SlideShare a Scribd company logo
1 of 6
Download to read offline
IBM Sof tware                                                                                                          Energy and Utilities
Rational
Rational




                                                              IBM Rational security
                                                              solutions for energy and
                                                              utility companies
                                                              Application security for risk reduction and regulatory
                                                              compliance for utilities building the smart grid


                                                              Energy and utility companies today are facing a combination of opportu-
                Highlights                                    nities and challenges. They must cope with the introduction of advanced
                                                              metering infrastructure (AMI), home area network devices (HAN), grid
            ●   Help energy and utility companies test        automation technologies, distributed generation and electric vehicles
                software from multiple sources for
                vulnerabilities                               (EVs), while maintaining their ability to deliver reliable, high-quality
                                                              power. Whether for residential or commercial and industrial (C&I)
            ●   Help save time and money by eliminating
                                                              customers, energy and utility providers must find ways to maintain the
                vulnerabilities as early as possible in the
                software delivery life cycle (SDLC)           stability and security of their existing systems while creating the next gen-
                                                              eration of more interactive—and therefore more vulnerable—solutions.
            ●   Ease the burden of demonstrating NERC
                CIP compliance for cyber vulnerability
                                                              IBM® Rational® software provides the tools to create these new
                assessments                                   applications while helping to minimize security risks.

                                                              Most energy and utility companies rely on software from a variety of
                                                              sources, which can make it difficult to stay on top of security issues.
                                                              These sources include:

                                                              ●   Internal development teams: Often tasked with complicated deliver-
                                                                  ables and facing tight deadlines, internal teams are dealing with vast
                                                                  numbers of critical requirements, which means security may not get the
                                                                  attention it deserves. And some of the security thinking in development
                                                                  is new, as traditionally, electric companies have not invested heavily in
                                                                  large scale software development initiatives. Besides, system integrators
                                                                  working with utilities often do not expose every detail of the underpin-
                                                                  nings of the grid applications.
IBM Software                                                                                                             Energy and Utilities
Rational




●   Packaged application vendors: Commercial off the shelf                 call for even more frequent assessments, covering a much larger
    (COTS) applications or “packaged apps” represent a signifi-             portion of utility systems. Performing these assessments consis-
    cant portion of many energy and utility companies’ infrastruc-         tently and cost-effectively requires significant effort.
    tures, but these applications have been created to meet the            Automation can help alleviate that burden.
    manufacturer’s standards rather than the energy and utility
    industry’s standards.                                                  And getting ready for NIST
●   External development teams: Outsourcing development                    Following years of work by members of industry, government,
    enables providers to take advantage of a wider pool of expert-         and academia, the National Institute for Standards
    ise and potentially realize cost savings, but to get the results       and Technology (NIST) released its “NISTIR 7628:
    you need, you must provide detailed descriptions of expected           Guidelines for Smart Grid Cyber Security,”2 version 1.0 in
    secure development standards.                                          September 2010 and included guidance to rid systems of
●   Free and open source software: These offerings can be cost             application-layer vulnerabilities and design issues, calling out
    effective, but they’re developed by groups that may or may             several by name, including:
    not meet the regulations and standards that drive the utilities
    looking to use them.                                                   ●Input and output validation
                                                                           ●Authorization vulnerabilities
Minimizing vulnerabilities                                                 ●Password and password management vulnerabilities
It would be ideal if all software used in your applications were           ●Error handling
developed and tested in a secure software development life                 ●Cryptographic vulnerabilities and weaknesses
cycle (SDLC), but that is rarely the case. Furthermore, security           ●Logging & auditing issues
requirements differ among industries, and no one set of best               … and more
practices can apply to all of them. So as new smart grids are
being built out of billions of lines of software, it’s difficult to        It’s uncertain how quickly these guidelines will become
know whether all of it has been rigorously examined from a                 part of utilities’ compliance regime, but as support for
security perspective. And unfortunately, hackers regularly                 NISTIR 7628 has been strong in the US, including among
demonstrate their ability to circumvent security controls by               the state public utility commissions (PUCs) as well as interna-
finding and exploiting software vulnerabilities.                            tionally, it makes sense for utilities to begin preparations.

