<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Italian Conference on Cybersecurity, June</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Cyber  Security  strategies  for  the  protection  of  Electrical  Substations </article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Roberto Setola</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Francesco Morelli</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Complex System &amp; Security Lab, University Campus Bio-Medico of Rome</institution>
          ,
          <addr-line>Rome</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>ISACA Certified Information Security Manager (CISM)</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2020</year>
      </pub-date>
      <volume>2</volume>
      <fpage>0</fpage>
      <lpage>23</lpage>
      <abstract>
        <p>   The shift to widely distributed forms of energy generation and storage, requiring increased interconnectivity to geographically balance supply with distributed demand for electricity, creates a more complex electrical network. This complex network is generally labelled as the 'Internet of Energy' to stress the relevance that the digital components acquired in the electrical grid. But this introduces in the national electrical system new vulnerabilities related to the cyber risk. This paper illustrates the optimal approach that a TSO (Transmission System Operator) can adopt to manage such a risk in the electrical substations. Such an approach is based on the Zero Trust paradigm and is composed of technological, procedural and cultural elements in order to adequately manage cyber security issue all along the life cycle of any component..</p>
      </abstract>
      <kwd-group>
        <kwd> 1  Cyber-security</kwd>
        <kwd>Operational Technology</kwd>
        <kwd>Cyber-Threat</kwd>
        <kwd>Electric infrastructure</kwd>
        <kwd>critical infrastructures</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction </title>
      <p>
        The shift to widely distributed forms of energy generation and storage, requiring increased
interconnectivity to geographically balance supply with distributed demand for electricity, creates a
more complex electrical network. This complex network is generally labelled as the ‘Internet of Energy’
to stress the relevance that the digital components acquired in the electric grid. But this introduces in
the electric grid new vulnerabilities related to the cyber risk. As noted by the World Energy Council [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]
the resilience of the energy sector is greatly increased by digitalization as it enables the use of a complex
and widening array of decentralized resources, improved efficiency, and enhanced abilities to detect
threats, thereby increasing operational accessibility, productivity, sustainability, and safety.
Unfortunately, at the same time, digitalization presents new challenges because a cyber events can affect
operations producing severe degradation or even induce black-out.
      </p>
      <p>The World Energy Council stressed that there are five factors that increase the vulnerability of the
internet of energy, and specifically:</p>
      <sec id="sec-1-1">
        <title>The rapid pace of innovation;</title>
      </sec>
      <sec id="sec-1-2">
        <title>Technological complexity;</title>
      </sec>
      <sec id="sec-1-3">
        <title>Data sharing and interconnectivity;</title>
      </sec>
      <sec id="sec-1-4">
        <title>Rising cyberattack sophistication; and,</title>
      </sec>
      <sec id="sec-1-5">
        <title>The sector’s attractiveness as a cyber target. In this paper we focalize specifically on the last two points due to their increased relevance because a wide range of malicious external actors target power grids motivated by financial goals, such as</title>
        <p>
          ransomware or intellectual property theft, or sometimes they aim to cause broader economic and social
harm. In addition, like all organizations, energy companies can be collateral damage from an attack not
directed at a specific company, such as fast-spreading malware like NotPetya attacks in 2017 and
recently emphasized also by the Italian government CSIRT [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] in the framework of the consequences
of the Russia-Ukraine war.
        </p>
        <p>
          This fragility depends also by recent business-driven trends such as the standardization of protocols,
the employment of off-the-shelves solutions and the augmented connectivity which significantly
increased the vulnerable surface of industrial processes making them susceptible to be compromised
via cyber-space as illustrated by the Aurora Project [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ].
        </p>
        <p>
          Episodes like Blackenergy 3 and CrashOverride which induced in 2015 and 2016 black-out in
Ukraine [
          <xref ref-type="bibr" rid="ref4 ref5">4,5</xref>
          ] have shown that attacks of this fashion are possible but require the work of highly skilled
and resourceful hackers. Even if impact of cyber-attacks remained far below the threshold of
catastrophic events, cyber threat remains a crucial factor that jeopardizes the electric grid security.
        </p>
        <p>
          However, they showed that targeting OT via cyber-space can lead to mechanical damage and that
cyber-attacks involving kinetic consequences have become ‘possible, available, significant and liable
to disrupt the functioning of developed societies’ [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ].
