Download:
pdf |
pdfUNITED STATES OF AMERICA
BEFORE THE
FEDERAL ENERGY REGULATORY COMMISSION
North American Electric Reliability
Corporation
)
)
Docket No. _______
PETITION OF THE
NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION
FOR APPROVAL OF PROPOSED RELIABILITY STANDARDS
CIP-004-7 AND CIP-011-3 ADDRESSING BULK ELECTRIC SYSTEM CYBER
SYSTEM INFORMATION ACCESS MANAGEMENT
Lauren Perotti
Senior Counsel
Marisa Hecht
Counsel
North American Electric Reliability
Corporation
1325 G Street, N.W., Suite 600
Washington, D.C. 20005
202-400-3000
[email protected]
[email protected]
Counsel for the North American Electric
Reliability Corporation
September 15, 2021
TABLE OF CONTENTS
I.
SUMMARY ............................................................................................................................ 2
II.
NOTICES AND COMMUNICATIONS ................................................................................ 4
III. BACKGROUND .................................................................................................................... 4
A.
Regulatory Framework ..................................................................................................... 4
B.
NERC Reliability Standards Development Procedure ..................................................... 5
C.
Standard Drafting Team Schedule Directive ................................................................... 6
D.
Development of the Proposed Reliability Standards........................................................ 7
IV. JUSTIFICATION FOR APPROVAL .................................................................................... 8
V.
A.
Proposed Reliability Standard CIP-004-7 ........................................................................ 8
B.
Proposed Reliability Standard CIP-011-3 ...................................................................... 12
C.
Other Modifications ....................................................................................................... 13
D.
Enforceability of Proposed Reliability Standards .......................................................... 14
EFFECTIVE DATE .............................................................................................................. 15
VI. CONCLUSION ..................................................................................................................... 16
Exhibit A
Proposed Reliability Standards
Exhibit B
Implementation Plan
Exhibit C
Order No. 672 Criteria
Exhibit D
Mapping Documents
Exhibit E
Technical Rationale
Exhibit F
Implementation Guidance
Exhibit G
Analysis of Violation Risk Factors and Violation Severity Levels
Exhibit H
Summary of Development History and Complete Record of Development
Exhibit I
Standard Drafting Team Roster
i
UNITED STATES OF AMERICA
BEFORE THE
FEDERAL ENERGY REGULATORY COMMISSION
North American Electric Reliability
Corporation
)
)
Docket No. _______
PETITION OF THE
NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION
FOR APPROVAL OF PROPOSED RELIABILITY STANDARDS
CIP-004-7 AND CIP-011-3 ADDRESSING BULK ELECTRIC SYSTEM CYBER
SYSTEM INFORMATION ACCESS MANAGEMENT
Pursuant to Section 215(d)(1) of the Federal Power Act (“FPA”) 1 and Section 39.5 of the
regulations of the Federal Energy Regulatory Commission (“FERC” or “Commission”), 2 the
North American Electric Reliability Corporation (“NERC”) 3 hereby submits for Commission
approval proposed Reliability Standards CIP-004-7 – Cyber Security – Personnel & Training and
CIP-011-3 – Cyber Security – Information Protection. The proposed Reliability Standards improve
the reliability of the Bulk Electric System (“BES”) by clarifying the protections required regarding
use of third-party solutions for BES Cyber System Information (“BCSI”). NERC requests that the
Commission approve the proposed Reliability Standards, provided in Exhibit A hereto, as just,
reasonable, not unduly discriminatory, or preferential, and in the public interest.
NERC also requests approval of: (1) the associated Implementation Plan (Exhibit B); the
associated Violation Risk Factors (“VRFs”) and Violation Severity Levels (“VSLs”) (Exhibit G);
and the retirement of currently effective Reliability Standards CIP-004-6 and CIP-011-2.
16 U.S.C. § 824o.
18 C.F.R. § 39.5 (2020).
3
The Commission certified NERC as the electric reliability organization (“ERO”) in accordance with
Section 215 of the FPA. N. Am. Elec. Reliability Corp., 116 FERC ¶ 61,062 (2006) [hereinafter ERO Certification
Order].
1
2
1
As required by Section 39.5(a) of the Commission’s regulations, 4 this petition presents the
technical basis and purpose of the proposed Reliability Standards, a summary of the development
history (Exhibit H), and a demonstration that the proposed Reliability Standards meet the criteria
identified by the Commission in Order No. 672 5 (Exhibit C). The NERC Board of Trustees
adopted the proposed Reliability Standards on August 12, 2021.
I.
SUMMARY
The suite of Critical Infrastructure Protection (“CIP”) Reliability Standards require
protections around BES Cyber Systems, the most critical cyber devices on the electric grid. As
defined in the NERC Glossary of Terms used in Reliability Standards (“NERC Glossary”), BCSI
is “[i]nformation about the BES Cyber System that could be used to gain unauthorized access or
pose a security threat to the BES Cyber System.” 6 Given the importance of BCSI, Responsible
Entities must control access to this information. In currently effective Reliability Standards CIP004-6 and CIP-011-2, Responsible Entities do this by managing access to the “designated storage
location” of BCSI, such as an electronic document or physical file room. However, as technology
has evolved, third-party services, such as cloud services, have become a viable and safe option for
storing BCSI. The protections available for Responsible Entities to secure information in the cloud,
18 C.F.R. § 39.5(a).
Rules Concerning Certification of the Electric Reliability Organization; and Procedures for the
Establishment, Approval, and Enforcement of Electric Reliability Standards, Order No. 672, 114 FERC 61,104 at
PP 262, 321-37 (2006) [hereinafter Order No. 672], order on reh’g, Order No. 672-A, 114 FERC 61,328 (2006).
6
The rest of the definition also states:
BES Cyber System Information does not include individual pieces of information that by themselves
do not pose a threat or could not be used to allow unauthorized access to BES Cyber Systems, such
as, but not limited to, device names, individual IP addresses without context, ESP names, or policy
statements. Examples of BES Cyber System Information may include, but are not limited to, security
procedures or security information about BES Cyber Systems, Physical Access Control Systems,
and Electronic Access Control or Monitoring Systems that is not publicly available and could be
used to allow unauthorized access or unauthorized distribution; collections of network addresses;
and network topology of the BES Cyber System.
The NERC Glossary is available at
https://www.nerc.com/pa/Stand/Glossary%20of%20Terms/Glossary_of_Terms.pdf.
4
5
2
for example, depend less on the actual storage location of the information and more on file-level
rights and permissions. As a result, the revisions in proposed Reliability Standards CIP-004-7 and
CIP-011-3 would allow Responsible Entities to leverage these protections within their control for
third-party data storage and analysis systems.
To that end, proposed CIP-004-7, which pertains to personnel and training, includes the
following modifications:
•
Removes references to “designated storage locations” of BCSI;
•
Adds Requirement R6 regarding an access management program to authorize, verify,
and revoke provisioned access to BCSI; and
•
Other minor clarifications to update the standard.
Proposed Reliability Standard CIP-011-3, which pertains to information protection,
includes the following modifications:
•
Clarifies requirements regarding protecting and securely handling BCSI; and
•
Other minor clarifications to update the standard.
The proposed Reliability Standards maintain the security objectives supported in previous
versions while providing flexibility for Responsible Entities to leverage third-party data storage
and analysis systems. As such, the Commission should approve the proposed Reliability Standards
as just, reasonable, not unduly discriminatory, or preferential, and in the public interest.
3
II.
NOTICES AND COMMUNICATIONS
Notices and communications with respect to this filing may be addressed to the following: 7
Lauren Perotti*
Senior Counsel
Marisa Hecht*
Counsel
North American Electric Reliability
Corporation
1325 G Street, N.W.
Suite 600
Washington, D.C. 20005
202-400-3000
[email protected]
[email protected]
III.
Howard Gugel*
Vice President, Engineering and Standards
North American Electric Reliability
Corporation
3353 Peachtree Road, N.E.
Suite 600, North Tower
Atlanta, GA 30326
404-446-2560
[email protected]
BACKGROUND
A.
Regulatory Framework
By enacting the Energy Policy Act of 2005, 8 Congress entrusted the Commission with the
duties of approving and enforcing rules to ensure the reliability of the Bulk-Power System, and
with the duty of certifying an ERO that would be charged with developing and enforcing
mandatory Reliability Standards, subject to Commission approval. Section 215(b)(1) of the FPA
states that all users, owners, and operators of the Bulk-Power System in the United States will be
subject to Commission-approved Reliability Standards. 9 Section 215(d)(5) of the FPA authorizes
the Commission to order the ERO to submit a new or modified Reliability Standard. 10 Section
39.5(a) of the Commission’s regulations requires the ERO to file for Commission approval each
Reliability Standard that the ERO proposes should become mandatory and enforceable in the
Persons to be included on the Commission’s service list are identified by an asterisk. NERC respectfully
requests a waiver of Rule 203 of the Commission’s regulations, 18 C.F.R. § 385.203, to allow the inclusion of more
than two persons on the service list in this proceeding.
8
16 U.S.C. § 824o.
9
Id. § 824o(b)(1).
10
Id. § 824o(d)(5).
7
4
United States, and each modification to a Reliability Standard that the ERO proposes to make
effective. 11
The Commission has the regulatory responsibility to approve Reliability Standards that
protect the reliability of the Bulk-Power System and to ensure that such Reliability Standards are
just, reasonable, not unduly discriminatory, or preferential, and in the public interest. Pursuant to
Section 215(d)(2) of the FPA and Section 39.5(c) of the Commission’s regulations, the
Commission will give due weight to the technical expertise of the ERO with respect to the content
of a Reliability Standard. 12
B.
NERC Reliability Standards Development Procedure
The proposed Reliability Standards were developed in an open and fair manner and in
accordance with the Commission-approved Reliability Standard development process. 13 NERC
develops Reliability Standards in accordance with Section 300 (Reliability Standards
Development) of its Rules of Procedure and the NERC Standard Processes Manual. 14 In its ERO
Certification Order, the Commission found that NERC’s proposed rules provide for reasonable
notice and opportunity for public comment, due process, openness, and a balance of interests in
developing Reliability Standards and thus satisfies certain criteria for approving Reliability
Standards. 15 The development process is open to any person or entity with a legitimate interest in
the reliability of the Bulk-Power System. NERC considers the comments of all stakeholders.
18 C.F.R. § 39.5(a).
16 U.S.C. § 824o(d)(2); 18 C.F.R. § 39.5(c)(1).
13
Order No. 672 at P 334.
14
The NERC Rules of Procedure are available at https://www.nerc.com/AboutNERC/Pages/Rules-ofProcedure.aspx. The NERC Standard Processes Manual is available at
https://www.nerc.com/comm/SC/Documents/Appendix_3A_StandardsProcessesManual.pdf.
15
ERO Certification Order at P 250.
11
12
5
Further, a vote of stakeholders and adoption by the NERC Board of Trustees is required before
NERC submits the Reliability Standard to the Commission for approval.
C.
Standard Drafting Team Schedule Directive
In an order issued on February 20, 2020, the Commission directed NERC to submit an
informational filing outlining the project schedules for Projects 2016-02 16 and 2019-02. 17 Pursuant
to paragraph 5 of the Schedules Order, 18 the Commission stated that these schedules should
include the status of the projects, interim target dates, and the anticipated filing date for new or
modified Reliability Standards. In addition, the Commission directed NERC to file quarterly
informational status updates, beginning in June 2020, until NERC files new or modified standards
with the Commission. 19
NERC provided the initial informational filing regarding the schedules on March 19,
2020 20 and four additional quarterly informational filings with updated schedules on June 19,
2020, 21 September 17, 2020, 22 December 15, 2020, 23 March 15, 2021, 24 and June 15, 2021. 25
16
Project 2016-02 – Modifications to CIP Standards focuses on modifications to the suite of CIP Reliability
Standards to incorporate applicable protections for virtualized environments.
17
N. Am. Elec. Reliability Corp., “Order Directing Informational Filings Regarding NERC Standard Drafting
Projects,” 170 FERC ¶ 61,109 (Feb. 20, 2020) [hereinafter Schedules Order].
18
Id.
19
Id.
20
NERC, Informational Filing of NERC Regarding Standards Development Projects, Docket No. RD20-2000 (March 19, 2020).
21
NERC, Informational Filing of NERC Regarding Standards Development Projects, Docket No. RD20-2000 (June 19, 2020).
22
NERC, Informational Filing of NERC Regarding Standards Development Projects, Docket No. RD20-2000 (September 17, 2020).
23
NERC, Informational Filing of NERC Regarding Standards Development Projects, Docket No. RD20-2000 (December 15, 2020).
24
NERC, Informational Filing of NERC Regarding Standards Development Projects, Docket No. RD20-2000 (March 15, 2021).
25
NERC, Informational Filing of NERC Regarding Standards Development Projects, Docket No. RD20-2000 (June 15, 2021).
6
NERC also provided a supplemental informational filing on November 13, 2020. 26 This petition
will conclude the updates for Project 2019-02. 27
D.
Development of the Proposed Reliability Standards
As further described in Exhibit H hereto, NERC initiated a Reliability Standard
development project, Project 2019-02 BES Cyber System Information Access Management
(“Project 2019-02”), and appointed a standard drafting team (Exhibit I) to develop the revisions.
This project was initiated due to the work of an informal team, in collaboration with the NERC
Compliance Input Working Group, 28 to review the use of encryption on BCSI and its impact on
compliance with NERC Reliability Standards.
On December 20, 2019, NERC posted the initial drafts of proposed Reliability Standards
CIP-004-7 and CIP-011-3 for a 45-day comment period and ballot. The initial ballot did not receive
the requisite approval from the registered ballot body (“RBB”). After considering comments to the
initial drafts, NERC posted second drafts of the proposed Reliability Standards for another 45-day
comment period and ballot on August 6, 2020. The second drafts did not receive the requisite
approval from the RBB. On March 25, 2021, NERC posted the third drafts of the proposed
Reliability Standards after considering comments on the second drafts. The third drafts received
the requisite approval from the RBB with an affirmative vote of 83.75 percent at 84.31 quorum for
proposed CIP-004-7 and an affirmative vote of 81.39 percent at 84.62 quorum for proposed CIP-
NERC, Supplemental Informational Filing of NERC Regarding Standards Development Projects, Docket
No. RD20-2-000 (November 13, 2020).
27
As directed, NERC will continue to file updates on Project 2016-02 until those revisions are filed in a
petition for approval.
28
The Compliance Input Working Group was a subgroup of the now-disbanded NERC Critical Infrastructure
Protection Committee, a stakeholder technical committee.
26
7
011-3. 29 On June 2, 2021, NERC conducted a 10-day final ballot for the proposed Reliability
Standards, which received an affirmative vote of 85.8 percent at 86.5 quorum for proposed CIP004-7 and an affirmative vote of 83 percent at 86.81 quorum for proposed CIP-011-3. 30 The NERC
Board of Trustees adopted the proposed Reliability Standards on August 12, 2021.
IV.
JUSTIFICATION FOR APPROVAL
As discussed below and in Exhibit C, the proposed Reliability Standards would enhance
reliability by providing increased options for entities to leverage third-party data storage and
analysis systems in a secure manner, and are just, reasonable, not unduly discriminatory, or
preferential, and in the public interest. The proposed revisions clarify the protections expected
when using third-party solutions (e.g., cloud services). The following section discusses the
revisions to the standards:
•
proposed Reliability Standard CIP-004-7 (Subsection A);
•
proposed Reliability Standard CIP-011-3 (Subsection B); and
•
other modifications (Subsection C).
This section concludes with a discussion of the enforceability of the proposed Reliability Standards
(Subsection D).
A.
Proposed Reliability Standard CIP-004-7
As in currently effective Reliability Standard CIP-004-6, proposed Reliability Standard
CIP-004-7 continues to include requirements that govern personnel risk assessment, training,
security awareness, and access management in support of BES Cyber System security. The
29
The third drafts of the standards were posted as CIP-004-X and CIP-011-X because they were posted
simultaneously with other proposed revisions to those standards as a part of Project 2016-02 Modifications to CIP
Standards.
30
The final drafts of the standards were posted as CIP-004-X and CIP-011-X because they were posted
simultaneously with other proposed revisions to those standards as a part of Project 2016-02 Modifications to CIP
Standards.
8
revisions in proposed CIP-004-7 include a new requirement on provisioned access to BCSI that
consolidates access requirements previously spread throughout CIP-004-6. Proposed Reliability
Standard CIP-004-7 includes six requirements: (1) Requirement R1 requires a Responsible Entity
to implement a documented security awareness process for high and medium impact BES Cyber
Systems that reinforces cyber security practices for certain personnel; (2) Requirement R2 requires
Responsible Entities to implement a cyber security training program that includes the applicable
requirement parts; (3) Requirement R3 requires a documented personnel risk assessment
program(s); (4) Requirement R4 requires a documented access management program(s) that
includes the applicable requirement parts; (5) Requirement R5 requires a documented access
revocation program(s) that includes the applicable requirement parts; and (6) Requirement R6 is a
new requirement that requires an access management program(s) to authorize, verify, and revoke
provisioned access to BCSI that includes the applicable requirement parts.
The proposed revisions in CIP-004-7 center on removing references to “designated storage
locations” and focusing the requirements on provisioned access to the BCSI, not just on where it
is stored. This change permits entities to implement file-level rights and permissions, such as
policy-based credentials or encryption, to manage access to BCSI. Provisioned access, while not
proposed as a term in the NERC Glossary, is well understood among subject matter experts.
Nevertheless, Requirement R6 clarifies that: “Provisioned access is to be considered the result of
the specific actions taken to provide an individual(s) the means to access BCSI (e.g., may include
physical keys or access cards, user accounts and associated rights and privileges, encryption
keys).” For example, an individual with encrypted BCSI but no encryption key has not been
granted provisioned access to that BCSI because the Responsible Entity has not taken the step to
give this individual the encryption key. Furthermore, while the individual has obtained the BCSI,
9
the individual lacks the ability to use the BCSI without the key. Therefore, that individual does not
have access to BCSI. Each Responsible Entity has its own process to grant provisioned access to
individuals, and the concept of “provisioned access” in Requirement R6 is referring to the
Responsible Entity’s process.
Proposed CIP-004-7 includes revisions that eliminate the “designated storage locations”
concept in order to facilitate more appropriate protections for using third-parties. To eliminate
references to “designated storage locations,” Requirement Part 4.4, 31 Part 5.3, 32 and subpart 4.1.3,
from CIP-004-6 have been deleted in proposed CIP-004-7 and are incorporated into the new
Requirement R6 on provisioned access, as described further below. 33 This centralizes all BCSI
access requirements in the standard into one, new requirement. The proposed revised Part 4.1 with
the deletion of subpart 4.1.3 reads as follows, in blackline:
4.1
Process to authorize based on need, as determined by the Responsible Entity, except
for CIP Exceptional Circumstances:
4.1.1
Electronic access; and
4.1.2
Unescorted physical access into a Physical Security Perimeter; and
4.1.3
Access to designated storage locations, whether physical or electronic, for
BES Cyber System Information.
Proposed new Requirement R6 applies to high impact BES Cyber Systems; medium impact
BES Cyber Systems with External Routable Connectivity; and Electronic Access Control or
The deleted Part 4.4 from CIP-004-6 reads as follows: Verify at least once every 15 calendar months that
access to the designated storage locations for BES Cyber System Information, whether physical or electronic, are
correct and are those that the Responsible Entity determines are necessary for performing assigned work functions.
32
The deleted Part 5.3 from CIP-004-6 reads as follows: For termination actions, revoke the individual’s
access to the designated storage locations for BES Cyber System Information, whether physical or electronic (unless
already revoked according to Requirement R5.1), by the end of the next calendar day following the effective date of
the termination action.
33
Requirement 5.4 in CIP-004-6 becomes Requirement 5.3 in proposed CIP-004-7 as a result of this deletion.
31
10
Monitoring Systems (“EACMS”) and Physical Access Control Systems (“PACS”) associated with
these high and medium BES Cyber Systems. Proposed new Requirement R6 reads as follows:
R6.
Each Responsible Entity shall implement one or more documented access
management program(s) to authorize, verify, and revoke provisioned access
to BCSI pertaining to the “Applicable Systems” identified in CIP-004-7
Table R6 – Access Management for BES Cyber System Information that
collectively include each of the applicable requirement parts in CIP-004-7
Table R6 – Access Management for BES Cyber System Information. To be
considered access to BCSI in the context of this requirement, an individual
has both the ability to obtain and use BCSI. Provisioned access is to be
considered the result of the specific actions taken to provide an individual(s)
the means to access BCSI (e.g., may include physical keys or access cards,
user accounts and associated rights and privileges, encryption keys).
[Violation Risk Factor: Medium] [Time Horizon: Same Day Operations
and Operations Planning].
There are three new requirement parts within Requirement R6. Proposed Part 6.1 requires
Responsible Entities to authorize provisioned electronic access and provisioned physical access to
BCSI. Proposed Part 6.2 incorporates into the access management program the deleted Part 4.4
obligations to verify individuals with provisioned access are still appropriate. Finally, proposed
Part 6.3 incorporates into the provisioned access program the deleted Part 5.3 obligation to remove
an individual’s ability to use provisioned access to BCSI for a termination action. Proposed Parts
6.1, 6.2, and 6.3 provide as follows:
6.1
Prior to provisioning, authorize (unless already authorized according to Part
4.1) based on need, as determined by the Responsible Entity, except for CIP
Exceptional Circumstances:
6.1.1. Provisioned electronic access to electronic BCSI; and
6.1.2. Provisioned physical access to physical BCSI.
6.2
Verify at least once every 15 calendar months that all individuals with
provisioned access to BCSI:
6.2.1. have an authorization record; and
6.2.2. still need the provisioned access to perform their current work
functions, as determined by the Responsible Entity.
11
6.3
For termination actions, remove the individual’s ability to use provisioned
access to BCSI (unless already revoked according to Part 5.1) by the end of
the next calendar day following the effective date of the termination action.
B.
Proposed Reliability Standard CIP-011-3
Proposed Reliability Standard CIP-011-3 addresses information protection of BCSI and
includes two requirements. Proposed Requirement R1 requires Responsible Entities to implement
a documented information protection program(s) that includes the applicable requirement parts.
Proposed Requirement R2 requires Responsible Entities to implement documented processes
regarding BES Cyber Asset reuse and disposal, consistent with the applicable requirement parts.
Proposed Requirement R1 includes the only substantive modifications to CIP-011-3, which are
shown in blackline below:
R1.
Each Responsible Entity shall implement one or more documented
information protection program(s) for BES Cyber System Information
(BCSI) pertaining to “Applicable Systems” identified in CIP-011-3
Table R1 – Information Protection Program that collectively includes
each of the applicable requirement parts in CIP-011-23 Table R1 –
Information Protection Program. [Violation Risk Factor: Medium] [Time
Horizon: Operations Planning].
The language added to Requirement R1 helps scope the applicability of the requirement
parts to the BCSI pertaining to the systems listed in the applicability column of Table R1 –
Information Protection Program. This clarifies the intent of the requirement to place protections
around the BCSI, regardless of its storage location. This revision permits Responsible Entities to
leverage more appropriate protections for use with third parties.
Within Requirement R1, proposed CIP-011-3 Table R1 – Information Protection Program
includes two modified requirement parts. Proposed Parts 1.1 and 1.2 apply to high and medium
impact BES Cyber Systems and their associated EACMS and PACS. Proposed Parts 1.1 and 1.2
provide as follows, in blackline:
12
1.1
Method(s) to identify BCSI information that meets the definition of BES
Cyber System Information.
1.2
Procedure(s) for protecting and Method(s) to protect and securely
handleing BCSI to mitigate the risks of compromising confidentiality
BES Cyber System Information, including storage, transit, and use.
The proposed changes to Parts 1.1 and 1.2 clarify and simplify the requirement language.
Proposed Part 1.1 removes redundant language. Proposed Part 1.2 includes more objective-level
language to once again focus the protections on the BCSI itself. The proposed objective of Part
1.2 is “to mitigate the risks of compromising confidentiality.” The intent of proposed Part 1.2 is to
protect BCSI from unauthorized access no matter where the BCSI is located or its state (i.e., in
storage, transit, or use). Therefore, in focusing protections on preserving confidentiality, the
requirements in proposed CIP-011-3 help ensure that BCSI is protected regardless of the location
of the BCSI.
C.
Other Modifications
The proposed Reliability Standards also contain a number of minor modifications to align
the standards with revisions to other standards or initiatives in other areas. These changes are
shown in redline in Exhibit A and are summarized below.
First, the Interchange Coordinator or Interchange Authority is removed from the
Applicability section of the proposed Reliability Standards. This revision is consistent with FERCapproved changes to the NERC Compliance Registry under the risk-based registration initiative. 34
N. Am. Elec. Reliability Corp., 150 FERC ¶ 61,213 (2015) (approving removal of the Purchasing-Selling
Entity and Interchange Authority/Coordinator from the NERC Compliance Registry).
34
13
Second, the term “Special Protection Systems” has been replaced in the Applicability
section of the proposed Reliability Standards with the term “Remedial Action Schemes,”
consistent with similar revisions made to other NERC Reliability Standards. 35
Third, the acronym for BES Cyber System Information, BCSI, has replaced all references
to BES Cyber System Information except in certain circumstances, such as first use of the term
and in headers of some tables. Responsible Entities often use the acronym BCSI when
implementing these requirements. As such, the standard drafting team determined to incorporate
the acronym to better reflect usage in industry.
Additionally, the proposed Reliability Standards include other minor modifications to the
non-enforceable sections of the standard.
D.
Enforceability of Proposed Reliability Standards
The proposed Reliability Standards also include measures that support each requirement
by clearly identifying what is required and how the ERO will enforce the requirement. These
measures help ensure that the requirements will be enforced in a clear, consistent, and nonpreferential manner and without prejudice to any party. 36 Additionally, the proposed Reliability
Standards include VRFs and VSLs. The VRFs and VSLs provide guidance on the way that NERC
will enforce the requirements of the proposed Reliability Standards. The VRFs and VSLs for the
proposed Reliability Standards comport with NERC and Commission guidelines related to their
assignment. Exhibit G provides a detailed review of the VRFs and VSLs, and the analysis of how
the VRFs and VSLs were determined using these guidelines.
In Order No. 818, the Commission approved NERC’s revised definition of the term “Remedial Action
Scheme” and approved certain Reliability Standards in which references to the term “Special Protections Systems”
were removed and replaced with the term “Remedial Action Schemes.” Revisions to Emergency Operations
Reliability Standards; Revisions to Undervoltage Load Shedding Reliability Standards; Revisions to the Definition
of “Remedial Action Scheme” and Related Reliability Standards, Order No. 818, 153 FERC ¶ 61,228 (2015).
35
36
Order No. 672 at P 327.
14
V.
EFFECTIVE DATE
NERC respectfully requests that the Commission approve the proposed Reliability
Standards to become effective as set forth in the proposed Implementation Plan, provided in
Exhibit B hereto. The proposed Implementation Plan provides that the proposed Reliability
Standards shall become effective on the first day of the first calendar quarter that is 24 calendar
months after the effective date of the Commission’s order approving the proposed Reliability
Standards. The 24-month implementation period is designed to afford Responsible Entities
sufficient time to implement electronic technical mechanisms to mitigate the risk of unauthorized
access to BCSI when Responsible Entities elect to use vendor services; establish or modify vendor
relationships to ensure compliance with the new and revised requirements in proposed CIP-004-7
and CIP-011-3; and make the necessary administrative changes, such as revising their information
protection programs to incorporate the new requirements.
The proposed Implementation Plan also permits Responsible Entities to elect to comply
with proposed CIP-004-7 and CIP-011-3 following Commission approval but prior to the
standards’ effective date, provided the Responsible Entity notifies its applicable Regional Entities.
Some Responsible Entities desire to use third party services for BCSI sooner than the effective
date, and early adoption of CIP-004-7 and CIP-011-3 would allow Responsible Entities to
implement the appropriate controls commensurate with third-party use.
15
VI.
CONCLUSION
For the reasons set forth above, NERC respectfully requests that the Commission approve:
•
proposed Reliability Standards CIP-004-7, and CIP-011-3, and associated elements
included in Exhibit A, effective as proposed herein;
•
the proposed Implementation Plan included in Exhibit B; and
•
the retirement of Reliability Standards CIP-004-6 and CIP-011-2, effective as
proposed herein.
Respectfully submitted,
/s/ Marisa Hecht
Lauren Perotti
Senior Counsel
Marisa Hecht
Counsel
North American Electric Reliability Corporation
1325 G Street, N.W., Suite 600
Washington, D.C. 20005
202-400-3000
[email protected]
[email protected]
Counsel for the North American Electric Reliability Corporation
Date: September 15, 2021
16
Exhibit A
Proposed Reliability Standards
RELIABILITY | RESILIENCE | SECURITY
Exhibit A-1
CIP-004-7
Clean
RELIABILITY | RESILIENCE | SECURITY
CIP-004-7 — Cyber Security – Personnel & Training
A. Introduction
1. Title:
Cyber Security — Personnel & Training
2. Number:
CIP-004-7
3. Purpose: To minimize the risk against compromise that could lead to misoperation or
instability in the Bulk Electric System (BES) from individuals accessing BES Cyber Systems by
requiring an appropriate level of personnel risk assessment, training, security awareness,
and access management in support of protecting BES Cyber Systems.
4. Applicability:
4.1.
Functional Entities: For the purpose of the requirements contained herein, the
following list of functional entities will be collectively referred to as “Responsible
Entities.” For requirements in this standard where a specific functional entity or
subset of functional entities are the applicable entity or entities, the functional
entity or entities are specified explicitly.
4.1.1. Balancing Authority
4.1.2. Distribution Provider that owns one or more of the following Facilities,
systems, and equipment for the protection or restoration of the BES:
4.1.2.1. Each underfrequency Load shedding (UFLS) or undervoltage Load
shedding (UVLS) system that:
4.1.2.1.1. is part of a Load shedding program that is subject to one
or more requirements in a NERC or Regional Reliability
Standard; and
4.1.2.1.2. performs automatic Load shedding under a common
control system owned by the Responsible Entity, without
human operator initiation, of 300 MW or more.
4.1.2.2. Each Remedial Action Scheme (RAS) where the RAS is subject to one
or more requirements in a NERC or Regional Reliability Standard.
4.1.2.3. Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.1.2.4. Each Cranking Path and group of Elements meeting the initial
switching requirements from a Blackstart Resource up to and
including the first interconnection point of the starting station
service of the next generation unit(s) to be started.
4.1.3. Generator Operator
4.1.4. Generator Owner
4.1.5. Reliability Coordinator
Page 1 of 31
CIP-004-7 — Cyber Security – Personnel & Training
4.1.6. Transmission Operator
4.1.7. Transmission Owner
4.2.
Facilities: For the purpose of the requirements contained herein, the following
Facilities, systems, and equipment owned by each Responsible Entity in 4.1 above
are those to which these requirements are applicable. For requirements in this
standard where a specific type of Facilities, system, or equipment or subset of
Facilities, systems, and equipment are applicable, these are specified explicitly.
4.2.1. Distribution Provider: One or more of the following Facilities, systems and
equipment owned by the Distribution Provider for the protection or
restoration of the BES:
4.2.1.1. Each UFLS or UVLS System that:
4.2.1.1.1. is part of a Load shedding program that is subject to one
or more requirements in a NERC or Regional Reliability
Standard; and
4.2.1.1.2. performs automatic Load shedding under a common
control system owned by the Responsible Entity, without
human operator initiation, of 300 MW or more.
4.2.1.2. Each RAS where the RAS is subject to one or more requirements in a
NERC or Regional Reliability Standard.
4.2.1.3. Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.2.1.4. Each Cranking Path and group of Elements meeting the initial
switching requirements from a Blackstart Resource up to and
including the first interconnection point of the starting station
service of the next generation unit(s) to be started.
4.2.2. Responsible Entities listed in 4.1 other than Distribution Providers: All BES
Facilities.
4.2.3. Exemptions: The following are exempt from Standard CIP-004-7:
4.2.3.1. Cyber Assets at Facilities regulated by the Canadian Nuclear Safety
Commission.
4.2.3.2. Cyber Assets associated with communication networks and data
communication links between discrete Electronic Security
Perimeters.
4.2.3.3. The systems, structures, and components that are regulated by the
Nuclear Regulatory Commission under a cyber security plan pursuant
to 10 C.F.R. Section 73.54.
Page 2 of 31
CIP-004-7 — Cyber Security – Personnel & Training
4.2.3.4. For Distribution Providers, the systems and equipment that are not
included in section 4.2.1 above.
4.2.3.5. Responsible Entities that identify that they have no BES Cyber
Systems categorized as high impact or medium impact according to
the CIP-002-5.1a identification and categorization processes.
5. Effective Dates: See Implementation Plan for CIP-004-7.
6. Background: Standard CIP-004 exists as part of a suite of CIP Standards related to cyber
security, which require the initial identification and categorization of BES Cyber Systems and
require a minimum level of organizational, operational, and procedural controls to mitigate
risk to BES Cyber Systems.
Most requirements open with, “Each Responsible Entity shall implement one or more
documented [processes, plan, etc.] that include the applicable items in [Table Reference].”
The referenced table requires the applicable items in the procedures for the common
subject matter of the requirements.
The term documented processes refers to a set of required instructions specific to the
Responsible Entity and to achieve a specific outcome. This term does not imply any
particular naming or approval structure beyond what is stated in the requirements. An
entity should include as much as it believes necessary in its documented processes, but it
must address the applicable requirements in the table.
The terms program and plan are sometimes used in place of documented processes where it
makes sense and is commonly understood. For example, documented processes describing
a response are typically referred to as plans (i.e., incident response plans and recovery
plans). Likewise, a security plan can describe an approach involving multiple procedures to
address a broad subject matter.
Similarly, the term program may refer to the organization’s overall implementation of its
policies, plans and procedures involving a subject matter. Examples in the standards
include the personnel risk assessment program and the personnel training program. The
full implementation of the CIP Cyber Security Standards could also be referred to as a
program. However, the terms program and plan do not imply any additional requirements
beyond what is stated in the standards.
Responsible Entities can implement common controls that meet requirements for multiple
high and medium impact BES Cyber Systems. For example, a single training program could
meet the requirements for training personnel across multiple BES Cyber Systems.
Measures for the initial requirement are simply the documented processes themselves.
Measures in the table rows provide examples of evidence to show documentation and
implementation of applicable items in the documented processes. These measures serve to
provide guidance to entities in acceptable records of compliance and should not be viewed
Page 3 of 31
CIP-004-7 — Cyber Security – Personnel & Training
as an all-inclusive list.
Throughout the standards, unless otherwise stated, bulleted items in the requirements and
measures are items that are linked with an “or,” and numbered items are items that are
linked with an “and.”
Many references in the Applicability section use a threshold of 300 MW for UFLS and UVLS.
This particular threshold of 300 MW for UVLS and UFLS was provided in Version 1 of the CIP
Cyber Security Standards. The threshold remains at 300 MW since it is specifically
addressing UVLS and UFLS, which are last ditch efforts to save the BES. A review of UFLS
tolerances defined within regional reliability standards for UFLS program requirements to
date indicates that the historical value of 300 MW represents an adequate and reasonable
threshold value for allowable UFLS operational tolerances.
“Applicable Systems” Columns in Tables:
Each table has an “Applicable Systems” column to further define the scope of systems to
which a specific requirement row applies. The CSO706 SDT adapted this concept from the
National Institute of Standards and Technology (“NIST”) Risk Management Framework as a
way of applying requirements more appropriately based on impact and connectivity
characteristics. The following conventions are used in the “Applicable Systems” column as
described.
•
High Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as high
impact according to the CIP-002-5.1a identification and categorization processes.
•
Medium Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as
medium impact according to the CIP-002-5.1a identification and categorization
processes.
•
Medium Impact BES Cyber Systems with External Routable Connectivity – Only applies
to medium impact BES Cyber Systems with External Routable Connectivity. This also
excludes Cyber Assets in the BES Cyber System that cannot be directly accessed through
External Routable Connectivity.
•
Electronic Access Control or Monitoring Systems (EACMS) – Applies to each Electronic
Access Control or Monitoring System associated with a referenced high impact BES
Cyber System or medium impact BES Cyber System. Examples may include, but are not
limited to, firewalls, authentication servers, and log monitoring and alerting systems.
•
Physical Access Control Systems (PACS) – Applies to each Physical Access Control
System associated with a referenced high impact BES Cyber System or medium impact
BES Cyber System with External Routable Connectivity.
Page 4 of 31
CIP-004-7 — Cyber Security – Personnel & Training
B. Requirements and Measures
R1. Each Responsible Entity shall implement one or more documented processes that collectively include each of the
applicable requirement parts in CIP-004-7 Table R1 – Security Awareness Program. [Violation Risk Factor: Lower] [Time
Horizon: Operations Planning]
M1. Evidence must include each of the applicable documented processes that collectively include each of the applicable
requirement parts in CIP-004-7 Table R1 – Security Awareness Program and additional evidence to demonstrate
implementation as described in the Measures column of the table.
CIP-004-7 Table R1 – Security Awareness Program
Part
1.1
Applicable Systems
High Impact BES Cyber Systems
Medium Impact BES Cyber Systems
Requirements
Security awareness that, at least once
each calendar quarter, reinforces cyber
security practices (which may include
associated physical security practices)
for the Responsible Entity’s personnel
who have authorized electronic or
authorized unescorted physical access
to BES Cyber Systems.
Measures
An example of evidence may include,
but is not limited to, documentation
that the quarterly reinforcement has
been provided. Examples of evidence
of reinforcement may include, but are
not limited to, dated copies of
information used to reinforce security
awareness, as well as evidence of
distribution, such as:
•
•
•
direct communications (for
example, e-mails, memos,
computer-based training); or
indirect communications (for
example, posters, intranet, or
brochures); or
management support and
reinforcement (for example,
presentations or meetings).
Page 5 of 31
CIP-004-7 — Cyber Security – Personnel & Training
R2. Each Responsible Entity shall implement one or more cyber security training program(s) appropriate to individual roles,
functions, or responsibilities that collectively includes each of the applicable requirement parts in CIP-004-7 Table R2 –
Cyber Security Training Program. [Violation Risk Factor: Lower] [Time Horizon: Operations Planning]
M2. Evidence must include the training program that includes each of the applicable requirement parts in CIP-004-7 Table R2 –
Cyber Security Training Program and additional evidence to demonstrate implementation of the program(s).
CIP-004-7 Table R2 – Cyber Security Training Program
Part
2.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Requirements
Training content on:
2.1.1. Cyber security policies;
2.1.2. Physical access controls;
2.1.3. Electronic access controls;
Measures
Examples of evidence may include, but
are not limited to, training material such
as power point presentations, instructor
notes, student notes, handouts, or other
training materials.
2.1.4. The visitor control program;
2.1.5. Handling of BES Cyber System
Information and its storage;
2.1.6. Identification of a Cyber
Security Incident and initial
notifications in accordance with
the entity’s incident response
plan;
2.1.7. Recovery plans for BES Cyber
Systems;
2.1.8. Response to Cyber Security
Incidents; and
2.1.9. Cyber security risks associated
with a BES Cyber System’s
electronic interconnectivity and
interoperability with other
Cyber Assets, including
Page 6 of 31
CIP-004-7 — Cyber Security – Personnel & Training
CIP-004-7 Table R2 – Cyber Security Training Program
Part
Applicable Systems
Requirements
Measures
Transient Cyber Assets, and
with Removable Media.
2.2
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
Require completion of the training
specified in Part 2.1 prior to granting
authorized electronic access and
authorized unescorted physical access
to applicable Cyber Assets, except
during CIP Exceptional Circumstances.
Examples of evidence may include, but
are not limited to, training records and
documentation of when CIP Exceptional
Circumstances were invoked.
Require completion of the training
specified in Part 2.1 at least once every
15 calendar months.
Examples of evidence may include, but
are not limited to, dated individual
training records.
1. EACMS; and
2. PACS
2.3
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Page 7 of 31
CIP-004-7 — Cyber Security – Personnel & Training
R3. Each Responsible Entity shall implement one or more documented personnel risk assessment program(s) to attain and
retain authorized electronic or authorized unescorted physical access to BES Cyber Systems that collectively include each of
the applicable requirement parts in CIP-004-7 Table R3 – Personnel Risk Assessment Program. [Violation Risk Factor:
Medium] [Time Horizon: Operations Planning].
M3. Evidence must include the documented personnel risk assessment programs that collectively include each of the applicable
requirement parts in CIP-004-7 Table R3 – Personnel Risk Assessment Program and additional evidence to demonstrate
implementation of the program(s).
CIP-004-7 Table R3 – Personnel Risk Assessment Program
Part
3.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
Requirements
Measures
Process to confirm identity.
An example of evidence may include,
but is not limited to, documentation of
the Responsible Entity’s process to
confirm identity.
Process to perform a seven year
criminal history records check as part of
each personnel risk assessment that
includes:
An example of evidence may include,
but is not limited to, documentation of
the Responsible Entity’s process to
perform a seven year criminal history
records check.
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and
their associated:
1. EACMS; and
2. PACS
3.2
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and
their associated:
1. EACMS; and
3.2.1. current residence, regardless of
duration; and
3.2.2. other locations where, during
the seven years immediately prior to
the date of the criminal history
records check, the subject has resided
Page 8 of 31
CIP-004-7 — Cyber Security – Personnel & Training
CIP-004-7 Table R3 – Personnel Risk Assessment Program
Part
Applicable Systems
2. PACS
3.3
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
Requirements
Measures
for six consecutive months or more.
If it is not possible to perform a full
seven year criminal history records
check, conduct as much of the seven
year criminal history records check as
possible and document the reason the
full seven year criminal history records
check could not be performed.
Criteria or process to evaluate criminal
history records checks for authorizing
access.
An example of evidence may include,
but is not limited to, documentation of
the Responsible Entity’s process to
evaluate criminal history records
checks.
Criteria or process for verifying that
personnel risk assessments performed
for contractors or service vendors are
conducted according to Parts 3.1
through 3.3.
An example of evidence may include,
but is not limited to, documentation of
the Responsible Entity’s criteria or
process for verifying contractors or
service vendors personnel risk
assessments.
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and
their associated:
1. EACMS; and
2. PACS
3.4
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and
their associated:
1. EACMS; and
Page 9 of 31
CIP-004-7 — Cyber Security – Personnel & Training
CIP-004-7 Table R3 – Personnel Risk Assessment Program
Part
Applicable Systems
Requirements
Measures
2. PACS
3.5
High Impact BES Cyber Systems and
their associated:
Process to ensure that individuals with
authorized electronic or authorized
unescorted physical access have had a
1. EACMS; and
personnel risk assessment completed
2. PACS
according to Parts 3.1 to 3.4 within the
Medium Impact BES Cyber Systems with last seven years.
External Routable Connectivity and
their associated:
An example of evidence may include,
but is not limited to, documentation of
the Responsible Entity’s process for
ensuring that individuals with
authorized electronic or authorized
unescorted physical access have had a
personnel risk assessment completed
within the last seven years.
1. EACMS; and
2. PACS
Page 10 of 31
CIP-004-7 — Cyber Security – Personnel & Training
R4. Each Responsible Entity shall implement one or more documented access management program(s) that collectively
include each of the applicable requirement parts in CIP-004-7 Table R4 – Access Management Program. [Violation Risk
Factor: Medium] [Time Horizon: Operations Planning and Same Day Operations].
M4. Evidence must include the documented processes that collectively include each of the applicable requirement parts in CIP004-7 Table R4 – Access Management Program and additional evidence to demonstrate that the access management
program was implemented as described in the Measures column of the table.
CIP-004-7 Table R4 – Access Management Program
Part
4.1
Applicable Systems
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
Requirements
Process to authorize based on need,
as determined by the Responsible
Entity, except for CIP Exceptional
Circumstances:
4.1.1. Electronic access; and
4.1.2. Unescorted physical access
into a Physical Security
Perimeter
Measures
An example of evidence may include,
but is not limited to, dated
documentation of the process to
authorize electronic access, and
unescorted physical access in a
Physical Security Perimeter.
2. PACS
4.2
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Verify at least once each calendar
quarter that individuals with active
electronic access or unescorted
physical access have authorization
records.
Examples of evidence may include,
but are not limited to:
•
Dated documentation of the
verification between the system
generated list of individuals who
have been authorized for access
(i.e., workflow database) and a
system generated list of
personnel who have access (i.e.,
user account listing), or
Dated documentation of the
Page 11 of 31
CIP-004-7 — Cyber Security – Personnel & Training
CIP-004-7 Table R4 – Access Management Program
Part
Applicable Systems
Requirements
Measures
verification between a list of
individuals who have been
authorized for access (i.e.,
authorization forms) and a list of
individuals provisioned for access
(i.e., provisioning forms or shared
account listing).
4.3
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
For electronic access, verify at least
once every 15 calendar months that
all user accounts, user account
groups, or user role categories, and
their specific, associated privileges are
correct and are those that the
Responsible Entity determines are
necessary.
An example of evidence may include,
but is not limited to, documentation
of the review that includes all of the
following:
1. A dated listing of all
accounts/account groups or
roles within the system;
2. A summary description of
privileges associated with
each group or role;
3. Accounts assigned to the
group or role; and
Dated evidence showing verification
of the privileges for the group are
authorized and appropriate to the
work function performed by people
assigned to each account.
Page 12 of 31
CIP-004-7 — Cyber Security – Personnel & Training
R5. Each Responsible Entity shall implement one or more documented access revocation program(s) that collectively include
each of the applicable requirement parts in CIP-004-7 Table R5 – Access Revocation. [Violation Risk Factor: Medium] [Time
Horizon: Same Day Operations and Operations Planning].
M5. Evidence must include each of the applicable documented programs that collectively include each of the applicable
requirement parts in CIP-004-7 Table R5 – Access Revocation and additional evidence to demonstrate implementation as
described in the Measures column of the table.
CIP-004-7 Table R5 – Access Revocation
Part
5.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
Requirements
Measures
A process to initiate removal of an
individual’s ability for unescorted
physical access and Interactive Remote
Access upon a termination action, and
complete the removals within 24 hours
of the termination action (Removal of
the ability for access may be different
than deletion, disabling, revocation, or
removal of all access rights).
An example of evidence may include,
but is not limited to, documentation of
all of the following:
For reassignments or transfers, revoke
the individual’s authorized electronic
access to individual accounts and
authorized unescorted physical access
that the Responsible Entity determines
are not necessary by the end of the
next calendar day following the date
that the Responsible Entity determines
that the individual no longer requires
retention of that access.
An example of evidence may include,
but is not limited to, documentation of
all of the following:
For termination actions, revoke the
individual’s non-shared user accounts
An example of evidence may include,
but is not limited to, workflow or sign-
2. PACS
5.2
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
5.3
High Impact BES Cyber Systems and
their associated:
1. Dated workflow or sign-off form
verifying access removal
associated with the termination
action; and
Logs or other demonstration showing
such persons no longer have access.
1. Dated workflow or sign-off form
showing a review of logical and
physical access; and
Logs or other demonstration showing
such persons no longer have access
that the Responsible Entity determines
is not necessary.
Page 13 of 31
CIP-004-7 — Cyber Security – Personnel & Training
CIP-004-7 Table R5 – Access Revocation
Part
Applicable Systems
•
5.4
EACMS
High Impact BES Cyber Systems and
their associated:
•
EACMS
Requirements
Measures
(unless already revoked according to
Part 5.1) within 30 calendar days of the
effective date of the termination
action.
off form showing access removal for
any individual BES Cyber Assets and
software applications as determined
necessary to completing the revocation
of access and dated within thirty
calendar days of the termination
actions.
For termination actions, change
Examples of evidence may include, but
passwords for shared account(s) known are not limited to:
to the user within 30 calendar days of
• Workflow or sign-off form
the termination action. For
showing password reset within
reassignments or transfers, change
30 calendar days of the
passwords for shared account(s) known
termination;
to the user within 30 calendar days
• Workflow or sign-off form
following the date that the Responsible
showing password reset within
Entity determines that the individual no
30 calendar days of the
longer requires retention of that
reassignments or transfers; or
access.
Documentation of the extenuating
If the Responsible Entity determines
operating circumstance and workflow
and documents that extenuating
or sign-off form showing password
operating circumstances require a
reset within 10 calendar days following
longer time period, change the
the end of the operating circumstance.
password(s) within 10 calendar days
following the end of the operating
circumstances.
Page 14 of 31
CIP-004-7 — Cyber Security – Personnel & Training
R6. Each Responsible Entity shall implement one or more documented access management program(s) to authorize, verify,
and revoke provisioned access to BCSI pertaining to the “Applicable Systems” identified in CIP-004-7 Table R6 – Access
Management for BES Cyber System Information that collectively include each of the applicable requirement parts in CIP‐
004‐7 Table R6 – Access Management for BES Cyber System Information. To be considered access to BCSI in the context of
this requirement, an individual has both the ability to obtain and use BCSI. Provisioned access is to be considered the
result of the specific actions taken to provide an individual(s) the means to access BCSI (e.g., may include physical keys or
access cards, user accounts and associated rights and privileges, encryption keys). [Violation Risk Factor: Medium] [Time
Horizon: Same Day Operations and Operations Planning].
M6. Evidence must include each of the applicable documented programs that collectively include the applicable requirement
parts in CIP-004-7 Table R6 – Access Management for BES Cyber System Information and additional evidence to
demonstrate implementation as described in the Measures column of the table.
CIP-004-7 Table R6 – Access Management for BES Cyber System Information
Part
6.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
Requirements
Measures
Prior to provisioning, authorize (unless
already authorized according to Part
4.1.) based on need, as determined by
the Responsible Entity, except for CIP
Exceptional Circumstances:
Examples of evidence may include, but
are not limited to, individual records or
lists that include who is authorized, the
date of the authorization, and the
justification of business need for the
provisioned access.
6.1.1. Provisioned electronic access to
electronic BCSI; and
6.1.2. Provisioned physical access to
physical BCSI.
2. PACS
Page 15 of 31
CIP-004-7 — Cyber Security – Personnel & Training
CIP-004-7 Table R6 – Access Management for BES Cyber System Information
Part
6.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
Requirements
Verify at least once every 15 calendar
months that all individuals with
provisioned access to BCSI:
6.2.1. have an authorization record;
and
6.2.2. still need the provisioned access
to perform their current work
functions, as determined by the
Responsible Entity.
Measures
Examples of evidence may include, but
are not limited to, the documentation
of the review that includes all of the
following:
•
List of authorized individuals;
•
List of individuals who have been
provisioned access;
•
Verification that provisioned
access is appropriate based on
need; and
•
Documented reconciliation
actions, if any.
2. PACS
6.3
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
For termination actions, remove the
individual’s ability to use provisioned
access to BCSI (unless already revoked
according to Part 5.1) by the end of the
next calendar day following the
effective date of the termination
action.
Examples of dated evidence may
include, but are not limited to, access
revocation records associated with the
terminations and dated within the next
calendar day of the termination action.
1. EACMS; and
2. PACS
Page 16 of 31
CIP-004-7 — Cyber Security – Personnel & Training
C. Compliance
1. Compliance Monitoring Process:
1.1. Compliance Enforcement Authority: “Compliance Enforcement Authority” (CEA)
means NERC or the Regional Entity, or any entity as otherwise designated by an
Applicable Governmental Authority, in their respective roles of monitoring and/or
enforcing compliance with mandatory and enforceable Reliability Standards in
their respective jurisdictions.
1.2. Evidence Retention: The following evidence retention periods identify the period
of time an entity is required to retain specific evidence to demonstrate
compliance. For instances where the evidence retention period specified below is
shorter than the time since the last audit, the CEA may ask an entity to provide
other evidence to show that it was compliant for the full time period since the last
audit.
The applicable entity shall keep data or evidence to show compliance as identified
below unless directed by its CEA to retain specific evidence for a longer period of
time as part of an investigation:
•
The applicable entity shall retain evidence of each requirement in this standard
for three calendar years.
•
The applicable entity is found non-compliant, it shall keep information related
to the non-compliance until mitigation is complete and approved or for the
time specified above, whichever is longer.
•
The CEA shall keep the last audit records and all requested and submitted
subsequent audit records.
1.3. Compliance Monitoring and Enforcement Program: As defined in the NERC Rules
of Procedure, “Compliance Monitoring and Enforcement Program” refers to the
identification of the processes that will be used to evaluate data or information for
the purpose of assessing performance or outcomes with the associated Reliability
Standard.
Page 17 of 31
CIP-004-7 — Cyber Security – Personnel & Training
2. Table of Compliance Elements
R#
R1
R2
Time Horizon
Operations
Planning
Operations
Planning
VRF
Lower
Lower
Violation Severity Levels (CIP-004-7)
Lower VSL
Moderate VSL
High VSL
Severe VSL
The Responsible Entity
did not reinforce
cyber security
practices during a
calendar quarter but
did so less than 10
calendar days after
the start of a
subsequent calendar
quarter. (1.1)
The Responsible Entity
did not reinforce
cyber security
practices during a
calendar quarter but
did so between 10 and
30 calendar days after
the start of a
subsequent calendar
quarter. (1.1)
The Responsible Entity
did not reinforce
cyber security
practices during a
calendar quarter but
did so within the
subsequent quarter
but beyond 30
calendar days after
the start of that
calendar quarter. (1.1)
The Responsible Entity
did not document or
implement any
security awareness
process(es) to
reinforce cyber
security practices. (R1)
The Responsible Entity
implemented a cyber
security training
program but failed to
include one of the
training content topics
in Requirement Parts
The Responsible Entity
implemented a cyber
security training
program but failed to
include two of the
training content topics
in Requirement Parts
The Responsible Entity
implemented a cyber
security training
program but failed to
include three of the
training content topics
in Requirement Parts
OR
The Responsible Entity
did not reinforce
cyber security
practices and
associated physical
security practices for
at least two
consecutive calendar
quarters. (1.1)
The Responsible Entity
did not implement a
cyber security training
program appropriate
to individual roles,
functions, or
responsibilities. (R2)
Page 18 of 31
CIP-004-7 — Cyber Security – Personnel & Training
R#
Time Horizon
Violation Severity Levels (CIP-004-7)
VRF
Lower VSL
Moderate VSL
High VSL
2.1.1 through 2.1.9.
(2.1)
2.1.1 through 2.1.9.
(2.1)
2.1.1 through 2.1.9.
(2.1)
OR
OR
OR
Severe VSL
OR
The Responsible Entity
implemented a cyber
The Responsible Entity The Responsible Entity The Responsible Entity security training
implemented a cyber implemented a cyber
implemented a cyber program but failed to
include four or more
security training
security training
security training
program but failed to program but failed to program but failed to of the training content
train one individual
train two individuals
train three individuals topics in Requirement
(with the exception of (with the exception of (with the exception of Parts 2.1.1 through
2.1.9. (2.1)
CIP Exceptional
CIP Exceptional
CIP Exceptional
Circumstances) prior
Circumstances) prior
Circumstances) prior
OR
to their being granted to their being granted to their being granted
authorized electronic authorized electronic authorized electronic The Responsible Entity
implemented a cyber
and authorized
and authorized
and authorized
security training
unescorted physical
unescorted physical
unescorted physical
program but failed to
access. (2.2)
access. (2.2)
access. (2.2)
train four or more
OR
OR
OR
individuals (with the
The Responsible Entity The Responsible Entity The Responsible Entity exception of CIP
implemented a cyber implemented a cyber
implemented a cyber Exceptional
Circumstances) prior
security training
security training
security training
program but failed to program but failed to program but failed to to their being granted
train one individual
train two individuals
train three individuals authorized electronic
and authorized
with authorized
with authorized
with authorized
unescorted physical
electronic or
electronic or
electronic or
authorized unescorted authorized unescorted authorized unescorted access. (2.2)
physical access within physical access within physical access within OR
Page 19 of 31
CIP-004-7 — Cyber Security – Personnel & Training
R#
R3
Time Horizon
Operations
Planning
VRF
Medium
Violation Severity Levels (CIP-004-7)
Lower VSL
Moderate VSL
High VSL
Severe VSL
15 calendar months of
the previous training
completion date. (2.3)
15 calendar months of
the previous training
completion date. (2.3)
15 calendar months of
the previous training
completion date. (2.3)
The Responsible Entity
implemented a cyber
security training
program but failed to
train four or more
individuals with
authorized electronic
or authorized
unescorted physical
access within 15
calendar months of
the previous training
completion date. (2.3)
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
but did not conduct
the PRA as a condition
of granting authorized
electronic or
authorized unescorted
physical access for
one individual. (R3)
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
but did not conduct
the PRA as a condition
of granting authorized
electronic or
authorized unescorted
physical access for
two individuals. (R3)
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
but did not conduct
the PRA as a condition
of granting authorized
electronic or
authorized unescorted
physical access for
three individuals. (R3)
The Responsible Entity
did not have all of the
required elements as
described by 3.1
through 3.4 included
within documented
program(s) for
implementing
Personnel Risk
Assessments (PRAs),
for individuals,
including contractors
and service vendors,
for obtaining and
Page 20 of 31
CIP-004-7 — Cyber Security – Personnel & Training
R#
Time Horizon
Violation Severity Levels (CIP-004-7)
VRF
Lower VSL
Moderate VSL
OR
OR
The Responsible Entity
did conduct Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
not confirm identity
for one individual. (3.1
& 3.4)
The Responsible Entity
did conduct Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
not confirm identity
for two individuals.
(3.1 & 3.4)
OR
OR
The Responsible Entity
has a process to
perform seven-year
criminal history record
checks for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
The Responsible Entity
has a process to
perform seven-year
criminal history record
checks for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
High VSL
Severe VSL
retaining authorized
cyber or authorized
The Responsible Entity unescorted physical
did conduct Personnel access. (R3)
Risk Assessments
(PRAs) for individuals, OR
including contractors
The Responsible Entity
and service vendors,
has a program for
with authorized
conducting Personnel
electronic or
Risk Assessments
authorized unescorted (PRAs) for individuals,
physical access but did including contractors
not confirm identity
and service vendors,
for three individuals.
but did not conduct
(3.1 & 3.4)
the PRA as a condition
of granting authorized
OR
electronic or
The Responsible Entity authorized unescorted
has a process to
physical access for
perform seven-year
four or more
criminal history record individuals. (R3)
checks for individuals,
OR
including contractors
and service vendors,
The Responsible Entity
with authorized
did conduct Personnel
electronic or
Risk Assessments
authorized unescorted (PRAs) for individuals,
physical access but did including contractors
OR
Page 21 of 31
CIP-004-7 — Cyber Security – Personnel & Training
R#
Time Horizon
Violation Severity Levels (CIP-004-7)
VRF
Lower VSL
Moderate VSL
High VSL
not include the
required checks
described in 3.2.1 and
3.2.2 for one
individual. (3.2 & 3.4)
not include the
required checks
described in 3.2.1 and
3.2.2 for two
individuals. (3.2 & 3.4)
not include the
required checks
described in 3.2.1 and
3.2.2 for three
individuals. (3.2 & 3.4)
OR
OR
The Responsible Entity
did conduct Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
not evaluate criminal
history records check
for access
authorization for one
individual. (3.3 & 3.4)
The Responsible Entity
did conduct Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
not evaluate criminal
history records check
for access
authorization for two
individuals. (3.3 & 3.4)
OR
OR
The Responsible Entity
did not conduct
Personnel Risk
Assessments (PRAs)
The Responsible Entity
did not conduct
Personnel Risk
Assessments (PRAs)
Severe VSL
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
not confirm identity
OR
for four or more
The Responsible Entity individuals. (3.1 & 3.4)
did conduct Personnel
OR
Risk Assessments
(PRAs) for individuals, The Responsible Entity
including contractors
has a process to
and service vendors,
perform seven-year
with authorized
criminal history record
electronic or
checks for individuals,
authorized unescorted including contractors
physical access but did and service vendors,
not evaluate criminal
with authorized
history records check electronic or
for access
authorized unescorted
authorization for
physical access but did
three individuals. (3.3 not include the
& 3.4)
required checks
described in 3.2.1 and
OR
3.2.2 for four or more
The Responsible Entity individuals. (3.2 & 3.4)
did not conduct
OR
Personnel Risk
Page 22 of 31
CIP-004-7 — Cyber Security – Personnel & Training
R#
Time Horizon
VRF
Violation Severity Levels (CIP-004-7)
Lower VSL
Moderate VSL
High VSL
Severe VSL
for one individual with
authorized electronic
or authorized
unescorted physical
access within 7
calendar years of the
previous PRA
completion date. (3.5)
for two individuals
with authorized
electronic or
authorized unescorted
physical access within
7 calendar years of
the previous PRA
completion date. (3.5)
Assessments (PRAs)
for three individuals
with authorized
electronic or
authorized unescorted
physical access within
7 calendar years of
the previous PRA
completion date. (3.5)
The Responsible Entity
did conduct Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
not evaluate criminal
history records check
for access
authorization for four
or more individuals.
(3.3 & 3.4)
OR
The Responsible Entity
did not conduct
Personnel Risk
Assessments (PRAs)
for four or more
individuals with
authorized electronic
or authorized
unescorted physical
access within 7
Page 23 of 31
CIP-004-7 — Cyber Security – Personnel & Training
R#
R4
Time Horizon
Operations
Planning and
Same Day
Operations
VRF
Medium
Violation Severity Levels (CIP-004-7)
Lower VSL
Moderate VSL
High VSL
Severe VSL
calendar years of the
previous PRA
completion date. (3.5)
The Responsible Entity The Responsible Entity The Responsible Entity The Responsible Entity
did not verify that
did not verify that
did not verify that
did not implement any
individuals with active individuals with active individuals with active documented
electronic or active
electronic or active
electronic or active
program(s) for access
unescorted physical
unescorted physical
unescorted physical
management. (R4)
access have
access have
access have
OR
authorization records authorization records authorization records
The Responsible Entity
during a calendar
during a calendar
during a calendar
did not implement
quarter but did so less quarter but did so
quarter but did so
one or more
than 10 calendar days between 10 and 20
between 20 and 30
documented
after the start of a
calendar days after
calendar days after
program(s) for access
subsequent calendar
the start of a
the start of a
management that
quarter. (4.2)
subsequent calendar
subsequent calendar
includes a process to
quarter. (4.2)
quarter. (4.2)
OR
authorize electronic
OR
OR
The Responsible Entity
access or unescorted
has implemented
The Responsible Entity The Responsible Entity physical access. (4.1)
processes to verify
has implemented
has implemented
OR
that user accounts,
processes to verify
processes to verify
The Responsible Entity
that user accounts,
that user accounts,
user account groups,
did not verify that
or user role
user account groups,
user account groups,
individuals with active
categories, and their
or user role
or user role
electronic or active
specific, associated
categories, and their
categories, and their
unescorted physical
privileges are correct
specific, associated
specific, associated
access have
and necessary within
privileges are correct
privileges are correct
Page 24 of 31
CIP-004-7 — Cyber Security – Personnel & Training
R#
R5
Time Horizon
Same Day
Operations
VRF
Medium
Violation Severity Levels (CIP-004-7)
Lower VSL
Moderate VSL
High VSL
Severe VSL
15 calendar months of
the previous
verification but for 5%
or less of its BES Cyber
Systems, privileges
were incorrect or
unnecessary. (4.3)
and necessary within
15 calendar months of
the previous
verification but for
more than 5% but less
than (or equal to) 10%
of its BES Cyber
Systems, privileges
were incorrect or
unnecessary. (4.3)
and necessary within
15 calendar months of
the previous
verification but for
more than 10% but
less than (or equal to)
15% of its BES Cyber
Systems, privileges
were incorrect or
unnecessary. (4.3)
authorization records
for at least two
consecutive calendar
quarters. (4.2)
The Responsible Entity
has implemented one
or more process(es) to
revoke the individual’s
The Responsible Entity
has implemented one
or more process(es) to
remove the ability for
The Responsible Entity
has implemented one
or more process(es) to
remove the ability for
The Responsible Entity
has not implemented
any documented
program(s) for access
OR
The Responsible Entity
has implemented
processes to verify
that user accounts,
user account groups,
or user role
categories, and their
specific, associated
privileges are correct
and necessary within
15 calendar months of
the previous
verification but for
more than 15% of its
BES Cyber Systems,
privileges were
incorrect or
unnecessary. (4.3)
Page 25 of 31
CIP-004-7 — Cyber Security – Personnel & Training
R#
Time Horizon
and Operations
Planning
VRF
Violation Severity Levels (CIP-004-7)
Lower VSL
Moderate VSL
High VSL
user accounts upon
termination action but
did not do so for
within 30 calendar
days of the date of
termination action for
one or more
individuals. (5.3)
unescorted physical
access and Interactive
Remote Access upon a
termination action or
complete the removal
within 24 hours of the
termination action but
did not initiate those
removals for one
individual. (5.1)
unescorted physical
access and Interactive
Remote Access upon a
termination action or
complete the removal
within 24 hours of the
termination action but
did not initiate those
removals for two
individuals. (5.1)
Severe VSL
revocation for
electronic access or
unescorted physical
access. (R5)
OR
The Responsible Entity
has implemented one
or more process(es) to
OR
remove the ability for
The Responsible Entity
unescorted physical
OR
OR
access and Interactive
has implemented one
or more process(es) to The Responsible Entity The Responsible Entity Remote Access upon a
change passwords for has implemented one has implemented one termination action or
shared accounts
or more process(es) to or more process(es) to complete the removal
known to the user
determine that an
determine that an
within 24 hours of the
individual no longer
individual no longer
upon termination
termination action but
requires retention of
action, reassignment, requires retention of
did not initiate those
access following
access following
or transfer, but did
removals for three or
reassignments or
reassignments or
more individuals. (5.1)
not do so for within
transfers but, for one transfers but, for two OR
30 calendar days of
individual, did not
individuals, did not
the date of
revoke the authorized revoke the authorized The Responsible Entity
termination action,
has implemented one
electronic access to
electronic access to
reassignment, or
or more process(es) to
individual accounts
individual accounts
transfer for one or
determine that an
and authorized
more individuals. (5.4) and authorized
individual no longer
unescorted physical
unescorted physical
OR
requires retention of
access by the end of
access by the end of
Page 26 of 31
CIP-004-7 — Cyber Security – Personnel & Training
R#
R6
Time Horizon
VRF
Same Day
Medium
Operations and
Operations
Planning
Violation Severity Levels (CIP-004-7)
Lower VSL
Moderate VSL
High VSL
Severe VSL
The Responsible Entity
has implemented one
or more process(es) to
determine and
document extenuating
operating
circumstances
following a
termination action,
reassignment, or
transfer, but did not
change one or more
passwords for shared
accounts known to
the user within 10
calendar days
following the end of
the extenuating
operating
circumstances. (5.4)
the next calendar day
following the
predetermined date.
(5.2)
the next calendar day
following the
predetermined date.
(5.2)
access following
reassignments or
transfers but, for
three or more
individuals, did not
revoke the authorized
electronic access to
individual accounts
and authorized
unescorted physical
access by the end of
the next calendar day
following the
predetermined date.
(5.2)
The Responsible Entity
has implemented one
or more program(s) as
required by
Requirement R6 Part
6.1 but, for one
individual, did not
The Responsible Entity
has implemented one
or more program(s) as
required by
Requirement R6 Part
6.1 but, for two
individuals, did not
The Responsible Entity
has implemented one
or more program(s) as
required by
Requirement R6 Part
6.1 but, for three
individuals, did not
The Responsible Entity
did not implement
one or more
documented access
management
program(s) for BCSI.
(R6)
Page 27 of 31
CIP-004-7 — Cyber Security – Personnel & Training
R#
Time Horizon
VRF
Violation Severity Levels (CIP-004-7)
Lower VSL
Moderate VSL
High VSL
authorize provisioned
electronic access to
electronic BCSI or
provisioned physical
access to physical
BCSI. (6.1)
authorize provisioned
electronic access to
electronic BCSI or
provisioned physical
access to physical
BCSI. (6.1)
authorize provisioned
electronic access to
electronic BCSI or
provisioned physical
access to physical
BCSI. (6.1)
Severe VSL
OR
The Responsible Entity
has implemented one
or more program(s) as
required by
Requirement R6 Part
OR
OR
OR
6.1 but, for four or
The Responsible Entity The Responsible Entity The Responsible Entity more individuals, did
performed the
performed the
performed the
not authorize
provisioned electronic
verification required
verification required
verification required
by Requirement R6
by Requirement R6
by Requirement R6
access to electronic
Part 6.2 more than 15 Part 6.2 more than 16 Part 6.2 more than 17 BCSI or provisioned
calendar months but
calendar months but
calendar months but
physical access to
physical BCSI. (6.1)
less than or equal to
less than or equal to
less than or equal to
16 calendar months of 17 calendar months of 18 calendar months of OR
the previous
the previous
the previous
The Responsible Entity
verification. (6.2)
verification. (6.2)
verification. (6.2)
performed the
OR
OR
OR
verification required
The
Responsible
Entity
The Responsible Entity The Responsible Entity
by Requirement R6
has implemented one has implemented one has implemented one Part 6.2 more than 18
or more program(s) to or more program(s) to or more program(s) to calendar months of
remove the
remove the
remove the
the previous
individual’s ability to
verification. (6.2)
individual’s ability to
individual’s ability to
use provisioned
use provisioned
use provisioned
OR
access to BCSI but, for access to BCSI but, for access to BCSI but, for
one individual, did not two individuals, did
three individuals, did
Page 28 of 31
CIP-004-7 — Cyber Security – Personnel & Training
R#
Time Horizon
VRF
Violation Severity Levels (CIP-004-7)
Lower VSL
Moderate VSL
High VSL
Severe VSL
do so by the
timeframe required in
Requirement R6, Part
6.3.
not do so by the
timeframe required in
Requirement R6, Part
6.3.
not do so by the
timeframe required in
Requirement R6, Part
6.3.
The Responsible Entity
has implemented one
or more program(s) to
remove the
individual’s ability to
use provisioned
access to BCSI but, for
four or more
individuals, did not do
so by the timeframe
required in
Requirement R6, Part
6.3.
Page 29 of 31
CIP-004-7 — Cyber Security – Personnel & Training
D. Regional Variances
None.
E. Interpretations
None.
F. Associated Documents
None.
Version History
Version
Date
1
1/16/06
Action
R3.2 — Change “Control Center” to
“control center.”
Change Tracking
3/24/06
Modifications to clarify the requirements
and to bring the compliance elements
into conformance with the latest
guidelines for developing compliance
elements of standards.
2
9/30/09
Removal of reasonable business
judgment.
Replaced the RRO with the RE as a
responsible entity.
Rewording of Effective Date.
Changed compliance monitor to
Compliance Enforcement Authority.
Updated Version Number from -2 to -3
In Requirement 1.6, deleted the
sentence pertaining to removing
component or system from service in
order to perform testing, in response to
FERC order issued September 30, 2009.
3
12/16/09
3
12/16/09
Approved by the NERC Board of
Trustees.
3
3/31/10
Approved by FERC.
4
1/24/11
Approved by the NERC Board of
Trustees.
Page 30 of 31
CIP-004-7 — Cyber Security – Personnel & Training
Version
Date
Action
Change Tracking
Modified to coordinate
with other CIP
standards and to revise
format to use RBS
Template.
5
11/26/12
Adopted by the NERC Board of Trustees.
5
11/22/13
FERC Order issued approving CIP-004-5.
5.1
9/30/13
Modified two VSLs in R4
Errata
Adopted by the NERC Board of Trustees.
Addressed two FERC
directives from Order No.
791 related to identify,
assess, and correct
language and
communication
networks.
Replaces the version
adopted by the Board on
11/13/2014. Revised
version addresses
remaining directives
from Order No. 791
related to transient
devices and low impact
BES Cyber Systems.
6
11/13/14
6
2/12/15
Adopted by the NERC Board of Trustees.
6
1/21/16
FERC order issued approving CIP-004-6.
Docket No. RM15-14-000
7
8/12/21
Adopted by the NERC Board of Trustees
Revised to enhance BES
reliability for entities to
manage their BCSI.
Page 31 of 31
Exhibit A-2
CIP-004-7
Redline
RELIABILITY | RESILIENCE | SECURITY
CIP-004-76 — Cyber Security – Personnel & Training
A. Introduction
1. Title:
Cyber Security — Personnel & Training
2. Number:
CIP-004-76
3. Purpose:
To minimize the risk against compromise that could lead to misoperation or
instability in the Bulk Electric System (BES) from individuals accessing BES Cyber
Systems by requiring an appropriate level of personnel risk assessment, training,
and security awareness, and access management in support of protecting BES
Cyber Systems.
4. Applicability:
4.1.
Functional Entities: For the purpose of the requirements contained herein, the following
list of functional entities will be collectively referred to as “Responsible Entities.” For
requirements in this standard where a specific functional entity or subset of functional
entities are the applicable entity or entities, the functional entity or entities are specified
explicitly.
4.1.1. Balancing Authority
4.1.2. Distribution Provider that owns one or more of the following Facilities, systems, and
equipment for the protection or restoration of the BES:
4.1.2.1. Each underfrequency Load shedding (UFLS) or undervoltage Load shedding
(UVLS) system that:
4.1.2.1.1. is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.1.2.1.2. performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation, of
300 MW or more.
4.1.2.2. Each Special Protection System (SPS) or Remedial Action Scheme (RAS) where
the SPS or RAS is subject to one or more requirements in a NERC or Regional
Reliability Standard.
4.1.2.3. Each Protection System (excluding UFLS and UVLS) that applies to Transmission
where the Protection System is subject to one or more requirements in a NERC
or Regional Reliability Standard.
4.1.2.4. Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.1.3. Generator Operator
4.1.4. Generator Owner
4.1.5. Interchange Coordinator or Interchange Authority
Page 1 of 45
CIP-004-76 — Cyber Security – Personnel & Training
4.1.6.4.1.5.
Reliability Coordinator
4.1.7.4.1.6.
Transmission Operator
4.1.8.4.1.7.
Transmission Owner
4.2.
Facilities: For the purpose of the requirements contained herein, the following
Facilities, systems, and equipment owned by each Responsible Entity in 4.1 above are
those to which these requirements are applicable. For requirements in this standard
where a specific type of Facilities, system, or equipment or subset of Facilities, systems,
and equipment are applicable, these are specified explicitly.
4.2.1. Distribution Provider: One or more of the following Facilities, systems and
equipment owned by the Distribution Provider for the protection or restoration of
the BES:
4.2.1.1. Each UFLS or UVLS System that:
4.2.1.1.1. is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.2.1.1.2. performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation, of
300 MW or more.
4.2.1.2. Each SPS or RAS where the SPS or RAS is subject to one or more requirements in
a NERC or Regional Reliability Standard.
4.2.1.3. Each Protection System (excluding UFLS and UVLS) that applies to Transmission
where the Protection System is subject to one or more requirements in a NERC
or Regional Reliability Standard.
4.2.1.4. Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.2.2. Responsible Entities listed in 4.1 other than Distribution Providers:
All BES Facilities.
4.2.3. Exemptions: The following are exempt from Standard CIP-004-76:
4.2.3.1. Cyber Assets at Facilities regulated by the Canadian Nuclear Safety Commission.
4.2.3.2. Cyber Assets associated with communication networks and data
communication links between discrete Electronic Security Perimeters.
4.2.3.3. The systems, structures, and components that are regulated by the Nuclear
Regulatory Commission under a cyber security plan pursuant to 10 C.F.R.
Section 73.54.
4.2.3.4. For Distribution Providers, the systems and equipment that are not included in
section 4.2.1 above.
Page 2 of 45
CIP-004-76 — Cyber Security – Personnel & Training
4.2.3.5. Responsible Entities that identify that they have no BES Cyber Systems
categorized as high impact or medium impact according to the CIP-002-5.1a
identification and categorization processes.
5. Effective Dates: See Implementation Plan for CIP-004-76.
6. Background:
Standard CIP-004 exists as part of a suite of CIP Standards related to cyber security, which
require the initial identification and categorization of BES Cyber Systems and require a
minimum level of organizational, operational, and procedural controls to mitigate risk to BES
Cyber Systems.
Most requirements open with, “Each Responsible Entity shall implement one or more
documented [processes, plan, etc.] that include the applicable items in [Table Reference].” The
referenced table requires the applicable items in the procedures for the common subject
matter of the requirements.
The term documented processes refers to a set of required instructions specific to the
Responsible Entity and to achieve a specific outcome. This term does not imply any particular
naming or approval structure beyond what is stated in the requirements. An entity should
include as much as it believes necessary in its documented processes, but it must address the
applicable requirements in the table.
The terms program and plan are sometimes used in place of documented processes where it
makes sense and is commonly understood. For example, documented processes describing a
response are typically referred to as plans (i.e., incident response plans and recovery plans).
Likewise, a security plan can describe an approach involving multiple procedures to address a
broad subject matter.
Similarly, the term program may refer to the organization’s overall implementation of its
policies, plans and procedures involving a subject matter. Examples in the standards include
the personnel risk assessment program and the personnel training program. The full
implementation of the CIP Cyber Security Standards could also be referred to as a program.
However, the terms program and plan do not imply any additional requirements beyond what
is stated in the standards.
Responsible Entities can implement common controls that meet requirements for multiple high
and medium impact BES Cyber Systems. For example, a single training program could meet the
requirements for training personnel across multiple BES Cyber Systems.
Measures for the initial requirement are simply the documented processes themselves.
Measures in the table rows provide examples of evidence to show documentation and
implementation of applicable items in the documented processes. These measures serve to
provide guidance to entities in acceptable records of compliance and should not be viewed as
an all-inclusive list.
Throughout the standards, unless otherwise stated, bulleted items in the requirements and
measures are items that are linked with an “or,” and numbered items are items that are linked
with an “and.”
Page 3 of 45
CIP-004-76 — Cyber Security – Personnel & Training
Many references in the Applicability section use a threshold of 300 MW for UFLS and UVLS.
This particular threshold of 300 MW for UVLS and UFLS was provided in Version 1 of the CIP
Cyber Security Standards. The threshold remains at 300 MW since it is specifically addressing
UVLS and UFLS, which are last ditch efforts to save the BES. A review of UFLS tolerances defined
within regional reliability standards for UFLS program requirements to date indicates that the
historical value of 300 MW represents an adequate and reasonable threshold value for
allowable UFLS operational tolerances.
“Applicable Systems” Columns in Tables:
Each table has an “Applicable Systems” column to further define the scope of systems to which
a specific requirement row applies. The CSO706 SDT adapted this concept from the National
Institute of Standards and Technology (“NIST”) Risk Management Framework as a way of
applying requirements more appropriately based on impact and connectivity characteristics.
The following conventions are used in the “Applicable Systems” column as described.
• High Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as high impact
according to the CIP-002-5.1a identification and categorization processes.
• Medium Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as medium
impact according to the CIP-002-5.1a identification and categorization processes.
• Medium Impact BES Cyber Systems with External Routable Connectivity – Only applies to
medium impact BES Cyber Systems with External Routable Connectivity. This also excludes
Cyber Assets in the BES Cyber System that cannot be directly accessed through External
Routable Connectivity.
• Electronic Access Control or Monitoring Systems (EACMS) – Applies to each Electronic
Access Control or Monitoring System associated with a referenced high impact BES Cyber
System or medium impact BES Cyber System. Examples may include, but are not limited to,
firewalls, authentication servers, and log monitoring and alerting systems.
• Physical Access Control Systems (PACS) – Applies to each Physical Access Control System
associated with a referenced high impact BES Cyber System or medium impact BES Cyber
System with External Routable Connectivity.
Page 4 of 45
CIP-004-76 — Cyber Security – Personnel & Training
B. Requirements and Measures
R1.
Each Responsible Entity shall implement one or more documented processes that collectively include each of the
applicable requirement parts in CIP-004-76 Table R1 – Security Awareness Program. [Violation Risk Factor: Lower] [Time
Horizon: Operations Planning]
M1. Evidence must include each of the applicable documented processes that collectively include each of the applicable
requirement parts in CIP-004-76 Table R1 – Security Awareness Program and additional evidence to demonstrate
implementation as described in the Measures column of the table.
CIP-004-76 Table R1 – Security Awareness Program
Part
1.1
Applicable Systems
High Impact BES Cyber Systems
Medium Impact BES Cyber Systems
Requirements
Security awareness that, at least once
each calendar quarter, reinforces cyber
security practices (which may include
associated physical security practices)
for the Responsible Entity’s personnel
who have authorized electronic or
authorized unescorted physical access
to BES Cyber Systems.
Measures
An example of evidence may include,
but is not limited to, documentation
that the quarterly reinforcement has
been provided. Examples of evidence
of reinforcement may include, but are
not limited to, dated copies of
information used to reinforce security
awareness, as well as evidence of
distribution, such as:
•
•
•
direct communications (for
example, e-mails, memos,
computer-based training); or
indirect communications (for
example, posters, intranet, or
brochures); or
management support and
reinforcement (for example,
presentations or meetings).
Page 5 of 45
CIP-004-76 — Cyber Security – Personnel & Training
R2. Each Responsible Entity shall implement one or more cyber security training program(s) appropriate to individual roles,
functions, or responsibilities that collectively includes each of the applicable requirement parts in CIP-004-76 Table R2 –
Cyber Security Training Program. [Violation Risk Factor: Lower] [Time Horizon: Operations Planning]
M2. Evidence must include the training program that includes each of the applicable requirement parts in CIP-004-76 Table R2 –
Cyber Security Training Program and additional evidence to demonstrate implementation of the program(s).
Page 6 of 45
CIP-004-76 — Cyber Security – Personnel & Training
CIP-004-76 Table R2 – Cyber Security Training Program
Part
2.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Requirements
Training content on:
2.1.1. Cyber security policies;
2.1.2. Physical access controls;
2.1.3. Electronic access controls;
2.1.4. The visitor control program;
Measures
Examples of evidence may include,
but are not limited to, training
material such as power point
presentations, instructor notes,
student notes, handouts, or other
training materials.
2.1.5. Handling of BES Cyber System
Information and its storage;
2.1.6. Identification of a Cyber
Security Incident and initial
notifications in accordance
with the entity’s incident
response plan;
2.1.7. Recovery plans for BES Cyber
Systems;
2.1.8. Response to Cyber Security
Incidents; and
2.1.9. Cyber security risks associated
with a BES Cyber System’s
electronic interconnectivity
and interoperability with
other Cyber Assets, including
Transient Cyber Assets, and
with Removable Media.
Page 7 of 45
CIP-004-76 — Cyber Security – Personnel & Training
CIP-004-76 Table R2 – Cyber Security Training Program
Part
2.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
Requirements
Measures
Require completion of the training
specified in Part 2.1 prior to granting
authorized electronic access and
authorized unescorted physical access
to applicable Cyber Assets, except
during CIP Exceptional Circumstances.
Examples of evidence may include,
but are not limited to, training
records and documentation of when
CIP Exceptional Circumstances were
invoked.
Require completion of the training
specified in Part 2.1 at least once
every 15 calendar months.
Examples of evidence may include,
but are not limited to, dated
individual training records.
1. EACMS; and
2. PACS
2.3
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Page 8 of 45
CIP-004-76 — Cyber Security – Personnel & Training
R3.
Each Responsible Entity shall implement one or more documented personnel risk assessment program(s) to attain and
retain authorized electronic or authorized unescorted physical access to BES Cyber Systems that collectively include each of
the applicable requirement parts in CIP-004-76 Table R3 – Personnel Risk Assessment Program. [Violation Risk Factor:
Medium] [Time Horizon: Operations Planning].
M3. Evidence must include the documented personnel risk assessment programs that collectively include each of the applicable
requirement parts in CIP-004-76 Table R3 – Personnel Risk Assessment Program and additional evidence to demonstrate
implementation of the program(s).
CIP-004-76 Table R3 – Personnel Risk Assessment Program
Part
Applicable Systems
3.1
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Requirements
Process to confirm identity.
Measures
An example of evidence may
include, but is not limited to,
documentation of the Responsible
Entity’s process to confirm identity.
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Page 9 of 45
CIP-004-76 — Cyber Security – Personnel & Training
CIP-004-76 Table R3 – Personnel Risk Assessment Program
Part
3.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Requirements
Measures
Process to perform a seven year
criminal history records check as part of
each personnel risk assessment that
includes:
An example of evidence may include,
but is not limited to, documentation of
the Responsible Entity’s process to
perform a seven year criminal history
records check.
3.2.1. current residence, regardless of
duration; and
3.2.2. other locations where, during
the seven years immediately prior to
the date of the criminal history
records check, the subject has resided
for six consecutive months or more.
If it is not possible to perform a full
seven year criminal history records
check, conduct as much of the seven
year criminal history records check as
possible and document the reason the
full seven year criminal history records
check could not be performed.
Page 10 of 45
CIP-004-76 — Cyber Security – Personnel & Training
CIP-004-76 Table R3 – Personnel Risk Assessment Program
Part
3.3
Applicable Systems
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
Requirements
Measures
Criteria or process to evaluate criminal
history records checks for authorizing
access.
An example of evidence may
include, but is not limited to,
documentation of the
Responsible Entity’s process to
evaluate criminal history records
checks.
Criteria or process for verifying that
personnel risk assessments performed for
contractors or service vendors are
conducted according to Parts 3.1 through
3.3.
An example of evidence may
include, but is not limited to,
documentation of the
Responsible Entity’s criteria or
process for verifying contractors
or service vendors personnel risk
assessments.
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
3.4
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Page 11 of 45
CIP-004-76 — Cyber Security – Personnel & Training
CIP-004-76 Table R3 – Personnel Risk Assessment Program
Part
3.5
Applicable Systems
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Requirements
Measures
Process to ensure that individuals with
authorized electronic or authorized
unescorted physical access have had a
personnel risk assessment completed
according to Parts 3.1 to 3.4 within the last
seven years.
An example of evidence may
include, but is not limited to,
documentation of the
Responsible Entity’s process for
ensuring that individuals with
authorized electronic or
authorized unescorted physical
access have had a personnel risk
assessment completed within the
last seven years.
Page 12 of 45
CIP-004-76 — Cyber Security – Personnel & Training
R4. Each Responsible Entity shall implement one or more documented access management program(s) that collectively include
each of the applicable requirement parts in CIP-004-76 Table R4 – Access Management Program. [Violation Risk Factor:
Medium] [Time Horizon: Operations Planning and Same Day Operations].
M4. Evidence must include the documented processes that collectively include each of the applicable requirement parts in CIP004-76 Table R4 – Access Management Program and additional evidence to demonstrate that the access management
program was implemented as described in the Measures column of the table.
CIP-004-76 Table R4 – Access Management Program
Part
Applicable Systems
4.1
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Requirements
Process to authorize based on need, as
determined by the Responsible Entity,
except for CIP Exceptional
Circumstances:
4.1.1. Electronic access; and
4.1.2. Unescorted physical access into a
Physical Security Perimeter; and
4.1.3. Access to designated storage
locations, whether physical or
electronic, for BES Cyber System
Information.
Measures
An example of evidence may
include, but is not limited to, dated
documentation of the process to
authorize electronic access and
unescorted physical access in a
Physical Security Perimeter, and
access to designated storage
locations, whether physical or
electronic, for BES Cyber System
Information.
Page 13 of 45
CIP-004-76 — Cyber Security – Personnel & Training
CIP-004-76 Table R4 – Access Management Program
Part
Applicable Systems
4.2
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Requirements
Verify at least once each calendar
quarter that individuals with active
electronic access or unescorted physical
access have authorization records.
Measures
Examples of evidence may include,
but are not limited to:
•
Dated documentation of the
verification between the system
generated list of individuals who
have been authorized for access
(i.e., workflow database) and a
system generated list of
personnel who have access (i.e.,
user account listing), or
•
Dated documentation of the
verification between a list of
individuals who have been
authorized for access (i.e.,
authorization forms) and a list
of individuals provisioned for
access (i.e., provisioning forms
or shared account listing).
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Page 14 of 45
CIP-004-76 — Cyber Security – Personnel & Training
CIP-004-76 Table R4 – Access Management Program
Part
Applicable Systems
Requirements
4.3
High Impact BES Cyber Systems and their
associated:
For electronic access, verify at least once
every 15 calendar months that all user
accounts, user account groups, or user
role categories, and their specific,
associated privileges are correct and are
those that the Responsible Entity
determines are necessary.
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Measures
An example of evidence may
include, but is not limited to,
documentation of the review that
includes all of the following:
1. A dated listing of all
accounts/account groups or
roles within the system;
2. A summary description of
privileges associated with
each group or role;
3. Accounts assigned to the
group or role; and
4. Dated evidence showing
verification of the privileges
for the group are authorized
and appropriate to the work
function performed by
people assigned to each
account.
Page 15 of 45
CIP-004-76 — Cyber Security – Personnel & Training
CIP-004-6 Table R4 – Access Management Program
Part
Applicable Systems
Requirements
4.4
High Impact BES Cyber Systems and their
associated:
Verify at least once every 15 calendar
months that access to the designated
storage locations for BES Cyber System
Information, whether physical or
electronic, are correct and are those that
the Responsible Entity determines are
necessary for performing assigned work
functions.
EACMS; and
1. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
0. EACMS; and
0. PACS
Measures
An example of evidence may
include, but is not limited to, the
documentation of the review that
includes all of the following:
0. A dated listing of
authorizations for BES Cyber
System information;
0. Any privileges associated
with the authorizations; and
0. Dated evidence showing a
verification of the
authorizations and any
privileges were confirmed
correct and the minimum
necessary for performing
assigned work functions.
Page 16 of 45
CIP-004-76 — Cyber Security – Personnel & Training
R5. Each Responsible Entity shall implement one or more documented access revocation program(s) that collectively include
each of the applicable requirement parts in CIP-004-76 Table R5 – Access Revocation. [Violation Risk Factor: Medium] [Time
Horizon: Same Day Operations and Operations Planning].
M5. Evidence must include each of the applicable documented programs that collectively include each of the applicable
requirement parts in CIP-004-76 Table R5 – Access Revocation and additional evidence to demonstrate implementation as
described in the Measures column of the table.
CIP-004-76 Table R5 – Access Revocation
Part
5.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Requirements
Measures
A process to initiate removal of an
individual’s ability for unescorted
physical access and Interactive Remote
Access upon a termination action, and
complete the removals within 24 hours
of the termination action (Removal of
the ability for access may be different
than deletion, disabling, revocation, or
removal of all access rights).
An example of evidence may include,
but is not limited to, documentation of
all of the following:
1. Dated workflow or sign-off form
verifying access removal
associated with the termination
action; and
2. Logs or other demonstration
showing such persons no longer
have access.
Page 17 of 45
CIP-004-76 — Cyber Security – Personnel & Training
CIP-004-76 Table R5 – Access Revocation
Part
5.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Requirements
Measures
For reassignments or transfers, revoke
the individual’s authorized electronic
access to individual accounts and
authorized unescorted physical access
that the Responsible Entity determines
are not necessary by the end of the
next calendar day following the date
that the Responsible Entity determines
that the individual no longer requires
retention of that access.
An example of evidence may include,
but is not limited to, documentation of
all of the following:
1. Dated workflow or sign-off form
showing a review of logical and
physical access; and
2. Logs or other demonstration
showing such persons no longer
have access that the
Responsible Entity determines
is not necessary.
Page 18 of 45
CIP-004-76 — Cyber Security – Personnel & Training
CIP-004-76 Table R5 – Access Revocation
Part
5.3
Applicable Systems
High Impact BES Cyber Systems and
their associated:
EACMS; and
PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
EACMS; and
Requirements
Measures
For termination actions, revoke the
individual’s access to the designated
storage locations for BES Cyber System
Information, whether physical or
electronic (unless already revoked
according to Requirement R5.1), by the
end of the next calendar day following
the effective date of the termination
action.
An example of evidence may include,
but is not limited to, workflow or signoff form verifying access removal to
designated physical areas or cyber
systems containing BES Cyber System
Information associated with the
terminations and dated within the next
calendar day of the termination action.
For termination actions, revoke the
individual’s non-shared user accounts
(unless already revoked according to
Parts 5.1 or 5.3) within 30 calendar
days of the effective date of the
termination action.
An example of evidence may include,
but is not limited to, workflow or signoff form showing access removal for
any individual BES Cyber Assets and
software applications as determined
necessary to completing the revocation
of access and dated within thirty
calendar days of the termination
actions.
PACS
5.34
High Impact BES Cyber Systems and
their associated:
•
EACMS
Page 19 of 45
CIP-004-76 — Cyber Security – Personnel & Training
CIP-004-76 Table R5 – Access Revocation
Part
Applicable Systems
5.45 High Impact BES Cyber Systems and
their associated:
•
EACMS
Requirements
Measures
For termination actions, change
Examples of evidence may include, but
passwords for shared account(s) known are not limited to:
to the user within 30 calendar days of
• Workflow or sign-off form
the termination action. For
showing password reset within
reassignments or transfers, change
30 calendar days of the
passwords for shared account(s) known
termination;
to the user within 30 calendar days
• Workflow or sign-off form
following the date that the Responsible
showing password reset within
Entity determines that the individual no
30 calendar days of the
longer requires retention of that
reassignments or transfers; or
access.
If the Responsible Entity determines
and documents that extenuating
operating circumstances require a
longer time period, change the
password(s) within 10 calendar days
following the end of the operating
circumstances.
•
Documentation of the
extenuating operating
circumstance and workflow or
sign-off form showing password
reset within 10 calendar days
following the end of the
operating circumstance.
Page 20 of 45
CIP-004-76 — Cyber Security – Personnel & Training
R6. Each Responsible Entity shall implement one or more documented access management program(s) to authorize, verify, and
revoke provisioned access to BCSI pertaining to the “Applicable Systems” identified in CIP-004-7 Table R6 – Access
Management for BES Cyber System Information that collectively include each of the applicable requirement parts in CIP‐
004‐7 Table R6 – Access Management for BES Cyber System Information. To be considered access to BCSI in the context of
this requirement, an individual has both the ability to obtain and use BCSI. Provisioned access is to be considered the result
of the specific actions taken to provide an individual(s) the means to access BCSI (e.g., may include physical keys or access
cards, user accounts and associated rights and privileges, encryption keys). [Violation Risk Factor: Medium] [Time Horizon:
Same Day Operations and Operations Planning].
M6. Evidence must include each of the applicable documented programs that collectively include the applicable requirement
parts in CIP-004-7 Table R6 – Access Management for BES Cyber System Information and additional evidence to
demonstrate implementation as described in the Measures column of the table.
CIP-004-7 Table R6 – Access Management for BES Cyber System Information
Part
6.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
Requirements
Measures
Prior to provisioning, authorize (unless
already authorized according to Part
4.1.) based on need, as determined by
the Responsible Entity, except for CIP
Exceptional Circumstances:
Examples of evidence may include, but
are not limited to, individual records or
lists that include who is authorized, the
date of the authorization, and the
justification of business need for the
provisioned access.
6.1.1. Provisioned electronic access to
electronic BCSI; and
6.1.2. Provisioned physical access to
physical BCSI.
2. PACS
Page 21 of 45
CIP-004-76 — Cyber Security – Personnel & Training
CIP-004-7 Table R6 – Access Management for BES Cyber System Information
Part
6.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
Requirements
Verify at least once every 15 calendar
months that all individuals with
provisioned access to BCSI:
6.2.1. have an authorization record;
and
6.2.2. still need the provisioned access
to perform their current work
functions, as determined by the
Responsible Entity.
Measures
Examples of evidence may include, but
are not limited to, the documentation
of the review that includes all of the
following:
•
List of authorized individuals;
•
List of individuals who have been
provisioned access;
•
Verification that provisioned
access is appropriate based on
need; and
•
Documented reconciliation
actions, if any.
2. PACS
6.3
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
For termination actions, remove the
individual’s ability to use provisioned
access to BCSI (unless already revoked
according to Part 5.1) by the end of the
next calendar day following the
effective date of the termination
action.
Examples of dated evidence may
include, but are not limited to, access
revocation records associated with the
terminations and dated within the next
calendar day of the termination action.
1. EACMS; and
2. PACS
Page 22 of 45
CIP-004-76 — Cyber Security – Personnel & Training
C. Compliance
1. Compliance Monitoring Process:
1.1. Compliance Enforcement Authority:
As defined in the NERC Rules of Procedure, “Compliance Enforcement Authority” (CEA)
means NERC or the Regional Entity, or any entity as otherwise designated by an
Applicable Governmental Authority, in their respective roles of monitoring and/or
enforcing compliance with mandatory and enforceable the NERC Reliability Standards
in their respective jurisdictions.
1.2. Evidence Retention:
The following evidence retention periods identify the period of time an entity is
required to retain specific evidence to demonstrate compliance. For instances where
the evidence retention period specified below is shorter than the time since the last
audit, the CEA may ask an entity to provide other evidence to show that it was
compliant for the full time period since the last audit.
The Responsible Eapplicable entity shall keep data or evidence to show compliance as
identified below unless directed by its CEA to retain specific evidence for a longer
period of time as part of an investigation:
•
Each Responsible EThe applicable entity shall retain evidence of each requirement in
this standard for three calendar years.
•
If a Responsible EThe applicable entity is found non-compliant, it shall keep information
related to the non-compliance until mitigation is complete and approved or for the
time specified above, whichever is longer.
•
The CEA shall keep the last audit records and all requested and submitted subsequent
audit records.
1.3. Compliance Monitoring and EnforceAssessment Programcesses:
As defined in the NERC Rules of Procedure, “Compliance Monitoring and Enforcement
Program” refers to the identification of the processes that will be used to evaluate data
or information for the purpose of assessing performance or outcomes with the
associated Reliability Standard.
Compliance Audits
Self-Certifications
Spot Checking
Compliance Violation Investigations
Self-Reporting
Complaints
1.4. Additional Compliance Information:
None
Page 23 of 45
CIP-004-76 — Cyber Security – Personnel & Training
2. Table of Compliance Elements
R#
R1
R2
Time
Horizon
VRF
Operations
Planning
Lower
Operations
Planning
Violation Severity Levels (CIP-004-76)
Lower VSL
Lower
Moderate VSL
High VSL
Severe VSL
The Responsible Entity did
not reinforce cyber
security practices during a
calendar quarter but did
so less than 10 calendar
days after the start of a
subsequent calendar
quarter. (1.1)
The Responsible
Entity did not
reinforce cyber
security practices
during a calendar
quarter but did so
between 10 and 30
calendar days after
the start of a
subsequent calendar
quarter. (1.1)
The Responsible Entity
did not reinforce cyber
security practices
during a calendar
quarter but did so
within the subsequent
quarter but beyond 30
calendar days after the
start of that calendar
quarter. (1.1)
The Responsible Entity
did not document or
implement any security
awareness process(es)
to reinforce cyber
security practices. (R1)
The Responsible Entity
implemented a cyber
security training program
but failed to include one
of the training content
topics in Requirement
Parts 2.1.1 through 2.1.9.
(2.1)
The Responsible
Entity implemented a
cyber security
training program but
failed to include two
of the training
content topics in
Requirement Parts
2.1.1 through 2.1.9.
(2.1)
The Responsible Entity
implemented a cyber
security training
program but failed to
include three of the
training content topics
in Requirement Parts
2.1.1 through 2.1.9.
(2.1)
The Responsible Entity
did not implement a
cyber security training
program appropriate to
individual roles,
functions, or
responsibilities. (R2)
OR
OR
OR
OR
The Responsible Entity
did not reinforce cyber
security practices and
associated physical
security practices for at
least two consecutive
calendar quarters. (1.1)
OR
The Responsible Entity
implemented a cyber
Page 24 of 45
CIP-004-76 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-76)
Lower VSL
The Responsible Entity
implemented a cyber
security training program
but failed to train one
individual (with the
exception of CIP
Exceptional
Circumstances) prior to
their being granted
authorized electronic and
authorized unescorted
physical access. (2.2)
OR
The Responsible Entity
implemented a cyber
security training program
but failed to train one
individual with authorized
electronic or authorized
unescorted physical
access within 15 calendar
months of the previous
training completion date.
(2.3)
Moderate VSL
The Responsible
Entity implemented a
cyber security
training program but
failed to train two
individuals (with the
exception of CIP
Exceptional
Circumstances) prior
to their being
granted authorized
electronic and
authorized
unescorted physical
access. (2.2)
High VSL
The Responsible Entity
implemented a cyber
security training
program but failed to
train three individuals
(with the exception of
CIP Exceptional
Circumstances) prior to
their being granted
authorized electronic
and authorized
unescorted physical
access. (2.2)
OR
The Responsible Entity
implemented a cyber
security training
program but failed to
The Responsible
Entity implemented a train three individuals
with authorized
cyber security
training program but electronic or authorized
unescorted physical
failed to train two
access within 15
individuals with
authorized electronic calendar months of the
previous training
or authorized
completion date. (2.3)
unescorted physical
access within 15
OR
Severe VSL
security training
program but failed to
include four or more of
the training content
topics in Requirement
Parts 2.1.1 through
2.1.9. (2.1)
OR
The Responsible Entity
implemented a cyber
security training
program but failed to
train four or more
individuals (with the
exception of CIP
Exceptional
Circumstances) prior to
their being granted
authorized electronic
and authorized
unescorted physical
access. (2.2)
OR
The Responsible Entity
implemented a cyber
security training
program but failed to
Page 25 of 45
CIP-004-76 — Cyber Security – Personnel & Training
R#
R3
Time
Horizon
VRF
Operations
Planning
Medium
Violation Severity Levels (CIP-004-76)
Lower VSL
The Responsible Entity
has a program for
conducting Personnel Risk
Assessments (PRAs) for
individuals, including
contractors and service
vendors, but did not
conduct the PRA as a
condition of granting
authorized electronic or
authorized unescorted
physical access for one
individual. (R3)
Moderate VSL
calendar months of
the previous training
completion date.
(2.3)
The Responsible
Entity has a program
for conducting
Personnel Risk
Assessments (PRAs)
for individuals,
including contractors
and service vendors,
but did not conduct
the PRA as a
condition of granting
authorized electronic
or authorized
unescorted physical
OR
access for two
The Responsible Entity did individuals. (R3)
conduct Personnel Risk
OR
Assessments (PRAs) for
individuals, including
The Responsible
contractors and service
Entity did conduct
High VSL
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments (PRAs)
for individuals,
including contractors
and service vendors,
but did not conduct the
PRA as a condition of
granting authorized
electronic or authorized
unescorted physical
access for three
individuals. (R3)
OR
Severe VSL
train four or more
individuals with
authorized electronic or
authorized unescorted
physical access within 15
calendar months of the
previous training
completion date. (2.3)
The Responsible Entity
did not have all of the
required elements as
described by 3.1 through
3.4 included within
documented program(s)
for implementing
Personnel Risk
Assessments (PRAs), for
individuals, including
contractors and service
vendors, for obtaining
and retaining authorized
cyber or authorized
unescorted physical
access. (R3)
The Responsible Entity
OR
did conduct Personnel
Risk Assessments (PRAs) The Responsible Entity
for individuals,
has a program for
Page 26 of 45
CIP-004-76 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-76)
Lower VSL
vendors, with authorized
electronic or authorized
unescorted physical
access but did not confirm
identity for one
individual. (3.1 & 3.4)
OR
The Responsible Entity
has a process to perform
seven-year criminal
history record checks for
individuals, including
contractors and service
vendors, with authorized
electronic or authorized
unescorted physical
access but did not include
the required checks
described in 3.2.1 and
3.2.2 for one individual.
(3.2 & 3.4)
Moderate VSL
Personnel Risk
Assessments (PRAs)
for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized
unescorted physical
access but did not
confirm identity for
two individuals. (3.1
& 3.4)
OR
The Responsible
Entity has a process
to perform sevenyear criminal history
record checks for
individuals, including
contractors and
service vendors, with
OR
authorized electronic
The Responsible Entity did or authorized
conduct Personnel Risk
unescorted physical
Assessments (PRAs) for
access but did not
individuals, including
include the required
contractors and service
checks described in
High VSL
including contractors
and service vendors,
with authorized
electronic or authorized
unescorted physical
access but did not
confirm identity for
three individuals. (3.1 &
3.4)
OR
The Responsible Entity
has a process to
perform seven-year
criminal history record
checks for individuals,
including contractors
and service vendors,
with authorized
electronic or authorized
unescorted physical
access but did not
include the required
checks described in
3.2.1 and 3.2.2 for three
individuals. (3.2 & 3.4)
OR
Severe VSL
conducting Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, but did not
conduct the PRA as a
condition of granting
authorized electronic or
authorized unescorted
physical access for four
or more individuals. (R3)
OR
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with authorized
electronic or authorized
unescorted physical
access but did not
confirm identity for four
or more individuals. (3.1
& 3.4)
OR
The Responsible Entity
has a process to perform
Page 27 of 45
CIP-004-76 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-76)
Lower VSL
vendors, with authorized
electronic or authorized
unescorted physical
access but did not
evaluate criminal history
records check for access
authorization for one
individual. (3.3 & 3.4)
Moderate VSL
3.2.1 and 3.2.2 for
two individuals. (3.2
& 3.4)
OR
The Responsible
Entity did conduct
Personnel Risk
Assessments (PRAs)
OR
for individuals,
The Responsible Entity did including contractors
not conduct Personnel
and service vendors,
Risk Assessments (PRAs)
with authorized
for one individual with
electronic or
authorized electronic or
authorized
authorized unescorted
unescorted physical
physical access within 7
access but did not
calendar years of the
evaluate criminal
previous PRA completion history records check
date. (3.5)
for access
authorization for two
individuals. (3.3 &
3.4)
OR
The Responsible
Entity did not
conduct Personnel
Risk Assessments
High VSL
Severe VSL
seven-year criminal
The Responsible Entity
history record checks for
did conduct Personnel
Risk Assessments (PRAs) individuals, including
contractors and service
for individuals,
vendors, with authorized
including contractors
electronic or authorized
and service vendors,
unescorted physical
with authorized
electronic or authorized access but did not
include the required
unescorted physical
checks described in 3.2.1
access but did not
and 3.2.2 for four or
evaluate criminal
more individuals. (3.2 &
history records check
for access authorization 3.4)
for three individuals.
OR
(3.3 & 3.4)
The Responsible Entity
OR
did conduct Personnel
Risk Assessments (PRAs)
The Responsible Entity
for individuals, including
did not conduct
contractors and service
Personnel Risk
Assessments (PRAs) for vendors, with authorized
electronic or authorized
three individuals with
authorized electronic or unescorted physical
access but did not
authorized unescorted
physical access within 7 evaluate criminal history
records check for access
calendar years of the
authorization for four or
previous PRA
more individuals. (3.3 &
completion date. (3.5)
3.4)
Page 28 of 45
CIP-004-76 — Cyber Security – Personnel & Training
R#
R4
Time
Horizon
Operations
Planning
and Same
Day
Operations
VRF
Violation Severity Levels (CIP-004-76)
Lower VSL
Medium
The Responsible Entity did
not verify that individuals
with active electronic or
active unescorted physical
access have authorization
records during a calendar
quarter but did so less
than 10 calendar days
after the start of a
subsequent calendar
quarter. (4.2)
OR
Moderate VSL
(PRAs) for two
individuals with
authorized electronic
or authorized
unescorted physical
access within 7
calendar years of the
previous PRA
completion date.
(3.5)
The Responsible
Entity did not verify
that individuals with
active electronic or
active unescorted
physical access have
authorization records
during a calendar
quarter but did so
between 10 and 20
calendar days after
the start of a
subsequent calendar
quarter. (4.2)
High VSL
Severe VSL
OR
The Responsible Entity
did not verify that
individuals with active
electronic or active
unescorted physical
access have
authorization records
during a calendar
quarter but did so
between 20 and 30
calendar days after the
start of a subsequent
calendar quarter. (4.2)
OR
The Responsible Entity
did not conduct
Personnel Risk
Assessments (PRAs) for
four or more individuals
with authorized
electronic or authorized
unescorted physical
access within 7 calendar
years of the previous
PRA completion date.
(3.5)
The Responsible Entity
did not implement any
documented program(s)
for access management.
(R4)
OR
The Responsible Entity
has did not
implemented one or
more documented
program(s) for access
management that
includes a process to
Page 29 of 45
CIP-004-76 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-76)
Lower VSL
The Responsible Entity
has implemented
processes to verify that
user accounts, user
account groups, or user
role categories, and their
specific, associated
privileges are correct and
necessary within 15
calendar months of the
previous verification but
for 5% or less of its BES
Cyber Systems, privileges
were incorrect or
unnecessary. (4.3)
OR
The Responsible Entity
has implemented
processes to verify that
access to the designated
storage locations for BES
Cyber System Information
is correct and necessary
within 15 calendar
months of the previous
verification but for 5% or
less of its BES Cyber
System Information
OR
Moderate VSL
The Responsible
Entity has
implemented
processes to verify
that user accounts,
user account groups,
or user role
categories, and their
specific, associated
privileges are correct
and necessary within
15 calendar months
of the previous
verification but for
more than 5% but
less than (or equal
to) 10% of its BES
Cyber Systems,
privileges were
incorrect or
unnecessary. (4.3)
OR
The Responsible
Entity has
implemented
High VSL
The Responsible Entity
has implemented
processes to verify that
user accounts, user
account groups, or user
role categories, and
their specific,
associated privileges
are correct and
necessary within 15
calendar months of the
previous verification
but for more than 10%
but less than (or equal
to) 15% of its BES Cyber
Systems, privileges
were incorrect or
unnecessary. (4.3)
OR
The Responsible Entity
has implemented
processes to verify that
access to the
designated storage
locations for BES Cyber
System Information is
Severe VSL
authorize electronic
access, or unescorted
physical access, or
access to the designated
storage locations where
BES Cyber System
Information is located.
(4.1)
OR
The Responsible Entity
did not verify that
individuals with active
electronic or active
unescorted physical
access have
authorization records for
at least two consecutive
calendar quarters. (4.2)
OR
The Responsible Entity
has implemented
processes to verify that
user accounts, user
account groups, or user
role categories, and their
Page 30 of 45
CIP-004-76 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-76)
Lower VSL
storage locations,
privileges were incorrect
or unnecessary. (4.4)
Moderate VSL
processes to verify
that access to the
designated storage
locations for BES
Cyber System
Information is
correct and
necessary within 15
calendar months of
the previous
verification but for
more than 5% but
less than (or equal
to) 10% of its BES
Cyber System
Information storage
locations, privileges
were incorrect or
unnecessary. (4.4)
High VSL
correct and necessary
within 15 calendar
months of the previous
verification but for
more than 10% but less
than (or equal to) 15%
of its BES Cyber System
Information storage
locations, privileges
were incorrect or
unnecessary. (4.4)
Severe VSL
specific, associated
privileges are correct
and necessary within 15
calendar months of the
previous verification but
for more than 15% of its
BES Cyber Systems,
privileges were incorrect
or unnecessary. (4.3)
OR
The Responsible Entity
has implemented
processes to verify that
access to the designated
storage locations for BES
Cyber System
Information is correct
and necessary within 15
calendar months of the
previous verification but
for more than 15% of its
BES Cyber System
Information storage
locations, privileges
were incorrect or
unnecessary. (4.4)
Page 31 of 45
CIP-004-76 — Cyber Security – Personnel & Training
R#
R5
Time
Horizon
Same Day
Operations
and
Operations
Planning
VRF
Medium
Violation Severity Levels (CIP-004-76)
Lower VSL
The Responsible Entity
has implemented one or
more process(es) to
revoke the individual’s
access to the designated
storage locations for BES
Cyber System Information
but, for one individual,
did not do so by the end
of the next calendar day
following the effective
date and time of the
termination action. (5.3)
OR
The Responsible Entity
has implemented one or
more process(es) to
revoke the individual’s
user accounts upon
termination action but did
not do so for within 30
calendar days of the date
of termination action for
one or more individuals.
(5.43)
OR
The Responsible Entity
has implemented one or
Moderate VSL
The Responsible
Entity has
implemented one or
more process(es) to
remove the ability
for unescorted
physical access and
Interactive Remote
Access upon a
termination action or
complete the
removal within 24
hours of the
termination action
but did not initiate
those removals for
one individual. (5.1)
OR
The Responsible
Entity has
implemented one or
more process(es) to
determine that an
individual no longer
requires retention of
access following
High VSL
The Responsible Entity
has implemented one
or more process(es) to
remove the ability for
unescorted physical
access and Interactive
Remote Access upon a
termination action or
complete the removal
within 24 hours of the
termination action but
did not initiate those
removals for two
individuals. (5.1)
OR
The Responsible Entity
has implemented one
or more process(es) to
determine that an
individual no longer
requires retention of
access following
reassignments or
transfers but, for two
individuals, did not
revoke the authorized
Severe VSL
The Responsible Entity
has not implemented
any documented
program(s) for access
revocation for electronic
access, or unescorted
physical access, or BES
Cyber System
Information storage
locations. (R5)
OR
The Responsible Entity
has implemented one or
more process(es) to
remove the ability for
unescorted physical
access and Interactive
Remote Access upon a
termination action or
complete the removal
within 24 hours of the
termination action but
did not initiate those
removals for three or
more individuals. (5.1)
OR
Page 32 of 45
CIP-004-76 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-76)
Lower VSL
more process(es) to
change passwords for
shared accounts known to
the user upon termination
action, reassignment, or
transfer, but did not do so
for within 30 calendar
days of the date of
termination action,
reassignment, or transfer
for one or more
individuals. (5.45)
Moderate VSL
reassignments or
transfers but, for one
individual, did not
revoke the
authorized electronic
access to individual
accounts and
authorized
unescorted physical
access by the end of
the next calendar day
following the
predetermined date.
OR
(5.2)
The Responsible Entity
OR
has implemented one or
The Responsible
more process(es) to
Entity has
determine and document implemented one or
extenuating operating
more process(es) to
circumstances following a revoke the
termination action,
individual’s access to
reassignment, or transfer, the designated
but did not change one or storage locations for
more passwords for
BES Cyber System
shared accounts known to Information but, for
the user within 10
two individuals, did
calendar days following
not do so by the end
the end of the
of the next calendar
High VSL
electronic access to
individual accounts and
authorized unescorted
physical access by the
end of the next
calendar day following
the predetermined
date. (5.2)
OR
The Responsible Entity
has implemented one
or more process(es) to
revoke the individual’s
access to the
designated storage
locations for BES Cyber
System Information but,
for three or more
individuals, did not do
so by the end of the
next calendar day
following the effective
date and time of the
termination action.
(5.3)
Severe VSL
The Responsible Entity
has implemented one or
more process(es) to
determine that an
individual no longer
requires retention of
access following
reassignments or
transfers but, for three
or more individuals, did
not revoke the
authorized electronic
access to individual
accounts and authorized
unescorted physical
access by the end of the
next calendar day
following the
predetermined date.
(5.2)
Page 33 of 45
CIP-004-76 — Cyber Security – Personnel & Training
R#
R6
Time
Horizon
VRF
Same Day
Operations
and
Operations
Planning
Medium
Violation Severity Levels (CIP-004-76)
Lower VSL
extenuating operating
circumstances. (5.54)
Moderate VSL
day following the
effective date and
time of the
termination action.
(5.3)
The Responsible Entity
has implemented one or
more program(s) as
required by Requirement
R6 Part 6.1 but, for one
individual, did not
authorize provisioned
electronic access to
electronic BCSI or
provisioned physical
access to physical BCSI.
(6.1)
The Responsible
Entity has
implemented one or
more program(s) as
required by
Requirement R6 Part
6.1 but, for two
individuals, did not
authorize
provisioned
electronic access to
electronic BCSI or
provisioned physical
access to physical
BCSI. (6.1)
OR
The Responsible Entity
performed the
verification required by
Requirement R6 Part 6.2
more than 15 calendar
months but less than or
equal to 16 calendar
months of the previous
verification. (6.2)
OR
The Responsible
Entity performed the
verification required
by Requirement R6
Part 6.2 more than
16 calendar months
High VSL
The Responsible Entity
has implemented one
or more program(s) as
required by
Requirement R6 Part
6.1 but, for three
individuals, did not
authorize provisioned
electronic access to
electronic BCSI or
provisioned physical
access to physical BCSI.
(6.1)
OR
The Responsible Entity
performed the
verification required by
Requirement R6 Part
6.2 more than 17
calendar months but
less than or equal to 18
calendar months of the
Severe VSL
The Responsible Entity
did not implement one
or more documented
access management
program(s) for BCSI.
(R6)
OR
The Responsible Entity
has implemented one or
more program(s) as
required by
Requirement R6 Part 6.1
but, for four or more
individuals, did not
authorize provisioned
electronic access to
electronic BCSI or
provisioned physical
access to physical BCSI.
(6.1)
OR
Page 34 of 45
CIP-004-76 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-76)
Lower VSL
OR
The Responsible Entity
has implemented one or
more program(s) to
remove the individual’s
ability to use provisioned
access to BCSI but, for
one individual, did not do
so by the timeframe
required in Requirement
R6, Part 6.3.
Moderate VSL
but less than or equal
to 17 calendar
months of the
previous verification.
(6.2)
OR
The Responsible
Entity has
implemented one or
more program(s) to
remove the
individual’s ability to
use provisioned
access to BCSI but,
for two individuals,
did not do so by the
timeframe required
in Requirement R6,
Part 6.3.
High VSL
previous verification.
(6.2)
OR
The Responsible Entity
has implemented one
or more program(s) to
remove the individual’s
ability to use
provisioned access to
BCSI but, for three
individuals, did not do
so by the timeframe
required in
Requirement R6, Part
6.3.
Severe VSL
The Responsible Entity
performed the
verification required by
Requirement R6 Part 6.2
more than 18 calendar
months of the previous
verification. (6.2)
OR
The Responsible Entity
has implemented one or
more program(s) to
remove the individual’s
ability to use
provisioned access to
BCSI but, for four or
more individuals, did not
do so by the timeframe
required in Requirement
R6, Part 6.3.
Page 35 of 45
Guidelines and Technical Basis
D. Regional Variances
None.
E. Interpretations
None.
F. Associated Documents
None.
Version History
Version
Date
Action
1
1/16/06
R3.2 — Change “Control Center” to
“control center.”
2
9/30/09
Modifications to clarify the
requirements and to bring the
compliance elements into conformance
with the latest guidelines for developing
compliance elements of standards.
Change Tracking
3/24/06
Removal of reasonable business
judgment.
Replaced the RRO with the RE as a
responsible entity.
Rewording of Effective Date.
Changed compliance monitor to
Compliance Enforcement Authority.
3
12/16/09
Updated Version Number from -2 to -3
In Requirement 1.6, deleted the
sentence pertaining to removing
component or system from service in
order to perform testing, in response to
FERC order issued September 30, 2009.
3
12/16/09
3
3/31/10
4
1/24/11
Approved by the NERC Board of
Trustees.
Approved by FERC.
Approved by the NERC Board of
Trustees.
Page 36 of 45
Guidelines and Technical Basis
Version
Date
Action
Change Tracking
5
11/26/12
Adopted by the NERC Board of
Trustees.
5
11/22/13
FERC Order issued approving CIP-004-5.
5.1
9/30/13
Modified two VSLs in R4
Errata
6
11/13/14
Adopted by the NERC Board of
Trustees.
Addressed two
FERC directives
from Order No.
791 related to
identify, assess,
and correct
language and
communication
networks.
6
2/12/15
Adopted by the NERC Board of
Trustees.
Replaces the
version adopted
by the Board on
11/13/2014.
Revised version
addresses
remaining
directives from
Order No. 791
related to
transient devices
and low impact
BES Cyber
Systems.
6
1/21/16
7
8/12/21
FERC order issued approving CIP-004-6.
Docket No. RM15-14-000
Adopted by the NERC Board of Trustees
Modified to
coordinate with
other CIP
standards and to
revise format to
use RBS
Template.
Revised to
enhance BES
reliability for
entities to
manage their
BCSI.
Page 37 of 45
Guidelines and Technical Basis
Guidelines and Technical Basis
Section 4 – Scope of Applicability of the CIP Cyber Security Standards
Section “4. Applicability” of the standards provides important information for Responsible
Entities to determine the scope of the applicability of the CIP Cyber Security Requirements.
Section “4.1. Functional Entities” is a list of NERC functional entities to which the standard
applies. If the entity is registered as one or more of the functional entities listed in Section
4.1, then the NERC CIP Cyber Security Standards apply. Note that there is a qualification in
Section 4.1 that restricts the applicability in the case of Distribution Providers to only those
that own certain types of systems and equipment listed in 4.2.
Section “4.2. Facilities” defines the scope of the Facilities, systems, and equipment owned by
the Responsible Entity, as qualified in Section 4.1, that is subject to the requirements of the
standard. As specified in the exemption section 4.2.3.5, this standard does not apply to
Responsible Entities that do not have High Impact or Medium Impact BES Cyber Systems
under CIP-002-5.1’s categorization. In addition to the set of BES Facilities, Control Centers,
and other systems and equipment, the list includes the set of systems and equipment owned
by Distribution Providers. While the NERC Glossary term “Facilities” already includes the BES
characteristic, the additional use of the term BES here is meant to reinforce the scope of
applicability of these Facilities where it is used, especially in this applicability scoping section.
This in effect sets the scope of Facilities, systems, and equipment that is subject to the
standards.
Requirement R1:
The security awareness program is intended to be an informational program, not a formal
training program. It should reinforce security practices to ensure that personnel maintain
awareness of best practices for both physical and electronic security to protect its BES Cyber
Systems. The Responsible Entity is not required to provide records that show that each
individual received or understood the information, but they must maintain documentation of
the program materials utilized in the form of posters, memos, and/or presentations.
Examples of possible mechanisms and evidence, when dated, which can be used are:
Direct communications (e.g., emails, memos, computer based training, etc.);
Indirect communications (e.g., posters, intranet, brochures, etc.);
Management support and reinforcement (e.g., presentations, meetings, etc.).
Requirement R2:
Page 38 of 45
Guidelines and Technical Basis
Training shall cover the policies, access controls, and procedures as developed for the BES
Cyber Systems and include, at a minimum, the required items appropriate to personnel roles
and responsibilities from Table R2. The Responsible Entity has the flexibility to define the
training program and it may consist of multiple modules and multiple delivery mechanisms,
but a single training program for all individuals needing to be trained is acceptable. The
training can focus on functions, roles or responsibilities at the discretion of the Responsible
Entity.
One new element in the training content is intended to encompass networking hardware and
software and other issues of electronic interconnectivity supporting the operation and
control of BES Cyber Systems as per FERC Order No. 706, Paragraph 434. Additionally,
training should address the risk posed when connecting and using Transient Cyber Assets and
Removable Media with BES Cyber Systems or within an Electronic Security Perimeter. As
noted in FERC Order No. 791, Paragraph 135, Transient Cyber Assets and Removable Media
have been the source of incidents where malware was introduced into electric generation
industrial control systems in real-world situations. Training on their use is a key element in
protecting BES Cyber Systems. This is not intended to provide technical training to individuals
supporting networking hardware and software, but educating system users of the cyber
security risks associated with the interconnectedness of these systems. The users, based on
their function, role, or responsibility, should have a basic understanding of which systems can
be accessed from other systems and how the actions they take can affect cyber security.
Each Responsible Entity shall ensure all personnel who are granted authorized electronic
access and/or authorized unescorted physical access to its BES Cyber Systems, including
contractors and service vendors, complete cyber security training prior to their being granted
authorized access, except for CIP Exceptional Circumstances. To retain the authorized
accesses, individuals must complete the training at least one every 15 months.
Requirement R3:
Each Responsible Entity shall ensure a personnel risk assessment is performed for all
personnel who are granted authorized electronic access and/or authorized unescorted
physical access to its BES Cyber Systems, including contractors and service vendors, prior to
their being granted authorized access, except for program specified exceptional
circumstances that are approved by the single senior management official or their delegate
and impact the reliability of the BES or emergency response. Identity should be confirmed in
accordance with federal, state, provincial, and local laws, and subject to existing collective
bargaining unit agreements. Identity only needs to be confirmed prior to initially granting
access and only requires periodic confirmation according to the entity’s process during the
tenure of employment, which may or may not be the same as the initial verification action.
A seven year criminal history check should be performed for those locations where the
individual has resided for at least six consecutive months. This check should also be
performed in accordance with federal, state, provincial, and local laws, and subject to existing
collective bargaining unit agreements. When it is not possible to perform a full seven year
criminal history check, documentation must be made of what criminal history check was
performed, and the reasons a full seven-year check could not be performed. Examples of this
Page 39 of 45
Guidelines and Technical Basis
could include individuals under the age of 25 where a juvenile criminal history may be
protected by law, individuals who may have resided in locations from where it is not possible
to obtain a criminal history records check, violates the law or is not allowed under the
existing collective bargaining agreement. The Responsible Entity should consider the absence
of information for the full seven years when assessing the risk of granting access during the
process to evaluate the criminal history check. There needs to be a personnel risk assessment
that has been completed within the last seven years for each individual with access. A new
criminal history records check must be performed as part of the new PRA. Individuals who
have been granted access under a previous version of these standards need a new PRA within
seven years of the date of their last PRA. The clarifications around the seven year criminal
history check in this version do not require a new PRA be performed by the implementation
date.
Requirement R4:
Authorization for electronic and unescorted physical access and access to BES Cyber System
Information must be on the basis of necessity in the individual performing a work function.
Documentation showing the authorization should have some justification of the business
need included. To ensure proper segregation of duties, access authorization and provisioning
should not be performed by the same person where possible.
This requirement specifies both quarterly reviews and reviews at least once every 15 calendar
months. Quarterly reviews are to perform a validation that only authorized users have been
granted access to BES Cyber Systems. This is achieved by comparing individuals actually
provisioned to a BES Cyber System against records of individuals authorized to the BES Cyber
System. The focus of this requirement is on the integrity of provisioning access rather than
individual accounts on all BES Cyber Assets. The list of provisioned individuals can be an
automatically generated account listing. However, in a BES Cyber System with several
account databases, the list of provisioned individuals may come from other records such as
provisioning workflow or a user account database where provisioning typically initiates.
Page 40 of 45
Guidelines and Technical Basis
The privilege review at least once every 15 calendar months is more detailed to ensure an
individual’s associated privileges are the minimum necessary to perform their work function
(i.e., least privilege). Entities can more efficiently perform this review by implementing rolebased access. This involves determining the specific roles on the system (e.g., system
operator, technician, report viewer, administrator, etc.) then grouping access privileges to the
role and assigning users to the role. Role-based access does not assume any specific software
and can be implemented by defining specific provisioning processes for each role where
access group assignments cannot be performed. Role-based access permissions eliminate the
1/1
1) Quarterly access review
2) privilege review (at least once every
15 calendar months)
3) BES Cyber
System Information
review (at least once every
4/1
15 calendar months)
Quarterly access review
2/1
3/1
4/1
7/1
Quarterly access review
5/1
6/1
7/1
1/1
1) Quarterly access review
2) privilege review
(at least once every
15 calendar months)
3) BES Cyber System
Information review
(at least once every
15 calendar months)
10/1
Quarterly access review
8/1
9/1
10/1
11/1
12/1
1/1
1/1
need to perform the privilege review on individual accounts. An example timeline of all the
reviews in Requirement R4 is included below.
Separation of duties should be considered when performing the reviews in Requirement R4.
The person reviewing should be different than the person provisioning access.
If the results of quarterly or at least once every 15 calendar months account reviews indicate
an administrative or clerical error in which access was not actually provisioned, then the SDT
intends that this error should not be considered a violation of this requirement.
For BES Cyber Systems that do not have user accounts defined, the controls listed in
Requirement R4 are not applicable. However, the Responsible Entity should document such
configurations.
Requirement R5:
The requirement to revoke access at the time of the termination action includes procedures
showing revocation of access concurrent with the termination action. This requirement
recognizes that the timing of the termination action may vary depending on the
circumstance. Some common scenarios and possible processes on when the termination
action occurs are provided in the following table. These scenarios are not an exhaustive list of
all scenarios, but are representative of several routine business practices.
Page 41 of 45
Guidelines and Technical Basis
Scenario
Possible Process
Immediate involuntary
termination
Human resources or corporate security escorts the
individual off site and the supervisor or human resources
personnel notify the appropriate personnel to begin the
revocation process.
Scheduled involuntary
termination
Human resources personnel are notified of the termination
and work with appropriate personnel to schedule the
revocation of access at the time of termination.
Voluntary termination
Human resources personnel are notified of the termination
and work with appropriate personnel to schedule the
revocation of access at the time of termination.
Retirement where the last
working day is several weeks
prior to the termination date
Human resources personnel coordinate with manager to
determine the final date access is no longer needed and
schedule the revocation of access on the determined day.
Death
Human resources personnel are notified of the death and
work with appropriate personnel to begin the revocation
process.
Revocation of electronic access should be understood to mean a process with the end result
that electronic access to BES Cyber Systems is no longer possible using credentials assigned to
or known by the individual(s) whose access privileges are being revoked. Steps taken to
accomplish this outcome may include deletion or deactivation of accounts used by the
individual(s), but no specific actions are prescribed. Entities should consider the ramifications
of deleting an account may include incomplete event log entries due to an unrecognized
account or system services using the account to log on.
The initial revocation required in Requirement R5.1 includes unescorted physical access and
Interactive Remote Access. These two actions should prevent any further access by the
individual after termination. If an individual still has local access accounts (i.e., accounts on
the Cyber Asset itself) on BES Cyber Assets, then the Responsible Entity has 30 days to
complete the revocation process for those accounts. However, nothing prevents a
Responsible Entity from performing all of the access revocation at the time of termination.
For transferred or reassigned individuals, a review of access privileges should be performed.
This review could entail a simple listing of all authorizations for an individual and working
with the respective managers to determine which access will still be needed in the new
position. For instances in which the individual still needs to retain access as part of a
transitory period, the entity should schedule a time to review these access privileges or
include the privileges in the quarterly account review or annual privilege review.
Page 42 of 45
Guidelines and Technical Basis
Revocation of access to shared accounts is called out separately to prevent the situation
where passwords on substation and generation devices are constantly changed due to staff
turnover.
Requirement 5.5 specified that passwords for shared account are to the changed within 30
calendar days of the termination action or when the Responsible Entity determines an
individual no longer requires access to the account as a result of a reassignment or transfer.
The 30 days applies under normal operating conditions. However, circumstances may occur
where this is not possible. Some systems may require an outage or reboot of the system in
order to complete the password change. In periods of extreme heat or cold, many
Responsible Entities may prohibit system outages and reboots in order to maintain reliability
of the BES. When these circumstances occur, the Responsible Entity must document these
circumstances and prepare to change the password within 10 calendar days following the end
of the operating circumstances. Records of activities must be retained to show that the
Responsible Entity followed the plan they created.
Rationale:
During development of this standard, text boxes were embedded within the standard to
explain the rationale for various parts of the standard. Upon BOT approval, the text from the
rationale text boxes was moved to this section.
Rationale for Requirement R1:
Ensures that Responsible Entities with personnel who have authorized electronic or
authorized unescorted physical access to BES Cyber Assets take action so that those
personnel with such authorized electronic or authorized unescorted physical access maintain
awareness of the Responsible Entity’s security practices.
Rationale for Requirement R2:
To ensure that the Responsible Entity’s training program for personnel who need authorized
electronic access and/or authorized unescorted physical access to BES Cyber Systems covers
the proper policies, access controls, and procedures to protect BES Cyber Systems and are
trained before access is authorized.
Rationale for Requirement R3:
To ensure that individuals who need authorized electronic or authorized unescorted physical
access to BES Cyber Systems have been assessed for risk. Whether initial access or
maintaining access, those with access must have had a personnel risk assessment completed
within the last 7 years.
Rationale for Requirement R4:
Page 43 of 45
Guidelines and Technical Basis
To ensure that individuals with access to BES Cyber Systems and the physical and electronic
locations where BES Cyber System Information is stored by the Responsible Entity have been
properly authorized for such access. “Authorization” should be considered to be a grant of
permission by a person or persons empowered by the Responsible Entity to perform such
grants and included in the delegations referenced in CIP-003-6. “Provisioning” should be
considered the actions to provide access to an individual.
Access is physical, logical, and remote permissions granted to Cyber Assets composing the
BES Cyber System or allowing access to the BES Cyber System. When granting, reviewing, or
revoking access, the Responsible Entity must address the Cyber Asset specifically as well as
the systems used to enable such access (i.e., physical access control system, remote access
system, directory services).
CIP Exceptional Circumstances are defined in a Responsible Entity’s policy from CIP-003-6 and
allow an exception to the requirement for authorization to BES Cyber Systems and BES Cyber
System Information.
Quarterly reviews in Part 4.5 are to perform a validation that only authorized users have been
granted access to BES Cyber Systems. This is achieved by comparing individuals actually
provisioned to a BES Cyber System against records of individuals authorized to access the BES
Cyber System. The focus of this requirement is on the integrity of provisioning access rather
than individual accounts on all BES Cyber Assets. The list of provisioned individuals can be an
automatically generated account listing. However, in a BES Cyber System with several
account databases, the list of provisioned individuals may come from other records such as
provisioning workflow or a user account database where provisioning typically initiates.
If the results of quarterly or annual account reviews indicate an administrative or clerical
error in which access was not actually provisioned, then the SDT intends that the error should
not be considered a violation of this requirement.
For BES Cyber Systems that do not have user accounts defined, the controls listed in
Requirement R4 are not applicable. However, the Responsible Entity should document such
configurations.
Rationale for Requirement R5:
The timely revocation of electronic access to BES Cyber Systems is an essential element of an
access management regime. When an individual no longer requires access to a BES Cyber
System to perform his or her assigned functions, that access should be revoked. This is of
particular importance in situations where a change of assignment or employment is
involuntary, as there is a risk the individual(s) involved will react in a hostile or destructive
manner.
In considering how to address directives in FERC Order No. 706 directing “immediate”
revocation of access for involuntary separation, the SDT chose not to specify hourly time
parameters in the requirement (e.g., revoking access within 1 hour). The point in time at
which an organization terminates a person cannot generally be determined down to the
Page 44 of 45
Guidelines and Technical Basis
hour. However, most organizations have formal termination processes, and the timeliest
revocation of access occurs in concurrence with the initial processes of termination.
Access is physical, logical, and remote permissions granted to Cyber Assets composing the
BES Cyber System or allowing access to the BES Cyber System. When granting, reviewing, or
revoking access, the Responsible Entity must address the Cyber Asset specifically as well as
the systems used to enable such access (e.g., physical access control system, remote access
system, directory services).
Page 45 of 45
Exhibit A-3
CIP-011-3
Clean
RELIABILITY | RESILIENCE | SECURITY
CIP-011-3 — Cyber Security — Information Protection
A. Introduction
1. Title:
Cyber Security — Information Protection
2. Number: CIP-011-3
3. Purpose: To prevent unauthorized access to BES Cyber System Information (BCSI) by
specifying information protection requirements in support of protecting BES Cyber
Systems against compromise that could lead to misoperation or instability in the Bulk
Electric System (BES).
4. Applicability:
4.1. Functional Entities: For the purpose of the requirements contained herein, the
following list of functional entities will be collectively referred to as “Responsible
Entities.” For requirements in this standard where a specific functional entity or
subset of functional entities are the applicable entity or entities, the functional
entity or entities are specified explicitly.
4.1.1 Balancing Authority
4.1.2 Distribution Provider that owns one or more of the following Facilities,
systems, and equipment for the protection or restoration of the BES:
4.1.2.1 Each underfrequency Load shedding (UFLS) or undervoltage Load
shedding (UVLS) system that:
4.1.2.1.1 is part of a Load shedding program that is subject to
one or more requirements in a NERC or Regional
Reliability Standard; and
4.1.2.1.2 performs automatic Load shedding under a common
control system owned by the Responsible Entity,
without human operator initiation, of 300 MW or more.
4.1.2.2 Each Remedial Action Scheme (RAS) where the RAS is subject to
one or more requirements in a NERC or Regional Reliability
Standard.
4.1.2.3 Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or
more requirements in a NERC or Regional Reliability Standard.
4.1.2.4 Each Cranking Path and group of Elements meeting the initial
switching requirements from a Blackstart Resource up to and
including the first interconnection point of the starting station
service of the next generation unit(s) to be started.
4.1.3 Generator Operator
4.1.4 Generator Owner
4.1.5 Reliability Coordinator
Page 1 of 13
CIP-011-3 — Cyber Security — Information Protection
4.1.6 Transmission Operator
4.1.7 Transmission Owner
4.2. Facilities: For the purpose of the requirements contained herein, the following
Facilities, systems, and equipment owned by each Responsible Entity in 4.1 above
are those to which these requirements are applicable. For requirements in this
standard where a specific type of Facilities, system, or equipment or subset of
Facilities, systems, and equipment are applicable, these are specified explicitly.
4.2.1 Distribution Provider: One or more of the following Facilities, systems and
equipment owned by the Distribution Provider for the protection or
restoration of the BES:
4.2.1.1 Each UFLS or UVLS System that:
4.2.1.1.1 is part of a Load shedding program that is subject to
one or more requirements in a NERC or Regional
Reliability Standard; and
4.2.1.1.2 performs automatic Load shedding under a common
control system owned by the Responsible Entity,
without human operator initiation, of 300 MW or more.
4.2.1.2 Each RAS where the RAS is subject to one or more requirements in
a NERC or Regional Reliability Standard.
4.2.1.3 Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or
more requirements in a NERC or Regional Reliability Standard.
4.2.1.4 Each Cranking Path and group of Elements meeting the initial
switching requirements from a Blackstart Resource up to and
including the first interconnection point of the starting station
service of the next generation unit(s) to be started.
4.2.2 Responsible Entities listed in 4.1 other than Distribution Providers:
All BES Facilities.
4.2.3 Exemptions: The following are exempt from Standard CIP-011-3:
4.2.3.1 Cyber Assets at Facilities regulated by the Canadian Nuclear Safety
Commission.
4.2.3.2 Cyber Assets associated with communication networks and data
communication links between discrete Electronic Security
Perimeters.
4.2.3.3 The systems, structures, and components that are regulated by the
Nuclear Regulatory Commission under a cyber security plan
pursuant to 10 C.F.R. Section 73.54.
Page 2 of 13
CIP-011-3 — Cyber Security — Information Protection
4.2.3.4 For Distribution Providers, the systems and equipment that are not
included in section 4.2.1 above.
4.2.3.5 Responsible Entities that identify that they have no BES Cyber
Systems categorized as high impact or medium impact according to
the CIP-002-5.1a identification and categorization processes.
5. Effective Dates: See Implementation Plan for CIP-011-3.
6. Background: Standard CIP-011 exists as part of a suite of CIP Standards related to cyber
security, which require the initial identification and categorization of BES Cyber Systems
and require a minimum level of organizational, operational, and procedural controls to
mitigate risk to BES Cyber Systems.
Most requirements open with, “Each Responsible Entity shall implement one or more
documented [processes, plan, etc.] that include the applicable items in [Table
Reference].” The referenced table requires the applicable items in the procedures for
the requirement’s common subject matter.
The term documented processes refers to a set of required instructions specific to the
Responsible Entity and to achieve a specific outcome. This term does not imply any
particular naming or approval structure beyond what is stated in the requirements. An
entity should include as much as it believes necessary in its documented processes, but
it must address the applicable requirements in the table.
The terms program and plan are sometimes used in place of documented processes
where it makes sense and is commonly understood. For example, documented
processes describing a response are typically referred to as plans (i.e., incident response
plans and recovery plans). Likewise, a security plan can describe an approach involving
multiple procedures to address a broad subject matter.
Similarly, the term program may refer to the organization’s overall implementation of
its policies, plans and procedures involving a subject matter. Examples in the standards
include the personnel risk assessment program and the personnel training program.
The full implementation of the CIP Cyber Security Standards could also be referred to as
a program. However, the terms program and plan do not imply any additional
requirements beyond what is stated in the standards.
Responsible Entities can implement common controls that meet requirements for
multiple high and medium impact BES Cyber Systems. For example, a single training
program could meet the requirements for training personnel across multiple BES Cyber
Systems.
Measures for the initial requirement are simply the documented processes themselves.
Measures in the table rows provide examples of evidence to show documentation and
Page 3 of 13
CIP-011-3 — Cyber Security — Information Protection
implementation of applicable items in the documented processes. These measures
serve to provide guidance to entities in acceptable records of compliance and should
not be viewed as an all-inclusive list.
Throughout the standards, unless otherwise stated, bulleted items in the requirements
and measures are items that are linked with an “or,” and numbered items are items that
are linked with an “and.”
Many references in the Applicability section use a threshold of 300 MW for UFLS and
UVLS. This particular threshold of 300 MW for UVLS and UFLS was provided in Version 1
of the CIP Cyber Security Standards. The threshold remains at 300 MW since it is
specifically addressing UVLS and UFLS, which are last ditch efforts to save the BES. A
review of UFLS tolerances defined within regional reliability standards for UFLS program
requirements to date indicates that the historical value of 300 MW represents an
adequate and reasonable threshold value for allowable UFLS operational tolerances.
“Applicable Systems” Columns in Tables:
Each table has an “Applicable Systems” column to further define the scope of systems
to which a specific requirement row applies. The CSO706 SDT adapted this concept
from the National Institute of Standards and Technology (“NIST”) Risk Management
Framework as a way of applying requirements more appropriately based on impact and
connectivity characteristics. The following conventions are used in the “Applicable
Systems” column as described.
•
High Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as
high impact according to the CIP-002-5.1a identification and categorization
processes.
•
Medium Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as
medium impact according to the CIP-002-5.1a identification and categorization
processes.
•
Electronic Access Control or Monitoring Systems (EACMS) – Applies to each
Electronic Access Control or Monitoring System associated with a referenced high
impact BES Cyber System or medium impact BES Cyber System. Examples may
include, but are not limited to, firewalls, authentication servers, and log
monitoring and alerting systems.
•
Physical Access Control Systems (PACS) – Applies to each Physical Access Control
System associated with a referenced high impact BES Cyber System or medium
impact BES Cyber System with External Routable Connectivity.
•
Protected Cyber Assets (PCA) – Applies to each Protected Cyber Asset associated
with a referenced high impact BES Cyber System or medium impact BES Cyber
System.
Page 4 of 13
CIP-011-3 — Cyber Security — Information Protection
B. Requirements and Measures
R1. Each Responsible Entity shall implement one or more documented information protection program(s) for BES Cyber System
Information (BCSI) pertaining to “Applicable Systems” identified in CIP-011-3 Table R1 – Information Protection Program
that collectively includes each of the applicable requirement parts in CIP-011-3 Table R1 – Information Protection Program.
[Violation Risk Factor: Medium] [Time Horizon: Operations Planning].
M1. Evidence for the information protection program must include the applicable requirement parts in CIP-011-3 Table R1 –
Information Protection Program and additional evidence to demonstrate implementation as described in the Measures
column of the table.
CIP-011-3 Table R1 – Information Protection Program
Part
1.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
and their associated:
1. EACMS; and
Requirements
Method(s) to identify BCSI.
Measures
Examples of acceptable evidence may
include, but are not limited to, the
following:
•
Documented method(s) to identify
BCSI from the entity’s information
protection program; or
•
Indications on information (e.g.,
labels or classification) that identify
BCSI as designated in the entity’s
information protection program; or
•
Training materials that provide
personnel with sufficient
knowledge to identify BCSI; or
•
Storage locations identified for
housing BCSI in the entity’s
information protection program.
2. PACS
Page 5 of 13
CIP-011-3 — Cyber Security — Information Protection
CIP-011-3 Table R1 – Information Protection Program
Part
1.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Requirements
Method(s) to protect and securely
handle BCSI to mitigate risks of
compromising confidentiality.
Measures
Examples of evidence for on-premise
BCSI may include, but are not limited
to, the following:
•
Medium Impact BES Cyber Systems
and their associated:
1. EACMS; and
2. PACS
•
Procedures for protecting and
securely handling, which
include topics such as storage,
security during transit, and use
of BCSI; or
Records indicating that BCSI is
handled in a manner consistent
with the entity’s documented
procedure(s).
Examples of evidence for off-premise
BCSI may include, but are not limited
to, the following:
•
Implementation of electronic
technical method(s) to protect
electronic BCSI (e.g., data
masking, encryption, hashing,
tokenization, cipher, electronic
key management); or
•
Implementation of physical
technical method(s) to protect
physical BCSI (e.g., physical lock
and key management, physical
badge management,
biometrics, alarm system); or
Page 6 of 13
CIP-011-3 — Cyber Security — Information Protection
CIP-011-3 Table R1 – Information Protection Program
Part
Applicable Systems
Requirements
Measures
•
Implementation of
administrative method(s) to
protect BCSI (e.g., vendor
service risk assessments,
business agreements).
Page 7 of 13
CIP-011-3 — Cyber Security — Information Protection
R2.
Each Responsible Entity shall implement one or more documented process(es) that collectively include the applicable
requirement parts in CIP-011-3 Table R2 – BES Cyber Asset Reuse and Disposal. [Violation Risk Factor: Lower] [Time Horizon:
Operations Planning].
M2. Evidence must include each of the applicable documented processes that collectively include each of the applicable
requirement parts in CIP-011-3 Table R2 – BES Cyber Asset Reuse and Disposal and additional evidence to demonstrate
implementation as described in the Measures column of the table.
CIP-011-3 Table R2 – BES Cyber Asset Reuse and Disposal
Part
2.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS;
2. PACS; and
3. PCA
Medium Impact BES Cyber Systems
and their associated:
1. EACMS;
2. PACS; and
3. PCA
Requirements
Prior to the release for reuse of
applicable Cyber Assets that contain
BCSI (except for reuse within other
systems identified in the “Applicable
Systems” column), the Responsible
Entity shall take action to prevent the
unauthorized retrieval of BCSI from
the Cyber Asset data storage media.
Measures
Examples of acceptable evidence may
include, but are not limited to, the
following:
•
Records tracking sanitization actions
taken to prevent unauthorized
retrieval of BCSI such as clearing,
purging, or destroying; or
•
Records tracking actions such as
encrypting, retaining in the Physical
Security Perimeter or other methods
used to prevent unauthorized
retrieval of BCSI.
Page 8 of 13
CIP-011-3 — Cyber Security — Information Protection
CIP-011-3 Table R2 – BES Cyber Asset Reuse and Disposal
Part
2.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS;
2. PACS; and
3. PCA
Medium Impact BES Cyber Systems
and their associated:
1. EACMS;
2. PACS; and
Requirements
Prior to the disposal of applicable
Cyber Assets that contain BCSI, the
Responsible Entity shall take action to
prevent the unauthorized retrieval of
BCSI from the Cyber Asset or destroy
the data storage media.
Measures
Examples of acceptable evidence may
include, but are not limited to, the
following:
•
Records that indicate that data
storage media was destroyed
prior to the disposal of an
applicable Cyber Asset; or
•
Records of actions taken to
prevent unauthorized retrieval of
BCSI prior to the disposal of an
applicable Cyber Asset.
3. PCA
Page 9 of 13
CIP-011-3 — Cyber Security — Information Protection
B. Compliance
1.
Compliance Monitoring Process:
1.1. Compliance Enforcement Authority: “Compliance Enforcement Authority” (CEA)
means NERC or the Regional Entity, or any entity as otherwise designated by an
Applicable Governmental Authority, in their respective roles of monitoring and/or
enforcing compliance with mandatory and enforceable Reliability Standards in
their respective jurisdictions.
1.2. Evidence Retention: The following evidence retention period(s) identify the period
of time an entity is required to retain specific evidence to demonstrate
compliance. For instances where the evidence retention period specified below is
shorter than the time since the last audit, the CEA may ask an entity to provide
other evidence to show that it was compliant for the full time period since the last
audit.
The applicable entity shall keep data or evidence to show compliance as identified
below unless directed by its CEA to retain specific evidence for a longer period of
time as part of an investigation:
•
The applicable entity shall retain evidence of each requirement in this standard
for three calendar years.
•
If an applicable entity is found non-compliant, it shall keep information related
to the non-compliance until mitigation is complete and approved or for the
time specified above, whichever is longer.
•
The CEA shall keep the last audit records and all requested and submitted
subsequent audit records.
1.3. Compliance Monitoring and Enforcement Program: As defined in the NERC Rules
of Procedure, “Compliance Monitoring and Enforcement Program” refers to the
identification of the processes that will be used to evaluate data or information for
the purpose of assessing performance or outcomes with the associated Reliability
Standard.
Page 10 of 13
CIP-011-3 — Cyber Security — Information Protection
Violation Severity Levels
R#
R1
Time
Horizon
Operations
Planning
Violation Severity Levels (CIP-011-3)
VRF
Medium
Lower VSL
N/A
Moderate VSL
N/A
High VSL
Severe VSL
The Responsible
Entity documented,
but did not,
implement one or
more BCSI protection
program(s). (R1)
The Responsible
Entity neither
documented nor
implemented one or
more BCSI protection
program(s). (R1)
OR
The Responsible
Entity documented
but did not
implement at least
one method to
identify BCSI. (1.1)
OR
The Responsible
Entity documented
but did not
implement at least
one method to
protect and securely
handle BCSI. (1.2)
R2
Operations
Planning
Lower
N/A
The Responsible
Entity implemented
one or more
documented
processes but did
The Responsible
Entity implemented
one or more
documented
processes but did
The Responsible
Entity has not
documented or
implemented any
processes for
Page 11 of 13
CIP-011-3 — Cyber Security — Information Protection
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-011-3)
Lower VSL
Moderate VSL
High VSL
Severe VSL
not include
processes for reuse
as to prevent the
unauthorized
retrieval of BCSI
from the BES Cyber
Asset. (2.1)
not include disposal
or media destruction
processes to prevent
the unauthorized
retrieval of BCSI
from the BES Cyber
Asset. (2.2)
applicable
requirement parts in
CIP-011-3 Table R3 –
BES Cyber Asset
Reuse and Disposal.
(R2)
Page 12 of 13
CIP-011-3 — Cyber Security — Information Protection
C. Regional Variances
None.
D. Interpretations
None.
E. Associated Documents
Version History
Version
Date
Action
Change Tracking
1
11/26/12
Adopted by the NERC Board of
Trustees.
1
11/22/13
FERC Order issued approving CIP011-1. (Order becomes effective
on 2/3/14.)
2
11/13/14
Adopted by the NERC Board of
Trustees.
Addressed two FERC directives
from Order No. 791 related to
identify, assess, and correct
language and communication
networks.
2
2/12/15
Adopted by the NERC Board of
Trustees.
Replaces the version adopted
by the Board on 11/13/2014.
Revised version addresses
remaining directives from
Order No. 791 related to
transient devices and low
impact BES Cyber Systems.
2
1/21/16
FERC Order issued approving CIP011-2. Docket No. RM15-14-000
3
8/12/21
Adopted by the NERC Board of
Trustees
Developed to define the
information protection
requirements in coordination
with other CIP standards and
to address the balance of the
FERC directives in its Order
706.
Revised to enhance BES
reliability for entities to
manage their BCSI.
Page 13 of 13
Exhibit A-4
CIP-011-3
Redline
RELIABILITY | RESILIENCE | SECURITY
CIP-011-23 — Cyber Security — Information Protection
A. Introduction
1.
Title:
Cyber Security — Information Protection
2.
Number:
CIP-011-32
3.
Purpose:
To prevent unauthorized access to BES Cyber System Information (BCSI)
by specifying information protection requirements in support of
protecting BES Cyber Systems against compromise that could lead to
misoperation or instability in the Bulk Electric System (BES).
4.
Applicability:
4.1. Functional Entities: For the purpose of the requirements contained herein, the
following list of functional entities will be collectively referred to as “Responsible
Entities.” For requirements in this standard where a specific functional entity or
subset of functional entities are the applicable entity or entities, the functional entity
or entities are specified explicitly.
