Lesson Learned CIP Version 5 Transition Program CIP R1: Grouping BES Cyber Assets Version: March 2, 2014

Size: px
Start display at page:

Download "Lesson Learned CIP Version 5 Transition Program CIP R1: Grouping BES Cyber Assets Version: March 2, 2014"

Transcription

1 Lesson Learned CIP Version 5 Transition Program CIP R1: Grouping BES Cyber Assets Version: March 2, 2014 This document is designed to convey lessons learned from NERC s various CIP version 5 transition activities. It is not intended to establish new requirements under NERC s Reliability Standards, to modify the requirements in any existing reliability standards nor to provide an official interpretation. Additionally, there may be other legitimate ways to fulfill the obligations of the requirements that are not expressed within this supporting document. Compliance will continue to be determined based on language in the NERC Reliability Standards as they may be amended from time to time. Implementation of this lesson learned is not a substitute for compliance with requirements in NERC s Reliability Standards. Purpose The purpose of this Lesson Learned is to describe useful methods to group BES Cyber Assets into BES Cyber Systems (BCS). Background The CIP Version 5 standards introduces a new concept not included in Version 3 a BES Cyber System, which consists of one or more BES Cyber Assets (BCA) logically grouped by a responsible entity to perform one or more reliability tasks for a functional entity. If a Registered Entity decides to group their BCA, they will need to demonstrate their grouping method. Guidance Registered entities may choose to create different groupings of BES Cyber Assets to comply with individual CIP Version 5 standards. Entities are provided flexibility in how they group their BES Cyber Assets. However, it is recommended that each entity should document their processes for grouping their BES Cyber Assets to improve transparency during compliance monitoring. The following sections provide examples of how different participants in NERC CIP version 5 implementation study grouped their BES Cyber Assets into BES Cyber Systems. Groupings Based on Function Certain implementation study participants grouped their BES Cyber Assets by function. In other words, the entity grouped BES Cyber Assets into BES Cyber Systems based primarily on which BES Cyber Assets perform a common function. For example, an Energy Management System (EMS) BES Cyber System may consist of a number of human machine interface workstations, communications servers, processing servers, database servers, and peripheral devices such as time-synchronizing clocks or printers Peachtree Road NE Suite 600, North Tower Atlanta, GA

2 All the EMS servers at a Control Center and the associated backup Control Center could be grouped together as they are categorized at the same impact level. Alternatively, entities can group Microsoft Cyber Assets, Linux Cyber Assets, and other Cyber Assets (e.g., network or disk servers) according to the software patching requirements (as the patch sources may be different and released on different release cycles). This grouping methodology allows entities to prepare their processes and demonstrate compliance of like systems. See Figure 1 below. Figure 1: Functional Grouping Groupings Based on Common Local Area Network Other implementation study participants used a BES Cyber System grouping based on whether individual BES Cyber Assets are on a common local area network and can communicate with each other via a routable protocol. For example, a Transmission Protection System identified as a BES Cyber System could include all of the protective relay BES Cyber Assets at a specific transmission substation, especially if various protective relays communicate with each other over a local area network for protection coordination. While initially it may seem prudent to create separate BES Cyber Systems for each protection zone or for those protecting a single Facility at a given station or substation, there may be communications between different protection zones, either to provide additional zones of protection or backup within a specific zone. If the various Protection Systems identified as BES Cyber Systems need to meet the same CIP standard requirements, there may be no benefit in creating multiple separate BES Cyber Systems at a Transmission station. However, if it is anticipated that (1) some BES Cyber Systems will be at different impact levels (i.e., Medium or Low), (2) there is limited or no communications between the BES Cyber Systems at different impact levels, and (3) they are not on the same local area network, then having multiple BES Cyber Systems may be a preferable approach. See Figure 2 below.

3 Figure 2: Grouping across Substations Documenting BES Cyber Systems The inventory list created through the development of CIP , Requirement R1 should indicate the identified BES Cyber System groupings. To demonstrate compliance, one approach is to create a name for each individual BES Cyber System for reference when applying the remainder of the requirements of the CIP Version 5 standards. As provided in the example below, a reason (or reason code) to document the rationale for the grouping would also be beneficial when presenting your evidence for audit. One way to document this approach could be in a sortable spreadsheet, as shown below: No. Facility Name Equipment Description Device ID Responsible Work Group Function Cyber Asset Classification (BCS) BES Reliability Operating Service (BROS) If not a BCA - List the reason why PSP ESP Additional Examples One implementation study participant identified several BES Cyber Assets at a medium impact substation and elected to group them into BES Cyber Systems based on both function and location as described above. The entity has grouped the remote terminal unit (RTU) equipment together as one BES Cyber System and the Protection Systems equipment together as another BES Cyber System. The BES Cyber Assets in each BES Cyber System work together to provide the same BES reliability operating services and the loss of one asset in the system impacts the functions of the system in a similar manner. See Figure 3 below.

4 Figure 3: Grouping by Function and Location Alternatively, entities may choose to group all of the BES Cyber Assets at a particluar medium impact substation into a BES Cyber System, i.e. grouping by physical location, as in figure 4 below. Figure 4: Grouping by Location Notwithstanding the previous examples, there are many options for grouping BES Cyber Assets into a BES Cyber System. An entity may choose to group BES Cyber Assets of the same type into individual BES Cyber Systems. For example, at a medium impact substation, all Protection System BES Cyber Assets with External Routable Connectivity would be one BES Cyber System. All Protection System BES Cyber Assets without External Routable Connectivity

