ADVANCING THE POWER OF ENERGY
The Art of Securing Microgrid
Control Systems
Presented at the Energy, Utility, and Environment
Conference, March 6, 2018, San Diego, CA
Jim Dodenhoff, Regional Director of Business Development
Intelligent Power & Energy Research Corporation (IPERC)
50
Utility security professionals
that have reported at least
one security breach
70%
of total 2016 ICS-CERT ICS
cyber incidents targeted
the Energy sector
20%
Cyber Attacks Go Beyond International Cyberwarfare and they Go Beyond Data Breaches
3
Microgrids: A System of Systems
4
Overly Complex Security Protocols Result in Fragile Systems
COMPLEXITY ≠ RESILIENCY
Augmentation of cybersecurity solutions adds
devices and applications that can malfunction and
cause system degradation or cascading failures.
KNOW YOUR SYSTEM’S NEEDS
Understand the components and interfaces
of your system and assess the risks at hand
before selecting security measures.
≠
→
5
The Art of Securing a Microgrid Control System
Initial Threat
Analysis
Security Measure
Identification
Prioritized Security
Implementation
01 02 03
6Proprietary
Initial Threat Analysis: Develop System Configuration Baseline
LEGACY EQUIPMENT
INTERCONNECTIONS
Review all interconnections including ports,
protocols, services, and end-device connections
Consider the impact of legacy assets and
potential bandwidth constraints
SECURITY POLICIES
Examine which security procedures are
applicable and reduce the most risk
COMPONENT INVENTORY
Detailed system inventory with an overarching
layered, port-level diagram
7Proprietary
Initial Threat Analysis: Examine Potential Attack Vectors & High Risk Points
PHYSICAL SECURITY
FRAGILITY
Identify where there could be single points of
failure and threats to missions
Ensure locked enclosures and controlled
access points
CRITICAL SECURITY
Review security checklists for critical open
items such as ICS standards, and DoD and
vendor checklists
CONNECTIONS
Examine connections to external networks, pivot
points, and remote access
!
8Proprietary
Security Measure Identification: Network Based Measures
MONITORING
ENTERPRISE CONSIDERATIONS
Identify where there could be single points of
failure and threats to mission dependencies
Enable monitoring and alert tools to notify
system operators
SIMPLIFICATION
Reduce system fragility by selecting the
right security measures for your microgrid
SEGMENTATION
Physically and logically separate computer
networks to isolate network threats
9Proprietary
Security Measure Identification: End Devices
AUTHORIZED CONFIGURATION
ACCESS CONTROL
Selectively restrict physical and logical access to end
devices based on needs
Each component should have a known,
good configuration.
CHANGE DETECTION
Monitor end device activity for any changes
that occur
INVENTORY
Develop and maintain a comprehensive listing of all
system end devices
10Proprietary
Security Measure Identification: Control System
FLOW CONTROL
WHITELISTING
A strong form of access control denies access by
default unless on the “whitelist.”
Manage data flow between system devices
at an efficient pace
SECURITY HARDENING
Build control system software and
hardware security from the ground up
ACCESS CONTROL
Restrict system access to only authorized operators
and devices
11Proprietary
Prioritized Security Implementation
05 HOST BASED PROTECTIONS
04 RAPID RECOVERY03 RISK-BASED PRIORITIZATION
06 MONITOR & TEST
02 TECHNICAL SECURITY
01 PLAN OF ACTION
!
12
Not all security postures are created equal
Legacy Security Paradigm
Intrusion
Detection
Whitelisting Authentication Encryption Soft/Hardware
Hardening
Defense in Depth Security Paradigm
Firewall
 Jim.Dodenhoff@iperc.com
 M310-936-9456
www.IPERC.com
IPERC Contact: Jim Dodenhoff
Regional Business Development
Director

