In accordance
with 5 CFR 1320, OMB is filing comment and withholding approval at
this time. The agency shall examine public comment in response to
the proposed rulemaking and will include in the supporting
statement of the next ICR--to be submitted to OMB at the final rule
stage--a description of how the agency has responded to any public
comments on the ICR, including comments on maximizing the practical
utility of the collection and minimizing the burden.
Inventory as of this Action
Requested
Previously Approved
36 Months From Approved
0
0
0
0
0
0
0
0
0
Pursuant to section 215 of the Federal
Power Act (FPA), the Commission proposes to approve Critical
Infrastructure Protection (CIP) Reliability Standard CIP-013-1
(Cyber Security – Supply Chain Risk Management), CIP-005-6 (Cyber
Security --- Electronic Security Perimeters(s)), and CIP-010-3
(Cyber Security --- Configuration Change Management and
Vulnerability Assessments). The North American Electric Reliability
Corporation (NERC), the Commission-certified Electric Reliability
Organization (ERO), submitted proposed Reliability Standards
CIP-013-1, CIP-005-6, and CIP-010-3 in response to directives in
Order No. 829. The proposed reliability standards are intended to
augment the currently effective CIP Reliability Standards in order
to mitigate cybersecurity risks associated with the supply chain
for BES Cyber System. The proposed Reliability Standards CIP-013-1
(Cyber Security – Supply Chain Risk Management), CIP-005-6 (Cyber
Security --- Electronic Security Perimeters(s)), and CIP-010-3
(Cyber Security --- Configuration Change Management and
Vulnerability Assessments) are to be used by NERC registered
entities to mitigate cybersecurity risks associated with the supply
chain for BES Cyber System The NERC Compliance Registry, as of
December 2017, identifies approximately 1,250 unique U.S. entities
that are subject to mandatory compliance with Reliability
Standards. Of this total, we estimate that 288 entities will face
an increased paperwork burden under proposed Reliability Standards
CIP-013-1, CIP-005-6, and CIP-010-3.
As the Commission previously
recognized, the global supply chain provides the opportunity for
significant benefits to customers, including low cost,
interoperability, rapid innovation, a variety of product features
and choice. However, the global supply chain also enables
opportunities for adversaries to directly or indirectly affect the
management or operations of companies that may result in risks to
end users. Supply chain risks may include the insertion of
counterfeits, unauthorized production, tampering, theft, or
insertion of malicious software, as well as poor manufacturing and
development practices. We propose to determine that the supply
chain risk management Reliability Standards submitted by NERC
constitute substantial progress in addressing the supply chain
cyber security risks identified by the Commission. NERC registered
entities that operate applicable systems listed in the Proposed
Reliability Standards CIP-013-1, CIP-005-6, and CIP-010-3 must
develop and implement (1) one or more method(s) for determining
active vendor remote access sessions, (2) one or more method(s) to
disable active vendor remote access, (3) when the method to do so
is available to the Responsible Entity from the software source,
verify the identity of the software source and verify the integrity
of the software obtained from the software source, (4) develop one
or more documented supply chain cyber security risk management
plan(s) for high and medium impact BES Cyber Systems which must
address as applicable (4a) Notification by the vendor of
vendor-identified incidents related to the products or services
provided to the Responsible Entity that pose cyber security risk to
the Responsible Entity, (4b) Coordination of responses to
vendor-identified incidents related to the products or services
provided to the Responsible Entity that pose cyber security risk to
the Responsible Entity, (4c) Notification by vendors when remote or
onsite access should no longer be granted to vendor
representatives, (4d) Disclosure by vendors of known
vulnerabilities related to the products or services provided to the
Responsible Entity, (4e) Verification of software integrity and
authenticity of all software and patches provided by the vendor for
use in the BES Cyber System, (4f) Coordination of controls for (i)
vendor-initiated Interactive Remote Access, and (ii)
system-to-system remote access with a vendor(s), (5) Each
Responsible Entity shall implement its supply chain cyber security
risk management plan(s).
On behalf of this Federal agency, I certify that
the collection of information encompassed by this request complies
with 5 CFR 1320.9 and the related provisions of 5 CFR
1320.8(b)(3).
The following is a summary of the topics, regarding
the proposed collection of information, that the certification
covers:
(i) Why the information is being collected;
(ii) Use of information;
(iii) Burden estimate;
(iv) Nature of response (voluntary, required for a
benefit, or mandatory);
(v) Nature and extent of confidentiality; and
(vi) Need to display currently valid OMB control
number;
If you are unable to certify compliance with any of
these provisions, identify the item by leaving the box unchecked
and explain the reason in the Supporting Statement.