Demonstrating compliance with NERC                                         Controlling development costs
regulations                                                                When the applications in question are the ones you’re building
The North American Electric Reliability Corporation (NERC)                 yourself, reducing vulnerabilities early in the life cycle may be
critical infrastructure protection (CIP) 007 regulation calls for          one of the best ways to ensure security and reduce development
annual vulnerability assessments. It also states that energy and           costs. Assessing applications during the development phase can
utility companies must provide “[d]ocumentation of the results             be an ideal way to reduce opportunities for vulnerabilities and
of the assessment, the action plan to remediate or mitigate vul-           to simplify the assessment and reporting process later on.
nerabilities identified in the assessment, and the execution status
of that action plan.”1 Upcoming versions of the CIPs will likely




                                                                       2
IBM Software                                                                                                                         Energy and Utilities
Rational




                           Outsourced applications   Preexisting applications        Packaged applications      Applications developed in-house




     Applications
  from disparate
         sources
                      Outage management
                      application

                                                       Customer portal
                                                                                   System identity and access
                                                                                   management system
                                                                                                                        Meter data management
                                                                                                                                       system
                                                                                                                                                   [
                                                                  Vulnerability identification
    IBM Rational
        security
       solutions




                                                                                                                                                   [
                                                                   Vulnerability remediation




   Assessed and
       validated
    applications




A solution from IBM Rational software                                           vulnerabilities long before your software is exposed to the
IBM offers a combination of products and services that can help                 public. And you can save time by automating analysis, triage,
you enhance security while reducing your development costs:                     and vulnerability dispatch as part of your build process.

IBM Rational AppScan Standard Edition                                           IBM Rational AppScan Enterprise Edition
Rapidly scan applications and web-facing systems for                            Enable enterprise report generation for senior manage-
vulnerabilities and configuration issues using IBM Rational                      ment, auditors and other key stakeholders. Improving
AppScan® Standard Edition software. If you’re buying or                         security is one thing; demonstrating that you’ve done what it
building a new customer portal, web application assessment                      takes is another. Automated reporting capabilities from Rational
capabilities from Rational software can help reduce the security                AppScan Enterprise Edition software allow you to spend less
risks involved.                                                                 time creating reports and more time on your applications,
                                                                                systems and customers.
IBM Rational AppScan Source Edition
Analyze your source code during the early stages of the                         IBM Rational Professional Services
SDLC to catch vulnerabilities quickly. Rational AppScan                         Develop processes to address current and evolving NERC
Source Edition software enables you to identify and reduce                      compliance requirements. Rational security professionals can
                                                                                help you design and develop a customized vulnerability action
                                                                                plan that’s applicable for NERC and other standards.




                                                                          3
IBM Software                                                                                                              Energy and Utilities
Rational




