CIP v5/v6 Implementation Plan CIP v5 Workshop. Tony Purgar October 2-3, 2014

Size: px
Start display at page:

Download "CIP v5/v6 Implementation Plan CIP v5 Workshop. Tony Purgar October 2-3, 2014"

Transcription

1 CIP v5/v6 Implementation Plan CIP v5 Workshop Tony Purgar October 2-3, 2014

2 Revision History CIP v5/v6 Implementation Plan Change History Date Description Initial Release July 25, 2014 Revision V0.1 August-2014 Various content edits based on CIP SDT work from June through present. V0.2 9/8/14 Updated CIP v5 Transition guidance slides V0.3 9/11/14 Edits from internal CIP SME Peer Review V0.4 9/18/14 Edits added per ERO Workshop - added new slide 26. Updated links to NERC resources. Formatting updates to RF CIP v5 Focus group slides. V0.5 9/19/14 Per the Project CIP Version 5 Revisions Standard webinar on 9/19/14: Revised slides 3,14,21 Added slides V0.6 9/26/14 Revised title slide. Added LERP and LEAP to CIP Terms slide. Minor edits for finalization. 2

3 Agenda What is CIP v5/v6? How is CIP v5/v6 Different from v3? The makeup of CIP v5/v6 New / Modified Terms Facilities Comparison Decrypting v5/v6 - Reliability Standard Format / Structure CIP v3-v5 Transition Guidance Highlights CIP v5/v6 Work in Progress FERC Order 791 v5 Key Dates CIP v5 Implementation for Periodic Requirements CIP vx/v6 Implementation Timeline Proposal CIP v6 Implementation Timeline Proposals CIP v6 Implementation Next Steps RF CIP v5 Focus Group Q & A 3

4 What is CIP v5/v6? CIP v5 contains revisions to the initial Cyber Security Standards (CIP through CIP-009-1) mandated by FERC Order 706. CIP v6 includes revisions to v5 mandated by FERC Order 791. v6 will consist of: CIP CIP CIP CIP CIP CIP CIP CIP CIP CIP-011-2

5 How is CIP v5/v6 Different from v3? Second generation of cyber security standards Provides greater clarity for some requirements Takes some requirements to the next level Results Based Standards Impact Rating criteria for applicable assets Graduated applicability of requirements (H/M/L) Some level of protection for a wide range of systems (low impact) Not intended for a zero-tolerance environment 5

6 New / Modified CIP Terms BES Cyber Asset (BCA)* Protected Cyber Asset (PCA)* BES Cyber System (BCS) BES Cyber System Information CIP Exceptional Circumstances Impact Rating Criteria (IRC) Removable Media* Transient Cyber Asset* Low Impact BES Cyber System Electronic Access Point (LEAP)** Low Impact External Routable Connectivity (LERC)** * Terms to be effective on the same compliance date as Reliability standard CIP Requirement R4 ** Terms introduced with CIP NOTE: This is not an all inclusive list of new/modified terms. 6

7 CIP v3/v4 to v5 Facilities Comparison 7

8 Decrypting CIP v5/v6 Rationale, Summary of Changes Main Requirement & Measure Applicable Systems for Requirement Part Requirement Part Text Requirement Part Measure Text 8 Requirement Part Reference Requirement Part Change Rationale

9 Decrypting CIP v5/v6 9 v5/v6 Format Introduction Standard Title, Number, Purpose, Applicability Effective Dates Background Requirements and Measures Requirements, Measures Tables addressing Requirement Part #, Applicable Systems, Language, and Measures Compliance Compliance Monitoring Process Tables of Compliance Elements Requirement, Time Horizon, VRF, VSLs Guidelines and Technical Basis at end Still will only audit to the requirement

10 CIP v3-v5 Transition Guidance Highlights Issued August 12, 2014 Allows for smooth transition to new standards No expectation that there is a single point in time to move from compliance with v3 to compliance with v5 until v5 effective dates Provides guidance and flexibility for implementing changes to achieve compliance with v5 without undue concerns regarding compliance with v3 Chart of compatible requirements Spreadsheet identifying how to upgrade to v5 and stay Mostly Compatible to v3 If fail to do either v3 or v5, then compliance issue CIP audits during implementation period to focus on v5 transition Phase-in of v5 criteria encouraged For further support, refer to the SPP RE CIP Version 5 Transition Guidance presentation: % pdf 10

11 CIP v5/v6 Work in Progress Standard Drafting Team FERC directed NERC to modify certain aspects of v5: Identify, Assess, and Correct language (IAC) Communication Networks (CN) Low Impact Assets (LIA) Transient Devices (TD) Filing deadline = February 3, 2015 for (IAC) and (CN) directives (LIA) and (TD) do not have a deadline but SDT s goal is to address by Filing deadline. 11

12 CIP v5/v6 Work in Progress Standard Drafting Team Proposed Changes Identify, Assess, and Correct language Removed language from all 17 requirements Communication Networks CIP Requirement R1, new Part 1.10 added address security controls needed to protect the nonprogrammable components of communications networks Low Impact Assets CIP Requirement R2, new Parts added Address the lack of objective criteria for Low Impact BES Cyber Systems 12

13 CIP v5/v6 Work in Progress Standard Drafting Team Proposed Changes Transient Devices CIP Requirement R4 added address the FERC directive to consider the following security controls: device authorization as it relates to users and locations software authorization security patch management malware prevention detection controls for unauthorized physical access to a transient device processes and procedures for connecting transient devices to systems at different security classification levels 13

14 CIP v5/v6 Work in Progress 14 Standard Drafting Team Proposed Changes Status Initial ballot recently completed (6/2/14 7/16/14) Low Impact Assets (CIP-003) and Transient Devices (CIP-010) did not receive enough Yes votes Currently being modified to address industry comments 8/26/14: To meet the FERC-imposed February 3, 2015 filing deadline for (IAC) and (CN) directives and maintain momentum on the non-deadline (LIA) and (TD) directives, SDT is balloting standards addressing (IAC) and (CN) directives without language addressing the (LIA) and (TD) directives, as version X. However, SDT to continue revising the standards to address (LIA) and (TD) directives to meet the FERC deadline. IAC/CN-only revisions = Version X Standards CIP-003-X, CIP-004-X, CIP-007-X, CIP-010-X, CIP-011-X IAC/CN/LIA/TD revisions = Version 6 Standards CIP-003-6, CIP-004-6, CIP-006-6, CIP-007-6, CIP-009-6, CIP-010-2, CIP Comment period in process (9/3/14 10/17/14) Additional Ballots and Non Binding Polls (10/8/14 10/17/14) Hoping to go to FERC (with version 6) by end of the year

15 FERC Order 791 v5 Key Dates Commission Approval 11/22/2013 Publication in Federal Register 12/3/2013 FERC Order Effective Date 2/3/ days after publication in Federal Register Effective Date for Compliance with all non-periodic requirements: High and Medium Impact 4/1/2016 Low Impact 4/1/2017 Based on SDT work addressing issues identified by FERC in Order 791, Implementation Timeline Proposals, addressing Low Impact, are being developed and will be addressed in the following slides. 15

