Example 1: BES Cyber System Asset Assessment
Input:
{
"request_type": "bes_cyber_system_assessment",
"assessment_date": "2024-04-22",
"facility": {
"name": "Metro Power Generation Station",
"type": "generation_facility",
"capacity_mw": 650,
"fuel_type": "natural_gas",
"owner": "Metro Electric Utility"
},
"systems_inventory": [
{
"system_id": "EMS-001",
"system_name": "Energy Management System",
"function": "generation_control",
"network_accessible": true,
"routable_connectivity": true,
"dial_up_connectivity": false,
"serial_connectivity": true
},
{
"system_id": "HMI-002",
"system_name": "Plant Control HMI",
"function": "unit_control",
"network_accessible": true,
"routable_connectivity": false,
"critical_control_functions": true
},
{
"system_id": "SCADA-003",
"system_name": "Substation SCADA",
"function": "transmission_protection",
"voltage_level": "345kv",
"protection_systems": true
}
],
"assessment_criteria": {
"generation_threshold": 300,
"transmission_voltage": 100,
"impact_rating_required": "high_medium"
}
}
Output:
{
"assessment_id": "BES-ASSESS-2024-04-22-001",
"facility_classification": {
"bes_asset": true,
"impact_rating": "HIGH",
"justification": "Generation facility >300MW with transmission interconnection >100kV"
},
"cyber_system_classifications": [
{
"system_id": "EMS-001",
"classification": "high_impact_bes_cyber_system",
"rationale": "Performs real-time generation control functions",
"cip_requirements": ["CIP-003", "CIP-004", "CIP-005", "CIP-007", "CIP-010", "CIP-011"],
"electronic_access_points": 3,
"esp_required": true
},
{
"system_id": "HMI-002",
"classification": "high_impact_bes_cyber_system",
"rationale": "Critical control functions for unit operations",
"cip_requirements": ["CIP-003", "CIP-004", "CIP-005", "CIP-007", "CIP-010", "CIP-011"],
"esp_required": true
},
{
"system_id": "SCADA-003",
"classification": "high_impact_bes_cyber_system",
"rationale": "Controls transmission protection systems >300kV",
"cip_requirements": ["CIP-003", "CIP-004", "CIP-005", "CIP-007", "CIP-010", "CIP-011"],
"esp_required": true
}
],
"electronic_security_perimeter": {
"esp_required": true,
"number_of_esps": 2,
"electronic_access_points": [
{
"eap_id": "EAP-001",
"location": "Corporate_Network_Connection",
"access_type": "routable_connectivity",
"security_controls_required": ["firewall", "ids", "access_control"]
},
{
"eap_id": "EAP-002",
"location": "Vendor_Remote_Access",
"access_type": "dial_up_connectivity",
"security_controls_required": ["authentication", "encryption", "logging"]
}
]
},
"compliance_requirements": {
"immediate_actions": [
"Develop Electronic Security Perimeter documentation",
"Implement CIP-005 access control measures",
"Establish personnel authorization program (CIP-004)"
],
"timeline": {
"esp_implementation": "Within 90 days",
"personnel_training": "Within 60 days",
"vulnerability_assessments": "Annual",
"configuration_management": "Ongoing"
}
},
"risk_assessment": {
"threat_level": "HIGH",
"vulnerability_score": 7.2,
"impact_potential": "SEVERE",
"mitigation_priority": "IMMEDIATE"
}
}
Example 2: CIP-010 Configuration Change Management
Input:
{
"request_type": "configuration_change_management",
"change_request_id": "CCM-2024-0419-001",
"bes_cyber_system": {
"system_id": "EMS-001",
"impact_rating": "high",
"esp_designation": "ESP-001"
},
"proposed_changes": [
{
"change_type": "software_update",
"component": "SCADA_Server_OS",
"current_version": "Windows_Server_2019_v1809",
"proposed_version": "Windows_Server_2022_v21H2",
"justification": "Security patches and performance improvements",
"vendor": "Microsoft"
},
{
"change_type": "network_configuration",
"component": "Firewall_Rules",
"change_description": "Add port 443 access for new monitoring system",
"source": "Monitoring_Server_10.1.1.50",
"destination": "SCADA_Server_10.1.1.10",
"justification": "Enable secure HTTPS monitoring"
}
],
"change_window": {
"scheduled_start": "2024-04-27T02:00:00Z",
"scheduled_end": "2024-04-27T06:00:00Z",
"outage_required": true,
"backup_generation_available": true
}
}
Output:
{
"change_assessment_id": "CIP010-2024-0419-001",
"authorization_status": "APPROVED_WITH_CONDITIONS",
"security_impact_assessment": {
"overall_risk": "MODERATE",
"security_controls_affected": [
"CIP-005-5 Electronic Access Control",
"CIP-007-1 Ports and Services",
"CIP-010-1 Configuration Change Management"
],
"baseline_configuration_impact": "MODERATE"
},
"change_validation_requirements": [
{
"requirement": "security_testing",
"description": "Vulnerability scan of updated system",
"responsible_party": "Security Team",
"deadline": "Before production deployment"
},
{
"requirement": "backup_verification",
"description": "Verify system backup and rollback procedures",
"responsible_party": "Operations Team",
"deadline": "24 hours before change"
},
{
"requirement": "change_documentation",
"description": "Update baseline configuration documentation",
"responsible_party": "Compliance Team",
"deadline": "Within 30 days of change"
}
],
"compliance_checklist": {
"cip_010_r1": {
"requirement": "Configuration Change Management Program",
"status": "COMPLIANT",
"evidence": "CCM process followed per documented procedures"
},
"cip_010_r2": {
"requirement": "Configuration Monitoring",
"status": "REQUIRES_UPDATE",
"action": "Update monitoring baselines post-change"
},
"cip_010_r3": {
"requirement": "Vulnerability Assessments",
"status": "SCHEDULED",
"next_assessment": "2024-05-15"
}
},
"rollback_plan": {
"rollback_triggers": [
"System performance degradation >20%",
"Security control failures",
"Operational impact to generation"
],
"rollback_procedures": [
"Restore from pre-change system backup",
"Revert firewall rules to previous configuration",
"Verify all BES Cyber System functionality"
],
"rollback_timeframe": "Within 4 hours"
},
"post_change_verification": {
"functional_testing": "Required within 24 hours",
"security_validation": "Required within 72 hours",
"documentation_update": "Required within 30 days",
"lessons_learned": "Required within 7 days"
}
}