Second Draft NIST Interagency Report: Smart Grid Cyber Security Strategy and Requirements; Request for Comments

Federal Register: April 13, 2010 (Volume 75, Number 70)

Notices

Page 18819-18823

From the Federal Register Online via GPO Access [wais.access.gpo.gov]

DOCID:fr13ap10-34

DEPARTMENT OF COMMERCE

National Institute of Standards and Technology

Docket Number: 100202060-0143-01

Second DRAFT NIST Interagency Report (NISTIR) 7628, Smart Grid

Cyber Security Strategy and Requirements; Request for Comments

AGENCY: National Institute of Standards and Technology (NIST),

Department of Commerce.

ACTION: Notice; request for comments.

SUMMARY: The National Institute of Standards and Technology (NIST) seeks comments on the second draft of NISTIR 7628, Smart Grid Cyber

Security Strategy and Requirements. This second draft has been updated to address the comments submitted. In addition, the privacy, vulnerability categories, bottom-up analysis, individual logical interface diagrams, and the cyber security strategy sections have all been updated and expanded and the requirements section has been revised to include requirements for the entire Smart Grid. Finally, there are new sections on research and development, standards assessment, and an overall logical functional architecture. This is the second draft of

NISTIR 7628; the final version is scheduled to be posted in the spring of 2010.

DATES: Comments must be received on or before June 2, 2010.

ADDRESSES: Written comments may be sent to: Annabelle Lee, National

Institute of Standards and Technology, 100 Bureau Dr., Stop 8930,

Gaithersburg, MD 20899-8930. Electronic comments may be sent to: cswgdraft2comments@nist.gov.

The report is available at: http://csrc.nist.gov/publications/

PubsDrafts.html#NIST-IR-7628.

FOR FURTHER INFORMATION CONTACT: Annabelle Lee, National Institute of

Standards and Technology, 100 Bureau Dr., Stop 8930, Gaithersburg, MD 20899-8930, telephone (301) 975-8897.

SUPPLEMENTARY INFORMATION: Section 1305 of the Energy Independence and

Security Act (EISA) of 2007 (Pub. L. 110-140) requires the Director of the National Institute of Standards and Technology (NIST) ``to coordinate the development of a framework that includes protocols and model standards for information management to achieve interoperability of smart grid devices and systems.'' EISA also specifies that, ``It is the policy of the United States to support the modernization of the

Nation's electricity transmission and distribution system to maintain a reliable and secure electricity infrastructure that can meet future demand growth and to achieve each of the following, which together characterize a Smart Grid: * * *

(1) Increased use of digital information and controls technology to improve reliability, security, and efficiency of the electric grid.

(2) Dynamic optimization of grid operations and resources, with full cyber-security * * *''

With the Smart Grid's transformation of the electric system to a two-way flow of electricity and information, the information technology

(IT) and telecommunications infrastructures have become critical to the energy sector infrastructure.

NIST has established a Smart Grid Interoperability Panel. The

Panel's Cyber Security Working Group (SGIP-CSWG) now has more than 375 volunteer members from the public and private sectors, academia, regulatory organizations, and Federal agencies. Cyber security is being addressed in a process that will result in a comprehensive set of cyber security requirements. These requirements are being developed using a high-level risk assessment process that is defined in the cyber security strategy for the Smart Grid.

NIST published a request for public comments in the Federal

Register on October 9, 2009 (74 FR 152183) to seek public comment on the first draft of NIST Interagency Report (NISTIR) 7628, Smart Grid

Cyber Security Strategy and Requirements.

The comment period closed on December 1, 2009. The second draft of

NISTIR 7628 incorporates changes based on the comments received, which are summarized below. The complete set of comments and NIST's analysis are posted at: http://csrc.nist.gov/publications/PubsDrafts.html#NIST-

IR-7628.