16 CIP v5 Implementation for Periodic Requirements Compliance with initial performance of Certain Periodic Requirements as discussed in the Implementation Plan: Using an Effective Date of 4/1/2016 Specific v5 CIP Standards have periodic requirements that contain time parameters for subsequent and recurring iterations of the requirement, such as, but not limited to,.at least once every 15 calendar months, and responsible entities shall comply initially with those periodic requirements as follows: 16

17 CIP v5 Implementation for Periodic Requirements Requirement Implementation Plan Calculated Note Language Date CIP R2 on or before 4/1/2016 CIP R1 on or before 4/1/2016 * CIP R2 Low Impact 4/1/2017 (One extra year) CIP Part 4.4 Within 14 days following 4/15/2016 (Date Plus 14 days) CIP Part 2.1 Within 35 days following 5/6/2016 (Date plus 35 days) CIP Part calendar months following 7/1/2016 (Date plus 3 months) CIP Part calendar months following 4/1/2017 (Date plus 12 months) CIP Part calendar months following 4/1/2017 (Date plus 12 months) CIP Part calendar months following 4/1/2017 (Date plus 12 months) CIP Part calendar months following 4/1/2017 (Date plus 12 months) CIP Part calendar months following 4/1/2017 (Date plus 12 months) CIP Part calendar months following 4/1/2017 (Date plus 12 months) CIP Part calendar months following 4/1/2017 (Date plus 12 months) CIP Part calendar months following 4/1/2017 (Date plus 12 months) CIP Part calendar months following 4/1/2018 (Date plus 24 months) CIP Part calendar months following 4/1/2018 (Date plus 24 months) CIP Part 3.5 Within 7 years after previous PRA (Based on prior PRA) * Currently under SDT revision to address FERC directive and industry concerns 17

18 CIP v5 Implementation for Periodic Requirements 18

19 CIP vx/v6 Implementation Timeline Proposal Compliance Date for CIP-003-X/6, CIP-004-X/6, CIP-006-6, CIP-007-X/6, CIP , CIP-010-X/2, CIP-011-X/2 Reliability Standard CIP-00#-# shall become effective on the later of April 1, 2016 or the first day of the first calendar quarter that is three calendar months after the date that the standard is approved by an applicable governmental authority, or as otherwise provided for in a jurisdiction where approval by an applicable governmental authority is required for a standard to go into effect. Where approval by an applicable governmental authority is not required, the standard shall become effective on the later of April 1, 2016 or the first day of the first calendar quarter that is three calendar months after the date the standard is adopted by the NERC Board of Trustees, or as otherwise provided for in that jurisdiction. Compliance Date for CIP-003-X/6, R2 (covered in vx/v6 Implementation Plans) Registered Entities shall not be required to comply with Reliability Standard CIP-003-6, Requirement R2 until the later of April 1, 2017 or nine calendar months after the effective date of Reliability Standard CIP Compliance Date for CIP-006-6, Requirement R1, Part 1.10 For new high or medium impact BES Cyber Systems at Control Centers identified by CIP which were not identified as Critical Cyber Assets in CIP Version 3, Registered Entities shall not be required to comply with Reliability Standard CIP-006-6, Requirement R1, Part 1.10 until nine calendar months after the effective date of Reliability Standard CIP

20 CIP vx/v6 Implementation Timeline Proposal Compliance Date for CIP-007-X/6, Requirement R1, Part 1.2 (covered in vx/v6 Implementation Plans) Registered Entities shall not be required to comply with the elements of Reliability Standard CIP-007-6, Requirement R1, Part 1.2 that apply to PCAs and nonprogrammable communication components located inside a PSP and inside an ESP and associated with High and Medium Impact BES Cyber Systems until six/nine calendar months after the effective date of Reliability Standard CIP Compliance Date for CIP-010-2, Requirement R4 (Removed from vx Implementation Plan) Registered Entities shall not be required to comply with Reliability Standard CIP-010-2, Requirement R4 until nine calendar months after the effective date of Reliability Standard CIP New and Modified NERC Glossary Terms The new and modified NERC Glossary Terms BES Cyber Asset, Protected Cyber Asset, Removable Media, and Transient Cyber Asset shall become effective on the same compliance date as when Reliability Standard CIP-010-2, Requirement R4 is approved by an applicable governmental authority, or as otherwise provided for in a jurisdiction where approval by an applicable governmental authority is required for a standard to go into effect. Unplanned Changes Resulting in Low Impact Categorization (covered in vx Implementation Plan) For unplanned changes resulting in a low impact categorization where previously the asset containing BES Cyber Systems had no categorization, the responsible entity shall comply with all Requirements applicable to Low Impact BES Cyber Systems within 12 calendar months following the identification and categorization of the affected BES Cyber System. 20

21 CIP v6 Implementation Timeline Proposals 8/12/14: The SDT continued its work on the CIP Version 5 Revisions Implementation Plan for low impact assets and had identified two proposals. Feedback on each of the proposals was collected to identify pros/cons and justifications that the SDT considered prior to the next ballot. The two Implementation Plan proposals were: Tier by Asset Plan Tiers 21

22 CIP v6 Implementation Timeline Proposals Proposal #1 Tier by Asset This option phases the implementation by low impact asset type. In this approach the SDT proposes the implementation date of the CIP- 003, R2 policies and development of the management plan, cyber security incident response and cyber security awareness as April 1, 2017; the original implementation date approved with CIP Version 5. However, this option establishes a phased implementation by asset type for physical access controls and electronic access controls using the following criterion: 1. Control Centers, Generation greater than 1000MW and substations greater than 300kV would set April 1, 2017 as the implementation date. 2. Generation between MW, substations rated between kV would be provided eight additional months from the original implementation date; setting the new implementation date as January 1, All other low impact assets would be provided 16 additional months from the original implementation date; setting the new implementation date as September 1,

23 CIP v6 Implementation Timeline Proposals Proposal #2: Plan Tiers This option phases the implementation by item area within the Attachment. Again in this approach the SDT proposes the implementation of the CIP- 003, R2 policies and development of the management plan, cyber security incident response and cyber security awareness to April 1, 2017; the original implementation date approved with CIP Version 5. For physical access controls, the SDT is proposing to provide an additional year from the original implementation date, setting the new implementation date as April 1, For electronic access controls, the SDT is proposing to provide an additional 16 months from the original implementation date, setting the new implementation date as September 1,

24 CIP v6 Implementation Timeline Proposals For submission in the 2 nd ballot, Proposal #2 was selected Proposed CIP Implementation Plan Registered Entities shall not be required to comply with Reliability Standard CIP-003-6, Attachment 1, element 1 (Cyber Security Awareness) until the later of April 1, 2017 or nine calendar months after the effective date of Reliability Standard CIP Registered Entities shall not be required to comply with Reliability Standard CIP-003-6, Attachment 1, element 2 (Physical Access Controls) until the later of April 1, 2018 or nine calendar months after the effective date of Reliability Standard CIP Registered Entities shall not be required to comply with Reliability Standard CIP-003-6, Attachment 1, element 3 (Electronic Access Controls) until the later of September 1, 2018 or nine calendar months after the effective date of Reliability Standard CIP Registered Entities shall not be required to comply with Reliability Standard CIP-003-6, Attachment 1, element 4 (Cyber Security Incident Response) until the later of April 1, 2017 or nine calendar months after the effective date of Reliability Standard CIP

