SlideShare a Scribd company logo
September 25, 2015
The Path to Confident Compliance
and the Transition to NERC CIP
Version 5 – A Case Study
ROBERT LANDAVAZO, NERC SECURITY COMPLIANCE ADMIN
SLIDE 2 | September 25, 2015
ABOUT ME
ROBERT LANDAVAZO
SLIDE 3 | September 25, 2015
OVERVIEW OF OUR CASE STUDY
THE PMN JOURNEY TO NERC CIP V5
• PNM Background
• Organization & functional responsibility
• The state of compliance 2012
• Re-implementing forgotten solutions
• Compliance over time
• Current environment
• A look at the future, a transtion
• Lessons Learned
SLIDE 4 | September 25, 2015
ABOUT PNM RESOURCES
PNM RESOURCES – PNM AND TNMP
• Functional Registrations
» PNM = BA, DP, GO, GOP, LSE, PA, PSE, RP, TO, TOP,
TP, TSP
» TNMP = DP, LSE, TO, TOP , TP
• Subject to Regional Entity(s) = WECC for PNM & TRE for
TNMP
• Generation Capability = 3000+ MW; 8 Plants (PNM only)
• Peak Load = 2600 MW (PNM Only)
• Miles of BES Transmission = 15000+ miles at various
BES voltages (PNM and TNMP)
• Control Centers = 2 in PNM and 2 for TNMP
• Approximate Electric Customers Served = 750,000
SLIDE 5 | September 25, 2015
OBJECTIVE - FUNCTIONAL ALIGNMENT
Streamline support functions of key systems
• Operations systems strategy
• Control Systems design
• Security/Network Architecture
• Control System Security Standards
• Enterprise Security and Architecture
Standards
• Evaluation of emerging technologies
• Project Support
• Energy Management Systems
• Generation Management Systems
• Plant Control Systems/ Distributed
Controls Systems Applications
support
• Historian Systems
• DOC/OMS Systems Support
• Network/communication configuration
maintenance
• Network Diagnostics/ Performance
Management
• CIP Compliance Process/ Procedure
Development
• OT Security Operations (security
event management/ incident
response/forensics)
• Disaster Recovery/Business
Continuity
• Security Configuration Management
SLIDE 6 | September 25, 2015
OT STRATEGIC BENEFITS
Support across PNMR “operations” business areas
• Mitigating cyber security risks consistently across the enterprise
• Aligning support, compliance, and cyber security skills
• Integrating cyber security risk and compliance decision making into 3RD
party contracts and services procurement
• Better positioned to support/integrate emerging OT technology and
Smart Grid initiatives
• Architecture and systems standardization
• Mitigating cyber security risks consistently across the enterprise
• Aligning support, compliance, and cyber security skills
• Integrating cyber security risk and compliance decision making into 3RD
party contracts and services procurement
• Better positioned to support/integrate emerging OT technology and
Smart Grid initiatives
• Architecture and systems standardization
SLIDE 7 | September 25, 2015
THE STATE OF COMPLIANCE IN 2012
CIP V3 COMPLIANCE WASN’T EASY AND WASN’T SUSTAINABLE
• Inadequate state of compliance
• Support tools were shelfware
• Smart team working the hard way
• Manual controls
• Support system sprawl across
Business Units and Companies
• Frequent identification of potential
violations
• Looming WECC audit in 2014
8
Changeinsystems,processes,oroperations
Time
CIPv3 Audit
The Fate of CIPv3 Compliance
A Model
• Business
changes affect
compliance
• Massive effort
to achieve
audit-readiness
• No reason to
expect pattern
to change
9
A Different Model for Maintaining ComplianceChangeinsystems,processes,oroperations
Time
Compliance Audit
Deadline or Security
Event
Quarterly Audit Review or
Security Assessment
Continuous Security and Compliance
Lowers Cost
Increases Efficiency
Increases Security
Reduces Risk
SLIDE 10 | September 25, 2015
BRINGING THE TOOLS BACK TO LIFE
TRANSITIONING TO AUTOMATION
Our Systems’ State:
•Systems patched but content not updated and maintained –
going through the motions but no care & feeding
•Multiple tools untouched for years
•Incorrectly configured or missing configs
•More failed jobs than successful ones
•Poor documentation
•Non existent monitoring for health and uptime
•Newly discovered issues bring to light
