Risk-Based Approach to Compliance Monitoring and Enforcement

Similar documents
2017 ERO Enterprise Compliance Monitoring and Enforcement Implementation Plan

Québec Reliability Standards Compliance Monitoring and Enforcement Program Implementation Plan Annual Implementation Plan

New Brunswick 2018 Annual Implementation Plan Version 1

Regulatory Impacts on Research Topics. Jennifer T. Sterling Director, Exelon NERC Compliance Program

Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13

British Columbia Utilities Commission Reliability Standards with Effective Dates adopted in British Columbia

Chapter X Security Performance Metrics

Standards Authorization Request Justification

Standard Development Timeline

Standard Development Timeline

ERO Reliability Risk Priorities Report. Peter Brandien, RISC Chair Member Representatives Committee Meeting November 1, 2016

2018 MRO Regional Risk Assessment

Disclaimer Executive Summary Introduction Overall Application of Attachment Generation Transmission...

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

Standard EOP Disturbance Reporting

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

Proposed Convention for Numbering of NERC Reliability Standards Draft September 9, 2004

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

Appendix A3 - Northeast Power Coordinating Council (NPCC) 2015 CMEP Implementation Plan for Entities within the U.S.

NERC Management Response to the Questions of the NERC Board of Trustees on Reliability Standard COM September 6, 2013

CIP Cyber Security Systems Security Management

Reliability Standards Development Plan

Cyber Threats? How to Stop?

151 FERC 61,066 UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION ORDER DENYING REHEARING. (Issued April 23, 2015)

Project Cyber Security - Order No. 791 Identify, Assess, and Correct; Low Impact; Transient Devices; and Communication Networks Directives

FERC Reliability Technical Conference Panel I: 2015 State of Reliability Report Introduction Overview of the State Of Reliability

CIP Cyber Security Personnel & Training

CIP Cyber Security Critical Cyber Asset Identification. Rationale and Implementation Reference Document

Chapter X Security Performance Metrics

NERC and Regional Coordination Update

History of NERC January 2018

Transmission, Risk and EPA Air Regulations

NB Appendix CIP NB-0 - Cyber Security Personnel & Training

Critical Infrastructure Protection Version 5

Chapter X Security Performance Metrics

DRAFT. Cyber Security Communications between Control Centers. March May Technical Rationale and Justification for Reliability Standard CIP-012-1

Violation Risk Factor and Violation Severity Level Justifications Project Modifications to CIP Standards

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

Standard Development Timeline

NERC Overview and Compliance Update

RELIABILITY COMPLIANCE ENFORCEMENT IN ONTARIO

FERC Reliability Technical Conference -- Panel I State of Reliability and Emerging Issues

CIP Cyber Security Personnel & Training

primary Control Center, for the exchange of Real-time data with its Balancing

CIP Version 5 Transition. Steven Noess, Director of Compliance Assurance Member Representatives Committee Meeting November 12, 2014

Cyber Security Incident Report

Geomagnetic Disturbances

NERC CIP Information Protection

CIP Cyber Security Configuration Management and Vulnerability Assessments

Blackout 2003 Reliability Recommendations

Standards Authorization Request Form

UNITED STATES OF AMERICA BEFORE THE FEDERAL ENERGY REGULATORY COMMISSION ) )

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010

Violation Risk Factor and Violation Severity Level Justification Project Modifications to CIP-008 Cyber Security Incident Reporting

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS

requirements in a NERC or Regional Reliability Standard.

NB Appendix CIP NB-0 - Cyber Security Recovery Plans for BES Cyber Systems

requirements in a NERC or Regional Reliability Standard.

CIP Cyber Security Information Protection

Project Retirement of Reliability Standard Requirements

PRC Coordination of Protection Systems for Performance During Faults

Standard CIP Cyber Security Critical Cyber As s et Identification

Standards Development Update

Electric Reliability Organization Enterprise Operating Plan

Standard CIP Cyber Security Critical Cyber As s et Identification

NERC Event Analysis Update Webinar. Hassan Hamdar Chair, Event Analysis Subcommittee October 20, 2016

NERC and Regional Coordination Update. Operating Committee Preston Walker January 9, 2018

Appendix A8 - Western Electricity Coordinating Council (WECC) 2015 CMEP Implementation Plan

Unofficial Comment Form Project Operating Personnel Communications Protocols COM Operating Personnel Communications Protocols

Grid Security & NERC. Council of State Governments. Janet Sena, Senior Vice President, Policy and External Affairs September 22, 2016

2015 Risk Element: Extreme Physical Events

ERO Reliability Risk Priorities

CIP Cyber Security Physical Security of BES Cyber Systems

Supplemental Information

Reliability Standard Audit Worksheet 1

EEI Fall 2008 Legal Conference Boston, Massachusetts Stephen M. Spina November 1,

This draft standard is being posted for an initial comment and ballot. The draft includes modifications to meet the directives of FERC Order No. 791.