25 CIP v6 Implementation Timeline Proposals 25 Worksheet shows the revisions and proposed implementation timeline Key Items: Targeted NERC BOT Approval date and Implementation clock starts when FERC approves revs

26 CIP v6 Implementation Next Steps Additional comment period September 3-October 17, 2014 Ballot period October 8-17, 2014 SDT meeting October 22-24, 2014 ERCOT (Austin, TX) Targeted final ballot October 31-November 10, 2014 Targeted NERC Board of Trustees meeting to approve revisions November 13, 2014 Stay tuned for further industry communications and monitor the Referenced NERC Sites at the back of this presentation!!! 26

27 RF CIP v5 Focus Group Q&A June-2014: RF held a CIP v5 Focus Group with select stakeholders to discuss CIP v5 Dayton Power & Light FirstEnergy American Electric Power Calpine MISO Wolverine Duquesne Light Company PJM Very Successful!! Feedback and Questions were collected and are addressed in the following slides. 27

28 RF CIP v5 Focus Group Q&A Gap analysis from v3 to v5? Please refer to the v3 v5 Compatibility Tables on the NERC CIP v5 transition program website: V5%20Compatibility%20Tables.pdf What was the entities level of planning for v5? Please refer to DPL lessons learned slides and NERC CIP v5 transition program website for further information from all pilots: 28

29 RF CIP v5 Focus Group Q&A One group has transitioned to v5 and one has not within a registration. How should this situation be handled? The following is from Section 5, page 8, of the CIP V5 Transition Guidance: NERC understands that an audit may occur while a Responsible Entity is in the course of transitioning multiple locations or facilities to compliance with a CIP V5 requirement and that all such locations or facilities may not be at the same stage of CIP V5 implementation. In that case, the declaration sent to the Regional Entity should define by category, location, or requirement where V5 or V3 requirements should apply, or should otherwise make clear to the Regional Entity where disparities in applying V5 or V3 requirements exist. 29

30 RF CIP v5 Focus Group Q&A Different entities have different implementations. Due to v5, new entities have been called into scope. Can you make any recommendations of how to implement things based on the type of entity: Large, Small, Muni, etc Please refer to the following NERC CIP v5 links for further information: CIP Transition Program: CIP Standards v5 Revisions: Infrastructure-Protection-Version-5-Revisions.aspx CIP v5 Implementation Study: Implementation-Study.aspx v3-v5 Transition Guidance FINAL: V5%20Transition%20Guidance%20FINAL.pdf v3-v5 Compatibility Tables: V5%20Compatibility%20Tables.pdf 30

31 RF CIP v5 Focus Group Q&A Guidance/Frequently Asked Questions from the Transition Study? Please refer to NERC CIP v5 transition program website for further information from all pilots: 31

32 RF CIP v5 Focus Group Q&A Multi-regional entity with Primary Data Center in one region and the backup in another region. Do they just show that the same controls from the primary apply to the backup? Sufficient (quantity) and appropriate (quality) evidence would be required for review by the audit team to verify this assertion by the MRRE. Will they be audited by both regions? This Multi-Regional Registered Entity (MRRE) would be audited by an audit team comprised of auditors from each Regional Entity that the registered entity is registered with. The audit would typically be done at one time, agreed upon by the multi-regional auditors and the MRRE. 32

33 RF CIP v5 Focus Group Q&A CIP v3-v5 Transition Guidance Is there transition guidance in laymen's language and what does it mean to the auditor? Please refer to the following NERC CIP v5 links for further information: CIP Transition Program: CIP v5 Implementation Study: Implementation-Study.aspx v3-v5 Transition Guidance FINAL: V5%20Transition%20Guidance%20FINAL.pdf v3-v5 Compatibility Tables: V5%20Compatibility%20Tables.pdf 33

34 RF CIP v5 Focus Group Q&A CIP v3-v5 Transition Guidance What are the requirements for third-party hosted systems (i.e. relation to the treatment of scheduling systems)? The requirement for third-party hosted systems is the same as for in house systems that meet the criteria of a BCA, PCA, EACM or PACS device. What requirements can we officially transition early to and still be in compliant with v3? CIP Transition Program: Program.aspx v3-v5 Transition Guidance FINAL: V5%20Transition%20Guidance%20FINAL.pdf v3-v5 Compatibility Tables: V5%20Compatibility%20Tables.pdf 34

35 RF CIP v5 Focus Group Q&A CIP v3-v5 Transition Guidance What are some suggested approaches to tracking of baseline configurations for Security Patches? Baselines can be tracked using a number of different methods such as paper, spreadsheet, database system and commercial software. With the more stringent requirements around baselines in CIP-010 you will want to utilize a spreadsheet at the very least and may want to look into developing a database or purchasing available commercial software. How are Scheduling Systems viewed in v5? See Lessons Learned for BES Impact of Transmission Scheduling Systems How does RAI align with v5 as well as with V5 audit efforts? Please refer to the document Identify, Assess, and Correct and Reliability Assurance Initiative FAQs document (dated 6/2/14) at: CIP Standards v5 Revisions: Infrastructure-Protection-Version-5-Revisions.aspx 35

36 RF CIP v5 Focus Group Q&A CIP v3-v5 Transition Guidance Depth of Training - During the Gap Analysis, there was much conversation about training of new hires, tribal knowledge, ability to ensure consistent procedural application, and documents written at a 5th grade level; while this might not be a question, perhaps you can try to ascertain how deep our training/documentation will need to go for audit purposes. Detailed work level instructions not just what but how Templates for evidence, reports, legends, etc. Auditors would expect to see the same type of evidence consistent with what has been provided for previous audits or at previous Compliance Monitoring Activities. Please review the Measures, included with the v5 Requirements, as examples of expected evidence to be provided by the audited entity. 36

37 RF CIP v5 Focus Group Q&A CIP v3-v5 Transition Guidance How to handle hosted solutions (like a managed security services provider) under CIP v5? The Hosted solutions need to meet all the requirements and should be handled just as if they were in house. Will the transition to controls based auditing (through RAI) occur at exactly the same time as CIP v5 implementation, or on some other schedule? RF is not performing controls based auditing. RF is performing Grid Reliability Improvement and Performance Model (GRIPM) Appraisals, on a volunteer basis, as a means of assessing an entity s overarching internal controls as they apply to 16 RF defined Management Practices. GRIPM Appraisals are conducted separate from audits. See Erik Johnson Manager, Entity Development for more information regarding the GRIPM Appraisal Method. 37