Summary of Public Comments Received by NIST in Response to the Draft

NISTIR 7628, Cyber Security Strategy and Requirements, and NIST's

Response to Those Comments

NIST received comments from sixty-three (63) organizations and individuals. The commenters consisted of twenty-three (23) private companies, five (5) Federal agencies, nine (9) individuals, twelve (12) non-profit organizations, twelve (12) industry associations and two (2) universities. A detailed analysis of the comments follows.

General Comments

Comment: Fifteen (15) commenters identified inconsistencies between the text and logical interface diagrams and suggested additions or deletions to the logical interface diagrams and associated text.

Response: In the second draft of NISTIR 7628, the logical interface diagrams and text have been updated and an overall functional logical architecture has been added.

Comment: Fifty-one (51) commenters suggested grammatical, editorial, and language changes and correcting cited information and sources.

Response: The relevant sections were updated to reflect suggested changes. Some suggested changes were not accepted because they are not consistent with Government Printing Office (GPO) style.

Comment: One (1) commenter suggested integration of cryptographically strong identity management mechanisms.

Response: Strong authentication is an important aspect of the Smart

Grid. This will be addressed in the next version of the NISTIR. There were several topics that were not addressed in the second draft of the

NISTIR. The schedule for completing the second draft was extremely tight. Therefore, we will address this comment in the June draft, which is the next version.

Comment: One (1) commenter suggested that security requirements be amended to address potential insider threats.

Response: The security requirements are intended to address threats from insiders and external entities. For the next version of the

NISTIR, additional analysis will be completed to ensure that the insider threat is addressed. There were several topics that were not addressed in the second draft of the NISTIR. The schedule for completing the second draft was extremely tight. Therefore, we will address this comment in the June draft, which is the next version.

Comment: Seven (7) commenters suggested amendments to the definition of the term ``cyber security'' to be more inclusive of the electric sector.

Response: The definition of ``cyber security'' was modified to focus on the electric sector.

Page 18820

Comment: Four (4) commenters suggested including definitions of frequently used terms and acronyms to ensure clear and consistent meanings throughout the document.

Response: A glossary has been included in the second draft of the

NISTIR.

Comment: Seven (7) commenters recommended establishing regulations and policies addressing various facets of Smart Grid, including naming an enforcement authority, privacy training and awareness, management and user accountability, use and retention of user data, and law enforcement access to Smart Grid data.

Response: These comments are outside the scope of the NISTIR and the Smart Grid Interoperability Panel (SGIP) Cyber Security Working

Group (CSWG) because they focus on regulations and policies.

Comment: Eighteen (18) commenters suggested that the NISTIR should be clarified with respect to purpose and intent of the document. It does not create Smart Grid Cyber Security ``requirements,'' rather acts as a strategy document intended to facilitate the development of such requirements.

Response: The NISTIR was revised to clarify that the document is a guidance document and that the content is not mandatory. In addition, text was added to clarify how the NISTIR may be used by organizations as they develop a cyber security strategy and specify security requirements for the Smart Grid.

Comment: Three (3) commenters suggested adding the following sections to the NISTIR:

Multi-Tier Control System Criticality Model.

Control System Trust Model.

Threat-based Requirements.

Response: These comments are being reviewed for possible inclusion in the next version of the NISTIR. There were several topics that were not addressed in the second draft of the NISTIR. The schedule for completing the second draft was extremely tight. Therefore, we will address this comment in the June draft, which is the next version.

Comment: One (1) commenter proposed use of risk-based performance standards rather than security-specific requirements.

Response: The comment will be considered during the development of the next version of the NISTIR. There were several topics that were not addressed in the second draft of the NISTIR. The schedule for completing the second draft was extremely tight. Therefore, we will address this comment in the June draft, which is the next version.

Comment: One (1) commenter encouraged NIST to collaborate closely with the electric utility industry to develop options for integrating legacy equipment into a smarter grid.

Response: The NISTIR has been revised to clarify that the content is at a high level and each organization will need to address security based on their specific requirements. The intent of the NISTIR is to identify security requirements for the end-to-end grid, including the integration of legacy equipment.