more PVs
11
SLIDE 12 | September 25, 2015
THE RESULTS ARE WHAT COUNTS
CURRENT STATE OF COMPLIANCE AT PNM
90 Day Aggregate NERC CIP Compliance
1.5 Year Aggregate NERC CIP
Compliance
SLIDE 13 | September 25, 2015
COMPLIANCE TODAY
TRANSITION TO V5
V3
Achieved in 2 years
3,500 control points
CIP-002-3
CIP-004-3
CIP-005-3
CIP-007-3
CIP-009-3
V5
Working towards
5,000+ control points by Q1 2016
CIP-002-5
CIP-004-6
CIP-005-5
CIP-007-6
CIP-009-6
CIP-010-2
Use the NERC
Transition
Guidance!
SLIDE 14 | September 25, 2015
WHAT’S NEXT?
THE FUTURE STATE OF COMPLIANCE
• “No new people”
• Need more tools!
SLIDE 15 | September 25, 2015
STREAMLINING COMPLIANCE
“IT TAKES A VILLAGE”
Automated Workflow for
Asset & Change
Management
(CIP-002, CIP-010)
•Delivers time
savings
Automated Workflow for
Identity Management
( CIP-004, CIP-007 )
•Ensures user
account accuracy
VIM Software White List
(Future)
(CIP-007 R2)
•Minimizing risks
•Reducing workload
Substation IED
Management
(CIP-007, CIP-010)
• Ensures
continuous monitor
& control
SLIDE 16 | September 25, 2015
ARCHITECTURE
INTEGRATED MONITOR & CONTROL
Tripwire EnterpriseTripwire Log Center IP 360
Secunia VIM
Eaton/Cooper
Yukon IMS
Sigmaflow AlertEnterprise! IDM
HI & MI Control CentersMI Substations
Passive Compliance Monitoring
Active Compliance Monitoring
SLIDE 17 | September 25, 2015
PATHWAY TO CIP V5
Requirement Key Ask Technology Support
Patch
Management
35 days or viable mitigation
plan
Secunia VIM, Tripwire citede within mitigation
plan
Malicious Code
Prevention
“deter, detect & prevent” McAfee/Intel Security, Cisco NGFW, and
Tripwire
Security Event
Logging
Log events – identify & after
the fact investigation
Tripwire Log Center & Yukon IMS
Ports & Services Logical network access ports
Adding physical in-out ports
Tripwire Enterprise, physical port locks, tamper
tape and signage
System Access
Control
Verify authentication
methods
Tripwire Enterprise and IP360
LEVERAGING TECHNOLOGY
SLIDE 18 | September 25, 2015
ICS-CERT RECENT INCIDENTS
ENERGY INDUSTRY CONTINUES TREND
SLIDE 19 | September 25, 2015
TAKE-AWAYS
BEST PRACTICES
 Get the right people working on the right things – OT Org
 Recognize shortcomings and identify tools to rectify
 Leverage technology to automate continuous monitoring
 Ensure that your tools integrate to some degree – single
pane of glass
 The foundation of security is built on compliance – it isn’t
enough on its own
SLIDE 20 | September 25, 2015
QUESTIONS & CONTACT INFO
Robert Landavazo
NERC Security Compliance Administrator
PNM Resources
robert.landavazo@pnmresources.com
SLIDE 21 | September 25, 2015
ENERGYSEC SESSION DESCRIPTION
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A
Case Study
Presenters: Robert Landavazo, PNM Resources and Katherine Brocklehurst, Tripwire
With countless hours of work to go, PNM was far from ready for its coming audit in just 18 months.
Confidence levels in its existing manual, and incomplete security controls, were at an all-time low; and the
visibility into control center environments for quantifying its status and progress towards compliance was
immeasurable.
With Tripwire, PNM’s preparation of the looming CIPv3 audit noticeably improved. With efficient reporting
and automation, PNM’s now positioned to hold itself accountable for CIP auditable compliance of more than
3,500 explicit and supporting control points, satisfying CIP-002-3, CIP-004-3, CIP-005-3, CIP-007-3 and CIP-
009-3. In addition, enhanced visibility and better control gave PNM the ability to effectively communicate
meaningful and measurable initiatives to executive teams – resulting in increased support for their funding
needs.
In this session, PNM – New Mexico’s largest electricity provider – will share a case study on its journey
towards achieving continuous NERC CIP compliance despite a highly limited headcount, how it saved
countless hours of labor-intensive manual effort, and the essential role that automation played in its success.
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A Case Study

