FERC-725B2, (NOPR in RM17-13-000) Mandatory Reliability Standards for Critical Infrastructure Protection [CIP] Reliability Standards

ICR 201801-1902-009

OMB: 1902-0304

Federal Form Document

Forms and Documents
Document
Name
Status
Supporting Statement A
2018-01-30
Supplementary Document
2018-01-30
Supplementary Document
2018-01-30
Supplementary Document
2018-01-30
Supplementary Document
2018-01-30
Supplementary Document
2018-01-30
Supplementary Document
2018-01-30
Supplementary Document
2018-01-30
IC Document Collections
IC ID
Document
Title
Status
229899
New
229894
New
ICR Details
1902-0304 201801-1902-009
Historical Inactive
FERC FERC-725B2
FERC-725B2, (NOPR in RM17-13-000) Mandatory Reliability Standards for Critical Infrastructure Protection [CIP] Reliability Standards
New collection (Request for a new OMB Control Number)   No
Regular
Comment filed on proposed rule 05/10/2018
Retrieve Notice of Action (NOA) 01/30/2018
In accordance with 5 CFR 1320, OMB is filing comment and withholding approval at this time. The agency shall examine public comment in response to the proposed rulemaking and will include in the supporting statement of the next ICR--to be submitted to OMB at the final rule stage--a description of how the agency has responded to any public comments on the ICR, including comments on maximizing the practical utility of the collection and minimizing the burden.
  Inventory as of this Action Requested Previously Approved
36 Months From Approved
0 0 0
0 0 0
0 0 0

Pursuant to section 215 of the Federal Power Act (FPA), the Commission proposes to approve Critical Infrastructure Protection (CIP) Reliability Standard CIP-013-1 (Cyber Security – Supply Chain Risk Management), CIP-005-6 (Cyber Security --- Electronic Security Perimeters(s)), and CIP-010-3 (Cyber Security --- Configuration Change Management and Vulnerability Assessments). The North American Electric Reliability Corporation (NERC), the Commission-certified Electric Reliability Organization (ERO), submitted proposed Reliability Standards CIP-013-1, CIP-005-6, and CIP-010-3 in response to directives in Order No. 829. The proposed reliability standards are intended to augment the currently effective CIP Reliability Standards in order to mitigate cybersecurity risks associated with the supply chain for BES Cyber System. The proposed Reliability Standards CIP-013-1 (Cyber Security – Supply Chain Risk Management), CIP-005-6 (Cyber Security --- Electronic Security Perimeters(s)), and CIP-010-3 (Cyber Security --- Configuration Change Management and Vulnerability Assessments) are to be used by NERC registered entities to mitigate cybersecurity risks associated with the supply chain for BES Cyber System The NERC Compliance Registry, as of December 2017, identifies approximately 1,250 unique U.S. entities that are subject to mandatory compliance with Reliability Standards. Of this total, we estimate that 288 entities will face an increased paperwork burden under proposed Reliability Standards CIP-013-1, CIP-005-6, and CIP-010-3.

US Code: 18 USC 824o Name of Law: Federal Power Act
   PL: Pub.L. 109 - 58 1211, Title XII, Subtitle A Name of Law: Energy Policy Act of 2005
  
None

1902-AF48 Proposed rulemaking 83 FR 3433 01/25/2018

No

2
IC Title Form No. Form Name
RM17-13 NOPR (one-time)
RM17-13 NOPR (ongoing)

Yes
Miscellaneous Actions
No
As the Commission previously recognized, the global supply chain provides the opportunity for significant benefits to customers, including low cost, interoperability, rapid innovation, a variety of product features and choice. However, the global supply chain also enables opportunities for adversaries to directly or indirectly affect the management or operations of companies that may result in risks to end users. Supply chain risks may include the insertion of counterfeits, unauthorized production, tampering, theft, or insertion of malicious software, as well as poor manufacturing and development practices. We propose to determine that the supply chain risk management Reliability Standards submitted by NERC constitute substantial progress in addressing the supply chain cyber security risks identified by the Commission. NERC registered entities that operate applicable systems listed in the Proposed Reliability Standards CIP-013-1, CIP-005-6, and CIP-010-3 must develop and implement (1) one or more method(s) for determining active vendor remote access sessions, (2) one or more method(s) to disable active vendor remote access, (3) when the method to do so is available to the Responsible Entity from the software source, verify the identity of the software source and verify the integrity of the software obtained from the software source, (4) develop one or more documented supply chain cyber security risk management plan(s) for high and medium impact BES Cyber Systems which must address as applicable (4a) Notification by the vendor of vendor-identified incidents related to the products or services provided to the Responsible Entity that pose cyber security risk to the Responsible Entity, (4b) Coordination of responses to vendor-identified incidents related to the products or services provided to the Responsible Entity that pose cyber security risk to the Responsible Entity, (4c) Notification by vendors when remote or onsite access should no longer be granted to vendor representatives, (4d) Disclosure by vendors of known vulnerabilities related to the products or services provided to the Responsible Entity, (4e) Verification of software integrity and authenticity of all software and patches provided by the vendor for use in the BES Cyber System, (4f) Coordination of controls for (i) vendor-initiated Interactive Remote Access, and (ii) system-to-system remote access with a vendor(s), (5) Each Responsible Entity shall implement its supply chain cyber security risk management plan(s).

$5,723
No
    No
    No
No
No
No
Uncollected
Simon Slobodnik 202 502-6707 [email protected]

  No

On behalf of this Federal agency, I certify that the collection of information encompassed by this request complies with 5 CFR 1320.9 and the related provisions of 5 CFR 1320.8(b)(3).
The following is a summary of the topics, regarding the proposed collection of information, that the certification covers:
 
 
 
 
 
 
 
    (i) Why the information is being collected;
    (ii) Use of information;
    (iii) Burden estimate;
    (iv) Nature of response (voluntary, required for a benefit, or mandatory);
    (v) Nature and extent of confidentiality; and
    (vi) Need to display currently valid OMB control number;
 
 
 
If you are unable to certify compliance with any of these provisions, identify the item by leaving the box unchecked and explain the reason in the Supporting Statement.
01/30/2018


© 2024 OMB.report | Privacy Policy