Best practices                                                             and maintaining a secure infrastructure, including knowledge of
Utilities have a few things to consider when launching an appli-           threats and vulnerabilities, structural elements, and ongoing val-
cation security program, and lessons learned in other industries           idation. For application security with smart meters and other
can help guide their way. A few of these first steps include:               grid automation sensors generating unprecedented amounts of
                                                                           (often sensitive) data on a daily basis, while Rational AppScan
●   Know what applications you have via centralized asset discov-          software family capabilities are central, other important and
    ery and management.                                                    related IBM tools and services include:
●   Put a starter policy in place that describes how your organiza-
    tion secures its SDLC.                                                 ●   Rational development life-cycle tools for defect tracking and
●   Prioritize applications by business criticality and exposure,              source code control, as well as tools to help you inventory
    and triage found vulnerabilities to remediate or mitigate the              your applications and capture your security policy.
    most severe ones first.                                                 ●   IBM InfoSphere™ Optim™ software for data management
●   Include application security objectives and requirements in                and IBM InfoSphere Guardium® software for data security.
    sourcing activities and decisions.                                     ●   IBM Tivoli® Identity and Access Management (IAM)
                                                                               solutions.
Use cases                                                                  ●   IBM WebSphere® Data Power for web services security.
Utilities in the US and elsewhere are beginning to understand
                                                                           ●   IBM Proventia® network and application layer firewalls.
that deploying and interconnecting software-centric systems is
                                                                           ●   IBM Emergency Response Services (ERS).
a risky proposition. And many have begun to address this issue
via implementation of new security policies, new employee                  Conclusion
training and awareness initiatives, and the addition of select             From a security perspective, energy and utility companies have
tools to help automate security testing at key milestones. Here            a lot on their plates these days. In the past, their systems were
are a few of the use cases:                                                partially protected through isolation. But the benefits of smart
                                                                           grid, AMI and grid automation projects can best be achieved
●   Using tools to identify and eliminate high severity vulnerabili-       by fully integrating and networking IT with operations and
    ties in public-facing applications like new smart grid customer        by achieving trusted, reliable and attack resilient two-way
    portals.                                                               communications paths to and from customers. This unprece-
●   Performing web and source code-level security assessments of           dented access and connectivity must be managed via new
    AMI components.                                                        security controls and policies, a vast majority of which are
●   Smart meter vendors running pre-release security tests of              implemented in software.
    their code.
                                                                           Security solutions from IBM Rational software can help energy
An important part of IBM’s “Secure by                                      and utility companies better understand the security posture of
                                                                           their applications and other software assets to save valuable time
Design” initiative
                                                                           and money, make better-informed decisions to manage compli-
As part of its Solutions Architecture for Energy (SAFE)
                                                                           ance regulations and help protect themselves from attackers.
software framework, and Secure by Design approach,
IBM offers three primary components essential to creating




                                                                       4
Notes
For more information
To learn more about security solutions for energy and utility
companies, contact your IBM representative or IBM Business
Partner, or visit: ibm.com/software/rational/offerings/
websecurity/?S_TACT=105AGX23&S_CMP=HP
                                                                     © Copyright IBM Corporation 2011

Additionally, financing solutions from IBM Global Financing           IBM Corporation
can enable effective cash management, protection from tech-          Software Group
                                                                     Route 100
nology obsolescence, improved total cost of ownership and            Somers, NY 10589
return on investment. Also, our Global Asset Recovery Services       U.S.A.
help address environmental concerns with new, more energy-           Produced in the United States of America
efficient solutions. For more information on IBM Global              March 2011
Financing, visit: ibm.com/financing                                   All Rights Reserved

                                                                     IBM, the IBM logo, ibm.com, and Rational are trademarks of International
                                                                     Business Machines Corp., registered in many jurisdictions worldwide.
                                                                     Other product and service names might be trademarks of IBM or other
                                                                     companies. A current list of IBM trademarks is available on the web at
                                                                     “Copyright and trademark information” at ibm.com/legal/copytrade.shtml

                                                                     Guardium is a registered trademark of Guardium, Inc., an IBM Company.

                                                                     References in this publication to IBM products or services do not
                                                                     imply that IBM intends to make them available in all countries in
                                                                     which IBM operates.

                                                                     The information contained in this documentation is provided for
                                                                     informational purposes only. While efforts were made to verify the
                                                                     completeness and accuracy of the information contained in this
                                                                     documentation, it is provided “as is” without warranty of any kind,
                                                                     express or implied. In addition, this information is based on IBM’s current
                                                                     product plans and strategy, which are subject to change by IBM without
                                                                     notice. IBM shall not be responsible for any damages arising out of the use
                                                                     of, or otherwise related to, this documentation or any other documentation.
                                                                     Nothing contained in this documentation is intended to, nor shall have
                                                                     the effect of, creating any warranties or representations from IBM (or its
                                                                     suppliers or licensors), or altering the terms and conditions of the applicable
                                                                     license agreement governing the use of IBM software.