        </p>
        <p>The episode happened at Colonia Pipeline in 2022 showed that in the absence of an effective
segregation between IT and OT system, malware can propagate also to operational system inducing
also the showdown of the system.</p>
        <p>This article will provide an overview of the approach that a TSO should adopt to improve the cyber
resilience of a national High Voltage electrical grid.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. National transmission grids  </title>
      <p>Electricity is not a storable commodity. It is therefore necessary to produce in each time instant the
required quantity and distribute it through the system in such a way as to ensure that the demand and
supply of electricity are always balanced, thus guaranteeing the continuity of service provision. This is
a very complex task because electricity production and consumption are geographically located in
different areas of the country, the consumption profile of users can only be partially estimated in
advance, production (especially from renewable sources) may depend to a large extent on
(unpredictable) weather conditions, and finally the state of the electricity grid must be taken into account
to avoid overload conditions and to manage out-of-service events.</p>
      <p>The management of electricity flows is known as dispatching and this activity is carried out by
national Transmission System Operators (TSOs). These companies, which generally operate as national
monopoly operators, manage the national transmission networks, i.e. those portions of the electricity
grid that operate at high (36 kV - 150 kV) and extra-high voltage (220 kV - 380 kV) and are used to
transfer significant amounts of electricity from generation plants and acquisition points from abroad to
make it available to large users (generally connected to the medium-voltage network known as the
distribution network to which domestic users are in turn connected on low-voltage networks). To this
end, TSOs must constantly monitor electricity flows in order to ensure the instantaneous balance
between available and used electricity at every point in the network. To do this, they have both the
possibility of requesting a modulation in production capacity (limited to those power plants capable of
dynamically modifying their production profile, such as hydroelectric and thermal power plants) or the
disconnection of interruptible users, but above all to dynamically direct the flow of electric power in a
manner consistent with instantaneous demand.</p>
      <p>In Europe, all transmission grids are galvanically interconnected in order to ensure greater stability
of the electric system and more effective management of electric power. This implies, however, that
the actions taken by individual TSOs can have repercussions at the level of the European electricity
system, with the consequence that any inappropriate actions can create even more or less extensive
blackout events in other nations, as occurred in 2003 and 2006, hence TSOs have to cooperate
exchanging information on electric status. To manage the power grid in the best possible way TSOs
have equipped themselves with high-tech control systems, known as National Control Centers (NCCs).
These centers represent the technological heart of the power grid overseeing all its operation and
managing any anomality and critical situations. Specifically, NCCs, in addition to operating on the
modulation of electricity supply and demand (generation and consumption side), intervene on the grid's
layout by dynamically changing its configuration through commands sent to the electrical sub-stations.</p>
      <p>Electric sub-stations are junction points where two or more branches of the electric grid, generally
with different voltage, converge with the possibility of defining different configurations of the electric
circuits in order to be able to direct the electric flow to instantaneously satisfy electrical constraints.</p>
      <p>Modern substation architecture can be structured roughly in three-levels: process, bay and station
[42, 43], as shown in Figure. 2.</p>
      <p>The station level gathers information from the bay level devices for real-time supervision,
monitoring and intervention by human experts. At this level are connected the computers dedicated to
the supervision and management of the substation. It collects substation data like voltage, current,
power factor etc. from the bay level devices and submit the control commands for the primary
equipment (Circuit breakers) and collect the. Generally at Station Level there is one or more workstation
used as HMI and for engineering purpose.</p>
      <p>The bay level embedded devices control and interact with the process level equipment’s. It acquires
the data from the bay and then mainly act on the primary (power circuit) equipment of the bay. Generally
a transformer with its related switchgear between the two busbars representing the two voltage levels
forms one bay.</p>
      <p>Process level extracts the information from sensors/transducers in the substation and to send them
to upper level device. The other major task of process level function is to receive the control command
from bay level device and execute it at the appropriate switch level. At process level there are different
power devices like transformers, current/voltage transformers (CT/VT), circuit-breakers (CB),
switchgears, surge arresters, etc., which are essentially analog devices. Therefore, merging units (MU) are
required to convert the analog signals, acquired/generated by the process level equipment, into digital
signals. These information are transferred to the bay level, which comprises of the protection and
control devices, which are embedded devices like DFRs, DPRs, IEDs, etc..</p>
      <p>Modern substations are aimed to be more interconnected, leveraging communication standards like
IEC 61850-9-2, and associated abstract data models and communication services like GOOSE, MMS,
SMV. Such interconnection would enable fast and secure data transfer, sharing of the analytics
information for various purposes like wide area monitoring, faster outage recovery, blackout
prevention, distributed state estimation, etc. Such communication is mainly managed at station level.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Operational Technology are inherently insecure  </title>
      <p>
        The acronym OT (Operational Technologies) refers to a set of interconnected systems that use
physical elements, networks and communication protocols to perform industrial operations such as
manufacturing, transportation and processing of goods [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Typical examples of OT are industrial
control systems (ICS), control and data acquisition (SCADA) systems, and distributed control systems
(DCS). These, despite being different and highly customized, are based on similar key components that
enable them to perform three essential tasks: data acquisition, control and supervision, and command
execution [
        <xref ref-type="bibr" rid="ref10 ref8 ref9">8, 9, 10</xref>
        ]. Such systems are generally designed to guarantee the safety of supervised
processes, and to this end they have to be compliant with the time dynamic of the underline physical
process this induces specific constraints on the maximum reaction time and the need to have high
availability requirements.