Standard CIP Cyber Security Critical Cyber Asset Identification

CIP Cyber Security Configuration Change Management and Vulnerability AssessmentsManagement

Summary of FERC Order No. 791

Standard CIP Cyber Security Critical Cyber Asset Identification

NERC Request for Data or Information: Protection System Misoperation Data Collection August 14, 2014

This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective.

Cybersecurity for the Electric Grid

Grid Security & NERC

Toward All-Hazards Security and Resilience for the Power Grid

Impacts and Implementation: NERC Reliability Standards, Compliance Initiatives, and Regulatory Activities

1. SAR posted for comment on January 15, Standard Drafting Team appointed on January 29, 2014

Physical Security Reliability Standard Implementation

Standard Development Timeline

Cyber Security Reliability Standards CIP V5 Transition Guidance:

Standard TOP Transmission Operations

Cyber Security Standards Drafting Team Update

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 January 23, 2015

Multi-Region Registered Entity Coordinated Oversight Program

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 June 2, 2014

CIP Cyber Security Recovery Plans for BES Cyber Systems

CIP Cyber Security Recovery Plans for BES Cyber Systems

ipcgrid 2015 March 26, 2015 David Roop Director Electric Transmission Operations Dominion Virginia Power

Title. Critical Infrastructure Protection Getting Low with a Touch of Medium. CanWEA Operations and Maintenance Summit 2018.

Transcription:

Risk-Based Compliance Oversight Plan Process for Risk Elements and Associated The ERO Enterprise continues to identify risks to the reliability of the BPS, as well as mitigating factors that may reduce or eliminate a given reliability risk, and the ERO Enterprise will continue to do so under the Framework referenced above. As such, NERC identifies risk elements using data including, but not limited to: compliance findings; event analysis experience; data analysis; and the expert judgment of NERC and RE staff, committees, and subcommittees (e.g., NERC Reliability Issues Steering Committee). NERC uses these risk elements to identify and prioritize interconnection and continent-wide risks to the reliability of the BPS. These identified risks, as well as risks to the reliability of the BPS identified by each RE for its footprint, will be used by REs to focus monitoring activities in the upcoming year, and they become inputs for developing oversight plans for individual registered entities. For the purpose of the Implementation Plan, areas of focus highlight ERO Enterprise-wide and RE-specific risks that merit increased focus for compliance monitoring, which becomes a part of an individual registered entity s compliance oversight plan. The areas of focus do not represent the exclusive list of important or relevant Reliability Standards or Requirements, nor are the areas of focus the entirety of the risks that may affect the reliability of the BPS. Rather, REs will consider the risk elements and areas of focus to help prioritize compliance monitoring efforts. When developing entity-specific compliance oversight plans, REs consider local risks and specific circumstances associated with individual registered entities. They focus on a complete picture of reliability risks to determine the appropriate compliance monitoring tool for registered entities. As a result, a particular registered entity s scope of monitoring may include more, fewer, or different Reliability Standards than those outlined in the ERO and RE CMEP IPs. The determination of the appropriate CMEP tools may be adjusted, as needed, within a given implementation year. Additionally, NERC and the REs have the authority to monitor compliance with all applicable Reliability Standards whether they are identified as areas of focus to be considered for compliance oversight in the annual Implementation Plan or are included in an RE s oversight plan for a registered entity. NERC followed the risk element development process outlined in the Risk Elements Guide for Development of the 2015 ERO Enterprise CMEP Implementation Plan to review and reassess the 2015 risk elements to determine applicability for 2016. 11 Although the Implementation Plan identifies NERC Standards and Requirements for consideration for focused compliance monitoring, the ERO Enterprise recognizes by using the Framework and riskbased processes that REs will develop a focused list of NERC Reliability Standards and Requirements specific to the risk a registered entity poses. Therefore, a particular area of focus under a risk element does not imply (1) that the identified NERC standard(s) fully addresses the particular risk associated with the risk element; (2) that the identified NERC Standard(s) is only related to that specific risk element; or (3) that all requirements of a NERC standard apply to that risk element equally. Subject to NERC monitoring, REs will consider the ERO Enterprise risk elements, along with RE risk elements, when conducting compliance monitoring activities and assessing compliance with identified NERC standards and requirements. Risk Element Results For 2016, NERC refined the nine 2015 risk elements down to eight. Specific refinements include combining some risk elements into broader categories, with more specified areas of focus under each risk element, and revising 11 Risk Elements Guide for Development of the 2015 CMEP IP, available at http://www.nerc.com/pa/comp/reliability%20assurance%20initiative/final_riskelementsguide_090814.pdf. 8

