Presentation is loading. Please wait.

Presentation is loading. Please wait.

NERC Cyber Security Standards Pre-Ballot Review

Similar presentations


Presentation on theme: "NERC Cyber Security Standards Pre-Ballot Review"— Presentation transcript:

1 NERC Cyber Security Standards Pre-Ballot Review

2 Background President’s Commission on Critical Infrastructure Protection PDD-63 SMD NOPR NERC Urgent Action Cyber Security Standards 1200 Joint US-Canada Task Force Report on the August 2003 Blackout National Infrastructure Protection Plan

3 General Numerous comments received on Draft 3 Comments focused on technical issues Comments represented industry consensus

4 General Ensured that requirements are clear and concise. Eliminated redundancy between the standards. Ensured that levels of noncompliance correctly align with the requirements and are auditable. Removed references to IAW/SOP

5 Definitions The definition of Critical Assets was changed to remove the references to “large quantities of customers” and “significant risk to public health and safety.” The new definition is “Facilities, systems, and equipment which, if destroyed, degraded, or otherwise rendered unavailable, would affect the reliability or operability of the Bulk Electric System.”

6 CIP-002 Critical Cyber Asset Identification
List of Required Critical Assets in Requirement 1 was removed. R1 divided into two requirements: “R1. Critical Asset Identification Method” and “R2. Critical Asset Identification.” (New R1 requires Responsible Entities to identify and document a risk-based assessment methodology that shall consider, at a minimum, certain assets as listed in the standard.) R2 requires Responsible Entities to apply the risk-based assessment methodology required in R1 to identify their lists of Critical Assets. The assets listed for consideration no longer contain references to “IROL” or “80% or greater of the largest single contingency within the Regional Reliability Coordinator.”

7 CIP-004 Personnel and Training
The update period for Personnel Risk Assessment was extended to 7 years. The review period was changed to be consistent with the update period. Personnel risk assessments and training no longer need to be completed prior to permitting authorized cyber or authorized unescorted physical access; rather, they must be conducted within 90 calendar days of personnel being granted such access.

8 Other Changes of Significance
CIP-003 – Security Management Controls Provision for emergency situations Removed “test environment” from Change Management CIP-005 – Electronic Security Perimeter(s) Removed requirement for port scanning

9 Implementation Plan for Standards
Implementation plan has been modified to recognize the time necessary to fully implement these standards. New phase of compliance has been added to the tables. Begin Work (BW) has been clarified to mean a Responsible Entity has developed and approved a plan to address the requirements of a standard, has begun to identify and plan for necessary resources, and has begun implementing the requirements. This new phase is “C” for compliance, which means that a Responsible Entity is in compliance with the requirements of the standards, but has not yet had the time necessary to compile a full calendar year’s worth of documentation where necessary.

10 Ballot Process Balloting opens Feb. 17th for ten days
Drafting Team will respond to any negative comments If necessary, recirculation balloting will be conducted Persons interested in voting must be registered to ballot pool by Feb. 17th

11 And now it’s time for your questions and comments.
Larry Bugh Chair, Cyber Security Standards Drafting Team


Download ppt "NERC Cyber Security Standards Pre-Ballot Review"

Similar presentations


Ads by Google