                                                                     IBM customers are responsible for ensuring their own compliance with
                                                                     legal requirements. It is the customer’s sole responsibility to obtain advice of
                                                                     competent legal counsel as to the identification and interpretation of any
                                                                     relevant laws and regulatory requirements that may affect the customer’s
                                                                     business and any actions the customer may need to take to comply with
                                                                     such laws.
                                                                 1
                                                                     North American Electric Reliability Corporation,
                                                                     Standard CIP-007-3—Cyber Security—Systems Security Management,
                                                                     December 16, 2009, http://www.nerc.com/files/CIP-007-3.pdf
                                                                 2
                                                                     National Institute of Standards and Technology Interoperability Report
                                                                     (NISTIR) 7628 - Guidelines for Smart Grid Cyber Security, Volume 3, August
                                                                     2010, http://csrc.nist.gov/publications/nistir/ir7628/nistir-7628_vol3.pdf


                                                                               Please Recycle




                                                                                                                              RAS14050-USEN-02

More Related Content

Viewers also liked

SMILE - FRAGRANCE OF LOVE SUBLIME!
SMILE - FRAGRANCE OF LOVE SUBLIME! SMILE - FRAGRANCE OF LOVE SUBLIME!
SMILE - FRAGRANCE OF LOVE SUBLIME! Vinod Sailes
 
Fitxes castanyada 2010
Fitxes castanyada 2010Fitxes castanyada 2010
Fitxes castanyada 2010espems
 
KJMediacourseworkpdf
KJMediacourseworkpdfKJMediacourseworkpdf
KJMediacourseworkpdf07kjamieson
 
Nick manij
Nick manijNick manij
Nick manijStunnah
 
NapoleonCat.com - InternetBeta2013
NapoleonCat.com - InternetBeta2013NapoleonCat.com - InternetBeta2013
NapoleonCat.com - InternetBeta2013NapoleonCat.com
 
Configuration / Patching of EM 12c
Configuration / Patching of EM 12cConfiguration / Patching of EM 12c
Configuration / Patching of EM 12cJon Petter Hjulstad
 
Agency1 full keynote_22_07_13
Agency1 full keynote_22_07_13Agency1 full keynote_22_07_13
Agency1 full keynote_22_07_13Sergey Vorobyov
 
Istanbul Declaration, 3 Nov 2010
Istanbul Declaration, 3 Nov 2010Istanbul Declaration, 3 Nov 2010
Istanbul Declaration, 3 Nov 2010Jerry_Nombri_Garry
 
Spanning people, processes, and technologies: The business case for Collabora...
Spanning people, processes, and technologies: The business case for Collabora...Spanning people, processes, and technologies: The business case for Collabora...
Spanning people, processes, and technologies: The business case for Collabora...IBM Rational software
 
Facebook age breakdown by country jan 2014
Facebook age breakdown by country jan 2014Facebook age breakdown by country jan 2014
Facebook age breakdown by country jan 2014NapoleonCat.com
 

Viewers also liked (15)

SMILE - FRAGRANCE OF LOVE SUBLIME!
SMILE - FRAGRANCE OF LOVE SUBLIME! SMILE - FRAGRANCE OF LOVE SUBLIME!
SMILE - FRAGRANCE OF LOVE SUBLIME!
 
Fitxes castanyada 2010
Fitxes castanyada 2010Fitxes castanyada 2010
Fitxes castanyada 2010
 
KJMediacourseworkpdf
KJMediacourseworkpdfKJMediacourseworkpdf
KJMediacourseworkpdf
 
Double page spread
Double page spreadDouble page spread
Double page spread
 
Nick manij
Nick manijNick manij
Nick manij
 
Colombian CM
Colombian CMColombian CM
Colombian CM
 
NapoleonCat.com - InternetBeta2013
NapoleonCat.com - InternetBeta2013NapoleonCat.com - InternetBeta2013
NapoleonCat.com - InternetBeta2013
 
DoDataDo introduction
DoDataDo introductionDoDataDo introduction
DoDataDo introduction
 
Lideratge 360º
Lideratge 360ºLideratge 360º
Lideratge 360º
 
Configuration / Patching of EM 12c
Configuration / Patching of EM 12cConfiguration / Patching of EM 12c
Configuration / Patching of EM 12c
 