5 would be another BES Cyber System. Alternately, the entity could group all BES Cyber Assets with External Routable Connectivity (RTU equipment, Protection Systems, etc.) at the substation into one BES Cyber System. However the BES Cyber System is defined, it must meet the CIP V5 Standards at the system level for all of its component BES Cyber Assets. A BES Cyber Systems can cross Physical Security Perimeters (PSP), Electronic Security Perimeters (ESP), and Facility geographic boundaries; they can encompass many Physical Security Perimeters, Electronic Security Perimeters and Facilities. Grouping BES Cyber Assets Considerations: Groupings may assist an entity in placing controls around devices that would otherwise not be able to apply a particular control, e.g. CIP R4.1, logging at the systems or asset level. BCS groupings do not influence or change other CIP concepts, such as ESP, PSP, Impact Rating, Watermarking, ERC, Facilities or Brightline. BCS groupings are object based, meaning that they include the basic capabilities for an object: identity, properties, and attributes defined by your procedures. The standards do not define the capabilities of the BCS objects. While it is possible to place a single BCA in more than one BCS, doing so creates complexity in documenting compliance for the entity and verification of compliance by the Regional Entity. Entities should exercise caution if planning to group in this manner. Entities should carefully document the strategies for grouping a BCA into a BCS, e.g. based on LAN, function, geolocation, etc. Entities should be prepared to provide the grouping approach upon receiving the 90 day audit notification and the Request For Information (RFI) may be customized by the region based on an entities grouping. Care should be taken when grouping across impact ratings. When there are multiple impact rated BCAs inside a single BCS, all assets must be protected to the highest impact rated BCA contained within the BCS. Entities should consider documenting which controls are being applied at the system level and which are being applied at the asset level.

6 Lesson Learned CIP Version 5 Transition Program CIP : Grouping BES Cyber Assets Industry Comments Draft Posted March 2, 2015 April 9, 2015 Comments Received Grouping BES Cyber Assets General Comments Bonneville Power Authority Illinois Municipal Electric Agency BPA supports the Grouping of BES Cyber Systems (Revised) Lesson Learned with no comments. IMEA supports this Lesson Learned 2 SERC Reliability Corporation 1. The SERC CIPC felt that this Lessons Learned Document was easy to read and understand. The drawings were done well and are being used to help people begin grouping. This document uses better language to serve as a lessons learned Agreed that the direction is clear that you must document what you choose and why but it is up to the entity to develop this grouping No issues with the information shared in this document but would like to see PCAs included; No issues with the document but would like to see PCA examples, serial devices, and generation included; Where would log collection systems reside? 2. Do you have comments for the Grouping Based on Functions section? Agree, no comments 3. Do you have any comments for the Common Local Area Network Grouping section? Agree, no comments 4. Do you have any comments for the documenting BES Cyber Systems? Agree, no comments 5. Do you have any comments on this Additional Examples section? Agree, no comments 3 Dominion Every page should be numbered. 4

7 Comments Received Grouping BES Cyber Assets The document is missing examples of BES Cyber Assets that have no external routable connectivity and examples of non-routable communication (serial, modbus, etc.). Include examples of BES Cyber Assets that have no external routable connectivity and examples of non-routable communication (serial, modbus, etc.). This Lesson Learned document doesn t include a cautionary note about creating separate groupings of BES Cyber Systems per requirement. Include language similar to bullet 4 on Page 5, that describes the complexity of taking that approach. The Lessons Learned is Transmission-centric. Either create a separate LL specific to Generation functions or include Generation examples in this document. Southern Company Edison Electric Institute Electric Power Supply Association American Electric Power Southern Company appreciates the opportunity to comment on the North American Electric Reliability Corporation s (NERC) two new lessons learned posted on March 2, NERC has put in a substantial effort to develop these drafts and we thank NERC for these efforts. Southern Company supports the Edison Electric Institute comments on the two lessons learned. The Trades continue to support the CIP Version 5 Advisory Group in developing supporting documents using the Section 11 NERC process to help entities transition to the CIP Version 5 Standards. This process is very important to supporting NERC s commitment to consistency across the Electric Reliability Organization 1 and a clear path and approach to transition from CIP Version 3 to CIP Version 5. 2 Herein, the Trades recommend several changes that will significantly improve the clarity of the Grouping BES Cyber Assets Lessons Learned. AEP is in agreement with the comments submitted by the Edison Electric Institute (EEI) in its entirety. 5 Exelon Exelon supports the comments submitted by EEI See, e.g., NERC, Project CIP Version 5 Revisions: Consideration of Comments, Additional Comment Period, January 23, 2015, p 8 ( NERC notes that it strives for consistency across the Electric Reliability Organization ); Informational Filing of the North American Electric Reliability Corporation Regarding the BES Cyber Asset Survey, Docket RM , February 3, 2015, p. 26 ( NERC understands the need for consistent understanding of the CIP Version 5 standards across the ERO in order for entities to effectively transition to CIP Version 5 compliance ). 2 Informational Filing of the North American Electric Reliability Corporation Regarding the CIP Version 5 Reliability Standards Implementation Study, Docket RM , October 11, 2013.

8 Comments Received Grouping BES Cyber Assets MidAmerican Energy Company Wisconsin Electric Power Company Encari ERCOT MidAmerican Energy Company supports the Edison Electric Institute comments on the two new lessons learned posted for comments on March 2, 2015, with comments due by March 30, Wisconsin Electric Power Company participated in the development of, and supports the feedback comments submitted by Edison Electric Institute (EEI) regarding NERC s Lessons Learned for Grouping of BES Cyber Systems (Revised) and Functional Obligations and Control Centers posted on March 2, Encari supports NERC s efforts to provide guidance to the industry to ease the transition to the suite of NERC Version 5 Critical Infrastructure Protection (CIP) standards from the previous suite of NERC CIP Version 3, but provides the below comments on this Lessons Learned for NERC s consideration. Encari, agrees with many of the outlined techniques used for grouping BES Cyber Assets into associated BES Cyber Systems. It is in the best interest that a process be developed for grouping of BES Cyber Assets into BES Cyber Systems where possible and as laid out throughout the NERC CIP Version 5 requirement paying attention to requirements which can be applied at the system level and not the asset level. The more thought that an entity puts into this ahead of time will cause less audit risk down the road, along with less chances for internal exceptions to policy This is a good example of the items that need to be asked as you categorize and complete your NERC CIP Version 5 inventory. ERCOT thanks the North American Electric Reliability Corporation ( NERC ) for the opportunity to review and provide comments on its Lesson Learned CIP Version 5 Transition Program CIP : Identification of BES Cyber Systems at Control Centers Pursuant to Reliability Standard CIP and Lesson Learned CIP Version 5 Transition Program CIP R1: Grouping BES Cyber Assets ( Lessons Learned ). ERCOT supports NERC s efforts to provide guidance to the industry to facilitate its transition to Version 5 of the Critical Infrastructure Protection (CIP) reliability standards, but provides the below comments on these Lessons Learned for NERC s consideration Specific Comments Duke Energy Duke Energy takes issue with the last sentence in the Background section of this lessons learned document. The last sentence suggests that an entity may choose to group its BES Cyber Assets. This is misleading in that, to maintain compliance, an entity must groups its BES Cyber Assets, and is not afforded a choice in the matter. Also, as written, the section tends to suggest that an entity must document its grouping method. This is 13