More Related Content

PPTX
Cyber Security of Power grids
PPTX
PLC Virtualization Dragos S4 2019
PPT
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
PPTX
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
PDF
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
PPTX
From Air Gap to Air Control
PPTX
Nreca kickoff meeting
Cyber Security of Power grids
PLC Virtualization Dragos S4 2019
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
From Air Gap to Air Control
Nreca kickoff meeting

What's hot (19)

PPTX
Cyber security for smart grid
PPT
Smart Grid Cyber Security
PDF
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
PDF
Smart Grid Security - Attack & Defense
PDF
Sfa community of practice a natural way of building
PPTX
Cyber security in Smart grid system
PDF
Practical analysis of the cybersecurity of European smart grids
PDF
Analytics for Smart Grid Cyber security
PDF
The Future of Cybersecurity in Energy Sector
PPTX
Agile fractal grid 7-11-14
PDF
Internet of Things Security - Trust in the supply chain
PPT
Cybersecurity for Control Systems: Current State and Future Vision pt.1
PPTX
Third Party Security Testing for Advanced Metering Infrastructure Program
PPTX
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
PPTX
S4 krotofil morning_sesh_2017
PDF
Industrial IOT and Security
PPTX
Smart grid chinedu opara(m00560830)
PDF
The Not So Smart Grid
PPTX
Dressing up the ICS Kill Chain
Cyber security for smart grid
Smart Grid Cyber Security
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Smart Grid Security - Attack & Defense
Sfa community of practice a natural way of building
Cyber security in Smart grid system
Practical analysis of the cybersecurity of European smart grids
Analytics for Smart Grid Cyber security
The Future of Cybersecurity in Energy Sector
Agile fractal grid 7-11-14
Internet of Things Security - Trust in the supply chain
Cybersecurity for Control Systems: Current State and Future Vision pt.1
Third Party Security Testing for Advanced Metering Infrastructure Program
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
S4 krotofil morning_sesh_2017
Industrial IOT and Security
Smart grid chinedu opara(m00560830)
The Not So Smart Grid
Dressing up the ICS Kill Chain
Ad

Similar to The art of securing microgrid control systems (20)

PDF
Standards based security for energy utilities
PDF
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
PDF
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
PDF
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
PPTX
Defending against industrial malware
PDF
Segregation of IT and OT Networks across organization
PDF
Securing Industrial Control System
PDF
10. industrial networks safety and security tom hammond
PPT
Industrial control systems cybersecurity.ppt
PPTX
Nozomi Fortinet Accelerate18
PDF
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
PPTX
Computer security aspects in
PDF
Cisco cybersecurity essentials chapter - 2
PDF
Beyond NIST, CMMC certification_webinar.pdf
PPT
industrialcontrolsystemscybersecurity-230201070859-90cfc987 (1).ppt
PPT
Secure Financial Intelligence System
PDF
White paper scada (2)
PDF
Secure architecture-industrial-control-systems-36327
PDF
Industrial networks safety & security - e+h june 2018 ben murphy
PPTX
Why_IoT_Security_Matters_in_2025_and_Beyond.pptx
Standards based security for energy utilities
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Defending against industrial malware
Segregation of IT and OT Networks across organization
Securing Industrial Control System
10. industrial networks safety and security tom hammond
Industrial control systems cybersecurity.ppt
Nozomi Fortinet Accelerate18
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
Computer security aspects in
Cisco cybersecurity essentials chapter - 2
Beyond NIST, CMMC certification_webinar.pdf
industrialcontrolsystemscybersecurity-230201070859-90cfc987 (1).ppt
Secure Financial Intelligence System
White paper scada (2)
Secure architecture-industrial-control-systems-36327
Industrial networks safety & security - e+h june 2018 ben murphy
Why_IoT_Security_Matters_in_2025_and_Beyond.pptx
Ad

More from Jim Dodenhoff (15)

