TOP-001 v3 and v4 Monitoring Non-BES and Data Exchange Requirements. FRCC Spring RE Workshop April 17-18, 2018
|
|
- Marybeth Riley
- 5 years ago
- Views:
Transcription
1 TOP-001 v3 and v4 Monitoring Non-BES and Data Exchange Requirements FRCC Spring RE Workshop April 17-18, 2018
2 Objectives Background Reference Documents TOP to TOP Changes o R10 (TOP) Monitoring Non-BES facilities o Rationale for Monitoring Non-BES facilities o Redundancy and diverse routing of data exchange infrastructure o Rationale for redundancy and diverse routing of data exchange infrastructure Audit Approach Summary/Highlights 2
3 Background TOP Approved by Letter Order on 4/17/17 Replaces currently effective standard TOP Effective Date is 7/1/18 Revised to address reliability concerns identified by FERC Order 817 o Monitoring of non-bulk electric system (BES) facilities o Redundancy and diverse routing of data exchange infrastructure o Test its primary Control Center data exchange infrastructure for redundant functionality at least once every 90 calendar days o Minor changes to update terminology from SPS to RAS 3
4 Reference Documents TOP R10, R11, R20 to R24 and Measures TOP R1 and Measure Rationale for Requirements R19 to R24 (Pages 26, 27) FERC Order No. 817 Para FERC Order No. 817 Para 47 and Para 51 FERC Order No. 817 * Regions are working on consensus and alignment to monitoring approach to TOP R20 to R24 4
5 TOP to TOP Changes R10 (TOP) R20 (TOP) R23 (BA) Monitoring non-bes facilities Redundant & diversely routed R10 (TOP) R11 (BA) Update terminology from SPS to RAS (Minor) Testing every 90 calendar days R21 (TOP) R24 (BA) 5
6 R10 (TOP) Monitoring Non-BES facilities R10. Each Transmission Operator shall perform the following for determining System Operating Limit (SOL) exceedances within its Transmission Operator Area: o R10.3. Monitor non-bes facilities within its Transmission Operator Area identified as necessary by the Transmission Operator o R10.6. Obtain and utilize status, voltages, and flow data for non-bes facilities outside its Transmission Operator Area identified as necessary by the Transmission Operator 6
7 Rationale for Monitoring Non-BES facilities The intent of the requirement is to ensure that all facilities (i.e., BES and non-bes) that can adversely impact reliability of the BES are monitored The non-bes facilities that the TOP is required to monitor are only those that are necessary for the TOP to determine SOL exceedances, within it s Transmission Operator Area Examples of analyses and studies to identification of non-bes facilities o OPA o Real-Time Assessments (RTA) o RC's outage coordination process that leads the TOP to identify a non-bes facility that should be temporarily monitored for determining SOL exceedances TOP Requirement R1 specifies that the TOP shall develop a data specification which includes data and information needed by the TOP to support it s Real-time monitoring and RTAs o This includes non-bes data and external network data as deemed necessary by the TOP 7
8 Audit Approach (R10) Monitoring Non-BES facilities How did the TOP determine the non-bes facilities and data identified for determining SOL exceedances? o Operational Planning Analysis (OPA) o Real-time Assessments (RTA) o RC's outage coordination process that leads the TOP to identify a non-bes facility that should be temporarily monitored for determining SOL exceedances List of the non BES facilities as necessary for determining SOL exceedances Evidence to demonstrate the TOP is monitoring non-bes facilities within its Transmission Operator Area identified as necessary by the Transmission Operator Evidence to demonstrate the TOP is obtaining data for identified non-bes facilities outside its Transmission Operator Area identified as necessary by the Transmission Operator 8
9 Redundancy and diverse routing of data exchange infrastructure Each TOP (R20) and each BA (R23) shall have data exchange capabilities, with redundant and diversely routed data exchange infrastructure within the TOP s or BA s primary Control Center, for the exchange of Real-time data with external entities RC, BA s TOP s it has identified it needs data from: o Real-time monitoring o Real-time Assessments 9