9 Comments Received Grouping BES Cyber Assets not a requirement, and should not be written in a lessons learned document to suggest an entity must document its grouping method. We suggest revising the language in the Background section to better align with the Guidance section of the document, which puts forward documenting the grouping as a recommendation of good practice. Duke Energy notices that Protected Cyber Assets are not referenced in the lessons learned document. We suggest that an example or a section addressing Protected Cyber Assets and how they should be treated in conjunction with the subject of this document be inserted. Bullet 5 of the Considerations section goes beyond what is required in the applicable standard. Bullet 5 is recommending that entities be prepared to provide information during an audit, information that is not required in the standard. Currently, Measure 1 of CIP requires that an entity identify a list of BES Cyber Systems, not provide a grouping approach. We suggest clarifying, or removing Bullet 5 altogether. Dominion Edison Electric Institute Electric Power Supply Association Re page 2: In regards to Figure 1 some direction should be provided on how to treat PCA(s) when you have multiple BES Cyber Systems in the same network with the PCA(s). Re page 3, Documenting BES Cyber Systems: The example provided exceeds what is required by the Standard. Include a disclaimer that indicates it is not a template to meet Compliance obligations. Re page 4. Figure 4: The figure provided is missing lines that connect the BES Cyber Assets to the EAP. Add lines similar to Figure 3. A. CIP requires Registered Entities to identify BES Cyber Systems, but does not require them to document the process they use to group BES Cyber Assets into a system. Under CIP , Responsible Entities must identify high and medium impact BES Cyber Systems (BCS) and assets that contain low impact BCS. BES Cyber Assets (BCA) are not mentioned in the standard requirement. By definition, a BCS is one or more BES Cyber Assets, which implies that entities must group their BCA into BCS, Grouping can mean a single BES Cyber Asset can be considered a BES Cyber System, or it can mean that several BCAs make up one BCS. Basically, grouping is required by the standard, but how the grouping is done is left up to the entity. The last sentence under the background section of the lesson learned implies that entities have a choice of whether to group: if a Registered Entity decides to group their BCA ; however, this is inconsistent with the language of the standard, which requires grouping

10 Comments Received Grouping BES Cyber Assets According to the background section of CIP , it is left up to the Responsible Entity to determine the level of granularity at which to identify a BES Cyber System within the qualifications in the definition of BES Cyber System. The language of the standard does not require or recommend that the entity demonstrate their grouping method when presenting evidence for an audit. Instead, it leaves it up to the Responsible Entity to determine. CIP R1 and M1 require that entities identify the BCS, but do not require entities to demonstrate their BCA grouping process. In fact, BCA are not mentioned in the standard requirements. Therefore they will need to demonstrate their grouping method in the last sentence of the Background section is also inconsistent with the standard requirements. In the Guidance section, the sentence however, it is recommended that each entity should document their processes for grouping their BES Cyber Assets to improve transparency during compliance monitoring is more appropriate for the lesson learned. It should be clear in the lesson learned document that the standard does not require the entity to document their grouping process. The Trades recommend deleting the last sentence in the Background section 3. Finally, the fifth bullet on the last page not only requires entities to carefully document their grouping strategies, but goes further by requiring them to provide the grouping approach upon receiving the 90 day audit notification. This bullet should also be removed as it establishes new requirements under the standard. It is left up to the Responsible Entity to identify a BES Cyber System within the qualifications in the definition and they must document this identification for audit. The method for grouping BCAs into a BCS is not addressed by the standard; however, an entity s grouping process could be used as evidence for BCS identification, but the standard does not require it. Therefore, it is not appropriate to modify the language of the standard to require the grouping approach under this supporting document. The lesson learned document is not intended to establish new requirements under NERC s Reliability Standards, to modify the requirements in any existing reliability standards nor to provide an official interpretation. Therefore, the Trades recommend removing all of the language that requires or recommends that Responsible Entities document or demonstrate their grouping method from the lesson learned. B. CIP does not require entities to document or inventory the cyber assets in a BCS or document cyber assets that would not be considered BCS. 3 We are recommending removing if a Registered Entity decides to group their BCA, they will need to demonstrate their grouping method from the Background section of the lesson learned.

11 Comments Received Grouping BES Cyber Assets The documentation approach example under the Documenting BES Cyber Systems uses column titles that imply that Registered Entities must document or inventory all of their cyber assets, identify whether each cyber asset is a BCA, and list the reason why a cyber asset is not a BCA. However, this is not required by CIP , which only requires entities to identify each BCS. The example provided in the lesson learned may cause auditors to ask for this evidence. Therefore the Trades recommend either removing this example or making it very clear that these items are not required pieces of evidence for compliance with the standard. C. BCA groupings may influence or change other CIP concepts. The second bullet on the last page states that BCS groupings do not influence or change other CIP concepts ; however, the grouping can in fact have an impact on the other CIP concepts. For example, if a cyber asset that would be considered a low impact BCS on its own is added to a medium impact BCS with external routable connectivity (ERC), then the added cyber asset would take on the higher impact rating, as described by the sixth bullet. For physical security perimeters (PSP), the CIP-006 requirements are written at the BCS level such that every cyber asset added to the system has to meet all the requirements applicable to the BCS. Therefore if an entity groups what could be categorized on its own as a low impact cyber system to a medium BCS, then the cyber asset becomes a part of the medium BCS. Because the medium impact CIP-006 PSP requirements apply to the system, the medium impact requirements apply to every asset in the system. We recommend that the words do not be replaced with may in the second bullet so that it reads BCS groupings may influence. D. The meaning of object based BCS groupings is unclear. The third bullet on the last page of this lesson learned describes object based BCS groupings; however, this bullet is unclear. We recommend the removal of this bullet. E. Documenting the controls applied at the system and asset levels are not a part of CIP and therefore should not be included in this lesson learned. The last bullet on the last page of this lesson learned tells entities to document controls applied at the system and asset level, which is not a part of CIP , which focuses on BCS categorization. The Trades recommend removing the last bullet from this lesson learned. F. Serial examples would be helpful.