      </p>
      <p>OTs are generally characterized by the exchange of huge amounts of small information
(limitedsized packets from a plethora of different sources) and high levels of determinism and very low latency.
Thus, including elements such as encryptions, antivirus and firewalls means incorporating control
routines that could affect the smooth running of activities by generating delays that, while quantitatively
insignificant, make the control system less ready, preventing it from meeting the "hard real-time"
requirements for which it was designed.</p>
      <p>
        Another factor that undermines the implementation of security measures is the fact that the OT must
operate continuously 24x365, which makes maintenance work extremely costly and problematic.
Maintaining a system through the introduction of patches and updates requires infrastructure downtime
[
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], which implies that updating must be planned well in advance and cannot immediately follow path
realise. In addition, patching is considered a risky task, as any change could produce unexpected effects.
Preventing these effects would mean specific and targeted testing, the cost of which is often prohibitive
[
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
      </p>
      <p>
        Therefore, once installed and certified for safety, OTs remain in operation for up to 20 years with
limited modifications, leading the operator to work with out-of-date software and inadequate assets with
inherent instability, critical failure points, and security holes. Similarly, as reported in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], only 10
percent of customers install patches and updates for programmable logic controllers (PLCs), leaving
existing software with innate vulnerabilities susceptible to attacks [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>
        As mentioned earlier, one of the primary needs for OT are the hard real time and high availability
requirements which leaves little room for cybersecurity measures. In OT context, for a long time the
only protective barrier has been the so-called "security through obscurity" Previously, control systems
were based on legacy systems running on networks that were physically isolated from company IT
environment and without any connection with Internet and external networks [
        <xref ref-type="bibr" rid="ref15 ref16">15, 16</xref>
        ]. In addition, OT
systems employed proprietary protocols unique to the industrial environment and tailored to the
supervised industrial process. This isolation allows to promote a security by obscurity approach were
the integrity of a system were “guaranteed” by the impossibility to physical access to the industrial
network and by the difficulties to acquire in-depth knowledge of the proprietary software in use. As a
result, industrial systems were considered reasonably immune to external cyber attacks and the main
threat was perceived as insider [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], e.g. a "disgruntled worker" seeking revenge [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. In fact, until
2010, the only cyber attack targeting control systems occurred in Maroochy Shire (Australia), where a
former employer hacked the city's water control system and caused 800,000 liters of raw sewage to
spill, resulting in significant environmental and economic damage [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ].
      </p>
      <p>
        Nowadays, OT-based sites can no longer rely on security by obscurity paradigm. In fact, modern
processes, to improve efficiency, are largely based on off-the-shelf software and component and it is
mandatory that OT networks can exchange data with company IT network or even be connected to
internet to allow remote maintenance, monitoring and control. This imply that the OT devices used to
control physical processes, which previously communicated through closed networks, are now
connected not only to the corporate network but also to the Internet [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. These developments are
business-oriented and aim to meet growing operational needs. While they have dramatically reduced
the cost of purchasing, installing, and maintaining OTs, as well as optimized the performance and
maximized the availability of systems, the general trend to "connect the unconnected” [
        <xref ref-type="bibr" rid="ref19 ref20">19, 20</xref>
        ] has
exponentially increased the vulnerable surface of OTs [21], with significant implications for
cybersecurity [22].
      </p>
      <p>This business-driven trends have led to a change in the nature of cyber-threats. In fact, if between
1982 and 2000 70% of attacks were internal, from 2000 to 2003 the number of attacks originated
externally increased to 70% [23]. This progressive trend reversal is a direct consequence of the use for
OT of off-the-shelf IT hardware and software included the use of commercial operative systema (e.g.
Windows NT) and network protocol (e.g. TCP/IP) and it is unlikely to decrease in the future.</p>
      <p>This elements, together with a significant increase in the frequency of cyber-attacks [24], have
raised a great concern about the threats stemming from cyberspace. In 2009, a survey involving six
hundred IT and security executives showed that most respondents held that a major cyber-operation
involving as target the OT components of Critical Infrastructures was imminent [25].</p>
      <p>Cyber-attacks might pursuit several goals. They could have a criminal nature, for example inflicting
reputational damages [26] or locking data/system and ask for a ransom [27]. They could be business
driven, thus with the aim of stealing valuable data or confidential information on production statistics,
market strategies, drilling plans and pricing sheets [28, 29]. However, the most critical aspect of OT
vulnerability is that cyber-attacks could have not only an economic impact, but also a kinetic one.
Indeed, by modifying the normal functioning of a process, attackers are able to induce failures and
mechanical break points. This was proved in 2007 with the Aurora Project, in which a cyber-attack
targeting an industrial power generator was simulated [30]. As asserted in 2012 by the former U.S.