Agency1 full keynote_22_07_13
Agency1 full keynote_22_07_13Agency1 full keynote_22_07_13
Agency1 full keynote_22_07_13
 
Istanbul Declaration, 3 Nov 2010
Istanbul Declaration, 3 Nov 2010Istanbul Declaration, 3 Nov 2010
Istanbul Declaration, 3 Nov 2010
 
The Romans
The RomansThe Romans
The Romans
 
Spanning people, processes, and technologies: The business case for Collabora...
Spanning people, processes, and technologies: The business case for Collabora...Spanning people, processes, and technologies: The business case for Collabora...
Spanning people, processes, and technologies: The business case for Collabora...
 
Facebook age breakdown by country jan 2014
Facebook age breakdown by country jan 2014Facebook age breakdown by country jan 2014
Facebook age breakdown by country jan 2014
 

More from IBM Rational software

DMT-2467 Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...
DMT-2467	Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...DMT-2467	Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...
DMT-2467 Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...IBM Rational software
 
Dmt 5899 workshop - Learn to Collaborate, Trace, Review and Reuse Your Requir...
Dmt 5899 workshop - Learn to Collaborate, Trace, Review and Reuse Your Requir...Dmt 5899 workshop - Learn to Collaborate, Trace, Review and Reuse Your Requir...
Dmt 5899 workshop - Learn to Collaborate, Trace, Review and Reuse Your Requir...IBM Rational software
 
Steer at the Team Level with Rational Team Concert
Steer at the Team Level with Rational Team ConcertSteer at the Team Level with Rational Team Concert
Steer at the Team Level with Rational Team ConcertIBM Rational software
 
UrbanCode Deploy course and product overview slides
UrbanCode Deploy course and product overview slidesUrbanCode Deploy course and product overview slides
UrbanCode Deploy course and product overview slidesIBM Rational software
 
IBM InterConnect Speaker Proposal Tips
IBM InterConnect Speaker Proposal TipsIBM InterConnect Speaker Proposal Tips
IBM InterConnect Speaker Proposal TipsIBM Rational software
 
Factors to consider when starting a brand-new requirements management project...
Factors to consider when starting a brand-new requirements management project...Factors to consider when starting a brand-new requirements management project...
Factors to consider when starting a brand-new requirements management project...IBM Rational software
 
IBM DevOps Announcements - June 2014
IBM DevOps Announcements - June 2014IBM DevOps Announcements - June 2014
IBM DevOps Announcements - June 2014IBM Rational software
 
IBM Rational Developer for System z Quick Start Sales Presentation
IBM Rational Developer for System z Quick Start Sales PresentationIBM Rational Developer for System z Quick Start Sales Presentation
IBM Rational Developer for System z Quick Start Sales PresentationIBM Rational software
 
Rational consulting café to go menu
Rational consulting café to go menuRational consulting café to go menu
Rational consulting café to go menuIBM Rational software
 

More from IBM Rational software (20)

DMT-2467 Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...
DMT-2467	Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...DMT-2467	Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...
DMT-2467 Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...
 
Dmt 5899 workshop - Learn to Collaborate, Trace, Review and Reuse Your Requir...
Dmt 5899 workshop - Learn to Collaborate, Trace, Review and Reuse Your Requir...Dmt 5899 workshop - Learn to Collaborate, Trace, Review and Reuse Your Requir...
Dmt 5899 workshop - Learn to Collaborate, Trace, Review and Reuse Your Requir...
 
Deployment module slides
Deployment module slidesDeployment module slides
Deployment module slides
 
Security
SecuritySecurity
Security
 
Steer at the Team Level with Rational Team Concert
Steer at the Team Level with Rational Team ConcertSteer at the Team Level with Rational Team Concert
Steer at the Team Level with Rational Team Concert
 
Applications lab
Applications lab Applications lab
Applications lab
 
Application slides
Application slidesApplication slides
Application slides
 
Components lab
Components labComponents lab
Components lab
 
UCD components
UCD components UCD components
UCD components
 
Resource lab
Resource labResource lab
Resource lab
 
Resources slides
Resources slidesResources slides
Resources slides
 
UrbanCode Deploy course and product overview slides
UrbanCode Deploy course and product overview slidesUrbanCode Deploy course and product overview slides
UrbanCode Deploy course and product overview slides
 
