on the human                           Room 2A, Washington, DC 20426.
                                               modifications to Reliability Standard                    environment. Included in the exclusion                      94. From the Commission’s Home
                                               CIP–003–6. As discussed above,                           are rules that are clarifying, corrective,                Page on the Internet, this information is
                                               proposed Reliability Standard CIP–003–                   or procedural or that do not                              available on eLibrary. The full text of
                                               6 enhances reliability by providing                      substantially change the effect of the                    this document is available on eLibrary
                                               criteria against which NERC and the                      regulations being amended.102 The                         in PDF and Microsoft Word format for
                                               Commission can evaluate the                              actions proposed herein fall within this                  viewing, printing, and/or downloading.
                                               sufficiency of an entity’s protections for               categorical exclusion in the                              To access this document in eLibrary,
                                               Low Impact BES Cyber Assets. We                          Commission’s regulations.                                 type the docket number of this
                                               estimate that each of the 399 small                      VI. Comment Procedures                                    document, excluding the last three
                                               entities to whom the proposed                                                                                      digits, in the docket number field.
                                               modifications to Reliability Standard                      89. The Commission invites interested
                                               CIP–003–6 applies will incur one-time                    persons to submit comments on the                           User assistance is available for
                                                                                                        matters and issues proposed in this                       eLibrary and the Commission’s Web site
                                                 96 5 U.S.C. 601–12.                                    notice to be adopted, including any                       during normal business hours from the
                                                                                                        related matters or alternative proposals                  Commission’s Online Support at (202)
Lhorne on DSK7TPTVN1PROD with PROPOSALS




                                                 97 13 CFR 121.101 (2013).
                                                 98 SBA Final Rule on ‘‘Small Business Size
                                                                                                        that commenters may wish to discuss.                      502–6652 (toll free at 1–866–208–3676)
                                               Standards: Utilities,’’ 78 FR 77343 (Dec. 23, 2013).     Comments are due September 21, 2015.                      or email at ferconlinesupport@ferc.gov,
                                                 99 Public utilities may fall under one of several

                                               different categories, each with a size threshold
                                                                                                                                                                  or the Public Reference Room at (202)
                                               based on the company’s number of employees,
                                                                                                             100 Estimated
                                                                                                                       annual cost for year 2 and forward.        502–8371, TTY (202) 502–8659. Email
                                               including affiliates, the parent company, and                 101 Regulations
                                                                                                                         Implementing the National                the Public Reference Room at
                                               subsidiaries. For the analysis in this NOPR, we are      Environmental Policy Act of 1969, Order No. 486,          public.referenceroom@ferc.gov.
                                               using a 500 employee threshold for each affected         FERC Stats. & Regs. ¶ 30,783 (1987).
                                               entity to conduct a comprehensive analysis.                102 18 CFR 380.4(a)(2)(ii).                               By direction of the Commission.



                                          VerDate Sep<11>2014   15:08 Jul 21, 2015   Jkt 235001   PO 00000     Frm 00029     Fmt 4702   Sfmt 4702   E:\FR\FM\22JYP1.SGM   22JYP1


                                                                      Federal Register / Vol. 80, No. 140 / Wednesday, July 22, 2015 / Proposed Rules                                          43367