the risk element names to more accurately reflect the risk involved. Table 2 compares the 2015 risk elements to the new, refined 2016 risk elements. Table 1. Critical Comparison of 2015 and 2016 Risk Elements 2015 Risk Elements 2016 Risk Elements Cybersecurity Critical Infrastructure Protection Extreme Physical Events Extreme Physical Events Infrastructure Maintenance Maintenance and Management of BPS Assets Monitoring and Situational Awareness Monitoring and Situational Awareness Protection System Misoperations Uncoordinated Protection Systems Protection System Failures Long-Term Planning and System Analysis Event Response/Recovery Planning and System Analysis Human Error Human Performance Workforce Capability (N/A for 2016) 2016 Risk Elements The eight risk elements below are not a comprehensive list of all risks to the reliability of the BPS. Standards, requirements, and associated functions for each area of focus may be updated throughout the year to reflect new versions of the standards that become effective. Where issues are being addressed through other mechanisms, they are not included herein for compliance assurance activities. 12 1. Critical Infrastructure Protection The protection of critical infrastructure remains an area of significant importance and is addressed in the RISC s ERO Priorities: RISC Updates and Recommendations report 13, the Cyber Attack Task Force Final Report 14, and in NERC s ERO Top Priority Reliability Risks 2014-2017 report. 15 The risk includes threats and vulnerabilities that result from (1) system downtime, (2) unauthorized access, and (3) corruption of operational data. While Critical Infrastructure Protection is identified as a separate risk element, the CIP standards themselves are also linked to other risk elements identified in this document. The CIP standards address protection of the BES; thus, errors in identifying and categorizing the appropriate BES components could lead to ineffective or missing security measures. There are also situations in which Operations and Planning standards could affect CIP risk elements (e.g., CIP-008 and CIP-009 deal with response planning and recovery from cyber events and as such could have been included as part of the Events Response/Recovery risk element). System Dow ntime NERC has analyzed data and identified that outages of tools and monitoring systems are fairly common occurrences. Events involving a complete loss of SCADA control, or monitoring functionality for 30 minutes or more, are the most common grid-related events since 2012 and limit the situational awareness of operators. Less- 12 For example, vegetation management and right-of-way clearances, while key priorities, are not areas of focus for compliance assurance activities because they are being addressed through other ongoing targeted initiatives. 13 ERO Priorities: RISC Updates and Recommendations available at http://www.nerc.com/comm/risc/related%20files%20dl/risc_priority_recommendations-jul_26_2013.pdf 14 Cyber Attack Task Force Final Report available at http://www.nerc.com/docs/cip/catf/12- CATF_Final_Report_BOT_clean_Mar_26_2012-Board%20Accepted%200521.pdf 15 ERO Top Priority Reliability Risks 2014-2017 available at http://www.nerc.com/comm/risc/agenda%20highlights%20and%20minutes/ero%20top%20priority%20reliability%20risks%202014.pdf 9

