Information Shield Solution Matrix for CIP Security Standards



Similar documents
TASK TDSP Web Portal Project Cyber Security Standards Best Practices

INFORMATION SYSTEMS. Revised: August 2013

ISO 27002:2013 Version Change Summary

Standard CIP Cyber Security Systems Security Management

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Standard CIP 007 3a Cyber Security Systems Security Management

ISO Controls and Objectives

INFORMATION TECHNOLOGY SECURITY STANDARDS

ReliabilityFirst CIP Evidence List CIP-002 through CIP-009 are applicable to RC, BA, IA, TSP, TO, TOP, GO, GOP, LSE, NERC, & RE

The first step in protecting Critical Cyber Assets is identifying them. CIP-002 focuses on this identification process.

Summary of CIP Version 5 Standards

Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6

security policy Purpose The purpose of this paper is to outline the steps required for developing and maintaining a corporate security policy.

Completed. Document Name. NERC CIP Requirements CIP-002 Critical Cyber Asset Identification R1 Critical Asset Identifaction Method

Dokument Nr. 521.dw Ausgabe Februar 2013, Rev Seite 1 von d Seite 1 von 11

BSM for IT Governance, Risk and Compliance: NERC CIP

NERC CIP Compliance with Security Professional Services

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)

LogRhythm and NERC CIP Compliance

ISO27001 Controls and Objectives

NERC Cyber Security Standards

Acceptance Page 2. Revision History 3. Introduction 14. Control Categories 15. Scope 15. General Requirements 15

CIP Cyber Security Security Management Controls

Standard CIP Cyber Security Security Management Controls

ISO/IEC 27001:2013 Thema Änderungen der Kontrollen der ISO/IEC 27001:2013 im Vergleich zur Fassung aus 2005 Datum

Newcastle University Information Security Procedures Version 3

How To Manage Security On A Networked Computer System

Central Agency for Information Technology

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

1B1 SECURITY RESPONSIBILITY

Information security management systems Specification with guidance for use

Standard CIP 004 3a Cyber Security Personnel and Training

Security Controls in Service Management

Cyber Security Compliance (NERC CIP V5)

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL

1 Purpose Scope Roles and Responsibilities Physical & Environmental Security Access Control to the Network...

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

Service Children s Education

Information Security Policies. Version 6.1

Supplier Security Assessment Questionnaire

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

NERC CIP Compliance. Dave Powell Plant Engineering and Environmental Performance. Presentation to 2009 BRO Forum

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

Technology Solutions for NERC CIP Compliance June 25, 2015

Data Management Policies. Sage ERP Online

Critical Controls for Cyber Security.

Information Technology Branch Access Control Technical Standard

Information Security Policy version 2.0

Alberta Reliability Standard Cyber Security System Security Management CIP-007-AB-5

TRIPWIRE NERC SOLUTION SUITE

Information security controls. Briefing for clients on Experian information security controls

Security and Privacy Controls for Federal Information Systems and Organizations

Attachment A. Identification of Risks/Cybersecurity Governance

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Security Controls What Works. Southside Virginia Community College: Security Awareness

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY

SARBANES OXLEY: ACHIEVING COMPLIANCE BY STARTING WITH ISO 17799

Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11

ISO Information Security Management Systems Professional

NovaTech NERC CIP Compliance Document and Product Description Updated June 2015

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

SUPPLIER SECURITY STANDARD

INFORMATION SECURITY PROCEDURES

Domain 1 The Process of Auditing Information Systems

Voluntary Cyber Security Standards for Industrial Control Systems v

A Rackspace White Paper Spring 2010

A Comparison of Oil and Gas Segment Cyber Security Standards

Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, CASE: Implementation of Cyber Security for Yara Glomfjord

Technical Report Electronic Signatures and Infrastructures (ESI); Data Preservation Systems Security; Part 2: Guidelines for Assessors

Mapping between the requirements of ISO/IEC 27001:2005 and ISO/IEC 27001:2013

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

NERC CIP Tools and Techniques

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

I n f o r m a t i o n S e c u r i t y

How To Protect Your School From A Breach Of Security

Information System Audit Guide

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

FRAMEWORK. Continuous Process Improvement Risk, Information Security, and Compliance