                                                 Issued: July 16, 2015.                                 you do not want posted online in the                     § 550.50 Purpose and scope. We
                                               Nathaniel J. Davis, Sr.,                                 first paragraph of your comment and                   propose changes to this regulation to
                                               Deputy Secretary.                                        identify what information you want                    more accurately describe the purpose of
                                               [FR Doc. 2015–17920 Filed 7–21–15; 8:45 am]              redacted.                                             the subpart and to reflect the source of
                                               BILLING CODE 6717–01–P                                      If you want to submit confidential                 drug treatment services within the
                                                                                                        business information as part of your                  Bureau of Prisons. The current
                                                                                                        comment but do not want it to be posted               regulation states that Bureau facilities
                                                                                                        online, you must include the phrase                   have drug abuse treatment specialists
                                               DEPARTMENT OF JUSTICE
                                                                                                        ‘‘CONFIDENTIAL BUSINESS                               who are supervised by a Coordinator
                                               Bureau of Prisons                                        INFORMATION’’ in the first paragraph                  and that facilities with residential drug
                                                                                                        of your comment. You must also                        abuse treatment programs (RDAP)
                                               28 CFR Part 550                                          prominently identify confidential                     should have additional specialists for
                                                                                                        business information to be redacted                   treatment in the RDAP unit. This is
                                               [BOP–1168–P]                                             within the comment. If a comment has                  inaccurate. We propose to change the
                                               RIN 1120–AB68                                            so much confidential business                         regulation to explain that the Bureau’s
                                                                                                        information that it cannot be effectively             drug abuse treatment programs, which
                                               Drug Abuse Treatment Program                             redacted, all or part of that comment                 include drug abuse education, RDAP
                                                                                                        may not be posted on                                  and non-residential drug abuse
                                               AGENCY:    Bureau of Prisons, Justice.                                                                         treatment services, are provided by the
                                                                                                        www.regulations.gov.
                                               ACTION:   Proposed rule.                                    Personal identifying information                   Psychology Services Department.
                                                                                                        identified and located as set forth above                We likewise propose to make a minor
                                               SUMMARY:   In this document, the Bureau                                                                        corresponding change in § 550.53(a)(1),
                                               of Prisons (Bureau) proposes revisions                   will be placed in the agency’s public
                                                                                                                                                              which also refers inaccurately to the
                                               to the Residential Drug Abuse                            docket file, but not posted online.
                                                                                                                                                              Drug Abuse Program Coordinator, when
                                               Treatment Program (RDAP) regulations                     Confidential business information
                                                                                                                                                              instead the course of activities
                                               to allow greater inmate participation in                 identified and located as set forth above
                                                                                                                                                              referenced in that regulation is provided
                                               the program and positively impact                        will not be placed in the public docket
                                                                                                                                                              by the Psychology Services Department.
                                               recidivism rates.                                        file. If you wish to inspect the agency’s                § 550.53 Residential Drug Abuse
                                                                                                        public docket file in person by                       Treatment Program (RDAP)(f)(2). The
                                               DATES: Comments are due by September
                                                                                                        appointment, please see the FOR                       Bureau proposes to remove
                                               21, 2015.
                                                                                                        FURTHER INFORMATION CONTACT
                                               ADDRESSES: The public is encouraged to                                                                         subparagraph (f)(2) of § 550.53, which
                                                                                                        paragraph.                                            requires inmates to pass RDAP testing
                                               submit comments on this proposed rule
                                               using the www.regulations.gov comment                    Discussion                                            procedures and refers to an RDAP exam.
                                               form. Written comments may also be                                                                             The RDAP program no longer includes
                                                                                                           In this document, the Bureau                       written testing as a requirement for
                                               submitted to the Rules Unit, Office of                   proposes revisions to the Residential
                                               General Counsel, Bureau of Prisons, 320                                                                        completion of the program. Instead,
                                                                                                        Drug Abuse Treatment Program (RDAP)                   RDAP uses clinical observation and
                                               First Street NW., Washington, DC                         regulations in four areas to allow greater
                                               20534. You may view an electronic                                                                              clinical evaluation of inmate behavior
                                                                                                        inmate participation in the program and               change to assess readiness for
                                               version of this regulation at                            positively impact recidivism rates.
                                               www.regulations.gov. When submitting                                                                           completion. Therefore, the current
                                                                                                        Specifically, the Bureau proposes to (1)              language is inaccurate and imposes a
                                               comments electronically you must                         remove the regulatory requirement for                 requirement upon inmates that no
                                               include the BOP Docket Number in the                     RDAP written testing because it is more               longer exists.
                                               subject box.                                             appropriate to assess an inmate’s                        In 2010, the Bureau converted the
                                               FOR FURTHER INFORMATION CONTACT:                         progress through clinical evaluation of               Residential Drug Abuse Treatment
                                               Sarah Qureshi, Office of General                         behavior change (the written test is no               Programs to the Modified Therapeutic
                                               Counsel, Bureau of Prisons, phone (202)                  longer used in practice); (2) remove                  Community Model of treatment (MTC).
                                               307–2105.                                                existing regulatory provisions which                  This evidenced-based model is designed
                                               SUPPLEMENTARY INFORMATION:                               automatically expel inmates who have                  to assess progress through treatment as
                                                                                                        committed certain acts (e.g., abuse of                determined by the participants’
                                               Posting of Public Comments                               drugs or alcohol, violence, attempted                 completion of treatment goals and
                                                  Please note that all comments                         escape); (3) limit the time frame for                 activities on their individualized
                                               received are considered part of the                      review of prior offenses for early release            treatment plan, and demonstrated
                                               public record and made available for                     eligibility purposes to ten years before              behavior change. Each participant
                                               public inspection online at                              the date of federal imprisonment; and                 jointly works with their treatment
                                               www.regulations.gov. Such information                    (4) lessen restrictions relating to early             specialist to create the content of their
                                               includes personal identifying                            release eligibility.                                  treatment plan. Every three months, or
                                               information (such as your name,                             Community Treatment Services.                      more often if necessary, each participant
                                               address, etc.) voluntarily submitted by                  Currently, the Bureau’s regulations                   meets with their clinical team (four or
                                               the commenter.                                           contain the term ‘‘Transitional drug                  more treatment staff) to review their
                                                  If you want to submit personal                        abuse treatment (TDAT)’’ in 28 CFR                    progress in treatment. Progress in
Lhorne on DSK7TPTVN1PROD with PROPOSALS