38 RF CIP v5 Focus Group Q&A CIP v3-v5 Transition Guidance How will audits be handled when a portion of the period was under CIP v3 regulations and a portion was under CIP v5? Please refer to the following NERC CIP v5 links for further information: CIP Transition Program: v3-v5 Transition Guidance FINAL: V5%20Transition%20Guidance%20FINAL.pdf v3-v5 Compatibility Tables: V5%20Compatibility%20Tables.pdf Draft Guidance Industry Feedback: %20Transition%20Guidance%20Draft%20for%20CIP%20V5.pdf 38

39 RF CIP v5 Focus Group Q&A CIP v3-v5 Transition Guidance What is the definition of BES Cyber Systems and how are they to be identified? BES Cyber System = One or more BES Cyber Assets logically grouped by a responsible entity to perform one or more reliability tasks for a functional entity. See Lessons Learned for Grouping BES Cyber Assets Transient Devices: What is needed in order to track and demonstrate compliance? Transient Devices requirements are currently under development by Standards drafting team and addressed under CIP R4. Please refer to the CIP Standards v5 Revisions for latest information: 39

40 RF CIP v5 Focus Group Q&A CIP v3-v5 Transition Guidance Visitor Tracking: Is there a time limit around how long a visitor can be out of the PSP before having to sign in again? Refer to the Guidelines and Technical Basis section of CIP There is not a specific timeframe specified in the requirement, however, the rationale does state that Part 2.2 addresses multi entry scenarios of the same person in a day (log first entry and last exit). The Guidelines and Technical Basis also states that the logging of visitors should capture each visit of the individual and does not need to capture each entry or exit during that visit. This is meant to allow a visitor to temporarily exit the Physical Security Perimeter to obtain something they left in their vehicle or outside the area without requiring a new log entry for each and every entry during the visit. 15 minute impact? Refer to the Background and Guidelines and Technical Basis sections of CIP

41 RF CIP v5 Focus Group Q&A CIP v3-v5 Transition Guidance Is there, or will there be, guidelines for various BES Cyber Systems? Looking for additional guidance on what is the impact by BES cyber systems? Refer to the Guidelines and Technical Basis section of CIP Refer to NERC Lessons Learned documentation available at Revisions.aspx 41

42 Resources Refer to resources available on the NERC site: NERC CIPC Presentation on Transition Guidance CIP Transition Program: CIP Standards v5 Revisions: Version-5-Revisions.aspx CIP v5 Implementation Study: v3-v5 Transition Guidance FINAL: v3-v5 Compatibility Tables: Draft Guidance Industry Feedback: %20Transition%20Guidance%20Draft%20for%20CIP%20V5.pdf 42

43 Questions & Answers Forward Together ReliabilityFirst

Cyber Security Standards Update: Version 5

Cyber Security Standards Update: Version 5 Cyber Security Standards Update: Version 5 January 17, 2013 Scott Mix, CISSP CIP Technical Manager Agenda Version 5 Impact Levels Format Features 2 RELIABILITY ACCOUNTABILITY CIP Standards Version 5 CIP

More information

Implementation Plan for Version 5 CIP Cyber Security Standards

Implementation Plan for Version 5 CIP Cyber Security Standards Implementation Plan for Version 5 CIP Cyber Security Standards April 10September 11, 2012 Prerequisite Approvals All Version 5 CIP Cyber Security Standards and the proposed additions, modifications, and

More information

Cyber Security Standards: Version 5 Revisions. Security Reliability Program 2015

Cyber Security Standards: Version 5 Revisions. Security Reliability Program 2015 Cyber Security Standards: Version 5 Revisions Security Reliability Program 2015 Overview of Development Activities The Team Standard Drafting Team (SDT) appointed to address these revisions in Project

More information

CIP 010 1 Cyber Security Configuration Change Management and Vulnerability Assessments

CIP 010 1 Cyber Security Configuration Change Management and Vulnerability Assessments CIP 010 1 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:

More information

Cyber Security Compliance (NERC CIP V5)

Cyber Security Compliance (NERC CIP V5) Cyber Security Compliance (NERC CIP V5) Ray Wright NovaTech, LLC Abstract: In December 2013, the Federal Energy Regulatory Commission (FERC) issued Order No. 791 which approved the Version 5 CIP Reliability

More information

CIP-003-5 Cyber Security Security Management Controls

CIP-003-5 Cyber Security Security Management Controls A. Introduction 1. Title: Cyber Security Security Management Controls 2. Number: CIP-003-5 3. Purpose: To specify consistent and sustainable security management controls that establish responsibility and

More information

CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments

CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:

More information

Alberta Reliability Standard Cyber Security Implementation Plan for Version 5 CIP Security Standards CIP-PLAN-AB-1

Alberta Reliability Standard Cyber Security Implementation Plan for Version 5 CIP Security Standards CIP-PLAN-AB-1 External Consultation Draft Version 1.0 December 12, 2013 1. Purpose The purpose of this reliability standard is to set the effective dates for the Version 5 CIP Cyber Security reliability standards and

More information

NERC Cyber Security Standards

NERC Cyber Security Standards SANS January, 2008 Stan Johnson Manager of Situation Awareness and Infrastructure Security Stan.johnson@NERC.net 609-452-8060 Agenda History and Status of Applicable Entities Definitions High Level of

More information

Summary of CIP Version 5 Standards

Summary of CIP Version 5 Standards Summary of CIP Version 5 Standards In Version 5 of the Critical Infrastructure Protection ( CIP ) Reliability Standards ( CIP Version 5 Standards ), the existing versions of CIP-002 through CIP-009 have

More information

NERC CIP Implementation Prepared by David Grubbs City of Garland NERC Critical Infrastructure Protection Committee (CIPC) Municipal Systems are well represented on the NERC CIPC Committee David Grubbs,

More information

Notable Changes to NERC Reliability Standard CIP-010-3

Notable Changes to NERC Reliability Standard CIP-010-3 C L AR I T Y AS S U R AN C E R E S U LT S M I D W E S T R E LIAB I L I T Y ORGAN I Z AT I ON Notable Changes to NERC Reliability Standard CIP-010-3 Cyber Security Configuration Change Management and Vulnerability

More information

CIP-003-6 R2 BES Assets Containing Low Impact BCS. Lisa Wood, CISA, CBRA, CBRM Compliance Auditor Cyber Security

CIP-003-6 R2 BES Assets Containing Low Impact BCS. Lisa Wood, CISA, CBRA, CBRM Compliance Auditor Cyber Security CIP-003-6 R2 BES Assets Containing Low Impact BCS Lisa Wood, CISA, CBRA, CBRM Compliance Auditor Cyber Security Slide 2 About Me Been with WECC for 5 years 1 ½ years as a Compliance Program Coordinator

More information

Cyber Security Standards Update: Version 5 with Revisions

Cyber Security Standards Update: Version 5 with Revisions Cyber Security Standards Update: Version 5 with Revisions Security Reliability Program 2015 Agenda CIP Standards History Version 5 Format Impact Levels NOPR Final Rule References 2 RELIABILITY ACCOUNTABILITY

More information

ReliabilityFirst CIP Evidence List CIP-002 through CIP-009 are applicable to RC, BA, IA, TSP, TO, TOP, GO, GOP, LSE, NERC, & RE

