Alberta Reliability Standard Cyber Security Personnel & Training CIP-004-AB-5.1
|
|
|
- Claud Johns
- 10 years ago
- Views:
Transcription
1 Alberta Reliability Stard A. Introduction 1. Title: 2. Number: 3. Purpose: To minimize the risk against compromise that could lead to misoperation or instability in the bulk electric system from individuals accessing BES cyber systems by requiring an appropriate level of personnel risk assessment, training, security awareness in support of protecting BES cyber 4. Applicability: 4.1. For the purpose of the requirements contained herein, the following list of entities will be collectively referred to as Responsible Entities. For requirements in this reliability stard where a specific entity or subset of entities are the applicable entity or entities, the entity or entities are specified explicitly [Intentionally left blank.] a legal owner of an electric distribution system that owns one or more of the following facilities, systems, equipment for the protection or restoration of the bulk electric system: each underfrequency load shedding or under voltage load shed system that: is part of a load shedding program that is subject to one or more requirements in a reliability stard; performs automatic load shedding under a common control system owned by the entity in subsection , without human operator initiation, of 300 MW or more; each remedial action scheme where the remedial action scheme is subject to one or more requirements in a reliability stard; each protection system (excluding underfrequency load shedding under voltage load shed) that applies to transmission where the protection system is subject to one or more requirements in a reliability stard; each cranking path group of elements meeting the initial switching requirements from a contracted blackstart resource up to including the first point of supply /or point of delivery of the next generating unit or aggregated generating facility to be started; the operator of a generating unit the operator of an aggregated generating facility; the legal owner of a generating unit the legal owner of an aggregated generating facility; [Intentionally left blank.] [Intentionally left blank.] Effective: Page 1 of 14
2 Alberta Reliability Stard the operator of a transmission facility; the legal owner of a transmission facility; the ISO For the purpose of the requirements contained herein, the following facilities, systems, equipment owned by each Responsible Entity in subsection 4.1 above are those to which these requirements are applicable. For requirements in this reliability stard where a specific type of facilities, system, or equipment or subset of facilities, systems, equipment are applicable, these are specified explicitly One or more of the following facilities, systems equipment that operate at, or control elements that operate at, a nominal voltage of 25 kv or less are owned by a legal owner of an electric distribution system or a legal owner of a transmission facility for the protection or restoration of the bulk electric system: each underfrequency load shedding or under voltage load shed system that: is part of a load shedding program that is subject to one or more requirements in a reliability stard; performs automatic load shedding under a common control system owned by one or more of the entities in subsection 4.2.1, without human operator initiation, of 300 MW or more; each remedial action scheme where the remedial action scheme is subject to one or more requirements in a reliability stard; each protection system (excluding underfrequency load shedding under voltage load shed) that applies to transmission where the protection system is subject to one or more requirements in a reliability stard; each cranking path group of elements meeting the initial switching requirements from a contracted blackstart resource up to including the first point of supply /or point of delivery of the next generating unit or aggregated generating facility to be started; Responsible Entities listed in subsection 4.1 other than a legal owner of an electric distribution system are responsible for: each transmission facility that is part of the bulk electric system except each transmission facility that: is a transformer with fewer than 2 windings at 100 kv or higher does not connect a contracted blackstart resource; radially connects only to load; radially connects only to one or more generating units or aggregated generating facilities with a combined maximum authorized real power of less than or equal to 67.5 MW does not connect a contracted blackstart resource; or Effective: Page 2 of 14
3 Alberta Reliability Stard radially connects to load one or more generating units or aggregated generating facilities that have a combined maximum authorized real power of less than or equal to 67.5 MW does not connect a contracted blackstart resource; a reactive power resource that is dedicated to supplying or absorbing reactive power that is connected at 100 kv or higher, or through a dedicated transformer with a high-side voltage of 100 kv or higher, except those reactive power resources operated by an end-use customer for its own use; a generating unit that is: directly connected to the bulk electric system has a maximum authorized real power rating greater than 18 MW unless the generating unit is part of an industrial complex; within a power plant which: is not part of an aggregated generating facility; is directly connected to the bulk electric system; has a combined maximum authorized real power rating greater than 67.5 MW unless the power plant is part of an industrial complex; within an industrial complex with supply transmission service greater than 67.5 MW; or a contracted blackstart resource; an aggregated generating facility that is: directly connected to the bulk electric system has a maximum authorized real power rating greater than 67.5 MW unless the aggregated generating facility is part of an industrial complex; within an industrial complex with supply transmission service greater than 67.5 MW; or a contracted blackstart resource; control centres backup control centres The following are exempt from this reliability stard: [Intentionally left blank.] cyber assets associated with communication networks data communication links between discrete electronic security perimeters [Intentionally left blank.] for the legal owner of an electric distribution system, the systems equipment that are not included in subsection above. Effective: Page 3 of 14
4 Alberta Reliability Stard Responsible Entities that identify that they have no BES cyber systems categorized as High Impact or Medium Impact according to the CIP 002-AB 5.1 identification categorization processes. 5. [Intentionally left blank.] 6. [Intentionally left blank.] B. Requirements Measures R1. Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement parts in CIP 004-AB 5.1 Table R1 Security Awareness Program. M1. Evidence must include each of the applicable documented processes that collectively include each of the applicable requirement parts in CIP 004-AB 5.1 Table R1 Security Awareness Program additional evidence to demonstrate implementation as described in the Measures column of the table. Table R1 Security Awareness Program 1.1 High Impact BES cyber systems systems Security awareness that, at least once each calendar quarter, reinforces cyber security practices (which may include associated physical security practices) for the Responsible Entity s personnel who have authorized electronic or authorized unescorted physical access to BES cyber documentation that the quarterly reinforcement has been provided. Examples of evidence of reinforcement may include, but are not limited to, dated copies of information used to reinforce security awareness, as well as evidence of distribution, such as: direct communications (for example, e mails, memos, computer based training); or indirect communications (for example, posters, intranet, or brochures); or management support reinforcement (for example, presentations or meetings). R2. Each Responsible Entity shall implement, in a manner that identifies, assesses, corrects deficiencies, a cyber security training program(s) appropriate to individual roles, functions, or Effective: Page 4 of 14
5 Alberta Reliability Stard responsibilities that collectively includes each of the applicable requirement parts in CIP 004-AB 5.1 Table R2 Cyber Security Training Program. M2. Evidence must include the training program that includes each of the applicable requirement parts in CIP 004-AB 5.1 Table R2 Cyber Security Training Program additional evidence to demonstrate implementation of the program(s). Table R2 Cyber Security Training Program 2.1 High Impact BES cyber systems monitoring systems; routable connectivity monitoring systems; 2.2 High Impact BES cyber systems monitoring systems; Training content on: cyber security policies; physical access controls; electronic access controls; the visitor control program; hling of BES cyber system information its storage; identification of a cyber security incident initial notifications in accordance with the entity s incident response plan; recovery plans for BES cyber systems; response to cyber security incidents; cyber security risks associated with a BES cyber system s electronic interconnectivity interoperability with other cyber assets. Require completion of the training specified in part 2.1 prior to granting authorized electronic access authorized unescorted Examples of evidence may include, but are not limited to, training material such as power point presentations, instructor notes, student notes, houts, or other training materials. Examples of evidence may include, but are not limited to, training records documentation of when CIP exceptional circumstances Effective: Page 5 of 14
6 Alberta Reliability Stard Table R2 Cyber Security Training Program were invoked. routable connectivity monitoring systems; 2.3 High Impact BES cyber systems monitoring systems; routable connectivity monitoring systems; physical access to applicable cyber assets, except during CIP exceptional circumstances. Require completion of the training specified in part 2.1 at least once every 15 months. Examples of evidence may include, but are not limited to, dated individual training records. R3. Each Responsible Entity shall implement, in a manner that identifies, assesses, corrects deficiencies, one or more documented personnel risk assessment programs to attain retain authorized electronic or authorized unescorted physical access to BES Cyber Systems that collectively include each of the applicable requirement parts in CIP 004-AB 5.1 Table R3 Personnel Risk Assessment Program. M3. Evidence must include the documented personnel risk assessment programs that collectively include each of the applicable requirement parts in CIP 004-AB 5.1 Table R3 Personnel Risk Assessment Program additional evidence to demonstrate implementation of the program(s). Effective: Page 6 of 14
7 Alberta Reliability Stard Table R3 Personnel Risk Assessment Program 3.1 High Impact BES cyber systems monitoring systems; routable connectivity monitoring systems; 3.2 High Impact BES cyber systems monitoring systems; routable connectivity monitoring systems; Process to confirm identity. Process to perform a seven year criminal history records check as part of each personnel risk assessment that includes: current residence, regardless of duration; other locations where, during the seven years immediately prior to the date of the criminal history records check, the subject has resided for six consecutive months or more. If it is not possible to perform a full seven year criminal history records check, conduct as much of the seven year criminal history records check as possible document the reason the full seven year criminal history records check could not be performed. documentation of the Responsible Entity s process to confirm identity. documentation of the Responsible Entity s process to perform a seven year criminal history records check. Effective: Page 7 of 14
8 Alberta Reliability Stard Table R3 Personnel Risk Assessment Program 3.3 High Impact BES cyber systems monitoring systems; routable connectivity monitoring systems; 3.4 High Impact BES cyber systems monitoring systems; routable connectivity monitoring systems; 3.5 High Impact BES cyber systems monitoring systems; Criteria or process to evaluate criminal history records checks for authorizing access. Criteria or process for verifying that personnel risk assessments performed for contractors or service vendors are conducted according to parts 3.1 through 3.3. Process to ensure that individuals with authorized electronic or authorized unescorted physical access have had a personnel risk documentation of the Responsible Entity s process to evaluate criminal history records checks. documentation of the Responsible Entity s criteria or process for verifying contractors or service vendors personnel risk assessments. documentation of the Responsible Entity s process for ensuring that individuals Effective: Page 8 of 14
9 Alberta Reliability Stard Table R3 Personnel Risk Assessment Program assessment completed according to parts 3.1 to 3.4 within the last seven years. routable connectivity monitoring systems; with authorized electronic or authorized unescorted physical access have had a personnel risk assessment completed within the last seven years. R4. Each Responsible Entity shall implement, in a manner that identifies, assesses, corrects deficiencies, one or more documented access management programs that collectively include each of the applicable requirement parts in CIP 004-AB-5.1 Table R4 Access Management Program. M4. Evidence must include the documented processes that collectively include each of the applicable requirement parts in CIP 004-AB 5.1 Table R4 Access Management Program additional evidence to demonstrate that the access management program was implemented as described in the Measures column of the table. Table R4 Access Management Program 4.1 High Impact BES cyber systems monitoring systems; routable connectivity monitoring systems; Process to authorize based on need, as determined by the Responsible Entity, except for CIP exceptional circumstances: electronic access; unescorted physical access into a physical security perimeter; access to designated storage locations, whether physical or electronic, for BES cyber system information. dated documentation of the process to authorize electronic access, unescorted physical access in a physical security perimeter, access to designated storage locations, whether physical or electronic, for BES cyber system information. Effective: Page 9 of 14
10 Alberta Reliability Stard Table R4 Access Management Program 4.2 High Impact BES cyber systems monitoring systems; routable connectivity monitoring systems; 4.3 High Impact BES cyber systems monitoring systems; routable connectivity monitoring systems; Verify at least once each calendar quarter that individuals with active electronic access or unescorted physical access have authorization records. For electronic access, verify at least once every 15 months that all user accounts, user account groups, or user role categories, their specific, associated privileges are correct are those that the Responsible Entity determines are necessary. Examples of evidence may include, but are not limited to: dated documentation of the verification between the system generated list of individuals who have been authorized for access (i.e., workflow database) a system generated list of personnel who have access (i.e., user account listing), or dated documentation of the verification between a list of individuals who have been authorized for access (i.e., authorization forms) a list of individuals provisioned for access (i.e., provisioning forms or shared account listing). documentation of the review that includes all of the following: 1. a dated listing of all accounts/account groups or roles within the system; 2. a summary description of privileges associated with each group or role; 3. accounts assigned to the group or role; 4. dated evidence showing verification of the privileges for the group are Effective: Page 10 of 14
11 Alberta Reliability Stard Table R4 Access Management Program authorized appropriate to the work function performed by people assigned to each account. 4.4 High Impact BES cyber systems monitoring systems; routable connectivity monitoring systems; Verify at least once every 15 months that access to the designated storage locations for BES cyber system information, whether physical or electronic, are correct are those that the Responsible Entity determines are necessary for performing assigned work functions. the documentation of the review that includes all of the following: 1. a dated listing of authorizations for BES cyber system information; 2. any privileges associated with the authorizations; 3. dated evidence showing a verification of the authorizations any privileges were confirmed correct the minimum necessary for performing assigned work functions. R5. Each Responsible Entity shall implement, in a manner that identifies, assesses, corrects deficiencies, one or more documented access revocation programs that collectively include each of the applicable requirement parts in CIP 004-AB 5.1 Table R5 Access Revocation. M5. Evidence must include each of the applicable documented programs that collectively include each of the applicable requirement parts in CIP 004-AB 5.1 Table R5 Access Revocation additional evidence to demonstrate implementation as described in the Measures column of the table. Table R5 Access Revocation 5.1 High Impact BES cyber systems monitoring systems; A process to initiate removal of an individual s ability for unescorted physical access interactive remote access upon a termination action, complete the documentation of all of the following: 1. dated workflow or sign off Effective: Page 11 of 14
12 Alberta Reliability Stard Table R5 Access Revocation removals within 24 hours of the termination action (Removal of the ability for routable connectivity access may be different than deletion, disabling, revocation, or removal of all access rights). monitoring systems; 5.2 High Impact BES cyber systems monitoring systems; routable connectivity monitoring systems; 5.3 High Impact BES cyber systems monitoring systems; routable connectivity For reassignments or transfers, revoke the individual s authorized electronic access to individual accounts authorized unescorted physical access that the Responsible Entity determines are not necessary by the end of the next day following the date that the Responsible Entity determines that the individual no longer requires retention of that access. For termination actions, revoke the individual s access to the designated storage locations for BES cyber system information, whether physical or electronic (unless already revoked according to requirement R5.1), by the end of the next day following the effective date of the termination action. form verifying access removal associated with the termination action; 2. logs or other demonstration showing such persons no longer have access. documentation of all of the following: 1. dated workflow or sign off form showing a review of logical physical access; 2. logs or other demonstration showing such persons no longer have access that the Responsible Entity determines is not necessary. workflow or signoff form verifying access removal to designated physical areas or cyber systems containing BES cyber system information associated with the terminations dated within the next day of the termination action. Effective: Page 12 of 14
13 Alberta Reliability Stard Table R5 Access Revocation monitoring systems; 5.4 High Impact BES cyber systems electronic access control monitoring 5.5 High Impact BES cyber systems electronic access control monitoring For termination actions, revoke the individual s non shared user accounts (unless already revoked according to parts 5.1 or 5.3) within 30 days of the effective date of the termination action. For termination actions, change passwords for shared account(s) known to the user within 30 days of the termination action. For reassignments or transfers, change passwords for shared account(s) known to the user within 30 days following the date that the Responsible Entity determines that the individual no longer requires retention of that access. If the Responsible Entity determines documents that extenuating operating circumstances require a longer time period, change the password(s) within 10 days following the end of the operating circumstances. workflow or signoff form showing access removal for any individual BES cyber assets software applications as determined necessary to completing the revocation of access dated within thirty calendar days of the termination actions. Examples of evidence may include, but are not limited to: workflow or sign off form showing password reset within 30 days of the termination; workflow or sign off form showing password reset within 30 days of the reassignments or transfers; or documentation of the extenuating operating circumstance workflow or sign off form showing password reset within 10 days following the end of the operating circumstance. Effective: Page 13 of 14
14 Alberta Reliability Stard Revision History Date Description Initial release. Effective: Page 14 of 14
Alberta Reliability Standard Cyber Security Physical Security of BES Cyber Systems CIP-006-AB-5
Alberta Reliability Stard Final Proposed Draft Version 2.0 September 9, 2014 A. Introduction 1. Title: 2. Number: 3. Purpose: To manage physical access to BES cyber systems by specifying a physical security
Alberta Reliability Standard Cyber Security Configuration Change Management and Vulnerability Assessments CIP-010-AB-1
A. Introduction 1. Title: 2. Number: 3. Purpose: To prevent and detect unauthorized changes to BES cyber systems by specifying configuration change management and vulnerability assessment requirements
Alberta Reliability Standard Cyber Security Security Management Controls CIP-003-AB-5
A. Introduction 1. Title: 2. Number: 3. Purpose: To specify consistent and sustainable security management controls that establish responsibility and accountability to protect BES cyber systems against
Alberta Reliability Standard Cyber Security System Security Management CIP-007-AB-5
A. Introduction 1. Title: 2. Number: 3. Purpose: To manage system security by specifying select technical, operational, and procedural requirements in support of protecting BES cyber systems against compromise
Summary of CIP Version 5 Standards
Summary of CIP Version 5 Standards In Version 5 of the Critical Infrastructure Protection ( CIP ) Reliability Standards ( CIP Version 5 Standards ), the existing versions of CIP-002 through CIP-009 have
CIP-003-5 Cyber Security Security Management Controls
A. Introduction 1. Title: Cyber Security Security Management Controls 2. Number: CIP-003-5 3. Purpose: To specify consistent and sustainable security management controls that establish responsibility and
North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)
Whitepaper North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5) NERC-CIP Overview The North American Electric Reliability Corporation (NERC) is a
CIP 010 1 Cyber Security Configuration Change Management and Vulnerability Assessments
CIP 010 1 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:
CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments
CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:
Standard CIP 004 3a Cyber Security Personnel and Training
A. Introduction 1. Title: Cyber Security Personnel & Training 2. Number: CIP-004-3a 3. Purpose: Standard CIP-004-3 requires that personnel having authorized cyber or authorized unescorted physical access
The first step in protecting Critical Cyber Assets is identifying them. CIP-002 focuses on this identification process.
CIPS Overview Introduction The reliability of the energy grid depends not only on physical assets, but cyber assets. The North American Electric Reliability Corporation (NERC) realized that, along with
NERC Cyber Security Standards
SANS January, 2008 Stan Johnson Manager of Situation Awareness and Infrastructure Security [email protected] 609-452-8060 Agenda History and Status of Applicable Entities Definitions High Level of
CIP-005-5 Cyber Security Electronic Security Perimeter(s)
A. Introduction 1. Title: Cyber Security Electronic Security Perimeter(s) 2. Number: CIP-005-5 3. Purpose: To manage electronic access to BES Cyber Systems by specifying a controlled Electronic Security
ReliabilityFirst CIP Evidence List CIP-002 through CIP-009 are applicable to RC, BA, IA, TSP, TO, TOP, GO, GOP, LSE, NERC, & RE
R1 Provide Risk Based Assessment Methodology (RBAM) R1.1 Provide evidence that the RBAM includes both procedures and evaluation criteria, and that the evaluation criteria are riskbased R1.2 Provide evidence
Completed. Document Name. NERC CIP Requirements CIP-002 Critical Cyber Asset Identification R1 Critical Asset Identifaction Method
NERC CIP Requirements CIP-002 Critical Cyber Asset Identification R1 Critical Asset Identifaction Method R2 Critical Asset Identification R3 Critical Cyber Asset Identification Procedures and Evaluation
When this standard has received ballot approval, the text boxes will be moved to the Guidelines and Technical Basis section of the Standard.
CIP-002-5 Cyber Security BES Cyber System Categorization When this standard has received ballot approval, the text boxes will be moved to the Guidelines and Technical Basis section of the Standard. A.
NERC CIP Tools and Techniques
NERC CIP Tools and Techniques Supplemental Project - Introduction Webcast Scott Sternfeld, Project Manager Smart Grid Substation & Cyber Security Research Labs [email protected] (843) 619-0050 October
Cyber Security Standards Update: Version 5
Cyber Security Standards Update: Version 5 January 17, 2013 Scott Mix, CISSP CIP Technical Manager Agenda Version 5 Impact Levels Format Features 2 RELIABILITY ACCOUNTABILITY CIP Standards Version 5 CIP
Standard CIP 003 1 Cyber Security Security Management Controls
A. Introduction 1. Title: Cyber Security Security Management Controls 2. Number: CIP-003-1 3. Purpose: Standard CIP-003 requires that Responsible Entities have minimum security management controls in place
Technology Solutions for NERC CIP Compliance June 25, 2015
Technology Solutions for NERC CIP Compliance June 25, 2015 2 Encari s Focus is providing NERC CIP Compliance Products and Services for Generation and Transmission Utilities, Municipalities and Cooperatives
Information Shield Solution Matrix for CIP Security Standards
Information Shield Solution Matrix for CIP Security Standards The following table illustrates how specific topic categories within ISO 27002 map to the cyber security requirements of the Mandatory Reliability
Cyber Security Compliance (NERC CIP V5)
Cyber Security Compliance (NERC CIP V5) Ray Wright NovaTech, LLC Abstract: In December 2013, the Federal Energy Regulatory Commission (FERC) issued Order No. 791 which approved the Version 5 CIP Reliability
Implementation Plan for Version 5 CIP Cyber Security Standards
Implementation Plan for Version 5 CIP Cyber Security Standards April 10September 11, 2012 Prerequisite Approvals All Version 5 CIP Cyber Security Standards and the proposed additions, modifications, and
Cyber Security Standards Update: Version 5 with Revisions
Cyber Security Standards Update: Version 5 with Revisions Security Reliability Program 2015 Agenda CIP Standards History Version 5 Format Impact Levels NOPR Final Rule References 2 RELIABILITY ACCOUNTABILITY
Standard CIP 007 3 Cyber Security Systems Security Management
A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-3 3. Purpose: Standard CIP-007-3 requires Responsible Entities to define methods, processes, and procedures for securing
Scope of Restoration Plan
RWG Area Restoration Review Worksheet (10/28/09) EOP-006-02 Directory 8 EOP-005 NYSRG Rule G Text Restoration Plan Requirement R1.Each Reliability Coordinator shall have a Reliability Coordinator Area
Standard CIP 007 3a Cyber Security Systems Security Management
A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-3a 3. Purpose: Standard CIP-007-3 requires Responsible Entities to define methods, processes, and procedures for
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
Voluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, [email protected]. 2014 Utilities Telecom Council
Voluntary Cybersecurity Initiatives in Critical Infrastructure Nadya Bartol, CISSP, SGEIT, [email protected] 2014 Utilities Telecom Council Utility cybersecurity environment is full of collaborations
Supporting our customers with NERC CIP compliance. James McQuiggan, CISSP
Supporting our customers with NERC CIP compliance James, CISSP Siemens Energy Sector Energy products and solutions - in 6 Divisions Oil & Gas Fossil Power Generation Renewable Energy Service Rotating Equipment
Alberta Reliability Standard Cyber Security Implementation Plan for Version 5 CIP Security Standards CIP-PLAN-AB-1
External Consultation Draft Version 1.0 December 12, 2013 1. Purpose The purpose of this reliability standard is to set the effective dates for the Version 5 CIP Cyber Security reliability standards and
Managed Hosting & Datacentre PCI DSS v2.0 Obligations
Any physical access to devices or data held in an Melbourne datacentre that houses a customer s cardholder data must be controlled and restricted only to approved individuals. PCI DSS Requirements Version
SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards
SCADA Compliance Tools For NERC-CIP The Right Tools for Bringing Your Organization in Line with the Latest Standards OVERVIEW Electrical utilities are responsible for defining critical cyber assets which
Entity Name ( Acronym) NCRnnnnn Risk Assessment Questionnaire
Entity Name ( Acronym) NCRnnnnn Risk Assessment Questionnaire Upcoming Audit Date: March 16, 2015 Upcoming Audit Type: O&P Audit Start of Audit Period: March 16, 2012 Date Submitted: Table of Contents
Control System Integrity (CSI) Tools and Processes to Automate CIP Compliance for Control Systems
Control System Integrity (CSI) Tools and Processes to Automate CIP Compliance for Control Systems James Goosby Manager I&C Systems and Field Support 19 th Annual ARC Industry Forum Agenda About Us Compliance
Open Enterprise Architectures for a Substation Password Management System
CIGRÉ Canada 21, rue d Artois, F-75008 PARIS (154) Conference on Power Systems http : //www.cigre.org Toronto, October 4-6, 2009 Open Enterprise Architectures for a Substation Password Management System
TRIPWIRE NERC SOLUTION SUITE
CONFIDENCE: SECURED SOLUTION BRIEF TRIPWIRE NERC SOLUTION SUITE TAILORED SUITE OF PRODUCTS AND SERVICES TO AUTOMATE NERC CIP COMPLIANCE u u We ve been able to stay focused on our mission of delivering
Information Technology Branch Access Control Technical Standard
Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,
SUPPLIER SECURITY STANDARD
SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard
CIP-003-6 R2 BES Assets Containing Low Impact BCS. Lisa Wood, CISA, CBRA, CBRM Compliance Auditor Cyber Security
CIP-003-6 R2 BES Assets Containing Low Impact BCS Lisa Wood, CISA, CBRA, CBRM Compliance Auditor Cyber Security Slide 2 About Me Been with WECC for 5 years 1 ½ years as a Compliance Program Coordinator
LogRhythm and NERC CIP Compliance
LogRhythm and NERC CIP Compliance The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to ensure that the bulk electric system in North America is reliable, adequate
NERC-CIP S MOST WANTED
WHITE PAPER NERC-CIP S MOST WANTED The Top Three Most Violated NERC-CIP Standards What you need to know to stay off the list. www.alertenterprise.com NERC-CIP s Most Wanted AlertEnterprise, Inc. White
NovaTech NERC CIP Compliance Document and Product Description Updated June 2015
NovaTech NERC CIP Compliance Document and Product Description Updated June 2015 This document describes the NovaTech Products for NERC CIP compliance and how they address the latest requirements of NERC
INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE
TITLE AND INFORMATION TECHNOLOGY RESOURCES DOCUMENT # 1107 APPROVAL LEVEL Alberta Health Services Executive Committee SPONSOR Legal & Privacy / Information Technology CATEGORY Information and Technology
1B1 SECURITY RESPONSIBILITY
(ITSP-1) SECURITY MANAGEMENT 1A. Policy Statement District management and IT staff will plan, deploy and monitor IT security mechanisms, policies, procedures, and technologies necessary to prevent disclosure,
NERC CIP VERSION 5 COMPLIANCE
BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining
4.1.1 Generator Owner 4.1.2 Transmission Owner that owns synchronous condenser(s)
A. Introduction 1. Title: Verification and Data Reporting of Generator Real and Reactive Power Capability and Synchronous Condenser Reactive Power Capability 2. Number: MOD-025-2 3. Purpose: To ensure
Midwest Reliability Organization Procedure For NERC PRC-012
Midwest Reliability Organization Procedure For NERC PRC-012 A. Introduction The following procedure developed by the MRO Protective Relay Subcommittee (PRS) and Transmission Assessment Subcommittee (TAS)
BPA Policy 434-1 Cyber Security Program
B O N N E V I L L E P O W E R A D M I N I S T R A T I O N BPA Policy Table of Contents.1 Purpose & Background...2.2 Policy Owner... 2.3 Applicability... 2.4 Terms & Definitions... 2.5 Policy... 5.6 Policy
BSM for IT Governance, Risk and Compliance: NERC CIP
BSM for IT Governance, Risk and Compliance: NERC CIP Addressing NERC CIP Security Program Requirements SOLUTION WHITE PAPER Table of Contents INTRODUCTION...................................................
How To Protect Your School From A Breach Of Security
SECURITY MANAGEMENT IT Security Policy (ITSP- 1) 1A Policy Statement District management and IT staff will plan, deploy, and monitor IT security mechanisms, policies, procedures, and technologies necessary
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
CYBER SECURITY POLICY For Managers of Drinking Water Systems
CYBER SECURITY POLICY For Managers of Drinking Water Systems Excerpt from Cyber Security Assessment and Recommended Approach, Final Report STATE OF DELAWARE DRINKING WATER SYSTEMS February 206 Kash Srinivasan
References... 4. Appendices... 5. I. INTRODUCTION... 6 A. Background... 6 B. Standards... 6
ISO New England Operating Procedure No. 14 - Technical Requirements for Generators, Demand Resources, Asset Related Demands and Alternative Technology Regulation Resources Effective Date: January 29, 2015
Meeting NERC CIP Access Control Standards. Presented on February 12, 2014
Meeting NERC CIP Access Control Standards Presented on February 12, 2014 Presented By: CyberLock The leading supplier of key-centric access control systems Based in Corvallis, Oregon James T. McGowan Technology
Plans for CIP Compliance
Testing Procedures & Recovery Plans for CIP Compliance DECEMBER 16, 2009 Developed with: Presenters Bart Thielbar, CISA Senior Research hanalyst Sierra Energy Group, a Division of Energy Central Primer
NYSED DATA DASHBOARD SOLUTIONS RFP ATTACHMENT 6.4 MAINTENANCE AND SUPPORT SERVICES
NYSED DATA DASHBOARD SOLUTIONS RFP ATTACHMENT 6.4 MAINTENANCE AND SUPPORT SERVICES 1. Definitions. The definitions below shall apply to this Schedule. All capitalized terms not otherwise defined herein
Supplier IT Security Guide
Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA
Reclamation Manual Directives and Standards
PRA Process 1. Introduction. A. Additional information and requirements supplementing the PRA process are defined in the Directive and Standard (D&S). Terms used within this Appendix can be found in the
Version: 1.5 2014 Page 1 of 5
Version: 1.5 2014 Page 1 of 5 1.0 Overview A backup policy is similar to an insurance policy it provides the last line of defense against data loss and is sometimes the only way to recover from a hardware
Continuous Compliance for Energy and Nuclear Facility Cyber Security Regulations
Continuous Compliance for Energy and Nuclear Facility Cyber Security Regulations Leveraging Configuration and Vulnerability Analysis for Critical Assets and Infrastructure May 2015 (Revision 2) Table of
Voluntary Cyber Security Standards for Industrial Control Systems v.1.0 www.gcsb.govt.nz www.ncsc.govt.nz
National Cyber Security Centre Voluntary Cyber Security Standards for Industrial Control Systems v.1.0 www.gcsb.govt.nz www.ncsc.govt.nz Foreword The national and economic security of New Zealand depends
NERC s New BES Definition: How Many CHP Units Will It Impact?
NERC s New BES Definition: How Many CHP Units Will It Impact? A presentation by: Dr. John A. Anderson, President & CEO Electricity Consumers Resource Council (ELCON) Washington, D.C. At: US Combined Heat
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
FERC, NERC and Emerging CIP Standards
Protecting Critical Infrastructure and Cyber Assets in Power Generation and Distribution Embracing standards helps prevent costly fines and improves operational efficiency Bradford Hegrat, CISSP, Principal
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
COUNTY OF ORANGE, CA Schedule 2D Service Desk Services SOW SCHEDULE 2D SERVICE DESK SERVICES SOW. for. Date TBD
SCHEDULE 2D SERVICE DESK SERVICES SOW for COUNTY OF ORANGE, CA Date TBD Schedule 2D Service Desk Services SOW Table of Contents 1.0 Service Desk Services Overview and Service Objectives... 1 1.1 Service
BUSINESS ASSOCIATE AGREEMENT ( BAA )
BUSINESS ASSOCIATE AGREEMENT ( BAA ) Pursuant to the terms and conditions specified in Exhibit B of the Agreement (as defined in Section 1.1 below) between EMC (as defined in the Agreement) and Subcontractor
Arkansas Crime Information Center. ACIC Training Policy
Arkansas Crime Information Center ACIC Training Policy pg. 1 Approved by the ACIC Supervisory Board December 4, 2015 ACIC Training Policy Training is necessary for the proper and effective use of the state
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,
Critical Infrastructure Security: The Emerging Smart Grid. Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn
Critical Infrastructure Security: The Emerging Smart Grid Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn Overview Assurance & Evaluation Security Testing Approaches
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
Miami University. Payment Card Data Security Policy
Miami University Payment Card Data Security Policy IT Policy IT Standard IT Guideline IT Procedure IT Informative Issued by: IT Services SCOPE: This policy covers all units within Miami University that
This policy shall be reviewed at least annually and updated as needed to reflect changes to business objectives or the risk environment.
- 1. Policy Statement All card processing activities and related technologies must comply with the Payment Card Industry Data Security Standard (PCI-DSS) in its entirety. Card processing activities must
SAQ D Compliance. Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP
SAQ D Compliance Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP Ground Rules WARNING: Potential Death by PowerPoint Interaction Get clarification Share your institution s questions, challenges,
Applicant Guide to EMR Certification
Applicant Guide to EMR Certification Updated December 2015 Contact us at: Email: [email protected] Phone: (204) 926-3482 Table of Contents Introduction... 2 About this guide Manitoba s agent Certification
WHITE PAPER CYBER SECURITY AND ELECTRIC UTILITY COMMUNICATIONS WHAT NERC/CIP MEANS FOR YOUR MICROWAVE
CYBER SECURITY AND ELECTRIC UTILITY COMMUNICATIONS WHAT NERC/CIP MEANS FOR YOUR MICROWAVE MAY 2011 TABLE OF CONTENTS 1.0 INTRODUCTION... 3 2.0 MODERN ELECTRIC UTILITY COMMUNICATIONS... 4 2.1 DOMAINS AND
Master/Local Control Center Procedure No. 13 (M/LCC 13) Communications Between the ISO and Local Control Centers
Master/LCC Procedure No. 13 - Communications Master/Local Control Center Procedure No. 13 (M/LCC 13) Communications 1. References... 2 2. Background... 3 3. Responsibilities... 3 4. Procedure... 4 4.1
SecFlow Security Appliance Review
Solution Paper. SecFlow Security Appliance Review NERC CIP version 5 Compliance Enabler July 2014 Abstract The alarming increase in cyber attacks on critical infrastructure poses new risk management challenges
EnergySec Partnered Webinar with MetricStream Transitioning to NERC CIP Version 5: What Does it Mean for Electric Utilities JANUARY 28, 2015
EnergySec Partnered Webinar with MetricStream Transitioning to NERC CIP Version 5: What Does it Mean for Electric Utilities JANUARY 28, 2015 Housekeeping Items Submit questions using control panel Contact
Physical Protection Policy Sample (Required Written Policy)
Physical Protection Policy Sample (Required Written Policy) 1.0 Purpose: The purpose of this policy is to provide guidance for agency personnel, support personnel, and private contractors/vendors for the
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Security Regulations and Standards for SCADA and Industrial Controls
Security Regulations and Standards for SCADA and Industrial Controls Overview of NERC CIP and other Security Frameworks 1 65 th Annual Instrumentation Symposium for the Process Industry Topics Covered
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice
NERC Cyber Security Compliance Consulting Services HCL Governance, Risk & Compliance Practice Overview The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to
