Power stations and other utility organizations are prone to attacks according to the National Conference of State Legislatures (NCSL). This is why there have been more than 12 security measures passed by state legislatures. They were responding to the growing number of ransom and terrorist attacks.
Utility and energy-related facilities have vast interconnected networks that require having physical security and cybersecurity structures in place. They need a security framework with multiple layers of security.
The North American Electric Reliability Corporation (NERC) is a non-profit organization that is responsible for ensuring the reliability of the bulk electric system in North America. NERC develops and enforces reliability standards that all electric utilities in the United States, Canada, and Mexico must follow. It’s a global regulatory authority.
NERC can be subject to oversight by the Federal Energy Regulatory Commission (FERC) and governmental authorities in Canada. CIP-014-02 is a NERC reliability standard that specifically focuses on physical security. The purpose of CIP-014-02 is to identify and protect critical infrastructure sites. If these sites are rendered inoperable or damaged, then it could result in instability, uncontrolled separation, or cascading within the bulk electric system.
In simple terms, CIP-014-02 requires electric utilities to assess their physical security risks and implement appropriate measures to protect their critical infrastructure. This may include things like perimeter security, access control, intrusion detection, and video surveillance.
CIP-014-02 is an important standard because it helps to protect the critical infrastructure that powers our homes, businesses, and hospitals. By complying with CIP-014-02, electric utilities are helping to reduce the risk of physical attacks and other disruptions to the bulk electric system.
Here are some examples of critical infrastructure sites that are covered by CIP-014-02:
- Transmission stations and substations
- Primary control centers
- Generation plants
- Fuel storage facilities
- Communication networks
Electric utilities are required to conduct regular risk assessments to identify which of their critical infrastructure sites are most at risk of attack. Upon completing the risk assessment, the utility organizations must implement appropriate security measures to help mitigate the risks.
CIP-014-02 is a complex standard. However, it is essential for protecting the reliability of the bulk electric system. By complying with CIP-014-02, electric utilities are helping to keep the lights on and our communities safe.
What CIP-014-02 Requires
R5 5.1 from CIP-014-02 explains what a physical security plan needs to cover to ensure the utility organization can respond to physical threats.
“Resiliency or security measures designed to collectively deter, detect, delay, assess, communicate and respond to potential physical threats/vulnerabilities identified during the evaluation conducted in Requirement R4.”
NERC CIP-014 guidelines and technical basis documents indicate resiliency could include spare equipment, system topology changes, and the construction of a new transition station or transmission substation to distribute the load to multiple facilities.
The standard provides examples of physical security measures that can induce trespassers to go elsewhere.
Video cameras
The presence of security cameras can act as a deterrent. You can reinforce that by adding signs, which brings up the next point.
Perimeter signs
These are signs that say, “No trespassing” and “Area under surveillance.” These signs need to be visible and legible from any spot around the perimeter.
Environmental design
Use the principles of Crime Prevention Through Environmental Design. According to CPTED’s website, it’s a “multi-disciplinary approach of crime prevention that uses urban and architectural design and the management of built and natural environments. CPTED strategies aim to reduce victimization, deter offender decisions that precede criminal acts, and build a sense of community among inhabitants so they can gain territorial control of areas, reduce crime, and minimize fear of crime.”
Fencing, gates, and other barriers
Provides an outer layer of protection around the perimeter. They can help slow down potential intruders to give the police time to catch up with them.
Lighting
There are many considerations when it comes to security lighting. They can make a difference between an intruder staying or leaving to go find a less secure site.
Voice down
Voice down is a way to talk to a trespasser without being on the site. Think of it as a remote speaker. This can be part of a video surveillance monitoring service.
CIP-014-02 and Video Surveillance with Remote Monitoring
Video surveillance with live remote monitoring can help with CIP-014-02 in many ways. First, it can help utility organizations identify and deter potential threats. Live video surveillance systems can be used to monitor critical infrastructure sites for suspicious activity, such as unauthorized personnel or vehicles in the area.
As soon as the video analytics or trained monitoring operator detects a potential threat, the utility organization can be notified and take immediate action to mitigate the risk.