12 Comments Received Grouping BES Cyber Assets The examples in this lesson learned are all IP based examples. It would be helpful to Responsible Entities to include a serial-based example in the lesson learned. American Electric Power ERCOT The representative spreadsheet, in the Documenting BES Cyber Systems section, presents a column requesting the rationale for exclusion on a device by device basis. This is simply not reasonable for a large organization with thousands, or perhaps tens of thousands of cyber assets. The leading narrative, in the Documenting BES Cyber Systems section, describes the example compliance approach of applying a reason (or reason code) to the cyber assets. Neither the reason nor reason code is represented in the example spreadsheet columns. 1. Figure 1 does not represent the example explained. 2. The Documenting BES Cyber Systems section should be moved after the examples of asset grouping. 3. Grouping BES Cyber Assets Considerations should be a section header. 4. Terms not included in the NERC glossary should not be capitalized

Lesson Learned CIP Version 5 Transition Program CIP R1: Grouping BES Cyber Assets Version: September 8, 2015

Lesson Learned CIP Version 5 Transition Program CIP R1: Grouping BES Cyber Assets Version: September 8, 2015 Lesson Learned CIP Version 5 Transition Program CIP-002-5.1 R1: Grouping BES Cyber Assets Version: September 8, 2015 This document is designed to convey lessons learned from NERC s various CIP version

More information

Lesson Learned CIP Version 5 Transition Program CIP : Communications and Networking Cyber Assets Draft Version: August 18, 2015

Lesson Learned CIP Version 5 Transition Program CIP : Communications and Networking Cyber Assets Draft Version: August 18, 2015 Lesson Learned CIP Version 5 Transition Program CIP-002-5.1: Communications and Networking Cyber Assets Draft Version: August 18, 2015 This document is designed to convey lessons learned from NERC s various

More information

Lesson Learned CIP Version 5 Transition Program CIP : Communications and Networking Cyber Assets Version: October 6, 2015

Lesson Learned CIP Version 5 Transition Program CIP : Communications and Networking Cyber Assets Version: October 6, 2015 Lesson Learned CIP Version 5 Transition Program CIP-002-5.1: Communications and Networking Cyber Assets Version: October 6, 2015 Authorized by the Standards Committee on October 29, 2015 for posting as

More information

Cyber Security Reliability Standards CIP V5 Transition Guidance:

Cyber Security Reliability Standards CIP V5 Transition Guidance: Cyber Security Reliability Standards CIP V5 Transition Guidance: ERO Compliance and Enforcement Activities during the Transition to the CIP Version 5 Reliability Standards To: Regional Entities and Responsible

More information

Lesson Learned CIP Version 5 Transition Program

Lesson Learned CIP Version 5 Transition Program Lesson Learned CIP Version 5 Transition Program CIP-002-5: BES Cyber Assets Version: September 9, 2015 This document is designed to convey lessons learned from NERC s various CIP version 5 transition activities.

More information

Purpose. ERO Enterprise-Endorsed Implementation Guidance

Purpose. ERO Enterprise-Endorsed Implementation Guidance Lesson Learned CIP Version 5 Transition Program CIP-002-5.1 Requirement R1: Impact Rating of Generation Resource Shared BES Cyber Systems Version: January 29, 2015 Authorized by the Standards Committee

More information

Lesson Learned CIP Version 5 Transition Program

Lesson Learned CIP Version 5 Transition Program Lesson Learned CIP Version 5 Transition Program CIP-002-5: BES Cyber Assets Version: December 7, 2015 This document is designed to convey lessons learned from NERC s various CIP version 5 transition activities.

More information

Implementation Plan. Project CIP Version 5 Revisions 1. January 23, 2015

Implementation Plan. Project CIP Version 5 Revisions 1. January 23, 2015 Implementation Plan Project 2014-02 CIP Version 5 Revisions January 23, 2015 This Implementation Plan for the Reliability Standards developed as part of Project 2014 02 CIP Version 5 Revisions replaces

More information

Unofficial Comment Form Project Modifications to CIP Standards Virtualization in the CIP Environment

Unofficial Comment Form Project Modifications to CIP Standards Virtualization in the CIP Environment Unofficial Comment Form Project 2016-02 Modifications to CIP Standards Virtualization in the CIP Environment Do not use this form for submitting comments. Use the electronic form to submit comments on

More information

Implementation Plan. Project CIP Version 5 Revisions. January 23, 2015

Implementation Plan. Project CIP Version 5 Revisions. January 23, 2015 Implementation Plan Project 2014-02 CIP Version 5 Revisions January 23, 2015 This Implementation Plan for the Reliability Standards developed as part of Project 2014-02 CIP Version 5 Revisions replaces

More information

CIP V5 Updates Midwest Energy Association Electrical Operations Conference

CIP V5 Updates Midwest Energy Association Electrical Operations Conference CIP V5 Updates Midwest Energy Association Electrical Operations Conference May 2015 Bob Yates, CISSP, MBA Principal Technical Auditor ReliabilityFirst Corporation Agenda Cyber Security Standards Version

More information

CIP V5 Implementation Study SMUD s Experience

CIP V5 Implementation Study SMUD s Experience CIP V5 Implementation Study SMUD s Experience Tim Kelley October 16, 2014 Powering forward. Together. SMUD Fast Facts General Information SMUD employs approximately 2,000 individuals Service area of 900

More information

Standards Authorization Request Form

Standards Authorization Request Form Standards Authorization Request Form When completed, email this form to: sarcomm@nerc.com NERC welcomes suggestions to improve the reliability of the bulk power system through improved reliability standards.