IBM InterConnect Speaker Proposal Tips
IBM InterConnect Speaker Proposal TipsIBM InterConnect Speaker Proposal Tips
IBM InterConnect Speaker Proposal Tips
 
Factors to consider when starting a brand-new requirements management project...
Factors to consider when starting a brand-new requirements management project...Factors to consider when starting a brand-new requirements management project...
Factors to consider when starting a brand-new requirements management project...
 
IBM DevOps Announcements - June 2014
IBM DevOps Announcements - June 2014IBM DevOps Announcements - June 2014
IBM DevOps Announcements - June 2014
 
IBM Rational Developer for System z Quick Start Sales Presentation
IBM Rational Developer for System z Quick Start Sales PresentationIBM Rational Developer for System z Quick Start Sales Presentation
IBM Rational Developer for System z Quick Start Sales Presentation
 
Rational consulting café to go menu
Rational consulting café to go menuRational consulting café to go menu
Rational consulting café to go menu
 
Lab3 RTC Source Control
Lab3 RTC Source ControlLab3 RTC Source Control
Lab3 RTC Source Control
 
Lab2 RTC Work Items
Lab2 RTC Work ItemsLab2 RTC Work Items
Lab2 RTC Work Items
 
Lab4 RTC Builds
Lab4 RTC BuildsLab4 RTC Builds
Lab4 RTC Builds
 

Recently uploaded

Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Sheetaleventcompany
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...lizamodels9
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture conceptP&CO
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Call Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂Escort
Call Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂EscortCall Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂Escort
Call Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂Escortdlhescort
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizharallensay1
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noidadlhescort
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 

Recently uploaded (20)

Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Call Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂Escort
Call Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂EscortCall Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂Escort
Call Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂Escort
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 

Application security for risk reduction and regulatory compliance for utilities building the smart grid

