Cyber Wiki

From CyberWiki
Jump to navigation Jump to search

Welcome to the Cyber Security for Electric Power Generation CyberWiki

Welcome to the main page of the Electric Power Research Institute's CyberWiki, a wiki-style hub for cyber security research at EPRI, with a focus on operational technology in power generation. CyberWiki was built using the MediaWiki engine to be an extensible and dynamic educational and knowledge dissemination tool. It supplements the published content that is accessible through the EPRI website, or through each program's cockpit, by providing a flexible, web-based content delivery solution for projects that can benefit from the ability to easily update and add content as a project progresses. EPRI members can log in to access additional content through the EPRI Cyber Security for Generation Assets homepage.

Overview

ERPI’s Cyber Security for Generation Assets Program (P209) performed research and development to improve the security, safety, and resiliency of power generation facilities. The program addresses strategic focus areas including:

The CyberWiki also includes industry definitions, terms, standards, and regulations.

Summary of Key Topics

Here you will find a summary listing of resource areas and key topics. Published EPRI resources are listed by topic (separate login and access required). Resources that address multiple topics are listed multiple times.

Topic Description Resources
Changing Threat Landscape Cyber security threats evolve and impacts strategy, OT technology, and defensive tools. Recent Russian Cyber Campaign Targeting the Electric Sector
Changing Threat Landscape Study Report
Awareness of Nation State Cyber Activity Targeting Critical Infrastructure
2020 OT Cyber Security Trends for Electric Utilities
Critical Infrastructure Interdependencies on Generation Capacity
Operational Technology (OT) Network Segmentation and Micro-Segmentation Strategies
Industry Standards and Regulation Cyber security focusses on risk reduction. Regulatory standards mandate minimum expectations. Multiple security standards and framework are used worldwide and can align strategies with common terms and expectations. Research guides typically include sections relating to relevant standards and regulations by topic. CyberWiki Standards and Regulation Listing
Definitions and Terms CyberWiki Terms Library
NIST Glossary (External)
NERC Published Glossary of Terms (External)
ISC2 CISSP Student Guide Glossary (External)
Process and Integration
Governance, Risk, and Compliance Governance, Risk, and Compliance (GRC) addresses…. Cyber Security Technical Assessment Methodology
ConEd and Duke Energy Evaluate Cyber Security with Technical Assessment Methodology
Asset Management and Baseline Configuration for Generation and Renewable Assets
Risk-Informed Cyber Security Program Guide for Electric Generation Facilities
Fossil Power Plant Cyber Security Life-Cycle Risk Reduction
Operations Security (OPSEC) Program Development Guide
Cyber Security Risk Assessment Methodology
Cyber Security Case Study in Digital Overspeed Protection Systems
Cyber Security Operations Security (OPSEC) Awareness Posters
Duke Energy Optimizes Cyber Security for Generation Fleet
Program Development Cyber Security Technical Assessment Methodology: Risk Informed Exploit Sequence Identification and Mitigation, Revision 1
Transient Cyber Assets (TCAs) and Removable Media Process Guidance: Generation Cyber Security
Risk-Informed Cyber Security Program Guide for Electric Generation Facilities: Generation Cyber Security
Developing a Tamper Indicating Device (TID) Program for Cyber-Physical Security
Cyber-Security Assessment Lessons Learned in Generation
Duke Energy Optimizes Cyber Security for Generation Fleet
Workforce Development Patch Management Guideline CBT
Secure Interactive Remote Access in Power Generation Facilities v1.0
Guideline on Digital I&C Configuration Management and Hardening for Generation Facilities Computer Based Technology Transfer Modules
Incident Response Guidance: Generation Cyber Security
Access Control and Permission Management: Generation Cyber Security
Guideline on Cyber Security Scanning for Generation Plant Control Systems
Transient Cyber Assets and Removable Media Guideline
Technical Assessment Methodology (TAM) Revision 1
Developing a Cyber Security Culture in the Operational Technology (OT) Environment
Operations Security (OPSEC) Program Development Guide
Generation Cyber Security: Workforce Development
Cyber Security Operations Security (OPSEC) Awareness Posters
Supply Chain Cyber Security in the Supply Chain: Cyber Security Procurement Methodology, Revision 2
Understanding Vendor Cyber Security Certifications
Hydro Power DCS Upgrade Cyber Security Assessment
Cyber Security Procurement Topical Guide
Protection
Security Architectures and Segmentation
Vulnerability Management
Hardening
Secure Remote Access
Transient Cyber Assets and Removable Media
Identity and Access Management
Detection
Real-Time Detection
Scanning
Security Event Monitoring
Response and Recovery
Incident Response Program
Incident Response Playbooks
Disaster Recovery Plans
Scenarios and Training
Backup and Recovery
Security Operations and Incident Classification
Technology and Use Cases
Wireless Technology in Generation
IIOT, IOT, and Industry 4.0
Digital Worker
Artificial Intelligence
Quantum Computing
Software Bill of Materials
Control System Case Studies
Technical Assessment Methodology Case Studies