ReliabilityFirst CIP Evidence List CIP-002 through CIP-009 are applicable to RC, BA, IA, TSP, TO, TOP, GO, GOP, LSE, NERC, & RE R1 Provide Risk Based Assessment Methodology (RBAM) R1.1 Provide evidence that the RBAM includes both procedures and evaluation criteria, and that the evaluation criteria are riskbased R1.2 Provide evidence

More information

NERC CIP Tools and Techniques

NERC CIP Tools and Techniques NERC CIP Tools and Techniques Supplemental Project - Introduction Webcast Scott Sternfeld, Project Manager Smart Grid Substation & Cyber Security Research Labs ssternfeld@epri.com (843) 619-0050 October

More information

Notable Changes to NERC Reliability Standard CIP-005-5

Notable Changes to NERC Reliability Standard CIP-005-5 MIDWEST RELIABILITY ORGANIZATION Notable Changes to NERC Reliability Standard CIP-005-5 Electronic Security Perimeter(s) Bill Steiner MRO Principal Risk Assessment and Mitigation Engineer MRO CIP Version

More information

Standard CIP 007 3a Cyber Security Systems Security Management

Standard CIP 007 3a Cyber Security Systems Security Management A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-3a 3. Purpose: Standard CIP-007-3 requires Responsible Entities to define methods, processes, and procedures for

More information

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5) Whitepaper North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5) NERC-CIP Overview The North American Electric Reliability Corporation (NERC) is a

More information

Alberta Reliability Standard Cyber Security Physical Security of BES Cyber Systems CIP-006-AB-5

Alberta Reliability Standard Cyber Security Physical Security of BES Cyber Systems CIP-006-AB-5 Alberta Reliability Stard Final Proposed Draft Version 2.0 September 9, 2014 A. Introduction 1. Title: 2. Number: 3. Purpose: To manage physical access to BES cyber systems by specifying a physical security

More information

Standard CIP 007 3 Cyber Security Systems Security Management

Standard CIP 007 3 Cyber Security Systems Security Management A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-3 3. Purpose: Standard CIP-007-3 requires Responsible Entities to define methods, processes, and procedures for securing

More information

Secure Remote Substation Access Interest Group Part 3: Review of Top Challenges, CIPv5 mapping, and looking forward to 2014!

Secure Remote Substation Access Interest Group Part 3: Review of Top Challenges, CIPv5 mapping, and looking forward to 2014! Secure Remote Substation Access Interest Group Part 3: Review of Top Challenges, CIPv5 mapping, and looking forward to 2014! October 3, 2013 Scott Sternfeld, Project Manager Smart Grid Substation & Cyber

More information

CIP-005-5 Cyber Security Electronic Security Perimeter(s)

CIP-005-5 Cyber Security Electronic Security Perimeter(s) A. Introduction 1. Title: Cyber Security Electronic Security Perimeter(s) 2. Number: CIP-005-5 3. Purpose: To manage electronic access to BES Cyber Systems by specifying a controlled Electronic Security

More information

The North American Electric Reliability Corporation ( NERC ) hereby submits

The North American Electric Reliability Corporation ( NERC ) hereby submits December 8, 2009 VIA ELECTRONIC FILING Kirsten Walli, Board Secretary Ontario Energy Board P.O Box 2319 2300 Yonge Street Toronto, Ontario, Canada M4P 1E4 Re: North American Electric Reliability Corporation

More information

Alberta Reliability Standard Cyber Security Configuration Change Management and Vulnerability Assessments CIP-010-AB-1

Alberta Reliability Standard Cyber Security Configuration Change Management and Vulnerability Assessments CIP-010-AB-1 A. Introduction 1. Title: 2. Number: 3. Purpose: To prevent and detect unauthorized changes to BES cyber systems by specifying configuration change management and vulnerability assessment requirements

More information

Entity Name ( Acronym) NCRnnnnn Risk Assessment Questionnaire

Entity Name ( Acronym) NCRnnnnn Risk Assessment Questionnaire Entity Name ( Acronym) NCRnnnnn Risk Assessment Questionnaire Upcoming Audit Date: March 16, 2015 Upcoming Audit Type: O&P Audit Start of Audit Period: March 16, 2012 Date Submitted: Table of Contents

More information

Standard CIP 004 3a Cyber Security Personnel and Training

Standard CIP 004 3a Cyber Security Personnel and Training A. Introduction 1. Title: Cyber Security Personnel & Training 2. Number: CIP-004-3a 3. Purpose: Standard CIP-004-3 requires that personnel having authorized cyber or authorized unescorted physical access

More information

152 FERC 61,054 UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION. 18 CFR Part 40. [Docket No. RM15-14-000]

152 FERC 61,054 UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION. 18 CFR Part 40. [Docket No. RM15-14-000] 152 FERC 61,054 UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION 18 CFR Part 40 [Docket No. RM15-14-000] Revised Critical Infrastructure Protection Reliability Standards (July 16, 2015) AGENCY:

More information

When this standard has received ballot approval, the text boxes will be moved to the Guidelines and Technical Basis section of the Standard.

When this standard has received ballot approval, the text boxes will be moved to the Guidelines and Technical Basis section of the Standard. CIP-002-5 Cyber Security BES Cyber System Categorization When this standard has received ballot approval, the text boxes will be moved to the Guidelines and Technical Basis section of the Standard. A.

More information

TOP 10 CHALLENGES. With suggested solutions

TOP 10 CHALLENGES. With suggested solutions NERC CIP VERSION 5 TOP 10 CHALLENGES With suggested solutions 401 Congress Avenue, Suite 1540 Austin, TX 78791 Phone: 512-687- 6224 E- Mail: chumphreys@theanfieldgroup.com Web: www.theanfieldgroup.com

More information

Technology Solutions for NERC CIP Compliance June 25, 2015

Technology Solutions for NERC CIP Compliance June 25, 2015 Technology Solutions for NERC CIP Compliance June 25, 2015 2 Encari s Focus is providing NERC CIP Compliance Products and Services for Generation and Transmission Utilities, Municipalities and Cooperatives

More information

Automating NERC CIP Compliance for EMS. Walter Sikora 2010 EMS Users Conference

Automating NERC CIP Compliance for EMS. Walter Sikora 2010 EMS Users Conference Automating NERC CIP Compliance for EMS Walter Sikora 2010 EMS Users Conference What do we fear? Thieves / Extortionists Enemies/Terrorists Stuxnet Malware Hacker 2025 Accidents / Mistakes 9/21/2010 # 2

More information

Top Ten Compliance Issues for Implementing the NERC CIP Reliability Standard

Top Ten Compliance Issues for Implementing the NERC CIP Reliability Standard Top Ten Compliance Issues for Implementing the NERC CIP Reliability Standard The North American Electric Reliability Corporation 1 s (NERC) CIP Reliability Standard is the most comprehensive and pervasive

More information

NERC Audit Definition

NERC Audit Definition Utilities & Energy Compliance & Ethics Conference NERC Audit Definition An engagement that provides assurance or conclusions on an evaluation of sufficient, appropriate evidence against stated criteria,

More information

CIP-010-1 R1 & R2: Configuration Change Management

CIP-010-1 R1 & R2: Configuration Change Management CIP-010-1 R1 & R2: Configuration Change Management June 3, 2014 Steven Keller Lead Compliance Specialist - CIP skeller.re@spp.org 501.688.1633 Outline What is CIP-010-1? How it is different from CIP-003-3

More information

3. Purpose: To improve the reliability of the Bulk Electric System by requiring the reporting of events by Responsible Entities.