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

Alberta Reliability Standard Cyber Security Personnel & Training CIP-004-AB-5.1

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)

Implementation Plan for Version 5 CIP Cyber Security Standards

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

Public Cloud Service Definition

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

SANS Top 20 Critical Controls for Effective Cyber Defense

Transcription:

Information Shield Solution Matrix for CIP Security Standards The following table illustrates how specific topic categories within ISO 27002 map to the cyber security requirements of the Mandatory Reliability Standards for Critical Infrastructure Protection [1] from Federal Energy Regulatory Commission (FERC). This map also applies to categories found within PolicyShield Security Policy Subscription and Information Security Policies Made Easy, Version 11. Standard Number Description ISO 27002 CIP-002-1 Critical Cyber Asset Identification 7 ASSET Standard CIP-002 requires the identification and documentation of the Critical Cyber Assets associated with the Critical Assets that support the reliable operation of the Bulk Electric System. These Critical Assets are to be identified through the application of a risk-based assessment. R1. Critical Asset Identification Method The Responsible Entity (RE) shall identify and document a risk-based assessment methodology to use to identify its Critical Assets. R2. Critical Asset Identification The RE shall develop a list of its identified Critical Assets determined through an annual application of the risk-based assessment methodology required in R1. The RE shall review this list at least annually, and update it as necessary. R3. Critical Cyber Asset Identification Using the list of Critical Assets developed pursuant to Requirement R2, the RE shall develop a list of associated Critical Cyber Assets essential to the operation of the Critical Asset. R4. Annual Approval A senior manager or delegate(s) shall approve annually the list of Critical Assets and the list of Critical Cyber Assets. CIP 003 1 Security Management Controls Standard CIP-003 requires that Responsible Entities have minimum security management controls in place to protect Critical Cyber Assets. R1. Cyber Security Policy The RE shall document and implement a cyber security that represents management s commitment and ability to secure its Critical Cyber Assets. R2. Leadership The RE shall assign a senior manager with overall responsibility for leading and managing the entity s 6.1.2 Information Security Coordination 6.1.1-2. Risk Assessments 6.2.1 Identification of risks related to external parties 14.1.2 Business continuity and risk assessment 15.1.1-6. System Risk Assessments 7.1 RESPONSIBILITY FOR ASSETS. 7.1.1 Inventory of assets 7.1.2 Ownership of assets 7.1.3 Acceptable use of assets 7.2 INFORMATION CLASSIFICATION 7.2.1 Classification guidelines 7.2.2 Information labeling and handling 15.2.1 Compliance with security policies and standards. 15.2.2 Technical compliance checking 5.1.1 Information Security Policy Document 6.1 INTERNAL ORGANIZATION 6.1.1 Management commitment to information security

implementation of, and adherence to, Standards CIP-002 through CIP-009. R3. Exceptions Instances where the RE cannot conform to its cyber security must be documented as exceptions and authorized by the senior manager or delegate(s). R4. Information Protection The RE shall implement and document a program to identify, classify, and protect information associated with Critical Cyber Assets. 6.1.2 Information security co-ordination 6.1.3 Allocation Of Information Security Responsibilities 7.2 Information Classification 7.2.1 Classification Guidelines 7.2.2 Information Labeling And Handling (42 policies) R5. Access Control The RE shall document and implement a program for managing access to protected Critical Cyber Asset information. R6. Change Control and Configuration Management The RE shall establish and document a process of change control and configuration management for adding, modifying, replacing, or removing Critical Cyber Asset hardware or software, and implement supporting configuration management activities to identify, control and document all entity or vendor related changes to hardware and software components of Critical Cyber Assets pursuant to the change control process. 11 Access Control 11.2 User Access Management 11.4 Network Access Control 11.5 Operating System Access Control 11.6 Application and Information Access Control 10.1 OPERATIONAL PROCEDURES AND RESPONSIBILITIES 10.1.1 Documented operating procedures 10.1.2 Change management 10.1.3 Segregation of duties 10.1.4 Separation of development, test, and operational facilities 10.3 SYSTEM PLANNING AND ACCEPTANCE. 10.3.1 Capacity management 10.3.2 System acceptance CIP 004 1 Personnel and Training 8 HUMAN RESOURCES SECURITY R1. Awareness The RE shall establish, maintain, and document a security awareness program to ensure personnel having unescorted physical access receive ongoing reinforcement in sound security practices. R2. Training The RE shall establish, maintain, and document an annual cyber security training program for personnel having unescorted physical access to Critical Cyber Assets, R3. Personnel Risk Assessment The RE shall have a documented personnel risk assessment program, in accordance with federal, state, provincial, and local laws, and subject to existing collective bargaining unit agreements, for personnel having unescorted physical access. R4. Access The RE shall maintain list(s) of personnel with authorized cyber or authorized unescorted physical access to Critical Cyber Assets, including their specific electronic and physical access rights to Critical Cyber Assets. 8.2.2 Information security awareness, education, and training 8.2.2 Information security awareness, education, and training 8.1 PRIOR TO EMPLOYMENT 8.1.1 Roles and responsibilities 8.1.2 Screening 8.1.3 Terms and conditions of employment 8.2 DURING EMPLOYMENT 8.2.1 Management responsibilities 8.2.3 Disciplinary process 8.3.3 Removal of access rights 11.2 User Access Management 11.5.2 User identification and authentication 11.3 USER RESPONSIBILITIES 11.3.1 Password use. 11.3.2 Unattended user equipment

11.3.3 Clear desk and clear screen CIP 005 1 Electronic Security Perimeter(s) 11.4 NETWORK ACCESS CONTROL R1. Electronic Security Perimeter The RE shall ensure that every Critical Cyber Asset resides within an Electronic Security Perimeter. The RE shall identify and document the Electronic Security Perimeter(s) and all access points to the perimeter(s). R2. Electronic Access Controls The RE shall implement and document the organizational processes and technical and procedural mechanisms for control of electronic access at all electronic access points to the Electronic Security Perimeter(s). R3. Monitoring Electronic Access The RE implement and document an electronic or manual process(es) for monitoring and logging access at access points to the Electronic Security Perimeter(s) twenty-four hours a day, seven days a week. R4. Cyber Vulnerability Assessment The RE shall perform a cyber vulnerability assessment of the electronic access points to the Electronic Security Perimeter(s) at least annually. R5. Documentation Review and Maintenance The RE shall review, update, and maintain all documentation to support compliance with the requirements of Standard CIP-005. 11.1.1 Access control 11.4 NETWORK ACCESS CONTROL 11.5 OPERATING SYSTEM ACCESS CONTROL 11.6 APPLICATION AND INFORMATION ACCESS CONTROL 10.10 MONITORING 10.10.1 Audit logging 10.10.2 Monitoring system use 10.10.3 Protection of log information 10.10.4 Administrator and operator logs 10.10.5 Fault logging 10.10.6 Clock synchronization 12.6 TECHNICAL VULNERABILITY 12.6.1 Control of technical vulnerabilities 15.2.2 Technical compliance checking CIP-006-1 Physical Security 9 PHYSICAL AND ENVIRONMENTAL SECURITY R1. Physical Security Plan The RE shall create and maintain a physical security plan, R2. Physical Access Controls The RE shall document and implement the operational and procedural controls to manage physical access at all access points to the Physical Security Perimeter(s) twenty-four hours a day, seven days a week. R3. Monitoring Physical Access The RE shall document technical and procedural controls for monitoring physical access at all access points to the Physical Security Perimeter(s) twenty-four hours a day, seven days a week. R4. Logging Physical Access Logging shall record sufficient information to uniquely identify individuals and the time of access twenty-four hours a day, seven days a week. R5. Access Log Retention The RE shall retain physical access logs for at least ninety calendar days. R6. Maintenance and Testing The RE shall implement a maintenance and testing program to ensure that all physical security systems under Requirements R2, R3, and R4 function properly. CIP 007 1 Systems Security Management 9.1 SECURE AREAS 9.1.1 Physical security perimeter 9.1.3 Securing offices, rooms, and facilities 10. Access Control System Records 12. Physical Access Grantor List 13. Identification Badge Reports 10. Access Control System Records

R1. Test Procedures The RE shall ensure that new Cyber Assets and significant changes to existing Cyber Assets within the Electronic Security Perimeter do not adversely affect existing cyber security controls. R2. Ports and Services The RE shall establish and document a process to ensure that only those ports and services required for normal and emergency operations are enabled. 10.3 SYSTEM PLANNING AND ACCEPTANCE 10.6.1 Network controls R3. Security Patch Management 12.5.2 Technical review of applications after operating system changes 12.5.3 Restrictions on changes to software packages 12.5.4 Information leakage R4. Malicious Software Prevention 10.4 PROTECTION AGAINST MALICIOUS AND MOBILE CODE R5. Account Management shall establish, implement, and document technical and procedural controls that enforce access authentication of, and accountability for, all user activity, and that minimize the risk of unauthorized system access. R5.2. The RE shall implement a to minimize and manage the scope and acceptable use of administrator, shared, and other generic account privileges including factory default accounts. R5. 3 shall require and use passwords, R6. Security Status Monitoring process controls to monitor system events that are related to cyber security. R7. Disposal or Redeployment The RE shall establish formal methods, processes, and procedures for disposal or redeployment of Cyber Assets within the Electronic Security Perimeter(s) as identified and documented in Standard CIP-005. R8. Cyber Vulnerability Assessment The RE shall perform a cyber vulnerability assessment of all Cyber Assets within the Electronic Security Perimeter at least annually. CIP 008 1 R1. Cyber Security Incident Response Plan R2. Cyber Security Incident Documentation Incident Reporting and Response Planning The RE shall develop and maintain a Cyber Security Incident response plan. The RE shall keep relevant documentation related to Cyber Security Incidents reportable per Requirement R1.1 for three calendar years. 11.5 OPERATING SYSTEM ACCESS CONTROL 11.5.1 Secure log-on procedures 11.5.2 User identification and authentication 11.5.3 Password management system 11.5.4 Use of system utilities 11.5.5 Session time-out 11.5.6 Limitation of connection time 11.2 USER ACCESS. 11.2.1 User registration 11.2.2 Privilege management 11.2.3 User password management 10.10.2 Monitoring system use 15.3 INFORMATION SYSTEMS AUDIT CONSIDERATIONS 10.7.1 Management of removable media 10.7.2 Disposal of media 10.7.3 Information handling procedures 10.7.4 Security of system documentation 12.6.1 Control of technical vulnerabilities 13 INFORMATION SECURITY INCIDENT 13.1 REPORTING INFORMATION SECURITY EVENTS AND WEAKNESSES 13.1.1 Reporting information security events 13.1.2 Reporting security weaknesses 13.2 OF INFORMATION SECURITY INCIDENTS AND IMPROVEMENTS 13.2.1 Responsibilities and procedures 13.2.2 Learning from information security incidents 13.2.3 Collection of evidence CIP 009 1 Recovery Plans for Critical Cyber Assets 14 BUSINESS CONTINUITY R1. Recovery Plans The RE shall create and annually 14.1.1 Including information security in the

review recovery plan(s) for Critical Cyber Assets. The recovery plan(s) shall address at a minimum the following: R1.1. Specify the required actions in response to events or conditions of varying duration and severity that would activate the recovery plan(s). R1.2. Define the roles and responsibilities of responders. R2. Exercises The recovery plan(s) shall be exercised at least annually. An exercise of the recovery plan(s) can range from a paper drill, to a full operational exercise, to recovery from an actual incident. R3. Change Control Recovery plan(s) shall be updated to reflect any changes or lessons learned as a result of an exercise or the recovery from an actual incident. R4. Backup and Restore The recovery plan(s) shall include processes and procedures for the backup and storage of information required to successfully restore Critical Cyber Assets. R5. Testing Backup Media Information essential to recovery that is stored on backup media shall be tested at least annually to ensure that the information is available. Testing can be completed off site. business continuity management process 14.1.2 Business continuity and risk assessment 14.1.3 Developing and implementing continuity plans including information security 14.1.4 Business continuity planning framework 14.1.5 Testing, maintaining and reassessing business continuity plans 14.1.5 Testing, maintaining and reassessing business continuity plans 10.5.1 Information back-up 10.5.1 Information back-up All material Copyright 2008, Information Shield, Inc. [1] Information based on material found in Mandatory Reliability Standards for Critical Infrastructure Protection (18 CFR Part 40), available from the Federal Energy Regulatory Commission (FERC). Policy categories based on the ISO 27002 information security standard and the PolicyShield Security Policy Subscription Service.