Comment: One (1) commenter advised NIST to implement role-based access control to Smart Grid data.

Response: The NISTIR has been revised to include role-based access control because NIST agrees that role-based access control is good practice.

Comment: Four (4) commenters suggested that the NISTIR should focus on the specificity of standards pertaining to cyber security rather than data privacy.

Response: Both reliability and privacy are being addressed by the

NISTIR as both are critical to the effective operation of the Smart

Grid.

Comment: One (1) commenter recommended creating a risk management framework focused on protecting the functions of the electric power system rather than the individual assets.

Response: The risk assessment process included in the NISTIR addresses the functions of and information in the electric grid, not individual assets.

Comment: One (1) commenter suggested that interoperability and system security standards be developed that apply directly to the interfaces and the equipment being integrated.

Response: This design consideration will be reviewed in depth for the next draft of the NISTIR. There were several topics that were not addressed in the second draft of the NISTIR. The schedule for completing the second draft was extremely tight. Therefore, we will address this comment in the June draft, which is the next version. The

NISTIR is intended to assist all stakeholders of the Smart Grid as they develop requirements and integration strategies.

Comment: One (1) commenter recommended assessing any potential cyber security impacts on the Smart Grid beyond the scope of IT and telecommunications; new vulnerabilities applicable to the Smart Grid could be introduced regularly.

Response: The second draft of the NISTIR provides additional information on impacts that affect the reliability of the Smart Grid.

The second draft of the NISTIR clarifies that a risk assessment needs to be performed at regular intervals to address new threats and vulnerabilities. This discussion will be further expanded on the next version of the NISTIR.

Comment: Five (5) commenters suggested including a high-level

``summary'' or user guide of the document in order to help readability.

Response: The final version of the NISTIR will include design considerations and/or a user guide to assist people in the use of the document.

Comment: One (1) commenter inquired about how NIST would evolve the document to address emerging threats, Smart Grid paradigms and other changing elements of security.

Response: The second draft of the NISTIR clarifies that the risk assessment needs to be performed at regular intervals to address emerging threats, new vulnerabilities, and changes in technology. This discussion will be further expanded on the next version of the NISTIR.

Comment: One (1) commenter inquired about Smart Grid Security

Certification and NIST's role in determining the relevancy of such certification.

Response: The Smart Grid Interoperability Panel (SGIP) Testing and

Certification Committee has been established to focus on this issue.

The SGIP-Cyber Security Working Group (SGIP-CSWG) will be coordinating with this new committee.

Comments and Responses Regarding Chapter One, Cyber Security Risk

Management Framework and Strategy

Comment: One (1) commenter suggested that the NISTIR document be revised to be consistent with the ``NIST Framework and Roadmap for

Smart Grid Interoperability Standards.'' Also, the document should clearly articulate a strategy for Smart Grid Cyber Security.

Response: The cyber security strategy in the NIST Framework and the

NISTIR are the same. Also, additional information was included in the

NIST Framework document and in the NISTIR to clarify how the two documents should be used.

Comment: One (1) commenter requested a more detailed definition of how the North American Electric Reliability Corporation (NERC) Critical

Infrastructure Protection (CIP) standards 002-CIP 009 will apply to the

Smart Grid. These standards currently apply to the bulk power system and it would be costly to apply them to all of the

Page 18821

Advanced Metering Infrastructure (AMI) and Distribution systems.

Response: The NERC CIPs are mandatory for the bulk power system.

The NISTIR includes security requirements for the entire Smart Grid, and the NERC CIPs are some of the standards used as source documents for the security requirements.

Comment: Two (2) commenters commented about the aggressive timeline for developing security requirements and the potential for inferior standards, requirements, and/or strategies because of the limited timeline.

Response: Because of the short time schedule, tasks are being done in parallel. The SGIP-CSWG recognizes the impact this may have and is working hard to ensure the quality is at a high level.