than-adequate situational awareness has the potential for significant negative reliability consequences and is often a precursor event or contributor to events. Additionally, insufficient communication and data regarding neighboring entities operations could result in invalid assumptions of another system s behavior or system state. Furthermore, with the transition to CIP Version 5 in 2016, entities are to use a rigorous criteria to determine the BCSs that will be subject to the technical security requirements. With such a major shift in this key aspect of entities CIP and security programs, it is important to perform the analyses early so that critical BCSs are identified and potential gaps in the security controls used to protect BCSs is minimized. Unauthorized Access Unauthorized access can lead to BCSs being compromised and is a major risk to systems that are used to monitor and control the BES. The RISC report describes the implementation of mandatory CIP standards and the establishment of the E-ISAC as substantial risk mitigation measures, but cyber-attack is a constantly evolving threat. Any communication gaps between cyber experts and industry operators could lead to vulnerabilities. Also, the fast-paced rate of changes in technology with increased reliance on automation, remote control technology, and grid sensors that enable the close monitoring and operations of systems means that advanced tools are needed to counter those threats. Corruption of Operational Data Misconfiguration of BES Cyber Assets, which often results from gaps in change management processes, can make the devices used to monitor and control the BPS subject to more attacks. 16 Table 2. Critical Infrastructure Protection Asset Types Generator Operator Control Centers Backup Control Centers CIP-002-5.1 R1, R2 Generator Owner Data Centers Substations Generation Facilities Transmission Owner CIP-005-5 CIP-006-5 R1, R2 R1, R2, R3 Generator Operator Generator Owner Transmission Owner Transmission Owner Control Centers Backup Control Centers Data Centers Substations Generation Facilities Control Centers Backup Control Centers Data Centers Substations 16 While Table 2 lists the CIP Version 5 Reliability Standards, the ERO, through release of its Cyber Security Reliability Standards CIP Version 5 Transition Guidance, actively encourages and supports registered entities transitioning from compliance with the Version 3 Reliability Standards directly to the Version 5 Reliability Standards. As stated in that guidance, NERC and the Regional Entities will take a flexible compliance monitoring and enforcement approach for the CIP Reliability Standards prior to the Enforceable Date of the Version 5 Reliability Standards, recognizing that the details of implementing a Version 3 to Version 5 transition may cause a significant impact on certain compliance monitoring activities. 10

Table 2. Critical Infrastructure Protection Asset Types Control Centers CIP-007-5 R1, R2, R3, R5 Transmission Owner Backup Control Centers Data Centers 2. Extreme Physical Events Extreme physical events can include acts of nature or man-made events that cause extensive damage to equipment and systems. NERC identified this concern as a significant risk in its ERO Top Priority Reliability Risks 2014-2017 report as well as in the RISC s ERO Priorities: RISC Updates and Recommendations report. As concluded in the RISC report, the potential consequences of such events are high enough to warrant increased focus to properly address the risk. Acts of Nature The RISC report identifies severe weather events (e.g., hurricanes, tornadoes, polar vortices, GMDs, etc.) as physical events that, at the extreme, can cause equipment damage that is interconnection-wide, lead to fuel limitations, and disrupt telecommunications. Because of the long lead time needed to manufacture and replace some BPS assets, an extreme physical event that causes extensive damage to equipment could result in degraded reliability for an extended period of time. Man-made The second component of extreme physical events is those that are man-made. As stated in the RISC report, coordinated sabotage such as localized physical attacks of significance or electromagnetic pulse (EMP) attacks are physical events that, at the extreme, can cause extensive interconnection-wide equipment damage and disrupt telecommunications. As previously mentioned, the lead time for manufacturing and replacing some BPS assets could result in degraded reliability for an extended period of time. Table 3. Extreme Physical Events EOP-010-1 R1, R3 CIP-014-2 R1, R2, R3 Transmission Owner 3. Maintenance and Management of BPS Assets As the BPS ages, lack of infrastructure maintenance is a reliability risk that continues to grow. NERC identified this concern in its ERO Top Priority Reliability Risks 2014-2017 report as well as the RISC s ERO Priorities: RISC Updates and Recommendations report. The RISC report identifies that the failure to maintain equipment is a reliability risk exacerbated when an entity either does not have replacement components available or cannot procure needed parts in a timely fashion. Deficiencies in maintenance strategies create additional pressure on sparing programs and the ability to replace aging infrastructure. Another risk, highlighted by NERC s 2010 Facility Ratings Alert to industry, involved the misalignment between the design and actual construction of BPS facilities. Additionally, compliance data analysis shows that PRC-005 has the highest number of reported noncompliance and serious or moderate risk filings in the past four years. 11