PPTX
A new world wildfires -2021111 for posting
PPTX
Wastewater Treatment Plants: Enhancing the Water-Energy Nexus at the Most Cri...
PPTX
How Changes to Time of Use (TOU) Rates are Impacting Commercial & Industrial ...
PPTX
Terrestrial Microgrid Control
PPTX
A Guide to Resiliency
PPTX
Microgrid Autonomous Control
PPTX
Utility Microgrids: Why robust control solutions are critical to advanced mic...
PPTX
Integrating Cybersecure Microgrids Improves Energy Resiliency for the U.S. Mi...
PDF
Integrating Renewable Energy and Cybersecurity to Improve Energy Resiliency
PPTX
Water system optimization an energy efficiency view final presentation
PPTX
2017 wwtp presentation y20170524 final linkedinnonotes
PPTX
052115 final nlm jd water energy goggles 2015 emc final
PDF
Distributed Control and Intelligence for Electric Grids
PPTX
2017 wwtp presentation y20170524 final linkedinnonotes
PPTX
2017 clean energy presentation dodenhoff y20170608 linked in nonotes
A new world wildfires -2021111 for posting
Wastewater Treatment Plants: Enhancing the Water-Energy Nexus at the Most Cri...
How Changes to Time of Use (TOU) Rates are Impacting Commercial & Industrial ...
Terrestrial Microgrid Control
A Guide to Resiliency
Microgrid Autonomous Control
Utility Microgrids: Why robust control solutions are critical to advanced mic...
Integrating Cybersecure Microgrids Improves Energy Resiliency for the U.S. Mi...
Integrating Renewable Energy and Cybersecurity to Improve Energy Resiliency
Water system optimization an energy efficiency view final presentation
2017 wwtp presentation y20170524 final linkedinnonotes
052115 final nlm jd water energy goggles 2015 emc final
Distributed Control and Intelligence for Electric Grids
2017 wwtp presentation y20170524 final linkedinnonotes
2017 clean energy presentation dodenhoff y20170608 linked in nonotes

Recently uploaded (20)

PDF
Types of Token_ From Utility to Security.pdf
PPTX
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
PPTX
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
PDF
DNT Brochure 2025 – ISV Solutions @ D365
PDF
DuckDuckGo Private Browser Premium APK for Android Crack Latest 2025
PDF
Time Tracking Features That Teams and Organizations Actually Need
PPTX
Tech Workshop Escape Room Tech Workshop
PPTX
Cybersecurity: Protecting the Digital World
PDF
MCP Security Tutorial - Beginner to Advanced
DOCX
How to Use SharePoint as an ISO-Compliant Document Management System
PDF
Visual explanation of Dijkstra's Algorithm using Python
PPTX
Patient Appointment Booking in Odoo with online payment
PDF
Designing Intelligence for the Shop Floor.pdf
PDF
How Tridens DevSecOps Ensures Compliance, Security, and Agility
PPTX
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
PDF
Wondershare Recoverit Full Crack New Version (Latest 2025)
PDF
Cost to Outsource Software Development in 2025
PDF
Salesforce Agentforce AI Implementation.pdf
PPTX
Monitoring Stack: Grafana, Loki & Promtail
PDF
AI Guide for Business Growth - Arna Softech
Types of Token_ From Utility to Security.pdf
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
DNT Brochure 2025 – ISV Solutions @ D365
DuckDuckGo Private Browser Premium APK for Android Crack Latest 2025
Time Tracking Features That Teams and Organizations Actually Need
Tech Workshop Escape Room Tech Workshop
Cybersecurity: Protecting the Digital World
MCP Security Tutorial - Beginner to Advanced
How to Use SharePoint as an ISO-Compliant Document Management System
Visual explanation of Dijkstra's Algorithm using Python
Patient Appointment Booking in Odoo with online payment
Designing Intelligence for the Shop Floor.pdf
How Tridens DevSecOps Ensures Compliance, Security, and Agility
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
Wondershare Recoverit Full Crack New Version (Latest 2025)
Cost to Outsource Software Development in 2025
Salesforce Agentforce AI Implementation.pdf
Monitoring Stack: Grafana, Loki & Promtail
AI Guide for Business Growth - Arna Softech