                                               identifying information (such as your                    550.53(a)(3) and in the title and                     treatment is determined through
                                               name, address, etc.) as part of your                     paragraphs (a) and (b) of § 550.56. We                assessing the accomplishment of their
                                               comment, but do not want it to be                        propose to replace this phrase because                treatment goals and activities, along
                                               posted online, you must include the                      the name of this program has been                     with demonstrated behavior change,
                                               phrase ‘‘PERSONAL IDENTIFYING                            changed to ‘‘Community Treatment                      such as improved personal and social
                                               INFORMATION’’ in the first paragraph                     Services (CTS).’’ This is a minor change              conduct, no disciplinary incidents, etc.
                                               of your comment. You must also locate                    to more accurately reflect the nature of              Unsatisfactory progress is evident when
                                               all the personal identifying information                 the treatment program.                                the participant does not accomplish


                                          VerDate Sep<11>2014   15:08 Jul 21, 2015   Jkt 235001   PO 00000   Frm 00030   Fmt 4702   Sfmt 4702   E:\FR\FM\22JYP1.SGM   22JYP1



Document Created: 2015-12-15 12:54:59
Document Modified: 2015-12-15 12:54:59
CategoryRegulatory Information
CollectionFederal Register
sudoc ClassAE 2.7:
GS 4.107:
AE 2.106:
PublisherOffice of the Federal Register, National Archives and Records Administration
SectionProposed Rules
ActionNotice of proposed rulemaking.
DatesComments are due September 21, 2015.
ContactDaniel Phillips (Technical Information), Office of Electric Reliability, Federal Energy Regulatory Commission, 888 First Street NE., Washington, DC 20426, (202) 502-6387, [email protected] Kevin Ryan (Legal Information), Office of the General Counsel, Federal Energy Regulatory Commission, 888 First Street NE., Washington, DC 20426, (202) 502-6840 [email protected]
FR Citation80 FR 43354 

2025 Federal Register | Disclaimer | Privacy Policy
USC | CFR | eCFR