Comment: One (1) commenter noted the impact of new logical interface categories, security considerations, and appropriate controls on the current NISTIR. The overview should mention that the document is not exhaustive and excludes certain topics.

Response: The second draft of the NISTIR clarifies that the document is neither finalized nor comprehensive on all topics.

Comment: One (1) commenter proposed two specific strategies for developing a cyber security framework for the Smart Grid: 1. NIST and the industry should develop a focus on response and recovery. Although the primary goal of a cyber security strategy should be prevention, a response and recovery plan needs to be developed in the event of a cyber attack. 2. It is essential that those parts or equipment of the Smart Grid that optimize the system are separate from the core components of the

Smart Grid. In the event of a cyber security incident on the grid, the core components can be recovered with minimal technology in a quick and efficient manner, thereby assuring bulk power system reliability. This will also help identify where response plan decisions and actions can be carried out to protect core functionality and/or quickly restore it.

Response: The cyber security strategy included in the NISTIR addresses prevention, response, and recovery for events that affect the

Smart Grid. The cyber security strategy and the security requirements included in the NISTIR are at a high level and do not focus on specific parts and equipment. It is the responsibility of each organization to provide more granular security requirements. Also, the NISTIR addresses the entire Smart Grid, not just the bulk power system.

Comment: One (1) commenter suggested the expansion of the risk assessment to address distribution, transmission, and generation, in addition to AMI.

Response: The second draft of the NISTIR clarifies that the risk assessment should address the entire Smart Grid, not just AMI.

Comment: One (1) commenter inquired about the Smart Grid distribution system in relation to the jurisdiction of NERC.

Response: The NISTIR addresses the entire Smart Grid. Any questions related to the jurisdiction of NERC should be forwarded to that organization.

Comment: One (1) commenter recommended a continual assessment of cyber security risks to the Smart Grid be performed. This way, a common lexicon or language to capture system vulnerabilities that require continual monitoring can be determined.

Response: This recommendation will be considered for the final version of the NISTIR.

Comment: One (1) commenter suggested that NIST should integrate adequate cyber security protection at all levels (device, application, network and system) in the development of a cyber security strategy.

This level of cyber security protection should go beyond the requirements of NERC CIP Reliability Standards.

Response: The NISTIR has been modified to clarify that the security requirements are applicable to the entire Smart Grid. The NERC CIPs were considered in the development of the security requirements.

Comments and Responses Regarding Chapter Two, Privacy and the Smart

Grid

Comment: One (1) commenter suggested that NIST's approach to Smart

Grid privacy is insufficient.

Response: The privacy chapter has been significantly revised and includes more comprehensive privacy principles.

Comment: One (1) commenter recommended that fair information practices be adopted.

Response: The second draft of the NISTIR has a rewritten privacy chapter that includes privacy principles that addresses this concern.

Comment: One (1) commenter suggested that a rulemaking be developed so that service providers establish a concrete set of approved purposes for which PII activity is permitted. That list of approved purposes should be very limited and PII activity only be permitted for purposes essential to the functioning of the Smart Grid. Also, restrictions on the use and retention of data should be mandatory, not merely best practices.

Response: The scope of the NISTIR is to provide recommendations.

Implementation of regulations and mandatory practices are outside the scope of the NISTIR and the CSWG.

Comment: One (1) commenter stated the importance of having clear, strong language spelling out specific privacy protection.

Response: The privacy chapter of the second draft of the NISTIR has been revised and now includes revised privacy principles relevant to the Smart Grid.

Comment: One (1) commenter suggested that the privacy chapter should relate how the findings in the ``high-level privacy impact assessment (PIA) of the consumer-to-utility metering data sharing portion of the Smart Grid'' can be applied to the whole of the Smart

Grid. Otherwise, this whole chapter belongs as an appendix as a summary of those findings.