More information

Technical Questions and Answers CIP Version 5 Standards Version: June 13, 2014

Technical Questions and Answers CIP Version 5 Standards Version: June 13, 2014 Technical s and s CIP Version 5 Standards Version: June 13, 2014 This document is designed to convey lessons learned from NERC s various activities. It is not intended to establish new requirements under

More information

Project Modifications to CIP Standards

Project Modifications to CIP Standards Project 2016-02 Modifications to CIP Standards Virtualization and other Technology Innovations Presenters Jay Cribb, Southern Company Steve Brain, Dominion Energy Forrest Krigbaum, Bonneville Power Administration

More information

DRAFT. Cyber Security Communications between Control Centers. March May Technical Rationale and Justification for Reliability Standard CIP-012-1

DRAFT. Cyber Security Communications between Control Centers. March May Technical Rationale and Justification for Reliability Standard CIP-012-1 DRAFT Cyber Security Communications between Control Centers Technical Rationale and Justification for Reliability Standard CIP-012-1 March May 2018 NERC Report Title Report Date I Table of Contents Preface...

More information

Standard Development Timeline

Standard Development Timeline Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard is adopted by the NERC Board of Trustees (Board).

More information

UNITED STATES OF AMERICA BEFORE THE FEDERAL ENERGY REGULATORY COMMISSION ) )

UNITED STATES OF AMERICA BEFORE THE FEDERAL ENERGY REGULATORY COMMISSION ) ) UNITED STATES OF AMERICA BEFORE THE FEDERAL ENERGY REGULATORY COMMISSION Version 5 Critical Infrastructure Protection Reliability Standards ) ) Docket No. RM13-5- INFORMATIONAL FILING OF THE NORTH AMERICAN

More information

Reliability Standard Audit Worksheet 1

Reliability Standard Audit Worksheet 1 Reliability Standard Audit Worksheet 1 CIP-002-5.1 Cyber Security BES Cyber System Categorization This section to be completed by the Compliance Enforcement Authority. Audit ID: Registered Entity: NCR

More information

Frequently Asked Questions November 25, 2014 CIP Version 5 Standards

Frequently Asked Questions November 25, 2014 CIP Version 5 Standards Frequently Asked Questions November 25, 2014 CIP Version 5 Standards This document provides answers to questions asked by entities as they transition to the CIP Version 5 Standards. The questions are listed

More information

Physical Security Reliability Standard Implementation

Physical Security Reliability Standard Implementation Physical Security Reliability Standard Implementation Attachment 4b Action Information Background On March 7, 2014, the Commission issued an order directing NERC to submit for approval, within 90 days,

More information

Please contact the undersigned if you have any questions concerning this filing.

Please contact the undersigned if you have any questions concerning this filing. !! November 29, 2016 VIA ELECTRONIC FILING Veronique Dubois Régie de l'énergie Tour de la Bourse 800, Place Victoria Bureau 255 Montréal, Québec H4Z 1A2 Re: North American Electric Reliability Corporation

More information

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 January 23, 2015

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 January 23, 2015 Federal Energy Regulatory Commission Order No. 791 January 23, 2015 67 and 76 67. For the reasons discussed below, the Commission concludes that the identify, assess, and correct language, as currently

More information

Summary of FERC Order No. 791

Summary of FERC Order No. 791 Summary of FERC Order No. 791 On November 22, 2013, the Federal Energy Regulatory Commission ( FERC or Commission ) issued Order No. 791 adopting a rule that approved Version 5 of the Critical Infrastructure

More information

Cyber Security Incident Report

Cyber Security Incident Report Cyber Security Incident Report Technical Rationale and Justification for Reliability Standard CIP-008-6 January 2019 NERC Report Title Report Date I Table of Contents Preface... iii Introduction... 1 New

More information

Reliability Standard Audit Worksheet 1

Reliability Standard Audit Worksheet 1 Reliability Standard Audit Worksheet 1 CIP-012-1 Cyber Security Communications between Control Centers This section to be completed by the Compliance Enforcement Authority. Audit ID: Registered Entity:

More information

Standard CIP 005 4a Cyber Security Electronic Security Perimeter(s)

Standard CIP 005 4a Cyber Security Electronic Security Perimeter(s) A. Introduction 1. Title: Cyber Security Electronic Security Perimeter(s) 2. Number: CIP-005-4a 3. Purpose: Standard CIP-005-4a requires the identification and protection of the Electronic Security Perimeter(s)

More information

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

CIP Cyber Security Configuration Change Management and Vulnerability Assessments CIP-010-2 3 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:

More information

CIP Cyber Security Configuration Management and Vulnerability Assessments

CIP Cyber Security Configuration Management and Vulnerability Assessments Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed

More information

CIP Version 5 Evidence Request User Guide

CIP Version 5 Evidence Request User Guide CIP Version 5 Evidence Request User Guide Version 1.0 December 15, 2015 NERC Report Title Report Date I Table of Contents Preface... iv Introduction... v Purpose... v Evidence Request Flow... v Sampling...

More information

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

CIP Cyber Security Configuration Change Management and Vulnerability Assessments Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed

More information

Standard Development Timeline

Standard Development Timeline Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard is adopted by the NERC Board of Trustees (Board).

More information

Standard CIP 005 2a Cyber Security Electronic Security Perimeter(s)

Standard CIP 005 2a Cyber Security Electronic Security Perimeter(s) A. Introduction 1. Title: Cyber Security Electronic Security Perimeter(s) 2. Number: CIP-005-2a 3. Purpose: Standard CIP-005-2 requires the identification and protection of the Electronic Security Perimeter(s)

More information

NERC-Led Technical Conferences

NERC-Led Technical Conferences NERC-Led Technical Conferences NERC s Headquarters Atlanta, GA Tuesday, January 21, 2014 Sheraton Phoenix Downtown Phoenix, AZ Thursday, January 23, 2014 Administrative Items NERC Antitrust Guidelines

More information

Implementation Plan for Version 5 CIP Cyber Security Standards

Implementation Plan for Version 5 CIP Cyber Security Standards Implementation Plan for Version 5 CIP Cyber Security Standards April 10September 17, 2012 Note: On September 17, 2012, NERC was alerted that some references in the Initial Performance of Certain Periodic

More information

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 June 2, 2014

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 June 2, 2014 Federal Energy Regulatory Commission Order No. 791 June 2, 2014 67 and 76 67. For the reasons discussed below, the Commission concludes that the identify, assess, and correct language, as currently proposed

More information

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

CIP Cyber Security Configuration Change Management and Vulnerability Assessments CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:

More information

Standard Development Timeline

Standard Development Timeline CIP-008-6 Incident Reporting and Response Planning Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard

More information

Disclaimer Executive Summary Introduction Overall Application of Attachment Generation Transmission...