Table 4. Maintenance and Management of BPS Assets FAC-008-3 R6 Generator Owners Transmission Owners PRC-005-2(i) R3, R4, R5 Distribution Providers Generator Owners Transmission Owners 4. Monitoring and Situational Awareness Without the right tools and data, operators can make decisions that may or may not be appropriate to ensure reliability for the given state of the system. NERC s ERO Top Priority Reliability Risks 2014-2017 notes that stale data and lack of analysis capabilities contributed to the blackout events in 2003 ( August 14, 2003 Blackout ) and 2011 ( Arizona-Southern California Outages ). Certain essential functional capabilities must be in place with upto-date information available for staff to use on a regular basis to make informed decisions. An essential component of Monitoring and Situational Awareness is the availability of information when needed. Unexpected outages of tools, or planned outages without appropriate coordination or oversight, can leave operators without visibility to some or all of the systems they operate. While failure of a decision-support tool is rarely the cause of an event, such failures manifest as latent risks that further hinder the decision-making capabilities of the operator. One clear example of this is the August 14, 2003 Blackout NERC has analyzed data and identified that outages of tools and monitoring systems are fairly common occurrences. The RISC s ERO Priorities: RISC Updates and Recommendations report and NERC s ERO Top Priority Reliability Risks 2014-2017 report recognize this concern. Table 5. Monitoring and Situational Awareness IRO-005-3.1a R1, R2 TOP-006-2 R1, R2, R7 5. Protection System Failures Protection systems are designed to remove equipment from service so it won t be damaged when a fault occurs. Protection systems that trip unnecessarily can contribute significantly to the extent of an event. When protection systems are not coordinated properly, the order of execution can result in either incorrect elements being removed from service or more elements being removed than necessary. This can also occur with Special Protection Systems, Remedial Action Schemes, and Underfrequency Load Shedding and Undervoltage Load Shedding schemes. Such coordination errors occurred in the Arizona-Southern California Outages (see recommendation 19) 17 and the August 14, 2003 Blackout (see recommendation 21). 18 Additionally, a protection system that does not trip or is slow to trip may lead to the damage of equipment (which may result in degraded reliability for an extended period of time), while a protection system that trips when it 17 See Arizona-Southern California Outages on September 8, 2011. 18 See Final Report on the August 14, 2003 Blackout. 12

shouldn t can remove important elements of the power system from service at times when they are needed most. Unnecessary trips can even start cascading failures as each successive trip can cause another protection system to trip. The NERC 2015 State of Reliability report concludes that protection system misoperations can severely increase risk to reliability. According to the report, 68 percent of the transmission-related events meeting a category description in the ERO Event Analysis Process have protection system misoperations associated with them that either initiated the event or caused it to be more severe. 19 Both the RISC s ERO Priorities: RISC Updates and Recommendations report and NERC s ERO Top Priority Reliability Risks 2014-2017 report recognize protection systems as a significant risk based on analysis contained in the state of reliability reports from 2012, 2013, and 2015. Table 6. Protection System Failures PRC-001-1.1(ii) R3, R4, R5 Generator Operator PRC-004-2.1(i)a R1, R2 Distribution Provider Generator Owner Transmission Owner 6. Event Response/Recovery When events occur, the safe and efficient restoration of transmission service to critical load in a timely manner is of utmost importance. As the RISC identifies in its ERO Priorities: RISC Updates and Recommendations report, the effect of poor event response and recovery is far reaching and not only causes safety, operational, or equipment related risks during restoration activities, but also contributes to prolonged transmission outage durations, thereby increasing the duration of BPS unreliability. An additional risk to event response and recovery is the unavailability of generators. Extreme weather conditions, severe cold, heat, and drought create significant stress on maintaining overall BPS reliability and present unique challenges for electric system planners and operators. These conditions can significantly increase residential and commercial electricity demand and consumption, at the same time imposing adverse RE generation impacts and fuel availability issues. Extreme weather conditions can also vary the amount of wind and clouds (fuel for variable energy resources) that impact the expected amount of available renewable generation in some areas. When combined, the heightened electricity demand, increased potential for failure of power plant components, limitations on fuel supply availability, and competing use of certain fuels can lead to increased risks of adverse reliability impacts, including simultaneous forced outages, de-ratings, and failures to start of multiple generating units. When these severe conditions are present over large geographic areas, the combined impacts on the fuel supply, power plant operations, generation unavailability, and heightened electricity demand can lead to severe reliability impacts. These extreme conditions occur beyond the extent of planned stress conditions, anticipated severe operation conditions, or fuel supply availability expectations. Further, the conditions can lead to imprecise forecasts of residential and commercial electricity demand, which is the baseline for planning the BPS and operators determining the amount of electric generation needed during critical periods. When the combination of some, or all, of these conditions occurs during these extreme incidents, the end result can be operations under severe 19 See ERO Event Analysis Process V2.1 13