More Related Content

PPT
NERC CIP Compliance 101 Workshop - Smart Grid Security East 2011
PPTX
Explore the Implicit Requirements of the NERC CIP RSAWs
PPTX
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
PPT
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...
PDF
Rapid7 NERC-CIP Compliance Guide
PPT
Cyber Security in Energy & Utilities Industry
PDF
Unidirectional Network Architectures
PDF
S4xJapan Closing Keynote
NERC CIP Compliance 101 Workshop - Smart Grid Security East 2011
Explore the Implicit Requirements of the NERC CIP RSAWs
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...
Rapid7 NERC-CIP Compliance Guide
Cyber Security in Energy & Utilities Industry
Unidirectional Network Architectures
S4xJapan Closing Keynote

What's hot (20)

PDF
20180529 scaf and cosmic presentaiton s rajagopal
PDF
Unidirectional Security, Andrew Ginter of Waterfall Security
PPTX
Using Assessment Tools on ICS (English)
PDF
Monitoring ICS Communications
PPT
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
PPTX
ICS Security from the Plant Floor Up - A Controls Engineers Approach to Secur...
PPTX
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
PDF
compliance made easy. pass your audits stress-free webinar
PDF
Accenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case Study
PPTX
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
PPTX
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
PDF
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
PPTX
2018 11-19 improving business agility with security policy automation final
PDF
DevSecOps: Putting the Sec into the DevOps
PDF
Caretower's Managed ePO Brochure 180215
PDF
Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...
PPTX
Application visibility across the security estate the value and the vision ...
PPTX
SDN's managing security across the virtual network final
PDF
best practices-managing_security_in_the hybrid cloud
PDF
Managing Application Connectivity in the World of Network Security
20180529 scaf and cosmic presentaiton s rajagopal
Unidirectional Security, Andrew Ginter of Waterfall Security
Using Assessment Tools on ICS (English)
Monitoring ICS Communications
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
ICS Security from the Plant Floor Up - A Controls Engineers Approach to Secur...
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
compliance made easy. pass your audits stress-free webinar
Accenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case Study
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
2018 11-19 improving business agility with security policy automation final
DevSecOps: Putting the Sec into the DevOps
Caretower's Managed ePO Brochure 180215
Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...
Application visibility across the security estate the value and the vision ...
SDN's managing security across the virtual network final
best practices-managing_security_in_the hybrid cloud
Managing Application Connectivity in the World of Network Security
Ad

Viewers also liked (15)

PDF
NERC Critical Infrastructure Protection (CIP) and Security for Field Devices
PDF
Security of the Electric Grid: It's more than just NERC CIP
PDF
Structured NERC CIP Process Improvement Using Six Sigma
PPT
Mannan 2b areas of interventions in nfp po a and nutrition programmes in cip
PPTX
CIP Version 5 Immersion Workshop
PDF
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
PDF
Wireless Sensor Networks: Nothing is Out of Reach
PDF
Slide Griffin - Practical Attacks and Mitigations
PPTX
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
PPTX
Where Are All The ICS Attacks?
PDF
Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
PDF
Please, Come and Hack my SCADA System!
PDF
Where Cyber Security Meets Operational Value
PPTX
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
PPTX
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
NERC Critical Infrastructure Protection (CIP) and Security for Field Devices
Security of the Electric Grid: It's more than just NERC CIP
Structured NERC CIP Process Improvement Using Six Sigma
Mannan 2b areas of interventions in nfp po a and nutrition programmes in cip
CIP Version 5 Immersion Workshop
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Wireless Sensor Networks: Nothing is Out of Reach
Slide Griffin - Practical Attacks and Mitigations
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Where Are All The ICS Attacks?
Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Please, Come and Hack my SCADA System!
Where Cyber Security Meets Operational Value
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Ad

Similar to The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A Case Study (20)

PPTX
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
PPTX
DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422
PDF
Keep Your Guard: Stay Compliant and Be Secure
DOC
MICHAEL BILHEIMER Resume
DOC
MICHAEL BILHEIMER Resume v3
PDF
White paper scada (2)
PPTX
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
PPTX
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
DOCX
Ensuring Seamless Network Operations with The Ultimate Guide to NOC Managed S...
DOCX
A Complete Guide to Optimizing Network Performance and Uptime with NOC Soluti...
PDF
Why NOC Services in 2025 Are Critical for MSPs and How to Implement Them.pdf
DOCX
Maximizing Efficiency with NOC Solutions and A Game-Changer for IT Infrastruc...
PPTX
CMMC for Contractors and Manufacturers – What to Know for 2023
PDF
Nuts and Bolts of Building Compliance Process with Nintex and SharePoint 2013
PDF
Case Study: University of Chicago Achieves High Availability through a Centr...
PPTX
Tripwire Energy Working Group: Keynote w/Patrick Miller
PDF
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
PPTX
Cybersecurity Research Papers.pptx
DOCX
The Heart of Modern IT Infrastructure with Network Operation Center (NOC) in ...
DOCX
What’s Your Downtime Really Costing You Discover the Power of Proactive NOC M...
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422
Keep Your Guard: Stay Compliant and Be Secure
MICHAEL BILHEIMER Resume
MICHAEL BILHEIMER Resume v3
White paper scada (2)
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Ensuring Seamless Network Operations with The Ultimate Guide to NOC Managed S...
A Complete Guide to Optimizing Network Performance and Uptime with NOC Soluti...
Why NOC Services in 2025 Are Critical for MSPs and How to Implement Them.pdf
Maximizing Efficiency with NOC Solutions and A Game-Changer for IT Infrastruc...
CMMC for Contractors and Manufacturers – What to Know for 2023
Nuts and Bolts of Building Compliance Process with Nintex and SharePoint 2013
Case Study: University of Chicago Achieves High Availability through a Centr...
Tripwire Energy Working Group: Keynote w/Patrick Miller
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Cybersecurity Research Papers.pptx
The Heart of Modern IT Infrastructure with Network Operation Center (NOC) in ...
What’s Your Downtime Really Costing You Discover the Power of Proactive NOC M...

More from EnergySec (16)

PPTX
Jack Whitsitt - Yours, Anecdotally
PDF
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
PDF
Industrial Technology Trajectory: Running With Scissors
PPT
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
PPT
Industry Reliability and Security Standards Working Together
PPT
What the Department of Defense and Energy Sector Can Learn from Each Other
PPTX
Third Party Security Testing for Advanced Metering Infrastructure Program
PPTX
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
PPTX
Sea Changes, Strategic Implications, Board Cyber Perspectives
PPTX
Red Teaming and Energy Grid Security
PPT
Open Platform for ICS Cybersecurity Research and Education
PPTX
CIP-014-1: Next Steps from an Auditor’s Perspective
PPTX
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
PPTX
Lessons Learned for a Behavior-Based IDS in the Energy Sector
PPT
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
PPTX
Event Correlation Applications for Utilities
Jack Whitsitt - Yours, Anecdotally
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Industrial Technology Trajectory: Running With Scissors
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
Industry Reliability and Security Standards Working Together
What the Department of Defense and Energy Sector Can Learn from Each Other
Third Party Security Testing for Advanced Metering Infrastructure Program
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
Sea Changes, Strategic Implications, Board Cyber Perspectives
Red Teaming and Energy Grid Security
Open Platform for ICS Cybersecurity Research and Education
CIP-014-1: Next Steps from an Auditor’s Perspective
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Lessons Learned for a Behavior-Based IDS in the Energy Sector
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
Event Correlation Applications for Utilities

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Electronic commerce courselecture one. Pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Advanced IT Governance
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Advanced Soft Computing BINUS July 2025.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Spectral efficient network and resource selection model in 5G networks
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Big Data Technologies - Introduction.pptx
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PPTX
MYSQL Presentation for SQL database connectivity
Teaching material agriculture food technology
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Electronic commerce courselecture one. Pdf
Understanding_Digital_Forensics_Presentation.pptx
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Advanced IT Governance
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Dropbox Q2 2025 Financial Results & Investor Presentation
Review of recent advances in non-invasive hemoglobin estimation
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Advanced Soft Computing BINUS July 2025.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Spectral efficient network and resource selection model in 5G networks
The AUB Centre for AI in Media Proposal.docx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Big Data Technologies - Introduction.pptx
GamePlan Trading System Review: Professional Trader's Honest Take
MYSQL Presentation for SQL database connectivity

The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A Case Study

  • 1. September 25, 2015 The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A Case Study ROBERT LANDAVAZO, NERC SECURITY COMPLIANCE ADMIN
  • 2. SLIDE 2 | September 25, 2015 ABOUT ME ROBERT LANDAVAZO
  • 3. SLIDE 3 | September 25, 2015 OVERVIEW OF OUR CASE STUDY THE PMN JOURNEY TO NERC CIP V5 • PNM Background • Organization & functional responsibility • The state of compliance 2012 • Re-implementing forgotten solutions • Compliance over time • Current environment • A look at the future, a transtion • Lessons Learned
  • 4. SLIDE 4 | September 25, 2015 ABOUT PNM RESOURCES PNM RESOURCES – PNM AND TNMP • Functional Registrations » PNM = BA, DP, GO, GOP, LSE, PA, PSE, RP, TO, TOP, TP, TSP » TNMP = DP, LSE, TO, TOP , TP • Subject to Regional Entity(s) = WECC for PNM & TRE for TNMP • Generation Capability = 3000+ MW; 8 Plants (PNM only) • Peak Load = 2600 MW (PNM Only) • Miles of BES Transmission = 15000+ miles at various BES voltages (PNM and TNMP) • Control Centers = 2 in PNM and 2 for TNMP • Approximate Electric Customers Served = 750,000
  • 5. SLIDE 5 | September 25, 2015 OBJECTIVE - FUNCTIONAL ALIGNMENT Streamline support functions of key systems • Operations systems strategy • Control Systems design • Security/Network Architecture • Control System Security Standards • Enterprise Security and Architecture Standards • Evaluation of emerging technologies • Project Support • Energy Management Systems • Generation Management Systems • Plant Control Systems/ Distributed Controls Systems Applications support • Historian Systems • DOC/OMS Systems Support • Network/communication configuration maintenance • Network Diagnostics/ Performance Management • CIP Compliance Process/ Procedure Development • OT Security Operations (security event management/ incident response/forensics) • Disaster Recovery/Business Continuity • Security Configuration Management
  • 6. SLIDE 6 | September 25, 2015 OT STRATEGIC BENEFITS Support across PNMR “operations” business areas • Mitigating cyber security risks consistently across the enterprise • Aligning support, compliance, and cyber security skills • Integrating cyber security risk and compliance decision making into 3RD party contracts and services procurement • Better positioned to support/integrate emerging OT technology and Smart Grid initiatives • Architecture and systems standardization • Mitigating cyber security risks consistently across the enterprise • Aligning support, compliance, and cyber security skills • Integrating cyber security risk and compliance decision making into 3RD party contracts and services procurement • Better positioned to support/integrate emerging OT technology and Smart Grid initiatives • Architecture and systems standardization
  • 7. SLIDE 7 | September 25, 2015 THE STATE OF COMPLIANCE IN 2012 CIP V3 COMPLIANCE WASN’T EASY AND WASN’T SUSTAINABLE • Inadequate state of compliance • Support tools were shelfware • Smart team working the hard way • Manual controls • Support system sprawl across Business Units and Companies • Frequent identification of potential violations • Looming WECC audit in 2014
  • 8. 8 Changeinsystems,processes,oroperations Time CIPv3 Audit The Fate of CIPv3 Compliance A Model • Business changes affect compliance • Massive effort to achieve audit-readiness • No reason to expect pattern to change