The art of securing microgrid control systems

  • 1. ADVANCING THE POWER OF ENERGY The Art of Securing Microgrid Control Systems Presented at the Energy, Utility, and Environment Conference, March 6, 2018, San Diego, CA Jim Dodenhoff, Regional Director of Business Development Intelligent Power & Energy Research Corporation (IPERC)
  • 2. 50 Utility security professionals that have reported at least one security breach 70% of total 2016 ICS-CERT ICS cyber incidents targeted the Energy sector 20% Cyber Attacks Go Beyond International Cyberwarfare and they Go Beyond Data Breaches
  • 4. 4 Overly Complex Security Protocols Result in Fragile Systems COMPLEXITY ≠ RESILIENCY Augmentation of cybersecurity solutions adds devices and applications that can malfunction and cause system degradation or cascading failures. KNOW YOUR SYSTEM’S NEEDS Understand the components and interfaces of your system and assess the risks at hand before selecting security measures. ≠ →
  • 5. 5 The Art of Securing a Microgrid Control System Initial Threat Analysis Security Measure Identification Prioritized Security Implementation 01 02 03
  • 6. 6Proprietary Initial Threat Analysis: Develop System Configuration Baseline LEGACY EQUIPMENT INTERCONNECTIONS Review all interconnections including ports, protocols, services, and end-device connections Consider the impact of legacy assets and potential bandwidth constraints SECURITY POLICIES Examine which security procedures are applicable and reduce the most risk COMPONENT INVENTORY Detailed system inventory with an overarching layered, port-level diagram
  • 7. 7Proprietary Initial Threat Analysis: Examine Potential Attack Vectors & High Risk Points PHYSICAL SECURITY FRAGILITY Identify where there could be single points of failure and threats to missions Ensure locked enclosures and controlled access points CRITICAL SECURITY Review security checklists for critical open items such as ICS standards, and DoD and vendor checklists CONNECTIONS Examine connections to external networks, pivot points, and remote access !
  • 8. 8Proprietary Security Measure Identification: Network Based Measures MONITORING ENTERPRISE CONSIDERATIONS Identify where there could be single points of failure and threats to mission dependencies Enable monitoring and alert tools to notify system operators SIMPLIFICATION Reduce system fragility by selecting the right security measures for your microgrid SEGMENTATION Physically and logically separate computer networks to isolate network threats
  • 9. 9Proprietary Security Measure Identification: End Devices AUTHORIZED CONFIGURATION ACCESS CONTROL Selectively restrict physical and logical access to end devices based on needs Each component should have a known, good configuration. CHANGE DETECTION Monitor end device activity for any changes that occur INVENTORY Develop and maintain a comprehensive listing of all system end devices
  • 10. 10Proprietary Security Measure Identification: Control System FLOW CONTROL WHITELISTING A strong form of access control denies access by default unless on the “whitelist.” Manage data flow between system devices at an efficient pace SECURITY HARDENING Build control system software and hardware security from the ground up ACCESS CONTROL Restrict system access to only authorized operators and devices
  • 11. 11Proprietary Prioritized Security Implementation 05 HOST BASED PROTECTIONS 04 RAPID RECOVERY03 RISK-BASED PRIORITIZATION 06 MONITOR & TEST 02 TECHNICAL SECURITY 01 PLAN OF ACTION !
  • 12. 12 Not all security postures are created equal Legacy Security Paradigm Intrusion Detection Whitelisting Authentication Encryption Soft/Hardware Hardening Defense in Depth Security Paradigm Firewall
  • 13.  Jim.Dodenhoff@iperc.com  M310-936-9456 www.IPERC.com IPERC Contact: Jim Dodenhoff Regional Business Development Director