unanticipated scenarios or a shortage of generation, prompting operators to implement curtailments or shed load in local areas to maintain reliability in the overall grid. Both the RISC in its ERO Priorities: RISC Updates and Recommendations report and NERC s ERO Top Priority Reliability Risks 2014-2017 report recognized this concern. Table 7. Event Response/Recovery EOP-001-2.1b R1, R2, R3 TOP-007-0 R1, R2, R3, R4 7. Human Performance Human performance remains a key focus for the ERO Enterprise. Poor human performance generally refers to situations in which a human being makes a decision that contributes to operational errors. Stronger management and organizational support greatly contribute to the reduction and prevention of operational errors. Included in this subset are communication errors that can pose a significant potential risk to BPS reliability. Human performance was identified as a key issue by the RISC in its ERO Priorities: RISC Updates and Recommendations report. Table 8. Human Performance COM-002-2 R2 PER-005-1 R2, R3 8. Planning and System Analysis Planning and system analysis is encompasses several areas (such as increased use of demand-side management, integration of variable generation, changes in load and system behavior, smart grid, increased dependence on natural gas, fossil requirements and retrofit outage coordination, nuclear generation retirements and outages, and resource planning). In addition, uncoordinated planning can lead to cases where generation or transmission resources, or information concerning those resources, may be inadequate to ensure firm demand is served. This is particularly the case since a changing resource mix, deployment of new technologies, etc., can increase the risk to reliability if not properly considered in local planning cases. Planning and system analysis has been highlighted as a concern in RISC s ERO Priorities: RISC Updates and Recommendations report and NERC s ERO Top Priority Reliability Risks 2014-2017 report. NERC s annual Long-Term Reliability Assessment 20 forms the basis of NERC s assessment of emerging reliability issues. 20 http://www.nerc.com/pa/rapa/ra/reliability%20assessments%20dl/2014ltra_errata.pdf. 14

Table 9. Planning and System Analysis EOP-002-3.1 R4 TPL-001-4 R1, R2, R3, R4 Planning Coordinator Transmission Planner FAC-014-2 R1, R5 Regional Risk Assessments When considering risk elements, REs will perform a Regional Risk Assessment to identify risks specific to their Region and footprint that could potentially impact the reliability of the BPS. After determining Region-specific risks, REs will also identify the related NERC Reliability Standards and Requirements associated with those risks used to focus monitoring activities. The standards and requirements identified for RE risk elements are not intended to be a static list that must be examined during all compliance monitoring activities (e.g., scoping for a Compliance Audit). Rather, the risk elements identified by the RE will serve as input when conducting an IRA for a registered entity and ultimately in determining the scope of the entity s compliance oversight plan. In the process of reviewing ERO risk elements to compile Regional Risk Assessments, REs are expected to: Gather and review RE-specific risk reports and operational information (e.g., interconnection points and critical paths, system geography, seasonal/ambient conditions, etc.); Review and prioritize potential RE-specific risks; and Identify associated Reliability Standards and Requirements for IRAs, ICEs, and ultimately the compliance oversight plan. The RE Implementation Plans will describe the process and results for how the RE considered and identified Region-specific risks. The RE Implementation Plans should explain how REs identified risks their footprints, including reasons why any ERO risk elements identified above are not included or applicable to the RE footprint. Although each RE will consider risk elements, and may use similar risk considerations, the output of the Regional Risk Assessments may differ as a result of RE characteristics and the uniqueness of each RE s footprint. REs are encouraged to align their RE risk elements with the ERO risk elements as much as possible as RE risk elements should be viewed as incremental to the ERO risk elements. Regional Compliance Monitoring Plan Based on RE consideration and assessment of risk elements (ERO and/or Regional) and Regional Risk Assessments, each RE will develop a compliance monitoring plan, which in 2016 will include, at a minimum, the list of planned audits for s, Balancing Authorities, and s that are in the three-year audit cycle, per the ROP. REs may also identify other registered entities that it will monitor through appropriate CMEP tools based on risk elements, Regional Risk Assessments, and the application of IRAs and ICEs. 15

