140 likes | 221 Views
Intelligrid “The need for a comprehensive security framework”. Presented to EUTC November 2008. Dennis Holstein (OPUS Publishing) Thomas Kropp (DYONYX) Keith Stouffer (NIST). The vision of Intelligrid. An extensive scope reaching from the generating plant to appliances in the home
E N D
Intelligrid“The need for a comprehensive security framework” Presented to EUTC November 2008 Dennis Holstein (OPUS Publishing) Thomas Kropp (DYONYX) Keith Stouffer (NIST)
The vision of Intelligrid • An extensive scope reaching from the generating plant to appliances in the home • Requirements space highly complex (legacy and future systems) • Focus is on: • Who is involved • What data is exchanged • How the data is exchanged (Quality of Service requirements) • Security is a complicated and multi-faceted topic created by the interdependency of: • Security Domain security policy • Security Implementations • Communication technology • Intelligrid provides an architecture upon which to build interoperable technical solutions Intelligrid Security Framework
Suggestions from Intelligrid analysis Some examples • Approximately 26 security policies identified • Intelligrid leaves the analysis up to the user to determine what services need to be addressed • The trade space to perform the analysis is multi-dimensional and requires • High degree of security expertise and power system domain expertise • A System Dynamics Model is needed to develop a relative rank ordering of viable options O=optional, M=mandatory Intelligrid Security Framework
Comm technology recommendations Intelligrid Security Framework
Technologies that need to be created • No standard for audit record format or mechanism to retrieve and aggregate such records • No standard to enforce physical access • Physical access is presumed in many security scenarios • Users must develop their own physical access control and monitoring system • No technological mechanism through which to exchange security service definitions/availability from one domain to another • No technological mechanism through which to request a given communication path or quality of security • Technologies are available to determine the path that a given communication packet traveled (e.g. source routing • More disturbing is that no authoritative work regarding the use of security as a quality of service to be provided Intelligrid Security Framework
Major concern - Certificate Revocation Lists • No well-defined methodology or technology to disseminate Certificate Revocation Lists (CRLs) within a security domain • Only minimal work in regards to the actual behavior from a communication perspective once a in-use certificate has been revoked • Suggest that communication be terminated a certificate has been revoked • Loss of communication at an inopportune time must be carefully considered Intelligrid Security Framework
The challenges are clear – some suggestions • First and foremost we need a comprehensive security solution • Address all domains within the scope of Intelligrid • Need to focus on an “infosec” solution not a “comsec” solution • Don’t think in terms of point-to-point communications • Think in terms of data which has a point of presence and should be available to all who have legitimate need for its use • Security should be applied as close to the source of data creation as possible • Access control and use rights should be carried with the data for its lifetime regardless of the communication path or its storage repository • Cost of confidentiality must be balanced with system performance Intelligrid Security Framework
Identity Management Platform/Device Management PK/PKI Operational Environ Who are you? Where are you? Federation Device Permission Management Authorization Authorization ANSI X9.69 What are you allowed to do? Putting all together – security view Note: ANSI X9.73 and X9.96 complement X9.69, conversion to ISO/IEC 22896 in work Intelligrid Security Framework
Secure communication through data protection Individual Characteristics Data Characteristics • Identity – Who is this person? What role does he play in the organization? How is he identified (token, biometric, key fob)? • Environment – Where is he? What kind of network connection does he have? What kind of security is on his computer? • Authorization – What is this person allowed to see or do in reference to sensitive information? • Availability – How easily can the data be accessed? • Integrity – How reliable is the data? • Where did it come from and has it been altered in any way? • Confidentiality – Are only those authorized to see the data allowed access? Is it protected from everyone else? ANSI X9.69 technology is a, standards-based, cryptographic key management technology that provides role-based access control of information enforced by cryptography. Intelligrid Security Framework
Discriminators of X9.69 implementation • End-to-end security, not just in the Tunnel • Protects the object, permitting granular management of info • System owner has tools to set own risk management rules • Allows for information sharing of work in process • Object management and need-to-know access, permits controlled, interactive processing • Access to information objects, is designed for a need-to-know environment and is rigidly enforced • Travelers can retain Privacy when working off-line • Keys not distributed; and Recovery is 100% • Simple, comprehensive, Key Management System, allows for flexibility and works with or without a PKI. • Standard, industry approved cryptographic algorithms supported Intelligrid Security Framework
Secure Information Sharing and Collaboration • A threat is received at the Federal Level and analyzed. A Threat Alert needs to be dispersed to all agencies and accessed on a need-to-know and need-to-share basis. Different Access Control Credentials are applied to different parts of the Threat Alert. The Threat Alert is distributed to all agencies - only those recipients with the proper Roles & Permissions will be able to access all or part of document. Intelligrid Security Framework
In summary • Intelligrid security options are discussed in the EPRI reports • Sorting out the options is a daunting task • You have to have considerable security expertise with a very strong understanding of power system operations • Commercial solutions are available • ANSI X9.69-based security is a comprehensive solution that can extend though all domains of Intelligrid • We then have a cost-effective coherent security solution for Intelligrid • Security management is pushed to the lowest level – nearest the application • Legacy systems need implementations that do not require changes to existing hardware and software Intelligrid Security Framework
Source references • Intelligridhttp://intelligrid.epri.com/ • ANSI http://webstore.ansi.org/subscriptions/ • ISO http://www.iso.org/iso/en/ Intelligrid Security Framework
Thank you for your attention Dennis Holsteinholsteindk@ieee.org Thomas Kropptom.kropp@dyonyx.com Keith Stoufferkeith.stouffer@nist.gov