Response: The privacy chapter in the second draft of the NISTIR clarifies that the privacy impact assessment was performed for the entire Smart Grid.

Comment: Two (2) commenters recommended removing the privacy chapter from the NISTIR and creating a stand-alone document about Smart

Grid Privacy.

Response: Privacy is an important topic and is addressed alongside cyber security in the NISTIR. Although privacy and security are not the same, many of the security requirements that address privacy also address confidentiality which is a security objective. Because the two are closely related, they are both included in the NISTIR.

Comment: One (1) commenter proposed adopting a ``privacy by design'' approach. By building standards that reflect privacy interests, rather than attempting to tack on privacy at a later point, this is the most effective means of protecting consumer privacy and security. Ensuring privacy is addressed at an early stage will also be less expensive than attempting to address these issues in the future and will make the grid more adaptable to changing threats to privacy and security as use increases.

Response: Organizations utilizing the Smart Grid should take a holistic view toward privacy, building in privacy from project initiation whenever possible, rather than as an add-on at a later date.

This will be further expanded in the next draft of the NISTIR. The

Privacy sub-group plans to develop

Page 18822

relevant use cases with the intent of including them in the final version of the NISTIR. The second draft of the NISTIR includes suggested privacy principles that are applicable to the Smart Grid that may be useful to many organizations.

Comment: Eight (8) commenters encouraged including privacy principles to cover all Smart Grid entities and practices and develop use cases that reflect a comprehensive model of data flow detailing necessary consumer privacy protections.

Response: The second draft of the NISTIR includes privacy principles applicable to the entire Smart Grid. The next draft of the

NISTIR will include privacy use cases.

Comment: Two (2) comments suggested updating the NISTIR to address privacy policies, standards, and supporting procedures on information collection and uses.

Response: The privacy section has been revised to include privacy principles that address these concerns.

Comment: Three (3) commenters suggested that any attempt to define

Personally Identifiable Information (PII) must account for rules and definitions of PII in other jurisdictions. There is also a difference between data privacy and data security. NIST should focus on data security issues and especially upon data security that effectively frustrates security breaches that result in identity theft.

Response: In the second draft of the NISTIR the content of the privacy chapter has been revised and the term PII is not included. PII is defined very specifically and does not include concepts that are used in Smart Grid. Both data privacy and data security are important to the Smart Grid and are included in the NISTIR.

Comment: One (1) commenter suggested that it will be necessary to address the privacy of customer information generated by Smart Grid installations.

Response: The privacy chapter has been revised and includes privacy principles.

Comments and Responses Regarding Chapter Three, Logical Interface

Analysis

Comment: Twenty-seven (27) commenters recommended changing the impact levels of various logical interface categories.

Response: The impact levels for the logical interface categories have been revised. They will continue to be reviewed and revised for the final version of the NISTIR.

Comment: One (1) commenter proposed two additional constraints to

Category 11-- 1. System scale and diversity prohibits a unified solution to security management. 2. Ubiquitous networking of devices combined with remote control capabilities can enable coordinated manipulation of load on a large scale.

Also, an additional impact to Category 11 was proposed-- 1. Possible large-scale load manipulation through distributed control of unsecured or compromised devices.

Response: The Logical Interface Category Definitions section has been rewritten in the second draft of the NISTIR. Rather than constraints, Table 3.1 provides the analysis matrix of the security- related logical interface categories against the attributes that reflect the interface categories.

Comment: One (1) commenter suggested that the logical interface diagrams be moved and re-titled ``Proposed Logical Interfaces.''

Response: The second draft of the NISTIR has been revised to clarify that these are logical interface diagrams, are not solutions, and do not imply any architectural implementations.

Comment: One (1) commenter identified a high-risk, low-tech attack that did not apply to the Confidentiality, Integrity, or Availability

(CIA) of Smart Grid data.

Response: Both the Vulnerability and Bottom-up sub-groups within the SGIP-CSWG will review this attack to include in Appendix C or

Appendix D of the final version of the NISTIR.