10 Rationale for redundancy and diverse routing of data exchange infrastructure Concept of Redundancy o Duplicate devices that are used for backup purpose o Redundancy protects against the internal failure of any single component Concept of Diversely Routed o The practice of routing circuits along different physical paths o The physical separation of components and the circuits between them protects against external damage causing failure of both redundant systems o Physical damage of any component or circuit should not disable both primary and backup systems 10
11 Rationale for redundancy and diverse routing of data exchange infrastructure Components in the primary Control Center used for the exchange of system operating data o Switches o Routers o Servers o Power supplies o Network cabling o Communication paths between these components Limits of Requirements o Requirements apply within the primary Control Center o Backup Control Centers are not addressed by these requirement o Since Control Centers include associated Data Centers, redundancy and diversity must be satisfied within each, with the objective of preventing any single point of failure 11
12 Audit Approach to redundancy and diverse routing of data exchange infrastructure Who are the entities the TOP has identified it needs data from in order to perform Real-time monitoring and RTA? Provide evidence the data exchange infrastructure are redundant and diversely routed within the primary Control Center o R20 and R23 are infrastructure requirements o Diagrams and descriptions of the components required for data exchange infrastructure o Diagrams and descriptions of the locations of the components and power supplies o Physical tour of the facilities 12
13 Summary/Highlights TOP Effective Date is 7/1/2018 TOP to TOP Changes o R10 (TOP) Monitoring Non-BES facilities o R20 and R23 Redundancy and diverse routing of data exchange infrastructure o Audit Approach* * Regions are working on consensus and alignment to monitoring approach to TOP R20 to R24 13
14 Questions? Sonny Patel P.E. (813)
TOP for Transmission Operators
Meeting Title Date TOP-001-4 for Transmission Operators Compliance Team Lead, Keith Smith Background Effective July 1, 2018 Replaces currently effective TOP-001-3 Modified to address reliability concerns
More informationStandard TOP Transmission Operations
A. Introduction 1. Title: Transmission Operations 2. Number: TOP-001-34 3. Purpose: To prevent instability, uncontrolled separation, or Cascading outages that adversely impact the reliability of the Interconnection
More informationModifications to TOP and IRO Standards
Modifications to TOP and IRO Standards Jason Smith, Mgr Reliability Standards Development SPP RTO Compliance Forum September 21-22, 2016 Project 2016-01 Background FERC issued Order No. 817 in November
More informationprimary Control Center, for the exchange of Real-time data with its Balancing
A. Introduction 1. Title: Reliability Coordination Monitoring and Analysis 2. Number: IRO-002-5 3. Purpose: To provide System Operators with the capabilities necessary to monitor and analyze data needed
More informationTOP/IRO Standards. RC Users Group January 21, Vic Howell Manager, Operations Engineering Support
TOP/IRO Standards RC Users Group January 21, 2016 Vic Howell Manager, Operations Engineering Support Saad Malik Manager, Real-Time Operations Engineering New/Revised TOP & IRO Standards November 19, 2015,
More informationModifications to TOP and IRO Standards
Modifications to TOP and IRO Standards Jason Smith, Southwest Power Pool Industry Webinar July 22, 2016 NERC Antitrust Guidelines It is NERC's policy and practice to obey the antitrust laws to avoid all
More informationA. Introduction. B. Requirements and Measures
A. Introduction 1. Title: Communications 2. Number: COM-001-3 3. Purpose: To establish Communication capabilities necessary to maintain reliability. 4. Applicability: 4.1. Functional Entities: 4.1.1. Transmission
More information5. Effective Date: The first day of the first calendar quarter after applicable regulatory approval.