Defense Secretary Leon E. Panetta, a successful operation could result in a ‘cyber-Pearl Harbour’ if a
group gained ‘control of critical switches’ [31].</p>
      <p>As concrete examples of such scenario, BlackEnergy 3 and CRASHOVERRIDE are considered to
have originated power outages in Ukraine. The first attack manifested itself on the 23rd of December
2015 and caused a loss of power for six hours that affected around 225,000 customers. The adversaries
used BlackEnergy 3 malware to pivot into the SCADA environment and take control of the operation.
Once intruded, they leveraged the system to disconnect substations from the grid, which caused the
blackout [32, 33]. Approximatively one year later, CRASHOVERRIDE, known also as Industroyer,
deprived power to a part of Kiev and its surroundings for over an hour [34]. CRASHOVERRIDE
allowed the attackers to take direct control of the substation breakers that were then opened, which
provoked a temporary loss of power [32, 34].</p>
      <p>An interesting peculiarity of these attacks is that it was not the malware which directly caused the
loss of power. Both BlackEnergy 3 and CRASHOVERRIDE allowed the attackers to take control of
the industrial operations and sent legitimate command to the substation, and such commands where
able to induce anomalous behavior in the electric grid. In other terms the malwares were able to generate
a sophisticated sequences of legitimate commands which malicious interaction with the physical system
provoked the outages [32, 45, 36]. This means that the main focus of the attack was not con the payloads
themselves, but rather on the adversary’s knowledge and ability to interact with the system [35]. In
other words, if attackers find another entry-point into the industrial network, they would be capable of
successfully repeating the attack regardless of the patches put in place by the defender.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Strategy for cyber‐security of OT systems  </title>
      <p>In this paper we focalize on the cyber security of the electric substation. Such a motivation is based
on the relevance that elements play for the stability of the electric grid. Indeed, as shown by the attacks
in Ukrainian, a successful cyber attack is able to induce a blackout in large portion of population.
Moreover being unattended and geographically dispersed sites generically located in rural areas with
very low population density, their protection also from the physical point of view is a complex task.
Finally the tight hard real time constraints which characterize the control schema, with maximum
latency in the order of milliseconds, makes very challenging their cyber-protection.</p>
      <p>However substations are, by their nature, comparable to distributed IT systems and, for this reason,
they must be protected by implementing adequate organizational, process and technological
countermeasures throughout their entire life cycle. Hence an adequate strategy to improve their cyber
security involving all the components of the electric substation needs to be developed to guarantee the
"construction" of a secure Cyber posture and the maintenance, until decommissioning, of the required
level of protection.</p>
      <p>This consideration should inspire any TSOs to create cyber resilient strategies which involve both
technical and no-technical aspects and must be able to permeate all company divisions so that the
departments dealing with substation procurement, operation, maintenance and decommissioning are
fully involved and aware of the implications that failure to comply with cyber-security procedures could
have in terms of negative effects on the electricity grid.</p>
      <p>Such a strategy must include both cultural, procedural and technological elements. Even if in this
paper we mainly focalize on the technological aspects, we consider mandatory to provide before a short
description of the best practice that should be adopted to increase the cyber security culture in TSOs
and about the procedure to manage the cyber security element along all the life cycle of any component
of the electrical substations.
4.1.</p>
    </sec>
    <sec id="sec-5">
      <title>Cultural initiative and Cyber Security organization </title>
      <p>To be able to implement an effective cyber protection strategy, it is mandatory that TSOs should
have a dedicated structure to manage all the aspects related with the management of OT cyber security.
Such a structure should have adequate decision-making autonomy and sufficient capacity to influence
the various business processes in order to impose appropriate attention to cyber security issues in all
decision-making and operational processes. Moreover, such a structure facilitates the development of a
dedicated team with high skilled and specialization personnel with in-depth knowledge of both cyber
and process issues.</p>
      <p>Th e presence of a such a dedicated structure will ensure adequate governance and constant
innovation of the cyber security architecture. This structure should supervision all the aspects related to
the OT cyber issues and, among others, should:
•
•
•
•
support the definition of security requirements in all the phases of the "life cycle" (design,
acquisition, implementation, operation and decommissioning) of OT systems, components and
services used to manage the high-voltage electric grid;
ensure the constant development of defense and protection systems for the digital perimeter;
carry out with adequate frequency cyber security assessment activities;
guaranteeing centralized monitoring in real time of the cyber perimeters and ICT platforms
(including those in the industrial sector);
manage and coordinate security incidents in all their phases (detection, reaction, manage,
forensic and post-event low up) included the management of relationship with law-enforcement
and national cyber agencies;
ensure the operation and ordinary and extraordinary maintenance of IT systems and
applications in support of cyber security management activities;
coordinate and promote corporate awareness &amp; training initiatives in the cyber security area.</p>
      <p>The last point should be one of the cornerstones of any cyber security strategy [37], this because
human incorrect operation is at the base of almost 80% of Cyber Attacks successes [38]. In this regard,
TSOs should develop campaigns to increase the digital culture and cyber security posture of the
employers not only within the company, but also outside the company perimeter with suppliers and
customers, thus increasing the awareness of all the actors involved, especially in the face of an
exponential interconnection and sharing of digital data. Such initiatives should include, but not limited,
specific training courses on cyber security issues for the personnel involving in the operation of OT and
substation systems [39]. Moreover specific campaigns should be constantly carrying out to test the
effective level of awareness of the personnel for cyber security issue [40].