Disclaimer Executive Summary Introduction Overall Application of Attachment Generation Transmission... CIP-002-4 Cyber Security Critical Cyber Asset Identification Rationale and Implementation Reference Document September, 2010 Table of Contents TABLE OF CONTENts Disclaimer... 3 Executive Summary... 4 Introduction...

More information

DRAFT Voice Communications in a CIP Environment Critical Infrastructure Protection Committee Implementation Recommendation May 22, 2017

DRAFT Voice Communications in a CIP Environment Critical Infrastructure Protection Committee Implementation Recommendation May 22, 2017 DRAFT Voice Communications in a CIP Environment Critical Infrastructure Protection Committee Implementation Recommendation May 22, 2017 1 Introduction The Critical Infrastructure Protection Committee (CIPC)

More information

Frequently Asked Questions CIP Version 5 Standards Consolidated Comments Received Regarding April 1, 2015 Posting

Frequently Asked Questions CIP Version 5 Standards Consolidated Comments Received Regarding April 1, 2015 Posting Frequently Asked Questions CIP Version 5 Standards Consolidated Received Regarding April 1, 2015 Posting This draft document is designed to provide answers to questions asked by entities as they transition

More information

CIP Cyber Security Incident Reporting and Response Planning

CIP Cyber Security Incident Reporting and Response Planning Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed

More information

CIP Cyber Security Recovery Plans for BES Cyber Systems

CIP Cyber Security Recovery Plans for BES Cyber Systems A. Introduction 1. Title: Cyber Security Recovery Plans for BES Cyber Systems 2. Number: CIP-009-6 3. Purpose: To recover reliability functions performed by BES Cyber Systems by specifying recovery plan

More information

CIP Cyber Security Recovery Plans for BES Cyber Systems

CIP Cyber Security Recovery Plans for BES Cyber Systems Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed

More information

Reliability Standard Audit Worksheet 1

Reliability Standard Audit Worksheet 1 Reliability Standard Audit Worksheet 1 CIP-006-6 Cyber Security Physical Security of BES Cyber Systems This section to be completed by the Compliance Enforcement Authority. Audit ID: Registered Entity:

More information

Standard CIP-006-4c Cyber Security Physical Security

Standard CIP-006-4c Cyber Security Physical Security A. Introduction 1. Title: Cyber Security Physical Security of Critical Cyber Assets 2. Number: CIP-006-4c 3. Purpose: Standard CIP-006-4c is intended to ensure the implementation of a physical security

More information

Standard Authorization Request Form

Standard Authorization Request Form Title of Proposed Standard Cyber Security Request Date May 2, 2003 SAR Requestor Information Name Charles Noble (on behalf of CIPAG) Company Telephone SAR Type (Check box for one of these selections.)

More information

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010 Standard CIP 011 1 Cyber Security Protection Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes

More information

Critical Infrastructure Protection (CIP) Version 5 Revisions. Standard Drafting Team Update Industry Webinar September 19, 2014

Critical Infrastructure Protection (CIP) Version 5 Revisions. Standard Drafting Team Update Industry Webinar September 19, 2014 Critical Infrastructure Protection (CIP) Version 5 Revisions Standard Drafting Team Update Industry Webinar September 19, 2014 Administrative Items NERC Antitrust Guidelines It is NERC s policy and practice

More information

Critical Infrastructure Protection Version 5

Critical Infrastructure Protection Version 5 Critical Infrastructure Protection Version 5 Tobias Whitney, Senior CIP Manager, Grid Assurance, NERC Compliance Committee Open Meeting August 9, 2017 Agenda Critical Infrastructure Protection (CIP) Standards

More information

Reliability Standard Audit Worksheet 1

Reliability Standard Audit Worksheet 1 Reliability Standard Audit Wksheet 1 CIP-005-6 Cyber Security Electronic Security Perimeter(s) This section to be completed by the Compliance Enfcement Authity. Audit ID: Registered Entity: NCR Number:

More information

UNITED STATES OF AMERICA BEFORE THE FEDERAL ENERGY REGULATORY COMMISSION ) )

UNITED STATES OF AMERICA BEFORE THE FEDERAL ENERGY REGULATORY COMMISSION ) ) UNITED STATES OF AMERICA BEFORE THE FEDERAL ENERGY REGULATORY COMMISSION Cyber Security Incident Reporting Reliability Standards ) ) Docket Nos. RM18-2-000 AD17-9-000 COMMENTS OF THE NORTH AMERICAN ELECTRIC

More information

CIP Cyber Security Security Management Controls. Standard Development Timeline

CIP Cyber Security Security Management Controls. Standard Development Timeline Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed

More information

Reliability Standard Audit Worksheet 1

Reliability Standard Audit Worksheet 1 Reliability Standard Audit Worksheet 1 PRC-004-3 Protection System Misoperation Identification and Correction This section to be completed by the Compliance Enforcement Authority. Audit ID: Registered

More information

CIP Cyber Security Security Management Controls. A. Introduction

CIP Cyber Security Security Management Controls. A. Introduction CIP-003-7 - Cyber Security Security Management Controls A. Introduction 1. Title: Cyber Security Security Management Controls 2. Number: CIP-003-7 3. Purpose: To specify consistent and sustainable security

More information

CIP Cyber Security Personnel & Training

CIP Cyber Security Personnel & Training A. Introduction 1. Title: Cyber Security Personnel & Training 2. Number: CIP-004-6 3. Purpose: To minimize the risk against compromise that could lead to misoperation or instability in the Bulk Electric

More information

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

CIP Cyber Security Configuration Change Management and Vulnerability Assessments CIP 010 1 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:

More information

Standard Development Timeline

Standard Development Timeline CIP-003-67(i) - Cyber Security Security Management Controls Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when