Introduction 1. Title: IROL and SOL Mitigation in the ERCOT Region 2. Number: IRO-006-TRE-1 3. Purpose: To provide and execute transmission loading relief procedures that can be used to mitigate SOL or
More informationProject Consideration of Commission Directives in Order No. 693
Project 2009-02 Consideration of Commission Directives in Order Order P 905-906 Further, consistent with the NOPR, the Commission directs the ERO to modify IRO-002-1 to require a minimum set of tools that
More informationNERC and Regional Coordination Update
NERC and Regional Coordination Update Mark Kuras Sr. Lead Engineer, NERC and Regional Coordination Planning Committee April 7, 2016 NERC Standards Under Development Standards Project Activity Due Date
More informationReliability Standard Audit Worksheet 1
Reliability Standard Audit Worksheet 1 CIP-002-5.1 Cyber Security BES Cyber System Categorization This section to be completed by the Compliance Enforcement Authority. Audit ID: Registered Entity: NCR
More informationTOP-010-1(i) Real-time Reliability Monitoring and Analysis Capabilities
A. Introduction 1. Title: Real-time Reliability Monitoring and Analysis Capabilities 2. Number: TOP-010-1(i) 3. Purpose: Establish requirements for Real-time monitoring and analysis capabilities to support
More informationReliability Standard Audit Worksheet 1
Reliability Standard Audit Worksheet 1 PRC-004-3 Protection System Misoperation Identification and Correction This section to be completed by the Compliance Enforcement Authority. Audit ID: Registered
More informationUnofficial Comment Form Project Protection System Maintenance and Testing Phase 3 (Sudden Pressure Relays)
Project 2007-17.3 Protection System Maintenance and Testing Phase 3 (Sudden Pressure Relays) Please DO NOT use this form for submitting comments. Please use the electronic form to submit comments on the
More informationStandard CIP Cyber Security Critical Cyber As s et Identification
A. Introduction 1. Title: Cyber Security Critical Cyber Asset Identification 2. Number: CIP-002-4 3. Purpose: NERC Standards CIP-002-4 through CIP-009-4 provide a cyber security framework for the identification
More informationDRAFT. Cyber Security Communications between Control Centers. March May Technical Rationale and Justification for Reliability Standard CIP-012-1
DRAFT Cyber Security Communications between Control Centers Technical Rationale and Justification for Reliability Standard CIP-012-1 March May 2018 NERC Report Title Report Date I Table of Contents Preface...
More informationStandards Authorization Request Form
Standards Authorization Request Form When completed, email this form to: sarcomm@nerc.com NERC welcomes suggestions to improve the reliability of the bulk power system through improved reliability standards.
More informationStandards Authorization Request Justification
Standards Authorization Request Justification Project 2009-02 Real-time Monitoring and Analysis Capabilities NERC Report Title Report Date 1 of 30 3353 Peachtree Road NE Suite 600, North Tower Atlanta,
More informationDraft CIP Standards Version 5
Draft CIP Standards Version 5 Technical Webinar Part 1 Project 2008-06 Cyber Security Order 706 Standards Drafting Team November 15, 2011 Agenda Opening Remarks John Lim, Consolidated Edison, Chair V5
More informationStandard CIP Cyber Security Critical Cyber As s et Identification
A. Introduction 1. Title: Cyber Security Critical Cyber Asset Identification 2. Number: CIP-002-4 3. Purpose: NERC Standards CIP-002-4 through CIP-009-4 provide a cyber security framework for the identification
More informationNB Appendix CIP NB-0 - Cyber Security Recovery Plans for BES Cyber Systems
This appendix establishes modifications to the FERC approved NERC standard CIP-009-6 for its specific application in New Brunswick. This appendix must be read with CIP-009-6 to determine a full understanding
More informationStandard INT Dynamic Transfers
A. Introduction 1. Title: Dynamic Transfers 2. Number: INT-004-3 3. Purpose: To ensure Dynamic Schedules and Pseudo-Ties are communicated and accounted for appropriately in congestion management procedures.