4.1.1 Balancing Authority
4.1.2 Distribution Provider that owns one or more of the following Facilities, systems,
and equipment for the protection or restoration of the BES:
4.1.2.1 Each underfrequency Load shedding (UFLS) or undervoltage Load shedding
(UVLS) system that:
4.1.2.1.1 is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.1.2.1.2 performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation,
of 300 MW or more.
4.1.2.2 Each Special Protection System (SPS) or Remedial Action Scheme (RAS)
where the SPS or RAS is subject to one or more requirements in a NERC or
Regional Reliability Standard.
4.1.2.3 Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.1.2.4 Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.1.3 Generator Operator
4.1.4 Generator Owner
4.1.5 Interchange Coordinator or Interchange Authority
4.1.64.1.5
Reliability Coordinator
Page 1 of 19
CIP-011-23 — Cyber Security — Information Protection
4.1.74.1.6
Transmission Operator
4.1.84.1.7
Transmission Owner
4.2.
Facilities: For the purpose of the requirements contained herein, the following
Facilities, systems, and equipment owned by each Responsible Entity in 4.1 above
are those to which these requirements are applicable. For requirements in this
standard where a specific type of Facilities, system, or equipment or subset of
Facilities, systems, and equipment are applicable, these are specified explicitly.
4.2.1 Distribution Provider: One or more of the following Facilities, systems and
equipment owned by the Distribution Provider for the protection or restoration
of the BES:
4.2.1.1 Each UFLS or UVLS System that:
4.2.1.1.1 is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.2.1.1.2 performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation,
of 300 MW or more.
4.2.1.2 Each SPS or RAS where the SPS or RAS is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.2.1.3 Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.2.1.4 Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.2.2 Responsible Entities listed in 4.1 other than Distribution Providers:
All BES Facilities.
4.2.3 Exemptions: The following are exempt from Standard CIP-011-32:
4.2.3.1 Cyber Assets at Facilities regulated by the Canadian Nuclear Safety
Commission.
4.2.3.2 Cyber Assets associated with communication networks and data
communication links between discrete Electronic Security Perimeters.
4.2.3.3 The systems, structures, and components that are regulated by the Nuclear
Regulatory Commission under a cyber security plan pursuant to 10 C.F.R.
Section 73.54.
4.2.3.4 For Distribution Providers, the systems and equipment that are not included
in section 4.2.1 above.
Page 2 of 19
CIP-011-23 — Cyber Security — Information Protection
4.2.3.5 Responsible Entities that identify that they have no BES Cyber Systems
categorized as high impact or medium impact according to the CIP-002-5.1a
identification and categorization processes.
5.
Effective Dates: See Implementation Plan for CIP-011-32.
6.
Background:
Standard CIP-011 exists as part of a suite of CIP Standards related to cyber security,
which require the initial identification and categorization of BES Cyber Systems and
require a minimum level of organizational, operational, and procedural controls to
mitigate risk to BES Cyber Systems.
Most requirements open with, “Each Responsible Entity shall implement one or more
documented [processes, plan, etc.] that include the applicable items in [Table
Reference].” The referenced table requires the applicable items in the procedures for
the requirement’s common subject matter.
The term documented processes refers to a set of required instructions specific to the
Responsible Entity and to achieve a specific outcome. This term does not imply any
particular naming or approval structure beyond what is stated in the requirements.
An entity should include as much as it believes necessary in its documented processes,
but it must address the applicable requirements in the table.
The terms program and plan are sometimes used in place of documented processes
where it makes sense and is commonly understood. For example, documented
processes describing a response are typically referred to as plans (i.e., incident
response plans and recovery plans). Likewise, a security plan can describe an
approach involving multiple procedures to address a broad subject matter.
Similarly, the term program may refer to the organization’s overall implementation of
its policies, plans and procedures involving a subject matter. Examples in the
standards include the personnel risk assessment program and the personnel training
program. The full implementation of the CIP Cyber Security Standards could also be
referred to as a program. However, the terms program and plan do not imply any
additional requirements beyond what is stated in the standards.
Responsible Entities can implement common controls that meet requirements for
multiple high and medium impact BES Cyber Systems. For example, a single training
program could meet the requirements for training personnel across multiple BES
Cyber Systems.
Measures for the initial requirement are simply the documented processes
themselves. Measures in the table rows provide examples of evidence to show
documentation and implementation of applicable items in the documented processes.
These measures serve to provide guidance to entities in acceptable records of
compliance and should not be viewed as an all-inclusive list.
Page 3 of 19
CIP-011-23 — Cyber Security — Information Protection
Throughout the standards, unless otherwise stated, bulleted items in the
requirements and measures are items that are linked with an “or,” and numbered
items are items that are linked with an “and.”
Many references in the Applicability section use a threshold of 300 MW for UFLS and
UVLS. This particular threshold of 300 MW for UVLS and UFLS was provided in Version
1 of the CIP Cyber Security Standards. The threshold remains at 300 MW since it is
specifically addressing UVLS and UFLS, which are last ditch efforts to save the BES. A
review of UFLS tolerances defined within regional reliability standards for UFLS
program requirements to date indicates that the historical value of 300 MW
represents an adequate and reasonable threshold value for allowable UFLS
operational tolerances.
“Applicable Systems” Columns in Tables:
Each table has an “Applicable Systems” column to further define the scope of systems
to which a specific requirement row applies. The CSO706 SDT adapted this concept
from the National Institute of Standards and Technology (“NIST”) Risk Management
Framework as a way of applying requirements more appropriately based on impact
and connectivity characteristics. The following conventions are used in the
“Applicable Systems” column as described.
•
High Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as
high impact according to the CIP-002-5.1a identification and categorization
processes.
•
Medium Impact BES Cyber Systems – Applies to BES Cyber Systems categorized
as medium impact according to the CIP-002-5.1a identification and
categorization processes.
•
Electronic Access Control or Monitoring Systems (EACMS) – Applies to each
Electronic Access Control or Monitoring System associated with a referenced
high impact BES Cyber System or medium impact BES Cyber System. Examples
may include, but are not limited to, firewalls, authentication servers, and log
monitoring and alerting systems.
•
Physical Access Control Systems (PACS) – Applies to each Physical Access
Control System associated with a referenced high impact BES Cyber System or
medium impact BES Cyber System with External Routable Connectivity.
•
Protected Cyber Assets (PCA) – Applies to each Protected Cyber Asset
associated with a referenced high impact BES Cyber System or medium impact
BES Cyber System.
Page 4 of 19
CIP-011-23 — Cyber Security — Information Protection
B. Requirements and Measures
R1. Each Responsible Entity shall implement one or more documented information protection program(s) for BES Cyber System
Information (BCSI) pertaining to “Applicable Systems” identified in CIP-011-3 Table R1 – Information Protection Program
that collectively includes each of the applicable requirement parts in CIP-011-32 Table R1 – Information Protection
Program. [Violation Risk Factor: Medium] [Time Horizon: Operations Planning].
M1. Evidence for the information protection program must include the applicable requirement parts in CIP-011-32 Table R1 –
Information Protection Program and additional evidence to demonstrate implementation as described in the Measures
column of the table.
Page 5 of 19
CIP-011-23 — Cyber Security — Information Protection
CIP-011-32 Table R1 – Information Protection Program
Part
1.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
and their associated:
1. EACMS; and
Requirements
Method(s) to identify information that
meets the definition of BES Cyber
sytem Information BCSI.
Measures
Examples of acceptable evidence may
include, but are not limited to, the
following:
•
Documented method(s) to identify
BES Cyber System Information BCSI
from the entity’s information
protection program; or
•
Indications on information (e.g.,
labels or classification) that identify
BES Cyber System Information BCSI
as designated in the entity’s
information protection program; or
•
Training materials that provide
personnel with sufficient
knowledge to identify BES Cyber
System Information BCSI; or
•
Repository or electronic and
physical location designated for
housing BES Cyber System
Information in the entity’s
information protection program.
•
Storage locations identified for
housing BCSI in the entity’s
information protection program.
2. PACS
Page 6 of 19
CIP-011-23 — Cyber Security — Information Protection
CIP-011-32 Table R1 – Information Protection Program
Part
1.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Requirements
Procedure(s) for protecting
andMethod(s) to protect and
securely handleing BES Cyber System
InformationBCSI, including storage,
transit, and useto mitigate risks of
compromising confidentiality.
Measures
Examples of acceptable evidence for
on-premise BCSI may include, but are
not limited to, the following:
•
Medium Impact BES Cyber Systems
and their associated:
1. EACMS; and
2. PACS
•
Procedures for protecting and
securely handling BCSI, which
include topics such as storage,
security during transit, and use
of BES Cyber System
information; or
Records indicating that BES
Cyber System Information BCSI
is handled in a manner
consistent with the entity’s
documented procedure(s).
Examples of evidence for off-premise
BCSI may include, but are not limited
to, the following:
•
Implementation of electronic
technical method(s) to protect
electronic BCSI (e.g., data
masking, encryption, hashing,
tokenization, cipher, electronic
key management); or
•
Implementation of physical
technical method(s) to protect
physical BCSI (e.g., physical lock
and key management, physical
Page 7 of 19
CIP-011-23 — Cyber Security — Information Protection
CIP-011-32 Table R1 – Information Protection Program
Part
Applicable Systems
Requirements
Measures
badge management,
biometrics, alarm system); or
•
Implementation of
administrative method(s) to
protect BCSI (e.g., vendor
service risk assessments,
business agreements).
Page 8 of 19
CIP-011-23 — Cyber Security — Information Protection
R2.
Each Responsible Entity shall implement one or more documented process(es) that collectively include the applicable
requirement parts in CIP-011-32 Table R2 – BES Cyber Asset Reuse and Disposal. [Violation Risk Factor: Lower] [Time Horizon:
Operations Planning].
M2. Evidence must include each of the applicable documented processes that collectively include each of the applicable
requirement parts in CIP-011-32 Table R2 – BES Cyber Asset Reuse and Disposal and additional evidence to demonstrate
implementation as described in the Measures column of the table.
CIP-011-32 Table R2 – BES Cyber Asset Reuse and Disposal
Part
2.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS;
2. PACS; and
3. PCA
Medium Impact BES Cyber Systems
and their associated:
1. EACMS;
2. PACS; and
3. PCA
Requirements
Measures
Prior to the release for reuse of
applicable Cyber Assets that contain
BES Cyber System Information BCSI
(except for reuse within other
systems identified in the “Applicable
Systems” column), the Responsible
Entity shall take action to prevent the
unauthorized retrieval of BES Cyber
System InformationBCSI from the
Cyber Asset data storage media.
Examples of acceptable evidence may
include, but are not limited to, the
following:
•
Records tracking sanitization
actions taken to prevent
unauthorized retrieval of BES
Cyebr System Information BCSI
such as clearing, purging, or
destroying; or
•
Records tracking actions such as
encrypting, retaining in the
Physical Security Perimeter or
other methods used to prevent
unauthorized retrieval of BES
Cyber System InformationBCSI.
Page 9 of 19
CIP-011-23 — Cyber Security — Information Protection
CIP-011-32 Table R2 – BES Cyber Asset Reuse and Disposal
Part
2.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS;
2. PACS; and
3. PCA
Medium Impact BES Cyber Systems
and their associated:
1. EACMS;
2. PACS; and
3. PCA
Requirements
Measures
Prior to the disposal of applicable
Cyber Assets that contain BES Cyber
System InformationBCSI, the
Responsible Entity shall take action to
prevent the unauthorized retrieval of
BES Cyber System Information BCSI
from the Cyber Asset or destroy the
data storage media.
Examples of acceptable evidence may
include, but are not limited to, the
following:
•
Records that indicate that
data storage media was
destroyed prior to the
disposal of an applicable
Cyber Asset; or
•
Records of actions taken to
prevent unauthorized
retrieval of BES Cyber System
Information BCSI prior to the
disposal of an applicable
Cyber Asset.
Page 10 of 19
CIP-011-23 — Cyber Security — Information Protection
B. Compliance
1.
Compliance Monitoring Process:
1.1. Compliance Enforcement Authority:
As defined in the NERC Rules of Procedure, “Compliance Enforcement Authority” (CEA) means
NERC or the Regional Entity, or any entity as otherwise designated by an Applicable
Governmental Authority, in their respective roles of monitoring and/or enforcing compliance
with mandatory and enforceable the NERC Reliability Standards in their respective jurisdictions.
1.2. Evidence Retention: The following evidence retention period(s) identify the period of time an
entity is required to retain specific evidence to demonstrate compliance. For instances where
the evidence retention period specified below is shorter than the time since the last audit, the
CEA may ask an entity to provide other evidence to show that it was compliant for the full time
period since the last audit.
The applicable entity shall keep data or evidence to show compliance as identified below unless
directed by its CEA to retain specific evidence for a longer period of time as part of an
investigation.:
The Responsible Entity shall keep data or evidence to show compliance as identified below
unless directed by its CEA to retain specific evidence for a longer period of time as part of an
investigation:
•
Each Responsible The applicable Eentity shall retain evidence of each requirement in this
standard for three calendar years.
•
If a Responsible applicable Eentity is found non-compliant, it shall keep information related
to the noncompliance until mitigation is complete and approved or for the time specified
above, whichever is longer.
•
The CEA shall keep the last audit records and all requested and submitted subsequent audit
records.
1.3. Compliance Monitoring and Assessment Process Enforcement Program: As defined in the
NERC Rules of Procedure, “Compliance Monitoring and Enforcement Program” refers to the
identification of the processes that will be used to evaluate data or information for the purpose
of assessing performance or outcomes with the associated Reliability Standard.
• Compliance Audits
• Self-Certifications
• Spot Checking
• Compliance Violation Investigations
• Self-Reporting
• 3Complaints
1.4. Additional Compliance Information:
None
Page 11 of 19
CIP-011-23 — Cyber Security — Information Protection
Violation Severity Levels
R#
R1
Time
Horizon
VRF
Operations
Planning
Medium
Violation Severity Levels (CIP-011-32)
Lower VSL
N/A
Moderate VSL
N/A
High VSL
The Responsible Entity
documented, but did
not, implement one or
more BCSI protection
program(s). (R1)
OR
The Responsible Entity
documented but did
not implement at least
one method to identify
BCSI. (1.1)
Severe VSL
The Responsible
Entity has not
neither documented
nor implemented a
one or more BES
Cyber System
Information BCSI
protection
program(s). (R1)
OR
The Responsible Entity
documented but did
not implement at least
one method to protect
and securely handle
BCSI. (1.2)
N/A
R2
Operations
Planning
Lower
N/A
The Responsible
Entity implemented
one or more
documented
processes but did not
The Responsible Entity
implemented one or
more documented
processes but did not
include disposal or
The Responsible
Entity has not
documented or
implemented any
processes for
Page 12 of 19
CIP-011-23 — Cyber Security — Information Protection
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-011-32)
Lower VSL
Moderate VSL
include processes for
reuse as to prevent
the unauthorized
retrieval of BES Cyber
System Information
BCSI from the BES
Cyber Asset. (2.1)
High VSL
media destruction
processes to prevent
the unauthorized
retrieval of BES Cyber
System Information
BCSI from the BES
Cyber Asset. (2.2)
Severe VSL
applicable
requirement parts
in CIP-011-32 Table
R3 – BES Cyber
Asset Reuse and
Disposal. (R2)
Page 13 of 19
CIP-011-23 — Cyber Security — Information Protection
C. Regional Variances
None.
D. Interpretations
None.
E. Associated Documents
Version History
Version
Date
Action
1
11/26/12
Adopted by the NERC Board of
Trustees.
1
11/22/13
2
11/13/14
FERC Order issued approving CIP011-1. (Order becomes effective
on 2/3/14.)
Adopted by the NERC Board of
Trustees.
2
2/12/15
Adopted by the NERC Board of
Trustees.
2
1/21/16
FERC Order issued approving CIP011-2. Docket No. RM15-14-000
Change Tracking
Developed to define
the information
protection
requirements in
coordination with other
CIP standards and to
address the balance of
the FERC directives in
its Order 706.
Addressed two FERC
directives from Order
No. 791 related to
identify, assess, and
correct language and
communication
networks.
Replaces the version
adopted by the Board
on 11/13/2014. Revised
version addresses
remaining directives
from Order No. 791
related to transient
devices and low impact
BES Cyber Systems.
Page 14 of 19
CIP-011-23 — Cyber Security — Information Protection
3
TBD
Adopted by the NERC Board of
Trustees
Revised to enhance BES
reliability for entities to
manage their BCSI.
Page 15 of 19
CIP-011-23 — Cyber Security — Information Protection
Guidelines and Technical Basis
Section 4 – Scope of Applicability of the CIP Cyber Security Standards
Section “4. Applicability” of the standards provides important information for Responsible
Entities to determine the scope of the applicability of the CIP Cyber Security Requirements.
Section “4.1. Functional Entities” is a list of NERC functional entities to which the standard
applies. If the entity is registered as one or more of the functional entities listed in Section 4.1,
then the NERC CIP Cyber Security Standards apply. Note that there is a qualification in Section
4.1 that restricts the applicability in the case of Distribution Providers to only those that own
certain types of systems and equipment listed in 4.2.
Section “4.2. Facilities” defines the scope of the Facilities, systems, and equipment owned by
the Responsible Entity, as qualified in Section 4.1, that is subject to the requirements of the
standard. As specified in the exemption section 4.2.3.5, this standard does not apply to
Responsible Entities that do not have High Impact or Medium Impact BES Cyber Systems under
CIP-002-5.1’s categorization. In addition to the set of BES Facilities, Control Centers, and other
systems and equipment, the list includes the set of systems and equipment owned by
Distribution Providers. While the NERC Glossary term “Facilities” already includes the BES
characteristic, the additional use of the term BES here is meant to reinforce the scope of
applicability of these Facilities where it is used, especially in this applicability scoping section.
This in effect sets the scope of Facilities, systems, and equipment that is subject to the
standards.
Requirement R1:
Responsible Entities are free to utilize existing change management and asset management
systems. However, the information contained within those systems must be evaluated, as the
information protection requirements still apply.
The justification for this requirement is pre-existing from previous versions of CIP and is also
documented in FERC Order No. 706 and its associated Notice of Proposed Rulemaking.
This requirement mandates that BES Cyber System Information be identified. The Responsible
Entity has flexibility in determining how to implement the requirement. The Responsible Entity
should explain the method for identifying the BES Cyber System Information in their
information protection program. For example, the Responsible Entity may decide to mark or
label the documents. Identifying separate classifications of BES Cyber System Information is
not specifically required. However, a Responsible Entity maintains the flexibility to do so if they
desire. As long as the Responsible Entity’s information protection program includes all
applicable items, additional classification levels (e.g., confidential, public, internal use only, etc.)
can be created that go above and beyond the requirements. If the entity chooses to use
classifications, then the types of classifications used by the entity and any associated labeling
should be documented in the entity’s BES Cyber System Information Program.
Page 16 of 19
CIP-011-23 — Cyber Security — Information Protection
The Responsible Entity may store all of the information about BES Cyber Systems in a separate
repository or location (physical and/or electronic) with access control implemented. For
example, the Responsible Entity’s program could document that all information stored in an
identified repository is considered BES Cyber System Information, the program may state that
all information contained in an identified section of a specific repository is considered BES
Cyber System Information, or the program may document that all hard copies of information
are stored in a secured area of the building. Additional methods for implementing the
requirement are suggested in the measures section. However, the methods listed in measures
are not meant to be an exhaustive list of methods that the entity may choose to utilize for the
identification of BES Cyber System Information.
The SDT does not intend that this requirement cover publicly available information, such as
vendor manuals that are available via public websites or information that is deemed to be
publicly releasable.
Information protection pertains to both digital and hardcopy information. R1.2 requires one or
more procedures for the protection and secure handling BES Cyber System Information,
including storage, transit, and use. This includes information that may be stored on Transient
Cyber Assets or Removable Media.
The entity’s written Information Protection Program should explain how the entity handles
aspects of information protection including specifying how BES Cyber System Information is to
be securely handled during transit in order to protect against unauthorized access, misuse, or
corruption and to protect confidentiality of the communicated BES Cyber System Information.
For example, the use of a third-party communication service provider instead of organizationowned infrastructure may warrant the use of encryption to prevent unauthorized disclosure of
information during transmission. The entity may choose to establish a trusted communications
path for transit of BES Cyber System Information. The trusted communications path would
utilize a logon or other security measures to provide secure handling during transit. The entity
may employ alternative physical protective measures, such as the use of a courier or locked
container for transmission of information. It is not the intent of this standard to mandate the
use of one particular format for secure handling during transit.
A good Information Protection Program will document the circumstances under which BES
Cyber System Information can be shared with or used by third parties. The organization should
distribute or share information on a need-to-know basis. For example, the entity may specify
that a confidentiality agreement, non-disclosure arrangement, contract, or written agreement
of some kind concerning the handling of information must be in place between the entity and
the third party. The entity’s Information Protection Program should specify circumstances for
sharing of BES Cyber System Information with and use by third parties, for example, use of a
non-disclosure agreement. The entity should then follow their documented program. These
requirements do not mandate one specific type of arrangement.
Requirement R2:
This requirement allows for BES Cyber Systems to be removed from service and analyzed with
their media intact, as that should not constitute a release for reuse. However, following the
Page 17 of 19
CIP-011-23 — Cyber Security — Information Protection
analysis, if the media is to be reused outside of a BES Cyber System or disposed of, the entity
must take action to prevent the unauthorized retrieval of BES Cyber System Information from
the media.
The justification for this requirement is pre-existing from previous versions of CIP and is also
documented in FERC Order No. 706 and its associated Notice of Proposed Rulemaking.
If an applicable Cyber Asset is removed from the Physical Security Perimeter prior to action
taken to prevent the unauthorized retrieval of BES Cyber System Information or destroying the
data storage media, the Responsible Entity should maintain documentation that identifies the
custodian for the data storage media while the data storage media is outside of the Physical
Security Perimeter prior to actions taken by the entity as required in R2.
Media sanitization is the process used to remove information from system media such that
reasonable assurance exists that the information cannot be retrieved or reconstructed. Media
sanitization is generally classified into four categories: Disposal, clearing, purging, and
destroying. For the purposes of this requirement, disposal by itself, with the exception of
certain special circumstances, such as the use of strong encryption on a drive used in a SAN or
other media, should never be considered acceptable. The use of clearing techniques may
provide a suitable method of sanitization for media that is to be reused, whereas purging
techniques may be more appropriate for media that is ready for disposal.
The following information from NIST SP800-88 provides additional guidance concerning the
types of actions that an entity might take to prevent the unauthorized retrieval of BES Cyber
System Information from the Cyber Asset data storage media:
Clear: One method to sanitize media is to use software or hardware products to
overwrite storage space on the media with non-sensitive data. This process may include
overwriting not only the logical storage location of a file(s) (e.g., file allocation table) but
also may include all addressable locations. The security goal of the overwriting process
is to replace written data with random data. Overwriting cannot be used for media that
are damaged or not rewriteable. The media type and size may also influence whether
overwriting is a suitable sanitization method [SP 800-36].
Purge: Degaussing and executing the firmware Secure Erase command (for ATA drives
only) are acceptable methods for purging. Degaussing is exposing the magnetic media to
a strong magnetic field in order to disrupt the recorded magnetic domains. A degausser
is a device that generates a magnetic field used to sanitize magnetic media. Degaussers
are rated based on the type (i.e., low energy or high energy) of magnetic media they can
purge. Degaussers operate using either a strong permanent magnet or an
electromagnetic coil. Degaussing can be an effective method for purging damaged or
inoperative media, for purging media with exceptionally large storage capacities, or for
quickly purging diskettes. [SP 800-36] Executing the firmware Secure Erase command
(for ATA drives only) and degaussing are examples of acceptable methods for purging.
Page 18 of 19
CIP-011-23 — Cyber Security — Information Protection
Degaussing of any hard drive assembly usually destroys the drive as the firmware that
manages the device is also destroyed.
Destroy: There are many different types, techniques, and procedures for media
destruction. Disintegration, Pulverization, Melting, and Incineration are sanitization
methods designed to completely destroy the media. They are typically carried out at an
outsourced metal destruction or licensed incineration facility with the specific
capabilities to perform these activities effectively, securely, and safely. Optical mass
storage media, including compact disks (CD, CD-RW, CD-R, CD-ROM), optical disks
(DVD), and MO disks, must be destroyed by pulverizing, crosscut shredding or burning.
In some cases such as networking equipment, it may be necessary to contact the
manufacturer for proper sanitization procedure.
It is critical that an organization maintain a record of its sanitization actions to prevent
unauthorized retrieval of BES Cyber System Information. Entities are strongly encouraged to
review NIST SP800-88 for guidance on how to develop acceptable media sanitization processes.
Rationale:
During development of this standard, text boxes were embedded within the standard to explain
the rationale for various parts of the standard. Upon BOT approval, the text from the rationale
text boxes was moved to this section.
Rationale for Requirement R1:
The SDT’s intent of the information protection program is to prevent unauthorized access to
BES Cyber System Information.
Rationale for Requirement R2:
The intent of the BES Cyber Asset reuse and disposal process is to prevent the unauthorized
dissemination of BES Cyber System Information upon reuse or disposal.
Page 19 of 19
Exhibit B
Implementation Plan
RELIABILITY | RESILIENCE | SECURITY
Implementation Plan
Project 2019-02 BES Cyber System Information Access Management
Reliability Standard CIP-004 and CIP-011
Applicable Standard(s)
•
CIP-004-7 – Cyber Security - Personnel & Training
•
CIP-011-3 – Cyber Security - Information Protection
Requested Retirement(s)
•
CIP-004-6 – Cyber Security - Personnel & Training
•
CIP-011-2 – Cyber Security - Information Protection
Prerequisite Standard(s)
•
None
Applicable Entities
•
Balancing Authority
•
Distribution Provider 1
•
Generator Operator
•
Reliability Coordinator
•
Transmission Operator
•
Transmission Owner
Background
The purpose of Project 2019-02 BES Cyber System Information (BCSI) Access Management is to
clarify the CIP requirements related to both managing access and securing BCSI. This project
proposes revisions to Reliability Standards CIP-004-6 and CIP-011-2.
The proposed revisions enhance BES reliability by creating increased choice, greater flexibility,
higher availability, and reduced-cost options for entities to manage their BCSI. In addition, the
proposed revisions clarify the protections expected when utilizing third-party solutions (e.g., cloud
services).
1
See subject standards for additional information on Distribution Providers subject to the standards.
RELIABILITY | RESILIENCE | SECURITY
General Considerations
The 24-month period provides Responsible Entities with sufficient time to come into compliance
with new and revised Requirements, including taking steps to:
•
Implement electronic technical mechanisms to mitigate the risk of unauthorized access to
BCSI when Responsible Entities elect to use vendor services;
•
Establish and/or modify vendor relationships to ensure compliance with the updated CIP-004
and CIP-011; and
•
Administrative overhead to review their program.
The 24-month implementation period will allow budgetary cycles for Responsible Entities to allocate
the proper amount of resources to support implementation of the updated CIP-004 and CIP-011. In
addition, the implementation period will provide Electric Reliability Organization (ERO) and
Responsible Entities flexibility in case of unforeseen circumstances or events and afford the
opportunity for feedback to be provided to the ERO and Responsible Entities through various
communication vehicles within industry (e.g., NERC Reliability Standards Technical Committee,
North American Transmission Form), which will encourage more ownership and commitment by
Responsible Entities to adhere to the updated CIP-004 and CIP-011.
Effective Date
CIP-004-7 – Cyber Security - Personnel & Training
Where approval by an applicable governmental authority is required, the standard shall become
effective on the first day of the first calendar quarter that is twenty-four (24) months after the
effective date of the applicable governmental authority’s order approving the standard, or as
otherwise provided for by the applicable governmental authority.
Where approval by an applicable governmental authority is not required, the standard shall become
effective on the first day of the first calendar quarter that is twenty-four (24) months after the date
the standard is adopted by the NERC Board of Trustees, or as otherwise provided for in that
jurisdiction.
CIP-011-3 – Cyber Security - Information Protection
Where approval by an applicable governmental authority is required, the standard shall become
effective on the first day of the first calendar quarter that is twenty-four (24) months after the
effective date of the applicable governmental authority’s order approving the standard, or as
otherwise provided for by the applicable governmental authority.
Where approval by an applicable governmental authority is not required, the standard shall become
effective on the first day of the first calendar quarter that is twenty-four (24) months after the date
the standard is adopted by the NERC Board of Trustees, or as otherwise provided for in that
jurisdiction.
Implementation Plan | June 2021
Project 2019-02 BES Cyber System Information Access Management
2
Initial Performance of Periodic Requirements
Responsible Entities shall initially comply with the periodic requirements in the CIP-004-7 and CIP011-3 within the periodic timeframes of their last performance under the CIP-004-6 and CIP-011-2.
Compliance Dates for Early Adoption of Revised CIP Standards
A Responsible Entity may elect to comply with the requirements in CIP-004-7 and CIP-011-3
following their approval by the applicable governmental authority, but prior to their Effective Date.
In such a case, the Responsible Entity shall notify the applicable Regional Entities of the date of
compliance with the CIP-004-7 and CIP-011-3 Reliability Standards. Responsible Entities must
comply with CIP-004-6 and CIP-011-2 until that date.
Retirement Date
CIP-004-6 – Cyber Security - Personnel & Training
Reliability Standard CIP-004-6 shall be retired immediately prior to the effective date of CIP-004-7 in
the particular jurisdiction in which the revised standard is becoming effective.
CIP-011-2 – Cyber Security - Information Protection
Reliability Standard CIP-011-2 shall be retired immediately prior to the effective date of CIP-011-3 in
the particular jurisdiction in which the revised standard is becoming effective.
Implementation Plan | June 2021
Project 2019-02 BES Cyber System Information Access Management
3
Exhibit C
Order No. 672 Criteria
RELIABILITY | RESILIENCE | SECURITY
EXHIBIT C
Order No. 672 Criteria
In Order No. 672, 1 the Commission identified a number of criteria it will use to analyze
Reliability Standards proposed for approval to ensure they are just, reasonable, not unduly
discriminatory or preferential, and in the public interest. The discussion below identifies these
factors and explains how the proposed Reliability Standards meet or exceed the criteria.
1. Proposed Reliability Standards must be designed to achieve a specified reliability
goal and must contain a technically sound means to achieve that goal. 2
The proposed Reliability Standards require Responsible Entities to manage access to BES
Cyber Security Information (“BCSI”) to prevent unauthorized use. To manage this access, the
proposed Reliability Standards provide increased options for Responsible Entities to leverage
third-party data storage and analysis systems to store BCSI in a secure manner. As a result, the
proposed Reliability Standards enhance reliability by still requiring protections around access to
BCSI while permitting Responsible Entities the flexibility to securely use third-party data storage
and analysis systems.
2. Proposed Reliability Standards must be applicable only to users, owners and
operators of the Bulk-Power System, and must be clear and unambiguous as to
what is required and who is required to comply. 3
The proposed Reliability Standards are clear and unambiguous as to what is required and
who is required to comply, in accordance with Order No. 672. The proposed Reliability Standards
apply to Balancing Authorities, certain Distribution Providers, Generator Operators, Generator
Rules Concerning Certification of the Electric Reliability Organization; and Procedures for the
Establishment, Approval, and Enforcement of Electric Reliability Standards, Order No. 672, 114 FERC ¶ 61,104,
order on reh’g, Order No. 672-A, 114 FERC ¶ 61,328 (2006) [hereinafter Order No. 672].
1
2
See Order No. 672, at P 324.
3
See Order No. 672, at PP 322, 325.
Owners, Reliability Coordinators, Transmission Operators, and Transmission Owners. The
proposed Reliability Standards clearly articulate the actions that such entities must take to comply
with the standard.
3. A proposed Reliability Standard must include clear and understandable
consequences and a range of penalties (monetary and/or non-monetary) for a
violation. 4
The Violation Risk Factors (“VRFs”) and Violation Severity Levels (“VSLs”) for the
proposed Reliability Standards comport with NERC and Commission guidelines related to their
assignment, as discussed further in Exhibit G. The assignment of the severity level for each VSL
is consistent with the corresponding requirement. The VSLs do not use any ambiguous
terminology, thereby supporting uniformity and consistency in the determination of similar
penalties for similar violations. For these reasons, the proposed Reliability Standards include clear
and understandable consequences in accordance with Order No. 672.
4. A proposed Reliability Standard must identify clear and objective criterion or
measure for compliance, so that it can be enforced in a consistent and nonpreferential manner. 5
The proposed Reliability Standards contain measures that support the requirements by
clearly identifying what is required to demonstrate compliance. These measures help provide
clarity regarding the manner in which the requirements will be enforced and help ensure that the
requirements will be enforced in a clear, consistent, and non-preferential manner and without
prejudice to any party.
4
See Order No. 672, at P 326.
5
See Order No. 672, at P 327.
5. Proposed Reliability Standards should achieve a reliability goal effectively and
efficiently — but do not necessarily have to reflect “best practices” without regard
to implementation cost or historical regional infrastructure design. 6
The proposed Reliability Standards achieve the reliability goals effectively and efficiently
in accordance with Order No. 672. The proposed Reliability Standards would achieve the
reliability goal of protecting BCSI through managing access to it.
6. Proposed Reliability Standards cannot be “lowest common denominator,” i.e.,
cannot reflect a compromise that does not adequately protect Bulk-Power System
reliability. Proposed Reliability Standards can consider costs to implement for
smaller entities, but not at consequences of less than excellence in operating system
reliability. 7
The proposed Reliability Standards do not reflect a “lowest common denominator”
approach. The proposed Reliability Standards permit Responsible Entities to leverage more types
of protections to secure BCSI, including encryption.
7. Proposed Reliability Standards must be designed to apply throughout North
America to the maximum extent achievable with a single Reliability Standard while
not favoring one geographic area or regional model. It should take into account
regional variations in the organization and corporate structures of transmission
owners and operators, variations in generation fuel type and ownership patterns,
and regional variations in market design if these affect the proposed Reliability
Standard. 8
The proposed Reliability Standards apply throughout North America and do not favor one
geographic area or regional model.
6
See Order No. 672, at P 328.
7
See Order No. 672, at PP 329-30.
8
See Order No. 672, at P 331.
8. Proposed Reliability Standards should cause no undue negative effect on
competition or restriction of the grid beyond any restriction necessary for
reliability. 9
The proposed Reliability Standards have no undue negative impact on competition. The
proposed Reliability Standards require the same performance by each of the applicable Functional
Entities. The proposed Reliability Standards do not unreasonably restrict the available
transmission capability or limit use of the Bulk-Power System in a preferential manner.
9. The implementation time for the proposed Reliability Standard is reasonable. 10
The proposed implementation period for the proposed Reliability Standards is just and
reasonable and appropriately balances the urgency in the need to implement the standard against
the reasonableness of the time allowed for those who must comply to develop necessary processes.
The proposed implementation plan also permits Responsible Entities to early adopt the revisions
once approved by the Commission and upon notification of applicable Regional Entities.
10. The Reliability Standard was developed in an open and fair manner and in
accordance with the Commission-approved Reliability Standard development
process. 11
The proposed Reliability Standards were developed in accordance with NERC’s
Commission-approved, ANSI-accredited processes for developing and approving Reliability
Standards. Exhibit H includes a summary of the development proceedings and details the
processes followed to develop the proposed Reliability Standards. These processes included,
among other things, comment and ballot periods. Additionally, all meetings of the drafting team
9
See Order No. 672, at P 332.
10
See Order No. 672, at P 333.
11
See Order No. 672, at P 334.
were properly noticed and open to the public. The initial and additional ballots achieved a quorum,
and the last additional ballot and final ballot exceeded the required ballot pool approval levels.
11. NERC must explain any balancing of vital public interests in the development of
proposed Reliability Standards. 12
NERC has identified no competing public interests regarding the request for approval of
the proposed Reliability Standards. No comments were received that indicated the proposed
Reliability Standards conflict with other vital public interests.
12. Proposed Reliability Standards must consider any other appropriate factors. 13
No other negative factors relevant to whether the proposed Reliability Standards are just
and reasonable were identified.
12
See Order No. 672, at P 335.
13
See Order No. 672, at P 323.
Exhibit D
Mapping Documents
RELIABILITY | RESILIENCE | SECURITY
Exhibit D-1
Mapping Document
CIP-004-7
RELIABILITY | RESILIENCE | SECURITY
Mapping Document
Project 2019-02 BES Cyber System Information Access Management
Mapping of CIP-004-6 R4 and R5 to CIP-004-X R6
Access Management Program control requirements as applied to BES Cyber System Information (BCSI) designated storage locations were
moved to CIP-004 Requirement R6.
Standard: CIP-004-6
Requirement in Approved Standard
Translation to New Standard or Other Action
CIP-004-X, Requirement R6. Each Responsible
Entity shall implement one or more documented
access management program(s) to authorize,
verify, and revoke provisioned access to BCSI
pertaining to the “Applicable Systems” identified
in CIP-004-X Table R6 – Access Management for
BES Cyber System Information that collectively
include each of the applicable requirement parts
in CIP‐004‐X Table R6 – Access Management for
BES Cyber System Information. To be considered
access to BCSI in the context of this requirement,
an individual has both the ability to obtain and
use BCSI. Provisioned access is to be considered
the result of the specific actions taken to provide
an individual(s) the means to access BCSI (e.g.,
may include physical keys or access cards, user
accounts and associated rights and privileges,
encryption keys). [Violation Risk Factor: Medium]
Description and Change Justification
Requirement R6 was created to house all BCSI
related access management requirements,
which include the current CIP-004-6 R4.1.3,
R4.4, and R5.3 in a single requirement (R6).
The modified requirement language includes
clarification on the specific elements within an
access management program that need to be
implemented. In addition, a definition of what
constitutes BCSI access was included in the
parent R6 requirement language.
RELIABILITY | RESILIENCE | SECURITY
Standard: CIP-004-6
Requirement in Approved Standard
Translation to New Standard or Other Action
Description and Change Justification
[Time Horizon: Same Day Operations and
Operations Planning].
CIP-004-6, Requirement R4, Part 4.1.3
CIP-004-X, Requirement R6, Part 6.1, 6.1.1, and
6.1.2
Process to authorize based on need, as
determined by the Responsible Entity, except for Prior to provisioning, authorize (unless already
authorized according to Part 4.1.) based on need,
CIP Exceptional Circumstances:
as determined by the Responsible Entity, except
Access to designated storage locations, whether
for CIP Exceptional Circumstances:
physical or electronic, for BES Cyber System
Information.
6.1.1. Provisioned electronic access to electronic
BCSI; and
The modified requirement language includes a
shift from authorizing access to designated
storage locations, to authorizing the provisioned
access to BCSI.
The Note was included to specify the type of
access to be authorized (6.1), verified (6.2) and
revoked (6.3).
6.1.2. Provisioned physical access to physical
BCSI.
CIP-004-6, Requirement R4, Part 4.4
Verify at least once every 15 calendar months
that access to the designated storage locations
for BES Cyber System Information, whether
physical or electronic, are correct and are those
that the Responsible Entity determines are
necessary for performing assigned work
functions.
CIP-004-X, Requirement R6, Part 6.2, 6.2.1, and
6.2.2.
Verify at least once every 15 calendar months
that all individuals with provisioned access to
BCSI:
6.2.1. have an authorization record; and
The modified requirement language includes a
two-part separation of the current CIP-004-6
R4.4 requirement and that the Responsible
Entity 1) Verifies provisioned access to BCSI is
authorized, and 2) Verifies the provisioned
access is still needed.
6.2.2. still need the provisioned access to perform
their current work functions, as
determined by the Responsible Entity.
Mapping Document | March 2021
Project 2019-02 BES Cyber System Information Access Management
2
Standard: CIP-004-6
Requirement in Approved Standard
Translation to New Standard or Other Action
CIP-004-6, Requirement R5, Part 5.3
CIP-004-X, Requirement R6, Part 6.3
For termination actions, revoke the individual’s
current access to the designated storage
locations for BES Cyber System Information,
whether physical or electronic (unless already
revoked according to Requirement R5.1), by the
end of the next calendar day following the
effective date of the termination action.
For termination actions, remove the individual’s
ability to use provisioned access to BCSI (unless
already revoked according to Part 5.1) by the end
of the next calendar day following the effective
date of the termination action.
CIP-004-6, Requirement R5, Part 5.4
CIP-004-6, Requirement R5, Part 5.3
For termination actions, revoke the individual’s
non-shared user accounts (unless already
revoked according to Parts 5.1 or 5.3) within 30
calendar days of the effective date of the
termination action.
For termination actions, revoke the individual’s
non-shared user accounts (unless already revoked
according to Part 5.1) within 30 calendar days of
the effective date of the termination action.
CIP-004-6, Requirement R5, Part 5.5
CIP-004-6, Requirement R5, Part 5.4
For termination actions, change passwords for
shared account(s) known to the user within 30
calendar days of the termination action. For
reassignments or transfers, change passwords
for shared account(s) known to the user within
30 calendar days following the date that the
Responsible Entity determines that the
For termination actions, change passwords for
shared account(s) known to the user within 30
calendar days of the termination action. For
reassignments or transfers, change passwords for
shared account(s) known to the user within 30
calendar days following the date that the
Responsible Entity determines that the individual
no longer requires retention of that access.
Description and Change Justification
The change in requirement language focuses on
revoking the ability to use provisioned access to
BCSI instead of revoking access to the
designated storage locations for BCSI.
This Part was renumbed from 5.4 to 5.3 after
Part 5.3 was removed and incorporated into the
new R6 Part 6.3.
The reference within the Part was changed to
just Part 5.1.
This Part was renumbed from 5.5 to 5.4 after
Part 5.3 was removed and incorporated into the
new R6 Part 6.3. This is a renumbering change
only, no changes were made to the Part’s
requirement language.
If the Responsible Entity determines and
documents that extenuating operating
Mapping Document | March 2021
Project 2019-02 BES Cyber System Information Access Management
3
Standard: CIP-004-6
Requirement in Approved Standard
individual no longer requires retention of that
access.
If the Responsible Entity determines and
documents that extenuating operating
circumstances require a longer time period,
change the password(s) within 10 calendar days
following the end of the operating
circumstances.
Translation to New Standard or Other Action
Description and Change Justification
circumstances require a longer time period,
change the password(s) within 10 calendar days
following the end of the operating circumstances.
Mapping Document | March 2021
Project 2019-02 BES Cyber System Information Access Management
4
Exhibit D-2
Mapping Document
CIP-011-3
RELIABILITY | RESILIENCE | SECURITY
Mapping Document
Project 2019-02 BES Cyber System Information Access Management
Modifications to CIP-011-X
The modifications made to requirements within CIP-011-X are intended to focus on preventing unauthorized access to BES Cyber System
Information (BCSI) regardless of state (storage, transit, use).
Standard: CIP-011-X
Requirement in Approved Standard
Translation to New Standard or Other
Action
CIP-011-2, Requirement R1.
CIP-011-X, Requirement R1.
Each Responsible Entity shall implement one
or more documented information protection
program(s) that collectively includes each of
the applicable requirement parts in CIP-011-2
Table R1 – Information Protection Program.
Each Responsible Entity shall implement
one or more documented information
protection program(s) for BES Cyber
System Information (BCSI) pertaining to
Applicable Systems that collectively
includes each of the applicable
requirement parts in CIP-011-X Table R1 –
Information Protection Program.
CIP-011-2, Requirement R1, Part 1.1
CIP-011-X, Requirement R1, Part 1.1
Method(s) to identify information that meets
the definition of BES Cyber System
Information.
Method(s) to identify BCSI.
Description and Change Justification
Parent CIP-011-X Requirement R1 language
modified to sharpen focus on protecting
BCSI as opposed to protecting the BES Cyber
System(s) and associated applicable
systems, which may contain BCSI.
Requirement language simplified.
RELIABILITY | RESILIENCE | SECURITY
Standard: CIP-011-X
Requirement in Approved Standard
Translation to New Standard or Other
Action
CIP-011-2, Requirement R1, Part 1.2
CIP-011-X, Requirement R1, Part 1.2
Procedure(s) for protecting and securely
handling BES Cyber System Information,
including storage, transit, and use.
Method(s) to protect and securely handle
BCSI to mitigate the risks of compromising
confidentiality.
Mapping Document | June 2021
Project 2019-02 BES Cyber System Information Access Management
Description and Change Justification
Requirement revised to broaden the focus
around the implementation of controls that
mitigate the risks of compromising
confidentiality in any state, not just storage,
transit, and use.
2
Exhibit E
Technical Rationale
RELIABILITY | RESILIENCE | SECURITY
Exhibit E-1
Technical Rationale
CIP-004-7
RELIABILITY | RESILIENCE | SECURITY
Cyber Security —
Personnel & Training
Technical Rationale and Justification for
Reliability Standard CIP-004-X
March 2021
RELIABILITY | RESILIENCE | SECURITY
NERC | Report Title | Report Date
I
Table of Contents
Preface ........................................................................................................................................................................... iii
Introduction ................................................................................................................................................................... iv
Requirement R1 .............................................................................................................................................................. 1
General Considerations for Requirement R1........................................................................................................... 1
Rationale for Requirement R1 ................................................................................................................................. 1
Requirement R2 .............................................................................................................................................................. 2
General Considerations for Requirement R2........................................................................................................... 2
Rationale for Requirement R2 ................................................................................................................................. 2
Requirement R3 .............................................................................................................................................................. 3
General Considerations for Requirement R3........................................................................................................... 3
Rationale for Requirement R3 ................................................................................................................................. 3
Requirement R4 .............................................................................................................................................................. 4
General Considerations for Requirement R4........................................................................................................... 4
Rationale for Requirement R4 ................................................................................................................................. 4
Requirement R5 .............................................................................................................................................................. 5
General Considerations for Requirement R5........................................................................................................... 5
Rationale for Requirement R5 ................................................................................................................................. 5
Requirement R6 .............................................................................................................................................................. 0
General Considerations for Requirement R6........................................................................................................... 0
Rationale for Requirement R6 ................................................................................................................................. 0
Attachment 1: Technical Rationale for Reliability Standard CIP-004-6 .......................................................................... 0
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-7 | March 2021
ii
Preface
Electricity is a key component of the fabric of modern society and the Electric Reliability Organization (ERO) Enterprise
serves to strengthen that fabric. The vision for the ERO Enterprise, which is comprised of the North American Electric
Reliability Corporation (NERC) and the six Regional Entities (REs), is a highly reliable and secure North American bulk
power system (BPS). Our mission is to assure the effective and efficient reduction of risks to the reliability and security
of the grid.
Reliability | Resilience | Security
Because nearly 400 million citizens in North America are counting on us
The North American BPS is divided into six RE boundaries as shown in the map and corresponding table below. The
multicolored area denotes overlap as some load-serving entities participate in one Region while associated
Transmission Owners/Operators participate in another.
MRO
Midwest Reliability Organization
NPCC
Northeast Power Coordinating Council
RF
ReliabilityFirst
SERC
SERC Reliability Corporation
Texas RE
Texas Reliability Entity
WECC
Western Electricity Coordinating Council
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-7 | March 2021
iii
Introduction
This document explains the technical rationale and justification for the proposed Reliability Standard CIP-004-X. It
provides stakeholders and the ERO Enterprise with an understanding of the technology and technical requirements
in the Reliability Standard. It also contains information on the intent of the Standard Drafting Team (SDT) in drafting
the requirements. This Technical Rationale and Justification for CIP-004-X is not a Reliability Standard and should not
be considered mandatory and enforceable.
On July 24, 2019, the North American Electric Reliability Corporation (NERC) Standards Committee accepted a
Standard Authorization Request (SAR) approving and initiative to enhance BES reliability by creating increased choice,
greater flexibility, higher availability, and reduced‐cost options for entities to manage their BES Cyber System
Information, by providing a secure path towards utilization of modern third‐party data storage and analysis systems.
In addition, the project intended to clarify the protections expected when utilizing third‐party solutions (e.g., cloud
services).
In response to this SAR, the Project 2019-02 SDT modified Reliability Standard CIP-004-X to require Responsible
Entities to implement specific controls in Requirement R6 to authorize, verify, and revoke provisioned access to BES
Cyber System Information (BCSI).
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-7 | March 2021
iv
Requirement R1
General Considerations for Requirement R1
None
Rationale for Requirement R1
The security awareness program is intended to be an informational program, not a formal training program. It should
reinforce security practices to ensure that personnel maintain awareness of best practices for both physical and
electronic security to protect its BES Cyber Systems. The Responsible Entity is not required to provide records that
show each individual received or understood the information, but they must maintain documentation of the program
materials utilized in the form of posters, memos, and/or presentations.
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-X | March 2021
1
Requirement R2
General Considerations for Requirement R2
None
Rationale for Requirement R2
Training shall cover the policies, access controls, and procedures as developed for the BES Cyber Systems and include,
at a minimum, the required items appropriate to personnel roles and responsibilities from Table Requirement R2.
One new element in the training content is intended to encompass networking hardware and software and other
issues of electronic interconnectivity supporting the operation and control of BES Cyber Systems as per FERC Order
No. 706, Paragraph 434. Additionally, training should address the risk posed when connecting and using Transient
Cyber Assets (TCA) and Removable Media with BES Cyber Systems or within an Electronic Security Perimeter. As
noted in FERC Order No. 791, Paragraph 135, TCA and Removable Media have been the source of incidents where
malware was introduced into electric generation industrial control systems in real-world situations. Training on their
use is a key element in protecting BES Cyber Systems. This is not intended to provide technical training to individuals
supporting networking hardware and software, but educating system users of the cyber security risks associated with
the interconnectedness of these systems. The users, based on their function, role, or responsibility, should have a
basic understanding of which systems can be accessed from other systems and how the actions they take can affect
cyber security.
Each Responsible Entity shall ensure all personnel who are granted authorized electronic access and/or authorized
unescorted physical access to its BES Cyber Systems, including contractors and service vendors, complete cyber
security training prior to their being granted authorized access, except for CIP Exceptional Circumstances. To retain
the authorized accesses, individuals must complete the training at least one every 15 months.
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-X | March 2021
2
Requirement R3
General Considerations for Requirement R3
None
Rationale for Requirement R3
Each Responsible Entity shall ensure a personnel risk assessment is performed for all personnel who are granted
authorized electronic access and/or authorized unescorted physical access to its BES Cyber Systems, including
contractors and service vendors, prior to their being granted authorized access, except for program specified
exceptional circumstances that are approved by the single senior management official or their delegate and impact
the reliability of the BES or emergency response. Identity should be confirmed in accordance with federal, state,
provincial, and local laws, and subject to existing collective bargaining unit agreements. Identity only needs to be
confirmed prior to initially granting access and only requires periodic confirmation according to the entity’s process
during the tenure of employment, which may or may not be the same as the initial verification action.
A seven year criminal history check should be performed for those locations where the individual has resided for at
least six consecutive months. This check should also be performed in accordance with federal, state, provincial, and
local laws, and subject to existing collective bargaining unit agreements. When it is not possible to perform a full
seven year criminal history check, documentation must be made of what criminal history check was performed, and
the reasons a full seven-year check could not be performed. Examples of this could include individuals under the age
of 25 where a juvenile criminal history may be protected by law, individuals who may have resided in locations from
where it is not possible to obtain a criminal history records check, violates the law or is not allowed under the existing
collective bargaining agreement. The Responsible Entity should consider the absence of information for the full seven
years when assessing the risk of granting access during the process to evaluate the criminal history check. There
needs to be a personnel risk assessment that has been completed within the last seven years for each individual with
access. A new criminal history records check must be performed as part of the new personnel risk assessment (PRA).
Individuals who have been granted access under a previous version of these standards need a new PRA within seven
years of the date of their last PRA. The clarifications around the seven year criminal history check in this version do
not require a new PRA be performed by the implementation date.
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-X | March 2021
3
Requirement R4
General Considerations for Requirement R4
None
Rationale for Requirement R4
Authorization for electronic and unescorted physical access must be on the basis of necessity in the individual
performing a work function. Documentation showing the authorization should have some justification of the business
need included.
This requirement specifies both quarterly reviews and reviews at least once every 15 calendar months. Quarterly
reviews are to perform a validation that only authorized users have been granted access to BES Cyber Systems. The
focus of this requirement is on the integrity of provisioning access rather than individual accounts on all BES Cyber
Assets.
The privilege review at least once every 15 calendar months is more detailed to ensure an individual’s associated
privileges are the minimum necessary to perform their work function.
If the results of quarterly or at least once every 15 calendar months account reviews indicate an administrative or
clerical error in which access was not actually provisioned, then the SDT intends that this error should not be
considered a violation of this requirement.
For BES Cyber Systems that do not have user accounts defined, the controls listed in Requirement R4 are not
applicable. However, the Responsible Entity should document such configurations.
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-X | March 2021
4
Requirement R5
General Considerations for Requirement R5
None
Rationale for Requirement R5
Revocation of electronic access should be understood to mean a process with the end result that electronic access
to BES Cyber Systems is no longer possible using credentials assigned to or known by the individual(s) whose access
privileges are being revoked.
The initial revocation required in Requirement R5 Part 5.1 includes unescorted physical access and Interactive
Remote Access. These two actions should prevent any further access by the individual after termination. If an
individual still has local access accounts (i.e., accounts on the Cyber Asset itself) on BES Cyber Assets, then the
Responsible Entity has 30 days to complete the revocation process for those accounts. However, nothing prevents a
Responsible Entity from performing all of the access revocation at the time of termination.
Revocation of access to shared accounts is called out separately to prevent the situation where passwords on
substation and generation devices are constantly changed due to staff turnover.
Requirement R5 Part 5.5 specified that passwords for shared account are to be changed within 30 calendar days of
the termination action or when the Responsible Entity determines an individual no longer requires access to the
account as a result of a reassignment or transfer. The 30 days applies under normal operating conditions. However,
circumstances may occur where this is not possible. Some systems may require an outage or reboot of the system in
order to complete the password change. In periods of extreme heat or cold, many Responsible Entities may prohibit
system outages and reboots in order to maintain reliability of the Bulk Electric System. When these circumstances
occur, the Responsible Entity must document these circumstances and prepare to change the password within 10
calendar days following the end of the operating circumstances. Records of activities must be retained to show that
the Responsible Entity followed the plan they created.
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-X | March 2021
5
Requirement R6
General Considerations for Requirement R6
None
Rationale for Requirement R6
Requirement R6 requires Responsible Entities to implement a BES Cyber System Information (BCSI) access
management program to ensure that provisioned access to BCSI is authorized, verified, and promptly revoked.
Authorization ensures only individuals who have a need are authorized for provisioned access to BCSI. Prompt
revocation of terminated individuals’ ability to access BCSI helps prevent inappropriate disclosure or use of BCSI.
Periodic verification ensures that what is currently provisioned is authorized and still required, and allows the
Responsible Entity the opportunity to correct any errors in provisioning.
The change to “provisioned access” instead of “designated storage locations” enables the use of third-party solutions
(e.g., cloud services) for BCSI. The concept of “designated storage locations” is too prescriptive and limiting for
entities that want to implement file-level rights and permissions (i.e., policy based credentials or encryption keys that
follow the file and the provisioned individual), which provide BCSI access controls regardless of storage location. The
concept of provisioned access provides the needed flexibility for entities to use other technologies and approaches
instead of or in addition to storage locations as a way to meet the access management requirements for BCSI,
especially that which is stored in third-party cloud solutions or is protected at the information/file level no matter
where it is located.
According to Requirement R6, Part 6.1, the Responsible Entity must authorize individuals to be given provisioned
access to BCSI. First, the Responsible Entity determines who needs the ability to obtain and use BCSI for performing
legitimate work functions. Next, a person empowered by the Responsible Entity to do so authorizes—gives
permission or approval for—those individuals to be given provisioned access to BCSI. Only then would the
Responsible Entity provision access to BCSI as authorized.
Provisioned access is to be considered the result of specific actions taken to provide an individual the means to access
BCSI (e.g., physical keys or access cards, user accounts and associated rights and privileges, encryption keys, etc.). In
the context of this requirement, an individual is considered to have been provisioned access if they concurrently have
the means to both obtain and use the BCSI. To illustrate, an individual who can obtain encrypted BCSI but does not
have the encryption keys to be able to use the BCSI has not been provisioned access to the BCSI.
For BCSI in physical format, physical access is provisioned to a physical storage location designated for BCSI and for
which access can be provisioned, such as a lockable file cabinet. For BCSI in electronic format, electronic access is
provisioned to an electronic system or its contents, or to individual files. Provisioned physical access alone to a
physical location housing hardware that contains electronic BCSI is not considered to be provisioned access to the
electronic BCSI. Take, for instance, storing BCSI with a cloud service provider. In this case, the cloud service provider’s
personnel with physical access to the data center is not, by itself, considered provisioned access to the electronic
BCSI stored on servers in that data center, as the personnel would also need to be provisioned electronic access to
the servers or system. In scenarios like this, the Responsible Entity should implement appropriate information
protection controls to help prevent unauthorized access to BCSI per its information protection program, as required
in CIP-011-X. The subparts in Requirement R6, Part 6.1 were written to reinforce this concept and clarify access
management requirements.
The periodic verification required by Requirement R6 Part 6.2 is to ensure that only authorized individuals have been
provisioned access to BCSI and that what is provisioned is what each individual currently needs to perform work
functions. For example, by performing the verification, the Responsible Entity might identify individuals who have
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-7 | August 2020
0
Requirement R6
changed jobs and no longer have a need for provisioned access to BCSI, and would therefore revoke provisioned
access.
For Requirement R6 Part 6.3, removal of an individual’s ability to use provisioned access to BCSI is considered to
mean a process with the result that electronic access to electronic BCSI and physical access to physical BCSI is no
longer possible from that point in time onwards using the means the individual had been given to obtain and use
BCSI in those circumstances. Either what was specifically provisioned to give an individual access to BCSI (e.g., keys,
local user or database accounts and associated privileges, etc.) is taken away, deleted, disabled, revoked, etc. (also
known as “deprovisioning”), or some primary access is removed which prevents the individual from using the
specifically provisioned means. Requirement R6 Part 6.3 acknowledges that where removing unescorted physical
access and Interactive Remote Access, such as is required in Requirement R5 Part 5.1, prevents any further access to
BCSI by the individual after termination, then this would constitute removal of an individual’s ability to use
provisioned access to BCSI. Access can only be revoked or removed where access has been provisioned. The intent is
not to have to retrieve individual pieces of BCSI (e.g., documents) that might be in someone’s possession (although
you should if you can, but the individual cannot un-see what they have already seen).
Where no specific mechanisms are available or feasible for provisioning access to BCSI, these requirements are not
applicable. For example, there is no available or feasible mechanism to provision access in instances when an
individual is merely given, views, or might see BCSI, such as when the individual is handed a piece of paper during a
meeting or sees a whiteboard in a conference room. Likewise, these requirements are not applicable where
provisioned electronic or physical access is not specifically intended to provide an individual the means to obtain and
use BCSI. There will likely be no specific provisioning of access to BCSI on work stations, laptops, flash drives, portable
equipment, offices, vehicles, etc., especially when BCSI is only temporarily or incidentally located or stored there.
Another example is the provisioning of access to a substation, the intent of which is to enable an individual to gain
access to the substation to perform substation-related work tasks, not to access BCSI that may be located there.
However, BCSI in these locations and situations still needs to be protected against unauthorized access per the
Responsible Entity’s information protection program as required by CIP-011-X.
The change to “provisioned access” to BCSI is backwards compatible with the previous “designated storage locations”
concept. Entities have likely designated only those storage locations to which access can be provisioned, rather than
any location where BCSI might be found. Both concepts intend to exclude those locations where BCSI is temporarily
stored, as explained in the previous paragraph. Provisioned access, like designated storage locations, maintains the
scope to a finite and discrete object that is manageable and auditable, rather than trying to manage access to
individual pieces of information. The removal of the term “designated storage location” does not preclude an entity
from defining storage locations for the entity’s access management program for authorization, verification, and
revocation of access to BCSI.
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-X | March 2021
1
Attachment 1: Technical Rationale for Reliability Standard CIP-004-6
This section contains a “cut and paste” of the Technical Rationale components of the former Guidelines and Technical
Basis (GTB) as-is of from CIP-004-6 standard to preserve any historical references. Similarly, former GTB content
providing compliance guidance can be found in a separate Implementation Guidance document for this standard.
Section 4 – Scope of Applicability of the CIP Cyber Security Standards
Section “4. Applicability” of the standards provides important information for Responsible Entities to determine the
scope of the applicability of the CIP Cyber Security Requirements.
Section “4.1. Functional Entities” is a list of NERC functional entities to which the standard applies. If the entity is
registered as one or more of the functional entities listed in Section 4.1, then the NERC CIP Cyber Security Standards
apply. Note that there is a qualification in Section 4.1 that restricts the applicability in the case of Distribution
Providers to only those that own certain types of systems and equipment listed in 4.2.
Section “4.2. Facilities” defines the scope of the Facilities, systems, and equipment owned by the Responsible Entity,
as qualified in Section 4.1, that is subject to the requirements of the standard. As specified in the exemption section
4.2.3.5, this standard does not apply to Responsible Entities that do not have High Impact or Medium Impact BES
Cyber Systems under CIP-002-5.1’s categorization. In addition to the set of BES Facilities, Control Centers, and other
systems and equipment, the list includes the set of systems and equipment owned by Distribution Providers. While
the NERC Glossary term “Facilities” already includes the BES characteristic, the additional use of the term BES here is
meant to reinforce the scope of applicability of these Facilities where it is used, especially in this applicability scoping
section. This in effect sets the scope of Facilities, systems, and equipment that is subject to the standards.
Requirement R1:
The security awareness program is intended to be an informational program, not a formal training program. It
should reinforce security practices to ensure that personnel maintain awareness of best practices for both physical
and electronic security to protect its BES Cyber Systems. The Responsible Entity is not required to provide records
that show that each individual received or understood the information, but they must maintain documentation of
the program materials utilized in the form of posters, memos, and/or presentations.
Requirement R2:
Training shall cover the policies, access controls, and procedures as developed for the BES Cyber Systems and
include, at a minimum, the required items appropriate to personnel roles and responsibilities from Table R2.
One new element in the training content is intended to encompass networking hardware and software and other
issues of electronic interconnectivity supporting the operation and control of BES Cyber Systems as per FERC Order
No. 706, Paragraph 434. Additionally, training should address the risk posed when connecting and using Transient
Cyber Assets and Removable Media with BES Cyber Systems or within an Electronic Security Perimeter. As noted in
FERC Order No. 791, Paragraph 135, Transient Cyber Assets and Removable Media have been the source of
incidents where malware was introduced into electric generation industrial control systems in real-world situations.
Training on their use is a key element in protecting BES Cyber Systems. This is not intended to provide technical
training to individuals supporting networking hardware and software, but educating system users of the cyber
security risks associated with the interconnectedness of these systems. The users, based on their function, role, or
responsibility, should have a basic understanding of which systems can be accessed from other systems and how
the actions they take can affect cyber security.
Each Responsible Entity shall ensure all personnel who are granted authorized electronic access and/or authorized
unescorted physical access to its BES Cyber Systems, including contractors and service vendors, complete cyber
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-7 | August 2020
0
Attachment 1: Technical Rationale for Reliability Standard CIP-004-6
security training prior to their being granted authorized access, except for CIP Exceptional Circumstances. To retain
the authorized accesses, individuals must complete the training at least one every 15 months.
Requirement R3:
Each Responsible Entity shall ensure a personnel risk assessment is performed for all personnel who are granted
authorized electronic access and/or authorized unescorted physical access to its BES Cyber Systems, including
contractors and service vendors, prior to their being granted authorized access, except for program specified
exceptional circumstances that are approved by the single senior management official or their delegate and impact
the reliability of the BES or emergency response.
Identity only needs to be confirmed prior to initially granting access and only requires periodic confirmation
according to the entity’s process during the tenure of employment, which may or may not be the same as the initial
verification action.
A seven year criminal history check should be performed for those locations where the individual has resided for at
least six consecutive months. This check should also be performed in accordance with federal, state, provincial, and
local laws, and subject to existing collective bargaining unit agreements. When it is not possible to perform a full
seven year criminal history check, documentation must be made of what criminal history check was performed, and
the reasons a full seven-year check could not be performed.
There needs to be a personnel risk assessment that has been completed within the last seven years for each
individual with access. A new criminal history records check must be performed as part of the new PRA. Individuals
who have been granted access under a previous version of these standards need a new PRA within seven years of
the date of their last PRA. The clarifications around the seven year criminal history check in this version do not
require a new PRA be performed by the implementation date.
Requirement R4:
Authorization for electronic and unescorted physical access and access to BES Cyber System Information must be
on the basis of necessity in the individual performing a work function. Documentation showing the authorization
should have some justification of the business need included. To ensure proper segregation of duties, access
authorization and provisioning should not be performed by the same person where possible.
This requirement specifies both quarterly reviews and reviews at least once every 15 calendar months. Quarterly
reviews are to perform a validation that only authorized users have been granted access to BES Cyber Systems. The
focus of this requirement is on the integrity of provisioning access rather than individual accounts on all BES Cyber
Assets.
The privilege review at least once every 15 calendar months is more detailed to ensure an individual’s associated
privileges are the minimum necessary to perform their work function.
An example timeline of all the reviews in Requirement R4 is included below.
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-X | March 2021
1
Attachment 1: Technical Rationale for Reliability Standard CIP-004-6
1/1
1) Quarterly access review
2) privilege review (at least once every
15 calendar months)
3) BES Cyber
System Information
review (at least once every
4/1
15 calendar months)
Quarterly access review
2/1
3/1
4/1
7/1
Quarterly access review
5/1
6/1
7/1
1/1
1) Quarterly access review
2) privilege review
(at least once every
15 calendar months)
3) BES Cyber System
Information review
(at least once every
15 calendar months)
10/1
Quarterly access review
8/1
9/1
10/1
11/1
12/1
1/1
1/1
If the results of quarterly or at least once every 15 calendar months account reviews indicate an administrative or
clerical error in which access was not actually provisioned, then the SDT intends that this error should not be
considered a violation of this requirement.
For BES Cyber Systems that do not have user accounts defined, the controls listed in Requirement R4 are not
applicable. However, the Responsible Entity should document such configurations.
Requirement R5:
The requirement to revoke access at the time of the termination action includes procedures showing revocation of
access concurrent with the termination action. This requirement recognizes that the timing of the termination action
may vary depending on the circumstance.
Revocation of electronic access should be understood to mean a process with the end result that electronic access
to BES Cyber Systems is no longer possible using credentials assigned to or known by the individual(s) whose access
privileges are being revoked.
The initial revocation required in Requirement R5.1 includes unescorted physical access and Interactive Remote
Access. These two actions should prevent any further access by the individual after termination. If an individual still
has local access accounts (i.e., accounts on the Cyber Asset itself) on BES Cyber Assets, then the Responsible Entity
has 30 days to complete the revocation process for those accounts.
Revocation of access to shared accounts is called out separately to prevent the situation where passwords on
substation and generation devices are constantly changed due to staff turnover.
Requirement 5.5 specified that passwords for shared account are to the changed within 30 calendar days of the
termination action or when the Responsible Entity determines an individual no longer requires access to the account
as a result of a reassignment or transfer. The 30 days applies under normal operating conditions. However,
circumstances may occur where this is not possible. Some systems may require an outage or reboot of the system in
order to complete the password change. In periods of extreme heat or cold, many Responsible Entities may prohibit
system outages and reboots in order to maintain reliability of the BES. When these circumstances occur, the
Responsible Entity must document these circumstances and prepare to change the password within 10 calendar days
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-X | March 2021
2
Attachment 1: Technical Rationale for Reliability Standard CIP-004-6
following the end of the operating circumstances. Records of activities must be retained to show that the Responsible
Entity followed the plan they created.
Rationale:
During development of this standard, text boxes were embedded within the standard to explain the rationale for
various parts of the standard. Upon BOT approval, the text from the rationale text boxes was moved to this section.
Rationale for Requirement R1:
Ensures that Responsible Entities with personnel who have authorized electronic or authorized unescorted physical
access to BES Cyber Assets take action so that those personnel with such authorized electronic or authorized
unescorted physical access maintain awareness of the Responsible Entity’s security practices.
Rationale for Requirement R2:
To ensure that the Responsible Entity’s training program for personnel who need authorized electronic access and/or
authorized unescorted physical access to BES Cyber Systems covers the proper policies, access controls, and
procedures to protect BES Cyber Systems and are trained before access is authorized.
Rationale for Requirement R3:
To ensure that individuals who need authorized electronic or authorized unescorted physical access to BES Cyber
Systems have been assessed for risk. Whether initial access or maintaining access, those with access must have had
a personnel risk assessment completed within the last 7 years.
Rationale for Requirement R4:
To ensure that individuals with access to BES Cyber Systems and the physical and electronic locations where BES
Cyber System Information is stored by the Responsible Entity have been properly authorized for such access.
“Authorization” should be considered to be a grant of permission by a person or persons empowered by the
Responsible Entity to perform such grants and included in the delegations referenced in CIP-003-6. “Provisioning”
should be considered the actions to provide access to an individual.
Access is physical, logical, and remote permissions granted to Cyber Assets composing the BES Cyber System or
allowing access to the BES Cyber System. When granting, reviewing, or revoking access, the Responsible Entity must
address the Cyber Asset specifically as well as the systems used to enable such access (i.e., physical access control
system, remote access system, directory services).
CIP Exceptional Circumstances are defined in a Responsible Entity’s policy from CIP-003-6 and allow an exception to
the requirement for authorization to BES Cyber Systems and BES Cyber System Information.
Quarterly reviews in Part 4.5 are to perform a validation that only authorized users have been granted access to BES
Cyber Systems. This is achieved by comparing individuals actually provisioned to a BES Cyber System against records
of individuals authorized to access the BES Cyber System. The focus of this requirement is on the integrity of
provisioning access rather than individual accounts on all BES Cyber Assets.
If the results of quarterly or annual account reviews indicate an administrative or clerical error in which access was
not actually provisioned, then the SDT intends that the error should not be considered a violation of this requirement.
For BES Cyber Systems that do not have user accounts defined, the controls listed in Requirement R4 are not
applicable. However, the Responsible Entity should document such configurations.
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-X | March 2021
3
Attachment 1: Technical Rationale for Reliability Standard CIP-004-6
Rationale for Requirement R5:
The timely revocation of electronic access to BES Cyber Systems is an essential element of an access management
regime. When an individual no longer requires access to a BES Cyber System to perform his or her assigned functions,
that access should be revoked. This is of particular importance in situations where a change of assignment or
employment is involuntary, as there is a risk the individual(s) involved will react in a hostile or destructive manner.
In considering how to address directives in FERC Order No. 706 directing “immediate” revocation of access for
involuntary separation, the SDT chose not to specify hourly time parameters in the requirement (e.g., revoking access
within 1 hour). The point in time at which an organization terminates a person cannot generally be determined down
to the hour. However, most organizations have formal termination processes, and the timeliest revocation of access
occurs in concurrence with the initial processes of termination.
Access is physical, logical, and remote permissions granted to Cyber Assets composing the BES Cyber System or
allowing access to the BES Cyber System. When granting, reviewing, or revoking access, the Responsible Entity must
address the Cyber Asset specifically as well as the systems used to enable such access (e.g., physical access control
system, remote access system, directory services).
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-X | March 2021
4
Exhibit E-2
Technical Rationale
CIP-011-3
RELIABILITY | RESILIENCE | SECURITY
Cyber Security —
Information Protection
Technical Rationale and Justification for
Reliability Standard CIP-011-X
March 2021
RELIABILITY | RESILIENCE | SECURITY
NERC | Report Title | Report Date
I
Table of Contents
Preface ........................................................................................................................................................................... iii
Introduction ................................................................................................................................................................... iv
Background................................................................................................................................................................. iv
Requirement R1 .............................................................................................................................................................. 5
General Considerations for Requirement R1 .............................................................................................................. 5
Rationale for Modifications to Requirement R1:..................................................................................................... 5
Requirement R2 .............................................................................................................................................................. 6
General Considerations for Requirement R2 .............................................................................................................. 6
Rationale for Requirement R2: ................................................................................................................................ 6
Attachment 1: Technical Rationale for Reliability Standard CIP-011-2 .......................................................................... 7
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-X | March 2021
ii
Preface
Electricity is a key component of the fabric of modern society and the Electric Reliability Organization (ERO) Enterprise
serves to strengthen that fabric. The vision for the ERO Enterprise, which is comprised of the North American Electric
Reliability Corporation (NERC) and the six Regional Entities (REs), is a highly reliable and secure North American bulk
power system (BPS). Our mission is to assure the effective and efficient reduction of risks to the reliability and security
of the grid.
Reliability | Resilience | Security
Because nearly 400 million citizens in North America are counting on us
The North American BPS is divided into six RE boundaries as shown in the map and corresponding table below. The
multicolored area denotes overlap as some load-serving entities participate in one Region while associated
Transmission Owners/Operators participate in another.
MRO
Midwest Reliability Organization
NPCC
Northeast Power Coordinating Council
RF
ReliabilityFirst
SERC
SERC Reliability Corporation
Texas RE
Texas Reliability Entity
WECC
Western Electricity Coordinating Council
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-X | March 2021
iii
Introduction
Background
This document explains the technical rationale and justification for the proposed Reliability Standard CIP-011-X. It
provides stakeholders and the ERO Enterprise with an understanding of the technology and technical requirements
in the Reliability Standard. It also contains information on the standard drafting team’s (SDT’s) intent in drafting the
requirements. This Technical Rationale and Justification for CIP-011-X is not a Reliability Standard and should not be
considered mandatory and enforceable.
On July 24, 2019, the North American Electric Reliability Corporation (NERC) Standards Committee accepted a
Standard Authorization Request (SAR) approving an initiative to enhance BES reliability by creating increased
choice, greater flexibility, higher availability, and reduced‐cost options for entities to manage their BES Cyber
System Information (BCSI), by providing a secure path towards utilization of modern third‐party data storage and
analysis systems. In addition, the project intended to clarify the protections expected when utilizing third‐party
solutions (e.g., cloud services).
In response to this SAR, the Project 2019-02 SDT drafted Reliability Standard CIP-011-X to require Responsible Entities
to implement specific methods in Requirement R1 for administrative, technical, and physical controls related to BCSI
during storage, handling and use including when utilizing vendor provided cloud services such as Software as a Service
(SaaS), Infrastructure as a Service (IaaS), or Platform as a Service (PaaS).
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-X | March 2021
iv
Requirement R1
General Considerations for Requirement R1
None
Rationale for Modifications to Requirement R1:
Requirement R1 still specifies the need to implement one or more documented information protection program(s).
The SDT does not intend that this requirement cover publicly available information, such as vendor manuals or
information that is deemed to be publicly releasable. Information protection pertains to both digital and hardcopy
information.
The SDT clarified the intent of protecting BCSI as opposed to protecting the BES Cyber System(s) and associated
applicable systems which may contain BCSI. This was achieved by modifying the parent CIP-011-X R1 requirement
language to include “for BES Cyber System Information (BCSI) pertaining to Applicable Systems”.
Rationale for Modifications to Requirement R1, Part 1.1
Requirement R1, Part 1.1, is an objective level requirement focused on identifying BES Cyber System Information
(BCSI). The intent of the SDT was to simplify the requirement language from CIP-011-2 Part 1.1.
Rationale for Modifications to Requirement R1, Part 1.2
Requirement R1, Part 1.2, is an objective level requirement focused on protecting and securely handling
BES Cyber System Information (BCSI) in order to mitigate risks of compromising confidentiality. The
reference to different states of information such as “transit” or “storage” or “use” was removed. The
intent is to reduce confusion of Responsible Entities attempting to interpret controls specific to different
states of information, limiting controls to said states, overlapping controls between states, and reduce
confusion from an enforcement perspective. By removing this language, methods to protect BCSI
becomes explicitly comprehensive.
Requirement language revisions reflect consistency with other CIP requirements.
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-X | March 2021
5
Requirement R2
General Considerations for Requirement R2
None
Rationale for Requirement R2:
The intent of the BES Cyber Asset reuse and disposal process is to prevent the unauthorized dissemination of BCSI
upon reuse or disposal.
This requirement allows for BES Cyber Systems to be removed from service and analyzed with their media intact, as
that should not constitute a release for reuse.
The justification for this requirement is pre-existing from previous versions of CIP and is also documented in FERC
Order No. 706 and its associated Notice of Proposed Rulemaking.
Requirement 2 has remained unchanged. The requirements are focused more on the reuse and disposal of BCS rather
than BCSI. While acknowledging that such BCS and other applicable systems may have BCSI residing on them, the
original intent of the requirement is broader than addressing BCSI. This is a lifecycle issue concerning the applicable
systems. CIP-002 focuses on the beginning of the BCS lifecycle but not an end. The potential end of the applicable
systems lifecycle is absent from CIP-011 to reduce confusion with reuse and disposal of BCSI. The 2019 BCSI Access
Management project did not include modification of CIP-002 in the scope of the SAR. This concern has been
communicated for future evaluation.
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-X | March 2021
6
Attachment 1: Technical Rationale for Reliability Standard CIP-011-2
This section contains a “cut and paste” of the Technical Rationale components of the former Guidelines and Technical
Basis (GTB) as-is of from CIP-011-2 standard to preserve any historical references. Similarly, former GTB content
providing compliance guidance can be found in a separate Implementation Guidance document for this standard.
Section 4 – Scope of Applicability of the CIP Cyber Security Standards
Section “4. Applicability” of the standards provides important information for Responsible Entities to determine the
scope of the applicability of the CIP Cyber Security Requirements.
Section “4.1. Functional Entities” is a list of NERC functional entities to which the standard applies. If the entity is
registered as one or more of the functional entities listed in Section 4.1, then the NERC CIP Cyber Security Standards
apply. Note that there is a qualification in Section 4.1 that restricts the applicability in the case of Distribution
Providers to only those that own certain types of systems and equipment listed in 4.2.
Section “4.2. Facilities” defines the scope of the Facilities, systems, and equipment owned by the Responsible Entity,
as qualified in Section 4.1, that is subject to the requirements of the standard. As specified in the exemption section
4.2.3.5, this standard does not apply to Responsible Entities that do not have High Impact or Medium Impact BES
Cyber Systems under CIP-002-5.1’s categorization. In addition to the set of BES Facilities, Control Centers, and other
systems and equipment, the list includes the set of systems and equipment owned by Distribution Providers. While
the NERC Glossary term “Facilities” already includes the BES characteristic, the additional use of the term BES here is
meant to reinforce the scope of applicability of these Facilities where it is used, especially in this applicability scoping
section. This in effect sets the scope of Facilities, systems, and equipment that is subject to the standards.
Requirement R1:
Responsible Entities are free to utilize existing change management and asset management systems.
However, the information contained within those systems must be evaluated, as the information protection
requirements still apply.
The justification for this requirement is pre-existing from previous versions of CIP and is also documented in FERC
Order No. 706 and its associated Notice of Proposed Rulemaking.
This requirement mandates that BES Cyber System Information be identified. The Responsible Entity has flexibility in
determining how to implement the requirement. The Responsible Entity should explain the method for identifying
the BES Cyber System Information in their information protection program. For example, the Responsible Entity may
decide to mark or label the documents. Identifying separate classifications of BES Cyber System Information is not
specifically required. However, a Responsible Entity maintains the flexibility to do so if they desire. As long as the
Responsible Entity’s information protection program includes all applicable items, additional classification levels (e.g.,
confidential, public, internal use only, etc.) can be created that go above and beyond the requirements. If the entity
chooses to use classifications, then the types of classifications used by the entity and any associated labeling should
be documented in the entity’s BES Cyber System Information Program.
The Responsible Entity may store all of the information about BES Cyber Systems in a separate repository or location
(physical and/or electronic) with access control implemented. For example, the Responsible Entity’s program could
document that all information stored in an identified repository is considered BES Cyber System Information, the
program may state that all information contained in an identified section of a specific repository is considered BES
Cyber System Information, or the program may document that all hard copies of information are stored in a secured
area of the building. Additional methods for implementing the requirement are suggested in the measures section.
However, the methods listed in measures are not meant to be an exhaustive list of methods that the entity may
choose to utilize for the identification of BES Cyber System Information.
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-X | March 2021
7
The SDT does not intend that this requirement cover publicly available information, such as vendor manuals that are
available via public websites or information that is deemed to be publicly releasable. Information protection pertains
to both digital and hardcopy information. Requirement R1 Part 1.2 requires one or more procedures for the
protection and secure handling BES Cyber System Information, including storage, transit, and use. This includes
information that may be stored on Transient Cyber Assets or Removable Media.
The entity’s written Information Protection Program should explain how the entity handles aspects of information
protection including specifying how BES Cyber System Information is to be securely handled during transit in order
to protect against unauthorized access, misuse, or corruption and to protect confidentiality of the communicated BES
Cyber System Information. For example, the use of a third-party communication service provider instead of
organization-owned infrastructure may warrant the use of encryption to prevent unauthorized disclosure of
information during transmission. The entity may choose to establish a trusted communications path for transit of BES
Cyber System Information. The trusted communications path would utilize a logon or other security measures to
provide secure handling during transit. The entity may employ alternative physical protective measures, such as the
use of a courier or locked container for transmission of information. It is not the intent of this standard to mandate
the use of one particular format for secure handling during transit.
A good Information Protection Program will document the circumstances under which BES Cyber System
Information can be shared with or used by third parties. The organization should distribute or share information on
a need-to-know basis. For example, the entity may specify that a confidentiality agreement, non-disclosure
arrangement, contract, or written agreement of some kind concerning the handling of information must be in place
between the entity and the third party. The entity’s Information Protection Program should specify circumstances for
sharing of BES Cyber System Information with and use by third parties, for example, use of a non-disclosure
agreement. The entity should then follow their documented program. These requirements do not mandate one
specific type of arrangement.
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-X | March 2021
8
Technical Rationale for Reliability Standard CIP-011-2
Requirement R2:
This requirement allows for BES Cyber Systems to be removed from service and analyzed with their media intact, as
that should not constitute a release for reuse. However, following the analysis, if the media is to be reused outside
of a BES Cyber System or disposed of, the entity must take action to prevent the unauthorized retrieval of BES Cyber
System Information from the media.
The justification for this requirement is pre-existing from previous versions of CIP and is also documented in FERC
Order No. 706 and its associated Notice of Proposed Rulemaking.
If an applicable Cyber Asset is removed from the Physical Security Perimeter prior to action taken to prevent the
unauthorized retrieval of BES Cyber System Information or destroying the data storage media, the Responsible Entity
should maintain documentation that identifies the custodian for the data storage media while the data storage media
is outside of the Physical Security Perimeter prior to actions taken by the entity as required in Requirement R2.
Media sanitization is the process used to remove information from system media such that reasonable assurance
exists that the information cannot be retrieved or reconstructed. Media sanitization is generally classified into four
categories: Disposal, clearing, purging, and destroying. For the purposes of this requirement, disposal by itself, with
the exception of certain special circumstances, such as the use of strong encryption on a drive used in a SAN or other
media, should never be considered acceptable. The use of clearing techniques may provide a suitable method of
sanitization for media that is to be reused, whereas purging techniques may be more appropriate for media that is
ready for disposal. The following information from NIST SP800-88 provides additional guidance concerning the types
of actions that an entity might take to prevent the unauthorized retrieval of BES Cyber System Information from the
Cyber Asset data storage media:
Clear: One method to sanitize media is to use software or hardware products to overwrite storage space on
the media with non-sensitive data. This process may include overwriting not only the logical storage location
of a file(s) (e.g., file allocation table) but also may include all addressable locations. The security goal of the
overwriting process is to replace written data with random data. Overwriting cannot be used for media that
are damaged or not rewriteable. The media type and size may also influence whether overwriting is a suitable
sanitization method [SP 800-36].
Purge: Degaussing and executing the firmware Secure Erase command (for ATA drives only) are acceptable
methods for purging. Degaussing is exposing the magnetic media to a strong magnetic field in order to disrupt
the recorded magnetic domains. A degausser is a device that generates a magnetic field used to sanitize
magnetic media. Degaussers are rated based on the type (i.e., low energy or high energy) of magnetic media
they can purge. Degaussers operate using either a strong permanent magnet or an electromagnetic coil.
Degaussing can be an effective method for purging damaged or inoperative media, for purging media with
exceptionally large storage capacities, or for quickly purging diskettes. [SP 800-36] Executing the firmware
Secure Erase command (for ATA drives only) and degaussing are examples of acceptable methods for purging.
Degaussing of any hard drive assembly usually destroys the drive as the firmware that manages the device is
also destroyed.
Destroy: There are many different types, techniques, and procedures for media destruction. Disintegration,
Pulverization, Melting, and Incineration are sanitization methods designed to completely destroy the media.
They are typically carried out at an outsourced metal destruction or licensed incineration facility with the
specific capabilities to perform these activities effectively, securely, and safely. Optical mass storage media,
including compact disks (CD, CDRW, CD-R, CD-ROM), optical disks (DVD), and MO disks, must be destroyed
by pulverizing, crosscut shredding or burning. In some cases such as networking equipment, it may be
necessary to contact the manufacturer for proper sanitization procedure.
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-X | March 2021
9
It is critical that an organization maintain a record of its sanitization actions to prevent unauthorized retrieval of BES
Cyber System Information. Entities are strongly encouraged to review NIST SP800-88 for guidance on how to develop
acceptable media sanitization processes.
Rationale:
During development of this standard, text boxes were embedded within the standard to explain the rationale for
various parts of the standard. Upon Board of Trustees approval, the text from the rationale text boxes was moved
to this section.
Rationale for Requirement R1:
The SDT’s intent of the information protection program is to prevent unauthorized access to BES Cyber System
Information.
Rationale for Requirement R2:
The intent of the BES Cyber Asset reuse and disposal process is to prevent the unauthorized dissemination of BES
Cyber System Information upon reuse or disposal.
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-X | March 2021
10
Exhibit F
Implementation Guidance
RELIABILITY | RESILIENCE | SECURITY
DRAFT
Cyber Security —
Personnel & Training
Implementation Guidance for Reliability Standard
CIP-004-X
March 2021
RELIABILITY | RESILIENCE | SECURITY
NERC | Report Title | Report Date
I
Table of Contents
Preface ........................................................................................................................................................................... iii
Introduction ................................................................................................................................................................... iv
Requirement R1 .............................................................................................................................................................. 1
General Considerations for Requirement R1 .............................................................................................................. 1
Implementation Guidance for R1 ................................................................................................................................ 1
Requirement R2 .............................................................................................................................................................. 2
General Considerations for Requirement R2 .............................................................................................................. 2
Implementation Guidance for R2 ................................................................................................................................ 2
Requirement R3 .............................................................................................................................................................. 3
General Considerations for Requirement R3 .............................................................................................................. 3
Implementation Guidance for R3 ................................................................................................................................ 3
Requirement R4 .............................................................................................................................................................. 4
General Considerations for Requirement R4 .............................................................................................................. 4
Implementation Guidance for R4 ................................................................................................................................ 4
Requirement R5 .............................................................................................................................................................. 5
General Considerations for Requirement R5 .............................................................................................................. 5
Implementation Guidance for R5 ................................................................................................................................ 5
Requirement R6 .............................................................................................................................................................. 0
General Considerations for Requirement R6 .............................................................................................................. 0
Implementation Guidance for R6 ................................................................................................................................ 0
Apendix 1: Implementation Guidance for CIP-004-6 ...................................................................................................... 2
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
ii
Preface
Electricity is a key component of the fabric of modern society and the Electric Reliability Organization (ERO) Enterprise
serves to strengthen that fabric. The vision for the ERO Enterprise, which is comprised of the North American Electric
Reliability Corporation (NERC) and the six Regional Entities (REs), is a highly reliable and secure North American bulk
power system (BPS). Our mission is to assure the effective and efficient reduction of risks to the reliability and security
of the grid.
Reliability | Resilience | Security
Because nearly 400 million citizens in North America are counting on us
The North American BPS is divided into six RE boundaries as shown in the map and corresponding table below. The
multicolored area denotes overlap as some load-serving entities participate in one Region while associated
Transmission Owners/Operators participate in another.
MRO
Midwest Reliability Organization
NPCC
Northeast Power Coordinating Council
RF
ReliabilityFirst
SERC
SERC Reliability Corporation
Texas RE
Texas Reliability Entity
WECC
Western Electricity Coordinating Council
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
iii
Introduction
This Implementation Guidance was prepared to provide example approaches for compliance with CIP-004-X.
Implementation Guidance does not prescribe the only approach but highlights one or more approaches that could be
effective in achieving compliance with the standard. Because Implementation Guidance only provides examples,
entities may choose alternative approaches that better fit their individual situations. 1 This Implementation Guidance
for CIP-004-X is not a Reliability Standard and should not be considered mandatory and enforceable.
Responsible entities may find it useful to consider this Implementation Guidance document along with the
additional context and background provided in the SDT developed Technical Rationale and Justification for the
modifications to CIP-004-X.
1
NERC’s Compliance Guidance Policy
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
iv
Requirement R1
General Considerations for Requirement R1
None
Implementation Guidance for R1
None
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
1
Requirement R2
General Considerations for Requirement R2
None
Implementation Guidance for R2
The Responsible Entity has the flexibility to define the training program, and it may consist of multiple modules and
multiple delivery mechanisms, but a single training program for all individuals needing to be trained is acceptable.
The training can focus on functions, roles, or responsibilities at the discretion of the Responsible Entity.
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
2
Requirement R3
General Considerations for Requirement R3
None
Implementation Guidance for R3
None
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
3
Requirement R4
General Considerations for Requirement R4
None
Implementation Guidance for R4
Consider including the person or persons empowered by the Responsible Entity to authorize access in the delegations
referenced in CIP-003-8.
To ensure proper segregation of duties, access authorization and provisioning should not be performed by the same
person where possible. Separation of duties should also be considered when performing the reviews in Requirement
R4. The person reviewing should be different than the person provisioning access.
Quarterly reviews can be achieved by comparing individuals actually provisioned access against records of individuals
authorized for provisioned access. The list of provisioned individuals can be an automatically generated account
listing. However, in a BES Cyber System with several account databases, the list of provisioned individuals may come
from other records such as provisioning workflow or a user account database where provisioning typically initiates.
Entities can more efficiently perform the 15-calendar-month review by implementing role-based access. This involves
determining the specific roles on the system (e.g., system operator, technician, report viewer, administrator, etc.)
then grouping access privileges to the role and assigning users to the role. Role-based access does not assume any
specific software and can be implemented by defining specific provisioning processes for each role where access
group assignments cannot be performed.
An example timeline of all the reviews in Requirements R4 and R6 is included below.
1/1
1) Quarterly access review
2) privilege review (at least once every
15 calendar months)
3) BES Cyber
System Information
review (at least once every
4/1
15 calendar months)
Quarterly access review
2/1
3/1
4/1
7/1
Quarterly access review
5/1
6/1
7/1
1/1
1) Quarterly access review
2) privilege review
(at least once every
15 calendar months)
3) BES Cyber System
Information review
(at least once every
15 calendar months)
10/1
Quarterly access review
8/1
9/1
10/1
11/1
1/1
12/1
1/1
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
4
Requirement R5
General Considerations for Requirement R5
None
Implementation Guidance for R5
The requirement to revoke access at the time of the termination action includes procedures showing revocation of
access concurrent with the termination action. This requirement recognizes that the timing of the termination action
may vary depending on the circumstance. Some common scenarios and possible processes on when the termination
action occurs are provided in the following table. These scenarios are not an exhaustive list of all scenarios, but are
representative of several routine business practices.
Scenario
Possible Process
Immediate involuntary termination
Human resources or corporate security escorts the individual off site
and the supervisor or human resources personnel notify the
appropriate personnel to begin the revocation process.
Scheduled involuntary termination
Human resources personnel are notified of the termination and work
with appropriate personnel to schedule the revocation of access at the
time of termination.
Voluntary termination
Human resources personnel are notified of the termination and work
with appropriate personnel to schedule the revocation of access at the
time of termination.
Retirement where the last working
day is several weeks prior to the
termination date
Human resources personnel coordinate with manager to determine the
final date access is no longer needed and schedule the revocation of
access on the determined day.
Death
Human resources personnel are notified of the death and work with
appropriate personnel to begin the revocation process.
Steps taken to accomplish revocation of access may include deletion or deactivation of accounts used by the
individual(s). Entities should consider the ramifications of deleting an account may include incomplete event log
entries due to an unrecognized account or system services using the account to log on.
For transferred or reassigned individuals, a review of access privileges should be performed. This review could entail
a simple listing of all authorizations for an individual and working with the respective managers to determine which
access will still be needed in the new position. For instances in which the individual still needs to retain access as part
of a transitory period, the entity should schedule a time to review these access privileges or include the privileges in
the quarterly account review or annual privilege review.
If an entity considers transitioning a contracted individual to a direct hire, an entity should consider how they will
meet the evidentiary requirements for Requirements R1 through R4. If evidence for compliance with Requirements
R1 through R4 cannot be provided, the entity should consider invoking the applicable sub-requirements in
Requirement R5 for this administrative transfer scenario. Entities should also consider including this scenario in their
access management program, including a higher-level approval to minimize the instances to which this scenario
would apply.
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
5
Requirement R6
General Considerations for Requirement R6
None
Implementation Guidance for R6
This requirement recognizes that the timing of the termination action may vary depending on the circumstance. Some
common scenarios and possible processes on when the termination action occurs are provided in the following table.
These scenarios are not an exhaustive list of all scenarios, but are representative of several routine business practices.
Scenario
Possible Process
Immediate involuntary termination
Human resources or corporate security escorts the individual off site
and the supervisor or human resources personnel notify the
appropriate personnel to begin the revocation process.
Scheduled involuntary termination
Human resources personnel are notified of the termination and work
with appropriate personnel to schedule the revocation of access at the
time of termination.
Voluntary termination
Human resources personnel are notified of the termination and work
with appropriate personnel to schedule the revocation of access at the
time of termination.
Retirement where the last working
day is several weeks prior to the
termination date
Human resources personnel coordinate with manager to determine the
final date access is no longer needed and schedule the revocation of
access on the determined day.
Death
Human resources personnel are notified of the death and work with
appropriate personnel to begin the revocation process.
Steps taken to accomplish revocation of access may include deletion or deactivation of accounts used by the
individual(s). Entities should consider the ramifications of deleting an account may include incomplete event log
entries due to an unrecognized account or system services using the account to log on.
To ensure proper segregation of duties, access authorization and provisioning should not be performed by the same
person where possible. Separation of duties should also be considered when performing the 15-calendar-month
verification in Requirement R6. The person reviewing should be different than the person provisioning access.
Entities may choose not to provision access, or provision temporary rather than persistent access, for authorized
users. In other words, an authorized individual does not have to have any access provisioned, but all provisioned
access must be authorized.
An entity can choose to give an authorization to access any BCSI, or they can have authorizations for specific storage
locations or types of BCSI, if they so choose.
While Part 6.1 only requires authorization for provisioned access to BCSI, entities may also choose to have a process
to authorize individuals (that is, grant them permission or make them eligible) to receive, see, or use BCSI that is
disclosed to them, much like a security clearance. This can be helpful from an information protection standpoint
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
0
Requirement R6
where individuals can be instructed to only share BCSI with others who are authorized to see it, and entities could
implement this as part of their CIP-011 Information Protection Program. In this case, the review required in
Requirement R6 Part 6.2 should still be performed, and the revocation required in Requirement R6 Part 6.3 could
consist of removing the individual’s name from the authorized list at the time of termination or upon review when it
is determined the individual no longer has a need.
Entities can more efficiently perform the 15-calendar-month BCSI review by implementing role-based access. This
involves determining the specific roles on the system (e.g., system operator, technician, report viewer, administrator)
then grouping access privileges to the role and assigning users to the role. Role-based access does not assume any
specific software and can be implemented by defining specific provisioning processes for each role where access
group assignments cannot be performed. For an example timeline to perform the 15-calendar-month BCSI review,
refer to the graphic in the Implementation Guidance for R4 section.
An example where a termination action in Requirement R5 Part 5.1, satisfies Requirement R6 Part 6.3, would be the
Responsible Entity revoking an individual’s means of unescorted physical access and Interactive Remote Access (e.g.,
physical access card, virtual private network, Active Directory user account). By revoking both physical and electronic
access, the individual could ultimately not have access to BES Cyber System Information. The Responsible Entity
should still revoke access that is manually provisioned (e.g., local user account, relay, site area network server, cloud
based BCSI that is not tied to an active directory account).
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
1
Appendix 1: Implementation Guidance for CIP-004-6
This section contains a “cut and paste” of the Implementation Guidance components of the former Guidelines and
Technical Basis (GTB) as-is of from CIP-004-6 standard to preserve any historical references. Similarly, former GTB
content providing SDT intent and technical rationale sencan be found in a separate Technical Rational document for
this standard.
Section 4 – Scope of Applicability of the CIP Cyber Security Standards
Requirement R1:
Examples of possible mechanisms and evidence, when dated, which can be used are:
•
Direct communications (e.g., emails, memos, computer based training, etc.);
•
Indirect communications (e.g., posters, intranet, brochures, etc.);
•
Management support and reinforcement (e.g., presentations, meetings, etc.).
Requirement R2:
The Responsible Entity has the flexibility to define the training program and it may consist of multiple modules and
multiple delivery mechanisms, but a single training program for all individuals needing to be trained is acceptable.
The training can focus on functions, roles or responsibilities at the discretion of the Responsible Entity.
Requirement R3:
Identity should be confirmed in accordance with federal, state, provincial, and local laws, and subject to existing
collective bargaining unit agreements.
Examples of this could include individuals under the age of 25 where a juvenile criminal history may be protected
by law, individuals who may have resided in locations from where it is not possible to obtain a criminal history
records check, violates the law or is not allowed under the existing collective bargaining agreement. The
Responsible Entity should consider the absence of information for the full seven years when assessing the risk of
granting access during the process to evaluate the criminal history check.
Requirement R4:
To ensure proper segregation of duties, access authorization and provisioning should not be performed by the
same person where possible.
This is achieved by comparing individuals actually provisioned to a BES Cyber System against records of individuals
authorized to the BES Cyber System. The list of provisioned individuals can be an automatically generated account
listing. However, in a BES Cyber System with several account databases, the list of provisioned individuals may come
from other records such as provisioning workflow or a user account database where provisioning typically initiates.
(i.e., least privilege). Entities can more efficiently perform this review by implementing role-based access. This
involves determining the specific roles on the system (e.g., system operator, technician, report viewer, administrator,
etc.) then grouping access privileges to the role and assigning users to the role. Role-based access does not assume
any specific software and can be implemented by defining specific provisioning processes for each role where access
group assignments cannot be performed. Role-based access permissions eliminate the need to perform the privilege
review on individual accounts.
This is achieved by comparing individuals actually provisioned to a BES Cyber System against records of individuals
authorized to access the BES Cyber System. The list of provisioned individuals can be an automatically generated
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
2
Appendix 1: Implementation Guidance for CIP-004-6
account listing. However, in a BES Cyber System with several account databases, the list of provisioned individuals
may come from other records such as provisioning workflow or a user account database where provisioning typically
initiates.
Separation of duties should be considered when performing the reviews in Requirement R4. The person reviewing
should be different than the person provisioning access.
Requirement R5:
Some common scenarios and possible processes on when the termination action occurs are provided in the
following table. These scenarios are not an exhaustive list of all scenarios, but are representative of several routine
business practices.
Scenario
Possible Process
Immediate involuntary
termination
Human resources or corporate security escorts the individual off site and
the supervisor or human resources personnel notify the appropriate
personnel to begin the revocation process.
Scheduled involuntary
termination
Human resources personnel are notified of the termination and work with
appropriate personnel to schedule the revocation of access at the time of
termination.
Voluntary termination
Human resources personnel are notified of the termination and work with
appropriate personnel to schedule the revocation of access at the time of
termination.
Retirement where the last
working day is several weeks
prior to the termination date
Human resources personnel coordinate with manager to determine the
final date access is no longer needed and schedule the revocation of
access on the determined day.
Death
Human resources personnel are notified of the death and work with
appropriate personnel to begin the revocation process.
Steps taken to accomplish this outcome may include deletion or deactivation of accounts used by the individual(s),
but no specific actions are prescribed. Entities should consider the ramifications of deleting an account may include
incomplete event log entries due to an unrecognized account or system services using the account to log on.
However, nothing prevents a Responsible Entity from performing all of the access revocation at the time of
termination.
For transferred or reassigned individuals, a review of access privileges should be performed. This review could
entail a simple listing of all authorizations for an individual and working with the respective managers to determine
which access will still be needed in the new position. For instances in which the individual still needs to retain
access as part of a transitory period, the entity should schedule a time to review these access privileges or include
the privileges in the quarterly account review or annual privilege review.
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
3
Exhibit G
Analysis of Violation Risk Factors
and Violation Severity Levels
RELIABILITY | RESILIENCE | SECURITY
Exhibit G-1
Analysis of Violation Risk Factors
and Violation Severity Levels
CIP-004-7
RELIABILITY | RESILIENCE | SECURITY
Violation Risk Factor and Violation Severity Level
Justifications
Project 2019-02 BES Cyber System Information Access Management
This document provides the standard drafting team’s (SDT’s) justification for assignment of violation risk factors (VRFs) and violation severity
levels (VSLs) for each requirement in Project 2019-02 BES Cyber System Information Access Management CIP-004-7. Each requirement is
assigned a VRF and a VSL. These elements support the determination of an initial value range for the Base Penalty Amount regarding
violations of requirements in FERC-approved Reliability Standards, as defined in the Electric Reliability Organizations (ERO) Sanction
Guidelines. The SDT applied the following NERC criteria and FERC Guidelines when developing the VRFs and VSLs for the requirements.
NERC Criteria for Violation Risk Factors
High Risk Requirement
A requirement that, if violated, could directly cause or contribute to Bulk Electric System instability, separation, or a cascading sequence of
failures, or could place the Bulk Electric System at an unacceptable risk of instability, separation, or cascading failures; or, a requirement in a
planning time frame that, if violated, could, under emergency, abnormal, or restorative conditions anticipated by the preparations, directly
cause or contribute to Bulk Electric System instability, separation, or a cascading sequence of failures, or could place the Bulk Electric System
at an unacceptable risk of instability, separation, or cascading failures, or could hinder restoration to a normal condition.
Medium Risk Requirement
A requirement that, if violated, could directly affect the electrical state or the capability of the Bulk Electric System, or the ability to effectively
monitor and control the Bulk Electric System. However, violation of a medium risk requirement is unlikely to lead to Bulk Electric System
instability, separation, or cascading failures; or, a requirement in a planning time frame that, if violated, could, under emergency, abnormal,
or restorative conditions anticipated by the preparations, directly and adversely affect the electrical state or capability of the Bulk Electric
System, or the ability to effectively monitor, control, or restore the Bulk Electric System. However, violation of a medium risk requirement is
unlikely, under emergency, abnormal, or restoration conditions anticipated by the preparations, to lead to Bulk Electric System instability,
separation, or cascading failures, nor to hinder restoration to a normal condition.
RELIABILITY | RESILIENCE | SECURITY
Lower Risk Requirement
A requirement that is administrative in nature and a requirement that, if violated, would not be expected to adversely affect the electrical
state or capability of the Bulk Electric System, or the ability to effectively monitor and control the Bulk Electric System; or, a requirement that
is administrative in nature and a requirement in a planning time frame that, if violated, would not, under the emergency, abnormal, or
restorative conditions anticipated by the preparations, be expected to adversely affect the electrical state or capability of the Bulk Electric
System, or the ability to effectively monitor, control, or restore the Bulk Electric System.
FERC Guidelines for Violation Risk Factors
Guideline (1) – Consistency with the Conclusions of the Final Blackout Report
FERC seeks to ensure that VRFs assigned to Requirements of Reliability Standards in these identified areas appropriately reflect their historical
critical impact on the reliability of the Bulk-Power System. In the VSL Order, FERC listed critical areas (from the Final Blackout Report) where
violations could severely affect the reliability of the Bulk-Power System:
•
Emergency operations
•
Vegetation management
•
Operator personnel training
•
Protection systems and their coordination
•
Operating tools and backup facilities
•
Reactive power and voltage control
•
System modeling and data exchange
•
Communication protocol and facilities
•
Requirements to determine equipment ratings
•
Synchronized data recorders
•
Clearer criteria for operationally critical facilities
•
Appropriate use of transmission loading relief.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | June 2021
2
Guideline (2) – Consistency within a Reliability Standard
FERC expects a rational connection between the sub-Requirement VRF assignments and the main Requirement VRF assignment.
Guideline (3) – Consistency among Reliability Standards
FERC expects the assignment of VRFs corresponding to Requirements that address similar reliability goals in different Reliability Standards
would be treated comparably.
Guideline (4) – Consistency with NERC’s Definition of the Violation Risk Factor Level
Guideline (4) was developed to evaluate whether the assignment of a particular VRF level conforms to NERC’s definition of that risk level.
Guideline (5) – Treatment of Requirements that Co-mingle More Than One Obligation
Where a single Requirement co-mingles a higher risk reliability objective and a lesser risk reliability objective, the VRF assignment for such
Requirements must not be watered down to reflect the lower risk level associated with the less important objective of the Reliability
Standard.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | June 2021
3
NERC Criteria for Violation Severity Levels
VSLs define the degree to which compliance with a requirement was not achieved. Each requirement must have at least one VSL. While it is
preferable to have four VSLs for each requirement, some requirements do not have multiple “degrees” of noncompliant performance and
may have only one, two, or three VSLs.
VSLs should be based on NERC’s overarching criteria shown in the table below:
Lower VSL
Moderate VSL
The performance or product
measured almost meets the full
intent of the requirement.
The performance or product
measured meets the majority of
the intent of the requirement.
High VSL
The performance or product
measured does not meet the
majority of the intent of the
requirement, but does meet
some of the intent.
Severe VSL
The performance or product
measured does not
substantively meet the intent of
the requirement.
FERC Order of Violation Severity Levels
The FERC VSL guidelines are presented below, followed by an analysis of whether the VSLs proposed for each requirement in the standard
meet the FERC Guidelines for assessing VSLs:
Guideline (1) – Violation Severity Level Assignments Should Not Have the Unintended Consequence of Lowering the Current
Level of Compliance
Compare the VSLs to any prior levels of non-compliance and avoid significant changes that may encourage a lower level of compliance than
was required when levels of non-compliance were used.
Guideline (2) – Violation Severity Level Assignments Should Ensure Uniformity and Consistency in the Determination of
Penalties
A violation of a “binary” type requirement must be a “Severe” VSL.
Do not use ambiguous terms such as “minor” and “significant” to describe noncompliant performance.
Guideline (3) – Violation Severity Level Assignment Should Be Consistent with the Corresponding Requirement
VSLs should not expand on what is required in the requirement.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | June 2021
4
Guideline (4) – Violation Severity Level Assignment Should Be Based on a Single Violation, Not on a Cumulative Number of
Violations
Unless otherwise stated in the requirement, each instance of non-compliance with a requirement is a separate violation. Section 4 of the
Sanction Guidelines states that assessing penalties on a per violation per day basis is the “default” for penalty calculations.
VRF Justification for CIP-004-7, Requirement R1
The VRF did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VSL Justification for CIP-004-7, Requirement R1
The VSL did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VRF Justification for CIP-004-7, Requirement R2
The VRF did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VSL Justification for CIP-004-7, Requirement R2
The VSL did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VRF Justification for CIP-004-7, Requirement R3
The VRF did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VSL Justification for CIP-004-7, Requirement R3
The VSL did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VRF Justification for CIP-004-7, Requirement R4
The VRF did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VSL Justification for CIP-004-7, Requirement R4
The VSL has been revised to reflect the removal of Part 4.4 (moved to CIP-004-7, Requirement R6, Part 6.2) and a portion of Part 4.1 (moved
to CIP-004-7, Requirement R6, Part 6.1). The VSL did not otherwise change from the previously FERC approved CIP-004-6 Reliability Standard.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | June 2021
5
VRF Justification for CIP-004-7, Requirement R5
The VRF did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VSL Justification for CIP-004-7, Requirement R5
The VSL has been revised to reflect the removal of Part 5.3 (moved to CIP-004-7, Requirement R6, Part 6.3). The VSL did not otherwise
change from the previously FERC approved CIP-004-6 Reliability Standard.
VRF Justifications for CIP-004-7 R6
Proposed VRF
Medium
NERC VRF Discussion
Requirement R6 is a Requirement in the Same Day Operations and Operations Planning time horizons to
implement one or more documented access management program(s) to authorize, verify, and revoke
provisioned access to BCSI pertaining to the “Applicable System” identified in CIP-004-7 Table R6 – Access
Management for BCSI that collectively include each of the applicable requirement parts in CIP-004-7 Table
R6 – Access Management for BES Cyber System Information. To be considered access to BCSI in the
context of this requirement, an individual has both the ability to obtain and use BCSI. If violated, it could
directly affect the electrical state or the capability of the bulk electric system, or the ability to effectively
monitor and control the bulk electric system. However, violation of the requirement is unlikely to lead to
bulk electric system instability, separation, or cascading failures.
FERC VRF G1 Discussion
Guideline 1- Consistency w/ Blackout Report
Guideline 1- Consistency
with Blackout Report
This requirement does not address any of the critical areas identified in the Final Blackout Report.
FERC VRF G2 Discussion
Guideline 2- Consistency within a Reliability Standard
Guideline 2- Consistency
within a Reliability Standard
The proposed VRF is consistent among other FERC approved VRFs within the standard, specifically
Requirements R4 and R5 from which Requirement R6 is modified.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | June 2021
6
VRF Justifications for CIP-004-7 R6
Proposed VRF
Medium
FERC VRF G3 Discussion
Guideline 3- Consistency among Reliability Standards
Guideline 3- Consistency
among Reliability Standards
This is a new requirement addressing specific reliability goals. The VRF assignment is consistent with
similar Requirements in the CIP Reliability Standards.
FERC VRF G4 Discussion
Guideline 4- Consistency with NERC Definitions of VRFs
Guideline 4- Consistency
with NERC Definitions of
VRFs
A VRF of Medium is consistent with the NERC VRF definition.
FERC VRF G5 Discussion
Guideline 5- Treatment of Requirements that Co-mingle More than One Obligation
Guideline 5- Treatment of
Requirements that Comingle More than One
Obligation
Requirement R6 contains only one objective, which is to implement one or more documented access
management program(s) to authorize, verify, and revoke provisioned access to BCSI pertaining to the
“Applicable System” identified in CIP-004-7 Table R6 – Access Management for BCSI that collectively
include each of the applicable requirement parts in CIP-004-7 Table R6 – Access Management for BES
Cyber System Information. To be considered access to BCSI in the context of this requirement, an
individual has both the ability to obtain and use BCSI. Since the requirement has only one objective, only
one VRF was assigned.
VSLs for CIP-004-7 R6
Lower
Moderate
High
The Responsible Entity has
implemented one or more
program(s) as required by
Requirement R6 Part 6.1 but, for
one individual, did not authorize
The Responsible Entity has
implemented one or more
program(s) as required by
Requirement R6 Part 6.1 but, for
two individuals, did not
The Responsible Entity has
implemented one or more
program(s) as required by
Requirement R6 Part 6.1 but, for
three individuals, did not
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | June 2021
Severe
The Responsible Entity did not
implement one or more
documented access
management program(s) for
BCSI. (R6)
7
provisioned electronic access to
electronic BCSI or provisioned
physical access to physical BCSI.
(6.1)
authorize provisioned electronic
access to electronic BCSI or
provisioned physical access to
physical BCSI. (6.1)
authorize provisioned electronic
access to electronic BCSI or
provisioned physical access to
physical BCSI. (6.1)
OR
OR
OR
The Responsible Entity
performed the verification
required by Requirement R6
Part 6.2 more than 15 calendar
months but less than or equal to
16 calendar months of the
previous verification. (6.2)
The Responsible Entity
performed the verification
required by Requirement R6
Part 6.2 more than 16 calendar
months but less than or equal to
17 calendar months of the
previous verification. (6.2)
The Responsible Entity
performed the verification
required by Requirement R6
Part 6.2 more than 17 calendar
months but less than or equal to
18 calendar months of the
previous verification. (6.2)
OR
The Responsible Entity has
implemented one or more
program(s) to remove the
individual’s ability to use
provisioned access to BCSI but,
for one individual, did not do so
by the timeframe required in
Requirement R6, Part 6.3.
OR
OR
The Responsible Entity has
The Responsible Entity has
implemented one or more
implemented one or more
program(s) to remove the
program(s) to remove the
individual’s ability to use
individual’s ability to use
provisioned access to BCSI but,
provisioned access to BCSI but,
for two individuals, did not do so for three individuals, did not do
by the timeframe required in
so by the timeframe required in
Requirement R6, Part 6.3.
Requirement R6, Part 6.3.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | June 2021
OR
The Responsible Entity has
implemented one or more
program(s) as required by
Requirement R6 Part 6.1 but, for
four or more individuals, did not
authorize provisioned electronic
access to electronic BCSI or
provisioned physical access to
physical BCSI. (6.1)
OR
The Responsible Entity
performed the verification
required by Requirement R6
Part 6.2 more than 18 calendar
months of the previous
verification. (6.2)
OR
The Responsible Entity has
implemented one or more
program(s) to remove the
individual’s ability to use
provisioned access to BCSI but,
for four or more individuals, did
not do so by the timeframe
required in Requirement R6,
Part 6.3.
8
VSL Justifications for CIP-004-7 R6
FERC VSL G1
There is no prior compliance obligation related to the subject of this requirement.
Violation Severity Level
Assignments Should Not
Have the Unintended
Consequence of Lowering
the Current Level of
Compliance
FERC VSL G2
Violation Severity Level
Assignments Should Ensure
Uniformity and Consistency
in the Determination of
Penalties
The proposed VSLs are not binary and do not use any ambiguous terminology, thereby supporting
uniformity and consistency in the determination of similar penalties for similar violations.
Guideline 2a: The Single
Violation Severity Level
Assignment Category for
"Binary" Requirements Is
Not Consistent
Guideline 2b: Violation
Severity Level Assignments
that Contain Ambiguous
Language
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | June 2021
9
FERC VSL G3
Violation Severity Level
Assignment Should Be
Consistent with the
Corresponding Requirement
FERC VSL G4
The proposed VSL uses similar terminology to that used in the associated requirement and is therefore
consistent with the requirement.
Proposed VSLs are based on a single violation and not cumulative violations.
Violation Severity Level
Assignment Should Be Based
on A Single Violation, Not on
A Cumulative Number of
Violations
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | June 2021
10
Exhibit G-2
Analysis of Violation Risk Factors
and Violation Severity Levels
CIP-011-3
RELIABILITY | RESILIENCE | SECURITY
Violation Risk Factor and Violation Severity Level
Justifications
Project 2019-02 BES Cyber System Information Access Management
This document provides the standard drafting team’s (SDT’s) justification for assignment of violation risk factors (VRFs) and violation severity
levels (VSLs) for each requirement in Project 2019-02 BES Cyber System Information Access Management CIP-011-3. Each requirement is
assigned a VRF and a VSL. These elements support the determination of an initial value range for the Base Penalty Amount regarding
violations of requirements in FERC-approved Reliability Standards, as defined in the Electric Reliability Organizations (ERO) Sanction
Guidelines. The SDT applied the following NERC criteria and FERC Guidelines when developing the VRFs and VSLs for the requirements.
NERC Criteria for Violation Risk Factors
High Risk Requirement
A requirement that, if violated, could directly cause or contribute to Bulk Electric System instability, separation, or a cascading sequence of
failures, or could place the Bulk Electric System at an unacceptable risk of instability, separation, or cascading failures; or, a requirement in a
planning time frame that, if violated, could, under emergency, abnormal, or restorative conditions anticipated by the preparations, directly
cause or contribute to Bulk Electric System instability, separation, or a cascading sequence of failures, or could place the Bulk Electric System
at an unacceptable risk of instability, separation, or cascading failures, or could hinder restoration to a normal condition.
Medium Risk Requirement
A requirement that, if violated, could directly affect the electrical state or the capability of the Bulk Electric System, or the ability to effectively
monitor and control the Bulk Electric System. However, violation of a medium risk requirement is unlikely to lead to Bulk Electric System
instability, separation, or cascading failures; or, a requirement in a planning time frame that, if violated, could, under emergency, abnormal,
or restorative conditions anticipated by the preparations, directly and adversely affect the electrical state or capability of the Bulk Electric
System, or the ability to effectively monitor, control, or restore the Bulk Electric System. However, violation of a medium risk requirement is
unlikely, under emergency, abnormal, or restoration conditions anticipated by the preparations, to lead to Bulk Electric System instability,
separation, or cascading failures, nor to hinder restoration to a normal condition.
RELIABILITY | RESILIENCE | SECURITY
Lower Risk Requirement
A requirement that is administrative in nature and a requirement that, if violated, would not be expected to adversely affect the electrical
state or capability of the Bulk Electric System, or the ability to effectively monitor and control the Bulk Electric System; or, a requirement that
is administrative in nature and a requirement in a planning time frame that, if violated, would not, under the emergency, abnormal, or
restorative conditions anticipated by the preparations, be expected to adversely affect the electrical state or capability of the Bulk Electric
System, or the ability to effectively monitor, control, or restore the Bulk Electric System.
FERC Guidelines for Violation Risk Factors
Guideline (1) – Consistency with the Conclusions of the Final Blackout Report
FERC seeks to ensure that VRFs assigned to Requirements of Reliability Standards in these identified areas appropriately reflect their historical
critical impact on the reliability of the Bulk-Power System. In the VSL Order, FERC listed critical areas (from the Final Blackout Report) where
violations could severely affect the reliability of the Bulk-Power System:
•
Emergency operations
•
Vegetation management
•
Operator personnel training
•
Protection systems and their coordination
•
Operating tools and backup facilities
•
Reactive power and voltage control
•
System modeling and data exchange
•
Communication protocol and facilities
•
Requirements to determine equipment ratings
•
Synchronized data recorders
•
Clearer criteria for operationally critical facilities
•
Appropriate use of transmission loading relief.
VRF and VSL Justifications | March 2021
Project 2019-02 BES Cyber System Information Access Management
2
Guideline (2) – Consistency within a Reliability Standard
FERC expects a rational connection between the sub-Requirement VRF assignments and the main Requirement VRF assignment.
Guideline (3) – Consistency among Reliability Standards
FERC expects the assignment of VRFs corresponding to Requirements that address similar reliability goals in different Reliability Standards
would be treated comparably.
Guideline (4) – Consistency with NERC’s Definition of the Violation Risk Factor Level
Guideline (4) was developed to evaluate whether the assignment of a particular VRF level conforms to NERC’s definition of that risk level.
Guideline (5) – Treatment of Requirements that Co-mingle More Than One Obligation
Where a single Requirement co-mingles a higher risk reliability objective and a lesser risk reliability objective, the VRF assignment for such
Requirements must not be watered down to reflect the lower risk level associated with the less important objective of the Reliability
Standard.
VRF and VSL Justifications | March 2021
Project 2019-02 BES Cyber System Information Access Management
3
NERC Criteria for Violation Severity Levels
VSLs define the degree to which compliance with a requirement was not achieved. Each requirement must have at least one VSL. While it is
preferable to have four VSLs for each requirement, some requirements do not have multiple “degrees” of noncompliant performance and
may have only one, two, or three VSLs.
VSLs should be based on NERC’s overarching criteria shown in the table below:
Lower VSL
Moderate VSL
The performance or product
measured almost meets the full
intent of the requirement.
The performance or product
measured meets the majority of
the intent of the requirement.
High VSL
The performance or product
measured does not meet the
majority of the intent of the
requirement, but does meet
some of the intent.
Severe VSL
The performance or product
measured does not
substantively meet the intent of
the requirement.
FERC Order of Violation Severity Levels
The FERC VSL guidelines are presented below, followed by an analysis of whether the VSLs proposed for each requirement in the standard
meet the FERC Guidelines for assessing VSLs:
Guideline (1) – Violation Severity Level Assignments Should Not Have the Unintended Consequence of Lowering the Current
Level of Compliance
Compare the VSLs to any prior levels of non-compliance and avoid significant changes that may encourage a lower level of compliance than
was required when levels of non-compliance were used.
Guideline (2) – Violation Severity Level Assignments Should Ensure Uniformity and Consistency in the Determination of
Penalties
A violation of a “binary” type requirement must be a “Severe” VSL.
Do not use ambiguous terms such as “minor” and “significant” to describe noncompliant performance.
Guideline (3) – Violation Severity Level Assignment Should Be Consistent with the Corresponding Requirement
VSLs should not expand on what is required in the requirement.
VRF and VSL Justifications | March 2021
Project 2019-02 BES Cyber System Information Access Management
4
Guideline (4) – Violation Severity Level Assignment Should Be Based on a Single Violation, Not on a Cumulative Number of
Violations
Unless otherwise stated in the requirement, each instance of non-compliance with a requirement is a separate violation. Section 4 of the
Sanction Guidelines states that assessing penalties on a per violation per day basis is the “default” for penalty calculations.
VRF Justification for CIP-011-3, Requirement R1
The VRF did not change from the previously FERC approved CIP-011-2 Reliability Standard.
VSL Justification for CIP-011-3, Requirement R1
The VSL justification is below.
VSLs for CIP-011-3, R1
Lower
N/A
Moderate
N/A
High
The Responsible Entity
documented, but did not,
implement one or more BCSI
protection program(s). (R1)
Severe
The Responsible Entity neither
documented nor implemented
one or more BCSI protection
program(s). (R1)
OR
The Responsible Entity
documented but did not
implement at least one method
to identify BCSI. (1.1)
OR
The Responsible Entity
documented but did not
implement at least one method
to protect and securely handle
BCSI. (1.2)
VRF and VSL Justifications | March 2021
Project 2019-02 BES Cyber System Information Access Management
5
VSL Justifications for CIP-011-3, R1
FERC VSL G1
The proposed revisions do not lower the current level of compliance.
Violation Severity Level
Assignments Should Not
Have the Unintended
Consequence of Lowering
the Current Level of
Compliance
FERC VSL G2
Violation Severity Level
Assignments Should Ensure
Uniformity and Consistency
in the Determination of
Penalties
Guideline 2a:
The VSLs are not binary.
Guideline 2b:
The proposed VSL does not use ambiguous terms, supporting uniformity and consistency in the
determination of similar penalties for similar violations.
Guideline 2a: The Single
Violation Severity Level
Assignment Category for
"Binary" Requirements Is
Not Consistent
Guideline 2b: Violation
Severity Level Assignments
that Contain Ambiguous
Language
FERC VSL G3
Violation Severity Level
Assignment Should Be
Consistent with the
Corresponding Requirement
The proposed VSL uses similar terminology to that used in the associated requirement, and is therefore
consistent with the requirement.
VRF and VSL Justifications | March 2021
Project 2019-02 BES Cyber System Information Access Management
6
FERC VSL G4
Violation Severity Level
Assignment Should Be Based
on A Single Violation, Not on
A Cumulative Number of
Violations
Proposed VSLs are based on a single violation and not a cumulative violation methodology. The VSL is
assigned for a single instance of failing to implement one or more documented information protection
program(s) that collectively include the applicable requirement parts in CIP-011-3 Table R1 – Information
Protection Program.
VRF Justification for CIP-011-3 Requirement R2
The VRF did not change from the previously FERC approved CIP-011-2 Reliability Standard.
VSL Justification for CIP-011-3 Requirement R2
The VSL did not change from the previously FERC approved CIP-011-2 Reliability Standard.
VRF and VSL Justifications | March 2021
Project 2019-02 BES Cyber System Information Access Management
7
Exhibit H
Summary of Development History
and Complete Record of Development
RELIABILITY | RESILIENCE | SECURITY
Summary of Development History
The following is a summary of the development record for Project 2019-02 Bulk Electric
System (“BES”) Cyber System Information Access Management (“Project 2019-02”).
I.
Overview of the Standard Drafting Team
When evaluating a proposed Reliability Standard, the Commission is expected to give “due
weight” to the technical expertise of the ERO. 1 The technical expertise of the ERO is derived from
the standard drafting team (“SDT”) selected to lead each project in accordance with Section 4.3 of
the NERC Standard Processes Manual. 2 For this project, the SDT consisted of industry experts,
all with a diverse set of experiences. A roster of the Project 2019-02 SDT members is included in
Exhibit I.
II.
Standard Development History
A. Standard Authorization Request Development and Posting
On March 1, 2019, NERC received a Standard Authorization Request (“SAR”) from Tri-
State Generation and Transmission Association seeking to address BES Cyber System Information
(“BCSI”) access management. The SAR is the result of work by an informal team, in collaboration
with the NERC Compliance Input Working Group, 3 assembled to review the use of encryption on
BCSI with a particular focus on BCSI stored or used by a third party’s system (i.e., the cloud). The
Critical Infrastructure Protection Committee endorsed the SAR at its March 6, 2019 meeting. 4
1
Section 215(d)(2) of the Federal Power Act; 16 U.S.C. § 824(d)(2) (2020).
The NERC Standard Processes Manual is available at
https://www.nerc.com/FilingsOrders/us/RuleOfProcedureDL/SPM_Clean_Mar2019.pdf.
2
The Compliance Input Working Group was a subgroup of the now-disbanded NERC Critical Infrastructure
Protection Committee, a stakeholder technical committee.
3
Minutes, Critical Infrastructure Protection Committee Meeting, Agenda Item 13b.i.(1),
https://www.nerc.com/comm/CIPC/Agendas%20Highlights%20and%20Minutes%202013/CIPC_Meeting_Minutes
_March_5-6_2019.pdf.
4
1
On March 20, 2019, the Standards Committee (“SC”) accepted the SAR and authorized
posting it for a 30-day formal comment period and the solicitation of nominees for a SAR drafting
team for a 30-day nomination period from March 28, 2019 through April 26, 2019. 5
On May 22, 2019, the SC appointed the SAR drafting team members for Project 2019-02. 6
Based on comments received from the initial posting, the SAR drafting team made revisions to the
SAR. At its July 24, 2019 meeting, the SC accepted a revised SAR, authorized drafting revisions
to the Reliability Standards identified in the SAR, and appointed the SAR drafting team as the
Project 2019-02 Standard Drafting Team (“SDT”). 7
At its August 21, 2019 meeting, the SC authorized posting for additional SDT members
for a 30-day nomination period from August 22, 2019 through September 20, 2019. 8 On October
23, 2019, the SC appointed supplemental members to the SDT. 9 On November 20, 2019, the SC
approved a final revision to the SAR. 10
Meeting Minutes, Standards Committee Conference Call, Agenda Item 6 (Standard Authorization Request
Cyber System Information Access Management),
https://www.nerc.com/comm/SC/Agenda%20Highlights%20and%20Minutes/Standards_Commitee_Meeting_Minut
es_Approved_April_17_2019.pdf.
5
Meeting Minutes, Standards Committee Conference Call, Agenda Item 5 (Project 2019-02 – BES Cyber
System Information Access Management),
https://www.nerc.com/comm/SC/Agenda%20Highlights%20and%20Minutes/Standards_Committee_Minutes_Appr
oved_June_26_%202019.pdf.
6
Meeting Minutes, Standards Committee Conference Call, Agenda Item 5 (Project 2019-02 – BES Cyber
System Information Access Management),
https://www.nerc.com/comm/SC/Agenda%20Highlights%20and%20Minutes/SC%20July%20Meeting%20Minutes_
Approved_082119.pdf.
7
Meeting Minutes, Standards Committee Conference Call, Agenda Item 6 (Project 2019-02 BES Cyber
System Information Access Management),
https://www.nerc.com/comm/SC/Agenda%20Highlights%20and%20Minutes/SC%20August%20Meeting%20Minut
es_Approved_091819.pdf.
8
Minutes, Standards Committee Meeting, Agenda Item 5 (Project 2019-02 BES Cyber System Information
Access Management Supplemental SDT),
https://www.nerc.com/comm/SC/Agenda%20Highlights%20and%20Minutes/SC%20October%20Meeting%20Minu
tes_Approved%20112019.pdf.
9
Minutes, Standards Committee Meeting, Agenda Item 6a (Project 2019-02 BES Cyber System Information
Access Management),
10
2
B. First Posting – Draft One of Reliability Standards and Initial Ballot
At its December 18, 2019 meeting, the SC authorized posting for a 45-day formal comment
period and initial ballot. 11 The SDT posted draft one of proposed Reliability Standards CIP-0047, CIP-011-3, an implementation plan, and other supporting materials for a 45-day formal
comment period from December 20, 2019 through February 3, 2020, with an initial ballot and nonbinding poll during the last 10 days from January 24, 2020 through February 3, 2020.
This posting received 91 sets of responses, including comments from approximately 209
different people from approximately 131 companies representing all 10 of the Industry Segments.
Results of the initial ballot are summarized in the table below:
Ballot
Non-binding Poll
Quorum / Approval
Quorum / Supportive
Opinions
CIP-004-7
91.76% / 15.37%
88.55% / 18.88%
CIP-011-3
92.45% / 13.04%
88.21% / 15.31%
Implementation Plan
91.58% / 22.30%
Standard
C. Second Posting – Draft Two and Second Ballot
The SDT posted draft two of proposed Reliability Standards CIP-004-7, CIP-011-3, an
implementation plan, and other supporting materials for a 45-day formal comment period from
https://www.nerc.com/comm/SC/Agenda%20Highlights%20and%20Minutes/SC%20November%20Meeeting%20
Minutes_Approved_121819.pdf.
Minutes, Standards Committee Meeting, Agenda Item 4 (Project 2019-02 BES Cyber System Information
Access Management),
https://www.nerc.com/comm/SC/Agenda%20Highlights%20and%20Minutes/SC%20December%20Meeting%20Mi
nutes_Approved_012220.pdf.
11
3
August 6, 2020 through September 21, 2020, with an additional ballot and non-binding poll during
the final 10 days from September 11, 2020 through September 21, 2020.
This posting received 68 sets of responses, including comments from approximately 175
different people from approximately 111 companies representing all 10 of the Industry Segments.
Results of the second ballot are summarized in the table below:
Ballot
Non-binding Poll
Quorum / Approval
Quorum / Supportive
Opinions
CIP-004-7
83.15% / 32.80%
80.15% / 32.08%
CIP-011-3
82.01% / 23.06%
79.47% / 24.36%
Implementation Plan
81.02% / 50.49%
Standard
D. Third Posting – Draft Three and Third Ballot
The SDT posted draft three of proposed Reliability Standards CIP-004-7, CIP-011-3, an
implementation plan, and other supporting materials for a 45-day formal comment period from
4
March 25, 2021 through May 10, 2021, with an additional ballot and non-binding poll during the
last 10 days from April 30, 2021 through May 10, 2021. 12
This posting received 64 sets of responses, including comments from approximately 157
different people from approximately 98 companies representing all 10 of the Industry Segments.
Results of the third ballot are summarized in the table below:
Ballot
Non-binding Poll
Quorum / Approval
Quorum / Supportive
Opinions
CIP-004-7
84.31% / 83.75%
82.88% / 84.57%
CIP-011-3
84.62% / 81.39%
82.95% / 82.61%
Implementation Plan
83.64% / 92.51%
Standard
E. Final Ballot
Final drafts of CIP-004-7, CIP-011-3, the implementation plan, and other associated
documents were posted for a 10-day final ballot from June 2, 2021 through June 11, 2021. 13
Results of the final ballot are summarized in the table below:
Ballot
Standard
Quorum / Approval
CIP-004-7
86.50% / 85.80%
CIP-011-3
86.81% / 83.00%
The third drafts of the standards were posted as CIP-004-X and CIP-011-X because they were posted
simultaneously with other proposed revisions to those standards as a part of Project 2016-02 Modifications to CIP
Standards.
12
The final drafts of the standards were posted as CIP-004-X and CIP-011-X because they were posted
simultaneously with other proposed revisions to those standards as a part of Project 2016-02 Modifications to CIP
Standards.
13
5
Ballot
Standard
Quorum / Approval
Implementation Plan
85.87 % / 94.17%
F. Board of Trustees Adoption
The NERC Board of Trustees adopted proposed Reliability Standards CIP-004-7, CIP-0113, the implementation plan, the retirement of CIP-004-6 and CIP-011-2, and the VRFs and VSLs
at its quarterly meeting on August 12, 2021. 14
NERC, Board of Trustees Agenda Package, Agenda Item 5a (Project 2019-02 BES Cyber System
Information Access Management),
https://www.nerc.com/gov/bot/Agenda%20highlights%20and%20Mintues%202013/Board_Open_Meeting_Agenda
_Package_August_12_2021_ATTENDEE.pdf.
14
6
Complete Record of Development
7
Project 2019-02 BES Cyber System Information Access Management
Page 1 of 3
Project 2019-02 BES Cyber System Information Access Management
Related Files
Status
Final ballots concluded 8 p.m. Eastern, Friday, June 11, 2021 for the following:
-CIP-004-X - Cyber Security - Personnel & Training
-CIP-011-X - Cyber Security - Information Protection
-Implementation Plan
The voting results can be accessed via the links below. The standards will be submitted to the Board of Trustees for adoption and then filed with the appropriate regulatory authorities.
Background
This initiative enhances BES reliability by creating increased choice, greater flexibility, higher availability, and reduced‐cost options for entities to manage their BES Cyber System Information, by
providing a secure path towards utilization of modern third‐party data storage and analysis systems. In addition, the proposed project would clarify the protections expected when utilizing third‐
party solutions (e.g., cloud services).
Standard(s) Affected – CIP-004-6 - Cyber Security - Personnel & Training | CIP-011-2 - Cyber Security - Information Protection
Purpose/Industry Need
The purpose of this project is to clarify the CIP requirements related to BES Cyber System Information (BCSI) access, to allow for alternative methods, such as encryption, to be utilized in the
protection of BCSI.
Draft
Actions
Dates
Results
Consideration of
Comments
Final Draft
CIP-004-X
Clean (84) | Redline to Last Posted (85) | Redline to
Last Approved (86)
Board Documents
CIP-004-7 Clean (87) | Redline to Last Approved (88)
CIP-011-X
Clean (89) | Redline to Last Posted (90) | Redline to
Ballot Results
Last Approved (91)
Board Documents
CIP-011-3 Clean (92) | Redline to Last Approved (93)
Final Ballots
CIP-004-X (107)
Info (106)
06/02/21 - 06/11/2021
CIP-011-X (108)
Implementation Plan (94)
Vote
Implementation Plan (109)
Board Implementation Plan Document (95)
Supporting Materials
Technical Rationale
CIP-004-X (96)
CIP-011-X (97)
Implementation Guidance
CIP-004-X (98)
VRF/VSL Justifications
CIP-004-X (99)
CIP-011-X (100)
Board VRF/VSL Documents
CIP-004-7 (101)
CIP-011-3 (102)
Mapping Documents
CIP-004-X
Clean (103) | Redline (104)
CIP-011-X (105)
Draft 3
Ballot Results
https://www.nerc.com/pa/Stand/Pages/Project2019-02BCSIAccessManagement.aspx
9/1/2021
Project 2019-02 BES Cyber System Information Access Management
Page 2 of 3
CIP-004-X
Clean (59) | Redline to Last Posted (60) | Redline to
CIP-004-X (79)
Last Approved (61)
CIP-011-X
Clean (62) | Redline to Last Posted (63) | Redline to
Last Approved (64)
CIP-011-X (80)
Additional Ballot and Nonbinding Poll
04/30/21 - 05/10/21
Implementation Plan (65)
Non-binding Poll
Info (78)
Supporting Documents
Implementation Plan (81)
Updated Info (77)
Results
CIP-004-X (82)
Vote
Unofficial Comment Form (Word) (66)
CIP-011-X (83)
Technical Rationale
CIP-004-X (67)
CIP-011-X (68)
Implementation Guidance
CIP-004-X (69)
VRF/VSL Justifications
CIP-004-X (70)
CIP-011-X (71)
Mapping Document
CIP-004-X (72)
CIP-011-X (73)
Comment Period
Info (74)
03/25/21 - 05/10/21
Comments Received (75)
Consideration of
Comments (76)
Submit Comments
Draft 2
CIP-004-7
Clean (35) | Redline to Approved (36) | Redline to
Ballot Results
Last Posted (37)
Additional Ballot
CIP-011-3
Clean (38) | Redline to Approved (39) | Redline to
Last Posted (40)
09/11/20– 09/21/20
CIP-004-7 (54)
CIP-011-3 (55)
Info (53)
Implementation Plan (56)
Vote
Implementation Plan
Non-Binding Poll
Clean (41) | Redline (42)
Results
Supporting Materials
CIP-004-7 (57)
Unofficial Comment Form (Word) (43)
CIP-011-3 (58)
Technical Rationale
CIP-004-7 (44)
CIP-011-3 (45) *updated
VRF/VSL Justifications
CIP-004-7 (46)
CIP-011-3 (47)
Mapping Documents
CIP-004-7 (48)
CIP-011-3 (49)
Comment Period
08/06/20– 09/21/20
Comments Received (51)
Consideration of
Comments (52)
Info (50)
Submit Comments
Draft 1
CIP-004-7
Clean (14) | Redline (15) *updated
Initial Ballot
Info (29)
CIP-011-3
Clean (16) | Redline (17)
Vote
Ballot Results
01/24/20– 02/03/20
CIP-004-7 (30)
CIP-011-3 (31)
Implementation Plan (32)
https://www.nerc.com/pa/Stand/Pages/Project2019-02BCSIAccessManagement.aspx
9/1/2021
Project 2019-02 BES Cyber System Information Access Management
Page 3 of 3
Non-binding Poll
Implementation Plan (18)
Results
CIP-004-7 (33)
Supporting Materials
CIP-011-3 (34)
Unofficial Comment Form (Word) (19)
Technical Rationale
CIP-004-7 (20)
CIP-011-3 (21)
VRF/VSL Justifications
CIP-004-7 (22)
CIP-011-3 (23)
Mapping Documents
CIP-004-7 (24)
Comment Period
Info (26)
12/20/19– 02/03/20
Comments Received (27)
Consideration of
Comments (28)
Submit Comments
CIP-011-3 (25)
Join Ballot Pools
Standard Authorization Request (SAR)
The Standards Committee
Clean (12) | Redline (13)
accepted the corrected SAR
12/20/19– 01/20/20
on November 20, 2019
Supplemental Drafting Team Nominations
Supporting Materials
Nomination Period
Info (11)
Unofficial Nomination Form (Word) (10)
Submit Nominations
Standard Authorization Request (SAR)
The Standards Committee
Clean (8) | Redline (9)
accepted the SAR on July
08/22/19 - 09/20/19
24, 2019
Drafting Team Nominations
Supporting Materials
Nomination Period
Info (7)
Unofficial Nomination Form (Word) (6)
Submit Nominations
Standard Authorization Request (1)
Comment Period
Supporting Materials
Unofficial Comment Form (Word) (2)
Info (3)
03/28/19 - 04/26/19
03/28/19 - 04/26/19
Comments
Received (4)
Consideration of
Comments (5)
Submit Comments
https://www.nerc.com/pa/Stand/Pages/Project2019-02BCSIAccessManagement.aspx
9/1/2021
Standard Authorization Request (SAR)
Complete and please email this form, with
Complete
and please
email this form, with
attachment(s)
to: [email protected]
attachment(s) to: [email protected]
The North American Electric Reliability Corporation (NERC)
welcomes suggestions to improve the reliability of the bulk
power system through improved Reliability Standards.
Requested information
BES Cyber System Information Access Management
March 1, 2019
SAR Title:
Date Submitted:
SAR Requester
Name:
Alice Ireland
Organization: Tri-State Generation and Transmission Association
Telephone:
(303) 254-3120
Email:
[email protected]
SAR Type (Check as many as apply)
New Standard
Imminent Action/ Confidential Issue (SPM
Revision to Existing Standard
Section 10)
Add, Modify or Retire a Glossary Term
Variance development or revision
Withdraw/retire an Existing Standard
Other (Please specify)
Justification for this proposed standard development project (Check all that apply to help NERC
prioritize development)
Regulatory Initiation
NERC Standing Committee Identified
Emerging Risk (Reliability Issues Steering
Enhanced Periodic Review Initiated
Committee) Identified
Industry Stakeholder Identified
Reliability Standard Development Plan
Industry Need (What Bulk Electric System (BES) reliability benefit does the proposed project provide?):
While there is no direct benefit to the reliability of the BES, this initiative enhances BES reliability by
creating increased choice, greater flexibility, higher availability, and reduced-cost options for entities to
manage their BES Cyber System Information, by providing a secure path towards utilitzation of modern
third-party data storage and analysis systems. In addition, the proposed project would clarify the
protections expected when utilizing third-party solutions (aka cloud).
Purpose or Goal (How does this proposed project provide the reliability-related benefit described
above?):
Clarifying the CIP requirements related to BES Cyber System Information access, to allow for alternative
methods, such as encryption, to be utilized in the protection of BCSI.
Project Scope (Define the parameters of the proposed project):
CIP-004 and CIP-011
Requested information
Detailed Description (Describe the proposed deliverable(s) with sufficient detail for a drafting team to
execute the project. If you propose a new or substantially revised Reliability Standard or definition,
provide: (1) a technical justification 1which includes a discussion of the reliability-related benefits of
developing a new or revised Reliability Standard or definition, and (2) a technical foundation document
(e.g. research paper) to guide development of the Standard or definition):
CIP-004-6 Requirement R4 Part 4.1.3 needs to be modified so authorization and access to BCSI is
clarified to focus on the BCSI and the controls deployed to limit access. In addition, the Standard should
allow multiple methods for controlling access to BES Cyber System Information, rather than just
electronic and physical access to the BES Cyber System Information storage location. For example, the
focus must be on BCSI and the ability to obtain and make use of it. This is particularly necessary when it
comes to the utilization of a third party’s system (aka cloud). As currently drafted, the requirement is
focused on access to the “storage location”, and therefore does not permit methods such as encryption
and key management to be utilized in lieu of physical/electronic access controls. This wording also does
not explicitly permit any flexibility in the audit approach. In addition to modifying CIP-004-6
Requirement R4 Part 4.1.3, Part 4.4, Part 5.3 and CIP-011-2 Requirement R1 should also be evaluated
for any subsequent impacts to the requirements, measures and/or the guidelines and technical basis.
Cost Impact Assessment, if known (Provide a paragraph describing the potential cost impacts associated
with the proposed project):
Potential cost savings due to economies of scale and third party support.
Please describe any unique characteristics of the BES facilities that may be impacted by this proposed
standard development project (e.g. Dispersed Generation Resources):
To assist the NERC Standards Committee in appointing a drafting team with the appropriate members,
please indicate to which Functional Entities the proposed standard(s) should apply (e.g. Transmission
Operator, Reliability Coordinator, etc. See the most recent version of the NERC Functional Model for
definitions):
Please see Section 4. Applicability of CIP-004-6 and CIP-011-2.
Do you know of any iconsensus building activities 2 in connection with this SAR? If so, please provide
any recommendations or findings resulting from the consensus bulding activity.
An informal team, under the direction of the NERC Compliance Input Working Group, was assembled to
review the use of encryption on BES Cyber System Information, and the impact on compliance, with a
particular focus on such BES Cyber System Information being stored or utilized by a third party’s system
(aka cloud). This team met every two weeks during Dec. 2018 – Feb. 2019. The development of this SAR
was supported by all team members. The team consisted of the following individuals:
The NERC Rules of Procedure require a technical justification for new or substantially revised Reliability Standards. Please attach pertinent
information to this form before submittal to NERC.
2 Consensus building activities are occasionally conducted by NERC and/or project review teams. They typically are conducted to obtain
industry inputs prior to proposing any standard development project to revise, or develop a standard or definition.
1
Standard Authorization Request (SAR)
2
Requested information
Name
Alice Ireland (lead)
David Vitkus
Company
Tri-State Generation and Transmission
Tucson Electric Power
Eric Hull
SMUD
Marina Rohnow
Sempra Utilities/ San Diego Gas & Electric
Paul Haase
Seattle City Light
Richie Field
Hoosier Energy REC, Inc.
Rob Ellis
Tri-State Generation and Transmission
Steve Wesling
Tri-State Generation and Transmission
Toley Clague
Portland General Electric
Ziad Dassouki
ATCO Electric
Joseph Baxter
NERC
Lonnie Ratliff
NERC
Brian Kinstad
MRO
Holly Eddy
WECC
Kenath Carver
Texas Reliability Entity, Inc.
Michael Taube
MRO
Mike Stuetzle
NPCC
Morgan King
WECC
Shon Austin
Reliability First
Tremayne Brown
SERC
Are there any related standards or SARs that should be assessed for impact as a result of this proposed
project? If so which standard(s) or project number(s)?
Project 2016-02 Modifications to CIP Standards
Are there alternatives (e.g. guidelines, white paper, alerts, etc.) that have been considered or could
meet the objectives? If so, please list the alternatives.
When evaluating ways to modify the requirement, other standards and requirements were identified,
which provide examples on possible paths forward. Of particular relevance are the following
standards/requirements:
• CIP-006-6 Requirement R1 Part 1.10;
• CIP-010-2 Requirement R4, Attachment 1, Section 1.5;
• CIP-012-1 Requirement R1 (pending FERC approval).
Standard Authorization Request (SAR)
3
Requested information
As a means to assist the SDT, several possible options for revision to CIP-004-6 Requirement R4 Part
4.1.3 have been drafted and provided below:
EXAMPLE #1:
[Delete 4.1.3 and create a new subrequirement in either CIP-004 or CIP-011, that would read something
like this:]
R4.X Process to prevent unauthorized access to BES Cyber System Information. The process shall
include:
4.X.1. Identification of physical and electronic repositories utilized to store BES Cyber System
Information. If electronic, indicate whether the repository is hosted by the Responsible Entity or a thirdparty and also whether it is in a virtual or non-virtual environment.;
4.X.2. Identification of security protection(s) used to prevent unauthorized access to BES Cyber System
Information within each repository. Examples may include but are not limited to the following:
• Encryption and key management,
• Physical access management,
• Electronic access management,
• Data loss prevention techniques and rights management services.
4.X.3. The process to authorize access to BES Cyber System Information, based on need, as determined
by the Responsible Entity, except for CIP Exceptional Circumstances;
EXAMPLE #2:
R4.1 Process to authorize based on need, as determined by the Responsible Entity, except for CIP
Exceptional Circumstances:
4.1.1. Electronic access;
4.1.2. Unescorted physical access into a Physical Security Perimeter;
4.1.3. Physical access to physical BES Cyber System Information storage locations;
4.1.4. Physical access to unencrypted electronic BES Cyber System Information storage locations;
4.1.5. Electronic access to unencrypted electronic BES Cyber System Information storage locations; and
4.1.6. Electronic access to BES Cyber System Information encryption keys for encrypted BES Cyber
System Information.
EXAMPLE #3:
R4.1 Process to authorize based on need, as determined by the Responsible Entity, except for CIP
Exceptional Circumstances:
4.1.1. Electronic access;
4.1.2. Unescorted physical access into a Physical Security Perimeter;
4.1.3. Physical access to physical BES Cyber System Information storage locations;
4.1.4. Access to electronic BES Cyber System Information.
Standard Authorization Request (SAR)
4
Reliability Principles
Does this proposed standard development project support at least one of the following Reliability
Principles (Reliability Interface Principles)? Please check all those that apply.
1. Interconnected bulk power systems shall be planned and operated in a coordinated manner
to perform reliably under normal and abnormal conditions as defined in the NERC Standards.
2. The frequency and voltage of interconnected bulk power systems shall be controlled within
defined limits through the balancing of real and reactive power supply and demand.
3. Information necessary for the planning and operation of interconnected bulk power systems
shall be made available to those entities responsible for planning and operating the systems
reliably.
4. Plans for emergency operation and system restoration of interconnected bulk power systems
shall be developed, coordinated, maintained and implemented.
5. Facilities for communication, monitoring and control shall be provided, used and maintained
for the reliability of interconnected bulk power systems.
6. Personnel responsible for planning and operating interconnected bulk power systems shall be
trained, qualified, and have the responsibility and authority to implement actions.
7. The security of the interconnected bulk power systems shall be assessed, monitored and
maintained on a wide area basis.
8. Bulk power systems shall be protected from malicious physical or cyber attacks.
Market Interface Principles
Does the proposed standard development project comply with all of the following
Market Interface Principles?
1. A reliability standard shall not give any market participant an unfair competitive
advantage.
2. A reliability standard shall neither mandate nor prohibit any specific market
structure.
3. A reliability standard shall not preclude market solutions to achieving compliance
with that standard.
4. A reliability standard shall not require the public disclosure of commercially
sensitive information. All market participants shall have equal opportunity to
access commercially non-sensitive information that is required for compliance
with reliability standards.
Enter
(yes/no)
Yes
Yes
Yes
Yes
Identified Existing or Potential Regional or Interconnection Variances
Region(s)/
Explanation
Interconnection
e.g. NPCC
For Use by NERC Only
Standard Authorization Request (SAR)
5
SAR Status Tracking (Check off as appropriate)
Draft SAR reviewed by NERC Staff
Draft SAR presented to SC for acceptance
DRAFT SAR approved for posting by the SC
Final SAR endorsed by the SC
SAR assigned a Standards Project by NERC
SAR denied or proposed as Guidance
document
Version History
Version
Date
Owner
Change Tracking
1
June 3, 2013
1
August 29, 2014
Standards Information Staff
Updated template
2
January 18, 2017
Standards Information Staff
Revised
2
June 28, 2017
Standards Information Staff
Updated template
Standard Authorization Request (SAR)
Revised
6
Unofficial Comment Form
Project 2019-02 BES Cyber System Information Access Management
Do not use this form for submitting comments. Use the Standards Balloting and Commenting System
(SBS) to submit comments on Project 2019-02 BES Cyber System Information Access Management.
Comments must be submitted by 8 p.m. Eastern, April 26, 2019.
m. Eastern, Thursday, August 20, 2015
Additional information is available on the project page. If you have questions, contact Senior Standards
Developer, Latrice Harkness (via email), or at 404-446-9728.
Background Information
The purpose of this project is to clarify the CIP requirements related to BES Cyber System Information
(BCSI) access, to allow for alternative methods, such as encryption, to be utilized in the protection of BCSI.
The proposed scope of this project would entail modifications to CIP-004-6 and CIP-011-2. The SAR
describes the proposed scope as follows:
CIP-004-6 Requirement R4 Part 4.1.3 needs to be modified so authorization and access to BCSI is
clarified to focus on the BCSI and the controls deployed to limit access. In addition, the Standard
should allow multiple methods for controlling access to BES Cyber System Information, rather than
just electronic and physical access to the BES Cyber System Information storage location. For
example, the focus must be on BCSI and the ability to obtain and make use of it. This is particularly
necessary when it comes to the utilization of a third party’s system (aka cloud). As currently drafted,
the requirement is focused on access to the “storage location”, and therefore does not permit
methods such as encryption and key management to be utilized in lieu of physical/electronic access
controls. This wording also does not explicitly permit any flexibility in the audit approach. In addition
to modifying CIP-004-6 Requirement R4 Part 4.1.3, Part 4.4, Part 5.3 and CIP-011-2 Requirement R1
should also be evaluated for any subsequent impacts to the requirements, measures and/or the
guidelines and technical basis.
Questions
1. Do you agree with the proposed scope as described in the SAR? If you do not agree, or if you agree
but have comments or suggestions for the project scope please provide your recommendation and
explanation.