  • 1. IBM Sof tware Energy and Utilities Rational Rational IBM Rational security solutions for energy and utility companies Application security for risk reduction and regulatory compliance for utilities building the smart grid Energy and utility companies today are facing a combination of opportu- Highlights nities and challenges. They must cope with the introduction of advanced metering infrastructure (AMI), home area network devices (HAN), grid ● Help energy and utility companies test automation technologies, distributed generation and electric vehicles software from multiple sources for vulnerabilities (EVs), while maintaining their ability to deliver reliable, high-quality power. Whether for residential or commercial and industrial (C&I) ● Help save time and money by eliminating customers, energy and utility providers must find ways to maintain the vulnerabilities as early as possible in the software delivery life cycle (SDLC) stability and security of their existing systems while creating the next gen- eration of more interactive—and therefore more vulnerable—solutions. ● Ease the burden of demonstrating NERC CIP compliance for cyber vulnerability IBM® Rational® software provides the tools to create these new assessments applications while helping to minimize security risks. Most energy and utility companies rely on software from a variety of sources, which can make it difficult to stay on top of security issues. These sources include: ● Internal development teams: Often tasked with complicated deliver- ables and facing tight deadlines, internal teams are dealing with vast numbers of critical requirements, which means security may not get the attention it deserves. And some of the security thinking in development is new, as traditionally, electric companies have not invested heavily in large scale software development initiatives. Besides, system integrators working with utilities often do not expose every detail of the underpin- nings of the grid applications.
  • 2. IBM Software Energy and Utilities Rational ● Packaged application vendors: Commercial off the shelf call for even more frequent assessments, covering a much larger (COTS) applications or “packaged apps” represent a signifi- portion of utility systems. Performing these assessments consis- cant portion of many energy and utility companies’ infrastruc- tently and cost-effectively requires significant effort. tures, but these applications have been created to meet the Automation can help alleviate that burden. manufacturer’s standards rather than the energy and utility industry’s standards. And getting ready for NIST ● External development teams: Outsourcing development Following years of work by members of industry, government, enables providers to take advantage of a wider pool of expert- and academia, the National Institute for Standards ise and potentially realize cost savings, but to get the results and Technology (NIST) released its “NISTIR 7628: you need, you must provide detailed descriptions of expected Guidelines for Smart Grid Cyber Security,”2 version 1.0 in secure development standards. September 2010 and included guidance to rid systems of ● Free and open source software: These offerings can be cost application-layer vulnerabilities and design issues, calling out effective, but they’re developed by groups that may or may several by name, including: not meet the regulations and standards that drive the utilities looking to use them. ●Input and output validation ●Authorization vulnerabilities Minimizing vulnerabilities ●Password and password management vulnerabilities It would be ideal if all software used in your applications were ●Error handling developed and tested in a secure software development life ●Cryptographic vulnerabilities and weaknesses cycle (SDLC), but that is rarely the case. Furthermore, security ●Logging & auditing issues requirements differ among industries, and no one set of best … and more practices can apply to all of them. So as new smart grids are being built out of billions of lines of software, it’s difficult to It’s uncertain how quickly these guidelines will become know whether all of it has been rigorously examined from a part of utilities’ compliance regime, but as support for security perspective. And unfortunately, hackers regularly NISTIR 7628 has been strong in the US, including among demonstrate their ability to circumvent security controls by the state public utility commissions (PUCs) as well as interna- finding and exploiting software vulnerabilities. tionally, it makes sense for utilities to begin preparations. Demonstrating compliance with NERC Controlling development costs regulations When the applications in question are the ones you’re building The North American Electric Reliability Corporation (NERC) yourself, reducing vulnerabilities early in the life cycle may be critical infrastructure protection (CIP) 007 regulation calls for one of the best ways to ensure security and reduce development annual vulnerability assessments. It also states that energy and costs. Assessing applications during the development phase can utility companies must provide “[d]ocumentation of the results be an ideal way to reduce opportunities for vulnerabilities and of the assessment, the action plan to remediate or mitigate vul- to simplify the assessment and reporting process later on. nerabilities identified in the assessment, and the execution status of that action plan.”1 Upcoming versions of the CIPs will likely 2
  • 3. IBM Software Energy and Utilities Rational Outsourced applications Preexisting applications Packaged applications Applications developed in-house Applications from disparate sources Outage management application Customer portal System identity and access management system Meter data management system [ Vulnerability identification IBM Rational security solutions [ Vulnerability remediation Assessed and validated applications A solution from IBM Rational software vulnerabilities long before your software is exposed to the IBM offers a combination of products and services that can help public. And you can save time by automating analysis, triage, you enhance security while reducing your development costs: and vulnerability dispatch as part of your build process. IBM Rational AppScan Standard Edition IBM Rational AppScan Enterprise Edition Rapidly scan applications and web-facing systems for Enable enterprise report generation for senior manage- vulnerabilities and configuration issues using IBM Rational ment, auditors and other key stakeholders. Improving AppScan® Standard Edition software. If you’re buying or security is one thing; demonstrating that you’ve done what it building a new customer portal, web application assessment takes is another. Automated reporting capabilities from Rational capabilities from Rational software can help reduce the security AppScan Enterprise Edition software allow you to spend less risks involved. time creating reports and more time on your applications, systems and customers. IBM Rational AppScan Source Edition Analyze your source code during the early stages of the IBM Rational Professional Services SDLC to catch vulnerabilities quickly. Rational AppScan Develop processes to address current and evolving NERC Source Edition software enables you to identify and reduce compliance requirements. Rational security professionals can help you design and develop a customized vulnerability action plan that’s applicable for NERC and other standards. 3