More informationCIP Cyber Security Critical Cyber Asset Identification. Rationale and Implementation Reference Document
CIP-002-4 Cyber Security Critical Cyber Asset Identification Rationale and Implementation Reference Document NERC Cyber Security Standards Drafting Team for Order 706 December 2010 This document provides
More informationStandard INT Dynamic Transfers
Standard INT-004-3.1 Dynamic Transfers A. Introduction 1. Title: Dynamic Transfers 2. Number: INT-004-3.1 3. Purpose: To ensure Dynamic Schedules and Pseudo-Ties are communicated and accounted for appropriately
More informationDisclaimer Executive Summary Introduction Overall Application of Attachment Generation Transmission...
CIP-002-4 Cyber Security Critical Cyber Asset Identification Rationale and Implementation Reference Document September, 2010 Table of Contents TABLE OF CONTENts Disclaimer... 3 Executive Summary... 4 Introduction...
More informationTitle. Critical Infrastructure Protection Getting Low with a Touch of Medium. CanWEA Operations and Maintenance Summit 2018.
Critical Infrastructure Protection Getting Low with a Touch of Medium Title CanWEA Operations and Maintenance Summit 2018 January 30, 2018 George E. Brown Compliance Manager Acciona Wind Energy Canada
More informationImplementation Plan for COM-001-2
Defined Terms in the NERC Glossary The RC SDT proposes the following new definitions: Interpersonal Communication: Any medium that allows two or more individuals interact, consult, or exchange information.
More informationViolation Risk Factor and Violation Severity Level Justifications Project Modifications to CIP Standards
Violation Risk Factor and Violation Severity Level Justifications Project 2016-02 Modifications to CIP Standards This document provides the standard drafting team s (SDT s) justification for assignment
More informationConcept White Paper. Concepts for Proposed Content of Eventual Standard(s) for Project : Real-Time Monitoring and Analysis Capabilities
Concept White Paper Concepts for Proposed Content of Eventual Standard(s) for Project 2009-02: Real-Time Monitoring and Analysis Capabilities Real-time Monitoring and Analysis Capabilities Standard Drafting
More informationQuébec Reliability Standards Compliance Monitoring and Enforcement Program Implementation Plan Annual Implementation Plan
Québec Reliability Standards Compliance Monitoring and Enforcement Program Implementation Plan 2017 Annual Implementation Plan Effective Date: January 1, 2017 Approved by the Régie: December 1, 2016 Table
More informationCyber Security Reliability Standards CIP V5 Transition Guidance:
Cyber Security Reliability Standards CIP V5 Transition Guidance: ERO Compliance and Enforcement Activities during the Transition to the CIP Version 5 Reliability Standards To: Regional Entities and Responsible
More informationViolation Risk Factor and Violation Severity Level Justification Project Modifications to CIP-008 Cyber Security Incident Reporting
Violation Risk Factor and Justification Project 2018-02 Modifications to CIP-008 Cyber Security Incident Reporting This document provides the standard drafting team s (SDT s) justification for assignment
More informationPath Operations post WECC TOP 007 Rob Witham, WAPA RMR TSS Supervisor
Path Operations post WECC TOP 007 Rob Witham, WAPA RMR TSS Supervisor May 10, 2017 ISAS Salt Lake City, UT WECC Standard TOP 007 WECC 1a Title: System Operating Limits Purpose: To limit instances where
More informationCIP Cyber Security Configuration Change Management and Vulnerability Assessments
CIP-010-2 3 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:
More informationNB Appendix CIP NB-0 - Cyber Security Personnel & Training
This appendix establishes modifications to the FERC approved NERC standard CIP-004-5.1 for its specific application in New Brunswick. This appendix must be read with CIP-004-5.1 to determine a full understanding
More informationCIP Configuration Change Management & Vulnerability Assessments
CIP-010-2 Configuration Change Management & Vulnerability Assessments FRCC Spring RE Workshop April 17-18, 2018 Objective Change Management to prevent unauthorized modifications to Bulk Electric Systems
More informationCOM Operating Personnel Communications Protocols. October 31, 2013
COM-002-4 Operating Personnel Communications Protocols October 31, 2013 Agenda Introductory Remarks: Mark Lauby Project 2007 02 Background COM 002 4 Requirements Implementation Plan Compliance VSL/VRF
More informationCIP Baseline Configuration Management Overview. FRCC Spring Compliance Workshop April 14-16, 2015
CIP-010-1 Baseline Configuration Management Overview FRCC Spring Compliance Workshop April 14-16, 2015 Overview Review the configuration change management requirements found in CIP- 10-1 R1 and R2 2 R1.1
More informationNovember 9, Revisions to the Violation Risk Factors for Reliability Standards IRO and TOP
