Cyber Informed Engineering Implementation Guide: Version 1.0: U.S. Department of Energy (DOE), Office of Cybersecurity, Energy Security, and Emergency Response (CESER)

Robert Anderson, Victor Atkins, Marco Ayala, KatherineAnne Baker, Lance Barnes, Krystel Castillo, Samuel Chanoski, Joel Cox, Robert Edsall, Rob Foy, Tim Gale, Jeff Gellner, Rich Graham, Daniel Groves, Mary Holtz, Stephanie Johnson, Jeremy Jones, Lindsay Kishter, Katya Le Blanc, Sin LooRichard Macwan, Joseph Mahanes, Maurice Martin, Shane McFly, Timothy McJunkin, Jakob Meng, Matt Morris, Andrew Ohrt, Waylon Pattison, Jessica Robinson, Daniel Rucinski, Marc Sachs, Greg Shannon, Jeremy Smith, Venkatesh Venkataramanan, Emily Waligoske, Justin Welch, Gareth Williams, Zane Wilsterman, Virginia Wright

Research output: NRELTechnical Report

Abstract

This Implementation Guide describes the principles of Cyber-Informed Engineering (CIE) and outlines questions that engineering teams should consider during each phase of a system's lifecycle to effectively employ these principles. It describes what it means to engineer systems in a cyber-informed way, rather than offering a comprehensive, step-by-step process or procedure for CIE implementation. This guide complements - but does not replace - the application of cybersecurity standards or practices currently in place within an organization. Engineers and technicians that design critical energy infrastructure installations can use this Implementation Guide to integrate the 12 principles of CIE into each phase of the engineering lifecycle, from concept to retirement. The guide is aimed at system or design engineers, rather than software engineers or operational cybersecurity practitioners. The engineers who design, build, operate, and maintain the physical infrastructure are best positioned to leverage a system's engineering design to diminish the severity of cyber attacks or digital technology failures. CIE expands cybersecurity decisions into the engineering space, not by asking engineers to become cyber experts, but by calling on engineers to apply engineering tools and make engineering decisions that improve cybersecurity outcomes. CIE examines the engineering consequences that a sophisticated cyber attacker could achieve and drives engineering changes that may provide deterministic mitigations to limit or eliminate those consequences.
Original languageAmerican English
Number of pages170
DOIs
StatePublished - 2023

NREL Publication Number

  • NREL/TP-5R00-87145

Other Report Number

  • INL/RPT-23-74072

Keywords

  • cyber informed engineering
  • cyber resilience
  • cybersecurity
  • cybersecurity culture
  • security by design
  • systems engineering

Fingerprint

Dive into the research topics of 'Cyber Informed Engineering Implementation Guide: Version 1.0: U.S. Department of Energy (DOE), Office of Cybersecurity, Energy Security, and Emergency Response (CESER)'. Together they form a unique fingerprint.

Cite this