4.2.</p>
    </sec>
    <sec id="sec-6">
      <title>Cyber Security procedure </title>
      <p>
        How to manage cyber security issue in Electrical Substation must be codified within a specific
standard in which a guideline is provided for the entire life cycle of digital station systems, consistently
with the cyber security strategy. This to avoid to have multiple and potentially clashing requirements
documents and also to have a repository where such information are collected and easily available. Such
requirements have been inspired by the NIST 800-82 [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], but it is important to extended and customized
the requirements on the base of the peculiarities of each environment in order to be immediately
applicable to the specific TSOs’ scenario. A factor that significantly affects this aspect is the different
obsolescence level of the various technologies used within the substation, this because IT components,
so as the OT components, have times of obsolescence much shorter than those of the electromechanical
components.
      </p>
      <p>An overview of the macro-areas that should be included in the standard is reported in the Table 1</p>
      <p>As stressed by the last issue of the standard, it is mandatory that all the actors involved in the supply
chain be actively involved in the risk analysis phase and for the management of the cyber security.
Suppliers need to be compliant with cyber security technical specifications and to they have to guarantee
an adequate level of cyber awareness. Moreover, in the supply contract should be explicitly included
specific service level agreement (SLA) on the procedure to manage any situation when vulnerability
are discovered/realized, specific procedures and time schedule to release and implement security patch,
and also the procedure to manage specific contingency plan and to be involved in the risk assessment
process.
4.3.</p>
    </sec>
    <sec id="sec-7">
      <title>Cyber Security architecture for Station </title>
      <p>In line with the evolution of the Substation Automation Systems which have enabled various new
functions (e.g. remote control), TSOs have to adapted their technologies and processes to ensure high
protection and monitoring capacity of industrial systems.</p>
      <p>Such approach should be inspired by the well-know principles of the Security by Design, i.e.:
•
•
•</p>
      <p>Defense in Depth: the cybersecurity strategy should be arranged as a series of different layered
defense mechanisms each one characterize by peculiar mechanism and solution. In this
scenario, if one mechanism fails, another immediately takes its place to counter an attack. This
multi-layered redundant approach is able to increase the security of the entire system and
addresses many different attack vectors;
Least-Privilege: any user, person or software agent, is granted with the minimum levels of
permissions that he/she needs to carry out his duties;
Deny-by-Default: grants permission only what is explicitly authorized, while the rest is
prohibited by default.</p>
      <p>
        But it is important to implement the more innovative and recent approaches generally labelled as Zero
Trust in compliance with the guidelines dictated by international industry standards such as, for
example, NIST SP 800-82 [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] and ISO 27001: 2013. Inside a Zero Trust schema nothing, both internal
and external to the network perimeter of an organization, is considered trusted by default,
      </p>
      <p>A cornerstone element of this strategy is an effective segregation between IT and OT infrastructure
(suggested also recently by Italian CISRT in response to the cyber risk related with Ukraine-Russia
war). Such a segregation actually operates at two level from one side the IT network is segregated with
respect to central OT network but also the central OT network is segregated from the OT networks
distributed in the substations. This means that any malicious packed even if gained the access to the IT
environment had to overcome two different type of firewalls before to be able to reach any single
substation.</p>
      <p>However, it must be considered that an attack can be carried out either by gaining physical access
to the substation, which is generally unprotected, or by intercepting communications to/from the control
center and the communications exchanged between substations. Hence the physical protection of a
substation is the very first barrier to prevent a dangerous cyber attack and it should be carefully designed
and continuously checked.</p>
      <p>On the other side protecting communications is a challenge because only in some cases the
substations are connected via proprietary fiber optics cable, while in general they use commercial or
LTE links. However, the presence of a firewall is a useful tool to mitigate such a risk.</p>
      <p>More complex is the protection of communication between substations, due to very stringent
requirements on latency (generally less than 1 ms) that make unfeasible the presence of any on-line
filtering component, i.e. this flow cannot generally be monitored by the firewall.</p>
      <p>To partially overcome these difficulties, it is strongly recommended that each substation be equipped
with an Anomaly Detection System (ADS) with signatures for industrial environments that, operating