!! November 9, 2016 VIA ELECTRONIC FILING Jim Crone Director, Energy Division Manitoba Innovation, Energy and Mines 1200-155 Carlton Street Winnipeg MB R3C 3H8 RE: Revisions to the Violation Risk Factors
More informationReliability Standard Audit Worksheet 1
Reliability Standard Audit Worksheet 1 PRC-004-3 Protection System Misoperation Identification and Correction This section to be completed by the Compliance Enforcement Authority. Audit ID: Registered
More informationCompliance Enforcement Initiative
Compliance Enforcement Initiative Filing and Status Update November 2, 2011 Rebecca Michael Status of the Filings NERC filed several components of the Compliance Enforcement Initiative on September 30,
More informationStandard Development Timeline
CIP-002-6 Cyber Security BES Cyber System Categorization Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the
More informationPurpose. ERO Enterprise-Endorsed Implementation Guidance
Lesson Learned CIP Version 5 Transition Program CIP-002-5.1 Requirement R1: Impact Rating of Generation Resource Shared BES Cyber Systems Version: January 29, 2015 Authorized by the Standards Committee
More informationStandard Development Timeline
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Description of Current Draft
More informationCIP Cyber Security Configuration Change Management and Vulnerability Assessments
CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:
More informationThis section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective.
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Description of Current Draft
More informationProject Cyber Security - Order No. 791 Identify, Assess, and Correct; Low Impact; Transient Devices; and Communication Networks Directives
Project 2014-02 - Cyber Security - Order No. 791 Identify, Assess, and Correct; Low Impact; Transient Devices; and Communication Networks Directives Violation Risk Factor and Justifications The tables
More informationSummary of FERC Order No. 791
Summary of FERC Order No. 791 On November 22, 2013, the Federal Energy Regulatory Commission ( FERC or Commission ) issued Order No. 791 adopting a rule that approved Version 5 of the Critical Infrastructure
More informationStandard Development Timeline
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard is adopted by the NERC Board of Trustees (Board).
More informationNERC Management Response to the Questions of the NERC Board of Trustees on Reliability Standard COM September 6, 2013
NERC Management Response to the Questions of the NERC Board of Trustees on Reliability Standard COM-003-1 September 6, 2013 At the August 14-15, 2013 meeting of the Board of Trustees ( Board ) of the North
More informationCIP Cyber Security Recovery Plans for BES Cyber Systems
A. Introduction 1. Title: Cyber Security Recovery Plans for BES Cyber Systems 2. Number: CIP-009-5 3. Purpose: To recover reliability functions performed by BES Cyber Systems by specifying recovery plan
More informationReliability Standard Audit Worksheet 1
Reliability Standard Audit Wksheet 1 EOP-008-2 Loss of Control Center Functionality This section to be completed by the Compliance Enfcement Authity. Audit ID: Registered Entity: NCR Number: Compliance
More informationCIP Cyber Security Configuration Change Management and Vulnerability Assessments
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed
More informationOPUC Workshop March 13, 2015 Cyber Security Electric Utilities. Portland General Electric Co. Travis Anderson Scott Smith
OPUC Workshop March 13, 2015 Cyber Security Electric Utilities Portland General Electric Co. Travis Anderson Scott Smith 1 CIP Version 5 PGE Implementation Understanding the Regulations PGE Attended WECC
More informationCOM Interpersonal Communications Capabilities
COM-001-3 Interpersonal Communications Capabilities 1 Background In the FERC Notice of Proposed Rulemaking (NOPR) for COM-001-2, the Commission asked for comments on whether the standard should be modified
More informationDRAFT Reliability Standard Audit Worksheet 1
DRAFT Reliability Standard Audit Worksheet 1 PRC-025-2 Generator Relay Loadability This section to be completed by the Compliance Enforcement Authority. Audit ID: Registered Entity: NCR Number: Compliance
More informationUnofficial Comment Form 1st Draft of PRC-005-3: Protection System and Automatic Reclosing Maintenance (Project )
Unofficial Comment Form 1st Draft of PRC-005-3: Protection System and Automatic Reclosing Maintenance (Project 2007-17.2) Please DO NOT use this form for submitting comments. Please use the electronic
More informationStandard Development Timeline
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Description of Current Draft
More informationThis section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective.