More information

CIP Cyber Security Physical Security of BES Cyber Systems

CIP Cyber Security Physical Security of BES Cyber Systems A. Introduction 1. Title: Cyber Security Physical Security of BES Cyber Systems 2. Number: CIP-006-5 3. Purpose: To manage physical access to BES Cyber Systems by specifying a physical security plan in

More information

NPCC Compliance Monitoring Team Classroom Session

NPCC Compliance Monitoring Team Classroom Session NPCC Compliance Monitoring Team Classroom Session John Muir - Director, Compliance Monitoring Jacqueline Jimenez - Senior Compliance Engineer David Cerasoli, CISSP - Manager, CIP Audits 5/14/2018 1 Compliance

More information

Project Modifications to CIP Standards. Technical Conference April 19, 2016 Atlanta, GA

Project Modifications to CIP Standards. Technical Conference April 19, 2016 Atlanta, GA Project 2016-02 Modifications to CIP Standards Technical Conference April 19, 2016 Atlanta, GA Agenda Welcome Steven Noess NERC Antitrust Compliance Guidelines and Public Announcement* - Al McMeekin Logistics

More information

Unofficial Comment Form Project Modifications to CIP Standards Requirements for Transient Cyber Assets CIP-003-7(i)

Unofficial Comment Form Project Modifications to CIP Standards Requirements for Transient Cyber Assets CIP-003-7(i) Unofficial Comment Form Project 2016-02 Modifications to CIP Standards Requirements for Transient Cyber Assets CIP-003-7(i) Do not use this form for submitting comments. Use the electronic form to submit

More information

CIP Cyber Security Electronic Security Perimeter(s)

CIP Cyber Security Electronic Security Perimeter(s) A. Introduction 1. Title: Cyber Security Electronic Security Perimeter(s) 2. Number: CIP-005-5 3. Purpose: To manage electronic access to BES Cyber Systems by specifying a controlled Electronic Security

More information

Standard CIP-006-3c Cyber Security Physical Security

Standard CIP-006-3c Cyber Security Physical Security A. Introduction 1. Title: Cyber Security Physical Security of Critical Cyber Assets 2. Number: CIP-006-3c 3. Purpose: Standard CIP-006-3 is intended to ensure the implementation of a physical security

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information

Interactive Remote Access FERC Remote Access Study Compliance Workshop October 27, Eric Weston Compliance Auditor Cyber Security.

Interactive Remote Access FERC Remote Access Study Compliance Workshop October 27, Eric Weston Compliance Auditor Cyber Security. Interactive Remote Access Compliance Workshop October 27, 2016 Eric Weston Compliance Auditor Cyber Security 2 Agenda Interactive Remote Access Overview Review of Use Cases and Strategy 1 Interactive Remote

More information

Cyber Security Standards Drafting Team Update

Cyber Security Standards Drafting Team Update Cyber Security Standards Drafting Team Update Michael Assante, VP & Chief Security Officer North American Electric Reliability Corp. February 3, 2008 Overview About NERC Project Background Proposed Modifications

More information

SGAS Low Impact Atlanta, GA September 14, 2016

SGAS Low Impact Atlanta, GA September 14, 2016 SGAS Low Impact Atlanta, GA September 14, 2016 Lisa Wood, CISA, Security+, CBRA, CBRM Compliance Auditor Cyber Security Western Electricity Coordinating Council Slide 2 Agenda Low Impact Case Study Overview

More information

Standard CIP Cyber Security Critical Cyber As s et Identification

Standard CIP Cyber Security Critical Cyber As s et Identification A. Introduction 1. Title: Cyber Security Critical Cyber Asset Identification 2. Number: CIP-002-4 3. Purpose: NERC Standards CIP-002-4 through CIP-009-4 provide a cyber security framework for the identification

More information

Standard Development Timeline

Standard Development Timeline CIP-002-6 Cyber Security BES Cyber System Categorization Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the

More information

CIP Cyber Security Physical Security of BES Cyber Systems

CIP Cyber Security Physical Security of BES Cyber Systems Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed

More information

Frequently Asked Questions CIP Version 5 Standards April 1, 2015

Frequently Asked Questions CIP Version 5 Standards April 1, 2015 Frequently Asked Questions CIP Version 5 Standards April 1, 2015 This draft document provides answers to questions asked by entities as they transition to the CIP Version 5 Reliability Standards. The information

More information

Better Practice Elements for Audit Preparation

Better Practice Elements for Audit Preparation Better Practice Elements for Audit Preparation David Cerasoli, CISSP Manager, CIP Audits John Muir Director, Compliance Monitoring 3/23/2018 1 This presentation will cover the major milestones of an audit,

More information

CIP Technical Workshop

CIP Technical Workshop CIP Technical Workshop Scott R, Mix, CISSP, NERC CIP Technical Manager Nick Santora, CISSP, CISA, GISP, CIP Cybersecurity Specialist Tobias R. Whitney, Manager, CIP Compliance March 4, 2014 Agenda Welcome

More information

Reliability Standard Audit Worksheet 1

Reliability Standard Audit Worksheet 1 Reliability Standard Audit Worksheet 1 PRC-004-3 Protection System Misoperation Identification and Correction This section to be completed by the Compliance Enforcement Authority. Audit ID: Registered

More information

Frequently Asked Questions CIP Version 5 Standards Consolidated FAQs and Answers Version: October 2015

Frequently Asked Questions CIP Version 5 Standards Consolidated FAQs and Answers Version: October 2015 Frequently Asked Questions CIP Version 5 Standards Consolidated FAQs and Answers Version: October 2015 This document is designed to provide answers to questions asked by entities as they transition to

More information

CIP Cyber Security Recovery Plans for BES Cyber Systems

CIP Cyber Security Recovery Plans for BES Cyber Systems A. Introduction 1. Title: Cyber Security Recovery Plans for BES Cyber Systems 2. Number: CIP-009-5 3. Purpose: To recover reliability functions performed by BES Cyber Systems by specifying recovery plan

More information

DRAFT Reliability Standard Audit Worksheet 1

DRAFT Reliability Standard Audit Worksheet 1 DRAFT Reliability Standard Audit Worksheet 1 PRC-025-2 Generator Relay Loadability This section to be completed by the Compliance Enforcement Authority. Audit ID: Registered Entity: NCR Number: Compliance

More information

A. Introduction 1. Title: 2. Number: 3. Purpose: 4. Applicability: 4.1. Functional Entities: Balancing Authority Distribution Provider

A. Introduction 1. Title: 2. Number: 3. Purpose: 4. Applicability: 4.1. Functional Entities: Balancing Authority Distribution Provider The Background, VRF/VSLs, and Guidelines and Technical Basis Sections have been removed for this informal posting. The Project 2016-02 is seeking comments around the concept of the Requirement/Measure

More information

Standard Development Timeline

Standard Development Timeline Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Description of Current Draft

More information

This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective.