Comment: Twenty (20) commenters suggested changes to examples within the logical interface categories.

Response: Examples for the logical interface categories were changed accordingly.

Comments and Responses Regarding Chapter Four, Advanced Metering

Infrastructure (AMI) Security Requirements

Comment: Twenty-five (25) commenters suggested that requirements be clear, non-prescriptive, cost effective and scalable based on the criticality of the device or system. Certain requirements also require further clarification and detail.

Response: The second draft of the NISTIR includes requirements for the entire Smart Grid. The security requirements in the second draft of the NISTIR are at a high level and do not specify specific solutions or controls. The AMI requirements included in the first draft of the

NISTIR were developed by the Advanced Security Acceleration Project for the Smart Grid (ASAP-SG) project as part of the AMI Security Profile document which is now being maintained by the UCA International Users

Group (UCAIug) Smart Grid (SG) Security working group.

Comment: One (1) commenter suggested removing ``AMI'' from the section title and adding a section on ``Smart Grid Control Systems

Security Requirements'' to this section.

Response: The chapter was revised to address security requirements for the entire Smart Grid and the title of the chapter was changed to

``High-Level Security Requirements.''

Comment: One (1) commenter recommended that the requirements be refined to remove statements requiring ``all components'' to include security features. Many security requirements can effectively be handled in a central ``system'' method.

Response: The second draft of the NISTIR includes security requirements for the entire Smart Grid. The security requirements in the second draft of the NISTIR are at a high level and do not specify specific solutions or controls.

Comment: One (1) commenter proposed that the requirements should be more flexible to allow alternatives that meet the security requirement for efficiency and effectiveness.

Response: The second draft of the NISTIR includes requirements for the entire Smart Grid. The security requirements in the second draft of the NISTIR are at a high level and do not specify specific solutions or controls.

Comment: One (1) commenter suggested that the AMI-Security Task

Force (SEC) requirements should be included in an informative annex and not in the main body of the document.

Response: The second draft of the NISTIR includes requirements for the entire Smart Grid, not just on AMI. The AMI requirements will be included in a reference list that will be added to the final version of the NISTIR.

Comment: One (1) commenter proposed that the focus should be on how to secure the transported information through the Internet rather than discourage its use.

Response: The second draft of the NISTIR includes requirements for the entire Smart Grid. The security requirements in the second draft of the NISTIR are at a high level and do not specify specific solutions or controls. Use of the Internet is a specific solution.

Comment: Thirteen (13) commenters provided comments about specific

AMI controls. Suggestions included:

Text revisions for technical content.

Page 18823

Inquiries regarding clarification or further detail.

Deletion of text.

Accidental omissions.

Concerns regarding specific use cases.

Inconsistency in terminology.

Inclusion of additional relevant controls.

Response: The second draft of the NISTIR includes requirements for the entire Smart Grid. The AMI requirements included in the first draft of the NISTIR were developed by the ASAP-SG project as part of the AMI

Security Profile document which is now being maintained by the UCAIug

SG Security working group. The eighty-six (86) comments were forwarded to the ASAP-SG team.

Comment: One (1) commenter recommended that there are two further pieces of work that will be vital to the success of this project, and in which the security research community could be engaged, as they are of technical interest as well as being important. 1. Security policy for the core of the network. 2. Information flow policies at the periphery (between the meter, home and network).

Response: An R&D sub-group was established under the SGIP CSWG and a chapter in the second draft of the NISTIR includes R&D themes. This comment has been forwarded to that group for evaluation and potential inclusion in the final version of the NISTIR.

Comments and Responses Regarding Appendices

Comment: Five (5) commenters suggested additional use cases to include in the document or edits to existing use cases.

Additions to Retail Power Electricity Market Use Case.

Considerations for variation in:

cir

Real Time Pricing (RTP) for Customer Load and Distributed

Energy Resources (DER)/Plug-in Electric Vehicles (PEV).

cir

Time of Use (TOU) Pricing.

cir

Power Bulk Electricity Market.