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed
More informationCIP Cyber Security Standards. Development Update
CIP Cyber Security Standards Development Update John Lim Consolidated Edison Co. of New York Rob Antonishen Ontario Power Generation September 21-22, 2010 1 Disclaimer This NPCC TFIST workshop provides
More informationUnofficial Comment Form Project Operating Personnel Communications Protocols COM-002-4
Project 2007-02 Operating Personnel Communications Protocols COM-002-4 Please DO NOT use this form. Please use the electronic comment form to submit comments on the proposed draft COM 002 4 (Operating
More informationProcedure For NPCC Bulk Electric System Asset Database
Procedure For NPCC Bulk Electric System Asset Database Compliance Procedure 09 (CP-09) Revision 2 Table of Contents 1. Introduction and Purpose... 3 2. Responsibilities... 3 3. Overview... 3 4. Asset Database...
More informationStandard COM-002-2a Communications and Coordination
A. Introduction 1. Title: Communication and Coordination 2. Number: COM-002-2a 3. Purpose: To ensure Balancing Authorities, Transmission Operators, and Generator Operators have adequate communications
More informationPhilip Huff Arkansas Electric Cooperative Corporation Doug Johnson Commonwealth Edison Company. CSO706 SDT Webinar August 24, 2011
CIP Standards Version 5 Requirements & Status Philip Huff Arkansas Electric Cooperative Corporation Doug Johnson Commonwealth Edison Company David Revill Georgia Transmission Corporation CSO706 SDT Webinar
More informationStandard COM Communication and Coordination
A. Introduction 1. Title: Communication and Coordination 2. Number: COM-002-3 3. Purpose: To ensure Emergency communications between operating personnel are effective. 4. Applicability 4.1. Reliability
More informationCOM Communications and Coordination
COM-002-2 Communications and Coordination February 27, 2014 Lonnie Lindekugel ~ SPP Jim Nail ~ City of Independence INTRODUCTION NERC Reliability Standard COM-002-2 (Communications and Coordination) serves
More informationConsideration of Issues and Directives Project Modeling Data (MOD B) October 7, 2013
Project 2010-03 Modeling Data (MOD B) October 7, 2013 Para 290. Project 2010-03 - Modeling Data The Commission directs public utilities, working through NERC, to modify the reliability standards MOD- 010
More informationPRC Coordination of Protection Systems for Performance During Faults
PRC-027-1 Coordination of Protection Systems for Performance During Faults A. Introduction 1. Title: Coordination of Protection Systems for Performance During Faults 2. Number: PRC-027-1 3. Purpose: To
More informationStandard Authorization Request Form
Standard Authorization Request Form E-mail completed form to rsm@texasre.org Texas RE to Complete SAR No: Title of Proposed Standard IRO-006-TRE-1 IROL and SOL Mitigation in the ERCOT Region Request Date
More informationrequirements in a NERC or Regional Reliability Standard.