3. Purpose: To improve the reliability of the Bulk Electric System by requiring the reporting of events by Responsible Entities. A. Introduction 1. Title: Event Reporting 2. Number: EOP-004-2 3. Purpose: To improve the reliability of the Bulk Electric System by requiring the reporting of events by Responsible Entities. 4. Applicability:

More information

Standard CIP 003 1 Cyber Security Security Management Controls

Standard CIP 003 1 Cyber Security Security Management Controls A. Introduction 1. Title: Cyber Security Security Management Controls 2. Number: CIP-003-1 3. Purpose: Standard CIP-003 requires that Responsible Entities have minimum security management controls in place

More information

NERC CIP VERSION 5 COMPLIANCE

NERC CIP VERSION 5 COMPLIANCE BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining

More information

CIP-014-1 Physical Security. Nate Roberts CIP Security Auditor I

CIP-014-1 Physical Security. Nate Roberts CIP Security Auditor I CIP-014-1 Physical Security Nate Roberts CIP Security Auditor I Notes Critical Infrastructure Protection (CIP) Standard CIP-014-1 is currently pending approval by the Federal Energy Regulatory Commission

More information

IRA Risk Factors Update for CIP. Ben Christensen Senior Compliance Risk Analyst, Cyber Security October 14, 2015

IRA Risk Factors Update for CIP. Ben Christensen Senior Compliance Risk Analyst, Cyber Security October 14, 2015 IRA Risk Factors Update for CIP Ben Christensen Senior Compliance Risk Analyst, Cyber Security October 14, 2015 2 Agenda Why the changes? What s new? Example of a Risk Factor How does this effect CIP V5?

More information

Safety Share Who is Cleco? CIP-005-3, R5 How What

Safety Share Who is Cleco? CIP-005-3, R5 How What 1 Safety Share Who is Cleco? CIP-005-3, R5 How What AGENDA 2 SAFETY SHARE 3 Statistics: General Customers: approx. 279,000 retail customers across Louisiana Non-contiguous transmission and service area

More information

NERC CIP Compliance 10/11/2011

NERC CIP Compliance 10/11/2011 NERC CIP Compliance 10/11/2011 Authored by Dan Barker, American Transmission Co. Ron Bender, Nebraska Public Power District Richard Burt, Minnkota Power Cooperative, Inc. Marc Child, Great River Energy

More information

TRIPWIRE NERC SOLUTION SUITE

TRIPWIRE NERC SOLUTION SUITE CONFIDENCE: SECURED SOLUTION BRIEF TRIPWIRE NERC SOLUTION SUITE TAILORED SUITE OF PRODUCTS AND SERVICES TO AUTOMATE NERC CIP COMPLIANCE u u We ve been able to stay focused on our mission of delivering

More information

Top 10 Compliance Issues for Implementing Security Programs

Top 10 Compliance Issues for Implementing Security Programs www.dyonyx.com Top 10 Compliance Issues for Implementing Security Programs This White Paper articulates the top ten issues that we have encountered in the design and implementation of comprehensive Security

More information

NERC CIP Version 5 webinar series Change management

NERC CIP Version 5 webinar series Change management 10/8/2014 NERC CIP Version 5 webinar series Change management Slide 1 Housekeeping All attendees are automatically in Mute. If you have any questions, please type them into the questions panel. This webinar

More information

Lessons Learned CIP Reliability Standards

Lessons Learned CIP Reliability Standards Evidence for a requirement was not usable due to a lack of identifying information on the document. An entity should set and enforce a "quality of evidence" standard for its compliance documentation. A

More information

ABB Power Generation Cyber Security Users Group

ABB Power Generation Cyber Security Users Group August 28, 2014 ABB Power Generation Cyber Security Users Group ABB Group August 28, 2014 Slide 1 Registration Peer Group Survey ABB Group August 28, 2014 Slide 2 ABB Group August 28, 2014 Slide 3 Registration

More information

Secure Remote Substation Access Solutions

Secure Remote Substation Access Solutions Secure Remote Substation Access Solutions Supplemental Project - Introduction Webcast October 16, 2013 Scott Sternfeld, Project Manager Smart Grid Substation & Cyber Security Research Labs ssternfeld@epri.com

More information

Transmission Function Employees Job Titles and Descriptions 18 C.F.R 358.7(f)(1)

Transmission Function Employees Job Titles and Descriptions 18 C.F.R 358.7(f)(1) Date of Last Change to the Provided Information August 27 th, 2015 Director, Transmission Operations The employee in this position is responsible for effectively managing the operation of FirstEnergy Utilities

More information

KEY CONSIDERATIONS FOR MIGRATING TO THE VERSION 5 NERC CIP CYBER SECURITY STANDARDS

KEY CONSIDERATIONS FOR MIGRATING TO THE VERSION 5 NERC CIP CYBER SECURITY STANDARDS KEY CONSIDERATIONS FOR MIGRATING TO THE VERSION 5 NERC CIP CYBER SECURITY STANDARDS Lenny Mansell Director, Consulting Services 1 January 29, 2014 AGENDA Introduction Multiple paradigm shifts ahead How

More information

The first step in protecting Critical Cyber Assets is identifying them. CIP-002 focuses on this identification process.

The first step in protecting Critical Cyber Assets is identifying them. CIP-002 focuses on this identification process. CIPS Overview Introduction The reliability of the energy grid depends not only on physical assets, but cyber assets. The North American Electric Reliability Corporation (NERC) realized that, along with

More information

NERC CIP-007 v. 5 Patch Management: Factors for Success

NERC CIP-007 v. 5 Patch Management: Factors for Success Cyber Security Compliance Industrial Computing NERC CIP-007 v. 5 Patch Management: Factors for Success A Presentation By: EnergySec FoxGuard Solutions NRG It s Interactive Please submit your questions

More information

Internal Controls And Good Utility Practices. Ruchi Ankleshwaria Manager, Compliance Risk Analysis

Internal Controls And Good Utility Practices. Ruchi Ankleshwaria Manager, Compliance Risk Analysis Internal Controls And Good Utility Practices Ruchi Ankleshwaria Manager, Compliance Risk Analysis 2 Introduction Joined WECC in March 2013 6 years of industry experience prior to joining WECC 4 years at

More information

Welcome to the CIP Workshop!