Regional Transmission Operators (RTO).

Independent System Operators (ISO).

Response: The security-relevant content of these use cases will be considered for the final version of the NISTIR.

Comment: One (1) commenter urged NIST to follow a two-track approach in order to address any confidentiality issues: (1) Ensuring that its cyber security standards incorporate into Smart Grid architecture all reasonable and cost-effective safeguards to protect the privacy of customer information, while also (2) educating State and

Federal policy makers as to the potential costs and benefits of including the highest level of cyber security safeguards into Smart

Grid installations.

Response: A strong focus has been placed on reliability, since it is a first priority to the power grid. However, confidentiality is also very critical and the SGIP-CSWG will coordinate with State and Federal policy makers when developing future versions of the NISTIR. The NISTIR focuses on high level security requirements and not specific controls that are implementation specific. Outreach to Federal and State representatives and private sector organizations are an important task and will be considered for the future.

Comment: Thirteen (13) commenters recommended changes and updates to use cases presented in Appendix A. Examples of such recommendations include:

Revisions to the retail power electricity market scenario.

Revisions to reflect continuing regional diversity in wholesale power markets.

Refine statements regarding power system operations to demonstrate some portions of a power system can cease operations without an objectionable impact on the overall power system.

Clarification that the Use Cases are not mandatory.

Design considerations to assist people with the use/ application of the document.

Concerns regarding impact (financially to the Utility and to customer trust) of incorrect data.

Response: The Use Cases presented in Appendix A are neither exhaustive nor complete. New Use Cases may be added as they evolve in future versions of this document. The Use Cases were derived ``as-is'' from their sources and put into a common format for evaluating Smart

Grid characteristics and associated cyber security objectives, requirements and stakeholder concerns. The section introduction has been modified to reflect this more clearly.

Comment: One (1) commenter suggested it would be helpful to have a tool to help resolve conflicts between relevant standards. It is not clear which document should be followed for each security requirement in the Draft NISTIR.

Response: Appendix B has been revised to only list the source documents and not standards, that were used in developing the security requirements in the NISTIR. The final version of the NISTIR will list the specific requirements; therefore, individuals will not need to refer to the source documents.

Comment: One (1) commenter was concerned that statements in

Appendix D.4, Openness and Accessibility of Smart Grid Standards, could be misconstrued to imply that simply because there is a charge for a standard that the standard is not ``accessible.'' Neither openness nor accessibility demands that documents be made available without charge.

Response: The language was changed to avoid possible confusion in associating these standards with closed, secretly developed algorithms.

Comment: Ten (10) commenters provided additional references for inclusion in the NISTIR or changes to existing references.

Response: These references will be considered in developing the final version of the NISTIR.

Comment: One (1) commenter suggested additional information regarding cryptography and key management.

Response: Cryptography and key management are important areas for the Smart Grid. They will be examined more fully in the final version of the NISTIR and a new sub-group has been established to address these topics.

Request for Comments: NIST seeks public comments on the second draft of NISTIR 7628. The report will be revised on the basis of comments received and a final version is scheduled to be posted in late spring of 2010.

The document will contain the final set of security controls and the final security architecture.

Comments on draft NISTIR 7628, Smart Grid Cyber Security Strategy and Requirements, may be transmitted electronically to: csctgdraftcomments@nist.gov. They also may be mailed to: Annabelle Lee,

National Institute of Standards and Technology, 100 Bureau Dr., Stop 8930, Gaithersburg, MD 20899-8930.

Comments must be received no later than June 2, 2010.

E.O. 12866: This notice has been determined not to be significant for the purposes of E.O. 12866.

Dated: April 7, 2010.

Marc G. Stanley,

Acting Deputy Director, NIST.

FR Doc. 2010-8415 Filed 4-12-10; 8:45 am

BILLING CODE 3510-13-P

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT