140 likes | 222 Views
Explore the need for a comprehensive security framework for Intelligrid, including analysis, technology recommendations, and major concerns. Learn about secure communication, identity management, and the role of ANSI X9.69 technology.
E N D
Intelligrid“The need for a comprehensive security framework” Presented to EUTC November 2008 Dennis Holstein (OPUS Publishing) Thomas Kropp (DYONYX) Keith Stouffer (NIST)
The vision of Intelligrid • An extensive scope reaching from the generating plant to appliances in the home • Requirements space highly complex (legacy and future systems) • Focus is on: • Who is involved • What data is exchanged • How the data is exchanged (Quality of Service requirements) • Security is a complicated and multi-faceted topic created by the interdependency of: • Security Domain security policy • Security Implementations • Communication technology • Intelligrid provides an architecture upon which to build interoperable technical solutions Intelligrid Security Framework
Suggestions from Intelligrid analysis Some examples • Approximately 26 security policies identified • Intelligrid leaves the analysis up to the user to determine what services need to be addressed • The trade space to perform the analysis is multi-dimensional and requires • High degree of security expertise and power system domain expertise • A System Dynamics Model is needed to develop a relative rank ordering of viable options O=optional, M=mandatory Intelligrid Security Framework
Comm technology recommendations Intelligrid Security Framework
Technologies that need to be created • No standard for audit record format or mechanism to retrieve and aggregate such records • No standard to enforce physical access • Physical access is presumed in many security scenarios • Users must develop their own physical access control and monitoring system • No technological mechanism through which to exchange security service definitions/availability from one domain to another • No technological mechanism through which to request a given communication path or quality of security • Technologies are available to determine the path that a given communication packet traveled (e.g. source routing • More disturbing is that no authoritative work regarding the use of security as a quality of service to be provided Intelligrid Security Framework
Major concern - Certificate Revocation Lists • No well-defined methodology or technology to disseminate Certificate Revocation Lists (CRLs) within a security domain • Only minimal work in regards to the actual behavior from a communication perspective once a in-use certificate has been revoked • Suggest that communication be terminated a certificate has been revoked • Loss of communication at an inopportune time must be carefully considered Intelligrid Security Framework
The challenges are clear – some suggestions • First and foremost we need a comprehensive security solution • Address all domains within the scope of Intelligrid • Need to focus on an “infosec” solution not a “comsec” solution • Don’t think in terms of point-to-point communications • Think in terms of data which has a point of presence and should be available to all who have legitimate need for its use • Security should be applied as close to the source of data creation as possible • Access control and use rights should be carried with the data for its lifetime regardless of the communication path or its storage repository • Cost of confidentiality must be balanced with system performance Intelligrid Security Framework
Identity Management Platform/Device Management PK/PKI Operational Environ Who are you? Where are you? Federation Device Permission Management Authorization Authorization ANSI X9.69 What are you allowed to do? Putting all together – security view Note: ANSI X9.73 and X9.96 complement X9.69, conversion to ISO/IEC 22896 in work Intelligrid Security Framework
Secure communication through data protection Individual Characteristics Data Characteristics • Identity – Who is this person? What role does he play in the organization? How is he identified (token, biometric, key fob)? • Environment – Where is he? What kind of network connection does he have? What kind of security is on his computer? • Authorization – What is this person allowed to see or do in reference to sensitive information? • Availability – How easily can the data be accessed? • Integrity – How reliable is the data? • Where did it come from and has it been altered in any way? • Confidentiality – Are only those authorized to see the data allowed access? Is it protected from everyone else? ANSI X9.69 technology is a, standards-based, cryptographic key management technology that provides role-based access control of information enforced by cryptography. Intelligrid Security Framework
Discriminators of X9.69 implementation • End-to-end security, not just in the Tunnel • Protects the object, permitting granular management of info • System owner has tools to set own risk management rules • Allows for information sharing of work in process • Object management and need-to-know access, permits controlled, interactive processing • Access to information objects, is designed for a need-to-know environment and is rigidly enforced • Travelers can retain Privacy when working off-line • Keys not distributed; and Recovery is 100% • Simple, comprehensive, Key Management System, allows for flexibility and works with or without a PKI. • Standard, industry approved cryptographic algorithms supported Intelligrid Security Framework
Secure Information Sharing and Collaboration • A threat is received at the Federal Level and analyzed. A Threat Alert needs to be dispersed to all agencies and accessed on a need-to-know and need-to-share basis. Different Access Control Credentials are applied to different parts of the Threat Alert. The Threat Alert is distributed to all agencies - only those recipients with the proper Roles & Permissions will be able to access all or part of document. Intelligrid Security Framework
In summary • Intelligrid security options are discussed in the EPRI reports • Sorting out the options is a daunting task • You have to have considerable security expertise with a very strong understanding of power system operations • Commercial solutions are available • ANSI X9.69-based security is a comprehensive solution that can extend though all domains of Intelligrid • We then have a cost-effective coherent security solution for Intelligrid • Security management is pushed to the lowest level – nearest the application • Legacy systems need implementations that do not require changes to existing hardware and software Intelligrid Security Framework
Source references • Intelligridhttp://intelligrid.epri.com/ • ANSI http://webstore.ansi.org/subscriptions/ • ISO http://www.iso.org/iso/en/ Intelligrid Security Framework
Thank you for your attention Dennis Holsteinholsteindk@ieee.org Thomas Kropptom.kropp@dyonyx.com Keith Stoufferkeith.stouffer@nist.gov