Yes
No
Comments:
2. Provide any additional comments for the SAR drafting team to consider, if desired.
Comments:
Unofficial Comment Form
Project 2019-02 BES Cyber System Information Access Management | March 2019
2
Standards Announcement
Project 2019-02 BES Cyber System Information Access Management
Formal Comment Period Open through April 26, 2019
Now Available
A 30-day formal comment period for the Project 2019-02 BES Cyber System Information Access
Management Standard Authorization Request (SAR), is open through 8 p.m. Eastern, Friday, April 26,
2019.
Commenting
Use the Standards Balloting and Commenting System (SBS) to submit comments. If you experience issues
navigating the SBS, contact Linda Jenkins. An unofficial Word version of the comment form is posted on
the project page.
•
If you are having difficulty accessing the SBS due to a forgotten password, incorrect credential
error messages, or system lock-out, contact NERC IT support directly at https://support.nerc.net/
(Monday – Friday, 8 a.m. - 5 p.m. Eastern).
•
Passwords expire every 6 months and must be reset.
•
The SBS is not supported for use on mobile devices.
•
Please be mindful of ballot and comment period closing dates. We ask to allow at least 48 hours
for NERC support staff to assist with inquiries. Therefore, it is recommended that users try logging
into their SBS accounts prior to the last day of a comment/ballot period.
Next Steps
The SAR drafting team will review all responses received during the comment period and determine the
next steps of the project.
For more information on the Standards Development Process, refer to the Standard Processes Manual.
For more information or assistance, contact Senior Standards Developer, Latrice Harkness (via email) or at
404-446-9728.
North American Electric Reliability Corporation
3353 Peachtree Rd, NE
Suite 600, North Tower
Atlanta, GA 30326
404-446-2560 | www.nerc.com
Comment Report
Project Name:
Project 2019-02 BES Cyber System Information Access Management
Comment Period Start Date:
3/28/2019
Comment Period End Date:
4/26/2019
Associated Ballots:
There were 47 sets of responses, including comments from approximately 121 different people from approximately 93 companies
representing 10 of the Industry Segments as shown in the table on the following pages.
Questions
1. Do you agree with the proposed scope as described in the SAR? If you do not agree, or if you agree but have comments or suggestions for
the project scope please provide your recommendation and explanation.
2. Provide any additional comments for the SAR drafting team to consider, if desired.
Organization
Name
Tennessee
Valley
Authority
MRO
Name
Segment(s)
Brian Millard 1,3,5,6
Dana Klem 1,2,3,4,5,6
Region
SERC
MRO
Group Name
Tennessee
Valley
Authority
MRO NSRF
Group
Member
Name
Group
Group
Member
Member
Organization Segment(s)
Group
Member
Region
Kurtz, Bryan
G.
Tennessee
Valley
Authority
1
SERC
Grant, Ian S.
Tennessee
Valley
Authority
3
SERC
Thomas, M.
Lee
Tennessee
Valley
Authority
5
SERC
Parsons,
Marjorie S.
Tennessee
Valley
Authority
6
SERC
Joseph
DePoorter
Madison Gas 3,4,5,6
& Electric
MRO
Larry Heckert Alliant Energy 4
MRO
Amy Casucelli Xcel Energy
1,3,5,6
MRO
Michael
Brytowski
Great River
Energy
1,3,5,6
MRO
Jodi Jensen
Western Area 1,6
Power
Administration
MRO
Kayleigh
Wilkerson
Lincoln
Electric
System
1,3,5,6
MRO
Mahmood
Safi
Omaha Public 1,3,5,6
Power District
MRO
Brad Parret
Minnesota
Powert
1,5
MRO
Terry Harbour MidAmerican 1,3
Energy
Company
MRO
Tom Breene
Wisconsin
3,5,6
Public Service
Corporation
MRO
Jeremy Voll
Basin Electric 1
Power
Cooperative
MRO
Kevin Lyons
Central Iowa
Power
Cooperative
MRO
1
Mike Morrow Midcontinent 2
ISO
Westar
Energy
Douglas
Webb
ACES Power Jodirah
Marketing
Green
DTE Energy - Karie
Detroit Edison Barczak
Company
Duke Energy Masuncha
Bussey
Manitoba
Hydro
1,3,5,6
1,3,4,5,6
MRO,SPP RE
1,3,5,6
Mike Smith 1,3,5,6
Westar-KCPL Doug Webb
Westar
1,3,5,6
MRO
Doug Webb
KCP&L
1,3,5,6
MRO
MRO,NA - Not
ACES
Bob Solomon Hoosier
1
Applicable,RF,SERC,Texas Standard
Energy Rural
RE,WECC
Collaborations
Electric
Cooperative,
Inc.
3,4,5
Kevin Lyons
Central Iowa
Power
Cooperative
Ginger
Mercier
Prairie Power 1,3
, Inc.
MRO
SERC
SERC
Jennifer Brey Arizona
1
Electric Power
Cooperative,
Inc.
WECC
Bill Hutchison Southern
1
Illinois Power
Cooperative
SERC
DTE Energy - 5
DTE Electric
RF
Daniel Herring DTE Energy - 4
DTE Electric
RF
Karie Barczak DTE Energy - 3
DTE Electric
RF
Duke Energy Laura Lee
Manitoba
Hydro
1
SERC
Susan Sosbe Wabash
3
Valley Power
Association
DTE Energy - Jeffrey
DTE Electric Depriest
FRCC,RF,SERC
MRO
Duke Energy 1
SERC
Lee Schuster Duke Energy 3
FRCC
Dale
Goodwine
Duke Energy 5
SERC
Greg Cecil
Duke Energy 6
RF
Yuguang Xiao Manitoba
Hydro
5
MRO
Karim Abdel- Manitoba
Hadi
Hydro
3
MRO
Blair Mukanik Manitoba
Hydro
6
MRO
Mike Smith
1
MRO
Manitoba
Hydro
Southern
Pamela
Company Hunter
Southern
Company
Services, Inc.
Northeast
Ruida Shu
Power
Coordinating
Council
1,3,5,6
SERC
1,2,3,4,5,6,7,8,9,10 NPCC
Southern
Company
RSC no
Dominion
Katherine
Prewitt
Southern
1
Company
Services, Inc.
SERC
Joel
Dembowski
Southern
Company Alabama
Power
Company
3
SERC
William D.
Shultz
Southern
Company
Generation
5
SERC
Jennifer G.
Sykes
Southern
Company
Generation
and Energy
Marketing
6
SERC
Guy V. Zito
Northeast
10
Power
Coordinating
Council
NPCC
Randy
MacDonald
New
Brunswick
Power
2
NPCC
Glen Smith
Entergy
Services
4
NPCC
Brian
Robinson
Utility
Services
5
NPCC
Alan
Adamson
New York
State
Reliability
Council
7
NPCC
David Burke
Orange &
Rockland
Utilities
3
NPCC
Michele
Tondalo
UI
1
NPCC
Helen Lainis
IESO
2
NPCC
Michael Jones National Grid 3
NPCC
Sean Cavote
PSEG
4
NPCC
Kathleen
Goodman
ISO-NE
2
NPCC
David Kiguel
Independent
NA - Not
Applicable
NPCC
6
NPCC
Silvia Mitchell NextEra
Energy -
Florida Power
and Light Co.
Paul
Malozewski
Hydro One
3
Networks, Inc.
NPCC
Gregory
Campoli
New York
Independent
System
Operator
2
NPCC
Caroline
Dupuis
Hydro
Quebec
1
NPCC
Chantal
Mazza
Hydro
Quebec
2
NPCC
Laura McLeod NB Power
Corporation
5
NPCC
Nick
Kowalczyk
1
NPCC
John Hastings National Grid 1
NPCC
Joel
Charlebois
AESI Acumen
Engineered
Solutions
International
Inc.
5
NPCC
Quintin Lee
Eversource
Energy
1
NPCC
Mike Cooke
Ontario Power 4
Generation,
Inc.
NPCC
Salvatore
Spagnolo
New York
Power
Authority
1
NPCC
Shivaz
Chopra
New York
Power
Authority
5
NPCC
Michael Forte Con Ed 1
Consolidated
Edison
NPCC
Dermot Smyth Con Ed 1
Consolidated
Edison Co. of
New York
NPCC
Peter Yost
NPCC
Orange and
Rockland
Con Ed 3
Consolidated
Edison Co. of
New York
Dominion Dominion
Resources,
Inc.
PSEG
Sean
Bodkin
Sean
Cavote
3,5,6
1,3,5,6
Dominion
FRCC,NPCC,RF
PSEG REs
Ashmeet Kaur Con Ed 5
Consolidated
Edison
NPCC
Connie Lowe Dominion Dominion
Resources,
Inc.
3
NA - Not
Applicable
Lou Oberski
Dominion Dominion
Resources,
Inc.
5
NA - Not
Applicable
Larry Nash
Dominion Dominion
Virginia
Power
1
NA - Not
Applicable
Tim Kucey
PSEG 5
PSEG Fossil
LLC
NPCC
Karla Barton
PSEG 6
PSEG Energy
Resources
and Trade
LLC
RF
Jeffrey
Mueller
PSEG - Public 3
Service
Electric and
Gas Co.
RF
Joseph Smith PSEG - Public 1
Service
Electric and
Gas Co.
RF
1. Do you agree with the proposed scope as described in the SAR? If you do not agree, or if you agree but have comments or suggestions for
the project scope please provide your recommendation and explanation.
Richard Jackson - U.S. Bureau of Reclamation - 1,5
Answer
No
Document Name
Comment
Reclamation agrees that a cost-effective, risk-based approach for the adoption and use of cloud services is needed within industry. BES Cyber System
Information could be stored on third party systems if proper controls for confidentiality, integrity, and availability are implemented for acceptable risk to
the BES. For example, if BCSI is stored within a cloud server and encrypted, the entity that owns the data should be the only one with access to the
encryption keys capable of decrypting the data, availability during critical emergencies, and integrity of transport layers 2 and 3.
Reclamation disagrees with the statement, “As currently drafted, the requirement is focused on access to the ‘storage location,’ and therefore does not
permit methods such as encryption and key management to be utilized in lieu of physical/electronic access controls. This wording also does not
explicitly permit any flexibility in the audit approach.” The current CIP-004 standard does not exclude these methods.
Virtualization can and should be as simple as, “If it is something that needs to be protected, protect it.” Reclamation recommends registered entities be
allowed to determine their risks. Reclamation is concerned that the proposed requirements will lead to increased requirements for low impact systems.
The SDT must consider allocation of resources spent on managing and documenting efforts on low impact systems. The SAR seems to indicate that
everyone would need specific authorization versus the current method of allowing a position of authority to delegate who may have access. More
detailed categorization will require more tracking tools and create more opportunities for failure (non-compliance) without necessarily improving BES
reliability or reducing risk.
Reclamation recommends the SDT focus on defining what BCSI is; specifically, if it is information carried through the BES Cyber System or about the
BES Cyber System.
Likes
1
Dislikes
Minnkota Power Cooperative Inc., NA - Not Applicable, Fuhrman Andy
0
Response
Oliver Burke - Entergy - Entergy Services, Inc. - 1
Answer
No
Document Name
Comment
The goal of restricting access to BCSI to only authorized personnel is to ensure the confidentiality, integrity, and availability of the data. Entities need to
have flexibility of defining how this is accomplished. Limiting entities to specific requirements and technology hinders a company's ability to use tools
that may protect them more effectively.
A good example of this problem involves access revocation requirements for BCSI. Currently we must revoke access within the next business day.
Certainly, a revocation process is necessary, but a specific time frame makes it almost impossible to manage service solutions such as cloud services.
The regulatory controls that govern BCSI should guide entities to build strong risk-based data protection plans for their BCSI, not limit them to specific
technologies or measures. Doing this restricts their ability to implement modern security programs and best-of-breed tools based on current and
evolving threat landscapes.
While this SAR doe mention specific technologies that could assist in preventing unauthorized access to BCSI, we are concerned that it will provide only
minimal expansion of what is acceptable rather than giving each entity the flexibility it needs.
Likes
1
Dislikes
Minnkota Power Cooperative Inc., NA - Not Applicable, Fuhrman Andy
0
Response
Shari Heino - Brazos Electric Power Cooperative, Inc. - 1,5
Answer
No
Document Name
Comment
We do not believe that the standards require revision in order to accommodate cloud storage, encryption, or various other tools which may be used for
protection of BCSI. CIP-004-6 is written to accommodate a variety of vetting and authorization approaches. For BSCI access under CIP-004, R4.1
merely specifies that a Responsible Entity must have a process to “authorize based on need, as determined by the Responsible Entity,” for the types of
access listed in 4.1.1 through 4.1.3. This provision does not specify a requirement to do background or identity checks on individual third party
employees. It does not preclude the ability of a Responsible Entity to use a cloud provider to store BSCI; it merely requires codifying and implementing
an approach to authorizing access to BCSI storage, if actual access will even occur. Terms such as “access,” “designated storage location,” and
“termination action” are undefined in the standards, and, depending how defined in the Responsible Entity’s process, could allow third party cloud
storage of BSCI while still meeting the current standards.
If the drafting team determines that changes should be made; however, we recommend that, (1) such changes should be clearly couched as
clarifications, and (2) highly specific or qualitative requirements regarding cloud storage and encryption should be avoided. Technology and cyber
attacks are changing daily, and our requirements should remain flexible regarding the protections we choose to use.
Likes
1
Dislikes
Minnkota Power Cooperative Inc., NA - Not Applicable, Fuhrman Andy
0
Response
Sean Bodkin - Dominion - Dominion Resources, Inc. - 3,5,6, Group Name Dominion
Answer
No
Document Name
Comment
While Dominion Energy supports cloud computing, Dominion Energy does not support the instant SAR. In stating the industry needs to allow BCSI data
to be stored on the cloud using encryption rather than the current requirements of the CIP standards, the SAR does NOT present a reliability purpose to
allow this less stringent method of storage of BCSI data. The need statement actually appears to potentially create a reliability gap by asserting that
encryption alone could be an alternative to the existing requirements. The SAR is proposing to use specific technologies (i.e. encryption and key
management) which could be less secure when used as an alternative to current CIP requirements.
Dominion Energy is also of the opinion that the SAR is requesting a modification solely for compliance clarification. A standard modification may not be
the appropriate tool, rather Implementation Guidance should be used to clarify compliance expectation. The current requirements do not need to be
modified to allow cloud storage of information and is appropriate based on the nature of the information being protected (BCSI). Dominion Energy is of
the opinion that the term ‘access’, which is a key issue in the SAR, standard could be defined as “the ability to use” when used in the context of
electronic access; therefore, a change to the standard wouldn’t be necessary to allow an entity to take credit for controls that prevent access; such as,
encryption and key management as methods for controlling physical/electronic access.
As an example, if an individual can log into a server that contains an electronic storage location but doesn’t have the ability to use the data because the
individual doesn’t the rights to access the data, there’s no compliance issue because the individual doesn’t have the ability to use the data.
The issue statement for cloud computing is ensuring the entity has an ability to know who has access to the BCSI information. o Given the nature of
the environment, it may not be clear who (outside of the entity) has access to the designated electronic storage location.
There may also be supply chain implications to be able to contractually ensure an entity is able to ensure administrators of the cloud computing vendor
are not provisioned in such a way that they would ever have unauthorized access to a designated BCSI storage repository.
From a cyber-security perspective, use of cloud computing for confidential information increases the risk of information falling into the hands of a ‘bad
actor’:
An entity loses control of the data as soon as it’s in the cloud. This includes not only the storage location but the transport from the source to the thirdparty storage location.
Even though the BCSI may be may be encrypted, there’s no assurance that a copy of the encrypted data can’t be made. A copy of the encrypted data
can be held by “bad actors” until such time as the technology exists to break the encryption.
It may not be clear who administratively has access to the electronic storage location from the cloud storage vendor.
The cloud storage vendor may subcontract portions of the administration of the environment.
There is no assurance that confidential files will be properly destroyed once it’s determined they’re no longer needed.
Due to the nature of cloud storage, multiple copies of a designated storage location may exist for redundancy in strategically placed data centers.
Deleting a repository in one data center doesn’t mean all copies (and backup copies) are also deleted.
For these reasons, Dominion Energy does not support this SAR and recommends that an Implementation Guidance document, which is appropriate to
address the compliance concerns raised in the SAR, be explored.
Likes
1
Dislikes
SCANA - South Carolina Electric and Gas Co., 1,3,5,6, Shumpert RoLynda
0
Response
Andy Fuhrman - Minnkota Power Cooperative Inc. - NA - Not Applicable - MRO
Answer
No
Document Name
Comment
MPC agrees that CIP-004 can be updated to better accommodate cloud-based storage, however, the current scope misses out on opportunites to align
CIP-004 with the risk -based approach of CIP-012 and CIP-013. CIP-011 is currently risk based, but the examples provided in the SAR are highly
prescriptive and should be considered a step backwards. The scope of this project should accommodate cloud storage by echoing CIP-012 R1
language, such as:
“The Responsible Entity shall develop one or more documented plan(s) to mitigate the risk of the unauthorized disclosure of BCSI. This shall be
accomplished by one or more of the following means, to include BCSI that is in storage, transit, and use:
•
Encryption and k ey management;
•
Physical access management;
•
Electronic access management;
•
Data loss prevention techniques and rights management services; or
•
Using an equally effective method to mitigate the risk of unauthorized disclosure.”
The scope of this project needs to include authorization and access restrictions to BCSI, not to a “designated storage location”.
Likes
0
Dislikes
0
Response
RoLynda Shumpert - SCANA - South Carolina Electric and Gas Co. - 1,3,5,6 - SERC
Answer
No
Document Name
Comment
Dominion Energy South Carolina (formerly SCANA) is in agreement with comments submitted by Dominion Energy (Sean Bodkin).
Likes
0
Dislikes
0
Response
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
No
Document Name
Comment
Electric Reliability Council of Texas, Inc. (ERCOT) requests that the SAR expressly identify the option of creating a separate standard for solutions
involving third-parties rather than embedding new requirements in existing requirements.
Likes
0
Dislikes
0
Response
Teresa Cantwell - Lower Colorado River Authority - 1,5
Answer
Yes
Document Name
Comment
No comments.
Likes
0
Dislikes
0
Response
Russell Martin II - Salt River Project - 1,3,5,6 - WECC
Answer
Yes
Document Name
Comment
Permitting methods such as encryption and key management to be utilized to as an additional protection for BCSI in transit and use allows
improvements to the standard for CIP-011-2.
However, cloud services are of a concern to the security of storing and allow multiple methods for controlling access to the BES Cyber System
Information storage location may pose additional risks.
Likes
0
Dislikes
0
Response
Andrea Barclay - Georgia System Operations Corporation - 3,4
Answer
Yes
Document Name
Comment
GSOC supports the proposed scope of the SAR and we believe the changes to the standards will provide registered entities with additional options for
using other efficient tools for CIP compliance activities.
Likes
0
Dislikes
0
Response
John Merrell - Tacoma Public Utilities (Tacoma, WA) - 1,3,4,5,6
Answer
Yes
Document Name
Comment
In addition to the mentioned potential modifications for CIP-004-6 R4.1.3, R4.4, R5.3 & CIP-011-2 R1, Tacoma Power recommends the SAR be
extended to include review of CIP-004-6 R2.1.5 which covers training for BES Cyber System Information Handling, and CIP-011-2 R2 which deals with
preventing unauthorized access to BCSI when a system is being reused or disposed.
Likes
0
Dislikes
0
Response
Laura Nelson - IDACORP - Idaho Power Company - 1
Answer
Yes
Document Name
Comment
In general, Idaho Power Company agrees with the scope of the SAR as described. BCSI protections should be flexible enough to provide an entity with
the ability to adapt to different environments and situations while still being restrictive enough to provide assurance that information is protected in
storage, transit, and use.
Likes
0
Dislikes
0
Response
Masuncha Bussey - Duke Energy - 1,3,5,6 - FRCC,SERC,RF, Group Name Duke Energy
Answer
Document Name
Comment
Yes
Duke Energy agrees with the proposed scope of this project, and agrees that additional clarity regarding this issue is sorely needed.
Also, we would be interested to know if the drafting team has considered, or is aware if this project will impact CIP-013 specifically?
Likes
0
Dislikes
0
Response
Mike Kraft - Basin Electric Power Cooperative - 1,3,5,6
Answer
Yes
Document Name
Comment
Support NRECA comments.
Likes
0
Dislikes
0
Response
Jeremy Voll - Basin Electric Power Cooperative - 1,3,5,6
Answer
Yes
Document Name
Comment
Support NRECA Comments
Likes
0
Dislikes
0
Response
Douglas Webb - Westar Energy - 1,3,5,6 - MRO, Group Name Westar-KCPL
Answer
Document Name
Comment
Yes
Westar and Kansas City Power & Light are supportive of Edison Electric Institute's response to Question 1.
Likes
0
Dislikes
0
Response
Aaron Cavanaugh - Bonneville Power Administration - 1,3,5,6 - WECC
Answer
Yes
Document Name
Comment
None
Likes
0
Dislikes
0
Response
Chris Scanlon - Exelon - 1,3,5,6
Answer
Yes
Document Name
Comment
Exelon agrees with the overall scope of the SAR. There are sections in the document that need clarification. Example #4.X.2, the language “may
include but are not limited to…” seems to imply that entities aren’t being held to any one thing specifically except identifying “… security protection(s)
used to prevent unauthorized access to [BCSI] within each repository”. Further define what’s expectations are around “Data loss prevention techniques
and rights management services” in section 4.X.2.
Example #2 4.1.3 “Physical access to physical BES Cyber System Information storage locations;” appears somewhat redundant with 4.1.4, “Physical
access to unencrypted electronic BES Cyber System Information storage locations;” where this may require a fairly significant effort.
Likes
0
Dislikes
0
Response
Barry Lawson - National Rural Electric Cooperative Association - 3,4
Answer
Document Name
Yes
Comment
NRECA supports the proposed scope of the SAR and we believe the changes to the standards will provide registered entities with additional options for
using other efficient tools for CIP compliance activities.
Likes
0
Dislikes
0
Response
Patrick Wells - OGE Energy - Oklahoma Gas and Electric Co. - 1,3,5,6
Answer
Yes
Document Name
Comment
OG&E supports the comments made by EEI:
Comments: EEI member companies support the intent of the proposed SAR but believe there is room to clarify the draft language to ensure the affected
Reliability Standards continue to meet the Reliability needs of the Bulk Electric System. From that perspective, we offer the following brief input for
consideration:
Comments are provided by SAR Section Title:
Industry Need: We recommend removing the introductory statement (i.e., “While there is no direct benefit to the reliability of the BES”), because we
believe this statement conflicts with the following text, as currently written.
Purpose or Goal: EEI members offer for consideration the following clarifying edits consideration:
This project is intended to Cclarifying and expand the the options available under the CIP requirements, related to BES Cyber System Information
access, to remove unnecessary barriers and allow for alternative methods, (e.g., such as encryption, etc.), that could provide equally effective
solutions for the storage, transit and access to be utilized in the protectioned of BCSI data.
Do you know of any consensus building activities in conjunction with this SAR? EEI member companies ask that conclusions developed by the
“informal team” assembled by the NERC Compliance Input Working Group be referenced within this SAR. While it is clear that a large number of SMEs
worked on this effort, their findings and recommendations are neither posted by NERC or referenced within this SAR.
Are there alternatives that have been considered or could meet the objectives? EEI member companies question whether the detailed examples
contained within the SAR might unintentionally limit the SDT from developing other, possibly more effective, solutions and offer the following edits.
As a means to assist the SDT, several possible options are provided for SDT consideration to address revisions to CIP-004-6 Requirement R4 Part
4.1.3. These options are not intended to limit the SDT from developing other more effective solutions.
Additionally, EEI member companies are unclear whether the examples provided were developed as part of the informal team (previously mentioned in
the proceeding question), that operated under the direction of the NERC Compliance Input Working Group. If that is the case, we believe such
information would be better placed under the proceeding question.
Likes
0
Dislikes
0
Response
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
Yes
Document Name
Comment
NV Energy supports the project as intended; to expand available options under current Standard related to an entity to utilize changes in technologies
for data storage paltforms. That said, we do believe tht further clarifiaction and development still needs to take place to define scope.
NV Energy believes the current SAR language is still too general in its statement for allowing Industry and Entities to be more flexible in performing
business function and using new technologies, but NV Energy would request more clarifying language to understand the burden of accountability via
evidence on the Entity to provide after this change is made. It would benefit NV Energy to know this, prior to agreeing to creation of a SDT for the
project.
Keeping the subject matter only in the scope of CIP-004 and CIP-011, we agree with a SAR to address a growth for technologies.
Likes
0
Dislikes
0
Response
Leanna Lamatrice - AEP - 3,5
Answer
Document Name
Yes
Comment
While AEP agrees with the proposed scope of the SAR, we recommend that the examples provided for possible revisions to CIP-004-6 Requirement R4
Part 4.1.3 be deleted from the SAR. The inclusion of the examples hinders the flexibility of the SDT to craft the revisons necessary to accurately
address the use of encryption on BES Cyber System Information. AEP recommends the SDT work off the scope and objectives as written in the
Detailed Description section of the SAR.
Likes
0
Dislikes
0
Response
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
Yes
Document Name
Comment
Southern Company supports the intent of the proposed SAR but believes there is room to clarify the draft language to ensure the affected Reliability
Standards continue to meet the Reliability needs of the Bulk Electric System.
Southern Company requests that the scope of the SAR allows the SDT to specifically address and clarify the interpretation around encrypted BCSI and
how encrypted data (cyphertext) does not constitute “information that can be used”, as per the BCSI definition. To consider cyphertext to still meet the
definition of BCSI is in opposition to the plain language of the existing defined term, and to consider it as such nullifies any benefit to be gained or
optionality for using 3rd party hosting solutions as a Registered Entity would have no control over those physically accessing the 3rd party’s data
centers. Physical access to electronically stored and encrypted cyphertext should be considered outside of the scope of this SAR based on the grounds
that access to cyphertext without the ability to decrypt that data should not be considered “access to BCSI.”
The SAR should also clarify that the inclusion of encryption as an option to secure BCSI is in addition to other acceptable means available to Registered
Entities, such as other physical and electronic security controls, and that the SAR will not force the SDT into limiting a Registered Entity’s options for
complying with the Standard. Southern is concerned that the detailed examples contained within the SAR might unintentionally limit the SDT from
developing other, possibly more effective, solutions.
Likes
0
Dislikes
0
Response
Jerry Horner - Basin Electric Power Cooperative - 1,3,5,6
Answer
Document Name
Yes
Comment
Support NRECA comments.
Likes
0
Dislikes
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Yes
Document Name
Comment
Texas RE suggests adding verbiage to the SAR to indicate entities should use the strongest encryption algorithm since not all encryption algorithms are
secure.
Likes
0
Dislikes
0
Response
Matthew Nutsch - Seattle City Light - 1,3,4,5,6 - WECC
Answer
Yes
Document Name
Comment
Comments: The impact of nondisclosure agreements (NDAs) also should be considered on managing access to BSCI. In some cases within the
NERC CIP Standards, a properly constructed NDA apparently can provide sufficient evidence of adequate information handling, and in other cases it
cannot.
For sensitive CIP-014 documents, for instance, an NDA is explicitly identified within the Standard (R2, R6) as sufficient for protecting the information,
and in practice validating the existence of such an NDA appears to be the audit approach for the information protection aspect of CIP-014 R2 and R6.
There is no effort on the part of ERO auditors to identify CIP-004 R4 and R5 details, such as who has access to the information, when they were
disabled, or how or where it is stored by the third party signing the NDA.
Similarly, an NDA appears audit-sufficient for BSCI or sentitive information provided to third party consultants as part of a mock audit, say, or for
program improvement work, or for such information shared among regulated entities themselves as necessary for reliable operation of operation of the
power grid. To date, NERC CIP auditors do not appear to require or request CIP-004-type evidence of how the third-party handled or stored the
sensitive information or BCSI. The existence of the NDA is sufficient.
Finally the ERO enterprise itself provides a third example of how NDAs, by themselves, are sometimes deemed sufficient for third-party handling and
storage of sensitive information and BCSI. Here, the general NDA among the entity and regulator is considered sufficient, even for third-party (ERO)
storage of sensitive information and BCSI in cloud-based systems such as webCDMS. Again, no CIP-004-type evidence is requested or expected.
In other cases, an NDA is not deemed sufficient. The most obvious case is that an NDA, by itself, does not appear to considered by NERC auditors as
sufficient evidence of adequate protection of BCSI provided by an entity to a third-party cloud storage providers. In such cases, whether a proper NDA
exists or not, the audit approach typically calls for review of evidence that all CIP-004 R4 and R5 requirements have been met by the third-party cloud
provider.
These different audit approaches for sensitive information and BCSI under an NDA raise several questions. Under what conditions is an NDA, alone,
sufficient and why? What is the expectation under CIP-004 R4 for BCSI that is protected pursuant to an NDA? Does the NDA authorize blanket access
for the company to which it applies, or is individual authorization expected in addition to the NDA? If the former, what is the expectation regarding
access tracking, revocations, and reviews? Including NDA issues within the SAR scope may reveal alternative paths towards secure cloud management
of BCSI under NERC CIP.
Likes
0
Dislikes
0
Response
Sean Cavote - PSEG - 1,3,5,6 - NPCC,RF, Group Name PSEG REs
Answer
Yes
Document Name
Comment
PSEG supports the proposed scope of the SAR. Proposed changes to the standards would provide industry with more tools and greater flexibility in
complying with the CIP standards.
Likes
0
Dislikes
0
Response
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
Yes
Document Name
Comment
EEI member companies support the intent of the proposed SAR but believe there is room to clarify the draft language to ensure the affected Reliability
Standards continue to meet the Reliability needs of the Bulk Electric System. From that perspective, we offer the following brief input for consideration:
Comments are provided by SAR Section Title:
Industry Need: We recommend removing the introductory statement (i.e., “While there is no direct benefit to the reliability of the BES”), because we
believe this statement conflicts with the following text, as currently written.
Purpose or Goal: EEI members offer for consideration the following clarifying edits consideration:
This project is intended to clarify and expand the options available under the CIP requirements, related to BES Cyber System Information access,
to remove unnecessary barriers and allow for alternative methods, (e.g., encryption, etc.) that could provide equally effective solutions for the
storage, transit and access to protected BCSI data. (strike throughs removed due to the system not allowing its use)
Do you know of any consensus building activities in conjunction with this SAR? EEI member companies ask that conclusions developed by the
“informal team” assembled by the NERC Compliance Input Working Group be referenced within this SAR. While it is clear that a large number of SMEs
worked on this effort, their findings and recommendations are neither posted by NERC or referenced within this SAR.
Are there alternatives that have been considered or could meet the objectives? EEI member companies question whether the detailed examples
contained within the SAR might unintentionally limit the SDT from developing other, possibly more effective, solutions and offer the following edits.
As a means to assist the SDT, several options are provided for SDT consideration to address revisions to CIP-004-6 Requirement R4 Part 4.1.3.
These options are not intended to limit the SDT from developing other more effective solutions. (strike throughs removed due to the system not
allowing its use)
Additionally, EEI member companies are unclear whether the examples provided were developed as part of the informal team (previously mentioned in
the proceeding question), that operated under the direction of the NERC Compliance Input Working Group. If that is the case, we believe such
information would be better placed under the proceeding question.
Likes
0
Dislikes
0
Response
Darcy O'Connell - California ISO - 2 - WECC
Answer
Yes
Document Name
Comment
CAISO proposes that any third party obligations for storing BCSI in the cloud should not be embedded in the requirements but deferred to cloud vendor
risk asseements
Likes
0
Dislikes
0
Response
Marty Hostler - Northern California Power Agency - 5,6
Answer
Document Name
Comment
Yes
Likes
0
Dislikes
0
Response
Susan Sosbe - Wabash Valley Power Association - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Leonard Kula - Independent Electricity System Operator - 2
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Mike Smith - Manitoba Hydro - 1,3,5,6, Group Name Manitoba Hydro
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
Response
0
Cassie Williams - Golden Spread Electric Cooperative, Inc. - 5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Tho Tran - Oncor Electric Delivery - 1 - Texas RE
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Dana Klem - MRO - 1,2,3,4,5,6 - MRO, Group Name MRO NSRF
Answer
Document Name
Comment
Yes
Likes
0
Dislikes
0
Response
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kimberly Van Brimer - Southwest Power Pool, Inc. (RTO) - 2 - MRO,WECC
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name RSC no Dominion
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Maryanne Darling-Reich - Black Hills Corporation - 1,3,5,6 - WECC
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Chinedu Ochonogor - APS - Arizona Public Service Co. - 1,3,5,6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Constantin Chitescu - Ontario Power Generation Inc. - 5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Gregory Campoli - New York Independent System Operator - 2
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Glenn Barry - Los Angeles Department of Water and Power - 1,3,5,6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
Document Name
Comment
We are in support of the scope of the SAR and believe changes to the standards will give registered entities additional options for using other methods
for CIP compliance activities.
Likes
0
Dislikes
Response
0
2. Provide any additional comments for the SAR drafting team to consider, if desired.
Darcy O'Connell - California ISO - 2 - WECC
Answer
Document Name
Comment
The CAISO offers the following feedback on the SAR.
INDUSTRY NEED SECTION:
CAISO contends that this initiative could have a direct benefit to reliability. The use of third-party solutions (aka cloud) for the storage of BES Cyber
System Information can provide a reliability benefit in having recovery plans and other information available to the entity in the event they are needed
and the entity’s systems are unavailable.
Further, as technologies and cyber attacks advance and become more complex, Responsible Entities are becoming increasingly interested in collecting
and correlating electronic access monitoring events across their enterprises. This broad-based information collection provides Responsible Entities with
more visibility into emerging threats and trends. Many of these types of software providers are no longer offering on-premises solutions. Allowing the
use of third parties for these solutions to analyze and take action serves to improve the overall cybersecurity and reliability of the BES through early
detection of compromise.
CAISO would also note that the SAR does not address the use of applications. The SAR only addresses storage. The SAR should account for both.
PURPOSE OR GOAL SECTION:
CAISO contends that encryption is already recognized as a means to protect BCSI. Under CIP-011-2 R2, Part 2.1, encryption is listed as a means to
prevent “unauthorized retrieval” of BCSI. Unauthorized retrieval is basically the same concept as unauthorized access. The use of encryption should be
applied consistently to CIP-004 R4, CIP-004 R5, and CIP-011 R2, Part 2.1.
DETAILED DESCRIPTION SECTION:
CAISO contends that encryption is already recognized as a means to protect BCSI. Under CIP-011-2 R2, Part 2.1, encryption is listed as a means to
prevent “unauthorized retrieval” of BCSI. Unauthorized retrieval is basically the same concept as unauthorized access. The use of encryption should be
applied consistently to CIP-004 R4, CIP-004 R5, and CIP-011 R2, Part 2.1. The use of encryption can be used to prevent access. Therefore, CIP-004
R4 and R5 should not apply since access is prevented.
CAISO agrees that audit evidence should be addressed. This should include the use of external audit reports to demonstrate compliance in lieu of
detailed evidence that would be available for on-premises implementations. In the context of these services, the Responsible Entity’s obligations may
only be limited to due diligence in reviewing third party audit and certification details.
ALTERNATIVES SECTION:
CAISO agrees with the concept of Example #1, but requests clarification on the inclusion of “virtual or non-virtual environment” on Example #1.
ADDITIONAL COMMENTS:
One area that should be considered is to address the geographical location of BCSI stored with a third party (aka cloud). Requirements should be
drafted for entities to evaluate the geographic location of hosted solutions in their risk assessment of the service.
Any requirement language should include provisions of a CIP Exceptional Circumstance in addressing access controls under CIP-004.
Likes
0
Dislikes
0
Response
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
Document Name
Comment
ERCOT offers the following additional comments for the SAR drafting team to consider.
INDUSTRY NEED SECTION
ERCOT believes this initiative could have a direct benefit to reliability. The use of third-party solutions (aka cloud) for the storage of BES Cyber System
Information can provide a reliability benefit in having recovery plans and other information available to the entity in the event they are needed and the
entity’s systems are unavailable.
In addition, as technologies and cyber attacks advance and become more complex, Responsible Entities are becoming increasingly interested in
collecting and correlating electronic access monitoring events across their enterprises. This broad-based information collection provides Responsible
Entities with more visibility into emerging threats and trends. Many of these types of software providers are no longer offering on-premises solutions.
Allowing the use of third parties for these solutions to analyze and take action serves to improve the overall cybersecurity and reliability of the BES
through early detection of compromise.
ERCOT also notes that the SAR does not address the use of applications. The SAR only addresses storage. The SAR should take both into
consideration.
PURPOSE OR GOAL SECTION
Encryption is already recognized as a means to protect BCSI. Under CIP-011-2 R2, Part 2.1, encryption is listed as a means to prevent "unauthorized
retrieval" of BCSI. Unauthorized retrieval is basically the same concept as unauthorized access. The use of encryption should be applied consistently to
CIP-004 R4, CIP-004 R5, and CIP-011 R2, Part 2.1.
DETAILED DESCRIPTION SECTION
Encryption is already recognized as a means to protect BCSI. Under CIP-011-2 R2, Part 2.1, encryption is listed as a means to prevent "unauthorized
retrieval" of BCSI. Unauthorized retrieval is basically the same concept as unauthorized access. The use of encryption should be applied consistently to
CIP-004 R4, CIP-004 R5, and CIP-011 R2, Part 2.1. The use of encryption can be used to prevent access. Therefore, CIP-004 R4 and R5 should not
apply because access is prevented.
ERCOT concurs with the SAR drafting team that audit evidence should be addressed. This should include the use of external audit reports to
demonstrate compliance in lieu of detailed evidence that would be available for on-premises implementations. In the context of these services, the
Responsible Entity’s obligations may only be limited to due diligence in reviewing third party audit and certification details.
ALTERNATIVES SECTION
ERCOT agrees with the concept of Example No. 1, but requests clarification on the inclusion of "virtual or non-virtual environment" in Example No. 1.
ADDITIONAL COMMENTS
An additional area that should be considered is the geographical location of BCSI stored with a third party (aka cloud). Requirements should be drafted
for entities to evaluate the geographic location of hosted solutions in their risk assessment of the service. Finally, any new requirement language should
include provisions concerning CIP Exceptional Circumstance in addressing access controls under CIP-004.
Likes
0
Dislikes
0
Response
Gregory Campoli - New York Independent System Operator - 2
Answer
Document Name
Comment
The NYISO offers the following feedback on the SAR.
INDUSTRY NEED SECTION:
NYISO contends that the standard revision should be specific to storage of BCSI. This would include modifications to support the use of encryption as
an acceptable level of protection for data being stored within third party infrastructure.
PURPOSE OR GOAL SECTION:
NYISO contends that encryption is already recognized as a means to protect BCSI. Under CIP-011-2 R2, Part 2.1, encryption is listed as a means to
prevent “unauthorized retrieval” of BCSI. Unauthorized retrieval is basically the same concept as unauthorized access.
DETAILED DESCRIPTION SECTION:
The use of encryption to ensure both integrity and confidentiality at a minimum should be the focus.
Modifications to the standards should include the establishment of acceptable levels of encryption, the management of keys, the establishment and
testing of encryption for data stored and in transit to/from third party providers of cloud storage.
CIP modifications need to provide clarity in establishing what obligations the responsible entity would have in order to establish and maintain
compliance and what aspects could be left to the third party provider of cloud storage.
Modifications should include noting contractural provisions that would need to be in place to assure the controls are in place (i.e. testing, alerting) and
what obligations the third party provider would have as it pertains to data destruction once contractual relationship is terminated.
ALTERNATIVES SECTION:
NYISO agrees with the concept of Example #1, but requests clarification on the inclusion of “virtual or non-virtual environment” on Example #1.
ADDITIONAL COMMENTS:
One area that should be considered is to address the geographical location of BCSI stored with a third party (aka cloud). Requirements should be
drafted for entities to evaluate the geographic location of hosted solutions in their risk assessment of the service.
Any requirement language should include provisions of a CIP Exceptional Circumstance in addressing access controls under CIP-004.
Likes
0
Dislikes
0
Response
Matthew Nutsch - Seattle City Light - 1,3,4,5,6 - WECC
Answer
Document Name
Comment
None
Likes
0
Dislikes
0
Response
Jerry Horner - Basin Electric Power Cooperative - 1,3,5,6
Answer
Document Name
Comment
Support NRECA comments.
Likes
Dislikes
0
0
Response
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
Document Name
Comment
If approved, the following is provided as feedback to the NERC SDT that will be addressing the SAR:
Southern Company suggests the SDT consider modifying the glossary definition of BCSI in the section of the defined term that states what is not BCSI
to add language to the effect of “encrypted cyphertext without the ability to decrypt or access the encryption key”. Properly encrypted data is not actual
information, but cyphertext and not useable without a “key” to decrypt it.
Southern Company also suggests the SDT consider requirements for the use of two-factor authentication when accessing BCSI stored on 3rd party
hosted solutions.
Likes
0
Dislikes
0
Response
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
Document Name
Comment
NV Energy shares EEI's comments that conclusions developed by the “informal team” assembled by the NERC Compliance Input Working Group be
referenced within this SAR. While it is clear that a large number of SMEs worked on this effort, their findings and recommendations are neither posted
by NERC or referenced within this SAR.
Additionally, NV Energy is unclear whether the examples provided were developed as part of the informal team that operated under the direction of the
NERC Compliance Input Working Group.
Likes
Dislikes
0
0
Response
Barry Lawson - National Rural Electric Cooperative Association - 3,4
Answer
Document Name
Comment
NRECA appreciates the efforts of Tri-State G&T and the other members of the NERC Compliance Input Working Group for submitting this SAR.
Likes
0
Dislikes
0
Response
Andy Fuhrman - Minnkota Power Cooperative Inc. - NA - Not Applicable - MRO
Answer
Document Name
Comment
MPC has additional concerns regarding the ambigious term: “designated storage location”. The ultimate objective of CIP-004 R4.1.3 is to protect BCSI,
not a server, room, lock er, computer, vehicle, etc. BCSI can be anywhere as it is stored, used, and transported. A “designated storage location” is a
challenge to define and difficult to audit. A risk-based approach allows an entity to define the risk and the adequacy of the actions taken to mitigate that
risk , without confining those actions to prescriptive definitions or an out-of-date or restrictive framework . The term “designated storage location” could be
removed from CIP-004 altogether, with all requirements for the protection of BCSI being specified within CIP-011 in a manner similar to what is
suggested above.
The examples provided in the SAR are restrictive, burdensome, and costly, and do not allow the entity to address the level of risk posed by a particular
situation. MPC is strongly opposed to any language that resembles the examples provided in the SAR. The Cost Impact Assessment notes potential
savings due to economies of scale. While this my be true when considering the use of cloud storage, the reality is that highly prescriptive requirements
such as the examples that are provided, would significantly increase costs without an appropriate risk analysis.
Likes
0
Dislikes
0
Response
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
Document Name
Comment
TVA supports review of the CIP-004 and CIP-011 language as currently written, specifically with regard to the use of encryption in place of physical
access controls. However, TVA cautions against including discussion of specific technologies in the language of the standards that could prohibit or
discourage innovation or use of emerging technologies.
Likes
0
Dislikes
0
Response
Aaron Cavanaugh - Bonneville Power Administration - 1,3,5,6 - WECC
Answer
Document Name
Comment
None
Likes
0
Dislikes
0
Response
Douglas Webb - Westar Energy - 1,3,5,6 - MRO, Group Name Westar-KCPL
Answer
Document Name
Comment
None.
Likes
0
Dislikes
0
Response
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
Document Name
Comment
ACES would like to thank the SAR Team for their efforts and opportunity to comment on the SAR.
Likes
0
Dislikes
0
Response
Jeremy Voll - Basin Electric Power Cooperative - 1,3,5,6
Answer
Document Name
Comment
Support NRECA Comments
Likes
0
Dislikes
0
Response
Mike Kraft - Basin Electric Power Cooperative - 1,3,5,6
Answer
Document Name
Comment
Support NRECA comments.
Likes
0
Dislikes
0
Response
Dana Klem - MRO - 1,2,3,4,5,6 - MRO, Group Name MRO NSRF
Answer
Document Name
Comment
Agree with the objective of the proposal, but are we certain that the current language of CIP-004-6 Requirement R4 Part 4.1.3 cannot accommodate
third-party cloud-based encrypted BCSI? The “or” in “physical or electronic” access to designated storage locations (an undefined term that can be
defined by the Responsible Entity) permits electronic authorization exclusively, relieving the Responsible Entity of any physical access concerns.
Encryption key management can be the process to authorize electronic access to BCSI. The designated storage location could be defined as the
Responsible Entity’s encrypted BSCI in a designated third-party data repository.
Does the requirement language need to be changed to explicitly permit, or can other options be pursued to ascertain whether or not current language
can accommodate? Has anyone submitted implementation guidance for ERO endorsement showing how industry believes this can be done
compliantly?
If NERC is receptive to encryption satisfying R4.1.3, a SAR may yet be required to specify minimum acceptable encryption key strength, such as NIST
Advanced Encryption Standard AES 256-bit, just as minimum password length and complexity requirements are set forth in CIP-007-6 R5.5
Likes
0
Dislikes
0
Response
Oliver Burke - Entergy - Entergy Services, Inc. - 1
Answer
Document Name
Comment
No additional comments.
Likes
0
Dislikes
0
Response
Masuncha Bussey - Duke Energy - 1,3,5,6 - FRCC,SERC,RF, Group Name Duke Energy
Answer
Document Name
Comment
Duke Energy would like to recommend that the drafting team consider the potential impacts of setting encryption at the document level or
the repository level.
Likes
0
Dislikes
0
Response
Richard Jackson - U.S. Bureau of Reclamation - 1,5
Answer
Document Name
Comment
Reclamation recommends IT systems that store BCSI be certified and accredited for operation in accordance with federal and Department of Homeland
Security (DHS) standards. Boundaries and security authorization(s) must be defined for systems with common security controls. National Institute of
Standards and Technology (NIST) Information Management Security suggests entities should control risks by evaluating the system’s or information’s
importance and designating the confidentiality, integrity, and availability necessary for the system or information. The entity’s CIP Senior Manager or
delegate should accept (approve) the risk for the responsible entity.
Additionally, the revised standards must specifically account for the requirements pertaining to Controlled Unclassified Information (CUI) in 32 CFR
2002. Reclamation recommends the SDT obtain a full understanding of overall information protection requirements, to include requirements beyond IT
systems. For example, there is no mechanism to encrypt hard copy data, so physical protection requirements cannot be totally removed.
Reclamation also recommends the SDT incorporate the following definition of “Information Security” as stated in NIST SP800-12r1, Section 1.4
Important Terminology, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-12r1.pdf:
“Information Security – The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or
destruction in order to ensure confidentiality, integrity, and availability.”
Likes
0
Dislikes
0
Response
Andrea Barclay - Georgia System Operations Corporation - 3,4
Answer
Document Name
Comment
GSOC appreciates the efforts of Tri-State G&T and the other members of the NERC Compliance Input Working Group for submitting this SAR. Drafting
team should consider how entities and NERC could rely on third party audit assessment of cloud services provider. They should also evaluate the
requirement for access management, revocation, disposal and information protection.
Likes
0
Dislikes
0
Response
Russell Martin II - Salt River Project - 1,3,5,6 - WECC
Answer
Document Name
Comment
SRP agrees with the SAR that additional considerations need to be given to other ways to protect BCSI beyond access to storage locations. There are
more methods to protect BCSI and the standards need to be flexible enough to allow it. The current requirements apply to BCSI in the cloud, however,
it is not feasible to expect third party providers of hosted solutions (cloud BCSI storage locations) to comply with CIP-004-06 R4.1.3 and CIP-004-6
R5.3, so entities have to look for other options – and not using cloud providers is no longer an option.
SRP suggests the SDT look for opportunities to update CIP-011 requirements to better document the types of protections in place for BCSI storage
locations where the only available control is CIP-004-6 (access management), then CIP-004 applies.
SRP disagrees with an approach that encryption or masking BCSI renders it no longer BCSI. This would create a need for entities to know when
information is no longer BCSI (upon encryption) and when it becomes BCSI again (upon decryption). It will be difficult to apply the current CIP-004
storage locations based requirements. SRP agrees with the SAR’s approach that the standards should be updated to allow for other methods to protect
BCSI. This will ensure a complete inventory of BCSI and a better overall understanding of the protections in place.
The SDT may want to consider minimum requirements (or guidance) for an approach to properly sanitize (i.e. cryptographic erase) off premise BCSI.
Likes
1
Dislikes
Minnkota Power Cooperative Inc., NA - Not Applicable, Fuhrman Andy
0
Response
Teresa Cantwell - Lower Colorado River Authority - 1,5
Answer
Document Name
Comment
No comments.
Likes
0
Dislikes
0
Response
Mike Smith - Manitoba Hydro - 1,3,5,6, Group Name Manitoba Hydro
Answer
Document Name
Comment
Given that the Example #2 proposes a reasonable and alternative approach that permits encryption and key management to be utilized in lieu of
physical/electronic access controls, we support Example #2 to be considered for modifying CIP-004-6 R4 Part 4.1.3. This encryption and key
management method woud provide flexibility for entities to manage BCSI access and facilitate the cloud storage solution. Note that if the CIP-004-6 R4
Part 4.1.3 is revised using Example #2, the CIP-004-6 R4 Part 4.3 and R5 Part 5.3 should be revised in accordance with the modification of CIP-004-6
R4 Part 5.1.3.
Likes
0
Dislikes
0
Response
Susan Sosbe - Wabash Valley Power Association - 3
Answer
Document Name
Comment
The standards development team should favor non-prescriptive standards for protection of BES Cyber System Information that requires an
appropriate level security within (1) individual Entities, (2) Application Providers, (3) Public Cloud Providers, (4) Entities that hold protected
information for other utilities business partners, and (5) business partners that need access and temporarily retain this information.
Likes
0
Dislikes
Response
0
Consideration of Comments
Project Name:
Project 2019-02 BES Cyber System Information Access Management
Comment Period Start Date:
3/28/2019
Comment Period End Date:
4/26/2019
Associated Ballots:
There were 47 sets of responses, including comments from approximately 121 different people from approximately 93 companies
representing 10 of the Industry Segments as shown in the table on the following pages.
All comments submitted can be reviewed in their original format on the project page.
If you feel that your comment has been overlooked, please let us know immediately. Our goal is to give every comment serious consideration
in this process. If you feel there has been an error or omission, you can contact the Vice President of Engineering and Standards, Howard Gugel
(via email) or at (404) 446‐9693.
Questions
1. Do you agree with the proposed scope as described in the SAR? If you do not agree, or if you agree but have comments or suggestions for
the project scope please provide your recommendation and explanation.
2. Provide any additional comments for the SAR drafting team to consider, if desired.
The Industry Segments are:
1 — Transmission Owners
2 — RTOs, ISOs
3 — Load‐serving Entities
4 — Transmission‐dependent Utilities
5 — Electric Generators
6 — Electricity Brokers, Aggregators, and Marketers
7 — Large Electricity End Users
8 — Small Electricity End Users
9 — Federal, State, Provincial Regulatory or other Government Entities
10 — Regional Reliability Organizations, Regional Entities
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
2
Organization
Name
Tennessee
Valley
Authority
MRO
Name
Brian
Millard
Dana
Klem
Segment(s)
1,3,5,6
1,2,3,4,5,6
Region
SERC
MRO
Group Name
Tennessee
Valley
Authority
MRO NSRF
Group
Member
Name
Group
Group
Group
Member
Member Member
Organization Segment(s) Region
Kurtz,
Bryan G.
Tennessee
Valley
Authority
1
SERC
Grant, Ian
S.
Tennessee
Valley
Authority
3
SERC
Thomas,
M. Lee
Tennessee
Valley
Authority
5
SERC
Parsons,
Tennessee
Marjorie S. Valley
Authority
6
SERC
Joseph
Madison Gas
DePoorter & Electric
3,4,5,6
MRO
Larry
Heckert
Alliant Energy 4
MRO
Amy
Casucelli
Xcel Energy
1,3,5,6
MRO
Michael
Brytowski
Great River
Energy
1,3,5,6
MRO
Jodi Jensen Western Area 1,6
Power
Administration
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
MRO
3
Kayleigh
Wilkerson
1,3,5,6
MRO
Mahmood Omaha Public 1,3,5,6
Safi
Power District
MRO
Brad Parret Minnesota
Powert
1,5
MRO
Terry
Harbour
MidAmerican 1,3
Energy
Company
MRO
Tom
Breene
Wisconsin
3,5,6
Public Service
Corporation
MRO
Jeremy Voll Basin Electric 1
Power
Cooperative
MRO
Kevin Lyons Central Iowa
Power
Cooperative
1
MRO
Midcontinent 2
ISO
MRO
Westar-KCPL Doug
Webb
Westar
1,3,5,6
MRO
Doug
Webb
KCP&L
1,3,5,6
MRO
Bob
Solomon
Hoosier
Energy Rural
1
SERC
Mike
Morrow
Westar
Energy
ACES Power
Marketing
Douglas
Webb
Jodirah
Green
1,3,5,6
MRO,SPP RE
1,3,4,5,6
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
Lincoln
Electric
System
4
MRO,NA - Not
Applicable,RF,SERC,Texas
RE,WECC
ACES
Standard
Collaborations
Electric
Cooperative,
Inc.
Kevin Lyons Central Iowa
Power
Cooperative
DTE Energy - Karie
Detroit
Barczak
Edison
Company
3,4,5
Duke Energy Masuncha 1,3,5,6
Bussey
DTE Energy DTE Electric
FRCC,RF,SERC
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
Duke Energy
1
MRO
Ginger
Mercier
Prairie Power , 1,3
Inc.
SERC
Susan
Sosbe
Wabash Valley 3
Power
Association
SERC
Jennifer
Brey
Arizona
1
Electric Power
Cooperative,
Inc.
WECC
Bill
Hutchison
Southern
1
Illinois Power
Cooperative
SERC
Jeffrey
Depriest
DTE Energy DTE Electric
5
RF
Daniel
Herring
DTE Energy DTE Electric
4
RF
Karie
Barczak
DTE Energy DTE Electric
3
RF
Laura Lee
Duke Energy
1
SERC
Lee
Schuster
Duke Energy
3
FRCC
5
Manitoba
Hydro
Mike
Smith
Southern
Pamela
Company Hunter
Southern
Company
Services, Inc.
1,3,5,6
1,3,5,6
Manitoba
Hydro
SERC
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
Southern
Company
Dale
Duke Energy
Goodwine
5
SERC
Greg Cecil
Duke Energy
6
RF
Yuguang
Xiao
Manitoba
Hydro
5
MRO
Karim
Manitoba
Abdel-Hadi Hydro
3
MRO
Blair
Mukanik
Manitoba
Hydro
6
MRO
Mike Smith Manitoba
Hydro
1
MRO
Katherine
Prewitt
1
SERC
Joel
Southern
Dembowski Company Alabama
Power
Company
3
SERC
William D. Southern
Shultz
Company
Generation
5
SERC
Jennifer G. Southern
Sykes
Company
Generation
and Energy
Marketing
6
SERC
Southern
Company
Services, Inc.
6
Northeast
Ruida Shu 1,2,3,4,5,6,7,8,9,10 NPCC
Power
Coordinating
Council
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
RSC no
Dominion
Guy V. Zito Northeast
Power
Coordinating
Council
10
NPCC
Randy
New
MacDonald Brunswick
Power
2
NPCC
Glen Smith Entergy
Services
4
NPCC
Brian
Robinson
Utility Services 5
NPCC
Alan
Adamson
New York
State
Reliability
Council
7
NPCC
David
Burke
Orange &
Rockland
Utilities
3
NPCC
Michele
Tondalo
UI
1
NPCC
Helen
Lainis
IESO
2
NPCC
Michael
Jones
National Grid 3
NPCC
Sean
Cavote
PSEG
NPCC
4
7
Kathleen
Goodman
ISO-NE
2
NPCC
David
Kiguel
Independent
NA - Not
Applicable
NPCC
Silvia
Mitchell
NextEra
6
Energy Florida Power
and Light Co.
NPCC
Paul
Hydro One
3
Malozewski Networks, Inc.
NPCC
Gregory
Campoli
New York
Independent
System
Operator
2
NPCC
Caroline
Dupuis
Hydro Quebec 1
NPCC
Chantal
Mazza
Hydro Quebec 2
NPCC
Laura
McLeod
NB Power
Corporation
5
NPCC
Nick
Orange and
Kowalczyk Rockland
1
NPCC
National Grid 1
NPCC
Joel
AESI - Acumen 5
Charlebois Engineered
Solutions
NPCC
John
Hastings
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
8
International
Inc.
Quintin Lee Eversource
Energy
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
1
NPCC
Mike
Cooke
Ontario Power 4
Generation,
Inc.
NPCC
Salvatore
Spagnolo
New York
Power
Authority
1
NPCC
Shivaz
Chopra
New York
Power
Authority
5
NPCC
Michael
Forte
Con Ed Consolidated
Edison
1
NPCC
Dermot
Smyth
Con Ed Consolidated
Edison Co. of
New York
1
NPCC
Peter Yost Con Ed Consolidated
Edison Co. of
New York
3
NPCC
Ashmeet
Kaur
5
NPCC
Con Ed Consolidated
Edison
9
Dominion Dominion
Resources,
Inc.
PSEG
Sean
Bodkin
Sean
Cavote
3,5,6
1,3,5,6
Dominion
FRCC,NPCC,RF
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
PSEG REs
Connie
Lowe
Dominion Dominion
Resources,
Inc.
3
NA - Not
Applicable
Lou
Oberski
Dominion Dominion
Resources,
Inc.
5
NA - Not
Applicable
Larry Nash Dominion 1
Dominion
Virginia Power
NA - Not
Applicable
Tim Kucey PSEG - PSEG
Fossil LLC
NPCC
5
Karla
Barton
PSEG - PSEG 6
Energy
Resources and
Trade LLC
RF
Jeffrey
Mueller
PSEG - Public
Service
Electric and
Gas Co.
3
RF
Joseph
Smith
PSEG - Public
Service
Electric and
Gas Co.
1
RF
10
1. Do you agree with the proposed scope as described in the SAR? If you do not agree, or if you agree but have comments or suggestions
for the project scope please provide your recommendation and explanation.
Richard Jackson - U.S. Bureau of Reclamation - 1,5
Answer
No
Document Name
Comment
Reclamation agrees that a cost-effective, risk-based approach for the adoption and use of cloud services is needed within industry. BES Cyber
System Information could be stored on third party systems if proper controls for confidentiality, integrity, and availability are implemented
for acceptable risk to the BES. For example, if BCSI is stored within a cloud server and encrypted, the entity that owns the data should be the
only one with access to the encryption keys capable of decrypting the data, availability during critical emergencies, and integrity of transport
layers 2 and 3.
Reclamation disagrees with the statement, “As currently drafted, the requirement is focused on access to the ‘storage location,’ and
therefore does not permit methods such as encryption and key management to be utilized in lieu of physical/electronic access controls. This
wording also does not explicitly permit any flexibility in the audit approach.” The current CIP-004 standard does not exclude these methods.
Virtualization can and should be as simple as, “If it is something that needs to be protected, protect it.” Reclamation recommends registered
entities be allowed to determine their risks. Reclamation is concerned that the proposed requirements will lead to increased requirements for
low impact systems. The SDT must consider allocation of resources spent on managing and documenting efforts on low impact systems. The
SAR seems to indicate that everyone would need specific authorization versus the current method of allowing a position of authority to
delegate who may have access. More detailed categorization will require more tracking tools and create more opportunities for failure (noncompliance) without necessarily improving BES reliability or reducing risk.
Reclamation recommends the SDT focus on defining what BCSI is; specifically, if it is information carried through the BES Cyber System or
about the BES Cyber System.
Likes
1
Minnkota Power Cooperative Inc., NA - Not Applicable, Fuhrman Andy
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
11
Dislikes
0
Response
Thank you for your comment. The SAR DT has revised the SAR to more accurately state what the SDT would be addressing with the future
proposed revisions. The scope of the proposed SAR is only related to High and Medium Impact BES Cyber Systems. The consideration of the
definition is included in the scope of the SAR.
Oliver Burke - Entergy - Entergy Services, Inc. - 1
Answer
No
Document Name
Comment
The goal of restricting access to BCSI to only authorized personnel is to ensure the confidentiality, integrity, and availability of the data.
Entities need to have flexibility of defining how this is accomplished. Limiting entities to specific requirements and technology hinders a
company's ability to use tools that may protect them more effectively.
A good example of this problem involves access revocation requirements for BCSI. Currently we must revoke access within the next business
day. Certainly, a revocation process is necessary, but a specific time frame makes it almost impossible to manage service solutions such as
cloud services.
The regulatory controls that govern BCSI should guide entities to build strong risk-based data protection plans for their BCSI, not limit them to
specific technologies or measures. Doing this restricts their ability to implement modern security programs and best-of-breed tools based on
current and evolving threat landscapes.
While this SAR doe mention specific technologies that could assist in preventing unauthorized access to BCSI, we are concerned that it will
provide only minimal expansion of what is acceptable rather than giving each entity the flexibility it needs.
Likes
1
Dislikes
Minnkota Power Cooperative Inc., NA - Not Applicable, Fuhrman Andy
0
Response
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
12
Thank you for your comment. The Requirements concerning access management and the flexibility are included in the scope of the revised
SAR.
Shari Heino - Brazos Electric Power Cooperative, Inc. - 1,5
Answer
No
Document Name
Comment
We do not believe that the standards require revision in order to accommodate cloud storage, encryption, or various other tools which may
be used for protection of BCSI. CIP-004-6 is written to accommodate a variety of vetting and authorization approaches. For BSCI access under
CIP-004, R4.1 merely specifies that a Responsible Entity must have a process to “authorize based on need, as determined by the Responsible
Entity,” for the types of access listed in 4.1.1 through 4.1.3. This provision does not specify a requirement to do background or identity checks
on individual third party employees. It does not preclude the ability of a Responsible Entity to use a cloud provider to store BSCI; it merely
requires codifying and implementing an approach to authorizing access to BCSI storage, if actual access will even occur. Terms such as
“access,” “designated storage location,” and “termination action” are undefined in the standards, and, depending how defined in the
Responsible Entity’s process, could allow third party cloud storage of BSCI while still meeting the current standards.
If the drafting team determines that changes should be made; however, we recommend that, (1) such changes should be clearly couched as
clarifications, and (2) highly specific or qualitative requirements regarding cloud storage and encryption should be avoided. Technology and
cyber attacks are changing daily, and our requirements should remain flexible regarding the protections we choose to use.
Likes
1
Dislikes
Minnkota Power Cooperative Inc., NA - Not Applicable, Fuhrman Andy
0
Response
Thank you for your comment. The Requirements concerning access management and the flexibility are included in the scope of the revised
SAR.
Sean Bodkin - Dominion - Dominion Resources, Inc. - 3,5,6, Group Name Dominion
Answer
No
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
13
Document Name
Comment
While Dominion Energy supports cloud computing, Dominion Energy does not support the instant SAR. In stating the industry needs to allow
BCSI data to be stored on the cloud using encryption rather than the current requirements of the CIP standards, the SAR does NOT present a
reliability purpose to allow this less stringent method of storage of BCSI data. The need statement actually appears to potentially create a
reliability gap by asserting that encryption alone could be an alternative to the existing requirements. The SAR is proposing to use specific
technologies (i.e. encryption and key management) which could be less secure when used as an alternative to current CIP requirements.
Dominion Energy is also of the opinion that the SAR is requesting a modification solely for compliance clarification. A standard modification
may not be the appropriate tool, rather Implementation Guidance should be used to clarify compliance expectation. The current
requirements do not need to be modified to allow cloud storage of information and is appropriate based on the nature of the information
being protected (BCSI). Dominion Energy is of the opinion that the term ‘access’, which is a key issue in the SAR, standard could be defined as
“the ability to use” when used in the context of electronic access; therefore, a change to the standard wouldn’t be necessary to allow an
entity to take credit for controls that prevent access; such as, encryption and key management as methods for controlling physical/electronic
access.
As an example, if an individual can log into a server that contains an electronic storage location but doesn’t have the ability to use the data
because the individual doesn’t the rights to access the data, there’s no compliance issue because the individual doesn’t have the ability to
use the data.
The issue statement for cloud computing is ensuring the entity has an ability to know who has access to the BCSI information. o Given the
nature of the environment, it may not be clear who (outside of the entity) has access to the designated electronic storage location.
There may also be supply chain implications to be able to contractually ensure an entity is able to ensure administrators of the cloud
computing vendor are not provisioned in such a way that they would ever have unauthorized access to a designated BCSI storage repository.
From a cyber-security perspective, use of cloud computing for confidential information increases the risk of information falling into the hands
of a ‘bad actor’:
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
14
An entity loses control of the data as soon as it’s in the cloud. This includes not only the storage location but the transport from the source to
the third-party storage location.
Even though the BCSI may be may be encrypted, there’s no assurance that a copy of the encrypted data can’t be made. A copy of the
encrypted data can be held by “bad actors” until such time as the technology exists to break the encryption.
It may not be clear who administratively has access to the electronic storage location from the cloud storage vendor.
The cloud storage vendor may subcontract portions of the administration of the environment.
There is no assurance that confidential files will be properly destroyed once it’s determined they’re no longer needed.
Due to the nature of cloud storage, multiple copies of a designated storage location may exist for redundancy in strategically placed data
centers. Deleting a repository in one data center doesn’t mean all copies (and backup copies) are also deleted.
For these reasons, Dominion Energy does not support this SAR and recommends that an Implementation Guidance document, which is
appropriate to address the compliance concerns raised in the SAR, be explored.
Likes
1
Dislikes
SCANA - South Carolina Electric and Gas Co., 1,3,5,6, Shumpert RoLynda
0
Response
Thank you for your comment. The SAR DT asserts that revisions to the current standards are needed to provide further clarity.
Andy Fuhrman - Minnkota Power Cooperative Inc. - NA - Not Applicable - MRO
Answer
No
Document Name
Comment
MPC agrees that CIP-004 can be updated to better accommodate cloud-based storage, however, the current scope misses out on opportunites
to align CIP-004 with the risk-based approach of CIP-012 and CIP-013. CIP-011 is currently risk based, but the examples provided in the SAR
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
15
are highly prescriptive and should be considered a step backwards. The scope of this project should accommodate cloud storage by echoing
CIP-012 R1 language, such as:
“The Responsible Entity shall develop one or more documented plan(s) to mitigate the risk of the unauthorized disclosure of BCSI. This shall be
accomplished by one or more of the following means, to include BCSI that is in storage, transit, and use:
•
Encryption and key management;
•
Physical access management;
•
Electronic access management;
•
Data loss prevention techniques and rights management services; or
•
Using an equally effective method to mitigate the risk of unauthorized disclosure.”
The scope of this project needs to include authorization and access restrictions to BCSI, not to a “designated storage location”.
Likes
0
Dislikes
0
Response
Thank you for your comment. This will be noted for the SDT to consider as they draft proposed revisions.
RoLynda Shumpert - SCANA - South Carolina Electric and Gas Co. - 1,3,5,6 - SERC
Answer
No
Document Name
Comment
Dominion Energy South Carolina (formerly SCANA) is in agreement with comments submitted by Dominion Energy (Sean Bodkin).
Likes
0
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
16
Dislikes
0
Response
Thank you for your comment. Please see response to Dominion Energy.
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
No
Document Name
Comment
Electric Reliability Council of Texas, Inc. (ERCOT) requests that the SAR expressly identify the option of creating a separate standard
for solutions involving third-parties rather than embedding new requirements in existing requirements.
Likes
0
Dislikes
0
Response
Thank you for your comment. This will be noted for the SDT to consider as they draft proposed revisions.
Teresa Cantwell - Lower Colorado River Authority - 1,5
Answer
Yes
Document Name
Comment
No comments.
Likes
0
Dislikes
0
Response
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
17
Thank you for your participation.
Russell Martin II - Salt River Project - 1,3,5,6 - WECC
Answer
Yes
Document Name
Comment
Permitting methods such as encryption and key management to be utilized to as an additional protection for BCSI in transit and use allows
improvements to the standard for CIP-011-2.
However, cloud services are of a concern to the security of storing and allow multiple methods for controlling access to the BES Cyber System
Information storage location may pose additional risks.
Likes
0
Dislikes
0
Response
Thank you for your comment.
Andrea Barclay - Georgia System Operations Corporation - 3,4
Answer
Yes
Document Name
Comment
GSOC supports the proposed scope of the SAR and we believe the changes to the standards will provide registered entities with additional
options for using other efficient tools for CIP compliance activities.
Likes
Dislikes
0
0
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
18
Response
Thank you for your comment.
John Merrell - Tacoma Public Utilities (Tacoma, WA) - 1,3,4,5,6
Answer
Yes
Document Name
Comment
In addition to the mentioned potential modifications for CIP-004-6 R4.1.3, R4.4, R5.3 & CIP-011-2 R1, Tacoma Power recommends the SAR be
extended to include review of CIP-004-6 R2.1.5 which covers training for BES Cyber System Information Handling, and CIP-011-2 R2 which
deals with preventing unauthorized access to BCSI when a system is being reused or disposed.
Likes
0
Dislikes
0
Response
Thank you for your comment. The SAR DT has revised the SAR to more accurately state what the SDT would be addressing with the future
proposed revisions.
Laura Nelson - IDACORP - Idaho Power Company - 1
Answer
Yes
Document Name
Comment
In general, Idaho Power Company agrees with the scope of the SAR as described. BCSI protections should be flexible enough to provide an
entity with the ability to adapt to different environments and situations while still being restrictive enough to provide assurance that
information is protected in storage, transit, and use.
Likes
0
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
19
Dislikes
0
Response
Thank you for your comment.
Masuncha Bussey - Duke Energy - 1,3,5,6 - FRCC,SERC,RF, Group Name Duke Energy
Answer
Yes
Document Name
Comment
Duke Energy agrees with the proposed scope of this project, and agrees that additional clarity regarding this issue is sorely needed.
Also, we would be interested to know if the drafting team has considered, or is aware if this project will impact CIP-013 specifically?
Likes
0
Dislikes
0
Response
Thank you for your comment. This will be noted for the SDT to consider as they draft proposed revisions.
Mike Kraft - Basin Electric Power Cooperative - 1,3,5,6
Answer
Yes
Document Name
Comment
Support NRECA comments.
Likes
0
Dislikes
0
Response
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
20
Thank you for your comment. Please see response to NRECA.
Jeremy Voll - Basin Electric Power Cooperative - 1,3,5,6
Answer
Yes
Document Name
Comment
Support NRECA Comments
Likes
0
Dislikes
0
Response
Thank you for your comment. Please see response to NRECA.
Douglas Webb - Westar Energy - 1,3,5,6 - MRO, Group Name Westar-KCPL
Answer
Yes
Document Name
Comment
Westar and Kansas City Power & Light are supportive of Edison Electric Institute's response to Question 1.
Likes
0
Dislikes
0
Response
Thank you for your comment. Please see response to EEI.
Aaron Cavanaugh - Bonneville Power Administration - 1,3,5,6 - WECC
Answer
Yes
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
21
Document Name
Comment
None
Likes
0
Dislikes
0
Response
Thank you for your comment.
Chris Scanlon - Exelon - 1,3,5,6
Answer
Yes
Document Name
Comment
Exelon agrees with the overall scope of the SAR. There are sections in the document that need clarification. Example #4.X.2, the language
“may include but are not limited to…” seems to imply that entities aren’t being held to any one thing specifically except identifying “…
security protection(s) used to prevent unauthorized access to [BCSI] within each repository”. Further define what’s expectations are around
“Data loss prevention techniques and rights management services” in section 4.X.2.
Example #2 4.1.3 “Physical access to physical BES Cyber System Information storage locations;” appears somewhat redundant with 4.1.4,
“Physical access to unencrypted electronic BES Cyber System Information storage locations;” where this may require a fairly significant effort.
Likes
0
Dislikes
0
Response
Thank you for your comment. This will be noted for the SDT to consider as they draft proposed revisions.
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
22
Barry Lawson - National Rural Electric Cooperative Association - 3,4
Answer
Yes
Document Name
Comment
NRECA supports the proposed scope of the SAR and we believe the changes to the standards will provide registered entities with additional
options for using other efficient tools for CIP compliance activities.
Likes
0
Dislikes
0
Response
Thank you for your comment.
Patrick Wells - OGE Energy - Oklahoma Gas and Electric Co. - 1,3,5,6
Answer
Yes
Document Name
Comment
OG&E supports the comments made by EEI:
Comments: EEI member companies support the intent of the proposed SAR but believe there is room to clarify the draft language to ensure
the affected Reliability Standards continue to meet the Reliability needs of the Bulk Electric System. From that perspective, we offer the
following brief input for consideration:
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
23
Comments are provided by SAR Section Title:
Industry Need: We recommend removing the introductory statement (i.e., “While there is no direct benefit to the reliability of the BES”),
because we believe this statement conflicts with the following text, as currently written.
Purpose or Goal: EEI members offer for consideration the following clarifying edits consideration:
This project is intended to Cclarifying and expand the options available under the CIP requirements, related to BES Cyber System
Information access, to remove unnecessary barriers and allow for alternative methods, (e.g., such as encryption, etc.), that could provide
equally effective solutions for the storage, transit and access to be utilized in the protectioned of BCSI data.
Do you know of any consensus building activities in conjunction with this SAR? EEI member companies ask that conclusions developed by the
“informal team” assembled by the NERC Compliance Input Working Group be referenced within this SAR. While it is clear that a large number
of SMEs worked on this effort, their findings and recommendations are neither posted by NERC or referenced within this SAR.
Are there alternatives that have been considered or could meet the objectives? EEI member companies question whether the detailed
examples contained within the SAR might unintentionally limit the SDT from developing other, possibly more effective, solutions and offer the
following edits.
As a means to assist the SDT, several possible options are provided for SDT consideration to address revisions to CIP-004-6 Requirement R4
Part 4.1.3. These options are not intended to limit the SDT from developing other more effective solutions.
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
24
Additionally, EEI member companies are unclear whether the examples provided were developed as part of the informal team (previously
mentioned in the proceeding question), that operated under the direction of the NERC Compliance Input Working Group. If that is the case,
we believe such information would be better placed under the proceeding question.
Likes
0
Dislikes
0
Response
Thank you for your comment. Please see response to EEI.
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
Yes
Document Name
Comment
NV Energy supports the project as intended; to expand available options under current Standard related to an entity to utilize changes in
technologies for data storage paltforms. That said, we do believe tht further clarifiaction and development still needs to take place to define
scope.
NV Energy believes the current SAR language is still too general in its statement for allowing Industry and Entities to be more flexible in
performing business function and using new technologies, but NV Energy would request more clarifying language to understand the burden
of accountability via evidence on the Entity to provide after this change is made. It would benefit NV Energy to know this, prior to agreeing to
creation of a SDT for the project.
Keeping the subject matter only in the scope of CIP-004 and CIP-011, we agree with a SAR to address a growth for technologies.
Likes
0
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
25
Dislikes
0
Response
Thank you for your comment. The SAR DT has made revisions to the scope and we believe your concern has been addressed.
Leanna Lamatrice - AEP - 3,5
Answer
Yes
Document Name
Comment
While AEP agrees with the proposed scope of the SAR, we recommend that the examples provided for possible revisions to CIP-004-6
Requirement R4 Part 4.1.3 be deleted from the SAR. The inclusion of the examples hinders the flexibility of the SDT to craft the revisons
necessary to accurately address the use of encryption on BES Cyber System Information. AEP recommends the SDT work off the scope and
objectives as written in the Detailed Description section of the SAR.
Likes
0
Dislikes
0
Response
Thank you for your comment. This will be noted for the SDT to consider as they draft proposed revisions.
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
Yes
Document Name
Comment
Southern Company supports the intent of the proposed SAR but believes there is room to clarify the draft language to ensure the affected
Reliability Standards continue to meet the Reliability needs of the Bulk Electric System.
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
26
Southern Company requests that the scope of the SAR allows the SDT to specifically address and clarify the interpretation around encrypted
BCSI and how encrypted data (cyphertext) does not constitute “information that can be used”, as per the BCSI definition. To consider
cyphertext to still meet the definition of BCSI is in opposition to the plain language of the existing defined term, and to consider it as such
nullifies any benefit to be gained or optionality for using 3rd party hosting solutions as a Registered Entity would have no control over those
physically accessing the 3rd party’s data centers. Physical access to electronically stored and encrypted cyphertext should be considered
outside of the scope of this SAR based on the grounds that access to cyphertext without the ability to decrypt that data should not be
considered “access to BCSI.”
The SAR should also clarify that the inclusion of encryption as an option to secure BCSI is in addition to other acceptable means available to
Registered Entities, such as other physical and electronic security controls, and that the SAR will not force the SDT into limiting a Registered
Entity’s options for complying with the Standard. Southern is concerned that the detailed examples contained within the SAR might
unintentionally limit the SDT from developing other, possibly more effective, solutions.
Likes
0
Dislikes
0
Response
Thank you for your comment. This will be noted for the SDT to consider as they draft proposed revisions. The SAR DT has revised the scope.
Jerry Horner - Basin Electric Power Cooperative - 1,3,5,6
Answer
Yes
Document Name
Comment
Support NRECA comments.
Likes
0
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
27
Dislikes
0
Response
Thank you for your comment. Please see response to NRECA.
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Yes
Document Name
Comment
Texas RE suggests adding verbiage to the SAR to indicate entities should use the strongest encryption algorithm since not all encryption
algorithms are secure.
Likes
0
Dislikes
0
Response
Thank you for your comment. This will be noted for the SDT to consider as they draft proposed revisions.
Matthew Nutsch - Seattle City Light - 1,3,4,5,6 - WECC
Answer
Yes
Document Name
Comment
Comments: The impact of nondisclosure agreements (NDAs) also should be considered on managing access to BSCI. In some cases within the
NERC CIP Standards, a properly constructed NDA apparently can provide sufficient evidence of adequate information handling, and in other
cases it cannot.
For sensitive CIP-014 documents, for instance, an NDA is explicitly identified within the Standard (R2, R6) as sufficient for protecting the
information, and in practice validating the existence of such an NDA appears to be the audit approach for the information protection aspect
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
28
of CIP-014 R2 and R6. There is no effort on the part of ERO auditors to identify CIP-004 R4 and R5 details, such as who has access to the
information, when they were disabled, or how or where it is stored by the third party signing the NDA.
Similarly, an NDA appears audit-sufficient for BSCI or sentitive information provided to third party consultants as part of a mock audit, say, or
for program improvement work, or for such information shared among regulated entities themselves as necessary for reliable operation of
operation of the power grid. To date, NERC CIP auditors do not appear to require or request CIP-004-type evidence of how the third-party
handled or stored the sensitive information or BCSI. The existence of the NDA is sufficient.
Finally the ERO enterprise itself provides a third example of how NDAs, by themselves, are sometimes deemed sufficient for third-party
handling and storage of sensitive information and BCSI. Here, the general NDA among the entity and regulator is considered sufficient, even
for third-party (ERO) storage of sensitive information and BCSI in cloud-based systems such as webCDMS. Again, no CIP-004-type evidence is
requested or expected.
In other cases, an NDA is not deemed sufficient. The most obvious case is that an NDA, by itself, does not appear to considered by NERC
auditors as sufficient evidence of adequate protection of BCSI provided by an entity to a third-party cloud storage providers. In such cases,
whether a proper NDA exists or not, the audit approach typically calls for review of evidence that all CIP-004 R4 and R5 requirements have
been met by the third-party cloud provider.
These different audit approaches for sensitive information and BCSI under an NDA raise several questions. Under what conditions is an NDA,
alone, sufficient and why? What is the expectation under CIP-004 R4 for BCSI that is protected pursuant to an NDA? Does the NDA authorize
blanket access for the company to which it applies, or is individual authorization expected in addition to the NDA? If the former, what is the
expectation regarding access tracking, revocations, and reviews? Including NDA issues within the SAR scope may reveal alternative paths
towards secure cloud management of BCSI under NERC CIP.
Likes
0
Dislikes
0
Response
Thank you for your comment. This will be noted for the SDT to consider as they draft proposed revisions.
Sean Cavote - PSEG - 1,3,5,6 - NPCC,RF, Group Name PSEG REs
Answer
Yes
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
29
Document Name
Comment
PSEG supports the proposed scope of the SAR. Proposed changes to the standards would provide industry with more tools and greater
flexibility in complying with the CIP standards.
Likes
0
Dislikes
0
Response
Thank you for your comment.
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
Yes
Document Name
Comment
EEI member companies support the intent of the proposed SAR but believe there is room to clarify the draft language to ensure the affected
Reliability Standards continue to meet the Reliability needs of the Bulk Electric System. From that perspective, we offer the following brief
input for consideration:
Comments are provided by SAR Section Title:
Industry Need: We recommend removing the introductory statement (i.e., “While there is no direct benefit to the reliability of the BES”),
because we believe this statement conflicts with the following text, as currently written.
Purpose or Goal: EEI members offer for consideration the following clarifying edits consideration:
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
30
This project is intended to clarify and expand the options available under the CIP requirements, related to BES Cyber System Information
access, to remove unnecessary barriers and allow for alternative methods, (e.g., encryption, etc.) that could provide equally effective
solutions for the storage, transit and access to protected BCSI data. (strike throughs removed due to the system not allowing its use)
Do you know of any consensus building activities in conjunction with this SAR? EEI member companies ask that conclusions developed by
the “informal team” assembled by the NERC Compliance Input Working Group be referenced within this SAR. While it is clear that a large
number of SMEs worked on this effort, their findings and recommendations are neither posted by NERC or referenced within this SAR.
Are there alternatives that have been considered or could meet the objectives? EEI member companies question whether the detailed
examples contained within the SAR might unintentionally limit the SDT from developing other, possibly more effective, solutions and offer the
following edits.
As a means to assist the SDT, several options are provided for SDT consideration to address revisions to CIP-004-6 Requirement R4 Part 4.1.3.
These options are not intended to limit the SDT from developing other more effective solutions. (strike throughs removed due to the system
not allowing its use)
Additionally, EEI member companies are unclear whether the examples provided were developed as part of the informal team (previously
mentioned in the proceeding question), that operated under the direction of the NERC Compliance Input Working Group. If that is the case,
we believe such information would be better placed under the proceeding question.
Likes
0
Dislikes
0
Response
Thank you for your comment. The SAR DT has made revisions to address reliability benefits and made a clarification to provided examples.
Darcy O'Connell - California ISO - 2 - WECC
Answer
Yes
Document Name
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
31
Comment
CAISO proposes that any third party obligations for storing BCSI in the cloud should not be embedded in the requirements but deferred to
cloud vendor risk asseements
Likes
0
Dislikes
0
Response
Thank you for your comment. This will be noted for the SDT so they can request additional information for clarity.
Marty Hostler - Northern California Power Agency - 5,6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Thank you for your participation.
Susan Sosbe - Wabash Valley Power Association - 3
Answer
Yes
Document Name
Comment
Likes
0
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
32
Dislikes
0
Response
Thank you for your participation.
Leonard Kula - Independent Electricity System Operator - 2
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Thank you for your participation.
Mike Smith - Manitoba Hydro - 1,3,5,6, Group Name Manitoba Hydro
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Thank you for your participation.
Cassie Williams - Golden Spread Electric Cooperative, Inc. - 5
Answer
Yes
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
33
Document Name
Comment
Likes
0
Dislikes
0
Response
Thank you for your participation.
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Thank you for your participation.
Tho Tran - Oncor Electric Delivery - 1 - Texas RE
Answer
Yes
Document Name
Comment
Likes
Dislikes
0
0
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
34
Response
Thank you for your participation.
Dana Klem - MRO - 1,2,3,4,5,6 - MRO, Group Name MRO NSRF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Thank you for your participation.
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Thank you for your participation.
Kimberly Van Brimer - Southwest Power Pool, Inc. (RTO) - 2 - MRO,WECC
Answer
Yes
Document Name
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
35
Comment
Likes
0
Dislikes
0
Response
Thank you for your participation.
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Thank you for your participation.
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name RSC no Dominion
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
36
Thank you for your participation.
Maryanne Darling-Reich - Black Hills Corporation - 1,3,5,6 - WECC
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Thank you for your participation.
Chinedu Ochonogor - APS - Arizona Public Service Co. - 1,3,5,6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Thank you for your participation.
Constantin Chitescu - Ontario Power Generation Inc. - 5
Answer
Yes
Document Name
Comment
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
37
Likes
0
Dislikes
0
Response
Thank you for your participation.
Gregory Campoli - New York Independent System Operator - 2
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Thank you for your participation.
Glenn Barry - Los Angeles Department of Water and Power - 1,3,5,6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Thank you for your participation.
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
38
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
Document Name
Comment
We are in support of the scope of the SAR and believe changes to the standards will give registered entities additional options for using other
methods for CIP compliance activities.
Likes
0
Dislikes
0
Response
Thank you for your comment.
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
39
2. Provide any additional comments for the SAR drafting team to consider, if desired.
Darcy O'Connell - California ISO - 2 - WECC
Answer
Document Name
Comment
The CAISO offers the following feedback on the SAR.
INDUSTRY NEED SECTION:
CAISO contends that this initiative could have a direct benefit to reliability. The use of third-party solutions (aka cloud) for the storage of BES
Cyber System Information can provide a reliability benefit in having recovery plans and other information available to the entity in the event
they are needed and the entity’s systems are unavailable.
Further, as technologies and cyber attacks advance and become more complex, Responsible Entities are becoming increasingly interested in
collecting and correlating electronic access monitoring events across their enterprises. This broad-based information collection provides
Responsible Entities with more visibility into emerging threats and trends. Many of these types of software providers are no longer offering
on-premises solutions. Allowing the use of third parties for these solutions to analyze and take action serves to improve the overall
cybersecurity and reliability of the BES through early detection of compromise.
CAISO would also note that the SAR does not address the use of applications. The SAR only addresses storage. The SAR should account for
both.
PURPOSE OR GOAL SECTION:
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
40
CAISO contends that encryption is already recognized as a means to protect BCSI. Under CIP-011-2 R2, Part 2.1, encryption is listed as a means
to prevent “unauthorized retrieval” of BCSI. Unauthorized retrieval is basically the same concept as unauthorized access. The use of
encryption should be applied consistently to CIP-004 R4, CIP-004 R5, and CIP-011 R2, Part 2.1.
DETAILED DESCRIPTION SECTION:
CAISO contends that encryption is already recognized as a means to protect BCSI. Under CIP-011-2 R2, Part 2.1, encryption is listed as a means
to prevent “unauthorized retrieval” of BCSI. Unauthorized retrieval is basically the same concept as unauthorized access. The use of
encryption should be applied consistently to CIP-004 R4, CIP-004 R5, and CIP-011 R2, Part 2.1. The use of encryption can be used to prevent
access. Therefore, CIP-004 R4 and R5 should not apply since access is prevented.
CAISO agrees that audit evidence should be addressed. This should include the use of external audit reports to demonstrate compliance in
lieu of detailed evidence that would be available for on-premises implementations. In the context of these services, the Responsible Entity’s
obligations may only be limited to due diligence in reviewing third party audit and certification details.
ALTERNATIVES SECTION:
CAISO agrees with the concept of Example #1, but requests clarification on the inclusion of “virtual or non-virtual environment” on Example
#1.
ADDITIONAL COMMENTS:
One area that should be considered is to address the geographical location of BCSI stored with a third party (aka cloud). Requirements should
be drafted for entities to evaluate the geographic location of hosted solutions in their risk assessment of the service.
Any requirement language should include provisions of a CIP Exceptional Circumstance in addressing access controls under CIP-004.
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
41
Likes
0
Dislikes
0
Response
Thank you for your comment. The SAR DT has made revisions to the scope as well as addressing the flexibility and geographical location. This
will be noted for the SDT to consider as they draft proposed revisions.
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
Document Name
Comment
ERCOT offers the following additional comments for the SAR drafting team to consider.
INDUSTRY NEED SECTION
ERCOT believes this initiative could have a direct benefit to reliability. The use of third-party solutions (aka cloud) for the storage of BES Cyber
System Information can provide a reliability benefit in having recovery plans and other information available to the entity in the event they
are needed and the entity’s systems are unavailable.
In addition, as technologies and cyber attacks advance and become more complex, Responsible Entities are becoming increasingly interested
in collecting and correlating electronic access monitoring events across their enterprises. This broad-based information collection provides
Responsible Entities with more visibility into emerging threats and trends. Many of these types of software providers are no longer offering
on-premises solutions. Allowing the use of third parties for these solutions to analyze and take action serves to improve the overall
cybersecurity and reliability of the BES through early detection of compromise.
ERCOT also notes that the SAR does not address the use of applications. The SAR only addresses storage. The SAR should take both into
consideration.
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
42
PURPOSE OR GOAL SECTION
Encryption is already recognized as a means to protect BCSI. Under CIP-011-2 R2, Part 2.1, encryption is listed as a means to prevent
"unauthorized retrieval" of BCSI. Unauthorized retrieval is basically the same concept as unauthorized access. The use of encryption should be
applied consistently to CIP-004 R4, CIP-004 R5, and CIP-011 R2, Part 2.1.
DETAILED DESCRIPTION SECTION
Encryption is already recognized as a means to protect BCSI. Under CIP-011-2 R2, Part 2.1, encryption is listed as a means to prevent
"unauthorized retrieval" of BCSI. Unauthorized retrieval is basically the same concept as unauthorized access. The use of encryption should be
applied consistently to CIP-004 R4, CIP-004 R5, and CIP-011 R2, Part 2.1. The use of encryption can be used to prevent access. Therefore, CIP004 R4 and R5 should not apply because access is prevented.
ERCOT concurs with the SAR drafting team that audit evidence should be addressed. This should include the use of external audit reports to
demonstrate compliance in lieu of detailed evidence that would be available for on-premises implementations. In the context of these
services, the Responsible Entity’s obligations may only be limited to due diligence in reviewing third party audit and certification details.
ALTERNATIVES SECTION
ERCOT agrees with the concept of Example No. 1, but requests clarification on the inclusion of "virtual or non-virtual environment" in
Example No. 1.
ADDITIONAL COMMENTS
An additional area that should be considered is the geographical location of BCSI stored with a third party (aka cloud). Requirements should
be drafted for entities to evaluate the geographic location of hosted solutions in their risk assessment of the service. Finally, any new
requirement language should include provisions concerning CIP Exceptional Circumstance in addressing access controls under CIP-004.
Likes
0
Dislikes
0
Response
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
43
Thank you for your comment. The SAR DT has made revisions to the scope as well as addressing the flexibility and geographical location. This
will be noted for the SDT to consider as they draft proposed revisions.
Gregory Campoli - New York Independent System Operator - 2
Answer
Document Name
Comment
The NYISO offers the following feedback on the SAR.
INDUSTRY NEED SECTION:
NYISO contends that the standard revision should be specific to storage of BCSI. This would include modifications to support the use of
encryption as an acceptable level of protection for data being stored within third party infrastructure.
PURPOSE OR GOAL SECTION:
NYISO contends that encryption is already recognized as a means to protect BCSI. Under CIP-011-2 R2, Part 2.1, encryption is listed as a means
to prevent “unauthorized retrieval” of BCSI. Unauthorized retrieval is basically the same concept as unauthorized access.
DETAILED DESCRIPTION SECTION:
The use of encryption to ensure both integrity and confidentiality at a minimum should be the focus.
Modifications to the standards should include the establishment of acceptable levels of encryption, the management of keys, the
establishment and testing of encryption for data stored and in transit to/from third party providers of cloud storage.
CIP modifications need to provide clarity in establishing what obligations the responsible entity would have in order to establish and maintain
compliance and what aspects could be left to the third party provider of cloud storage.
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
44
Modifications should include noting contractural provisions that would need to be in place to assure the controls are in place (i.e. testing,
alerting) and what obligations the third party provider would have as it pertains to data destruction once contractual relationship is
terminated.
ALTERNATIVES SECTION:
NYISO agrees with the concept of Example #1, but requests clarification on the inclusion of “virtual or non-virtual environment” on Example
#1.
ADDITIONAL COMMENTS:
One area that should be considered is to address the geographical location of BCSI stored with a third party (aka cloud). Requirements should
be drafted for entities to evaluate the geographic location of hosted solutions in their risk assessment of the service.
Any requirement language should include provisions of a CIP Exceptional Circumstance in addressing access controls under CIP-004.
Likes
0
Dislikes
0
Response
Thank you for your comment. The SAR DT has made revisions to the scope as well as addressing the flexibility and geographical location. This
will be noted for the SDT to consider as they draft proposed revisions.
Matthew Nutsch - Seattle City Light - 1,3,4,5,6 - WECC
Answer
Document Name
Comment
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
45
None
Likes
0
Dislikes
0
Response
Thank you for your participation.
Jerry Horner - Basin Electric Power Cooperative - 1,3,5,6
Answer
Document Name
Comment
Support NRECA comments.
Likes
0
Dislikes
0
Response
Thank you for your comment. Please see response to NRECA.
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
Document Name
Comment
If approved, the following is provided as feedback to the NERC SDT that will be addressing the SAR:
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
46
Southern Company suggests the SDT consider modifying the glossary definition of BCSI in the section of the defined term that states what is
not BCSI to add language to the effect of “encrypted cyphertext without the ability to decrypt or access the encryption key”. Properly
encrypted data is not actual information, but cyphertext and not useable without a “key” to decrypt it.
Southern Company also suggests the SDT consider requirements for the use of two-factor authentication when accessing BCSI stored on 3rd
party hosted solutions.
Likes
0
Dislikes
0
Response
Thank you for your comment. This will be noted for the SDT to consider as they draft proposed revisions.
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
Document Name
Comment
NV Energy shares EEI's comments that conclusions developed by the “informal team” assembled by the NERC Compliance Input Working
Group be referenced within this SAR. While it is clear that a large number of SMEs worked on this effort, their findings and recommendations
are neither posted by NERC or referenced within this SAR.
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
47
Additionally, NV Energy is unclear whether the examples provided were developed as part of the informal team that operated under the
direction of the NERC Compliance Input Working Group.
Likes
0
Dislikes
0
Response
Thank you for your comment. Please see response to EEI.
Barry Lawson - National Rural Electric Cooperative Association - 3,4
Answer
Document Name
Comment
NRECA appreciates the efforts of Tri-State G&T and the other members of the NERC Compliance Input Working Group for submitting this SAR.
Likes
0
Dislikes
0
Response
Thank you for your comment.
Andy Fuhrman - Minnkota Power Cooperative Inc. - NA - Not Applicable - MRO
Answer
Document Name
Comment
MPC has additional concerns regarding the ambigious term: “designated storage location”. The ultimate objective of CIP-004 R4.1.3 is to
protect BCSI, not a server, room, locker, computer, vehicle, etc. BCSI can be anywhere as it is stored, used, and transported. A “designated
storage location” is a challenge to define and difficult to audit. A risk-based approach allows an entity to define the risk and the adequacy of
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
48
the actions taken to mitigate that risk, without confining those actions to prescriptive definitions or an out-of-date or restrictive framework.
The term “designated storage location” could be removed from CIP-004 altogether, with all requirements for the protection of BCSI being
specified within CIP-011 in a manner similar to what is suggested above.
The examples provided in the SAR are restrictive, burdensome, and costly, and do not allow the entity to address the level of risk posed by a
particular situation. MPC is strongly opposed to any language that resembles the examples provided in the SAR. The Cost Impact Assessment
notes potential savings due to economies of scale. While this my be true when considering the use of cloud storage, the reality is that highly
prescriptive requirements such as the examples that are provided, would significantly increase costs without an appropriate risk analysis.
Likes
0
Dislikes
0
Response
Thank you for your comment. The SAR DT has addressed the concerns with revisions to the SAR concerning “designated storage location.”
This will be noted for the SDT to consider as they draft proposed revisions.
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
Document Name
Comment
TVA supports review of the CIP-004 and CIP-011 language as currently written, specifically with regard to the use of encryption in place of
physical access controls. However, TVA cautions against including discussion of specific technologies in the language of the standards that
could prohibit or discourage innovation or use of emerging technologies.
Likes
0
Dislikes
0
Response
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
49
Thank you for your comment. The SAR DT agrees that it should be about the “what” and not the “how”. This will be noted for the SDT to
consider as they draft proposed revisions.
Aaron Cavanaugh - Bonneville Power Administration - 1,3,5,6 - WECC
Answer
Document Name
Comment
None
Likes
0
Dislikes
0
Response
Thank you for your comment.
Douglas Webb - Westar Energy - 1,3,5,6 - MRO, Group Name Westar-KCPL
Answer
Document Name
Comment
None.
Likes
0
Dislikes
0
Response
Thank you for your comment.
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
50
Answer
Document Name
Comment
ACES would like to thank the SAR Team for their efforts and opportunity to comment on the SAR.
Likes
0
Dislikes
0
Response
Thank you for your comment.
Jeremy Voll - Basin Electric Power Cooperative - 1,3,5,6
Answer
Document Name
Comment
Support NRECA Comments
Likes
0
Dislikes
0
Response
Thank you for your comment. Please see response to NRECA.
Mike Kraft - Basin Electric Power Cooperative - 1,3,5,6
Answer
Document Name
Comment
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
51
Support NRECA comments.
Likes
0
Dislikes
0
Response
Thank you for your comment. Please see response to NRECA.
Dana Klem - MRO - 1,2,3,4,5,6 - MRO, Group Name MRO NSRF
Answer
Document Name
Comment
Agree with the objective of the proposal, but are we certain that the current language of CIP-004-6 Requirement R4 Part 4.1.3 cannot
accommodate third-party cloud-based encrypted BCSI? The “or” in “physical or electronic” access to designated storage locations (an
undefined term that can be defined by the Responsible Entity) permits electronic authorization exclusively, relieving the Responsible Entity of
any physical access concerns. Encryption key management can be the process to authorize electronic access to BCSI. The designated storage
location could be defined as the Responsible Entity’s encrypted BSCI in a designated third-party data repository.
Does the requirement language need to be changed to explicitly permit, or can other options be pursued to ascertain whether or not current
language can accommodate? Has anyone submitted implementation guidance for ERO endorsement showing how industry believes this can
be done compliantly?
If NERC is receptive to encryption satisfying R4.1.3, a SAR may yet be required to specify minimum acceptable encryption key strength, such
as NIST Advanced Encryption Standard AES 256-bit, just as minimum password length and complexity requirements are set forth in CIP-007-6
R5.5
Likes
Dislikes
0
0
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
52
Response
Thank you for your comment. The SAR DT asserts that revisions to the current standards are needed to provide further clarity.
Oliver Burke - Entergy - Entergy Services, Inc. - 1
Answer
Document Name
Comment
No additional comments.
Likes
0
Dislikes
0
Response
Thank you for your comment.
Masuncha Bussey - Duke Energy - 1,3,5,6 - FRCC,SERC,RF, Group Name Duke Energy
Answer
Document Name
Comment
Duke Energy would like to recommend that the drafting team consider the potential impacts of setting encryption at the document level
or the repository level.
Likes
0
Dislikes
0
Response
Thank you for your comment. This will be noted for the SDT to consider as they draft proposed revisions.
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
53
Richard Jackson - U.S. Bureau of Reclamation - 1,5
Answer
Document Name
Comment
Reclamation recommends IT systems that store BCSI be certified and accredited for operation in accordance with federal and Department of
Homeland Security (DHS) standards. Boundaries and security authorization(s) must be defined for systems with common security controls.
National Institute of Standards and Technology (NIST) Information Management Security suggests entities should control risks by evaluating
the system’s or information’s importance and designating the confidentiality, integrity, and availability necessary for the system or
information. The entity’s CIP Senior Manager or delegate should accept (approve) the risk for the responsible entity.
Additionally, the revised standards must specifically account for the requirements pertaining to Controlled Unclassified Information (CUI) in
32 CFR 2002. Reclamation recommends the SDT obtain a full understanding of overall information protection requirements, to include
requirements beyond IT systems. For example, there is no mechanism to encrypt hard copy data, so physical protection requirements cannot
be totally removed.
Reclamation also recommends the SDT incorporate the following definition of “Information Security” as stated in NIST SP800-12r1, Section
1.4 Important Terminology, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-12r1.pdf:
“Information Security – The protection of information and information systems from unauthorized access, use, disclosure, disruption,
modification, or destruction in order to ensure confidentiality, integrity, and availability.”
Likes
0
Dislikes
0
Response
Thank you for your comment. This will be noted for the SDT to consider as they draft proposed revisions.
Andrea Barclay - Georgia System Operations Corporation - 3,4
Answer
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
54
Document Name
Comment
GSOC appreciates the efforts of Tri-State G&T and the other members of the NERC Compliance Input Working Group for submitting this SAR.
Drafting team should consider how entities and NERC could rely on third party audit assessment of cloud services provider. They should also
evaluate the requirement for access management, revocation, disposal and information protection.
Likes
0
Dislikes
0
Response
Thank you for your comment. This will be noted for the SDT to consider as they draft proposed revisions.
Russell Martin II - Salt River Project - 1,3,5,6 - WECC
Answer
Document Name
Comment
SRP agrees with the SAR that additional considerations need to be given to other ways to protect BCSI beyond access to storage
locations. There are more methods to protect BCSI and the standards need to be flexible enough to allow it. The current requirements apply
to BCSI in the cloud, however, it is not feasible to expect third party providers of hosted solutions (cloud BCSI storage locations) to comply
with CIP-004-06 R4.1.3 and CIP-004-6 R5.3, so entities have to look for other options – and not using cloud providers is no longer an option.
SRP suggests the SDT look for opportunities to update CIP-011 requirements to better document the types of protections in place for BCSI
storage locations where the only available control is CIP-004-6 (access management), then CIP-004 applies.
SRP disagrees with an approach that encryption or masking BCSI renders it no longer BCSI. This would create a need for entities to know
when information is no longer BCSI (upon encryption) and when it becomes BCSI again (upon decryption). It will be difficult to apply the
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
55
current CIP-004 storage locations based requirements. SRP agrees with the SAR’s approach that the standards should be updated to allow for
other methods to protect BCSI. This will ensure a complete inventory of BCSI and a better overall understanding of the protections in place.
The SDT may want to consider minimum requirements (or guidance) for an approach to properly sanitize (i.e. cryptographic erase) off
premise BCSI.
Likes
1
Dislikes
Minnkota Power Cooperative Inc., NA - Not Applicable, Fuhrman Andy
0
Response
Thank you for your comment. This will be noted for the SDT to consider as they draft proposed revisions.
Teresa Cantwell - Lower Colorado River Authority - 1,5
Answer
Document Name
Comment
No comments.
Likes
0
Dislikes
0
Response
Thank you for your comment.
Mike Smith - Manitoba Hydro - 1,3,5,6, Group Name Manitoba Hydro
Answer
Document Name
Comment
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
56
Given that the Example #2 proposes a reasonable and alternative approach that permits encryption and key management to be utilized in lieu
of physical/electronic access controls, we support Example #2 to be considered for modifying CIP-004-6 R4 Part 4.1.3. This encryption and key
management method woud provide flexibility for entities to manage BCSI access and facilitate the cloud storage solution. Note that if the CIP004-6 R4 Part 4.1.3 is revised using Example #2, the CIP-004-6 R4 Part 4.3 and R5 Part 5.3 should be revised in accordance with the
modification of CIP-004-6 R4 Part 5.1.3.
Likes
0
Dislikes
0
Response
Thank you for your comment. This will be noted for the SDT to consider as they draft proposed revisions.
Susan Sosbe - Wabash Valley Power Association - 3
Answer
Document Name
Comment
The standards development team should favor non-prescriptive standards for protection of BES Cyber System Information that requires an
appropriate level security within (1) individual Entities, (2) Application Providers, (3) Public Cloud Providers, (4) Entities that hold protected
information for other utilities business partners, and (5) business partners that need access and temporarily retain this information.
Likes
0
Dislikes
0
Response
Thank you for your comment. The SAR DT has made revisions to the scope as well as addressing the flexibility. The SDT should consider issues
related to where data resides (e.g. off premises). This will be noted for the SDT to consider as they draft proposed revisions.
Consideration of Comments
Project 2019-02 BES Cyber System Information Access Management | July 2019
57
Unofficial Nomination Form
Project 2019-02 BES Cyber System Information Access Management
Do not use this form for submitting nominations. Use the electronic form to submit nominations for
Project 2019-02 BES Cyber System Information Access Management SAR drafting team members by 8
p.m. Eastern, Friday, April 26, 2019. This unofficial version is provided to assist nominees in compiling the
information necessary to submit the electronic form.
Additional information is available on the project page. If you have questions, contact Senior Standards
Developer, Latrice Harkness (via email), or at 404-446-9728.
By submitting a nomination form, you are indicating your willingness and agreement to actively
participate in face-to-face meetings and conference calls.
Previous drafting or review team experience is beneficial, but not required. A brief description of the
desired qualifications, expected commitment, and other pertinent information is included below.
BES Cyber System Information Access Management
The purpose of this project is to clarify the CIP requirements related to BES Cyber System Information
(BCSI) access, to allow for alternative methods, such as encryption, to be utilized in the protection of BCSI.
Standard affected: CIP-004-6 and CIP-011-2
The Reliability Standard(s) developed or revised will include modifications to clarify authorization and
access to the BCSI to focus on the BCSI and the controls deployed to limit access. In addition, revisions
should allow multiple methods for controlling access to BES Cyber System Information, rather than just
electronic and physical access to the BES Cyber System Information storage location. For example, the
focus must be on BCSI and the ability to obtain and make use of it. This is particularly necessary when it
comes to the utilization of a third party’s system (aka cloud). As currently drafted, the requirement is
focused on access to the “storage location,” and therefore does not permit methods such as encryption
and key management to be utilized in lieu of physical/electronic access controls. This wording also does
not explicitly permit any flexibility in the audit approach.
The time commitment for these projects is expected to be up to two face-to-face meetings per quarter
(on average two full working days each meeting) with conference calls scheduled as needed to meet the
agreed-upon timeline the review or drafting team sets forth. Team members may also have side projects,
either individually or by subgroup, to present to the larger team for discussion and review. Lastly, an
important component of the review and drafting team effort is outreach. Members of the team will be
expected to conduct industry outreach during the development process to support a successful project
outcome.
We are seeking a cross section of the industry to participate on the team, but in particular are seeking
individuals who have experience and expertise in one or more of the following areas:
•
BES Cyber System Information (BCSI) access management
•
Critical Infrastructure Protection (“CIP”) family of Reliability Standards
Individuals who have facilitation skills and experience and/or legal or technical writing backgrounds are
also strongly desired. Please include this in the description of qualifications as applicable.
Name:
Organization:
Address:
Telephone:
Email:
Please briefly describe your experience and qualifications to serve on the requested standard drafting
team (Bio):
If you are currently a member of any NERC drafting team, please list each team here:
Not currently on any active SAR or standard drafting team.
Currently a member of the following SAR or standard drafting team(s):
If you previously worked on any NERC drafting team please identify the team(s):
No prior NERC SAR or standard drafting team.
Prior experience on the following team(s):
Select each NERC Region in which you have experience relevant to the Project for which you are
volunteering:
Texas RE
FRCC
MRO
NPCC
RF
SERC
WECC
NA – Not Applicable
Select each Industry Segment that you represent:
Unofficial Nomination Form
Project 2019-02 BES Cyber System Information Access Management | March 2019
2
1 — Transmission Owners
2 — RTOs, ISOs
3 — Load-serving Entities
4 — Transmission-dependent Utilities
5 — Electric Generators
6 — Electricity Brokers, Aggregators, and Marketers
7 — Large Electricity End Users
8 — Small Electricity End Users
9 — Federal, State, and Provincial Regulatory or other Government Entities
10 — Regional Reliability Organizations and Regional Entities
NA – Not Applicable
Select each Function 1 in which you have current or prior expertise:
Balancing Authority
Compliance Enforcement Authority
Distribution Provider
Generator Operator
Generator Owner
Interchange Authority
Load-serving Entity
Market Operator
Planning Coordinator
Transmission Operator
Transmission Owner
Transmission Planner
Transmission Service Provider
Purchasing-selling Entity
Reliability Coordinator
Reliability Assurer
Resource Planner
Provide the names and contact information for two references who could attest to your technical
qualifications and your ability to work well in a group:
1
Name:
Telephone:
Organization:
Email:
Name:
Telephone:
These functions are defined in the NERC Functional Model, which is available on the NERC website.
Unofficial Nomination Form
Project 2019-02 BES Cyber System Information Access Management | March 2019
3
Organization:
Email:
Provide the name and contact information of your immediate supervisor or a member of your
management who can confirm your organization’s willingness to support your active participation.
Name:
Telephone:
Title:
Email:
Unofficial Nomination Form
Project 2019-02 BES Cyber System Information Access Management | March 2019
4
Standards Announcement
Project 2019-02 BES Cyber System Information Access Management
Nomination Period Open through April 26, 2019
Now Available
Nominations are being sought for SAR drafting team members through 8 p.m. Eastern, Friday, April 26,
2019.
Use the electronic form to submit a nomination. If you experience issues using the electronic form,
contact Linda Jenkins. An unofficial Word version of the nomination form is posted on the Drafting Team
Vacancies page and the project page.
By submitting a nomination form, you are indicating your willingness and agreement to actively participate
in face-to-face meetings and conference calls.
The time commitment for this project is expected to be two face-to-face meetings per quarter (on average
three full working days each meeting) with conference calls scheduled as needed to meet the agreed upon
timeline the team sets forth. Team members may also have side projects, either individually or by subgroup, to present for discussion and review. Lastly, an important component of the team effort is
outreach. Members of the team will be expected to conduct industry outreach during the development
process to support a successful ballot.
Previous drafting or periodic review team experience is beneficial, but not required. See the project page
and unofficial nomination form for additional information.
Next Steps
The Standards Committee is expected to appoint members to the team May 22, 2019. Nominees will be
notified shortly after they have been selected.
For information on the Standards Development Process, refer to the Standard Processes Manual.
For more information or assistance, contact Senior Standards Developer, Latrice Harkness (via email) or at
404-446-9728.
North American Electric Reliability Corporation
3353 Peachtree Rd, NE
Suite 600, North Tower
Atlanta, GA 30326
404-446-2560 | www.nerc.com
Standard Authorization Request (SAR)
Complete and please email this form, with
Complete
and please
email this form, with
attachment(s)
to: [email protected]
attachment(s) to: [email protected]
The North American Electric Reliability Corporation (NERC)
welcomes suggestions to improve the reliability of the bulk
power system through improved Reliability Standards.
Requested information
BES Cyber System Information Access Management
March 1, 2019
SAR Title:
Date Submitted:
SAR Requester
Name:
Alice Ireland
Organization: Tri‐State Generation and Transmission Association
Telephone:
(303) 254‐3120
Email:
[email protected]
SAR Type (Check as many as apply)
New Standard
Imminent Action/ Confidential Issue (SPM
Revision to Existing Standard
Section 10)
Add, Modify or Retire a Glossary Term
Variance development or revision
Withdraw/retire an Existing Standard
Other (Please specify)
Justification for this proposed standard development project (Check all that apply to help NERC
prioritize development)
Regulatory Initiation
NERC Standing Committee Identified
Emerging Risk (Reliability Issues Steering
Enhanced Periodic Review Initiated
Committee) Identified
Industry Stakeholder Identified
Reliability Standard Development Plan
Industry Need (What Bulk Electric System (BES) reliability benefit does the proposed project provide?):
This initiative enhances BES reliability by creating increased choice, greater flexibility, higher availability,
and reduced‐cost options for entities to manage their BES Cyber System Information, by providing a
secure path towards utilization of modern third‐party data storage and analysis systems. In addition, the
proposed project would clarify the protections expected when utilizing third‐party solutions (e.g., cloud
services).
Purpose or Goal (How does this proposed project provide the reliability‐related benefit described
above?):
Clarifying the CIP requirements and measures related to both managing access and securing BES Cyber
System Information.
Project Scope (Define the parameters of the proposed project):
The scope of this project is to consider CIP‐004 and CIP‐011 modifications, and review the NERC
Glossary of Terms as it pertains to Requirements addressing BCSI.
Requested information
Detailed Description (Describe the proposed deliverable(s) with sufficient detail for a drafting team to
execute the project. If you propose a new or substantially revised Reliability Standard or definition,
provide: (1) a technical justification1which includes a discussion of the reliability‐related benefits of
developing a new or revised Reliability Standard or definition, and (2) a technical foundation document
(e.g. research paper) to guide development of the Standard or definition):
CIP‐004‐6 Requirements need to be modified so management of access to BCSI is clarified to include a
focus on the BCSI data and the controls deployed to limit access. In addition, the Standard should allow
various methods for controlling access to BES Cyber System Information, storage location(s). The focus
must be on BCSI and the ability to obtain and make use of it. This is particularly necessary when it
comes to the utilization of a third party’s system (e.g. cloud services). The current Requirements are
focused on access to the “storage location”, but should not consider management of access to BCSI
while in transit, storage, and in use. In addition to CIP‐004‐6 modifications, CIP‐011‐2 should also be
evaluated for any subsequent impacts.
Cost Impact Assessment, if known (Provide a paragraph describing the potential cost impacts associated
with the proposed project):
Potential cost savings due to economies of scale and third party support.
Please describe any unique characteristics of the BES facilities that may be impacted by this proposed
standard development project (e.g. Dispersed Generation Resources):
SAR Drafting Team asserts there are no unique characteristics associated with BES facilities that will be
impacted by this proposed standard development project.
To assist the NERC Standards Committee in appointing a drafting team with the appropriate members,
please indicate to which Functional Entities the proposed standard(s) should apply (e.g. Transmission
Operator, Reliability Coordinator, etc. See the most recent version of the NERC Functional Model for
definitions):
Please see Section 4. Applicability of CIP‐004‐6 and CIP‐011‐2.
Do you know of any consensus building activities2 in connection with this SAR? If so, please provide any
recommendations or findings resulting from the consensus building activity.
An informal team, under the direction of the NERC Compliance Input Working Group, was assembled to
review the use of encryption on BES Cyber System Information, and the impact on compliance, with a
particular focus on such BES Cyber System Information being stored or utilized by a third party’s system
(aka cloud). This team met every two weeks during Dec. 2018 – Feb. 2019. The development of this SAR
was supported by all team members. The team consisted of the following individuals:
Name
Company
1 The NERC Rules of Procedure require a technical justification for new or substantially revised Reliability Standards. Please attach pertinent
information to this form before submittal to NERC.
2 Consensus building activities are occasionally conducted by NERC and/or project review teams. They typically are conducted to obtain
industry inputs prior to proposing any standard development project to revise, or develop a standard or definition.
Standard Authorization Request (SAR)
2
Requested information
Alice Ireland (lead)
Tri‐State Generation and Transmission
David Vitkus
Tucson Electric Power
Eric Hull
SMUD
Marina Rohnow
Sempra Utilities/ San Diego Gas & Electric
Paul Haase
Seattle City Light
Richie Field
Hoosier Energy REC, Inc.
Rob Ellis
Tri‐State Generation and Transmission
Steve Wesling
Tri‐State Generation and Transmission
Toley Clague
Portland General Electric
Ziad Dassouki
ATCO Electric
Joseph Baxter
NERC Observer
Lonnie Ratliff
NERC Observer
Brian Kinstad
MRO Observer
Holly Eddy
WECC Observer
Kenath Carver
Texas Reliability Entity, Inc. Observer
Michael Taube
MRO Observer
Mike Stuetzle
NPCC Observer
Morgan King
WECC Observer
Shon Austin
Reliability First Observer
Tremayne Brown
SERC Observer
Are there any related standards or SARs that should be assessed for impact as a result of this proposed
project? If so which standard(s) or project number(s)?
Project 2016‐02 Modifications to CIP Standards
Are there alternatives (e.g. guidelines, white paper, alerts, etc.) that have been considered or could
meet the objectives? If so, please list the alternatives.
When evaluating ways to modify the requirement, other standards and requirements were identified,
which provide examples on possible paths forward. These examples are not intended to limit the SDT
from developing other more effective solutions.
Of particular relevance are the following standards/requirements:
CIP‐006‐6 Requirement R1 Part 1.10;
CIP‐010‐2 Requirement R4, Attachment 1, Section 1.5;
CIP‐012‐1 Requirement R1 (pending FERC approval).
Standard Authorization Request (SAR)
3
Requested information
As a means to assist the SDT, several possible options for revision to CIP‐004‐6 Requirement R4 Part
4.1.3 have been drafted and provided below:
EXAMPLE #1:
[Delete 4.1.3 and create a new subrequirement in either CIP‐004 or CIP‐011, that would read something
like this:]
R4.X Process to prevent unauthorized access to BES Cyber System Information. The process shall
include:
4.X.1. Identification of physical and electronic repositories utilized to store BES Cyber System
Information. If electronic, indicate whether the repository is hosted by the Responsible Entity or a third‐
party and also whether it is in a virtual or non‐virtual environment.;
4.X.2. Identification of security protection(s) used to prevent unauthorized access to BES Cyber System
Information within each repository. Examples may include but are not limited to the following:
Encryption and key management,
Physical access management,
Electronic access management,
Data loss prevention techniques and rights management services.
4.X.3. The process to authorize access to BES Cyber System Information, based on need, as determined
by the Responsible Entity, except for CIP Exceptional Circumstances;
EXAMPLE #2:
R4.1 Process to authorize based on need, as determined by the Responsible Entity, except for CIP
Exceptional Circumstances:
4.1.1. Electronic access;
4.1.2. Unescorted physical access into a Physical Security Perimeter;
4.1.3. Physical access to physical BES Cyber System Information storage locations;
4.1.4. Physical access to unencrypted electronic BES Cyber System Information storage locations;
4.1.5. Electronic access to unencrypted electronic BES Cyber System Information storage locations; and
4.1.6. Electronic access to BES Cyber System Information encryption keys for encrypted BES Cyber
System Information.
EXAMPLE #3:
R4.1 Process to authorize based on need, as determined by the Responsible Entity, except for CIP
Exceptional Circumstances:
4.1.1. Electronic access;
4.1.2. Unescorted physical access into a Physical Security Perimeter;
4.1.3. Physical access to physical BES Cyber System Information storage locations;
4.1.4. Access to electronic BES Cyber System Information.
Standard Authorization Request (SAR)
4
Reliability Principles
Does this proposed standard development project support at least one of the following Reliability
Principles (Reliability Interface Principles)? Please check all those that apply.
1. Interconnected bulk power systems shall be planned and operated in a coordinated manner
to perform reliably under normal and abnormal conditions as defined in the NERC Standards.
2. The frequency and voltage of interconnected bulk power systems shall be controlled within
defined limits through the balancing of real and reactive power supply and demand.
3. Information necessary for the planning and operation of interconnected bulk power systems
shall be made available to those entities responsible for planning and operating the systems
reliably.
4. Plans for emergency operation and system restoration of interconnected bulk power systems
shall be developed, coordinated, maintained and implemented.
5. Facilities for communication, monitoring and control shall be provided, used and maintained
for the reliability of interconnected bulk power systems.
6. Personnel responsible for planning and operating interconnected bulk power systems shall be
trained, qualified, and have the responsibility and authority to implement actions.
7. The security of the interconnected bulk power systems shall be assessed, monitored and
maintained on a wide area basis.
8. Bulk power systems shall be protected from malicious physical or cyber attacks.
Market Interface Principles
Does the proposed standard development project comply with all of the following
Market Interface Principles?
1. A reliability standard shall not give any market participant an unfair competitive
advantage.
2. A reliability standard shall neither mandate nor prohibit any specific market
structure.
3. A reliability standard shall not preclude market solutions to achieving compliance
with that standard.
4. A reliability standard shall not require the public disclosure of commercially
sensitive information. All market participants shall have equal opportunity to
access commercially non‐sensitive information that is required for compliance
with reliability standards.
Enter
(yes/no)
Yes
Yes
Yes
Yes
Identified Existing or Potential Regional or Interconnection Variances
Region(s)/
Explanation
Interconnection
e.g. NPCC
For Use by NERC Only
Standard Authorization Request (SAR)
5
SAR Status Tracking (Check off as appropriate)
Draft SAR reviewed by NERC Staff
Draft SAR presented to SC for acceptance
DRAFT SAR approved for posting by the SC
Final SAR endorsed by the SC
SAR assigned a Standards Project by NERC
SAR denied or proposed as Guidance
document
Version History
Version
Date
Owner
Change Tracking
1
June 3, 2013
Revised
1
August 29, 2014
Standards Information Staff Updated template
2
January 18, 2017
Standards Information Staff Revised
2
June 28, 2017
Standards Information Staff Updated template
Standard Authorization Request (SAR)
6
Standard Authorization Request (SAR)
Complete and please email this form, with
Complete
and please
email this form, with
attachment(s)
to: [email protected]
attachment(s) to: [email protected]
The North American Electric Reliability Corporation (NERC)
welcomes suggestions to improve the reliability of the bulk
power system through improved Reliability Standards.
Requested information
BES Cyber System Information Access Management
March 1, 2019
SAR Title:
Date Submitted:
SAR Requester
Name:
Alice Ireland
Organization: Tri‐State Generation and Transmission Association
Telephone:
(303) 254‐3120
Email:
[email protected]
SAR Type (Check as many as apply)
New Standard
Imminent Action/ Confidential Issue (SPM
Revision to Existing Standard
Section 10)
Add, Modify or Retire a Glossary Term
Variance development or revision
Withdraw/retire an Existing Standard
Other (Please specify)
Justification for this proposed standard development project (Check all that apply to help NERC
prioritize development)
Regulatory Initiation
NERC Standing Committee Identified
Emerging Risk (Reliability Issues Steering
Enhanced Periodic Review Initiated
Committee) Identified
Industry Stakeholder Identified
Reliability Standard Development Plan
Industry Need (What Bulk Electric System (BES) reliability benefit does the proposed project provide?):
While there is no direct benefit to the reliability of the BES, tThis initiative enhances BES reliability by
creating increased choice, greater flexibility, higher availability, and reduced‐cost options for entities to
manage their BES Cyber System Information, by providing a secure path towards utilitzation of modern
third‐party data storage and analysis systems. In addition, the proposed project would clarify the
protections expected when utilizing third‐party solutions (e.g.,aka cloud services).
Purpose or Goal (How does this proposed project provide the reliability‐related benefit described
above?):
Clarifying the CIP requirements and measures related to both managing accessing and securing BES
Cyber System Information access, to allow for alternative methods, such as encryption, to be utilized in
the protection of BCSI.
Project Scope (Define the parameters of the proposed project):
The scope of this project is to consider revisions modifications of CIP‐004 and CIP‐011 modifications,
and review the NERC Glossary of Terms as it pertains to Requirements addressing BCSI.
Requested information
Detailed Description (Describe the proposed deliverable(s) with sufficient detail for a drafting team to
execute the project. If you propose a new or substantially revised Reliability Standard or definition,
provide: (1) a technical justification1which includes a discussion of the reliability‐related benefits of
developing a new or revised Reliability Standard or definition, and (2) a technical foundation document
(e.g. research paper) to guide development of the Standard or definition):
CIP‐004‐6 Requirements R4 Part 4.1.3 needs to be modified so authorization management of and access
to BCSI is clarified to include a focus on the BCSI data and the controls deployed to limit access. In
addition, the Standard should allow multiple various methods for controlling access to BES Cyber
System Information, rather than just electronic and physical access to the BES Cyber System Information
storage location(s). For example, tThe focus must be on BCSI and the ability to obtain and make use of
it. This is particularly necessary when it comes to the utilization of a third party’s system (e.g.aka cloud
services). As currently drafted, tThe current rRequirements isare focused on access to the “storage
location”, and but should not consider management of access to BCSI while in transit, storage, and in
use. therefore does not permit methods such as encryption and key management to be utilized in lieu
of physical/electronic access controls. This wording also does not explicitly permit any flexibility in the
audit approach. In addition to modifying CIP‐004‐6 modifications, Requirement R4 Part 4.1.3, Part 4.4,
Part 5.3 and CIP‐011‐2 Requirement R1 should also be evaluated for any subsequent impacts to the
requirements, measures and/or the guidelines and technical basis.
Cost Impact Assessment, if known (Provide a paragraph describing the potential cost impacts associated
with the proposed project):
Potential cost savings due to economies of scale and third party support.
Please describe any unique characteristics of the BES facilities that may be impacted by this proposed
standard development project (e.g. Dispersed Generation Resources):
SAR Drafting Team asserts there are no unique characteristics associated with BES facilities that will be
impacted by this proposed standard development project.
To assist the NERC Standards Committee in appointing a drafting team with the appropriate members,
please indicate to which Functional Entities the proposed standard(s) should apply (e.g. Transmission
Operator, Reliability Coordinator, etc. See the most recent version of the NERC Functional Model for
definitions):
Please see Section 4. Applicability of CIP‐004‐6 and CIP‐011‐2.
Do you know of any iconsensus building activities2 in connection with this SAR? If so, please provide any
recommendations or findings resulting from the consensus building activity.
An informal team, under the direction of the NERC Compliance Input Working Group, was assembled to
review the use of encryption on BES Cyber System Information, and the impact on compliance, with a
particular focus on such BES Cyber System Information being stored or utilized by a third party’s system
1 The NERC Rules of Procedure require a technical justification for new or substantially revised Reliability Standards. Please attach pertinent
information to this form before submittal to NERC.
2 Consensus building activities are occasionally conducted by NERC and/or project review teams. They typically are conducted to obtain
industry inputs prior to proposing any standard development project to revise, or develop a standard or definition.
Standard Authorization Request (SAR)
2
Requested information
(aka cloud). This team met every two weeks during Dec. 2018 – Feb. 2019. The development of this SAR
was supported by all team members. The team consisted of the following individuals:
Name
Alice Ireland (lead)
Company
Tri‐State Generation and Transmission
David Vitkus
Tucson Electric Power
Eric Hull
SMUD
Marina Rohnow
Sempra Utilities/ San Diego Gas & Electric
Paul Haase
Seattle City Light
Richie Field
Hoosier Energy REC, Inc.
Rob Ellis
Tri‐State Generation and Transmission
Steve Wesling
Tri‐State Generation and Transmission
Toley Clague
Portland General Electric
Ziad Dassouki
ATCO Electric
Joseph Baxter
NERC Observer
Lonnie Ratliff
NERC Observer
Brian Kinstad
MRO Observer
Holly Eddy
WECC Observer
Kenath Carver
Texas Reliability Entity, Inc. Observer
Michael Taube
MRO Observer
Mike Stuetzle
NPCC Observer
Morgan King
WECC Observer
Shon Austin
Reliability First Observer
Tremayne Brown
SERC Observer
Are there any related standards or SARs that should be assessed for impact as a result of this proposed
project? If so which standard(s) or project number(s)?
Project 2016‐02 Modifications to CIP Standards
Are there alternatives (e.g. guidelines, white paper, alerts, etc.) that have been considered or could
meet the objectives? If so, please list the alternatives.
When evaluating ways to modify the requirement, other standards and requirements were identified,
which provide examples on possible paths forward. These examples are not intended to limit the SDT
from developing other more effective solutions.
Standard Authorization Request (SAR)
3
Requested information
Of particular relevance are the following standards/requirements:
CIP‐006‐6 Requirement R1 Part 1.10;
CIP‐010‐2 Requirement R4, Attachment 1, Section 1.5;
CIP‐012‐1 Requirement R1 (pending FERC approval).
As a means to assist the SDT, several possible options for revision to CIP‐004‐6 Requirement R4 Part
4.1.3 have been drafted and provided below:
EXAMPLE #1:
[Delete 4.1.3 and create a new subrequirement in either CIP‐004 or CIP‐011, that would read something
like this:]
R4.X Process to prevent unauthorized access to BES Cyber System Information. The process shall
include:
4.X.1. Identification of physical and electronic repositories utilized to store BES Cyber System
Information. If electronic, indicate whether the repository is hosted by the Responsible Entity or a third‐
party and also whether it is in a virtual or non‐virtual environment.;
4.X.2. Identification of security protection(s) used to prevent unauthorized access to BES Cyber System
Information within each repository. Examples may include but are not limited to the following:
Encryption and key management,
Physical access management,
Electronic access management,
Data loss prevention techniques and rights management services.
4.X.3. The process to authorize access to BES Cyber System Information, based on need, as determined
by the Responsible Entity, except for CIP Exceptional Circumstances;
EXAMPLE #2:
R4.1 Process to authorize based on need, as determined by the Responsible Entity, except for CIP
Exceptional Circumstances:
4.1.1. Electronic access;
4.1.2. Unescorted physical access into a Physical Security Perimeter;
4.1.3. Physical access to physical BES Cyber System Information storage locations;
4.1.4. Physical access to unencrypted electronic BES Cyber System Information storage locations;
4.1.5. Electronic access to unencrypted electronic BES Cyber System Information storage locations; and
4.1.6. Electronic access to BES Cyber System Information encryption keys for encrypted BES Cyber
System Information.
EXAMPLE #3:
R4.1 Process to authorize based on need, as determined by the Responsible Entity, except for CIP
Exceptional Circumstances:
4.1.1. Electronic access;
4.1.2. Unescorted physical access into a Physical Security Perimeter;
Standard Authorization Request (SAR)
4
Requested information
4.1.3. Physical access to physical BES Cyber System Information storage locations;
4.1.4. Access to electronic BES Cyber System Information.
Reliability Principles
Does this proposed standard development project support at least one of the following Reliability
Principles (Reliability Interface Principles)? Please check all those that apply.
1. Interconnected bulk power systems shall be planned and operated in a coordinated manner
to perform reliably under normal and abnormal conditions as defined in the NERC Standards.
2. The frequency and voltage of interconnected bulk power systems shall be controlled within
defined limits through the balancing of real and reactive power supply and demand.
3. Information necessary for the planning and operation of interconnected bulk power systems
shall be made available to those entities responsible for planning and operating the systems
reliably.
4. Plans for emergency operation and system restoration of interconnected bulk power systems
shall be developed, coordinated, maintained and implemented.
5. Facilities for communication, monitoring and control shall be provided, used and maintained
for the reliability of interconnected bulk power systems.
6. Personnel responsible for planning and operating interconnected bulk power systems shall be
trained, qualified, and have the responsibility and authority to implement actions.
7. The security of the interconnected bulk power systems shall be assessed, monitored and
maintained on a wide area basis.
8. Bulk power systems shall be protected from malicious physical or cyber attacks.
Market Interface Principles
Does the proposed standard development project comply with all of the following
Market Interface Principles?
1. A reliability standard shall not give any market participant an unfair competitive
advantage.
2. A reliability standard shall neither mandate nor prohibit any specific market
structure.
3. A reliability standard shall not preclude market solutions to achieving compliance
with that standard.
4. A reliability standard shall not require the public disclosure of commercially
sensitive information. All market participants shall have equal opportunity to
access commercially non‐sensitive information that is required for compliance
with reliability standards.
Enter
(yes/no)
Yes
Yes
Yes
Yes
Standard Authorization Request (SAR)
5
Identified Existing or Potential Regional or Interconnection Variances
Region(s)/
Explanation
Interconnection
e.g. NPCC
For Use by NERC Only
SAR Status Tracking (Check off as appropriate)
Draft SAR reviewed by NERC Staff
Draft SAR presented to SC for acceptance
DRAFT SAR approved for posting by the SC
Final SAR endorsed by the SC
SAR assigned a Standards Project by NERC
SAR denied or proposed as Guidance
document
Version History
Version
Date
Owner
Change Tracking
1
June 3, 2013
Revised
1
August 29, 2014
Standards Information Staff Updated template
2
January 18, 2017
Standards Information Staff Revised
2
June 28, 2017
Standards Information Staff Updated template
Standard Authorization Request (SAR)
6
Unofficial Nomination Form
Project 2019-02 BES Cyber System Information Access Management
Do not use this form for submitting nominations. Use the electronic form to submit nominations by 8
p.m. Eastern, September 20, 2019. This unofficial version is provided to assist nominees in compiling the
information necessary to submit the electronic form.
Additional information about this project is available on the Project 2019-02 BES Cyber System
Information Access Management project page. If you have questions, contact Senior Standards
Developer, Latrice Harkness (via email), or at 404-446-9728.
By submitting a nomination form, you are indicating your willingness and agreement to actively
participate in face-to-face meetings and conference calls.
Previous drafting or review team experience is beneficial, but not required. A brief description of the
desired qualifications, expected commitment, and other pertinent information is included below.
BES Cyber System Information Access Management
The purpose of this project is to clarify the CIP requirements and measures related to both managing
access and securing BES Cyber System Information (BCSI).
Standards affected: CIP-004-6 and CIP-011-2
The Reliability Standard(s) developed or revised will include modifications so management of access to
BCSI is clarified to include a focus on the BCSI data and the controls deployed to limit access. In addition,
the Standard(s) should allow various methods for controlling access to BCSI, storage location(s). The focus
must be on BCSI and the ability to obtain and make use of it. This is particularly necessary when it comes
to the utilization of a third party’s system (e.g. cloud services). The current Requirements are focused on
access to the “storage location,” but should not consider management of access to BCSI while in transit,
storage, and in use. In addition to CIP-004-6 modifications, CIP-011-2 should also be evaluated for any
subsequent impacts.
The time commitment for these projects is expected to be up to two face-to-face meetings per
quarter (on average two full working days each meeting) with conference calls scheduled as needed
to meet the agreed-upon timeline the review or drafting team sets forth. Team members may also
have side projects, either individually or by subgroup, to present to the larger team for discussion and
review. Lastly, an important component of the review and drafting team effort is outreach. Members
of the team will be expected to conduct industry outreach during the development process to support
a successful project outcome.
We are seeking a cross section of the industry to participate on the team, but in particular are seeking
individuals who have experience and expertise in one or more of the following areas:
RELIABILITY | RESILIENCE | SECURITY
•
BES Cyber System Information (BCSI) access management
•
Critical Infrastructure Protection (“CIP”) family of Reliability Standards
Individuals who have facilitation skills and experience and/or legal or technical writing backgrounds are
also strongly desired. Please include this in the description of qualifications as applicable.
Name:
Organization:
Address:
Telephone:
Email:
Please briefly describe your experience and qualifications to serve on the requested Standard
Drafting Team (Bio):
If you are currently a member of any NERC drafting team, please list each team here:
Not currently on any active SAR or standard drafting team.
Currently a member of the following SAR or standard drafting team(s):
If you previously worked on any NERC drafting team please identify the team(s):
No prior NERC SAR or standard drafting team.
Prior experience on the following team(s):
Select each NERC Region in which you have experience relevant to the Project for which you are
volunteering:
MRO
NPCC
RF
SERC
Texas RE
WECC
NA – Not Applicable
Unofficial Nomination Form
Project 2019-02 BES Cyber System Information Access Management | August 2019
2
Select each Industry Segment that you represent:
1 — Transmission Owners
2 — RTOs, ISOs
3 — Load-serving Entities
4 — Transmission-dependent Utilities
5 — Electric Generators
6 — Electricity Brokers, Aggregators, and Marketers
7 — Large Electricity End Users
8 — Small Electricity End Users
9 — Federal, State, and Provincial Regulatory or other Government Entities
10 — Regional Reliability Organizations and Regional Entities
NA – Not Applicable
Select each Function 1 in which you have current or prior expertise:
Balancing Authority
Compliance Enforcement Authority
Distribution Provider
Generator Operator
Generator Owner
Interchange Authority
Load-serving Entity
Market Operator
Planning Coordinator
1
Transmission Operator
Transmission Owner
Transmission Planner
Transmission Service Provider
Purchasing-selling Entity
Reliability Coordinator
Reliability Assurer
Resource Planner
These functions are defined in the NERC Functional Model, which is available on the NERC web site.
Unofficial Nomination Form
Project 2019-02 BES Cyber System Information Access Management | August 2019
3
Provide the names and contact information for two references who could attest to your technical
qualifications and your ability to work well in a group:
Name:
Telephone:
Organization:
Email:
Name:
Telephone:
Organization:
Email:
Provide the name and contact information of your immediate supervisor or a member of your
management who can confirm your organization’s willingness to support your active participation.
Name:
Telephone:
Title:
Email:
Unofficial Nomination Form
Project 2019-02 BES Cyber System Information Access Management | August 2019
4
Standards Announcement
Project 2019-02 BES Cyber System Information Access
Management
Standard Drafting Team Nomination Period Open through September 20, 2019
Now Available
Additional nominations are being sought for standard drafting team (SDT) members through 8 p.m.
Eastern, Friday, September 20, 2019. This nomination period is needed to supplement the SDT.
Use the electronic form to submit a nomination. Contact Linda Jenkins regarding issues using the
electronic form. An unofficial Word version of the nomination form is posted on the Standard
Drafting Team Vacancies page and the project page.
By submitting a nomination form, you are indicating your willingness and agreement to actively
participate in face-to-face meetings and conference calls.
The time commitment for this project is expected to be two face-to-face meetings per quarter (on
average two full working days each meeting) with conference calls scheduled as needed to meet the
agreed upon timeline the team sets forth. Team members may also have side projects, either
individually or by sub-group, to present for discussion and review. Lastly, an important component of
the SDT effort is outreach. Members of the team will be expected to conduct industry outreach
during the development process to support a successful ballot.
Previous SDT experience is beneficial but not required. See the project page and nomination form for
additional information.
Next Steps
The Standards Committee is expected to appoint members to the SDT on October 23, 2019. Nominees
will be notified shortly after they have been appointed.
For more information on the Standards Development Process, refer to the Standard Processes
Manual.
Subscribe to this project's observer mailing list by selecting "NERC Email Distribution Lists" from the
"Applications" drop-down menu and specify “Project 2019-02 BES Cyber System Information Access
Management” in the Description Box. For more information or assistance, contact Senior Standards
Developer, Latrice Harkness (via email) or at 404-446-9728.
RELIABILITY | RESILIENCE | SECURITY
North American Electric Reliability Corporation
3353 Peachtree Rd, NE
Suite 600, North Tower
Atlanta, GA 30326
404-446-2560 | www.nerc.com
Standards Announcement
Project 2019-02 BES Cyber System Information Access Management | August 2019
2
Standard Authorization Request (SAR)
Complete and please email this form, with
Complete and please
email this form, with
attachment(s)
to: [email protected]
attachment(s) to: [email protected]
The North American Electric Reliability Corporation (NERC)
welcomes suggestions to improve the reliability of the bulk
power system through improved Reliability Standards.
Requested information
BES Cyber System Information Access Management
March 1, 2019
SAR Title:
Date Submitted:
SAR Requester
Name:
Alice Ireland
Organization: Tri-State Generation and Transmission Association
Telephone:
(303) 254-3120
Email:
[email protected]
SAR Type (Check as many as apply)
New Standard
Imminent Action/ Confidential Issue (SPM
Revision to Existing Standard
Section 10)
Add, Modify or Retire a Glossary Term
Variance development or revision
Withdraw/retire an Existing Standard
Other (Please specify)
Justification for this proposed standard development project (Check all that apply to help NERC
prioritize development)
Regulatory Initiation
NERC Standing Committee Identified
Emerging Risk (Reliability Issues Steering
Enhanced Periodic Review Initiated
Committee) Identified
Industry Stakeholder Identified
Reliability Standard Development Plan
Industry Need (What Bulk Electric System (BES) reliability benefit does the proposed project provide?):
This initiative enhances BES reliability by creating increased choice, greater flexibility, higher availability,
and reduced-cost options for entities to manage their BES Cyber System Information, by providing a
secure path towards utilization of modern third-party data storage and analysis systems. In addition, the
proposed project would clarify the protections expected when utilizing third-party solutions (e.g., cloud
services).
Purpose or Goal (How does this proposed project provide the reliability-related benefit described
above?):
Clarifying the CIP requirements and measures related to both managing access and securing BES Cyber
System Information.
Project Scope (Define the parameters of the proposed project):
The scope of this project is to consider CIP-004 and CIP-011 modifications, and review the NERC
Glossary of Terms as it pertains to Requirements addressing BCSI.
Requested information
Detailed Description (Describe the proposed deliverable(s) with sufficient detail for a drafting team to
execute the project. If you propose a new or substantially revised Reliability Standard or definition,
provide: (1) a technical justification 1which includes a discussion of the reliability-related benefits of
developing a new or revised Reliability Standard or definition, and (2) a technical foundation document
(e.g. research paper) to guide development of the Standard or definition):
CIP-004-6 Requirements need to be modified so management of access to BCSI is clarified to include a
focus on the BCSI data and the controls deployed to limit access. In addition, the Standard should allow
various methods for controlling access to BES Cyber System Information, storage location(s). The focus
must be on BCSI and the ability to obtain and make use of it. This is particularly necessary when it
comes to the utilization of a third party’s system (e.g. cloud services). The current Requirements are
focused on access to the “storage location”, but should consider management of access to BCSI while in
transit, storage, and in use. In addition to CIP-004-6 modifications, CIP-011-2 should also be evaluated
for any subsequent impacts.
Cost Impact Assessment, if known (Provide a paragraph describing the potential cost impacts associated
with the proposed project):
Potential cost savings due to economies of scale and third party support.
Please describe any unique characteristics of the BES facilities that may be impacted by this proposed
standard development project (e.g. Dispersed Generation Resources):
SAR Drafting Team asserts there are no unique characteristics associated with BES facilities that will be
impacted by this proposed standard development project.
To assist the NERC Standards Committee in appointing a drafting team with the appropriate members,
please indicate to which Functional Entities the proposed standard(s) should apply (e.g. Transmission
Operator, Reliability Coordinator, etc. See the most recent version of the NERC Functional Model for
definitions):
Please see Section 4. Applicability of CIP-004-6 and CIP-011-2.
Do you know of any consensus building activities 2 in connection with this SAR? If so, please provide any
recommendations or findings resulting from the consensus building activity.
An informal team, under the direction of the NERC Compliance Input Working Group, was assembled to
review the use of encryption on BES Cyber System Information, and the impact on compliance, with a
particular focus on such BES Cyber System Information being stored or utilized by a third party’s system
(aka cloud). This team met every two weeks during Dec. 2018 – Feb. 2019. The development of this SAR
was supported by all team members. The team consisted of the following individuals:
Name
Company
The NERC Rules of Procedure require a technical justification for new or substantially revised Reliability Standards. Please attach pertinent
information to this form before submittal to NERC.
2 Consensus building activities are occasionally conducted by NERC and/or project review teams. They typically are conducted to obtain
industry inputs prior to proposing any standard development project to revise, or develop a standard or definition.
1
Standard Authorization Request (SAR)
2
Requested information
Alice Ireland (lead)
Tri-State Generation and Transmission
David Vitkus
Tucson Electric Power
Eric Hull
SMUD
Marina Rohnow
Sempra Utilities/ San Diego Gas & Electric
Paul Haase
Seattle City Light
Richie Field
Hoosier Energy REC, Inc.
Rob Ellis
Tri-State Generation and Transmission
Steve Wesling
Tri-State Generation and Transmission
Toley Clague
Portland General Electric
Ziad Dassouki
ATCO Electric
Joseph Baxter
NERC Observer
Lonnie Ratliff
NERC Observer
Brian Kinstad
MRO Observer
Holly Eddy
WECC Observer
Kenath Carver
Texas Reliability Entity, Inc. Observer
Michael Taube
MRO Observer
Mike Stuetzle
NPCC Observer
Morgan King
WECC Observer
Shon Austin
Reliability First Observer
Tremayne Brown
SERC Observer
Are there any related standards or SARs that should be assessed for impact as a result of this proposed
project? If so which standard(s) or project number(s)?
Project 2016-02 Modifications to CIP Standards
Are there alternatives (e.g. guidelines, white paper, alerts, etc.) that have been considered or could
meet the objectives? If so, please list the alternatives.
When evaluating ways to modify the requirement, other standards and requirements were identified,
which provide examples on possible paths forward. These examples are not intended to limit the SDT
from developing other more effective solutions.
Of particular relevance are the following standards/requirements:
• CIP-006-6 Requirement R1 Part 1.10;
• CIP-010-2 Requirement R4, Attachment 1, Section 1.5;
• CIP-012-1 Requirement R1 (pending FERC approval).
Standard Authorization Request (SAR)
3
Requested information
As a means to assist the SDT, several possible options for revision to CIP-004-6 Requirement R4 Part
4.1.3 have been drafted and provided below:
EXAMPLE #1:
[Delete 4.1.3 and create a new subrequirement in either CIP-004 or CIP-011, that would read something
like this:]
R4.X Process to prevent unauthorized access to BES Cyber System Information. The process shall
include:
4.X.1. Identification of physical and electronic repositories utilized to store BES Cyber System
Information. If electronic, indicate whether the repository is hosted by the Responsible Entity or a thirdparty and also whether it is in a virtual or non-virtual environment.
4.X.2. Identification of security protection(s) used to prevent unauthorized access to BES Cyber System
Information within each repository. Examples may include but are not limited to the following:
• Encryption and key management,
• Physical access management,
• Electronic access management,
• Data loss prevention techniques and rights management services.
4.X.3. The process to authorize access to BES Cyber System Information, based on need, as determined
by the Responsible Entity, except for CIP Exceptional Circumstances;
EXAMPLE #2:
R4.1 Process to authorize based on need, as determined by the Responsible Entity, except for CIP
Exceptional Circumstances:
4.1.1. Electronic access;
4.1.2. Unescorted physical access into a Physical Security Perimeter;
4.1.3. Physical access to physical BES Cyber System Information storage locations;
4.1.4. Physical access to unencrypted electronic BES Cyber System Information storage locations;
4.1.5. Electronic access to unencrypted electronic BES Cyber System Information storage locations; and
4.1.6. Electronic access to BES Cyber System Information encryption keys for encrypted BES Cyber
System Information.
EXAMPLE #3:
R4.1 Process to authorize based on need, as determined by the Responsible Entity, except for CIP
Exceptional Circumstances:
4.1.1. Electronic access;
4.1.2. Unescorted physical access into a Physical Security Perimeter;
4.1.3. Physical access to physical BES Cyber System Information storage locations;
4.1.4. Access to electronic BES Cyber System Information.
Standard Authorization Request (SAR)
4
Reliability Principles
Does this proposed standard development project support at least one of the following Reliability
Principles (Reliability Interface Principles)? Please check all those that apply.
1. Interconnected bulk power systems shall be planned and operated in a coordinated manner
to perform reliably under normal and abnormal conditions as defined in the NERC Standards.
2. The frequency and voltage of interconnected bulk power systems shall be controlled within
defined limits through the balancing of real and reactive power supply and demand.
3. Information necessary for the planning and operation of interconnected bulk power systems
shall be made available to those entities responsible for planning and operating the systems
reliably.
4. Plans for emergency operation and system restoration of interconnected bulk power systems
shall be developed, coordinated, maintained and implemented.
5. Facilities for communication, monitoring and control shall be provided, used and maintained
for the reliability of interconnected bulk power systems.
6. Personnel responsible for planning and operating interconnected bulk power systems shall be
trained, qualified, and have the responsibility and authority to implement actions.
7. The security of the interconnected bulk power systems shall be assessed, monitored and
maintained on a wide area basis.
8. Bulk power systems shall be protected from malicious physical or cyber attacks.
Market Interface Principles
Does the proposed standard development project comply with all of the
following Market Interface Principles?
1. A reliability standard shall not give any market participant an unfair competitive
advantage.
2. A reliability standard shall neither mandate nor prohibit any specific market
structure.
3. A reliability standard shall not preclude market solutions to achieving compliance
with that standard.
4. A reliability standard shall not require the public disclosure of commercially
sensitive information. All market participants shall have equal opportunity to
access commercially non-sensitive information that is required for compliance
with reliability standards.
Enter
(yes/no)
Yes
Yes
Yes
Yes
Identified Existing or Potential Regional or Interconnection Variances
Region(s)/
Explanation
Interconnection
e.g. NPCC
For Use by NERC Only
Standard Authorization Request (SAR)
5
SAR Status Tracking (Check off as appropriate)
Draft SAR reviewed by NERC Staff
Draft SAR presented to SC for acceptance
DRAFT SAR approved for posting by the SC
Final SAR endorsed by the SC
SAR assigned a Standards Project by NERC
SAR denied or proposed as Guidance
document
Version History
Version
Date
Owner
Change Tracking
1
June 3, 2013
1
August 29, 2014
Standards Information Staff
Updated template
2
January 18, 2017
Standards Information Staff
Revised
2
June 28, 2017
Standards Information Staff
Updated template
Standard Authorization Request (SAR)
Revised
6
Standard Authorization Request (SAR)
Complete and please email this form, with
Complete and please
email this form, with
attachment(s)
to: [email protected]
attachment(s) to: [email protected]
The North American Electric Reliability Corporation (NERC)
welcomes suggestions to improve the reliability of the bulk
power system through improved Reliability Standards.
Requested information
BES Cyber System Information Access Management
March 1, 2019
SAR Title:
Date Submitted:
SAR Requester
Name:
Alice Ireland
Organization: Tri-State Generation and Transmission Association
Telephone:
(303) 254-3120
Email:
[email protected]
SAR Type (Check as many as apply)
New Standard
Imminent Action/ Confidential Issue (SPM
Revision to Existing Standard
Section 10)
Add, Modify or Retire a Glossary Term
Variance development or revision
Withdraw/retire an Existing Standard
Other (Please specify)
Justification for this proposed standard development project (Check all that apply to help NERC
prioritize development)
Regulatory Initiation
NERC Standing Committee Identified
Emerging Risk (Reliability Issues Steering
Enhanced Periodic Review Initiated
Committee) Identified
Industry Stakeholder Identified
Reliability Standard Development Plan
Industry Need (What Bulk Electric System (BES) reliability benefit does the proposed project provide?):
This initiative enhances BES reliability by creating increased choice, greater flexibility, higher availability,
and reduced-cost options for entities to manage their BES Cyber System Information, by providing a
secure path towards utilization of modern third-party data storage and analysis systems. In addition, the
proposed project would clarify the protections expected when utilizing third-party solutions (e.g., cloud
services).
Purpose or Goal (How does this proposed project provide the reliability-related benefit described
above?):
Clarifying the CIP requirements and measures related to both managing access and securing BES Cyber
System Information.
Project Scope (Define the parameters of the proposed project):
The scope of this project is to consider CIP-004 and CIP-011 modifications, and review the NERC
Glossary of Terms as it pertains to Requirements addressing BCSI.
Requested information
Detailed Description (Describe the proposed deliverable(s) with sufficient detail for a drafting team to
execute the project. If you propose a new or substantially revised Reliability Standard or definition,
provide: (1) a technical justification 1which includes a discussion of the reliability-related benefits of
developing a new or revised Reliability Standard or definition, and (2) a technical foundation document
(e.g. research paper) to guide development of the Standard or definition):
CIP-004-6 Requirements need to be modified so management of access to BCSI is clarified to include a
focus on the BCSI data and the controls deployed to limit access. In addition, the Standard should allow
various methods for controlling access to BES Cyber System Information, storage location(s). The focus
must be on BCSI and the ability to obtain and make use of it. This is particularly necessary when it
comes to the utilization of a third party’s system (e.g. cloud services). The current Requirements are
focused on access to the “storage location”, but should not consider management of access to BCSI
while in transit, storage, and in use. In addition to CIP-004-6 modifications, CIP-011-2 should also be
evaluated for any subsequent impacts.
Cost Impact Assessment, if known (Provide a paragraph describing the potential cost impacts associated
with the proposed project):
Potential cost savings due to economies of scale and third party support.
Please describe any unique characteristics of the BES facilities that may be impacted by this proposed
standard development project (e.g. Dispersed Generation Resources):
SAR Drafting Team asserts there are no unique characteristics associated with BES facilities that will be
impacted by this proposed standard development project.
To assist the NERC Standards Committee in appointing a drafting team with the appropriate members,
please indicate to which Functional Entities the proposed standard(s) should apply (e.g. Transmission
Operator, Reliability Coordinator, etc. See the most recent version of the NERC Functional Model for
definitions):
Please see Section 4. Applicability of CIP-004-6 and CIP-011-2.
Do you know of any consensus building activities 2 in connection with this SAR? If so, please provide any
recommendations or findings resulting from the consensus building activity.
An informal team, under the direction of the NERC Compliance Input Working Group, was assembled to
review the use of encryption on BES Cyber System Information, and the impact on compliance, with a
particular focus on such BES Cyber System Information being stored or utilized by a third party’s system
(aka cloud). This team met every two weeks during Dec. 2018 – Feb. 2019. The development of this SAR
was supported by all team members. The team consisted of the following individuals:
Name
Company
The NERC Rules of Procedure require a technical justification for new or substantially revised Reliability Standards. Please attach pertinent
information to this form before submittal to NERC.
2 Consensus building activities are occasionally conducted by NERC and/or project review teams. They typically are conducted to obtain
industry inputs prior to proposing any standard development project to revise, or develop a standard or definition.
1
Standard Authorization Request (SAR)
2
Requested information
Alice Ireland (lead)
Tri-State Generation and Transmission
David Vitkus
Tucson Electric Power
Eric Hull
SMUD
Marina Rohnow
Sempra Utilities/ San Diego Gas & Electric
Paul Haase
Seattle City Light
Richie Field
Hoosier Energy REC, Inc.
Rob Ellis
Tri-State Generation and Transmission
Steve Wesling
Tri-State Generation and Transmission
Toley Clague
Portland General Electric
Ziad Dassouki
ATCO Electric
Joseph Baxter
NERC Observer
Lonnie Ratliff
NERC Observer
Brian Kinstad
MRO Observer
Holly Eddy
WECC Observer
Kenath Carver
Texas Reliability Entity, Inc. Observer
Michael Taube
MRO Observer
Mike Stuetzle
NPCC Observer
Morgan King
WECC Observer
Shon Austin
Reliability First Observer
Tremayne Brown
SERC Observer
Are there any related standards or SARs that should be assessed for impact as a result of this proposed
project? If so which standard(s) or project number(s)?
Project 2016-02 Modifications to CIP Standards
Are there alternatives (e.g. guidelines, white paper, alerts, etc.) that have been considered or could
meet the objectives? If so, please list the alternatives.
When evaluating ways to modify the requirement, other standards and requirements were identified,
which provide examples on possible paths forward. These examples are not intended to limit the SDT
from developing other more effective solutions.
Of particular relevance are the following standards/requirements:
• CIP-006-6 Requirement R1 Part 1.10;
• CIP-010-2 Requirement R4, Attachment 1, Section 1.5;
• CIP-012-1 Requirement R1 (pending FERC approval).
Standard Authorization Request (SAR)
3
Requested information
As a means to assist the SDT, several possible options for revision to CIP-004-6 Requirement R4 Part
4.1.3 have been drafted and provided below:
EXAMPLE #1:
[Delete 4.1.3 and create a new subrequirement in either CIP-004 or CIP-011, that would read something
like this:]
R4.X Process to prevent unauthorized access to BES Cyber System Information. The process shall
include:
4.X.1. Identification of physical and electronic repositories utilized to store BES Cyber System
Information. If electronic, indicate whether the repository is hosted by the Responsible Entity or a thirdparty and also whether it is in a virtual or non-virtual environment.;
4.X.2. Identification of security protection(s) used to prevent unauthorized access to BES Cyber System
Information within each repository. Examples may include but are not limited to the following:
• Encryption and key management,
• Physical access management,
• Electronic access management,
• Data loss prevention techniques and rights management services.
4.X.3. The process to authorize access to BES Cyber System Information, based on need, as determined
by the Responsible Entity, except for CIP Exceptional Circumstances;
EXAMPLE #2:
R4.1 Process to authorize based on need, as determined by the Responsible Entity, except for CIP
Exceptional Circumstances:
4.1.1. Electronic access;
4.1.2. Unescorted physical access into a Physical Security Perimeter;
4.1.3. Physical access to physical BES Cyber System Information storage locations;
4.1.4. Physical access to unencrypted electronic BES Cyber System Information storage locations;
4.1.5. Electronic access to unencrypted electronic BES Cyber System Information storage locations; and
4.1.6. Electronic access to BES Cyber System Information encryption keys for encrypted BES Cyber
System Information.
EXAMPLE #3:
R4.1 Process to authorize based on need, as determined by the Responsible Entity, except for CIP
Exceptional Circumstances:
4.1.1. Electronic access;
4.1.2. Unescorted physical access into a Physical Security Perimeter;
4.1.3. Physical access to physical BES Cyber System Information storage locations;
4.1.4. Access to electronic BES Cyber System Information.
Standard Authorization Request (SAR)
4
Reliability Principles
Does this proposed standard development project support at least one of the following Reliability
Principles (Reliability Interface Principles)? Please check all those that apply.
1. Interconnected bulk power systems shall be planned and operated in a coordinated manner
to perform reliably under normal and abnormal conditions as defined in the NERC Standards.
2. The frequency and voltage of interconnected bulk power systems shall be controlled within
defined limits through the balancing of real and reactive power supply and demand.
3. Information necessary for the planning and operation of interconnected bulk power systems
shall be made available to those entities responsible for planning and operating the systems
reliably.
4. Plans for emergency operation and system restoration of interconnected bulk power systems
shall be developed, coordinated, maintained and implemented.
5. Facilities for communication, monitoring and control shall be provided, used and maintained
for the reliability of interconnected bulk power systems.
6. Personnel responsible for planning and operating interconnected bulk power systems shall be
trained, qualified, and have the responsibility and authority to implement actions.
7. The security of the interconnected bulk power systems shall be assessed, monitored and
maintained on a wide area basis.
8. Bulk power systems shall be protected from malicious physical or cyber attacks.
Market Interface Principles
Does the proposed standard development project comply with all of the
following Market Interface Principles?
1. A reliability standard shall not give any market participant an unfair competitive
advantage.
2. A reliability standard shall neither mandate nor prohibit any specific market
structure.
3. A reliability standard shall not preclude market solutions to achieving compliance
with that standard.
4. A reliability standard shall not require the public disclosure of commercially
sensitive information. All market participants shall have equal opportunity to
access commercially non-sensitive information that is required for compliance
with reliability standards.
Enter
(yes/no)
Yes
Yes
Yes
Yes
Identified Existing or Potential Regional or Interconnection Variances
Region(s)/
Explanation
Interconnection
e.g. NPCC
For Use by NERC Only
Standard Authorization Request (SAR)
5
SAR Status Tracking (Check off as appropriate)
Draft SAR reviewed by NERC Staff
Draft SAR presented to SC for acceptance
DRAFT SAR approved for posting by the SC
Final SAR endorsed by the SC
SAR assigned a Standards Project by NERC
SAR denied or proposed as Guidance
document
Version History
Version
Date
Owner
Change Tracking
1
June 3, 2013
1
August 29, 2014
Standards Information Staff
Updated template
2
January 18, 2017
Standards Information Staff
Revised
2
June 28, 2017
Standards Information Staff
Updated template
Standard Authorization Request (SAR)
Revised
6
CIP-004-7 — Cyber Security – Personnel & Training
Standard Development Timeline
This section is maintained by the drafting team during the development of the standard and will be
removed when the standard is adopted by the NERC Board of Trustees (Board).
Description of Current Draft
Completed Actions
Standards Committee approved Standard Authorization Request
(SAR) for posting
SAR posted for comment
Anticipated Actions
Date
March 22, 2019
March 28, 2019 –
April 26, 2019
Date
45-day formal or informal comment period with ballot
December 2019
45-day formal or informal comment period with additional ballot
February 2020
10-day final ballot
April 2020
Board adoption
May 2020
New or Modified Term(s) Used in NERC Reliability Standards
This section includes all new or modified terms used in the proposed standard that will be included
in the Glossary of Terms Used in NERC Reliability Standards upon applicable regulatory approval.
Terms used in the proposed standard that are already defined and are not being modified can be
found in the Glossary of Terms Used in NERC Reliability Standards. The new or revised terms listed
below will be presented for approval with the proposed standard. Upon Board adoption, this
section will be removed.
Term(s):
None.
Draft 1
December 2019
Page 1 of 39
CIP-004-7 — Cyber Security – Personnel & Training
A. Introduction
1. Title:
Cyber Security — Personnel & Training
2. Number:
CIP-004-7
3. Purpose:
To minimize the risk against compromise that could lead to misoperation or
instability in the Bulk Electric System (BES) from individuals accessing BES Cyber Systems by
requiring an appropriate level of personnel risk assessment, training, and security awareness in
support of protecting BES Cyber Systems.
4. Applicability:
4.1.
Functional Entities: For the purpose of the requirements contained herein, the following
list of functional entities will be collectively referred to as “Responsible Entities.” For
requirements in this standard where a specific functional entity or subset of functional
entities are the applicable entity or entities, the functional entity or entities are specified
explicitly.
4.1.1. Balancing Authority
4.1.2. Distribution Provider that owns one or more of the following Facilities, systems, and
equipment for the protection or restoration of the BES:
4.1.2.1. Each underfrequency Load shedding (UFLS) or undervoltage Load shedding
(UVLS) system that:
4.1.2.1.1. is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.1.2.1.2. performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation, of
300 MW or more.
4.1.2.2. Each Remedial Action Scheme (RAS) where the RAS is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.1.2.3. Each Protection System (excluding UFLS and UVLS) that applies to Transmission
where the Protection System is subject to one or more requirements in a NERC
or Regional Reliability Standard.
4.1.2.4. Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.1.3. Generator Operator
4.1.4. Generator Owner
4.1.5. Reliability Coordinator
4.1.6. Transmission Operator
Draft 1
December 2019
Page 2 of 39
CIP-004-7 — Cyber Security – Personnel & Training
4.1.7. Transmission Owner
4.2.
Facilities: For the purpose of the requirements contained herein, the following
Facilities, systems, and equipment owned by each Responsible Entity in 4.1 above are
those to which these requirements are applicable. For requirements in this standard
where a specific type of Facilities, system, or equipment or subset of Facilities, systems,
and equipment are applicable, these are specified explicitly.
4.2.1. Distribution Provider: One or more of the following Facilities, systems and
equipment owned by the Distribution Provider for the protection or restoration of
the BES:
4.2.1.1. Each UFLS or UVLS System that:
4.2.1.1.1. is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.2.1.1.2. performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation, of
300 MW or more.
4.2.1.2. Each RAS where the RAS is subject to one or more requirements in a NERC or
Regional Reliability Standard.
4.2.1.3. Each Protection System (excluding UFLS and UVLS) that applies to Transmission
where the Protection System is subject to one or more requirements in a NERC
or Regional Reliability Standard.
4.2.1.4. Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.2.2. Responsible Entities listed in 4.1 other than Distribution Providers:
All BES Facilities.
4.2.3. Exemptions: The following are exempt from Standard CIP-004-7:
4.2.3.1. Cyber Assets at Facilities regulated by the Canadian Nuclear Safety Commission.
4.2.3.2. Cyber Assets associated with communication networks and data
communication links between discrete Electronic Security Perimeters.
4.2.3.3. The systems, structures, and components that are regulated by the Nuclear
Regulatory Commission under a cyber security plan pursuant to 10 C.F.R.
Section 73.54.
4.2.3.4. For Distribution Providers, the systems and equipment that are not included in
section 4.2.1 above.
Draft 1
December 2019
Page 3 of 39
CIP-004-7 — Cyber Security – Personnel & Training
4.2.3.5. Responsible Entities that identify that they have no BES Cyber Systems
categorized as high impact or medium impact according to the CIP-002-5.1
identification and categorization processes.
5. Effective Dates:
See Implementation Plan for CIP-004-7.
6. Background:
Standard CIP-004 exists as part of a suite of CIP Standards related to cyber security, which
require the initial identification and categorization of BES Cyber Systems and require a
minimum level of organizational, operational, and procedural controls to mitigate risk to BES
Cyber Systems.
Most requirements open with, “Each Responsible Entity shall implement one or more
documented [processes, plan, etc.] that include the applicable items in [Table Reference].” The
referenced table requires the applicable items in the procedures for the common subject
matter of the requirements.
The term documented processes refers to a set of required instructions specific to the
Responsible Entity and to achieve a specific outcome. This term does not imply any particular
naming or approval structure beyond what is stated in the requirements. An entity should
include as much as it believes necessary in its documented processes, but it must address the
applicable requirements in the table.
The terms program and plan are sometimes used in place of documented processes where it
makes sense and is commonly understood. For example, documented processes describing a
response are typically referred to as plans (i.e., incident response plans and recovery plans).
Likewise, a security plan can describe an approach involving multiple procedures to address a
broad subject matter.
Similarly, the term program may refer to the organization’s overall implementation of its
policies, plans and procedures involving a subject matter. Examples in the standards include
the personnel risk assessment program and the personnel training program. The full
implementation of the CIP Cyber Security Standards could also be referred to as a program.
However, the terms program and plan do not imply any additional requirements beyond what
is stated in the standards.
Responsible Entities can implement common controls that meet requirements for multiple high
and medium impact BES Cyber Systems. For example, a single training program could meet the
requirements for training personnel across multiple BES Cyber Systems.
Measures for the initial requirement are simply the documented processes themselves.
Measures in the table rows provide examples of evidence to show documentation and
implementation of applicable items in the documented processes. These measures serve to
provide guidance to entities in acceptable records of compliance and should not be viewed as
an all-inclusive list.
Draft 1
December 2019
Page 4 of 39
CIP-004-7 — Cyber Security – Personnel & Training
Throughout the standards, unless otherwise stated, bulleted items in the requirements and
measures are items that are linked with an “or,” and numbered items are items that are linked
with an “and.”
Many references in the Applicability section use a threshold of 300 MW for UFLS and UVLS.
This particular threshold of 300 MW for UVLS and UFLS was provided in Version 1 of the CIP
Cyber Security Standards. The threshold remains at 300 MW since it is specifically addressing
UVLS and UFLS, which are last ditch efforts to save the BES. A review of UFLS tolerances defined
within regional reliability standards for UFLS program requirements to date indicates that the
historical value of 300 MW represents an adequate and reasonable threshold value for
allowable UFLS operational tolerances.
“Applicable Systems” Columns in Tables:
Each table has an “Applicable Systems” column to further define the scope of systems to which
a specific requirement row applies. The CSO706 SDT adapted this concept from the National
Institute of Standards and Technology (“NIST”) Risk Management Framework as a way of
applying requirements more appropriately based on impact and connectivity characteristics.
The following conventions are used in the “Applicable Systems” column as described.
• High Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as high impact
according to the CIP-002-5.1 identification and categorization processes.
• Medium Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as medium
impact according to the CIP-002-5.1 identification and categorization processes.
• Medium Impact BES Cyber Systems with External Routable Connectivity – Only applies to
medium impact BES Cyber Systems with External Routable Connectivity. This also excludes
Cyber Assets in the BES Cyber System that cannot be directly accessed through External
Routable Connectivity.
• Electronic Access Control or Monitoring Systems (EACMS) – Applies to each Electronic
Access Control or Monitoring System associated with a referenced high impact BES Cyber
System or medium impact BES Cyber System. Examples may include, but are not limited to,
firewalls, authentication servers, and log monitoring and alerting systems.
• Physical Access Control Systems (PACS) – Applies to each Physical Access Control System
associated with a referenced high impact BES Cyber System or medium impact BES Cyber
System with External Routable Connectivity.
Draft 1
December 2019
Page 5 of 39
CIP-004-7 — Cyber Security – Personnel & Training
B. Requirements and Measures
R1.
Each Responsible Entity shall implement one or more documented processes that collectively include each of the
applicable requirement parts in CIP-004-7 Table R1 – Security Awareness Program. [Violation Risk Factor: Lower] [Time
Horizon: Operations Planning]
M1. Evidence must include each of the applicable documented processes that collectively include each of the applicable
requirement parts in CIP-004-7 Table R1 – Security Awareness Program and additional evidence to demonstrate
implementation as described in the Measures column of the table.
CIP-004-7 Table R1 – Security Awareness Program
Part
1.1
Applicable Systems
High Impact BES Cyber Systems
Medium Impact BES Cyber Systems
Requirements
Security awareness that, at least once
each calendar quarter, reinforces cyber
security practices (which may include
associated physical security practices)
for the Responsible Entity’s personnel
who have authorized electronic or
authorized unescorted physical access
to BES Cyber Systems.
Measures
An example of evidence may include,
but is not limited to, documentation
that the quarterly reinforcement has
been provided. Examples of evidence
of reinforcement may include, but are
not limited to, dated copies of
information used to reinforce security
awareness, as well as evidence of
distribution, such as:
•
•
Draft 1
December 2019
direct communications (for
example, emails, memos,
computer-based training); or
indirect communications (for
example, posters, intranet, or
brochures); or
Page 6 of 39
CIP-004-7 — Cyber Security – Personnel & Training
CIP-004-7 Table R1 – Security Awareness Program
Part
Applicable Systems
Requirements
Measures
•
Draft 1
December 2019
management support and
reinforcement (for example,
presentations or meetings).
Page 7 of 39
CIP-004-7 — Cyber Security – Personnel & Training
R2. Each Responsible Entity shall implement one or more cyber security training program(s) appropriate to individual roles,
functions, or responsibilities that collectively includes each of the applicable requirement parts in CIP-004-7 Table R2 –
Cyber Security Training Program. [Violation Risk Factor: Lower] [Time Horizon: Operations Planning]
M2. Evidence must include the training program that includes each of the applicable requirement parts in CIP-004-7 Table R2 –
Cyber Security Training Program and additional evidence to demonstrate implementation of the program(s).
Draft 1
December 2019
Page 8 of 39
CIP-004-7 — Cyber Security – Personnel & Training
CIP-004-7 Table R2 – Cyber Security Training Program
Part
2.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Requirements
Training content on:
2.1.1.
2.1.2.
2.1.3.
2.1.4.
2.1.5.
2.1.6.
2.1.7.
2.1.8.
2.1.9.
Draft 1
December 2019
Cyber security policies;
Physical access controls;
Electronic access controls;
The visitor control program;
Handling of BES Cyber System
Information and its storage;
Identification of a Cyber
Security Incident and initial
notifications in accordance
with the entity’s incident
response plan;
Recovery plans for BES Cyber
Systems;
Response to Cyber Security
Incidents; and
Cyber security risks associated
with a BES Cyber System’s
electronic interconnectivity
and interoperability with
other Cyber Assets, including
Transient Cyber Assets, and
with Removable Media.
Measures
Examples of evidence may include,
but are not limited to, training
material such as power point
presentations, instructor notes,
student notes, handouts, or other
training materials.
Page 9 of 39
CIP-004-7 — Cyber Security – Personnel & Training
CIP-004-7 Table R2 – Cyber Security Training Program
Part
2.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Requirements
Measures
Require completion of the training
specified in Part 2.1 prior to granting
authorized electronic access and
authorized unescorted physical access
to applicable Cyber Assets, except
during CIP Exceptional Circumstances.
Examples of evidence may include,
but are not limited to, training
records and documentation of when
CIP Exceptional Circumstances were
invoked.
Require completion of the training
specified in Part 2.1 at least once
every 15 calendar months.
Examples of evidence may include,
but are not limited to, dated
individual training records.
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
2.3
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 1
December 2019
Page 10 of 39
CIP-004-7 — Cyber Security – Personnel & Training
R3.
Each Responsible Entity shall implement one or more documented personnel risk assessment program(s) to attain and
retain authorized electronic or authorized unescorted physical access to BES Cyber Systems that collectively include each of
the applicable requirement parts in CIP-004-7 Table R3 – Personnel Risk Assessment Program. [Violation Risk Factor:
Medium] [Time Horizon: Operations Planning].
M3. Evidence must include the documented personnel risk assessment programs that collectively include each of the applicable
requirement parts in CIP-004-7 Table R3 – Personnel Risk Assessment Program and additional evidence to demonstrate
implementation of the program(s).
CIP-004-7 Table R3 – Personnel Risk Assessment Program
Part
Applicable Systems
3.1
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Requirements
Process to confirm identity.
Measures
An example of evidence may
include, but is not limited to,
documentation of the Responsible
Entity’s process to confirm identity.
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Draft 1
December 2019
Page 11 of 39
CIP-004-7 — Cyber Security – Personnel & Training
CIP-004-7 Table R3 – Personnel Risk Assessment Program
Part
3.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Requirements
Measures
Process to perform a seven year
criminal history records check as part of
each personnel risk assessment that
includes:
An example of evidence may include,
but is not limited to, documentation of
the Responsible Entity’s process to
perform a seven year criminal history
records check.
3.2.1. current residence, regardless of
duration; and
3.2.2. other locations where, during
the seven years immediately prior to
the date of the criminal history
records check, the subject has resided
for six consecutive months or more.
If it is not possible to perform a full
seven year criminal history records
check, conduct as much of the seven
year criminal history records check as
possible and document the reason the
full seven year criminal history records
check could not be performed.
Draft 1
December 2019
Page 12 of 39
CIP-004-7 — Cyber Security – Personnel & Training
CIP-004-7 Table R3 – Personnel Risk Assessment Program
Part
3.3
Applicable Systems
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Requirements
Measures
Criteria or process to evaluate criminal
history records checks for authorizing
access.
An example of evidence may
include, but is not limited to,
documentation of the
Responsible Entity’s process to
evaluate criminal history records
checks.
Criteria or process for verifying that
personnel risk assessments performed for
contractors or service vendors are
conducted according to Parts 3.1 through
3.3.
An example of evidence may
include, but is not limited to,
documentation of the
Responsible Entity’s criteria or
process for verifying contractors
or service vendors personnel risk
assessments.
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
3.4
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Draft 1
December 2019
Page 13 of 39
CIP-004-7 — Cyber Security – Personnel & Training
CIP-004-7 Table R3 – Personnel Risk Assessment Program
Part
3.5
Applicable Systems
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Draft 1
December 2019
Requirements
Measures
Process to ensure that individuals with
authorized electronic or authorized
unescorted physical access have had a
personnel risk assessment completed
according to Parts 3.1 to 3.4 within the last
seven years.
An example of evidence may
include, but is not limited to,
documentation of the
Responsible Entity’s process for
ensuring that individuals with
authorized electronic or
authorized unescorted physical
access have had a personnel risk
assessment completed within the
last seven years.
Page 14 of 39
CIP-004-7 — Cyber Security – Personnel & Training
R4. Each Responsible Entity shall implement one or more documented access management program(s) that collectively include
each of the applicable requirement parts in CIP-004-7 Table R4 – Access Management Program. [Violation Risk Factor:
Medium] [Time Horizon: Operations Planning and Same Day Operations].
M4. Evidence must include the documented processes that collectively include each of the applicable requirement parts in CIP004-7 Table R4 – Access Management Program and additional evidence to demonstrate that the access management
program was implemented as described in the Measures column of the table.
CIP-004-7 Table R4 – Access Management Program
Part
Applicable Systems
4.1
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Draft 1
December 2019
Requirements
Process to authorize based on need, as
determined by the Responsible Entity,
except for CIP Exceptional
Circumstances:
4.1.1. Electronic access; and
4.1.2. Unescorted physical access into a
Physical Security Perimeter.
Measures
An example of evidence may
include, but is not limited to, dated
documentation of the process to
authorize electronic access and
unescorted physical access into a
Physical Security Perimeter.
Page 15 of 39
CIP-004-7 — Cyber Security – Personnel & Training
CIP-004-7 Table R4 – Access Management Program
Part
Applicable Systems
Requirements
4.2
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Verify at least once each calendar
quarter that individuals with active
electronic access or unescorted physical
access have authorization records.
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Draft 1
December 2019
Measures
Examples of evidence may include,
but are not limited to:
Dated documentation of the
verification between the system
generated list of individuals who
have been authorized for access
(i.e., workflow database) and a
system generated list of
personnel who have access (i.e.,
user account listing), or
• Dated documentation of the
verification between a list of
individuals who have been
authorized for access (i.e.,
authorization forms) and a list
of individuals provisioned for
access (i.e., provisioning forms
or shared account listing).
•
Page 16 of 39
CIP-004-7 — Cyber Security – Personnel & Training
CIP-004-7 Table R4 – Access Management Program
Part
Applicable Systems
Requirements
4.3
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
For electronic access, verify at least once
every 15 calendar months that all user
accounts, user account groups, or user
role categories, and their specific,
associated privileges are correct and are
those that the Responsible Entity
determines are necessary.
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Measures
An example of evidence may
include, but is not limited to,
documentation of the review that
includes all of the following:
1. A dated listing of all
accounts/account groups or
roles within the system;
2. A summary description of
privileges associated with
each group or role;
3. Accounts assigned to the
group or role; and
4. Dated evidence showing
verification of the privileges
for the group are authorized
and appropriate to the work
function performed by
people assigned to each
account.
R5. Each Responsible Entity shall implement one or more documented access revocation program(s) that collectively include
each of the applicable requirement parts in CIP-004-7 Table R5 – Access Revocation. [Violation Risk Factor: Medium] [Time
Horizon: Same Day Operations and Operations Planning].
Draft 1
December 2019
Page 17 of 39
CIP-004-7 — Cyber Security – Personnel & Training
M5. Evidence must include each of the applicable documented programs that collectively include each of the applicable
requirement parts in CIP-004-7 Table R5 – Access Revocation and additional evidence to demonstrate implementation as
described in the Measures column of the table.
CIP-004-7 Table R5 – Access Revocation
Part
5.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 1
December 2019
Requirements
Measures
A process to initiate removal of an
individual’s ability for unescorted
physical access and Interactive Remote
Access upon a termination action, and
complete the removals within 24 hours
of the termination action (Removal of
the ability for access may be different
than deletion, disabling, revocation, or
removal of all access rights).
An example of evidence may include,
but is not limited to, documentation of
all of the following:
1. Dated workflow or sign-off form
verifying access removal
associated with the termination
action; and
2. Logs or other demonstration
showing such persons no longer
have access.
Page 18 of 39
CIP-004-7 — Cyber Security – Personnel & Training
CIP-004-7 Table R5 – Access Revocation
Part
5.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 1
December 2019
Requirements
Measures
For reassignments or transfers, revoke
the individual’s authorized electronic
access to individual accounts and
authorized unescorted physical access
that the Responsible Entity determines
are not necessary by the end of the
next calendar day following the date
that the Responsible Entity determines
that the individual no longer requires
retention of that access.
An example of evidence may include,
but is not limited to, documentation of
all of the following:
1. Dated workflow or sign-off form
showing a review of logical and
physical access; and
2. Logs or other demonstration
showing such persons no longer
have access that the
Responsible Entity determines
is not necessary.
Page 19 of 39
CIP-004-7 — Cyber Security – Personnel & Training
CIP-004-7 Table R5 – Access Revocation
Part
5.3
Applicable Systems
High Impact BES Cyber Systems and
their associated:
• EACMS
Draft 1
December 2019
Requirements
Measures
For termination actions, revoke the
individual’s non-shared user accounts
(unless already revoked according to
Part 5.1) within 30 calendar days of the
effective date of the termination
action.
An example of evidence may include,
but is not limited to, workflow or signoff form showing access removal for
any individual BES Cyber Assets and
software applications as determined
necessary to completing the revocation
of access and dated within thirty
calendar days of the termination
actions.
Page 20 of 39
CIP-004-7 — Cyber Security – Personnel & Training
CIP-004-7 Table R5 – Access Revocation
Part
5.4
Applicable Systems
High Impact BES Cyber Systems and
their associated:
• EACMS
Requirements
Measures
For termination actions, change
Examples of evidence may include, but
passwords for shared account(s) known are not limited to:
to the user within 30 calendar days of
• Workflow or sign-off form
the termination action. For
showing password reset within
reassignments or transfers, change
30 calendar days of the
passwords for shared account(s) known
termination;
to the user within 30 calendar days
• Workflow or sign-off form
following the date that the Responsible
showing password reset within
Entity determines that the individual no
30 calendar days of the
longer requires retention of that
reassignments or transfers; or
access.
• Documentation of the
extenuating operating
If the Responsible Entity determines
circumstance and workflow or
and documents that extenuating
sign-off form showing password
operating circumstances require a
reset within 10 calendar days
longer time period, change the
following the end of the
password(s) within 10 calendar days
operating circumstance.
following the end of the operating
circumstances.
Draft 1
December 2019
Page 21 of 39
CIP-004-7 — Cyber Security – Personnel & Training
C. Compliance
1. Compliance Monitoring Process:
1.1. Compliance Enforcement Authority:
As defined in the NERC Rules of Procedure, “Compliance Enforcement Authority” (CEA)
means NERC or the Regional Entity in their respective roles of monitoring and enforcing
compliance with the NERC Reliability Standards.
1.2. Evidence Retention:
The following evidence retention periods identify the period of time an entity is
required to retain specific evidence to demonstrate compliance. For instances where
the evidence retention period specified below is shorter than the time since the last
audit, the CEA may ask an entity to provide other evidence to show that it was
compliant for the full time period since the last audit.
The Responsible Entity shall keep data or evidence to show compliance as identified
below unless directed by its CEA to retain specific evidence for a longer period of time
as part of an investigation:
•
Each Responsible Entity shall retain evidence of each requirement in this standard for
three calendar years.
•
If a Responsible Entity is found non-compliant, it shall keep information related to the
non-compliance until mitigation is complete and approved or for the time specified
above, whichever is longer.
•
The CEA shall keep the last audit records and all requested and submitted subsequent
audit records.
1.3. Compliance Monitoring and Assessment Processes:
Compliance Audits
Self-Certifications
Spot Checking
Compliance Investigations
Self-Reporting
Complaints
1.4. Additional Compliance Information:
None
Draft 1
November 2019
Page 22 of 39
CIP-004-7 — Cyber Security – Personnel & Training
2. Table of Compliance Elements
R#
Time
Horizon
R1
R2
Draft 1
November 2019
Operations
Planning
Operations
Planning
VRF
Violation Severity Levels (CIP-004-7)
Lower VSL
Lower
Lower
Moderate VSL
High VSL
Severe VSL
The
Responsible
Entity did not
reinforce cyber
security
practices
during a
calendar
quarter but did
so less than 10
calendar days
after the start
of a
subsequent
calendar
quarter. (1.1)
The Responsible Entity
did not reinforce cyber
security practices during
a calendar quarter but
did so between 10 and
30 calendar days after
the start of a
subsequent calendar
quarter. (1.1)
The Responsible Entity
did not reinforce cyber
security practices during
a calendar quarter but
did so within the
subsequent quarter but
beyond 30 calendar
days after the start of
that calendar quarter.
(1.1)
The Responsible Entity
did not document or
implement any security
awareness process(es)
to reinforce cyber
security practices. (R1)
The
Responsible
Entity
implemented a
cyber security
training
program but
failed to
include one of
the training
The Responsible Entity
implemented a cyber
security training
program but failed to
include two of the
training content topics
in Requirement Parts
2.1.1 through 2.1.9.
(2.1)
The Responsible Entity
implemented a cyber
security training
program but failed to
include three of the
training content topics
in Requirement Parts
2.1.1 through 2.1.9.
(2.1)
The Responsible Entity
did not implement a
cyber security training
program appropriate to
individual roles,
functions, or
responsibilities. (R2)
OR
OR
OR
The Responsible Entity
did not reinforce cyber
security practices and
associated physical
security practices for at
least two consecutive
calendar quarters. (1.1)
OR
Page 23 of 39
CIP-004-7 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-7)
Lower VSL
content topics
in Requirement
Parts 2.1.1
through 2.1.9.
(2.1)
OR
The
Responsible
Entity
implemented a
cyber security
training
program but
failed to train
one individual
(with the
exception of
CIP Exceptional
Circumstances)
prior to their
being granted
authorized
electronic and
authorized
unescorted
physical access.
(2.2)
Draft 1
November 2019
Moderate VSL
High VSL
The Responsible Entity
implemented a cyber
security training
program but failed to
train two individuals
(with the exception of
CIP Exceptional
Circumstances) prior to
their being granted
authorized electronic
and authorized
unescorted physical
access. (2.2)
The Responsible Entity
implemented a cyber
security training
program but failed to
train three individuals
(with the exception of
CIP Exceptional
Circumstances) prior to
their being granted
authorized electronic
and authorized
unescorted physical
access. (2.2)
OR
OR
The Responsible Entity
implemented a cyber
security training
program but failed to
train two individuals
with authorized
electronic or authorized
unescorted physical
access within 15
calendar months of the
previous training
completion date. (2.3)
The Responsible Entity
implemented a cyber
security training
program but failed to
train three individuals
with authorized
electronic or authorized
unescorted physical
access within 15
calendar months of the
previous training
completion date. (2.3)
Severe VSL
The Responsible Entity
implemented a cyber
security training
program but failed to
include four or more of
the training content
topics in Requirement
Parts 2.1.1 through
2.1.9. (2.1)
OR
The Responsible Entity
implemented a cyber
security training
program but failed to
train four or more
individuals (with the
exception of CIP
Exceptional
Circumstances) prior to
their being granted
authorized electronic
and authorized
unescorted physical
access. (2.2)
OR
Page 24 of 39
CIP-004-7 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-7)
Lower VSL
Moderate VSL
High VSL
The Responsible Entity
implemented a cyber
security training
program but failed to
train four or more
individuals with
authorized electronic or
authorized unescorted
physical access within
15 calendar months of
the previous training
completion date. (2.3)
OR
The
Responsible
Entity
implemented a
cyber security
training
program but
failed to train
one individual
with authorized
electronic or
authorized
unescorted
physical access
within 15
calendar
months of the
previous
training
completion
date. (2.3)
R3
Draft 1
November 2019
Operations
Planning
Medium
The
Responsible
Entity has a
program for
conducting
Severe VSL
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments (PRAs)
for individuals, including
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments (PRAs)
for individuals, including
The Responsible Entity
did not have all of the
required elements as
described by 3.1
through 3.4 included
Page 25 of 39
CIP-004-7 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-7)
Lower VSL
Personnel Risk
Assessments
(PRAs) for
individuals,
including
contractors and
service
vendors, but
did not conduct
the PRA as a
condition of
granting
authorized
electronic or
authorized
unescorted
physical access
for one
individual. (R3)
OR
The
Responsible
Entity did
conduct
Personnel Risk
Assessments
(PRAs) for
individuals,
Draft 1
November 2019
Moderate VSL
contractors and service
vendors, but did not
conduct the PRA as a
condition of granting
authorized electronic or
authorized unescorted
physical access for two
individuals. (R3)
High VSL
contractors and service
vendors, but did not
conduct the PRA as a
condition of granting
authorized electronic or
authorized unescorted
physical access for three
individuals. (R3)
OR
OR
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not confirm identity for
two individuals. (3.1 &
3.4)
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not confirm identity for
three individuals. (3.1 &
3.4)
OR
OR
The Responsible Entity
has a process to
perform seven-year
criminal history record
checks for individuals,
The Responsible Entity
has a process to
perform seven-year
criminal history record
checks for individuals,
Severe VSL
within documented
program(s) for
implementing Personnel
Risk Assessments
(PRAs), for individuals,
including contractors
and service vendors, for
obtaining and retaining
authorized cyber or
authorized unescorted
physical access. (R3)
OR
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, but did not
conduct the PRA as a
condition of granting
authorized electronic or
authorized unescorted
physical access for four
or more individuals. (R3)
OR
Page 26 of 39
CIP-004-7 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-7)
Lower VSL
including
contractors and
service
vendors, with
authorized
electronic or
authorized
unescorted
physical access
but did not
confirm
identity for one
individual. (3.1
& 3.4)
OR
Moderate VSL
including contractors
and service vendors,
with authorized
electronic or authorized
unescorted physical
access but did not
include the required
checks described in
3.2.1 and 3.2.2 for two
individuals. (3.2 & 3.4)
High VSL
including contractors
and service vendors,
with authorized
electronic or authorized
unescorted physical
access but did not
include the required
checks described in
3.2.1 and 3.2.2 for three
individuals. (3.2 & 3.4)
OR
OR
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not evaluate criminal
history records check
for access authorization
for two individuals. (3.3
& 3.4)
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not evaluate criminal
history records check
for access authorization
for three individuals.
(3.3 & 3.4)
The
Responsible
Entity has a
process to
perform sevenyear criminal
history record
checks for
individuals,
including
contractors and OR
service
vendors, with
Draft 1
November 2019
OR
Severe VSL
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not confirm identity for
four or more
individuals. (3.1 & 3.4)
OR
The Responsible Entity
has a process to
perform seven-year
criminal history record
checks for individuals,
including contractors
and service vendors,
with authorized
electronic or authorized
unescorted physical
access but did not
include the required
checks described in
3.2.1 and 3.2.2 for four
Page 27 of 39
CIP-004-7 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-7)
Lower VSL
authorized
electronic or
authorized
unescorted
physical access
but did not
include the
required
checks
described in
3.2.1 and 3.2.2
for one
individual. (3.2
& 3.4)
OR
The
Responsible
Entity did
conduct
Personnel Risk
Assessments
(PRAs) for
individuals,
including
contractors and
service
vendors, with
authorized
Draft 1
November 2019
Moderate VSL
The Responsible Entity
did not conduct
Personnel Risk
Assessments (PRAs) for
two individuals with
authorized electronic or
authorized unescorted
physical access within 7
calendar years of the
previous PRA
completion date. (3.5)
High VSL
The Responsible Entity
did not conduct
Personnel Risk
Assessments (PRAs) for
three individuals with
authorized electronic or
authorized unescorted
physical access within 7
calendar years of the
previous PRA
completion date. (3.5)
Severe VSL
or more individuals. (3.2
& 3.4)
OR
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not evaluate criminal
history records check
for access authorization
for four or more
individuals. (3.3 & 3.4)
OR
The Responsible Entity
did not conduct
Personnel Risk
Assessments (PRAs) for
four or more individuals
with authorized
electronic or authorized
unescorted physical
access within 7 calendar
Page 28 of 39
CIP-004-7 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-7)
Lower VSL
electronic or
authorized
unescorted
physical access
but did not
evaluate
criminal history
records check
for access
authorization
for one
individual. (3.3
& 3.4)
Moderate VSL
High VSL
Severe VSL
years of the previous
PRA completion date.
(3.5)
OR
The
Responsible
Entity did not
conduct
Personnel Risk
Assessments
(PRAs) for one
individual with
authorized
electronic or
authorized
unescorted
physical access
within 7
Draft 1
November 2019
Page 29 of 39
CIP-004-7 — Cyber Security – Personnel & Training
R#
R4
Draft 1
November 2019
Time
Horizon
VRF
Operations
Planning
and Same
Day
Operations
Medium
Violation Severity Levels (CIP-004-7)
Lower VSL
calendar years
of the previous
PRA
completion
date. (3.5)
The
Responsible
Entity did not
verify that
individuals with
active
electronic or
active
unescorted
physical access
have
authorization
records during
a calendar
quarter but did
so less than 10
calendar days
after the start
of a
subsequent
calendar
quarter. (4.2)
Moderate VSL
High VSL
The Responsible Entity
did not verify that
individuals with active
electronic or active
unescorted physical
access have
authorization records
during a calendar
quarter but did so
between 10 and 20
calendar days after the
start of a subsequent
calendar quarter. (4.2)
The Responsible Entity
did not verify that
individuals with active
electronic or active
unescorted physical
access have
authorization records
during a calendar
quarter but did so
between 20 and 30
calendar days after the
start of a subsequent
calendar quarter. (4.2)
OR
OR
The Responsible Entity
has implemented
processes to verify that
user accounts, user
account groups, or user
role categories, and
their specific, associated
privileges are correct
The Responsible Entity
has implemented
processes to verify that
user accounts, user
account groups, or user
role categories, and
their specific, associated
privileges are correct
Severe VSL
The Responsible Entity
did not implement any
documented program(s)
for access management.
(R4)
OR
The Responsible Entity
has not implemented
one or more
documented program(s)
for access management
that includes a process
to authorize electronic
accessor unescorted
physical access. (4.1)
OR
The Responsible Entity
did not verify that
individuals with active
electronic or active
Page 30 of 39
CIP-004-7 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-7)
Lower VSL
OR
The
Responsible
Entity has
implemented
processes to
verify that user
accounts, user
account
groups, or user
role categories,
and their
specific,
associated
privileges are
correct and
necessary
within 15
calendar
months of the
previous
verification but
for 5% or less
of its BES Cyber
Systems,
privileges were
incorrect or
Draft 1
November 2019
Moderate VSL
and necessary within 15
calendar months of the
previous verification but
for more than 5% but
less than (or equal to)
10% of its BES Cyber
Systems, privileges were
incorrect or
unnecessary. (4.3)
High VSL
and necessary within 15
calendar months of the
previous verification but
for more than 10% but
less than (or equal to)
15% of its BES Cyber
Systems, privileges were
incorrect or
unnecessary. (4.3)
Severe VSL
unescorted physical
access have
authorization records
for at least two
consecutive calendar
quarters. (4.2)
OR
The Responsible Entity
has implemented
processes to verify that
user accounts, user
account groups, or user
role categories, and
their specific, associated
privileges are correct
and necessary within 15
calendar months of the
previous verification but
for more than 15% of its
BES Cyber Systems,
privileges were
incorrect or
unnecessary. (4.3)
Page 31 of 39
CIP-004-7 — Cyber Security – Personnel & Training
R#
R5
Time
Horizon
VRF
Same Day
Operations
Medium
and
Operations
Planning
Violation Severity Levels (CIP-004-7)
Lower VSL
unnecessary.
(4.3)
The
Responsible
Entity has
implemented
one or more
process(es) to
revoke the
individual’s
user accounts
upon
termination
action but did
not do so for
within 30
calendar days
of the date of
termination
action for one
or more
individuals.
(5.3)
OR
Draft 1
November 2019
Moderate VSL
The Responsible Entity
has implemented one or
more process(es) to
remove the ability for
unescorted physical
access and Interactive
Remote Access upon a
termination action or
complete the removal
within 24 hours of the
termination action but
did not initiate those
removals for one
individual. (5.1)
High VSL
The Responsible Entity
has implemented one or
more process(es) to
remove the ability for
unescorted physical
access and Interactive
Remote Access upon a
termination action or
complete the removal
within 24 hours of the
termination action but
did not initiate those
removals for two
individuals. (5.1)
Severe VSL
The Responsible Entity
has not implemented
any documented
program(s) for access
revocation for electronic
access or unescorted
physical access. (R5)
OR
The Responsible Entity
has implemented one or
more process(es) to
remove the ability for
unescorted physical
access and Interactive
Remote Access upon a
OR
OR
termination action or
complete the removal
The Responsible Entity
The Responsible Entity
has implemented one or has implemented one or within 24 hours of the
termination action but
more process(es) to
more process(es) to
did not initiate those
determine that an
determine that an
removals for three or
individual no longer
individual no longer
more individuals. (5.1)
requires retention of
requires retention of
access following
access following
OR
reassignments or
reassignments or
Page 32 of 39
CIP-004-7 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-7)
Lower VSL
The
Responsible
Entity has
implemented
one or more
process(es) to
change
passwords for
shared
accounts
known to the
user upon
termination
action,
reassignment,
or transfer, but
did not do so
for within 30
calendar days
of the date of
termination
action,
reassignment,
or transfer for
one or more
individuals.
(5.4)
Moderate VSL
transfers but, for one
individual, did not
revoke the authorized
electronic access to
individual accounts and
authorized unescorted
physical access by the
end of the next calendar
day following the
predetermined date.
(5.2)
High VSL
transfers but, for two
individuals, did not
revoke the authorized
electronic access to
individual accounts and
authorized unescorted
physical access by the
end of the next calendar
day following the
predetermined date.
(5.2)
Severe VSL
The Responsible Entity
has implemented one or
more process(es) to
determine that an
individual no longer
requires retention of
access following
reassignments or
transfers but, for three
or more individuals, did
not revoke the
authorized electronic
access to individual
accounts and authorized
unescorted physical
access by the end of the
next calendar day
following the
predetermined date.
(5.2)
OR
Draft 1
November 2019
Page 33 of 39
CIP-004-7 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-7)
Lower VSL
Moderate VSL
High VSL
Severe VSL
The
Responsible
Entity has
implemented
one or more
process(es) to
determine and
document
extenuating
operating
circumstances
following a
termination
action,
reassignment,
or transfer, but
did not change
one or more
passwords for
shared
accounts
known to the
user within 10
calendar days
following the
end of the
extenuating
operating
Draft 1
November 2019
Page 34 of 39
CIP-004-7 — Cyber Security – Personnel & Training
R#
Draft 1
November 2019
Time
Horizon
VRF
Violation Severity Levels (CIP-004-7)
Lower VSL
circumstances.
(5.4)
Moderate VSL
High VSL
Severe VSL
Page 35 of 39
Guidelines and Technical Basis
D. Regional Variances
None.
E. Interpretations
None.
F. Associated Documents
None.
Version History
Version
Date
Action
1
1/16/06
R3.2 — Change “Control Center” to
“control center.”
2
9/30/09
Modifications to clarify the
requirements and to bring the
compliance elements into conformance
with the latest guidelines for developing
compliance elements of standards.
Change Tracking
3/24/06
Removal of reasonable business
judgment.
Replaced the RRO with the RE as a
responsible entity.
Rewording of Effective Date.
Changed compliance monitor to
Compliance Enforcement Authority.
3
12/16/09
Updated Version Number from -2 to -3
In Requirement 1.6, deleted the
sentence pertaining to removing
component or system from service in
order to perform testing, in response to
FERC order issued September 30, 2009.
3
12/16/09
3
3/31/10
4
1/24/11
Draft 1
November 2019
Approved by the NERC Board of
Trustees.
Approved by FERC.
Approved by the NERC Board of
Trustees.
Page 36 of 39
Guidelines and Technical Basis
Version
Date
5
11/26/12
Adopted by the NERC Board of
Trustees.
5
11/22/13
FERC Order issued approving CIP-004-5.
5.1
9/30/13
Modified two VSLs in R4
Errata
6
11/13/14
Adopted by the NERC Board of
Trustees.
Addressed two
FERC directives
from Order No.
791 related to
identify, assess,
and correct
language and
communication
networks.
6
2/12/15
Adopted by the NERC Board of
Trustees.
Replaces the
version adopted
by the Board on
11/13/2014.
Revised version
addresses
remaining
directives from
Order No. 791
related to
transient devices
and low impact
BES Cyber
Systems.
6
1/21/16
7
TBD
FERC order issued approving CIP-004-6.
Docket No. RM15-14-000
Adopted by the NERC Board of Trustees
Draft 1
November 2019
Action
Change Tracking
Modified to
coordinate with
other CIP
standards and to
revise format to
use RBS
Template.
Revised to
enhance BES
reliability for
entities to
manage their BES
Page 37 of 39
Guidelines and Technical Basis
Version
Date
Action
Change Tracking
Cyber System
Information.
Draft 1
November 2019
Page 38 of 39
Guidelines and Technical Basis
Note: The Guidelines and Technical Basis section has not been revised as part of Project 201902. A separate technical rationale document has been created to cover Project 2019-02
revisions. Future edits to this section will be conducted through the Technical Rationale for
Reliability Standards Project and the Standards Drafting Process.
Draft 1
November 2019
Page 39 of 39
CIP-004-67 — Cyber Security – Personnel & Training
Standard Development Timeline
This section is maintained by the drafting team during the development of the standard and will be
removed when the standard is adopted by the NERC Board of Trustees (Board).
Description of Current Draft
Completed Actions
Standards Committee approved Standard Authorization Request
(SAR) for posting
SAR posted for comment
Anticipated Actions
Date
March 22, 2019
March 28, 2019 –
April 26, 2019
Date
45-day formal or informal comment period with ballot
December 2019
45-day formal or informal comment period with additional ballot
February 2020
10-day final ballot
April 2020
Board adoption
May 2020
New or Modified Term(s) Used in NERC Reliability Standards
This section includes all new or modified terms used in the proposed standard that will be included
in the Glossary of Terms Used in NERC Reliability Standards upon applicable regulatory approval.
Terms used in the proposed standard that are already defined and are not being modified can be
found in the Glossary of Terms Used in NERC Reliability Standards. The new or revised terms listed
below will be presented for approval with the proposed standard. Upon Board adoption, this
section will be removed.
Term(s):
None.
Draft 1
December 2019
Page 1 of 49
CIP-004-67 — Cyber Security – Personnel & Training
A. Introduction
1. Title:
Cyber Security — Personnel & Training
2. Number:
CIP-004-67
3. Purpose:
To minimize the risk against compromise that could lead to misoperation or
instability in the Bulk Electric System (BES) from individuals accessing BES Cyber Systems by
requiring an appropriate level of personnel risk assessment, training, and security awareness in
support of protecting BES Cyber Systems.
4. Applicability:
4.1.
Functional Entities: For the purpose of the requirements contained herein, the following
list of functional entities will be collectively referred to as “Responsible Entities.” For
requirements in this standard where a specific functional entity or subset of functional
entities are the applicable entity or entities, the functional entity or entities are specified
explicitly.
4.1.1. Balancing Authority
4.1.2. Distribution Provider that owns one or more of the following Facilities, systems, and
equipment for the protection or restoration of the BES:
4.1.2.1. Each underfrequency Load shedding (UFLS) or undervoltage Load shedding
(UVLS) system that:
4.1.2.1.1. is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.1.2.1.2. performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation, of
300 MW or more.
4.1.2.2. Each Special Protection System (SPS) or Remedial Action Scheme (RAS) where
the SPS or RAS is subject to one or more requirements in a NERC or Regional
Reliability Standard.
4.1.2.3. Each Protection System (excluding UFLS and UVLS) that applies to Transmission
where the Protection System is subject to one or more requirements in a NERC
or Regional Reliability Standard.
4.1.2.4. Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.1.3. Generator Operator
4.1.4. Generator Owner
4.1.5. Interchange Coordinator or Interchange Authority
4.1.6.4.1.5.
Draft 1
December 2019
Reliability Coordinator
Page 2 of 49
CIP-004-67 — Cyber Security – Personnel & Training
4.1.7.4.1.6.
Transmission Operator
4.1.8.4.1.7.
Transmission Owner
4.2.
Facilities: For the purpose of the requirements contained herein, the following
Facilities, systems, and equipment owned by each Responsible Entity in 4.1 above are
those to which these requirements are applicable. For requirements in this standard
where a specific type of Facilities, system, or equipment or subset of Facilities, systems,
and equipment are applicable, these are specified explicitly.
4.2.1. Distribution Provider: One or more of the following Facilities, systems and
equipment owned by the Distribution Provider for the protection or restoration of
the BES:
4.2.1.1. Each UFLS or UVLS System that:
4.2.1.1.1. is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.2.1.1.2. performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation, of
300 MW or more.
4.2.1.2. Each SPS or RAS where the SPS or RAS is subject to one or more requirements in
a NERC or Regional Reliability Standard.
4.2.1.3. Each Protection System (excluding UFLS and UVLS) that applies to Transmission
where the Protection System is subject to one or more requirements in a NERC
or Regional Reliability Standard.
4.2.1.4. Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.2.2. Responsible Entities listed in 4.1 other than Distribution Providers:
All BES Facilities.
4.2.3. Exemptions: The following are exempt from Standard CIP-004-67:
4.2.3.1. Cyber Assets at Facilities regulated by the Canadian Nuclear Safety Commission.
4.2.3.2. Cyber Assets associated with communication networks and data
communication links between discrete Electronic Security Perimeters.
4.2.3.3. The systems, structures, and components that are regulated by the Nuclear
Regulatory Commission under a cyber security plan pursuant to 10 C.F.R.
Section 73.54.
4.2.3.4. For Distribution Providers, the systems and equipment that are not included in
section 4.2.1 above.
Draft 1
December 2019
Page 3 of 49
CIP-004-67 — Cyber Security – Personnel & Training
4.2.3.5. Responsible Entities that identify that they have no BES Cyber Systems
categorized as high impact or medium impact according to the CIP-002-5.1
identification and categorization processes.
5. Effective Dates:
See Implementation Plan for CIP-004-67.
6. Background:
Standard CIP-004 exists as part of a suite of CIP Standards related to cyber security, which
require the initial identification and categorization of BES Cyber Systems and require a
minimum level of organizational, operational, and procedural controls to mitigate risk to BES
Cyber Systems.
Most requirements open with, “Each Responsible Entity shall implement one or more
documented [processes, plan, etc.] that include the applicable items in [Table Reference].” The
referenced table requires the applicable items in the procedures for the common subject
matter of the requirements.
The term documented processes refers to a set of required instructions specific to the
Responsible Entity and to achieve a specific outcome. This term does not imply any particular
naming or approval structure beyond what is stated in the requirements. An entity should
include as much as it believes necessary in its documented processes, but it must address the
applicable requirements in the table.
The terms program and plan are sometimes used in place of documented processes where it
makes sense and is commonly understood. For example, documented processes describing a
response are typically referred to as plans (i.e., incident response plans and recovery plans).
Likewise, a security plan can describe an approach involving multiple procedures to address a
broad subject matter.
Similarly, the term program may refer to the organization’s overall implementation of its
policies, plans and procedures involving a subject matter. Examples in the standards include
the personnel risk assessment program and the personnel training program. The full
implementation of the CIP Cyber Security Standards could also be referred to as a program.
However, the terms program and plan do not imply any additional requirements beyond what
is stated in the standards.
Responsible Entities can implement common controls that meet requirements for multiple high
and medium impact BES Cyber Systems. For example, a single training program could meet the
requirements for training personnel across multiple BES Cyber Systems.
Measures for the initial requirement are simply the documented processes themselves.
Measures in the table rows provide examples of evidence to show documentation and
implementation of applicable items in the documented processes. These measures serve to
provide guidance to entities in acceptable records of compliance and should not be viewed as
an all-inclusive list.
Draft 1
December 2019
Page 4 of 49
CIP-004-67 — Cyber Security – Personnel & Training
Throughout the standards, unless otherwise stated, bulleted items in the requirements and
measures are items that are linked with an “or,” and numbered items are items that are linked
with an “and.”
Many references in the Applicability section use a threshold of 300 MW for UFLS and UVLS.
This particular threshold of 300 MW for UVLS and UFLS was provided in Version 1 of the CIP
Cyber Security Standards. The threshold remains at 300 MW since it is specifically addressing
UVLS and UFLS, which are last ditch efforts to save the BES. A review of UFLS tolerances defined
within regional reliability standards for UFLS program requirements to date indicates that the
historical value of 300 MW represents an adequate and reasonable threshold value for
allowable UFLS operational tolerances.
“Applicable Systems” Columns in Tables:
Each table has an “Applicable Systems” column to further define the scope of systems to which
a specific requirement row applies. The CSO706 SDT adapted this concept from the National
Institute of Standards and Technology (“NIST”) Risk Management Framework as a way of
applying requirements more appropriately based on impact and connectivity characteristics.
The following conventions are used in the “Applicable Systems” column as described.
• High Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as high impact
according to the CIP-002-5.1 identification and categorization processes.
• Medium Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as medium
impact according to the CIP-002-5.1 identification and categorization processes.
• Medium Impact BES Cyber Systems with External Routable Connectivity – Only applies to
medium impact BES Cyber Systems with External Routable Connectivity. This also excludes
Cyber Assets in the BES Cyber System that cannot be directly accessed through External
Routable Connectivity.
• Electronic Access Control or Monitoring Systems (EACMS) – Applies to each Electronic
Access Control or Monitoring System associated with a referenced high impact BES Cyber
System or medium impact BES Cyber System. Examples may include, but are not limited to,
firewalls, authentication servers, and log monitoring and alerting systems.
• Physical Access Control Systems (PACS) – Applies to each Physical Access Control System
associated with a referenced high impact BES Cyber System or medium impact BES Cyber
System with External Routable Connectivity.
Draft 1
December 2019
Page 5 of 49
CIP-004-67 — Cyber Security – Personnel & Training
B. Requirements and Measures
R1.
Each Responsible Entity shall implement one or more documented processes that collectively include each of the
applicable requirement parts in CIP-004-67 Table R1 – Security Awareness Program. [Violation Risk Factor: Lower] [Time
Horizon: Operations Planning]
M1. Evidence must include each of the applicable documented processes that collectively include each of the applicable
requirement parts in CIP-004-67 Table R1 – Security Awareness Program and additional evidence to demonstrate
implementation as described in the Measures column of the table.
CIP-004-67 Table R1 – Security Awareness Program
Part
1.1
Applicable Systems
High Impact BES Cyber Systems
Medium Impact BES Cyber Systems
Requirements
Security awareness that, at least once
each calendar quarter, reinforces cyber
security practices (which may include
associated physical security practices)
for the Responsible Entity’s personnel
who have authorized electronic or
authorized unescorted physical access
to BES Cyber Systems.
Measures
An example of evidence may include,
but is not limited to, documentation
that the quarterly reinforcement has
been provided. Examples of evidence
of reinforcement may include, but are
not limited to, dated copies of
information used to reinforce security
awareness, as well as evidence of
distribution, such as:
•
•
Draft 1
December 2019
direct communications (for
example, e-mails, memos,
computer-based training); or
indirect communications (for
example, posters, intranet, or
brochures); or
Page 6 of 49
CIP-004-67 — Cyber Security – Personnel & Training
CIP-004-67 Table R1 – Security Awareness Program
Part
Applicable Systems
Requirements
Measures
•
Draft 1
December 2019
management support and
reinforcement (for example,
presentations or meetings).
Page 7 of 49
CIP-004-67 — Cyber Security – Personnel & Training
R2. Each Responsible Entity shall implement one or more cyber security training program(s) appropriate to individual roles,
functions, or responsibilities that collectively includes each of the applicable requirement parts in CIP-004-67 Table R2 –
Cyber Security Training Program. [Violation Risk Factor: Lower] [Time Horizon: Operations Planning]
M2. Evidence must include the training program that includes each of the applicable requirement parts in CIP-004-67 Table R2 –
Cyber Security Training Program and additional evidence to demonstrate implementation of the program(s).
Draft 1
December 2019
Page 8 of 49
CIP-004-67 — Cyber Security – Personnel & Training
CIP-004-67 Table R2 – Cyber Security Training Program
Part
2.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Requirements
Training content on:
2.1.1.
2.1.2.
2.1.3.
2.1.4.
2.1.5.
2.1.6.
2.1.7.
2.1.8.
2.1.9.
Draft 1
December 2019
Cyber security policies;
Physical access controls;
Electronic access controls;
The visitor control program;
Handling of BES Cyber System
Information and its storage;
Identification of a Cyber
Security Incident and initial
notifications in accordance
with the entity’s incident
response plan;
Recovery plans for BES Cyber
Systems;
Response to Cyber Security
Incidents; and
Cyber security risks associated
with a BES Cyber System’s
electronic interconnectivity
and interoperability with
other Cyber Assets, including
Transient Cyber Assets, and
with Removable Media.
Measures
Examples of evidence may include,
but are not limited to, training
material such as power point
presentations, instructor notes,
student notes, handouts, or other
training materials.
Page 9 of 49
CIP-004-67 — Cyber Security – Personnel & Training
CIP-004-67 Table R2 – Cyber Security Training Program
Part
2.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Requirements
Measures
Require completion of the training
specified in Part 2.1 prior to granting
authorized electronic access and
authorized unescorted physical access
to applicable Cyber Assets, except
during CIP Exceptional Circumstances.
Examples of evidence may include,
but are not limited to, training
records and documentation of when
CIP Exceptional Circumstances were
invoked.
Require completion of the training
specified in Part 2.1 at least once
every 15 calendar months.
Examples of evidence may include,
but are not limited to, dated
individual training records.
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
2.3
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 1
December 2019
Page 10 of 49
CIP-004-67 — Cyber Security – Personnel & Training
R3.
Each Responsible Entity shall implement one or more documented personnel risk assessment program(s) to attain and
retain authorized electronic or authorized unescorted physical access to BES Cyber Systems that collectively include each of
the applicable requirement parts in CIP-004-67 Table R3 – Personnel Risk Assessment Program. [Violation Risk Factor:
Medium] [Time Horizon: Operations Planning].
M3. Evidence must include the documented personnel risk assessment programs that collectively include each of the applicable
requirement parts in CIP-004-67 Table R3 – Personnel Risk Assessment Program and additional evidence to demonstrate
implementation of the program(s).
CIP-004-67 Table R3 – Personnel Risk Assessment Program
Part
Applicable Systems
3.1
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Requirements
Process to confirm identity.
Measures
An example of evidence may
include, but is not limited to,
documentation of the Responsible
Entity’s process to confirm identity.
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Draft 1
December 2019
Page 11 of 49
CIP-004-67 — Cyber Security – Personnel & Training
CIP-004-67 Table R3 – Personnel Risk Assessment Program
Part
3.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Requirements
Measures
Process to perform a seven year
criminal history records check as part of
each personnel risk assessment that
includes:
An example of evidence may include,
but is not limited to, documentation of
the Responsible Entity’s process to
perform a seven year criminal history
records check.
3.2.1. current residence, regardless of
duration; and
3.2.2. other locations where, during
the seven years immediately prior to
the date of the criminal history
records check, the subject has resided
for six consecutive months or more.
If it is not possible to perform a full
seven year criminal history records
check, conduct as much of the seven
year criminal history records check as
possible and document the reason the
full seven year criminal history records
check could not be performed.
Draft 1
December 2019
Page 12 of 49
CIP-004-67 — Cyber Security – Personnel & Training
CIP-004-67 Table R3 – Personnel Risk Assessment Program
Part
3.3
Applicable Systems
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Requirements
Measures
Criteria or process to evaluate criminal
history records checks for authorizing
access.
An example of evidence may
include, but is not limited to,
documentation of the
Responsible Entity’s process to
evaluate criminal history records
checks.
Criteria or process for verifying that
personnel risk assessments performed for
contractors or service vendors are
conducted according to Parts 3.1 through
3.3.
An example of evidence may
include, but is not limited to,
documentation of the
Responsible Entity’s criteria or
process for verifying contractors
or service vendors personnel risk
assessments.
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
3.4
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Draft 1
December 2019
Page 13 of 49
CIP-004-67 — Cyber Security – Personnel & Training
CIP-004-67 Table R3 – Personnel Risk Assessment Program
Part
3.5
Applicable Systems
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Draft 1
December 2019
Requirements
Measures
Process to ensure that individuals with
authorized electronic or authorized
unescorted physical access have had a
personnel risk assessment completed
according to Parts 3.1 to 3.4 within the last
seven years.
An example of evidence may
include, but is not limited to,
documentation of the
Responsible Entity’s process for
ensuring that individuals with
authorized electronic or
authorized unescorted physical
access have had a personnel risk
assessment completed within the
last seven years.
Page 14 of 49
CIP-004-67 — Cyber Security – Personnel & Training
R4. Each Responsible Entity shall implement one or more documented access management program(s) that collectively include
each of the applicable requirement parts in CIP-004-67 Table R4 – Access Management Program. [Violation Risk Factor:
Medium] [Time Horizon: Operations Planning and Same Day Operations].
M4. Evidence must include the documented processes that collectively include each of the applicable requirement parts in CIP004-67 Table R4 – Access Management Program and additional evidence to demonstrate that the access management
program was implemented as described in the Measures column of the table.
CIP-004-67 Table R4 – Access Management Program
Part
Applicable Systems
4.1
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Process to authorize based on need, as
determined by the Responsible Entity,
except for CIP Exceptional
Circumstances:
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
4.1.1. Electronic access; and
4.1.2. Unescorted physical access into a
Physical Security Perimeter.; and
4.1.3. Access to designated storage
locations, whether physical or
electronic, for BES Cyber System
Information.
Draft 1
December 2019
Requirements
Measures
An example of evidence may
include, but is not limited to, dated
documentation of the process to
authorize electronic access and,
unescorted physical access into a
Physical Security Perimeter, and
access to designated storage
locations, whether physical or
electronic, for BES Cyber System
Information.
Page 15 of 49
CIP-004-67 — Cyber Security – Personnel & Training
CIP-004-67 Table R4 – Access Management Program
Part
Applicable Systems
Requirements
4.2
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Verify at least once each calendar
quarter that individuals with active
electronic access or unescorted physical
access have authorization records.
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Draft 1
December 2019
Measures
Examples of evidence may include,
but are not limited to:
Dated documentation of the
verification between the system
generated list of individuals who
have been authorized for access
(i.e., workflow database) and a
system generated list of
personnel who have access (i.e.,
user account listing), or
• Dated documentation of the
verification between a list of
individuals who have been
authorized for access (i.e.,
authorization forms) and a list
of individuals provisioned for
access (i.e., provisioning forms
or shared account listing).
•
Page 16 of 49
CIP-004-67 — Cyber Security – Personnel & Training
CIP-004-67 Table R4 – Access Management Program
Part
Applicable Systems
Requirements
4.3
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
For electronic access, verify at least once
every 15 calendar months that all user
accounts, user account groups, or user
role categories, and their specific,
associated privileges are correct and are
those that the Responsible Entity
determines are necessary.
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Draft 1
December 2019
Measures
An example of evidence may
include, but is not limited to,
documentation of the review that
includes all of the following:
1. A dated listing of all
accounts/account groups or
roles within the system;
2. A summary description of
privileges associated with
each group or role;
3. Accounts assigned to the
group or role; and
4. Dated evidence showing
verification of the privileges
for the group are authorized
and appropriate to the work
function performed by
people assigned to each
account.
Page 17 of 49
CIP-004-67 — Cyber Security – Personnel & Training
CIP-004-7 Table R4 – Access Management Program
Part
Applicable Systems
Requirements
4.4
High Impact BES Cyber Systems and their
associated:
EACMS; and
3. PACS
Verify at least once every 15 calendar
months that access to the designated
storage locations for BES Cyber System
Information, whether physical or
electronic, are correct and are those that
the Responsible Entity determines are
necessary for performing assigned work
functions.
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
2. EACMS; and
2. PACS
Draft 1
December 2019
Measures
An example of evidence may
include, but is not limited to,
documentation of the review that
includes all of the following:
1. A dated listing of
authorizations for BES Cyber
System information;
2. Any privileges associated
with the authorizations; and
3. Dated evidence showing a
verification of the
authorizations and any
privileges were confirmed
correct and the minimum
necessary for performing
assigned work functions
Page 18 of 49
CIP-004-67 — Cyber Security – Personnel & Training
R5. Each Responsible Entity shall implement one or more documented access revocation program(s) that collectively include
each of the applicable requirement parts in CIP-004-67 Table R5 – Access Revocation. [Violation Risk Factor: Medium] [Time
Horizon: Same Day Operations and Operations Planning].
M5. Evidence must include each of the applicable documented programs that collectively include each of the applicable
requirement parts in CIP-004-67 Table R5 – Access Revocation and additional evidence to demonstrate implementation as
described in the Measures column of the table.
CIP-004-67 Table R5 – Access Revocation
Part
5.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 1
December 2019
Requirements
Measures
A process to initiate removal of an
individual’s ability for unescorted
physical access and Interactive Remote
Access upon a termination action, and
complete the removals within 24 hours
of the termination action (Removal of
the ability for access may be different
than deletion, disabling, revocation, or
removal of all access rights).
An example of evidence may include,
but is not limited to, documentation of
all of the following:
1. Dated workflow or sign-off form
verifying access removal
associated with the termination
action; and
2. Logs or other demonstration
showing such persons no longer
have access.
Page 19 of 49
CIP-004-67 — Cyber Security – Personnel & Training
CIP-004-67 Table R5 – Access Revocation
Part
5.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 1
December 2019
Requirements
Measures
For reassignments or transfers, revoke
the individual’s authorized electronic
access to individual accounts and
authorized unescorted physical access
that the Responsible Entity determines
are not necessary by the end of the
next calendar day following the date
that the Responsible Entity determines
that the individual no longer requires
retention of that access.
An example of evidence may include,
but is not limited to, documentation of
all of the following:
1. Dated workflow or sign-off form
showing a review of logical and
physical access; and
2. Logs or other demonstration
showing such persons no longer
have access that the
Responsible Entity determines
is not necessary.
Page 20 of 49
CIP-004-67 — Cyber Security – Personnel & Training
CIP-004-67 Table R5 – Access Revocation
Part
5.3
Applicable Systems
High Impact BES Cyber Systems and
their associated:
0. EACMS; and
0. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
0. EACMS; and
0. PACS
Draft 1
December 2019
Requirements
Measures
For termination actions, revoke the
individual’s access to the designated
storage locations for BES Cyber System
Information, whether physical or
electronic (unless already revoked
according to Requirement R5.1), by the
end of the next calendar day following
the effective date of the termination
action.
An example of evidence may include,
but is not limited to, workflow or signoff form verifying access removal to
designated physical areas or cyber
systems containing BES Cyber System
Information associated with the
terminations and dated within the next
calendar day of the termination action.
Page 21 of 49
CIP-004-67 — Cyber Security – Personnel & Training
CIP-004-67 Table R5 – Access Revocation
Part
5.43
Applicable Systems
High Impact BES Cyber Systems and
their associated:
• EACMS
Draft 1
December 2019
Requirements
For termination actions, revoke the
individual’s non-shared user accounts
(unless already revoked according to
Parts 5.1 or 5.3) within 30 calendar
days of the effective date of the
termination action.
Measures
An example of evidence may include,
but is not limited to, workflow or signoff form showing access removal for
any individual BES Cyber Assets and
software applications as determined
necessary to completing the revocation
of access and dated within thirty
calendar days of the termination
actions.
Page 22 of 49
CIP-004-67 — Cyber Security – Personnel & Training
CIP-004-67 Table R5 – Access Revocation
Part
Applicable Systems
5.54 High Impact BES Cyber Systems and
their associated:
• EACMS
Requirements
Measures
For termination actions, change
Examples of evidence may include, but
passwords for shared account(s) known are not limited to:
to the user within 30 calendar days of
• Workflow or sign-off form
the termination action. For
showing password reset within
reassignments or transfers, change
30 calendar days of the
passwords for shared account(s) known
termination;
to the user within 30 calendar days
• Workflow or sign-off form
following the date that the Responsible
showing password reset within
Entity determines that the individual no
30 calendar days of the
longer requires retention of that
reassignments or transfers; or
access.
• Documentation of the
extenuating operating
If the Responsible Entity determines
circumstance and workflow or
and documents that extenuating
sign-off form showing password
operating circumstances require a
reset within 10 calendar days
longer time period, change the
following the end of the
password(s) within 10 calendar days
operating circumstance.
following the end of the operating
circumstances.
Draft 1
December 2019
Page 23 of 49
CIP-004-67 — Cyber Security – Personnel & Training
C. Compliance
1. Compliance Monitoring Process:
1.1. Compliance Enforcement Authority:
As defined in the NERC Rules of Procedure, “Compliance Enforcement Authority” (CEA)
means NERC or the Regional Entity in their respective roles of monitoring and enforcing
compliance with the NERC Reliability Standards.
1.2. Evidence Retention:
The following evidence retention periods identify the period of time an entity is
required to retain specific evidence to demonstrate compliance. For instances where
the evidence retention period specified below is shorter than the time since the last
audit, the CEA may ask an entity to provide other evidence to show that it was
compliant for the full time period since the last audit.
The Responsible Entity shall keep data or evidence to show compliance as identified
below unless directed by its CEA to retain specific evidence for a longer period of time
as part of an investigation:
•
Each Responsible Entity shall retain evidence of each requirement in this standard for
three calendar years.
•
If a Responsible Entity is found non-compliant, it shall keep information related to the
non-compliance until mitigation is complete and approved or for the time specified
above, whichever is longer.
•
The CEA shall keep the last audit records and all requested and submitted subsequent
audit records.
1.3. Compliance Monitoring and Assessment Processes:
Compliance Audits
Self-Certifications
Spot Checking
Compliance Violation Investigations
Self-Reporting
Complaints
1.4. Additional Compliance Information:
None
Draft 1
November 2019
Page 24 of 49
CIP-004-67 — Cyber Security – Personnel & Training
2. Table of Compliance Elements
R#
Time
Horizon
R1
R2
Draft 1
November 2019
Operations
Planning
Operations
Planning
VRF
Violation Severity Levels (CIP-004-67)
Lower VSL
Lower
Lower
Moderate VSL
High VSL
Severe VSL
The
Responsible
Entity did not
reinforce cyber
security
practices
during a
calendar
quarter but did
so less than 10
calendar days
after the start
of a
subsequent
calendar
quarter. (1.1)
The Responsible Entity
did not reinforce cyber
security practices during
a calendar quarter but
did so between 10 and
30 calendar days after
the start of a
subsequent calendar
quarter. (1.1)
The Responsible Entity
did not reinforce cyber
security practices during
a calendar quarter but
did so within the
subsequent quarter but
beyond 30 calendar
days after the start of
that calendar quarter.
(1.1)
The Responsible Entity
did not document or
implement any security
awareness process(es)
to reinforce cyber
security practices. (R1)
The
Responsible
Entity
implemented a
cyber security
training
program but
failed to
include one of
the training
The Responsible Entity
implemented a cyber
security training
program but failed to
include two of the
training content topics
in Requirement Parts
2.1.1 through 2.1.9.
(2.1)
The Responsible Entity
implemented a cyber
security training
program but failed to
include three of the
training content topics
in Requirement Parts
2.1.1 through 2.1.9.
(2.1)
The Responsible Entity
did not implement a
cyber security training
program appropriate to
individual roles,
functions, or
responsibilities. (R2)
OR
OR
OR
The Responsible Entity
did not reinforce cyber
security practices and
associated physical
security practices for at
least two consecutive
calendar quarters. (1.1)
OR
Page 25 of 49
CIP-004-67 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-67)
Lower VSL
content topics
in Requirement
Parts 2.1.1
through 2.1.9.
(2.1)
OR
The
Responsible
Entity
implemented a
cyber security
training
program but
failed to train
one individual
(with the
exception of
CIP Exceptional
Circumstances)
prior to their
being granted
authorized
electronic and
authorized
unescorted
physical access.
(2.2)
Draft 1
November 2019
Moderate VSL
High VSL
The Responsible Entity
implemented a cyber
security training
program but failed to
train two individuals
(with the exception of
CIP Exceptional
Circumstances) prior to
their being granted
authorized electronic
and authorized
unescorted physical
access. (2.2)
The Responsible Entity
implemented a cyber
security training
program but failed to
train three individuals
(with the exception of
CIP Exceptional
Circumstances) prior to
their being granted
authorized electronic
and authorized
unescorted physical
access. (2.2)
OR
OR
The Responsible Entity
implemented a cyber
security training
program but failed to
train two individuals
with authorized
electronic or authorized
unescorted physical
access within 15
calendar months of the
previous training
completion date. (2.3)
The Responsible Entity
implemented a cyber
security training
program but failed to
train three individuals
with authorized
electronic or authorized
unescorted physical
access within 15
calendar months of the
previous training
completion date. (2.3)
Severe VSL
The Responsible Entity
implemented a cyber
security training
program but failed to
include four or more of
the training content
topics in Requirement
Parts 2.1.1 through
2.1.9. (2.1)
OR
The Responsible Entity
implemented a cyber
security training
program but failed to
train four or more
individuals (with the
exception of CIP
Exceptional
Circumstances) prior to
their being granted
authorized electronic
and authorized
unescorted physical
access. (2.2)
OR
Page 26 of 49
CIP-004-67 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-67)
Lower VSL
Moderate VSL
High VSL
The Responsible Entity
implemented a cyber
security training
program but failed to
train four or more
individuals with
authorized electronic or
authorized unescorted
physical access within
15 calendar months of
the previous training
completion date. (2.3)
OR
The
Responsible
Entity
implemented a
cyber security
training
program but
failed to train
one individual
with authorized
electronic or
authorized
unescorted
physical access
within 15
calendar
months of the
previous
training
completion
date. (2.3)
R3
Draft 1
November 2019
Operations
Planning
Medium
The
Responsible
Entity has a
program for
conducting
Severe VSL
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments (PRAs)
for individuals, including
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments (PRAs)
for individuals, including
The Responsible Entity
did not have all of the
required elements as
described by 3.1
through 3.4 included
Page 27 of 49
CIP-004-67 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-67)
Lower VSL
Personnel Risk
Assessments
(PRAs) for
individuals,
including
contractors and
service
vendors, but
did not conduct
the PRA as a
condition of
granting
authorized
electronic or
authorized
unescorted
physical access
for one
individual. (R3)
OR
The
Responsible
Entity did
conduct
Personnel Risk
Assessments
(PRAs) for
individuals,
Draft 1
November 2019
Moderate VSL
contractors and service
vendors, but did not
conduct the PRA as a
condition of granting
authorized electronic or
authorized unescorted
physical access for two
individuals. (R3)
High VSL
contractors and service
vendors, but did not
conduct the PRA as a
condition of granting
authorized electronic or
authorized unescorted
physical access for three
individuals. (R3)
OR
OR
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not confirm identity for
two individuals. (3.1 &
3.4)
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not confirm identity for
three individuals. (3.1 &
3.4)
OR
OR
The Responsible Entity
has a process to
perform seven-year
criminal history record
checks for individuals,
The Responsible Entity
has a process to
perform seven-year
criminal history record
checks for individuals,
Severe VSL
within documented
program(s) for
implementing Personnel
Risk Assessments
(PRAs), for individuals,
including contractors
and service vendors, for
obtaining and retaining
authorized cyber or
authorized unescorted
physical access. (R3)
OR
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, but did not
conduct the PRA as a
condition of granting
authorized electronic or
authorized unescorted
physical access for four
or more individuals. (R3)
OR
Page 28 of 49
CIP-004-67 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-67)
Lower VSL
including
contractors and
service
vendors, with
authorized
electronic or
authorized
unescorted
physical access
but did not
confirm
identity for one
individual. (3.1
& 3.4)
OR
Moderate VSL
including contractors
and service vendors,
with authorized
electronic or authorized
unescorted physical
access but did not
include the required
checks described in
3.2.1 and 3.2.2 for two
individuals. (3.2 & 3.4)
High VSL
including contractors
and service vendors,
with authorized
electronic or authorized
unescorted physical
access but did not
include the required
checks described in
3.2.1 and 3.2.2 for three
individuals. (3.2 & 3.4)
OR
OR
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not evaluate criminal
history records check
for access authorization
for two individuals. (3.3
& 3.4)
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not evaluate criminal
history records check
for access authorization
for three individuals.
(3.3 & 3.4)
The
Responsible
Entity has a
process to
perform sevenyear criminal
history record
checks for
individuals,
including
contractors and OR
service
vendors, with
Draft 1
November 2019
OR
Severe VSL
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not confirm identity for
four or more
individuals. (3.1 & 3.4)
OR
The Responsible Entity
has a process to
perform seven-year
criminal history record
checks for individuals,
including contractors
and service vendors,
with authorized
electronic or authorized
unescorted physical
access but did not
include the required
checks described in
3.2.1 and 3.2.2 for four
Page 29 of 49
CIP-004-67 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-67)
Lower VSL
authorized
electronic or
authorized
unescorted
physical access
but did not
include the
required
checks
described in
3.2.1 and 3.2.2
for one
individual. (3.2
& 3.4)
OR
The
Responsible
Entity did
conduct
Personnel Risk
Assessments
(PRAs) for
individuals,
including
contractors and
service
vendors, with
authorized
Draft 1
November 2019
Moderate VSL
The Responsible Entity
did not conduct
Personnel Risk
Assessments (PRAs) for
two individuals with
authorized electronic or
authorized unescorted
physical access within 7
calendar years of the
previous PRA
completion date. (3.5)
High VSL
The Responsible Entity
did not conduct
Personnel Risk
Assessments (PRAs) for
three individuals with
authorized electronic or
authorized unescorted
physical access within 7
calendar years of the
previous PRA
completion date. (3.5)
Severe VSL
or more individuals. (3.2
& 3.4)
OR
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not evaluate criminal
history records check
for access authorization
for four or more
individuals. (3.3 & 3.4)
OR
The Responsible Entity
did not conduct
Personnel Risk
Assessments (PRAs) for
four or more individuals
with authorized
electronic or authorized
unescorted physical
access within 7 calendar
Page 30 of 49
CIP-004-67 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-67)
Lower VSL
electronic or
authorized
unescorted
physical access
but did not
evaluate
criminal history
records check
for access
authorization
for one
individual. (3.3
& 3.4)
Moderate VSL
High VSL
Severe VSL
years of the previous
PRA completion date.
(3.5)
OR
The
Responsible
Entity did not
conduct
Personnel Risk
Assessments
(PRAs) for one
individual with
authorized
electronic or
authorized
unescorted
physical access
within 7
Draft 1
November 2019
Page 31 of 49
CIP-004-67 — Cyber Security – Personnel & Training
R#
R4
Draft 1
November 2019
Time
Horizon
VRF
Operations
Planning
and Same
Day
Operations
Medium
Violation Severity Levels (CIP-004-67)
Lower VSL
calendar years
of the previous
PRA
completion
date. (3.5)
The
Responsible
Entity did not
verify that
individuals with
active
electronic or
active
unescorted
physical access
have
authorization
records during
a calendar
quarter but did
so less than 10
calendar days
after the start
of a
subsequent
calendar
quarter. (4.2)
Moderate VSL
High VSL
The Responsible Entity
did not verify that
individuals with active
electronic or active
unescorted physical
access have
authorization records
during a calendar
quarter but did so
between 10 and 20
calendar days after the
start of a subsequent
calendar quarter. (4.2)
The Responsible Entity
did not verify that
individuals with active
electronic or active
unescorted physical
access have
authorization records
during a calendar
quarter but did so
between 20 and 30
calendar days after the
start of a subsequent
calendar quarter. (4.2)
OR
OR
The Responsible Entity
has implemented
processes to verify that
user accounts, user
account groups, or user
role categories, and
their specific, associated
privileges are correct
The Responsible Entity
has implemented
processes to verify that
user accounts, user
account groups, or user
role categories, and
their specific, associated
privileges are correct
Severe VSL
The Responsible Entity
did not implement any
documented program(s)
for access management.
(R4)
OR
The Responsible Entity
has not implemented
one or more
documented program(s)
for access management
that includes a process
to authorize electronic
access,or unescorted
physical access, or
access to the designated
storage locations where
BES Cyber System
Information is located.
(4.1)
Page 32 of 49
CIP-004-67 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-67)
Lower VSL
OR
The
Responsible
Entity has
implemented
processes to
verify that user
accounts, user
account
groups, or user
role categories,
and their
specific,
associated
privileges are
correct and
necessary
within 15
calendar
months of the
previous
verification but
for 5% or less
of its BES Cyber
Systems,
privileges were
incorrect or
Draft 1
November 2019
Moderate VSL
and necessary within 15
calendar months of the
previous verification but
for more than 5% but
less than (or equal to)
10% of its BES Cyber
Systems, privileges were
incorrect or
unnecessary. (4.3)
High VSL
and necessary within 15
calendar months of the
previous verification but
for more than 10% but
less than (or equal to)
15% of its BES Cyber
Systems, privileges were
incorrect or
unnecessary. (4.3)
OR
OR
The Responsible Entity
has implemented
processes to verify that
access to the designated
storage locations for
BES Cyber System
Information is correct
and necessary within 15
calendar months of the
previous verification but
for more than 5% but
less than (or equal to)
10% of its BES Cyber
System Information
storage locations,
privileges were
The Responsible Entity
has implemented
processes to verify that
access to the designated
storage locations for
BES Cyber System
Information is correct
and necessary within 15
calendar months of the
previous verification but
for more than 10% but
less than (or equal to)
15% of its BES Cyber
System Information
storage locations,
privileges were
Severe VSL
OR
The Responsible Entity
did not verify that
individuals with active
electronic or active
unescorted physical
access have
authorization records
for at least two
consecutive calendar
quarters. (4.2)
OR
The Responsible Entity
has implemented
processes to verify that
user accounts, user
account groups, or user
role categories, and
their specific, associated
privileges are correct
and necessary within 15
calendar months of the
previous verification but
for more than 15% of its
BES Cyber Systems,
privileges were
Page 33 of 49
CIP-004-67 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-67)
Lower VSL
unnecessary.
(4.3)
OR
The
Responsible
Entity has
implemented
processes to
verify that
access to the
designated
storage
locations for
BES Cyber
System
Information is
correct and
necessary
within 15
calendar
months of the
previous
verification but
for 5% or less
of its BES Cyber
System
Information
storage
Draft 1
November 2019
Moderate VSL
incorrect or
unnecessary. (4.4)
High VSL
incorrect or
unnecessary. (4.4)
Severe VSL
incorrect or
unnecessary. (4.3)
OR
The Responsible Entity
has implemented
processes to verify that
access to the designated
storage locations for
BES Cyber System
Information is correct
and necessary within 15
calendar months of the
previous verification but
for more than 15% of its
BES Cyber System
Information storage
locations, privileges
were incorrect or
unnecessary. (4.4)
Page 34 of 49
CIP-004-67 — Cyber Security – Personnel & Training
R#
R5
Time
Horizon
VRF
Same Day
Operations
Medium
and
Operations
Planning
Draft 1
November 2019
Violation Severity Levels (CIP-004-67)
Lower VSL
locations,
privileges were
incorrect or
unnecessary.
(4.4)
The
Responsible
Entity has
implemented
one or more
process(es) to
revoke the
individual’s
access to the
designated
storage
locations for
BES Cyber
System
Information
but, for one
individual, did
not do so by
the end of the
next calendar
day following
the effective
date and time
Moderate VSL
The Responsible Entity
has implemented one or
more process(es) to
remove the ability for
unescorted physical
access and Interactive
Remote Access upon a
termination action or
complete the removal
within 24 hours of the
termination action but
did not initiate those
removals for one
individual. (5.1)
High VSL
The Responsible Entity
has implemented one or
more process(es) to
remove the ability for
unescorted physical
access and Interactive
Remote Access upon a
termination action or
complete the removal
within 24 hours of the
termination action but
did not initiate those
removals for two
individuals. (5.1)
Severe VSL
The Responsible Entity
has not implemented
any documented
program(s) for access
revocation for electronic
access or, unescorted
physical access, or BES
Cyber System
Information storage
locations. (R5)
OR
The Responsible Entity
has implemented one or
more process(es) to
remove the ability for
OR
OR
unescorted physical
access and Interactive
The Responsible Entity
The Responsible Entity
has implemented one or has implemented one or Remote Access upon a
termination action or
more process(es) to
more process(es) to
complete the removal
determine that an
determine that an
within 24 hours of the
individual no longer
individual no longer
termination action but
requires retention of
requires retention of
did not initiate those
Page 35 of 49
CIP-004-67 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-67)
Lower VSL
of the
termination
action. (5.3)
OR
The
Responsible
Entity has
implemented
one or more
process(es) to
revoke the
individual’s
user accounts
upon
termination
action but did
not do so for
within 30
calendar days
of the date of
termination
action for one
or more
individuals.
(5.43)
OR
The
Responsible
Draft 1
November 2019
Moderate VSL
access following
reassignments or
transfers but, for one
individual, did not
revoke the authorized
electronic access to
individual accounts and
authorized unescorted
physical access by the
end of the next calendar
day following the
predetermined date.
(5.2)
High VSL
access following
reassignments or
transfers but, for two
individuals, did not
revoke the authorized
electronic access to
individual accounts and
authorized unescorted
physical access by the
end of the next calendar
day following the
predetermined date.
(5.2)
Severe VSL
removals for three or
more individuals. (5.1)
OR
The Responsible Entity
has implemented one or
more process(es) to
determine that an
individual no longer
requires retention of
access following
reassignments or
transfers but, for three
or more individuals, did
OR
OR
not revoke the
The Responsible Entity
The Responsible Entity
authorized electronic
has implemented one or has implemented one or access to individual
more process(es) to
more process(es) to
accounts and authorized
revoke the individual’s
revoke the individual’s
unescorted physical
access to the designated access to the designated access by the end of the
storage locations for
storage locations for
next calendar day
following the
BES Cyber System
BES Cyber System
predetermined date.
Information but, for two Information but, for
(5.2)
individuals, did not do
three or more
so by the end of the
individuals, did not do
next calendar day
so by the end of the
following the effective
next calendar day
date and time of the
following the effective
Page 36 of 49
CIP-004-67 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-67)
Lower VSL
Entity has
implemented
one or more
process(es) to
change
passwords for
shared
accounts
known to the
user upon
termination
action,
reassignment,
or transfer, but
did not do so
for within 30
calendar days
of the date of
termination
action,
reassignment,
or transfer for
one or more
individuals.
(5.54)
Moderate VSL
termination action.
(5.3)
High VSL
date and time of the
termination action. (5.3)
Severe VSL
OR
The
Responsible
Draft 1
November 2019
Page 37 of 49
CIP-004-67 — Cyber Security – Personnel & Training
R#
Draft 1
November 2019
Time
Horizon
VRF
Violation Severity Levels (CIP-004-67)
Lower VSL
Entity has
implemented
one or more
process(es) to
determine and
document
extenuating
operating
circumstances
following a
termination
action,
reassignment,
or transfer, but
did not change
one or more
passwords for
shared
accounts
known to the
user within 10
calendar days
following the
end of the
extenuating
operating
circumstances.
(5.54)
Moderate VSL
High VSL
Severe VSL
Page 38 of 49
Guidelines and Technical Basis
D. Regional Variances
None.
E. Interpretations
None.
F. Associated Documents
None.
Version History
Version
Date
Action
1
1/16/06
R3.2 — Change “Control Center” to
“control center.”
2
9/30/09
Modifications to clarify the
requirements and to bring the
compliance elements into conformance
with the latest guidelines for developing
compliance elements of standards.
Change Tracking
3/24/06
Removal of reasonable business
judgment.
Replaced the RRO with the RE as a
responsible entity.
Rewording of Effective Date.
Changed compliance monitor to
Compliance Enforcement Authority.
3
12/16/09
Updated Version Number from -2 to -3
In Requirement 1.6, deleted the
sentence pertaining to removing
component or system from service in
order to perform testing, in response to
FERC order issued September 30, 2009.
3
12/16/09
3
3/31/10
4
1/24/11
Draft 1
November 2019
Approved by the NERC Board of
Trustees.
Approved by FERC.
Approved by the NERC Board of
Trustees.
Page 39 of 49
Guidelines and Technical Basis
Version
Date
5
11/26/12
Adopted by the NERC Board of
Trustees.
5
11/22/13
FERC Order issued approving CIP-004-5.
5.1
9/30/13
Modified two VSLs in R4
Errata
6
11/13/14
Adopted by the NERC Board of
Trustees.
Addressed two
FERC directives
from Order No.
791 related to
identify, assess,
and correct
language and
communication
networks.
6
2/12/15
Adopted by the NERC Board of
Trustees.
Replaces the
version adopted
by the Board on
11/13/2014.
Revised version
addresses
remaining
directives from
Order No. 791
related to
transient devices
and low impact
BES Cyber
Systems.
6
1/21/16
7
TBD
FERC order issued approving CIP-004-6.
Docket No. RM15-14-000
Adopted by the NERC Board of Trustees
Draft 1
November 2019
Action
Change Tracking
Modified to
coordinate with
other CIP
standards and to
revise format to
use RBS
Template.
Revised to
enhance BES
reliability for
entities to
manage their BES
Page 40 of 49
Guidelines and Technical Basis
Version
Date
Action
Change Tracking
Cyber System
Information.
Draft 1
November 2019
Page 41 of 49
Guidelines and Technical Basis
Note: The Guidelines and Technical Basis section has not been revised as part of Project 201902. A separate technical rationale document has been created to cover Project 2019-02
revisions. Future edits to this section will be conducted through the Technical Rationale for
Reliability Standards Project and the Standards Drafting Process.
Guidelines and Technical Basis
Section 4 – Scope of Applicability of the CIP Cyber Security Standards
Section “4. Applicability” of the standards provides important information for Responsible
Entities to determine the scope of the applicability of the CIP Cyber Security Requirements.
Section “4.1. Functional Entities” is a list of NERC functional entities to which the standard
applies. If the entity is registered as one or more of the functional entities listed in Section
4.1, then the NERC CIP Cyber Security Standards apply. Note that there is a qualification in
Section 4.1 that restricts the applicability in the case of Distribution Providers to only those
that own certain types of systems and equipment listed in 4.2.
Section “4.2. Facilities” defines the scope of the Facilities, systems, and equipment owned by
the Responsible Entity, as qualified in Section 4.1, that is subject to the requirements of the
standard. As specified in the exemption section 4.2.3.5, this standard does not apply to
Responsible Entities that do not have High Impact or Medium Impact BES Cyber Systems
under CIP-002-5.1’s categorization. In addition to the set of BES Facilities, Control Centers,
and other systems and equipment, the list includes the set of systems and equipment owned
by Distribution Providers. While the NERC Glossary term “Facilities” already includes the BES
characteristic, the additional use of the term BES here is meant to reinforce the scope of
applicability of these Facilities where it is used, especially in this applicability scoping section.
This in effect sets the scope of Facilities, systems, and equipment that is subject to the
standards.
Requirement R1:
The security awareness program is intended to be an informational program, not a formal
training program. It should reinforce security practices to ensure that personnel maintain
awareness of best practices for both physical and electronic security to protect its BES Cyber
Systems. The Responsible Entity is not required to provide records that show that each
individual received or understood the information, but they must maintain documentation of
the program materials utilized in the form of posters, memos, and/or presentations.
Examples of possible mechanisms and evidence, when dated, which can be used are:
Direct communications (e.g., emails, memos, computer based training, etc.);
Indirect communications (e.g., posters, intranet, brochures, etc.);
Draft 1
November 2019
Page 42 of 49
Guidelines and Technical Basis
Management support and reinforcement (e.g., presentations, meetings, etc.).
Requirement R2:
Training shall cover the policies, access controls, and procedures as developed for the BES
Cyber Systems and include, at a minimum, the required items appropriate to personnel roles
and responsibilities from Table R2. The Responsible Entity has the flexibility to define the
training program and it may consist of multiple modules and multiple delivery mechanisms,
but a single training program for all individuals needing to be trained is acceptable. The
training can focus on functions, roles or responsibilities at the discretion of the Responsible
Entity.
One new element in the training content is intended to encompass networking hardware and
software and other issues of electronic interconnectivity supporting the operation and
control of BES Cyber Systems as per FERC Order No. 706, Paragraph 434. Additionally,
training should address the risk posed when connecting and using Transient Cyber Assets and
Removable Media with BES Cyber Systems or within an Electronic Security Perimeter. As
noted in FERC Order No. 791, Paragraph 135, Transient Cyber Assets and Removable Media
have been the source of incidents where malware was introduced into electric generation
industrial control systems in real-world situations. Training on their use is a key element in
protecting BES Cyber Systems. This is not intended to provide technical training to individuals
supporting networking hardware and software, but educating system users of the cyber
security risks associated with the interconnectedness of these systems. The users, based on
their function, role, or responsibility, should have a basic understanding of which systems can
be accessed from other systems and how the actions they take can affect cyber security.
Each Responsible Entity shall ensure all personnel who are granted authorized electronic
access and/or authorized unescorted physical access to its BES Cyber Systems, including
contractors and service vendors, complete cyber security training prior to their being granted
authorized access, except for CIP Exceptional Circumstances. To retain the authorized
accesses, individuals must complete the training at least one every 15 months.
Requirement R3:
Each Responsible Entity shall ensure a personnel risk assessment is performed for all
personnel who are granted authorized electronic access and/or authorized unescorted
physical access to its BES Cyber Systems, including contractors and service vendors, prior to
their being granted authorized access, except for program specified exceptional
circumstances that are approved by the single senior management official or their delegate
and impact the reliability of the BES or emergency response. Identity should be confirmed in
accordance with federal, state, provincial, and local laws, and subject to existing collective
bargaining unit agreements. Identity only needs to be confirmed prior to initially granting
access and only requires periodic confirmation according to the entity’s process during the
tenure of employment, which may or may not be the same as the initial verification action.
A seven year criminal history check should be performed for those locations where the
individual has resided for at least six consecutive months. This check should also be
performed in accordance with federal, state, provincial, and local laws, and subject to existing
Draft 1
November 2019
Page 43 of 49
Guidelines and Technical Basis
collective bargaining unit agreements. When it is not possible to perform a full seven year
criminal history check, documentation must be made of what criminal history check was
performed, and the reasons a full seven-year check could not be performed. Examples of this
could include individuals under the age of 25 where a juvenile criminal history may be
protected by law, individuals who may have resided in locations from where it is not possible
to obtain a criminal history records check, violates the law or is not allowed under the
existing collective bargaining agreement. The Responsible Entity should consider the absence
of information for the full seven years when assessing the risk of granting access during the
process to evaluate the criminal history check. There needs to be a personnel risk assessment
that has been completed within the last seven years for each individual with access. A new
criminal history records check must be performed as part of the new PRA. Individuals who
have been granted access under a previous version of these standards need a new PRA within
seven years of the date of their last PRA. The clarifications around the seven year criminal
history check in this version do not require a new PRA be performed by the implementation
date.
Requirement R4:
Authorization for electronic and unescorted physical access and access to BES Cyber System
Information must be on the basis of necessity in the individual performing a work function.
Documentation showing the authorization should have some justification of the business
need included. To ensure proper segregation of duties, access authorization and provisioning
should not be performed by the same person where possible.
This requirement specifies both quarterly reviews and reviews at least once every 15 calendar
months. Quarterly reviews are to perform a validation that only authorized users have been
granted access to BES Cyber Systems. This is achieved by comparing individuals actually
provisioned to a BES Cyber System against records of individuals authorized to the BES Cyber
System. The focus of this requirement is on the integrity of provisioning access rather than
individual accounts on all BES Cyber Assets. The list of provisioned individuals can be an
automatically generated account listing. However, in a BES Cyber System with several
account databases, the list of provisioned individuals may come from other records such as
provisioning workflow or a user account database where provisioning typically initiates.
Draft 1
November 2019
Page 44 of 49
Guidelines and Technical Basis
The privilege review at least once every 15 calendar months is more detailed to ensure an
individual’s associated privileges are the minimum necessary to perform their work function
(i.e., least privilege). Entities can more efficiently perform this review by implementing rolebased access. This involves determining the specific roles on the system (e.g., system
operator, technician, report viewer, administrator, etc.) then grouping access privileges to the
role and assigning users to the role. Role-based access does not assume any specific software
and can be implemented by defining specific provisioning processes for each role where
access group assignments cannot be performed. Role-based access permissions eliminate the
1/1
1) Quarterly access review
2) privilege review (at least once every
15 calendar months)
3) BES Cyber
System Information
review (at least once every
4/1
15 calendar months)
Quarterly access review
2/1
3/1
4/1
7/1
Quarterly access review
5/1
6/1
7/1
1/1
1) Quarterly access review
2) privilege review
(at least once every
15 calendar months)
3) BES Cyber System
Information review
(at least once every
15 calendar months)
10/1
Quarterly access review
8/1
9/1
10/1
11/1
12/1
1/1
1/1
need to perform the privilege review on individual accounts. An example timeline of all the
reviews in Requirement R4 is included below.
Separation of duties should be considered when performing the reviews in Requirement R4.
The person reviewing should be different than the person provisioning access.
If the results of quarterly or at least once every 15 calendar months account reviews indicate
an administrative or clerical error in which access was not actually provisioned, then the SDT
intends that this error should not be considered a violation of this requirement.
For BES Cyber Systems that do not have user accounts defined, the controls listed in
Requirement R4 are not applicable. However, the Responsible Entity should document such
configurations.
Requirement R5:
The requirement to revoke access at the time of the termination action includes procedures
showing revocation of access concurrent with the termination action. This requirement
recognizes that the timing of the termination action may vary depending on the
circumstance. Some common scenarios and possible processes on when the termination
action occurs are provided in the following table. These scenarios are not an exhaustive list of
all scenarios, but are representative of several routine business practices.
Draft 1
November 2019
Page 45 of 49
Guidelines and Technical Basis
Scenario
Possible Process
Immediate involuntary
termination
Human resources or corporate security escorts the
individual off site and the supervisor or human resources
personnel notify the appropriate personnel to begin the
revocation process.
Scheduled involuntary
termination
Human resources personnel are notified of the termination
and work with appropriate personnel to schedule the
revocation of access at the time of termination.
Voluntary termination
Human resources personnel are notified of the termination
and work with appropriate personnel to schedule the
revocation of access at the time of termination.
Retirement where the last
working day is several weeks
prior to the termination date
Human resources personnel coordinate with manager to
determine the final date access is no longer needed and
schedule the revocation of access on the determined day.
Death
Human resources personnel are notified of the death and
work with appropriate personnel to begin the revocation
process.
Revocation of electronic access should be understood to mean a process with the end result
that electronic access to BES Cyber Systems is no longer possible using credentials assigned to
or known by the individual(s) whose access privileges are being revoked. Steps taken to
accomplish this outcome may include deletion or deactivation of accounts used by the
individual(s), but no specific actions are prescribed. Entities should consider the ramifications
of deleting an account may include incomplete event log entries due to an unrecognized
account or system services using the account to log on.
The initial revocation required in Requirement R5.1 includes unescorted physical access and
Interactive Remote Access. These two actions should prevent any further access by the
individual after termination. If an individual still has local access accounts (i.e., accounts on
the Cyber Asset itself) on BES Cyber Assets, then the Responsible Entity has 30 days to
complete the revocation process for those accounts. However, nothing prevents a
Responsible Entity from performing all of the access revocation at the time of termination.
For transferred or reassigned individuals, a review of access privileges should be performed.
This review could entail a simple listing of all authorizations for an individual and working
with the respective managers to determine which access will still be needed in the new
position. For instances in which the individual still needs to retain access as part of a
transitory period, the entity should schedule a time to review these access privileges or
include the privileges in the quarterly account review or annual privilege review.
Draft 1
November 2019
Page 46 of 49
Guidelines and Technical Basis
Revocation of access to shared accounts is called out separately to prevent the situation
where passwords on substation and generation devices are constantly changed due to staff
turnover.
Requirement 5.5 specified that passwords for shared account are to the changed within 30
calendar days of the termination action or when the Responsible Entity determines an
individual no longer requires access to the account as a result of a reassignment or transfer.
The 30 days applies under normal operating conditions. However, circumstances may occur
where this is not possible. Some systems may require an outage or reboot of the system in
order to complete the password change. In periods of extreme heat or cold, many
Responsible Entities may prohibit system outages and reboots in order to maintain reliability
of the BES. When these circumstances occur, the Responsible Entity must document these
circumstances and prepare to change the password within 10 calendar days following the end
of the operating circumstances. Records of activities must be retained to show that the
Responsible Entity followed the plan they created.
Rationale:
During development of this standard, text boxes were embedded within the standard to
explain the rationale for various parts of the standard. Upon BOT approval, the text from the
rationale text boxes was moved to this section.
Rationale for Requirement R1:
Ensures that Responsible Entities with personnel who have authorized electronic or
authorized unescorted physical access to BES Cyber Assets take action so that those
personnel with such authorized electronic or authorized unescorted physical access maintain
awareness of the Responsible Entity’s security practices.
Rationale for Requirement R2:
To ensure that the Responsible Entity’s training program for personnel who need authorized
electronic access and/or authorized unescorted physical access to BES Cyber Systems covers
the proper policies, access controls, and procedures to protect BES Cyber Systems and are
trained before access is authorized.
Rationale for Requirement R3:
To ensure that individuals who need authorized electronic or authorized unescorted physical
access to BES Cyber Systems have been assessed for risk. Whether initial access or
maintaining access, those with access must have had a personnel risk assessment completed
within the last 7 years.
Rationale for Requirement R4:
Draft 1
November 2019
Page 47 of 49
Guidelines and Technical Basis
To ensure that individuals with access to BES Cyber Systems and the physical and electronic
locations where BES Cyber System Information is stored by the Responsible Entity have been
properly authorized for such access. “Authorization” should be considered to be a grant of
permission by a person or persons empowered by the Responsible Entity to perform such
grants and included in the delegations referenced in CIP-003-6. “Provisioning” should be
considered the actions to provide access to an individual.
Access is physical, logical, and remote permissions granted to Cyber Assets composing the
BES Cyber System or allowing access to the BES Cyber System. When granting, reviewing, or
revoking access, the Responsible Entity must address the Cyber Asset specifically as well as
the systems used to enable such access (i.e., physical access control system, remote access
system, directory services).
CIP Exceptional Circumstances are defined in a Responsible Entity’s policy from CIP-003-6 and
allow an exception to the requirement for authorization to BES Cyber Systems and BES Cyber
System Information.
Quarterly reviews in Part 4.5 are to perform a validation that only authorized users have been
granted access to BES Cyber Systems. This is achieved by comparing individuals actually
provisioned to a BES Cyber System against records of individuals authorized to access the BES
Cyber System. The focus of this requirement is on the integrity of provisioning access rather
than individual accounts on all BES Cyber Assets. The list of provisioned individuals can be an
automatically generated account listing. However, in a BES Cyber System with several
account databases, the list of provisioned individuals may come from other records such as
provisioning workflow or a user account database where provisioning typically initiates.
If the results of quarterly or annual account reviews indicate an administrative or clerical
error in which access was not actually provisioned, then the SDT intends that the error should
not be considered a violation of this requirement.
For BES Cyber Systems that do not have user accounts defined, the controls listed in
Requirement R4 are not applicable. However, the Responsible Entity should document such
configurations.
Rationale for Requirement R5:
The timely revocation of electronic access to BES Cyber Systems is an essential element of an
access management regime. When an individual no longer requires access to a BES Cyber
System to perform his or her assigned functions, that access should be revoked. This is of
particular importance in situations where a change of assignment or employment is
involuntary, as there is a risk the individual(s) involved will react in a hostile or destructive
manner.
In considering how to address directives in FERC Order No. 706 directing “immediate”
revocation of access for involuntary separation, the SDT chose not to specify hourly time
parameters in the requirement (e.g., revoking access within 1 hour). The point in time at
which an organization terminates a person cannot generally be determined down to the
Draft 1
November 2019
Page 48 of 49
Guidelines and Technical Basis
hour. However, most organizations have formal termination processes, and the timeliest
revocation of access occurs in concurrence with the initial processes of termination.
Access is physical, logical, and remote permissions granted to Cyber Assets composing the
BES Cyber System or allowing access to the BES Cyber System. When granting, reviewing, or
revoking access, the Responsible Entity must address the Cyber Asset specifically as well as
the systems used to enable such access (e.g., physical access control system, remote access
system, directory services).
Draft 1
November 2019
Page 49 of 49
CIP-011-3 — Cyber Security — Information Protection
Standard Development Timeline
This section is maintained by the drafting team during the development of the standard and will
be removed when the standard is adopted by the NERC Board of Trustees (Board).
Description of Current Draft
Completed Actions
Standards Committee approved Standard Authorization Request
(SAR) for posting
SAR posted for comment
Anticipated Actions
Date
March 22, 2019
March 28, 2019 –
April 26, 2019
Date
45-day formal or informal comment period with ballot
December 2019
45-day formal or informal comment period with additional ballot
February 2020
10-day final ballot
April 2020
Board adoption
May 2020
New or Modified Term(s) Used in NERC Reliability Standards
This section includes all new or modified terms used in the proposed standard that will be
included in the Glossary of Terms Used in NERC Reliability Standards upon applicable regulatory
approval. Terms used in the proposed standard that are already defined and are not being
modified can be found in the Glossary of Terms Used in NERC Reliability Standards. The new or
revised terms listed below will be presented for approval with the proposed standard. Upon
Board adoption, this section will be removed.
Term(s):
None.
Draft 1
December 2019
Page 1 of 21
CIP-011-3 — Cyber Security — Information Protection
A. Introduction
1.
Title:
Cyber Security — Information Protection
2.
Number:
CIP-011-3
3.
Purpose:
To prevent unauthorized access to BES Cyber System Information by
specifying information protection requirements in support of protecting
BES Cyber Systems against compromise that could lead to misoperation
or instability in the Bulk Electric System (BES).
4.
Applicability:
4.1. Functional Entities: For the purpose of the requirements contained herein, the
following list of functional entities will be collectively referred to as “Responsible
Entities.” For requirements in this standard where a specific functional entity or
subset of functional entities are the applicable entity or entities, the functional entity
or entities are specified explicitly.
4.1.1 Balancing Authority
4.1.2 Distribution Provider that owns one or more of the following Facilities, systems,
and equipment for the protection or restoration of the BES:
4.1.2.1 Each underfrequency Load shedding (UFLS) or undervoltage Load shedding
(UVLS) system that:
4.1.2.1.1 is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.1.2.1.2 performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation,
of 300 MW or more.
4.1.2.2 Each or Remedial Action Scheme (RAS) where the RAS is subject to one or
more requirements in a NERC or Regional Reliability Standard.
4.1.2.3 Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.1.2.4 Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.1.3 Generator Operator
4.1.4 Generator Owner
4.1.5 Reliability Coordinator
4.1.6 Transmission Operator
Draft 1
December 2019
Page 2 of 21
CIP-011-3 — Cyber Security — Information Protection
4.1.7 Transmission Owner
4.2.
Facilities: For the purpose of the requirements contained herein, the following
Facilities, systems, and equipment owned by each Responsible Entity in 4.1 above
are those to which these requirements are applicable. For requirements in this
standard where a specific type of Facilities, system, or equipment or subset of
Facilities, systems, and equipment are applicable, these are specified explicitly.
4.2.1 Distribution Provider: One or more of the following Facilities, systems and
equipment owned by the Distribution Provider for the protection or restoration
of the BES:
4.2.1.1 Each UFLS or UVLS System that:
4.2.1.1.1 is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.2.1.1.2 performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation,
of 300 MW or more.
4.2.1.2 Each RAS where the RAS is subject to one or more requirements in a NERC
or Regional Reliability Standard.
4.2.1.3 Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.2.1.4 Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.2.2 Responsible Entities listed in 4.1 other than Distribution Providers:
All BES Facilities.
4.2.3 Exemptions: The following are exempt from Standard CIP-011-3:
4.2.3.1 Cyber Assets at Facilities regulated by the Canadian Nuclear Safety
Commission.
4.2.3.2 Cyber Assets associated with communication networks and data
communication links between discrete Electronic Security Perimeters.
4.2.3.3 The systems, structures, and components that are regulated by the Nuclear
Regulatory Commission under a cyber security plan pursuant to 10 C.F.R.
Section 73.54.
4.2.3.4 For Distribution Providers, the systems and equipment that are not included
in section 4.2.1 above.
Draft 1
December 2019
Page 3 of 21
CIP-011-3 — Cyber Security — Information Protection
4.2.3.5 Responsible Entities that identify that they have no BES Cyber Systems
categorized as high impact or medium impact according to the CIP-002-5.1
identification and categorization processes.
5.
Effective Dates:
See Implementation Plan for CIP-011-3.
6.
Background:
Standard CIP-011 exists as part of a suite of CIP Standards related to cyber security,
which require the initial identification and categorization of BES Cyber Systems and
require a minimum level of organizational, operational, and procedural controls to
mitigate risk to BES Cyber Systems.
Most requirements open with, “Each Responsible Entity shall implement one or more
documented [processes, plan, etc.] that include the applicable items in [Table
Reference].” The referenced table requires the applicable items in the procedures for
the requirement’s common subject matter.
The term documented processes refers to a set of required instructions specific to the
Responsible Entity and to achieve a specific outcome. This term does not imply any
particular naming or approval structure beyond what is stated in the requirements.
An entity should include as much as it believes necessary in its documented processes,
but it must address the applicable requirements in the table.
The terms program and plan are sometimes used in place of documented processes
where it makes sense and is commonly understood. For example, documented
processes describing a response are typically referred to as plans (i.e., incident
response plans and recovery plans). Likewise, a security plan can describe an
approach involving multiple procedures to address a broad subject matter.
Similarly, the term program may refer to the organization’s overall implementation of
its policies, plans and procedures involving a subject matter. Examples in the
standards include the personnel risk assessment program and the personnel training
program. The full implementation of the CIP Cyber Security Standards could also be
referred to as a program. However, the terms program and plan do not imply any
additional requirements beyond what is stated in the standards.
Responsible Entities can implement common controls that meet requirements for
multiple high and medium impact BES Cyber Systems. For example, a single training
program could meet the requirements for training personnel across multiple BES
Cyber Systems.
Measures for the initial requirement are simply the documented processes
themselves. Measures in the table rows provide examples of evidence to show
documentation and implementation of applicable items in the documented processes.
These measures serve to provide guidance to entities in acceptable records of
compliance and should not be viewed as an all-inclusive list.
Draft 1
December 2019
Page 4 of 21
CIP-011-3 — Cyber Security — Information Protection
Throughout the standards, unless otherwise stated, bulleted items in the
requirements and measures are items that are linked with an “or,” and numbered
items are items that are linked with an “and.”
Many references in the Applicability section use a threshold of 300 MW for UFLS and
UVLS. This particular threshold of 300 MW for UVLS and UFLS was provided in Version
1 of the CIP Cyber Security Standards. The threshold remains at 300 MW since it is
specifically addressing UVLS and UFLS, which are last ditch efforts to save the BES. A
review of UFLS tolerances defined within regional reliability standards for UFLS
program requirements to date indicates that the historical value of 300 MW
represents an adequate and reasonable threshold value for allowable UFLS
operational tolerances.
“Applicable Systems” and “Applicability” Columns in Tables:
Each table has an “Applicable Systems” or “Applicability” column. The “Applicability
Systems” column further defines the scope of systems to which a specific requirement
row applies. The CSO706 SDT adapted this concept from the National Institute of
Standards and Technology (“NIST”) Risk Management Framework as a way of applying
requirements more appropriately based on impact and connectivity characteristics.
The following conventions are used in the “Applicable Systems” column as described.
•
High Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as
high impact according to the CIP-002-5.1 identification and categorization
processes.
•
Medium Impact BES Cyber Systems – Applies to BES Cyber Systems categorized
as medium impact according to the CIP-002-5.1 identification and categorization
processes.
•
Electronic Access Control or Monitoring Systems (EACMS) – Applies to each
Electronic Access Control or Monitoring System associated with a referenced
high impact BES Cyber System or medium impact BES Cyber System. Examples
may include, but are not limited to, firewalls, authentication servers, and log
monitoring and alerting systems.
•
Physical Access Control Systems (PACS) – Applies to each Physical Access
Control System associated with a referenced high impact BES Cyber System or
medium impact BES Cyber System with External Routable Connectivity.
•
Protected Cyber Assets (PCA) – Applies to each Protected Cyber Asset
associated with a referenced high impact BES Cyber System or medium impact
BES Cyber System.
Draft 1
December 2019
Page 5 of 21
CIP-011-3 — Cyber Security — Information Protection
B. Requirements and Measures
R1. Each Responsible Entity shall implement one or more documented information protection program(s) that collectively
includes each of the applicable requirement parts in CIP-011-3 Table R1 – Information Protection. [Violation Risk Factor:
Medium] [Time Horizon: Operations Planning].
M1. Evidence for the information protection program must include the applicable requirement parts in CIP-011-3 Table R1 –
Information Protection and additional evidence to demonstrate implementation as described in the Measures column of
the table.
Draft 1
December 2019
Page 6 of 21
CIP-011-3 — Cyber Security — Information Protection
CIP-011-3 Table R1 – Information Protection Program
Part
1.1
Applicability
Requirements
System information pertaining to: High
Impact BES Cyber Systems and their
associated:
1. EACMS;
2. PACS; and
3. PCA
Process(es) to identify information that
meets the definition of BES Cyber
System Information and identify
applicable BES Cyber System
Information storage locations.
Medium Impact BES Cyber Systems
and their associated:
1. EACMS;
2. PACS; and
3. PCA
Draft 1
December 2019
Measures
Examples of acceptable evidence
include, but are not limited to, the
following:
•
Documented process(es) to
identify BES Cyber System
Information from entity’s
information protection program; or
•
Indications on information (e.g.,
labels or classification) that identify
BES Cyber System Information as
designated in the entity’s
information protection program; or
•
Training materials that provide
personnel with sufficient
knowledge to recognize BES Cyber
System Information; or
•
Storage locations identified for
housing BES Cyber System
Information in the entity’s
information protection program.
Page 7 of 21
CIP-011-3 — Cyber Security — Information Protection
CIP-011-3 Table R1 – Information Protection Program
Part
1.2
Applicability
BES Cyber System Information as
identified in Requirement R1 Part 1.1.
Draft 1
December 2019
Requirements
Method(s) to prevent unauthorized
access to BES Cyber System
Information by eliminating the ability
to obtain and use BES Cyber System
Information during storage, transit,
use, and disposal.
Measures
Examples of acceptable evidence
include, but are not limited to, the
following:
•
Evidence of methods used to
prevent the unauthorized access to
BES Cyber System Information
(e.g., encryption of BES Cyber
System Information and key
management program, retention in
the Physical Security Perimeter).
Page 8 of 21
CIP-011-3 — Cyber Security — Information Protection
CIP-011-3 Table R1 – Information Protection Program
Part
1.3
Applicability
Requirement
Measure
BES Cyber System Information as
identified in Requirement R1 Part 1.1.
Process(es) to authorize access to BES
Cyber System Information based on
need, as determined by the
Responsible Entity, except during CIP
Exceptional Circumstances.
Examples of evidence may include, but
are not limited to, the following:
Draft 1
December 2019
•
Dated documentation of the
process to authorize access to
BES Cyber System Information
and documentation of when
CIP Exceptional Circumstances
were invoked.
•
This may include reviewing the
Responsible Entity’s key
management process(es).
Page 9 of 21
CIP-011-3 — Cyber Security — Information Protection
CIP-011-3 Table R1 – Information Protection Program
Part
1.4
Applicability
BES Cyber System Information as
identified in Requirement R1 Part 1.1.
Requirement
Process(es) to identify, assess, and
mitigate risks in cases where vendors
store Responsible Entity’s BES Cyber
System Information.
1.4.1 Perform initial risk
assessments of vendors
that store the Responsible
Entity’s BES Cyber System
Information; and
1.4.2 At least once every 15
calendar months, perform
risk assessments of vendors
that store the Responsible
Entity’s BES Cyber System
Information; and
1.4.3 Document the results of the
risk assessments performed
according to Parts 1.4.1 and
1.4.2 and the action plan to
remediate or mitigate
risk(s) identified in the
assessment, including the
planned date of completing
the action plan and the
execution status of any
remediation or mitigation
action items.
Draft 1
December 2019
Measure
Examples of acceptable evidence may
include, but are not limited to, dated
documentation of all of the following:
•
Methodology(ies) used to
perform risk assessments
•
Dated documentation of initial
vendor risk assessments
pertaining to BES Cyber System
Information that are performed
by the Responsible Entity;
•
Dated documentation of
vendor risk assessments
pertaining to BES Cyber System
Information that are performed
by the Responsible Entity every
15 calendar months;
•
Dated documentation of results
from the vendor risk
assessments that are
performed by the Responsible
Entity; and
•
Dated documentation of action
plans and statuses of
remediation and/or mitigation
action items.
Page 10 of 21
CIP-011-3 — Cyber Security — Information Protection
CIP-011-3 Table R1 – Information Protection Program
Part
1.5
Applicability
Requirement
Measure
BES Cyber System Information as
identified in Requirement R1 Part 1.1.
For termination actions, revoke the
individual’s current access to BES
Cyber System Information, unless
already revoked according to CIP-0047 Requirement R5, Part 5.1) by the end
of the next calendar day following the
effective date of the termination
action.
Examples of evidence may include, but
are not limited to, documentation of
the following:
Draft 1
December 2019
•
Dated workflow or sign-off
form verifying access removal
associated with the termination
action; and
•
Logs or other demonstration
showing such persons no
longer have access.
Page 11 of 21
CIP-011-3 — Cyber Security — Information Protection
CIP-011-3 Table R1 – Information Protection Program
Part
1.6
Applicability
BES Cyber System Information as
identified in Requirement R1 Part 1.1.
Requirement
Verify at least once every 15 calendar
months that access to BES Cyber
System Information is correct and
consists of personnel that the
Responsible Entity determine are
necessary for performing assigned
work functions.
Measure
Examples of evidence may include, but
are not limited to, the documentation
of the review that includes all of the
following:
•
•
•
Draft 1
December 2019
A dated listing of authorizations
for BES Cyber System
information;
Any privileges associated with
the authorizations; and
Dated evidence showing a
verification of the
authorizations and any
privileges were confirmed
correct and the minimum
necessary for performing
assigned work functions.
Page 12 of 21
CIP-011-3 — Cyber Security — Information Protection
R2.
Each Responsible Entity shall implement one or more documented key management program that collectively include the
applicable requirement parts in CIP-011-3 Table R2 – Information Protection. [Violation Risk Factor: Medium] [Time Horizon:
Operations Planning].
M2. Evidence must include each of the applicable documented processes that collectively include each of the applicable
requirement parts in CIP-011-3 Table R2 – Information Protection and additional evidence to demonstrate implementation as
described in the Measures column of the table.
CIP-011-3 Table R2 – Key Management Program
Part
2.1
Applicability
BES Cyber System Information as
identified in Requirement R1 Part 1.1.
Requirement
Where applicable, develop a key
management process(es) to restrict
access with revocation ability, which
shall include the following:
Measure
Examples of evidence may include, but
are not limited to, the following:
•
Dated documentation of key
management method(s),
including key generation, key
distribution, key storage, key
protection, key periods, key
suppression, key revocation
and key disposal are
implemented; and
•
Configuration files, command
output, or architecture
documents.
2.1.1 Key generation
2.1.3 Key distribution
2.1.4 Key storage
2.1.5 Key protection
2.1.6 Key-periods
2.1.7 Key suppression
2.1.8 Key revocation
2.1.9 Key disposal
Draft 1
December 2019
Page 13 of 21
CIP-011-3 — Cyber Security — Information Protection
CIP-011-3 Table R2 – Key Management Program
Part
2.2
Applicability
BES Cyber System Information as
identified in Requirement R1 Part 1.1.
Requirement
Implement controls to separate the
BES Cyber System Information
custodial entity’s duties independently
from the key management program
duties established in Part 2.1.
Measure
Examples of evidence may include, but
are not limited to, the following:
•
Dated documentation of key
management method(s) that
illustrate the Responsible Entity’s
independence from its vendor
(e.g., locations where keys were
generated, dated key period
records for keys, access records to
key storage locations).
• Procedural controls should be
designed to enforce the concept of
separation of duties between the
custodial entity and the key owner.
Draft 1
December 2019
Page 14 of 21
CIP-011-3 — Cyber Security — Information Protection
R3.
Each Responsible Entity shall implement one or more documented process(es) that collectively include the applicable
requirement parts in CIP-011-3 Table R3 – BES Cyber Asset Reuse and Disposal. [Violation Risk Factor: Lower] [Time Horizon:
Operations Planning].
M3. Evidence must include each of the applicable documented processes that collectively include each of the applicable
requirement parts in CIP-011-3 Table R3 – BES Cyber Asset Reuse and Disposal and additional evidence to demonstrate
implementation as described in the Measures column of the table.
CIP-011-3 Table R3 – BES Cyber Asset Reuse and Disposal
Part
3.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS;
2. PACS; and
3. PCA
Medium Impact BES Cyber Systems
and their associated:
Requirements
Prior to the release for reuse or
disposal of applicable Cyber Assets
(except for reuse within other
systems identified in the “Applicable
Systems” column), the Cyber Asset
data storage media shall be sanitized
or destroyed.
Measures
Examples of acceptable evidence
include, but are not limited to, the
following:
•
Records that indicate the Cyber
Asset’s data storage media was
sanitized or destroyed before
reuse or disposal.
•
Records that indicate chain of
custody was implemented.
1. EACMS;
2. PACS; and
3. PCA
Draft 1
December 2019
Page 15 of 21
CIP-011-3 — Cyber Security — Information Protection
C. Compliance
1.
Compliance Monitoring Process:
1.1. Compliance Enforcement Authority:
As defined in the NERC Rules of Procedure, “Compliance Enforcement Authority” (CEA) means
NERC or the Regional Entity in their respective roles of monitoring and enforcing compliance
with the NERC Reliability Standards.
1.2. Evidence Retention:
The following evidence retention periods identify the period of time an entity is required to
retain specific evidence to demonstrate compliance. For instances where the evidence
retention period specified below is shorter than the time since the last audit, the CEA may ask
an entity to provide other evidence to show that it was compliant for the full time period since
the last audit.
The Responsible Entity shall keep data or evidence to show compliance as identified below
unless directed by its CEA to retain specific evidence for a longer period of time as part of an
investigation:
•
Each Responsible Entity shall retain evidence of each requirement in this standard for three
calendar years.
•
If a Responsible Entity is found non-compliant, it shall keep information related to the noncompliance until mitigation is complete and approved or for the time specified above,
whichever is longer.
•
The CEA shall keep the last audit records and all requested and submitted subsequent audit
records.
1.3. Compliance Monitoring and Assessment Processes:
•
Compliance Audits
•
Self-Certifications
•
Spot Checking
•
Compliance Investigations
•
Self-Reporting
•
Complaints
1.4. Additional Compliance Information:
None
Draft 1
December 2019
Page 16 of 21
CIP-011-3 — Cyber Security — Information Protection
2. Table of Compliance Elements
R#
Time
Horizon
VRF
R1
Operations
Planning
Medium
N/A
N/A
The Responsible Entity
has documented or
implemented a BES
Cyber System
Information
protection program,
but did not prevent
unauthorized access
to BES Cyber System
Information by
eliminating the ability
to obtain and use BCSI
during storage, transit,
use and disposal. (1.2)
The Responsible
Entity has not
documented or
implemented a BES
Cyber System
Information
protection program
(R1).
R2
Operations
Planning
Medium
N/A
N/A
N/A
The Responsible
Entity has not
documented or
implemented
processes for BES
Cyber System
Information key
management
program. (R2)
Draft 1
December 2019
Violation Severity Levels (CIP-011-3)
Lower VSL
Moderate VSL
High VSL
Severe VSL
Page 17 of 21
CIP-011-3 — Cyber Security — Information Protection
R#
R3
Time
Horizon
Operations
Planning
Draft 1
December 2019
VRF
Violation Severity Levels (CIP-011-3)
Lower VSL
Lower
N/A
Moderate VSL
The Responsible Entity
implemented one or more
documented processes but
did not include processes
for reuse as to prevent the
unauthorized retrieval of
BES Cyber System
Information from the BES
Cyber Asset. (3.1)
High VSL
The Responsible Entity
implemented one or
more documented
processes but did not
include disposal or
media destruction
processes to prevent
the unauthorized
retrieval of BES Cyber
System Information
from the BES Cyber
Asset. (3.1)
Severe VSL
The Responsible
Entity has not
documented or
implemented any
processes for
applicable
requirement parts
in CIP-011-3 Table
R3 – BES Cyber
Asset Reuse and
Disposal. (R3)
Page 18 of 21
Guidelines and Technical Basis
D. Regional Variances
None.
E. Interpretations
None.
F. Associated Documents
Version History
Version
Date
1
11/26/12
Adopted by the NERC Board of
Trustees.
1
11/22/13
2
11/13/14
FERC Order issued approving CIP011-1. (Order becomes effective
on 2/3/14.)
Adopted by the NERC Board of
Trustees.
2
2/12/15
Adopted by the NERC Board of
Trustees.
2
1/21/16
FERC Order issued approving CIP011-2. Docket No. RM15-14-000
Draft 1
December 2019
Action
Change Tracking
Developed to define
the information
protection
requirements in
coordination with other
CIP standards and to
address the balance of
the FERC directives in
its Order 706.
Addressed two FERC
directives from Order
No. 791 related to
identify, assess, and
correct language and
communication
networks.
Replaces the version
adopted by the Board
on 11/13/2014. Revised
version addresses
remaining directives
from Order No. 791
related to transient
devices and low impact
BES Cyber Systems.
Page 19 of 21
Guidelines and Technical Basis
3
Draft 1
December 2019
TBD
Adopted by the NERC Board of
Trustees
Revised to enhance BES
reliability for entities to
manage their BES
Cyber System
Information.
Page 20 of 21
Guidelines and Technical Basis
Note: The Guidelines and Technical Basis section has not been revised as part of Project 201902. A separate technical rationale document has been created to cover Project 2019-02
revisions. Future edits to this section will be conducted through the Technical Rationale for
Reliability Standards Project and the Standards Drafting Process.
Draft 1
December 2019
Page 21 of 21
CIP-011-23 — Cyber Security — Information Protection
Standard Development Timeline
This section is maintained by the drafting team during the development of the standard and will
be removed when the standard is adopted by the NERC Board of Trustees (Board).
Description of Current Draft
Completed Actions
Standards Committee approved Standard Authorization Request
(SAR) for posting
SAR posted for comment
Anticipated Actions
Date
March 22, 2019
March 28, 2019 –
April 26, 2019
Date
45-day formal or informal comment period with ballot
December 2019
45-day formal or informal comment period with additional ballot
February 2020
10-day final ballot
April 2020
Board adoption
May 2020
New or Modified Term(s) Used in NERC Reliability Standards
This section includes all new or modified terms used in the proposed standard that will be
included in the Glossary of Terms Used in NERC Reliability Standards upon applicable regulatory
approval. Terms used in the proposed standard that are already defined and are not being
modified can be found in the Glossary of Terms Used in NERC Reliability Standards. The new or
revised terms listed below will be presented for approval with the proposed standard. Upon
Board adoption, this section will be removed.
Term(s):
None.
Draft 1
December 2019
Page 1 of 27
CIP-011-23 — Cyber Security — Information Protection
A. Introduction
1.
Title:
Cyber Security — Information Protection
2.
Number:
CIP-011-23
3.
Purpose:
To prevent unauthorized access to BES Cyber System Information by
specifying information protection requirements in support of protecting
BES Cyber Systems against compromise that could lead to misoperation
or instability in the Bulk Electric System (BES).
4.
Applicability:
4.1. Functional Entities: For the purpose of the requirements contained herein, the
following list of functional entities will be collectively referred to as “Responsible
Entities.” For requirements in this standard where a specific functional entity or
subset of functional entities are the applicable entity or entities, the functional entity
or entities are specified explicitly.
4.1.1 Balancing Authority
4.1.2 Distribution Provider that owns one or more of the following Facilities, systems,
and equipment for the protection or restoration of the BES:
4.1.2.1 Each underfrequency Load shedding (UFLS) or undervoltage Load shedding
(UVLS) system that:
4.1.2.1.1 is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.1.2.1.2 performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation,
of 300 MW or more.
4.1.2.2 Each Special Protection System (SPS) or Remedial Action Scheme (RAS)
where the SPS or RAS is subject to one or more requirements in a NERC or
Regional Reliability Standard.
4.1.2.3 Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.1.2.4 Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.1.3 Generator Operator
4.1.4 Generator Owner
4.1.5 Interchange Coordinator or Interchange Authority
4.1.64.1.5
Draft 1
December 2019
Reliability Coordinator
Page 2 of 27
CIP-011-23 — Cyber Security — Information Protection
4.1.74.1.6
Transmission Operator
4.1.84.1.7
Transmission Owner
4.2.
Facilities: For the purpose of the requirements contained herein, the following
Facilities, systems, and equipment owned by each Responsible Entity in 4.1 above
are those to which these requirements are applicable. For requirements in this
standard where a specific type of Facilities, system, or equipment or subset of
Facilities, systems, and equipment are applicable, these are specified explicitly.
4.2.1 Distribution Provider: One or more of the following Facilities, systems and
equipment owned by the Distribution Provider for the protection or restoration
of the BES:
4.2.1.1 Each UFLS or UVLS System that:
4.2.1.1.1 is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.2.1.1.2 performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation,
of 300 MW or more.
4.2.1.2 Each SPS or RAS where the SPS or RAS is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.2.1.3 Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.2.1.4 Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.2.2 Responsible Entities listed in 4.1 other than Distribution Providers:
All BES Facilities.
4.2.3 Exemptions: The following are exempt from Standard CIP-011-23:
4.2.3.1 Cyber Assets at Facilities regulated by the Canadian Nuclear Safety
Commission.
4.2.3.2 Cyber Assets associated with communication networks and data
communication links between discrete Electronic Security Perimeters.
4.2.3.3 The systems, structures, and components that are regulated by the Nuclear
Regulatory Commission under a cyber security plan pursuant to 10 C.F.R.
Section 73.54.
4.2.3.4 For Distribution Providers, the systems and equipment that are not included
in section 4.2.1 above.
Draft 1
December 2019
Page 3 of 27
CIP-011-23 — Cyber Security — Information Protection
4.2.3.5 Responsible Entities that identify that they have no BES Cyber Systems
categorized as high impact or medium impact according to the CIP-002-5.1
identification and categorization processes.
5.
Effective Dates:
See Implementation Plan for CIP-011-23.
6.
Background:
Standard CIP-011 exists as part of a suite of CIP Standards related to cyber security,
which require the initial identification and categorization of BES Cyber Systems and
require a minimum level of organizational, operational, and procedural controls to
mitigate risk to BES Cyber Systems.
Most requirements open with, “Each Responsible Entity shall implement one or more
documented [processes, plan, etc.] that include the applicable items in [Table
Reference].” The referenced table requires the applicable items in the procedures for
the requirement’s common subject matter.
The term documented processes refers to a set of required instructions specific to the
Responsible Entity and to achieve a specific outcome. This term does not imply any
particular naming or approval structure beyond what is stated in the requirements.
An entity should include as much as it believes necessary in its documented processes,
but it must address the applicable requirements in the table.
The terms program and plan are sometimes used in place of documented processes
where it makes sense and is commonly understood. For example, documented
processes describing a response are typically referred to as plans (i.e., incident
response plans and recovery plans). Likewise, a security plan can describe an
approach involving multiple procedures to address a broad subject matter.
Similarly, the term program may refer to the organization’s overall implementation of
its policies, plans and procedures involving a subject matter. Examples in the
standards include the personnel risk assessment program and the personnel training
program. The full implementation of the CIP Cyber Security Standards could also be
referred to as a program. However, the terms program and plan do not imply any
additional requirements beyond what is stated in the standards.
Responsible Entities can implement common controls that meet requirements for
multiple high and medium impact BES Cyber Systems. For example, a single training
program could meet the requirements for training personnel across multiple BES
Cyber Systems.
Measures for the initial requirement are simply the documented processes
themselves. Measures in the table rows provide examples of evidence to show
documentation and implementation of applicable items in the documented processes.
These measures serve to provide guidance to entities in acceptable records of
compliance and should not be viewed as an all-inclusive list.
Draft 1
December 2019
Page 4 of 27
CIP-011-23 — Cyber Security — Information Protection
Throughout the standards, unless otherwise stated, bulleted items in the
requirements and measures are items that are linked with an “or,” and numbered
items are items that are linked with an “and.”
Many references in the Applicability section use a threshold of 300 MW for UFLS and
UVLS. This particular threshold of 300 MW for UVLS and UFLS was provided in Version
1 of the CIP Cyber Security Standards. The threshold remains at 300 MW since it is
specifically addressing UVLS and UFLS, which are last ditch efforts to save the BES. A
review of UFLS tolerances defined within regional reliability standards for UFLS
program requirements to date indicates that the historical value of 300 MW
represents an adequate and reasonable threshold value for allowable UFLS
operational tolerances.
“Applicable Systems” and “Applicability” Columns in Tables:
Each table has an “Applicable Systems” or “Applicability” column. The “Applicability
Systems” column to further defines the scope of systems to which a specific
requirement row applies. The CSO706 SDT adapted this concept from the National
Institute of Standards and Technology (“NIST”) Risk Management Framework as a way
of applying requirements more appropriately based on impact and connectivity
characteristics. The following conventions are used in the “Applicable Systems”
column as described.
•
High Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as
high impact according to the CIP-002-5.1 identification and categorization
processes.
•
Medium Impact BES Cyber Systems – Applies to BES Cyber Systems categorized
as medium impact according to the CIP-002-5.1 identification and categorization
processes.
•
Electronic Access Control or Monitoring Systems (EACMS) – Applies to each
Electronic Access Control or Monitoring System associated with a referenced
high impact BES Cyber System or medium impact BES Cyber System. Examples
may include, but are not limited to, firewalls, authentication servers, and log
monitoring and alerting systems.
•
Physical Access Control Systems (PACS) – Applies to each Physical Access
Control System associated with a referenced high impact BES Cyber System or
medium impact BES Cyber System with External Routable Connectivity.
•
Protected Cyber Assets (PCA) – Applies to each Protected Cyber Asset
associated with a referenced high impact BES Cyber System or medium impact
BES Cyber System.
Draft 1
December 2019
Page 5 of 27
CIP-011-23 — Cyber Security — Information Protection
B. Requirements and Measures
R1. Each Responsible Entity shall implement one or more documented information protection program(s) that collectively
includes each of the applicable requirement parts in CIP-011-23 Table R1 – Information Protection. [Violation Risk Factor:
Medium] [Time Horizon: Operations Planning].
M1. Evidence for the information protection program must include the applicable requirement parts in CIP-011-23 Table R1 –
Information Protection and additional evidence to demonstrate implementation as described in the Measures column of
the table.
Draft 1
December 2019
Page 6 of 27
CIP-011-23 — Cyber Security — Information Protection
CIP-011-23 Table R1 – Information Protection Program
Part
1.1
Applicabilityle Systems
System information pertaining to:
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS; and
2.3.
PCA
Medium Impact BES Cyber Systems
and their associated:
1. EACMS; and
2. PACS; and
2.3.
PCA
Draft 1
December 2019
Requirements
MethodProcess(es) to identify
information that meets the definition
of BES Cyber System Information and
identify applicable BES Cyber System
Information storage locations.
Measures
Examples of acceptable evidence
include, but are not limited to, the
following:
•
Documented method process(es)
to identify BES Cyber System
Information from entity’s
information protection program; or
•
Indications on information (e.g.,
labels or classification) that identify
BES Cyber System Information as
designated in the entity’s
information protection program; or
•
Training materials that provide
personnel with sufficient
knowledge to recognize BES Cyber
System Information; or
•
Repository or electronic and
physical Storage locations
identified designated for housing
BES Cyber System Information in
the entity’s information protection
program.
Page 7 of 27
CIP-011-23 — Cyber Security — Information Protection
CIP-011-23 Table R1 – Information Protection Program
Part
1.2
Applicabilityle Systems
BES Cyber System Information as
identified in Requirement R1 Part 1.1.
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems and
their associated:
1. EACMS; and
PACS
Draft 1
December 2019
Requirements
ProcedureMethod(s) to prevent
unauthorized access to for protecting
and securely handling BES Cyber
System Information by eliminating the
ability to obtain and use BES Cyber
System Information during, including
storage, transit, use, and disposal .
Measures
Examples of acceptable evidence
include, but are not limited to, the
following:
•
Evidence of methods used to
prevent the unauthorized access to
Procedures for protecting and
securely handling, which include
topics such as storage, security
during transit, and use of BES
Cyber System Information (e.g.,
encryption of ; or
•
Records indicating that BES Cyber
System Information and key
management program, retention in
the Physical Security Perimeter)is
handled in a manner consistent
with the entity’s documented
procedure(s).
Page 8 of 27
CIP-011-23 — Cyber Security — Information Protection
CIP-011-3 Table R1 – Information Protection Program
Part
1.3
Applicability
Requirement
Measure
BES Cyber System Information as
identified in Requirement R1 Part 1.1.
Process(es) to authorize access to BES
Cyber System Information based on
need, as determined by the
Responsible Entity, except during CIP
Exceptional Circumstances.
Examples of evidence may include, but
are not limited to, the following:
Draft 1
December 2019
•
Dated documentation of the
process to authorize access to
BES Cyber System Information
and documentation of when
CIP Exceptional Circumstances
were invoked.
•
This may include reviewing the
Responsible Entity’s key
management process(es).
Page 9 of 27
CIP-011-23 — Cyber Security — Information Protection
CIP-011-3 Table R1 – Information Protection Program
Part
Draft 1
December 2019
Applicability
Requirement
Measure
Page 10 of 27
CIP-011-23 — Cyber Security — Information Protection
1.4
BES Cyber System Information as
identified in Requirement R1 Part 1.1.
Draft 1
December 2019
Process(es) to identify, assess, and
mitigate risks in cases where vendors
store Responsible Entity’s BES Cyber
System Information.
Examples of acceptable evidence may
include, but are not limited to, dated
documentation of all of the following:
•
Methodology(ies) used to
perform risk assessments
1.4.1 Perform initial risk
assessments of vendors
that store the Responsible
Entity’s BES Cyber System
Information; and
•
Dated documentation of initial
vendor risk assessments
pertaining to BES Cyber System
Information that are performed
by the Responsible Entity;
1.4.2 At least once every 15
calendar months, perform
risk assessments of vendors
that store the Responsible
Entity’s BES Cyber System
Information; and
•
Dated documentation of
vendor risk assessments
pertaining to BES Cyber System
Information that are performed
by the Responsible Entity every
15 calendar months;
1.4.3 Document the results of the
risk assessments performed
according to Parts 1.4.1 and
1.4.2 and the action plan to
remediate or mitigate
risk(s) identified in the
assessment, including the
planned date of completing
the action plan and the
execution status of any
remediation or mitigation
action items.
•
Dated documentation of results
from the vendor risk
assessments that are
performed by the Responsible
Entity; and
•
Dated documentation of action
plans and statuses of
remediation and/or mitigation
action items.
Page 11 of 27
CIP-011-23 — Cyber Security — Information Protection
CIP-011-3 Table R1 – Information Protection Program
Part
1.5
Applicability
Requirement
Measure
BES Cyber System Information as
identified in Requirement R1 Part 1.1.
For termination actions, revoke the
individual’s current access to BES
Cyber System Information, unless
already revoked according to CIP-0047 Requirement R5, Part 5.1) by the end
of the next calendar day following the
effective date of the termination
action.
Examples of evidence may include, but
are not limited to, documentation of
the following:
Draft 1
December 2019
•
Dated workflow or sign-off
form verifying access removal
associated with the termination
action; and
•
Logs or other demonstration
showing such persons no
longer have access.
Page 12 of 27
CIP-011-23 — Cyber Security — Information Protection
CIP-011-3 Table R1 – Information Protection Program
Part
1.6
Applicability
BES Cyber System Information as
identified in Requirement R1 Part 1.1.
Requirement
Verify at least once every 15 calendar
months that access to BES Cyber
System Information is correct and
consists of personnel that the
Responsible Entity determine are
necessary for performing assigned
work functions.
Measure
Examples of evidence may include, but
are not limited to, the documentation
of the review that includes all of the
following:
•
•
•
Draft 1
December 2019
A dated listing of authorizations
for BES Cyber System
information;
Any privileges associated with
the authorizations; and
Dated evidence showing a
verification of the
authorizations and any
privileges were confirmed
correct and the minimum
necessary for performing
assigned work functions.
Page 13 of 27
CIP-011-23 — Cyber Security — Information Protection
R2.
Each Responsible Entity shall implement one or more documented key management program that collectively include the
applicable requirement parts in CIP-011-3 Table R2 – Information Protection. [Violation Risk Factor: Medium] [Time Horizon:
Operations Planning].
M2. Evidence must include each of the applicable documented processes that collectively include each of the applicable
requirement parts in CIP-011-3 Table R2 – Information Protection and additional evidence to demonstrate implementation as
described in the Measures column of the table.
CIP-011-3 Table R2 – Key Management Program
Part
2.1
Applicability
BES Cyber System Information as
identified in Requirement R1 Part 1.1.
Requirement
Where applicable, develop a key
management process(es) to restrict
access with revocation ability, which
shall include the following:
Measure
Examples of evidence may include, but
are not limited to, the following:
•
Dated documentation of key
management method(s),
including key generation, key
distribution, key storage, key
protection, key periods, key
suppression, key revocation
and key disposal are
implemented; and
•
Configuration files, command
output, or architecture
documents.
2.1.1 Key generation
2.1.3 Key distribution
2.1.4 Key storage
2.1.5 Key protection
2.1.6 Key-periods
2.1.7 Key suppression
2.1.8 Key revocation
2.1.9 Key disposal
Draft 1
December 2019
Page 14 of 27
CIP-011-23 — Cyber Security — Information Protection
CIP-011-3 Table R2 – Key Management Program
Part
2.2
Applicability
BES Cyber System Information as
identified in Requirement R1 Part 1.1.
Requirement
Implement controls to separate the
BES Cyber System Information
custodial entity’s duties independently
from the key management program
duties established in Part 2.1.
Measure
Examples of evidence may include, but
are not limited to, the following:
•
Dated documentation of key
management method(s) that
illustrate the Responsible Entity’s
independence from its vendor
(e.g., locations where keys were
generated, dated key period
records for keys, access records to
key storage locations).
• Procedural controls should be
designed to enforce the concept of
separation of duties between the
custodial entity and the key owner.
Draft 1
December 2019
Page 15 of 27
CIP-011-23 — Cyber Security — Information Protection
R32. Each Responsible Entity shall implement one or more documented process(es) that collectively include the applicable
requirement parts in CIP-011-23 Table R23 – BES Cyber Asset Reuse and Disposal. [Violation Risk Factor: Lower] [Time Horizon:
Operations Planning].
M23. Evidence must include each of the applicable documented processes that collectively include each of the applicable
requirement parts in CIP-011-23 Table R23 – BES Cyber Asset Reuse and Disposal and additional evidence to demonstrate
implementation as described in the Measures column of the table.
Draft 1
December 2019
Page 16 of 27
CIP-011-23 — Cyber Security — Information Protection
CIP-011-23 Table R23 – BES Cyber Asset Reuse and Disposal
Part
32.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS;
2. PACS; and
3. PCA
Medium Impact BES Cyber Systems
and their associated:
1. EACMS;
2. PACS; and
3. PCA
Draft 1
December 2019
Requirements
Prior to the release for reuse or
disposal of applicable Cyber Assets
that contain BES Cyber System
Information (except for reuse within
other systems identified in the
“Applicable Systems” column), the
Responsible Entity shall take action to
prevent the unauthorized retrieval of
BES Cyber System Information from
the Cyber Asset data storage media
shall be sanitized or destroyed.
Measures
Examples of acceptable evidence
include, but are not limited to, the
following:
•
Records tracking sanitization
actions taken to prevent
unauthorized retrieval of BES
Cyber System Information such as
clearing, purging, or destroying;
or
•
Records tracking actions such as
encrypting, retaining in the
Physical Security Perimeter or
other methods used to prevent
unauthorized retrieval of BES
Cyber System Information.
Records that indicate the Cyber
Asset’s data storage media was
sanitized or destroyed before
reuse or disposal.
•
Records that indicate chain of
custody was implemented.
Page 17 of 27
CIP-011-23 — Cyber Security — Information Protection
CIP-011-2 Table R2 – BES Cyber Asset Reuse and Disposal
Part
2.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS;
2. PACS; and
3. PCA
Medium Impact BES Cyber Systems
and their associated:
1. EACMS;
2. PACS; and
3. PCA
Draft 1
December 2019
Requirements
Prior to the disposal of applicable
Cyber Assets that contain BES Cyber
System Information, the Responsible
Entity shall take action to prevent the
unauthorized retrieval of BES Cyber
System Information from the Cyber
Asset or destroy the data storage
media.
Measures
Examples of acceptable evidence
include, but are not limited to:
•
Records that indicate that data
storage media was destroyed
prior to the disposal of an
applicable Cyber Asset; or
•
Records of actions taken to
prevent unauthorized retrieval of
BES Cyber System Information
prior to the disposal of an
applicable Cyber Asset.
Page 18 of 27
CIP-011-23 — Cyber Security — Information Protection
C. Compliance
1.
Compliance Monitoring Process:
1.1. Compliance Enforcement Authority:
As defined in the NERC Rules of Procedure, “Compliance Enforcement Authority” (CEA) means
NERC or the Regional Entity in their respective roles of monitoring and enforcing compliance
with the NERC Reliability Standards.
1.2. Evidence Retention:
The following evidence retention periods identify the period of time an entity is required to
retain specific evidence to demonstrate compliance. For instances where the evidence
retention period specified below is shorter than the time since the last audit, the CEA may ask
an entity to provide other evidence to show that it was compliant for the full time period since
the last audit.
The Responsible Entity shall keep data or evidence to show compliance as identified below
unless directed by its CEA to retain specific evidence for a longer period of time as part of an
investigation:
•
Each Responsible Entity shall retain evidence of each requirement in this standard for three
calendar years.
•
If a Responsible Entity is found non-compliant, it shall keep information related to the noncompliance until mitigation is complete and approved or for the time specified above,
whichever is longer.
•
The CEA shall keep the last audit records and all requested and submitted subsequent audit
records.
1.3. Compliance Monitoring and Assessment Processes:
•
Compliance Audits
•
Self-Certifications
•
Spot Checking
•
Compliance Violation Investigations
•
Self-Reporting
•
Complaints
1.4. Additional Compliance Information:
None
Draft 1
December 2019
Page 19 of 27
CIP-011-23 — Cyber Security — Information Protection
2. Table of Compliance Elements
R#
Time
Horizon
VRF
R1
Operations
Planning
Medium
N/A
N/A
The Responsible Entity
has documented or
implemented a BES
Cyber System
Information
protection program,
but did not prevent
unauthorized access
to BES Cyber System
Information by
eliminating the ability
to obtain and use BCSI
during storage, transit,
use and disposal.
(1.2)N/A
The Responsible
Entity has not
documented or
implemented a BES
Cyber System
Information
protection program
(R1).
R2
Operations
Planning
LowerM
ediu
m
N/A
N/A
N/A
The Responsible
Entity has not
documented or
implemented
processes for BES
Cyber System
Information key
Draft 1
December 2019
Violation Severity Levels (CIP-011-23)
Lower VSL
Moderate VSL
High VSL
Severe VSL
Page 20 of 27
CIP-011-23 — Cyber Security — Information Protection
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-011-23)
Lower VSL
Moderate VSL
High VSL
Severe VSL
management
program. (R2)
R2
Operations
3 Planning
Draft 1
December 2019
Lower
N/A
The Responsible Entity
implemented one or more
documented processes but
did not include processes
for reuse as to prevent the
unauthorized retrieval of
BES Cyber System
Information from the BES
Cyber Asset. (23.1)
The Responsible Entity
implemented one or
more documented
processes but did not
include disposal or
media destruction
processes to prevent
the unauthorized
retrieval of BES Cyber
System Information
from the BES Cyber
Asset. (23.21)
The Responsible
Entity has not
documented or
implemented any
processes for
applicable
requirement parts
in CIP-011-23 Table
R23 – BES Cyber
Asset Reuse and
Disposal. (R23)
Page 21 of 27
Guidelines and Technical Basis
D. Regional Variances
None.
E. Interpretations
None.
F. Associated Documents
Guideline and Technical Basis (attached).
Version History
Version
Date
1
11/26/12
Adopted by the NERC Board of
Trustees.
1
11/22/13
2
11/13/14
FERC Order issued approving CIP011-1. (Order becomes effective
on 2/3/14.)
Adopted by the NERC Board of
Trustees.
2
2/12/15
Adopted by the NERC Board of
Trustees.
2
1/21/16
FERC Order issued approving CIP011-2. Docket No. RM15-14-000
Draft 1
December 2019
Action
Change Tracking
Developed to define
the information
protection
requirements in
coordination with other
CIP standards and to
address the balance of
the FERC directives in
its Order 706.
Addressed two FERC
directives from Order
No. 791 related to
identify, assess, and
correct language and
communication
networks.
Replaces the version
adopted by the Board
on 11/13/2014. Revised
version addresses
remaining directives
from Order No. 791
related to transient
devices and low impact
BES Cyber Systems.
Page 22 of 27
Guidelines and Technical Basis
3
Draft 1
December 2019
TBD
Adopted by the NERC Board of
Trustees
Revised to enhance BES
reliability for entities to
manage their BES
Cyber System
Information.
Page 23 of 27
Guidelines and Technical Basis
Note: The Guidelines and Technical Basis section has not been revised as part of Project 201902. A separate technical rationale document has been created to cover Project 2019-02
revisions. Future edits to this section will be conducted through the Technical Rationale for
Reliability Standards Project and the Standards Drafting Process.
Guidelines and Technical Basis
Section 4 – Scope of Applicability of the CIP Cyber Security Standards
Section “4. Applicability” of the standards provides important information for Responsible
Entities to determine the scope of the applicability of the CIP Cyber Security Requirements.
Section “4.1. Functional Entities” is a list of NERC functional entities to which the standard
applies. If the entity is registered as one or more of the functional entities listed in Section 4.1,
then the NERC CIP Cyber Security Standards apply. Note that there is a qualification in Section
4.1 that restricts the applicability in the case of Distribution Providers to only those that own
certain types of systems and equipment listed in 4.2.
Section “4.2. Facilities” defines the scope of the Facilities, systems, and equipment owned by
the Responsible Entity, as qualified in Section 4.1, that is subject to the requirements of the
standard. As specified in the exemption section 4.2.3.5, this standard does not apply to
Responsible Entities that do not have High Impact or Medium Impact BES Cyber Systems under
CIP-002-5.1’s categorization. In addition to the set of BES Facilities, Control Centers, and other
systems and equipment, the list includes the set of systems and equipment owned by
Distribution Providers. While the NERC Glossary term “Facilities” already includes the BES
characteristic, the additional use of the term BES here is meant to reinforce the scope of
applicability of these Facilities where it is used, especially in this applicability scoping section.
This in effect sets the scope of Facilities, systems, and equipment that is subject to the
standards.
Requirement R1:
Responsible Entities are free to utilize existing change management and asset management
systems. However, the information contained within those systems must be evaluated, as the
information protection requirements still apply.
The justification for this requirement is pre-existing from previous versions of CIP and is also
documented in FERC Order No. 706 and its associated Notice of Proposed Rulemaking.
This requirement mandates that BES Cyber System Information be identified. The Responsible
Entity has flexibility in determining how to implement the requirement. The Responsible Entity
should explain the method for identifying the BES Cyber System Information in their
information protection program. For example, the Responsible Entity may decide to mark or
label the documents. Identifying separate classifications of BES Cyber System Information is
not specifically required. However, a Responsible Entity maintains the flexibility to do so if they
desire. As long as the Responsible Entity’s information protection program includes all
applicable items, additional classification levels (e.g., confidential, public, internal use only, etc.)
Draft 1
December 2019
Page 24 of 27
Guidelines and Technical Basis
can be created that go above and beyond the requirements. If the entity chooses to use
classifications, then the types of classifications used by the entity and any associated labeling
should be documented in the entity’s BES Cyber System Information Program.
The Responsible Entity may store all of the information about BES Cyber Systems in a separate
repository or location (physical and/or electronic) with access control implemented. For
example, the Responsible Entity’s program could document that all information stored in an
identified repository is considered BES Cyber System Information, the program may state that
all information contained in an identified section of a specific repository is considered BES
Cyber System Information, or the program may document that all hard copies of information
are stored in a secured area of the building. Additional methods for implementing the
requirement are suggested in the measures section. However, the methods listed in measures
are not meant to be an exhaustive list of methods that the entity may choose to utilize for the
identification of BES Cyber System Information.
The SDT does not intend that this requirement cover publicly available information, such as
vendor manuals that are available via public websites or information that is deemed to be
publicly releasable.
Information protection pertains to both digital and hardcopy information. R1.2 requires one or
more procedures for the protection and secure handling BES Cyber System Information,
including storage, transit, and use. This includes information that may be stored on Transient
Cyber Assets or Removable Media.
The entity’s written Information Protection Program should explain how the entity handles
aspects of information protection including specifying how BES Cyber System Information is to
be securely handled during transit in order to protect against unauthorized access, misuse, or
corruption and to protect confidentiality of the communicated BES Cyber System Information.
For example, the use of a third-party communication service provider instead of organizationowned infrastructure may warrant the use of encryption to prevent unauthorized disclosure of
information during transmission. The entity may choose to establish a trusted communications
path for transit of BES Cyber System Information. The trusted communications path would
utilize a logon or other security measures to provide secure handling during transit. The entity
may employ alternative physical protective measures, such as the use of a courier or locked
container for transmission of information. It is not the intent of this standard to mandate the
use of one particular format for secure handling during transit.
A good Information Protection Program will document the circumstances under which BES
Cyber System Information can be shared with or used by third parties. The organization should
distribute or share information on a need-to-know basis. For example, the entity may specify
that a confidentiality agreement, non-disclosure arrangement, contract, or written agreement
of some kind concerning the handling of information must be in place between the entity and
the third party. The entity’s Information Protection Program should specify circumstances for
sharing of BES Cyber System Information with and use by third parties, for example, use of a
non-disclosure agreement. The entity should then follow their documented program. These
requirements do not mandate one specific type of arrangement.
Draft 1
December 2019
Page 25 of 27
Guidelines and Technical Basis
Requirement R2:
This requirement allows for BES Cyber Systems to be removed from service and analyzed with
their media intact, as that should not constitute a release for reuse. However, following the
analysis, if the media is to be reused outside of a BES Cyber System or disposed of, the entity
must take action to prevent the unauthorized retrieval of BES Cyber System Information from
the media.
The justification for this requirement is pre-existing from previous versions of CIP and is also
documented in FERC Order No. 706 and its associated Notice of Proposed Rulemaking.
If an applicable Cyber Asset is removed from the Physical Security Perimeter prior to action
taken to prevent the unauthorized retrieval of BES Cyber System Information or destroying the
data storage media, the Responsible Entity should maintain documentation that identifies the
custodian for the data storage media while the data storage media is outside of the Physical
Security Perimeter prior to actions taken by the entity as required in R2.
Media sanitization is the process used to remove information from system media such that
reasonable assurance exists that the information cannot be retrieved or reconstructed. Media
sanitization is generally classified into four categories: Disposal, clearing, purging, and
destroying. For the purposes of this requirement, disposal by itself, with the exception of
certain special circumstances, such as the use of strong encryption on a drive used in a SAN or
other media, should never be considered acceptable. The use of clearing techniques may
provide a suitable method of sanitization for media that is to be reused, whereas purging
techniques may be more appropriate for media that is ready for disposal.
The following information from NIST SP800-88 provides additional guidance concerning the
types of actions that an entity might take to prevent the unauthorized retrieval of BES Cyber
System Information from the Cyber Asset data storage media:
Clear: One method to sanitize media is to use software or hardware products to
overwrite storage space on the media with non-sensitive data. This process may include
overwriting not only the logical storage location of a file(s) (e.g., file allocation table) but
also may include all addressable locations. The security goal of the overwriting process
is to replace written data with random data. Overwriting cannot be used for media that
are damaged or not rewriteable. The media type and size may also influence whether
overwriting is a suitable sanitization method [SP 800-36].
Purge: Degaussing and executing the firmware Secure Erase command (for ATA drives
only) are acceptable methods for purging. Degaussing is exposing the magnetic media to
a strong magnetic field in order to disrupt the recorded magnetic domains. A degausser
is a device that generates a magnetic field used to sanitize magnetic media. Degaussers
are rated based on the type (i.e., low energy or high energy) of magnetic media they can
purge. Degaussers operate using either a strong permanent magnet or an
electromagnetic coil. Degaussing can be an effective method for purging damaged or
inoperative media, for purging media with exceptionally large storage capacities, or for
Draft 1
December 2019
Page 26 of 27
Guidelines and Technical Basis
quickly purging diskettes. [SP 800-36] Executing the firmware Secure Erase command
(for ATA drives only) and degaussing are examples of acceptable methods for purging.
Degaussing of any hard drive assembly usually destroys the drive as the firmware that
manages the device is also destroyed.
Destroy: There are many different types, techniques, and procedures for media
destruction. Disintegration, Pulverization, Melting, and Incineration are sanitization
methods designed to completely destroy the media. They are typically carried out at an
outsourced metal destruction or licensed incineration facility with the specific
capabilities to perform these activities effectively, securely, and safely. Optical mass
storage media, including compact disks (CD, CD-RW, CD-R, CD-ROM), optical disks
(DVD), and MO disks, must be destroyed by pulverizing, crosscut shredding or burning.
In some cases such as networking equipment, it may be necessary to contact the
manufacturer for proper sanitization procedure.
It is critical that an organization maintain a record of its sanitization actions to prevent
unauthorized retrieval of BES Cyber System Information. Entities are strongly encouraged to
review NIST SP800-88 for guidance on how to develop acceptable media sanitization processes.
Rationale:
During development of this standard, text boxes were embedded within the standard to explain
the rationale for various parts of the standard. Upon BOT approval, the text from the rationale
text boxes was moved to this section.
Rationale for Requirement R1:
The SDT’s intent of the information protection program is to prevent unauthorized access to
BES Cyber System Information.
Rationale for Requirement R2:
The intent of the BES Cyber Asset reuse and disposal process is to prevent the unauthorized
dissemination of BES Cyber System Information upon reuse or disposal.
Draft 1
December 2019
Page 27 of 27
Implementation Plan
Project 2019-02 BES Cyber System Information Access Management
Reliability Standard CIP-004 and CIP-011
Applicable Standard(s)
•
CIP-004-7 – Cyber Security - Personnel & Training
•
CIP-011-3 – Cyber Security - Information Protection
Requested Retirement(s)
•
CIP-004-6 – Cyber Security - Personnel & Training
•
CIP-011-2 – Cyber Security - Information Protection
Prerequisite Standard(s)
•
None
Applicable Entities
•
Balancing Authority
•
Distribution Provider 1
•
Generator Operator
•
Interchange Coordinator or Interchange Authority
•
Reliability Coordinator
•
Transmission Operator
•
Transmission Owner
•
Facilities 2
Background
The purpose of Project 2019-02 BES Cyber System Information Access Management is to clarify the
CIP requirements related to both managing access and securing BES Cyber System Information
(BCSI). This project proposes revisions to Reliability Standards CIP-004-6 and CIP-011-2, including
moving some existing CIP-004-6 Requirements to proposed CIP-011-3.
1
2
See subject standards for additional information on Distribution Providers subject to the standards.
See subject standards for additional information on Facilities subject to the standards.
RELIABILITY | RESILIENCE | SECURITY
The proposed revisions enhance BES reliability by creating increased choice, greater flexibility,
higher availability, and reduced-cost options for entities to manage their BCSI. In addition, the
proposed revisions clarify the protections expected when utilizing third-party solutions (e.g., cloud
services).
General Considerations
This standard will become effective 18 months following regulatory approval. The 18-month period
provides Responsible Entities with sufficient time to come into compliance with new and revised
Requirements, including taking steps to:
•
Establish and/or modify vendor relationships to establish compliance with the revised CIP-011-3
Requirements;
•
Address the increased scope of the CIP-011-3 “Applicable Systems” and “Applicability” column,
which has a focus on BES Cyber System Information as well as the addition of Protected Cyber
Assets (PCA); and
•
Develop additional sanitization programs for the life cycle of BES Cyber Systems, if necessary.
Effective Date
CIP-004-7 – Cyber Security - Personnel & Training
Where approval by an applicable governmental authority is required, the standard shall become
effective on the first day of the first calendar quarter that is eighteen (18) months after the effective
date of the applicable governmental authority’s order approving the standard, or as otherwise
provided for by the applicable governmental authority.
Where approval by an applicable governmental authority is not required, the standard shall become
effective on the first day of the first calendar quarter that is eighteen (18) months after the date the
standard is adopted by the NERC Board of Trustees, or as otherwise provided for in that jurisdiction.
CIP-011-3 – Cyber Security - Information Protection
Where approval by an applicable governmental authority is required, the standard shall become
effective on the first day of the first calendar quarter that is eighteen (18) months after the effective
date of the applicable governmental authority’s order approving the standard, or as otherwise
provided for by the applicable governmental authority.
Where approval by an applicable governmental authority is not required, the standard shall become
effective on the first day of the first calendar quarter that is eighteen (18) months after the date the
standard is adopted by the NERC Board of Trustees, or as otherwise provided for in that jurisdiction.
Retirement Date
CIP-004-7 – Cyber Security - Personnel & Training
Implementation Plan
Project 2019-02 BES Cyber System Information Access Management | December 2019
2
Reliability Standard CIP-004-6 shall be retired immediately prior to the effective date of CIP-004-7 in
the particular jurisdiction in which the revised standard is becoming effective.
CIP-011-3 – Cyber Security - Information Protection
Reliability Standard CIP-011-2 shall be retired immediately prior to the effective date of CIP-011-3 in
the particular jurisdiction in which the revised standard is becoming effective.
Implementation Plan
Project 2019-02 BES Cyber System Information Access Management | December 2019
3
Unofficial Comment Form
Project 2019-02 BES Cyber System Information Access Management
Do not use this form for submitting comments. Use the Standards Balloting and Commenting System
(SBS) to submit comments on Project 2019-02 BES Cyber System Information Access Management by 8
p.m. Eastern, February 3, 2020.
Additional information is available on the project page. If you have questions, contact Senior Standards
Developer, Latrice Harkness (via email), or at 404-446-9728.
Background Information
The purpose of Project 2019-02 BES Cyber System Information Access Management is to clarify the CIP
requirements related to both managing access and securing BES Cyber System Information (BCSI). This
project proposes revisions to Reliability Standards CIP-004-6 and CIP-011-2, including moving some
existing CIP-004-6 Requirements to proposed CIP-011-3.
The proposed revisions enhance BES reliability by creating increased choice, greater flexibility, higher
availability, and reduced-cost options for entities to manage their BCSI. In addition, the proposed
revisions clarify the protections expected when utilizing third-party solutions (e.g., cloud services).
RELIABILITY | RESILIENCE | SECURITY
Questions
1. The proposed revision to Requirement R1 Part 1.1 adds the requirement to identify BCSI storage
locations. Do you agree that the requirement as written allows the Responsible Entity the flexibility
to identify which storage locations are for BCSI? Do you agree the requirement is necessary? If you
disagree with the changes made, what, specifically, do you disagree with? Please provide specific
suggestions or proposals for any alternative language.
Yes
No
Comments:
2. The standard drafting team (SDT) attempted to maintain backwards compatibility with concepts of
designated storage locations and access-level requirements previously contained in CIP-004-6. Do
you agree that there is a minimal effort to meet this objective while providing greater clarity
between BCSI and BES Cyber System (BCS) requirement obligations?
Yes
No
Comments:
3. The SDT is attempting to expand information storage solutions or security technologies for
Responsible Entities. Do you agree that this approach is reflected in the proposed requirements?
Yes
No
Comments:
4. The SDT is addressing, and further defining, the risk regarding potential compromise of BCSI
through the inclusion of the terms “obtain” and “use” in requirement CIP-011-3, Requirement R1
Part 1.2. Do you agree that this will more accurately address the risk related to the potential
compromise of BCSI versus the previous approach?
Yes
No
Comments:
Unofficial Comment Form
Project 2019-02 BES Cyber System Information Access Management | December 2019
2
5. The SDT is proposing to have BCSI in the “Applicability” column. Do you agree that this provides
better clarity on the focus of the requirements?
Yes
No
Comments:
6. The SDT is proposing to address the security risks associated with BCSI environments, particularly
owned or managed by vendors via CIP-011-3, Requirements R1, Part 1.4, and Requirement R2,
Parts 2.1 and 2.2. Do you agree that these requirements will promote a better understanding of
security risks involved while also providing opportunities for the Responsible Entity to address
appropriate security controls?
Yes
No
Comments:
7. The SDT is addressing the growing demand for Responsible Entities to leverage new and future
technologies such as cloud services. Do you agree that the proposed changes support this
endeavor?
Yes
No
Comments:
8. The SDT is proposing a new “key management” set of requirements. Do you agree that key
management involving BCSI is integral to protecting BCSI?
Yes
No
Comments:
Unofficial Comment Form
Project 2019-02 BES Cyber System Information Access Management | December 2019
3
9. The SDT is proposing to shift the focus of security of BCSI more towards the BCSI itself rather than
physical security or “hardware” storage locations. Do you agree that this approach aids the
Responsible Entity by reducing potential unneeded controls on BCS?
Yes
No
Comments:
10. The SDT is proposing to transfer all BCSI-related requirements from CIP-004 to CIP-011 with the
understanding that this will further address differing security needs between BCSI and BCS as well
as ease future standard development. Do you agree that this provides greater clarity between BCSI
and BCS requirements?
Yes
No
Comments:
11. The SDT increased the scope of information to be evaluated by including both Protected Cyber
Assets and all Medium Impact (not just Medium Impact Assets with External Routable
Connectivity). Are there any concerns regarding a Responsible Entity attempting to meet these
proposed, expanded requirements?
Yes
No
Comments:
12. In looking at all proposed recommendations from the SDT, are the proposed changes a costeffective approach?
Yes
No
Comments:
Unofficial Comment Form
Project 2019-02 BES Cyber System Information Access Management | December 2019
4
13. Do you have any other general recommendations/considerations for the drafting team?
Yes
No
Comments:
Unofficial Comment Form
Project 2019-02 BES Cyber System Information Access Management | December 2019
5
Technical Rationale for Reliability Standard
CIP-004-7
December 2019
CIP-004-7 – Personnel & Training
Rationale for Requirement R4
The standard drafting team (SDT) utilized the concept of separating the association of BES Cyber System
Information (BCSI) and the BES Cyber System with associated applicable systems within the CIP-004
Standard. This approach was decided to allow for maturity in the CIP-011 Information Protection
Standard, facilitate future iterations of CIP-004, and remove confusion regarding protection of BCSI and
BES Cyber System with associated applicable systems due to the Applicable Systems column in the
requirement.
CIP-011 will include the complete lifecycle of information related to BCSI (i.e., identification, protection,
access management, and disposal), thus focusing on protection and access management on BCSI itself, as
appropriate. The diverse needs of entities can be addressed directly without causing confusion or
affecting access management of BCSI and associated repositories. This will allow future standard
development for information protection to mature in an easier fashion without disturbing requirements
that involve access management of BES Cyber Systems and their associated applicable systems that may
require electronic and /or physical security perimeters.
Physical access to BCSI can now be addressed separately from access to specific host media / devices
whether a designated storage location or a BES Cyber System and its associated applicable systems.
This will allow the SDT the ability to move away from specifically having requirements around putting
controls pertaining to designated storage locations or BES Cyber Systems and their associated applicable
systems. The focus will move to implementing controls to address BCSI regardless of where the media
resides at any given time.
Rationale for Requirement R4, Part 4.1.3
The intent of Requirement R4, Part 4.1.3, is now addressed in the revised version of CIP-011 regarding
BCSI access management; therefore, the language was removed from Requirement R4, Part 4.1.
Rationale for Deletion of Requirement R4, Part 4.4
The intent of Requirement R4, Part 4.4, is now addressed in the revised version of CIP-011 regarding BCSI
access management; therefore, this requirement is being recommended for retirement.
RELIABILITY | RESILIENCE | SECURITY
Rationale for Deletion of Requirement R5, Part 5.3
The intent of Requirement R5, Part 5.3, is now addressed in the revised version of CIP-011 regarding BCSI
access management; therefore, this requirement is being recommended for retirement.
Rationale for Deletion of Requirement R5, Part 5.4
The language connecting this requirement to Requirement R5, Part 5.3, has been removed since the SDT
is recommending the retirement of Requirement R5, Part 5.3.
Technical Rationale for Reliability Standard CIP-004-7
Project 2019-02 BCSI Access Management |December 2019
2
This section contains the Guidelines and Technical basis as a “cut and paste” from CIP-004-6 standard to
preserve any historical references.
Section 4 – Scope of Applicability of the CIP Cyber Security Standards
Section “4. Applicability” of the standards provides important information for Responsible Entities to
determine the scope of the applicability of the CIP Cyber Security Requirements.
Section “4.1. Functional Entities” is a list of NERC functional entities to which the standard applies. If the
entity is registered as one or more of the functional entities listed in Section 4.1, then the NERC CIP Cyber
Security Standards apply. Note that there is a qualification in Section 4.1 that restricts the applicability in
the case of Distribution Providers to only those that own certain types of systems and equipment listed in
4.2.
Section “4.2. Facilities” defines the scope of the Facilities, systems, and equipment owned by the
Responsible Entity, as qualified in Section 4.1, that is subject to the requirements of the standard. As
specified in the exemption section 4.2.3.5, this standard does not apply to Responsible Entities that do
not have High Impact or Medium Impact BES Cyber Systems under CIP-002-5.1’s categorization. In
addition to the set of BES Facilities, Control Centers, and other systems and equipment, the list includes
the set of systems and equipment owned by Distribution Providers. While the NERC Glossary term
“Facilities” already includes the BES characteristic, the additional use of the term BES here is meant to
reinforce the scope of applicability of these Facilities where it is used, especially in this applicability
scoping section. This in effect sets the scope of Facilities, systems, and equipment that is subject to the
standards.
Requirement R1:
The security awareness program is intended to be an informational program, not a formal training
program. It should reinforce security practices to ensure that personnel maintain awareness of best
practices for both physical and electronic security to protect its BES Cyber Systems. The Responsible
Entity is not required to provide records that show that each individual received or understood the
information, but they must maintain documentation of the program materials utilized in the form of
posters, memos, and/or presentations.
Examples of possible mechanisms and evidence, when dated, which can be used are:
•
Direct communications (e.g., emails, memos, computer based training, etc.);
•
Indirect communications (e.g., posters, intranet, brochures, etc.);
•
Management support and reinforcement (e.g., presentations, meetings, etc.).
Requirement R2:
Training shall cover the policies, access controls, and procedures as developed for the BES Cyber Systems
and include, at a minimum, the required items appropriate to personnel roles and responsibilities from
Table R2. The Responsible Entity has the flexibility to define the training program and it may consist of
multiple modules and multiple delivery mechanisms, but a single training program for all individuals
Technical Rationale for Reliability Standard CIP-004-7
Project 2019-02 BCSI Access Management |December 2019
3
needing to be trained is acceptable. The training can focus on functions, roles or responsibilities at the
discretion of the Responsible Entity.
One new element in the training content is intended to encompass networking hardware and software
and other issues of electronic interconnectivity supporting the operation and control of BES Cyber
Systems as per FERC Order No. 706, Paragraph 434. Additionally, training should address the risk posed
when connecting and using Transient Cyber Assets and Removable Media with BES Cyber Systems or
within an Electronic Security Perimeter. As noted in FERC Order No. 791, Paragraph 135, Transient Cyber
Assets and Removable Media have been the source of incidents where malware was introduced into
electric generation industrial control systems in real-world situations. Training on their use is a key
element in protecting BES Cyber Systems. This is not intended to provide technical training to individuals
supporting networking hardware and software, but educating system users of the cyber security risks
associated with the interconnectedness of these systems. The users, based on their function, role, or
responsibility, should have a basic understanding of which systems can be accessed from other systems
and how the actions they take can affect cyber security.
Each Responsible Entity shall ensure all personnel who are granted authorized electronic access and/or
authorized unescorted physical access to its BES Cyber Systems, including contractors and service
vendors, complete cyber security training prior to their being granted authorized access, except for CIP
Exceptional Circumstances. To retain the authorized accesses, individuals must complete the training at
least one every 15 months.
Requirement R3:
Each Responsible Entity shall ensure a personnel risk assessment is performed for all personnel who are
granted authorized electronic access and/or authorized unescorted physical access to its BES Cyber
Systems, including contractors and service vendors, prior to their being granted authorized access, except
for program specified exceptional circumstances that are approved by the single senior management
official or their delegate and impact the reliability of the BES or emergency response. Identity should be
confirmed in accordance with federal, state, provincial, and local laws, and subject to existing collective
bargaining unit agreements. Identity only needs to be confirmed prior to initially granting access and only
requires periodic confirmation according to the entity’s process during the tenure of employment, which
may or may not be the same as the initial verification action.
A seven year criminal history check should be performed for those locations where the individual has
resided for at least six consecutive months. This check should also be performed in accordance with
federal, state, provincial, and local laws, and subject to existing collective bargaining unit agreements.
When it is not possible to perform a full seven year criminal history check, documentation must be made
of what criminal history check was performed, and the reasons a full seven-year check could not be
performed. Examples of this could include individuals under the age of 25 where a juvenile criminal
history may be protected by law, individuals who may have resided in locations from where it is not
possible to obtain a criminal history records check, violates the law or is not allowed under the existing
collective bargaining agreement. The Responsible Entity should consider the absence of information for
the full seven years when assessing the risk of granting access during the process to evaluate the criminal
Technical Rationale for Reliability Standard CIP-004-7
Project 2019-02 BCSI Access Management |December 2019
4
history check. There needs to be a personnel risk assessment that has been completed within the last
seven years for each individual with access. A new criminal history records check must be performed as
part of the new PRA. Individuals who have been granted access under a previous version of these
standards need a new PRA within seven years of the date of their last PRA. The clarifications around the
seven year criminal history check in this version do not require a new PRA be performed by the
implementation date.
Requirement R4:
Authorization for electronic and unescorted physical access and access to BES Cyber System Information
must be on the basis of necessity in the individual performing a work function. Documentation showing
the authorization should have some justification of the business need included. To ensure proper
segregation of duties, access authorization and provisioning should not be performed by the same person
where possible.
This requirement specifies both quarterly reviews and reviews at least once every 15 calendar months.
Quarterly reviews are to perform a validation that only authorized users have been granted access to BES
Cyber Systems. This is achieved by comparing individuals actually provisioned to a BES Cyber System
against records of individuals authorized to the BES Cyber System. The focus of this requirement is on the
integrity of provisioning access rather than individual accounts on all BES Cyber Assets. The list of
provisioned individuals can be an automatically generated account listing. However, in a BES Cyber
System with several account databases, the list of provisioned individuals may come from other records
such as provisioning workflow or a user account database where provisioning typically initiates.
The privilege review at least once every 15 calendar months is more detailed to ensure an individual’s
associated privileges are the minimum necessary to perform their work function (i.e., least privilege).
Entities can more efficiently perform this review by implementing role-based access. This involves
determining the specific roles on the system (e.g., system operator, technician, report viewer,
administrator, etc.) then grouping access privileges to the role and assigning users to the role. Role-based
access does not assume any specific software and can be implemented by defining specific provisioning
processes for each role where access group
Technical Rationale for Reliability Standard CIP-004-7
Project 2019-02 BCSI Access Management |December 2019
5
1/1
1) Quarterly access review
2) privilege review (at least once every
15 calendar months)
3) BES Cyber
System Information
review (at least once every
4/1
15 calendar months)
Quarterly access review
2/1
3/1
4/1
7/1
Quarterly access review
5/1
6/1
7/1
1/1
1) Quarterly access review
2) privilege review
(at least once every
15 calendar months)
3) BES Cyber System
Information review
(at least once every
15 calendar months)
10/1
Quarterly access review
8/1
9/1
10/1
11/1
12/1
1/1
1/1
assignments cannot be performed. Role-based access permissions eliminate the need to perform the
privilege review on individual accounts. An example timeline of all the reviews in Requirement R4 is
included below.
Separation of duties should be considered when performing the reviews in Requirement R4. The person
reviewing should be different than the person provisioning access.
If the results of quarterly or at least once every 15 calendar months account reviews indicate an
administrative or clerical error in which access was not actually provisioned, then the SDT intends that this
error should not be considered a violation of this requirement.
For BES Cyber Systems that do not have user accounts defined, the controls listed in Requirement R4 are
not applicable. However, the Responsible Entity should document such configurations.
Requirement R5:
The requirement to revoke access at the time of the termination action includes procedures showing
revocation of access concurrent with the termination action. This requirement recognizes that the timing
of the termination action may vary depending on the circumstance. Some common scenarios and possible
processes on when the termination action occurs are provided in the following table. These scenarios are
not an exhaustive list of all scenarios, but are representative of several routine business practices.
Scenario
Immediate involuntary
termination
Possible Process
Human resources or corporate security escorts the individual
off site and the supervisor or human resources personnel
notify the appropriate personnel to begin the revocation
process.
Technical Rationale for Reliability Standard CIP-004-7
Project 2019-02 BCSI Access Management |December 2019
6
Scheduled involuntary
termination
Human resources personnel are notified of the termination
and work with appropriate personnel to schedule the
revocation of access at the time of termination.
Voluntary termination
Human resources personnel are notified of the termination
and work with appropriate personnel to schedule the
revocation of access at the time of termination.
Retirement where the last
working day is several weeks
prior to the termination date
Human resources personnel coordinate with manager to
determine the final date access is no longer needed and
schedule the revocation of access on the determined day.
Death
Human resources personnel are notified of the death and
work with appropriate personnel to begin the revocation
process.
Revocation of electronic access should be understood to mean a process with the end result that
electronic access to BES Cyber Systems is no longer possible using credentials assigned to or known by the
individual(s) whose access privileges are being revoked. Steps taken to accomplish this outcome may
include deletion or deactivation of accounts used by the individual(s), but no specific actions are
prescribed. Entities should consider the ramifications of deleting an account may include incomplete
event log entries due to an unrecognized account or system services using the account to log on.
The initial revocation required in Requirement R5.1 includes unescorted physical access and Interactive
Remote Access. These two actions should prevent any further access by the individual after termination. If
an individual still has local access accounts (i.e., accounts on the Cyber Asset itself) on BES Cyber Assets,
then the Responsible Entity has 30 days to complete the revocation process for those accounts. However,
nothing prevents a Responsible Entity from performing all of the access revocation at the time of
termination.
For transferred or reassigned individuals, a review of access privileges should be performed. This review
could entail a simple listing of all authorizations for an individual and working with the respective
managers to determine which access will still be needed in the new position. For instances in which the
individual still needs to retain access as part of a transitory period, the entity should schedule a time to
review these access privileges or include the privileges in the quarterly account review or annual privilege
review.
Revocation of access to shared accounts is called out separately to prevent the situation where passwords
on substation and generation devices are constantly changed due to staff turnover.
Requirement 5.5 specified that passwords for shared accounts are to be changed within 30 calendar days
of the termination action or when the Responsible Entity determines an individual no longer requires
access to the account as a result of a reassignment or transfer. The 30 days applies under normal
operating conditions. However, circumstances may occur where this is not possible. Some systems may
Technical Rationale for Reliability Standard CIP-004-7
Project 2019-02 BCSI Access Management |December 2019
7
require an outage or reboot of the system in order to complete the password change. In periods of
extreme heat or cold, many Responsible Entities may prohibit system outages and reboots in order to
maintain reliability of the BES. When these circumstances occur, the Responsible Entity must document
these circumstances and prepare to change the password within 10 calendar days following the end of
the operating circumstances. Records of activities must be retained to show that the Responsible Entity
followed the plan they created.
Rationale:
During development of this standard, text boxes were embedded within the standard to explain the
rationale for various parts of the standard. Upon BOT approval, the text from the rationale text boxes
was moved to this section.
Rationale for Requirement R1:
Ensures that Responsible Entities with personnel who have authorized electronic or authorized
unescorted physical access to BES Cyber Assets take action so that those personnel with such authorized
electronic or authorized unescorted physical access maintain awareness of the Responsible Entity’s
security practices.
Rationale for Requirement R2:
To ensure that the Responsible Entity’s training program for personnel who need authorized electronic
access and/or authorized unescorted physical access to BES Cyber Systems covers the proper policies,
access controls, and procedures to protect BES Cyber Systems and are trained before access is authorized.
Rationale for Requirement R3:
To ensure that individuals who need authorized electronic or authorized unescorted physical access to
BES Cyber Systems have been assessed for risk. Whether initial access or maintaining access, those with
access must have had a personnel risk assessment completed within the last 7 years.
Rationale for Requirement R4:
To ensure that individuals with access to BES Cyber Systems and the physical and electronic locations
where BES Cyber System Information is stored by the Responsible Entity have been properly authorized
for such access. “Authorization” should be considered to be a grant of permission by a person or persons
empowered by the Responsible Entity to perform such grants and included in the delegations referenced
in CIP-003-6. “Provisioning” should be considered the actions to provide access to an individual.
Access is physical, logical, and remote permissions granted to Cyber Assets composing the BES Cyber
System or allowing access to the BES Cyber System. When granting, reviewing, or revoking access, the
Responsible Entity must address the Cyber Asset specifically as well as the systems used to enable such
access (i.e., physical access control system, remote access system, directory services).
CIP Exceptional Circumstances are defined in a Responsible Entity’s policy from CIP-003-6 and allow an
exception to the requirement for authorization to BES Cyber Systems and BES Cyber System Information.
Technical Rationale for Reliability Standard CIP-004-7
Project 2019-02 BCSI Access Management |December 2019
8
Quarterly reviews in Part 4.5 are to perform a validation that only authorized users have been granted
access to BES Cyber Systems. This is achieved by comparing individuals actually provisioned to a BES
Cyber System against records of individuals authorized to access the BES Cyber System. The focus of this
requirement is on the integrity of provisioning access rather than individual accounts on all BES Cyber
Assets. The list of provisioned individuals can be an automatically generated account listing. However, in
a BES Cyber System with several account databases, the list of provisioned individuals may come from
other records such as provisioning workflow or a user account database where provisioning typically
initiates.
If the results of quarterly or annual account reviews indicate an administrative or clerical error in which
access was not actually provisioned, then the SDT intends that the error should not be considered a
violation of this requirement.
For BES Cyber Systems that do not have user accounts defined, the controls listed in Requirement R4 are
not applicable. However, the Responsible Entity should document such configurations.
Rationale for Requirement R5:
The timely revocation of electronic access to BES Cyber Systems is an essential element of an access
management regime. When an individual no longer requires access to a BES Cyber System to perform his
or her assigned functions, that access should be revoked. This is of particular importance in situations
where a change of assignment or employment is involuntary, as there is a risk the individual(s) involved
will react in a hostile or destructive manner.
In considering how to address directives in FERC Order No. 706 directing “immediate” revocation of
access for involuntary separation, the SDT chose not to specify hourly time parameters in the requirement
(e.g., revoking access within 1 hour). The point in time at which an organization terminates a person
cannot generally be determined down to the hour. However, most organizations have formal termination
processes, and the timeliest revocation of access occurs in concurrence with the initial processes of
termination.
Access is physical, logical, and remote permissions granted to Cyber Assets composing the BES Cyber
System or allowing access to the BES Cyber System. When granting, reviewing, or revoking access, the
Responsible Entity must address the Cyber Asset specifically as well as the systems used to enable such
access (e.g., physical access control system, remote access system, directory services).
Technical Rationale for Reliability Standard CIP-004-7
Project 2019-02 BCSI Access Management |December 2019
9
Technical Rationale for Reliability Standard
CIP-011-3
December 2019
CIP-011-3 – Information Protection
Rationale for Applicability Section
Standard CIP-011 has been modified to enhance protection of BES Cyber System Information (BCSI). The
modified requirements under CIP-011 will address protection of information in several facets that are
discussed in this document, which include the following:
•
Identification of BCSI
•
Prevention of unauthorized access to BCSI
•
Authorization of approved access to BCSI
•
Risk assessments for BCSI not stored in the Responsible Entity’s environment
•
Termination of access to BCSI
•
Review of access BCSI
•
Key management to restrict access to BCSI
•
Controls to separate duties for protecting BCSI
To provide clarity, the Applicability Systems column, which now contains BCSI, was included to associate
the requirement and address the focus on protecting the BCSI regardless of the location of the BCSI. In
addition, the title of the column has been changed to “Applicability” to accommodate this philosophical
change.
To address access-management-related requirements for BCSI, the related requirements from CIP-004-6
(Requirement R4, Parts 4.1.3 and 4.4, and Requirement R5, Part 5.3) have been transferred to CIP-011.
This allows CIP-011 to become a more mature and easier standard to follow and update for future
modifications.
Rationale for Modifications to Requirement R1, Part 1.1
Requirement R1, Part 1.1, is intended to solely identify BCSI and provide documented methods to support
this identification process.
The standard drafting team (SDT) clarified the intent of addressing BCSI as opposed to the BES Cyber
System (BCS) with associated applicable systems, which may contain BCSI; the Applicable Systems column
RELIABILITY | RESILIENCE | SECURITY
has added language to specify system information that is affiliated with High Impact and Medium Impact
BES Cyber Systems and their associated applicable systems. In addition, the title of the column has been
changed to “Applicability” to accommodate this philosophical change.
Protected Cyber Assets were added to the Applicability column to ensure system information pertaining
to Protected Cyber Assets is reviewed within the Responsibility Entity’s information protection program
subject to CIP-011 requirements, which was not previously required. Protected Cyber Assets are also
applicable to CIP-011-3, Requirement R1, Parts 1.2 through 1.6, and CIP-011-3, Requirement R2, Parts 2.1
and 2.2.
Requirement language was added to Requirement R1, Part 1.1, to identify designated BCSI storage
locations, whether physical or electronic. This identification should be as follows:
1) Defined as a friendly name of the electronic or physical repository (thus protecting the actual
storage location); and
2) The description of the storage location (e.g., physical or electronic, off-premises or on premises).
The SDT wanted to ensure access management controls were focused on access to BCSI rather than
access to BCSI designated storage locations. If a BCSI designated storage location was not identified
because it does not exist, this would provide a means of accounting and clarifying this potential scenario.
The SDT has intentionally not included Low Impact BCS and their associated systems in CIP011. Requirement R1, Part 1.1, only includes High Impact and Medium Impact BCS and their associated
systems (PACS, EACMS, and PCA). The SDT also referenced Requirement R1, Part 1.1, in the Applicability
column of Requirement R1, Parts 1.2 through 1.6, and Requirement R2, Parts 2.1 and 2.2, so the
Responsible Entity can easily determine the applicability of those sub-requirements based on how the
Responsible Entity defined and identified BCSI to satisfy Requirement R1, Part 1.1. This further clarifies
there is no CIP-011 applicability to Low Impact BCS and their associated systems.
Rationale for Modifications to Requirement R1, Part 1.2
Requirement R1, Part 1.2, addresses protecting and securely handling BCSI throughout its life cycle. This
life cycle includes creation, use, exchange or sharing (i.e., transit), storage, and disposal. A key
component of the information protection of BCSI is the secure handling of BCSI during each of these life
cycle phases.
The SDT clarified the intent of addressing BCSI as opposed to the BES Cyber System with associated
applicable systems, which may contain BCSI. The Applicable Systems column has added language to
specify BCSI that is affiliated with associated applicable systems. In addition, the title of the column has
been changed to “Applicability” to accommodate this philosophical change.
Language was added to incorporate the NERC CMEP Practice Guide where BCSI access is defined as the
ability to obtain and use BCSI.
Technical Rationale for Reliability Standard CIP-011-3
Project 2019-02 BCSI Access Management |December 2019
2
Requirement language was revised to reflect consistency with other CIP requirements as well as the
current rationale for CIP-011-2, Requirement R1 (e.g., prevent unauthorized access).
Requirement language was added to include disposal as part of the BCSI life cycle. While it is assumed
that disposal of BCSI is part of the BCSI life cycle, it was not previously required.
Rationale for New Requirement R1, Part 1.3
New Requirement R1, Part 1.3, was transferred from CIP-004-6, Requirement R4, Part 4.1.3, to
consolidate into one Standard both BCSI protection and access authorization to BCSI.
The SDT wanted to separate the concept of protecting information via a physical device or location from
protecting the information (BCSI) itself. If the focus is protection of BCSI, the device or storage location
becomes less relevant. This is important when considering vendor storage as a service and security
considerations regarding physical access and information moving between physical devices outside of the
Responsible Entity’s direct control. To accomplish this, the focus and means of protection have been
shifted to address the possession and utilization of the information. Possession of BCSI addresses physical
and electronic/digital controls to protect BCSI. Utilization of BCSI addresses that when BCSI is not in
possession, an entity can take precautions to reasonably assure that, if BCSI is compromised from a
possession aspect, the BCSI would not be able to be utilized. There are three benefits with moving in this
direction:
1) There are different levels of compromise. This provides a more granular way of evaluating and
reporting risk during a BCSI compromise. Before this approach, reporting a compromise or
mishandling was binary and did not accurately depict risk or the actual ability of a threat actor to
capitalize and exploit the information.
2) The focus is now on ensuring controls around BCSI. Physical and electronic controls now become a
means to protect how information is possessed and utilized.
3) There is now the ability for the entity to address controls that are independent of possession of
BCSI. This will play a significant role in leveraging technologies such as the “cloud.”
The SDT also wanted to ensure backwards compatibility with the previous requirement, where feasible.
Authorization for electronic and unescorted physical access and access to BCSI must still be based on
necessity of the individual performing a work function. Documentation showing the authorization should
still have some justification of the business need included. To ensure proper segregation of duties, the
same person should still not perform access authorization and provisioning, where possible.
The SDT clarified the intent of addressing BCSI as opposed to the BES Cyber System with associated
applicable systems, which may contain BCSI. The Applicable Systems column has added language to
specify BCSI that is affiliated with associated applicable systems. In addition, the title of the column has
been changed to “Applicability” to accommodate this philosophical change.
Technical Rationale for Reliability Standard CIP-011-3
Project 2019-02 BCSI Access Management |December 2019
3
Rationale for New Requirement R1, Part 1.4
New Requirement R1, Part 1.4, was drafted to allow Responsible Entities to implement a BCSI risk
management methodology for vendors that store the Responsible Entity’s BCSI and allow a risk-based
approach to address the security objectives. One example of a risk-based approach is allowing
Responsible Entities to develop their BCSI risk management methodology around risks posed by various
vendors involved within the Responsible Entity’s BCSI life cycle. This flexibility is important to account for
the varying needs and characteristics of Responsible Entities and the diversity of BCSI-related
environments, technologies, and risk.
The SDT recognized that CIP-013-1, Requirement R1, can be leveraged to incorporate protection of BCSI
but does not currently include information protection.
This requirement includes the following three sub-requirements as a basis for implementing a BCSI risk
management methodology:
1) Part 1.4.1 is included so the Responsible Entity will perform an initial risk assessment of any
vendor(s) selected to store its BCSI to identify risk factors that could potentially compromise the
Responsible Entity’s BCSI within the vendor’s environment, analyze the risk of the BCSI being
compromised, and review the results of the risk analysis.
2) Part 1.4.2 is included so the Responsible Entity will review the vendor(s) that stores its BCSI at
least every 15 calendar months to confirm whether the vendor(s) is still the most reliable vendor
to perform that function for the Responsible Entity and the Bulk Electric System.
3) Part 1.4.3 is included so the Responsible Entity will document the results from the risk
assessments performed in Parts 1.4.1 and 1.4.2 and an action plan to remediate or mitigate risks
identified in the assessment.
The SDT clarified the intent of addressing BCSI as opposed to the BES Cyber System with associated
applicable systems, which may contain BCSI. The Applicable Systems column has added language to
specify BCSI that is affiliated with associated applicable systems. In addition, the title of the column has
been changed to “Applicability” to accommodate this philosophical change.
Rationale for New Requirement R1, Part 1.5
New Requirement R1, Part 1.5, was transferred from CIP-004-6, Requirement R5, Part 5.3, to consolidate
into one Standard both BCSI protection and BCSI access revocation for termination actions within
24 hours.
The SDT wanted to ensure backwards compatibility with the previous requirement, where feasible. The
requirement to revoke access to BCSI at the time of the termination action still includes procedures
showing revocation of access to BCSI concurrent with the termination action. This requirement also still
recognizes the timing of the termination action might vary depending on the circumstance.
For applicability, the SDT included Medium Impact BES Cyber Systems with this requirement regardless of
whether the Medium Impact BES Cyber System had External Routable Connectivity. The SDT does not
Technical Rationale for Reliability Standard CIP-011-3
Project 2019-02 BCSI Access Management |December 2019
4
feel that External Routable Connectivity is a determining factor for what the Responsible Entity has
identified as BCSI.
Revocation of electronic access is still understood to mean a process with the result that electronic access
to BCSI is no longer possible using credentials assigned to or known by the individual(s) whose access
privileges are being revoked. Steps taken to accomplish this outcome may include deletion or
deactivation of accounts used by the individual(s), but no specific actions are prescribed. Responsible
Entities should still consider the ramifications of deleting an account might include incomplete event log
entries due to an unrecognized account or system services using the account to log on.
The SDT clarified the intent of addressing BCSI as opposed to the BES Cyber System with associated
applicable systems, which may contain BCSI. The Applicable Systems column has added language to
specify BCSI that is affiliated with associated applicable systems. In addition, the title of the column has
been changed to “Applicability” to accommodate this philosophical change.
Rationale for New Requirement R1, Part 1.6
New Requirement R1, Part 1.6, was transferred from CIP-004-6, Requirement R4, Part 4.4, to consolidate
into one Standard both BCSI protection and the 15-calendar-month BCSI access review.
The SDT wanted to ensure backwards compatibility with the previous requirement, where feasible. The
BCSI privilege review at least once every 15 calendar months is still in place to ensure an individual’s
associated privileges to BCSI are the minimum necessary to perform their work function (i.e., least
privilege). This involves determining the specific roles with BCSI (e.g., system operator, technician, report
viewer, administrator) then grouping access privileges to the role and assigning users to the role.
Role-based access to BCSI does not assume any specific software, and it can be implemented by defining
specific provisioning processes for each role where access group assignments cannot be performed.
Role-based access permissions eliminate the need to perform the BCSI privilege review on individual
accounts.
The SDT clarified the intent of addressing BCSI as opposed to the BES Cyber System with associated
applicable systems, which may contain BCSI. The Applicable Systems column has added language to
specify BCSI that is affiliated with associated applicable systems. In addition, the title of the column has
been changed to “Applicability” to accommodate this philosophical change.
Rationale for New Requirement R2, Part 2.1
New Requirement R2, Part 2.1, was drafted by the SDT to require Responsible Entities to develop a key
management process(es) within their information protection programs to restrict access with revocation
ability. Key management provides a layer of defense against bad actors who may have the means to
physically or electronically obtain BCSI but not use or modify BCSI; this has not been previously required
but is needed regardless of the location or state in which the Responsible Entity’s BCSI resides. The
requirement language includes the minimum expectations for the key management life cycle to guide
Responsible Entities while they are developing a key management program and to provide an auditable
requirement for Compliance Enforcement Authorities.
Technical Rationale for Reliability Standard CIP-011-3
Project 2019-02 BCSI Access Management |December 2019
5
The SDT identified the intent of addressing BCSI as opposed to the BES Cyber System with associated
applicable systems, which may contain BCSI. The Applicability column has been included to accommodate
this philosophical change and to be consistent with the Applicability language added in Requirement R1,
Parts 1.2 through 1.6.
Rationale for New Requirement R2, Part 2.2
New Requirement R2, Part 2.2, was drafted to require Responsible Entities to ensure separation of duties
in the Responsible Entity’s key management process(es) so, regardless of the location or state in which
the Responsible Entity’s BCSI resides, the risk of unauthorized access to the Responsible Entity’s BCSI can
be minimized. Controls must be implemented to separate the BES Cyber System Information custodial
entity’s duties independently from the key management duties established in Requirement R2, Part 2.1.
If a Responsibility Entity is unable to implement these controls, and there is a compromise of its BCSI, the
time and cost for a Responsible Entity to recover from the compromise of its BCSI could be significant to
the Responsible Entity and even to the Bulk Electric System.
The SDT identified the intent of addressing BCSI as opposed to the BES Cyber System with associated
applicable systems, which may contain BCSI. The Applicability column has been included to accommodate
this philosophical change and to be consistent with the Applicability language added in Requirement R1,
Parts 1.2 through 1.6, and Requirement R2, Part 2.1.
Rationale for Modifications to Requirement R2, Part 2.1 (will become new Requirement R3, Part 3.1)
The SDT combined CIP-011-2, Requirement R2, Part 2.1 (reuse) and CIP-011-2, Requirement R2, Part 2.2
(disposal) within the same requirement language under CIP-011-3 Requirement R3, Part 3.1.
In addition, the phrase “that contain BES Cyber System Information” was removed from the requirement
language effectively expanding applicability of sanitization or destruction practices to all Applicable
Systems, not just those containing BCSI. This was done to align with the historical intent of CIP-007-3 R7
where reliability data was required to be sanitized as well from Cyber Assets before reuse or disposal.
Rationale for Retirement of CIP-011-2 Requirement R2, Part 2.2
The intent of CIP-011-2, Requirement R2, Part 2.2, which is related to BES Cyber Asset disposal, will be
addressed in CIP-011-3, Requirement R3, Part 3.1, so CIP-011-2, Requirement R2, Part 2.2, is being
recommended for retirement.
Technical Rationale for Reliability Standard CIP-011-3
Project 2019-02 BCSI Access Management |December 2019
6
Technical Rationale for Reliability Standard CIP-011-2
This section contains the Guidelines and Technical basis as a “cut and paste” from CIP-011-2 standard to
preserve any historical references.
Section 4 – Scope of Applicability of the CIP Cyber Security Standards
Section “4. Applicability” of the standards provides important information for Responsible Entities to
determine the scope of the applicability of the CIP Cyber Security Requirements.
Section “4.1. Functional Entities” is a list of NERC functional entities to which the standard applies. If the
entity is registered as one or more of the functional entities listed in Section 4.1, then the NERC CIP Cyber
Security Standards apply. Note that there is a qualification in Section 4.1 that restricts the applicability in
the case of Distribution Providers to only those that own certain types of systems and equipment listed in
4.2.
Section “4.2. Facilities” defines the scope of the Facilities, systems, and equipment owned by the
Responsible Entity, as qualified in Section 4.1, that is subject to the requirements of the standard. As
specified in the exemption section 4.2.3.5, this standard does not apply to Responsible Entities that do
not have High Impact or Medium Impact BES Cyber Systems under CIP-002-5.1’s categorization. In
addition to the set of BES Facilities, Control Centers, and other systems and equipment, the list includes
the set of systems and equipment owned by Distribution Providers. While the NERC Glossary term
“Facilities” already includes the BES characteristic, the additional use of the term BES here is meant to
reinforce the scope of applicability of these Facilities where it is used, especially in this applicability
scoping section. This in effect sets the scope of Facilities, systems, and equipment that is subject to the
standards.
Requirement R1:
Responsible Entities are free to utilize existing change management and asset management systems.
However, the information contained within those systems must be evaluated, as the information
protection requirements still apply.
The justification for this requirement is pre-existing from previous versions of CIP and is also documented
in FERC Order No. 706 and its associated Notice of Proposed Rulemaking.
This requirement mandates that BES Cyber System Information be identified. The Responsible Entity has
flexibility in determining how to implement the requirement. The Responsible Entity should explain the
method for identifying the BES Cyber System Information in their information protection program. For
example, the Responsible Entity may decide to mark or label the documents. Identifying separate
classifications of BES Cyber System Information is not specifically required. However, a Responsible Entity
maintains the flexibility to do so if they desire. As long as the Responsible Entity’s information protection
program includes all applicable items, additional classification levels (e.g., confidential, public, internal use
only, etc.) can be created that go above and beyond the requirements. If the entity chooses to use
Technical Rationale for Reliability Standard CIP-011-3
Project 2019-02 BCSI Access Management |December 2019
7
classifications, then the types of classifications used by the entity and any associated labeling should be
documented in the entity’s BES Cyber System Information Protection Program.
The Responsible Entity may store all of the information about BES Cyber Systems in a separate repository
or location (physical and/or electronic) with access control implemented. For example, the Responsible
Entity’s program could document that all information stored in an identified repository is considered BES
Cyber System Information, the program may state that all information contained in an identified section
of a specific repository is considered BES Cyber System Information, or the program may document that
all hard copies of information are stored in a secured area of the building. Additional methods for
implementing the requirement are suggested in the measures section. However, the methods listed in
measures are not meant to be an exhaustive list of methods that the entity may choose to utilize for the
identification of BES Cyber System Information.
The SDT does not intend that this requirement cover publicly available information, such as vendor
manuals that are available via public websites or information that is deemed to be publicly releasable.
Information protection pertains to both digital and hardcopy information. R1.2 requires one or more
procedures for the protection and secure handling BES Cyber System Information, including storage,
transit, and use. This includes information that may be stored on Transient Cyber Assets or Removable
Media.
The entity’s written Information Protection Program should explain how the entity handles aspects of
information protection including specifying how BES Cyber System Information is to be securely handled
during transit in order to protect against unauthorized access, misuse, or corruption and to protect
confidentiality of the communicated BES Cyber System Information. For example, the use of a third-party
communication service provider instead of organization-owned infrastructure may warrant the use of
encryption to prevent unauthorized disclosure of information during transmission. The entity may choose
to establish a trusted communications path for transit of BES Cyber System Information. The trusted
communications path would utilize a logon or other security measures to provide secure handling during
transit. The entity may employ alternative physical protective measures, such as the use of a courier or
locked container for transmission of information. It is not the intent of this standard to mandate the use
of one particular format for secure handling during transit.
A good Information Protection Program will document the circumstances under which BES Cyber System
Information can be shared with or used by third parties. The organization should distribute or share
information on a need-to-know basis. For example, the entity may specify that a confidentiality
agreement, non-disclosure arrangement, contract, or written agreement of some kind concerning the
handling of information must be in place between the entity and the third party. The entity’s Information
Protection Program should specify circumstances for sharing of BES Cyber System Information with and
use by third parties, for example, use of a non-disclosure agreement. The entity should then follow their
documented program. These requirements do not mandate one specific type of arrangement.
Technical Rationale for Reliability Standard CIP-011-3
Project 2019-02 BCSI Access Management |December 2019
8
Requirement R2:
This requirement allows for BES Cyber Systems to be removed from service and analyzed with their media
intact, as that should not constitute a release for reuse. However, following the analysis, if the media is to
be reused outside of a BES Cyber System or disposed of, the entity must take action to prevent the
unauthorized retrieval of BES Cyber System Information from the media.
The justification for this requirement is pre-existing from previous versions of CIP and is also documented
in FERC Order No. 706 and its associated Notice of Proposed Rulemaking.
If an applicable Cyber Asset is removed from the Physical Security Perimeter prior to action taken to
prevent the unauthorized retrieval of BES Cyber System Information or destroying the data storage
media, the Responsible Entity should maintain documentation that identifies the custodian for the data
storage media while the data storage media is outside of the Physical Security Perimeter prior to actions
taken by the entity as required in R2.
Media sanitization is the process used to remove information from system media such that reasonable
assurance exists that the information cannot be retrieved or reconstructed. Media sanitization is
generally classified into four categories: Disposal, clearing, purging, and destroying. For the purposes of
this requirement, disposal by itself, with the exception of certain special circumstances, such as the use of
strong encryption on a drive used in a SAN or other media, should never be considered acceptable. The
use of clearing techniques may provide a suitable method of sanitization for media that is to be reused,
whereas purging techniques may be more appropriate for media that is ready for disposal.
The following information from NIST SP800-88 provides additional guidance concerning the types of
actions that an entity might take to prevent the unauthorized retrieval of BES Cyber System Information
from the Cyber Asset data storage media:
Clear: One method to sanitize media is to use software or hardware products to overwrite storage
space on the media with non-sensitive data. This process may include overwriting not only the
logical storage location of a file(s) (e.g., file allocation table) but also may include all addressable
locations. The security goal of the overwriting process is to replace written data with random
data. Overwriting cannot be used for media that are damaged or not rewriteable. The media type
and size may also influence whether overwriting is a suitable sanitization method [SP 800-36].
Purge: Degaussing and executing the firmware Secure Erase command (for ATA drives only) are
acceptable methods for purging. Degaussing is exposing the magnetic media to a strong magnetic
field in order to disrupt the recorded magnetic domains. A degausser is a device that generates a
magnetic field used to sanitize magnetic media. Degaussers are rated based on the type (i.e., low
energy or high energy) of magnetic media they can purge. Degaussers operate using either a
strong permanent magnet or an electromagnetic coil. Degaussing can be an effective method for
purging damaged or inoperative media, for purging media with exceptionally large storage
capacities, or for quickly purging diskettes. [SP 800-36] Executing the firmware Secure Erase
command (for ATA drives only) and degaussing are examples of acceptable methods for purging.
Technical Rationale for Reliability Standard CIP-011-3
Project 2019-02 BCSI Access Management |December 2019
9
Degaussing of any hard drive assembly usually destroys the drive as the firmware that manages
the device is also destroyed.
Destroy: There are many different types, techniques, and procedures for media destruction.
Disintegration, Pulverization, Melting, and Incineration are sanitization methods designed to
completely destroy the media. They are typically carried out at an outsourced metal destruction
or licensed incineration facility with the specific capabilities to perform these activities effectively,
securely, and safely. Optical mass storage media, including compact disks (CD, CD-RW, CD-R, CDROM), optical disks (DVD), and MO disks, must be destroyed by pulverizing, crosscut shredding or
burning. In some cases such as networking equipment, it may be necessary to contact the
manufacturer for proper sanitization procedure.
It is critical that an organization maintain a record of its sanitization actions to prevent unauthorized
retrieval of BES Cyber System Information. Entities are strongly encouraged to review NIST SP800-88 for
guidance on how to develop acceptable media sanitization processes.
Rationale:
During development of this standard, text boxes were embedded within the standard to explain the
rationale for various parts of the standard. Upon BOT approval, the text from the rationale text boxes
was moved to this section.
Rationale for Requirement R1:
The SDT’s intent of the information protection program is to prevent unauthorized access to BES Cyber
System Information.
Rationale for Requirement R2:
The intent of the BES Cyber Asset reuse and disposal process is to prevent the unauthorized dissemination
of BES Cyber System Information upon reuse or disposal of a BES Cyber Asset.
Technical Rationale for Reliability Standard CIP-011-3
Project 2019-02 BCSI Access Management |December 2019
10
Violation Risk Factor and Violation Severity Level
Justifications
Project 2019-02 BES Cyber System Information Access Management
This document provides the standard drafting team’s (SDT’s) justification for assignment of violation risk factors (VRFs) and violation severity
levels (VSLs) for each requirement in Project 2019-02 BES Cyber System Information Access Management CIP-004-7. Each requirement is
assigned a VRF and a VSL. These elements support the determination of an initial value range for the Base Penalty Amount regarding
violations of requirements in FERC-approved Reliability Standards, as defined in the Electric Reliability Organizations (ERO) Sanction
Guidelines. The SDT applied the following NERC criteria and FERC Guidelines when developing the VRFs and VSLs for the requirements.
NERC Criteria for Violation Risk Factors
High Risk Requirement
A requirement that, if violated, could directly cause or contribute to Bulk Electric System instability, separation, or a cascading sequence of
failures, or could place the Bulk Electric System at an unacceptable risk of instability, separation, or cascading failures; or, a requirement in a
planning time frame that, if violated, could, under emergency, abnormal, or restorative conditions anticipated by the preparations, directly
cause or contribute to Bulk Electric System instability, separation, or a cascading sequence of failures, or could place the Bulk Electric System
at an unacceptable risk of instability, separation, or cascading failures, or could hinder restoration to a normal condition.
Medium Risk Requirement
A requirement that, if violated, could directly affect the electrical state or the capability of the Bulk Electric System, or the ability to effectively
monitor and control the Bulk Electric System. However, violation of a medium risk requirement is unlikely to lead to Bulk Electric System
instability, separation, or cascading failures; or, a requirement in a planning time frame that, if violated, could, under emergency, abnormal,
or restorative conditions anticipated by the preparations, directly and adversely affect the electrical state or capability of the Bulk Electric
System, or the ability to effectively monitor, control, or restore the Bulk Electric System. However, violation of a medium risk requirement is
unlikely, under emergency, abnormal, or restoration conditions anticipated by the preparations, to lead to Bulk Electric System instability,
separation, or cascading failures, nor to hinder restoration to a normal condition.
RELIABILITY | RESILIENCE | SECURITY
Lower Risk Requirement
A requirement that is administrative in nature and a requirement that, if violated, would not be expected to adversely affect the electrical
state or capability of the Bulk Electric System, or the ability to effectively monitor and control the Bulk Electric System; or, a requirement that
is administrative in nature and a requirement in a planning time frame that, if violated, would not, under the emergency, abnormal, or
restorative conditions anticipated by the preparations, be expected to adversely affect the electrical state or capability of the Bulk Electric
System, or the ability to effectively monitor, control, or restore the Bulk Electric System.
FERC Guidelines for Violation Risk Factors
Guideline (1) – Consistency with the Conclusions of the Final Blackout Report
FERC seeks to ensure that VRFs assigned to Requirements of Reliability Standards in these identified areas appropriately reflect their historical
critical impact on the reliability of the Bulk-Power System. In the VSL Order, FERC listed critical areas (from the Final Blackout Report) where
violations could severely affect the reliability of the Bulk-Power System:
•
Emergency operations
•
Vegetation management
•
Operator personnel training
•
Protection systems and their coordination
•
Operating tools and backup facilities
•
Reactive power and voltage control
•
System modeling and data exchange
•
Communication protocol and facilities
•
Requirements to determine equipment ratings
•
Synchronized data recorders
•
Clearer criteria for operationally critical facilities
•
Appropriate use of transmission loading relief.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | December 2019
2
Guideline (2) – Consistency within a Reliability Standard
FERC expects a rational connection between the sub-Requirement VRF assignments and the main Requirement VRF assignment.
Guideline (3) – Consistency among Reliability Standards
FERC expects the assignment of VRFs corresponding to Requirements that address similar reliability goals in different Reliability Standards
would be treated comparably.
Guideline (4) – Consistency with NERC’s Definition of the Violation Risk Factor Level
Guideline (4) was developed to evaluate whether the assignment of a particular VRF level conforms to NERC’s definition of that risk level.
Guideline (5) – Treatment of Requirements that Co-mingle More Than One Obligation
Where a single Requirement co-mingles a higher risk reliability objective and a lesser risk reliability objective, the VRF assignment for such
Requirements must not be watered down to reflect the lower risk level associated with the less important objective of the Reliability
Standard.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | December 2019
3
NERC Criteria for Violation Severity Levels
VSLs define the degree to which compliance with a requirement was not achieved. Each requirement must have at least one VSL. While it is
preferable to have four VSLs for each requirement, some requirements do not have multiple “degrees” of noncompliant performance and
may have only one, two, or three VSLs.
VSLs should be based on NERC’s overarching criteria shown in the table below:
Lower VSL
Moderate VSL
The performance or product
measured almost meets the full
intent of the requirement.
The performance or product
measured meets the majority of
the intent of the requirement.
High VSL
The performance or product
measured does not meet the
majority of the intent of the
requirement, but does meet
some of the intent.
Severe VSL
The performance or product
measured does not
substantively meet the intent of
the requirement.
FERC Order of Violation Severity Levels
The FERC VSL guidelines are presented below, followed by an analysis of whether the VSLs proposed for each requirement in the standard
meet the FERC Guidelines for assessing VSLs:
Guideline (1) – Violation Severity Level Assignments Should Not Have the Unintended Consequence of Lowering the Current
Level of Compliance
Compare the VSLs to any prior levels of non-compliance and avoid significant changes that may encourage a lower level of compliance than
was required when levels of non-compliance were used.
Guideline (2) – Violation Severity Level Assignments Should Ensure Uniformity and Consistency in the Determination of
Penalties
A violation of a “binary” type requirement must be a “Severe” VSL.
Do not use ambiguous terms such as “minor” and “significant” to describe noncompliant performance.
Guideline (3) – Violation Severity Level Assignment Should Be Consistent with the Corresponding Requirement
VSLs should not expand on what is required in the requirement.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | December 2019
4
Guideline (4) – Violation Severity Level Assignment Should Be Based on a Single Violation, Not on a Cumulative Number of
Violations
Unless otherwise stated in the requirement, each instance of non-compliance with a requirement is a separate violation. Section 4 of the
Sanction Guidelines states that assessing penalties on a per violation per day basis is the “default” for penalty calculations.
VRF Justification for CIP-004-7, Requirement R1
The VRF did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VSL Justification for CIP-004-7, Requirement R1
The VSL did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VRF Justification for CIP-004-7, Requirement R2
The VRF did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VSL Justification for CIP-004-7, Requirement R2
The VSL did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VRF Justification for CIP-004-7, Requirement R3
The VRF did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VSL Justification for CIP-004-7, Requirement R3
The VSL did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VRF Justification for CIP-004-7, Requirement R4
The VRF did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VSL Justification for CIP-004-7, Requirement R4
The VSL has been revised to reflect the removal of Part 4.4(CIP-011-3 Requirement R1, Part 1.6) and a portion of Part 4.1(CIP-011-3
Requirement R1, Part 1.3). The VSL did not otherwise change from the previously FERC approved CIP-004-6 Reliability Standard.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | December 2019
5
VRF Justification for CIP-004-7, Requirement R5
The VRF did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VSL Justification for CIP-004-7, Requirement R5
The VSL has been revised to reflect the removal of Part 5.3(CIP-011-3 Requirement R1, Part 1). The VSL did not change from the previously
FERC approved CIP-004-6 Reliability Standard.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | December 2019
6
Violation Risk Factor and Violation Severity Level
Justifications
Project 2019-02 BES Cyber System Information Access Management
This document provides the standard drafting team’s (SDT’s) justification for assignment of violation risk factors (VRFs) and violation severity
levels (VSLs) for each requirement in Project 2019-02 BES Cyber System Information Access Management CIP-011-3. Each requirement is
assigned a VRF and a VSL. These elements support the determination of an initial value range for the Base Penalty Amount regarding
violations of requirements in FERC-approved Reliability Standards, as defined in the Electric Reliability Organizations (ERO) Sanction
Guidelines. The SDT applied the following NERC criteria and FERC Guidelines when developing the VRFs and VSLs for the requirements.
NERC Criteria for Violation Risk Factors
High Risk Requirement
A requirement that, if violated, could directly cause or contribute to Bulk Electric System instability, separation, or a cascading sequence of
failures, or could place the Bulk Electric System at an unacceptable risk of instability, separation, or cascading failures; or, a requirement in a
planning time frame that, if violated, could, under emergency, abnormal, or restorative conditions anticipated by the preparations, directly
cause or contribute to Bulk Electric System instability, separation, or a cascading sequence of failures, or could place the Bulk Electric System
at an unacceptable risk of instability, separation, or cascading failures, or could hinder restoration to a normal condition.
Medium Risk Requirement
A requirement that, if violated, could directly affect the electrical state or the capability of the Bulk Electric System, or the ability to effectively
monitor and control the Bulk Electric System. However, violation of a medium risk requirement is unlikely to lead to Bulk Electric System
instability, separation, or cascading failures; or, a requirement in a planning time frame that, if violated, could, under emergency, abnormal,
or restorative conditions anticipated by the preparations, directly and adversely affect the electrical state or capability of the Bulk Electric
System, or the ability to effectively monitor, control, or restore the Bulk Electric System. However, violation of a medium risk requirement is
unlikely, under emergency, abnormal, or restoration conditions anticipated by the preparations, to lead to Bulk Electric System instability,
separation, or cascading failures, nor to hinder restoration to a normal condition.
RELIABILITY | RESILIENCE | SECURITY
Lower Risk Requirement
A requirement that is administrative in nature and a requirement that, if violated, would not be expected to adversely affect the electrical
state or capability of the Bulk Electric System, or the ability to effectively monitor and control the Bulk Electric System; or, a requirement that
is administrative in nature and a requirement in a planning time frame that, if violated, would not, under the emergency, abnormal, or
restorative conditions anticipated by the preparations, be expected to adversely affect the electrical state or capability of the Bulk Electric
System, or the ability to effectively monitor, control, or restore the Bulk Electric System.
FERC Guidelines for Violation Risk Factors
Guideline (1) – Consistency with the Conclusions of the Final Blackout Report
FERC seeks to ensure that VRFs assigned to Requirements of Reliability Standards in these identified areas appropriately reflect their historical
critical impact on the reliability of the Bulk-Power System. In the VSL Order, FERC listed critical areas (from the Final Blackout Report) where
violations could severely affect the reliability of the Bulk-Power System:
•
Emergency operations
•
Vegetation management
•
Operator personnel training
•
Protection systems and their coordination
•
Operating tools and backup facilities
•
Reactive power and voltage control
•
System modeling and data exchange
•
Communication protocol and facilities
•
Requirements to determine equipment ratings
•
Synchronized data recorders
•
Clearer criteria for operationally critical facilities
•
Appropriate use of transmission loading relief.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | December 2019
2
Guideline (2) – Consistency within a Reliability Standard
FERC expects a rational connection between the sub-Requirement VRF assignments and the main Requirement VRF assignment.
Guideline (3) – Consistency among Reliability Standards
FERC expects the assignment of VRFs corresponding to Requirements that address similar reliability goals in different Reliability Standards
would be treated comparably.
Guideline (4) – Consistency with NERC’s Definition of the Violation Risk Factor Level
Guideline (4) was developed to evaluate whether the assignment of a particular VRF level conforms to NERC’s definition of that risk level.
Guideline (5) – Treatment of Requirements that Co-mingle More Than One Obligation
Where a single Requirement co-mingles a higher risk reliability objective and a lesser risk reliability objective, the VRF assignment for such
Requirements must not be watered down to reflect the lower risk level associated with the less important objective of the Reliability
Standard.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | December 2019
3
NERC Criteria for Violation Severity Levels
VSLs define the degree to which compliance with a requirement was not achieved. Each requirement must have at least one VSL. While it is
preferable to have four VSLs for each requirement, some requirements do not have multiple “degrees” of noncompliant performance and
may have only one, two, or three VSLs.
VSLs should be based on NERC’s overarching criteria shown in the table below:
Lower VSL
Moderate VSL
The performance or product
measured almost meets the full
intent of the requirement.
The performance or product
measured meets the majority of
the intent of the requirement.
High VSL
The performance or product
measured does not meet the
majority of the intent of the
requirement, but does meet
some of the intent.
Severe VSL
The performance or product
measured does not
substantively meet the intent of
the requirement.
FERC Order of Violation Severity Levels
The FERC VSL guidelines are presented below, followed by an analysis of whether the VSLs proposed for each requirement in the standard
meet the FERC Guidelines for assessing VSLs:
Guideline (1) – Violation Severity Level Assignments Should Not Have the Unintended Consequence of Lowering the Current
Level of Compliance
Compare the VSLs to any prior levels of non-compliance and avoid significant changes that may encourage a lower level of compliance than
was required when levels of non-compliance were used.
Guideline (2) – Violation Severity Level Assignments Should Ensure Uniformity and Consistency in the Determination of
Penalties
A violation of a “binary” type requirement must be a “Severe” VSL.
Do not use ambiguous terms such as “minor” and “significant” to describe noncompliant performance.
Guideline (3) – Violation Severity Level Assignment Should Be Consistent with the Corresponding Requirement
VSLs should not expand on what is required in the requirement.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | December 2019
4
Guideline (4) – Violation Severity Level Assignment Should Be Based on a Single Violation, Not on a Cumulative Number of
Violations
Unless otherwise stated in the requirement, each instance of non-compliance with a requirement is a separate violation. Section 4 of the
Sanction Guidelines states that assessing penalties on a per violation per day basis is the “default” for penalty calculations.
VRF Justification for CIP-011-3, Requirement R1
Requirement R1 was revised to include PCA and eliminate potential barriers to use cloud based services for storage of BES Cyber System
Information. No changes to the VRF are necessary from the previously approved standard. The VRF did not change from the previously FERC
approved CIP-011-2 Reliability Standard.
VSL Justification for CIP-011-3, Requirement R1
The VSL did not change from the previously FERC approved CIP-011-2 Reliability Standard.
VRF Justifications for CIP-011-3 R2
Proposed VRF
Medium
NERC VRF Discussion
R2 is a requirement in an Operations Planning time horizon to implement one or more documented
process(es) that collectively include the applicable requirement parts in CIP-011-3 Table R2 – Information
Protection. If violated, it could directly affect the electrical state or the capability of the bulk electric
system, or the ability to effectively monitor and control the bulk electric system. However, violation of the
requirement is unlikely to lead to bulk electric system instability, separation, or cascading failures.
FERC VRF G1 Discussion
Guideline 1- Consistency w/ Blackout Report
Guideline 1- Consistency
with Blackout Report
This requirement does not address any of the critical areas identified in the Final Blackout Report.
FERC VRF G2 Discussion
Guideline 2- Consistency within a Reliability Standard
Guideline 2- Consistency
within a Reliability Standard
The requirement has sub-requirements and is assigned a single VRF consistent with other Requirements
within the proposed standard.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | December 2019
5
VRF Justifications for CIP-011-3 R2
Proposed VRF
Medium
FERC VRF G3 Discussion
Guideline 3- Consistency among Reliability Standards
Guideline 3- Consistency
among Reliability Standards
This is a new requirement addressing specific reliability goals. The VRF assignment is consistent with
similar Requirements in the CIP Reliability Standards.
FERC VRF G4 Discussion
Guideline 4- Consistency with NERC Definitions of VRFs
Guideline 4- Consistency
with NERC Definitions of
VRFs
A VRF of Medium is consistent with the NERC VRF definition as discussed above.
FERC VRF G5 Discussion
Guideline 5- Treatment of Requirements that Co-mingle More than One Obligation
Guideline 5- Treatment of
Requirements that Comingle More than One
Obligation
R2 contains only one objective, which is to implement one or more documented process(es) that
collectively include the applicable requirement parts in CIP-011-3 Table R2 – Information Protection. Since
the requirement has only one objective, only one VRF was assigned.
VSLs for CIP-011-3, R2
Lower
N/A
Moderate
N/A
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | December 2019
High
The Responsible Entity has
documented or implemented a
BES Cyber System Information
protection program, but did not
prevent unauthorized access to
BES Cyber System Information
by eliminating the ability to
obtain and use BCSI during
Severe
The Responsible Entity has not
documented or implemented
any processes for BES Cyber
System Information protection
(R2)
6
storage, transit, use and disposal
(Part 1.2)
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | December 2019
7
VSL Justifications for CIP-001-3, R2
FERC VSL G1
There is no prior compliance obligation related to the subject of this standard.
Violation Severity Level
Assignments Should Not
Have the Unintended
Consequence of Lowering
the Current Level of
Compliance
FERC VSL G2
Guideline 2a:
Violation Severity Level
Assignments Should Ensure
Uniformity and Consistency
in the Determination of
Penalties
The VSL assignment for R1 is binary.
Guideline 2a: The Single
Violation Severity Level
Assignment Category for
"Binary" Requirements Is
Not Consistent
Guideline 2b:
The proposed VSL does not use ambiguous terms, supporting uniformity and consistency in the
determination of similar penalties for similar violations.
Guideline 2b: Violation
Severity Level Assignments
that Contain Ambiguous
Language
FERC VSL G3
Violation Severity Level
Assignment Should Be
Consistent with the
Corresponding Requirement
The proposed VSL uses similar terminology to that used in the associated requirement, and is therefore
consistent with the requirement.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | December 2019
8
VSL Justifications for CIP-001-3, R2
FERC VSL G4
Violation Severity Level
Assignment Should Be Based
on A Single Violation, Not on
A Cumulative Number of
Violations
Proposed VSLs are based on a single violation and not a cumulative violation methodology. The VSL is
assigned for a single instance of failing to implement one or more documented process(es) that
collectively include the applicable requirement parts in CIP-011-3 Table R2 – Information Protection.
VRF Justification for CIP-011-3, Requirement R3 (Moved from R2 to R3 in CIP-011-3)
The VRF did not change from the previously FERC approved CIP-011-2 Reliability Standard.
VSL Justification for CIP-011-3, Requirement R3 (Moved from R2 to R3 in CIP-011-3)
The VSL did not change from the previously FERC approved CIP-011-2 Reliability Standard.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | December 2019
9
Mapping Document
Project 2019-02 BES Cyber System Information Access Management
Mapping of CIP-004-6 R4 to CIP-011-3
Access Management Program control requirements as applied to BES Cyber System Information (BCSI) designated storage locations were
moved to CIP-011 Requirement R1.
Standard: CIP-004-6
Requirement in Approved Standard
Translation to New Standard or Other
Action
CIP-004-6, Requirement R4, Part 4.1.3
CIP-011-3, Requirement R1, Part 1.3
4.1.3. Access to designated storage locations,
whether physical or electronic, for BES Cyber
System Information.
Process(es) to authorize access to BES Cyber
System Information based on need, as
determined by the Responsible Entity,
except during CIP Exceptional
Circumstances.
CIP-004-6, Requirement R4, Part 4.4
CIP-011-3, Requirement R1, Part 1.6
Verify at least once every 15 calendar months
that access to the designated storage
locations for BES Cyber System Information,
whether physical or electronic, are correct
and are those that the Responsible Entity
determines are necessary for performing
assigned work functions.
Verify at least once every 15 calendar
months that access to BES Cyber System
Information is correct and consists of
personnel that the Responsible Entity
determines are necessary for performing
assigned work functions.
Description and Change Justification
Access to designated storage locations for
BES Cyber System Information moved to
CIP-011 to better align with overall
Information Protection program controls. In
addition, focus changed from access to
designated storage locations to access to
BES Cyber System Information.
15-month entitlement reviews to BCSI
designated storage locations moved to CIP011 to better align with overall Information
Protection program controls.
Focus of verification changed from
designated storage locations to BES Cyber
System Information.
RELIABILITY | RESILIENCE | SECURITY
Standard: CIP-004-6
Requirement in Approved Standard
Translation to New Standard or Other
Action
CIP-004-6, Requirement R4, Part 5.3
CIP-011-3, Requirement R1, Part 1.5
For termination actions, revoke the
individual’s current access to the designated
storage locations for BES Cyber System
Information, whether physical or electronic
(unless already revoked according to
Requirement R5.1), by the end of the next
calendar day following the effective date of
the termination action.
For termination actions, revoke the
individual’s current access to BES Cyber
System Information, unless already revoked
according to CIP-004-7 Requirement R5,
Part 5.1) by the end of the next calendar
day following the effective date of the
termination action.
Mapping Document
Project 2019-02 BES Cyber System Information Access Management | December 2019
Description and Change Justification
Next calendar day termination actions for
those with access to BCSI designated
storage locations moved to CIP-011 to
better align with overall Information
Protection program controls.
In addition, focus of termination actions
changed from access to designated storage
locations to access to BES Cyber System
Information.
2
Mapping Document
Project 2019-02 BES Cyber System Information Access Management
Modifications to CIP-011-2
BES Cyber System Information (BCSI)-related access management requirements were moved from CIP-004-6, Requirements R4 and R5, to CIP011-2, Requirement R1. In addition, new requirements have been implemented to mitigate risks associated with BCSI and off-premises
vendor services.
Standard: CIP-011-3
Requirement in Approved Standard
CIP-011-2, Requirement R1, Part 1.1
Translation to New Standard or Other
Action
Description and Change Justification
CIP-011-3, Requirement R1, Part 1.1
Method(s) to identify information that meets
the definition of BES Cyber System
Information.
Added requirement language for
Responsible Entities to identify designated
Process(es) to identify information that
BCSI storage locations, whether physical or
meets the definition of BES Cyber System
electronic, along with BCSI, which was
Information and identify applicable BES
Cyber System Information storage locations. already required.
CIP-011-2, Requirement R1, Part 1.2
CIP-011-3, Requirement R1, Part 1.2
Procedure(s) for protecting and securely
handling BES Cyber System Information,
including storage, transit, and use.
Method(s) to prevent unauthorized access
to BES Cyber System Information by
eliminating the ability to obtain and use BES
Cyber System Information during storage,
transit, use and disposal.
Established a stand-alone requirement for
authorization of access to BCSI based on
need, except for CIP Exceptional
Circumstances. This change helps to
consolidate all BCSI-related requirements
under one CIP Standard. This subrequirement was carried over from CIP-0046, Requirement R4, Part 4.1.3. Added the
lifecycle element “disposal” to the
RELIABILITY | RESILIENCE | SECURITY
Standard: CIP-011-3
Requirement in Approved Standard
Translation to New Standard or Other
Action
Description and Change Justification
requirement to complement actions taken
in CIP-011-2, Requirement R2.
CIP-004-6, Requirement R4, Part 4.1.3
CIP-011-3, Requirement R1, Part 1.3
4.1.3. Access to designated storage locations,
whether physical or electronic, for BES Cyber
System Information.
Process(es) to authorize access to BES Cyber
System Information based on need, as
determined by the Responsible Entity,
except during CIP Exceptional
Circumstances.
N/A
CIP-011-3, Requirement R1, Part 1.4 (NEW)
Process(es) to identify, assess and mitigate
risks in cases where vendors store
Responsible Entity’s BES Cyber System
Information.
1.4.1 Perform initial risk assessments of
vendors that store the Responsible Entity’s
BES Cyber System Information; and
Access to designated storage locations for
BES Cyber System Information moved to
CIP-011 to better align with overall
Information Protection program controls. In
addition, focus changed from access to
designated storage locations to access to
BES Cyber System Information.
New CIP-011-3 requirement which is similar
to the cyber security risk assessment
required as part of CIP-013 Requirement R1.
This new requirement is intended to focus
risk analysis on potential vendors that will
be hosting Responsible Entity’s BCSI in the
cloud.
1.4.2 At least once every 15 calendar
months, perform risk assessments of
vendors that store the Responsible Entity’s
BES Cyber System Information; and
Mapping Document
Project 2019-02 BES Cyber System Information Access Management | December 2019
2
Standard: CIP-011-3
Requirement in Approved Standard
Translation to New Standard or Other
Action
Description and Change Justification
1.4.3 Document the results of the risk
assessments performed according to Parts
1.4.1 and 1.4.2 and the action plan to
remediate or mitigate risk(s) identified in
the assessment, including the planned date
of completing the action plan and the
execution status of any remediation or
mitigation action items.
CIP-004-6, Requirement R4, Part 5.3
CIP-011-3, Requirement R1, Part 1.5
For termination actions, revoke the
individual’s current access to the designated
storage locations for BES Cyber System
Information, whether physical or electronic
(unless already revoked according to
Requirement R5.1), by the end of the next
calendar day following the effective date of
the termination action.
For termination actions, revoke the
individual’s current access to BES Cyber
System Information, unless already revoked
according to CIP-004-7 Requirement R5,
Part 5.1) by the end of the next calendar
day following the effective date of the
termination action.
CIP-004-6, Requirement R4, Part 4.4
CIP-011-3, Requirement R1, Part 1.6
Verify at least once every 15 calendar months
that access to the designated storage
locations for BES Cyber System Information,
whether physical or electronic, are correct
and are those that the Responsible Entity
Verify at least once every 15 calendar
months that access to BES Cyber System
Information is correct and consists of
personnel that the Responsible Entity
Mapping Document
Project 2019-02 BES Cyber System Information Access Management | December 2019
Next calendar day termination actions for
those with access to BCSI designated
storage locations moved to CIP-011 to
better align with overall Information
Protection program controls.
In addition, focus of termination actions
changed from access to designated storage
locations to access to BES Cyber System
Information.
15-month entitlement reviews to BCSI
designated storage locations moved to CIP011 to better align with overall Information
Protection program controls.
3
Standard: CIP-011-3
Requirement in Approved Standard
Translation to New Standard or Other
Action
determines are necessary for performing
assigned work functions.
determines are necessary for performing
assigned work functions.
Focus of verification changed from
designated storage locations to BES Cyber
System Information.
N/A
CIP-011-3, Requirement R2
New CIP-011-3 requirement that leverages
NIST 800-57 security controls. The security
of BES Cyber System Information protected
by obfuscation directly depends on the
strength of the keys, the effectiveness of
mechanisms and protocols associated with
keys, and the protection afforded to the
keys. Key management provides the
foundation for the secure generation,
storage, distribution, and destruction of
keys.
R2. Each Responsible Entity shall
implement one or more documented
key management program that
collectively include the applicable
requirement parts in CIP-011-3 Table
R2 – Information Protection
N/A
CIP-011-3, Requirement R2, Part 2.1 (NEW)
Where applicable, develop a key
management program to restrict access
with revocation ability, which shall include
the following:
2.1.1 Key generation
2.1.3 Key distribution
2.1.4 Key storage
Mapping Document
Project 2019-02 BES Cyber System Information Access Management | December 2019
Description and Change Justification
New CIP-011-3 requirement that leverages
NIST 800-57 security controls. The security
of BES Cyber System Information protected
by obfuscation directly depends on the
strength of the keys, the effectiveness of
mechanisms and protocols associated with
keys, and the protection afforded to the
keys. Key management provides the
foundation for the secure generation,
4
Standard: CIP-011-3
Requirement in Approved Standard
Translation to New Standard or Other
Action
2.1.5 Key protection
2.1.6 Key-periods
Description and Change Justification
storage, distribution, and destruction of
keys.
2.1.7 Key suppression
2.1.8 Key revocation
2.1.9 Key disposal
N/A
CIP-011-3, Requirement R2, Part 2.2 (NEW)
Implement controls to separate the BES
Cyber System Information custodial entity’s
duties independently from the key
management program duties established in
Part 2.1.
CIP-011-2, Requirement R2, Part 2.1
CIP-011-3, Requirement R3, Part 3.1
Prior to the release for reuse of applicable
Cyber Assets that contain BES Cyber System
Information (except for reuse within other
systems identified in the “Applicable Systems”
Prior to the release for reuse or disposal of
applicable Cyber Assets (except for reuse
within other systems identified in the
“Applicable Systems” column), the Cyber
Mapping Document
Project 2019-02 BES Cyber System Information Access Management | December 2019
New CIP-011-3 requirement that requires
implementation of controls that ensure the
separation of duties and organizational
independence between the programs used
to restrict the ability to obtain BCSI from
those programs used to restrict the ability
to use BCSI.
Combined CIP-011-2, Requirement R2, Part
2.1 (reuse) and CIP-011-2, Requirement R2,
Part 2.2 (disposal) within the same
requirement language.
5
Standard: CIP-011-3
Requirement in Approved Standard
Translation to New Standard or Other
Action
Description and Change Justification
column), the Responsible Entity shall take
action to prevent the unauthorized retrieval
of BES Cyber System Information from the
Cyber Asset data storage media.
Asset data storage media shall be sanitized
or destroyed.
In addition, the phrase “that contain BES
Cyber System Information” was removed
from the requirement language effectively
expanding applicability of sanitization or
destruction practices to all Applicable
Systems, not just those containing BCSI.
This was done to align with the historical
intent of CIP-007-3 Requirement R7 where
reliability data was required to be sanitized
as well from Cyber Assets before reuse or
disposal.
CIP-011-2, Requirement R2, Part 2.2
CIP-011-3, Requirement R3, Part 3.1
Prior to the disposal of applicable Cyber
Assets that contain BES Cyber System
Information, the Responsible Entity shall take
action to prevent the unauthorized retrieval
of BES Cyber System Information from the
Cyber Asset or destroy the data storage
media.
Prior to the release for reuse or disposal of
applicable Cyber Assets (except for reuse
within other systems identified in the
“Applicable Systems” column), the Cyber
Asset data storage media shall be sanitized
or destroyed.
As above. CIP-011-2, Requirement R2, Part
2.2 was combined into CIP-011-3,
Requirement R3, Part 3.1.
Mapping Document
Project 2019-02 BES Cyber System Information Access Management | December 2019
6
Standards Announcement
Project 2019-02 BES Cyber System Information Access Management
Formal Comment Period Open through February 3, 2020
Ballot Pools Forming through January 20, 2020
Now Available
A 45-day formal comment period for Project 2019-02 BES Cyber System Information Access
Management is open through 8 p.m. Eastern, Monday, February 3, 2020.
Commenting
Use the Standards Balloting and Commenting System (SBS) to submit comments. If you experience
issues navigating the SBS, contact Linda Jenkins. An unofficial Word version of the comment form is
posted on the project page.
•
If you are having difficulty accessing the SBS due to a forgotten password, incorrect credential
error messages, or system lock-out, contact NERC IT support directly at
https://support.nerc.net/ (Monday – Friday, 8 a.m. - 5 p.m. Eastern).
•
Passwords expire every 6 months and must be reset.
•
The SBS is not supported for use on mobile devices.
•
Please be mindful of ballot and comment period closing dates. We ask to allow at least 48 hours
for NERC support staff to assist with inquiries. Therefore, it is recommended that users try logging
into their SBS accounts prior to the last day of a comment/ballot period.
Next Steps
Initial ballots for the Standards and Implementation Plan, along with non-binding polls for each
associated Violation Risk Factors and Violation Severity Levels, will be conducted January 24 –
February 3, 2020.
For more information on the Standards Development Process, refer to the Standard Processes Manual.
For more information or assistance, contact Senior Standards Developer, Latrice Harkness (via email) or at
404-446-9728.
North American Electric Reliability Corporation
3353 Peachtree Rd, NE
Suite 600, North Tower
Atlanta, GA 30326
404-446-2560 | www.nerc.com
RELIABILITY | RESILIENCE | SECURITY
Comment Report
Project Name:
2019-02 BES Cyber System Information Access Management
Comment Period Start Date:
12/20/2019
Comment Period End Date:
2/3/2020
Associated Ballots:
2019-02 BES Cyber System Information Access Management CIP-004-7 IN 1 ST
2019-02 BES Cyber System Information Access Management CIP-011-3 IN 1 ST
2019-02 BES Cyber System Information Access Management Implementation Plan IN 1 OT
There were 91 sets of responses, including comments from approximately 209 different people from approximately 131 companies
representing 10 of the Industry Segments as shown in the table on the following pages.
Questions
1. The proposed revision to Requirement R1 Part 1.1 adds the requirement to identify BCSI storage locations. Do you agree that the
requirement as written allows the Responsible Entity the flexibility to identify which storage locations are for BCSI? Do you agree the
requirement is necessary? If you disagree with the changes made, what, specifically, do you disagree with? Please provide specific
suggestions or proposals for any alternative language.
2. The standard drafting team (SDT) attempted to maintain backwards compatibility with concepts of designated storage locations and
access-level requirements previously contained in CIP-004-6. Do you agree that there is a minimal effort to meet this objective while
providing greater clarity between BCSI and BES Cyber System (BCS) requirement obligations?
3. The SDT is attempting to expand information storage solutions or security technologies for Responsible Entities. Do you agree that this
approach is reflected in the proposed requirements?
4. The SDT is addressing, and further defining, the risk regarding potential compromise of BCSI through the inclusion of the terms “obtain”
and “use” in requirement CIP-011-3, Requirement R1 Part 1.2. Do you agree that this will more accurately address the risk related to the
potential compromise of BCSI versus the previous approach?
5. The SDT is proposing to have BCSI in the “Applicability” column. Do you agree that this provides better clarity on the focus of the
requirements?
6. The SDT is proposing to address the security risks associated with BCSI environments, particularly owned or managed by vendors via
CIP-011-3, Requirements R1, Part 1.4, and Requirement R2, Parts 2.1 and 2.2. Do you agree that these requirements will promote a better
understanding of security risks involved while also providing opportunities for the Responsible Entity to address appropriate security
controls?
7. The SDT is addressing the growing demand for Responsible Entities to leverage new and future technologies such as cloud services. Do
you agree that the proposed changes support this endeavor?
8. The SDT is proposing a new “key management” set of requirements. Do you agree that key management involving BCSI is integral to
protecting BCSI?
9. The SDT is proposing to shift the focus of security of BCSI more towards the BCSI itself rather than physical security or “hardware”
storage locations. Do you agree that this approach aids the Responsible Entity by reducing potential unneeded controls on BCS?
10. The SDT is proposing to transfer all BCSI-related requirements from CIP-004 to CIP-011 with the understanding that this will further
address differing security needs between BCSI and BCS as well as ease future standard development. Do you agree that this provides
greater clarity between BCSI and BCS requirements?
11. The SDT increased the scope of information to be evaluated by including both Protected Cyber Assets and all Medium Impact (not just
Medium Impact Assets with External Routable Connectivity). Are there any concerns regarding a Responsible Entity attempting to meet
these proposed, expanded requirements?
12. In looking at all proposed recommendations from the SDT, are the proposed changes a cost-effective approach?
13. Do you have any other general recommendations/considerations for the drafting team?
Organization
Name
BC Hydro
and Power
Authority
Tennessee
Valley
Authority
Santee
Cooper
MRO
Name
Adrian
Andreoiu
Brian
Millard
Chris
Wagner
Segment(s)
1
1,3,5,6
Region
WECC
SERC
1
Dana Klem 1,2,3,4,5,6
Group Name Group Member
Name
BC Hydro
Tennessee
Valley
Authority
Santee
Cooper
MRO
MRO NSRF
Group
Group
Member
Member
Organization Segment(s)
Group
Member
Region
Hootan Jarollahi BC Hydro and 3
Power
Authority
WECC
Helen Hamilton BC Hydro and 5
Harding
Power
Authority
WECC
Adrian Andreoiu BC Hydro and 1
Power
Authority
WECC
Kurtz, Bryan G. Tennessee
Valley
Authority
1
SERC
Grant, Ian S.
Tennessee
Valley
Authority
3
SERC
Thomas, M. Lee Tennessee
Valley
Authority
5
SERC
Parsons,
Marjorie S.
Tennessee
Valley
Authority
6
SERC
Rene' Free
Santee
Cooper
1,3,5,6
SERC
Rodger Blakely
Santee
Cooper
1,3,5,6
SERC
Joseph
DePoorter
Madison Gas 3,4,5,6
& Electric
MRO
Larry Heckert
Alliant Energy 4
MRO
Michael
Brytowski
Great River
Energy
MRO
Jodi Jensen
Western Area 1,6
Power
Administration
MRO
Andy Crooks
SaskPower
Corporation
1
MRO
Bryan Sherrow
Kansas City 1
Board of
Public Utilities
MRO
Bobbi Welch
Omaha Public 1,3,5,6
Power District
MRO
1,3,5,6
PPL Devin
Louisville Gas Shines
and Electric
Co.
Douglas
Webb
1,3,5,6
Douglas
Webb
Holly
Chaney
RF,SERC
MRO,SPP RE
3
PPL NERC
Registered
Affiliates
Jeremy Voll
Basin Electric 1
Power
Cooperative
MRO
Bobbi Welch
Midcontinent
ISO
MRO
Douglas Webb
Kansas City 1,3,5,6
Power & Light
MRO
Fred Meyer
Algonquin
Power Co.
1
MRO
John Chang
Manitoba
Hydro
1,3,6
MRO
James Williams Southwest
Power Pool,
Inc.
2
MRO
Jamie Monette
1
MRO
Minnesota
Power /
ALLETE
2
Jamison Cawley Nebraska
1,3,5
Public Power
MRO
Sing Tay
Oklahoma
1,3,5,6
Gas & Electric
MRO
Terry Harbour
MidAmerican 1,3
Energy
MRO
Troy Brumfield
American
1
Transmission
Company
MRO
Brenda Truhe
PPL Electric
Utilities
Corporation
RF
1
Charles Freibert PPL 3
Louisville Gas
and Electric
Co.
SERC
JULIE
PPL 5
HOSTRANDER Louisville Gas
and Electric
Co.
SERC
Linn Oelker
PPL 6
Louisville Gas
and Electric
Co.
SERC
Westar-KCPL Doug Webb
Westar
1,3,5,6
MRO
Doug Webb
KCP&L
1,3,5,6
MRO
4
WECC
SNPD Voting John Martinsen Public Utility
Members
District No. 1
Snohomish
County PUD
No. 1
ACES Power Jodirah
Marketing
Green
DTE Energy - Karie
Detroit
Barczak
Edison
Company
of Snohomish
County
1,3,4,5,6
3,4,5
FirstEnergy - Mark Garza 4
FirstEnergy
Corporation
John Liang
Snohomish
County PUD
No. 1
6
WECC
Sam Nietfeld
Public Utility 5
District No. 1
of Snohomish
County
WECC
Long Duong
Public Utility 1
District No. 1
of Snohomish
County
WECC
Hoosier
1
Energy Rural
Electric
Cooperative,
Inc.
SERC
Kevin Lyons
Central Iowa
Power
Cooperative
MRO
Bill Hutchison
Southern
1
Illinois Power
Cooperative
SERC
Amber Skillern
East Kentucky 1
Power
Cooperative
SERC
Jennifer Brey
Arizona
Electric
Power
Cooperative
WECC
Joseph Smith
Prairie Power 1,3
, Inc.
MRO,NA - Not
ACES
Bob Solomon
Applicable,RF,SERC,Texas Standard
RE,WECC
Collaborations
1
1
DTE Energy - Jeffrey Depriest DTE Energy - 5
DTE Electric
DTE Electric
FE Voter
SERC
RF
Daniel Herring
DTE Energy - 4
DTE Electric
RF
Karie Barczak
DTE Energy - 3
DTE Electric
RF
Julie Severino
FirstEnergy FirstEnergy
Corporation
1
RF
Aaron
Ghodooshim
FirstEnergy FirstEnergy
Corporation
3
RF
Duke Energy Masuncha
Bussey
Public Utility Meaghan
District No. 1 Connell
of Chelan
County
Michael
Johnson
FRCC,RF,SERC
5
Michael
Johnson
Southern
Pamela
Company Hunter
Southern
Company
Services, Inc.
Eversource
Energy
1,3,5,6
Public Utility
District No. 1
of Chelan
County
WECC
1,3,5,6
Quintin Lee 1
Duke Energy
SERC
PG&E All
Segments
Southern
Company
Eversource
Group
Robert Loy
FirstEnergy FirstEnergy
Solutions
5
RF
Ann Carey
FirstEnergy FirstEnergy
Solutions
6
RF
Mark Garza
FirstEnergyFirstEnergy
4
RF
Laura Lee
Duke Energy
1
SERC
Dale Goodwine Duke Energy
5
SERC
Greg Cecil
Duke Energy
6
RF
Lee Schuster
Duke Energy
3
SERC
Joyce Gundry
Public Utility
District No. 1
of Chelan
County
3
WECC
Ginette Lacasse Public Utility
District No. 1
of Chelan
County
1
WECC
PG&E
PG&E
1
WECC
PG&E
PG&E
3
WECC
PG&E
PG&E
5
WECC
Matt Carden
Southern
1
Company Southern
Company
Services, Inc.
SERC
Joel Dembowski Southern
Company Alabama
Power
Company
3
SERC
William D.
Shultz
Southern
Company
Generation
5
SERC
Ron Carlsen
Southern
Company Southern
Company
Generation
6
SERC
Sharon Flannery Eversource
Energy
3
NPCC
Northeast
Ruida Shu
Power
Coordinating
Council
1,2,3,4,5,6,7,8,9,10 NPCC
RSC no
NextEra
Quintin Lee
Eversource
Energy
1
NPCC
Guy V. Zito
Northeast
Power
Coordinating
Council
10
NPCC
Randy
MacDonald
New
Brunswick
Power
2
NPCC
Glen Smith
Entergy
Services
4
NPCC
Brian Robinson Utility
Services
5
NPCC
Alan Adamson
New York
State
Reliability
Council
7
NPCC
David Burke
Orange &
Rockland
Utilities
3
NPCC
Michele Tondalo UI
1
NPCC
Helen Lainis
IESO
2
NPCC
Sean Cavote
PSEG
4
NPCC
Kathleen
Goodman
ISO-NE
2
NPCC
David Kiguel
Independent
7
NPCC
Paul
Malozewski
Hydro One
3
Networks, Inc.
NPCC
Nick Kowalczyk Orange and
Rockland
1
NPCC
Joel Charlebois AESI Acumen
Engineered
Solutions
International
Inc.
5
NPCC
Mike Cooke
Ontario Power 4
Generation,
Inc.
NPCC
Salvatore
Spagnolo
New York
Power
Authority
NPCC
1
Portland
General
Electric Co.
Ryan Olson 5
Shivaz Chopra
New York
Power
Authority
5
NPCC
Mike Forte
Con Ed 4
Consolidated
Edison
NPCC
Dermot Smyth
Con Ed 1
Consolidated
Edison Co. of
New York
NPCC
Peter Yost
Con Ed 3
Consolidated
Edison Co. of
New York
NPCC
Ashmeet Kaur
Con Ed 5
Consolidated
Edison
NPCC
Caroline Dupuis Hydro
Quebec
1
NPCC
Chantal Mazza
Hydro
Quebec
2
NPCC
Sean Bodkin
Dominion Dominion
Resources,
Inc.
6
NPCC
Laura McLeod
NB Power
Corporation
5
NPCC
Randy
MacDonald
NB Power
Corporation
2
NPCC
Gregory
Campoli
New York
Independent
System
Operator
2
NPCC
Quintin Lee
Eversource
Energy
1
NPCC
John Hastings
National Grid 1
NPCC
Michael Jones
National Grid 1
USA
NPCC
Portland
General
Electric Co.
1
WECC
Portland
General
Electric Co.
3
WECC
PGE Group 2 Angela Gaines
Dan Zollner
Dominion Dominion
Resources,
Inc.
Lower
Colorado
River
Authority
Sean
Bodkin
Teresa
Cantwell
Associated
Todd
Electric
Bennett
Cooperative,
Inc.
6
1,5
3
Dominion
LCRA
Compliance
AECI
Daniel Mason
Portland
General
Electric Co.
6
WECC
Ryan Olson
Portland
General
Electric Co.
5
WECC
Connie Lowe
Dominion Dominion
Resources,
Inc.
3
NA - Not
Applicable
Lou Oberski
Dominion Dominion
Resources,
Inc.
5
NA - Not
Applicable
Larry Nash
Dominion Dominion
Virginia
Power
1
NA - Not
Applicable
Rachel Snead
Dominion Dominion
Resources,
Inc.
5
NA - Not
Applicable
Michael Shaw
LCRA
6
Texas RE
Dixie Wells
LCRA
5
Texas RE
Teresa Cantwell LCRA
1
Texas RE
Michael Bax
Central
1
Electric Power
Cooperative
(Missouri)
SERC
Adam Weber
Central
3
Electric Power
Cooperative
(Missouri)
SERC
Stephen Pogue M and A
3
Electric Power
Cooperative
SERC
William Price
M and A
1
Electric Power
Cooperative
SERC
Jeff Neas
Sho-Me
3
Power Electric
Cooperative
SERC
Peter Dawson
Sho-Me
1
Power Electric
Cooperative
SERC
Mark Ramsey
N.W. Electric
Power
Cooperative,
Inc.
1
NPCC
John Stickley
NW Electric
Power
Cooperative,
Inc.
3
SERC
Tony Gott
KAMO
Electric
Cooperative
3
SERC
Micah
Breedlove
KAMO
Electric
Cooperative
1
SERC
Kevin White
Northeast
1
Missouri
Electric Power
Cooperative
SERC
Skyler
Wiegmann
Northeast
3
Missouri
Electric Power
Cooperative
SERC
Ryan Ziegler
Associated
Electric
Cooperative,
Inc.
1
SERC
Brian
Ackermann
Associated
Electric
Cooperative,
Inc.
6
SERC
Brad Haralson
Associated
Electric
Cooperative,
Inc.
5
SERC
1. The proposed revision to Requirement R1 Part 1.1 adds the requirement to identify BCSI storage locations. Do you agree that the
requirement as written allows the Responsible Entity the flexibility to identify which storage locations are for BCSI? Do you agree the
requirement is necessary? If you disagree with the changes made, what, specifically, do you disagree with? Please provide specific
suggestions or proposals for any alternative language.
Kevin Conway - Public Utility District No. 1 of Pend Oreille County - 1
Answer
No
Document Name
Comment
I don't see the referenced changes in CIP-004-7. If you are refering to CIP-011-3, "storage locations" is very broad. This could be a problem during
audits, if the auditor does not like the interpretation. We need a much stricter wording for storage locations.
Likes
1
Dislikes
Miller Scott On Behalf of: David Weekley, MEAG Power, 3, 1; Roger Brand, MEAG Power, 3, 1;
0
Response
Joe Tarantino - Joe Tarantino On Behalf of: Arthur Starkovich, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Beth Tincher, Sacramento
Municipal Utility District, 4, 1, 6, 3, 5; Jamie Cutlip, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Kevin Smith, Balancing Authority of
Northern California, 1; Nicole Goi, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Nicole Looney, Sacramento Municipal Utility District, 4, 1,
6, 3, 5; - Joe Tarantino
Answer
No
Document Name
Comment
It is already implied in CIP-004 R4 that storage locations have to be identified and adds to the complexity of the compliance requirement. Flexibility is
already provided under CIP-004 R4. Access controls were grouped in CIP-004 R4, relocating these controls to CIP-011 creates additional complexities.
Likes
0
Dislikes
0
Response
Dana Klem - MRO - 1,2,3,4,5,6 - MRO, Group Name MRO NSRF
Answer
Document Name
Comment
No
An overarching problem with this proposed draft of CIP-011-3 is the removal of the qualifying language “with ERC” from the applicability of Medium
Impact BES Cyber Systems in CIP-011-3 R1.1 as currently provided in CIP-004-6 R4.1, and how this greatly and needlessly expands the scope of all
subsequent parts of R1, and R2.
Identifying BCSI storage locations for system information pertaining to Medium Impact BES Cyber Systems without ERC is not necessary, as Cyber
Systems without remote connectivity can only be compromised locally by a breach of physical security. The information protection mandated by this
standard will afford no protection should an adversary gain physical access to the Cyber Systems.
We will not be able to vote affirmative unless “with ERC” is added to the Applicability of of Medium Impact BES Cyber Systems in R1 Part 1.1.
We agree that the language provides flexibility in identifying BCSI storage locations.
We would prefer to retain the less prescriptive “Method(s)” over the proposed requirement change to “Process(es).” Making this change to “process”
implies that existing programs will need to be updated to a procedural format. Again, this is not requested by the SAR and does not increase reliability,
yet this would add administrative burden and increase compliance risk.
To clarify location with respect to electronic storage locations, recommend the definition of “BCSI Repository” per EEI comments along these lines:
“BCSI Repositories are either physical or electronic storage locations where BCSI is retained for long term storage. For physical BCSI Repositories,
this would be a physical location. For electronic BCSI Repositories, this would be a logical location. Short term storage locations for working copies are
not part of this definition.”
Likes
0
Dislikes
0
Response
Amy Casuscelli - Xcel Energy, Inc. - 1,3,5,6 - MRO,WECC
Answer
No
Document Name
Comment
Xcel Energy support the comments submitted by EEI.
Likes
0
Dislikes
0
Response
Jeremy Voll - Basin Electric Power Cooperative - 3
Answer
Document Name
Comment
No
Support the MRO NSRF comments
Likes
0
Dislikes
0
Response
Matthew Nutsch - Seattle City Light - 1,3,4,5,6 - WECC
Answer
No
Document Name
Comment
Although the proposed revision explicitly states the requirement to identify specific BCSI storage locations, it does not add any actual new flexibility
about designating BCSI storage locations. The same flexibility exists today between the lines of existing CIP-004 and CIP-011. It is just implicit, rather
than explicit. The confusion remains about the necessity (or lack thereof) to store BCSI in designated BCSI storage locations, how large a collection of
BCSI has to be to warrant a BCSI storage location of its own, or how long BCSI can be in use outside of a storage location without creating security and
compliance concerns.
Seattle City Light believes a more effective approach would be to clearly state a security objective (“to prevent unauthorized access to BCSI”), require
an entity to develop a risk-informed BCSI security plan to achieve this objective, and then require implementation and periodic review of the BCSI
security plan. Beyond this, almost all details about specific approaches for and elements that might be expected in a BCSI security plan should be
provided in the measures and/or technical guidelines. A few specific elements of the security plan might be requested as sub-requirements, such as i)
how to identify BCSI; ii) controls to limit unauthorized access to BCSI in use, transit, and storage; and iii) security requirements expected of third party
that uses and/or stores BCSI for the entity, if an entity chooses to employ such parties. Note that by iii) Seattle does NOT mean that any specific
security requirements for third party providers should be spelled out as requirement in the revised Standard, but rather than each entity should develop
its own risk-based list of the security controls/requirements it demands of any third party provider it may employ with regard to BCSI. And that such
entity-specific control requirements would only be required if an entity elected to use third-party BCSI providers. Guidance as to what these
requirements might be could be provided in the Measures or supporting technical document.
If a more prescriptive approach to controls is desired, Seattle shares the same concerns expressed by Sacramento Municipal Utility District (SMUD)
regarding the change of language about BCSI storage locations.
Likes
0
Dislikes
0
Response
Kjersti Drott - Tri-State G and T Association, Inc. - 1
Answer
Document Name
Comment
No
‘System Information pertaining to’ in the applicability column may broaden scope expectations and should be removed.
Likes
0
Dislikes
0
Response
Payam Farahbakhsh - Hydro One Networks, Inc. - 1
Answer
No
Document Name
Comment
We support the overall effort. However, we do not support introducing "System information pertaining to" in the applicability section. This creates some
ambiguity. We believe that the applicability should be limited to BCSI.
Likes
0
Dislikes
0
Response
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
No
Document Name
Comment
The draft language in present form would obligate entities to establish a Data Loss Prevention program to fully satisfy this requirement. This doesn’t
support the scope or intent of the original SAR. This goes far beyond controlling access to BCSI and includes topic that may cover how an individual
may handle that information (replication, forwarding, etc.). The previous version included the term “Designated repository” for identification of scope of
protection. Removal of this qualification creates an obligation to manage BCSI regardless of where it may occur.
Likes
0
Dislikes
0
Response
Maryanne Darling-Reich - Black Hills Corporation - 1,3,5,6 - MRO,WECC
Answer
Document Name
Comment
No
As written the requirement may require the Registered Entity (RE) identify the physical locations a third-party provider is storing the RE’s BCSI. We
think that it would make more sense to identify the access controls and methods the RE has in place controlling the ability to obtain and use the
information.
Likes
0
Dislikes
0
Response
Kent Feliks - AEP - 3
Answer
No
Document Name
Comment
AEP agrees with EEI’s comments and requests clarification on the requirement to identify BES Cyber System Information (BCSI) storage locations as
proposed by the Standard Drafting Team (SDT) for CIP-011-3, Requirement R1, Part 1.1. As written, this requirement would require registered entities
to work with their third-party cloud-based service providers to identify the physical location where their BCSI resided on the service provider’s cloudbased network. This would be difficult (or possibly impractical) for entities to maintain suitable records on an ongoing basis.
Also, from a compliance perspective, registered entities would have difficulty proving that they granted or removed access to BCSI, as required in the
proposed draft for CIP-004-7. To resolve this concern, we suggest that the SDT modify the proposal to require registered entities to prove access is
granted or removed to a BCSI Repository.
Likes
0
Dislikes
0
Response
Todd Bennett - Associated Electric Cooperative, Inc. - 3, Group Name AECI
Answer
No
Document Name
Comment
AECI supports comments filed by NRECA
Likes
0
Dislikes
0
Response
Barry Lawson - National Rural Electric Cooperative Association - 4
Answer
No
Document Name
Comment
NRECA does not support the replacement of the term “method” with the term “process.” A “method” for identification allows Responsible Entities to
provide guidelines and criteria to their personnel to aid in identification of BCSI without requiring a pre-defined series of steps or action (e.g., a process)
to be utilized by such personnel in the identification. This distinction is critical because a process can be high-level and – thereby – provide significant
variability in what is identified as BCSI whereas a method provides personnel with enough guidance to provide consistency relative to BCSI
identification without being overly prescriptive regarding how such identification is accomplished.
Additionally, NRECA does not support the addition of a requirement to “identify applicable BES Cyber System Information storage location.” The
Technical Rationale indicates that the SDT wanted to shift focus from the storage location to the information; however, this addition places the focus
back on to the storage location for what appears to be solely administrative purposes. As well, the description of what was intended for identification in
the Technical Rationale exceeds the scope of the verbiage added to Requirement R1.1. Identification of an object is different than description of an
object and the requirement language addresses only the former while the Technical Rationale is clearly suggesting the latter. Thus, this addition
creates ambiguity and confusion regarding Responsible Entity’s obligations for little or no benefit to BES reliability.
Likes
0
Dislikes
0
Response
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
No
Document Name
Comment
The addition of a new requirement is not necessary because 1) REs already have the flexibility to identify BCSI storage locations, and 2) None of the
rest of the proposed requirements reference storage locations anyway.
Likes
0
Dislikes
0
Response
Andrea Barclay - Georgia System Operations Corporation - 4
Answer
No
Document Name
Comment
GSOC does not support the replacement of the term “method” with the term “process.” A “method” for identification allows Responsible Entities to
provide guidelines and criteria to their personnel to aid in identification of BCSI without requiring a pre-defined series of steps or action (e.g., a process)
to be utilized by such personnel in the identification. This distinction is critical because a process can be high-level and – thereby – provide significant
variability in what is identified as BCSI whereas a method provides personnel with enough guidance to provide consistency relative to BCSI
identification without being overly prescriptive regarding how such identification is accomplished.
Additionally, GSOC does not support the addition of a requirement to “identify applicable BES Cyber System Information storage location.” The
Technical Rationale indicates that the SDT wanted to shift focus from the storage location to the information; however, this addition places the focus
back on to the storage location for what appears to be solely administrative purposes. As well, the description of what was intended for identification in
the Technical Rationale exceeds the scope of the verbiage added to Requirement R1.1. Identification of an object is different than description of an
object and the requirement language addresses only the former while the Technical Rationale is clearly suggesting the latter. Thus, this addition
creates ambiguity and confusion regarding Responsible Entity’s obligations for little or no benefit to BES reliability.
Likes
0
Dislikes
0
Response
Lana Smith - San Miguel Electric Cooperative, Inc. - 5
Answer
No
Document Name
Comment
SMEC agrees with comments submitted by NRECA.
SMEC also disagrees with the removal of the qualifying language “with ERC” from the applicability of Medium Impact BES Cyber Systems in CIP-011-3
R1.1 as currently provided in CIP-004-6 R4.1, and how this greatly and needlessly expands the scope of all subsequent parts of R1, and R2.
Likes
0
Dislikes
0
Response
Leonard Kula - Independent Electricity System Operator - 2
Answer
No
Document Name
Comment
IESO agrees in principle with the comments submitted by NPCC:
1. We recommend security objectives instead of prescriptive requirements. Information protection program should include identification, access
control, etc.
2. For the Applicability column referencing “system information,” we suggest changing “System information pertaining to:” to “Information
associated with,” or clarification of what is considered “system information”
3. We recommend clarifying by stipulating that the Entity’s information protection plan includes a description of the storage location(s) and that the
Entity maintains a list of those storage locations
4. It is unclear if the intent of R1.1. is also for an entity to *develop a process* to list the storage locations or the actual inventory list of the storage
locations. If the intention is not a “process”, then subdivide 1.1 requirement into two component parts: 1.1.1 a process to identify what
constitutes BCSI and 1.1.2 a second requirement to have an inventory of locations.
Likes
0
Dislikes
0
Response
Chris Wagner - Santee Cooper - 1, Group Name Santee Cooper
Answer
No
Document Name
Comment
No, the current version of CIP-004 already provides for the identification of BCSI storage locations. Keeping all the requirements for access and
revocation in one standard decreases the complexity for compliance.
Likes
0
Dislikes
0
Response
sean erickson - Western Area Power Administration - 1
Answer
No
Document Name
Comment
The SDT should consider that with cloud computing the physical location of BCSI is irrelevant. It is more important to protect the data vs
where the data is located. Cloud computing currently replicates data in data centers world-wide. Entities will not be able to verify where cloud
BCSI exists.
This is duplicative in nature. The requirement to approve access by itself requires entitites to know where the data is located. Hence
authorization though roles or entitlments identifies the locations of the BCSI.
Likes
0
Dislikes
0
Response
Gerry Adamski - Cogentrix Energy Power Management, LLC - 5
Answer
No
Document Name
Comment
With respect to Applicability, the term 'System Information" is undefined. Perhaps the team intended to include "BES Cyber System Information" In any
case, greater clarification of this term is needed.
The term "Method" allows the Registered Entity greater flexibility to provide guidance to meet the intended security objectives of the requirement. In
that regard, I do not agree that the use of the term "process" is a better choice for this requirement as this implies a rigid step-by-step structure.
With respect to the Measure concerning "Indications on information.......", the language should be clarified to permit classification of the electronic
storage location as contaning BCSI and not each individual document or file while at rest within that access-controlled location. Indications should be
considered for data in transit.
I agree that a listing of individual storage locations for BCSI should be identified and maintained.
Likes
0
Dislikes
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
No
Document Name
Comment
New and emerging technologies shift the paradigm of security controls away from a specific storage location/repository to the ability to access and use
the information itself. For example, an entity that utilizes file level security can apply encrypted protections on the data that preclude unauthorized
access to the data regardless of where it is stored. Requiring a list of storage locations is an antiquated construct that disincentivizes entities from using
potentially more secure mechanisms because of the impossibility of compliance with documenting storage locations. The requirement should be
technology agnostic and objective based, so it is written to focus on the implementation of effective methods that afford adequate security protections to
prevent unauthorized access to the information.
Likes
0
Dislikes
0
Response
Janelle Marriott Gill - Tri-State G and T Association, Inc. - 3
Answer
Document Name
Comment
No
‘System Information pertaining to’ in the applicability column may broaden scope expectations and should be removed.
Likes
1
Dislikes
Barry Jones, N/A, Jones Barry
0
Response
Jonathan Robbins - Seminole Electric Cooperative, Inc. - 4
Answer
No
Document Name
Comment
See NRECA submitted comments.
Likes
1
Dislikes
Barry Jones, N/A, Jones Barry
0
Response
Anton Vu - Los Angeles Department of Water and Power - 6
Answer
No
Document Name
Comment
New R1.1 still stresses “Identify applicable BES Cyber System information storage locations.” According to the SAR, the emphasis was supposed to
move away from storage “locations” and focus on the protection of the information itself. However, to maintain security of information being stored
outside of a Registered Entity using cloud services and vendors, to conform to the SAR, and without imposing undue regulatory burdens to entities
using encryption key management for BCSI stored within the Responsible Entity, the language should be modified to say “Identify applicable BES Cyber
System information storage locations not owned or managed by the Responsible Entity.”
Likes
0
Dislikes
0
Response
Sandra Shaffer - Berkshire Hathaway - PacifiCorp - 6
Answer
Document Name
Comment
No
Yes, we agree that the language in R1 Part 1.1, as written, allows the Responsible Entity the flexibility in identifying BCSI storage locations.
While the requirement is necessary, we do propose splitting R1 Part 1.1 into two parts as follows:
In Part 1.1: change the Requirement to delete the phrase, “and identify applicable BES Cyber System Information storage locations.” Also, in the
Measures, delete last bullet.
Recommend creating a new Part 1.2: with the ‘Applicability’ as Part 1.1, but add, “with ERC” to Medium Impact BES Cyber Systems, and in the
Requirement section, “Method(s) to identify applicable BES Cyber System Information storage locations.”
We agree with EEI’s suggestion to create the new term “BCSI Repository” to better define BCSI storage locations.
Applicability of current R1 Parts 1.3 to 1.6, and R2 Parts 2.1 and 2.2, change to reference a newly created R1 Part 1.2.
Likes
0
Dislikes
0
Response
Sean Bodkin - Dominion - Dominion Resources, Inc. - 6, Group Name Dominion
Answer
No
Document Name
Comment
Dominion Energy supports the work the SDT has done on develoing the current draft. Dominion energy suggests that the team focus on the approach
taken in the current NERC CMEP Guidance document in addressing the issue and further supports EEIs comments.
Likes
0
Dislikes
0
Response
David Jendras - Ameren - Ameren Services - 3
Answer
Document Name
No
Comment
Ameren agrees with and supports EEI comments.
Likes
0
Dislikes
0
Response
Kagen DelRio - North Carolina Electric Membership Corporation - 3,4,5 - SERC
Answer
No
Document Name
Comment
NCEMC supports the comments by Barry Lawson, National Rural Electric Cooperative Association and ACES
Likes
0
Dislikes
0
Response
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
No
Document Name
Comment
Part 1.1 as written requires a process for identifying two things; BCSI and BCSI storage locations. However there is no other mention of BCSI storage
locations within the standard. Since there are no proposed requirements for these storage locations, a process to identify them has no function. The
remainder of the requirements apply to the BCSI as identified in R1.1 with no further mention of the storage locations. We are concerned with the
philosophical shift from BCSI storage locations as the object of many of the requirements to the BCSI itself, in particular all the requirements that were
previously in CIP-004. Managing and auditing access to BCSI as simply information in whatever form and wherever it is being used is an infinite
scope. In order for access to be managed and audited, it must have finite and discrete objects such as designated BCSI storage locations. For
example, entities will be unable to prove compliance with CIP-011 (R1.3 and R1.5 in particular) on BCSI as it exists in the form of a working copy of a
printed network diagram used by a technician in a substation to troubleshoot a communications issue. By making BCSI the object of the requirements
rather than the designated storage locations, the scope has been expanded to a point that is unmanageable and unmeasurable with which entities are
unable to prove compliance. We suggest the object of the requirements remain as they were in CIP-004 and explicitly reference designated BCSI
storage locations as their object, not simply BCSI.
Also, the requirement does not “allow an entity the flexibility” to identify storage locations for BCSI, it requires that an entity do so. The identification of
storage locations containing BCSI is, for all practical audit purposes, already required under CIP-011-2 (See the NERC Evidence Request Tool, BCSI
Tab), and the proposed wording does not allow any flexibility – it explicitly requires an entity to develop and maintain a list.
The applicability of Part 1.1 has changed to “System information pertaining to…”, which raises a concern over what “system information” is and how
does an entity prove they have performed their BCSI identification process on the universe of all such information? We are concerned that “system
information” is not a finite or discrete scope for this requirement. A requirement with a stated applicability of all possible information about a system is a
showstopper issue.
Southern suggests that instead it should require a process for determining BCSI for high/medium impact BCS. An example replacement R1 that is not
in “table format” could state “Each Responsible Entity shall have a process to identify BCSI that pertains to high impact or medium impact BCS and their
associated EACMS and PACS.” Subsequent R2, R3, etc. could then outline the necessary parts of the information protection program scoped to that
identified BCSI.
If keeping the table format for R1 is desired, retaining the the high/medium impact BCS as the applicability of Part 1.1 and then require “Processes to
identify BCSI that pertain to the applicable systems” is preferable. It should stay scoped to high/med impact BCS and not the full universe of system
information.
Likes
0
Dislikes
0
Response
Bridget Silvia - Sempra - San Diego Gas and Electric - 3
Answer
No
Document Name
Comment
SDG&E supports EEI’s comments submitted on our behalf.
In addition, as an alternative to EEI’s proposed definition for BCSI Repository, SDG&E tenders its alternate definition below:
BCSI Repository – Either a physical or electronic storage location where BES Cyber System Information is stored, and for which access is controlled.
For physical BCSI Repositories, this would be a physical location. For electronic BCSI Repositories, this would be a logical location.
Likes
0
Dislikes
0
Response
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
No
Document Name
Comment
ITC supports the response found in the NSRF Comment Form
Likes
0
Dislikes
0
Response
Quintin Lee - Eversource Energy - 1, Group Name Eversource Group
Answer
No
Document Name
Comment
1. We would recommend security objectives (similar to CIP-013-1) instead of prescriptive requirements. Information protection program should
include identification, access control, etc.
2. We suggest changing “System information pertaining to:” to “Information associated with,” or clarify the term “system information”.
Likes
0
Dislikes
0
Response
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
No
Document Name
Comment
Yes, we agree that the language in R1 Part 1.1, as written, allows the Responsible Entity the flexibility in identifying BCSI storage locations.
However, we share the concerns expressed by EEI.
While the requirement is necessary, we do propose splitting R1 Part 1.1 into two parts as follows:
In Part 1.1: change the Requirement to delete the phrase, “and identify applicable BES Cyber System Information storage locations.” Also, in the
Measures, delete last bullet.
Recommend creating a new Part 1.2: with the ‘Applicability’ as Part 1.1, but add, “with ERC” to Medium Impact BES Cyber Systems, and in the
Requirement section, “Method(s) to identify applicable BES Cyber System Information storage locations.” This could in turn be changed to “Method(s)
to identify applicable BES Cyber System Information Repositories” per the EEI recommendations.
We agree with EEI’s suggestion to create the new term “BCSI Repository” to better define BCSI storage locations.
Applicability of current R1 Parts 1.3 to 1.6, and R2 Parts 2.1 and 2.2, change to reference a newly created R1 Part 1.2.
Likes
0
Dislikes
0
Response
Ayman Samaan - Edison International - Southern California Edison Company - 1
Answer
No
Document Name
Comment
Please see comments submitted by Edison Electric Institute
Likes
0
Dislikes
0
Response
David Rivera - New York Power Authority - 3
Answer
No
Document Name
Comment
Our first suggestion is that the Applicability for 1.1 be returned to it’s original state without any additional conditions or prerequites. Absent that,
1. We recommend security objectives instead of prescriptive requirements. Information protection program should include identification, access
control, etc.
2. Since we have some debate over “system information,” we suggest changing “System information pertaining to:” to “Information associated
with,” or clarification of “system information”. At a minimum, if “system information” must be used. It should be established as a NERC glossary
Defined Term.
3. We recommend clarifying by stipulating that the Entity’s plan includes a description of the storage location(s) and maintains a list of those
storage locations.
Likes
0
Dislikes
0
Response
Devin Shines - PPL - Louisville Gas and Electric Co. - 1,3,5,6 - SERC,RF, Group Name PPL NERC Registered Affiliates
Answer
No
Document Name
Comment
The SAR stressed that changes would be focused on “…BCSI and the ability to obtain and make use of it”, where the current standard “…focused on
access to the ‘storage location’…”, yet the proposed changes add additional requirements to identify the storage locations. This seems to be contrary to
the main objective of the SAR. We have additional concerns about what the SDT means about storage location and how it pertains to storage at
vendors and their networks. We suggest that the SDT clarify what their intent was regarding the changed requirement on storage location.
Additionally, the proposed changes add PCAs as applicable systems, which by definition do not contain BCSI. It seems that this addition is outside of
the SAR and it would be helpful for the SDT to describe how adding this “clarifies the protections expected when utilizing third-party solutions”. We
believe that no changes are needed to R1 Part 1.1 to address the SAR and thus, the current language should remain the same.
Likes
0
Dislikes
0
Response
Wayne Guttormson - SaskPower - 1
Answer
No
Document Name
Comment
Support MRO comments.
Likes
Dislikes
0
0
Response
Bobbi Welch - Midcontinent ISO, Inc. - 2
Answer
No
Document Name
Comment
Comments: MISO agrees the changes are necessary; however, we also have concerns. As the existing language in CIP-004-6, requirement R4, part
4.1.3 implies and/or can be interpreted as limiting access to the storage location as opposed to controlling access to BCSI regardless of location, MISO
supports adding language to require identifying information and applicable BCSI storage locations will expand flexibility and options.
That said, MISO proposes the SDT more clearly articulate the following key distinctions raised during the Q&A portion of the 2019-02: BES Cyber
System Information Access Management Webinar hosted on January 16, 2020: physical or electronic, responsible entity or vendor hosted. To make this
clear in the proposed standard, MISO proposes the SDT expand the language of the last example provided under requirement R1, Part 1.1, Measures
as follows:
“Storage locations (physical or electronic, responsible entity or vendor hosted) identified for housing BES Cyber System Information in the entity’s
information protection program”
Likes
0
Dislikes
0
Response
Eli Rivera - CenterPoint Energy Houston Electric, LLC - NA - Not Applicable - Texas RE
Answer
No
Document Name
Comment
CenterPoint Energy Houston Electric, LLC (CEHE) supports the comments as submitted by the Edison Electric Institute.
Likes
0
Dislikes
0
Response
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
Document Name
Comment
No
EEI member companies (EEI) identified four issues for further consideration by the SDT and proposes solutions to address some of those issues.
First, EEI urges the SDT to clarify the requirement to identify BES Cyber System Information (BCSI) storage locations as proposed by the SDT for CIP011-3, Requirement R1, Part 1.1. The requirement, as written, requires registered entities to work with their third-party cloud-based service providers to
identify the physical location where their BCSI resided on the service provider’s cloud-based network. The challenge is the difficulty and, potential
impracticality for entities to track down and maintain records from service providers to demonstrate compliance on a continuing basis. To address this
challenge, the SDT should clarify BCSI “Storage Location” and address electronic and physical repositories within that definition. As an alternative, EEI
suggests the SDT define the term “BCSI Repository,” which would provide registered entities a simpler solution than what was provided in the proposed
revisions to CIP-004-7 and CIP-011-3. Additionally, EEI offers the following definition for SDT review and consideration:
BCSI Repository – Either a physical or electronic storage location where BES Cyber System Information is retained. For physical BCSI Repositories,
this would be a physical location. For electronic BCSI Repositories, this would be a logical location. Notes: Issues surrounding short term storage of
BCSI (e.g., working copies, etc.) are not intended to be part of this definition but would need to be addressed by responsible entity’s policies and
procedures.
Second, to provide clarity with respect to the applicability of Requirement R1, Part 1.1., EEI suggests replacing the undefined term, “system information”
with the NERC defined term, “BES Cyber System Information.”
Third, the SDT’s proposal creates compliance challenges. Registered entities would have difficulty proving the granting and removal of access to BCSI
as contemplated in the proposed draft for CIP-004-7. As an alternative, EEI suggests using the BCSI Repository definition shown above, and revising
proposed CIP-004-7 to require registered entities to prove access and removal of access to a BCSI Repository.
Fourth, EEI is concerned that the SAR scope may have expanded without providing necessary justification within the Technical Rationale. See our
comments to Questions 11 below.
Likes
0
Dislikes
0
Response
Gregory Campoli - New York Independent System Operator - 2
Answer
No
Document Name
Comment
NYISO felt that the changes are necessary. The existing language in CIP-004-6, requirement R4, part 4.1.3 implies and/or can be interpreted as
limiting access to storage location options as opposed to controlling access to BCSI regardless of location. By adding language to require identifying
information coupled with an identification of applicable BCSI storage locations would certainly add acceptable options and provide a responsible entity
flexibility in choosing technology solutions.
In addition, NYISO feels that the SDT more clearly articulated key distinctions during the Q&A portion of the 2019-02: BES Cyber System Information
Access Management Webinar that was hosted on January 16, 2020. In order to make this clearer, NYISO would suggest that the SDT should endeavor
to expand the language of the last example in the current draft provided under requirement R1, Part 1.1, Measures as follows:
“An inventory of locations, either physical or electronic, either housed within a responsible entity’s data center or vendor hosted that are identified as
housing the responsible entity’s BES Cyber System Information be a part of the entity’s information protection program”
Likes
0
Dislikes
0
Response
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name RSC no NextEra
Answer
No
Document Name
Comment
1)
We recommend security objectives instead of prescriptive requirements. Information protection program should include identification, access
control, etc.
2)
Since we have some debate over “system information,” we suggest changing “System information pertaining to:” to “Information associated with,”
or clarification of “system information”.
3)
We recommend clarifying by stipulating that the Entity’s plan includes a description of the storage location(s) and maintains a list of those storage
locations.
Likes
0
Dislikes
0
Response
Marty Hostler - Northern California Power Agency - 5
Answer
No
Document Name
Comment
The requirement is not necessary. Why should we have to identify our locations to NERC? There should be security objectives instead of prescriptive
requirements.
Likes
0
Dislikes
0
Response
Holly Chaney - Snohomish County PUD No. 1 - 3, Group Name SNPD Voting Members
Answer
Document Name
Comment
No
SNPD is concerned that the proposed wording INCREASES rather than DECREASES ambiguity. The current language is understood to require
Entities to designate BCSI storage locations, which is the fundamental security imperative to enable proper access control. Semantics between terms
such as “designate” vs. “identify” or another synonym will not fundamentally alter how Entities choose to interpret and respond to R1. There are already
substantial differences between how Entities interpret the current language. In other words, the current wording is descriptive and defines the
imperative.
Likes
1
Dislikes
Public Utility District No. 1 of Snohomish County, 4, Martinsen John
0
Response
Jenifer Holmes - Alliant Energy Corporation Services, Inc. - 4 - MRO,RF
Answer
No
Document Name
Comment
Alliant Energy agrees with NSRF and EEI’s comments.
Likes
0
Dislikes
0
Response
Constantin Chitescu - Ontario Power Generation Inc. - 5
Answer
No
Document Name
Comment
OPG is in agreement with RSC provided comment
Likes
0
Dislikes
0
Response
James Brown - California ISO - 2 - WECC
Answer
Document Name
Comment
No
The approach of identifying the storage locations is welcomed since this is where controls are applied and is compatible to current CIP-004
requirements. The drafting team needs to avoid requirements that can be interpreted as requiring protection of each individual piece of BCSI.
It would be helpful to clearly define what is meant by “storage locations”. Is it geographical? Is it the server or tenant with a cloud provider? This
distinction could be important when BCSI is housed by a vendor or other third-party. Consider adding identification of a) storage locations with the
entity, b) with a vendor who provides custom services with identified personnel for in scope cyber systems or assets and c) with a certified cloud service
provider who provides generic cloud based services without insider knowledge.
The Applicability column needs to be modified to limit the information to only BCSI, and not all system information pertaining to the system categories
listed. Just using “system information” will cast too wide of a net on identifying BCSI. Consider revising as, “BES Cyber System Information for:” This is
easily understood since it is a defined term with defined criteria.
Likes
0
Dislikes
0
Response
Ryan Olson - Portland General Electric Co. - 5, Group Name PGE Group 2
Answer
No
Document Name
Comment
PGE agrees with EEI’s comments
Likes
1
Dislikes
Portland General Electric Co., 3, Zollner Dan
0
Response
Jennie Wike - Jennie Wike On Behalf of: Hien Ho, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; John Merrell, Tacoma Public Utilities
(Tacoma, WA), 3, 1, 4, 5, 6; Marc Donaldson, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Ozan Ferrin, Tacoma Public Utilities (Tacoma,
WA), 3, 1, 4, 5, 6; Terry Gifford, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; - Jennie Wike
Answer
No
Document Name
Comment
No, The term “designated storage locations” offered additional clarity that it was only those storage locations designated as such by the responsible
entity that would meet this requirement. However, the updated term “applicable BES Cyber System Information storage locations” offers no clarity of
which storage locations would be applicable. This could have the unintended consequence of increasing the scope of locations to be managed under
CIP. The term is too broad, and should be left as “designated storage locations” or amended to “designated storage locations of BCSI.”
Likes
0
Dislikes
0
Response
Angela Gaines - Portland General Electric Co. - 1
Answer
No
Document Name
Comment
Please see comments PGE Group 2
Likes
0
Dislikes
0
Response
Dennis Sismaet - Northern California Power Agency - 6
Answer
No
Document Name
Comment
The requirement is not necessary. Why should we have to identify our locations to NERC? There should be security objectives instead of prescriptive
requirements.
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
No
Document Name
Comment
Yes, we agree that the language in R1 Part 1.1, as written, allows the Responsible Entity the flexibility in identifying BCSI storage locations.
However, we share the concerns expressed by EEI and the MRO NSRF.
While the requirement is necessary, we do propose splitting R1 Part 1.1 into two parts as follows:
In Part 1.1: change the Requirement to delete the phrase, “and identify applicable BES Cyber System Information storage locations.” Also, in the
Measures, delete last bullet.
Recommend creating a new Part 1.2: with the ‘Applicability’ as Part 1.1, but add, “with ERC” to Medium Impact BES Cyber Systems, and in the
Requirement section, “Method(s) to identify applicable BES Cyber System Information storage locations.” This could in turn be changed to “Method(s)
to identify applicable BES Cyber System Information Repositories” per the EEI and MRO NSRF recommendations.
Applicability of current R1 Parts 1.3 to 1.6, and R2 Parts 2.1 and 2.2, change to reference a newly created R1 Part 1.2.
Likes
0
Dislikes
0
Response
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
No
Document Name
Comment
The approach of identifying the storage locations is welcomed because this is where controls are applied, and the approach is compatible to current
CIP-004 requirements. ERCOT suggests the drafting team avoid requirements that can be interpreted as requiring protection of each individual piece of
BCSI.
ERCOT believes it would be helpful to clearly define what is meant by “storage locations.” Is it geographical? Is it the server or tenant with a cloud
provider? This distinction could be important when BCSI is housed by a vendor or other third-party. ERCOT suggests the drafting team consider
adding identification of (a) storage locations with the entity, (b) vendors that provide custom services with identified personnel for in scope cyber
systems or assets, and (c) certified cloud service providers that provide generic cloud based services without insider knowledge.
The Applicability column should be modified to limit the information to only BCSI, and not all system information pertaining to the system categories
listed. Just using “system information” may cast too wide of a net on identifying BCSI. ERCOT suggests the drafting team consider revising to read
“BES Cyber System Information for:” This would likely be more easily understood because it is a defined term with defined criteria.
Likes
0
Dislikes
0
Response
Douglas Webb - Douglas Webb On Behalf of: Allen Klassen, Westar Energy, 6, 3, 1, 5; Bryan Taggart, Westar Energy, 6, 3, 1, 5; Derek Brown,
Westar Energy, 6, 3, 1, 5; Grant Wilkerson, Westar Energy, 6, 3, 1, 5; James McBee, Great Plains Energy - Kansas City Power and Light Co., 1,
3, 6, 5; Jennifer Flandermeyer, Great Plains Energy - Kansas City Power and Light Co., 1, 3, 6, 5; John Carlson, Great Plains Energy - Kansas
City Power and Light Co., 1, 3, 6, 5; Marcus Moor, Great Plains Energy - Kansas City Power and Light Co., 1, 3, 6, 5; - Douglas Webb, Group
Name Westar-KCPL
Answer
No
Document Name
Comment
Westar and Kansas City Power & Light Company, endorse Edison Electric Institute's (EEI) comments.
Likes
0
Dislikes
0
Response
Michael Johnson - Michael Johnson On Behalf of: James Mearns, Pacific Gas and Electric Company, 1, 3, 5; Marco Rios, Pacific Gas and
Electric Company, 1, 3, 5; Sandra Ellis, Pacific Gas and Electric Company, 1, 3, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
No
Document Name
Comment
PG&E does not agree with required identification of BCSI storage locations. The stated purpose and emphasis of the modifications is the protection of
“System Information” (i.e. BCSI) and PGAE does not believe that this burdensome requirement enhances protection of BCSI. The requirement to
identify storage locations has been administratively burdensome and challenging for BCSI placed on internal servers but could be impossible for BCSI
placed on third-party provider infrastructure (i.e. cloud), especially if the service providers have the capability to store the BCSI on multiple instances of
their infrastructure for redundancy and resilience.
PG&E recommends the required identification of storage locations be removed while maintaining the emphasis on the protection of the BCSI.
Likes
0
Dislikes
0
Response
Allan Long - Memphis Light, Gas and Water Division - 1
Answer
No
Document Name
Comment
The change from "designated storage locations" to "applicable ... storage locations" increases the confusion that already surrounds this topic.
Likes
0
Dislikes
0
Response
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
No
Document Name
Comment
Yes, we agree that the language in R1 Part 1.1, as written, allows the Responsible Entity the flexibility in identifying BCSI storage locations.
However, we share the concerns expressed by EEI and the MRO NSRF.
While the requirement is necessary, we do propose splitting R1 Part 1.1 into two parts as follows:
In Part 1.1: change the Requirement to delete the phrase, “and identify applicable BES Cyber System Information storage locations.” Also, in the
Measures, delete last bullet.
Recommend creating a new Part 1.2: with the ‘Applicability’ as Part 1.1, but add, “with ERC” to Medium Impact BES Cyber Systems, and in the
Requirement section, “Method(s) to identify applicable BES Cyber System Information storage locations.” This could in turn be changed to “Method(s)
to identify applicable BES Cyber System Information Repositories” per the EEI and MRO NSRF recommendations.
Applicability of current R1 Parts 1.3 to 1.6, and R2 Parts 2.1 and 2.2, change to reference a newly created R1 Part 1.2
Likes
0
Dislikes
0
Response
Michael Puscas - ISO New England, Inc. - 2
Answer
No
Document Name
Comment
We recommend clarifying the requirement by stipulating that the Entity’s plan includes a description of the storage locations for BCSI and maintains a
list of those storage locations. In addition, there should be language describing what is meant by “storage locations.” The definition is important when
BCSI is housed by a vendor or other third-party. Finally, the requirement should cover only BCSI and not all system information pertaining to the
system categories listed in the Applicability column. Accordingly, “system information” in the Applicability column should be changed to the defined term
“BES Cyber System Information.”
Likes
0
Dislikes
0
Response
Bradley Collard - SunPower - 5
Answer
No
Document Name
Comment
In its current form, CIP-004 and CIP-011 already provides flexibility.
The current requirements to address access to sensitive data and information seem acceptable in the current formats.
What is unclear is how the BCSI will be usable if it must always reside in specific locations? For example, is it violation if someone who has access,
temporary pulls that information off the stored location and prints the document for review? While a copy of that data is stored in the storage location,
the hard copy now creates an issue. What happens when that person takes it outside the physical security perimeter? Entities should be required to
describe how they identify BCSI, how BCSI is transmitted, whom may have access to the data and information, the description electronic access
controls, and how exceptions, if any, exist in relation to the use of the information outside of those parameters.
The real issue is where it is stored. Auto saves, inadvertent machine shutdowns, etc. may cause the data to be stored in a location outside the
acceptable storage location. Virtualization, Office 365, etc. may cause issues for entities to be able to ensure the information is never stored outside of a
set storage location. While SunPower believes there can be adequate controls, the programs and systems industry use will likely cause an increase of
possible violations as those programs and systems change by the provider. Temporary storage on local devices that are also secured by an approved
user should be allowed, at least on a temporary basis.
Likes
0
Dislikes
0
Response
Laura Nelson - IDACORP - Idaho Power Company - 1
Answer
No
Document Name
Comment
Likes
Dislikes
0
0
Response
Susan Sosbe - Wabash Valley Power Association - 3
Answer
Yes
Document Name
Comment
While the requirement seems flexible, it is subject to confusion in implementation. The previous version specificially identified electronic or physical
controls. This version extends scope to include the cloud. However, in doing so, it removes the context for full understanding of the
requirement. Lacking this context, there is a signficant potential of having multiple interpretations of the requirement.
Likes
1
Dislikes
Miller Scott On Behalf of: David Weekley, MEAG Power, 3, 1; Roger Brand, MEAG Power, 3, 1;
0
Response
William Hutchison - Southern Illinois Power Cooperative - 1
Answer
Yes
Document Name
Comment
Comments: We feel the language could be clearer if the BES Cyber System itself was excluded being it is already being protected by the NERC CIP
requirements. The same problem exists within the standard today. It does not exclude BCSI contained within the BES Cyber System itself. Although it
is inherent BES Cyber Systems contain BCSI, the standards do not exclude those systems/Cyber Assets from containing BCSI, thus the Cyber Assets
themselves would be BCSI repositories and should be documented as such. We have not seen this as a problem in audit, but a strict auditor could
make this an issue the way it is written.
Also, examples of potential Cyber Assets containing BCSI could be better expanded in the Guidelines and Technical Basis, such as SIEMs, Anti-virus
servers, backup servers, etc. which are not a part of a BES Cyber System and the rationale behind why they are or are not considered BCSI
repositories.
Likes
0
Dislikes
0
Response
Masuncha Bussey - Duke Energy - 1,3,5,6 - SERC, Group Name Duke Energy
Answer
Document Name
Comment
Yes
Duke Energy generally agrees that CIP-011-3 R1, Part 1.1 allows flexibility to identify which storage locations are for BCSI and agree the requirement is
necessary.
Likes
0
Dislikes
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Yes
Document Name
Comment
While we agree that including the need to identify storage locations, this could prove burdensome to entities. Identification of a location in cloud storage
providers (e.g. OneDrive, Microsoft Teams, Sharepoint, etc.) which offer seamless creation and storage of documentation may make it difficult to
identify specific storage locations. This could result in entities not listing key storage locations or generalizing, at a loss of security, in order to meet the
requirement.
Likes
0
Dislikes
0
Response
Scott Miller - Scott Miller On Behalf of: David Weekley, MEAG Power, 3, 1; Roger Brand, MEAG Power, 3, 1; - Scott Miller
Answer
Yes
Document Name
Comment
There is more than one question and we vote yes on the first question and no on the second. There should only be one quetion, not two.
Likes
0
Dislikes
0
Response
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name Public Utility District No. 1 of Chelan County
Answer
Document Name
Comment
Yes
Yes, due to improved applicability and exclusion of low impact assets.
Likes
0
Dislikes
0
Response
Bruce Reimer - Manitoba Hydro - 1
Answer
Yes
Document Name
Comment
Agree with adding requirement to identify BCSI storage locations even though it is already
Implicitly required to be identified in CIP-004-6 R4.1. To better identify BCSI storage locations, we
would suggest making a definition of BCSI Repository as follows:
“A multi-user electronic or physical locations where a collection of BCSI is retained for long-term
storage.”
Likes
0
Dislikes
0
Response
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
Yes
Document Name
Comment
We feel the language could be clearer if the BES Cyber System itself was excluded being it is already being protected by the NERC CIP
requirements. The same problem exists within the standard today. It does not exclude BCSI contained within the BES Cyber System itself. Although it
is inherent BES Cyber Systems contain BCSI, the standards do not exclude those systems/Cyber Assets from containing BCSI, thus the Cyber Assets
themselves would be BCSI repositories and should be documented as such. We have not seen this as a problem in audit, but a strict auditor could
make this an issue the way it is written.
Also, examples of potential Cyber Assets containing BCSI could be better expanded in the Guidelines and Technical Basis, such as SIEMs, Anti-virus
servers, backup servers, etc. which are not a part of a BES Cyber System and the rationale behind why they are or are not considered BCSI
repositories.
Likes
0
Dislikes
0
Response
Nicholas Lauriat - Network and Security Technologies - 1
Answer
Yes
Document Name
Comment
N&ST suggests changing: “Process(es) to identify information that meets the definition of BES Cyber System Information and identify applicable BES
Cyber System Information storage locations” to “Process(es) to identify information that meets the definition of BES Cyber System Information and to
identify BES Cyber System Information storage locations.”
Likes
0
Dislikes
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Yes
Document Name
Comment
Texas RE recommends revising “System information” to “Information” in the Applicability column to be consistent with the Requirement language.
Likes
0
Dislikes
0
Response
Dmitriy Bazylyuk - NiSource - Northern Indiana Public Service Co. - 3
Answer
Yes
Document Name
Comment
See Steven Toosevich's comments.
Likes
Dislikes
0
0
Response
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 1,3,4,5 - RF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Karl Blaszkowski - CMS Energy - Consumers Energy Company - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Donald Lynd - CMS Energy - Consumers Energy Company - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Document Name
Yes
Comment
Likes
0
Dislikes
0
Response
Teresa Cantwell - Lower Colorado River Authority - 1,5, Group Name LCRA Compliance
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Dwayne Parker - CMS Energy - Consumers Energy Company - 4
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
Response
0
Vivian Moser - APS - Arizona Public Service Co. - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Truong Le - Truong Le On Behalf of: Carol Chinn, Florida Municipal Power Agency, 6, 4, 5, 3; Chris Gowder, Florida Municipal Power Agency,
6, 4, 5, 3; Dale Ray, Florida Municipal Power Agency, 6, 4, 5, 3; David Owens, Gainesville Regional Utilities, 1, 5, 3; Richard Montgomery,
Florida Municipal Power Agency, 6, 4, 5, 3; - Truong Le
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Andrea Jessup - Bonneville Power Administration - 1,3,5,6 - WECC
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Tho Tran - Tho Tran On Behalf of: Lee Maurer, Oncor Electric Delivery, 1; - Tho Tran
Answer
Document Name
Yes
Comment
Likes
0
Dislikes
0
Response
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Adrian Andreoiu - BC Hydro and Power Authority - 1, Group Name BC Hydro
Answer
Yes
Document Name
Comment
Likes
1
Dislikes
BC Hydro and Power Authority, 5, Hamilton Harding Helen
0
Response
Jamie Monette - Allete - Minnesota Power, Inc. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
Response
0
Colleen Campbell - AES - Indianapolis Power and Light Co. - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kinte Whitehead - Exelon - 3
Answer
Document Name
Comment
Exelon supports EEI's comments on behalf of Exelon Segments 1, 3, 5, and 6.
Likes
0
Dislikes
0
Response
Kathryn Tackett - NiSource - Northern Indiana Public Service Co. - 5
Answer
Document Name
Comment
See Steven Toosevich's comments.
Likes
1
Dislikes
Response
NiSource - Northern Indiana Public Service Co., 3, Bazylyuk Dmitriy
0
2. The standard drafting team (SDT) attempted to maintain backwards compatibility with concepts of designated storage locations and
access-level requirements previously contained in CIP-004-6. Do you agree that there is a minimal effort to meet this objective while
providing greater clarity between BCSI and BES Cyber System (BCS) requirement obligations?
Bradley Collard - SunPower - 5
Answer
No
Document Name
Comment
It appears the scope has greatly expanded. Because of the focus of all possible BCSI storage locations, entities will not only be focused on who should
have access and how access is controlled, but where that information may be stored temporally and where it might be duplicated.
Additionally, how are Cloud storage services handled in the new CIP-011-3? The physical security perimeter of that service exists outside of the control
of the registered entity.
If, during a CIP Exceptional Circumstance, information is transmitted to another person to help facilitate an issue, at the end of the CIP Exceptional
Circumstance, data cleanup becomes a problem.
Are entities to identify the RE file server location if an entity is required to send a Regional Entity BCSI?
The focus should be access controls, as the long-term storage is already considered in that process.
Likes
0
Dislikes
0
Response
Michael Puscas - ISO New England, Inc. - 2
Answer
No
Document Name
Comment
Comments: No. The CIP-004-6 requirements are based on an “Applicable System” approach and access to BCSI designated electronic and physical
storage locations. However, CIP-011 shifts the paradigm to “Applicability,” access to BCSI, and the ability to obtain and use the information.
Recommendation: Ensure that the implementation timeline accounts for the need to shift the construct of an Entity’s information protection program.
Likes
0
Dislikes
0
Response
Colleen Campbell - AES - Indianapolis Power and Light Co. - 3
Answer
No
Document Name
Comment
By moving the requirements from CIP-004 to CIP-011 will require a reworking of existing evidence and will cause confusion during any subsequent
audits.
Likes
0
Dislikes
0
Response
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
No
Document Name
Comment
We support the EEI and MRO NSRF comments that disagree with the qualifying language “with ERC” dropping from the applicability of Medium Impact
BES Cyber Systems from CIP-004-6 when moved to CIP-011-3 R1.3. This deletion greatly expands the scope of this requirement, and may have
created a situation where Responsible Entities could be subject to multiple compliance violations based on a single action due to overlapping
obligatations in the CIP Standards.
Having a lack of ERC also renders BCSI pertaining to Medium Impact BES Cyber Systems outside the scope of R1 Part 1.2, as such information, if
obtained, cannot be used remotely, as there is no remote access to the Cyber Systems. Information pertaining to these Cyber Systems can only be
used to compromise them by breaching physical security.
There also is significant scope expansion with the authorization/revocation and review requirements now applying to all BCSI (not just designated
storage locations of BCSI). This expansion of scope is not justified, as the deliberate choice of not implementing ERC to Medium Impact BES Cyber
Systems is currently recognized as a considerable protection.
Likes
0
Dislikes
0
Response
Allan Long - Memphis Light, Gas and Water Division - 1
Answer
Document Name
Comment
No
"Method(s) to prevent the unauthorized access to and use of BES Cyber System Informatin during storage, transit, use, and disposal." is a practical
than "elminate the ability to ...."
Likes
0
Dislikes
0
Response
Douglas Webb - Douglas Webb On Behalf of: Allen Klassen, Westar Energy, 6, 3, 1, 5; Bryan Taggart, Westar Energy, 6, 3, 1, 5; Derek Brown,
Westar Energy, 6, 3, 1, 5; Grant Wilkerson, Westar Energy, 6, 3, 1, 5; James McBee, Great Plains Energy - Kansas City Power and Light Co., 1,
3, 6, 5; Jennifer Flandermeyer, Great Plains Energy - Kansas City Power and Light Co., 1, 3, 6, 5; John Carlson, Great Plains Energy - Kansas
City Power and Light Co., 1, 3, 6, 5; Marcus Moor, Great Plains Energy - Kansas City Power and Light Co., 1, 3, 6, 5; - Douglas Webb, Group
Name Westar-KCPL
Answer
No
Document Name
Comment
Westar and Kansas City Power & Light Company, endorse Edison Electric Institute's (EEI) comments.
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
No
Document Name
Comment
We support the EEI and MRO NSRF comments that disagree with the qualifying language “with ERC” dropping from the applicability of Medium Impact
BES Cyber Systems from CIP-004-6 when moved to CIP-011-3 R1.3. This deletion greatly expands the scope of this requirement, and may have
created a situation where Responsible Entities could be subject to multiple compliance violations based on a single action due to overlapping
obligatations in the CIP Standards.
Having a lack of ERC also renders BCSI pertaining to Medium Impact BES Cyber Systems outside the scope of R1 Part 1.2, as such information, if
obtained, cannot be used remotely, as there is no remote access to the Cyber Systems. Information pertaining to these Cyber Systems can only be
used to compromise them by breaching physical security.
There also is significant scope expansion with the authorization/revocation and review requirements now applying to all BCSI (not just designated
storage locations of BCSI). This expansion of scope is not justified, as the deliberate choice of not implementing ERC to Medium Impact BES Cyber
Systems is currently recognized as a considerable protection.
Likes
0
Dislikes
0
Response
Dennis Sismaet - Northern California Power Agency - 6
Answer
No
Document Name
Comment
I don't see backwards compatibility based on the methods listed in 1.2.
Likes
0
Dislikes
0
Response
Angela Gaines - Portland General Electric Co. - 1
Answer
No
Document Name
Comment
Please see comments PGE Group 2
Likes
0
Dislikes
0
Response
Jennie Wike - Jennie Wike On Behalf of: Hien Ho, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; John Merrell, Tacoma Public Utilities
(Tacoma, WA), 3, 1, 4, 5, 6; Marc Donaldson, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Ozan Ferrin, Tacoma Public Utilities (Tacoma,
WA), 3, 1, 4, 5, 6; Terry Gifford, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; - Jennie Wike
Answer
No
Document Name
Comment
No, The term “designated storage locations” offered additional clarity that it was only those storage locations designated as such by the responsible
entity that would meet this requirement. However, the updated term “applicable BES Cyber System Information storage locations” offers no clarity of
which storage locations would be applicable. This could have the unintended consequence of increasing the scope of locations to be managed under
CIP. The term is too broad, and should be left as “designated storage locations” or amended to “designated storage locations of BCSI.”
Additionally, the CIP-004-6 access level requirements were scoped to High Impact BCS, and Medium Impact BCS with ERC. The CIP-011 replacement
broadly expands the scope of the access level requirements.
Likes
0
Dislikes
0
Response
Ryan Olson - Portland General Electric Co. - 5, Group Name PGE Group 2
Answer
No
Document Name
Comment
PGE agrees with EEI’s comments
Likes
0
Dislikes
0
Response
Dmitriy Bazylyuk - NiSource - Northern Indiana Public Service Co. - 3
Answer
No
Document Name
Comment
See Steven Toosevich's comments.
Likes
0
Dislikes
0
Response
Jamie Monette - Allete - Minnesota Power, Inc. - 1
Answer
No
Document Name
Comment
All BCSI access requirements should remain under CIP-004 as one Standardized Security Standard (centralized location). Leaving the BCSI access
with cyber and physical provides a holistic security access management and review program verses fragmenting access management.
Likes
0
Dislikes
0
Response
Jenifer Holmes - Alliant Energy Corporation Services, Inc. - 4 - MRO,RF
Answer
No
Document Name
Comment
Alliant Energy agrees with NSRF and EEI’s comments.
Likes
0
Dislikes
0
Response
Holly Chaney - Snohomish County PUD No. 1 - 3, Group Name SNPD Voting Members
Answer
No
Document Name
Comment
SNPD is concerned that the proposed wording INCREASES rather than DECREASES ambiguity. The current language is understood to require
Entities to designate BCSI storage locations, which is the fundamental security imperative to enable proper access control. Semantics between terms
such as “designate” vs. “indentify” or another synonym will not fundamentally alter how Entities choose to interpret and respond to R1. There are
already substantial differences between how Entities interpret the current language. In other words, the current wording is descriptive and defines the
imperative.
Likes
1
Dislikes
Public Utility District No. 1 of Snohomish County, 4, Martinsen John
0
Response
Marty Hostler - Northern California Power Agency - 5
Answer
No
Document Name
Comment
I don't see backwards compatibility based on the methods listed in 1.2.
Likes
0
Dislikes
0
Response
Gregory Campoli - New York Independent System Operator - 2
Answer
No
Document Name
Comment
NYISO’s response is based on the assumption this question relates to the proposed changes in CIP-011-3 within requirement R1, parts 1.3, 1.5 and
1.6.
NYISO believes that the proposed changes maintain backwards capability. That said, the proposed changes in CIP-011-3 also introduce a potential
complication; having to maintain similar access authorization, revocation and control measures as that currently contained within CIP-004-7. This could
create a situation whereby a single deficiency in an entity’s access management program could lead to potential non-compliance with two separate
NERC standards.
Note – during the Q&A portion of the 2019-02: BES Cyber System Information Access Management Webinar hosted on January 16, 2020, the SDT
explained that their intent in proposing these modifications was to direct the content of CIP-004-7 solely on BCS while focusing the content of CIP-011-3
solely on BCSI.
NYISO recognizes and agrees with the SDT’s intent to consolidate similar issues. Our recommendation would be for the SDT to maintain all personnel
and access management requirements within CIP-004-7 to better align with existing industry practices. In addition, NYISO would also propose that the
SDT consider similar treatment of vendor related risk assessment requirements be incorporated and consolidated within CIP-013-2.
Likes
0
Dislikes
0
Response
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
No
Document Name
Comment
EEI appreciates the considerable efforts of the SDT to streamline Requirements associated with BCSI within the proposed changes to CIP-004-7 and
CIP-011-3. However, EEI is concerned that the proposed changes may create a situation where responsible entities could be subject to multiple
compliance violations based on a single action due to overlapping obligations in the CIP Standards. For example, if an entity developed a process to
remove access to BCSI, including other logical access, and there was a failure in that process, the proposed requirement could be interpreted as a
violation of CIP-004-7 R5 and CIP-011-3 R1. Whereas, under the current approved standards this situation would result in a single violation of CIP-0046 R5.
Likes
0
Dislikes
0
Response
Eli Rivera - CenterPoint Energy Houston Electric, LLC - NA - Not Applicable - Texas RE
Answer
No
Document Name
Comment
CEHE does not agree that there is a minimal effort to meet the proposed obligations due to the addition of PCAs. Adding the phrase, “System
information pertaining to:” in the Aplicability column does provide greater clarity between BCSI and BES Cyber Systems.
Likes
0
Dislikes
0
Response
Bobbi Welch - Midcontinent ISO, Inc. - 2
Answer
No
Document Name
Comment
MISO’s response assumes this question relates to the proposed changes in CIP-011-3, requirement R1, parts 1.3, 1.5 and 1.6.
MISO believes the proposed changes maintain backwards capability; however, the proposed changes in CIP-011-3 also introduce a new complication,
that of having to maintain similar access authorization, revocation and control measures as that in CIP-004-7. This could create a situation whereby a
single deficiency in an entity’s access management program could lead to potential non-compliance with two NERC standards at the same time.
Note – during the Q&A portion of the 2019-02: BES Cyber System Information Access Management Webinar hosted on January 16, 2020, the SDT
explained their intent in proposing these modifications is to focus the content of CIP-004-7 solely on BCS and the content of CIP-011-3 solely on BCSI.
MISO recognizes and agrees with the SDT’s intent to consolidate similar issues. We recommend that the SDT maintain all personnel and access
management requirements within CIP-004-7 to better align with existing industry practices. Likewise, MISO would propose the SDT consider similar
treatment of vendor related requirements by incorporating them into CIP-013-2.
Likes
0
Dislikes
0
Response
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
No
Document Name
Comment
The standards development team should support specific requirements providing appropriate levels of security for Cloud Service Providers and 3rd
Party Access. Transferring the CIP-004 BCSI requirements to CIP-011 does not address the unique issues created by storing BCSI in repositories that
are not controlled by registered entities. The standards development team should draft separate requirements.
Likes
0
Dislikes
0
Response
Wayne Guttormson - SaskPower - 1
Answer
No
Document Name
Comment
Support MRO comments.
Likes
0
Dislikes
0
Response
Devin Shines - PPL - Louisville Gas and Electric Co. - 1,3,5,6 - SERC,RF, Group Name PPL NERC Registered Affiliates
Answer
No
Document Name
Comment
While we understand the reasoning behind including access to BES Cyber System Information storage locations in CIP-011, the 2016-02 SDT made
great efforts to consolidate like requirements together and remove the “spaghetti” requirements. We believe that these changes are undoing that
effort. The ability for an entity to have a single access management program (dealing with physical, electronic and information access) provides
economy of scale and less opportunities for mistakes or confusion. While we do believe these changes maintain backwards compatibility, we cannot
support splitting access management into multiple Standards.
Likes
0
Dislikes
0
Response
David Rivera - New York Power Authority - 3
Answer
No
Document Name
Comment
NYPA believes that some backward compatibility has been lost since the modified Standard has been modified to extend to ALL Medium Impact BES
Cyber Systems
Likes
0
Dislikes
0
Response
Ayman Samaan - Edison International - Southern California Edison Company - 1
Answer
No
Document Name
Comment
Please see comments submitted by Edison Electric Institute
Likes
0
Dislikes
0
Response
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
No
Document Name
Comment
We support the EEI comments that disagree with the qualifying language “with ERC” dropping from the applicability of Medium Impact BES Cyber
Systems from CIP-004-6 R4.1 when moved to CIP-011-3 R1.3. This deletion greatly expands the scope of this requirement, and may have created a
situation where Responsible Entities could be subject to multiple compliance violations based on a single action due to overlapping obligatations in the
CIP Standards.
Having a lack of ERC also renders BCSI pertaining to Medium Impact BES Cyber Systems outside the scope of R1 Part 1.2, as such information, if
obtained, cannot be used remotely, as there is no remote access to the Cyber Systems. Information pertaining to these Cyber Systems can only be
used to compromise them by breaching physical security, in which case the CIP-011 standard provides no protection.
There also is significant scope expansion with the authorization/revocation and review requirements now applying to all BCSI (not just designated
storage locations of BCSI). This expansion of scope is not justified, as the deliberate choice of not implementing ERC to Medium Impact BES Cyber
Systems is currently recognized as a sufficient protection.
Likes
0
Dislikes
0
Response
Quintin Lee - Eversource Energy - 1, Group Name Eversource Group
Answer
No
Document Name
Comment
We do apprecitate the SDT concern with backwards compatibity, but since we are recommending changes to the current drafts of CIP-004-7 and CIP011-3, we are not able to agree at this time.
Likes
0
Dislikes
0
Response
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
No
Document Name
Comment
ITC supports the response found in the NSRF Comment Form
Likes
0
Dislikes
0
Response
Bridget Silvia - Sempra - San Diego Gas and Electric - 3
Answer
Document Name
Comment
No
SDG&E supports EEI’s comments submitted on our behalf.
SDG&E would like to additionally speak to the new draft standard R1.3 requirement of “Process(es) to authorize access to BES Cyber System
Information…” The existing requirements require authorization for the repositories that BCSI is stored in. A change to authorizing access to BCSI
generally will be a large deviation from current practices and creates many questions about how to authorize/track access to each piece of BCSI.
Likes
0
Dislikes
0
Response
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
No
Document Name
Comment
We do not agree as one of the fundamental concepts of CIP-004 R4 Part 4.1.3 that was lost in the proposed transition to CIP-011 R1 Part 1.3 is the
difference between authorizing access to BCSI storage locations, which is a discrete and finite object that can be monitored and audited (the current
CIP-004 approach), while the new CIP-011 approach is access to BCSI wherever and however it exists inside or outside of its storage locations (i.e. a
hardcopy of a network diagram in a company truck). This fundamental change has made the requirement unmeasurable and non-auditable. We
believe the primary issue of hardware or device level requirements that prevented the use of cloud services was in CIP-011 R2 that required data
destruction at a Cyber Asset/physical storage media level. We do not agree with moving the authorization programs away from BCSI storage
locations. A “storage location” can be a designated encrypted area on a cloud service.
Additionally, we do not agree with moving the “access management” requirements for BCSI out of CIP-004-6 and into CIP-011-3. Although one
argument is to keep all requirements applicable to BCSI in a single standard, the same argument could be applied to keep all “access management”
requirements in the same standard. This is additionally supported by the fact that this is how all entities have currently structured their compliance
programs, and the justification to reallocate those requirements to CIP-011-3 causes more undue burden than any resultant benefit.
Likes
0
Dislikes
0
Response
Kagen DelRio - North Carolina Electric Membership Corporation - 3,4,5 - SERC
Answer
No
Document Name
Comment
NCEMC supports the comments by Barry Lawson, National Rural Electric Cooperative Association and ACES
Likes
0
Dislikes
0
Response
David Jendras - Ameren - Ameren Services - 3
Answer
No
Document Name
Comment
Ameren agrees with and supports EEI comments.
Likes
0
Dislikes
0
Response
Sean Bodkin - Dominion - Dominion Resources, Inc. - 6, Group Name Dominion
Answer
No
Document Name
Comment
Dominion Energy supports the work the SDT has done on develoing the current draft. Dominion energy suggests that the team focus on the approach
taken in the current NERC CMEP Guidance document in addressing the issue and further supports EEIs comments.
Likes
0
Dislikes
0
Response
Andrea Jessup - Bonneville Power Administration - 1,3,5,6 - WECC
Answer
No
Document Name
Comment
BPA believes this is not a minimal effort. There is a difference between access to a location and consuming information stored in that location. The
need to know standard is not contained in the verbiage of the requirement, but is in the guidance. Need to know implies consuming the information
while need to access is simply controlling access. The need to know standard for actually consuming and using information is an unsustainable burden
at remote, especially rarely occupied, locations and could interfere with the ability to perform operations in an emergent situation. All personnel with
access to storage locations have authorization; those who do not actually consume and use that information nonetheless have a business need to
access the location. This covers the risk while keeping the burden minimal. A more sustainable objective would be to ensure that all personnel with
access are authorized rather than a strict need to know standard. Strict need to know implies compartmentalization that is not sustainable for large
organizations with the need to deploy technicians across multiple districts. The language proposed so far would be sustainable if all information were
stored electronically and cryptographically protected but this proposes a problem for hard copies stored in substations.
Likes
0
Dislikes
0
Response
Sandra Shaffer - Berkshire Hathaway - PacifiCorp - 6
Answer
No
Document Name
Comment
We disagree with the qualifying language “with ERC” dropping from the applicability of Medium Impact BES Cyber Systems from CIP-004-6 R4.1 when
moved to CIP-011-3 R1.3. This deletion greatly expands the scope of this requirement, and may have created a situation where Responsible Entities
could be subject to multiple compliance violations based on a single action due to overlapping obligatations in the CIP Standards.
Having a lack of ERC also renders BCSI pertaining to Medium Impact BES Cyber Systems outside the scope of R1 Part 1.2, as such information, if
obtained, cannot be used remotely, as there is no remote access to the Cyber Systems. Information pertaining to these Cyber Systems can only be
used to compromise them by breaching physical security, in which case the CIP-011 standard provides no protection.
There also is significant scope expansion with the authorization/revocation and review requirements now applying to all BCSI (not just designated
storage locations of BCSI). This expansion of scope is not justified, as the deliberate choice of not implementing ERC to Medium Impact BES Cyber
Systems is currently recognized as a sufficient protection.
Likes
0
Dislikes
0
Response
Nicholas Lauriat - Network and Security Technologies - 1
Answer
No
Document Name
Comment
N&ST sees no benefit in moving BCSI storage location access management requirements from CIP-004 to CIP-011, and believes there is no need for
clarification between BCSI and BCS requirements. Furthermore, N&ST believes that the impact of moving some access management requirements
from CIP-004 to CIP-011 could be significant for some Responsible Entities, compelling needless modification and disruption of mature and effective
CIP compliance programs.
Likes
0
Dislikes
0
Response
Jonathan Robbins - Seminole Electric Cooperative, Inc. - 4
Answer
No
Document Name
Comment
See NRECA submitted comments.
Likes
0
Dislikes
0
Response
Janelle Marriott Gill - Tri-State G and T Association, Inc. - 3
Answer
No
Document Name
Comment
Tri-State is generally ok with the movement of the requirements from CIP-004 to CIP-011. However, we do not agree with several of the changes.
1) We do not agree with the addition of PCAs to the scope. Furthermore, this was not in scope of the SAR to address.
2) As for R1.2, we think the original language was correct and the concept of “obtain and use” should instead be incorporated into the access
requirements, especially R1.3. This will make it clear that in order for someone to be deemed to have access to BCSI, they must have the ability to
obtain and use it, which would align with the ERO Practice Guide. Although, we don’t recommend using the term “use” without providing more
clarification as to its meaning.
3) Also as it relates to R1.2, we do not agree with the addition of “disposal”. While this is certainly a good security practice, adding this as a compliance
requirement would be overly burdensome and unnecessary. Furthermore, this was not in scope of the SAR to address.
4) We think the modifications made to R3 are more prescriptive than the prior version in how to prevent unauthorized retrieval of BCSI and
unnecessarily limits the entity’s options in how to meet the security objective. This should be reverted back to previous objective-based language.
Furthermore, this was not in scope of the SAR to address.
Likes
Dislikes
0
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
No
Document Name
Comment
New and emerging technologies shift the paradigm of security controls away from a specific storage location/repository to the ability to access and use
the information itself. For example, an entity that utilizes file level security can apply encrypted protections on the data that preclude unauthorized
access to the data regardless of where it is stored. Requiring a list of storage locations is an antiquated construct that disincentivizes entities from using
potentially more secure mechanisms because of the impossibility of compliance with documenting storage locations. The requirement should be
technology agnostic and objective based, so it is written to focus on the implementation of effective methods that afford adequate security protections to
prevent unauthorized access to the information
Likes
0
Dislikes
0
Response
Vivian Moser - APS - Arizona Public Service Co. - 3
Answer
No
Document Name
Comment
Although AZPS agrees that meeting this objective likely requires minimal effort, AZPS recommends the SDT address the concept of designated storage
locations throughout the Standard. Part 1.1 requires the identification of BCSI storage locations; however, subsequent Requirements omit references to
storage locations and instead refer only to the protection of BCSI. The switch from storage locations to BCSI causes confusion and may create
challenges in executing the required access management and protection controls.
Likes
0
Dislikes
0
Response
sean erickson - Western Area Power Administration - 1
Answer
Document Name
Comment
No
CIP-004 is the appropriate place to require applicable levels of approval prior to granting access to BCSI. Removing the language from CIP004 and adding it to CIP-011 creates two separate standards that cover access controls in place to protect the Bulk Electic System
Information. CIP-011 defines what consititues BCSI and the requirements to protect it. It should not be an standard for approval,
auditing and access monitoring.
Secondly, entities will be required to make major changes to their internal governance and compliance program procedures, policies and
documentation in order to meet this requirement. Please do not mix standards/requirements
Likes
0
Dislikes
0
Response
Chris Wagner - Santee Cooper - 1, Group Name Santee Cooper
Answer
No
Document Name
Comment
The change made to CIP-011-3 Part 1.2 does not add clarity. The choice of the second “use” in Part 1.2 is confusing and does not make sense; “…by
eliminating the ability to obtain and use BES Cyber System Information during, storage, transit, use, and disposal.” The SDT needs to elaborate on
“…eliminating the ability…” What constitutes elimination of ability?
Likes
0
Dislikes
0
Response
Lana Smith - San Miguel Electric Cooperative, Inc. - 5
Answer
No
Document Name
Comment
SMEC agrees with comments submitted by NRECA.
SMEC also disagrees with the removal of the qualifying language “with ERC” from the applicability of Medium Impact BES Cyber Systems in CIP-011-3
R1.1 as currently provided in CIP-004-6 R4.1, and how this greatly and needlessly expands the scope of all subsequent parts of R1, and R2
Likes
0
Dislikes
Response
0
Andrea Barclay - Georgia System Operations Corporation - 4
Answer
No
Document Name
Comment
GSOC appreciates the SDT’s consideration of the important concept of backwards compatibility; however, giving due consideration to the proposed
scope expansion to include PCAs; the shift from access authorization to BCSI generally and not storage locations; the shift from methods to processes;
and the incorporation of vendor risk assessments and required mitigations into the proposed requirements, GSOC cannot agree that the proposed
requirements are actually backwards compatible nor that minimal effort will be required to meet these new requirements.
Likes
0
Dislikes
0
Response
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
No
Document Name
Comment
No, not as proposed.
There is a difference between authorizing access and provisioning access. Per CIP-004-6 Rationale for Requirement R4:
"Authorization" should be considered to be a grant of permission by a person or persons empowered by the Responsible Entity to perform such grants
and included in the delegations referenced in CIP-003-6.
"Provisioning" should be considered the actions to provide access to an individual.
The scope of CIP-004 could be maintained while also changing the focus to the BCSI itself to meet the goals of the SAR by slightly modifying CIP-004
applicable requirement parts to “access to BES Cyber System Information in designated storage locations”, such as in part 4.1.3:
R4.1
Process to authorize based on need, as determined by the Responsible Entity, except for CIP Exceptional Circumstances:
4.1.3 Access to BES Cyber System Information in designated storage locations.
CIP-004 R4.4 and R5.3 refer to provisioned access, and could be modified to include this language as well. For example:
R4.4 Verify at least once every 15 calendar months that provisioned access to BES Cyber System Information in designated storage locations is
authorized and implemented correctly.
R5.3 For termination actions, revoke the individual’s provisioned access to BES Cyber System Information in designated storage locations by the end
of the next calendar day following the effective date of the termination action.
Likes
Dislikes
0
0
Response
Barry Lawson - National Rural Electric Cooperative Association - 4
Answer
No
Document Name
Comment
NRECA appreciates the SDT’s consideration of the important concept of backwards compatibility; however, giving due consideration to the proposed
scope expansion to include PCAs; the shift from access authorization to BCSI generally and not storage locations; the shift from methods to processes;
and the incorporation of vendor risk assessments and required mitigations into the proposed requirements, NRECA does not agree that the proposed
requirements are actually backwards compatible nor that minimal effort will be required to meet these new requirements.
Likes
0
Dislikes
0
Response
Todd Bennett - Associated Electric Cooperative, Inc. - 3, Group Name AECI
Answer
No
Document Name
Comment
AECI supports comments filed by NRECA
Likes
0
Dislikes
0
Response
Kent Feliks - AEP - 3
Answer
No
Document Name
Comment
While AEP is appreciative of the SDT’s efforts to consolidate BCSI requirements into CIP-011, we do not feel there is minimal effort involved in ensuring
compliance. Moving these requirements to a different standard creates more challenges that those who are responsible for
complying are required
to overcome, leading to more overall work and effort for those involved.
Likes
0
Dislikes
0
Response
Maryanne Darling-Reich - Black Hills Corporation - 1,3,5,6 - MRO,WECC
Answer
No
Document Name
Comment
Black Hills would be in favor of seeing less perscriptive models of access and termination requirements. Additionally, the failure to remove BCSI per
CIP-011 could potentially create a scenario where CIP-004’s requirements were also unmet, creating a double violation.
Likes
0
Dislikes
0
Response
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
No
Document Name
Comment
The removal of the term “designated” greatly expands the scope to cover handling BCSI, including creating replicated copies of applicable BCSI, and
ensuring applicable processes and controls are applied to new identified locations / instances of BSCI.
Likes
0
Dislikes
0
Response
Kjersti Drott - Tri-State G and T Association, Inc. - 1
Answer
No
Document Name
Comment
Tri-State is generally ok with the movement of the requirements from CIP-004 to CIP-011. However, we do not agree with several of the changes.
1) Tri-State does not agree with the addition of PCAs to the scope. Furthermore, this was not in scope of the SAR to address.
2) As for R1.2, we think the original language was correct and the concept of “obtain and use” should instead be incorporated into the access
requirements, especially R1.3. This will make it clear that in order for someone to be deemed to have access to BCSI, they must have the ability to
obtain and use it, which would align with the ERO Practice Guide. Although, we don’t recommend using the term “use” without providing more
clarification as to its meaning.
3) Also as it relates to R1.2, we do not agree with the addition of “disposal”. While this is certainly a good security practice, adding this as a compliance
requirement would be overly burdensome and unnecessary. Furthermore, this was not in scope of the SAR to address.
4) We think the modifications made to R3 are more prescriptive than the prior version in how to prevent unauthorized retrieval of BCSI and
unnecessarily limits the entity’s options in how to meet the security objective. This should be reverted back to previous objective-based language.
Furthermore, this was not in scope of the SAR to address.
Likes
0
Dislikes
0
Response
Matthew Nutsch - Seattle City Light - 1,3,4,5,6 - WECC
Answer
No
Document Name
Comment
Seattle finds the proposed requirements are not backward compatible in that they significantly expand scope, from controls for access to BCSI about
High and Medium-with-ERC BCS, to access to all High and Medium BCS. Although this change does address the conflict between the different BCSI
applicabilities of CIP-004 and CIP-011, it does not seem necessary to address the objective of the SAR, which is to revise the Standards to clearly
accommodate BCSI storage and use solutions that are not based on local, physically-focused concepts. Like the change proposed in Q1 above, it is a
clarifying change but appears to do little or nothing to address the central object of these revisions.
If specific access controls are deemed desirable, Seattle recommends that the access termination requirement be changed from the unique-to-BCSI
“one calendar day” to the “24 hours” that is used for all other access termination requirements.
Seattle also supports the comments of SMUD to this question.
Likes
0
Dislikes
0
Response
Bruce Reimer - Manitoba Hydro - 1
Answer
No
Document Name
Comment
We disagree with moving requirements for access to BCSI from CIP-004-6 to CIP-011-3 since it
causes unnessessay revisions of the exsiting CIP-004 and CIP-011 progroms without gaining any
security values. CIP-004 were originally developed for centralizing the access management within
one standard and we don’t think SDT wants backwards, otherwise, does electronic access and
physical access need to be moved back to CIP-004 to CIP-007 and CIP-006 as
well?
Likes
0
Dislikes
0
Response
Jeremy Voll - Basin Electric Power Cooperative - 3
Answer
No
Document Name
Comment
Support the MRO NSRF comments
Likes
0
Dislikes
0
Response
Amy Casuscelli - Xcel Energy, Inc. - 1,3,5,6 - MRO,WECC
Answer
No
Document Name
Comment
Xcel Energy support the comments submitted by EEI.
Likes
0
Dislikes
0
Response
Dana Klem - MRO - 1,2,3,4,5,6 - MRO, Group Name MRO NSRF
Answer
Document Name
Comment
No
Disagree that the qualifying language “with ERC” was dropped from the applicability of Medium Impact BES Cyber Systems from CIP-004-6 R4.1 when
moved to CIP-011-3 R1.3. This deletion greatly expands the scope of this requirement. This expansion of scope is not justified, as the deliberate choice
of not implementing ERC to Medium Impact BES Cyber Systems is currently recognized as a considerable and sufficient protection in and of itself.
Lack of ERC also renders BCSI pertaining to Medium Impact BES Cyber Systems outside the scope of R1 Part 1.2, as any such information, if
obtained, cannot be used remotely, as there is no remote access to the Cyber Systems. These Cyber Systems can only be compromised by breaching
physical security, in which case this standard provides no protection.
There also is significant scope expansion with the authorization/revocation and review requirements now applying to all BCSI (not just designated
storage locations of BCSI).
We disagree with moving requirements for access to BCSI from CIP-004-6 to CIP-011-3. We appreciate the attempt to streamline Requirements
associated with BCSI by placing all related compliance activities solely within the CIP-011-3 Standard. However, by doing so Responsible Entities would
be subject to the potential of having multiple compliance issues with one failed compliance activity as a result of the overlapping NERC CIP Standards.
For example, it is conceivable that one process could remove the ability to access BCSI as well as other logical access. In this approach if there was a
failure in this process it could result in a violation of both CIP-004-7 R5 and for CIP-011-3 R1, where under current Standards this situation would result
in a single potential non-compliance with CIP-004-6 R5.
Due to these reasons we suggest that access control Requirements remain in CIP-004-6 with other access control Requirements.
Likes
0
Dislikes
0
Response
Joe Tarantino - Joe Tarantino On Behalf of: Arthur Starkovich, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Beth Tincher, Sacramento
Municipal Utility District, 4, 1, 6, 3, 5; Jamie Cutlip, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Kevin Smith, Balancing Authority of
Northern California, 1; Nicole Goi, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Nicole Looney, Sacramento Municipal Utility District, 4, 1,
6, 3, 5; - Joe Tarantino
Answer
No
Document Name
Comment
The new standard expands the scope of BES CSI repositories to anywhere BES CSI may be, including in use and transit. This language is similar to
the v3 language that was changed based on lessons learned. This may put entities across North America out of compliance because the current
standard focuses on storage locations, not information in use or transit. Tracking BES CSI in use and transit will not be technically feasible and will but
a great burden on business processes.
Likes
0
Dislikes
0
Response
Scott Miller - Scott Miller On Behalf of: David Weekley, MEAG Power, 3, 1; Roger Brand, MEAG Power, 3, 1; - Scott Miller
Answer
No
Document Name
Comment
Due to having a strong disagreement with R1.2, 1.4 and R2, we disagree with this clarity statement.
Likes
0
Dislikes
0
Response
Susan Sosbe - Wabash Valley Power Association - 3
Answer
No
Document Name
Comment
While this change is minimal, it is relocated from the standard that contains all other authorization and provisioning requirements. This component of
the requirement is about authorization, and is appropriate to be tracked and enforced in the same set of requirements, rather than potentially creating
two separate violations when one violation would have occurred previously.
Likes
0
Dislikes
0
Response
Kevin Conway - Public Utility District No. 1 of Pend Oreille County - 1
Answer
No
Document Name
Comment
The requirment in CIP-011-3 R1.2 appears circular. Are we trying to elimiate the abiltiy to use the BCSI while we are using it?
System Information by eliminating the ability to obtain and use BES Cyber System Information during, including storage, transit, use, and disposal .
Likes
0
Dislikes
0
Response
Laura Nelson - IDACORP - Idaho Power Company - 1
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Michael Johnson - Michael Johnson On Behalf of: James Mearns, Pacific Gas and Electric Company, 1, 3, 5; Marco Rios, Pacific Gas and
Electric Company, 1, 3, 5; Sandra Ellis, Pacific Gas and Electric Company, 1, 3, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
Yes
Document Name
Comment
PG&E agrees the placement of access authorization and revocation as written in CIP-011-3, R1, Parts 1.3 and 1.5 does maintain backward
compatibility to existing CIP-004 processes if an entity elects to use those existing processes.
As noted in Question 1, PGAE does not agree storage locations need to be identified to establish the protections for the BCSI.
Likes
0
Dislikes
0
Response
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
Yes
Document Name
Comment
ERCOT agrees that the concepts of the current version of CIP-004 are maintained. However, a better approach may be to correct this with new parts in
CIP-004. ERCOT also refers the drafting team to the comments submitted by ERCOT in response to Question No. 10.
Likes
0
Dislikes
0
Response
James Brown - California ISO - 2 - WECC
Answer
Yes
Document Name
Comment
We agree that the concepts of the current version of CIP-004 are maintained. However, a better approach would be to correct this with new parts in
CIP-004. Also see comments on question 10.
Likes
0
Dislikes
0
Response
Constantin Chitescu - Ontario Power Generation Inc. - 5
Answer
Yes
Document Name
Comment
OPG is in agreement with RSC provided comment
Likes
0
Dislikes
0
Response
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name RSC no NextEra
Answer
Yes
Document Name
Comment
1.
We agree this update is backward compatible and this update provides greater flexibility.
Likes
0
Dislikes
0
Response
Leonard Kula - Independent Electricity System Operator - 2
Answer
Document Name
Yes
Comment
We agree this update is backward compatible and this update provides greater flexibility.
Likes
0
Dislikes
0
Response
Masuncha Bussey - Duke Energy - 1,3,5,6 - SERC, Group Name Duke Energy
Answer
Yes
Document Name
Comment
Duke Energy generally agrees with moving the requirement to CIP-011. However, notes the change in applicabiltiy will be more than miminal effort to
meet the new objectives.
Likes
0
Dislikes
0
Response
Calvin Wheatley - Wabash Valley Power Association - 1,3 - SERC,RF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Adrian Andreoiu - BC Hydro and Power Authority - 1, Group Name BC Hydro
Answer
Document Name
Comment
Yes
Likes
1
Dislikes
BC Hydro and Power Authority, 5, Hamilton Harding Helen
0
Response
Tho Tran - Tho Tran On Behalf of: Lee Maurer, Oncor Electric Delivery, 1; - Tho Tran
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Anton Vu - Los Angeles Department of Water and Power - 6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
Response
0
Truong Le - Truong Le On Behalf of: Carol Chinn, Florida Municipal Power Agency, 6, 4, 5, 3; Chris Gowder, Florida Municipal Power Agency,
6, 4, 5, 3; Dale Ray, Florida Municipal Power Agency, 6, 4, 5, 3; David Owens, Gainesville Regional Utilities, 1, 5, 3; Richard Montgomery,
Florida Municipal Power Agency, 6, 4, 5, 3; - Truong Le
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Gerry Adamski - Cogentrix Energy Power Management, LLC - 5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Dwayne Parker - CMS Energy - Consumers Energy Company - 4
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
Document Name
Comment
Yes
Likes
0
Dislikes
0
Response
Payam Farahbakhsh - Hydro One Networks, Inc. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Teresa Cantwell - Lower Colorado River Authority - 1,5, Group Name LCRA Compliance
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
Response
0
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Donald Lynd - CMS Energy - Consumers Energy Company - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Karl Blaszkowski - CMS Energy - Consumers Energy Company - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name Public Utility District No. 1 of Chelan County
Answer
Document Name
Comment
Yes
Likes
0
Dislikes
0
Response
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 1,3,4,5 - RF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
William Hutchison - Southern Illinois Power Cooperative - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kathryn Tackett - NiSource - Northern Indiana Public Service Co. - 5
Answer
Document Name
Comment
See Steven Toosevich's comments.
Likes
0
Dislikes
0
Response
Kinte Whitehead - Exelon - 3
Answer
Document Name
Comment
Exelon supports EEI's comments on behalf of Exelon Segments 1, 3, 5, and 6.
Likes
0
Dislikes
Response
0
3. The SDT is attempting to expand information storage solutions or security technologies for Responsible Entities. Do you agree that this
approach is reflected in the proposed requirements?
Kevin Conway - Public Utility District No. 1 of Pend Oreille County - 1
Answer
No
Document Name
Comment
I cannot find these references in CIP-004-7. If you are referring to CIP-011-3, we see where you are trying to go, but we dont think that it is clear
enough.
Likes
0
Dislikes
0
Response
Susan Sosbe - Wabash Valley Power Association - 3
Answer
No
Document Name
Comment
The requirement mixes two types of usage needs. One is cloud storage and a separate requirement for vendors using information to perform
work. The standard is appropriate for cloud storage type vendors. However, vendors using information for contract work should be moved or added to
CIP-013 as part of an appropriate risk assessment.
Likes
0
Dislikes
0
Response
Scott Miller - Scott Miller On Behalf of: David Weekley, MEAG Power, 3, 1; Roger Brand, MEAG Power, 3, 1; - Scott Miller
Answer
No
Document Name
Comment
There are too many ambiquities and additional clarity is required.
Likes
Dislikes
0
0
Response
Joe Tarantino - Joe Tarantino On Behalf of: Arthur Starkovich, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Beth Tincher, Sacramento
Municipal Utility District, 4, 1, 6, 3, 5; Jamie Cutlip, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Kevin Smith, Balancing Authority of
Northern California, 1; Nicole Goi, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Nicole Looney, Sacramento Municipal Utility District, 4, 1,
6, 3, 5; - Joe Tarantino
Answer
No
Document Name
Comment
The increase in storage solutions adds ambiguity this could have been done in a more effective way by removing references to physical and electronic
storage. If this new version is intended to allow Storage as a Service model by external vendors, it should be clearified. We recommend that the BES
CSI also be clearified to define terms such as ‘context’.
Likes
0
Dislikes
0
Response
Dana Klem - MRO - 1,2,3,4,5,6 - MRO, Group Name MRO NSRF
Answer
No
Document Name
Comment
Cloud storage and encryption technologies are not excluded under the current standards. The ERO Enterprise CMEP Practice Guide: BES Cyber
System Information dated April 26, 2019 suggests that CIP-004-6 and CIP-011-2 already accommodate BCSI on the cloud.
We believe it would be better to focus efforts on Requirements that do not hinder the use of other solutions while allowing for the development of access
control programs by Responsible Entities that address risk posed to the industry. Any new Requirements need to meet the objective of protecting
access to BCSI without constraining or prescribing types of storage solutions.
Likes
0
Dislikes
0
Response
Amy Casuscelli - Xcel Energy, Inc. - 1,3,5,6 - MRO,WECC
Answer
Document Name
Comment
No
Xcel Energy support the comments submitted by EEI.
Likes
0
Dislikes
0
Response
Jeremy Voll - Basin Electric Power Cooperative - 3
Answer
No
Document Name
Comment
Support the MRO NSRF comments
Likes
0
Dislikes
0
Response
Bruce Reimer - Manitoba Hydro - 1
Answer
No
Document Name
Comment
We disagree with the requirement language for achieving the SDT’s goal. One of the SAR goals is to clarify the protections expected when utilizing
third-party solutions (e.g., cloud services), but we haven’t see the cloud storage and encryption language in the revised requirements yet.
Likes
0
Dislikes
0
Response
Matthew Nutsch - Seattle City Light - 1,3,4,5,6 - WECC
Answer
No
Document Name
Comment
The revision succeeds in part but at the risk of considerable new ambiguities and unintended consequences (such as returning to the difficulty inherent
in CIP v1-3 of controlling access to each individual piece of BCSI, or the necessity to understand the capability of an outside party to reasonably assess
if they can “obtain and use” BCSI). The proposed language from CIP-011 R1.1 to R1.3 seems to Seattle a promising start to an objective-based, riskfocused approach to protection of BCSI, but then subsequent sub-requirements and requirements revert to an old-school prescriptive approach that
creates confusion, speaks to specific technologies, and limits options. Seattle would prefer that a new Standard state a security objective, require a riskbased plan to meet this object (with certain, minimal components that must be in the plan), and then require implementation and periodic review of the
plan.
Seattle also supports the comments of SMUD to this question.
Likes
0
Dislikes
0
Response
Kjersti Drott - Tri-State G and T Association, Inc. - 1
Answer
No
Document Name
Comment
Tri-State does not agree that this approach is aproppriately reflected in the proposed requirements. Some items allow for expanded use of BCSI
solutions; however, the new R2 requirements are too prescriptive and cannot be prudently applied across all BCSI storage solutions and they limit the
ability for the entity to manage their own compliance. Instead, these requirements should be objective based, which can be tailored to the specific
solution and security options.
Likes
0
Dislikes
0
Response
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
No
Document Name
Comment
The proposed language is too prescriptive and loses the focus on controlling access to BCSI. In its present form, it precludes technical advances that
may improve how an RE controls access (e.g., geolocation, biometric, and other potential solutions).
Likes
0
Dislikes
0
Response
Maryanne Darling-Reich - Black Hills Corporation - 1,3,5,6 - MRO,WECC
Answer
No
Document Name
Comment
Black Hills agrees that these changes make, what was understood to be possible under the current standards more explicit, however we are concerned
that the standard remains too rigid. Instead we would prefer to see guidelines which then allow the RE to document its approach for using new
technologies.
Likes
0
Dislikes
0
Response
Todd Bennett - Associated Electric Cooperative, Inc. - 3, Group Name AECI
Answer
No
Document Name
Comment
AECI supports comments filed by NRECA
Likes
0
Dislikes
0
Response
Barry Lawson - National Rural Electric Cooperative Association - 4
Answer
No
Document Name
Comment
NRECA agrees that this is reflected in the proposed revisions; however, we are concerned that the way this has been incorporated places additional
unnecessary compliance obligations on those entities that have chosen not to engage in the storage of BCSI in a cloud or other storage
solution. Additionally, NRECA notes that the proposed revisions are very limiting relative to compatibility with future or differently configured storage
solutions. For these reasons, NRECA is concerned that the proposed revisions will only work for specifically configured storage solutions and will not
be properly scoped or flexible enough to accommodate the evolving storage and other solutions that could be employed in the future.
Likes
0
Dislikes
Response
0
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
No
Document Name
Comment
Agree with MRO NSRF comments.
Likes
0
Dislikes
0
Response
Andrea Barclay - Georgia System Operations Corporation - 4
Answer
No
Document Name
Comment
GSOC agrees that this is reflected in the proposed revisions; however, is concerned that the manner in which this has been incorporated places
additional unnecessary compliance obligations on those entities that have chosen not to engage in the storage of BCSI in a cloud or other storage
solution. Additionally, GSOC notes that the proposed revisions are very limiting relative to compatibility with future or differently configured storage
solutions. Finally, GSOC respectfully asserts that standard revisions to accommodate cloud storage are unnecessary and would be better addressed in
implementation or compliance guidance. For these reasons, GSOC is concerned that the proposed revisions will only work for specifically configured
storage solutions and will not be properly scoped or flexible to enough to accommodate the evolving storage and other solutions that could be employed
in the future.
Likes
0
Dislikes
0
Response
Lana Smith - San Miguel Electric Cooperative, Inc. - 5
Answer
No
Document Name
Comment
SMEC agrees with comments submitted by NRECA.
Likes
0
Dislikes
Response
0
Chris Wagner - Santee Cooper - 1, Group Name Santee Cooper
Answer
No
Document Name
Comment
Yes, agree that a stand alone requirement where a vendor stores an entitiy’s BCSI is needed. 1.4.1 requires an initial risk assessment of vendors but
the SDT needs to define what is acceptable evidence for a risk assessment.
Likes
0
Dislikes
0
Response
sean erickson - Western Area Power Administration - 1
Answer
No
Document Name
Comment
It is unclear in this draft or guidance how the SDT is expanding information storage soluctions or security technologies.
Likes
0
Dislikes
0
Response
Vivian Moser - APS - Arizona Public Service Co. - 3
Answer
No
Document Name
Comment
Although AZPS agrees that the SDT’s intent is reflected in Part 1.4, the requirements as written do not clearly reflect an approach to expand information
storage solutions or security technologies.
Likes
0
Dislikes
Response
0
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
No
Document Name
Comment
New and emerging technologies shift the paradigm of security controls away from a specific storage location/repository to the ability to access and use
the information itself. For example, an entity that utilizes file level security can apply encrypted protections on the data that preclude unauthorized
access to the data regardless of where it is stored. Requiring a list of storage locations is an antiquated construct that disincentivizes entities from using
potentially more secure mechanisms because of the impossibility of compliance with documenting storage locations. The requirement should be
technology agnostic and objective based, so it is written to focus on the implementation of effective methods that afford adequate security protections to
prevent unauthorized access to the information
Likes
0
Dislikes
0
Response
Janelle Marriott Gill - Tri-State G and T Association, Inc. - 3
Answer
No
Document Name
Comment
Tri-State G&T does not agree that this approach is aproppriately reflected in the proposed requirements. Some items allow for expanded use of BCSI
solutions however, the new R2 requirements are too prescriptive and cannot be prudently applied across all BCSI storage solutions and they limit the
ability for the entity to manage their own compliance. Instead, these requirements should be objective based, which can be tailored to the specific
solution and security options.
Likes
0
Dislikes
0
Response
Jonathan Robbins - Seminole Electric Cooperative, Inc. - 4
Answer
Document Name
Comment
See NRECA submitted comments.
No
Likes
0
Dislikes
0
Response
Nicholas Lauriat - Network and Security Technologies - 1
Answer
No
Document Name
Comment
While N&ST understands one of the SDT’s key goals is to facilitate the use of an expanded array of storage options, we believe the associated
imposition of a specific technology (encryption + key management) is likely to inhibit, not promote, the use of newer storage options such as cloudbased solutions. Furthermore, N&ST is concerned that the SDT’s proposed changes could have significant cost and effort impacts on Responsible
Entities that neither store BCSI in the cloud today nor have any plans to do so in the future.
Likes
0
Dislikes
0
Response
Sandra Shaffer - Berkshire Hathaway - PacifiCorp - 6
Answer
No
Document Name
Comment
We disagree because cloud based storage technologies and encryption technologies are not excluded under the current standards. The ERO
Enterprise CMEP Practice Guide stated: BES Cyber System Information dated April 26, 2019 suggests that CIP-004-6 and CIP-011-2 already
accommodates BCSI on the cloud.
Likes
0
Dislikes
0
Response
Sean Bodkin - Dominion - Dominion Resources, Inc. - 6, Group Name Dominion
Answer
Document Name
Comment
No
Dominion Energy supports the work the SDT has done on develoing the current draft. Dominion energy suggests that the team focus on the approach
taken in the current NERC CMEP Guidance document in addressing the issue and further supports EEIs comments.
Likes
0
Dislikes
0
Response
David Jendras - Ameren - Ameren Services - 3
Answer
No
Document Name
Comment
Ameren agrees with and supports EEI comments.
Likes
0
Dislikes
0
Response
Kagen DelRio - North Carolina Electric Membership Corporation - 3,4,5 - SERC
Answer
No
Document Name
Comment
NCEMC supports the comments by Barry Lawson, National Rural Electric Cooperative Association and ACES
Likes
0
Dislikes
0
Response
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
No
Document Name
Comment
The question asks if the approach expands two different things: information storage solutions and security technologies. We agree the changes could
allow for expanded storage solutions, but we do not agree that this approach expands security technologies for Responsible Entities. An example of a
security technology may be a cloud service that needs to use the information in order to provide security or reliability benefit to the BES. We find an
applicable phrase in the “Industry Need” section of the SAR that states the expected reliability benefit is “providing a secure path towards utilization of
modern third-party data storage and analysis systems” and the current draft doesn’t address third party analysis of the data to provide services to
entities and actually further restricts such analysis.
It seems the approach is focused solely on using cloud storage for BCSI in an encrypted form and managing the encryption keys. Therefore, the focus
seems to be on cloud storage only, not cloud services that need to use or analyze the data to provide services such as security monitoring
technologies.
Likes
0
Dislikes
0
Response
Bridget Silvia - Sempra - San Diego Gas and Electric - 3
Answer
No
Document Name
Comment
SDG&E supports EEI’s comments submitted on our behalf.
Likes
0
Dislikes
0
Response
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
No
Document Name
Comment
ITC supports the response found in the NSRF Comment Form
Likes
0
Dislikes
0
Response
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
No
Document Name
Comment
We disagree with the proposed approach, as we do not see the necessity. Cloud-based storage technologies and encryption technologies are not
excluded either under the current standards, or by the ERO Enterprise CMEP Practice Guide BES Cyber System Information dated April 26, 2019.
We agree with EEI comments that requirements should neither constrain nor prescribe solutions.
Likes
0
Dislikes
0
Response
Ayman Samaan - Edison International - Southern California Edison Company - 1
Answer
No
Document Name
Comment
Please see comments submitted by Edison Electric Institute
Likes
0
Dislikes
0
Response
Devin Shines - PPL - Louisville Gas and Electric Co. - 1,3,5,6 - SERC,RF, Group Name PPL NERC Registered Affiliates
Answer
No
Document Name
Comment
We appreciate the SDT’s effort to expand information storage solutions and security technologies; however, key management is the only technology
that is explicitly detailed within the requirements. We feel that this is contradictory to what the 2016-02 SDT is working to accomplish with risk-based
standards. Additionally, as the requirement is currently written, an entity would need to prove a negative if this requirement is not applicable to them,
which is administratively burdensome. Finally, while it might not have been the SDT’s intent, an auditor might interpret the requirement to mean that if
an entity uses encryption internally (not with a third-party), then that entity must have a key management program, based on the requirement, for their
internal encryption.
Likes
0
Dislikes
0
Response
Wayne Guttormson - SaskPower - 1
Answer
No
Document Name
Comment
Support MRO comments.
Likes
0
Dislikes
0
Response
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
No
Document Name
Comment
The standards development team should support specific requirements providing appropriate levels of security for Cloud Service Providers and 3rd
Party Access. Transferring the CIP-004 BCSI requirements to CIP-011 does not address the unique issues created by storing BCSI in repositories that
are not controlled by registered entities. The standards development team should draft separate requirements.
Likes
0
Dislikes
0
Response
Bobbi Welch - Midcontinent ISO, Inc. - 2
Answer
No
Document Name
Comment
MISO’s response assumes this question pertains to all proposed changes in CIP-011, requirement R1 (parts 1.1 – 1.5).
The proposed changes as written, do not clearly draw out / articulate key distinctions that were noted during the Q&A portion of the 2019-02: BES Cyber
System Information Access Management Webinar hosted on January 16, 2020: physical or electronic, responsible entity or vendor hosted. To make this
clear in the proposed standard, MISO proposes the SDT include the following changes.
Part 1.1. Modify the last example provided under Measures to read as follows: “Storage locations (physical or electronic, responsible entity or vendor
hosted) identified for housing BES Cyber System Information in the entity’s information protection program.”
Part 1.2 For clarity, modify the bullet under Measures as follows: “Evidence of methods used to prevent the unauthorized access to BES Cyber System
Information (e.g., encryption of BES Cyber System Information, [delete the word "and"] key management program, retention in the Physical Security
Perimeter).”
Part 1.3 May not be necessary if the SDT accepts MISO’s proposal to retain all access management provisions (BCS and BCSI) as part of CIP-004-7.
Part 1.4 MISO recommends the provisions in this section be eliminated from CIP-011-3 and addressed as part of CIP-013-2 thereby covering all vendor
requirements (BCS and BCSI) in the same standard.
Part 1.5 MISO recommends the provisions in this section be eliminated from CIP-011-3 and addressed as part of CIP-004-7, requirement R5.3 thereby
covering all access management requirements (BCS and BCSI) in the same standard.
Likes
0
Dislikes
0
Response
Eli Rivera - CenterPoint Energy Houston Electric, LLC - NA - Not Applicable - Texas RE
Answer
No
Document Name
Comment
No, this approach is not clearly reflected in the proposed requirements. If the SDT’s intent is to provide direction on protection of BCSI stored in the
cloud, it should be clearly stated by saying that these requirements are intended to address vendor operated storage locations or services. The vague
language of “in cases where vendors store Responsible Entity’s BES Cyber System Information” opens a broad potential for auditor interpretation with
unintended applicability, including instances where data has been shared with a vendor, but the vendor is not operating a storage location, or where a
corporate resource with cloud functions is used to store working copies of data but is not a designated storage location.
Likes
0
Dislikes
0
Response
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
Document Name
Comment
No
EEI appreciates the SDT efforts to expand information storage solutions or security technologies for responsible entities. However, the proposed
approach appears to be too prescriptive and inconsistent with elements of a results-based standard. The SDT should also ensure that the requirements
are not tailored to any one solution or technology.
Likes
0
Dislikes
0
Response
Gregory Campoli - New York Independent System Operator - 2
Answer
No
Document Name
Comment
NYISO’s response is based on the assumption this question pertains to all proposed changes in CIP-011, requirement R1 (all subsections).
NYISO feels that the proposed changes do not clearly draw out or articulate key distinctions that were presented within the Q&A portion of the 2019-02:
BES Cyber System Information Access Management Webinar hosted on January 16, 2020. NYISO feels that additional language be inserted to
account for use cases (physical or electronic data being housed within either the responsible entity’s controlled data centers or instances where the
responsible entity has chosen to use vendor-hosted storage.
To make this clearer, NYISO proposes the SDT include the following changes:
Within Part 1.1: Modifications be made to the last example provided under Measures to read:
“Storage locations (physical or electronic, responsible entity or vendor hosted) be identified as housing BES Cyber System Information in the entity’s
information protection program.”
Within Part 1.2: For clarity, modify the bullet under Measures to read:
“Evidence of methods used to prevent the unauthorized access to BES Cyber System Information (e.g., encryption of BES Cyber System Information
with a sound key management program, retention within the responsible entity’s Physical Security Perimeter).”
NYISO feels that Part 1.3 will become unnecessary if the SDT retains all access management provisions (BCS and BCSI) within CIP-004-7.
NYISO would recommend that provisions contained in the current draft within Part 1.4 be removed from CIP-011-3 and addressed as part of CIP-0132. This would have the effect of keeping all vendor requirements (BCS and BCSI) within the same standard.
NYISO would recommend that the provisions contained in the current draft within Part 1.5 be removed from CIP-011-3 and addressed as part of CIP004-7. This would have the effect of keeping all access management requirements (BCS and BCSI) within the same standard.
Overall, NYISO would like to see all of the requirements in R1 be made clearer to allow the Responsible Entity latitude to choose any applicable security
technologies that adequately protects BCSI, based on risk. Within the current draft, the language within R2 suggests that key management programs
are mandatory; however, NYISO believes the intent was to allow other methods of protections as supported options.
Likes
Dislikes
0
0
Response
Marty Hostler - Northern California Power Agency - 5
Answer
No
Document Name
Comment
We believe the existing standard already allows multiple solutions. Why won't NERC/FERC tell Entities that the standard does not limited the scope of
solutions available to entities and be done with this?
Likes
0
Dislikes
0
Response
Holly Chaney - Snohomish County PUD No. 1 - 3, Group Name SNPD Voting Members
Answer
No
Document Name
Comment
No, SNPD does not believe the SDT’s objective has been met. SNPD believes that without explicit, affirmative authorization to use managed service
(“cloud”) storage solutions, Entities cannot and likely will not feel confident storing BCSI in the cloud. Entities will likely take the most conservative
response to avoid potential compliance risk and simply choose not to use cloud storage solutions. Thereby, maintaining the status quo and depriving
Entities of the flexibility desired under the proposed change. Suggestion: establish “reciprocity” from current Federal IT certification standards such as
FedRAMP/FISMA/DoD D-ITAR. Issue a blanket statement that storage of BCSI is authorized in any/all FedRAMP/FISMA or DoD D-ITAR cloud. This
type of verbiage is both actionable and clear.
Likes
1
Dislikes
Public Utility District No. 1 of Snohomish County, 4, Martinsen John
0
Response
Jenifer Holmes - Alliant Energy Corporation Services, Inc. - 4 - MRO,RF
Answer
Document Name
Comment
No
While Alliant Energy appreciates the SDT’s efforts to expand information storage solutions or security technologies for responsible entities, that
expansion is only useful if the requirement language is written such that it is clearly auditable. The updated requirements should avoid the ability to audit
to prescriptive requirements that are not stated in the language of the requirements.
Likes
0
Dislikes
0
Response
Dmitriy Bazylyuk - NiSource - Northern Indiana Public Service Co. - 3
Answer
No
Document Name
Comment
See Steven Toosevich's comments.
Likes
0
Dislikes
0
Response
James Brown - California ISO - 2 - WECC
Answer
No
Document Name
Comment
There is no expansion of solutions or technologies used. The proposed requirements codify the controls that have been discussed in informal manners.
This is a slight improvement, but as long as CIP requirements can also be interpreted as applicable for cloud vendors and are in the audit scope of CIP
audits, there is no real improvement.
Recommend excluding cloud vendors from applicability column of BCSI requirements and, instead setting requirements to be included in risk
assessments of cloud vendors and have the CIP senior manager or delegate approve each assessment and applicable risk mitigations at minimum
intervals. In addition cloud vendor requirements appears to be better addressed through CIP-013.
BCSI related cloud vendor risk assessment components can be a subset of CIP004 or CIP011 requirements that meet cloud vendor industry best
practices such as the Cloud Security Alliance (CSA) Consensus Assessments Initiative Questionnaire (CAIQ) and the provision of certifications (e.g.
ISO 27000) or audit reports (e.g. SOC for security) from accredited auditors who have verified cloud vendor claims of compliance.
Likes
0
Dislikes
0
Response
Ryan Olson - Portland General Electric Co. - 5, Group Name PGE Group 2
Answer
No
Document Name
Comment
PGE agrees with EEI’s comments
Likes
0
Dislikes
0
Response
Jennie Wike - Jennie Wike On Behalf of: Hien Ho, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; John Merrell, Tacoma Public Utilities
(Tacoma, WA), 3, 1, 4, 5, 6; Marc Donaldson, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Ozan Ferrin, Tacoma Public Utilities (Tacoma,
WA), 3, 1, 4, 5, 6; Terry Gifford, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; - Jennie Wike
Answer
No
Document Name
Comment
No, in order to provide expanded security technology solutions (read “in the cloud”), the vendor may need both access and use of BCSI to provide any
value to the registered entity. The approach offered in this proposal does not allow this access.
Likes
0
Dislikes
0
Response
Angela Gaines - Portland General Electric Co. - 1
Answer
No
Document Name
Comment
Please see comments PGE Group 2
Likes
0
Dislikes
0
Response
Dennis Sismaet - Northern California Power Agency - 6
Answer
No
Document Name
Comment
We believe the existing standard already allows multiple solutions. Why won't NERC/FERC tell Entities that the standard does not limited the scope of
solutions available to entities and be done with this?
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
No
Document Name
Comment
We disagree with the proposed approach, as we do not see the necessity. Cloud-based storage technologies and encryption technologies are not
excluded either under the current standards, or by the ERO Enterprise CMEP Practice Guide BES Cyber System Information dated April 26, 2019.
We agree with EEI and MRO NSRF comments that requirements should neither constrain nor prescribe solutions.
Likes
0
Dislikes
0
Response
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
No
Document Name
Comment
There is no expansion of solutions or technologies used. The proposed requirements codify the controls that have been discussed in informal
manners. This is a slight improvement, but as long as CIP requirements can also be interpreted as applicable to cloud vendors, and are in the scope of
CIP audits, there is no real improvement.
ERCOT recommends excluding cloud vendors from the applicability column of BCSI requirements, and instead setting requirements to be included in
risk assessments of cloud vendors and having CIP senior managers or delegates approve each assessment and applicable risk mitigations at minimum
intervals. In addition, cloud vendor requirements appear to be better addressed through CIP-013.
BCSI related cloud vendor risk assessment components can be a subset of CIP-004 or CIP-011 requirements that meet cloud vendor industry best
practices such as the Cloud Security Alliance (CSA), Consensus Assessments Initiative Questionnaire (CAIQ), and the provision of certifications (e.g.
ISO 27000) or audit reports (e.g. SOC for security) from accredited auditors who have verified cloud vendor claims of compliance.
Likes
0
Dislikes
0
Response
Douglas Webb - Douglas Webb On Behalf of: Allen Klassen, Westar Energy, 6, 3, 1, 5; Bryan Taggart, Westar Energy, 6, 3, 1, 5; Derek Brown,
Westar Energy, 6, 3, 1, 5; Grant Wilkerson, Westar Energy, 6, 3, 1, 5; James McBee, Great Plains Energy - Kansas City Power and Light Co., 1,
3, 6, 5; Jennifer Flandermeyer, Great Plains Energy - Kansas City Power and Light Co., 1, 3, 6, 5; John Carlson, Great Plains Energy - Kansas
City Power and Light Co., 1, 3, 6, 5; Marcus Moor, Great Plains Energy - Kansas City Power and Light Co., 1, 3, 6, 5; - Douglas Webb, Group
Name Westar-KCPL
Answer
No
Document Name
Comment
Westar and Kansas City Power & Light Company, endorse Edison Electric Institute's (EEI) comments.
Likes
0
Dislikes
0
Response
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
No
Document Name
Comment
We disagree with the proposed approach, as we do not see the necessity. Cloud-based storage technologies and encryption technologies are not
excluded either under the current standards, or by the ERO Enterprise CMEP Practice Guide BES Cyber System Information dated April 26, 2019.
We agree with EEI and MRO NSRF comments that requirements should neither constrain nor prescribe solutions.
Likes
0
Dislikes
0
Response
Colleen Campbell - AES - Indianapolis Power and Light Co. - 3
Answer
No
Document Name
Comment
There has to be a better definition of the different storage and security technologies the SDT is considering. There will be a big difference between on
premise and external solutions.
Likes
0
Dislikes
0
Response
Michael Puscas - ISO New England, Inc. - 2
Answer
No
Document Name
Comment
Comments: While there is clearly an effort to address expanded use of information storage solutions and security technologies, the current draft does
not specifically address use cases associated with cloud services and information sharing with external parties as clearly as will be required. For
entities to make use of options available from external service providers, there will need to be specification of information protections specific to such
situations (i.e. whether individual access to information must be demonstrated by the service provider to the responsible entity and the expectations for
measures to demonstrate compliance of a third party).
Likes
0
Dislikes
0
Response
Bradley Collard - SunPower - 5
Answer
Document Name
Comment
No
SunPower agrees with MRO NSRF’s comments
Likes
0
Dislikes
0
Response
Adrian Andreoiu - BC Hydro and Power Authority - 1, Group Name BC Hydro
Answer
No
Document Name
Comment
Likes
1
Dislikes
BC Hydro and Power Authority, 5, Hamilton Harding Helen
0
Response
Allan Long - Memphis Light, Gas and Water Division - 1
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Laura Nelson - IDACORP - Idaho Power Company - 1
Answer
No
Document Name
Comment
Likes
0
Dislikes
Response
0
William Hutchison - Southern Illinois Power Cooperative - 1
Answer
Yes
Document Name
Comment
Comments: Although the language allows Entities to expand information storage solutions, it then leaves the Entity open to risk due to interpretation of
how their process and security measures are interpreted by an auditor. As long as there is consistency in audit, that if an Entity follows their process, as
required by the standard, no audit findings will be given. If an auditor takes issue with the Entity’s process(es) or security technology, an audit
recommendation would be given, not a finding and or associated fine.
Likes
0
Dislikes
0
Response
Masuncha Bussey - Duke Energy - 1,3,5,6 - SERC, Group Name Duke Energy
Answer
Yes
Document Name
Comment
Duke Energy generally agrees that this approach is reflected in the proposed requirements. However, the requirements as written are problematic for
reasons provided in subsequent responses.
Likes
0
Dislikes
0
Response
Kent Feliks - AEP - 3
Answer
Yes
Document Name
Comment
AEP is of the opinion that the approach to expand information storage solutions is reflected in the proposed modifications. However, we feel that while
this approach may help organizations having information storage isssues, we also feel that this approach produces security concerns as a result of
BCSI being stored using cloud technology.
Likes
Dislikes
0
0
Response
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
Yes
Document Name
Comment
Although the language allows Entities to expand information storage solutions, it then leaves the Entity open to risk due to interpretation of how their
process and security measures are interpreted by an auditor. As long as there is consistency in audit, that if an Entity follows their process, as required
by the standard, no audit findings will be given. If an auditor takes issue with the Entity’s process(es) or security technology, an audit recommendation
would be given, not a finding and or associated fine.
Likes
0
Dislikes
0
Response
Leonard Kula - Independent Electricity System Operator - 2
Answer
Yes
Document Name
Comment
No comment.
Likes
0
Dislikes
0
Response
Gerry Adamski - Cogentrix Energy Power Management, LLC - 5
Answer
Yes
Document Name
Comment
Yes the expanded approach is available in the proposed standard; however, as discussed later, the requirements need to be improved.
Likes
Dislikes
0
0
Response
David Rivera - New York Power Authority - 3
Answer
Yes
Document Name
Comment
No comments
Likes
0
Dislikes
0
Response
Michael Johnson - Michael Johnson On Behalf of: James Mearns, Pacific Gas and Electric Company, 1, 3, 5; Marco Rios, Pacific Gas and
Electric Company, 1, 3, 5; Sandra Ellis, Pacific Gas and Electric Company, 1, 3, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
Yes
Document Name
Comment
PGAE believes the modifications expand the capability to use third-party service providers without a risk of being non-compliant based on different
interpretations of the current Standards. The method(s) or technology used to protect the BCSI are non-prescriptive, providing the necessary flexibility
to meet the objective of preventing unauthorized access.
Likes
0
Dislikes
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
Response
0
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 1,3,4,5 - RF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name Public Utility District No. 1 of Chelan County
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Karl Blaszkowski - CMS Energy - Consumers Energy Company - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Donald Lynd - CMS Energy - Consumers Energy Company - 1
Answer
Document Name
Comment
Yes
Likes
0
Dislikes
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Teresa Cantwell - Lower Colorado River Authority - 1,5, Group Name LCRA Compliance
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
Response
0
Payam Farahbakhsh - Hydro One Networks, Inc. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Dwayne Parker - CMS Energy - Consumers Energy Company - 4
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Truong Le - Truong Le On Behalf of: Carol Chinn, Florida Municipal Power Agency, 6, 4, 5, 3; Chris Gowder, Florida Municipal Power Agency,
6, 4, 5, 3; Dale Ray, Florida Municipal Power Agency, 6, 4, 5, 3; David Owens, Gainesville Regional Utilities, 1, 5, 3; Richard Montgomery,
Florida Municipal Power Agency, 6, 4, 5, 3; - Truong Le
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Anton Vu - Los Angeles Department of Water and Power - 6
Answer
Document Name
Comment
Yes
Likes
0
Dislikes
0
Response
Andrea Jessup - Bonneville Power Administration - 1,3,5,6 - WECC
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Tho Tran - Tho Tran On Behalf of: Lee Maurer, Oncor Electric Delivery, 1; - Tho Tran
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
Response
0
Quintin Lee - Eversource Energy - 1, Group Name Eversource Group
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name RSC no NextEra
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jamie Monette - Allete - Minnesota Power, Inc. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Constantin Chitescu - Ontario Power Generation Inc. - 5
Answer
Document Name
Comment
Yes
Likes
0
Dislikes
0
Response
Kinte Whitehead - Exelon - 3
Answer
Document Name
Comment
Exelon supports EEI's comments on behalf of Exelon Segments 1, 3, 5, and 6.
Likes
0
Dislikes
0
Response
Kathryn Tackett - NiSource - Northern Indiana Public Service Co. - 5
Answer
Document Name
Comment
See Steven Toosevich's comments.
Likes
0
Dislikes
Response
0
4. The SDT is addressing, and further defining, the risk regarding potential compromise of BCSI through the inclusion of the terms “obtain”
and “use” in requirement CIP-011-3, Requirement R1 Part 1.2. Do you agree that this will more accurately address the risk related to the
potential compromise of BCSI versus the previous approach?
Bradley Collard - SunPower - 5
Answer
No
Document Name
Comment
1.2 becomes extremely burdensome by eliminating the ability to obtain and use BCSI during storage, transit, use, and disposal. Entities may need to
employ methods such as chain of custody for disposal of hard drives that may contain BCSI.
SunPower encourages the term “reduce” the ability to obtain and use BES Cyber System Information during storage, transit, use. . .
Likes
0
Dislikes
0
Response
Michael Puscas - ISO New England, Inc. - 2
Answer
No
Document Name
Comment
Comments:
The inclusion of the terms “obtain and use” help to more accurately identify the objective of the access protections that need to be implemented.
However, inclusion of those terms does not accurately address the risk related to the potential compromise of BCSI.
Moreover, the term “eliminating” is an absolute, so implementation and compliance would be challenging to demonstrate.
Recommendation: change the language to “methods to prevent the ability to obtain and use BCSI information through unauthorized access including
storage, transit, use and disposal.”
Likes
0
Dislikes
0
Response
Laura Nelson - IDACORP - Idaho Power Company - 1
Answer
Document Name
No
Comment
The previous Part 1.2 approach gave Responsible Entities flexibility to accurately address the risk related to the potential compromise of BCSI. The new
Part 1.2 approach does not appear to give Responsible Entities thae same flexibility, especially if third-party solutions (e.g., cloud services) are not
utilized. If the purpose of the new Part 1.2 approach is to address the risk associated with the use of a third-party solution (e.g. cloud services), the Part
1.2 requirement language should be made more clear than is currently proposed. IPC requests that the SDT provide additional rationale information
related to “the ability to obtain and use BES Cyber System Information” language in the proposed requirement as it is unclear what is intended by the
phrase “obtain and use” in the requirement. IPC believes the Part 1.2 requirement language should focus more on a Responsible Entity ensuring they
have appropriate measures in place within their BES Cyber System Information (BCSI) Protection Program to protect BCSI rather than requiring entities
to encrypt their data in transit, storage, and use.
Likes
0
Dislikes
0
Response
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
No
Document Name
Comment
Agree with terms “obtain” and “use;” however, more explanation is needed within the requirement or guidelines. The drafting team has referred to the
CMEP BCSI practice guide. We recommend defining “BCSI Access” in the NERC Glossary of Terms per the practice guide: “An instance or event
during which a user obtains and uses BCSI. For access to occur, in this context, a user, authorized or unauthorized, must concurrently both obtain BCSI
and possess the ability to use BCSI. An unauthorized individual who obtains encrypted BCSI but has no ability to use it within a meaningful timeframe
should not be considered to have access.”
The draft R1 Part 1.2 Requirement could then be revised to “Method(s) to prevent unauthorized BCSI Access during BCSI storage, transit, and use.”
We disagree with the phrase, “by eliminating the ability” to obtain and use. This represents an unachievable threshold over and above the current
“Procedure(s) for protecting and securely handling.”
We concur with MRO NSRF comments that disagree with the addition of “and disposal” to the end of the requirement. BCSI in BES Cyber Systems is
already addressed in R3 Part 3.1., but Part 3.1 needs to reinstate the qualifying language in the Requirements “that contain BES Cyber System
Information.” Deletion of this qualifying language is an expansion of scope to the current CIP-011-2 R2 requiring evidence of sanitization of assets not
containing BCSI subject to this protection.
Although a logical inclusion as part of the lifecycle of BCSI, as applied in R1 Part 1.2, the Measures would need to address examples of acceptable
evidence of disposal, such as shredding for paper. We do not see a practical method of evidencing the disposal of electronic BCSI, i.e. the day-to-day
deletion of electronic files.
Likes
0
Dislikes
0
Response
Douglas Webb - Douglas Webb On Behalf of: Allen Klassen, Westar Energy, 6, 3, 1, 5; Bryan Taggart, Westar Energy, 6, 3, 1, 5; Derek Brown,
Westar Energy, 6, 3, 1, 5; Grant Wilkerson, Westar Energy, 6, 3, 1, 5; James McBee, Great Plains Energy - Kansas City Power and Light Co., 1,
3, 6, 5; Jennifer Flandermeyer, Great Plains Energy - Kansas City Power and Light Co., 1, 3, 6, 5; John Carlson, Great Plains Energy - Kansas
City Power and Light Co., 1, 3, 6, 5; Marcus Moor, Great Plains Energy - Kansas City Power and Light Co., 1, 3, 6, 5; - Douglas Webb, Group
Name Westar-KCPL
Answer
No
Document Name
Comment
Westar and Kansas City Power & Light Company, endorse Edison Electric Institute's (EEI) comments.
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
No
Document Name
Comment
Agree with terms “obtain” and “use;” however, more explanation is needed within the requirement or guidelines. The drafting team has referred to the
CMEP BCSI practice guide. We recommend defining “BCSI Access” in the NERC Glossary of Terms per the practice guide: “An instance or event
during which a user obtains and uses BCSI. For access to occur, in this context, a user, authorized or unauthorized, must concurrently both obtain BCSI
and possess the ability to use BCSI. An unauthorized individual who obtains encrypted BCSI but has no ability to use it within a meaningful timeframe
should not be considered to have access.”
The draft R1 Part 1.2 Requirement could then be revised to “Method(s) to prevent unauthorized BCSI Access during BCSI storage, transit, and use.”
We disagree with the phrase, “by eliminating the ability” to obtain and use. This represents an unachievable threshold over and above the current
“Procedure(s) for protecting and securely handling.”
We concur with MRO NSRF comments that disagree with the addition of “and disposal” to the end of the requirement. BCSI in BES Cyber Systems is
already addressed in R3 Part 3.1., but Part 3.1 needs to reinstate the qualifying language in the Requirements “that contain BES Cyber System
Information.” Deletion of this qualifying language is an expansion of scope to the current CIP-011-2 R2 requiring evidence of sanitization of assets not
containing BCSI subject to this protection.
Although a logical inclusion as part of the lifecycle of BCSI, as applied in R1 Part 1.2, the Measures would need to address examples of acceptable
evidence of disposal, such as shredding for paper. We do not see a practical method of evidencing the disposal of electronic BCSI, i.e. the day-to-day
deletion of electronic files.
Likes
0
Dislikes
0
Response
Angela Gaines - Portland General Electric Co. - 1
Answer
No
Document Name
Comment
Please see comments PGE Group 2
Likes
0
Dislikes
0
Response
Jennie Wike - Jennie Wike On Behalf of: Hien Ho, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; John Merrell, Tacoma Public Utilities
(Tacoma, WA), 3, 1, 4, 5, 6; Marc Donaldson, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Ozan Ferrin, Tacoma Public Utilities (Tacoma,
WA), 3, 1, 4, 5, 6; Terry Gifford, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; - Jennie Wike
Answer
No
Document Name
Comment
There appears to be a significant challenge with the proposed wording of Requirement Part 1.2, which appears to require entities to eliminate the ability
to obtain and use BCSI even for authorized access holders.
Suggest the following replacement requirement text:
"Method(s) to prevent unauthorized access to BES Cyber System Information by eliminating the ability of unauthorized users to obtain and use BES
Cyber System Information during storage, transit, use, and disposal."
OR
"Method(s) to prevent unauthorized access to BES Cyber System Information by restricting the ability to obtain and use BES Cyber System Information
during storage, transit, use, and disposal, to authorized access holders."
While this approach is better than previous approaches, there is still a need for security technology vendor service providers to have access and use of
BCSI. The proposed update does nothing to allow MSSPs in a CIP program. Along with allowing Authorized users to both obtain and use, the EACMS
split to EACS and EAMS is also required to allow MSSPs.
Likes
0
Dislikes
0
Response
Ryan Olson - Portland General Electric Co. - 5, Group Name PGE Group 2
Answer
No
Document Name
Comment
PGE agrees with EEI’s comments
Likes
0
Dislikes
0
Response
Dmitriy Bazylyuk - NiSource - Northern Indiana Public Service Co. - 3
Answer
No
Document Name
Comment
See Steven Toosevich's comments.
Likes
0
Dislikes
0
Response
Jenifer Holmes - Alliant Energy Corporation Services, Inc. - 4 - MRO,RF
Answer
No
Document Name
Comment
Alliant Energy agrees with NSRF and EEI’s comments.
Likes
Dislikes
0
0
Response
Holly Chaney - Snohomish County PUD No. 1 - 3, Group Name SNPD Voting Members
Answer
No
Document Name
Comment
SNPD does not agree that this will more accurately address the risk related to the potential compromise of BCSI versus the previous approach and
verbiage. However, SNPD supports the reasoning behind the proposed change.
Likes
1
Dislikes
Public Utility District No. 1 of Snohomish County, 4, Martinsen John
0
Response
Adrian Andreoiu - BC Hydro and Power Authority - 1, Group Name BC Hydro
Answer
No
Document Name
Comment
BC Hydro requests more clarity as to what is the extent of the application of the term “elimination” that is now included in the requirement. Please add
clarity within the language of standard. Example: Is an encryption key sufficient to “eliminate” even though this is potentially hackable?
BC Hydro would also request additional clarity on what the “ability to use BCSI” means.
Likes
1
Dislikes
BC Hydro and Power Authority, 5, Hamilton Harding Helen
0
Response
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
No
Document Name
Comment
EEI has concerns with defining risks regarding potential compromise of BCSI within the language of a Reliability Standard. EEI suggests that it may be
simpler to address BCSI security concerns through the development of a definition for “Useable Access” within the NERC Glossary of Terms. We also
suggest the SDT consider using the language from the April 26, 2019, ERO Enterprise CMEP Practice Guide on BES Cyber System Information which
appears to have the requisite clarity and could act as a clear definition for “Useable Access” (see below). If the term is deemed to be unsuitable, the
SDT could use the phrase “Access to the BCSI.…”
Useable Access: An instance or event during which a user obtains and uses BCSI. For access to occur, in this context, a user, authorized or
unauthorized, must concurrently both obtain BCSI and possess the ability to use BCSI. An unauthorized individual who obtains encrypted BCSI but has
no ability to use it within a meaningful timeframe should not be considered to have access. Ref.: Page 2, Bullet
1: https://www.nerc.com/pa/comp/guidance/CMEPPracticeGuidesDL/ERO%20Enterprise%20CMEP%20Practice%20Guide%20_%20BCSI%20%20v0.2%20CLEAN.pdf
In consideration of access, CIP-004-6 already effectively addresses access controls for BCSI when stored by responsible entities at their facilities so
protections would only need to be developed for a situation where third party cloud-based services are used. Consequently, the above reference CMEP
Practice Guide could effectively define access in a manner that addresses this issue.
Within this alternative approach and once the definition for “Useable Access” is addressed, the changes needed to meet the intent of the SAR could be
simply accomplished through the following changes to CIP-004-6:
4.1.1.
Electronic Access
4.1.2.
Unescorted physical access into a Physical Security Perimeter; and
4.1.3.
Useable Access to a BCSI Repository
The SDT should also consider restoring the language of CIP-004-6 R5.3, with the modification as shown below, or something similar, that achieves a
similar result:
For termination actions, revoke the individual’s Useable Access to a BCSI Repository, whether physical or electronic (unless already revoked
according to Requirement R5.1), by the end of the next calendar day following the effective date of the termination action.
With the proposed solution, the language within CIP-004-6, Part 5.3 could be largely retained while limiting the scope of any vendor’s “Useable
Access.” In such a situation, the vendor is simply a custodian to encrypted or otherwise masked data and does not have the ability to use
it. Additionally, vendors with “Useable Access” (i.e., both custody of data and ability to use BCSI) would continue to need provisional access granted by
the responsible entity through their established access control process and procedures.
Lastly, EEI is concerned with the compliance issues in using the term “eliminate” as proposed in CIP-011-3 R1.2. The word “eliminate” is ambiguous
when considered within the context of demonstrating compliance. It will be difficult to prove to an auditor that the responsible entity has eliminated all
risk. EEI suggests that the SDT modify the language and replace “eliminate” with “limit” or some similar language.
Likes
0
Dislikes
0
Response
Eli Rivera - CenterPoint Energy Houston Electric, LLC - NA - Not Applicable - Texas RE
Answer
No
Document Name
Comment
CEHE recommends using the words “or” instead of “and” and proposes the following alternative:
“Method(s) to prevent unauthorized access to BES Cyber System Information by eliminating the ability to obtain or use BES Cyber System Information
during storage, transit, use, and disposal.”
Protections to prevent access, like access control to the storage location, are separate and distinct from controls to prevent use, like encryption during
transit. Entities may have systems with one but not the other, if the system is all in house and physically protected. The proposed language would not
be backward compatible.
Likes
0
Dislikes
0
Response
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
No
Document Name
Comment
The standards development team should support specific requirements providing appropriate levels of security for Cloud Service Providers and 3rd
Party Access. Transferring the CIP-004 BCSI requirements to CIP-011 does not address the unique issues created by storing BCSI in repositories that
are not controlled by registered entities. The standards development team should draft separate requirements.
Likes
0
Dislikes
0
Response
Wayne Guttormson - SaskPower - 1
Answer
No
Document Name
Comment
Support MRO comments.
Likes
0
Dislikes
0
Response
David Rivera - New York Power Authority - 3
Answer
Document Name
No
Comment
While we agree that “obtain” and “use” more accurately address the risk, we have concerns with the overall wording. One of the below listed changes
should be made to these modified Standards.
We recommend changing Part 1.2 from
<>
To
<>
because “eliminating” is an absolute which makes implementation and demonstrating Compliance too challenging.
Likes
0
Dislikes
0
Response
Ayman Samaan - Edison International - Southern California Edison Company - 1
Answer
No
Document Name
Comment
Please see comments submitted by Edison Electric Institute
Likes
0
Dislikes
0
Response
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
No
Document Name
Comment
Agree with terms “obtain” and “use;” however, more explanation is needed within the requirement or guidelines. The drafting team has referred to the
CMEP BCSI practice guide. We recommend defining “BCSI Access” in the NERC Glossary of Terms per the practice guide: “An instance or event
during which a user obtains and uses BCSI. For access to occur, in this context, a user, authorized or unauthorized, must concurrently both obtain BCSI
and possess the ability to use BCSI. An unauthorized individual who obtains encrypted BCSI but has no ability to use it within a meaningful timeframe
should not be considered to have access.”
The draft R1 Part 1.2 Requirement could then be revised to “Method(s) to prevent unauthorized BCSI Access during BCSI storage, transit, and use.”
We disagree with the phrase, “by eliminating the ability” to obtain and use. This represents an unachievable threshold over and above the current
“Procedure(s) for protecting and securely handling.”
We concur with MRO NSRF comments that disagree with the addition of “and disposal” to the end of the requirement. BCSI in BES Cyber Systems is
already addressed in R3 Part 3.1., but Part 3.1 needs to reinstate the qualifying language in the Requirements “that contain BES Cyber System
Information.” Deletion of this qualifying language is an expansion of scope to the current CIP-011-2 R2 requiring evidence of sanitization of assets not
containing BCSI subject to this protection.
Although a logical inclusion as part of the lifecycle of BCSI, as applied in R1 Part 1.2, the Measures would need to address examples of acceptable
evidence of disposal, such as shredding for paper. We do not see a practical method of evidencing the disposal of electronic BCSI, i.e. the day-to-day
deletion of electronic files.
Likes
0
Dislikes
0
Response
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
No
Document Name
Comment
ITC supports the response found in the NSRF Comment Form
Likes
0
Dislikes
0
Response
Bridget Silvia - Sempra - San Diego Gas and Electric - 3
Answer
Document Name
No
Comment
SDG&E supports EEI’s comments submitted on our behalf.
Likes
0
Dislikes
0
Response
Tho Tran - Tho Tran On Behalf of: Lee Maurer, Oncor Electric Delivery, 1; - Tho Tran
Answer
No
Document Name
Comment
The language of “eliminating the ability to obtain the and use BES Cyber Information” sounds ambiguous. Also, the term “use” that occurs twice within a
sentence need more clarification.
Likes
0
Dislikes
0
Response
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
No
Document Name
Comment
We do not agree with the modifications to Part 1.2 for the following reasons:
•
It requires methods to “prevent” unauthorized access. We caution against using “100% words” in situations such as this because if ever a piece
of encrypted information is cracked, the entity’s method did not 100% prevent it. A technology breakthrough or suddenly discovered
vulnerability in an encryption algorithm that enables cracking today’s encryption protocols makes the entire industry suddenly non-compliant.
•
R1.2 goes on to say the process must prevent unauthorized access BY eliminating the ability to obtain and use BCSI. A literal reading of this
requirement says that entities must prevent unauthorized access by eliminating ALL ability for anyone to obtain and use BCSI. We understand
this phrasing is attempting to define “access”, but the way this is stated it says you must prevent unauthorized access by eliminating all
access.
•
Adding “disposal” to R1.2 is duplicative of R3. That’s now required twice in two different requirements within the same standard, and we do not
support including it here. We also question how “disposal” of BCSI is not inherently included in “storage, transit, and use” and why the additional
qualifier is needed?
Likes
0
Dislikes
0
Response
Kagen DelRio - North Carolina Electric Membership Corporation - 3,4,5 - SERC
Answer
No
Document Name
Comment
NCEMC supports the comments by Barry Lawson, National Rural Electric Cooperative Association and ACES
Likes
0
Dislikes
0
Response
David Jendras - Ameren - Ameren Services - 3
Answer
No
Document Name
Comment
Ameren agrees with and supports EEI comments.
Likes
0
Dislikes
0
Response
Sean Bodkin - Dominion - Dominion Resources, Inc. - 6, Group Name Dominion
Answer
Document Name
Comment
No
Dominion Energy supports the work the SDT has done on develoing the current draft. Dominion energy suggests that the team focus on the approach
taken in the current NERC CMEP Guidance document in addressing the issue and further supports EEIs comments.
Likes
0
Dislikes
0
Response
Andrea Jessup - Bonneville Power Administration - 1,3,5,6 - WECC
Answer
No
Document Name
Comment
BPA understands “obtain” to mean take possession of, and “use” to mean take an action on. “Obtain” is not much clearer than “gain access to” while
“use” does add an element of clarity to the objective of what needs to be protected. “Use” implies that obtaining “unusable” (i.e., encrypted) information
is a lesser risk.
Likes
0
Dislikes
0
Response
Sandra Shaffer - Berkshire Hathaway - PacifiCorp - 6
Answer
No
Document Name
Comment
We agree with using the terms “obtain” and “use”. However, this will require the Responsible Entity document what the the terms “obtain” and “use”
mean with respect to BCSI – we believe more explanation is needed within the requirement or guidelines.
Based on the CMEP BCSI practice guide. The practice guide provides very little additional information on what is meant by “obtain” and “use.” Without
additional guidance evidencing this concept for audit purposes (that someone obtained BCSI but couldn’t use it) would be a significant challenge.
We disagree with the phrase, “by eliminating the ability” to obtain and use. This represents an unachievable threshold over and above the current
“Procedure(s) for protecting and securely handling.”
Likes
Dislikes
0
0
Response
Nicholas Lauriat - Network and Security Technologies - 1
Answer
No
Document Name
Comment
N&ST does not believe the proposed terms will enhance general understanding of the risks associated with potential compromises of BCSI. In N&ST’s
opinion, the NERC Glossary definition of BCSI (“Information about the BES Cyber System that could be used to gain unauthorized access or pose a
security threat to the BES Cyber System.”) more than adequately defines the potential risks. Furthermore, in recent discussions with representatives
from several Responsible Entities, it has become apparent to N&ST that there is NO good consensus on what it means to “use” BCSI. We believe the
existing language in CIP-011-2, Requirement R1 Part 1.2 should be retained.
Likes
0
Dislikes
0
Response
Jonathan Robbins - Seminole Electric Cooperative, Inc. - 4
Answer
No
Document Name
Comment
See NRECA submitted comments.
For key retention in R1.2 of CIP-011, is this saying that where the key is stored needs to be behind a PSP?
Likes
0
Dislikes
0
Response
Janelle Marriott Gill - Tri-State G and T Association, Inc. - 3
Answer
No
Document Name
Comment
Tri-State G&T does not agree. Clarity is needed around what “use” means, especially considering this is an issue that currently exists under the version
that is in effect. Similarly, there would need to be more clarity around the meaning of the term “obtain”.
As for R1.2, we think the original language (other than “use” not being defined) was correct and the concept of “obtain and use” should instead be
incorporated into the access requirements, especially R1.3. This will make it clear that in order for someone to be deemed to have access to BCSI, they
must have the ability to obtain and use it, which would align with the ERO Practice Guide. Although, we don’t recommend using the actual terms “use”
and “obtain”, without providing more clarification as to their meaning.
Likes
0
Dislikes
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
No
Document Name
Comment
The intention is good; however, the current proposed requirement language does not accomplish that intention; instead it seems to completely preclude
the use of BCSI the way it is written.
Likes
0
Dislikes
0
Response
Vivian Moser - APS - Arizona Public Service Co. - 3
Answer
No
Document Name
Comment
While AZPS agrees that the inclusion of “obtain” and “use” more clearly addresses the risk related to the potential compromise of BCSI, AZPS believes
that the proposed language in Part 1.2 creates an undue burden for Entities to execute and evidence “eliminating the ability to obtain and use BES
Cyber System Information during storage, transit, use, and disposal”. AZPS recommends that the SDT retain focus of the requirement language on
“protecting and securely handling” BCSI, and address the inclusion of “obtain” and “use” in guidance documents. AZPS offers proposed changes for
Part 1.2 below:
“Procedure or method(s) to prevent unauthorized access, protect, and securely hande BES Cyber System Information during storage, transit, use, and
disposal”.
Likes
0
Dislikes
Response
0
sean erickson - Western Area Power Administration - 1
Answer
No
Document Name
Comment
WAPA requests changing the work “use” in the last sentence of the requirement. “BES Cyber System Information during storage, transit,
use and disposal.” To “BES Cyber System Information during storage, transit, and disposal. The lack of a clear definintion for the word
“use” creates major problems for Registered Entities (REs). Use in context of BCSI displayed a system screen, BCSI layed out on a drafting
table, BCSI posted in a response/job aid binder being read by an aoperator or BCSI in computer systems memory address? Without a better
definition REs will need to implement procedures to address these scenarios; some of which are not commercially viable (memory
encryption).
Likes
0
Dislikes
0
Response
Chris Wagner - Santee Cooper - 1, Group Name Santee Cooper
Answer
No
Document Name
Comment
The change made to CIP-011-3 Part 1.2 does not add clarity. The choice of the second “use” in Part 1.2 is confusing and does not make sense; “…by
eliminating the ability to obtain and use BES Cyber System Information during, storage, transit, use, and disposal.” The standards drafting team needs
to elaborate on “…eliminating the ability…” The SDT should remove the second “use”.
Likes
0
Dislikes
0
Response
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
No
Document Name
Comment
It is impossible to completely “prevent” and or “eliminate” the ability to obtain and or use BCSI during storage, transit, use, and disposal, so all Entities
would be in violation the way this is written. The reasons the standards exist are to lower cyber security risks to the BPS. Suggest replacing
“eliminating” with “reducing” or rewording the requirement language to: “Method(s) to reduce the risk of unauthorized access to BCSI during storage,
transit, use and disposal.”
Likes
0
Dislikes
0
Response
Lana Smith - San Miguel Electric Cooperative, Inc. - 5
Answer
No
Document Name
Comment
SMEC agrees with comments submitted by NRECA.
Likes
0
Dislikes
0
Response
Andrea Barclay - Georgia System Operations Corporation - 4
Answer
No
Document Name
Comment
GSOC agrees that the approach essentially “eliminates” the risk associated with use of BCSI as the revisions require entities to completely eliminate the
ability to obtain or use BCSI during nearly all life stages with the exception of creation. GSOC respectfully suggests that use of the term “eliminate” was
inadvertent and should be revised to “control” or “restrict.” Should the SDT remove the term “eliminate” and replace it with a feasible alternative, this
requirement could achieve its intended purpose. However, GSOC also notes, for the SDT’s consideration, the infeasibility of the term “prevent.”
Responsible Entities cannot “prevent” or “eliminate” every risk or capability that could possibly manifest during the life cycle of BCSI. Further, it is
difficult to conceive of how prevention of “unauthorized access” would be documented and proven during compliance monitoring.
For this reason, GSOC recommends that the SDT revise the requirement to indicate an affirmative obligation to manage or control access rather than
an obligation to prevent access, which would effectively require Responsible Entities to “prove” that unauthorized access did not occur rather than
proving that they “controlled” or “managed” access through proactive security controls. Such a revision will not only reduce the potential for confusion
around whether unauthorized access was “prevented,” it will also remove the likelihood that Responsible Entities would be required to “prove a
negative” during compliance monitoring activities. For these reasons, GSOC recommends that the SDT consider revising the requirement as proposed
below.
Method(s) to manage access to BES Cyber System Information during storage, transit, use, and disposal.
Likes
0
Dislikes
Response
0
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
No
Document Name
Comment
While we appreciate the SDT’s effort to clarify what access means, this is better left to guidance documents, like it is now in the CMEP Practice Guide:
BES Cyber System Information, dated April 26, 2019. Without the additional context that the guidance document provides, this language just adds
confusion to the requirement. In addition, the ability to use information is open to interpretation, such as whether or not the individual has the
knowledge to use the information in such a way as to affect the BES.
Also, it is not possible to completely eliminate the ability to obtain and use BCSI, so “eliminate” should not be used.
Likes
0
Dislikes
0
Response
Barry Lawson - National Rural Electric Cooperative Association - 4
Answer
No
Document Name
Comment
NRECA agrees that the approach essentially “eliminates” the risk associated with use of BCSI as the revisions require entities to completely eliminate
the ability to obtain or use BCSI during nearly all life stages with the exception of creation. NRECA believes that use of the term “eliminate” was
inadvertent and should be revised to “control” or “restrict.” Should the SDT remove the term “eliminate” and replace it with a feasible alternative, this
requirement could achieve its intended purpose. However, NRECA also notes, for the SDT’s consideration, the infeasibility of the term “prevent.”
Responsible Entities cannot “prevent” or “eliminate” every risk or capability that could possibly manifest during the life cycle of BCSI. Further, it is
difficult to conceive of how prevention of “unauthorized access” would be documented and proven during compliance monitoring.
For this reason, NRECA recommends that the SDT revise the requirement to indicate an affirmative obligation to manage or control access rather than
an obligation to prevent access, which would effectively require Responsible Entities to “prove” that unauthorized access did not occur rather than
proving that they “controlled” or “managed” access through proactive security controls. Such a revision will not only reduce the potential for confusion
around whether unauthorized access was “prevented,” it will also remove the likelihood that Responsible Entities would be required to “prove a
negative” during compliance monitoring activities. For these reasons, NRECA recommends that the SDT consider revising the requirement as
proposed below:
“Method(s) to "manage" access to BES Cyber System Information during storage, transit, use, and disposal.”
Likes
0
Dislikes
Response
0
Todd Bennett - Associated Electric Cooperative, Inc. - 3, Group Name AECI
Answer
No
Document Name
Comment
AECI supports comments filed by NRECA
Likes
0
Dislikes
0
Response
Kent Feliks - AEP - 3
Answer
No
Document Name
Comment
AEP does not believe that the new language being proposed effectively addresses risks associated the compromise of BCSI. AEP has no opinion on
the inclusion of the words “obtain” and “use”, but the inclusion of the word “eliminating” is a cause for concern. The absolute nature of the word has
brought about concerns that it would be difficult to prove compliance.
Likes
0
Dislikes
0
Response
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
No
Document Name
Comment
The removal of the word “designated” creates an insurmountable scope of program management. The use of the word “eliminate” sets an impossible
threshold to achieve.
Likes
0
Dislikes
Response
0
Payam Farahbakhsh - Hydro One Networks, Inc. - 1
Answer
No
Document Name
Comment
There are issues with the wording. “eliminating the ability to obtain and use BES Cyber System Information during, including storage, transit, use,
and disposal”
Likes
0
Dislikes
0
Response
Kjersti Drott - Tri-State G and T Association, Inc. - 1
Answer
No
Document Name
Comment
Tri-State does not agree. Need more clarity around what “use” means, especially considering this is an issue that currently exists under the version that
is in effect. Similarly, there would need to be more clarity around the meaning of the term “obtain”.
As for R1.2, we think the original language (other than “use” not being defined) was correct and the concept of “obtain and use” should instead be
incorporated into the access requirements, especially R1.3. This will make it clear that in order for someone to be deemed to have access to BCSI, they
must have the ability to obtain and use it, which would align with the ERO Practice Guide. Although, we don’t recommend using the actual terms “use”
and “obtain”, without providing more clarification as to their meaning.
Likes
0
Dislikes
0
Response
Matthew Nutsch - Seattle City Light - 1,3,4,5,6 - WECC
Answer
No
Document Name
Comment
Seattle supports the comments of SMUD to this question.
Likes
Dislikes
0
0
Response
Bruce Reimer - Manitoba Hydro - 1
Answer
No
Document Name
Comment
Disagree with the phrase “by eliminating the ability to obtain and use” and it should be moved to Guidelines and Technical Basis to explain what
constitute a BCSI access. Agree with adding disposal since it was missing from current CIP-011-2 R1.2.
Suggest making the following changes for R1 Part 1.2:
“Method(s) to prevent unauthorized access to BES Cyber System Information during, including storage, transit, use, and disposal.”
Suggest adding the following language into Guidelines and Technical Basis based on CMEP BCSI Practice Guide:
“BCSI access means any instance or event during which a user obtains and uses BCSI. For access to occur, in this context, a user, authorized or
unauthorized, must concurrently both obtain BCSI and possess the ability to use BCSI. An unauthorized individual who obtains encrypted BCSI but has
no ability to use it within a meaningful timeframe should not be considered to have access.”
Likes
0
Dislikes
0
Response
Jeremy Voll - Basin Electric Power Cooperative - 3
Answer
No
Document Name
Comment
Support the MRO NSRF comments
Likes
0
Dislikes
0
Response
Amy Casuscelli - Xcel Energy, Inc. - 1,3,5,6 - MRO,WECC
Answer
No
Document Name
Comment
Xcel Energy support the comments submitted by EEI.
Likes
0
Dislikes
0
Response
Dana Klem - MRO - 1,2,3,4,5,6 - MRO, Group Name MRO NSRF
Answer
No
Document Name
Comment
Agree with terms “obtain” and “use;” however, more explanation is needed within the requirement or guidelines. The drafting team has referred to the
CMEP BCSI practice guide. Recommend defining “BCSI Access” in the NERC Glossary of Terms per the practice guide: “An instance or event during
which a user obtains and uses BCSI. For access to occur, in this context, a user, authorized or unauthorized, must concurrently both obtain BCSI and
possess the ability to use BCSI. An unauthorized individual who obtains encrypted BCSI but has no ability to use it within a meaningful timeframe
should not be considered to have access.”
Disagree and very concerned with the phrase “by eliminating the ability” to obtain and use. This represents an unachievable evidencing threshold over
and above the current “Procedure(s) for protecting and securely handling.” Responsible Entities can document protective procedures, but will be hard
pressed to prove they have eliminated all ability to obtain and use, i.e. rendered unauthorized access impossible.
Disagree with the addition of “and disposal” to the end of the requirement. BCSI in BES Cyber Systems is already addressed in R3 Part 3.1., but Part
3.1 needs to reinstate the qualifying language in the Requirements “that contain BES Cyber System Information.” Deletion of this qualifying language is
an expansion of scope to the current CIP-011-2 R2 requiring evidence of sanitization of assets not containing BCSI subject to this protection.
Although a logical inclusion as part of the lifecycle of BCSI, as applied in R1 Part 1.2, the evidencing we do in R3 for hardware is now going to be
extended to the disposal/deletion of BCSI, on every medium, wherever stored, since the Measure calls for “Evidence of methods used to prevent the
unauthorized access…” during disposal. The evidencing burden here can be crushing. Example concerns include:
- How will auditors know what BCSI has been disposed of unless Entities maintain an active inventory of BCSI “info items” and status, active or
disposed, just like we do for BES Cyber Systems?
- Entity may have a policy to shred paper-based BCSI as the disposal method, but to evidence the method was used, does Entity have to log
documents shredded?
- Will every electronic file, document, or email containing BCSI require its deletion to be logged by IT? Will Entities have to obtain such logs from thirdparty vendors/data custodians?
Likes
0
Dislikes
0
Response
Joe Tarantino - Joe Tarantino On Behalf of: Arthur Starkovich, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Beth Tincher, Sacramento
Municipal Utility District, 4, 1, 6, 3, 5; Jamie Cutlip, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Kevin Smith, Balancing Authority of
Northern California, 1; Nicole Goi, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Nicole Looney, Sacramento Municipal Utility District, 4, 1,
6, 3, 5; - Joe Tarantino
Answer
No
Document Name
Comment
The ‘obtain’ and ‘use’ terms are not defined and will lead to additional ambiguity and confusion. It is impossible for entities to know the capabilities of
potential threats, ‘use’ from one party may be different than another.
Likes
0
Dislikes
0
Response
Scott Miller - Scott Miller On Behalf of: David Weekley, MEAG Power, 3, 1; Roger Brand, MEAG Power, 3, 1; - Scott Miller
Answer
No
Document Name
Comment
1.
CIP-011 R1, Part 1.2 states “….by eliminating the ability to obtain and use BES Cyber System Information during storage, transit, use, and
disposal.” Does a format of portable storage media (e.g. flash drives) eliminate the ability to obtain and use BCSI?
Likes
0
Dislikes
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
No
Document Name
Comment
Adding the additional terms of “obtain” and “use” to try to imply the use of encryption without explicitly stating the requirement weakens the language.
Further, the use of the word “eliminating” adds significant burden to entities to prove their choosen method can never be compromised. Removal of the
phrase “by eliminating the ability to obtain and use BES Cyber System Information” makes the requirement clear and allows entities to select current
and future technologies to protect BCSI during storage, transit, use, and disposal. Consequently, by including these four phases protections for
“obtaining” access and during “use” are included in a number of current storage and transit technologies.
Likes
0
Dislikes
0
Response
Masuncha Bussey - Duke Energy - 1,3,5,6 - SERC, Group Name Duke Energy
Answer
No
Document Name
Comment
Duke Energy generally agrees that the inclusion of the terms “obtain” and “use” in requirement CIP-011-3, Requirement R1 Part 1.2 will more accurately
address the risk related to the potential compromise of BCSI. Duke Energy foresees a challenge to be able to demonstrate how we “eliminate” the
ability to “obtain and use” BCSI.
Suggest change "eliminating" to "limiting" or "restricting". Insert "both" before "obtain and use".
Likes
0
Dislikes
0
Response
William Hutchison - Southern Illinois Power Cooperative - 1
Answer
No
Document Name
Comment
Comments: It is impossible to completely “prevent” and or “eliminate” the ability to obtain and or use BCSI during storage, transit, use, and disposal, so
all Entities would be in violation the way this is written. The reasons the standards exist are to lower cyber security risks to the BPS. Suggest replacing
“eliminating” with “reducing” or rewording the requirement language to: “Method(s) to reduce the risk of unauthorized access to BCSI during storage,
transit, use and disposal.”
Likes
0
Dislikes
0
Response
Allan Long - Memphis Light, Gas and Water Division - 1
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Colleen Campbell - AES - Indianapolis Power and Light Co. - 3
Answer
Yes
Document Name
Comment
As long as both terms are defined properly, this methodology will help improve the storage of BCSI requirement.
Likes
0
Dislikes
0
Response
Michael Johnson - Michael Johnson On Behalf of: James Mearns, Pacific Gas and Electric Company, 1, 3, 5; Marco Rios, Pacific Gas and
Electric Company, 1, 3, 5; Sandra Ellis, Pacific Gas and Electric Company, 1, 3, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
Yes
Document Name
Comment
PG&E agrees with the inclusion of the “obtain” and “use”.
PG&E recommends that examples of what is “obtain” and “use” be included in the Technical Rationale document to help better understand the intended
meaning and to avoid potential future interpretation differences or ambiguities.
Likes
0
Dislikes
0
Response
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
Document Name
Yes
Comment
ERCOT believes this is an improvement and provides clarity on the meaning of unauthorized access.
Likes
0
Dislikes
0
Response
Dennis Sismaet - Northern California Power Agency - 6
Answer
Yes
Document Name
Comment
However, see other Entities comments related to wording change suggestions
Likes
0
Dislikes
0
Response
James Brown - California ISO - 2 - WECC
Answer
Yes
Document Name
Comment
This is an improvement and provides clarity on the meaning of unauthorized access.
Likes
0
Dislikes
0
Response
Constantin Chitescu - Ontario Power Generation Inc. - 5
Answer
Document Name
Comment
Yes
OPG is in agreement with RSC provided comment
Likes
0
Dislikes
0
Response
Marty Hostler - Northern California Power Agency - 5
Answer
Yes
Document Name
Comment
However, see other Entities comments related to wording change suggestions.
Likes
0
Dislikes
0
Response
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name RSC no NextEra
Answer
Yes
Document Name
Comment
While we agree that “obtain” and “use” more accurately address the risk, we have concerns with the overall wording.
We recommend changing Part 1.2 from
<>
To
<>
because “eliminating” is an absolute which makes implementation and demonstrating Compliance too challenging.
Likes
Dislikes
0
0
Response
Gregory Campoli - New York Independent System Operator - 2
Answer
Yes
Document Name
Comment
NYISO feels that “Obtain” and “use” are key distinctions providing clarity related to what is required to prevent unauthorized access. NYISO would also
suggest that the following modification be made to the Requirements language:
“Method(s) to prevent unauthorized access to BES Cyber System Information by restricting the ability to both obtain and use BES Cyber System
Information during storage, transit, use, and disposal.” In the case where BCSI is encrypted, information could still be obtained (physically or
electronically) but would not be in a usable format.
Note – During the Q&A session on the 2019-02: BES Cyber System Information Access Management webinar (January 16, 2020), it appears that
“access” equated to having the ability to “obtain and use.” Part 1.2 language seems to be focused on the prevention of unauthorized access by
“restricting” the ability to “obtain and use,” NYISO recommends the SDT clarify this point within the Technical Rationale for Reliability Standard CIP-0113.
Likes
0
Dislikes
0
Response
Bobbi Welch - Midcontinent ISO, Inc. - 2
Answer
Yes
Document Name
Comment
Yes – somewhat. “Obtain” and “use” are key distinctions which help provide better clarity related to what is required to prevent unauthorized access. In
addition, MISO suggests the following modification to the Requirements language:
“Method(s) to prevent unauthorized access to BES Cyber System Information by [delete the word "eliminating"] restricting the ability to simultaneously
obtain and use BES Cyber System Information during storage, transit, use, and disposal.”
Note – based on the Q&A session during the 2019-02: BES Cyber System Information Access Management webinar hosted on January 16, 2020, it
appears that “access” equates to having the ability to “obtain and use.”
As the intent of Part 1.2 is to prevent unauthorized access by “restricting” the ability to “obtain and use,” MISO recommends the SDT clarify this point in
the Technical Rationale for Reliability Standard CIP-011-3.
Likes
Dislikes
0
0
Response
Devin Shines - PPL - Louisville Gas and Electric Co. - 1,3,5,6 - SERC,RF, Group Name PPL NERC Registered Affiliates
Answer
Yes
Document Name
Comment
While we understand why “obtain and use” are included in Part 1.2, we fear that the way the requirement is written, the intent will be obscured. For
instance, the word “eliminating”, implies perfect execution. This is unattainable and should be avoided in the requirement language. While the changes
to this part are a good start, we feel that they are too narrowly focused on cloud-service providers and add extra burden to existing information
protection programs.
We encourage the SDT to develop a thoughtful process across all of CIP-011.
Likes
0
Dislikes
0
Response
Gerry Adamski - Cogentrix Energy Power Management, LLC - 5
Answer
Yes
Document Name
Comment
Yes the requirement is improved with the suggested terms "use" and obtain". However, the proposed requirement is somewhat circular and should be
further improved as follows:
"Method(s) to prevent unauthorized access to BES Cyber System Information during storage, transit, use, sanitization, and disposal." (The inclusion of
sanitization here eliminates the need for R3 Part 3.1.)
The term "eliminating" suggests a zero-defect approach, which is an extremely challenging compliance outcome to achieve.
The second bullet in the both R1 Part 1.2 and Part 1.3 Measures is fragmented and introduces topics (e.g. key management program) that have yet to
be presented in the standard.
Likes
0
Dislikes
0
Response
Leonard Kula - Independent Electricity System Operator - 2
Answer
Yes
Document Name
Comment
IESO agrees in principle with the comments submitted by NPCC:
While we agree that “obtain” and “use” more accurately address the risk, we have concerns with the overall wording because “eliminating” is an
absolute (i.e. zero defect) which makes implementation and demonstrating Compliance too challenging
We recommend changing Part 1.2 from
<>
To
<<<>
Likes
0
Dislikes
0
Response
Maryanne Darling-Reich - Black Hills Corporation - 1,3,5,6 - MRO,WECC
Answer
Yes
Document Name
Comment
The ability to “obtain and use” allows for the use of encryption as an acceptable means of protecting BCSI and helps to clarify “knowing and utilizing the
information” is what were aiming to protect, instead of simply possessing it. Additionally, Black Hills would like to see “Use” definded in the Glossary.
Likes
0
Dislikes
0
Response
Kevin Conway - Public Utility District No. 1 of Pend Oreille County - 1
Answer
Document Name
Comment
If you can clean up the sentance better.
Yes
Likes
0
Dislikes
0
Response
Jamie Monette - Allete - Minnesota Power, Inc. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Quintin Lee - Eversource Energy - 1, Group Name Eversource Group
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Anton Vu - Los Angeles Department of Water and Power - 6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
Response
0
Truong Le - Truong Le On Behalf of: Carol Chinn, Florida Municipal Power Agency, 6, 4, 5, 3; Chris Gowder, Florida Municipal Power Agency,
6, 4, 5, 3; Dale Ray, Florida Municipal Power Agency, 6, 4, 5, 3; David Owens, Gainesville Regional Utilities, 1, 5, 3; Richard Montgomery,
Florida Municipal Power Agency, 6, 4, 5, 3; - Truong Le
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Dwayne Parker - CMS Energy - Consumers Energy Company - 4
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Teresa Cantwell - Lower Colorado River Authority - 1,5, Group Name LCRA Compliance
Answer
Document Name
Comment
Yes
Likes
0
Dislikes
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Donald Lynd - CMS Energy - Consumers Energy Company - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Karl Blaszkowski - CMS Energy - Consumers Energy Company - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
Response
0
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name Public Utility District No. 1 of Chelan County
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 1,3,4,5 - RF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kathryn Tackett - NiSource - Northern Indiana Public Service Co. - 5
Answer
Document Name
Comment
See Steven Toosevich's comments.
Likes
0
Dislikes
0
Response
Kinte Whitehead - Exelon - 3
Answer
Document Name
Comment
Exelon supports EEI's comments on behalf of Exelon Segments 1, 3, 5, and 6.
Likes
0
Dislikes
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Document Name
Comment
Texas RE agrees that this will more accurately address the risk related to the potential compromise of BCSI versus the previous approach. This focus is
on the BCSI (data) versus applicable systems that would contain BCSI. This also aligns with the CMEP Practice Guide: ERO Enterprise CMEP
Practice Guide BES Cyber System Information.
Texas RE does have a concern that entities could simply use the bare minimum controls. For example, a registered entity could comply using
encryption, but there is no established brightline criteria indicating what level of encryption is sufficient to meet the objective of this requirement. This
may result in inconsistent enforcement of this requirement across the regions. If encryption is to be considered an acceptable means of prevent
unauthorized access to BES Cyber System Information then Texas RE recommends that the SDT review NIST Special Publication 800-175B, Guideline
for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms, and incorporate guidance from the NIST publication into the
CIP standard where appropriate and applicable.
Additionally, in the measures an example of evidence is ‘retention in the Physical Security Perimeter.’ Texas RE agrees that for BCSI in a physical form
retention in a PSP is an adequate means of protection. However, the PSP would not be considered adequate protection for electronic BCSI that is
located on a server outside of the Entity’s ESP.
Likes
0
Dislikes
Response
0
5. The SDT is proposing to have BCSI in the “Applicability” column. Do you agree that this provides better clarity on the focus of the
requirements?
Scott Miller - Scott Miller On Behalf of: David Weekley, MEAG Power, 3, 1; Roger Brand, MEAG Power, 3, 1; - Scott Miller
Answer
No
Document Name
Comment
Due to strong disagreements with 1.2, 1.4 and R2, we disagree here.
Likes
0
Dislikes
0
Response
Dana Klem - MRO - 1,2,3,4,5,6 - MRO, Group Name MRO NSRF
Answer
No
Document Name
Comment
We can agree with identifying BCSI in CIP-011-3 R1.1 and then using BCSI only in later applicability tables, but cannot support the removal of Medium
Impact BES Cyber Systems with ERC.
Likes
0
Dislikes
0
Response
Amy Casuscelli - Xcel Energy, Inc. - 1,3,5,6 - MRO,WECC
Answer
No
Document Name
Comment
Xcel Energy support the comments submitted by EEI.
Likes
Dislikes
0
0
Response
Jeremy Voll - Basin Electric Power Cooperative - 3
Answer
No
Document Name
Comment
Support the MRO NSRF comments
Likes
0
Dislikes
0
Response
Matthew Nutsch - Seattle City Light - 1,3,4,5,6 - WECC
Answer
No
Document Name
Comment
Although Seattle finds the proposed approach intriguing, it also finds unnecessarily confusing the inconsistent application of this approach among R1.1R1.3 and R1.4-1.5, R2, and R3. Better would be to revise the entire Standard one way or the other.
Seattle also believes that an objective-based, risk-focused approach would eliminate the need to add “BCSI” to the Applicability column at all. It would
be up the entity to specify its own controls in its plan and whether they are controls for BCSI about specific impact ratings of BCS, BCSI storage
locations, third party BCSI storage providers, etc.
Likes
0
Dislikes
0
Response
Kjersti Drott - Tri-State G and T Association, Inc. - 1
Answer
No
Document Name
Comment
While having BCSI in the applicability column provides clarity, it unfortunately expands the scope of the requirements beyond what they are today. If the
requirements are kept focused on designated storage locations for BCSI, it eliminates confusion with BCSI that may reside in BCS, EACMS and PACS.
We understand that this is a challenging part of the project, but we are concerned that the applicability and associated requirements as currently drafted
will create confusion, redundancy and expanded scope. Other than reverting back to the original structure, a possible solution could be to add
exclusions to the applicability to exclude High and Medium Impact BCS and their associated EACMS and PACS.
Likes
0
Dislikes
0
Response
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
No
Document Name
Comment
What was the intent of stating “BCSI as identified in R1.1”? Is the SDT inferring that other BCSI exists that was not identified in R1.1?
Likes
0
Dislikes
0
Response
Maryanne Darling-Reich - Black Hills Corporation - 1,3,5,6 - MRO,WECC
Answer
No
Document Name
Comment
Black Hills does not think the current definition of BCSI provided in the Glossary is clear enough to allow for BCSI to be listed as an Applicable System.
We think it would make more sense to leave applicability listed as High and Medium BCS… and state in the requirement “For BCSI, perform action “X,””
as the current CIP-004 R4.1 is modeled, for example.
Likes
0
Dislikes
0
Response
Todd Bennett - Associated Electric Cooperative, Inc. - 3, Group Name AECI
Answer
Document Name
Comment
No
AECI supports comments filed by NRECA
Likes
0
Dislikes
0
Response
Barry Lawson - National Rural Electric Cooperative Association - 4
Answer
No
Document Name
Comment
While NRECA understands what the SDT was attempting to accomplish and does not disagree with the intended clarification, the replacement of
“Applicable Systems” with “Applicability” is problematic as such term is already utilized in Section 4 of the CIP-011 standard, and, there, it is utilized to
denote whether a registered function has responsibility under the Standard. Utilization of the same term, but with a different scope within body of CIP011 will result in confusion and ambiguity regarding the overall applicability of CIP-011. Further, this change results in CIP-011 being different from the
remaining CIP reliability standards relative to the CIP reliability standards overall approach to identification of asset scope. Finally, NRECA notes that it
is also concerned that the modifications to the contents of the “Applicability” column conflict with the definition of BCSI set forth in the Glossary of Terms
Used in NERC Reliability Standards. Specifically, the revisions limit the “applicability” to “system information pertaining to…” while BCSI is defined as
Information about the BES Cyber System that could be used to gain unauthorized access or pose a security threat to the BES Cyber System. BES
Cyber System Information does not include individual pieces of information that by themselves do not pose a threat or could not be used to allow
unauthorized access to BES Cyber Systems, such as, but not limited to, device names, individual IP addresses without context, ESP names, or policy
statements. Examples of BES Cyber System Information may include, but are not limited to, security procedures or security information about BES
Cyber Systems, Physical Access Control Systems, and Electronic Access Control or Monitoring Systems that is not publicly available and could be used
to allow unauthorized access or unauthorized distribution; collections of network addresses; and network topology of the BES Cyber System.
There is information that is not “system information pertaining to” a particular asset that could be used to “gain unauthorized access or pose a security
threat to the BES Cyber System.” Further, the definition makes explicit reference to “security procedures or security information;” neither of which is
confined to “system information” and both of which may be comprised of information that is not “system information.” These potential conflicts and
contradictions between the standard and the Glossary of Terms Used in NERC Reliability Standards could result in increased ambiguity and confusion.
Finally, NRECA notes that requirement applicability is already complicated and in need of simplification. This modification and addition of the same
term within the standard and requirement only serves to increase the complexity and the likelihood for ambiguity and confusion. As well, it must be
noted that this change presents a substantial challenge to audit as the implication is that all system information must be evaluated to demonstrate that it
was evaluated for identification as BCSI and, further, relative to compliance monitoring activities, all such system information must be available to
sample to determine whether the process identified it as BCSI or not. NRECA does not agree that this provides better clarity on the focus of the
requirements and, therefore, does not support this change.
Likes
0
Dislikes
0
Response
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
No
Document Name
Comment
We disagree with changing the column heading and adding “system information pertaining to” for the following reasons. First, it is inconsistent with
other standards and it is confusing to have “applicability” here and also in section A.4 where it lists “Applicability” of functional entities and
facilities. Secondly, the definition of BCSI includes information about low impact systems. Therefore, we will be identifying all BCSI in our organization
as required by R1 Part 1.1. However, the applicable systems column defines the scope of systems to which the requirement row applies. By referring
to “BES Cyber System Information as identified in Requirement R1 Part 1.1” for the applicability of subsequent parts, the scope of systems to which the
requirements applied has been increased, since we will have identified BCSI pertaining to low impact systems as well. Third, CIP-011 has always been
about BCSI, regardless of where it is stored, so this does not clarify anything further.
Likes
0
Dislikes
0
Response
Andrea Barclay - Georgia System Operations Corporation - 4
Answer
No
Document Name
Comment
While GSOC understands what the SDT was attempting to accomplish and does not disagree with the intended clarification, the replacement of
“Applicable Systems” with “Applicability” is problematic as such term is already utilized in Section 4 of the CIP-011 standard, and, there, is utilized to
denote whether or not a particular registered function has responsibility under the Standard. Utilization of the same term, but with a different scope
within body of CIP-011 will result in confusion and ambiguity regarding the overall applicability of CIP-011. Further, this change results in CIP-011 being
different from the remaining CIP reliability standards relative to the CIP reliability standards overall approach to identification of asset scope. Finally,
GSOC notes that it is also concerned that the modifications to the contents of the “Applicability” column conflict with the definition of BCSI set forth in
the Glossary of Terms Used in NERC Reliability Standards. Specifically, the revisions limit the “applicability” to “system information pertaining to…”
while BCSI is defined as
Information about the BES Cyber System that could be used to gain unauthorized access or pose a security threat to the BES Cyber System. BES
Cyber System Information does not include individual pieces of information that by themselves do not pose a threat or could not be used to allow
unauthorized access to BES Cyber Systems, such as, but not limited to, device names, individual IP addresses without context, ESP names, or policy
statements. Examples of BES Cyber System Information may include, but are not limited to, security procedures or security information about BES
Cyber Systems, Physical Access Control Systems, and Electronic Access Control or Monitoring Systems that is not publicly available and could be used
to allow unauthorized access or unauthorized distribution; collections of network addresses; and network topology of the BES Cyber System.
There is information that is not “system information pertaining to” a particular asset that could be used to “gain unauthorized access or pose a security
threat to the BES Cyber System.” Further, the definition makes explicit reference to “security procedures or security information;” neither of which is
confined to “system information” and both of which may be comprised of information that is not “system information.” These potential conflicts and
contradictions between the standard and the Glossary of Terms Used in NERC Reliability Standards could result in increased ambiguity and confusion.
Finally, GSOC notes that requirement applicability is already complicated and in need of simplification. This modification and addition of the same term
within the standard and requirement only serves to increase the complexity and the likelihood for ambiguity and confusion. As well, it must be noted
that this change presents a substantial challenge to audit as the implication is that all system information must be evaluated to demonstrate that it was
evaluated for identification as BCSI and, further, relative to compliance monitoring activities, all such system information must be available to sample in
order to determine whether the process identified it as BCSI or not. For these reasons, GSOC does not agree that this provides better clarity on the
focus of the requirements and, therefore, cannot support this change.
Likes
0
Dislikes
0
Response
Lana Smith - San Miguel Electric Cooperative, Inc. - 5
Answer
No
Document Name
Comment
SMEC agrees with comments submitted by NRECA.
Likes
0
Dislikes
0
Response
sean erickson - Western Area Power Administration - 1
Answer
No
Document Name
Comment
R1.2 - No
R1.3 – Move to R1.5 - these specific requirements should be placed in the appropriate standards CIP-004 and CIP-013.
Likes
0
Dislikes
0
Response
Vivian Moser - APS - Arizona Public Service Co. - 3
Answer
Document Name
Comment
No
AZPS does not agree that the proposed revisions to the “Applicability” column provides better clarity on the focus of the requirements. AZPS requests
revising the applicability column to read as follows: “System information pertaining to (but not including the BES Cyber System (BCS) which may
contain BCSI):…” or similar language to to clearly establish the focus on BCSI.
Likes
0
Dislikes
0
Response
Janelle Marriott Gill - Tri-State G and T Association, Inc. - 3
Answer
No
Document Name
Comment
While having BCSI in the applicability column provides clarity, it unfortunately expands the scope of the requirements beyond what they are today. If the
requirements are kept focused on designated storage locations for BCSI, it eliminates confusion with BCSI that may reside in BCS, EACMS and PACS.
We understand that this is a challenging part of the project, but we are concerned that the applicability and associated requirements as currently drafted
will create confusion, redundancy and expanded scope. Other than reverting back to the original structure, a possible solution could be to add
exclusions to the applicability to exclude High and Medium Impact BCS and their associated EACMS and PACS.
Likes
0
Dislikes
0
Response
Jonathan Robbins - Seminole Electric Cooperative, Inc. - 4
Answer
No
Document Name
Comment
See NRECA submitted comments.
Likes
0
Dislikes
0
Response
Sandra Shaffer - Berkshire Hathaway - PacifiCorp - 6
Answer
Document Name
No
Comment
We disagree with any and all Applicability that does not include the qualifying language “with ERC” for Medium Impact BES Cyber Systems except for
the initial 1.1. The proposed language does not provide more clarity and needs to be more specific, not referencing another part. We recommend going
back to ‘Applicable Systems’.
Recommendation: All parts of R1 needs to go back to “Applicable Systems”, The “Applicability” for R2, is acceptable. Add clarity to the R2 Applicability
with “BES Cyber System Information stored in Vendor managed electronic BCSI Repositories, and pertaining to: (Applicable Systems)“ R3 needs to
stay, ‘Applicable Systems’.
Likes
0
Dislikes
0
Response
Andrea Jessup - Bonneville Power Administration - 1,3,5,6 - WECC
Answer
No
Document Name
Comment
BPA finds the proposed language is a significant change, and entities (and possibly auditors) do not have experience in applying this requirement to
information. This may cause some confusion. CIP-011 is an information protection standard and it is sensible to put such a requirement here. Referring
to the CIA model of Confidentiality, Integrity, and Availability, cyber security methodology often differentiates between protecting systems
functionality/availability, vs. data. It is sometimes desirable to share data while still protecting the system from unauthorized use. If the SDT’s intent is to
address distinct protections for data that may be processed, stored, or transmitted by the system separately from configuration information about the
system itself (i.e., versions, settings, and runtime parameters), the definition of “Cyber Assets” (NERC Glossary pg. 10) should be examined to further
clarify which and to what extent “data in those devices” is subject to which requirement.
Likes
0
Dislikes
0
Response
Sean Bodkin - Dominion - Dominion Resources, Inc. - 6, Group Name Dominion
Answer
Document Name
Comment
No
Dominion Energy supports the work the SDT has done on develoing the current draft. Dominion energy suggests that the team focus on the approach
taken in the current NERC CMEP Guidance document in addressing the issue and further supports EEIs comments.
Likes
0
Dislikes
0
Response
David Jendras - Ameren - Ameren Services - 3
Answer
No
Document Name
Comment
Ameren agrees with and supports EEI comments.
Likes
0
Dislikes
0
Response
Kagen DelRio - North Carolina Electric Membership Corporation - 3,4,5 - SERC
Answer
No
Document Name
Comment
NCEMC supports the comments by Barry Lawson, National Rural Electric Cooperative Association and ACES
Likes
0
Dislikes
0
Response
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
Document Name
Comment
No
We agree it clarifies the focus is on protecting the information, however we disagree that is the right focus for this type of standard. With the focus on
BCSI comes the issue that the requirements are now impossible to measure on every piece of BCSI everywhere. It is only measurable at BCSI storage
locations or repositories. See answer to Question 2 for additional explanation.
Likes
0
Dislikes
0
Response
Tho Tran - Tho Tran On Behalf of: Lee Maurer, Oncor Electric Delivery, 1; - Tho Tran
Answer
No
Document Name
Comment
While providing better clarity it may expands the scope of requirements beyond what are in place today.
Likes
0
Dislikes
0
Response
Bridget Silvia - Sempra - San Diego Gas and Electric - 3
Answer
No
Document Name
Comment
SDG&E supports EEI’s comments submitted on our behalf.
Additionally, SDG&E would like to comment on CIP-011-3 requirement’s proposed inclusion of all Medium-Impact BCS, regardless of ERC. The current
CIP-004-6 R4.4 requirement specifies applicability for only High Impact BCS and Medium Impact BCS with ERC. The new CIP 011-3 brings all BCSI in
scope regardless of ERC in Medium-Impact Sites. This change is significant and overburdensome to sites that don’t currently fall into this category of
BCSI.
Likes
0
Dislikes
0
Response
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
No
Document Name
Comment
ITC supports the response found in the NSRF Comment Form
Likes
0
Dislikes
0
Response
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
No
Document Name
Comment
We disagree with any and all Applicability that does not include the qualifying language “with ERC” for Medium Impact BES Cyber Systems except for
the initial 1.1. The proposed language does not provide more clarity and needs to be more specific, not referencing another part. We recommend going
back to ‘Applicable Systems’.
Recommendation: All parts of R1 needs to go back to “Applicable Systems”, The “Applicability” for R2, is acceptable. Add clarity to the R2 Applicability
with “BES Cyber System Information stored in Vendor managed electronic BCSI Repositories, and pertaining to: (Applicable Systems)“ R3 needs to
stay, ‘Applicable Systems’.
Likes
0
Dislikes
0
Response
Ayman Samaan - Edison International - Southern California Edison Company - 1
Answer
No
Document Name
Comment
Please see comments submitted by Edison Electric Institute
Likes
0
Dislikes
Response
0
Devin Shines - PPL - Louisville Gas and Electric Co. - 1,3,5,6 - SERC,RF, Group Name PPL NERC Registered Affiliates
Answer
No
Document Name
Comment
While we understand the reasoning behind the change, we feel that this change adds confusion and inconsistencies between CIP-011 and the rest of
the CIP Standards.
Likes
0
Dislikes
0
Response
Wayne Guttormson - SaskPower - 1
Answer
No
Document Name
Comment
Support MRO comments.
Likes
0
Dislikes
0
Response
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
No
Document Name
Comment
Please provide more clarity on the phrase "System information pertaining to". This needs to be well defined and understood. There may be many
systems that are associated with systems that may or may not house BCSI.
Likes
0
Dislikes
Response
0
Eli Rivera - CenterPoint Energy Houston Electric, LLC - NA - Not Applicable - Texas RE
Answer
No
Document Name
Comment
CEHE supports the comments as submitted by the Edison Electric Institute.
Likes
0
Dislikes
0
Response
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
No
Document Name
Comment
EEI supports adding BSCI in the Applicability Column of CIP-011-3. However, there are concerns with expanding the applicability to PCAs and Medium
Impact BES Cyber Security Systems.
First, in evaluating the proposed revision against the approved SAR, we are unable to find language to support the proposed revision. Second, the SDT
should provide support that this modification will alleviate a reliability gap. Specifically, we ask the SDT to provide information regarding the reliability
gap the proposed modifications are intended to address. Alternatively, the SDT could study the issue and develop a white paper, to identify, justify and
explain the gap that they believe exists and, if necessary, revise the SAR.
Likes
0
Dislikes
0
Response
Gregory Campoli - New York Independent System Operator - 2
Answer
No
Document Name
Comment
NYISO understands the intent of the change. However, we are concerned that this would create an inconsistency in format with the other current CIP
standards. NYISO would propose keeping the original “Applicable Systems” title and adding language such as “System Information pertaining to:” at the
head (or similar) of each applicable row in requirements R1 and R2.
Likes
0
Dislikes
0
Response
Jenifer Holmes - Alliant Energy Corporation Services, Inc. - 4 - MRO,RF
Answer
No
Document Name
Comment
Alliant Energy agrees with NSRF and EEI’s comments.
Likes
0
Dislikes
0
Response
Dmitriy Bazylyuk - NiSource - Northern Indiana Public Service Co. - 3
Answer
No
Document Name
Comment
See Steven Toosevich's comments.
Likes
0
Dislikes
0
Response
Ryan Olson - Portland General Electric Co. - 5, Group Name PGE Group 2
Answer
No
Document Name
Comment
PGE agrees with EEI’s comments
Likes
0
Dislikes
Response
0
Angela Gaines - Portland General Electric Co. - 1
Answer
No
Document Name
Comment
Please see comments PGE Group 2
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
No
Document Name
Comment
We disagree with any and all Applicability that does not include the qualifying language “with ERC” for Medium Impact BES Cyber Systems, except for
R1 Part 1.1, if restricted to identifying BCSI, and the identification of BCSI storage locations, or Repositories, is broken out into a separate part (with
Applicability to include “with ERC”) per Q1 response. The proposed language does not provide more clarity and needs to be more specific, not
referencing another part. We recommend going back to “Applicable Systems.”
Recommendation: All parts of R1 need to go back to “Applicable Systems.” The “Applicability” for R2, is acceptable. Add clarity to the R2 Applicability
with “BES Cyber System Information stored in Vendor managed electronic BCSI Repositories, and pertaining to: (Applicable Systems).” R3 needs to
stay “Applicable Systems.”
Likes
0
Dislikes
0
Response
Douglas Webb - Douglas Webb On Behalf of: Allen Klassen, Westar Energy, 6, 3, 1, 5; Bryan Taggart, Westar Energy, 6, 3, 1, 5; Derek Brown,
Westar Energy, 6, 3, 1, 5; Grant Wilkerson, Westar Energy, 6, 3, 1, 5; James McBee, Great Plains Energy - Kansas City Power and Light Co., 1,
3, 6, 5; Jennifer Flandermeyer, Great Plains Energy - Kansas City Power and Light Co., 1, 3, 6, 5; John Carlson, Great Plains Energy - Kansas
City Power and Light Co., 1, 3, 6, 5; Marcus Moor, Great Plains Energy - Kansas City Power and Light Co., 1, 3, 6, 5; - Douglas Webb, Group
Name Westar-KCPL
Answer
Document Name
Comment
No
Westar and Kansas City Power & Light Company, endorse Edison Electric Institute's (EEI) comments.
Likes
0
Dislikes
0
Response
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
No
Document Name
Comment
We disagree with any and all Applicability that does not include the qualifying language “with ERC” for Medium Impact BES Cyber Systems, except for
R1 Part 1.1, if restricted to identifying BCSI, and the identification of BCSI storage locations, or Repositories, is broken out into a separate part (with
Applicability to include “with ERC”) per Q1 response. The proposed language does not provide more clarity and needs to be more specific, not
referencing another part. We recommend going back to “Applicable Systems.”
Recommendation: All parts of R1 need to go back to “Applicable Systems.” The “Applicability” for R2, is acceptable. Add clarity to the R2 Applicability
with “BES Cyber System Information stored in Vendor managed electronic BCSI Repositories, and pertaining to: (Applicable Systems).” R3 needs to
stay “Applicable Systems.”
Likes
0
Dislikes
0
Response
Laura Nelson - IDACORP - Idaho Power Company - 1
Answer
No
Document Name
Comment
IPC does not agree with the change from “Applicable Systems” (High Impact BES Cyber Systems and their associated: EACMS and PACS, etc.) to
“Applicability” (BES Cyber System Information as identified in Requirement R1 Part 1.1) nor any reference other than an “Applicable System” reference
in the “Applicable Systems” column. IPC believes the “Applicable Systems” language and approach should remain consistent across all CIP Standards.
IPC does not agree that this change provides better clarity on the focus of the requirements; rather, this changes introduces and creates ambiguity and
inconsistencies across the CIP Standards.
Likes
Dislikes
0
0
Response
Colleen Campbell - AES - Indianapolis Power and Light Co. - 3
Answer
No
Document Name
Comment
Because the definition of BCSI is left for the most part up to the entity this could lead to confusion during an audit if the auditor has a different
interpretation for BCSI.
Likes
0
Dislikes
0
Response
Michael Puscas - ISO New England, Inc. - 2
Answer
No
Document Name
Comment
Comments:
Specification of information as an undefined category (i.e. “system information”) does not support understanding the intention of the information
protections being addressed. The shift to an information protection standard is welcome, but would require some support of identifying types of
information and developing some sort of inventory that can allow for concrete demonstration of protections and measures to comply. An entity could
use a narrow interpretation of “system information” to overtly restrict what is considered BCSI and minimize the compliance burden at the expense of
providing information protections. Since the rest of CIP-011-3 R1 depends on R1.1 identification, this could remove most information relevant to
protection of cyber assets from consideration for compliance.
Likes
0
Dislikes
0
Response
Susan Sosbe - Wabash Valley Power Association - 3
Answer
Document Name
Comment
Yes
No comments
Likes
0
Dislikes
0
Response
William Hutchison - Southern Illinois Power Cooperative - 1
Answer
Yes
Document Name
Comment
Comments: Yes, it would be good to have BCSI in the “Applicability” column. We feel BCSI repositories need to have a significant explanation in the
“Guidelines and Technical Basis” section as stated in question 1.
Likes
0
Dislikes
0
Response
Masuncha Bussey - Duke Energy - 1,3,5,6 - SERC, Group Name Duke Energy
Answer
Yes
Document Name
Comment
Duke Energy generally agrees that adding BCSI in the “Applicability” column provides further clarity on the focus of the requirements. However, Duke
Energy suggests using the High and Medium designations carried with the applicability for consistency throughout the rest of the standards. Also,
including the term “system information” in the applicability column and BES CSI in the requirement column may introduce scope ambiguity, particularly,
for example, PCA is included in the applicability, but is not included in the NERC Glossary term BES CSI.
Likes
0
Dislikes
0
Response
Bruce Reimer - Manitoba Hydro - 1
Answer
Document Name
Comment
Yes
Agree with proposing to have BCSI in the “Applicability” column and it is much clearer than the
current version since the CIP-011 requirements actually apply to BCSI rather than BCS and their
assocated cyber assets.
Likes
0
Dislikes
0
Response
Payam Farahbakhsh - Hydro One Networks, Inc. - 1
Answer
Yes
Document Name
Comment
That is fine as long as the Applicability section for R1.1 is worded correctly. We do not support introducing "System information pertaining to" in the
applicability section for R1.1. This creates some ambiguity. We believe that the applicability be limited to BCSI.
Likes
0
Dislikes
0
Response
Kent Feliks - AEP - 3
Answer
Yes
Document Name
Comment
AEP is in agreement that there is an overall increase in clarity on the focus of the standard. However, we were unable to find a justification for the
change within the Technical Rationale and have concerns regarding the need for these modifications.
Likes
0
Dislikes
0
Response
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
Yes
Document Name
Comment
Yes, it would be good to have BCSI in the “Applicability” column. We feel BCSI repositories need to have a significant explanation in the “Guidelines
and Technical Basis” section as stated in question 1.
Likes
0
Dislikes
0
Response
Leonard Kula - Independent Electricity System Operator - 2
Answer
Yes
Document Name
Comment
No comment.
Likes
0
Dislikes
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
Yes
Document Name
Comment
The intention is good, and provides greater focus, however, the current proposed requirements still have some ambiguity due to the applicability of
Requirement R1 including the BES Cyber System and associated Cyber Asset construct as the target.
Likes
0
Dislikes
0
Response
Nicholas Lauriat - Network and Security Technologies - 1
Answer
Document Name
Yes
Comment
N&ST suggests deleting the word, “System,” thereby changing, “System information pertaining,…” to “Information pertaining,…”
Likes
0
Dislikes
0
Response
David Rivera - New York Power Authority - 3
Answer
Yes
Document Name
Comment
No comments
Likes
0
Dislikes
0
Response
Bobbi Welch - Midcontinent ISO, Inc. - 2
Answer
Yes
Document Name
Comment
MISO supports the proposed change as long as the change is coordinated with Project 2016-02 so there is consistency across all CIP standards.
Likes
0
Dislikes
0
Response
Marty Hostler - Northern California Power Agency - 5
Answer
Document Name
Comment
Yes
Yes. We do agree. But does that mean NERC/FERC will consider the applicability section? They don't consider the applicability section related
to CIP-002 IRC 2.11 they and FERC claim that non-BES generation is to be considered when performing a nRP evaluation of a GOP Control
Center. The Applicability Section says "All BES Facilities". Why is the other CIP drafting team having to redefine BES in the new IRC 2.12. Is NERC
and FERC going to pull a fast one again and say entities need to include non-BES Cyber Information in their BCSI Protection Plans?????
•
And BES Means BES not non-BES
•
and Facilities mean BES equipment not non-BES equipment
•
and GOP's don't have GOP functional obligations for non-BES generation.
•
Non-GOPs are doing just fine not providing GOP functional obligation services to non-BES generation and so are GOPs; i.e. neither GOP's and
non-GOPs have GOP function obligations to any non-BES generator!. We reserve our GOP services for Generation Facilities (I.e. BES by
NERC Glossary definition for Facilities and GOP's provide services to a operate Facilities) not non-BES assets, see definition of GOP in NERC
Glossary of Terms.
•
According to NERC's March 1, 2019 Standards Process Manual Appendix 3A page 6 last paragraph "The only mandatory and enforceable
components of a Reliability Standrd are the (1) Applicability, (2) Requirements, and (3) effective dates.
•
What good is the Applicability Section if NERC/FERC are going to ignore it?
•
Likes
0
Dislikes
0
Response
Holly Chaney - Snohomish County PUD No. 1 - 3, Group Name SNPD Voting Members
Answer
Yes
Document Name
Comment
Yes. However, consistency is important when defining and using terms. Please pick a single descriptor and use it consistently throughout. e.g. BCSI vs
BES Cyber System Information.
Likes
1
Dislikes
Public Utility District No. 1 of Snohomish County, 4, Martinsen John
0
Response
James Brown - California ISO - 2 - WECC
Answer
Yes
Document Name
Comment
We agree with the approach. Retitling the column to “Applicability” will be beneficial for all Standards and Requirements to allow for more flexibility. This
aligns well with the work of the Project 2016-02 Standard Drafting Team that is also introducing new applicability. There may be future instances where
the applicability cannot be limited down to a system.
Likes
0
Dislikes
0
Response
Dennis Sismaet - Northern California Power Agency - 6
Answer
Yes
Document Name
Comment
We do agree. But does that mean NERC/FERC will consider the applicability section? They don't consider the applicability section related to CIP-002
IRC 2.11 they and FERC claim that non-BES generation is to be considered when performing a nRP evaluation of a GOP Control Center. The
Applicability Section says "All BES Facilities".
•
And BES Means BES not non-BES
•
and Facilities mean BES equipment not non-BES equipment
•
and GOP's don't have GOP functional obligations for non-BES generation.
•
Non-GOPs are doing just fine not providing GOP functional obligation services to non-BES generation and so are GOP. We reserve our GOP
services for Facilities nor non-BES assets.
•
According to NERC's March 1, 2019 Standards Process Manual Appendix 3A page 6 last paragraph "The only mandatory and enforceable
components of a Reliability Standrd are the (1) Applicability, (2) Requirements, and (3) effective dates.
What good is the Applicability Section if NERC/FERC are going to ignore it?
Likes
0
Dislikes
0
Response
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
Document Name
Yes
Comment
ERCOT agrees with this approach. Retitling the column to “Applicability” will be beneficial for all Standards and Requirements, and allow for more
flexibility. This revision aligns well with the work of the Project 2016-02 Standard Drafting Team that is also introducing new applicability. There may be
future instances where the applicability cannot be limited down to a system.
Likes
0
Dislikes
0
Response
Michael Johnson - Michael Johnson On Behalf of: James Mearns, Pacific Gas and Electric Company, 1, 3, 5; Marco Rios, Pacific Gas and
Electric Company, 1, 3, 5; Sandra Ellis, Pacific Gas and Electric Company, 1, 3, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
Yes
Document Name
Comment
PG&E agrees with the Applicability change to “System Information pertaining to” is appropriate and provides clarity on what is to be protected.
PG&E has concerns about the addition of PCA to the “System Information” to be protected. The concern is the additional effort to identify and protect
this information and the potential benefit of those additional protections. PG&AE is requesting the SDT articulate the reason for the proposed addition
of PCA since there is no information in the Technical Rationale document to warrant its addition.
Likes
0
Dislikes
0
Response
Kevin Conway - Public Utility District No. 1 of Pend Oreille County - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 1,3,4,5 - RF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name Public Utility District No. 1 of Chelan County
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Karl Blaszkowski - CMS Energy - Consumers Energy Company - 3
Answer
Yes
Document Name
Comment
Likes
Dislikes
0
0
Response
Donald Lynd - CMS Energy - Consumers Energy Company - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Joe Tarantino - Joe Tarantino On Behalf of: Arthur Starkovich, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Beth Tincher, Sacramento
Municipal Utility District, 4, 1, 6, 3, 5; Jamie Cutlip, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Kevin Smith, Balancing Authority of
Northern California, 1; Nicole Goi, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Nicole Looney, Sacramento Municipal Utility District, 4, 1,
6, 3, 5; - Joe Tarantino
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Teresa Cantwell - Lower Colorado River Authority - 1,5, Group Name LCRA Compliance
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Dwayne Parker - CMS Energy - Consumers Energy Company - 4
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Chris Wagner - Santee Cooper - 1, Group Name Santee Cooper
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Gerry Adamski - Cogentrix Energy Power Management, LLC - 5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Truong Le - Truong Le On Behalf of: Carol Chinn, Florida Municipal Power Agency, 6, 4, 5, 3; Chris Gowder, Florida Municipal Power Agency,
6, 4, 5, 3; Dale Ray, Florida Municipal Power Agency, 6, 4, 5, 3; David Owens, Gainesville Regional Utilities, 1, 5, 3; Richard Montgomery,
Florida Municipal Power Agency, 6, 4, 5, 3; - Truong Le
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Quintin Lee - Eversource Energy - 1, Group Name Eversource Group
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name RSC no NextEra
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Adrian Andreoiu - BC Hydro and Power Authority - 1, Group Name BC Hydro
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jamie Monette - Allete - Minnesota Power, Inc. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Constantin Chitescu - Ontario Power Generation Inc. - 5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jennie Wike - Jennie Wike On Behalf of: Hien Ho, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; John Merrell, Tacoma Public Utilities
(Tacoma, WA), 3, 1, 4, 5, 6; Marc Donaldson, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Ozan Ferrin, Tacoma Public Utilities (Tacoma,
WA), 3, 1, 4, 5, 6; Terry Gifford, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; - Jennie Wike
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Allan Long - Memphis Light, Gas and Water Division - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Bradley Collard - SunPower - 5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Anton Vu - Los Angeles Department of Water and Power - 6
Answer
Document Name
Comment
Neither agree nor disagree
Likes
0
Dislikes
0
Response
Kinte Whitehead - Exelon - 3
Answer
Document Name
Comment
Exelon supports EEI's comments on behalf of Exelon Segments 1, 3, 5, and 6.
Likes
0
Dislikes
0
Response
Kathryn Tackett - NiSource - Northern Indiana Public Service Co. - 5
Answer
Document Name
Comment
See Steven Toosevich's comments.
Likes
0
Dislikes
Response
0
6. The SDT is proposing to address the security risks associated with BCSI environments, particularly owned or managed by vendors via
CIP-011-3, Requirements R1, Part 1.4, and Requirement R2, Parts 2.1 and 2.2. Do you agree that these requirements will promote a better
understanding of security risks involved while also providing opportunities for the Responsible Entity to address appropriate security
controls?
Bradley Collard - SunPower - 5
Answer
No
Document Name
Comment
How are entities to list NERC, Regional Entities, FERC, etc.? The Standard should allow certain exemptions. They should also allow for exemptions
post NERC Exceptional Circumstance incidents where the information may be shared to expedite recovery.
Agree with Tarantino’s comment about this needs to be included in CIP-013.
Likes
0
Dislikes
0
Response
Michael Puscas - ISO New England, Inc. - 2
Answer
No
Document Name
Comment
Comments:
Requirement R1
The language in R1.4 goes beyond providing an opportunity for a Responsible Entity to address appropriate security controls because it requires
remediation and mitigation actions, including planned date of completion and status on action items. The requirement should also note that the risk
assessment is only necessary when a vendor or other third-party is housing the information. In other words, the assessment should not be required if
the information is stored by the Responsible Entity on its premises.
Additionally, the CIP-011 requirements seem to toggle from objective-based requirements to prescriptive-based implementation activities in an
unstructured manner. For example: R1.3 (Process to authorize access to BCSI) is objective-based, but R1.5 (Revoke the individual’s current access to
BCSI by the end of the next calendar day following the effective date of the termination) is prescriptive-based. R1.5 also implies that the process to
authorize access to BCSI must be on an individual (person by person) basis, which brings us right back the issue with CIP-004 and having BCSI in the
Cloud when an Entity may not have a list of individuals with access to the information. An Entity should be able to authorize a company, vendor,
individual, etc. to access information and it should have the flexibility to define how it implements the authorization process.
Requirement R2
The Standards should remain technology neutral. By prescribing key control management programs, there is an assumption that key management is
the only way to address preventing the ability to obtain and use BCSI through unauthorized access. Again, the requirements toggle between objectivebased and prescriptive/technology-based.
Recommendation: the SDT should consider either including information protection measures for vendors in CIP-013, or approaching CIP-011 similarly
to CIP-013. Specifically, the SDT should consider creating a requirement to develop and implement a BCSI security risk assessment plan and describe
the criteria that should be included in the plan (for example, a process to authorize access, a process to prevent ability to obtain and use BCSI from
unauthorized access, a process to revoke access within the next calendar day, etc.). This approach allows an Entity:
•
•
•
to focus on identifying information security risks and objectives specific to its needs and appropriately addressing them;
flexibility and scalability regarding how to implement technical controls, as well as remediation & mitigation activities; and
the ability to leverage emerging technologies that might better address information security risks without requiring updates to CIP Reliability
Standards.
Likes
0
Dislikes
0
Response
Colleen Campbell - AES - Indianapolis Power and Light Co. - 3
Answer
No
Document Name
Comment
The way the requirement is currently written there is confusion between how R2 will be applied to on premise storage solutions. The “Where Applicable”
reference does not fully explain the types of storage locations referred to in the requirement.
Likes
0
Dislikes
0
Response
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
No
Document Name
Comment
We believe R1 Part 1.4, and R2 Parts 2.1 and 2.2, exceed the scope of the SAR. We agree with EEI comments that vendor risk assessments with
respect to hosting BCSI should be addressed with a modification to CIP-013.
We concur with EEI comments that the draft requirement R2.1 regarding key management is unclear, and yet, at the same time, too prescriptive.
Similar to the explanation of the term “vendor(s)” in the CIP-013 Supplemental Material, it must be made clear with respect to vendors in R1 Part 1.4,
and custodial entity in R2 Part 2.2, that Regional and Registered Entities, as well as NERC and FERC, are exempted as such.
Likes
0
Dislikes
0
Response
Michael Johnson - Michael Johnson On Behalf of: James Mearns, Pacific Gas and Electric Company, 1, 3, 5; Marco Rios, Pacific Gas and
Electric Company, 1, 3, 5; Sandra Ellis, Pacific Gas and Electric Company, 1, 3, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
No
Document Name
Comment
PG&E agrees that R1 P1.4 and R2 are a good start in addressing the security risks of BCSI but is concerned with the apparent overlap that P1.4 has
with CIP-013 Supply Chain Risk Management R1 P1.1 risk assessment. Could CIP-011 SDT just reference the CIP-013 requirements for vendor risk
assessment and allow the entity to determine the appropriate method(s) for determining the risk, documentation of the risks and frequency of reassessment based on their CIP-013 plan(s)?
PG&E also has a concern regarding the language of Requirement R2. PG&E believes that it is not clear if key management is for physical, electronic, or
both types of keys. This lack of clarity could lead to entity confusion on what is covered. The Technical Rationale document for Requirement R2 does
indicate it covers both, but we are aware the Technical Rationale document is not always read and does not carry the same compliance mandate as
Requirement language.
PG&E recommends the Requirement language clearly indicates key management should cover such items as physical and electronic keys, with the
“such as” proceeding the “such as” to possibility future proof the Requirement to technology changes we are not aware of yet.
Likes
0
Dislikes
0
Response
Douglas Webb - Douglas Webb On Behalf of: Allen Klassen, Westar Energy, 6, 3, 1, 5; Bryan Taggart, Westar Energy, 6, 3, 1, 5; Derek Brown,
Westar Energy, 6, 3, 1, 5; Grant Wilkerson, Westar Energy, 6, 3, 1, 5; James McBee, Great Plains Energy - Kansas City Power and Light Co., 1,
3, 6, 5; Jennifer Flandermeyer, Great Plains Energy - Kansas City Power and Light Co., 1, 3, 6, 5; John Carlson, Great Plains Energy - Kansas
City Power and Light Co., 1, 3, 6, 5; Marcus Moor, Great Plains Energy - Kansas City Power and Light Co., 1, 3, 6, 5; - Douglas Webb, Group
Name Westar-KCPL
Answer
No
Document Name
Comment
Westar and Kansas City Power & Light Company, endorse Edison Electric Institute's (EEI) comments.
Likes
0
Dislikes
0
Response
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
No
Document Name
Comment
Regarding Part 1.4, this requirement appears to be better addressed in CIP-013. ERCOT refers the drafting team to ERCOT’s comments in response to
Question No. 3 recommends excluding applicability of all requirements for cloud service providers, but including the minimum requirements in the cloud
vendor risk assessments of Part 1.4.
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
No
Document Name
Comment
We believe R1 Part 1.4, and R2 Parts 2.1 and 2.2, exceed the scope of the SAR. We agree with EEI comments that vendor risk assessments with
respect to hosting BCSI should be addressed with a modification to CIP-013.
We concur with EEI comments that the draft requirement R2.1 regarding key management is unclear, and yet, at the same time, too prescriptive.
Similar to the explanation of the term “vendor(s)” in the CIP-013 Supplemental Material, it must be made clear with respect to vendors in R1 Part 1.4,
and custodial entity in R2 Part 2.2, that Regional and Registered Entities, as well as NERC and FERC, are exempted as such.
Likes
0
Dislikes
0
Response
Dennis Sismaet - Northern California Power Agency - 6
Answer
Document Name
No
Comment
This is way too prescriptive. Vendor requirements should reside only in CIP-014.
Likes
0
Dislikes
0
Response
Angela Gaines - Portland General Electric Co. - 1
Answer
No
Document Name
Comment
Please see comments PGE Group 2
Likes
0
Dislikes
0
Response
Jennie Wike - Jennie Wike On Behalf of: Hien Ho, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; John Merrell, Tacoma Public Utilities
(Tacoma, WA), 3, 1, 4, 5, 6; Marc Donaldson, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Ozan Ferrin, Tacoma Public Utilities (Tacoma,
WA), 3, 1, 4, 5, 6; Terry Gifford, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; - Jennie Wike
Answer
No
Document Name
Comment
While the proposed changes to promote a better understanding of the security risks, they are not in alignment with the current CIP-013-1 Standard for
Supply Chain Risk Management. Third-parties are part of the supply chain, and adding a Supply Chain Risk Management (SCRM) requirement within
CIP-011-2 R1 Part 1.4 adds unnecessary ambiguity and double jeopardy with Cloud Providers SCRM requirements falling under both CIP-013-1 and
CIP-011-3.
