1. Home
  2. |Insights
  3. |NERC Issues “Lesson Learned” From a Cyberattack on an Electricity Control Center

NERC Issues “Lesson Learned” From a Cyberattack on an Electricity Control Center

Client Alert | 2 min read | 09.13.19

On September 4, the North American Electric Reliability Corporation (NERC) issued a “Lessons Learned” from a March 5, 2019 cyberattack on a low-impact grid control center and several small power generation sites in the western United States.  NERC’s assessment provides guidance to NERC-registered entities on this incident, which was previously reported to the U.S. Department of Energy.

The cyber disruption is described as “brief (i.e. less than five minutes) outages of internet-facing firewalls that controlled communications between the control center and multiple remote generation sites and between equipment on these sites.” These outages continued over a 10-hour period.  NERC concludes that these outages “had no impact to generation” and notes that the targeted NERC-registered entity mitigated the immediate risks and then undertook corrective actions “to reduce the likelihood of an event with a similar cause from happening again.”

NERC’s release details “good cyber security policies and procedures.” This guidance is intended “to provide industry with technical and understandable information that assists them with maintaining the reliability of the bulk power system,” and invites interested parties both to comment on the guidance document, and to contact NERC or the Western Electric Coordinating Council (WECC) directly.

Among other things, NERC underscores the need to utilize technical actions along with effective policies, including the need to

  • timely know what exploitable vulnerabilities are on a network,
  • closely monitor vendor firmware updates and patch releases, and
  • implement appropriate patch management practices to address known vulnerabilities. 

As NERC recognizes, an important lesson from this event is that the victim entity had not identified the vulnerability on its network before the attack and, thus, had not implemented the firmware update available from the firewall vendor that would have closed it–a fact pattern that is too frequently at the heart of cybersecurity incidents.

Additional technical concepts highlighted by NERC include

  • reducing and controlling the attack surface by having as few internet-facing devices as possible,
  • implementing layered defenses (e.g., screening router, virtual private network terminator and a firewall) rather than relying on only a firewall, and
  • segmenting networks (i.e.,  restricting lateral communication to necessary and expected network traffic). 

NERC also identifies useful third party resources, such as external vulnerability scanning (through DHS or security vendors), vulnerability tracking sites, and participation in the Electricity Information Sharing and Analysis Center (E-ISAC).

The March 5 event qualifies as what is becoming a flock of canaries in the cybersecurity coal mine.  NERC, together with the multiple other federal agencies partly responsible in this space (including DOE, FERC, and WECC) are necessarily balancing the need for useful disclosure to the industry against the perils of providing road maps to potential bad actors looking for disruptive opportunities.  Owners of critical energy infrastructure in the electric power sector are advised to review carefully NERC’s guidance, to benchmark NERC’s recommendations against their own cybersecurity measures, to rigorously road test those measures in simulated exercises, and to engage with their public governing agencies (e.g., NERC, DHS, DOE) and private groups and vendors (e.g., E-ISAC, supply chain, /vendors) to timely share cyber threat information and best practices.

Insights

Client Alert | 1 min read | 04.18.24

GSA Clarifies Permissibility of Upfront Payments for Software-as-a-Service Offerings

On March 15, 2024, the General Services Administration (GSA) issued Acquisition Letter MV-2024-01 providing guidance to GSA contracting officers on the use of upfront payments for acquisitions of cloud-based Software-as-a-Service (SaaS).  Specifically, this acquisition letter clarifies that despite statutory prohibitions against the use of “advance” payments outside of narrowly-prescribed circumstances, upfront payments for SaaS licenses do not constitute an “advance” payment subject to these restrictions when made under the following conditions:...