This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Description of Current Draft

More information

Compliance: Evidence Requests for Low Impact Requirements

Compliance: Evidence Requests for Low Impact Requirements MIDWEST RELIABILITY ORGANIZATION Compliance: Evidence Requests for Low Impact Requirements Jess Syring, CIP Compliance Engineer MRO CIP Low Impact Workshop March 1, 2017 Improving RELIABILITY and mitigating

More information

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS The Saskatchewan Power Corporation (SaskPower) is the principal supplier of power in Saskatchewan with its mission to deliver power

More information

Standard Development Timeline

Standard Development Timeline Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard is adopted by the NERC Board of Trustees (Board).

More information

Standard CIP Cyber Security Electronic Security Perimeter(s)

Standard CIP Cyber Security Electronic Security Perimeter(s) A. Introduction 1. Title: Cyber Security Electronic Security Perimeter(s) 2. Number: CIP-005-2 3. Purpose: Standard CIP-005-2 requires the identification and protection of the Electronic Security Perimeter(s)

More information

Project Modifications to CIP Standards. Consideration of Comments Initial Comment Period

Project Modifications to CIP Standards. Consideration of Comments Initial Comment Period Project 2016-02 Modifications to CIP Standards Consideration of Comments Initial Comment Period October 21, 2016 Consideration of Comments Introduction The following are the ballots associated with this

More information

Standard Development Timeline

Standard Development Timeline CIP-002-6 Cyber Security BES Cyber System Categorization Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the

More information

NERC Transmission Availability Data System (TADS): Element Identifier Data Submission Addendum

NERC Transmission Availability Data System (TADS): Element Identifier Data Submission Addendum Transmission Availability Data System (TADS) Element Identifier Data Submission Addendum May 28, 2013 3353 Peachtree Road NE NERC Transmission Availability Data System (TADS): Element Identifier Data Submission

More information

Cybersecurity for the Electric Grid

Cybersecurity for the Electric Grid Cybersecurity for the Electric Grid Electric System Regulation, CIP and the Evolution of Transition to a Secure State A presentation for the National Association of Regulatory Utility Commissioners March

More information

Additional 45-Day Comment Period and Ballot November Final Ballot is Conducted January Board of Trustees (Board) Adoption February 2015

Additional 45-Day Comment Period and Ballot November Final Ballot is Conducted January Board of Trustees (Board) Adoption February 2015 Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed

More information

Implementation Plan for Newly Identified Critical Cyber Assets and Newly Registered Entities

Implementation Plan for Newly Identified Critical Cyber Assets and Newly Registered Entities Implementation Plan for Newly Identified Critical Cyber Assets and Newly Registered Entities This Implementation Plan applies to Cyber Security Standards CIP-002-2 through CIP-009-2 and CIP-002-3 through

More information

Standard CIP Cyber Security Critical Cyber As s et Identification

Standard CIP Cyber Security Critical Cyber As s et Identification A. Introduction 1. Title: Cyber Security Critical Cyber Asset Identification 2. Number: CIP-002-4 3. Purpose: NERC Standards CIP-002-4 through CIP-009-4 provide a cyber security framework for the identification

More information

CIP Cyber Security Physical Security of BES Cyber Systems

CIP Cyber Security Physical Security of BES Cyber Systems A. Introduction 1. Title: Cyber Security Physical Security of BES Cyber Systems 2. Number: CIP-006-6 3. Purpose: To manage physical access to Bulk Electric System (BES) Cyber Systems by specifying a physical

More information

Industry Webinar. Project Modifications to CIP-008 Cyber Security Incident Reporting. November 16, 2018

Industry Webinar. Project Modifications to CIP-008 Cyber Security Incident Reporting. November 16, 2018 Industry Webinar Project 2018-02 Modifications to CIP-008 Cyber Security Incident Reporting November 16, 2018 Agenda Presenters Standard Drafting Team NERC Staff - Alison Oswald Administrative Items Project

More information

NERC Request for Data or Information: Protection System Misoperation Data Collection August 14, 2014

NERC Request for Data or Information: Protection System Misoperation Data Collection August 14, 2014 Request for Data or Information Protection System Misoperation Data Collection August 14, 2014 3353 Peachtree Road NE Suite 600, North Tower Atlanta, GA 30326 404-446-2560 www.nerc.com 1 of 15 Table of

More information

Reliability Standard Audit Worksheet 1

Reliability Standard Audit Worksheet 1 Reliability Standard Audit Wksheet 1 CIP-009-6 Cyber Security Security Management Controls This section to be completed by the Compliance Enfcement Authity. Audit ID: Registered Entity: NCR Number: Compliance

More information

CIP Cyber Security Configuration Change Management and Vulnerability AssessmentsManagement

CIP Cyber Security Configuration Change Management and Vulnerability AssessmentsManagement The Background, VRF/VSLs, and Guidelines and Technical Basis Sections have been removed for this informal posting. The Project 2016-02 is seeking comments around the concept of the Requirement/Measure

More information

ERO Mitigation Plan Guide Revised April 2014

ERO Mitigation Plan Guide Revised April 2014 ERO Mitigation Plan Guide Revised April 2014 1 of 23 3353 Peachtree Road NE Suite 600, North Tower Atlanta, GA 30326 404-446-2560 www.nerc.com Table of Contents Table of Contents...2 Disclaimer...3 Document

More information

Draft CIP Standards Version 5

Draft CIP Standards Version 5 Draft CIP Standards Version 5 Technical Webinar Part 1 Project 2008-06 Cyber Security Order 706 Standards Drafting Team November 15, 2011 Agenda Opening Remarks John Lim, Consolidated Edison, Chair V5

More information