  • 9. 9 A Different Model for Maintaining ComplianceChangeinsystems,processes,oroperations Time Compliance Audit Deadline or Security Event Quarterly Audit Review or Security Assessment Continuous Security and Compliance Lowers Cost Increases Efficiency Increases Security Reduces Risk
  • 10. SLIDE 10 | September 25, 2015 BRINGING THE TOOLS BACK TO LIFE TRANSITIONING TO AUTOMATION Our Systems’ State: •Systems patched but content not updated and maintained – going through the motions but no care & feeding •Multiple tools untouched for years •Incorrectly configured or missing configs •More failed jobs than successful ones •Poor documentation •Non existent monitoring for health and uptime •Newly discovered issues bring to light more PVs
  • 11. 11
  • 12. SLIDE 12 | September 25, 2015 THE RESULTS ARE WHAT COUNTS CURRENT STATE OF COMPLIANCE AT PNM 90 Day Aggregate NERC CIP Compliance 1.5 Year Aggregate NERC CIP Compliance
  • 13. SLIDE 13 | September 25, 2015 COMPLIANCE TODAY TRANSITION TO V5 V3 Achieved in 2 years 3,500 control points CIP-002-3 CIP-004-3 CIP-005-3 CIP-007-3 CIP-009-3 V5 Working towards 5,000+ control points by Q1 2016 CIP-002-5 CIP-004-6 CIP-005-5 CIP-007-6 CIP-009-6 CIP-010-2 Use the NERC Transition Guidance!
  • 14. SLIDE 14 | September 25, 2015 WHAT’S NEXT? THE FUTURE STATE OF COMPLIANCE • “No new people” • Need more tools!
  • 15. SLIDE 15 | September 25, 2015 STREAMLINING COMPLIANCE “IT TAKES A VILLAGE” Automated Workflow for Asset & Change Management (CIP-002, CIP-010) •Delivers time savings Automated Workflow for Identity Management ( CIP-004, CIP-007 ) •Ensures user account accuracy VIM Software White List (Future) (CIP-007 R2) •Minimizing risks •Reducing workload Substation IED Management (CIP-007, CIP-010) • Ensures continuous monitor & control
  • 16. SLIDE 16 | September 25, 2015 ARCHITECTURE INTEGRATED MONITOR & CONTROL Tripwire EnterpriseTripwire Log Center IP 360 Secunia VIM Eaton/Cooper Yukon IMS Sigmaflow AlertEnterprise! IDM HI & MI Control CentersMI Substations Passive Compliance Monitoring Active Compliance Monitoring
  • 17. SLIDE 17 | September 25, 2015 PATHWAY TO CIP V5 Requirement Key Ask Technology Support Patch Management 35 days or viable mitigation plan Secunia VIM, Tripwire citede within mitigation plan Malicious Code Prevention “deter, detect & prevent” McAfee/Intel Security, Cisco NGFW, and Tripwire Security Event Logging Log events – identify & after the fact investigation Tripwire Log Center & Yukon IMS Ports & Services Logical network access ports Adding physical in-out ports Tripwire Enterprise, physical port locks, tamper tape and signage System Access Control Verify authentication methods Tripwire Enterprise and IP360 LEVERAGING TECHNOLOGY
  • 18. SLIDE 18 | September 25, 2015 ICS-CERT RECENT INCIDENTS ENERGY INDUSTRY CONTINUES TREND
  • 19. SLIDE 19 | September 25, 2015 TAKE-AWAYS BEST PRACTICES  Get the right people working on the right things – OT Org  Recognize shortcomings and identify tools to rectify  Leverage technology to automate continuous monitoring  Ensure that your tools integrate to some degree – single pane of glass  The foundation of security is built on compliance – it isn’t enough on its own
  • 20. SLIDE 20 | September 25, 2015 QUESTIONS & CONTACT INFO Robert Landavazo NERC Security Compliance Administrator PNM Resources robert.landavazo@pnmresources.com
  • 21. SLIDE 21 | September 25, 2015 ENERGYSEC SESSION DESCRIPTION The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A Case Study Presenters: Robert Landavazo, PNM Resources and Katherine Brocklehurst, Tripwire With countless hours of work to go, PNM was far from ready for its coming audit in just 18 months. Confidence levels in its existing manual, and incomplete security controls, were at an all-time low; and the visibility into control center environments for quantifying its status and progress towards compliance was immeasurable. With Tripwire, PNM’s preparation of the looming CIPv3 audit noticeably improved. With efficient reporting and automation, PNM’s now positioned to hold itself accountable for CIP auditable compliance of more than 3,500 explicit and supporting control points, satisfying CIP-002-3, CIP-004-3, CIP-005-3, CIP-007-3 and CIP- 009-3. In addition, enhanced visibility and better control gave PNM the ability to effectively communicate meaningful and measurable initiatives to executive teams – resulting in increased support for their funding needs. In this session, PNM – New Mexico’s largest electricity provider – will share a case study on its journey towards achieving continuous NERC CIP compliance despite a highly limited headcount, how it saved countless hours of labor-intensive manual effort, and the essential role that automation played in its success.