Additionally, the R2 requirements add additional ambiguity in their applicability. R2 Part 2.1 has a “where applicable” clause which seems to alleviate
the compliance burden for an entity that does not use PKI or like key management. Part 2.2 does not have this “where applicable” clause, but relies on
duties identified in Part 2.1, which would still apply to an entity without PKI, but what are the compliance requirements in this case?
Additionally, R2 imposes a significant burden on an entity who has key management infrastructure and local only BCSI storage. If there is key
management infrastructure at the enterprise level, this does not mean that the entity is capable of implementing this infrastructure to encrypt local BCSI
storage locations using the PKI, nor is there a requirement to do so. However there would be a requirement to implement documented processes
supporting R2 for an infrastructure that has no relevance to the BCSI.
A possible solution to this issue would be to modify the applicability to “BCSI from R1 Part 1.1 that is encrypted using a key management infrastructure”
or similar.
OR to change the R2 level language to something similar to this:
“Each Responsible Entity shall implement one or more documented key management programs that collectively include the applicable requirement
parts in CIP-011-3 Table R2 – Information Protection, for key management infrastructure used to protect BCSI. [Violation Risk Factor: Medium] [Time
Horizon: Operations Planning].”
Likes
0
Dislikes
0
Response
Ryan Olson - Portland General Electric Co. - 5, Group Name PGE Group 2
Answer
No
Document Name
Comment
PGE agrees with EEI’s comments
Likes
0
Dislikes
0
Response
James Brown - California ISO - 2 - WECC
Answer
No
Document Name
Comment
Regarding Part 1.4, this requirement appears to be better addressed through CIP-013. Please see comments to question #3. Recommend to exclude
applicability of all requirements for cloud service providers and include the minimum requirements in the cloud vendor risk assessments of R1.4.
Likes
0
Dislikes
0
Response
Jenifer Holmes - Alliant Energy Corporation Services, Inc. - 4 - MRO,RF
Answer
No
Document Name
Comment
Alliant Energy agrees with NSRF and EEI’s comments.
Specifically, if key management is not a requirement (due to the “where applicable” language in 2.1), then it is not appropriate to have this language in
the requirements section and would be better suited to guidance. The requirements should only state what is required.
Likes
0
Dislikes
0
Response
Holly Chaney - Snohomish County PUD No. 1 - 3, Group Name SNPD Voting Members
Answer
No
Document Name
Comment
SNPD supports the fundamental requirements and reasoning behind the proposed additions but believe it would be better placed within the context of
CIP-013 vendor and supply chain risk management. CIP-011 should be limited to information handling and protection. Vendor vetting and
management would appear to fit better within the overall context of CIP-013.
Likes
1
Dislikes
Public Utility District No. 1 of Snohomish County, 4, Martinsen John
0
Response
Marty Hostler - Northern California Power Agency - 5
Answer
No
Document Name
Comment
This is way too prescriptive. Vendor requirements should only reside in CIP-014.
Likes
0
Dislikes
0
Response
Gregory Campoli - New York Independent System Operator - 2
Answer
No
Document Name
Comment
If the intent of the proposed changes to CIP-011-3, requirement R1, Part 1.4 is to better understand and mitigate assessed risks to BCSI being stored
within a vendor-managed environment, NYISO believes the proposed changes are potentially overly broad and administratively burdensome in
comparison to risks currently assessed under CIP-013-1.
As stated in our response to question #3, NYISO would recommend eliminating Part 1.4 of requirement R1 from CIP-011-3. The issue of risk
assessments for vendors could be addressed as part of Project 2019-03: Cyber Security Supply Chain Risks (i.e. CIP-013-2), this would have the
benefit of accounting for all vendor requirements (BCS and BCSI) within the same standard.
Regarding examples contained within CIP-011-3, requirement R2, Parts 2.1 and 2.2, a key management process is an example of one method that
could be applied to prevent unauthorized access. NYISO feels that this example would be better included under requirement R1. NYISO proposes
requirement R2 be removed from the current draft.
Another suggested consideration would be include protections of BCSI stored in environments owned or managed by third parties into a separate
requirement. For example, combine the requirements into “R4”, which could reference R2 (Key management) as a stated requirement (not optional) for
BCSI stored in environments owned or managed by third parties.
Likes
0
Dislikes
0
Response
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
No
Document Name
Comment
There are other more appropriate methods to “promote better understanding” of issues and topics than through the standards drafting
process. Perhaps such issues and topics could be included as part of a Technical Rationale, supporting white paper, or using other available
mechanisms.
With regard to CIP-011-3, Requirement R1, Part 1.4, the requirements appear to duplicate CIP-013 Requirements. As such, we would encourage the
SDT to address a perceived security gap of BCSI stored at third party facilities within the CIP-013-1 Standard.
Regarding CIP-011-3, Requirement R2, Parts 2.1 and 2.2; EEI offers the following comments:
The SDT is prescribing requirements that do not appear to conform to NERC guidance regarding development of results-based Reliability
Standards. While encryption and key management would be an acceptable method for ensuring the security of BSCI at third party facilities, specifying
this solution within requirements may be overly prescriptive and potentially limit entities from using other methods to secure BCSI, if future technology
advancements offer such solutions. For this reason, the language should be broader with less prescription. If the SDT believes that the requirements
as described in R2 must be pursued, EEI suggests the following:
Part 2.1: “Where applicable” should be more clearly defined in order to avoid any confusion as to when key management processes are required,
otherwise the list of processes appears to be sufficiently comprehensive to ensure the security of BSCI.
Likes
0
Dislikes
0
Response
Eli Rivera - CenterPoint Energy Houston Electric, LLC - NA - Not Applicable - Texas RE
Answer
No
Document Name
Comment
If the SDT’s intent is to address security risks associated with vendors, then that should be specifically expressed in the requirements. The current
language is vague and needs further clarification. Part 1.4 states “in cases where vendors store” but Part 2.1 and Part 2.2 do not. In Part 2.1, the
statement “where applicable” needs to be expanded to clearly provide when a key management program must be implemented. As written, the
proposed requirements are too broad and could add an undue burden if auditors take the broadest possible meaning. Part 2.2 is not clear due to the
vagueness of Part 2.1. The following changes are suggested;
“Part 2.1 When BCSI is stored in environments owned or managed by vendors, develop a key management process(es) …”
“Part 2.2 When BCSI is stored in environments owned or managed by vendors, implement controls to separate …”
Also in reference to Part 2.2, the phrase “BCSI custodial entities duties” is not clear and open to broad interpretation.
Likes
0
Dislikes
0
Response
Bobbi Welch - Midcontinent ISO, Inc. - 2
Answer
No
Document Name
Comment
No – if the intent of the proposed changes to CIP-011-3, requirement R1, Part 1.4 is to mitigate risks particular to BCSI stored in a vendor managed
environment, MISO believes the proposed changes are overly broad and administratively burdensome in comparison to those risks currently assessed
under CIP-013-1 and the small amount of incremental benefit gained in relation to the level of effort required to produce it.
MISO recommends eliminating Part 1.4 of requirement R1 from CIP-011-3 and recommends the issue of risk assessments for vendors be addressed as
part of Project 2019-03: Cyber Security Supply Chain Risks (i.e. CIP-013-2), thereby covering all vendor requirements (BCS and BCSI) in the same
standard.
Regarding proposed CIP-011-3, requirement R2, Parts 2.1 and 2.2, a key management process is an example of one method to prevent unauthorized
access and would be better included as an example under requirement R1. MISO proposes requirement R2 be eliminated altogether.
Likes
0
Dislikes
0
Response
Wayne Guttormson - SaskPower - 1
Answer
No
Document Name
Comment
Support MRO comments.
Likes
0
Dislikes
0
Response
Devin Shines - PPL - Louisville Gas and Electric Co. - 1,3,5,6 - SERC,RF, Group Name PPL NERC Registered Affiliates
Answer
No
Document Name
Comment
To avoid confusion and the splitting of requirements, vendor risk management, including risk assessments of vendors, should be included in CIP013. Additionally, the concept of assessing the risk of cloud-providers is good, but the execution within the requirements needs more work. For
instance, the requirement is unclear on what constitutes a vendor “storing” an entity’s BCSI, and an auditor could make the assumption that this
requirement applies to all vendors and systems and not just to cloud providers. Another example is the timeframe described in Part 1.4.2. This timeline
implies that BCSI is more important than the actual BES Cyber Assets themselves (as CIP-013 has no timeframe for reassessments).
Likes
0
Dislikes
0
Response
David Rivera - New York Power Authority - 3
Answer
Document Name
No
Comment
1. We have strong apprehensions on “mitigate” in Part 1.4 and possibly push some to vote NO on this project. See #2 for more feedback. NYPA
is voting ‘NO’ based on these apprehensions.
2. We agree with that Part 1.4 will promote a better understanding the security risks involved. We have serious concerns with these controls.
Entities have little control of vendors OR the vendors of the primary vendors. We recommend the path laid out by CIP-013 – a) have a plan and
b) implement that plan. The potential costs of these controls may not produce an effective result. Plus the submitted feedback to Standards
Efficiency Review tends to question the value of annual reviews for the sake of a review instead of a trigger.
3. We request this SDT consider if these vendor controls (mitigations) belong in CIP-013.
4. We request clarification of physical security - will Part 2.2 be difficult to implement where the custodian and the person with the key are the
same?
Likes
0
Dislikes
0
Response
Ayman Samaan - Edison International - Southern California Edison Company - 1
Answer
No
Document Name
Comment
Please see comments submitted by Edison Electric Institute
Likes
0
Dislikes
0
Response
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
No
Document Name
Comment
We believe R1 Part 1.4, and R2 Parts 2.1 and 2.2, exceed the scope of the SAR. We agree with EEI comments that vendor risk assessments with
respect to hosting BCSI should be addressed with a modification to CIP-013.
We concur with EEI comments that the draft requirement R2.1 regarding key management is unclear, and yet, at the same time, too prescriptive.
Similar to the explanation of the term “vendor(s)” in the CIP-013 Supplemental Material, it must be made clear with respect to vendors in R1 Part 1.4,
and custodial entity in R2 Part 2.2, that Regional and Registered Entities, as well as NERC and FERC, are exempted as such.
Likes
0
Dislikes
0
Response
Quintin Lee - Eversource Energy - 1, Group Name Eversource Group
Answer
No
Document Name
Comment
1. We agree with that Part 1.4 will promote a better understanding the security risks involved. We have serious concerns with these controls.
Entities have little control of vendors OR the vendors of the primary vendors. We recommend the path laid out by CIP-013 – a) have a plan and
b) implement that plan.
2. We request this SDT consider if these vendor controls (mitigations) belong in CIP-013.
3. We request clarification of physical security. Part 2.2 may be difficult to implement where the custodian and the person with the key are the
same.
Likes
0
Dislikes
0
Response
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
No
Document Name
Comment
ITC supports the response found in the NSRF Comment Form
Likes
0
Dislikes
0
Response
Bridget Silvia - Sempra - San Diego Gas and Electric - 3
Answer
No
Document Name
Comment
SDG&E supports EEI’s comments submitted on our behalf.
Likes
0
Dislikes
0
Response
Tho Tran - Tho Tran On Behalf of: Lee Maurer, Oncor Electric Delivery, 1; - Tho Tran
Answer
No
Document Name
Comment
The BCSI should be protected regarless where it is. When and how to perform risk assessments of the vendors that store the Responsible Entity’s
BCSI should not become an extra burnden on Responsible Entity.
Likes
0
Dislikes
0
Response
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
No
Document Name
Comment
R1.4: Southern believes the wording “Process(es) to identify, assess, and mitigate risks in cases where vendors store Responsible Entity’s BES Cyber
System Information” is less clear. This has no wording to scope it to off-premise situations. Vendors produce all types of data storage solutions and
this could be interpreted to mean that all BCSI is stored by a vendor. The requirement should specify the relationship the vendor has to the “storing” of
the data as we believe this is about when vendors own/operate/maintain the storage in an off-premise cloud service environment.
R2: Requires that an entity “shall implement one or more documented key management program(s) that collectively include the applicable requirement
parts in CIP-011-3 Table R2 – Information Protection” regardless of whether or not an entity encrypts its BCSI or not. For entities that keep all BCSI onpremises and choose to not use 3rd party cloud solutions or encryption as a technical control, this main R requirement serves no purpose, and results in
a documentation exercise to ‘prove the negative.’ Consider moving the term “where applicable” to the main R requirement to explicitly exempt those
entities that do use encryption as a technical control to protect BCSI in storage, transit, or use.
Overall, Southern believes that the R2 requirements for VRA’s should be part of CIP-013 which is a more holistic approach to vendor risk. We do not
agree with the need to piecemeal different flavors of VRAs throughout the CIP standards for individual technical areas. CIP-013-1 R2 currently has
language containing a cyber security risk management plan for supply chain. We suggest this be removed from the proposed CIP-011 and instead be
coordinated with the Supply Chain SDT to add language or a requirement to align with conducting vendor risk assessments.
Part 1.4 seems to be somewhat a duplication of 1.6 where a verification of access to BCSI is required on the same time interval.
Likes
0
Dislikes
0
Response
Kagen DelRio - North Carolina Electric Membership Corporation - 3,4,5 - SERC
Answer
No
Document Name
Comment
NCEMC supports the comments by Barry Lawson, National Rural Electric Cooperative Association and ACES
Likes
0
Dislikes
0
Response
David Jendras - Ameren - Ameren Services - 3
Answer
No
Document Name
Comment
Ameren agrees with and supports EEI comments.
Likes
0
Dislikes
0
Response
Sean Bodkin - Dominion - Dominion Resources, Inc. - 6, Group Name Dominion
Answer
No
Document Name
Comment
Dominion Energy supports the work the SDT has done on develoing the current draft. Dominion energy suggests that the team focus on the approach
taken in the current NERC CMEP Guidance document in addressing the issue and further supports EEIs comments. Supply chain related related
requirements should remain as part of the CIP-013 planning process.
Likes
0
Dislikes
0
Response
Andrea Jessup - Bonneville Power Administration - 1,3,5,6 - WECC
Answer
No
Document Name
Comment
“System Information Pertaining to” BCS is far too vague. The NERC Glossary definition of BCSI shows examples rather than a principle by which to
designate BCSI. Guidance on this point fails to approach data “classification” or “categorization” according to sound and well-developed principles in
widespread use for which expertise and guidance exists from the Intelligence community. One vital concept is aggregation of data leading to increased
risk. The glossary definition gives an example or hints at it through the phrase “collections of network addresses:” but doesn’t explain how an Entity
would create a guideline for policy that assesses risk based on aggregation, doesn’t discuss “Essential Elements of (Friendly) Information” concepts and
doesn’t discuss derivative classification and marking.
Likes
0
Dislikes
0
Response
Sandra Shaffer - Berkshire Hathaway - PacifiCorp - 6
Answer
No
Document Name
Comment
We believe R1 Part 1.4 and R2 Parts 2.1 and 2.2 exceed the scope of the SAR. Vendor risk assessments are addressed in CIP-013. The result of
identifying, assessing, and mitigating vendor risks is still going to be controls we implement to prevent unauthorized access, which is already required in
various other current CIP Standards. The concern is that the SDT is developing a requirement that is duplicative of requirements contained within CIP013, and any modifications should be addressed in that Standard, not in CIP-011-3.
If R1 Part 1.4 needs to be pursued in CIP-011, per the definition of a Vendor in CIP-013, Regional and Registered Entities, need to be exempted from
being regarded as vendors, suppliers, or custodial entities.
Likes
0
Dislikes
0
Response
Nicholas Lauriat - Network and Security Technologies - 1
Answer
No
Document Name
Comment
N&ST believes that, following the Effective Date of 7/1/20 for CIP-013, vendors offering BCSI storage services will be subject to that Standard, which in
our view renders proposed CIP-011-3 Requirement R1, Part 1.4 redundant. Moreover, the proposed requirement is more stringent than any
requirement in CIP-013! The SDT is, in essence, proposing to require Responsible Entities to perform ANNUAL vulnerability assessments of their cloud
storage vendors (if any). N&ST admits to being hard-pressed to imagine how a Responsible Entity could perform a credible “risk assessment” of, for
instance, Microsoft Azure beyond asking them in writing if they still have the same FedRAMP authorization level as they had the previous year. The
“Technical Rationale for Reliability Standard CIP-011-3” includes a statement, “If the focus is protection of BCSI, the device or storage location becomes
less relevant,” that seems inconsistent with the proposed “risk assessment” requirement. N&ST recommends that it be dropped.
With regards to proposed Requirement R2, Parts 2.1 and 2.2, N&ST considers them vastly over-prescriptive. The goal here is to ensure that no
individuals who manage BCSI storage, whether in the Responsible Entity’s own data center or “in the cloud,” can access BCSI unless they have been
properly authorized in accordance with the requirements of CIP-004. Encryption and key management are certainly viable options, but they should
remain options. N&ST suggests moving them to the “Measures” associated with an appropriately re-worded requirement.
Likes
0
Dislikes
0
Response
Janelle Marriott Gill - Tri-State G and T Association, Inc. - 3
Answer
No
Document Name
Comment
While Tri-State G&T agrees with the concept of performing a risk evaluation (proposed by Part 1.4) associated with a cloud solution, we do not agree it
needs to be a compliance requirement. We think that the other requirements (access management, methods to protect/secure BCSI, etc.) already force
the Registered Entity to evaluate and identify risks, possible solutions, etc. Making the risk evaluation a mandatory requirement does not add value, and
instead adds unnecessary adminstrative compliance burden.
The R2 requirements as drafted are entirely too prescriptive and should instead be converted to objective-based requirements. Furthermore, as to R2.2,
entity’s should be permitted to have the same vendor manage the keys and hold the encrypted data, as long as controls are in place to prevent
unauthorized access and detect when an unauthorized action has been taken. Additionally, the use of the phrase “Where applicable” should be clarified.
We recommend instead using the phrase “Where encryption is utilized as a method to restrict access to BCSI”.
Likes
0
Dislikes
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
No
Document Name
Comment
The proposed language for CIP-011-3, Requirements R1, Part 1.4 are not only duplicative of CIP-013, they also prescribe mandatory timeframes for the
performance of periodic risk assessments for what is otherwise an objective based standard in CIP-013. This periodicity should be left up to each
Registered Entity to define within their Supply Chain Risk Management plan. To remove double jeopardy, prevent confusion, and maintain consistency
for supplier risk management requirements, CIP-011-3, Requirements R1, Part 1.4 should be removed and cloud-based suppliers for BCSI should be
covered in CIP-013.
Likes
0
Dislikes
0
Response
Vivian Moser - APS - Arizona Public Service Co. - 3
Answer
No
Document Name
Comment
AZPS agrees that the proposed language in Part 1.4 addresses security risks associated with instances where a vendor stores a Responsible Entity’s
BCSI. However, Parts 1.4.1 through 1.4.3 introduce duplicative requirements to perform risk assessments, as the requirement will be satisfactorily met
with the implementation of CIP-013-1 Part 1.1. AZPS recommends retaining Part 1.4 and remove sub-parts 1.4.1 through 1.4.3.
With respect to CIP-011-3 R2, AZPS provides its response in Question No. 8.
Likes
0
Dislikes
0
Response
Gerry Adamski - Cogentrix Energy Power Management, LLC - 5
Answer
No
Document Name
Comment
Requirement R1 Part 1.4 is a step in the right direction for structuring a framework that considers third-party providers as a viable source. However, as
written, the language falls short in the following wasy:
•
•
•
•
This entire process should be included in the CIP-013 Supply Chain standard that already deals with bendor risk assessments, etc. This is
duplicative to that effort and one that would likely be collapsed into CIP-013 during a subsequent efficiency review
The intent to mitigate risk does not include the intended risk threshold or objective. If this is to be determined by the entity, the outcome should
be clearly indicated. If this risk analysis were included in CIP-013, the entity already defines the process and risk objectives there, so this would
also be a duplication.
Part 1.4.3 - is it necessary to state that the entity needs to "document the results of the risk assessment"? This serves as a Measure to Part
1.4.2 than a standalone requirement, which in and of itself, is administrative. Furthermore, Part 1.4.3 should be reworded to state, "Implement
an action plan to remediate or mitigate risk(s) identified in the risk assessment performed according to Parts 1.4.1 and 1.4.2, including the
planned date of completing the action plan and the execution status of any remediation or mitigation action items."
Bullets 3 and 4 in the Measures - what is the difference between the "documentation of the vendor risk assessments" and "documentation of the
results of the vendor risk assessments"? It seems these could be combined into a singular measure.
With respect to R2 Parts 2.1 and 2.2:
•
•
•
The objective is to restrict access but it is not clear to what? The requirement should be clarified. Is the key management process intended for
physical access to locations of BCSI storage locations? Electronic access to folders and/or information containing BCSI? Both? Something
else? This appears to be an available Measure to meet Part 1.2 and not an independent requirement covering the same reliability objective of
preventing unauthorized access.
There are several terms included in the Parts 2.1.1 - 2.1.9 list that are not commonly understood without further explanation (e.g. key
suppression, periods). These need to be presented or explained more clearly to inform the Registered Entity what the intent is.
In Part 2.2, the use of "custodial entity" is not well understood. Furthermore, the intended security objective of this requirement is not clear as a
result.
Likes
0
Dislikes
0
Response
sean erickson - Western Area Power Administration - 1
Answer
No
Document Name
Comment
These additional requirements should be added to the language of CIP-013 and addressed in the entities supply chain risk management
plan. Do not mix the standards requirements.
Likes
Dislikes
0
0
Response
Chris Wagner - Santee Cooper - 1, Group Name Santee Cooper
Answer
No
Document Name
Comment
Yes, agree that a stand alone requirement where a vendor stores an entitiy’s BCSI is needed. 1.4.1 requires an initial risk assessment of vendors but
the SDT needs to define what is acceptable evidence for a risk assessment.
Is requirement 2 only applicable to BCSI stored in the cloud? For R2.1 the SDT should define key management and provide guidance in a GTB.
For R2.2 if an entity uses secure thumdrives, how can they separate the duties? Who in this requirement is the custodial entity?
Likes
0
Dislikes
0
Response
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
No
Document Name
Comment
Doing a risk assessment of an 3rd party / offsite storage provider is practically useless. The best a RE will get from most providers is a SOC1 or SOC-2
report. The way this is written today only creates compliance risk and burden on the RE. The majority of offsite/Cloud provider storage solutions (a
majority if not all the providers RE’s would use) are not the issue when it comes to security risks. These types of businesses would not be in business if
they did not have strong security systems in place and would not be used by Federal, State, Local governments and Fortune ranked
companies. Instead of putting the burden on the RE, NERC/FERC needs create an approval process and keep an approved published list of 3rd party
storage vendors list for RE’s to be able to use. This is exactly what is done for government and government contractors. This would be more efficient,
more in-depth, and not create compliance burden on the RE’s. This would not restrict competition or violate any laws as any 3rd party would be able to
go through the process to get approved.
In almost all documented cloud data breach cases we are aware of, it has been the end user which has caused data leaks not the provider themselves
ref: https://www.wsj.com/articles/human-error-often-the-culprit-in-cloud-data-breaches-11566898203 . We followed this article up by asking various
cybersecurity experts from EY, Mandiant, and Cisco. The only compromise which came up from them was 3rd party identity providers. The
compromise was of their own outward facing application and not the security of or compromise of customer storage solutions. The greater risk in
cloud/3rd party storage solutions lies more in a customer not having the knowledge of the risks and security tools necessary to protect data in the cloud
than the cloud provider itself. This is also significantly dependent on the type of environment being used such as a completely private cloud vs hybrid
public/private cloud and its subsequent configuration
Likes
0
Dislikes
0
Response
Lana Smith - San Miguel Electric Cooperative, Inc. - 5
Answer
No
Document Name
Comment
SMEC agrees with comments submitted by NRECA.
Likes
0
Dislikes
0
Response
Andrea Barclay - Georgia System Operations Corporation - 4
Answer
No
Document Name
Comment
GSOC agrees that the proposed revisions will promote a better understanding of security risks involved while also providing opportunities for the
Responsible Entity to address appropriate security controls; however, it does not support the manner in which the proposed requirements do
so. Specifically, GSOC is concerned about introducing a separate vendor risk assessment for vendors under CIP-011 than is proposed in CIP013. Such segregation of similar and potentially related requirements and processes into 2 different standards introduces (rather than reduces) overall
risk as discussed below in GSOC’s response to question #10. If a risk assessment for a vendor is necessary, then, the team should work with the
Supply Chain SDT to modify CIP-013. This is especially important where cloud services are provided under a master or general services agreement
that is in scope for CIP-013 as an additional requirement under CIP-011 creates redundancy and the potential for error. Further GSOC notes that
mitigations are not required to be implemented in CIP-013, but are required to be implemented here for what is likely a less risky procurement. It is
unclear as to why this would be necessary and, as this is not addressed within the Technical guidance, it should be addressed by the SDT to ensure
that there is an appropriate identification of risk associated with the recommendation to require a separate risk assessment and mandatory risk
mitigation within CIP-011 for access to information when mandatory mitigation is not required within CIP-013.
Likes
0
Dislikes
0
Response
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
Document Name
No
Comment
R1 Part 1.4 and R2 Parts 2.1 and 2.2 exceed the scope of the SAR and significantly increase the compliance obligations. CIP-011 should remain nonprescriptive and allow entities to implement the controls appropriate to their situations. Vendor risk assessments are addressed in CIP-013 and should
not be required here. In any case, the end result of identifying, assessing, and mitigating vendor risks is still going to be the controls we implement to
try and prevent unauthorized access, which is already required by CIP-011.
It is also unclear as to when/if these requirements are applicable.
Likes
0
Dislikes
0
Response
Barry Lawson - National Rural Electric Cooperative Association - 4
Answer
No
Document Name
Comment
NRECA agrees that the proposed revisions will promote a better understanding of security risks involved while also providing opportunities for the
Responsible Entity to address appropriate security controls; however, it does not support the way the proposed requirements do so. Specifically,
NRECA is concerned about introducing a separate vendor risk assessment for vendors under CIP-011 than is proposed in CIP-013. Such segregation
of similar and potentially related requirements and processes into 2 different standards introduces (rather than reduces) overall risk as discussed below
in NRECA’s response to question #10. If a risk assessment for a vendor is necessary, then, the team should work with the Supply Chain SDT to modify
CIP-013. This is especially important where cloud services are provided under a master or general services agreement that is in scope for CIP-013 as
an additional requirement under CIP-011 creates redundancy and the potential for error. Further, NRECA notes that mitigations are not required to be
implemented in CIP-013, but are required to be implemented here for what is likely a less risky procurement. It is unclear as to why this would be
necessary and, as this is not addressed within the Technical Rationale, it should be addressed by the SDT to ensure that there is an appropriate
identification of risk associated with the recommendation to require a separate risk assessment and mandatory risk mitigation within CIP-011 for access
to information when mandatory mitigation is not required within CIP-013.
Likes
0
Dislikes
0
Response
Todd Bennett - Associated Electric Cooperative, Inc. - 3, Group Name AECI
Answer
Document Name
Comment
No
AECI supports comments filed by NRECA
Likes
0
Dislikes
0
Response
Kent Feliks - AEP - 3
Answer
No
Document Name
Comment
Regarding CIP-011, Requirement 1, Part 1.4, AEP feels that this requirement does not belong in CIP-011. We believe vendor management/supply
chain requirements belong in CIP-013 rather than CIP-011. If the current language in CIP-013 does not address BCSI protection when stored at a third
party location, AEP recommends modifying the CIP-013 standard to address these needs.
In regards to CIP-011, Requirement 2, Parts 2.1 and 2.2, AEP is of the opinion that key management and encryption may not be enough to properly
ensure the protection of BCSI when being stored in a third party facility. We also feel these requirements could use some clarification regarding when
it’s necessary to use key management methods. AEP is unsure of how “where applicable” is defined within Part 2.1, which could lead to insufficient
protection of BCSI based on how that phrase is interpreted.
Likes
0
Dislikes
0
Response
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
No
Document Name
Comment
The focus needs to be on protecting access to the information. This should be performed in a vendor/platform neutral manner - whether the systems are
administered by in-house personnel or hosted on a shared cloud-based hosting provider, the outcome, regardless, should be that access to the
information is limited to authorized individuals only. The risk assessment is an additional undue burden on the entity that the existing process should
account for regardless of the outside party the information is being shared with. As such, suggest re-architect the standard to be outcome based so as
not to preclude using specific technologies or adoption of emergent solutions, and to apply regardless of the outside party with whom the information is
shared.
Likes
0
Dislikes
Response
0
Kjersti Drott - Tri-State G and T Association, Inc. - 1
Answer
No
Document Name
Comment
While Tri-State agrees with the concept of performing a risk evaluation (proposed by Part 1.4) associated with a cloud solution, we do not agree it needs
to be a compliance requirement. We think that the other requirements (access management, methods to protect/secure BCSI, etc.) already force the
Registered Entity to evaluate and identify risks, possible solutions, etc. Making the risk evaluation a mandatory requirement does not add value, and
instead adds unnecessary adminstrative compliance burden.
The R2 requirements as drafted are entirely too prescriptive and should instead be converted to objective-based requirements. Furthermore, as to R2.2,
entity’s should be permitted to have the same vendor manage the keys and hold the encrypted data, as long as controls are in place to prevent
unauthorized access and detect when an unauthorized action has been taken. Additionally, the use of the phrase “Where applicable” should be clarified.
We recommend instead using the phrase “Where encryption is utilized as a method to restrict access to BCSI”.
Likes
0
Dislikes
0
Response
Matthew Nutsch - Seattle City Light - 1,3,4,5,6 - WECC
Answer
No
Document Name
Comment
Seattle is concerned about the overlap and potential for conflict between proposed CIP-011 vendor controls and CIP-013. Seattle prefers an objectivebased, risk-focused approach that would leverage CIP-013 controls without restating them. Depending on how an entity used, transports, and stores its
BCSI, additional controls might be warranted for third parties involved in BCSI processes, but these might be better left up to each entity to determine
and defend, based on existing security concepts. For example, an entity may determine that a third-party with a valid FedRAMP certification is
sufficiently risk-free to engage to store BCSI, or it might identify specific individual controls. Leaving it up to each entity, with some reasonable guidance,
serves to break the Gordian Knot of third-party certifications that to date has stifled most NERC approaches to third party storage providers.
Likes
0
Dislikes
0
Response
Bruce Reimer - Manitoba Hydro - 1
Answer
Document Name
No
Comment
The requirement language is not clear as SDT expected. If it is intended that R1 Part 1.4 and R2 only apply when vendors are involved, the
Requirement language should clearly state this. In addition, for R1 Part 1.4 and R2 Part 2.2, Regional and Registered Entities, as well as NERC and
MRO, need to be exempted from any possibility of being regarded as vendors or custodial entities.
R2 requires entities to have a key management program, but the wording regarding encryption and vendors are missing. Suggest adding the following
language to R2:
“… shall implement one or more documented key management program where vendors are custodians and BCSI are encrypted…”
In R2 Part 2.1, we believe “key suppression” is a typo and it should be “key supersession”. Also if it is intended to address the electronic key rather than
physical key, it should clealy state electronic key or encryption key in the requirement language.
In R2 Part 2.2, what does the term “custodial entity” mean? If this is a term taken from other guidance or standard documents (NIST, Cloud Security
Alliance etc.), those should be referenced. Across various NIST and CSA documents, the terms “data custodian” and “key custodian” are both in use.
In R2 Part 2.2, when separation of duties is being called for, it’s not clear which particular duties must be kept separate. Also it is not clear whether the
separation of duties means between the vendors and Registered Entities.
In R2 Part 2.2, it is not clear if it is acceptable for a vendor to have both custody of data and ability to use it (e.g. have an encryption key.) if the vendor
separate their staff’s duties.
Likes
0
Dislikes
0
Response
Jeremy Voll - Basin Electric Power Cooperative - 3
Answer
No
Document Name
Comment
Support the MRO NSRF comments
Likes
Dislikes
0
0
Response
Teresa Cantwell - Lower Colorado River Authority - 1,5, Group Name LCRA Compliance
Answer
No
Document Name
Comment
The language appears that the key management would be outside of the Responsible Entity. The Responsible Entity may manage their own keys in
certain architectures. Clarification that separations are needed where an vendor (3rd party) is used for key management.
Likes
0
Dislikes
0
Response
Amy Casuscelli - Xcel Energy, Inc. - 1,3,5,6 - MRO,WECC
Answer
No
Document Name
Comment
Xcel Energy support the comments submitted by EEI.
Likes
0
Dislikes
0
Response
Dana Klem - MRO - 1,2,3,4,5,6 - MRO, Group Name MRO NSRF
Answer
No
Document Name
Comment
The draft requirement R2.1 regarding key management is unclear, and yet, at the same time, too prescriptive. Key management should not be specified
as the means, as there are others. R2 Part 2.1 should be deleted in its entirety.
Also, for R1 Part 1.4 and R2 Part 2.2, Regional and Registered Entities, as well as NERC and FERC, need to be exempted from any possibility of being
regarded as vendors or custodial entities.
R1 Part 1.4 and R2 Parts 2.1 and 2.2 exceed the scope of the SAR. We do not believe this is an appropriate place to promote better understanding of
security risks involved, nor do we think we should be held to these extremely prescriptive requirements. Identifying, assessing, and mitigating vendor
risks will already be addressed as part of preventing unauthorized access.
How a Responsible Entity chooses to implement their access control program should not be prescribed within standard language. We suggest removing
all language from CIP-011-3 R1.2, R1.4, R2.1 and R2.2. We believe that the inclusion of storing BCSI with cloud based service providers can be
addressed by defining “BCSI Access” in the NERC Glossary of Terms. The definition language could be taken from the April 26, 2019 ERO Enterprise
CMEP Practice Guide on BES Cyber System Information: “An instance or event during which a user obtains and uses BCSI. For access to occur, in this
context, a user, authorized or unauthorized, must concurrently both obtain BCSI and possess the ability to use BCSI. An unauthorized individual who
obtains encrypted BCSI but has no ability to use it within a meaningful timeframe should not be considered to have access.”
Currently CIP-004-6 adequately addresses access controls to BCSI when stored by the responsible entity. The issue with the current access
requirements is when applied to offsite vendors due to the fact that the Responsible Entity cannot control a vendor’s access to the BCSI.
With this definition in place the SDT can then simply change CIP-004-6 R4 to read:
R4: Process to authorize based on need, as determined by the Responsible Entity, except for CIP Exceptional Circumstances”:
4.1.1. Electronic Access
4.1.2. Unescorted physical access into a Physical Security Perimeter; and
4.1.3. BCSI Access
The SDT could also change language in CIP-004-6 R5.3 to read:
For termination actions, revoke the individual’s access to BES Cyber System Information, whether physical or electronic (unless already revoked
according to Requirement R5.1), by the end of the next calendar day following the effective date of the termination action.
Part CIP-004-7 R4.1.3 would limit “BCSI Access” appropriately to vendors that are custodians to encrypted or otherwise masked data but do not have
the ability to use it. Any vendor with both custody of data and ability to use it (e.g. have an encryption key) would need to be provisioned access by the
Responsible Entity through their established access control process and procedures.
Likes
0
Dislikes
0
Response
Joe Tarantino - Joe Tarantino On Behalf of: Arthur Starkovich, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Beth Tincher, Sacramento
Municipal Utility District, 4, 1, 6, 3, 5; Jamie Cutlip, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Kevin Smith, Balancing Authority of
Northern California, 1; Nicole Goi, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Nicole Looney, Sacramento Municipal Utility District, 4, 1,
6, 3, 5; - Joe Tarantino
Answer
No
Document Name
Comment
We recommend that CIP-013 is expanded to include vendors that store BES CSI on behalf of entities. The vendor requirements in CIP-011 exceed
CIP-013 requirements may result in additional processes that can be covered by the CIP-013 standard.
Likes
0
Dislikes
0
Response
Scott Miller - Scott Miller On Behalf of: David Weekley, MEAG Power, 3, 1; Roger Brand, MEAG Power, 3, 1; - Scott Miller
Answer
No
Document Name
Comment
1.
CIP-011 R1, Part 1.4 states “Process(es) to identify, assess, and mitigate risks in cases where vendors store Responsible Entity’s BES Cyber
System Information….” Since MEAG does not store its BCSI in the cloud with another vendor, would this requirement be N/A, or does MEAG still need
to develop a risk assessment document (program/process) in the event we decide to use a cloud vendor for our BCSI in the future?
2.
CIP-011 R2 deals with a key management program. Is this for physical and/or cyber? This requirement seems to assume that all entities would
have a key server for authentication, revocation, etc. Is this only for those entities that are using a 3rd party vendor to store BCSI? However, what
about those entities that don’t issue ‘keys’. For example, MEAG encrypts its files on the MEAG shared drive, but it is protected only by a secure
password that is given to only a 3 people; the IS Administrators can’t even see the contents of the files. Does MEAG need to call the software vendor to
ask how files are encrypted by the software and how the keys get processed on the PC? The encryption on the files works in the background; MEAG
has no control on that process. So, can this requirement be N/A for MEAG Power? Will N/A be allowed by the Auditors?
Likes
0
Dislikes
0
Response
Masuncha Bussey - Duke Energy - 1,3,5,6 - SERC, Group Name Duke Energy
Answer
No
Document Name
Comment
Duke Energy generally agrees that these requirements will promote a better understanding of security risks. Duke Energy would like better
understanding of the opportunities to address appropriate security controls. Also, Duke Energy would like more clarity on what consitutues an
acceptable risk assessment and/or what other options would suffice instead of a risk assessment.
Likes
0
Dislikes
0
Response
William Hutchison - Southern Illinois Power Cooperative - 1
Answer
No
Document Name
Comment
Comments: Doing a risk assessment of an 3rd party / offsite storage provider is practically useless. The best a RE will get from most providers is a
SOC1 or SOC-2 report. The way this is written today only creates compliance risk and burden on the RE. The majority of offsite/Cloud provider storage
solutions (a majority if not all the providers RE’s would use) are not the issue when it comes to security risks. These types of businesses would not be
in business if they did not have strong security systems in place and would not be used by Federal, State, Local governments and Fortune ranked
companies. Instead of putting the burden on the RE, NERC/FERC needs create an approval process and keep an approved published list of 3rd party
storage vendors list for RE’s to be able to use. This is exactly what is done for government and government contractors. This would be more efficient,
more in-depth, and not create compliance burden on the RE’s. This would not restrict competition or violate any laws as any 3rd party would be able to
go through the process to get approved.
Likes
0
Dislikes
0
Response
Kevin Conway - Public Utility District No. 1 of Pend Oreille County - 1
Answer
No
Document Name
Comment
This type of requirement often becomes a problem during enforcement, when the auditors evaluate the quality of the assessments. This is a reoccuring
issue with the auditors, and can only be resolved through more specific wording in the requirements.
Likes
0
Dislikes
0
Response
Laura Nelson - IDACORP - Idaho Power Company - 1
Answer
No
Document Name
Comment
Likes
0
Dislikes
Response
0
Allan Long - Memphis Light, Gas and Water Division - 1
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Adrian Andreoiu - BC Hydro and Power Authority - 1, Group Name BC Hydro
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Constantin Chitescu - Ontario Power Generation Inc. - 5
Answer
Yes
Document Name
Comment
OPG is in agreement with RSC provided comment
Likes
0
Dislikes
0
Response
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name RSC no NextEra
Answer
Document Name
Yes
Comment
1)
We have strong apprehensions on “mitigate” in Part 1.4 and possibly push some to vote NO on this project. See #2 for more feedback.
2)
We agree with that Part 1.4 will promote a better understanding the security risks involved. We have serious concerns with these controls. Entities
have little control of vendors OR the vendors of the primary vendors. We recommend the path laid out by CIP-013 – a) have a plan and b) implement
that plan. The potential costs of these controls may not produce an effective result. Plus the submitted feedback to Standards Efficiency Review tends
to question the value of annual reviews for the sake of a review instead of a trigger.
3)
We request this SDT consider if these vendor controls (mitigations) belong in CIP-013.
4)
No consensus on Part 2.1
5)
We request clarification of physical security - will Part 2.2 be difficult to implement where the custodian and the person with the key are the same?
Likes
0
Dislikes
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Yes
Document Name
Comment
Texas RE recommends the SDT define the term “vendor”, which is used in Part 1.4 as well as referenced in CIP-005-6 and CIP-013-1. This would
ensure an understanding of what is considered a vendor.
Likes
0
Dislikes
0
Response
Jonathan Robbins - Seminole Electric Cooperative, Inc. - 4
Answer
Yes
Document Name
Comment
We believe the proposed vendor risk assessment is best under CIP-011 rather than combining with CIP-013.
Likes
Dislikes
0
0
Response
Leonard Kula - Independent Electricity System Operator - 2
Answer
Yes
Document Name
Comment
IESO agrees in principle with the comments submitted by NPCC
We agree with that Part 1.4 will promote a better understanding the security risks involved. We have serious concerns with these controls:
1. We have strong apprehensions on “mitigate” in Part 1.4 and possibly push some to vote NO on this project. Entities have little control of
vendors their subcontractors vendors. We prefer the SDT consider that these vendor controls (mitigations) belong in CIP-013. If the SDT leaves
these controls in CIP-011, we recommend the same type of strategy used in CIP-013 – a) have a plan and b) implement that plan rather that
“mitigate”
2. In regards to Part 2.2 , we request clarification with respect to physical security - Part 2.2 may be difficult to implement where the custodian and
the person with the key are the same?
Likes
0
Dislikes
0
Response
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name Public Utility District No. 1 of Chelan County
Answer
Yes
Document Name
Comment
Please clarify if R1.4 would apply only to vendors providing storage as a service for BCSI, or if it would apply to any vendor possessing any amount of
BCSI.
Likes
0
Dislikes
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Document Name
Comment
Yes
We would encourage the SDT to include a time frame for when 3rd party security mitigations need to be completed. It is an improvement to see that a
date must be included for closure of identified security risks, but this is still open ended and will not ensure timely closure of risks.
Likes
0
Dislikes
0
Response
Dmitriy Bazylyuk - NiSource - Northern Indiana Public Service Co. - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jamie Monette - Allete - Minnesota Power, Inc. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
Yes
Document Name
Comment
Likes
Dislikes
0
0
Response
Anton Vu - Los Angeles Department of Water and Power - 6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Truong Le - Truong Le On Behalf of: Carol Chinn, Florida Municipal Power Agency, 6, 4, 5, 3; Chris Gowder, Florida Municipal Power Agency,
6, 4, 5, 3; Dale Ray, Florida Municipal Power Agency, 6, 4, 5, 3; David Owens, Gainesville Regional Utilities, 1, 5, 3; Richard Montgomery,
Florida Municipal Power Agency, 6, 4, 5, 3; - Truong Le
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Dwayne Parker - CMS Energy - Consumers Energy Company - 4
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Donald Lynd - CMS Energy - Consumers Energy Company - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Karl Blaszkowski - CMS Energy - Consumers Energy Company - 3
Answer
Yes
Document Name
Comment
Likes
Dislikes
0
0
Response
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 1,3,4,5 - RF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kathryn Tackett - NiSource - Northern Indiana Public Service Co. - 5
Answer
Document Name
Comment
See Steven Toosevich's comments.
Likes
0
Dislikes
0
Response
Kinte Whitehead - Exelon - 3
Answer
Document Name
Comment
Exelon supports EEI's comments on behalf of Exelon Segments 1, 3, 5, and 6.
Likes
0
Dislikes
0
Response
Payam Farahbakhsh - Hydro One Networks, Inc. - 1
Answer
Document Name
Comment
We support NPCC RSC comments.
Likes
0
Dislikes
0
Response
Susan Sosbe - Wabash Valley Power Association - 3
Answer
Document Name
Comment
While this will promote a better understanding of the requirements, it suffers in that internally stored information does not require the same types of
controls as externally stored information. For example, a company may encrypt all data storage, whether or not BCSI. However, requiring a separate
key custody process for internally stored information in small registered entities is an excessive and overly prescriptive requirements.
Likes
0
Dislikes
Response
0
7. The SDT is addressing the growing demand for Responsible Entities to leverage new and future technologies such as cloud services. Do
you agree that the proposed changes support this endeavor?
Kevin Conway - Public Utility District No. 1 of Pend Oreille County - 1
Answer
No
Document Name
Comment
There is not enough detail to address large service providers who will not cooperate with an entity for risk assessments for cloud
computing. Companies such as MicroSoft have not be very cooperative in helping us assure that the information is protected. All companies should be
able to be held to a common standard.
Likes
0
Dislikes
0
Response
Joe Tarantino - Joe Tarantino On Behalf of: Arthur Starkovich, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Beth Tincher, Sacramento
Municipal Utility District, 4, 1, 6, 3, 5; Jamie Cutlip, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Kevin Smith, Balancing Authority of
Northern California, 1; Nicole Goi, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Nicole Looney, Sacramento Municipal Utility District, 4, 1,
6, 3, 5; - Joe Tarantino
Answer
No
Document Name
Comment
The revisions make the use of specific technologies less apparent and adds to complexity. If cloud is permitted, it should list this as an example.
Likes
0
Dislikes
0
Response
Dana Klem - MRO - 1,2,3,4,5,6 - MRO, Group Name MRO NSRF
Answer
Document Name
Comment
No
As indicated in our previous responses, especially to Q3 and Q6, we believe that the proposed Requirements, by overly focusing on and prescribing
technologies, will instead significantly increase administrative activities and costs as well as introduce significant new compliance risks, and may
discouraging Responsible Entities from pursuing such options.
Likes
0
Dislikes
0
Response
Amy Casuscelli - Xcel Energy, Inc. - 1,3,5,6 - MRO,WECC
Answer
No
Document Name
Comment
Xcel Energy support the comments submitted by EEI.
Likes
0
Dislikes
0
Response
Jeremy Voll - Basin Electric Power Cooperative - 3
Answer
No
Document Name
Comment
Support the MRO NSRF comments
Likes
0
Dislikes
0
Response
Bruce Reimer - Manitoba Hydro - 1
Answer
Document Name
Comment
No
Agree with SDT’s idea and disagree with the written language that is vague. Cloud storage and encryption technologies are not explicitly excluded
under the current standards, where the registered entity could include NDA or contract provisions that require vendors to provide BCSI access and
handling evidence in order to meet CIP-011 and CIP-004 requirements. Even though the new requirements R1.4 and R2 try to provide other cloud
services solutions, we haven’t see the cloud storage and encryption language in the revised requirements.
SDT should focus on revising or developing new requirements that meet the objective of protecting access to BCSI without constraining or prescribing
types of storage solutions such as physical and electronic access controls. Any new Requirements need to address cloud services should clearly state
that in the requirement language.
Currently CIP-004-6 adequately addresses access controls to BCSI when stored by the responsible entity. The issue with the current access
requirements is when applied to offsite vendors due to the fact that the Responsible Entity cannot control a vendor’s access to the BCSI even though
NDA could be used for the compliance.
Likes
0
Dislikes
0
Response
Matthew Nutsch - Seattle City Light - 1,3,4,5,6 - WECC
Answer
No
Document Name
Comment
Seattle supports the comments of SMUD to this question.
Likes
0
Dislikes
0
Response
Kjersti Drott - Tri-State G and T Association, Inc. - 1
Answer
No
Document Name
Comment
The changes do show support and leverage towards new and future technologies but they are too specific and do not provide flexibility for the various
solutions and security controls that could vary.
Likes
0
Dislikes
0
Response
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
No
Document Name
Comment
The focus needs to be on protecting access to the information. This should be performed in a vendor/platform neutral manner - whether the systems are
administered by in-house personnel or hosted on a shared cloud-based hosting provider, the outcome, regardless, should be that access to the
information is limited to authorized individuals only. As such, suggest re-architect the standard to be outcome based so as not to preclude using specific
technologies or adoption of emergent solutions.
Likes
0
Dislikes
0
Response
Todd Bennett - Associated Electric Cooperative, Inc. - 3, Group Name AECI
Answer
No
Document Name
Comment
AECI supports comments filed by NRECA
Likes
0
Dislikes
0
Response
Barry Lawson - National Rural Electric Cooperative Association - 4
Answer
No
Document Name
Comment
NRECA agrees that the proposed revisions support this endeavor as related to specifically configured cloud storage services; however, we observe that
the proposed revisions are very limiting relative to compatibility with future or differently configured storage solutions and impose new, different, and
unnecessary compliance obligations on entities regardless of whether they are pursuing such options. NRECA is concerned that the way this has been
incorporated outweighs the value of the proposed revisions relative to taking small steps toward addressing the use of could services. NRECA does not
support the proposed revisions.
Likes
0
Dislikes
0
Response
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
No
Document Name
Comment
We agree with MRO NSRF comments: “we believe that the proposed Requirements, by overly focusing on and prescribing technologies, will instead
significantly increase administrative activities and costs as well as introduce significant new compliance risks”.
Likes
0
Dislikes
0
Response
Andrea Barclay - Georgia System Operations Corporation - 4
Answer
No
Document Name
Comment
GSOC agrees that the proposed revisions support this endeavor as related to specifically configured cloud storage services; however, observes that the
proposed revisions are very limiting relative to compatibility with future or differently configured storage solutions and impose new, different, and
unnecessary compliance obligations on entities regardless of whether they are pursuing such options. For this reason, GSOC is concerned that the
manner in which this has been incorporated outweighs the value of the proposed revisions relative to taking small steps toward addressing the use of
cloud services. As well, GSOC notes, again, that standard revisions to accommodate cloud storage are unnecessary and would be better addressed in
implementation or compliance guidance. For these reasons, GSOC does not support the proposed revisions.
Likes
0
Dislikes
0
Response
Lana Smith - San Miguel Electric Cooperative, Inc. - 5
Answer
No
Document Name
Comment
SMEC agrees with comments submitted by NRECA.
Likes
0
Dislikes
0
Response
Leonard Kula - Independent Electricity System Operator - 2
Answer
No
Document Name
Comment
No because of Part 1.5 still requires revocation of individual access privileges for third party vendors. This requires additional administrative burden for
entities as they have little control over third parties. As a suggestion, the SDT could consider wording vendor access controls within “have/ implement a
plan which addresses risks associated with vendor access to BCSI”
Likes
0
Dislikes
0
Response
Chris Wagner - Santee Cooper - 1, Group Name Santee Cooper
Answer
No
Document Name
Comment
Understand the growing use of cloud services for storage solutions, but it may be simpler to have a stand alone standard that address just cloud storage
or have the applicability for just cloud services.
Likes
0
Dislikes
0
Response
sean erickson - Western Area Power Administration - 1
Answer
No
Document Name
Comment
The requirements should be moved to appropriate standards. The vendor requirements should be moved to CIP-013 as applicable. Part of
the SCRM plan should be evaluating cloud services to meet the needs of applicable standards in scope.
R1.4 - The proposed language describes actiosn which should occur in supply chain management and should not be addressed in CIP-011.
R1.4.3 – remove the term “Mitigation Plan.” This is a confusing term which connotates a regulatory mitigation plan filed w/ the ERO.
R1.4.3 – “Remediate” and “mitigate” are different actions. Please choose one or the other when using these terms
Likes
0
Dislikes
0
Response
Gerry Adamski - Cogentrix Energy Power Management, LLC - 5
Answer
No
Document Name
Comment
I believe the team should consider specifying the security objectives for use of third-party storage solutions, and not limit the discussion to a risk profile
similar to CIP-013. Understanding the third-party risk profile does not go far enough. When the third-party has access to an entity's BCSI, there must
be a thorough understand of how the entity revents unauthorized access, manages and limits user permissions, etc. against a well-defined set of
objectives.
Likes
0
Dislikes
0
Response
Vivian Moser - APS - Arizona Public Service Co. - 3
Answer
No
Document Name
Comment
While the proposed requirements are a step in the right direction relative to cloud storage solutions, the language as written for Part 1.2 creates the
unintended consequence of limiting the types of technology (current and future) that can be used due to the access management methods that would
be necessary to implement and evidence. In support of AZPS’s response to Question No. 4, AZPS believes leveraging new and future technologies
would require a focus on preventing unauthorized access to identified storage locations as stated in Part 1.1, rather than a requirement to evidence
eliminating the ability to obtain and use. Alternatively, establishing a clear delineation between preventing unauthorized access to identified storage
locations and the protection of BCSI during transit, use, and disposal would also provide ability to leverage different technologies.
Likes
0
Dislikes
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
No
Document Name
Comment
New and emerging technologies shift the paradigm of security controls away from a specific storage location/repository to the ability to access and use
the information itself. For example, an entity that utilizes file level security can apply encrypted protections on the data that preclude unauthorized
access to the data regardless of where it is stored. Requiring a list of storage locations is an antiquated construct that disincentivizes entities from using
potentially more secure mechanisms because of the impossibility of compliance with documenting storage locations. The requirement should be
technology agnostic and objective based, so it is written to focus on the implementation of effective methods that afford adequate security protections to
prevent unauthorized access to the information.
Likes
0
Dislikes
0
Response
Janelle Marriott Gill - Tri-State G and T Association, Inc. - 3
Answer
No
Document Name
Comment
The changes do show support and leverage towards new and future technologies but they are too specific and do not provide flexibility for the various
solutions and security controls that could vary.
Likes
0
Dislikes
0
Response
Jonathan Robbins - Seminole Electric Cooperative, Inc. - 4
Answer
No
Document Name
Comment
See NRECA submitted comments.
Likes
0
Dislikes
0
Response
Nicholas Lauriat - Network and Security Technologies - 1
Answer
No
Document Name
Comment
N&ST believes proposed requirements CIP-011-3 Requirement R1, Part 1.4, and R2 Parts 2.1 and 2.2 are more likely to inhibit the use of cloud-based
BCSI storage solutions than to promote it.
Likes
0
Dislikes
0
Response
Sandra Shaffer - Berkshire Hathaway - PacifiCorp - 6
Answer
No
Document Name
Comment
We agree that the proposed changes address the demand to leverage new and future technologies.
We disagee with the changes made to CIP-011 R1.3 and R1.5. This change expands the scope of these requirements beyond the original BCSI
access requirements in CIP-004-6 R4 and R5 . We suggest that CIP-011 R1.3 and R1.5 be changed to processes related to designated BCSI storage
locations, thus maintaining the spirit of the CIP-004 access management requirements.
Likes
0
Dislikes
Response
0
Sean Bodkin - Dominion - Dominion Resources, Inc. - 6, Group Name Dominion
Answer
No
Document Name
Comment
Dominion Energy supports the work the SDT has done on develoing the current draft. Dominion energy suggests that the team focus on the approach
taken in the current NERC CMEP Guidance document in addressing the issue and further supports EEIs comments. The current approach taken by the
SDT appears too proscriptive and should remain flexiable and technology agnostic rather than stipulating a particular process or tool, such as key
management.
Likes
0
Dislikes
0
Response
David Jendras - Ameren - Ameren Services - 3
Answer
No
Document Name
Comment
Ameren agrees with and supports EEI comments.
Likes
0
Dislikes
0
Response
Kagen DelRio - North Carolina Electric Membership Corporation - 3,4,5 - SERC
Answer
No
Document Name
Comment
NCEMC supports the comments by Barry Lawson, National Rural Electric Cooperative Association and ACES
Likes
0
Dislikes
Response
0
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
No
Document Name
Comment
This is very similar to Question 3. Please refer to Question 3 response.
Likes
0
Dislikes
0
Response
Tho Tran - Tho Tran On Behalf of: Lee Maurer, Oncor Electric Delivery, 1; - Tho Tran
Answer
No
Document Name
Comment
Yes, the proposed chages support future technologies but do not provide flexibility in as need.
Likes
0
Dislikes
0
Response
Bridget Silvia - Sempra - San Diego Gas and Electric - 3
Answer
No
Document Name
Comment
SDG&E supports EEI’s comments submitted on our behalf.
Likes
0
Dislikes
0
Response
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
No
Document Name
Comment
ITC supports the response found in the NSRF Comment Form
Likes
0
Dislikes
0
Response
Quintin Lee - Eversource Energy - 1, Group Name Eversource Group
Answer
No
Document Name
Comment
Although the SDT is addressing the industry's request to add cloud services to store BSCI, the SDT needs to address the how to mitiage the individual
terminations at third parties. It is unclear if the entities need to have an information agreement with individuals at a cloud service or with the cloud
service company.
Likes
0
Dislikes
0
Response
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
No
Document Name
Comment
We agree that the proposed changes address the demand to leverage new and future technologies.
We disagee with the changes made to CIP-011 R1.3 and R1.5. This change expands the scope of these requirements beyond the original BCSI
access requirements in CIP-004-6 R4 and R5 . We suggest that CIP-011 R1.3 and R1.5 be changed to processes related to designated BCSI storage
locations, thus maintaining the spirit of the CIP-004 access management requirements.
Likes
0
Dislikes
Response
0
Ayman Samaan - Edison International - Southern California Edison Company - 1
Answer
No
Document Name
Comment
Please see comments submitted by Edison Electric Institute
Likes
0
Dislikes
0
Response
David Rivera - New York Power Authority - 3
Answer
No
Document Name
Comment
No because of individual terminations at third parties.
Likes
0
Dislikes
0
Response
Devin Shines - PPL - Louisville Gas and Electric Co. - 1,3,5,6 - SERC,RF, Group Name PPL NERC Registered Affiliates
Answer
No
Document Name
Comment
We appreciate the SDT’s efforts to make changes that allow entities to leverage new and future technologies. We believe that the changes made here
do support the concept of using cloud services; however, those changes should not impact an entity that does not use that technology. The SDT should
consider that not all entities will use cloud services and should ensure that the changes do not negatively impact or create an additional burden to those
entities.
Likes
0
Dislikes
Response
0
Wayne Guttormson - SaskPower - 1
Answer
No
Document Name
Comment
Support MRO comments.
Likes
0
Dislikes
0
Response
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
No
Document Name
Comment
The standards development team should support specific requirements providing appropriate levels of security for Cloud Service Providers and 3rd
Party Access. Transferring the CIP-004 BCSI requirements to CIP-011 does not address the unique issues created by storing BCSI in repositories that
are not controlled by registered entities. The standards development team should draft separate requirements.
Likes
0
Dislikes
0
Response
Bobbi Welch - Midcontinent ISO, Inc. - 2
Answer
No
Document Name
Comment
No. As written, the proposed changes may not sufficiently support this endeavor much more than the existing standards. MISO proposes the following
changes to provide additional clarity.
As noted under our response to question 1, to more clearly articulate the key distinctions mentioned during the Q&A portion of the 2019-02: BES Cyber
System Information Access Management webinar hosted on January 16, 2020, MISO proposes the SDT expand the language of the last example
provided under requirement R1, Part 1.1, Measures as follows:
“Storage locations (physical or electronic, responsible entity or vendor hosted) identified for housing BES Cyber System Information in the entity’s
information protection program”
Likes
0
Dislikes
0
Response
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
No
Document Name
Comment
EEI member companies appreciate the efforts by the SDT to enhance Responsible Entities ability to leverage new and future technologies such as
cloud-based services. However, the framework, as written, is too narrow and could potentially limit the use of future innovations and technologies that
might yield better security and efficiencies.
Likes
0
Dislikes
0
Response
Gregory Campoli - New York Independent System Operator - 2
Answer
No
Document Name
Comment
NYISO feels that the proposed changes may not sufficiently support this endeavor more so than the language contained within the existing standards,
NYISO offers the following suggested changes to provide additional clarity.
NYISO proposes the SDT expand the language of the last example provided under requirement R1, Part 1.1, Measures as follows:
“Storage locations of either physical or electronic data housed within a responsible entity’s Physical Security Perimeter or housed within a vendor’s
hosted environment be identified as BES Cyber System Information locations as part of the entity’s information protection program”
NYISO understands that R1.4 and R2 attempts to cover this detail, however NYIOS feels that additional clarification is needed. NYISO’s stance is that
third party personnel may have physical or electronic access to encrypted BCSI, but as long as they do not have access to the keys for decrypting the
BCSI, the information should be considered sufficiently protected.
Likes
0
Dislikes
Response
0
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name RSC no NextEra
Answer
No
Document Name
Comment
No because of individual terminations at third parties.
Likes
0
Dislikes
0
Response
Marty Hostler - Northern California Power Agency - 5
Answer
No
Document Name
Comment
In our very the existing standard already allows. It appears NERC and FERC is not will to advertise this to entities.
Likes
0
Dislikes
0
Response
Holly Chaney - Snohomish County PUD No. 1 - 3, Group Name SNPD Voting Members
Answer
No
Document Name
Comment
Please see response to Question 3, above. Without explicit and affirmative language, the proposed change does nothing to clarify the issue. Entities
will not likely move toward cloud storage for BCSI unless CIP language specifically supports cloud storage in those terms.
Likes
1
Dislikes
Public Utility District No. 1 of Snohomish County, 4, Martinsen John
0
Response
Jenifer Holmes - Alliant Energy Corporation Services, Inc. - 4 - MRO,RF
Answer
No
Document Name
Comment
Alliant Energy agrees with NSRF and EEI’s comments.
While Alliant Energy appreciates the SDT’s efforts to expand information storage solutions or security technologies for responsible entities, that
expansion is only useful if the requirement language is written such that it is clearly auditable. The updated requirements should avoid the ability to audit
to prescriptive requirements that are not stated in the language of the requirements.
Likes
0
Dislikes
0
Response
Dmitriy Bazylyuk - NiSource - Northern Indiana Public Service Co. - 3
Answer
No
Document Name
Comment
See Steven Toosevich's comments.
Likes
0
Dislikes
0
Response
Constantin Chitescu - Ontario Power Generation Inc. - 5
Answer
No
Document Name
Comment
OPG is in agreement with RSC provided comment
Likes
0
Dislikes
0
Response
James Brown - California ISO - 2 - WECC
Answer
No
Document Name
Comment
Please see comments to question #3 and #6.
Likes
0
Dislikes
0
Response
Ryan Olson - Portland General Electric Co. - 5, Group Name PGE Group 2
Answer
No
Document Name
Comment
PGE agrees with EEI’s comments
Likes
0
Dislikes
0
Response
Jennie Wike - Jennie Wike On Behalf of: Hien Ho, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; John Merrell, Tacoma Public Utilities
(Tacoma, WA), 3, 1, 4, 5, 6; Marc Donaldson, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Ozan Ferrin, Tacoma Public Utilities (Tacoma,
WA), 3, 1, 4, 5, 6; Terry Gifford, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; - Jennie Wike
Answer
No
Document Name
Comment
There is a significant barrier in the proposed language to adoption of cloud services with regard to the EACMS definition remaining as it stands. The
proposed changes do not offer entities the opportunity to make use of Managed Security Service Providers (MPPS) for their most critical systems
because the systems deployed by the MSSP would still fall into the EACMS bucket.
A possible solution would be to move forward with a split of the EACMS definition into EACS and EAMS, with BCSI requirements (CIP-011) applying to
EAMS, and system hardening requirements (CIP-006, CIP-007, & CIP-010) applying to EACS.
Likes
0
Dislikes
Response
0
Angela Gaines - Portland General Electric Co. - 1
Answer
No
Document Name
Comment
Please see comments PGE Group 2
Likes
0
Dislikes
0
Response
Dennis Sismaet - Northern California Power Agency - 6
Answer
No
Document Name
Comment
In our view the existing standard already allows. It appears NERC and FERC is not willing to advertise this to entities.
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
No
Document Name
Comment
We agree that the proposed changes address the demand to leverage new and future technologies.
We disagee with the changes made to CIP-011 R1.3 and R1.5. This change expands the scope of these requirements beyond the original BCSI
access requirements in CIP-004-6 R4 and R5. We suggest that CIP-011 R1.3 and R1.5 be changed to processes related to designated BCSI storage
locations, thus maintaining the spirit of the CIP-004 access management requirements.
Likes
0
Dislikes
Response
0
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
No
Document Name
Comment
ERCOT refers the drafting team to ERCOT's responses to Question Nos. 3 & 6.
Likes
0
Dislikes
0
Response
Douglas Webb - Douglas Webb On Behalf of: Allen Klassen, Westar Energy, 6, 3, 1, 5; Bryan Taggart, Westar Energy, 6, 3, 1, 5; Derek Brown,
Westar Energy, 6, 3, 1, 5; Grant Wilkerson, Westar Energy, 6, 3, 1, 5; James McBee, Great Plains Energy - Kansas City Power and Light Co., 1,
3, 6, 5; Jennifer Flandermeyer, Great Plains Energy - Kansas City Power and Light Co., 1, 3, 6, 5; John Carlson, Great Plains Energy - Kansas
City Power and Light Co., 1, 3, 6, 5; Marcus Moor, Great Plains Energy - Kansas City Power and Light Co., 1, 3, 6, 5; - Douglas Webb, Group
Name Westar-KCPL
Answer
No
Document Name
Comment
Westar and Kansas City Power & Light Company, endorse Edison Electric Institute's (EEI) comments.
Likes
0
Dislikes
0
Response
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
No
Document Name
Comment
We agree that the proposed changes address the demand to leverage new and future technologies.
We disagee with the changes made to CIP-011 R1.3 and R1.5. This change expands the scope of these requirements beyond the original BCSI
access requirements in CIP-004-6 R4 and R5. We suggest that CIP-011 R1.3 and R1.5 be changed to processes related to designated BCSI storage
locations, thus maintaining the spirit of the CIP-004 access management requirements.
Likes
0
Dislikes
0
Response
Michael Puscas - ISO New England, Inc. - 2
Answer
No
Document Name
Comment
Comments: No, see comments to question 6.
Likes
0
Dislikes
0
Response
Bradley Collard - SunPower - 5
Answer
No
Document Name
Comment
Agree with Tennessee Valley Authority’s comments about protecting access in a vendor/platform neutral manner. The focus should not be on where it is
stored but how access to the documents is secured.
Likes
0
Dislikes
0
Response
Allan Long - Memphis Light, Gas and Water Division - 1
Answer
Document Name
Comment
No
Likes
0
Dislikes
0
Response
Laura Nelson - IDACORP - Idaho Power Company - 1
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Susan Sosbe - Wabash Valley Power Association - 3
Answer
Yes
Document Name
Comment
The standard introduces appropriate controls for cloud storage environments. However, the standard is not specific to cloud storage and some of the
items are not reasonable for internally stored information.
Likes
0
Dislikes
0
Response
Masuncha Bussey - Duke Energy - 1,3,5,6 - SERC, Group Name Duke Energy
Answer
Yes
Document Name
Comment
Duke Energy generally agrees that the SDT is addressing the growing demand for Responsible Entities to leverage new and future technologies such
as cloud services. Duke Energy suggests that the SDT clarify the wording of the requirements to match those of the technical rationale document. Also,
the requirements as written are problematic for reasons provided in previous and subsequent responses.
Likes
0
Dislikes
0
Response
Scott Miller - Scott Miller On Behalf of: David Weekley, MEAG Power, 3, 1; Roger Brand, MEAG Power, 3, 1; - Scott Miller
Answer
Yes
Document Name
Comment
It is a good step forward. We need to have clarifying language for concerns previously identified.
Likes
0
Dislikes
0
Response
Andrea Jessup - Bonneville Power Administration - 1,3,5,6 - WECC
Answer
Yes
Document Name
Comment
BPA supports the SDT’s direction; however, the language is not yet clear enough to adopt.
Likes
0
Dislikes
0
Response
Michael Johnson - Michael Johnson On Behalf of: James Mearns, Pacific Gas and Electric Company, 1, 3, 5; Marco Rios, Pacific Gas and
Electric Company, 1, 3, 5; Sandra Ellis, Pacific Gas and Electric Company, 1, 3, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
Yes
Document Name
Comment
PG&E believes the modifications clearly indicate that third-party providers of BCSI storage will be allowed and the objectives an entity should reach in
determining the risks of the third-party usage and remediation or mitigation of those risks as determined by the entity. The non-prescriptive nature of
some of the Requirement language such as “Method(s) to prevent unauthorized access” in CIP-011-3, R1, Part 1.2 could be unsettling to some entities
who want to be told what needs to be done, but the objective nature provides the flexibility the SDT is trying to achieve to future proof the Standard as
much as possible and not disallow technology or processes unknown to the SDT that a more prescriptive Requirement could disallow.
As noted in Question 6, PG&E does have concerns regarding the overlap of CIP-011 R1 P1.4 with CIP-013 R1 P1.1.
Likes
0
Dislikes
0
Response
Colleen Campbell - AES - Indianapolis Power and Light Co. - 3
Answer
Yes
Document Name
Comment
The requirement is a good start towards the security methodologies needed for cloud storage.
Likes
0
Dislikes
0
Response
William Hutchison - Southern Illinois Power Cooperative - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
Response
0
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 1,3,4,5 - RF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name Public Utility District No. 1 of Chelan County
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Karl Blaszkowski - CMS Energy - Consumers Energy Company - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Donald Lynd - CMS Energy - Consumers Energy Company - 1
Answer
Document Name
Comment
Yes
Likes
0
Dislikes
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Teresa Cantwell - Lower Colorado River Authority - 1,5, Group Name LCRA Compliance
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
Response
0
Kent Feliks - AEP - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Dwayne Parker - CMS Energy - Consumers Energy Company - 4
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Truong Le - Truong Le On Behalf of: Carol Chinn, Florida Municipal Power Agency, 6, 4, 5, 3; Chris Gowder, Florida Municipal Power Agency,
6, 4, 5, 3; Dale Ray, Florida Municipal Power Agency, 6, 4, 5, 3; David Owens, Gainesville Regional Utilities, 1, 5, 3; Richard Montgomery,
Florida Municipal Power Agency, 6, 4, 5, 3; - Truong Le
Answer
Document Name
Comment
Yes
Likes
0
Dislikes
0
Response
Anton Vu - Los Angeles Department of Water and Power - 6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Eli Rivera - CenterPoint Energy Houston Electric, LLC - NA - Not Applicable - Texas RE
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
Response
0
Adrian Andreoiu - BC Hydro and Power Authority - 1, Group Name BC Hydro
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jamie Monette - Allete - Minnesota Power, Inc. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Payam Farahbakhsh - Hydro One Networks, Inc. - 1
Answer
Document Name
Comment
We are looking forward to improved wordings before answering this question.
Likes
0
Dislikes
0
Response
Kinte Whitehead - Exelon - 3
Answer
Document Name
Comment
Exelon supports EEI's comments on behalf of Exelon Segments 1, 3, 5, and 6.
Likes
0
Dislikes
0
Response
Kathryn Tackett - NiSource - Northern Indiana Public Service Co. - 5
Answer
Document Name
Comment
See Steven Toosevich's comments.
Likes
0
Dislikes
Response
0
8. The SDT is proposing a new “key management” set of requirements. Do you agree that key management involving BCSI is integral to
protecting BCSI?
Bradley Collard - SunPower - 5
Answer
No
Document Name
Comment
The requirement is unclear if this is an electronic key or a physical key. This will add considerable costs to smaller entities. This is an undue burden for
the industry. If you control access through an effective DMS, behind firewalls, or through the cloud processes, adding electronic key controls as
prescribed by the Standard is unnecessarily burdensome for entities.
Likes
0
Dislikes
0
Response
Michael Puscas - ISO New England, Inc. - 2
Answer
No
Document Name
Comment
Comments: No, see comments to question 6. In addition, the key management items should be listed in the measures. Encryption should not be the
only acceptable method of protecting BCSI; methods should be based on risk. Recommendation: replace “key management” with “electronic data
protection methodology.”
Likes
0
Dislikes
0
Response
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
Document Name
Comment
R2 Applicability should be:
No
BES Cyber System Information stored in Vendor managed electronic BCSI Repositories, and pertaining to:
High Impact BES Cyber Systems and their associated:
1. EACMS; and
2. PACS; and
3. PCA
Medium Impact BES Cyber Systems with ERC and their associated:
1. EACMS; and
2. PACS; and
3. PCA
We recommend removing R2 from this Standard. Key management should not be specified as a means, as there are others. An entity should have the
flexibility to use something from their key management program as evidence of a control, without mandating specific requirements in the standard. The
ERO Enterprise CMEP Practice Guide: BES Cyber System Information dated April 26, 2019 suggests auditors review whether key management
practices were implemented based on best practices. The SAR did not seek to increase required controls. Rather, it seeks language clarification around
access controls and storage locations.
If R2 needs to be pursued, we recommend explicitly stating in R2.1 “develop cryptographic key process(es).” Add the term “cryptographic” as
applicable within the R2 parts. Without the specificity, the Requirement could be interpreted to include both cryptographic, electronic and physical key
management. We believe this was not the SDT’s intent.
Likes
0
Dislikes
0
Response
Douglas Webb - Douglas Webb On Behalf of: Allen Klassen, Westar Energy, 6, 3, 1, 5; Bryan Taggart, Westar Energy, 6, 3, 1, 5; Derek Brown,
Westar Energy, 6, 3, 1, 5; Grant Wilkerson, Westar Energy, 6, 3, 1, 5; James McBee, Great Plains Energy - Kansas City Power and Light Co., 1,
3, 6, 5; Jennifer Flandermeyer, Great Plains Energy - Kansas City Power and Light Co., 1, 3, 6, 5; John Carlson, Great Plains Energy - Kansas
City Power and Light Co., 1, 3, 6, 5; Marcus Moor, Great Plains Energy - Kansas City Power and Light Co., 1, 3, 6, 5; - Douglas Webb, Group
Name Westar-KCPL
Answer
Document Name
Comment
No
Westar and Kansas City Power & Light Company, endorse Edison Electric Institute's (EEI) comments.
Likes
0
Dislikes
0
Response
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
No
Document Name
Comment
ERCOT does not believe there is a benefit to defining separate "key management" requirements. ERCOT proposes the removal of the explicit
requirement and, if it is to be included at all, it should be included in the cloud vendor risk assessments considerations of Part 1.4 .
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
No
Document Name
Comment
R2 Applicability should be:
BES Cyber System Information stored in Vendor managed electronic BCSI Repositories, and pertaining to:
High Impact BES Cyber Systems and their associated:
1. EACMS; and
2. PACS; and
3. PCA
Medium Impact BES Cyber Systems with ERC and their associated:
1. EACMS; and
2. PACS; and
3. PCA
We recommend removing R2 from this Standard. Key management should not be specified as a means, as there are others. An entity should have the
flexibility to use something from their key management program as evidence of a control, without mandating specific requirements in the standard. The
ERO Enterprise CMEP Practice Guide: BES Cyber System Information dated April 26, 2019 suggests auditors review whether key management
practices were implemented based on best practices. The SAR did not seek to increase required controls. Rather, it seeks language clarification around
access controls and storage locations.
If R2 needs to be pursued, we recommend explicitly stating in R2.1 “develop cryptographic key process(es).” Add the term “cryptographic” as
applicable within the R2 parts. Without the specificity, the Requirement could be interpreted to include both cryptographic, electronic and physical key
management. We believe this was not the SDT’s intent.
Likes
0
Dislikes
0
Response
Dennis Sismaet - Northern California Power Agency - 6
Answer
No
Document Name
Comment
The proposed version is prescriptive overkill.
Likes
0
Dislikes
0
Response
Angela Gaines - Portland General Electric Co. - 1
Answer
No
Document Name
Comment
Please see comments PGE Group 2
Likes
0
Dislikes
Response
0
Jennie Wike - Jennie Wike On Behalf of: Hien Ho, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; John Merrell, Tacoma Public Utilities
(Tacoma, WA), 3, 1, 4, 5, 6; Marc Donaldson, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Ozan Ferrin, Tacoma Public Utilities (Tacoma,
WA), 3, 1, 4, 5, 6; Terry Gifford, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; - Jennie Wike
Answer
No
Document Name
Comment
When used in the cloud, this is integral to encrypting that data, however the use of key management by itself does nothing to protect data. Additionally,
when protecting BCSI on premise, there are many alternate controls that offer significant protections without the need to use key management
infrastructure.
Likes
0
Dislikes
0
Response
Ryan Olson - Portland General Electric Co. - 5, Group Name PGE Group 2
Answer
No
Document Name
Comment
PGE agrees with EEI’s comments
Likes
0
Dislikes
0
Response
James Brown - California ISO - 2 - WECC
Answer
No
Document Name
Comment
There is no benefit of defining separate key management requirements. Propose to remove the explicit requirement and, if at all, include in cloud vendor
risk assessments considerations of R1.4.
Likes
0
Dislikes
Response
0
Constantin Chitescu - Ontario Power Generation Inc. - 5
Answer
No
Document Name
Comment
OPG is in agreement with RSC provided comment
Likes
0
Dislikes
0
Response
Dmitriy Bazylyuk - NiSource - Northern Indiana Public Service Co. - 3
Answer
No
Document Name
Comment
See Steven Toosevich's comments.
Likes
0
Dislikes
0
Response
Jenifer Holmes - Alliant Energy Corporation Services, Inc. - 4 - MRO,RF
Answer
No
Document Name
Comment
Alliant Energy agrees with NSRF and EEI’s comments.
Specifically, if key management is not a requirement (due to the “where applicable” language in 2.1), then it is not appropriate to have this language in
the requirements section and would be better suited to guidance. The requirements should only state what is required. Additionally, it is unnecessary to
require a key management program for all BCSI, which includes BCSI stored at responsible entity facilities and physical key management.
Likes
0
Dislikes
Response
0
Holly Chaney - Snohomish County PUD No. 1 - 3, Group Name SNPD Voting Members
Answer
No
Document Name
Comment
A full and proper key management program/system is a big ask for small to medium utilities who could most benefit from cloud storage and/or managed
third-party storage solutions. In this case, SNPD once again suggests, that CIP language specifically authorize a Federal IT certification as sufficient to
account for proper and secure key management on the part of the certified vendor. For example, many other federal agencies use large MSSPs
(Azure/AWS) to store and secure highly sensitive information without the requirement to locally control the keys. If this is sufficient for large federal
agencies involved in national security, it seems that the same could be applied to BCSI. If local key management is maintained as a requirement within
the proposed changes, SNPD believes many utilities will take the path of least resistance, and/or the most conservative response and simply choose to
avoid cloud storage altogether – depriving utilities most in need of flexible off-prem storage the ability to realize the benefits.
Likes
1
Dislikes
Public Utility District No. 1 of Snohomish County, 4, Martinsen John
0
Response
Marty Hostler - Northern California Power Agency - 5
Answer
No
Document Name
Comment
The proposed version is prescriptive overkill
Likes
0
Dislikes
0
Response
Adrian Andreoiu - BC Hydro and Power Authority - 1, Group Name BC Hydro
Answer
No
Document Name
Comment
BC Hydro requests that additional clarity on the definition and application of "keys" as it relates to BCSI storage locations is provided before a
determination if this is integral to protecting BCSI can be made. During the NERC webinar on the proposed revisions it was indicated that keys are
inclusive of encryption passwords that enable an individual to access encrypted BCSI as well as physical keys that are used to access physical BCSI
storage locations; however, this is not considered sufficiently clear per the standard language.
Likes
1
Dislikes
BC Hydro and Power Authority, 5, Hamilton Harding Helen
0
Response
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name RSC no NextEra
Answer
No
Document Name
Comment
1)
We recommend “electronic data protection methodology” instead of “key management”.
2)
We recommend moving the “key management” language to the Measures.
Likes
0
Dislikes
0
Response
Gregory Campoli - New York Independent System Operator - 2
Answer
No
Document Name
Comment
NYISO feels that the requirements are too prescriptive regarding key management processes, administratively burdensome and lack a commensurate
tie to what is the measurable expected outcome; i.e. a) a stated level of reliability performance, b) a reduction in a specified reliability risk (prevention),
or c) a necessary competency. As noted under our response to question #6, NYISO recommends proposed CIP-011-3, requirement R2, Parts 2.1 and
2.2 be eliminated altogether and that key management be incorporated as an example under requirement R1.
NYISO would like to see terms such as cryptographic system or cryptosystem used. If the intent is that physical keys / locks are also a part of this
mandate, it should be stated explicitly. In general, encryption should not be the only acceptable method of protecting BCSI. The selected methods
should be based on risk.
Likes
0
Dislikes
0
Response
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
Document Name
No
Comment
EEI supports the use of “key management” for protecting BCSI at third party facilities. However, BCSI stored at responsible entity facilities are
addressed in CIP-004-6 and CIP-011-2 Reliability Standards and therefore should remain an effective compliance solution with only minor
modifications. The SDT should define the reliability objectives, not the method that must be used to accomplish the objective so that future technologies
that might provide better protections can be used.
Likes
0
Dislikes
0
Response
Eli Rivera - CenterPoint Energy Houston Electric, LLC - NA - Not Applicable - Texas RE
Answer
No
Document Name
Comment
The requirements fail to state specifically when a key management program is required. The requirement in Part 2.1 starts off with, “Where applicable“,
but there is no information in the proposed CIP-011-3 that provides any information on where or when it is applicable. The Technical Rationale also
fails to provide any clarity on where or when a key program is needed. Also the use of term “key” by itself causes confusion on whether the requirement
is referring to encryption keys or physical keys for mechanical locks. If the SDT is referring to encryption keys then they should use the term “encryption
key”.
Likes
0
Dislikes
0
Response
Bobbi Welch - Midcontinent ISO, Inc. - 2
Answer
No
Document Name
Comment
No – as written the requirements are too prescriptive to key management processes, administratively burdensome and lack a commensurate tie to what
is the measurable expected outcome; i.e. a) a stated level of reliability performance, b) a reduction in a specified reliability risk (prevention), or c) a
necessary competency. As noted under our response to question 6, MISO recommends proposed CIP-011-3, requirement R2, Parts 2.1 and 2.2 be
eliminated altogether and that key management be incorporated as an example under requirement R1.
Likes
0
Dislikes
Response
0
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
No
Document Name
Comment
The standards development team should state explicitly that "Key Management" refers to encryption keys.
Likes
0
Dislikes
0
Response
Wayne Guttormson - SaskPower - 1
Answer
No
Document Name
Comment
Support MRO comments.
Likes
0
Dislikes
0
Response
Devin Shines - PPL - Louisville Gas and Electric Co. - 1,3,5,6 - SERC,RF, Group Name PPL NERC Registered Affiliates
Answer
No
Document Name
Comment
We agree that in today’s environment, key management is widely used to support and manage the protection of information. However, our concern is
that when the technology advances, these changes become “outdated” and put the industry in the same spot we are today. Whenever the opportunity
arises to make changes to the standards, those changes should be risk-based and should not include a single technology solution.
Likes
0
Dislikes
Response
0
David Rivera - New York Power Authority - 3
Answer
No
Document Name
Comment
We recommend “electronic data protection methodology” instead of “key management”.
We recommend moving the “key management” language to the Measures.
If Key Management must be included, it should be ‘specific’, including the allowable key management options (rather than a long, and somewhat
‘vague’ list of possible controls).
Likes
0
Dislikes
0
Response
Ayman Samaan - Edison International - Southern California Edison Company - 1
Answer
No
Document Name
Comment
Please see comments submitted by Edison Electric Institute
Likes
0
Dislikes
0
Response
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
No
Document Name
Comment
R2 Applicability should be:
BES Cyber System Information stored in Vendor managed electronic BCSI Repositories, and pertaining to:
High Impact BES Cyber Systems and their associated:
1. EACMS; and
2. PACS; and
3. PCA
Medium Impact BES Cyber Systems with ERC and their associated:
1. EACMS; and
2. PACS; and
3. PCA
We recommend removing R2 from this Standard, key management should not be specified as a means, as there are others. An entity should have the
flexibility to use something from their key management program as evidence of a control, without mandating specific requirements in the standard. The
ERO Enterprise CMEP Practice Guide: BES Cyber System Information dated April 26, 2019 suggests auditors review whether key management
practices were implement based on best practices. The SAR did not seek to increase required controls. Rather, it seeks language clarification around
access controls and storage locations.
If R2 needs to be pursued, we recommend explicitly stating in R2.1 “develop cryptographic key process(es).” Add the term “cryptographic” as
applicable within the R2 parts. Without the specificity, the Requirement could be interpreted to include both cryptographic, electronic and physical key
management. We believe this was not the SDT’s intent.
Likes
0
Dislikes
0
Response
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
No
Document Name
Comment
ITC supports the response found in the NSRF Comment Form
Likes
0
Dislikes
0
Response
Bridget Silvia - Sempra - San Diego Gas and Electric - 3
Answer
Document Name
No
Comment
SDG&E supports EEI’s comments submitted on our behalf.
Additionally, SDG&E believes there is much ambiguity in the section describing the “key management program.” There should be more clarity on
whether these are physical keys or software keys. The goal of this key management program needs to be clearly defined.
SDG&E also seeks clarification on what items qualify to be in scope for the key management program. For example, SDG&E’s Information Protection
procedure accounts for unattended BCSI in transit (e.g., locked vehicle, locked briefcase, etc.). Since the SDT’s proposed changes are more focused
on BCSI rather than the storage location, this set of proposed requirements could bring in previously undesignated/unidentified locations into scope,
such as locked vehicles and locked briefcases.
Likes
0
Dislikes
0
Response
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
No
Document Name
Comment
Southern does not agree that key management is integral to protecting unencrypted BCSI. We do agree that key management of encrypted material is
integral to protecting any encrypted information. This question assumes all BCSI is encrypted and that is not the case. However, we believe the
detailed prescriptive requirements in R2 may work against the goal of being able to use cloud services.
For example, 8 different areas must be included in the key management program which are not discussed in the Technical Rationale document. A
Google search of “Key suppression” shows no results applicable to this requirement so entities are left to guess what is meant by the words chosen in
the requirement. Southern also questions why key revocation is listed twice in the same requirement part. Southern recommends that the areas of key
management required are further defined and included in the Technical Rationale. Furthermore, Southern recommends that future proposed revisions
of the Standard maintain the flexibility of not requiring encryption of BCSI when other controls can be implemented, such as access control
solutions. Key management practices should be based on best practices and would be reviewed and measured as such during audit review.
For Part 2.2, new terms and concepts are introduced that have no explanation, such as “BCSI Custodial entity” and their “custodial entity
duties”. Southern believes this requirement part is unnecessary as R1 is all about ensuring only authorized access is allowed to BCSI. Those who
manage the encryption keys are required to have access to perform such management, so a non-compliance issue with 2.2 is really a non-compliance
issue with R1 and Southern believes that only R1 is required to cover this risk.
Likes
0
Dislikes
Response
0
Kagen DelRio - North Carolina Electric Membership Corporation - 3,4,5 - SERC
Answer
No
Document Name
Comment
NCEMC supports the comments by Barry Lawson, National Rural Electric Cooperative Association and ACES
Likes
0
Dislikes
0
Response
David Jendras - Ameren - Ameren Services - 3
Answer
No
Document Name
Comment
Ameren agrees with and supports EEI comments.
Likes
0
Dislikes
0
Response
Sean Bodkin - Dominion - Dominion Resources, Inc. - 6, Group Name Dominion
Answer
No
Document Name
Comment
Dominion Energy supports the work the SDT has done on develoing the current draft. Dominion energy suggests that the team focus on the approach
taken in the current NERC CMEP Guidance document in addressing the issue and further supports EEIs comments. The current approach taken by the
SDT appears too proscriptive and should remain flexiable and technology agnostic rather than stipulating a particular process or tool, such as key
management.
Likes
0
Dislikes
Response
0
Andrea Jessup - Bonneville Power Administration - 1,3,5,6 - WECC
Answer
No
Document Name
Comment
BPA believes cryptographic key management is necessary for electronic information but the language proposed so far causes problems for physical
information storage (i.e., printed documents.)
Likes
0
Dislikes
0
Response
Sandra Shaffer - Berkshire Hathaway - PacifiCorp - 6
Answer
No
Document Name
Comment
R2 Applicability should be:
BES Cyber System Information stored in Vendor managed electronic BCSI Repositories, and pertaining to:
High Impact BES Cyber Systems and their associated:
1. EACMS; and
2. PACS; and
3. PCA
Medium Impact BES Cyber Systems with ERC and their associated:
1. EACMS; and
2. PACS; and
3. PCA
We recommend removing R2 from this Standard, key management should not be specified as a means, as there are others. An entity should have the
flexibility to use something from their key management program as evidence of a control, without mandating specific requirements in the standard. The
ERO Enterprise CMEP Practice Guide: BES Cyber System Information dated April 26, 2019 suggests auditors review whether key management
practices were implement based on best practices. The SAR did not seek to increase required controls. Rather, it seeks language clarification around
access controls and storage locations.
If R2 needs to be pursued, we recommend explicitly stating in R2.1 “develop cryptographic key process(es).” Add the term “cryptographic” as
applicable within the R2 parts. Without the specificity, the Requirement could be interpreted to include both cryptographic, electronic and physical key
management. We believe this was not the SDT’s intent.
Likes
0
Dislikes
0
Response
Nicholas Lauriat - Network and Security Technologies - 1
Answer
No
Document Name
Comment
N&ST considers proposed Requirement R2, Parts 2.1 and 2.2 vastly over-prescriptive. The goal here is to ensure that no individuals who manage BCSI
storage, whether in the Responsible Entity’s own data center or “in the cloud,” can access BCSI unless they have been properly authorized in
accordance with the requirements of CIP-004. Encryption and key management are certainly viable options, but they should remain options. N&ST
suggests moving them to the “Measures” associated with an appropriately re-worded requirement.
Likes
0
Dislikes
0
Response
Jonathan Robbins - Seminole Electric Cooperative, Inc. - 4
Answer
No
Document Name
Comment
See NRECA submitted comments.
Likes
Dislikes
0
0
Response
Janelle Marriott Gill - Tri-State G and T Association, Inc. - 3
Answer
No
Document Name
Comment
Managing keys does play an important role for protecting BCSI but in order to fully utilize new technology, key management cannot be the sole focus. It
is important to ensure there are other layered security measures in place to allow for flexibility with keys. Not all new and future technologies can be
implemented with such restricted key management requirements. Instead, we recommend the requirements be converted to objective-based
requirements by removing “which shall include the following: 2.1.1-2.1.9.”
Likes
0
Dislikes
0
Response
Vivian Moser - APS - Arizona Public Service Co. - 3
Answer
No
Document Name
Comment
AZPS does not agree that the proposed requirement to implement a key management program is integral to protecting BCSI. The addition of a
requirement for a specific access control method (i.e., a key management program) is too prescriptive. AZPS recommends the same approach as
discussed in previous comments above, wherein the focus remains on the protection of BCSI, rather than requiring specific controls. AZPS believes
that Entities are well-positioned to assess and implement access control methods best suited to protect their BCSI.
The Technical Rationale for CIP-011-3 states that a key management program provides an extra “layer of defense against bad actors who may have
the means to physically or electronically obtain BCSI but not use or modify BCSI but not use or modify BCSI”. AZPS does not believe that the risk
associated with obtaining BCSI but not being able to use or modify BCSI does not support implementation of a key management program.
Likes
0
Dislikes
0
Response
Gerry Adamski - Cogentrix Energy Power Management, LLC - 5
Answer
Document Name
Comment
No
No. Please see response to Q6. Key management is a possible measure for preventing unauthorized access, not an independent requirement.
Likes
0
Dislikes
0
Response
Chris Wagner - Santee Cooper - 1, Group Name Santee Cooper
Answer
No
Document Name
Comment
Key management should be a requirement for off-site storage of BCSI or BCSI in the cloud.
Likes
0
Dislikes
0
Response
Leonard Kula - Independent Electricity System Operator - 2
Answer
No
Document Name
Comment
We recommend “electronic data protection methodology” instead of “key management” which is too prescriptive
We recommend moving the “key management” language to the Measures
We would prefer the “If Applicable” to include language that says this is mandatory only if you are using encryption or encrypted protocols
Likes
0
Dislikes
0
Response
Lana Smith - San Miguel Electric Cooperative, Inc. - 5
Answer
No
Document Name
Comment
SMEC agrees with comments submitted by NRECA.
Likes
0
Dislikes
0
Response
Andrea Barclay - Georgia System Operations Corporation - 4
Answer
No
Document Name
Comment
If selected as the security control to for access to BCSI, then, encryption is integral to protecting BCSI. However, encryption is not the only method or
security control to the overall protection of BCSI. The focus of the “key management” requirements that were added to CIP-011, while helpful where
encryption is utilized, are somewhat limiting to and leave unaddressed other methods and security controls that could be employed to protect
BCSI. Further, use of the term “key” could create confusion and ambiguity regarding the scope of these requirements, e.g., does it address electronic
and physical key management or merely electronic key management. Finally, GSOC is concerned that, as written, these new requirements may not be
flexible enough to maintain applicability #3 technology changes and evolves. Please refer to GSOC’s response to question for additional comments
regarding the limited applicability of these newly proposed requirements.
Additionally, GSOC notes that “custodial entity” is an undefined term and, therefore, could be interpreted broadly and variably. Further, there is not a
clear indication of where or how the “controls” would be documented and maintained. This is significant as it interpretations of how to demonstrate
compliance during compliance monitoring could vary across entities during implementation and across regions and audit teams, resulting in
inconsistency in enforcement. As well, the use of the term “methods” within the measures has the potential to further complicate implementation and
interpretation.
Finally, GSOC is concerned that a single control failure would result in a violation of requirement R2.2 regardless of whether other controls existed and
duties remained separated. GSOC respectfully asserts that such ambiguity places auditors and Responsible Entities in uncertain and tenuous positions
that would likely cause both to militate toward conservatism, resulting in over-reporting and -enforcement. For these reasons, GSOC requests that the
SDT provide clarification of the term “custodial entity,” the expected compliance documentation, and the overall compliance obligation to avoid
unnecessary compliance activities and risk.
Likes
0
Dislikes
0
Response
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
No
Document Name
Comment
R2 Parts 2.1 and 2.2 exceed the scope of the SAR and significantly increase the compliance obligations. CIP-011 should remain non-prescriptive and
allow entities to implement the controls appropriate to their situations, which could be something other than encryption and key management. An entity
is free to use something from their key management program if they have one to use as evidence of a control, without mandating specific requirements
in the standard. The ERO Enterprise CMEP Practice Guide: BES Cyber System Information dated April 26, 2019 suggests auditors review whether key
management practices were implement based on best practices.
It is also unclear as to what “where applicable” means, and whether this requirement applies to physical keys and passwords to on premises systems.
Likes
0
Dislikes
0
Response
Barry Lawson - National Rural Electric Cooperative Association - 4
Answer
No
Document Name
Comment
If selected as the security control for access to BCSI, then, encryption is integral to protecting BCSI. However, encryption is not the only method or
security control to the overall protection of BCSI. The focus of the “key management” requirements that were added to CIP-011, while helpful where
encryption is utilized, are somewhat limiting to and leave unaddressed other methods and security controls that could be employed to protect
BCSI. Further, use of the term “key” could create confusion and ambiguity regarding the scope of these requirements, e.g., does it address electronic
and physical key management or merely electronic key management.
Additionally, NRECA notes that “custodial entity” is an undefined term and, therefore, could be interpreted broadly and variably. Further, there is not a
clear indication of where or how the “controls” would be documented and maintained. This is significant as interpretations of how to demonstrate
compliance during compliance monitoring could vary across entities during implementation and across regions and audit teams, resulting in inconsistent
enforcement. As well, the use of the term “methods” within the measures has the potential to further complicate implementation and interpretation.
Finally, NRECA is concerned that a single control failure would result in a violation of requirement R2.2 regardless of whether other controls existed,
and duties remained separated. NRECA believes such ambiguity places auditors and Responsible Entities in uncertain and tenuous positions that
would likely result in over-reporting and -enforcement. NRECA requests that the SDT provide clarification of the term “custodial entity,” the expected
compliance documentation, and the overall compliance obligation to avoid unnecessary compliance activities and risk.
Likes
0
Dislikes
0
Response
Todd Bennett - Associated Electric Cooperative, Inc. - 3, Group Name AECI
Answer
No
Document Name
Comment
AECI supports comments filed by NRECA
Likes
0
Dislikes
0
Response
Kent Feliks - AEP - 3
Answer
No
Document Name
Comment
AEP is of the opinion that key management methods can be either partially accessible or not accessible at all in certain cloud storage environments,
which could increase security risks associated with the protection of BCSI. We also feel it is unnecessary to develop a key management process for the
storage of BCSI within a Responsible Entity’s own facility, but without more clarification surrounding the “where applicable” language, we are unsure if
the language is specifically addressing third party storage locations or BCSI storage as a whole.
Likes
0
Dislikes
0
Response
Maryanne Darling-Reich - Black Hills Corporation - 1,3,5,6 - MRO,WECC
Answer
No
Document Name
Comment
While Black Hills does agree that key management is crucial and appreciates it addition, we think further clarification should be added for information
held by a provider or third-party. If the intent is for on-premis items as well, we think that key management should be listed as an example of possible
controls and not the sole means.
Likes
0
Dislikes
0
Response
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
No
Document Name
Comment
As such, suggest re-architect the standard to be outcome based so as not to preclude using specific technologies or adoption of emergent solutions. As
such, geo-location or biometric protections are not available as options to RE’s.
Likes
0
Dislikes
0
Response
Payam Farahbakhsh - Hydro One Networks, Inc. - 1
Answer
No
Document Name
Comment
We support NPCC RSC comments.
Likes
0
Dislikes
0
Response
Kjersti Drott - Tri-State G and T Association, Inc. - 1
Answer
No
Document Name
Comment
Managing keys does play an important role for protecting BCSI but in order to fully utilize new technology, key management cannot be the sole focus. It
is important to ensure there are other layered security measures in place to allow for flexibility with keys. Not all new and future technologies can be
implemented with such restricted key management requirements. Instead, Tri-State recommends the requirements be converted to objective-based
requirements by removing “which shall include the following: 2.1.1-2.1.9.”
Likes
0
Dislikes
0
Response
Matthew Nutsch - Seattle City Light - 1,3,4,5,6 - WECC
Answer
No
Document Name
Comment
Although key management can be an effective control and a good security practice, it is not integral to protecting BCSI in all cases. Focusing attention
on this one type of control once again ties the Standard to a specific technology concept that 1) is not applicable in all cases, 2) may become obsolete
in part or in whole from unexpected technological developments, and 3) stifles alternative and creative approaches to security. Seattle believes key
management should NOT be a specific requirement of the revised CIP-011, but it should be identified in the Measures and discussed in detail in the
guidance documents as one effective approach that can be applied in many (but not all) situations.
Likes
0
Dislikes
0
Response
Bruce Reimer - Manitoba Hydro - 1
Answer
No
Document Name
Comment
Agree with the proposing a new “key management” set of requirements, but need clarification for the written language in R2 (See our response in
Question 6).
Likes
0
Dislikes
0
Response
Jeremy Voll - Basin Electric Power Cooperative - 3
Answer
No
Document Name
Comment
Support the MRO NSRF comments
Likes
0
Dislikes
0
Response
Amy Casuscelli - Xcel Energy, Inc. - 1,3,5,6 - MRO,WECC
Answer
No
Document Name
Comment
Xcel Energy support the comments submitted by EEI.
Likes
0
Dislikes
0
Response
Dana Klem - MRO - 1,2,3,4,5,6 - MRO, Group Name MRO NSRF
Answer
No
Document Name
Comment
Key management should not be specified as the means; Entities should be free to pursue any means that achieves the objective. We believe protecting
BCSI is best handled in the CIP-004 Access Control Requirements.
R2 Part 2.1 should be deleted in its entirety.
Likes
0
Dislikes
0
Response
Joe Tarantino - Joe Tarantino On Behalf of: Arthur Starkovich, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Beth Tincher, Sacramento
Municipal Utility District, 4, 1, 6, 3, 5; Jamie Cutlip, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Kevin Smith, Balancing Authority of
Northern California, 1; Nicole Goi, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Nicole Looney, Sacramento Municipal Utility District, 4, 1,
6, 3, 5; - Joe Tarantino
Answer
No
Document Name
Comment
Including a key management requirement may burden entities who do not have a key managmenet infrastructure. The requirement also requires
encryption as a technology that some entities may not want to employ.
Likes
0
Dislikes
0
Response
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name Public Utility District No. 1 of Chelan County
Answer
Document Name
Comment
No
We believe that this requirement is currently not adequately defined. The requirement language implies that this refers to encryption key management,
but the technical rationale includes a physical component. It is not a trivial task to encrypt ALL BCSI, so please clarify that a key management program
is not required for situations where BCSI is protected via another means. The technical guidance contains only two paragraphs for a key management
program with nine management requirements. Please include technical examples that would suitable comply with each of the nine key management
activities.
Likes
0
Dislikes
0
Response
Scott Miller - Scott Miller On Behalf of: David Weekley, MEAG Power, 3, 1; Roger Brand, MEAG Power, 3, 1; - Scott Miller
Answer
No
Document Name
Comment
This question is ambiguos and need more clarity. "key managment" ? Proposed language is not sufficient. Stating no here to insure other concerns are
addressed.
Likes
0
Dislikes
0
Response
Masuncha Bussey - Duke Energy - 1,3,5,6 - SERC, Group Name Duke Energy
Answer
No
Document Name
Comment
Duke Energy does not agree with the new “key management” set of requirements. Duke Energy would like clarification if key management applies to
electronic keys only and not physical keys. It is unclear what constitutes a custodial entity. It ignores other options for securing physical BCSI (e.g.
badged access), and other forms of physical controls that could be used for access to physical BCSI.
Likes
0
Dislikes
0
Response
Susan Sosbe - Wabash Valley Power Association - 3
Answer
No
Document Name
Comment
The standard is appropriate for externally stored information under the direct control of the entity such as in a cloud environment. However, two cases
where this is unreasonable: (1) Information stored by a consulting partner under non-disclosure agreement on systems owned and operated by a
consulting partner. (2) Information stored internally on entity owned systems where the company has chosen to perform encryption for other reasons. I
would not look forward to maintaining a key management program on each Microsoft Windows computer protected with BitDefender.
Likes
0
Dislikes
0
Response
Kevin Conway - Public Utility District No. 1 of Pend Oreille County - 1
Answer
No
Document Name
Comment
This represents a large burden on smaller utilities and those who outsource support.
Likes
0
Dislikes
0
Response
Laura Nelson - IDACORP - Idaho Power Company - 1
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Allan Long - Memphis Light, Gas and Water Division - 1
Answer
Document Name
No
Comment
Likes
0
Dislikes
0
Response
Anton Vu - Los Angeles Department of Water and Power - 6
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Michael Johnson - Michael Johnson On Behalf of: James Mearns, Pacific Gas and Electric Company, 1, 3, 5; Marco Rios, Pacific Gas and
Electric Company, 1, 3, 5; Sandra Ellis, Pacific Gas and Electric Company, 1, 3, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
Yes
Document Name
Comment
PG&E agrees the addition of key management will be critical to the protection of BCSI not only in third-party environments, but also for internal usage to
protect BCSI. Key management will demonstrate to Audit Teams the entity has the BCSI protected, and a lack of key management will raise serious
concerns on how the BCSI is being protected.
As noted in Question 6, PG&E recommends the requirement language clearly indicate key management covers the physical and electronic types of
keys.
Likes
0
Dislikes
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
Document Name
Comment
Yes
While “key management” is one way to effectively protect BCSI, this is too prescriptive in dictating “how” to comply, and therefore not future proof. The
requirement should be technology agnostic and objective based, so it is written to focus on the implementation of effective methods that afford adequate
security protections to prevent unauthorized access to the information, so it is scalable and does not preclude use of new and emerging technologies as
they become available.
Likes
0
Dislikes
0
Response
sean erickson - Western Area Power Administration - 1
Answer
Yes
Document Name
Comment
R2. - Encryption of BCSI and key management is the only potential method for entities to be able to utilize cloud services yet control CIA of
data. It is imperative that access control include encryption as a method to prevent access
Likes
0
Dislikes
0
Response
Colleen Campbell - AES - Indianapolis Power and Light Co. - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jamie Monette - Allete - Minnesota Power, Inc. - 1
Answer
Document Name
Comment
Yes
Likes
0
Dislikes
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Truong Le - Truong Le On Behalf of: Carol Chinn, Florida Municipal Power Agency, 6, 4, 5, 3; Chris Gowder, Florida Municipal Power Agency,
6, 4, 5, 3; Dale Ray, Florida Municipal Power Agency, 6, 4, 5, 3; David Owens, Gainesville Regional Utilities, 1, 5, 3; Richard Montgomery,
Florida Municipal Power Agency, 6, 4, 5, 3; - Truong Le
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Dwayne Parker - CMS Energy - Consumers Energy Company - 4
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
Response
0
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Teresa Cantwell - Lower Colorado River Authority - 1,5, Group Name LCRA Compliance
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Document Name
Comment
Yes
Likes
0
Dislikes
0
Response
Donald Lynd - CMS Energy - Consumers Energy Company - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Karl Blaszkowski - CMS Energy - Consumers Energy Company - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 1,3,4,5 - RF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
William Hutchison - Southern Illinois Power Cooperative - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kathryn Tackett - NiSource - Northern Indiana Public Service Co. - 5
Answer
Document Name
Comment
See Steven Toosevich's comments.
Likes
0
Dislikes
0
Response
Quintin Lee - Eversource Energy - 1, Group Name Eversource Group
Answer
Document Name
Comment
No comment
Likes
0
Dislikes
0
Response
Tho Tran - Tho Tran On Behalf of: Lee Maurer, Oncor Electric Delivery, 1; - Tho Tran
Answer
Document Name
Comment
N/A
Likes
0
Dislikes
0
Response
Kinte Whitehead - Exelon - 3
Answer
Document Name
Comment
Exelon supports EEI's comments on behalf of Exelon Segments 1, 3, 5, and 6.
Likes
0
Dislikes
Response
0
9. The SDT is proposing to shift the focus of security of BCSI more towards the BCSI itself rather than physical security or “hardware”
storage locations. Do you agree that this approach aids the Responsible Entity by reducing potential unneeded controls on BCS?
Masuncha Bussey - Duke Energy - 1,3,5,6 - SERC, Group Name Duke Energy
Answer
No
Document Name
Comment
Duke Energy does not agree that to the significant change of focus to BCSI from BCSI designated storage locations, additional controls, compliance
processes, and evidentiary documentation at a significant cost would be required along with requiring significant efforts of a technical, administrative,
and operational nature to meet the new Requirements.
CIP-011-3, R1, Part 1.3 - "focus changed from access to designated storage locations to access to BES Cyber System Information" It is not clearly
defined what information, independently or collectively, establishes the designation of BES CSI. The review and management of current designated
storage locations (and data) are managed by designated employees. The requirement that all potential BES CSI is guarded in transit and use increases
the number of individuals requiring training and potential access to the repository. An independent host name or IP address, independently, is not
currently labeled BES CSI. An individual without NERC privileges may have that information for daily work at a Generation station.
CIP-011-3, R1, Part 1.6 - "focus of verification changed from designated storage locations to BES Cyber System Information: It is not clearly defined
what information, independently or collectively, establishes the designation of BES CSI. An independent host name or IP address, independently, is not
currently labeled BES CSI. It is not possible for a small subset of individuals to review and manage all data throughout generation stations that 'may be'
considered BES CSI based on an unclear definition.
CIP-011-3, R1 Part 1.5 "focus of termination actions changed from access to designated storage location to access to BES Cyber System Information".
This is not feasible in the case of individuals access to documentation that is considered "in use" such as hard copies of information. It is not feasible to
manage at the document level while removing access from repositories can occur electronically and instantly.
Likes
0
Dislikes
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
No
Document Name
Comment
As written, this will have the opposite impact due to the focus on the lifecycle of BCSI. Any BCSI that is stored and transmitted by BCS, EACMS, PACS,
or PCAs will now require specific protections. For example, BCSI stored in ourBCS will now need to have extra protections during storage and transit
between BCS ad associated assets above what is required for operation for the BCS. This is not itself a bad thing, but as written this will be required by
the proposed changes.
Likes
Dislikes
0
0
Response
Scott Miller - Scott Miller On Behalf of: David Weekley, MEAG Power, 3, 1; Roger Brand, MEAG Power, 3, 1; - Scott Miller
Answer
No
Document Name
Comment
Needs further discussion and clarification.
Likes
0
Dislikes
0
Response
Joe Tarantino - Joe Tarantino On Behalf of: Arthur Starkovich, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Beth Tincher, Sacramento
Municipal Utility District, 4, 1, 6, 3, 5; Jamie Cutlip, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Kevin Smith, Balancing Authority of
Northern California, 1; Nicole Goi, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Nicole Looney, Sacramento Municipal Utility District, 4, 1,
6, 3, 5; - Joe Tarantino
Answer
No
Document Name
Comment
Specifically focusing on storage locations defined what to protect. Entities may not know the location of BES CSI at all times when in use and transit.
Likes
0
Dislikes
0
Response
Dana Klem - MRO - 1,2,3,4,5,6 - MRO, Group Name MRO NSRF
Answer
No
Document Name
Comment
The approach will significantly increase unnecessary controls on BCSI by eliminating the qualifying language “with ERC” from the applicability of
Medium Impact BES Cyber Systems, and adding authorization/revocation and review requirements for all BCSI, instead of only on identified storage
locations.
If the intent is to shift the focus to the BCSI rather than storage locations, why is there a requirement to list storage locations (R1 Part 1.1)? See also
comments to question 1. Not sure what is meant by unneeded controls on BCS.
As to the concept itself, we believe it will be more difficult to apply requirements to BCSI than the assets or storage locations in which it resides, and
therefore are resistant to this approach. Better to define BCSI Repositories and BCSI Access per previous responses.
Likes
0
Dislikes
0
Response
Amy Casuscelli - Xcel Energy, Inc. - 1,3,5,6 - MRO,WECC
Answer
No
Document Name
Comment
Xcel Energy support the comments submitted by EEI.
Likes
0
Dislikes
0
Response
Jeremy Voll - Basin Electric Power Cooperative - 3
Answer
No
Document Name
Comment
Support the MRO NSRF comments
Likes
0
Dislikes
0
Response
Bruce Reimer - Manitoba Hydro - 1
Answer
No
Document Name
Comment
Disgree with eliminating BCSI storage locations. If the intent is to shift the focus to the BCSI rather than storage locations, why is there a requirement to
list storage locations (R1 Part 1.1)? We believe BCSI Repository identification (see our response in Question 1) is centric for preventing unauthorized
access to the BCSI in that it is difficult to apply requirements to BCSI than the assets or storage locations in which it resides. For example, if a person
wants to have an authorized access to BCSI, he (she) should request access to the BCSI respository first. This approach ensures the person who
possess the BCSI will always has authorized access to the BCSI. The BCSI Repository and BCSI requirements should be working together to prevent
unauthorized access to BCSI.
Likes
0
Dislikes
0
Response
Matthew Nutsch - Seattle City Light - 1,3,4,5,6 - WECC
Answer
No
Document Name
Comment
Seattle is concerned that this proposed approach reopens the challenges of protecting individual “pieces” of BCSI that plagued CIP v1-3, adds
complexity, and introduces unintended consequences. This change ultimately MIGHT be the most effective one, but it should be vetted and explored
and explained in much more detail to minimize perverse outcomes.
Likes
0
Dislikes
0
Response
Kjersti Drott - Tri-State G and T Association, Inc. - 1
Answer
No
Document Name
Comment
Tri-State understands and agrees with the intent, however, as currently drafted, applicability and how to comply with the requirements become
blurred. For example, if the requirements are kept focused on designated storage locations for BCSI, it eliminates confusion with BCSI that may reside
in BCS, EACMS and PACS. We understand that this is a challenging part of the project, but we are concerned that the applicability and associated
requirements as currently drafted will create confusion, redundancy and expanded scope. Other than reverting back to the original structure, a possible
solution could be to add exclusions to the applicability to exclude High and Medium Impact BCS and their associated EACMS and PACS.
Likes
0
Dislikes
0
Response
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
No
Document Name
Comment
This increases a entities controls that are needed for BCSI. An entity would have to defined multiple process elements to further define and control
BCSI while it is in flight or in all storage locations that could have BCSI.
Likes
0
Dislikes
0
Response
Kent Feliks - AEP - 3
Answer
No
Document Name
Comment
AEP does not agree that this approach reduces potential unneeded controls on BCS. Additional BCSI related requirements feel unnecessary, and we
feel making modifications to access control requirements could address this issue.
Likes
0
Dislikes
0
Response
Todd Bennett - Associated Electric Cooperative, Inc. - 3, Group Name AECI
Answer
No
Document Name
Comment
AECI supports comments filed by NRECA
Likes
0
Dislikes
0
Response
Barry Lawson - National Rural Electric Cooperative Association - 4
Answer
No
Document Name
Comment
While this approach may reduce the potential for unnecessary controls on BCS, it introduces significant other compliance activities/obligations and
required security controls with which Responsible Entities must comply. Accordingly, the revised approach does not achieve a net reduction in effort or
scope of security controls and – likely – results in an increase of same without any resulting increase in security or reliability.
Likes
0
Dislikes
0
Response
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
No
Document Name
Comment
While we agree with the approach, the draft does not accomplish this. The focus can be shifted to the BCSI itself to meet the goals of the SAR by
slightly modifying CIP-004 R4, Part 1.4.3 to [Process to authorize. . .] “Access to BES Cyber System Information in designated storage locations.”
The focus of CIP-011 has always been on the BCSI, so we contend that the changes proposed in R3 directly contradict this by changing the focus to
the assets and storage media, rather than the BCSI.
Likes
0
Dislikes
0
Response
Andrea Barclay - Georgia System Operations Corporation - 4
Answer
No
Document Name
Comment
While this approach may reduce the potential for unnecessary controls on BCS, it introduces significant other compliance activities/obligations and
required security controls with which Responsible Entities must comply. Accordingly, the revised approach does not achieve a net reduction in effort or
scope of security controls and – likely – results in an increase of same without any attendant increase in security or reliability.
Likes
Dislikes
0
0
Response
Lana Smith - San Miguel Electric Cooperative, Inc. - 5
Answer
No
Document Name
Comment
SMEC agrees with comments submitted by NRECA.
Likes
0
Dislikes
0
Response
Chris Wagner - Santee Cooper - 1, Group Name Santee Cooper
Answer
No
Document Name
Comment
The proposed changes do not reduce potential uneeded controls on BCSI it adds more controls.
Likes
0
Dislikes
0
Response
Gerry Adamski - Cogentrix Energy Power Management, LLC - 5
Answer
No
Document Name
Comment
I do not believe this will lessen the controls as security will still be needed for the physical locations as well. Further, the proposed standard provides
greater specificity in R1 Part 1.1 in identifying BCSI storage locations.
Likes
0
Dislikes
Response
0
Vivian Moser - APS - Arizona Public Service Co. - 3
Answer
No
Document Name
Comment
Although AZPS agrees that the proposed requirements reflect an intent to increase security controls to protect BCSI, protection through management of
access to storage locations should remain separate from protection of BCSI in transit, use, and disposal.
Likes
0
Dislikes
0
Response
Janelle Marriott Gill - Tri-State G and T Association, Inc. - 3
Answer
No
Document Name
Comment
Tri-State G&T understands and agrees with the intent, however, as currently drafted, applicability and how to comply with the requirements become
blurred. For example, if the requirements are kept focused on designated storage locations for BCSI, it eliminates confusion with BCSI that may reside
in BCS, EACMS and PACS. We understand that this is a challenging part of the project, but we are concerned that the applicability and associated
requirements as currently drafted will create confusion, redundancy and expanded scope. Other than reverting back to the original structure, a possible
solution could be to add exclusions to the applicability to exclude High and Medium Impact BCS and their associated EACMS and PACS.
Likes
0
Dislikes
0
Response
Jonathan Robbins - Seminole Electric Cooperative, Inc. - 4
Answer
No
Document Name
Comment
See NRECA submitted comments.
Likes
0
Dislikes
Response
0
Nicholas Lauriat - Network and Security Technologies - 1
Answer
No
Document Name
Comment
N&ST is curious to know what “potential unneeded controls on BCS” might be reduced by changing the existing requirement to manage access to BCSI
storage locations to a requirement to grant, review, and revoke access to BCSI itself. In any case, N&ST believes such a change would have the
potential to significantly increase a Responsible Entity’s access management program workload and significantly increase its compliance risk (how
would an Entity convincingly demonstrate revocation of access to BCSI had been accomplished within the prescribed time frame?), with little or no
reduction of risk to BES Cyber Systems and the BES. N&ST believes the existing requirements of CIP-011 implicitly but adequately convey an
obligation to ensure BCSI cannot be accessed by unauthorized individuals.
N&ST strongly opposes this proposed change.
Likes
0
Dislikes
0
Response
Sandra Shaffer - Berkshire Hathaway - PacifiCorp - 6
Answer
No
Document Name
Comment
We are concerned with this approach. Authorizing access to BCSI is problematic unless the access requirements and controls are specific to the
designated BCSI storage locations.
The approach will significantly increase controls on BCSI by eliminating the qualifying language “with ERC” from the applicability of Medium Impact BES
Cyber Systems, and adding authorization/revocation and review requirements for all BCSI, instead of only on designated storage locations. As stated
previously, there is no benefit to these additions because without ERC, a bad player would not be able to remotely access and use the information.
We believe that focusing on access controls to storage locations adequately address the risks. A shift of focus to the BCSI rather than storage locations
is unnecessary and only ads significant burdens and impossible evidentiary requirements.
Likes
0
Dislikes
Response
0
Andrea Jessup - Bonneville Power Administration - 1,3,5,6 - WECC
Answer
No
Document Name
Comment
BPA finds the strategy is reasonable but implementation of the exact verbiage needs care. Various cyber security methodologies often address cyber
system protection strategies and information protection strategies separately. It’s also necessary to address the Cyber Asset definition where it includes
“data in the device” to clarify and make the language consistent. Potential conflict between proposed requirements for protecting system data vs
requirements protecting systems/devices would be very bad. The positive side of protecting the information rather than the storage location is that
specific controls for digital information such as encryption come into scope and these methods are very effective when properly implemented. The SDT
must continue to consider the physical storage of printed materials as well so as not to exclude the possibility of protecting physical storage locations
under some facsimile of the current methodology.
Likes
0
Dislikes
0
Response
Sean Bodkin - Dominion - Dominion Resources, Inc. - 6, Group Name Dominion
Answer
No
Document Name
Comment
Dominion Energy supports the work the SDT has done on develoing the current draft. Dominion energy suggests that the team focus on the approach
taken in the current NERC CMEP Guidance document in addressing the issue and further supports EEIs comments. Physical locations may require a
different approach from cloud based storage of BCSI data.
Likes
0
Dislikes
0
Response
David Jendras - Ameren - Ameren Services - 3
Answer
No
Document Name
Comment
Ameren agrees with and supports EEI comments.
Likes
0
Dislikes
0
Response
Kagen DelRio - North Carolina Electric Membership Corporation - 3,4,5 - SERC
Answer
No
Document Name
Comment
NCEMC supports the comments by Barry Lawson, National Rural Electric Cooperative Association and ACES
Likes
0
Dislikes
0
Response
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
No
Document Name
Comment
Southern agrees that certain hardware/device/Cyber Asset level requirements (such as CIP-011 R2) must change in order to allow for cloud
services. However, Southern does not agree that a wholesale move to protecting BCSI rather than BCSI storage locations is measurable or auditable
as per our answer to Question 2. In essence, Southern agrees that the focus needs to change from BCSI physical or hardware storage
locations. However, “BCSI storage location” does not necessarily imply physical or hardware issues, it can just as easily point to a dedicated and
protected area within a cloud service offering. CIP-011-1’s current R2 needs to be updated so that it is not Cyber Asset and physical media based,
however in this proposal it remains as such.
Likes
0
Dislikes
0
Response
Tho Tran - Tho Tran On Behalf of: Lee Maurer, Oncor Electric Delivery, 1; - Tho Tran
Answer
Document Name
Comment
See response in question #6 and #7.
No
Likes
0
Dislikes
0
Response
Bridget Silvia - Sempra - San Diego Gas and Electric - 3
Answer
No
Document Name
Comment
SDG&E supports EEI’s comments submitted on our behalf.
Additionally, for proposed CIP-011-3 R3.1, SDG&E suggests the draft retain the language “…that contain BES Cyber System information…” Otherwise
there is a requirement to sanitize assets which may not contain BCSI and may not have an available method for sanitization.
Likes
0
Dislikes
0
Response
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
No
Document Name
Comment
ITC supports the response found in the NSRF Comment Form
Likes
0
Dislikes
0
Response
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
No
Document Name
Comment
We are concerned with this approach. Authorizing access to BCSI is problematic unless the access requirements and controls are specific to the
designated BCSI storage locations.
The approach will significantly increase controls on BCSI by eliminating the qualifying language “with ERC” from the applicability of Medium Impact BES
Cyber Systems, and adding authorization/revocation and review requirements for all BCSI, instead of only on designated storage locations. As stated
previously, there is no benefit to these additions because without ERC, a bad player would not be able to remotely access and use the information.
We believe that focusing on access controls to storage locations adequately address the risks. A shift of focus to the BCSI rather than storage locations
is unnecessary and only ads significant burdens and impossible evidentiary requirements.
Likes
0
Dislikes
0
Response
Ayman Samaan - Edison International - Southern California Edison Company - 1
Answer
No
Document Name
Comment
Please see comments submitted by Edison Electric Institute
Likes
0
Dislikes
0
Response
David Rivera - New York Power Authority - 3
Answer
No
Document Name
Comment
We agree with this approach but we believe this update is not backwards compatible (primarily because of the new Applicability / storage locations).
Likes
0
Dislikes
0
Response
Wayne Guttormson - SaskPower - 1
Answer
No
Document Name
Comment
Support MRO comments.
Likes
0
Dislikes
0
Response
Eli Rivera - CenterPoint Energy Houston Electric, LLC - NA - Not Applicable - Texas RE
Answer
No
Document Name
Comment
There is no opportunity in the proposed standards to reduce controls on BCS, rather the proposed changes represent a vast increase in required
security controls and evidence gathering obligations.
Likes
0
Dislikes
0
Response
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
No
Document Name
Comment
EEI does not support additional Requirements to BCSI. Instead, the recommendations contained within our response to Question 4 could provide an
equally effective solution resulting in fewer changes to existing processes for responsible entities. In addition, the inclusion of the undefined term of
“storage locations” may create new obligations for entities who desire to use third party storage locations. This would necessitate that entities continue
to identify and protect the physical location and hardware of host repositories. This may keep industry from using cloud-based services. As an
alternative, the requirements could be written to only require entities to identify the repository name, type of repository (electronic or physical) and
identifying if the repository is managed onsite by the responsible entity or offsite by a third party.
Likes
0
Dislikes
Response
0
Marty Hostler - Northern California Power Agency - 5
Answer
No
Document Name
Comment
I would agree if that were the approach; and if this proposal was not so prescriptive; and if this proposal was not so way out to the SAR scope.
Likes
0
Dislikes
0
Response
Holly Chaney - Snohomish County PUD No. 1 - 3, Group Name SNPD Voting Members
Answer
No
Document Name
Comment
We agree with the approach however the language in the requirement does not achieve this goal. If the desire is to securely handle the information
itself, SNPD suggests a mandatory labelling and protection scheme akin to DoD requirements for protection of classified data. Requirements are clear,
implementation is simple, and accountability is baked in.
Likes
1
Dislikes
Public Utility District No. 1 of Snohomish County, 4, Martinsen John
0
Response
Jenifer Holmes - Alliant Energy Corporation Services, Inc. - 4 - MRO,RF
Answer
No
Document Name
Comment
Alliant Energy agrees with NSRF and EEI’s comments.
Likes
0
Dislikes
0
Response
Jamie Monette - Allete - Minnesota Power, Inc. - 1
Answer
No
Document Name
Comment
The definition of storage locations needs to include references to physical protections. A shift away from physical protections or ‘hardware’ dilutes the
concept of security around BCSI.
Likes
0
Dislikes
0
Response
James Brown - California ISO - 2 - WECC
Answer
No
Document Name
Comment
See comments for Part 1.1. Shifting the emphasis away from where the information is stored will increase potential unneeded controls for BCSI. Rather
than focusing on the systematic protection of those locations where controls can be applied, the revisions can be seen as requiring protection of
individual pieces of information. This would be tremendously burdensome and possibly unattainable.
Likes
0
Dislikes
0
Response
Ryan Olson - Portland General Electric Co. - 5, Group Name PGE Group 2
Answer
No
Document Name
Comment
PGE agrees with EEI’s comments
Likes
0
Dislikes
0
Response
Angela Gaines - Portland General Electric Co. - 1
Answer
No
Document Name
Comment
Please see comments PGE Group 2
Likes
0
Dislikes
0
Response
Dennis Sismaet - Northern California Power Agency - 6
Answer
No
Document Name
Comment
I would agree if that were the approach; and if this proposal was not so prescriptive; and if it was not so way out of the SAR scope.
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
No
Document Name
Comment
We are concerned with this approach. Authorizing access to BCSI is problematic unless the access requirements and controls are specific to the
designated BCSI storage locations.
The approach will significantly increase controls on BCSI by eliminating the qualifying language “with ERC” from the applicability of Medium Impact BES
Cyber Systems, and adding authorization/revocation and review requirements for all BCSI, instead of only on designated storage locations. As stated
previously, there is no benefit to these additions because without ERC, a bad player would not be able to remotely access and use the information.
We believe that focusing on access controls to storage locations adequately address the risks. A shift of focus to the BCSI rather than storage locations
is unnecessary and only adds significant burdens and impossible evidentiary requirements.
Likes
Dislikes
0
0
Response
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
No
Document Name
Comment
ERCOT refers to its comments concerning Part 1.1., and believes that shifting the emphasis away from where the information is stored will increase the
potential of unneeded controls for BCSI. Rather than focusing on the systematic protection of those locations where controls can be applied, the
revisions can be seen as requiring protection of individual pieces of information. Requiring protection of individual pieces of information would be
tremendously burdensome and possibly unattainable.
Likes
0
Dislikes
0
Response
Douglas Webb - Douglas Webb On Behalf of: Allen Klassen, Westar Energy, 6, 3, 1, 5; Bryan Taggart, Westar Energy, 6, 3, 1, 5; Derek Brown,
Westar Energy, 6, 3, 1, 5; Grant Wilkerson, Westar Energy, 6, 3, 1, 5; James McBee, Great Plains Energy - Kansas City Power and Light Co., 1,
3, 6, 5; Jennifer Flandermeyer, Great Plains Energy - Kansas City Power and Light Co., 1, 3, 6, 5; John Carlson, Great Plains Energy - Kansas
City Power and Light Co., 1, 3, 6, 5; Marcus Moor, Great Plains Energy - Kansas City Power and Light Co., 1, 3, 6, 5; - Douglas Webb, Group
Name Westar-KCPL
Answer
No
Document Name
Comment
Westar and Kansas City Power & Light Company, endorse Edison Electric Institute's (EEI) comments.
Likes
0
Dislikes
0
Response
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
Document Name
Comment
No
We are concerned with this approach. Authorizing access to BCSI is problematic unless the access requirements and controls are specific to the
designated BCSI storage locations.
The approach will significantly increase controls on BCSI by eliminating the qualifying language “with ERC” from the applicability of Medium Impact BES
Cyber Systems, and adding authorization/revocation and review requirements for all BCSI, instead of only on designated storage locations. As stated
previously, there is no benefit to these additions because without ERC, a bad player would not be able to remotely access and use the information.
We believe that focusing on access controls to storage locations adequately address the risks. A shift of focus to the BCSI rather than storage locations
is unnecessary and only adds significant burdens and impossible evidentiary requirements.
Likes
0
Dislikes
0
Response
Laura Nelson - IDACORP - Idaho Power Company - 1
Answer
No
Document Name
Comment
It is agreed that the focus should be on protecting the BCSI and Responsible Entities should have the flexibility to build a program that best fits their
needs. These revisions seem to focus mostly on encrypting data, which is a good component of a bigger program; however, if it is a requirement to
encrypt data, it can hamper the Responsible Entity’s flexibility to develop a program that meets its needs in a variety of situations.
Likes
0
Dislikes
0
Response
Colleen Campbell - AES - Indianapolis Power and Light Co. - 3
Answer
No
Document Name
Comment
The location where BCSI is stored is too difficult to separate from the BCSI itself. The requirements should remain focused on the storage location with
the addition of key management for third party storage locations.
Likes
0
Dislikes
0
Response
Bradley Collard - SunPower - 5
Answer
No
Document Name
Comment
The SDT appears to have made this more convoluted and burdensome by prescribing key controls and other methods.
Likes
0
Dislikes
0
Response
Susan Sosbe - Wabash Valley Power Association - 3
Answer
Yes
Document Name
Comment
Agree that this is the correct approach. Greater clarity is needed within the requirements to place the requirements in the appropriate context and
prevent a default fallback to the prior interpretation in the requirements.
Likes
0
Dislikes
0
Response
William Hutchison - Southern Illinois Power Cooperative - 1
Answer
Yes
Document Name
Comment
Comments: If this is in fact the intent of the SDT, then why is the SDT including a risk assessment of 3rd party storage solution providers? An RE would
just be leveraging the 3rd party storage solution provider’s hardware (physical or virtual) for a storage location.
Likes
Dislikes
0
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Yes
Document Name
Comment
However, we wish for clarity on this question.
Likes
0
Dislikes
0
Response
Maryanne Darling-Reich - Black Hills Corporation - 1,3,5,6 - MRO,WECC
Answer
Yes
Document Name
Comment
Black Hills agrees that focusing on the protection of the information rather than simply access to it is a better approach
Likes
0
Dislikes
0
Response
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
Yes
Document Name
Comment
If this is in fact the intent of the SDT, then why is the SDT including a risk assessment of 3rd party storage solution providers? An RE would just be
leveraging the 3rd party storage solution provider’s hardware (physical or virtual) for a storage location.
Likes
0
Dislikes
Response
0
Leonard Kula - Independent Electricity System Operator - 2
Answer
Yes
Document Name
Comment
We agree with this approach but we believe this update is not backwards compatible (primarily because of the new Applicability / storage locations)
Likes
0
Dislikes
0
Response
sean erickson - Western Area Power Administration - 1
Answer
Yes
Document Name
Comment
recommend focusing on protecting data (CIA)
Likes
0
Dislikes
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
Yes
Document Name
Comment
While there is agreement to focus the security on the BCSI making the answer to the question asked a “Yes” the presence of “storage locations” in
Requirement R1 defeats this SDT intention. Therefore, in its proposed form the requirement language neither aligns with nor accomplishes this stated
objective
Likes
0
Dislikes
0
Response
Devin Shines - PPL - Louisville Gas and Electric Co. - 1,3,5,6 - SERC,RF, Group Name PPL NERC Registered Affiliates
Answer
Yes
Document Name
Comment
We agree with the approach to shift the focus of security to the BCSI; however, the SDT should consider their execution of the approach as described
above.
Likes
0
Dislikes
0
Response
Bobbi Welch - Midcontinent ISO, Inc. - 2
Answer
Yes
Document Name
Comment
Yes – completely agree.
Likes
0
Dislikes
0
Response
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name RSC no NextEra
Answer
Yes
Document Name
Comment
We agree with this approach but we believe this update is not backwards compatible (primarily because of the new Applicability / storage locations).
Likes
0
Dislikes
0
Response
Constantin Chitescu - Ontario Power Generation Inc. - 5
Answer
Document Name
Yes
Comment
OPG is in agreement with RSC provided comment
Likes
0
Dislikes
0
Response
Jennie Wike - Jennie Wike On Behalf of: Hien Ho, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; John Merrell, Tacoma Public Utilities
(Tacoma, WA), 3, 1, 4, 5, 6; Marc Donaldson, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Ozan Ferrin, Tacoma Public Utilities (Tacoma,
WA), 3, 1, 4, 5, 6; Terry Gifford, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; - Jennie Wike
Answer
Yes
Document Name
Comment
However, the SDT has not completed this process in updating the previous R2, now R3 controls. Prescribing sanitization or destruction controls
eliminates the ability to use encryption to restrict unauthorized access, which is a viable control. We suggest moving this back to the Objective level of
preventing unauthorized access to...
Or leverage the updated 1.2 language of:
"Method(s) to prevent unauthorized access to BES Cyber System Information by restricting the ability to obtain and use BES Cyber System Information
during storage, transit, use, and disposal, to authorized access holders."
Which explicitly includes storage and disposal (and possibly eliminate R3 entirely).
Likes
0
Dislikes
0
Response
Michael Johnson - Michael Johnson On Behalf of: James Mearns, Pacific Gas and Electric Company, 1, 3, 5; Marco Rios, Pacific Gas and
Electric Company, 1, 3, 5; Sandra Ellis, Pacific Gas and Electric Company, 1, 3, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
Yes
Document Name
Comment
PG&E agrees with the shift to “System Information” (i.e. BCSI) and away from the security of the hardware. The Standard should be about Cyber Asset
information and not the Cyber Assets themselves.
Likes
Dislikes
0
0
Response
Michael Puscas - ISO New England, Inc. - 2
Answer
Yes
Document Name
Comment
Comments: The SDT should review all the requirements to ensure that new or updated requirements do not have the unintended consequence of
hindering an Entity’s ability to store or use BCSI in the Cloud. See comments to question 6.
Likes
0
Dislikes
0
Response
Kevin Conway - Public Utility District No. 1 of Pend Oreille County - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 1,3,4,5 - RF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name Public Utility District No. 1 of Chelan County
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Karl Blaszkowski - CMS Energy - Consumers Energy Company - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Donald Lynd - CMS Energy - Consumers Energy Company - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Teresa Cantwell - Lower Colorado River Authority - 1,5, Group Name LCRA Compliance
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Payam Farahbakhsh - Hydro One Networks, Inc. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Dwayne Parker - CMS Energy - Consumers Energy Company - 4
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Truong Le - Truong Le On Behalf of: Carol Chinn, Florida Municipal Power Agency, 6, 4, 5, 3; Chris Gowder, Florida Municipal Power Agency,
6, 4, 5, 3; Dale Ray, Florida Municipal Power Agency, 6, 4, 5, 3; David Owens, Gainesville Regional Utilities, 1, 5, 3; Richard Montgomery,
Florida Municipal Power Agency, 6, 4, 5, 3; - Truong Le
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Anton Vu - Los Angeles Department of Water and Power - 6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Quintin Lee - Eversource Energy - 1, Group Name Eversource Group
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Gregory Campoli - New York Independent System Operator - 2
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Adrian Andreoiu - BC Hydro and Power Authority - 1, Group Name BC Hydro
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Dmitriy Bazylyuk - NiSource - Northern Indiana Public Service Co. - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Allan Long - Memphis Light, Gas and Water Division - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Document Name
Comment
Texas RE agrees that the changes align better with the purpose of CIP-011, which reads, “To prevent unauthorized access to BES Cyber System
Information by specifying information protection requirements in support of protecting BES Cyber Systems against compromise that could lead to
misoperation or instability in the Bulk Electric System (BES).”
Texas RE does, however, recommend the SDT consider language to permit the use of third party equipment without also removing all security
obligations from equipment owned and maintained by Registered Entities since the SDT’s goal is to allow BCSI storage in equipment not owned or
managed by Registered Entities (e.g. cloud providers).
Likes
0
Dislikes
0
Response
Kinte Whitehead - Exelon - 3
Answer
Document Name
Comment
Exelon supports EEI's comments on behalf of Exelon Segments 1, 3, 5, and 6.
Likes
0
Dislikes
Response
0
Kathryn Tackett - NiSource - Northern Indiana Public Service Co. - 5
Answer
Document Name
Comment
See Steven Toosevich's comments.
Likes
0
Dislikes
Response
0
10. The SDT is proposing to transfer all BCSI-related requirements from CIP-004 to CIP-011 with the understanding that this will further
address differing security needs between BCSI and BCS as well as ease future standard development. Do you agree that this provides
greater clarity between BCSI and BCS requirements?
Michael Puscas - ISO New England, Inc. - 2
Answer
No
Document Name
Comment
Comments: While this supports separation of controls associated with information as opposed to cyber assets/systems, it also separates controls
related to access management into two standards, which may impact an entity’s program organization breakdown (i.e. central approaches to access
management now dealing with two standards instead of one). It would be preferable to have the access authorization/revocation requirements to be
centrally located in CIP-004. Related CIP-004 requirements should sufficiently cover concerns about individual terminations at third parties.
Likes
0
Dislikes
0
Response
Colleen Campbell - AES - Indianapolis Power and Light Co. - 3
Answer
No
Document Name
Comment
The CIP-004 requirements concerning BCSI revolve around authorized access to the information, that should remain in CIP-004 to maintain
consistency with the current requirements and the data already collected.
Likes
0
Dislikes
0
Response
Laura Nelson - IDACORP - Idaho Power Company - 1
Answer
No
Document Name
Comment
No, It is not agreed this approach provides greater clarity; rather, this approach introduces and creates ambiguity. The authorization, revocation, and
review requirements should remain in CIP-004. By consolidating requirements for BCSI, the SDT is separating authorization, revocation, and review
requirements. It is better to keep the BCSI protection controls in CIP-011 and the authorization, revocation, and review requirements in CIP-004 as
those are more programmatic in many cases to an organization.
Likes
0
Dislikes
0
Response
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
No
Document Name
Comment
We do not agree that this provides greater clarity between BCSI and BCS requirements. The difference in Medium Impact applicability needs to be
addressed by adding “with ERC” for the access requirements in R1.3 and R1.5 and these requirements need to be limited to designated storage
locations of BCSI.
Likes
0
Dislikes
0
Response
Douglas Webb - Douglas Webb On Behalf of: Allen Klassen, Westar Energy, 6, 3, 1, 5; Bryan Taggart, Westar Energy, 6, 3, 1, 5; Derek Brown,
Westar Energy, 6, 3, 1, 5; Grant Wilkerson, Westar Energy, 6, 3, 1, 5; James McBee, Great Plains Energy - Kansas City Power and Light Co., 1,
3, 6, 5; Jennifer Flandermeyer, Great Plains Energy - Kansas City Power and Light Co., 1, 3, 6, 5; John Carlson, Great Plains Energy - Kansas
City Power and Light Co., 1, 3, 6, 5; Marcus Moor, Great Plains Energy - Kansas City Power and Light Co., 1, 3, 6, 5; - Douglas Webb, Group
Name Westar-KCPL
Answer
No
Document Name
Comment
Westar and Kansas City Power & Light Company, endorse Edison Electric Institute's (EEI) comments.
Likes
0
Dislikes
0
Response
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
Document Name
No
Comment
ERCOT agrees with the rationale provided regarding treating BCSI differently than Cyber Assets. However, ERCOT believes the changes would be
more appropriately made by adding new parts to CIP-004, Requirements R4 and R5 that address the unique needs of BCSI. This would avoid the
existence of “spaghetti requirements” and unwanted side effects of cross referencing requirements. In versions 1-3, the access requirements for BCSI
were included in CIP-003. Industry provided strong feedback suggesting all access requirements should be in one location, which is why the
requirements were added to CIP-004. There are entities that use a consolidated access management program to meet all regulatory
requirements. Having all requirements in one location helps support this type of program.
An alternative approach would be to separate the BCSI requirements into separate rows in their respective requirements of CIP-004, Requirement R4
and R5. ERCOT suggests the drafting team Consider revising Part 4.1.3 into a separate row within the CIP-004, Requirement R4 table. ERCOT
believes the requirement language as written in CIP-004-6 should be retained to focus on where the information is located.
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
No
Document Name
Comment
We do not agree that this provides greater clarity between BCSI and BCS requirements. The difference in Medium Impact applicability needs to be
addressed by adding “with ERC” for the access requirements in R1.3 and R1.5 and these requirements need to be limited to designated storage
locations of BCSI.
Likes
0
Dislikes
0
Response
Dennis Sismaet - Northern California Power Agency - 6
Answer
No
Document Name
Comment
Access requirements should remain in CIP-004.
Likes
0
Dislikes
0
Response
Angela Gaines - Portland General Electric Co. - 1
Answer
No
Document Name
Comment
Please see comments PGE Group 2
Likes
0
Dislikes
0
Response
Ryan Olson - Portland General Electric Co. - 5, Group Name PGE Group 2
Answer
No
Document Name
Comment
PGE agrees with EEI’s comments
Likes
0
Dislikes
0
Response
James Brown - California ISO - 2 - WECC
Answer
No
Document Name
Comment
Agree with the rationale provided of treating the BCSI different than Cyber Assets. However, the changes would be more appropriately made by adding
new parts to CIP-004 R4 and R5 to address the unique needs of BCSI. This avoids the existence of “spaghetti requirements” with unwanted side effects
of cross referencing requirements. In versions 1-3, the access requirements for BCSI were included in CIP-003. Industry provided strong feedback
wanting all access requirements in one location, so the requirements were added to CIP-004. There are entities that use a consolidated access
management program to meet all regulatory requirements. Having all requirements in one location helps support this.
An alternate approach is to separate the BCSI requirements into separate rows in their respective requirements of CIP-004 R4 and R5. Consider
making 4.1.3 into a separate row within the CIP-004 R4 table. The requirement language as written in CIP-004-6 should be retained to focus on where
the information is located.
Likes
0
Dislikes
0
Response
Constantin Chitescu - Ontario Power Generation Inc. - 5
Answer
No
Document Name
Comment
OPG is in agreement with RSC provided comment
Likes
0
Dislikes
0
Response
Dmitriy Bazylyuk - NiSource - Northern Indiana Public Service Co. - 3
Answer
No
Document Name
Comment
See Steven Toosevich's comments.
Likes
0
Dislikes
0
Response
Jamie Monette - Allete - Minnesota Power, Inc. - 1
Answer
Document Name
Comment
No
It would be more beneficial to maintain all access requirements under one Standard. Keeping access management and review programs and
procedures under one Standard would reduce any confusion and decrease margins for error with compliance obligations and good sound security
practices. A holistic security standard would include requirements for access approvals, revocation, and annual reviews, which is greatly important if the
same department is responsible for those requirements.
Likes
0
Dislikes
0
Response
Jenifer Holmes - Alliant Energy Corporation Services, Inc. - 4 - MRO,RF
Answer
No
Document Name
Comment
Alliant Energy agrees with NSRF and EEI’s comments.
Likes
0
Dislikes
0
Response
Marty Hostler - Northern California Power Agency - 5
Answer
No
Document Name
Comment
Access requirements should remain in CIP-004.
Likes
0
Dislikes
0
Response
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name RSC no NextEra
Answer
Document Name
Comment
No
1)
No because Part 1.5 will require individual terminations at third parties. It is problematic for the Entity to know when a third party’s staff leaves.
2)
Part 1.5 does not addess a) when the BCSI was given to the vendor and b) how to revoke one person’s access?
Likes
0
Dislikes
0
Response
Gregory Campoli - New York Independent System Operator - 2
Answer
No
Document Name
Comment
NYISO recognizes and agrees with the SDT’s intent to consolidate similar issues. We recommend that the SDT pursue the maintenance of all
personnel and access management requirements be contained within CIP-004-7 to better align with existing industry practices. As noted in our
response to question #2, our concern with introducing access management requirements under CIP-011-3 is that it introduces a new complication, that
of having to maintain similar access authorization, revocation and control measures that are currently mandated within CIP-004-7. NYISO would see
this as requiring a responsible entity to be maintaining access management controls in support of two separate standards (i.e. CIP-004-7 for BCS and
CIP-011-3 for BCSI), there is the potential for a single deficiency in an entity’s access management program to result in non-compliance with two
different NERC standards.
Likes
0
Dislikes
0
Response
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
No
Document Name
Comment
Please note EEI comments to questions 8 and 9 above.
Likes
0
Dislikes
0
Response
Bobbi Welch - Midcontinent ISO, Inc. - 2
Answer
No
Document Name
Comment
No. Although MISO recognizes and agrees with the SDT’s intent to consolidate similar issues. We recommend that the SDT maintain all personnel and
access management requirements within CIP-004-7 to better align with existing industry practices. As noted in our response to question 2, our concern
with introducing access management requirements under CIP-011-3 is that it introduces a new complication, that of having to maintain similar access
authorization, revocation and control measures as that in CIP-004-7. By having to maintain access management controls in support of two standards
(i.e. CIP-004-7 for BCS and CIP-011-3 for BCSI), there is the potential for a single deficiency in an entity’s access management program to result in
non-compliance with two NERC standards.
Likes
0
Dislikes
0
Response
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
No
Document Name
Comment
The standards development team should support specific requirements providing appropriate levels of security for Cloud Service Providers and 3rd
Party Access. Transferring the CIP-004 BCSI requirements to CIP-011 does not address the unique issues created by storing BCSI in repositories that
are not controlled by registered entities. The standards development team should draft separate requirements.
Likes
0
Dislikes
0
Response
Wayne Guttormson - SaskPower - 1
Answer
No
Document Name
Comment
Support MRO comments.
Likes
0
Dislikes
Response
0
Devin Shines - PPL - Louisville Gas and Electric Co. - 1,3,5,6 - SERC,RF, Group Name PPL NERC Registered Affiliates
Answer
No
Document Name
Comment
We believe that this could complicate CIP access management programs. These changes seem contrary to the work completed by the V5 project team
to remove the “spaghetti” requirements.
Likes
0
Dislikes
0
Response
David Rivera - New York Power Authority - 3
Answer
No
Document Name
Comment
No because Part 1.5 will require individual terminations at third parties. It is problematic for the Entity to know when a third party’s staff leaves.
Part 1.5 does not addess a) when the BCSI was given to the vendor and b) how to revoke one person’s access?
Likes
0
Dislikes
0
Response
Ayman Samaan - Edison International - Southern California Edison Company - 1
Answer
No
Document Name
Comment
Please see comments submitted by Edison Electric Institute
Likes
0
Dislikes
Response
0
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
No
Document Name
Comment
We do not agree that this provides greater clarity between BCSI and BCS requirements. The difference in Medium Impact applicability needs to be
addressed by adding “with ERC”, for the access requirements in R1.3 and R1.5 and these requirements need to be limited to designated storage
locations of BCSI.
Likes
0
Dislikes
0
Response
Quintin Lee - Eversource Energy - 1, Group Name Eversource Group
Answer
No
Document Name
Comment
No because Part 1.5 will require individual terminations at third parties. It is problematic for the Entity to know when a third party’s staff leaves
Part 1.5 does not addess a) when the BCSI was given to the vendor and b) how to revoke one person’s access?
Likes
0
Dislikes
0
Response
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
No
Document Name
Comment
ITC supports the response found in the NSRF Comment Form
Likes
0
Dislikes
Response
0
Bridget Silvia - Sempra - San Diego Gas and Electric - 3
Answer
No
Document Name
Comment
SDG&E supports EEI’s comments submitted on our behalf.
Likes
0
Dislikes
0
Response
Tho Tran - Tho Tran On Behalf of: Lee Maurer, Oncor Electric Delivery, 1; - Tho Tran
Answer
No
Document Name
Comment
Moving BCSI access revocation requiment from CIP-004 to CIP-011 can resulting in multiple violation of a single instance.
Likes
0
Dislikes
0
Response
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
No
Document Name
Comment
Southern does not agree that this provides greater clarity, as it loses context. For example, the proposed R1.5 is pulled out of its CIP-004 context
where it was one of five parts of an access revocation program requirement. It is then inserted into CIP-011 with no context. Read in a vacuum without
the CIP-004 “Personnel and Training” standard context, Part 1.5 suddenly mentions “the individual” and “termination actions”. What do those mean
outside of the CIP-004 context? The requirement part prior to this was discussing vendors, so does this apply only when you terminate a
vendor? Southern strongly suggests leaving the CIP-004 personnel and access management issues within CIP-004 so they don’t lose vital context in a
transition to CIP-011.
Likes
Dislikes
0
0
Response
Kagen DelRio - North Carolina Electric Membership Corporation - 3,4,5 - SERC
Answer
No
Document Name
Comment
NCEMC supports the comments by Barry Lawson, National Rural Electric Cooperative Association and ACES
Likes
0
Dislikes
0
Response
David Jendras - Ameren - Ameren Services - 3
Answer
No
Document Name
Comment
Ameren agrees with and supports EEI comments.
Likes
0
Dislikes
0
Response
Sean Bodkin - Dominion - Dominion Resources, Inc. - 6, Group Name Dominion
Answer
No
Document Name
Comment
Dominion Energy supports the work the SDT has done on develoing the current draft. Dominion energy suggests that the team focus on the approach
taken in the current NERC CMEP Guidance document in addressing the issue and further supports EEIs comments. The current approach taken by the
SDT appears too proscriptive and should remain flexiable and technology agnostic.
Likes
0
Dislikes
Response
0
Andrea Jessup - Bonneville Power Administration - 1,3,5,6 - WECC
Answer
No
Document Name
Comment
BPA finds the strategy is reasonable but implementation of the exact verbiage needs care. Various cyber security methodologies often address cyber
system protection strategies and information protection strategies separately. It’s also necessary to address the BCS/BCA definition where it includes
“data in the device” to clarify and make the language consistent. There could be impact on CIP-010 for change (configuration) management as the
distinction between “data” and “software” is blurry in some cases. Certain best-practice managed-configuration items often referred to as “settings” (user
configured inputs to the runtime parameters of a software application or operating system) that drastically affect the operation of the system are not
tracked in CIP-010. These configuration items are “data in the device required for its operation” and also present an item of interest to the malicious
actor and a reliability issue if they are inadvertently altered; even such things as Internet Protocol addresses and subnet masks, hostnames, Domain
Name System (DNS) entries, Network Time Protocol (NTP) server addresses and similar parameters that enable reliability of a system and are not
considered in CIP-010 but are covered by the current understanding of BCSI. Potential conflict between proposed requirements for protecting system
data vs requirements protecting systems/devices would be very bad.
Likes
0
Dislikes
0
Response
Sandra Shaffer - Berkshire Hathaway - PacifiCorp - 6
Answer
No
Document Name
Comment
We do not agree that this provides greater clarity between BCSI and BCS requirements. The difference in Medium Impact applicability needs to be
addressed by adding “with ERC”, for the access requirements in R1.3 and R1.5 and these requirements need to be limited to designated storage
locations of BCSI.
Likes
0
Dislikes
0
Response
Nicholas Lauriat - Network and Security Technologies - 1
Answer
Document Name
Comment
No
N&ST sees no benefit in moving BCSI storage location access requirements from CIP-004 to CIP-011 and believes there is no need for clarification
between BCSI and BCS requirements. Furthermore, N&ST believes that the impact of moving some access management requirements from CIP-004 to
CIP-011 could be significant for some Responsible Entities, compelling needless modification and disruption of mature and effective CIP compliance
programs.
Likes
0
Dislikes
0
Response
Jonathan Robbins - Seminole Electric Cooperative, Inc. - 4
Answer
No
Document Name
Comment
See NRECA submitted comments.
Likes
0
Dislikes
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
No
Document Name
Comment
While there is appreciation for the desire to “group” requirements by “applicable system”, this change fosters a bifurcated model for user and access
management instead of incentivizing an enterprise program to manage risks and provisioning/deprovisioning tasks that can be unplanned and
considered high frequency security operations. The SDT should resist the temptation to revert back to previously problematic constructs that created
“spaghetti” in the Requirements, and maintain the construct that groups access management as a business process collectively under CIP-004. Access
to BCSI also not just 3rd party and to move these requirements out from under the umbrella of user and access management in CIP-004 seems like a
step backwards
Likes
0
Dislikes
0
Response
Vivian Moser - APS - Arizona Public Service Co. - 3
Answer
No
Document Name
Comment
AZPS does not necessarily agree that that the transfer of BCSI-related requirements from CIP-004 to CIP-011 provides greater clarity; however, is not
opposed to aggregating all BCSI-related requirements into one standard.
