New cybersecurity legislation has been implemented or is coming soon, and those in the energy sector must be up to speed, warns David Varney.
Last year, various cyberattacks in the UK made headlines around the world: Equifax, the NHS WannaCry ransomware attack, hackers preventing MPs from accessing emails, and threats from state-sponsored hackers.
Cybersecurity is a topic that is high on the agenda of businesses in the energy sector.
Growing reliance upon online and smart technologies is leading to greater risk of vulnerabilities to critical infrastructure.
From a policy and legislative perspective, the European Commission published a cybersecurity package in September 2017 which proposed more scrutiny of the software and other components used to monitor industrial control systems.
More specifically, the Commission released a paper titled ‘Cybersecurity in the Energy Sector’ in February 2017 which identified the strategic challenges and specific needs for cybersecurity in the energy sector.
The energy sector is an area of particular concern for cybersecurity authorities as the industry continues to embrace the Internet of Things with smart metering and other networked technologies which bring about potential vulnerabilities.
The ‘Cybersecurity in the Energy Sector’ report was published by the Energy Expert Cyber Security Platform (EESCP), a group which provides guidance or recommendations to the European Commission in respect to the energy sector. The report stressed the need for the energy sector to address the major challenges of cyber threats and the requirements for cybersecurity to be appropriately addressed.
It confirmed that two major pieces of European legislation implement the baseline for cybersecurity across member states: the Directive on Security of Network and Information Systems (NIS Directive) and the General Data Protection Regulation (GDPR).
The EESCP Report concluded with four key strategic priorities, but highlighted that success hinged on the ability and willingness of different stakeholders to cooperate and collaborate. Key recommendations for energy providers related to implementing a threat and risk management system, establishing an effective cyber-incident response network, improving resilience to cyberattacks and ensuring technical and human capacity and competence to address cybersecurity issues in the energy sector.
The NIS directive
The energy sector should be aware of the Network and Information Systems (NIS) Directive, which was implemented into national law across Europe in May 2018.
The UK government is yet to publish its draft implementing legislation, but has confirmed that, regardless of Brexit, it will still implement the NIS Directive into UK law.
To catch the attention of organisations whose activities fall within the scope of the NIS Directive, the government consultation paper proposed fines of up to €20 million or 4% of global turnover (whichever is higher) for breach of the NIS regime, mirroring the more-widely publicised sanctions of GDPR.
Along with certain other regulated sectors, the energy industry will need to be aware of the impact of the NIS Directive, which requires that operators of essential services increase the security of network and information systems.
As with other legislation (such as the Bribery Act 2010 and Modern Slavery Act 2015), there will be an onus on providers to ensure compliance through their supply chains and so necessary due diligence must be carried out to ensure compliance when appointing subcontractors.
To satisfy obligations relating to security, businesses must ensure that appropriate and proportionate technical and organisational measures are taken in respect of managing any risks to the network and information systems.
Operators are required to report incidents which affect the security, provision, confidentiality and integrity of the service: there are thresholds which limit the reporting of incidents to only those which have a “significant impact of the continuity of essential services.”
When considering what a ‘significant impact’ is, various factors including the number of users of the affected services, any impact on economic activities or public safety, the market share of the affected entity and the geographic spread of the area that could be affected by an incident will need to be considered.
The government proposes to delegate supervisory cybersecurity powers to the Department for Business, Energy and Industrial Strategy (BEIS), and possibly Ofgem. Supported by the National Cyber Security Centre, these authorities will be responsible for publishing cybersecurity guidance as it applies to the energy sector, incident reporting, taking decisions as to publicising incidents and taking enforcement action against cybersecurity breaches.
The NIS Directive also requires that the UK establishes a national Cyber Emergency Response Team, which (in cooperation with other European national response teams) will be responsible for monitoring incidents at a national level, providing warnings, alerts and announcements, and responding to risks, threats and incidents. The government has confirmed that the National Cyber Security Centre will also take responsibility for providing this UK cyber response team.
In contrast to GDPR, which will be directly implemented into UK law, the NIS Directive provides the UK government with some flexibility around implementation. With regards to fines for non-compliance, the government’s proposals have mirrored the sanctions provided for under GDPR for failing to ensure effective security.
The Department for Culture, Media and Sport (DCMS) published a press release which suggested that any fine issued for breach of the NIS Directive would be separate from, and in addition to, any fines issued under GDPR. There is there for potential for operators of essential services that suffer a serious loss of personal data through a cybersecurity incident, to be fined twice for the same breach. It highlights the paramount importance of ensuring appropriate organisational security.
One of the aims of the General Data Protection Regulation (GDPR) is to update and improve cultural attitudes towards data protection. In respect of the energy sector, progression is being propelled by technology, which opens a raft of opportunities (such as smart meters) aiming to provide consumer benefits by increasing competition and revealing accurate records of consumer data.
The increase in the availability of data must be afforded adequate protection.
This is likely to mean a significant increase in data protection standards for most organisations within the energy sector.
The increased focus on ‘accountability’ under GDPR requires organisations to not only comply with the legislation but to demonstrate their compliance. This will require careful consideration to ensure that security is not a one-off ‘tick-thebox’ compliance exercise but is an active, ongoing and managed process.
In line with the NIS Directive, GDPR also puts obligations on organisations to ensure that appropriate technical and organisational measures are put in place with regards to protecting personal data.
As well as preventing any cybersecurity issues, the aim is also to promote confidence through transparency which would be extremely beneficial for utility providers in the energy sector.
Implications for the energy sector as technology used in the energy sector continues to progress and develop, adherence to cybersecurity law will continue to be a significant issue.
Utilising technologies such as smart metering or responsive grid switching and management systems brings new efficiencies.
However, as such technologies require network connectivity, ensuring cybersecurity will be of paramount importance. The trend towards decentralised power plants, small-scale flexible gas power plants and solar panels on homes could create issues.
This could be because there are possibly less sophisticated cyber defences in place. Others note the digitalisation of the electricity grid and proliferation of renewable energy which has tempted hackers with new opportunities.
The sheer volume of data that is available now through connected devices such as smart meters or solar panels which connect to satellites and monitor energy usage, has made the energy industry appear more lucrative and prone to cyberattack. The damage to business reputation will also be a key reason for energy companies wanting to protect themselves.
A recent PricewaterhouseCoopers survey found that of 500 businesses questioned, 65% of UK businesses were “significantly concerned” over cyber risks to energy technology and three out of five would switch energy supplier if they suffered a cyber breach.
2018 will be an important year for the energy sector as it seeks to address compliance with both the NIS Directive and GDPR. The big challenges will stem from the proliferation of end user data in the sector, its allure and appeal to attackers and compliance with new legislation. IT teams will need to continue to be aware of, and responsive to, cybersecurity risks and should seek to ensure that any cybersecurity strategies are compliant with both the NIS Directive and GDPR.
With regards to opportunities, this is a good time for organisations to carefully consider their obligations and transparently present action plans for cybersecurity and data protection compliance.
As highlighted above, transparency will lead to greater trust, investment and rapport with consumers. This is important as the traditional position of consumers being wedded to one utility provider is shifting, enhanced regulation for competition making it easier for consumers to switch providers and receive the best deals.
Organisations in the energy sector should be aware of their individual government’s draft NIS legislation, and ensure that internal processes and security standards are compliant. SEI
About the author
David Varney is a senior associate in the corporate team at independent UK law firm Burges Salmon. This article is an adaptation of one published by Power Engineering International, a Clarion Energy Group brand