Appendix A3 - Northeast Power Coordinating Council (NPCC) 2016 CMEP Implementation Plan Regional Risk Element Revised BES Definition Regional Risk Elements Justification The FERC approved revised definition of BES becomes effective on July 1, 2016. The revised definition includes bright-line core criteria, including a general 100kV threshold, with various enumerated inclusions and exclusions. As a result of the application of these BES definition provisions, all Elements and Facilities necessary for the reliable operation and planning of the interconnected bulk power system will be included as BES elements. As a result of the new application of the revised definition in the NPCC Region, NPCC expects that a significant number of Elements and Facilities within the NPCC Region will be subject to the NERC Reliability Standards for the first time. Therefore, NPCC created a new regional risk element, Revised BES Definition, to address this regionally specific difference. Associated Standard & Requirement(s) EOP-005-2 R1, R5, R6, R9, R10, R11, R12, R13 FAC-003 R1, R2, R3, R4, R5, R6 IRO-004-2 R1 PER-001-0.2 R1 TOP-004-2 R1, R2, R3, R4, R5,R6 EOP-006-2 R1, R2, R3, R4, R5, R6, R7, R8, R9, R10 EOP-008-1 R1, R2, R3, R4, R5, R6, R7, R8 FAC-011-2 R1, R2, R3 TOP-002-2.1b R1, R2, R4, R11, R17, R19 PER-005-1 R1, R3 FAC-008-3 R2, R3 TOP-006-2 R3, R4, R5, R6 PRC-004-2.1a R3 EOP-001-2.1b R4, R5 PER-005-1 R1 EOP-002-3.1 R6, R7, R8 FAC-014-2 31

Appendix A3 - Northeast Power Coordinating Council (NPCC) 2016 CMEP Implementation Plan Expanded ERO Risk Element Critical Infrastructure Protection Extreme Physical Events Monitoring and Situational Awareness Human Performance Expanded ERO Risk Elements Justification NPCC is expanding this risk element due to identified regional deficiencies in manual load shed plans and operator response. Also, for increased reliability, NPCC professes shedding load to prevent equipment damage that would disconnect more load for a longer time period. Any part of a power system (transformers, power lines) will begin to deteriorate if there is an excess of load over available capability. These elements can overload and become permanently damaged as they attempt to supply the excess load. This combination of events can also cause various parts of the systems to separate due to power swings and resulting instability. The result can be large blocks of load lost for extended periods of time (die to transformer replacement, etc.). Load shedding is a last resort to prevent the collapse of the system. The ability to mitigate the effects of geomagnetic disturbance (GMD) events is a focus area within the NPCC Region because Northern US and Canadian terrain has more potential for a GMD event. Earth surface potential is highest in igneous rock areas and where transmission lines terminate near water. Upstate NY and NE have large areas of igneous rock. Also, due to the Earth Surface Potential being greater at higher latitudes, areas with close proximity to the Earth's magnetic north pole typically experience greater effects of GMDs. Past history also deems this to be an expanded risk element. A significant GMD occurred on March 13, 1989 and resulted in a blackout of the power system in Quebec due to the tripping of shunt reactive devices. NPCC is expanding this risk element due to identified regional deficiencies in identifying and operating to the most limiting parameter, and in the RC s issuing alerts to all impacted s and Balancing Authorities in its area without delay when foreseeing a transmission problem Also, each who foresees a transmission problem (such as an SOL or IROL violation, loss of reactive reserves, etc.) within its Area is required to issue an alert to all impacted Transmission Operators and Balancing Authorities in its area without delay. Having adequate communication and appropriate staffing of such communication capabilities to address a real-time emergency condition is essential. NPCC is expanding this risk element due to identified regional deficiencies in entities ensuring that communications shall be staffed and available for addressing a real-time emergency. Associated Standard & Requirement(s) EOP-003-2 R1, R3, R5, R8 EOP-010-1 R2 IRO-005-3.1a R10, R12 COM-002-4 R1 32