Second, live video monitoring can help utility organizations investigate and respond to security incidents. Anytime a security incident occurs, the organization can search its video recordings to identify the perpetrators and assess the damage. This information can be used to file a police report and to develop a plan to prevent similar incidents from happening in the future.
Third, live security camera monitoring can help utilities to comply with CIP-014-02. This is because CIP-014-02 requires utilities to implement multiple physical security measures, including video surveillance. Security cameras with live monitoring can help utilities meet this requirement by providing them with a way to watch over their critical infrastructure sites 24/7.
Here are some specific examples of how live remote video surveillance can help utilities comply with CIP-014-02:
Perimeter security
Video surveillance with live remote monitoring can be used to monitor the perimeter of critical infrastructure sites for unauthorized entry. This can help to deter potential intruders and to identify any perimeter security breaches that do occur.
Access control
Security cameras can be used to monitor access points at critical infrastructure sites to help ensure that only authorized personnel are entering. This can help to prevent sabotage and other security incidents.
Intrusion detection
The live monitoring of the video cameras can be used to detect intruders and other suspicious activity at critical infrastructure sites. This can help utilities to respond to security incidents quickly and effectively.
Access video recordings
Video surveillance with remote monitoring can save all video footage of critical infrastructure sites. This footage can be used to investigate security incidents and to comply with CIP-014-02 requirements.
Stealth Monitoring incorporates video surveillance with remote monitoring. The monitoring is done by video analytics (technology) and trained monitoring operators. It has the power to help deter, detect, delay, assess, communicate, and respond. These are all components in the CIP-014-02 standard.
Here’s how Stealth’s video security with live monitoring accomplishes each.
- Detect. High-resolution security cameras combined with professional-grade monitoring and advanced analytics can help detect potential problems in real-time and respond.
- Deter. Audio down consists of speakers, which allows Stealth’s monitoring operators to issue verbal warnings to the onsite suspects. This helps avert crime and damage. In some cases, they may leave the premises.
- Delay. Fencing and other barriers can slow down any intruders. This gives trained monitoring operators time to contact the police. Video surveillance also can help spot suspicious activity before suspects break through the perimeter. Police officers often reach the property while the trespassers remain on the premises.
- Assess. Video analytics takes on a lot of the tedious work that comes with monitoring many cameras for hours. It can help assess and detect potential problems. Once it identifies a match, it can let the monitoring operator know. They can assess the situation and respond quickly and appropriately to the situation.
- Communicate. After notifying the police, the monitoring operator can stay on the line with dispatch while watching the intruders. The advantage of this approach is that the officers can receive real-time updates so they can be more prepared to mitigate the situation while staying safe.
- Respond. Monitoring operators who have been trained know what to do in every scenario. Their lives are never at risk as they watch the monitors in a location away from the premises. As a bonus, when you work with a company like Stealth Monitor, you benefit from their relationships with local law enforcement departments across the U.S. and Canada. Whenever a representative from Stealth Monitoring contacts law enforcement, they tend to react quickly because they know Stealth has video verification to indicate that it isn’t a false alarm.
Overall, video surveillance with remote monitoring can be a valuable tool that can help utilities to comply with CIP-014-02 and to protect their critical infrastructure from physical attack. Utilities have assets spread far and wide. It’s possible to have eyes on all of them.
As you look for a vendor who offers video surveillance with remote monitoring, use this list of best questions to ask a security company. You want a solution that combines artificial and human intelligence, not a solution that only uses one or the other. The partnership between video analytics and monitoring operators greatly increases the chance they can catch shady activity before anything happens. This is imperative to help protect all the assets while keeping the power on.
If you’d like to learn more about securing utilities, check out the white paper on energy industry threats and solutions. For a security solution that helps maximize your ROI and protect your assets, contact us.
Texas Private Security License Number: B14187
California Alarm Operator License Number: ACO7876
Florida Alarm System Contractor I License Number: EF20001598
Tennessee Alarm Contracting Company License Number: 2294
Virginia Private Security Services Business License Number: 11-19499
Alabama Electronic Security License # 002116
Canada TSBC License: LEL0200704