Welcome to the CIP Workshop! Welcome to the CIP Workshop! Download Materials @ SPP.org ->Regional Entity ->2015 CIP Workshop: Questions or Comments? Email reworkshop@spp.org Please wait for a microphone Submit via online form on workshop

More information

Alberta Reliability Standard Cyber Security Personnel & Training CIP-004-AB-5.1

Alberta Reliability Standard Cyber Security Personnel & Training CIP-004-AB-5.1 Alberta Reliability Stard A. Introduction 1. Title: 2. Number: 3. Purpose: To minimize the risk against compromise that could lead to misoperation or instability in the bulk electric system from individuals

More information

NERC CIP Compliance with Security Professional Services

NERC CIP Compliance with Security Professional Services NERC CIP Compliance with Professional Services The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to ensure that the bulk electric system in North America is

More information

A. Introduction. B. Requirements. Standard PER-005-1 System Personnel Training

A. Introduction. B. Requirements. Standard PER-005-1 System Personnel Training A. Introduction 1. Title: System Personnel Training 2. Number: PER-005-1 3. Purpose: To ensure that System Operators performing real-time, reliability-related tasks on the North American Bulk Electric

More information

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security

More information

North American Electric Reliability Corporation (NERC) Cyber Security Standard

North American Electric Reliability Corporation (NERC) Cyber Security Standard North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation

More information

NERC s New BES Definition: How Many CHP Units Will It Impact?

NERC s New BES Definition: How Many CHP Units Will It Impact? NERC s New BES Definition: How Many CHP Units Will It Impact? A presentation by: Dr. John A. Anderson, President & CEO Electricity Consumers Resource Council (ELCON) Washington, D.C. At: US Combined Heat

More information

Information Shield Solution Matrix for CIP Security Standards

Information Shield Solution Matrix for CIP Security Standards Information Shield Solution Matrix for CIP Security Standards The following table illustrates how specific topic categories within ISO 27002 map to the cyber security requirements of the Mandatory Reliability

More information

April 28, 2009. Dear Mr. Chairman:

April 28, 2009. Dear Mr. Chairman: April 28, 2009 The Honorable Edward J. Markey Chairman Subcommittee on Energy and Environment Committee on Energy and Commerce U.S. House of Representatives Washington, D.C. 20515 Dear Mr. Chairman: I

More information

E-Commerce Security Perimeter (ESP) Identification and Access Control Process

E-Commerce Security Perimeter (ESP) Identification and Access Control Process Electronic Security Perimeter (ESP) Identification and Access Control Process 1. Introduction. A. This document outlines a multi-step process for identifying and protecting ESPs pursuant to the North American

More information

FERC, NERC and Emerging CIP Standards

FERC, NERC and Emerging CIP Standards Protecting Critical Infrastructure and Cyber Assets in Power Generation and Distribution Embracing standards helps prevent costly fines and improves operational efficiency Bradford Hegrat, CISSP, Principal

More information

ERCOT Design and Implementation of Internal Controls and benefits for NERC CMEP/RAI

ERCOT Design and Implementation of Internal Controls and benefits for NERC CMEP/RAI ERCOT Design and Implementation of Internal Controls and benefits for NERC CMEP/RAI Matt Mereness, ERCOT Compliance Director August 2015 Anfield Summit Outline of discussion ERCOT Background Business Case

More information

Completed. Document Name. NERC CIP Requirements CIP-002 Critical Cyber Asset Identification R1 Critical Asset Identifaction Method

Completed. Document Name. NERC CIP Requirements CIP-002 Critical Cyber Asset Identification R1 Critical Asset Identifaction Method NERC CIP Requirements CIP-002 Critical Cyber Asset Identification R1 Critical Asset Identifaction Method R2 Critical Asset Identification R3 Critical Cyber Asset Identification Procedures and Evaluation

More information

NB Appendix CIP-004-5.1-NB-1 - Cyber Security Personnel & Training

NB Appendix CIP-004-5.1-NB-1 - Cyber Security Personnel & Training This appendix establishes modifications to the FERC approved NERC standard CIP-004-5.1 for its specific application in New Brunswick. This appendix must be read with CIP-004-5.1 to determine a full understanding

More information

NovaTech NERC CIP Compliance Document and Product Description Updated June 2015

NovaTech NERC CIP Compliance Document and Product Description Updated June 2015 NovaTech NERC CIP Compliance Document and Product Description Updated June 2015 This document describes the NovaTech Products for NERC CIP compliance and how they address the latest requirements of NERC

More information

EnergySec Partnered Webinar with MetricStream Transitioning to NERC CIP Version 5: What Does it Mean for Electric Utilities JANUARY 28, 2015

EnergySec Partnered Webinar with MetricStream Transitioning to NERC CIP Version 5: What Does it Mean for Electric Utilities JANUARY 28, 2015 EnergySec Partnered Webinar with MetricStream Transitioning to NERC CIP Version 5: What Does it Mean for Electric Utilities JANUARY 28, 2015 Housekeeping Items Submit questions using control panel Contact

More information

Voluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, nadya.bartol@utc.org. 2014 Utilities Telecom Council

Voluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, nadya.bartol@utc.org. 2014 Utilities Telecom Council Voluntary Cybersecurity Initiatives in Critical Infrastructure Nadya Bartol, CISSP, SGEIT, nadya.bartol@utc.org 2014 Utilities Telecom Council Utility cybersecurity environment is full of collaborations

More information

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards SCADA Compliance Tools For NERC-CIP The Right Tools for Bringing Your Organization in Line with the Latest Standards OVERVIEW Electrical utilities are responsible for defining critical cyber assets which

More information

Template K Implementation Requirements Instructions for RFP Response RFP #

Template K Implementation Requirements Instructions for RFP Response RFP # Template K Implementation Requirements Instructions for RFP Response Table of Contents 1.0 Project Management Approach... 3 1.1 Program and Project Management... 3 1.2 Change Management Plan... 3 1.3 Relationship

More information

Muscle to Protect Your Grid July 2009. Sustainable and Cost-effective Muscle to Protect Your Grid

Muscle to Protect Your Grid July 2009. Sustainable and Cost-effective Muscle to Protect Your Grid July 2009 Sustainable and Cost-effective Muscle to Protect Your Grid Page 2 Ensuring the reliability of the North American power grid is no small task and one that continues to grow in complexity on a

More information

Change and Configuration Management

Change and Configuration Management Change and Configuration Management for CIP Compliance OCTOBER 21, 2009 Developed with: Presenters Bart Thielbar, CISA Senior Research hanalyst Sierra Energy Group, a Division of Energy Central CIP-003,

More information

BPA Policy 434-1 Cyber Security Program

BPA Policy 434-1 Cyber Security Program B O N N E V I L L E P O W E R A D M I N I S T R A T I O N BPA Policy Table of Contents.1 Purpose & Background...2.2 Policy Owner... 2.3 Applicability... 2.4 Terms & Definitions... 2.5 Policy... 5.6 Policy

More information

Tyson Jarrett CIP Enforcement Analyst. Best Practices for Security Patch Management October 24, 2013 Anaheim, CA

Tyson Jarrett CIP Enforcement Analyst. Best Practices for Security Patch Management October 24, 2013 Anaheim, CA Tyson Jarrett CIP Enforcement Analyst Best Practices for Security Patch Management October 24, 2013 Anaheim, CA A little about me Graduated from the University of Utah with a Masters in Information Systems