in parallel with the flow, is able to discover anomalous situations without interfering with the process.</p>
      <p>The presence of the ADS, possibly integrated with the firewall in an Intrusion Prevention Systems
(IPS), is also a protection mechanism for possible cyber attacks launched from the in-field devices by
exploiting the connection with the 'bay' area.</p>
      <p>In addition, it is useful to equip substation with control tools able to prevent unauthorized users or
codes from accessing the station's computer. To this end, such a tools should:
- deny permission to execute any application or process not specifically approved (e.g. whitelisting);
- management of asset access policies based on the user's profile;</p>
      <p>TSOs must be equipped with specific centralised asset management tools that guarantee the visibility
of the network and technological elements of industrial systems.</p>
      <p>The presence of a specific Cyber Threat Intelligence services for the industrial domain, is useful to
promptly identify any external threats that put the company's information assets and critical services at
risk. This allow to adopt pro-active measurements in order to prevent cyber attack.</p>
      <p>Finally it is very useful to equip any substation with specific tools for carrying out vulnerability
assessment campaigns (passive scanning on production environments, active scanning on test and
experimental environments) in order to support the delivery of this instrumentation without create
degradation in the operational environment.</p>
      <p>In order to be more effective, it is strongly recommended to set up one or more test environments
able to reproduce with high fidelity the architecture of the substations [40]. This test environment
dedicated may be used to:
•
•
•
•
•
•
check the effectiveness of patch and the absence of any side effect;
analyze potential impact of malware or virus on the operation capabilities of the substation;
experiment innovative technological security solutions;
recreate real conditions of use suitable for experimenting with cyber security solutions to be
used for the protection of assets;
develop and experiment innovative communication procedures to support Cyber Security
Awareness program
create a Digital Twin of some portions of the industrial systems infrastructure, replicating the
current operating ecosystem in order to carry out vulnerability analyzes and penetration tests.</p>
    </sec>
    <sec id="sec-8">
      <title>5. Conclusion </title>
      <p>In the framework of energy transition and network digitalization, the introduction of new
technologies in the OT, IoT and Edge Computing fields brings great benefits and great opportunities
for the evolution of the electricity system, but also inevitable new correlated cyber risks [39].</p>
      <p>Cyber Security in TSOs is now an enabling factor for advanced planning, in the face of an
everincreasing complexity and unpredictability of threats, which require strengthening risk mitigation tools
and reducing reaction times to attacks. These objectives can be effectively pursued through an
organization equipped with adequate technologies, processes and human resources.</p>
      <p>The experience made by several TSOs confirms that an effective response to cyber threats can be
given by a structure that manages the process end-to-end in an agile manner by using an operational
strategy in which the mix of insourcing and outsourcing is dynamically modified in the safety principles
and contributing to the achievement of the company's strategic objectives.</p>
    </sec>
    <sec id="sec-9">
      <title>6. References </title>
      <p>[21] Kaspersky lab ICS-CERT, (2017). Threat Landscape for Industrial Automation Systems In The
Second Half Of 2016, Kaspersky Lab. Available:
https://icscert.kaspersky.com/reports/2017/03/28/threat-landscape-for-industrial-automation-systems-inthe-second-half-of-2016/
[22] McAfee, (2009). In the Crossfire: Critical Infrastructure in the Age of Cyber War. McAfee report.</p>
      <p>Available at: https://img.en25.com/Web/McAfee/CIP_report_final_uk_fnl_lores.pdf
[23] Lagazio, M., Sherif, N., &amp; Cushman, M. (2014). A multi-level approach to understanding the
impact of cyber crime on the financial sector. Computers &amp; Security, 45, 58-74.
[24] Nicholson, A., Webber, S., Dyer, S., Patel, T., &amp; Janicke, H. (2012). SCADA security in the light
of Cyber-Warfare. Computers &amp; Security, 31(4), 418-436
[25] North America Oli &amp; Gas Pipelines, (2013). Discussing the Role of Cyber Security in OilAns Gas
Pipelines. At:
https://scholar.google.com/scholar_case?case=5478245559776905776&amp;hl=en&amp;as_sdt=0,5
[26] Wright, L. (2017). Economic Espionage and Business Intelligence. In People, Risk, and Security
(pp. 91-105). Palgrave Macmillan, London
[27] Cárdenas, A. A., Amin, S., &amp; Sastry, S. (2008). Research Challenges for the Security of Control</p>
      <p>Systems. In HotSec
[28] Bumiller, E. and Shanker, T. (2012). Panetta Warns of Dire Threat of Cyberattack on U.S, The
New York Times, 11 October 2012 available at:
http://www.nytimes.com/2012/10/12/world/panetta-warns-of-dire-threat-of-cyberattack.html
[29] Lee, R. (2017 a). CRASHOVERRIDE: Analysis of the threat to electric grid operations. Dragos</p>
      <p>Inc., March
[30] E-ISAC (2016). Analysis of the cyber attack on the Ukrainian power grid. Electricity Information</p>
      <p>Sharing and Analysis Center (E-ISAC).
