The utilities are not addressing the cyber security that will keep lights on

Nov. 22, 2021
On November 16-17, 2021 the utility industry conducted its biennial grid security exercise – GridEx VI. The exercise addressed the hybridized attacks of IT and OT networks which included ransomware as well as physical security. The lack of cybersecurity in the grid’s process sensors is a common mode vulnerability that affects both situational awareness and incident response plans. Aurora is a gap in electrical grid protecting that can render the grid inoperative for 9-18 MONTHS by damaging expensive and difficult to replace machinery. It can also damage natural gas compressor stations. The Chinese hardware backdoors represents a supply chain compromise that can lead to unanalyzed grid disturbances affecting major population centers. Yet hardware supply chain issues were not addressed. Why won’t the utilities adequately address what is their most important function which is keeping the lights on?

On November 16-17, 2021 the utility industry conducted its biennial grid security exercise – GridEx VI. According to NERC, GridEx VI’s objectives were to:

- Activate incident, operating, and crisis management response plans

- Enhance coordination with government to facilitate grid restoration

- Identify interdependence concerns with natural gas and telecommunications sectors

- Exercise response to a supply chain-based compromise to critical components; and

- Identify common mode and cyber operation concerns across interconnections.

The exercise did address the hybridized attacks of IT and OT networks which included ransomware as well as physical security (on-site premise and perimeter attacks). These are important issues, but do not directly affect keeping lights on.

The exercise does not seem to have identified the issues that could affect keeping lights on. Specifically, control system cyber issues including the lack of cyber security in grid process measurements, the Aurora vulnerability, and the Chinese hardware backdoors in power transformers and other grid equipment such as relays and inverters (https://www.controlglobal.com/blogs/unfettered/dni-identifies-chinese-transformers-as-cyber-vulnerable-risks-yet-doe-and-industry-ignore-the-threat/). The lack of cybersecurity in the grid’s process sensors is a common mode vulnerability that affects both situational awareness and incident response plans. Aurora is a gap in electrical grid protecting that can render the grid inoperative for 9-18 MONTHS by damaging expensive and difficult to replace machinery. It can also damage natural gas compressor stations. The Chinese hardware backdoors represents a supply chain compromise that can lead to unanalyzed grid disturbances affecting major population centers. Yet hardware supply chain issues were not addressed.

Why won’t the utilities adequately address what is their most important function which is keeping the lights on?

Joe Weiss

About the Author

Joe Weiss | Cybersecurity Contributor

Joe Weiss P.E., CISM, is managing partner of Applied Control Solutions, LLC, in Cupertino, CA. Formerly of KEMA and EPRI, Joe is an international authority on cybersecurity. You can contact him at [email protected]

Sponsored Recommendations

Municipalities are utilizing inline total solids measurements to enhance sludge thickening, lower polymer usage and cut operational expenses.
Carbon dioxide is increasingly recognized as a vital resource with significant economic potential. While the conversion of carbon dioxide into products is still in its infancy...
Discover our wide range of temperature transmitters that convert sensor signals from RTDs and thermocouples into stable and standardized output signals!
An innovative amine absorption-based carbon capture process enables retrofitting of existing industrial facilities to reduce emissions in hard-to-abate sectors, with advanced ...