Editor's Notes

  • #3: WILL ROBERT SPEAK TO HOW LONG HE HAS BEEN AT PNM? SHOULD DO OR LIST HERE
  • #4: This agenda could be more compelling leaning toward telling a story sort of like this – (it your talk track might actually fit this outline but can’t tell from the bullets – and maybe we tune it up together in our call tomorrow (?) - Business challenges, Compliance Challenges Choices (what solutions were at hand, who got to decide, what were the criteria?) Solution (decided on final solution for what reasons, then what happened….best practices –what worked what did not Business Results, Compliance Results What’s Next for PNM?
  • #5: Call out 2 certifications Show of hands who do this?
  • #6: This is what is your organization structure—next slide speaks to the why behind this organizational structure Segmented away from IT
  • #7: I would put the bottom bullet as second or third to show how the arch and systems stds help align the three groups and even assist in stronger mitigation efforts.
  • #8: Add some business implications – if there are any points of color – (like we had a new CIO and the pressure was high, last time we had fines, this time no can….IT and OT were (and have been) somewhat at odds, nothing new there but our leadership was demanding we solve for this together as a team, or whatever. Documentation challenges alone were killing us, or whateveretc etc Again, maybe your talk track is just fine…. Add examples in speaking notes
  • #9: ANYTHING NEW? Refit Place Before PNM results KEY MESSAGE – How does the rest of your business manage, track, trend, improve, etc as relates to change? ANSWER: Really large intervals, a lot of change in the meantime, and a lot of work to get back to the desired state Examples: When the help desk tickets get generated – do you expect all of them to be resolved instantly? No, time will pass as they process those tickets. So does your organization get this? Would they understand and agree that change happens, is monitored, and relates to the people, process, and technology in use?
  • #10: KEY MESSAGES: Continuously managing the state of security and compliance, you maintain a higher consistency, and can lower costs, increase efficiencies (Orange box) Alternatively, as it relates to both security and compliance, knowing when change happens in real time, continuous monitoring, and automation and integrations all work together to achieve higher levels of continuously secure and compliant systems. Ultimately this lowers cost and increases efficiency. This would be a good thing for most organizations, right?
  • #11: I’ll just be interested to hear you talk this through – be sure to think what the implications were for your business, and what was at risk in this condition Speaking notes: frame this with timing was tight , we had tools, we were confident they would do the job…but Why shelved? Lack of expertise Many organizations in a similar situation.
  • #12: Prefer to replace with real PNM diagram
  • #13: I’ll add ours Highlights of actual PNM results….images coming NEED ROBERT
  • #15: We have an integration with SigmaFlow – would be nice to share a detail or two Our TLC Log product can integrate with your physical security systems – card swipes or key fobs, even biometrics – whatever system you’re using – and can even integrate back up to TE ? Dynamic Software Reconciliation (DSR), Whitelist Profiler? (Tripwire Apps [5] Robert – as with in the beginning, as you look forward to leading the compliance/security front for PNM and CIPv5, what are the business drivers you’re also working to fulfill for YOUR bosses and their interests. What are your business goals above and beyond these tools? Speaker notes: call out actual usage scenarios—best practices points
  • #16: Secunia VIM for identification & evaluation of security patches Tripwire IP360 for discovery and vulnerability scanning SigmaFlow for compliance workflow management and governance Alert Enterprise for identity management Eaton/Cooper Yukon IMS for substation IED Management
  • #18: Aligning tools to v5
  • #19: The foundation of security is built on compliance – it isn’t enough on its own