  • 4. IBM Software Energy and Utilities Rational Best practices and maintaining a secure infrastructure, including knowledge of Utilities have a few things to consider when launching an appli- threats and vulnerabilities, structural elements, and ongoing val- cation security program, and lessons learned in other industries idation. For application security with smart meters and other can help guide their way. A few of these first steps include: grid automation sensors generating unprecedented amounts of (often sensitive) data on a daily basis, while Rational AppScan ● Know what applications you have via centralized asset discov- software family capabilities are central, other important and ery and management. related IBM tools and services include: ● Put a starter policy in place that describes how your organiza- tion secures its SDLC. ● Rational development life-cycle tools for defect tracking and ● Prioritize applications by business criticality and exposure, source code control, as well as tools to help you inventory and triage found vulnerabilities to remediate or mitigate the your applications and capture your security policy. most severe ones first. ● IBM InfoSphere™ Optim™ software for data management ● Include application security objectives and requirements in and IBM InfoSphere Guardium® software for data security. sourcing activities and decisions. ● IBM Tivoli® Identity and Access Management (IAM) solutions. Use cases ● IBM WebSphere® Data Power for web services security. Utilities in the US and elsewhere are beginning to understand ● IBM Proventia® network and application layer firewalls. that deploying and interconnecting software-centric systems is ● IBM Emergency Response Services (ERS). a risky proposition. And many have begun to address this issue via implementation of new security policies, new employee Conclusion training and awareness initiatives, and the addition of select From a security perspective, energy and utility companies have tools to help automate security testing at key milestones. Here a lot on their plates these days. In the past, their systems were are a few of the use cases: partially protected through isolation. But the benefits of smart grid, AMI and grid automation projects can best be achieved ● Using tools to identify and eliminate high severity vulnerabili- by fully integrating and networking IT with operations and ties in public-facing applications like new smart grid customer by achieving trusted, reliable and attack resilient two-way portals. communications paths to and from customers. This unprece- ● Performing web and source code-level security assessments of dented access and connectivity must be managed via new AMI components. security controls and policies, a vast majority of which are ● Smart meter vendors running pre-release security tests of implemented in software. their code. Security solutions from IBM Rational software can help energy An important part of IBM’s “Secure by and utility companies better understand the security posture of their applications and other software assets to save valuable time Design” initiative and money, make better-informed decisions to manage compli- As part of its Solutions Architecture for Energy (SAFE) ance regulations and help protect themselves from attackers. software framework, and Secure by Design approach, IBM offers three primary components essential to creating 4
  • 6. For more information To learn more about security solutions for energy and utility companies, contact your IBM representative or IBM Business Partner, or visit: ibm.com/software/rational/offerings/ websecurity/?S_TACT=105AGX23&S_CMP=HP © Copyright IBM Corporation 2011 Additionally, financing solutions from IBM Global Financing IBM Corporation can enable effective cash management, protection from tech- Software Group Route 100 nology obsolescence, improved total cost of ownership and Somers, NY 10589 return on investment. Also, our Global Asset Recovery Services U.S.A. help address environmental concerns with new, more energy- Produced in the United States of America efficient solutions. For more information on IBM Global March 2011 Financing, visit: ibm.com/financing All Rights Reserved IBM, the IBM logo, ibm.com, and Rational are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at “Copyright and trademark information” at ibm.com/legal/copytrade.shtml Guardium is a registered trademark of Guardium, Inc., an IBM Company. References in this publication to IBM products or services do not imply that IBM intends to make them available in all countries in which IBM operates. The information contained in this documentation is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained in this documentation, it is provided “as is” without warranty of any kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this documentation or any other documentation. Nothing contained in this documentation is intended to, nor shall have the effect of, creating any warranties or representations from IBM (or its suppliers or licensors), or altering the terms and conditions of the applicable license agreement governing the use of IBM software. IBM customers are responsible for ensuring their own compliance with legal requirements. It is the customer’s sole responsibility to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such laws. 1 North American Electric Reliability Corporation, Standard CIP-007-3—Cyber Security—Systems Security Management, December 16, 2009, http://www.nerc.com/files/CIP-007-3.pdf 2 National Institute of Standards and Technology Interoperability Report (NISTIR) 7628 - Guidelines for Smart Grid Cyber Security, Volume 3, August 2010, http://csrc.nist.gov/publications/nistir/ir7628/nistir-7628_vol3.pdf Please Recycle RAS14050-USEN-02