[31] ESET, (2017). ESET discovers dangerous malware designed to disrupt industrial control systems.</p>
      <p>ESET – Enjoy Safer Technology. 12 June, Available at:
https://www.eset.com/us/about/newsroom/press-releases/eset-discovers-dangerous-malwaredesigned-to-disrupt-industrial-control-systems/
[32] Conway, T., Lee, R. M., &amp; Assante, M. J. (2016). Analysis of the Cyber Attack on the Ukrainian
Power Grid. Electricity Information Sharing and Analysis Center. Available at:
https://ics.sans.org/media/E-ISAC_SANS_Ukraine_DUC_5.pdf
[33] Cherepanov, A. (2017). WIN32/INDUSTROYER, A new threat for industrial control systems.</p>
      <p>White paper, ESET (June 2017).
[34] Assenza, G., Chittaro, A., De Maggio, M. C., Mastrapasqua, M., &amp; Setola, R. (2020). A review of
methods for evaluating security awareness initiatives. European Journal for Security Research,
5(2), 259-287.
[35] [Corradini, I. (2020). Building a cybersecurity culture in organizations (Vol. 284).</p>
      <p>Berlin/Heidelberg, Germany: Springer International Publishing.
[36] Rodofile, N. R., Radke, K., &amp; Foo, E. (2019). Extending the cyber-attack landscape for
SCADAbased critical infrastructure. International Journal of Critical Infrastructure Protection, 25, 14-35.
[37] De Maggio, M. C., Mastrapasqua, M., Tesei, M., Chittaro, A., &amp; Setola, R. (2019). How to improve
the security awareness in complex organizations. European Journal for Security Research, 4(1),
33-49.
[38] Ani, U. P. D., He, H., &amp; Tiwari, A. (2017). Review of cybersecurity issues in industrial critical
infrastructure: manufacturing in perspective. Journal of Cyber Security Technology, 1(1), 32-74.
[39] Alcaraz, C., &amp; Zeadally, S. (2015). Critical infrastructure protection: Requirements and challenges
for the 21st century. International journal of critical infrastructure protection, 8, 53-66.
[40] Morris, T., Srivastava, A., Reaves, B., Gao, W., Pavurapu, K., &amp; Reddi, R. (2011). A control
system testbed to validate critical infrastructure protection concepts. International Journal of
Critical Infrastructure Protection, 4(2), 88-103.
[41] Lu, X., Wang, W., &amp; Ma, J. (2012). Authentication and integrity in the smart grid: An empirical
study in substation automation systems. International Journal of Distributed Sensor Networks,
8(6), 175262.
[42] Chattopadhyay, A., Ukil, A., Jap, D., &amp; Bhasin, S. (2017). Toward threat of implementation attacks
on substation security: Case study on fault detection and isolation. IEEE Transactions on Industrial
Informatics, 14(6), 2442-2451.
[43] Gupta, R. P. (2008, December). Substation automation using IEC61850 standard. In Fifteenth
National Power Systems Conference (NPSC), IIT Bombay (pp. 462-466).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>World</given-names>
            <surname>Energy</surname>
          </string-name>
          <string-name>
            <surname>Council</surname>
          </string-name>
          “
          <article-title>Cyber challenges to the energy transition</article-title>
          ”
          <source>Report</source>
          <year>2019</year>
          https://www.worldenergy.org/assets/downloads/Cyber_Challenges_to_the_Energy_Transition_ WEC_MMC_
          <year>2019</year>
          .pdf
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>CSIRT</surname>
          </string-name>
          (
          <year>2021</year>
          ) https://www.csirt.gov.it/crisi-ucraina
          <article-title>-analisi-del-rischio-tecnologico-ediversificazione</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Assenza</surname>
          </string-name>
          ,
          <string-name>
            <surname>Giacomo</surname>
          </string-name>
          , et al. (
          <year>2020</year>
          )
          <article-title>"Cyber threats for operational technologies”</article-title>
          .
          <source>International Journal of System of Systems Engineering</source>
          <volume>10</volume>
          .2:
          <fpage>128</fpage>
          -
          <lpage>142</lpage>
          ..
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>R. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Assante</surname>
            ,
            <given-names>M. J.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Conway</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>German steel mill cyber-attack</article-title>
          .
          <source>Industrial Control Systems</source>
          ,
          <volume>30</volume>
          , 62;)
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Assante</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2018</year>
          ). Triton/TriSIS - In Search of its Twin.
          <source>SANS Industrial Control Systems. 29 January</source>
          . Available at: https://ics.sans.org/blog/2018/01/29/tritontrisis-in
          <article-title>-search-of-its-twin</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Tabansky</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          (
          <year>2011</year>
          ).
          <article-title>Critical Infrastructure Protection against cyber threats</article-title>
          .