CIP 002 5.1 Cyber Security BES Cyber System Categorization A. Introduction 1. Title: Cyber Security BES Cyber System Categorization 2. Number: CIP 002 5.1 3. Purpose: To identify and categorize BES Cyber
More informationCIP Cyber Security Recovery Plans for BES Cyber Systems
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed
More informationComment Form for 1 st Draft of Standard for Backup Facilities (Project )
Comment Form for 1 st Draft of Standard for Backup Facilities (Project 2006-04) Please use this form to submit comments on the 1 st draft of the standards for Backup Facilities (Project 2006-04). Comments
More informationScreening Procedures for Access to ISO Register of Transmission Facilities and Entitlements
Screening Procedures for Access to ISO Register of Transmission Facilities and Entitlements In accordance with the Federal Energy Regulatory Commission (FERC) order issued on January 24, 2003 (as modified
More informationCIP Cyber Security Configuration Change Management and Vulnerability AssessmentsManagement
The Background, VRF/VSLs, and Guidelines and Technical Basis Sections have been removed for this informal posting. The Project 2016-02 is seeking comments around the concept of the Requirement/Measure
More informationNERC Request for Data or Information: Protection System Misoperation Data Collection August 14, 2014
Request for Data or Information Protection System Misoperation Data Collection August 14, 2014 3353 Peachtree Road NE Suite 600, North Tower Atlanta, GA 30326 404-446-2560 www.nerc.com 1 of 15 Table of
More informationMidwest ISO and PJM Joint Operating Agreement (JOA) Update. Joint Stakeholder Meeting November 14, 2008
Midwest ISO and PJM Joint Operating Agreement (JOA) Update Joint Stakeholder Meeting November 14, 2008 JOA Update Introduction Joint Operating Agreement Main Document Initially filed in December 2003 Congestion
More informationGuidelines for Submitting NERC Reliability Standards Required Documents to the SPP Reliability Coordinator and the SPP Balancing Authority Version 1
Guidelines for Submitting NERC Reliability Standards Required Documents to the SPP Reliability Coordinator and the SPP Balancing Authority Version 1 Revision History Version Effective Date Summary of Revisions
More informationImplementation Plan for Version 5 CIP Cyber Security Standards
Implementation Plan for Version 5 CIP Cyber Security Standards April 10September 17, 2012 Note: On September 17, 2012, NERC was alerted that some references in the Initial Performance of Certain Periodic
More informationCIP Cyber Security Recovery Plans for BES Cyber Systems
A. Introduction 1. Title: Cyber Security Recovery Plans for BES Cyber Systems 2. Number: CIP-009-6 3. Purpose: To recover reliability functions performed by BES Cyber Systems by specifying recovery plan
More informationProject Retirement of Reliability Standard Requirements
Project 2013-02 Retirement of Reliability Standard Requirements Unofficial Comment Form for Paragraph 81 (P81) Project Retirement of Reliability Standard Requirements This form is provided in a Word format
More informationBritish Columbia Utilities Commission Reliability Standards with Effective Dates adopted in British Columbia
Page 1 of 15 British Columbia Utilities Reliability Standards with s adopted in British Columbia BAL-001-2 Standard Real Power Balancing Control Performance R-14-16 July 1, 2016 BAL-002-1 1 Disturbance
More informationUnofficial Comment Form Project Real-time Monitoring and Analysis Capabilities IRO and TOP-010-1
Project 2009-02 Real-time Monitoring and Analysis Capabilities IRO-018-1 and TOP-010-1 DO NOT use this form for submitting comments. Use the electronic form to submit comments on IRO- 018-1 Reliability
More informationNORTH AMERICAN ELECTRIC RELIABILITY CORPORATION
NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION NARUC Energy Regulatory Partnership Program The Public Services Regulatory Commission of Armenia and The Iowa Utilities Board Janet Amick Senior Utility
More informationImplementation Plan. Project CIP Version 5 Revisions. January 23, 2015
Implementation Plan Project 2014-02 CIP Version 5 Revisions January 23, 2015 This Implementation Plan for the Reliability Standards developed as part of Project 2014-02 CIP Version 5 Revisions replaces