More information

2012 CIP Spring Compliance Workshop May 7-11. Testing, Ports & Services and Patch Management

2012 CIP Spring Compliance Workshop May 7-11. Testing, Ports & Services and Patch Management 2012 CIP Spring Compliance Workshop May 7-11 Testing, Ports & Services and Patch Management Purpose This presentation provides an overview of the CIP-007-3 R1 Test Procedures which includes a discussion

More information

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample

More information

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report Federal Energy Regulatory Commission's Monitoring of Power Grid Cyber Security DOE/IG-0846 January 2011

More information

GRADUATE RELIABILITY TRAINING PROGRAM. Initiation Date: September 2012

GRADUATE RELIABILITY TRAINING PROGRAM. Initiation Date: September 2012 GRADUATE RELIABILITY TRAINING PROGRAM Initiation Date: September 2012 Board Approved Date: May 2012 GRADUATE RELIABILITY TRAINING PROGRAM Program Description This program is intended for recent college

More information

Information Bulletin

Information Bulletin Public Policy Division Impact of NIST Guidelines for Cybersecurity Prepared by UTC Staff 1. Introduction... 3 2. Cybersecurity Landscape... 3 3. One Likely Scenario... 5 4. Draft NISTIR 7628, Guidelines

More information

April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 Salt River Project P.O. Box 52025 Mail Stop: CUN204 Phoenix, AZ 85072 2025 Phone: (602) 236 6011 Fax: (602) 629 7988 James.Costello@srpnet.com James J. Costello Director, Enterprise IT Security April 8,

More information

Reclamation Manual Directives and Standards

Reclamation Manual Directives and Standards Vulnerability Assessment Requirements 1. Introduction. Vulnerability assessment testing is required for all access points into an electronic security perimeter (ESP), all cyber assets within the ESP, and

More information

Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, 28.09.2015 CASE: Implementation of Cyber Security for Yara Glomfjord

Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, 28.09.2015 CASE: Implementation of Cyber Security for Yara Glomfjord Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, 28.09.2015 CASE: Implementation of Cyber Security for Yara Glomfjord Implementation of Cyber Security for Yara Glomfjord Speaker profile Olav Mo ABB

More information

Reclamation Manual Directives and Standards

Reclamation Manual Directives and Standards PRA Process 1. Introduction. A. Additional information and requirements supplementing the PRA process are defined in the Directive and Standard (D&S). Terms used within this Appendix can be found in the

More information

LogRhythm and NERC CIP Compliance

LogRhythm and NERC CIP Compliance LogRhythm and NERC CIP Compliance The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to ensure that the bulk electric system in North America is reliable, adequate

More information

149 FERC 61,140 UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION. 18 CFR Part 40. [Docket No. RM14-15-000; Order No.

149 FERC 61,140 UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION. 18 CFR Part 40. [Docket No. RM14-15-000; Order No. 149 FERC 61,140 UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION 18 CFR Part 40 [Docket No. RM14-15-000; Order No. 802] Physical Security Reliability Standard (Issued November 20, 2014) AGENCY:

More information

Physical Security Reliability Standard Implementation

Physical Security Reliability Standard Implementation Physical Security Reliability Standard Implementation Tobias Whitney, Manager of CIP Compliance (NERC) Carl Herron, Physical Security Leader (NERC) NERC Sub-Committee Meeting New Orleans, Louisiana CIP-014

More information

Smart Grid America: Securing your network and customer data. Michael Assante Vice President and Chief Security Officer March 9, 2010

Smart Grid America: Securing your network and customer data. Michael Assante Vice President and Chief Security Officer March 9, 2010 Smart Grid America: Securing your network and customer data Michael Assante Vice President and Chief Security Officer March 9, 2010 About NERC The electric industry s self-regulatory organization for reliability

More information

Framework for Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity Implementation of Executive Order 13636 NARUC Winter Committee Meeting Committee & Staff Committee on Critical Infrastructure February 15,

More information

BSM for IT Governance, Risk and Compliance: NERC CIP

BSM for IT Governance, Risk and Compliance: NERC CIP BSM for IT Governance, Risk and Compliance: NERC CIP Addressing NERC CIP Security Program Requirements SOLUTION WHITE PAPER Table of Contents INTRODUCTION...................................................

More information

How To Write A Cyber Security Checkout On A Nerc Webinar

How To Write A Cyber Security Checkout On A Nerc Webinar AS WE PREPARE FOR OUR WEBINAR Thanks to each of you for taking the time to participate in our Webinar today, which will provide extensive insight into what is required to address the Version 5 NERC Cyber

More information

Redesigning automation network security

Redesigning automation network security White Paper WP152006EN Redesigning automation network security Presented at Power and Energy Automation Conference (PEAC), Spokane, WA, March 2014 Jacques Benoit Eaton s Cooper Power Systems Abstract The

More information

DQI WHITE PAPER UPDATE CPUC RECOMMENDATION #1. Continuing effort on DQI issues by a new DQI Subteam of the OCC

DQI WHITE PAPER UPDATE CPUC RECOMMENDATION #1. Continuing effort on DQI issues by a new DQI Subteam of the OCC DQI WHITE PAPER UPDATE CPUC RECOMMENDATION #1 Continuing effort on DQI issues by a new DQI Subteam of the OCC Recommendation 1 was for the CPUC to recommend the continuing effort of the DQI working group

More information

Research and information management strategy 2015-18. Using research and managing information to ensure delivery of the Commission s objectives

Research and information management strategy 2015-18. Using research and managing information to ensure delivery of the Commission s objectives Research and information management strategy 2015-18 Using research and managing information to ensure delivery of the Commission s objectives 1 1. Introduction This strategy sets out a range of research

More information

Compliance Open Webinar. Thursday, August 20th, 2015

Compliance Open Webinar. Thursday, August 20th, 2015 Compliance Open Webinar Thursday, August 20th, 2015 2 Upcoming Events CIP Advanced Concepts September 9-10, 2015 Compliance Open Webinar September 17, 2015 WECC CIPUG/CUG October 13-15, 2015 Compliance

More information

Vendor Management Challenges and Solutions for HIPAA Compliance. Jim Sandford Vice President, Coalfire

Vendor Management Challenges and Solutions for HIPAA Compliance. Jim Sandford Vice President, Coalfire Vendor Management Challenges and Solutions for HIPAA Compliance Jim Sandford Vice President, Coalfire Housekeeping You may submit questions throughout the webinar using the question area in the control

More information

Meeting NERC CIP Access Control Standards. Presented on February 12, 2014

Meeting NERC CIP Access Control Standards. Presented on February 12, 2014 Meeting NERC CIP Access Control Standards Presented on February 12, 2014 Presented By: CyberLock The leading supplier of key-centric access control systems Based in Corvallis, Oregon James T. McGowan Technology

More information

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.

More information

SecFlow Security Appliance Review

SecFlow Security Appliance Review Solution Paper. SecFlow Security Appliance Review NERC CIP version 5 Compliance Enabler July 2014 Abstract The alarming increase in cyber attacks on critical infrastructure poses new risk management challenges

More information