          <source>Military and Strategic Affairs</source>
          ,
          <volume>3</volume>
          (
          <issue>2</issue>
          )
          <fpage>61</fpage>
          -
          <lpage>68</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Setola</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Faramondi</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Salzano</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Cozzani</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>An overview of Cyber Attack to Industrial Control System</article-title>
          .
          <source>Chemical Engineering Transactions</source>
          ,
          <volume>77</volume>
          ,
          <fpage>907</fpage>
          -
          <lpage>912</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Stouffer</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lightman</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pillitteri</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Abrams</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Hahn</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2015</year>
          ).
          <article-title>Guide to Industrial Control Systems (ICS) Security</article-title>
          , NIST special publication 800-82, National Institute of Standards and Technology;
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Monostori</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kádár</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bauernhansl</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kondoh</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kumara</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reinhart</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Ueda</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          (
          <year>2016</year>
          ).
          <article-title>Cyber-physical systems in manufacturing</article-title>
          .
          <source>Cirp Annals</source>
          ,
          <volume>65</volume>
          (
          <issue>2</issue>
          ),
          <fpage>621</fpage>
          -
          <lpage>641</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Bhatkar</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>Distributed Computer Control Systems in Industrial Automation</article-title>
          . Routledge.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Cook</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Janicke</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smith</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Maglaras</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>The industrial control system cyber defence triage process</article-title>
          .
          <source>Computers &amp; Security</source>
          ,
          <volume>70</volume>
          ,
          <fpage>467</fpage>
          -
          <lpage>481</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>McLaughlin</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Konstantinou</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Davi</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sadeghi</surname>
            ,
            <given-names>A. R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maniatakos</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Karri</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>2016</year>
          ).
          <article-title>The cybersecurity landscape in industrial control systems</article-title>
          .
          <source>Proceedings of the IEEE</source>
          ,
          <volume>104</volume>
          (
          <issue>5</issue>
          ),
          <fpage>1039</fpage>
          -
          <lpage>1057</lpage>
          [13]
          <string-name>
            <surname>(Bodenheim</surname>
          </string-name>
          ,
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Engels</surname>
            ,
            <given-names>J. I.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>Key Concepts for Critical Infrastructure Research</article-title>
          . Springer
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Galloway</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Hancke</surname>
            ,
            <given-names>G. P.</given-names>
          </string-name>
          (
          <year>2013</year>
          ).
          <article-title>Introduction to industrial control networks</article-title>
          .
          <source>IEEE Communications surveys &amp; tutorials</source>
          ,
          <volume>15</volume>
          (
          <issue>2</issue>
          ),
          <fpage>860</fpage>
          -
          <lpage>880</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Mansfield-Devine</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>The state of operational technology security</article-title>
          .
          <source>Network Security</source>
          ,
          <year>2019</year>
          (
          <volume>10</volume>
          ),
          <fpage>9</fpage>
          -
          <lpage>13</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Byres</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Lowe</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2004</year>
          ,
          <article-title>October)</article-title>
          .
          <article-title>The myths and facts behind cyber security risks for industrial control systems</article-title>
          .
          <source>In Proceedings of the VDE Kongress</source>
          (Vol.
          <volume>116</volume>
          , pp.
          <fpage>213</fpage>
          -
          <lpage>218</lpage>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Hemsley</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          , &amp; Fisher,
          <string-name>
            <surname>R.</surname>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>A History of Cyber Incidents and Threats Involving Industrial Control Systems</article-title>
          . In International Conference on Critical Infrastructure Protection (pp.
          <fpage>215</fpage>
          -
          <lpage>242</lpage>
          ). Springer, Cham.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Sadeghi</surname>
            ,
            <given-names>A. R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wachsmann</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Waidner</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2015</year>
          ).
          <article-title>Security and privacy challenges in industrial internet of things</article-title>
          .
          <source>In Design Automation Conference (DAC)</source>
          ,
          <year>2015</year>
          52nd ACM/EDAC/IEEE (pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          ). IEEE [
          <volume>20</volume>
          ]
          <article-title>(Knowles &amp; al</article-title>
          .,
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Drias</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Serhrouchni</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Vogel</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          (
          <year>2015</year>
          ).
          <article-title>Analysis of cyber security for industrial control systems</article-title>
          .
          <source>In Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)</source>
          , 2015 International Conference on (pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          ).
          <source>IEEE. [22] (Ani, He &amp; Tiwari</source>
          ,
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Knowles</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prince</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hutchison</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Disso</surname>
            ,
            <given-names>J. F. P.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Jones</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          (
          <year>2015</year>
          ).
          <article-title>A survey of cyber security management in industrial control systems</article-title>
          .
          <source>International Journal of Critical Infrastructure Protection</source>
          ,
          <volume>9</volume>
          ,
          <fpage>52</fpage>
          -
          <lpage>80</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>