More informationCIP Cyber Security Configuration Change Management and Vulnerability Assessments
CIP 010 1 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:
More informationSouthwest Power Pool Independent Coordinator of Transmission RELIABILITY PLAN for Entergy in the Southeastern Electric Reliability Council September
Southwest Power Pool Independent Coordinator of Transmission RELIABILITY PLAN for Entergy in the Southeastern Electric Reliability Council September 23, 2009 TABLE OF CONTENTS INTRODUCTION A. RESPONSIBILITIES
More informationImplementation Plan for Newly Identified Critical Cyber Assets and Newly Registered Entities
Implementation Plan for Newly Identified Critical Cyber Assets and Newly Registered Entities This Implementation Plan applies to Cyber Security Standards CIP-002-2 through CIP-009-2 and CIP-002-3 through
More informationCertification Program
Certification Program Ryan Stewart, Manager of Registration, NERC FRCC Reliability Performance Workshop September 20, 2017 Purpose of the Certification Program Rules of Procedure (ROP) Section 500: The
More informationImplementation Plan. Project CIP Version 5 Revisions 1. January 23, 2015
Implementation Plan Project 2014-02 CIP Version 5 Revisions January 23, 2015 This Implementation Plan for the Reliability Standards developed as part of Project 2014 02 CIP Version 5 Revisions replaces
More informationCyber Threats? How to Stop?
Cyber Threats? How to Stop? North American Grid Security Standards Jessica Bian, Director of Performance Analysis North American Electric Reliability Corporation AORC CIGRE Technical Meeting, September
More informationReliability Standard Audit Worksheet 1
Reliability Standard Audit Worksheet 1 CIP-012-1 Cyber Security Communications between Control Centers This section to be completed by the Compliance Enforcement Authority. Audit ID: Registered Entity:
More informationLow Impact BES Cyber Systems. Cyber Security Security Management Controls CIP Dave Kenney
Low Impact BES Cyber Systems Cyber Security Security Management Controls CIP-003-6 Dave Kenney November 9, 2016 Presentation Agenda Outreach Observations/Audit Approach Cyber Security Awareness Physical
More informationCritical Infrastructure Protection (CIP) Version 5 Revisions. Standard Drafting Team Update Industry Webinar September 19, 2014
Critical Infrastructure Protection (CIP) Version 5 Revisions Standard Drafting Team Update Industry Webinar September 19, 2014 Administrative Items NERC Antitrust Guidelines It is NERC s policy and practice
More informationPeak Reliability. Reliability Coordinator Data Request and Specifications for Data Provision
Table of Contents I. Purpose... 2 II. Introduction... 2 III. Peak Roles and Responsibilities... 2 IV. Applicability and Obligations... 3 V. Questions and Comments... 6 VI. Data Request Spreadsheet... 6
More informationStandard CIP 007 3a Cyber Security Systems Security Management
A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-3a 3. Purpose: Standard CIP-007-3 requires Responsible Entities to define methods, processes, and procedures for
More informationCAISO Metering & Telemetry Requirements. Jeremy Laundergan - Director, EnerNex November 8, 2012
CAISO Metering & Telemetry Requirements Jeremy Laundergan - Director, EnerNex November 8, 2012 Background and Overview Both federal and state regulatory authorities are advocating the participation of
More informationStandard CIP Cyber Security Physical Security
A. Introduction 1. Title: Cyber Security Physical Security of Critical Cyber Assets 2. Number: CIP-006-3 3. Purpose: Standard CIP-006-3 is intended to ensure the implementation of a physical security program
More informationInterconnection and Transmission
Interconnection and Transmission Gary L. Brown, P.E. Director of Energy Development Gary@ZGlobal.biz 916-985-9461 Kevin Coffee Energy Management Committee Meeting Irvine, California August 26, 2015 Interconnection
More informationCIP Cyber Security Configuration Management and Vulnerability Assessments
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed
More informationA. Introduction. Page 1 of 22
The Background, VRF/VSLs, and Guidelines and Technical Basis Sections have been removed for this informal posting. The Project 2016-02 is seeking comments around the concept of the Requirement/Measure
More information