Likes
0
Dislikes
0
Response
Gerry Adamski - Cogentrix Energy Power Management, LLC - 5
Answer
No
Document Name
Comment
The standard does not consider nor add clarity to the third-party access and revocation requirements, a gap in security objectives as discussed in the
response to Q7.
Likes
0
Dislikes
0
Response
sean erickson - Western Area Power Administration - 1
Answer
No
Document Name
Comment
Access management is access management keep it in CIP-004. CIP-004 includes physical and electronic access to BES Cyber Systems and
BCSI. It needs to remain together. Implementing this change would cause industry to ramp-up many internal governance process changes to
meet this proposed change
Likes
0
Dislikes
0
Response
Chris Wagner - Santee Cooper - 1, Group Name Santee Cooper
Answer
No
Document Name
Comment
No, the current version of CIP-004 already provides for the identification of BCSI storage locations. Keeping all the requirements for access and
revocation in one standard decreases the complexity for compliance.
Likes
0
Dislikes
0
Response
Leonard Kula - Independent Electricity System Operator - 2
Answer
No
Document Name
Comment
No because Part 1.5 will require individual terminations at third parties and does not address a) when the BCSI was given to the vendor and b) how
to revoke one person’s access?. See our comment to Question 7
While we understand the difficulty the SDT faces with leaving BCSI access requirements in CIP-004, we would prefer that all access requirements
remain together within CIP-004
Likes
0
Dislikes
0
Response
Lana Smith - San Miguel Electric Cooperative, Inc. - 5
Answer
No
Document Name
Comment
SMEC agrees with comments submitted by NRECA.
Likes
0
Dislikes
0
Response
Andrea Barclay - Georgia System Operations Corporation - 4
Answer
No
Document Name
Comment
No. First, GSOC respectfully suggests that the removal of requirements from CIP-004-6 to CIP-011-3 was not authorized by the SAR for this project. In
particular, the SAR explicitly stated that CIP-004 be modified and that CIP-011 be evaluated for any downstream type impacts. It did not authorize the
wholesale removal of requirements from CIP-004-6 and the addition of these requirements to CIP-011-2. Accordingly, the SDT revisions go beyond the
scope of the SAR as provided below:
CIP-004-6 Requirements need to be modified so management of access to BCSI is clarified to include a focus on the BCSI data and the controls
deployed to limit access. In addition, the Standard should allow various methods for controlling access to BES Cyber System Information, storage
location(s). … In addition to CIP-004-6 modifications, CIP-011-2 should also be evaluated for any subsequent impacts.
Second, there is significant value in the consolidation of access management requirements in 1 standard. For example, the ability of Responsible
Entities to apply consolidated processes, to better ensure that minimal impacts occur as a result of revisions to standards or processes, to leverage
similar or the same compliance documentation, etc. Moving only a portion of Responsible Entity’s access management requirements from CIP-004 to
CIP-011 places access management obligations in multiple standards, eliminated current synergies, creating confusion and process inefficiency, and
increasing compliance risk. It also likely results in the requirement to modify multiple standards where access management of system scope revisions
are proposed – instead of being able to implement revisions in just one standard, creating more work for SDTs and increased monitoring and
commenting effort by industry.
Finally, GSOC fails to see the reliability value in segregating these requirements into 2 standards. As well, the benefits listed in the Technical Rationale
are not reliability benefits, but are, rather, administrative improvements. This is highlighted by the shift to BCSI instead of locations as this shift has the
likely effect of expanding access to BCSI beyond what is actually needed by personnel, exposing more BCSI to the risk of unauthorized access. For
these reasons, GSOC does not support the relocation of the CIP-004 requirements associated with BCSI to CIP-011.
Likes
0
Dislikes
0
Response
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
No
Document Name
Comment
We commend the SDT for trying to consolidate all BCSI-related requirements. However, we believe CIP-004 remains the more appropriate place for
the access management requirements because 1) that is where other access management requirements are located, and entities have created their
access management programs based upon this, and 2) having access management requirements in two places creates the potential for multiple
violations for one instance (see MRO NSRF comment).
Likes
0
Dislikes
Response
0
Barry Lawson - National Rural Electric Cooperative Association - 4
Answer
No
Document Name
Comment
No. NRECA believes that the removal of requirements from CIP-004-6 to CIP-011-3 was not authorized by the SAR for this project. In particular, the
SAR explicitly stated that CIP-004 be modified and that CIP-011 be evaluated for any downstream type impacts. It did not authorize the wholesale
removal of requirements from CIP-004-6 and the addition of these requirements to CIP-011-2. Accordingly, the SDT revisions go beyond the scope of
the SAR as provided below (emphasis added):
CIP-004-6 Requirements need to be modified so management of access to BCSI is clarified to include a focus on the BCSI data and the controls
deployed to limit access. In addition, the Standard should allow various methods for controlling access to BES Cyber System Information, storage
location(s). … In addition to CIP-004-6 modifications, CIP-011-2 should also be evaluated for any subsequent impacts.
Additionally, there is significant value in the consolidation of access management requirements in a single standard. For example, the ability of
Responsible Entities to apply consolidated processes, to better ensure that minimal impacts occur because of revisions to standards or processes, to
leverage similar or the same compliance documentation, etc. Moving only a portion of Responsible Entity’s access management requirements from
CIP-004 to CIP-011 places access management obligations in multiple standards, eliminates current synergies, creates confusion and process
inefficiencies, and increases compliance risk. It also likely results in the requirement to modify multiple standards where access management of system
scope revisions are proposed – instead of being able to implement revisions in just one standard, creating more work for SDTs and increased
monitoring and commenting effort by industry.
Finally, NRECA fails to see the reliability value in segregating these requirements into 2 standards. As well, the benefits listed in the Technical
Rationale are not reliability benefits, but are, rather, administrative improvements. This is highlighted by the shift to BCSI instead of locations as this
shift has the likely effect of expanding access to BCSI beyond what is needed by personnel, exposing more BCSI to the risk of unauthorized
access. NRECA does not support the relocation of the CIP-004 requirements associated with BCSI to CIP-011.
Likes
0
Dislikes
0
Response
Todd Bennett - Associated Electric Cooperative, Inc. - 3, Group Name AECI
Answer
No
Document Name
Comment
AECI supports comments filed by NRECA
Likes
0
Dislikes
Response
0
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
No
Document Name
Comment
Fragmenting user access across two standards is a regressive action that negates a substantive uplift that NERC adopted in the version 5 standards.
Suggest retain all user access controls in CIP-004.
Likes
0
Dislikes
0
Response
Matthew Nutsch - Seattle City Light - 1,3,4,5,6 - WECC
Answer
No
Document Name
Comment
If specific access controls are deemed necessary, Seattle prefers that access requirements remain grouped in CIP-004, and furthermore recommends
alignment of termination timing for BCSI from “calendar day” to “24 hours” as is consistent with timing for other termination requirements.
Even better to Seattle would be to drop specific access requirements for BCSI and/or BCSI storage locations from either of CIP-004 or CIP-011, and left
up to each entity to specify in their risk-based BCSI security plan. Expectations and guidance could be provided in the Measures and technical
documents.
Likes
0
Dislikes
0
Response
Bruce Reimer - Manitoba Hydro - 1
Answer
No
Document Name
Comment
We disagree with moving requirements for access to BCSI from CIP-004-6 to CIP-011-3 (see our response in Question 2) and we havn’t seen any
security needs for this change.
Likes
0
Dislikes
0
Response
Jeremy Voll - Basin Electric Power Cooperative - 3
Answer
No
Document Name
Comment
Support the MRO NSRF comments
Likes
0
Dislikes
0
Response
Teresa Cantwell - Lower Colorado River Authority - 1,5, Group Name LCRA Compliance
Answer
No
Document Name
Comment
This places access management outside of CIP-004.
Likes
0
Dislikes
0
Response
Amy Casuscelli - Xcel Energy, Inc. - 1,3,5,6 - MRO,WECC
Answer
No
Document Name
Comment
Xcel Energy support the comments submitted by EEI.
Likes
0
Dislikes
Response
0
Dana Klem - MRO - 1,2,3,4,5,6 - MRO, Group Name MRO NSRF
Answer
No
Document Name
Comment
Not until the difference in Medium Impact applicability is addressed (add “with ERC”), and these requirements are limited to designated storage
locations of BES CSI.
Per our response to Question 2, we disagree with moving requirements for access to BCSI from CIP-004-6 to CIP-011-3. We appreciate the attempt to
streamline Requirements associated with BCSI by placing all related compliance activities solely within the CIP-011-3 Standard. However, by doing so
Responsible Entities would be subject to the potential of having multiple compliance issues with one failed compliance activity as a result of the
overlapping NERC CIP Standards.
To describe the scenario we offer the following: If an Entity were to have an employee, contractor or vendor with approved access to BCSI and no other
physical or logical access to BES Cyber Systems or Cyber Assets and that employee left the company then we would be required to revoke access by
the end of the next calendar day, per CIP-011-3 R1.5. If we were to have a miss and not revoke by the next calendar day then we would need to selfreport on CIP-011-3 R1.5. If we have an employee with access to CIP Cyber Systems or Cyber Assets and not to BCSI and failed to remove the
employee’s access then we would have to self-report on CIP-004-7 R5. If we have an employee that has access to both BES Cyber Systems and to
BCSI and we fail to remove access in a timely manner then we have violations for both CIP-004-7 R5 and for CIP-011-3 R1. This isn’t an issue today
because all access violations are rolled up to CIP-004-6 R5 but by separating them into two Standards we would be required to report on both and thus
exposing us to multiple possible violations whereas today it would only be one.
Additionally, many Responsibly Entities’ Access Control procedures are written under CIP-004-6 - Access Control procedure. Everything an employee
would need to know about their access control responsibilities would be located in a single document. This change would either create a potential
compliance risk by breaking access controls up into separate documents or cause entities to perform significant changes to how they document their
compliance procedures.
Likes
0
Dislikes
0
Response
Joe Tarantino - Joe Tarantino On Behalf of: Arthur Starkovich, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Beth Tincher, Sacramento
Municipal Utility District, 4, 1, 6, 3, 5; Jamie Cutlip, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Kevin Smith, Balancing Authority of
Northern California, 1; Nicole Goi, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Nicole Looney, Sacramento Municipal Utility District, 4, 1,
6, 3, 5; - Joe Tarantino
Answer
No
Document Name
Comment
Grouping by control type rather than CIP standard number is preferred. Access controls in many different areas of the standard does not add clearity.
Likes
0
Dislikes
0
Response
Masuncha Bussey - Duke Energy - 1,3,5,6 - SERC, Group Name Duke Energy
Answer
No
Document Name
Comment
Duke Energy does not agree with the transfer of all BCSI-related requirements from CIP-004 to CIP-011. Duke Energy concludes that moving access
revocation requirements from CIP-004 to CIP-011 will create the potential for access revocation of an individual entity violating requirements in two
separate standards.
Likes
0
Dislikes
0
Response
Susan Sosbe - Wabash Valley Power Association - 3
Answer
No
Document Name
Comment
There are two separate ways of evaluating this question. On one hand, it seeks to create a common place to include requirements on information
protection. On the other hand, it breaks the previous approach to consolidate all access authorization, provisioning, revocation, and
deauthorization. By moving these requirements, it also potentially changes a single violation for CIP-004 R4 or R5 into multiple violations.
Likes
0
Dislikes
0
Response
Michael Johnson - Michael Johnson On Behalf of: James Mearns, Pacific Gas and Electric Company, 1, 3, 5; Marco Rios, Pacific Gas and
Electric Company, 1, 3, 5; Sandra Ellis, Pacific Gas and Electric Company, 1, 3, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
Document Name
Comment
Yes
PG&E agrees with the shift of BCSI access authorization and revocation from CIP-004 to CIP-011. This allows an entity the option to have different
processes in place for granting and removing access to BCSI if they desire and removes the implied requirement of having a Personnel Risk
Assessment (PRA) executed before access to BCSI is granted if the entity does not what to make that a requirement in their environment.
Likes
0
Dislikes
0
Response
Jennie Wike - Jennie Wike On Behalf of: Hien Ho, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; John Merrell, Tacoma Public Utilities
(Tacoma, WA), 3, 1, 4, 5, 6; Marc Donaldson, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Ozan Ferrin, Tacoma Public Utilities (Tacoma,
WA), 3, 1, 4, 5, 6; Terry Gifford, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; - Jennie Wike
Answer
Yes
Document Name
Comment
However, the SDT should modify the applicability in CIP-011-3 requirements to align with CIP-004.
Likes
0
Dislikes
0
Response
Holly Chaney - Snohomish County PUD No. 1 - 3, Group Name SNPD Voting Members
Answer
Yes
Document Name
Comment
SNPD supports this change. CIP-004 should address BCS while CIP-011 should address BCSI (physical vs logical access). Mixing access and
storage requirements across multiple CIP standards is confusing and increases the likelihood for mismanagement.
Likes
1
Dislikes
Public Utility District No. 1 of Snohomish County, 4, Martinsen John
0
Response
Janelle Marriott Gill - Tri-State G and T Association, Inc. - 3
Answer
Document Name
Yes
Comment
Yes, however it is worth acknowledging that R3 applies to disposal/redeployment of cyber assets, not BCSI. Additionally, we suggest making separate
requirements for BCSI on premises versus in the cloud. This way there can be no implication that something new is required for BCSI on premises,
such as it appears currently with key management (R2).
Likes
0
Dislikes
0
Response
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
Yes
Document Name
Comment
Yes it will make changes to CIP-011 easier in the future, but it also allows for ease of changes in the future which makes it easier to include Low
Impact. This was brought up on the webinar that the scope of the SAR does not include Low Impact, but this change will easily allow changes to the
standard to include Low Impact without unintended consequences to other standards/requirements.
Likes
0
Dislikes
0
Response
Kent Feliks - AEP - 3
Answer
Yes
Document Name
Comment
AEP agrees these changes have the potential to provide greater clarity surrounding BSCI and BCS. However, please see AEP’s comments to questions
#8 and #9.
Likes
0
Dislikes
0
Response
Maryanne Darling-Reich - Black Hills Corporation - 1,3,5,6 - MRO,WECC
Answer
Yes
Document Name
Comment
Black Hills agrees that placing all the BCSI requirements into one standard provides clarity. However, we think it would be beneficial to modify the
language taken from CIP-004, making it less rigid.
Likes
0
Dislikes
0
Response
Payam Farahbakhsh - Hydro One Networks, Inc. - 1
Answer
Yes
Document Name
Comment
Overall yes; however, some third party issues remain to be addressed. See NPCC RSC comments.
Likes
0
Dislikes
0
Response
Kjersti Drott - Tri-State G and T Association, Inc. - 1
Answer
Yes
Document Name
Comment
Yes, however it is worth acknowledging that R3 applies to disposal/redeployment of cyber assets, not BCSI. Additionally, Tri-State suggests making
separate requirements for BCSI on premises versus in the cloud. This way there can be no implication that something new is required for BCSI on
premises, such as it appears currently with key management (R2).
Likes
0
Dislikes
0
Response
Scott Miller - Scott Miller On Behalf of: David Weekley, MEAG Power, 3, 1; Roger Brand, MEAG Power, 3, 1; - Scott Miller
Answer
Yes
Document Name
Comment
Moving the BCSI requirements from CIP-004 to CIP-011 as proposed is OK with MEAG. It doesn’t matter if the BCSI requirements are all in 1 standard
or multiple standards.
Likes
0
Dislikes
0
Response
William Hutchison - Southern Illinois Power Cooperative - 1
Answer
Yes
Document Name
Comment
Comments: Yes it will make changes to CIP-011 easier in the future, but it also allows for ease of changes in the future which makes it easier to include
Low Impact. This was brought up on the webinar that the scope of the SAR does not include Low Impact, but this change will easily allow changes to
the standard to include Low Impact without unintended consequences to other standards/requirements.
Likes
0
Dislikes
0
Response
Allan Long - Memphis Light, Gas and Water Division - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Adrian Andreoiu - BC Hydro and Power Authority - 1, Group Name BC Hydro
Answer
Document Name
Yes
Comment
Likes
0
Dislikes
0
Response
Eli Rivera - CenterPoint Energy Houston Electric, LLC - NA - Not Applicable - Texas RE
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Anton Vu - Los Angeles Department of Water and Power - 6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
Response
0
Truong Le - Truong Le On Behalf of: Carol Chinn, Florida Municipal Power Agency, 6, 4, 5, 3; Chris Gowder, Florida Municipal Power Agency,
6, 4, 5, 3; Dale Ray, Florida Municipal Power Agency, 6, 4, 5, 3; David Owens, Gainesville Regional Utilities, 1, 5, 3; Richard Montgomery,
Florida Municipal Power Agency, 6, 4, 5, 3; - Truong Le
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Dwayne Parker - CMS Energy - Consumers Energy Company - 4
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Document Name
Yes
Comment
Likes
0
Dislikes
0
Response
Donald Lynd - CMS Energy - Consumers Energy Company - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Karl Blaszkowski - CMS Energy - Consumers Energy Company - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name Public Utility District No. 1 of Chelan County
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
Response
0
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 1,3,4,5 - RF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kevin Conway - Public Utility District No. 1 of Pend Oreille County - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kathryn Tackett - NiSource - Northern Indiana Public Service Co. - 5
Answer
Document Name
Comment
See Steven Toosevich's comments.
Likes
0
Dislikes
0
Response
Kinte Whitehead - Exelon - 3
Answer
Document Name
Comment
Exelon supports EEI's comments on behalf of Exelon Segments 1, 3, 5, and 6.
Likes
0
Dislikes
Response
0
11. The SDT increased the scope of information to be evaluated by including both Protected Cyber Assets and all Medium Impact (not just
Medium Impact Assets with External Routable Connectivity). Are there any concerns regarding a Responsible Entity attempting to meet
these proposed, expanded requirements?
William Hutchison - Southern Illinois Power Cooperative - 1
Answer
No
Document Name
Comment
Comments: Yes, an Entity without ERC today will now be required to have an information protection program which could have a major impact. What is
the risk sought to be reduced here? There is not a possibility to use a site without ERC as a pivot point, so the likelihood of a site without ERC being
used in a cyber-attack is incredibly low. Increasing the scope here only furthers the point from question 10 on easily increasing scope in the future.
Likes
0
Dislikes
0
Response
Joe Tarantino - Joe Tarantino On Behalf of: Arthur Starkovich, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Beth Tincher, Sacramento
Municipal Utility District, 4, 1, 6, 3, 5; Jamie Cutlip, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Kevin Smith, Balancing Authority of
Northern California, 1; Nicole Goi, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Nicole Looney, Sacramento Municipal Utility District, 4, 1,
6, 3, 5; - Joe Tarantino
Answer
No
Document Name
Comment
This will add workload that may may not be justified by risk. Devices without ERC have less IT security risk than routable devices.
Likes
0
Dislikes
0
Response
Bruce Reimer - Manitoba Hydro - 1
Answer
Document Name
Comment
No
Removing the qualifying language “with ERC” from the applicability of Medium Impact BES Cyber Systems from CIP-004-6 R4.1, R4.4, R5.3 when
moved them to CIP-011-3 R1.3, R1.4, and R1.5 is unacceptable. This “with ERC”deletion expands the scope of CIP-004 R4 and R5 requirements
signicantly. After this scope expansion, CIP-004 R4 and R5 requirements will not only apply to all locations of BCSI pertaining to Medium Impact BES
Cyber Systems, but also apply to all Medium Impact BCS since the Medium Impact BCS contains BCSI. This expansion of scope is not justified, as the
deliberate choice of not implementing ERC to Medium Impact BES Cyber Systems is currently recognized as a considerable and sufficient protection in
and of itself and this is why the current CIP-004 R4 and R5 don’t apply to Medium Impact BCS without ERC.
Likes
0
Dislikes
0
Response
Matthew Nutsch - Seattle City Light - 1,3,4,5,6 - WECC
Answer
No
Document Name
Comment
Seattle is concerned about the expansion of scope introduced by these changes. Are they warranted from a security standpoint, given that BSCI about
a Medium substation without ERC, for example, likely presents less risk to the BES than the network information about a Low substation with ERC
(which is not even covered at all). Considerable additional resources will need to be expended to protect BCSI that may not present a significant
security risk, apparently only for the reason of consistency in wording. See also response to Question 2, above.
Likes
0
Dislikes
0
Response
Payam Farahbakhsh - Hydro One Networks, Inc. - 1
Answer
No
Document Name
Comment
It would be helpful if SDT provide some rationale for expanding the applicability to PCA. This expansion is not reflected in the Standard Authorization
Request. We need to ensure that additional compliance burden pays off in mitigating the security risk.
Likes
0
Dislikes
0
Response
Todd Bennett - Associated Electric Cooperative, Inc. - 3, Group Name AECI
Answer
No
Document Name
Comment
AECI supports comments filed by NRECA
Likes
0
Dislikes
0
Response
Barry Lawson - National Rural Electric Cooperative Association - 4
Answer
No
Document Name
Comment
Yes. NRECA believes the removal of requirements form CIP-004-6 to CIP-011-3 was not authorized by the SAR for this project. The SAR explicitly
stated that the purpose or goal of the project was “[c]larifying the CIP requirements and measures related to both managing access and securing BES
Cyber System Information.” Further, the scope of the SAR did not make any mention of scope expansion. In fact, the SAR explicitly provided for
modifications to “clarify” existing access management requirements for BCSI. Accordingly, because the SAR did not contemplate or authorize scope
expansion relative to asset applicability, the SDT revisions go beyond the scope of the SAR as provided below (emphasis added):
CIP-004-6 Requirements need to be modified so management of access to BCSI is clarified to include a focus on the BCSI data and the controls
deployed to limit access. In addition, the Standard should allow various methods for controlling access to BES Cyber System Information,
storage location(s). The focus must be on BCSI and the ability to obtain and make use of it. This is particularly necessary when it comes to the
utilization of a third party’s system (e.g. cloud services). The current Requirements are focused on access to the “storage location”, but should consider
management of access to BCSI while in transit, storage, and in use. In addition to CIP-004-6 modifications, CIP-011-2 should also be evaluated for any
subsequent impacts.
Further, NRECA notes that PCAs currently do not require authorization for access in CIP-004. If no access authorization is required to access the asset
itself, it is unclear as to why authorization would be required to obtain access to information about a system for which no access authorization is
required. This contradiction is not addressed within the Technical Rationale and should be addressed by the SDT to ensure that there is an appropriate
identification of risk associated with the recommendation to add PCAs to CIP-011.
Likes
0
Dislikes
0
Response
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
Document Name
No
Comment
Agree with MRO NSRF comments.
Likes
0
Dislikes
0
Response
Andrea Barclay - Georgia System Operations Corporation - 4
Answer
No
Document Name
Comment
Yes. First, GSOC respectfully suggests that the removal of requirements form CIP-004-6 to CIP-011-3 was not authorized by the SAR for this
project. In particular, the SAR explicitly stated that the purpose or goal of the project was “[c]larifying the CIP requirements and measures related to
both managing access and securing BES Cyber System Information.” Further, the scope of the SAR did not make any mention of scope expansion. In
fact, the SAR explicitly provided for modifications to “clarify” existing access management requirements for BCSI. Accordingly, because the SAR did
not contemplate or authorize scope expansion relative to asset applicability, the SDT revisions go beyond the scope of the SAR as provided below
(emphasis added):
CIP-004-6 Requirements need to be modified so management of access to BCSI is clarified to include a focus on the BCSI data and the controls
deployed to limit access. In addition, the Standard should allow various methods for controlling access to BES Cyber System Information,
storage location(s). The focus must be on BCSI and the ability to obtain and make use of it. This is particularly necessary when it comes to the
utilization of a third party’s system (e.g. cloud services). The current Requirements are focused on access to the “storage location”, but should consider
management of access to BCSI while in transit, storage, and in use. In addition to CIP-004-6 modifications, CIP-011-2 should also be evaluated for any
subsequent impacts.
Further, GSOC notes that PCAs currently do not require authorization for access in CIP-004. If no access authorization is required to access the asset
itself, it is unclear as to why authorization would be required to obtain access to information about a system for which no access authorization is
required. This contradiction is not addressed within the Technical Rationale and should be addressed by the SDT to ensure that there is an appropriate
identification of risk associated with the recommendation to add PCAs to CIP-011.
Likes
0
Dislikes
0
Response
Lana Smith - San Miguel Electric Cooperative, Inc. - 5
Answer
Document Name
Comment
No
SMEC agrees with comments submitted by NRECA.
Likes
0
Dislikes
0
Response
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
No
Document Name
Comment
Yes, an Entity without ERC today will now be required to have an information protection program which could have a major impact. What is the risk
sought to be reduced here? There is not a possibility to use a site without ERC as a pivot point, so the likelihood of a site without ERC being used in a
cyber-attack is incredibly low. Increasing the scope here only furthers the point from question 10 on easily increasing scope in the future.
Likes
0
Dislikes
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
No
Document Name
Comment
This seems to defeat the SDT’s stated intention to focus the security on the BCSI; therefore, in its proposed form the requirement language neither
aligns with nor accomplishes this stated objective
Likes
0
Dislikes
0
Response
Jonathan Robbins - Seminole Electric Cooperative, Inc. - 4
Answer
Document Name
Comment
No
See NRECA submitted comments.
Likes
0
Dislikes
0
Response
Nicholas Lauriat - Network and Security Technologies - 1
Answer
No
Document Name
Comment
N&ST does not have any concerns with the proposed expansion of CIP-011 to include PCAs. N&ST notes that the current, enforceable CIP-011-2 is
already applicable to all Medium Impact BES Cyber Systems.
Likes
0
Dislikes
0
Response
Kagen DelRio - North Carolina Electric Membership Corporation - 3,4,5 - SERC
Answer
No
Document Name
Comment
NCEMC supports the comments by Barry Lawson, National Rural Electric Cooperative Association and ACES
Likes
0
Dislikes
0
Response
Tho Tran - Tho Tran On Behalf of: Lee Maurer, Oncor Electric Delivery, 1; - Tho Tran
Answer
No
Document Name
Comment
Oncor does not agree with the scope expansion unless the SDT provide justification that pay off additional burden in mitigating the security risk.
Likes
0
Dislikes
0
Response
Bridget Silvia - Sempra - San Diego Gas and Electric - 3
Answer
No
Document Name
Comment
SDG&E supports EEI’s comments submitted on our behalf.
Additionally, SDG&E would like to comment on CIP-011-3 requirement’s proposed inclusion of all Medium-Impact BCS, regardless of ERC. The current
CIP-004-6 R4.4 requirement specifies applicability for only High Impact BCS and Medium Impact BCS with ERC. The new CIP 011-3 brings all BCSI in
scope regardless of ERC in Medium-Impact Sites. This change is significant and overburdensome to sites that don’t currently fall into this category of
BCSI.
Likes
0
Dislikes
0
Response
Ayman Samaan - Edison International - Southern California Edison Company - 1
Answer
No
Document Name
Comment
Please see comments submitted by Edison Electric Institute
Likes
0
Dislikes
0
Response
David Rivera - New York Power Authority - 3
Answer
Document Name
Comment
No
We are concerned because of access management associated with Medium Impact.
This expansion is not backwards compatible
Likes
0
Dislikes
0
Response
Bobbi Welch - Midcontinent ISO, Inc. - 2
Answer
No
Document Name
Comment
No – PCA may also contain BCSI.
Likes
0
Dislikes
0
Response
Gregory Campoli - New York Independent System Operator - 2
Answer
No
Document Name
Comment
PCA may also contain BCSI.
Likes
0
Dislikes
0
Response
Marty Hostler - Northern California Power Agency - 5
Answer
Document Name
Comment
No
We may in the future.
Likes
0
Dislikes
0
Response
James Brown - California ISO - 2 - WECC
Answer
No
Document Name
Comment
No additional comments.
Likes
0
Dislikes
0
Response
Dennis Sismaet - Northern California Power Agency - 6
Answer
No
Document Name
Comment
We may in the future.
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
Document Name
Comment
No
Removing the qualifying language “with ERC” from the applicability of Medium Impact BES Cyber Systems from CIP-004-6, when moved to CIP-011-3
R1.3, greatly expands the scope of this requirement. This expansion of scope is not justified, as the deliberate choice of not implementing ERC to
Medium Impact BES Cyber Systems is currently recognized as a considerable protection.
The scope is also expanded significantly by changing the former CIP-004 requirements to apply to all BCSI, not just designated storage locations of
BCSI.
Likes
0
Dislikes
0
Response
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
No
Document Name
Comment
No additional comments.
Likes
0
Dislikes
0
Response
Michael Johnson - Michael Johnson On Behalf of: James Mearns, Pacific Gas and Electric Company, 1, 3, 5; Marco Rios, Pacific Gas and
Electric Company, 1, 3, 5; Sandra Ellis, Pacific Gas and Electric Company, 1, 3, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
No
Document Name
Comment
PG&E has concerns regarding the addition of PCA and the benefit of including them compared to the effort of identifying and protecting BCSI related to
PCA. As noted in Question 5, PG&E would like the SDT to articulate the reason for the addition of PCA since there is no information in the Technical
Rationale document to warrant its addition.
Regarding the inclusion of all Medium Impact BCS, PG&E believes this is an appropriate modification since the BCSI information for these Cyber
Assets could be used to compromise those Cyber Assets if physical access is gained.
Likes
0
Dislikes
Response
0
Bradley Collard - SunPower - 5
Answer
No
Document Name
Comment
SunPower supports Duke Energy’s comments. This creates a possibility of multiple violations as opposed to a single violation in the original CIP-004
Standard.
Likes
0
Dislikes
0
Response
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 1,3,4,5 - RF
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name Public Utility District No. 1 of Chelan County
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Karl Blaszkowski - CMS Energy - Consumers Energy Company - 3
Answer
Document Name
No
Comment
Likes
0
Dislikes
0
Response
Donald Lynd - CMS Energy - Consumers Energy Company - 1
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Teresa Cantwell - Lower Colorado River Authority - 1,5, Group Name LCRA Compliance
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
No
Document Name
Comment
Likes
0
Dislikes
Response
0
Dwayne Parker - CMS Energy - Consumers Energy Company - 4
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
sean erickson - Western Area Power Administration - 1
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Gerry Adamski - Cogentrix Energy Power Management, LLC - 5
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Document Name
Comment
No
Likes
0
Dislikes
0
Response
Jamie Monette - Allete - Minnesota Power, Inc. - 1
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Colleen Campbell - AES - Indianapolis Power and Light Co. - 3
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Michael Puscas - ISO New England, Inc. - 2
Answer
No
Document Name
Comment
Likes
0
Dislikes
Response
0
Kevin Conway - Public Utility District No. 1 of Pend Oreille County - 1
Answer
Yes
Document Name
Comment
We are concerned with scope creep. What problem are we trying to solve?
Likes
0
Dislikes
0
Response
Masuncha Bussey - Duke Energy - 1,3,5,6 - SERC, Group Name Duke Energy
Answer
Yes
Document Name
Comment
Duke Energy is concerned that increasing the Applicability of the Requirements to include the addition of PCAs and all Medium Impact BCS would
require significant efforts to modify technical, administrative, and operational controls, compliance processes, and evidentiary documentation. Duke
Energy suggests to consider surveying Responsible Entities to assess how many PCAs and Medium Impact BCS would now need to comply with CIP011-3 and at what cost vs. the potential increase in Reliability to the BES.
Likes
0
Dislikes
0
Response
Scott Miller - Scott Miller On Behalf of: David Weekley, MEAG Power, 3, 1; Roger Brand, MEAG Power, 3, 1; - Scott Miller
Answer
Yes
Document Name
Comment
More clarity is needed.
Likes
0
Dislikes
Response
0
Dana Klem - MRO - 1,2,3,4,5,6 - MRO, Group Name MRO NSRF
Answer
Yes
Document Name
Comment
Removing the qualifying language “with ERC” from the applicability of Medium Impact BES Cyber Systems from CIP-004-6 R4.1 when moved to CIP011-3 R1.3, is unacceptable. This deletion greatly expands the scope of this requirement. This expansion of scope is not justified, as the deliberate
choice of not implementing ERC to Medium Impact BES Cyber Systems is currently recognized as a considerable and sufficient protection in and of
itself.
The scope is also expanded significantly by changing the former CIP-004 requirements to apply to all BCSI, not just designated storage locations of
BCSI.
Lack of ERC also renders BCSI pertaining to Medium Impact BES Cyber Systems outside the scope of R1 Part 1.2, as any such information, if
obtained, cannot be used remotely, as there is no remote access to the Cyber Systems. These Cyber Systems can only be compromised by breaching
physical security, in which case this standard provides no protection.
Likes
0
Dislikes
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Yes
Document Name
Comment
The addition of PCAs is overburdensome. By definition, PCAs do not have a 15 minute impact on the reliability of the BES. They are not a part of a
BCS and should not be considered BCSI.
Likes
0
Dislikes
0
Response
Amy Casuscelli - Xcel Energy, Inc. - 1,3,5,6 - MRO,WECC
Answer
Document Name
Comment
Yes
Xcel Energy support the comments submitted by EEI.
Likes
0
Dislikes
0
Response
Jeremy Voll - Basin Electric Power Cooperative - 3
Answer
Yes
Document Name
Comment
Support the MRO NSRF comments
Likes
0
Dislikes
0
Response
Kjersti Drott - Tri-State G and T Association, Inc. - 1
Answer
Yes
Document Name
Comment
Tri-State does not agree with the scope expansion, as the risk associated with these added assets is much lower. This does not conform to the riskbased approach that the ERO has been striving to. The SDT would need to provide justification for scope expansion, especially given this was not in
scope of the SAR.
Likes
0
Dislikes
0
Response
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
Document Name
Comment
Yes
Suggest retaining existing scope that includes exclusions for Medium without ERC. The security posture of a system without ERC substantively
decreases the value of BCSI for remote attack scenarios, thus greatly reducing the value of that information to a potential adversary.
Likes
0
Dislikes
0
Response
Kent Feliks - AEP - 3
Answer
Yes
Document Name
Comment
AEP agrees with EEI, and does not support the addition of PCAs and Medium Impact Assets without ERC because the SDT has not adequately
described the risks or provided an explanation that justifies the expanded compliance burdens for entities. These changes go beyond the scope of the
SAR and improperly expands the scope of protections beyond the currently approved CIP Reliability Standards.
Likes
0
Dislikes
0
Response
Leonard Kula - Independent Electricity System Operator - 2
Answer
Yes
Document Name
Comment
We are concerned because of additional effort that imposing access management associated with BCSI for Medium Impact BCS (without ERC) and
PCAs
While IESO has only High Impact BCS, further analysis would need to be done to determine the amount of the impact on Ontario market
participants where this applicability would apply
Likes
0
Dislikes
0
Response
Chris Wagner - Santee Cooper - 1, Group Name Santee Cooper
Answer
Document Name
Comment
Yes
The proposed changes will add a considerable amount of work to any utilities that have Medium Impact Assets without ERC which may not be justified
by risk. Devices without ERC have less IT security risk than routable devices.
Likes
0
Dislikes
0
Response
Vivian Moser - APS - Arizona Public Service Co. - 3
Answer
Yes
Document Name
Comment
AZPS is concerned that the proposed expansion of CIP-011-3 to include Protected Cyber Assets and all Medium Impact Assets is unnecessary and
may be overly burdensome on Responsible Entities. AZPS believes the protections already afforded to these assets through the implementation of
CIP-005-5 and CIP-006-6 are sufficient to protect against any unauthorized “use” of BCSI.
Likes
0
Dislikes
0
Response
Janelle Marriott Gill - Tri-State G and T Association, Inc. - 3
Answer
Yes
Document Name
Comment
Tri-State G&T does not agree with the scope expansion, as the risk associated with these added assets is much lower. This does not conform to the
risk-based approach that the ERO has been striving to. The SDT would need to provide justification for scope expansion, especially given this was not
in scope of the SAR.
Likes
0
Dislikes
0
Response
Sandra Shaffer - Berkshire Hathaway - PacifiCorp - 6
Answer
Document Name
Yes
Comment
Removing the qualifying language “with ERC” from the applicability of Medium Impact BES Cyber Systems from CIP-004-6 R4.1 when moved to CIP011-3 R1.3greatly expands the scope of this requirement. This expansion of scope is not justified, as the deliberate choice of not implementing ERC to
Medium Impact BES Cyber Systems is currently recognized as a considerable and sufficient protection in and of itself.
The scope is also expanded significantly by changing the former CIP-004 requirements to apply to all BCSI, not just designated storage locations of
BCSI.
Having a lack of ERC also renders BCSI pertaining to Medium Impact BES Cyber Systems outside the scope of R1 Part 1.2, as such information, if
obtained, cannot be used remotely, as there is no remote access to the Cyber Systems. Information pertaining to these Cyber Systems can only be
used to compromise them by breaching physical security, in which case the CIP-011 standard provides no protection.
Likes
0
Dislikes
0
Response
Andrea Jessup - Bonneville Power Administration - 1,3,5,6 - WECC
Answer
Yes
Document Name
Comment
As always, the cyber risk is not well-addressed by rating cyber systems by association with physical BES assets and facilities. The risk from cyber
attack is the speed of exploit. Automation and vulnerabilities on one machine can be exploited and spread exponentially through networks infecting all
other assets within a similar security profile or to which an unprotected or poorly secured connection exists. So the cyber risk and the impact to the
particular BES asset to which it is attached are not a good proxy for each other. The risk to the BES of lots of poorly secured cyber assets is that in
concert they can have a disparately large impact to multiple BES assets. Aggregate attacks on low impact cyber assets can equate to a moderate level
of impact, and likewise attacks on (individually) medium impact assets can have a high impact when aggregated across a large number of such
facilities.
Likes
0
Dislikes
0
Response
Sean Bodkin - Dominion - Dominion Resources, Inc. - 6, Group Name Dominion
Answer
Document Name
Comment
Yes
Dominion Energy supports the work the SDT has done on develoing the current draft. Dominion energy suggests that the team focus on the approach
taken in the current NERC CMEP Guidance document in addressing the issue and further supports EEIs comments. The potential expansion of the
scope to these assets appears to be poutside the scope of the original SAR.
Likes
0
Dislikes
0
Response
David Jendras - Ameren - Ameren Services - 3
Answer
Yes
Document Name
Comment
Ameren agrees with and supports EEI comments.
Likes
0
Dislikes
0
Response
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
Yes
Document Name
Comment
This scope expansion was not in the SAR and the Technical Rationale states it was added, but gives no rationale as to why it was added. What risk is
being mitigated that justifies an increase in effort and cost? A case can be made that PCAs are already covered in the existing language since network
diagrams and lists of all network clients are already included in the definition of BCSI. We suggest the SDT include a rationale for the addition in the
Technical Rationale document and appropriately outline the risk that is being addressed.
Likes
0
Dislikes
0
Response
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
Yes
Document Name
Comment
ITC supports the response found in the NSRF Comment Form
Likes
0
Dislikes
0
Response
Quintin Lee - Eversource Energy - 1, Group Name Eversource Group
Answer
Yes
Document Name
Comment
We are concerned because of access management associated with Medium Impact would bring into scope a large number of information related to
medium impact substations .
Likes
0
Dislikes
0
Response
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
Yes
Document Name
Comment
Removing the qualifying language “with ERC” from the applicability of Medium Impact BES Cyber Systems from CIP-004-6 R4.1 when moved to CIP011-3 R1.3, greatly expands the scope of this requirement. This expansion of scope is not justified, as the deliberate choice of not implementing ERC to
Medium Impact BES Cyber Systems is currently recognized as a considerable and sufficient protection in and of itself.
The scope is also expanded significantly by changing the former CIP-004 requirements to apply to all BCSI, not just designated storage locations of
BCSI.
Having a lack of ERC also renders BCSI pertaining to Medium Impact BES Cyber Systems outside the scope of R1 Part 1.2, as such information, if
obtained, cannot be used remotely, as there is no remote access to the Cyber Systems. Information pertaining to these Cyber Systems can only be
used to compromise them by breaching physical security, in which case the CIP-011 standard provides no protection.
Likes
0
Dislikes
0
Response
Devin Shines - PPL - Louisville Gas and Electric Co. - 1,3,5,6 - SERC,RF, Group Name PPL NERC Registered Affiliates
Answer
Yes
Document Name
Comment
As described in the SAR, the changes were to add the ability to allow entities to use cloud services and to clarify the requirements and measures
related to access and securing BCSI. We are unsure why the changes included expanding the scope to all Medium Impact BCS and PCAs. If
approved as written, 18 months will not be sufficient time to implement this across this large number of new assets, locations and
information. Additionally, an asset that has no impact on the BES and just resides within the same ESP as a BCS, a PCA, does not (by default) have
BCSI.
Likes
0
Dislikes
0
Response
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
Yes
Document Name
Comment
Please provide more clarity on the phrase "System information pertaining to". This needs to be well defined and understood. There may be many
systems that are associated with systems that may or may not house BCSI.
Likes
0
Dislikes
0
Response
Eli Rivera - CenterPoint Energy Houston Electric, LLC - NA - Not Applicable - Texas RE
Answer
Document Name
Comment
Yes
As a note, CIP-011-2 already applied to all Medium Impact whether or not External Routable Connectivity existed.
Adding PCA is a concern because it could be a major new effort unsupported by existing resources with expertise in OT, not IT, assets. Existing
storage locations, especially for substation BCS, PACS, and EACMS may be using a file-based version control system that may only be configured and
capable of handling a small number of text or firmware files. This system may not not be amenable to storing more complex configurations of a local
PCA such as a terminal or server running Windows.
Likes
0
Dislikes
0
Response
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
Yes
Document Name
Comment
EEI cannot support the addition of PCAs and Medium Impact Assets without ERC because there has not been an adequate identification of the risks or
an explanation for the expanded scope. These changes go beyond the scope of the SAR and expands the scope of protections beyond the currently
approved CIP Reliability Standards. The SDT should limit the applicability of BCSI to what is currently approved in CIP-011-2. If the SDT is aware of
any reliability gaps, it should develop a white paper to support their concerns and develop a revised SAR for approval.
Likes
0
Dislikes
0
Response
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name RSC no NextEra
Answer
Yes
Document Name
Comment
1.
We are concerned because of access management associated with Medium Impact.
1.
This expansion is not backwards compatible.
Likes
0
Dislikes
Response
0
Adrian Andreoiu - BC Hydro and Power Authority - 1, Group Name BC Hydro
Answer
Yes
Document Name
Comment
1. BC Hydro considers that additional guidance on the interpretation of what constitutes BCSI within either the Standard or the definition of BCSI is
needed for a more consistent framework across the industry.
2. With the expansion of scope to PCAs, BC Hydro requests that the language of the Standard includes provisions that limit the scope of authorization
requirements only to information disseminated after the effective date of the standard, and clarity that audits of previously released information is not
required.
Likes
1
Dislikes
BC Hydro and Power Authority, 5, Hamilton Harding Helen
0
Response
Holly Chaney - Snohomish County PUD No. 1 - 3, Group Name SNPD Voting Members
Answer
Yes
Document Name
Comment
SNPD does not understand what the new language is trying to achieve. We believe we understand and would likely choose to agree with the proposed
change, but the language does not appear to provide the necessary descriptive clarity to differentiate between whether the standard is attempting to
govern ALL PCA within medium facilities or just PCA with external connectivity? If the intent is ALL, please state so clearly.
Likes
1
Dislikes
Public Utility District No. 1 of Snohomish County, 4, Martinsen John
0
Response
Jenifer Holmes - Alliant Energy Corporation Services, Inc. - 4 - MRO,RF
Answer
Yes
Document Name
Comment
Alliant Energy agrees with NSRF and EEI’s comments.
Likes
Dislikes
0
0
Response
Dmitriy Bazylyuk - NiSource - Northern Indiana Public Service Co. - 3
Answer
Yes
Document Name
Comment
See Steven Toosevich's comments.
Likes
0
Dislikes
0
Response
Constantin Chitescu - Ontario Power Generation Inc. - 5
Answer
Yes
Document Name
Comment
OPG is in agreement with RSC provided comment
Likes
0
Dislikes
0
Response
Ryan Olson - Portland General Electric Co. - 5, Group Name PGE Group 2
Answer
Yes
Document Name
Comment
PGE agrees with EEI’s comments
Likes
0
Dislikes
Response
0
Jennie Wike - Jennie Wike On Behalf of: Hien Ho, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; John Merrell, Tacoma Public Utilities
(Tacoma, WA), 3, 1, 4, 5, 6; Marc Donaldson, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Ozan Ferrin, Tacoma Public Utilities (Tacoma,
WA), 3, 1, 4, 5, 6; Terry Gifford, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; - Jennie Wike
Answer
Yes
Document Name
Comment
While the identification of BCSI has not increased in scope, the identification of BCSI storage locations has. This will add burden to entities that have
many Medium Impact systems with no ERC.
Additionally, the R1 Part 1.2 requirement language as written seems to make even authorized access impossible.
Likes
0
Dislikes
0
Response
Douglas Webb - Douglas Webb On Behalf of: Allen Klassen, Westar Energy, 6, 3, 1, 5; Bryan Taggart, Westar Energy, 6, 3, 1, 5; Derek Brown,
Westar Energy, 6, 3, 1, 5; Grant Wilkerson, Westar Energy, 6, 3, 1, 5; James McBee, Great Plains Energy - Kansas City Power and Light Co., 1,
3, 6, 5; Jennifer Flandermeyer, Great Plains Energy - Kansas City Power and Light Co., 1, 3, 6, 5; John Carlson, Great Plains Energy - Kansas
City Power and Light Co., 1, 3, 6, 5; Marcus Moor, Great Plains Energy - Kansas City Power and Light Co., 1, 3, 6, 5; - Douglas Webb, Group
Name Westar-KCPL
Answer
Yes
Document Name
Comment
Westar and Kansas City Power & Light Company, endorse Edison Electric Institute's (EEI) comments.
Likes
0
Dislikes
0
Response
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
Yes
Document Name
Comment
Removing the qualifying language “with ERC” from the applicability of Medium Impact BES Cyber Systems from CIP-004-6, when moved to CIP-011-3
R1.3, greatly expands the scope of this requirement. This expansion of scope is not justified, as the deliberate choice of not implementing ERC to
Medium Impact BES Cyber Systems is currently recognized as a considerable protection.
The scope is also expanded significantly by changing the former CIP-004 requirements to apply to all BCSI, not just designated storage locations of
BCSI.
Likes
0
Dislikes
0
Response
Laura Nelson - IDACORP - Idaho Power Company - 1
Answer
Yes
Document Name
Comment
There are several expansions of scope built into this proposed revision. CIP-004-6 Part 4.4 is applicable to only Medium Impact BES Cyber Systems
with ERC. The ERC qualifier is removed as part of CIP-011-3 Part 1.3. While most Responsible Entities likely take care to protect BCSI to one degree
or another, there is not a compliance threshold for authorizing access to BCSI associated with Medium Impact BES Cyber System without ERC. This
proposed change increases the burden on Responsible Entities. Additionally, PCAs are introduced as associated devices in this proposed revision.
Again, most Responsible Entities are likely protecting much of the information, and this creates a new compliance threshold and new compliance
burden that Responsible Entities will have to bear. A signicant effort will be required to evaluate processes and procedures, to re-evaluate devices,
provide training, update and change technologies that are used to authorize and approve access. There are concerns that this will take more than
minimal effort to accommodate these changes without commensurate security benefits.
Likes
0
Dislikes
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Truong Le - Truong Le On Behalf of: Carol Chinn, Florida Municipal Power Agency, 6, 4, 5, 3; Chris Gowder, Florida Municipal Power Agency,
6, 4, 5, 3; Dale Ray, Florida Municipal Power Agency, 6, 4, 5, 3; David Owens, Gainesville Regional Utilities, 1, 5, 3; Richard Montgomery,
Florida Municipal Power Agency, 6, 4, 5, 3; - Truong Le
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Anton Vu - Los Angeles Department of Water and Power - 6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Angela Gaines - Portland General Electric Co. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Allan Long - Memphis Light, Gas and Water Division - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kinte Whitehead - Exelon - 3
Answer
Document Name
Comment
Exelon supports EEI's comments on behalf of Exelon Segments 1, 3, 5, and 6.
Likes
0
Dislikes
0
Response
Kathryn Tackett - NiSource - Northern Indiana Public Service Co. - 5
Answer
Document Name
Comment
See Steven Toosevich's comments.
Likes
0
Dislikes
Response
0
12. In looking at all proposed recommendations from the SDT, are the proposed changes a cost-effective approach?
Bradley Collard - SunPower - 5
Answer
No
Document Name
Comment
SunPower believes the cost of meeting the Standard will be greater by instituting key controls and other prescribed processes that are unnecessary. It
increases workload greatly.
Likes
0
Dislikes
0
Response
Colleen Campbell - AES - Indianapolis Power and Light Co. - 3
Answer
No
Document Name
Comment
The key management section needs to be better defined to show a difference between on premise and third party storage of BCSI. Solutions to the key
management issue may prove costly depending on the scope of where it will need to be used.
Likes
0
Dislikes
0
Response
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
No
Document Name
Comment
The proposed changes significantly increase the compliance and documentation burden without a commensurate increase in security.
We believe the standard revisions will increase the risk of non-compliance due to some of the proposed requirements having impossible evidencing
requirements.
Likes
0
Dislikes
0
Response
Michael Johnson - Michael Johnson On Behalf of: James Mearns, Pacific Gas and Electric Company, 1, 3, 5; Marco Rios, Pacific Gas and
Electric Company, 1, 3, 5; Sandra Ellis, Pacific Gas and Electric Company, 1, 3, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
No
Document Name
Comment
PG&E indicates the move of access authorization and revocation from CIP-004 to CIP-011 and inclusion of key management are appropriate in
addressing the protection of BCSI. There could be increased costs related to key management if an entity does not have that current capability for key
management but does not believe there would be any cost increase if an entity currently has a key management program.
For the addition of PCA, PG&E has concerns related to the benefit of their inclusion compared to the administrative burden of identifying and protecting
that BCSI. As noted in Question 5, PG&E would like the SDT to articulate the reason for the addition of PCA to help determine if it should be covered
by the Standard.
Likes
0
Dislikes
0
Response
Douglas Webb - Douglas Webb On Behalf of: Allen Klassen, Westar Energy, 6, 3, 1, 5; Bryan Taggart, Westar Energy, 6, 3, 1, 5; Derek Brown,
Westar Energy, 6, 3, 1, 5; Grant Wilkerson, Westar Energy, 6, 3, 1, 5; James McBee, Great Plains Energy - Kansas City Power and Light Co., 1,
3, 6, 5; Jennifer Flandermeyer, Great Plains Energy - Kansas City Power and Light Co., 1, 3, 6, 5; John Carlson, Great Plains Energy - Kansas
City Power and Light Co., 1, 3, 6, 5; Marcus Moor, Great Plains Energy - Kansas City Power and Light Co., 1, 3, 6, 5; - Douglas Webb, Group
Name Westar-KCPL
Answer
No
Document Name
Comment
Westar and Kansas City Power & Light Company believe there is a more cost-effective approach as set forth in EEI's comments.
Likes
0
Dislikes
0
Response
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
No
Document Name
Comment
As noted elsewhere, ERCOT believes some of the proposed changes may be administratively burdensome and that more cost-effective solutions may
be available. Recognizing that complying with new regulations will lead to increased costs, a more cost-effective approach may be to focus on less
prescriptive controls and focus more on objective or outcome based changes. ERCOT also notes that it is difficult to determine cost-effectiveness
absent a complete draft standard.
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
No
Document Name
Comment
The proposed changes significantly increase the compliance and documentation burden without a commensurate increase in security.
We believe the standard revisions will increase the risk of non-compliance due to some of the proposed requirements having impossible evidencing
requirements.
Likes
0
Dislikes
0
Response
Dennis Sismaet - Northern California Power Agency - 6
Answer
No
Document Name
Comment
If it where cost effective it would NOT be so prescriptive. Please include the real cost in the estimates maybe $350K/year+? Remember the WECC
Poka-Yoke webinar. Thorough project controls analysis; whatever can fail plan, will fail; so plan for cost of finding failures and fixing failures, then doing
it again until no failures, include all this work WECC discusses in their webinar in cost estimates.
Likes
0
Dislikes
Response
0
James Brown - California ISO - 2 - WECC
Answer
No
Document Name
Comment
As noted above, some of the proposed changes are administratively burdensome and a more cost-effective solution may be available. Recognizing that
complying with new regulations will lead to increased costs, a more cost-effective approach may be to focus on less prescriptive controls and instead be
more focused on objective or outcome based changes. Additionally, it is difficult to determine cost effectiveness with the first draft of a standard.
Likes
0
Dislikes
0
Response
Jamie Monette - Allete - Minnesota Power, Inc. - 1
Answer
No
Document Name
Comment
An evaluation would be needed to determine, but this proposal would likely add costs and does not appear to be cost effective as written. This
recommendation will require additional time, attention, and coordination between several departments and subject matter experts.
Likes
0
Dislikes
0
Response
Jenifer Holmes - Alliant Energy Corporation Services, Inc. - 4 - MRO,RF
Answer
No
Document Name
Comment
Alliant Energy agrees with NSRF’s comments.
Likes
0
Dislikes
Response
0
Holly Chaney - Snohomish County PUD No. 1 - 3, Group Name SNPD Voting Members
Answer
No
Document Name
Comment
No, the proposed changes do not meet the goal of enabling (relatively) easy vetting and procurement of cloud services or efficient use of cloud services
without the need for onerous local key management, and will likely not result in adoption of cloud services for BCSI due to the increased resources
required to vet, secure, and maintain BCSI in the cloud. Reciprocal federal certifications, such as those described in the response to Question 3, would
greatly alleviate the resources required for small and medium sized Entities.
Likes
1
Dislikes
Public Utility District No. 1 of Snohomish County, 4, Martinsen John
0
Response
Marty Hostler - Northern California Power Agency - 5
Answer
No
Document Name
Comment
If it where cost effective it would NOT be so prescriptive. Please include the real cost in the estimates maybe $350K/year+? Remember the WECC
PokaYoka webinar. Though project controls analysis. Whatever can fail plan for those high costs in esimate too?
Likes
0
Dislikes
0
Response
Adrian Andreoiu - BC Hydro and Power Authority - 1, Group Name BC Hydro
Answer
No
Document Name
Comment
BC Hydro estimates that significant costs will likely be incurred, particularly in relation to R2 of CIP-011-3. Also the use of vendors will lead to significant
costs relating to risk assessments under R1.4. If vendors need to adhere to entity imposed Vendor controls, the costs may be passed back to the
responsible entity. More cost effective approach would be to establish an industry accceptable standard for vendors and, if they meet these criteria, this
would negate vendor risk assessments as part of reliability standard requirements. This could be done by creating a list of certified vendors for entity
use.
Likes
1
Dislikes
BC Hydro and Power Authority, 5, Hamilton Harding Helen
0
Response
Gregory Campoli - New York Independent System Operator - 2
Answer
No
Document Name
Comment
As noted in our response to questions 6 and 8 above, some of the proposed changes are administratively burdensome where more efficient and costeffective solutions may be available. Recognizing that complying with new regulations will lead to increased costs; it would seem that a less prescriptive
method favoring an objective / outcome-based requirement would be a better approach. Cryptosystems and key management may be cost prohibitive
for many organizations.
Likes
0
Dislikes
0
Response
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
No
Document Name
Comment
Unintentionally, check a response to question 12. EEI offers no response to question 12.
Likes
0
Dislikes
0
Response
Bobbi Welch - Midcontinent ISO, Inc. - 2
Answer
Document Name
Comment
No
No. As noted in our response to questions 6 and 8 above, some of the proposed changes are administratively burdensome where more cost-effective
solutions may be available. Recognizing that complying with new regulations will lead to increased costs, a more cost-effective approach may be to
focus on less prescriptive methods in favor of objective / outcome-based requirements.
Likes
0
Dislikes
0
Response
Wayne Guttormson - SaskPower - 1
Answer
No
Document Name
Comment
Support MRO comments.
Likes
0
Dislikes
0
Response
Devin Shines - PPL - Louisville Gas and Electric Co. - 1,3,5,6 - SERC,RF, Group Name PPL NERC Registered Affiliates
Answer
No
Document Name
Comment
We believe that the proposed changes, which include the changes for cloud-based solutions and the increased scope for Medium Impact and PCAs,
are not a cost-effective approach.
Likes
0
Dislikes
0
Response
David Rivera - New York Power Authority - 3
Answer
Document Name
Comment
No
The changes included will require additional cost to every entity in North America, primarily through increased staff needed for compliance
management. Also, the additional cost associated with the change to Medium Impact expanded scope.
Likes
0
Dislikes
0
Response
Ayman Samaan - Edison International - Southern California Edison Company - 1
Answer
No
Document Name
Comment
Please see comments submitted by Edison Electric Institute
Likes
0
Dislikes
0
Response
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
No
Document Name
Comment
The proposed changes significantly increase the compliance and documentation burden without a commensurate increase in security.
We belive the standard revisons will increase the risk of non-compliance due to some of the proposed requirements having impossible evidencing
requirements.
Likes
0
Dislikes
0
Response
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
Document Name
Comment
No
ITC supports the response found in the NSRF Comment Form
Likes
0
Dislikes
0
Response
Bridget Silvia - Sempra - San Diego Gas and Electric - 3
Answer
No
Document Name
Comment
SDG&E supports EEI’s comments submitted on our behalf.
SDG&E believes the new requirements will increase costs for the Responsible Entities.
Likes
0
Dislikes
0
Response
Tho Tran - Tho Tran On Behalf of: Lee Maurer, Oncor Electric Delivery, 1; - Tho Tran
Answer
No
Document Name
Comment
See response to question #11.
Likes
0
Dislikes
0
Response
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
Document Name
Comment
No
Southern agrees with other industry organizations, particularly NSRF, where the proposed changes will significantly increase the compliance and
documentation burden without a commensurate increase in security.
Likes
0
Dislikes
0
Response
Kagen DelRio - North Carolina Electric Membership Corporation - 3,4,5 - SERC
Answer
No
Document Name
Comment
NCEMC supports the comments by Barry Lawson, National Rural Electric Cooperative Association and ACES
Likes
0
Dislikes
0
Response
Sean Bodkin - Dominion - Dominion Resources, Inc. - 6, Group Name Dominion
Answer
No
Document Name
Comment
Dominion Energy does not have enough information to make an informed cost effectiveness conclusion.
Likes
0
Dislikes
0
Response
Andrea Jessup - Bonneville Power Administration - 1,3,5,6 - WECC
Answer
Document Name
Comment
No
This is very difficult to quantify across all of industry and various types of registered entities. If the language can be adjusted to account for nonelectronic information storage locations, it has potential.
Likes
0
Dislikes
0
Response
Sandra Shaffer - Berkshire Hathaway - PacifiCorp - 6
Answer
No
Document Name
Comment
The proposed changes significantly increase the compliance and documentation burden without a commensurate increase in security.
We belive the standard revisons will increase the risk of non-compliance due to some of the proposed requirements having impossible evidencing
requirements.
Likes
0
Dislikes
0
Response
Nicholas Lauriat - Network and Security Technologies - 1
Answer
No
Document Name
Comment
N&ST believes the costs associated with moving CIP-004 access management requirements to CIP-011, with changing the objects of access
management from BCSI storage locations to BCSI, with being required to perform annual risk assessments of 3rd-party BCSI storage vendors, and with
implementing prescriptive key management program requirements could be significant. At the same time, N&ST believes these proposed changes
would neither achieve the SDT’s stated goals nor improve the security of BES Cyber System Information.
Likes
0
Dislikes
0
Response
Jonathan Robbins - Seminole Electric Cooperative, Inc. - 4
Answer
No
Document Name
Comment
See NRECA submitted comments.
Likes
0
Dislikes
0
Response
Janelle Marriott Gill - Tri-State G and T Association, Inc. - 3
Answer
No
Document Name
Comment
Tri-State expects the proposed changes, as drafted, to be costly. For example, Part 2.2 prescribes a segregation, without any consideration of controls,
that could 1) prevent an entity from utilizing a cloud solution and instead having to pay the more expensive rate for on premise solution, 2) prevent an
entity from being able to fully implement into a cloud solution (which means managing and paying for both cloud and on premise environments), or 3)
result in a substantial increase in costs associated with managing keys on premise with additional staff, or by a 3rd party.
Likes
0
Dislikes
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
No
Document Name
Comment
Given the duplicity of these proposed modifications with other current or future enforceable standards, these revisions are too prescriptive and introduce
undue administrative burden without accomplishing the SDT’s stated objectives. In addition, moving CIP-004 requirements into CIP-011 has unintended
consequences and does not achieve the perceived efficiency.
Likes
0
Dislikes
Response
0
Vivian Moser - APS - Arizona Public Service Co. - 3
Answer
No
Document Name
Comment
AZPS is unable to make a determination of cost effectiveness at this time due to uncertainties in the requirements as currently drafted.
Likes
0
Dislikes
0
Response
Chris Wagner - Santee Cooper - 1, Group Name Santee Cooper
Answer
No
Document Name
Comment
The proposed changes are not a cost-effective approach for a utility that does not ERC. These organizations will now have to look at their Medium
Impact Asset documentation and decide what will become BCSI and then create storage locations for the information.
Likes
0
Dislikes
0
Response
Leonard Kula - Independent Electricity System Operator - 2
Answer
No
Document Name
Comment
The potential costs of the Part R1.4 vendor controls may not produce an effective result. In addition, the submitted feedback to Standards Efficiency
Review tends to question the value of annual reviews for the sake of a review. We would prefer a specific trigger or sets of triggers for reviews.
Likes
0
Dislikes
0
Response
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
No
Document Name
Comment
Because of the increases in scope of the standard this could have significant cost increases for REs making using 3rd party storage solutions cost
ineffective.
Likes
0
Dislikes
0
Response
Lana Smith - San Miguel Electric Cooperative, Inc. - 5
Answer
No
Document Name
Comment
SMEC agrees with comments submitted by NRECA.
Likes
0
Dislikes
0
Response
Andrea Barclay - Georgia System Operations Corporation - 4
Answer
No
Document Name
Comment
The proposed changes increase compliance activities and burden without the likelihood of an associated increase in reliability or security. Further,
several of the proposed changes would result in infeasible and impracticable compliance obligations. For example, as discussion above in GSOC’s
response to question #, the proposed revisions regarding the identification of BCSI would require a demonstration that all system information has been
evaluated for classification as BCSI. Such is infeasible. Another example is the revocation requirements set forth in requirement R1.5, which, when
coupled with the new requirements around identification of BCSI, would require that Responsible Entities prove that they successfully revoked access to
every, possible, individual piece of BCSI. Such is not feasible and is a paper exercise that is not cost-effective or beneficial to reliability or
security. Further, ambiguity around the term “sanitization” raises concerns that it unnecessarily raises the bar and reduce flexibility regarding what
needs to be done to an asset prior to reuse of disposal. This creates uncertainty and increases the burden of compliance on Responsible Entities for no
ostensible enhancement to reliability or security. This proposed revision and its consequences further impact overall cost-effectiveness of the proposed
revisions as entities that cannot segregate storage media from the overall asset will either have to sanitize the entire device or destroy the entire device,
neither of which results in a cost-effective solution for entities. Taken together, the proposed revisions do not propose substantive enhancements to
security or reliability that would justify the additional cost, resource, or compliance burden or risk.
Likes
0
Dislikes
0
Response
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
No
Document Name
Comment
Agree with MRO NSRF comments.
Likes
0
Dislikes
0
Response
Barry Lawson - National Rural Electric Cooperative Association - 4
Answer
No
Document Name
Comment
Based on our comments above, the proposed revisions do not propose substantive enhancements to security or reliability that would justify additional
costs/resources.
Likes
0
Dislikes
0
Response
Todd Bennett - Associated Electric Cooperative, Inc. - 3, Group Name AECI
Answer
No
Document Name
Comment
AECI supports comments filed by NRECA
Likes
Dislikes
0
0
Response
Kent Feliks - AEP - 3
Answer
No
Document Name
Comment
AEP does not feel as though these changes are a cost effective approach. These changes will require additional training for employees due to
requirements shifting to a different standard. Additionally, managing cloud service encryption and keys can be potentially expensive. However, AEP
recognizes that cost-related circumstances vary by Responsible Entity.
Likes
0
Dislikes
0
Response
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
No
Document Name
Comment
This has the effect of ever increasing scope to include anywhere an instance of BCSI may reside, whether in a physical and/or logical form. If an
individual were to create a paper copy of a BCSI, the entity would be obligated to track that paper until its destruction to ensure that it managed access
to the BCSI. The additional review, controls, risk assessment, and significant expansion of the scope of this compliance obligation as written would have
a high cost for the entity.
Likes
0
Dislikes
0
Response
Kjersti Drott - Tri-State G and T Association, Inc. - 1
Answer
No
Document Name
Comment
Tri-State expects the proposed changes, as drafted, to be costly. For example, Part 2.2 prescribes a segregation, without any consideration of controls,
that could 1) prevent an entity from utilizing a cloud solution and instead having to pay the more expensive rate for on premise solution, 2) prevent an
entity from being able to fully implement into a cloud solution (which means managing and paying for both cloud and on premise environments), or 3)
result in a substantial increase in costs associated with managing keys on premise with additional staff, or by a 3rd party.
Likes
0
Dislikes
0
Response
Matthew Nutsch - Seattle City Light - 1,3,4,5,6 - WECC
Answer
No
Document Name
Comment
Seattle is unconvinced that the proposed changes represent a cost-effective approach, given the complexity of the required approaches; the unresolved
questions about “obtain and use,” storage locations, R2 conflict with CIP-013, etc; and the prescriptive nature of new requirements R1.4, R1.5, and R2
that once again presume certain (although different) technology concepts that will no doubt soon become obsolete.
Likes
0
Dislikes
0
Response
Bruce Reimer - Manitoba Hydro - 1
Answer
No
Document Name
Comment
The proposed changes significantly increase the compliance and documentation burden without a commensurate increase in security. The
requirements are beyond the goals of SAR. The goals of SAR are to clarify the CIP requirements and measures related to both managing access and
securing BES Cyber System Information and clarify the protections expected when utilizing third-party solutions (e.g., cloud services).
Likes
0
Dislikes
0
Response
Jeremy Voll - Basin Electric Power Cooperative - 3
Answer
Document Name
Comment
No
Support the MRO NSRF comments
Likes
0
Dislikes
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
No
Document Name
Comment
Refer to question 11.
Likes
0
Dislikes
0
Response
Dana Klem - MRO - 1,2,3,4,5,6 - MRO, Group Name MRO NSRF
Answer
No
Document Name
Comment
The proposed changes significantly increase the compliance and documentation burden without a commensurate increase in security.
The requirements are going well above and beyond the SAR, and as written requires more controls than are necessary to mitigate risks. For example,
peforming vendor risk assessments at least once every 15 calendar months may not be commensurate with the low level of risk a vendor may pose, or
there are no changes in the vendors practices that would warrant another assessment.
Likes
0
Dislikes
0
Response
Joe Tarantino - Joe Tarantino On Behalf of: Arthur Starkovich, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Beth Tincher, Sacramento
Municipal Utility District, 4, 1, 6, 3, 5; Jamie Cutlip, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Kevin Smith, Balancing Authority of
Northern California, 1; Nicole Goi, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Nicole Looney, Sacramento Municipal Utility District, 4, 1,
6, 3, 5; - Joe Tarantino
Answer
No
Document Name
Comment
The standards may not reach the goal of allowing industry to leverage the lower cost of cloud services.
Likes
0
Dislikes
0
Response
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name Public Utility District No. 1 of Chelan County
Answer
No
Document Name
Comment
R2.1 is not cost effective as written as it implies all BCSI must be encrypted.
Likes
0
Dislikes
0
Response
Scott Miller - Scott Miller On Behalf of: David Weekley, MEAG Power, 3, 1; Roger Brand, MEAG Power, 3, 1; - Scott Miller
Answer
No
Document Name
Comment
NOT COST EFFECTIVE.
There is too much approach-uncertainty and therefore difficult to specifically identify safetly and risk mitigation methods.
the proposed updates are adding administrative paperwork which does not improve BES security.
Likes
0
Dislikes
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
No
Document Name
Comment
The proposed recommendations will provide additional options for protecting BCSI as well as open to more technologies. Additionally, the proposed
changes increase the required controls which will reduce risk and increase security. However, these changes are not cost effective and will require
investment from entities to implement due to the increased controls and need to protect BCSI throughout the entire lifecycle as well as the increased
need to protect BCSI stored in BCS, EACMS, PACS, and PCAs.
Likes
0
Dislikes
0
Response
Masuncha Bussey - Duke Energy - 1,3,5,6 - SERC, Group Name Duke Energy
Answer
No
Document Name
Comment
Duke Energy thinks that the proposed recommendations from the SDT would require significant efforts to modify technical, administrative, and
operational controls, compliance processes, and evidentiary documentation which carry a high cost and may be ineffective or outdated by the time of
implementation.
Likes
0
Dislikes
0
Response
William Hutchison - Southern Illinois Power Cooperative - 1
Answer
No
Document Name
Comment
Comments: Because of the increases in scope of the standard this could have significant cost increases for REs making using 3rd party storage
solutions cost ineffective.
Likes
0
Dislikes
0
Response
Kevin Conway - Public Utility District No. 1 of Pend Oreille County - 1
Answer
No
Document Name
Comment
Not for small entities.
Likes
0
Dislikes
0
Response
Michael Puscas - ISO New England, Inc. - 2
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Laura Nelson - IDACORP - Idaho Power Company - 1
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Teresa Cantwell - Lower Colorado River Authority - 1,5, Group Name LCRA Compliance
Answer
Document Name
Comment
Yes
Any changes to Standards with additional obligations does create costs.
Likes
0
Dislikes
0
Response
Susan Sosbe - Wabash Valley Power Association - 3
Answer
Yes
Document Name
Comment
No comments
Likes
0
Dislikes
0
Response
Allan Long - Memphis Light, Gas and Water Division - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Angela Gaines - Portland General Electric Co. - 1
Answer
Yes
Document Name
Comment
Likes
Dislikes
0
0
Response
Ryan Olson - Portland General Electric Co. - 5, Group Name PGE Group 2
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name RSC no NextEra
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Anton Vu - Los Angeles Department of Water and Power - 6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Truong Le - Truong Le On Behalf of: Carol Chinn, Florida Municipal Power Agency, 6, 4, 5, 3; Chris Gowder, Florida Municipal Power Agency,
6, 4, 5, 3; Dale Ray, Florida Municipal Power Agency, 6, 4, 5, 3; David Owens, Gainesville Regional Utilities, 1, 5, 3; Richard Montgomery,
Florida Municipal Power Agency, 6, 4, 5, 3; - Truong Le
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
sean erickson - Western Area Power Administration - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Dwayne Parker - CMS Energy - Consumers Energy Company - 4
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
Yes
Document Name
Comment
Likes
Dislikes
0
0
Response
Donald Lynd - CMS Energy - Consumers Energy Company - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Karl Blaszkowski - CMS Energy - Consumers Energy Company - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 1,3,4,5 - RF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kathryn Tackett - NiSource - Northern Indiana Public Service Co. - 5
Answer
Document Name
Comment
See Steven Toosevich's comments.
Likes
0
Dislikes
0
Response
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
Document Name
Comment
Depends on clarifiaction to question 11.
Likes
0
Dislikes
0
Response
Quintin Lee - Eversource Energy - 1, Group Name Eversource Group
Answer
Document Name
Comment
No comment at this time.
Likes
0
Dislikes
0
Response
Kinte Whitehead - Exelon - 3
Answer
Document Name
Comment
Exelon supports EEI's comments on behalf of Exelon Segments 1, 3, 5, and 6.
Likes
0
Dislikes
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Document Name
Comment
Texas RE does not have comments on this question.
Likes
0
Dislikes
0
Response
Gerry Adamski - Cogentrix Energy Power Management, LLC - 5
Answer
Document Name
Comment
This cannot be answered until a more thoughtful consideration is given to third-party security objectives.
Likes
0
Dislikes
Response
0
13. Do you have any other general recommendations/considerations for the drafting team?
Dana Klem - MRO - 1,2,3,4,5,6 - MRO, Group Name MRO NSRF
Answer
No
Document Name
Comment
We feel by including all Medium Impact BES Cyber Systems and eliminating the exclusion of Medium Impact BES Cyber Systems without External
Routable Connectivity, this draft of the standard exceeds the scope of the FERC-approved SAR, and does so to no gain while adding significant burden.
The aims of the SAR can be better and more easily achieved by:
1. Defining BCSI Repository
2. Defining BCSI Access
3. Focusing on managing BCSI Access to BCSI Repositories
Likes
0
Dislikes
0
Response
Jeremy Voll - Basin Electric Power Cooperative - 3
Answer
No
Document Name
Comment
Support the MRO NSRF comments
Likes
0
Dislikes
0
Response
Todd Bennett - Associated Electric Cooperative, Inc. - 3, Group Name AECI
Answer
Document Name
Comment
No
AECI supports comments filed by NRECA
Likes
0
Dislikes
0
Response
Lana Smith - San Miguel Electric Cooperative, Inc. - 5
Answer
No
Document Name
Comment
SMEC agrees with comments submitted by NRECA.
Likes
0
Dislikes
0
Response
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
No
Document Name
Comment
Thank you for the opportunity to comment.
Likes
0
Dislikes
0
Response
Sandra Shaffer - Berkshire Hathaway - PacifiCorp - 6
Answer
No
Document Name
Comment
In general, PacifiCorp supports EEI and NSRF’s comments proposed for these revisions.
By eliminating the exclusion of Medium Impact BES Cyber Systems without External Routable Connectivity (ERC), the drafting team is exceeding the
FERC SAR.
Many of the proposed changes are not in scope with the SAR and are too prescriptive.
Removing CIP-004 R4.1.3, R4.4, & R5.3 – creates a perceived gap within the access controls designed for CIP-004. We suggest the removal of,
“access to BES Cyber System Information (BCSI)”and the replacement with the term “BCSI Respository” or “designated BCSI storage location.” Thusly,
termination actions would result in the removal of access to BCSI Repositiories.
If access controls are to be spread throughout the CIP suite of Standards then the references need to be made in both requirements to direct the
readers to the correct locations.
CIP-011 R1.1 (A) – Applicable Systems not applicability. Suggested requirement language: Method(s) to identify information that meets the definition
of BES Cyber System Information.
CIP-011 R1.1 (B) – Applicable Systems – change to Medium Impact with ERC. Suggested requirement language: Method(s) to identify designated
BES Cyber System Information storage locations.
CIP-011 R1.2 - Applicable Systems not applicability. Suggested requiremenet language: Procedure(s) to prevent unauthorized access to BES Cyber
System Information during storage, transit, use, and disposal.
CIP-011 R1.3 – Applicable Systems – change to Medium Impact with ERC. Suggested requiremenet language: Process(es) to authorize access to
designated BES Cyber System Information storage locations based on need, as determined by the Responsible Entity, except during CIP Exceptional
Circumstances.
CIP-011 R1.4 – Remove this requirement and add to CIP-013 where most appropriate.
CIP-011 R1.5 – Applicable Systems – change to Medium Impact with ERC. Suggested requiremenet language: For termination actions, revoke the
individual’s current access to designated BES Cyber System Information storage locations, unless already revoked according to CIP-004-7
Requirement R5, Part 5.1) by the end of the next calendar day following the effective date of the termination action.
CIP-011 R1.6 – Applicable Systems – change to Medium Impact with ERC. Suggested requiremenet language: Verify at least once every 15 calendar
months that access to designated BES Cyber System Information storage locations, whether physical or electronic, is correct and consists of personnel
that the Responsible Entity determine are necessary for performing assigned work functions.
CIP-011 R2 – Suggested language: Each Responsible Entity shall implement one or more documented cryptographic key management program(s) that
collectively include the applicable requirement parts in CIP-011-3 Table R2 – Cryptographic Key Management Program.
The draft requirement R2.1 regarding key management is unclear, and yet, at the same time, too prescriptive, with the list of things that should be
included. The stated purpose of the SAR is referring to “cryptosystem” key management, but the NERC webinar slide regarding this part listed
“physically.”
CIP-011 R2.1 – change Applicability to include “BES Cyber System Information stored in Vendor managed electronic BCSI Repositories”. Suggested
requirement language: Where applicable, develop a cryptographic key management process(es) to restrict access with revocation ability, shall include
the following: (list of requirement sub parts)
CIP-011 R2.2 – change Applicability to include “BES Cyber System Information stored in Vendor managed electronic BCSI Repositories”. Suggested
requirement language: Implement controls to separate the BES Cyber System Information custodial entity’s duties independently from the cryptographic
key management program duties established in Part 2.1.
CIP-011 R3 – the requirement is fine as proposed.
Likes
0
Dislikes
0
Response
Kagen DelRio - North Carolina Electric Membership Corporation - 3,4,5 - SERC
Answer
No
Document Name
Comment
NCEMC supports the comments by Barry Lawson, National Rural Electric Cooperative Association and ACES
Likes
0
Dislikes
0
Response
Bridget Silvia - Sempra - San Diego Gas and Electric - 3
Answer
No
Document Name
Comment
SDG&E supports EEI’s comments submitted on our behalf.
Likes
0
Dislikes
0
Response
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
No
Document Name
Comment
ITC supports the response found in the NSRF Comment Form
Likes
0
Dislikes
0
Response
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
No
Document Name
Comment
In general, we support EEI and MRO NSRF comments proposed for these revisions.
By eliminating the exclusion of Medium Impact BES Cyber Systems without External Routable Connectivity (ERC), the drafting team is exceeding the
mandate of the SAR.
Many of the proposed changes are not in scope with the SAR and are too prescriptive.
Removing CIP-004 R4.1.3, R4.4, & R5.3 – creates a perceived gap within the access controls designed for CIP-004. We suggest the removal of,
“access to BES Cyber System Information (BCSI)”and the replacement with the term “BCSI Respository” or “designated BCSI storage location.” Thusly,
termination actions would result in the removal of access to BCSI Repositiories.
If access controls are to be spread throughout the CIP suite of Standards then the references need to be made in both requirements to direct the
readers to the correct locations.
CIP-011 R1.1 (A) – Applicable Systems not applicability. Suggested requirement language: Method(s) to identify information that meets the definition
of BES Cyber System Information.
CIP-011 R1.1 (B) – Applicable Systems – change to Medium Impact with ERC. Suggested requirement language: “Method(s) to identify designated
BES Cyber System Information storage locations [or Repositories].”
CIP-011 R1.2 - Applicable Systems not applicability. Suggested requiremenet language: Procedure(s) to prevent unauthorized BCSI Access during
storage, transit, and use.
CIP-011 R1.3 – Applicable Systems – change to Medium Impact with ERC. Suggested requiremenet language: Process(es) to authorize access to
designated BES Cyber System Information storage locations based on need, as determined by the Responsible Entity, except during CIP Exceptional
Circumstances.
CIP-011 R1.4 – Remove this requirement and add to CIP-013 where most appropriate.
CIP-011 R1.5 – Applicable Systems – change to Medium Impact with ERC. Suggested requiremenet language: For termination actions, revoke the
individual’s current access to designated BES Cyber System Information storage locations, unless already revoked according to CIP-004-7
Requirement R5, Part 5.1) by the end of the next calendar day following the effective date of the termination action.
CIP-011 R1.6 – Applicable Systems – change to Medium Impact with ERC. Suggested requiremenet language: Verify at least once every 15 calendar
months that access to designated BES Cyber System Information storage locations, whether physical or electronic, is correct and consists of personnel
that the Responsible Entity determine are necessary for performing assigned work functions.
CIP-011 R2 – Suggested language: Each Responsible Entity shall implement one or more documented cryptographic key management program(s) that
collectively include the applicable requirement parts in
CIP-011-3 Table R2 – Cryptographic Key Management Program.
The draft requirement R2.1 regarding key management is unclear, and yet, at the same time, too prescriptive, with the list of things that should be
included. The stated purpose of the SAR is referring to “cryptosystem” key management, but the NERC webinar slide regarding this part listed
“physically.”
CIP-011 R2.1 – change Applicability to include “BES Cyber System Information stored in Vendor managed electronic BCSI Repositories”. Suggested
requirement language: Where applicable, develop a cryptographic key management process(es) to restrict access with revocation ability, shall include
the following: (list of requirement sub parts)
CIP-011 R2.2 – change Applicability to include “BES Cyber System Information stored in Vendor managed electronic BCSI Repositories”. Suggested
requirement language: Implement controls to separate the BES Cyber System Information custodial entity’s duties independently from the cryptographic
key management program duties established in Part 2.1.
CIP-011 R3 – the requirement is fine as proposed.
Likes
Dislikes
0
0
Response
Ayman Samaan - Edison International - Southern California Edison Company - 1
Answer
No
Document Name
Comment
Please see comments submitted by Edison Electric Institute
Likes
0
Dislikes
0
Response
Wayne Guttormson - SaskPower - 1
Answer
No
Document Name
Comment
Support MRO comments.
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
No
Document Name
Comment
In general, we support EEI and MRO NSRF comments proposed for these revisions.
Likes
0
Dislikes
Response
0
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
No
Document Name
Comment
In general, we support EEI and MRO NSRF comments proposed for these revisions.
Likes
0
Dislikes
0
Response
William Hutchison - Southern Illinois Power Cooperative - 1
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 1,3,4,5 - RF
Answer
Document Name
Comment
No
Likes
0
Dislikes
0
Response
Karl Blaszkowski - CMS Energy - Consumers Energy Company - 3
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Donald Lynd - CMS Energy - Consumers Energy Company - 1
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
No
Document Name
Comment
Likes
0
Dislikes
Response
0
Teresa Cantwell - Lower Colorado River Authority - 1,5, Group Name LCRA Compliance
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Dwayne Parker - CMS Energy - Consumers Energy Company - 4
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Andrea Jessup - Bonneville Power Administration - 1,3,5,6 - WECC
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Quintin Lee - Eversource Energy - 1, Group Name Eversource Group
Answer
Document Name
Comment
No
Likes
0
Dislikes
0
Response
Allan Long - Memphis Light, Gas and Water Division - 1
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Laura Nelson - IDACORP - Idaho Power Company - 1
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Colleen Campbell - AES - Indianapolis Power and Light Co. - 3
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Bradley Collard - SunPower - 5
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Susan Sosbe - Wabash Valley Power Association - 3
Answer
Yes
Document Name
Comment
While the changes are a good start, significant consideration needs to be performed to consider the various environments the standard will apply to: (1)
Information stored by the Entity, which includes many small Entities on both OT and IT systems; (2) Information stored by a Cloud service provider on
behalf of an Entity; (3) Information located at a vendor under non-disclosure agreement in active use to meet BES needs.
Likes
0
Dislikes
0
Response
Kevin Conway - Public Utility District No. 1 of Pend Oreille County - 1
Answer
Yes
Document Name
Comment
Small agencies have limited budgets and staff. This approach continues to burden small agencies and we struggle to see any of the proposed changes
being cost effective.
Likes
0
Dislikes
0
Response
Masuncha Bussey - Duke Energy - 1,3,5,6 - SERC, Group Name Duke Energy
Answer
Yes
Document Name
Comment
Duke Energy recommends the following:
•
•
•
Removing the periodic review requirement in Part 1.4, and allowing the risk assessment to determine necessary reviews and frequency;
Need more clarity on where or when “factory resets” of a device are sufficient sanitization in reference to Part 3.1;
R1.2 language is problematic
o Need clarity that we are addressing “unauthorized” ability to obtain
o Eliminate is extremely strong wording
o Likely would require extensive encryption implementation
o Addition of disposal is unclear – do they mean obtaining access after it’s been disposed? Prior to secure disposal;
o Consider the Glossary of Terms used in NERC Reliability Standards: “Operating Plan; Operating Procedure; and Operating
here and in Part 1.3 rather than “method”, or “process” For greater clarity as to SDT intent.
•
Process, for use
R1.3 language is problematic
o How would we authorize access to information in use in a meeting, for example? Are we excpted to keep track of every vendor who has a short term
/ in-use need to know?
o It would be better to continue focusing authorization for access to storage locations and make that more robust; and
•
R1.4 does this presume the Entity has authorized the vendor personnel to access the information (as is typically necessary to store it)? If not,
the language is problematic.
o Additionally, do R1.5 and R1.6 apply to these vendor personnel?
Likes
0
Dislikes
0
Response
Scott Miller - Scott Miller On Behalf of: David Weekley, MEAG Power, 3, 1; Roger Brand, MEAG Power, 3, 1; - Scott Miller
Answer
Yes
Document Name
Comment
Please increase outreach and collaboration using an approach to reach everyone. More than one meeting on specific topic may be needed to reach
everyone due to other meeting conflicts and committments. Add written clarity to the Standards so it can stand on its own without needing supporting
documents.
A guiodeline WILL be needed. Why not improve the Standard by increasing clarity thereby reducing the need for a Guideline?
Likes
0
Dislikes
0
Response
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name Public Utility District No. 1 of Chelan County
Answer
Yes
Document Name
Comment
Please provide guidance on the requirements as they relate to encrypting BCSI stored by a Vendor and encrypting BCSI stored on premises.
Likes
0
Dislikes
0
Response
Joe Tarantino - Joe Tarantino On Behalf of: Arthur Starkovich, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Beth Tincher, Sacramento
Municipal Utility District, 4, 1, 6, 3, 5; Jamie Cutlip, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Kevin Smith, Balancing Authority of
Northern California, 1; Nicole Goi, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Nicole Looney, Sacramento Municipal Utility District, 4, 1,
6, 3, 5; - Joe Tarantino
Answer
Yes
Document Name
Comment
We recommend that the scope of the standards team consider leveraging standards such as Fedramp to justify the use of cloud services. We also
recommend that the team revist the definition of BES CSI to clear ambiguity. The language and scope of the SAR focused on the resolution of the
issue related to the physical control of BES CSI information in transit or use that may not be practical.
Likes
0
Dislikes
0
Response
Amy Casuscelli - Xcel Energy, Inc. - 1,3,5,6 - MRO,WECC
Answer
Document Name
Comment
Yes
Xcel Energy support the comments submitted by EEI.
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
Yes
Document Name
Comment
Comments:
•
o
CIP-011-3 R2 Part 2.1 introduces nine terms in its sub-parts 2.1.1 through 2.1.9. These nine terms are not further discussed or defined.
While formal Glossary definitions may not be needed, each term should be at least briefly explained. For example, “2.1.1 Key
generation – the methods used to create a new encryption key.” Of particular interest is the use of the term “Key suppression.” This
term should be clearly explained.
o
The SDT should consider the advisability of keeping CIP-011-3’s BES Cyber Asset Reuse and Disposal as Requirement R2 for
continuity with CIP-011-2.
o
Per CIP-011-3 R3 Part 3.1 that states “Prior to the release for reuse or disposal of applicable Cyber Assets (except for reuse within
other systems identified in the “Applicable Systems” column), the Cyber Asset data storage media shall be sanitized or destroyed”, can
the referenced Applicable Systems be reused by another entity without adhearing to CIP-011-3 R3 Part 3.1? For example; if parent
company A decides to let company B reuse an Applicable System does the company A have to perform its CIP-011-3 R3 Part 3.1
process?
o
Is CIP-011-3 R1 Part 1.5 actually feasible for BCSI residing on externally controlled third party systems?
•
•
•
Likes
0
Dislikes
0
Response
Bruce Reimer - Manitoba Hydro - 1
Answer
Yes
Document Name
2019-02_Unofficial_Comment_Form_201912_MH.docx
Comment
We would suggest making the following changes:
1.
Define BCSI Repository (see our definition in Q1)
2.
Delete CIP-011-3 R1.3 and R1.5 and make changes in CIP-004-6 (delete existing Part 4.1.3 and Part 4.4) as follows:
See the table provided in response to questions 13 in the attached comment form.
Likes
0
Dislikes
0
Response
Matthew Nutsch - Seattle City Light - 1,3,4,5,6 - WECC
Answer
Yes
Document Name
Comment
Seattle City Light appreciates the thorough efforts of the 2019-02 Standard Drafting Team to develop more flexible approaches to securing BCSI. We
are keenly aware of the many difficulties and pitfalls associated with this endeavor.
Seattle believes, however, that an objective-based approach consistent with and similar to that employed in CIP-013 would provide a more effective
solution and avoid the pitfalls and challenges. Specifically, revisions to CIP-004 and CIP-011 might better employ approaches based on a specific
security objective (e.g., restrict access of unauthorized individuals to BCSI) and a risk-focused security plan rather than specific controls (control access
to BCSI using keys managed by specific practices, etc), combined with requirements for implementation and periodic review. Such an approach
achieves the desired security outcome with the double benefit of 1) not precluding use of new technologies outside the control paradigm in use when
the Standard was written (as is the case with cloud storage in today’s physically-focused Standards) and 2) allowing maximum flexibility to meet the
myriad data management methods employed by the hundreds of subject entities across North America.
Likes
Dislikes
0
0
Response
Kjersti Drott - Tri-State G and T Association, Inc. - 1
Answer
Yes
Document Name
Comment
•
•
•
•
We believe the SDT went beyond the scope of the SAR. For example, adding a risk assessment similar to CIP-013 was not in scope.
Suggest making separate requirements for BCSI on premises versus in the cloud.
Overall it is good to see a futuristic direction with the requirements adapting to technology changes however, some of the changes are too
prescriptive and therefore do not encompass current and future capabilities of all technology. Prefer to see goal and objective based
requirements, not prescriptive.
As it relates to Part 1.4, we think there should be a distinction between vendors that are hosting BCSI for the Responsible Entity’s use, versus
companies that the Responsible Entity provides BCSI to for a project. For example, if the Responsible Entity provides BCSI to a regional entity
for an audit, the use and storage of that BCSI by the regional entity should not be in scope of this requirement. Instead, those scenarios should
already be addressed by the entity’s methods for securing and protecting BCSI.
Likes
0
Dislikes
0
Response
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
Yes
Document Name
Comment
1) The requirements should be outcome focused and not prescriptive to specific technologies or techniques.
2) The changes to the standard do not provide any clarification regarding the definition of BCSI. This has led to consistency issues across regions
regarding what information is considered BCSI. The lack of a clearly understood definition of what comprises BCSI limits the ability to evaluate the
security value of the proposed access controls.
Likes
0
Dislikes
0
Response
Kent Feliks - AEP - 3
Answer
Document Name
Comment
Yes
AEP is appreciative of the SDT’s hard work of developing these proposed modifications. However, we feel that additional revisions are required as
shown by our comments. AEP is of the opinion that while on-site storage might be burdensome to some Responsible Entities, BCSI storage on cloud
platforms or within third party facilities should be entirely optional. We believe that cloud storage is not a mature enough technology at this time to be
able to match the security that on-site storage can provide. AEP also wants to state that given the level of change proposed, we ask that Responsible
Entities be provided with more time to ensure compliance by pushing the enforcement deadline to a later date.
Likes
0
Dislikes
0
Response
Barry Lawson - National Rural Electric Cooperative Association - 4
Answer
Yes
Document Name
Comment
NRECA believes the removal of requirements form CIP-004-6 to CIP-011-3 was not authorized by the SAR for this project. In particular, the SAR
explicitly stated that CIP-004 be modified and that CIP-011 be evaluated for any downstream type impacts. It did not authorize the wholesale removal
of requirements from CIP-004-6. Accordingly, the SDT revisions go beyond the scope of the SAR as provided below:
CIP-004-6 Requirements need to be modified so management of access to BCSI is clarified to include a focus on the BCSI data and the controls
deployed to limit access. In addition, the Standard should allow various methods for controlling access to BES Cyber System Information, storage
location(s). … In addition to CIP-004-6 modifications, CIP-011-2 should also be evaluated for any subsequent impacts.
NRECA recommends that NERC develop a process to gain industry consensus on proposed changes to CIP standards prior to the formation of a
standards drafting team for modifications that are not directed by FERC. Multiple standards drafting teams have spent significant time attempting to
make modifications to the standards for which there is no industry consensus that the modification is needed. This places the Standard Drafting Team
in an untenable position and consumes a substantial amount of industry resources without benefitting reliability or security.
Likes
0
Dislikes
0
Response
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
Yes
Document Name
Comment
Many of the proposed changes are not in scope with the SAR, are too prescriptive, and cause confusion rather than provide clarification. We don’t
believe the current standards, as written, preclude the use of cloud storage vendors and encryption technologies. In light of the fact that the CMEP
Guidance came out after the SAR, we wonder if changing the standards is needed. If needed, any further clarification can be done via additional
guidance.
We disagree with the change in R1, Part 1.1 from “Method(s)” to identify information” to “Process(es) to identify information.” This would cause
programs which use a method to identify information to be non-compliant. The last example of evidence is one such method--One can know that
something is BCSI (identify it) just by the fact that it is in a specified location or repository. Technical Rationale for CIP-011-2, Requirement 1,
paragraph 4 states: “The Responsible Entity may store all of the information about BES Cyber Systems in a separate repository or location (physical
and/or electronic) with access control implemented. For example, the Responsible Entity’s program could document that all information stored in an
identified repository is considered BES Cyber System Information, the program may state that all information contained in an identified section of a
specific repository is considered BES Cyber System Information, or the program may document that all hard copies of information are stored in a
secured area of the building. Additional methods for implementing the requirement are suggested in the measures section. However, the methods
listed in measures are not meant to be an exhaustive list of methods that the entity may choose to utilize for the identification of BES Cyber
System Information.” [emphasis added] Measure could be re-written as such: Documentation that information stored in a specified location is
considered BCSI.
We disagree with having requirements for disposal in two different parts (R1 Part 1.2 and R3 Part 3.1) as this could result in double jeopardy during
audits as auditors review disposal procedures for compliance with R1 and then again with R3. This change exceeds the SAR, and R3 takes the focus
off protecting the information (BCSI), which has always been the intent of this part and CIP-011 as a whole. R3 also brings all Cyber Assets into scope,
not just those that contain BCSI. We propose removing disposal from R1 Part 1.2 and reverting back to the CIP-011-2 version of R2 asset reuse and
disposal as separate requirements.
We do not see how chain of custody is a measure of sanitization or destruction. In addition, this term was rejected by commenters and the SDT of a
prior version of the standard.
The proposed High VSL is not appropriate or in line with other standards. As it reads, any instance of unauthorized access automatically results in a
High VSL. A breach is always possible even with a sound plan and implementation. We propose removing the additional High VSL altogether, or
looking to other standards which base VSL on included parts of the plan, or number of instances.
Likes
0
Dislikes
0
Response
Andrea Barclay - Georgia System Operations Corporation - 4
Answer
Document Name
Comment
Yes
GSOC respectfully suggests that the removal of requirements form CIP-004-6 to CIP-011-3 was not authorized by the SAR for this project. In particular,
the SAR explicitly stated that CIP-004 be modified and that CIP-011 be evaluated for any downstream type impacts. It did not authorize the wholesale
removal of requirements from CIP-004-6. Accordingly, the SDT revisions go beyond the scope of the SAR as provided below:
CIP-004-6 Requirements need to be modified so management of access to BCSI is clarified to include a focus on the BCSI data and the controls
deployed to limit access. In addition, the Standard should allow various methods for controlling access to BES Cyber System Information, storage
location(s). … In addition to CIP-004-6 modifications, CIP-011-2 should also be evaluated for any subsequent impacts.
GSOC recommends that NERC develop a process to gain industry consensus on proposed changes to CIP standards prior to the formation of a
standards drafting team for modifications that are not directed by FERC. Multiple standards drafting teams have spent significant time attempting to
make modifications to the standards for which there is no industry consensus that the modification is needed. This places the Standard Drafting Team
in an untenable position and consumes a substantial amount of industry resources without benefitting reliability or security.
Likes
0
Dislikes
0
Response
Leonard Kula - Independent Electricity System Operator - 2
Answer
Yes
Document Name
Comment
We have concerns with the Measures in Part 3.1 on “chain of custody” as too prescriptive
We have concerns with Part 3.1 on demonstrating compliance with a) destruction of virtualized equipment and b) re-deployment of virtualized
assets
Likes
0
Dislikes
0
Response
Chris Wagner - Santee Cooper - 1, Group Name Santee Cooper
Answer
Yes
Document Name
Comment
We recommend the SDT consider development of a standard just for cloud services. This will eliminate confusion and ambuiguity for the current
standards.
Likes
Dislikes
0
0
Response
Vivian Moser - APS - Arizona Public Service Co. - 3
Answer
Yes
Document Name
Comment
AZPS considers the proposed CIP-011-3 to exceed the scope of the SAR; however, recognizes the intent to increase the security posture for BCSI. For
this reason, AZPS offers the following recommendations for the SDT’s consideration:
•
Revise the proposed language to better delineate between protection of BCSI in use, transit, and disposal, and access to BCSI storage
locations.
Revise the applicability language to clearly establish focus on BCSI. As provided in our response to Question No. 5, AZPS offers the following
suggested wording:
•
“System information pertaining to (but not including the BES Cyber System (BCS) which may contain BCSI):…”
•
Reconsider the addition of CIP-011-3 R2 as currently drafted. AZPS asserts that requiring a key management program is overly prescriptive
(see further comments on this requirement included in the AZPS response to Question No. 8).
Likes
0
Dislikes
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
Yes
Document Name
Comment
Several of the proposed revisions are outside of the SAR, and this draft is too prescriptive and absolute in its language, and therefore not risk-based nor
technology agnostic.
Additionally, within this comment form, the SDT did not seek feedback on the proposed language in Part 3.1. This proposed language is a step
backwards and posed undue administrative burden without a commensurate security or reliability benefit. The requirements should be focused on
security and reliability value, and sanitization or destruction of data storage media not containing BCSI does not provide security nor reliability value. In
fact, for entities that may have life cycle processes in place to reuse equipment in a less critical capacity after a refresh in the critical environment
(perhaps test or dev, as one example) the requirement as written precludes an entity from reusing a non-BCSI device with a known and standardized
OS configuration, patch level, etc. in a different capacity outside the environment without a full sanitization and rebuild. This is an inefficient use of
Registered Entity’s limited resources.
Likes
0
Dislikes
Response
0
Janelle Marriott Gill - Tri-State G and T Association, Inc. - 3
Answer
Yes
Document Name
Comment
We believe the SDT went beyond the scope of the SAR. For example, adding a risk assessment similar to CIP-013 was not in scope.
Suggest making separate requirements for BCSI on premises versus in the cloud.
Overall it is good to see a futuristic direction with the requirements adapting to technology changes however, some of the changes are too prescriptive
and therefore do not encompass current and future capabilities of all technology. Prefer to see goal and objective based requirements, not prescriptive.
As it relates to Part 1.4, we think there should be a distinction between vendors that are hosting BCSI for the Responsible Entity’s use, versus
companies that the Responsible Entity provides BCSI to for a project. For example, if the Responsible Entity provides BCSI to a regional entity for an
audit, the use and storage of that BCSI by the regional entity should not be in scope of this requirement. Instead, those scenarios should already be
addressed by the entity’s methods for securing and protecting BCSI.
Likes
0
Dislikes
0
Response
Jonathan Robbins - Seminole Electric Cooperative, Inc. - 4
Answer
Yes
Document Name
NRECA comments 2019-02_Unofficial_Comment_Form_201912 (1) 013120.docx
Comment
See NRECA submitted comments.
Likes
0
Dislikes
0
Response
Anton Vu - Los Angeles Department of Water and Power - 6
Answer
Document Name
Comment
Yes
In order to properly shift the approach of information protection to focus on the information and not the storage locations, the requirement for declaration
of storage locations must be either removed or eased to focus on information residing with a vendor or third-party provider (e.g. cloud.) In addition,
information residing within a BCS environment should be fully exempt from this requirement as the existing CIP-004, CIP-005, and CIP-006 protections
will protect the information as long as it does not leave the BCS environment.
Likes
0
Dislikes
0
Response
Nicholas Lauriat - Network and Security Technologies - 1
Answer
Yes
Document Name
Comment
(1) N&ST recommends retaining the existing language of CIP-011-2 Requirement R1, Part 1.2 (“Procedure(s) for protecting and securely handling BES
Cyber System Information, including storage, transit, and use.”) In addition to objecting to the proposed “obtain and use” language in a revised Part 1.2,
N&ST notes that as written and if interpreted literally, the proposed requirement would compel a Responsible Entity to ensure that NOBODY could
“obtain and use” BCSI.
(2) While N&ST opposes moving existing BCSI storage location access management requirements from CIP-004 to CIP-011, we support the SDT’s
proposals to modify CIP-011’s “Applicability” column entries and to add an explicit requirement to identify BCSI storage locations. N&ST believes that if
this is done, the “Applicability” of CIP-004 requirements that apply to BCSI storage locations (R4 Part 4.1.3, R4 Part 4.4, and R5 Part 5.3) should be
changed to “Identified BCSI Storage Locations.” N&ST understands this change would likely compel moving R4 Part 4.1.3 to a revised R4 Part 4.2 and
renumbering existing R4 Parts 4.2 – 4.4 to R4 Parts 4.3 – 4.5.
Likes
0
Dislikes
0
Response
ALAN ADAMSON - New York State Reliability Council - 10
Answer
Yes
Document Name
Comment
The NYSRC is casting NEGATIVE vote because of these concerns:
•
We have a concern regarding Requirement 1.4, which calls for risk identification, assessment, and mitigation for entities choosing to use a
vendor to manage their BCSI. The risk identification and assessment portion of the requirement overlaps with CIP-013. We would like to know why the
SDT is requiring mitigation for CIP-011 compliance when it is not required for CIP-013 compliance. Also, this Requirement calls for a re-assessment at
least once every 15 months. We believe that the value that this would add to cybersecurity programs may be outweighed by the cost of performing the
reassessment (and subsequent mitigation).
•
There is ambiguity vis-à-vis the data destruction requirement for High & Medium Impact BES Cyber Systems. Does this apply to
virtualized BES Cyber Assets? What about BES Cyber Assets with read-only memory?
•
Requirement 2.2 – separation of duties between BCSI custodian and key-management custodian – will be difficult to implement for
entities that use physical keys, since in those instances it will most likely be the same individual(s) responsible for both sets of duties.
Likes
0
Dislikes
0
Response
Sean Bodkin - Dominion - Dominion Resources, Inc. - 6, Group Name Dominion
Answer
Yes
Document Name
Comment
Dominion Energy supports EEIs comments.
Likes
0
Dislikes
0
Response
David Jendras - Ameren - Ameren Services - 3
Answer
Yes
Document Name
Comment
Ameren agrees with and supports EEI comments.
Likes
0
Dislikes
0
Response
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
Yes
Document Name
Comment
CIP-011 R3 has increased in scope from BES Cyber Assets that may contain BCSI to the sanitization or destruction of ALL data storage media for ALL
BES Cyber Assets. This language removes from the Responsible Entity the ability to determine if a BES Cyber Asset contains BCSI, and if so, take
measures to prevent the unauthorized retrieval of said BCSI, and in turn requires the sanitization or destruction of ALL BES Cyber Assets. What
purpose is served by sanitizing or destroying an asset that does not contain BCSI? There is no rationale for this change documented in the Technical
Rationale document. We believe this requirement to now be problematic as there may be BES Cyber Assets that are firmware based and thus have
“data storage media” for their firmware code but have no capability to store BCSI. They are now in scope of this requirement, however there is no need
(and may have no ability) to wipe their firmware code. This requirement then forces the destruction of those devices that cannot be sanitized but that do
not contain BCSI, and this is an undue burden placed upon entities with no security benefit.
We also find that CIP-011 R3 is the one requirement that was explicitly hardware based, and it retains its hardware basis even though Question 9
implies that enabling cloud solutions would require the move away from hardware basis. The suggested change also presents issues with today’s onpremise virtualized environments where a virtual BES Cyber Asset with virtual storage, the virtual storage may be destroyed but that is not technically
the “data storage media”. The entity may not be able to map a logical, virtual storage unit to the actual “storage media” in the underlay on which the
data resided, and it cannot wipe or destroy physical media without impacting other live BES Cyber Assets.
We suggest the requirement simply state:
“Prior to the release for reuse or disposal of applicable Cyber Assets that contain BES Cyber System Information (except for reuse within other systems
identified in the “Applicable Systems” column), the Responsible Entity shall take action to prevent the unauthorized retrieval of the BES Cyber System
Information.”
There should be a clear delineation between Affiliate Restrictions requirements (the Standards of Conduct) for protecting information which may include
BCSI and the R1 Requirement of “Process to identify information that meets the definition of BES Cyber System Information…”
Likes
0
Dislikes
0
Response
David Rivera - New York Power Authority - 3
Answer
Yes
Document Name
Comment
We have concerns with the Measures in Part 3.1 on “chain of custody” as too prescriptive.
We have concerns with Part 3.1 on demonstrating compliance with a) destruction of virtualized equipment and b) re-deployment of virtualized
assets.
Likes
0
Dislikes
0
Response
Devin Shines - PPL - Louisville Gas and Electric Co. - 1,3,5,6 - SERC,RF, Group Name PPL NERC Registered Affiliates
Answer
Yes
Document Name
Comment
The effort put forth by the SDT is appreciated. However, we encourage the SDT to review the approved SAR and focus on adding requirements that
meet the objective of clarifying protections for cloud-based service providers, while keeping the burden on entities that do not use cloud-based providers
to a minimum. Additionally, while adding clarity around managing access to BCSI and securing BCSI, the SDT should consider how the changes might
impact or be similar to other requirements and attempt to avoid instances of added confusion or spaghetti requirements (access management and
vendor risk management). As stated in other drafting teams, the industry is looking for risk-based requirements, and adding more specificity to
requirements defeats this concept.
Furthermore, there were no questions specific to the implementation plan, but as proposed today, 18 months does not seem sufficient. As discussed
above, adding Medium Impact and PCAs could take significant time to implement across a large number of new assets, locations and
information. Additionally, the vendor risk assessment could cause entities to modify their vendor agreements, which in turn could increase costs to the
entities.
Likes
0
Dislikes
0
Response
Bobbi Welch - Midcontinent ISO, Inc. - 2
Answer
Yes
Document Name
Comment
Yes – MISO commends the SDT for its efforts to consolidate like requirements and suggest the existing standards evolve to align with industry security
standards, such as NIST 800-53 and ISO 27001.
In addition, MISO recommends that each requirement be reviewed and restated as applicable to focus on results; i.e. the protection of BES Cyber
Security Information : prevent unauthorized access to BCSI (performance-based), perform testing/simulations that demonstrate inability to access BCSI
without authorization (risk-based) and document procedures to prevent unauthorized access to BCSI (competency-based). Monitor performance via
periodic reporting of test/simulation results, actual security breaches/events, other?
Finally, MISO proposes the issue of electronic disposal be addressed. MISO suggests the SDT consider updating CIP-011-3, requirement R3 to provide
objective based requirements related to disposal. As written, the standard would be administratively burdensome from an evidence perspective.
Likes
0
Dislikes
0
Response
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
Yes
Document Name
Comment
Although EEI recognizes and appreciates the work done by the SDT to enhance entity options as it relates to the use of cloud-based services for the
storage of BCSI, many of the proposed changes are not in the scope of the approved SAR and are too rigid. The SAR seeks clarifying language that
would allow entities to safely and securely store BCSI on third-party cloud-based services. Thus, the change could be made through minor
modifications, such as developing new definitions (i.e., “BCSI Repository” and “Useable Access”) along with a few minor changes as suggested in our
response to question 4 (above). In addition, adding vendor assessment requirements into CIP-011, while also moving requirements from CIP-004 to
CIP-011, seem to conflict with one another. To the extent the SDT is concerned about potential reliability gaps meriting the proposed changes, a new
SAR should be developed with technical justification.
EEI also notes that the SDT did not ask about the appropriateness of the Implementation Plan. Given the level of change proposed, specifically related
to vendor contracts, entities will need at least 24 months to achieve compliance with these new requirements.
Likes
0
Dislikes
0
Response
Eli Rivera - CenterPoint Energy Houston Electric, LLC - NA - Not Applicable - Texas RE
Answer
Yes
Document Name
Comment
Language in part 1.2 does not align with the language in part 1.5, requiring a method to eliminate ability to obtain and use BCSI in one and revoke
individual’s access to BCSI in the other. This language mismatch will lead to confusion.
Also, sub-requirement 2.1.2 is missing.
Likes
0
Dislikes
0
Response
Gregory Campoli - New York Independent System Operator - 2
Answer
Yes
Document Name
Comment
NYISO commends the SDT for its efforts to consolidate like requirements and suggest the existing standards evolve to align with industry security
standards, such as NIST 800-53 and ISO 27001.
In addition, NYISO recommends that each requirement be reviewed and restated as applicable to focus more on results and security objectives; i.e. the
protection of BES Cyber Security Information : prevent unauthorized access to BCSI (performance-based), perform testing/simulations that demonstrate
inability to access BCSI without authorization (risk-based) and document procedures to prevent unauthorized access to BCSI (competency-based).
Further improvements of the draft should consider:
Separate and keep access authorization and revocation centrally maintained as part of CIP-004. Adding a reference to the CIP-004 requirements
from within CIP-011. The related CIP-004 requirements should also be reviewed and updated.
Clarify that Responsible Entities should determine protective measures for BCSI based on risk and that solution measures other than encryption
may be acceptable.
-
Keep together those requirements related to BCSI stored in environments owned by third parties (and in a way, that is not redundant).
-
Clarify that vendor risk assessment requirement can be accomplished via CIP-013 SCRM program
Adding clarification on the term, “obtain.” Would like assurance that we have a consistent understanding of what is meant between “Obtain and
Use” versus “Obtain or Use.”
NYISO agrees that all risk assessments requirements should be housed within CIP-013 and would suggest further clarification as to what type of
vendor needs to be risk assessed dependent on the type of cloud service is being procured and used (e.g. IaaS, Paas
-
All access should be revoked within the specified period for any reason where an individual no longer requires it, not just termination.
NYISO definitely sees the benefit in key management conceptually, but the language is too ambiguous and confusing therefore, we cannot
endorse it.
Likes
0
Dislikes
0
Response
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name RSC no NextEra
Answer
Yes
Document Name
Comment
1)
We have concerns with the Measures in Part 3.1 on “chain of custody” as too prescriptive.
2)
We have concerns with Part 3.1 on demonstrating compliance with a) destruction of virtualized equipment and b) re-deployment of virtualized
assets.
Likes
0
Dislikes
0
Response
Adrian Andreoiu - BC Hydro and Power Authority - 1, Group Name BC Hydro
Answer
Yes
Document Name
Comment
Could there be a standard in providing some form of industry threshold qualifications to vendors to reduce the responsibility and remove the onus of
entities subject to reliability standards to perform Vendor risks assessments and establish controls to mitigate these risks. Current model puts all
pressures on entities to conduct all work on BCSI risk. Possibility to look at NIST / FedRAMP standards.
Also please consider in providing additional guidelines on what constitutes "BCSI".
Likes
1
Dislikes
BC Hydro and Power Authority, 5, Hamilton Harding Helen
0
Response
Marty Hostler - Northern California Power Agency - 5
Answer
Yes
Document Name
Comment
We have concerns with the Measures in Part 3.1 on “chain of custody” as too prescriptive
We have concerns with Part 3.1 on demonstrating compliance with a) destruction of virtualized equipment and b) re-deployment of virtualized assets.
Likes
0
Dislikes
Response
0
Holly Chaney - Snohomish County PUD No. 1 - 3, Group Name SNPD Voting Members
Answer
Yes
Document Name
Comment
Please review the proposed language with an eye toward increasing the use of narrow scope. Explicit, and affirmative language is necessary to
eliminate ambiguity and inspire confidence in not running afoul of compliance should an entity choose to store BCSI in the cloud. There should be no
confusion as to what is and what is not permitted. Please investigate establishing reciprocity for Federal IT certifications.
Likes
1
Dislikes
Public Utility District No. 1 of Snohomish County, 4, Martinsen John
0
Response
Jenifer Holmes - Alliant Energy Corporation Services, Inc. - 4 - MRO,RF
Answer
Yes
Document Name
Comment
Alliant Energy agrees with NSRF and EEI’s comments.
Likes
0
Dislikes
0
Response
Jamie Monette - Allete - Minnesota Power, Inc. - 1
Answer
Yes
Document Name
Comment
Consider encompassing access management within one holistic Standard. The departure and movement of access management requirements
amongst several Standards seem to be a step backwards from security integration and collaboration between programs.
Likes
0
Dislikes
Response
0
James Brown - California ISO - 2 - WECC
Answer
Yes
Document Name
Comment
•
Overall, it appears that this version of requirements, specifically R.1.4, is intended to address situations where a Responsible Entity contracts
with another party for the storage and processing of BCSI. With that intention, measures on each requirement would benefit from adding
specific ways to demonstrate compliance when using a third party.
•
Requirement R1.4 does not include minimum security requirements the risk assessments of vendors need to include, such as security training,
access controls, and termination actions. A minimum set of expectations should be defined.
•
Any requirements allowing the use of third party provider should also include measures on the use of external audits performed by accredited
auditors (e.g. SOC) in demonstrating compliance with the requirement. This would include all access management and data destruction
requirements.
•
Can the drafting team provide more detail on the distinction between “data” about BES Cyber Systems and “information” about BES Cyber
Systems? Although the distinction is made in the definition, the distinction is not addressed in requirements or measures. Usability of the
information is the key.
•
Part 1.3 should be moved to CIP-004 with the proposed language.
•
Part 1.5 should be moved to CIP-004 with the proposed language.
•
Requirement Part 2.2 should note that separation of duties is only necessary when a vendor or other third-party is housing the information. This
should not be required if the information is stored on-premises with the Responsible Entity.
•
Requirement Part 3.1 is redundant to Part 1.2.
•
As the drafting team is considering updating the standards, suggest the existing standards evolve to align with industry security standards, such
as NIST 800-53 / ISO 27001, and be more objective and outcome based changes.
•
In reviewing this, it appears that the definition of BCSI should be modified to remove the examples. The definition allows for a risk-based
approach to identifying BCSI but the examples are being used as an authoritative list and not as a form guidance. The examples should be
removed from the definition and guidance written through other means.
•
There appears to be no actual requirement for security awareness training for individuals with access to BCSI. CIP-011-3, R1.1, lists “training
materials that provide personal with sufficient knowledge to recognize BCSI” as an example, not a requirement, of acceptable evidence. CIP004-7, R2.1.5 requires training content on “Handling of BES Cyber System Information and its storage”, but this is applicable only to individuals
with access to High and Medium Impact BES Cyber Systems~. This needs to be clarified to prevent a difference in interpretation between the
Responsible Entity and the Auditor. Is has been noted that there is no requirement to perform Personnel Risk Assessments on individuals with
access to BCSI.
Likes
0
Dislikes
Response
0
Constantin Chitescu - Ontario Power Generation Inc. - 5
Answer
Yes
Document Name
Comment
OPG is in agreement with RSC provided comment
Likes
0
Dislikes
0
Response
Ryan Olson - Portland General Electric Co. - 5, Group Name PGE Group 2
Answer
Yes
Document Name
Comment
PGE agrees with EEI’s general recommendations, particularly that the SDT could pursue minor modifications, such as new definitions, to achieve the
SAR’s objective.
Likes
0
Dislikes
0
Response
Jennie Wike - Jennie Wike On Behalf of: Hien Ho, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; John Merrell, Tacoma Public Utilities
(Tacoma, WA), 3, 1, 4, 5, 6; Marc Donaldson, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Ozan Ferrin, Tacoma Public Utilities (Tacoma,
WA), 3, 1, 4, 5, 6; Terry Gifford, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; - Jennie Wike
Answer
Yes
Document Name
Comment
Without splitting EACMS into EACS and EAMS the issue of third-party analysis systems is not addressed but is included in the SAR. Please ensure that
EACMS is split into EACS and EAMS in order to address this issue. Third-party analysis systems currently are include in the EACMS definition, splitting
the definition would allow EAMS to be applicable within only the CIP-011 standard, and simplify use of these third-party services.
Likes
0
Dislikes
Response
0
Dennis Sismaet - Northern California Power Agency - 6
Answer
Yes
Document Name
Comment
We have concerns with the Measures in Part 3.1 on “chain of custody” as too prescriptive. We have concerns with Part 3.1 on demonstrating
compliance with a) destruction of virtualized equipment and b) re-deployment of virtualized assets.
Likes
0
Dislikes
0
Response
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
Yes
Document Name
Comment
ERCOT offers the following additional comments:
•
Overall, it appears that this version of the requirements, specifically Part 1.4, is intended to address situations where a Responsible Entity
contracts with another party for the storage and processing of BCSI. ERCOT believes there is benefit to including measures on each
requirement that identify specific ways to demonstrate compliance when using a third party.
•
Part 1.4 does not include minimum security requirements the risk assessments of vendors need to include, such as security training, access
controls, and termination actions. ERCOT believes a minimum set of expectations should be defined.
•
ERCOT believes that any requirements allowing the use of third party providers should also include measures on the use of external audits
performed by accredited auditors (e.g. SOC) in demonstrating compliance with the requirement. This would include all access management
and data destruction requirements.
•
Is the drafting team able to provide more detail on the distinction between “data” about BES Cyber Systems and “information” about BES Cyber
Systems? Although the distinction is made in the definition, the distinction is not addressed in requirements or measures. ERCOT believes
usability of the information is the key.
•
ERCOT suggests Part 1.3 should be moved to CIP-004 with the proposed language.
•
ERCOT suggests Part 1.5 should be moved to CIP-004 with the proposed language.
•
ERCOT suggests Part 2.2 should note that separation of duties is only necessary when a vendor or other third-party is housing the
information. This should not be required if the information is stored on-premises with the Responsible Entity.
•
Part 3.1 is redundant to Part 1.2.
•
As the drafting team is considering updating the standards, ERCOT suggests the existing standards evolve to align with industry security
standards, such as NIST 800-53 / ISO 27001, and be more objective and outcome based.
•
ERCOT suggests that the definition of BCSI should be modified to remove the examples. The definition allows for a risk-based approach to
identifying BCSI, but the examples are being used as an authoritative list instead of a form of guidance. ERCOT believes the examples should
be removed from the definition, and guidance written through other means.
Likes
0
Dislikes
0
Response
Douglas Webb - Douglas Webb On Behalf of: Allen Klassen, Westar Energy, 6, 3, 1, 5; Bryan Taggart, Westar Energy, 6, 3, 1, 5; Derek Brown,
Westar Energy, 6, 3, 1, 5; Grant Wilkerson, Westar Energy, 6, 3, 1, 5; James McBee, Great Plains Energy - Kansas City Power and Light Co., 1,
3, 6, 5; Jennifer Flandermeyer, Great Plains Energy - Kansas City Power and Light Co., 1, 3, 6, 5; John Carlson, Great Plains Energy - Kansas
City Power and Light Co., 1, 3, 6, 5; Marcus Moor, Great Plains Energy - Kansas City Power and Light Co., 1, 3, 6, 5; - Douglas Webb, Group
Name Westar-KCPL
Answer
Yes
Document Name
Comment
Westar and Kansas City Power & Light Company, endorse Edison Electric Institute's (EEI) comments.
Likes
0
Dislikes
0
Response
Michael Johnson - Michael Johnson On Behalf of: James Mearns, Pacific Gas and Electric Company, 1, 3, 5; Marco Rios, Pacific Gas and
Electric Company, 1, 3, 5; Sandra Ellis, Pacific Gas and Electric Company, 1, 3, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
Yes
Document Name
Comment
PG&E recommends the SDT consider including the ability for an entity to use industry or federally approved certifications such as FedRAMP for CIP011 R1, Part 1.4 in place of doing their own risk assessment.
Likes
0
Dislikes
Response
0
Michael Puscas - ISO New England, Inc. - 2
Answer
Yes
Document Name
Comment
Comments: ISO-NE commends the SDT for taking on the challenge to address BCSI compliance issues that existed even in the CIPv3 days. ISO-NE
recommends that the SDT consider approaching the information security risks and protections on an objective basis instead of a prescriptive basis. The
standard should require the parts/elements/criteria that must be included in a security risk assessment plan without prescribing solutions or
technologies. As stated in the SAR, the standard should allow multiple methods for controlling access to BES Cyber System Information.
Likes
0
Dislikes
0
Response
sean erickson - Western Area Power Administration - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Truong Le - Truong Le On Behalf of: Carol Chinn, Florida Municipal Power Agency, 6, 4, 5, 3; Chris Gowder, Florida Municipal Power Agency,
6, 4, 5, 3; Dale Ray, Florida Municipal Power Agency, 6, 4, 5, 3; David Owens, Gainesville Regional Utilities, 1, 5, 3; Richard Montgomery,
Florida Municipal Power Agency, 6, 4, 5, 3; - Truong Le
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
Response
0
Angela Gaines - Portland General Electric Co. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Russel Mountjoy - Midwest Reliability Organization - 10
Answer
Document Name
Comment
MRO appreciates the efforts of the 2019-02 team over the past months. While there is good in the draft, the proposed language for CIP-011-3 Part 1.4
is too high level. Requiring a “Process to identify, assess, and mitigate risks…” offers no direction as to what risk considerations are a concern.
As discovered by the 2016-02 CIP SDT, objective based requirements seem to hit the mark when the requirement language guides the ‘what’, but not
the ‘how’. If ‘mitigate the risk’ language is used, the language should guide entities to address a minimum set of risk considerations. Risk
considerations should include risk categories that are typical for the cloud environment, such as service level agreements, encryption (logical
protections), data sovereignty, data transformations, and certifications.
If left as written, the ERO enforcement of this objective based requirement will likely become equally open ended.
Likes
0
Dislikes
0
Response
Gerry Adamski - Cogentrix Energy Power Management, LLC - 5
Answer
Document Name
Comment
CIP-011-3 R1.6. - Suggest a rewording of the requirement to "Verify at least once every 15 calendar months that access to BES Cyber System
Information is correct and that the Responsible Entityt determines is necessary for performing assigned work functions."
CIP-011-3 R3.1 - This requirement is not needed if the term 'sanitization' is included in Part 1.2 as discussed in Q4. Any associated measures could be
included there as well.
Likes
0
Dislikes
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Document Name
Comment
Texas RE has the following additional comments:
•
Part 3.1 table header: should be revised from “BES Cyber Asset Reuse and Disposal” to “Cyber Asset Reuse and Disposal”, the applicable
systems column contains EACMS, PACS, and PCAs as well.
•
Update the Applicable Systems columns in CIP-004-7 R4 (Parts 4.1-4.3) and R5 (Parts 5.1-5.4), to include PCA and Medium Impact BES
Cyber Systems (versus Medium Impact BES Cyber Systems with External Routable Connectivity). Since CIP-011-3 Part 3.1 includes EACMS,
PACS, and PCA, this change would align better CIP-004-7 better with CIP-011-3 as well as improve an overall security posture for access
management and revocation.
Likes
0
Dislikes
0
Response
Kinte Whitehead - Exelon - 3
Answer
Document Name
Comment
Exelon supports EEI's comments on behalf of Exelon Segments 1, 3, 5, and 6.
Likes
0
Dislikes
0
Response
Tho Tran - Tho Tran On Behalf of: Lee Maurer, Oncor Electric Delivery, 1; - Tho Tran
Answer
Document Name
Comment
N/A
Likes
0
Dislikes
0
Response
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
Document Name
Comment
The standards development team should draft separate requirements for cloud vs in house BCSI.
Likes
0
Dislikes
0
Response
Kathryn Tackett - NiSource - Northern Indiana Public Service Co. - 5
Answer
Document Name
Comment
See Steven Toosevich's comments.
Likes
0
Dislikes
0
Response
Dmitriy Bazylyuk - NiSource - Northern Indiana Public Service Co. - 3
Answer
Document Name
Comment
See Steven Toosevich's comments.
Likes
0
Dislikes
Response
0
Project 2019-02 BES Cyber System
Information Access Management
Summary Response to Comments
Background
Project 2019-02 enhances BES reliability by creating increased choice, greater flexibility, higher
availability, and reduced-cost options for entities to manage their BES Cyber System Information (BCSI). In
addition, the project
seeks to clarify the protections expected when utilizing third-party solutions (e.g., cloud
services).
The standard drafting team (SDT) revised Reliability Standards CIP-004 and CIP-011 and reviewed the
Glossary of Terms Used in NERC Reliability Standards pertaining to requirements addressing BCSI. The 45day comment period was December 20, 2019 through February 3, 2020. There were 91 sets of responses,
including comments from approximately 209 different people from approximately 131 companies
representing 10 of the Industry Segments as shown in the table on the following pages. Based on these
comments, the SDT has made proposed revisions to CIP-004 and CIP-011. Summary responses have been
developed to address the comments.
Question 1
The proposed revision to Requirement R1 Part 1.1 adds the requirement to identify BCSI storage
locations. Do you agree that the requirement as written allows the Responsible Entity the flexibility to
identify which storage locations are for BCSI? Do you agree the requirement is necessary? If you disagree
with the changes made, what, specifically, do you disagree with? Please provide specific suggestions or
proposals for any alternative language.
Summary
A comment states the proposed changes add PCAs as applicable systems, which by definition do not
contain BCSI. It seems that this addition is outside of the SAR and it would be helpful for the SDT to
describe how adding this “clarifies the protections expected when utilizing third-party solutions”.
Response
Thank you for your comments. The SDT does not agree that PCAs by definition are exempt from
containing BCSI. Each Registered Entity’s system and implementation is different, and there is nothing
that precludes a PCA from containing BCSI. As one example, an entity may have a vulnerability scanner
located within its ESP and this scanner may contain security configuration, network settings, enabled
ports and services, and vulnerability status information of the BCAs. As another example, an entity may
choose to implement a file server inside the ESP to store information like but not limited to ESP diagrams,
RELIABILITY | RESILIENCE | SECURITY
response or recovery plans, system backups of conjuration files etc. which could be considered BCSI. That
said, the SDT considered industry feedback and removed PCA from the Applicable Systems column.
Summary
Several commenters state that the removal of the qualifying language “with ERC” from the applicability of
Medium Impact BES Cyber Systems in CIP-011-3 R1.1 as currently provided in CIP-004-6 R4.1 expands the
scope of all subsequent parts of Requirements R1 and R2.
Response
Thank you for your comments. The SDT has considered these comments and has reverted the applicability
to include ERC.
Summary
Several commenters believe a more effective approach would be to clearly state security objectives
instead of prescriptive requirements.
Response
Thank you for your comments. The SDT agrees that objective requirements provide maximum flexibility to
allow an entity to determine how to comply with the objective. The SDT was mindful to strike an
appropriate balance between high level security objectives and enough detail to assure the expectations
are clear.
Summary
Some commenters recommend removing “System information pertaining to” from the “Applicability”
column of the Requirement Table and the applicability should be limited to BCSI.
Response
Thank you for your comments. The SDT adjusted the applicability to read BCSI as identified in
Requirement R1 Part 1.1.
Summary
Some commenters believe clarification is needed in CIP-011-3 Requirement R1 Part 1.1 to identify BCSI
storage locations as the requirement would create difficulty in identifying third-party storage locations or
that it should be removed.
Response
Thank you for your comments. The SDT has adjusted the applicability to read BCSI as identified in
Requirement R1 Part 1.1 and maintained the focus on the BCSI itself instead of storage locations. This
change is fully backwards compatible and does not preclude an entity from identifying and using storage
locations, while enabling entities who are ready to use of service provider technologies that are capable
of applying protections to the BCSI regardless of storage location.
Project 2019-02 BES Cyber System Information Access Management
2
Summary
A comment stated that “method” should not be replaced with the term “process.” A “method” for
identification allows Responsible Entities to provide guidelines and criteria to their personnel to aid in
identification of BCSI without requiring a pre-defined series of steps or action (e.g., a process) to be
utilized by such personnel in the identification. This distinction is critical because a process can be highlevel and – thereby – provide significant variability in what is identified as BCSI whereas a method
provides personnel with enough guidance to provide consistency relative to BCSI identification without
being overly prescriptive regarding how such identification is accomplished.
Response
Thank you for your comments. The SDT agrees with industry comments and has adjusted the requirement
language to make use of the word “methods” instead of “process”.
Summary
A comment stated that the SDT should create a new term “BCSI Repository”
Response
Thank you for your comments. The SDT considered industry comments to establish a new term for “BCSI
Repository” because it is too prescriptive as to how an entity would have to meet the directive. For this
reason, the SDT maintained the focus on the BCSI itself instead of storage locations or repositories. This
change is fully backwards compatible and does not preclude an entity from identifying and using storage
locations, while enabling entities who are ready to use of service provider technologies that are capable
of applying protections to the BCSI regardless of storage location or repositories.
Summary
Registered entities would have difficulty proving the granting and removal of access to BCSI as
contemplated in the proposed draft for CIP-004-7. As an alternative, EEI suggests using the BCSI
Repository definition shown above, and revising proposed CIP-004-7 to require registered entities to
prove access and removal of access to a BCSI Repository.
Response
Thank you for your comments. The SDT has revised the CIP-011-3 and CIP-004-7 requirements in order to
retain backward compatibility with existing requirements where BCSI protections are applied to storage
repositories. This should allow registered entities to prove access and removal of access to a BCSI
Repository.
Question 2
The standard drafting team (SDT) attempted to maintain backwards compatibility with concepts of
designated storage locations and access-level requirements previously contained in CIP-004-6. Do you
agree that there is a minimal effort to meet this objective while providing greater clarity between BCSI and
BES Cyber System (BCS) requirement obligations?
Summary
Project 2019-02 BES Cyber System Information Access Management
3
Several commenters state that Requirements related to access management should remain in CIP-004.
Response
Thank you for your comments. In response to the large number of comments received related to moving
BCSI access management requirements from CIP-004 to CIP-011, the BCSI SDT has move the BCSI access
management requirements back into CIP-004 in a newly created CIP-004 Requirement 6.
Summary
Switching from access controls on repositories to access controls on BCSI
Response
Thank you for your comments. The BCSI SDT has drafted a number of updates to the requirements to
clarify the drafting team’s intent. Primarily, the updates related to the provisioning of access in the newly
created CIP-004 Requirement 6 address this concern by clarifying that it is the provisioning of an access
privilege that allows ongoing access to BCSI that must be controlled, and not simply the ability to view
BCSI that is made available. This clarification allows entities with access management programs focused
on BCSI repositories to continue leveraging those programs, while also allowing for programs that focus
on individual pieces of BCSI to implement.
Summary
Some commenters disagree with dropping the qualifying language “with ERC” from the applicability of
Medium Impact BES Cyber Systems from CIP-004-6 Requirement R4 Part 4.1 when moved to CIP-011-3
Requirement R1 Part R1.3. This deletion greatly expands the scope of this requirement, and may have
created a situation where Responsible Entities could be subject to multiple compliance violations based
on a single action due to overlapping obligations in the CIP Standards.
Response
Thank you for your comments. The SDT recognizes that adding access management requirements for BCSI
associated with facilities containing medium impact BES Cyber Systems that do not have External
Routable Connectivity to the CIP-004 BCSI access management requirements is an increase in scope
beyond the scope of the SAR. Therefore, this addition has been removed.
Summary
A comment states that there is not minimal effort to meet the proposed obligations due to the addition of
PCAs.
Response
Thank you for your comments. The SDT recognizes that adding access management requirements for BCSI
associated with Protected Cyber Assets to the CIP-004 BCSI access management requirements is an
increase in scope beyond the scope of the SAR. Therefore, this addition has been removed.
Summary
Concerns with adding vendor risk assessments
Project 2019-02 BES Cyber System Information Access Management
4
Response
Thank you for your comments. The SDT made a number of updates to CIP-011 Requirement 1.3 to clarify
our intent. Specifically, the assessment is not about the vendor, but instead is an assessment of the
vendor’s technical environment.
Summary
Some commenters noted the proposed changes may create a situation where responsible entities could
be subject to multiple compliance violations based on a single action due to overlapping obligations in the
CIP Standards. The proposed changes in CIP-011-3 also introduce a new complication, that of having to
maintain similar access authorization, revocation and control measures as that in CIP-004-7. This could
create a situation whereby a single deficiency in an entity’s access management program could lead to
potential non-compliance with two NERC standards at the same time.
Response
Thank you for your comments. The SDT moved the BCSI access authorization and revocation
requirements from CIP-011-3 back into CIP-004-7 to eliminate the risk of potential non-compliance with
two NERC standards at the same time.
Summary
A commenter does not agree with draft revisions as one of the fundamental concepts of CIP-004
Requirement R4 Part 4.1.3 that was lost in the proposed transition to CIP-011 Requirement R1 Part 1.3 is
the difference between authorizing access to BCSI storage locations, which is a discrete and finite object
that can be monitored and audited (the current CIP-004 approach), while the new CIP-011 approach is
access to BCSI wherever and however it exists inside or outside of its storage locations (i.e. a hardcopy of
a network diagram in a company truck). This fundamental change has made the requirement
unmeasurable and non-auditable.
Response
Thank you for your comments. The SDT believes that this concern has been addressed through the
revisions made to CIP-004-7 R6 and CIP-011 R1 Part 1.2 regarding the protection and the secure handling
of BCSI, regardless of whether it is within a storage location or not.
Summary
A commenter disagrees with the addition of “disposal” to CIP-011 Requirement R1 Part 1.2.
Response
Thank you for your comments. The SDT has removed the term “disposal” from CIP-011 Requirement R1
Part 1.2.
Question 3
The SDT is attempting to expand information storage solutions or security technologies for Responsible
Entities. Do you agree that this approach is reflected in the proposed requirements?
Project 2019-02 BES Cyber System Information Access Management
5
Summary
Concerns with adding vendor risk assessments
Response
Thank you for your comments. The SDT made a number of updates to CIP-011 Requirement 1.3 to clarify
our intent. Specifically, the assessment is not about the vendor, but instead is an assessment of the
vendor’s technical environment.
Summary
A comment states it would be better to focus efforts on Requirements that do not hinder the use of other
solutions while allowing for the development of access control programs by Responsible Entities that
address risk posed to the industry.
Response
Thank you for your comments. The BCSI SDT has drafted a number of updates to the requirements to
clarify the drafting team’s intent. Primarily, the updates related to the provisioning of access in the newly
created CIP-004 Requirement 6 address this concern by clarifying that it is the provisioning of an access
privilege that allows ongoing access to BCSI that must be controlled, and not simply the ability to view
BCSI that is made available. This clarification allows entities with access management programs focused
on BCSI repositories to continue leveraging those programs, while also allowing for programs that focus
on individual pieces of BCSI to be implemented
Summary
A comment states new R2 requirements are too prescriptive and cannot be prudently applied across all
BCSI storage solutions and they limit the ability for the entity to manage their own compliance.
Response
Thank you for your comments. The SDT has removed R2 from the standard and incorporated it into R1.4
for clarity.
Summary
Some commenter noted the requirements as written do not clearly reflect an approach to expand
information storage solutions or security technologies
Response
Thank you for your comments. The SDT thanks you for your comments. The language has been modified
to allow RE’s to be able to expand information storage solutions specific to third parties.
Summary
A comment suggests the team focus on the approach taken in the current NERC CMEP Guidance
document in addressing the issue
Response
Project 2019-02 BES Cyber System Information Access Management
6
Thank you for your comments. The CMEP guidance has been used to directly develop the new language
for controlling access to BCSI and protecting BCSI.
Question 4
The SDT is addressing, and further defining, the risk regarding potential compromise of BCSI through the
inclusion of the terms “obtain” and “use” in requirement CIP-011-3, Requirement R1 Part 1.2. Do you
agree that this will more accurately address the risk related to the potential compromise of BCSI versus the
previous approach?
Summary
Commenters Agree with terms “obtain” and “use;” however, more explanation is needed within the
requirement or guidelines. The drafting team has referred to the CMEP BCSI practice guide. We
recommend defining “BCSI Access” in the NERC Glossary of Terms per the practice guide.
Response
Thank you for your comments. The SDT has taken the approach to refine the concept of access to BCSI
through the ability to “obtain” and “use” within the CIP-011 Implementation Guidance, rather than the
NERC Glossary of Terms.
Summary
A comment states while this approach is better than previous approaches, there is still a need for security
technology vendor service providers to have access and use of BCSI.
Response
Thank you for your comments. The SDT acknowledges the potential need for vendor service providers to
have the ability to “obtain” and “use” BCSI within their service model. The SDT Believes that the revisions
made to CIP-011-3 R1 Parts 1.3 and 1.4 provide the Responsible Entity with the appropriate compliance
framework when engaging vendor services to store, utilize, or analyze BCSI.
Question 5
The SDT is proposing to have BCSI in the “Applicability” column. Do you agree that this provides better
clarity on the focus of the requirements?
Summary
Several commenters stated that the revisions expanded beyond the scope of the SAR. The commenters
disagree with absence of ERC for Medium Impact BES Cyber Systems and the additions of PCAs, and want
exemption for BCS, EACMS and PACS as BCSI repositories.
Response
Thank you for your comments. The SDT considered industry feedback and moved the proposed CIP-011
requirements back to the original CIP-004 requirements where Applicable Systems scopes Medium impact
BES Cyber Systems with ERC, removed PCA from the Applicable Systems column, and decided to continue
to scope the proposed modifications to align with the SAR objectives to focus on the BCSI.
Project 2019-02 BES Cyber System Information Access Management
7
Summary
Several commenters requested that the “Applicability” column be changed back to “Applicable Systems”.
Commenters stated it creates ambiguity and inconsistency and recommends the SDT use requirement
language to scope to BCSI.
Response
Thank you for your comments. The SDT removed the undefined language in favor of using the defined
term BCSI to address concerns about ambiguity. The SDT adjusted the applicability to read BCSI as
identified in Requirement R1 Part 1.1.
Summary
A couple of commenters noted confusion of the “applicability” as the column header with Section 4
applicability and answered in a manner that calls out a perceived issue to consider Section 4 when
auditing CIP-002 citing NERC's March 1, 2019 Standards Process Manual Appendix 3A page 6 last
paragraph "The only mandatory and enforceable components of a Reliability Standard are the (1)
Applicability, (2) Requirements, and (3) effective dates.”
Response
Thank you for your comment. The SDT was referring to the use of the word “Applicability” in the Table
Requirement Parts and the use of BCSI within that table column and not Section 4. Applicability of the CIP011 Standard and the scope of the 2019-02 SAR. CIP-002 is not in scope for this SAR and the 2019-02 SDT
cannot speak to the oversight practices for Section 4 Applicability related to CIP-002.”
Question 6
The SDT is proposing to address the security risks associated with BCSI environments, particularly owned
or managed by vendors via CIP-011-3, Requirements R1, Part 1.4, and Requirement R2, Parts 2.1 and 2.2.
Do you agree that these requirements will promote a better understanding of security risks involved while
also providing opportunities for the Responsible Entity to address appropriate security controls?
Summary
Several commenters state that the vendor risk assessment overlaps with CIP 013 required assessment and
likely belongs in CIP-013.
Response
Thank you for your comments. The SDT made a number of updates to CIP-011 Requirement 1.3 to clarify
our intent. Specifically, the assessment is not about the vendor, but instead is an assessment of the
vendor’s technical environment.
Summary
Some commenters note the application and language of the key control requirement is unclear in CIP-011
Requirement R2 Part 2.1.
Project 2019-02 BES Cyber System Information Access Management
8
Response
Thank you for your comments. The specific requirement related to key control has been removed.
Summary
Some commenters note the application and language of the separation of duties requirement is unclear.
Response
Thank you for your comments. The specific requirement related to the separation of duties has been
removed.
Summary
Some commenters note responsible entities should have an exemption for regulators regarding these
requirements.
Response
Thank you for your comments. Language has been added to the requirements to clarify that it is when a
vendor’s services are used that certain requirements must be met.
Summary
Several commenters state that the vendor risk assessment lacks a clear value proposition.
Response
Thank you for your comments. The SDT made a number of updates to CIP-011 Requirement 1.3 to clarify
our intent. Specifically, the assessment is not about the vendor, but instead is an assessment of the
vendor’s technical environment. Language has been added to the requirements to clarify that it is when a
vendor’s services are used that certain requirements must be met.
This requirement ensures that prior to BCSI entering a vendor’s environment, the Responsible Entity is
well informed regarding the vendor’s environment and controls and should influence what if any varying
controls offered by a vendor are utilized or may influence the Responsible Entity to use technical
mechanisms (see CIP-0011 R2) that the Responsible Entity has more control over.
Summary
Some commenters note that these requirements may work better as guidance documents.
Response
Thank you for your comments. The SDT has made numerous modifications to ensure the requirements
are clear.
Summary
Commenters voiced concern that the vendor risk assessment requires mitigation; especially since CIP-013
doesn't require mitigation.
Response
Project 2019-02 BES Cyber System Information Access Management
9
Thank you for your comments. The SDT made a number of updates to CIP-011 Requirement 1.3 to clarify
our intent and the requirements for mitigation have been removed.
Summary
Some commenters noted that CIP-011 Requirement R2 could potentially be eliminated.
Response
Thank you for your comments. The SDT has clarified the intent of CIP-011 Requirement 2. This
requirement is critical to ensuring the security of BCSI when utilizing a vendor’s services.
Question 7
The SDT is addressing the growing demand for Responsible Entities to leverage new and future
technologies such as cloud services. Do you agree that the proposed changes support this endeavor?
Summary
Some commenters note the language proposed by the SDT is too narrow and prescriptive.
Response
Thank you for your comments. The SDT has made changes to the requirements to allow for more
flexibility in the use of future technologies. The requirements around key controls and separation of
duties have been added to the measures and are no longer part of the requirements language.
Summary
Some commenters note this change expands the scope of these requirements beyond the original BCSI
access requirements in CIP-004-6 R4 and R5
Response
Thank you for your comments. The SDT has purposefully separated BCSI access into CIP-004 and
identifying and protecting BCSI in CIP-011.
Question 8
The SDT is proposing a new “key management” set of requirements. Do you agree that key management
involving BCSI is integral to protecting BCSI?
Summary
Some comments note encryption should not be the only acceptable method of protecting BCSI; methods
should be based on risk.
Response
Thank you for your comments. The SDT agrees with the submitters comment and has revised CIP-011-3
R1 Part 1.4 to include “one or more documented electronic technical mechanisms to protect BCSI” to
allow the Responsible Entity more flexibility when considering the risk of implementation.
Project 2019-02 BES Cyber System Information Access Management
10
Summary
Some comments note the requirement is unclear if this is an electronic key or a physical key. Adding
electronic key controls as prescribed by the Standard is unnecessarily burdensome for entities.
Response
The SDT has remove the specific “key management” requirement language from CIP-011-3 and replaced it
with a more generic “one or more documented electronic technical mechanisms to protect BCSI” within
CIP-011-3 R1 Part 1.4.
Question 9
The SDT is proposing to shift the focus of security of BCSI more towards the BCSI itself rather than physical
security or “hardware” storage locations. Do you agree that this approach aids the Responsible Entity by
reducing potential unneeded controls on BCS?
Summary
Several commenters stated the team should continue focusing on access controls to repositories.
Response
Thank you for your comments. The SDT has drafted a number of updates to the requirements to clarify
the drafting team’s intent. Primarily, the updates related to the provisioning of access in the newly
created CIP-004 Requirement 6 address this concern by clarifying that it is the provisioning of an access
privilege that allows ongoing access to BCSI that must be controlled, and not simply the ability to view
BCSI that is made available. This clarification allows entities with access management programs focused
on BCSI repositories to continue leveraging those programs, while also allowing for programs that focus
on individual pieces of BCSI to be implemented.
Summary
Some commenters state that the approach as written may prevent using cloud services and may require
physical protections for electronic repositories, which would preclude using cloud services.
Response
Thank you for your comments. The SDT has drafted numerous updates to clarify our intent and
specifically allow Responsible Entities to leverage cloud services. Specifically, the modification to CIP-004
Requirement 6 which now focuses on the provisioning of access, and the modification to CIP-011
Requirement 1.2 which now focuses on the prevention of unauthorized access should clarify that physical
access to electronic repositories is not access to BCSI. Additionally, CIP-011 Requirement 2 specifically
speaks to controlling unauthorized logical access, which should also address this concern.
Summary
A commenter stated the additional controls may not have offsetting additional value to reliability and/or
security.
Response
Project 2019-02 BES Cyber System Information Access Management
11
Thank you for your comments. The number and type of controls required has been streamlined and
clarified.
Summary
Several commenters asserted that adding the non-ERC facilities to the access management expands the
scope.
Response
Thank you for your comments. The SDT recognizes that adding access management requirements for BCSI
associated with facilities containing medium impact BES Cyber Systems that do not have External
Routable Connectivity to the CIP-004 BCSI access management requirements is an increase in scope
beyond the scope of the SAR. Therefore, this addition has been removed.
Summary
Commenters expressed the approach isn't backwards compatible.
Response
Thank you for your comments. The BCSI SDT has drafted a number of updates to the requirements to
clarify the drafting team’s intent. Primarily, the updates related to the provisioning of access in the newly
created CIP-004 Requirement 6 address this concern by clarifying that it is the provisioning of an access
privilege that allows ongoing access to BCSI that must be controlled, and not simply the ability to view
BCSI that is made available. This clarification allows entities with access management programs focused
on BCSI repositories to continue leveraging those programs, while also allowing for programs that focus
on individual pieces of BCSI to be implemented.
Question 10
The SDT is proposing to transfer all BCSI-related requirements from CIP-004 to CIP-011 with the
understanding that this will further address differing security needs between BCSI and BCS as well as ease
future standard development. Do you agree that this provides greater clarity between BCSI and BCS
requirements?
Summary
Several commenter maintain that CIP-004-6 already effectively addresses access controls for BCSI stored
by responsible entities
Response
Thank you for your comments. In response to the large number of comments received related to moving
BCSI access management requirements from CIP-004 to CIP-011, the BCSI SDT has move the BCSI access
management requirements back into CIP-004 in a newly created CIP-004 Requirement 6.
Summary
A comment recommended the SDT create Part in CIP-004 for protections where third party cloud-based
services are used.
Project 2019-02 BES Cyber System Information Access Management
12
Response
Thank you for your comments. The SDT has created a new CIP-004 Requirement 6 specifically for BCSI
access management and it is applicable to all BCSI access, including where third party cloud-based
services are used.
Summary
A few commenters noted that it creates impossibility for compliance of individual vendor staff.
Response
Thank you for your comments. By incorporating the BCSI access concepts of the ERO Enterprise CMEP
Practice Guide: BES Cyber System Information into the revised CIP-011 standard language, the SDT
believes that they have provided a vehicle for industry to comply with CIP-004 BCSI access requirements
when using a 3rd party cloud vendor.
Question 11
The SDT increased the scope of information to be evaluated by including both Protected Cyber Assets and
all Medium Impact (not just Medium Impact Assets with External Routable Connectivity). Are there any
concerns regarding a Responsible Entity attempting to meet these proposed, expanded requirements?
Summary
Several commenters expressed concern of and expansion of scope to Mediums without ERC, contending
BCS w/out ERC are lower risk, expansion is burdensome and not justified, and the approach does not
conform to the risk-based approach that the ERO has been striving toward.
Response
Thank you for your comments. The SDT considered industry feedback and moved the proposed CIP-011
requirements back to the original CIP-004 requirements where Applicable Systems scopes Medium impact
BES Cyber Systems with ERC.
Summary
Several commenters cannot support expansion to PCA. PCAs are lower risk, expansion is burdensome and
not justified, and the approach does not conform to the risk-based approach that the ERO has been
striving toward.
Response
Thank you for your comments. The SDT does not agree that PCAs by definition are exempt from
containing BCSI. Each Registered Entity’s system and implementation is different, and there is nothing
that precludes a PCA from containing BCSI. As one example, an entity may have a vulnerability scanner
located within its ESP and this scanner may contain security configuration, network settings, enabled
ports and services, and vulnerability status information of the BCAs. As another example, an entity may
choose to implement a file server inside the ESP to store information like but not limited to ESP diagrams,
Project 2019-02 BES Cyber System Information Access Management
13
response or recovery plans, system backups of conjuration files etc. which could be considered BCSI. That
said, the SDT considered industry feedback and removed PCA from the Applicable Systems column.
Summary
Several commenters maintain the proposed modifications are outside the scope of the SAR and do not
address the SAR specifically, and should be limited to use of cloud services for BCSI and requirements to
permit cloud use.
Response
Thank you for your comments. The SDT considered industry feedback and has scoped the proposed
modifications to align with the SAR objectives by adjusting the requirement language to focus on “When
the Responsible Entity engages vendor services to store, utilize, or analyze BCSI…”
Summary
Several commenters maintain the change in applicability to BCSI greatly expands scope to all BCSI instead
of just the repositories, and is not backwards compatible with storage locations
Response
Thank you for your comments. The SDT considered industry feedback and moved forward with changing
applicability to BCSI within the Requirement language. The concept that not all BCSI is in scope today is at
odds with the original intent, and this adjustment brings the requirements into alignment with the
security objective. The SDT has adjusted the applicability to read BCSI as identified in Requirement R1
Part 1.1, and maintained the focus on the BCSI itself instead of storage locations. This change is fully
backwards compatible and does not preclude an entity from identifying and using storage locations, while
enabling entities who are ready to use of service provider technologies that are capable of applying
protections to the BCSI regardless of storage location.
Summary
Several commenters maintain the "System information pertaining to" language is unclear.
Response
Thank you for your comments. Thank you for your comment. The SDT removed the undefined language in
favor of using the defined term BCSI. The Applicability now reads, “BCSI as identified in Requirement R1
Part 1.1”
Summary
Several commenters maintain the proposed modifications create double jeopardy concern between CIP011 and CIP-004.
Response
Thank you for your comments. The SDT considered industry feedback and moved the proposed CIP-011
requirements back to the original CIP-004 requirements to address this concern.
Project 2019-02 BES Cyber System Information Access Management
14
Summary
Several commenters agree a PCA may contain BCSI.
Response
Thank you for your comment. The SDT appreciates your support for PCA in the Applicable Systems
column. Based on industry opposition to this change, the SDT removed PCA and focused the Requirement
on BCSI.
Question 12
In looking at all proposed recommendations from the SDT, are the proposed changes a cost-effective
approach?
Summary
Some commenters stated that key management would result in increased costs for utilities that do not
currently have key management programs in place.
Response
Thank you for your comments. The SDT has remove the specific “key management” requirement language
from CIP-011-3 and replaced it with a more generic “one or more documented electronic technical
mechanisms to protect BCSI” within CIP-011-3 R1 Part 1.4.
Summary
Some commenters requested to consider creating an industry standard or leveraging existing federal
standards for vendors for certifications.
Response
Thank you for your comments. The SDT acknowledges the ability to leverage certification models such as
The Federal Risk and Authorization Management Program (FedRAMP) would provide industry with a
streamlined and cost-effective way to engage vendor services used to store, utilize, or analyze BCSI.
However, this model is not feasible since NERC and Regional Entities are currently not able to rely on the
work of others in lieu of direct compliance evidence. Resolving this broader topic on certification models
is beyond the scope of the Project 2019-02 SAR.
Summary
Several commenters indicated that the shift from protecting repository to information level increases
both cost and effort with no additional security, compliance, reliability or operational benefits.
Response
Thank you for your comments. The SDT has revised the CIP-011-3 requirements in order to retain
backward compatibility with existing CIP-011-2 requirements where BCSI protections are applied to
storage repositories. This should alleviate concerns where cost is an issue when protecting BCSI at the
information level.
Project 2019-02 BES Cyber System Information Access Management
15
Summary
Some commenters stated that doing periodic or time-based risk assessments do not return the value
especially when the risks are low and suggested entities could have the flexibility of conducting vendor
risk assessment based on criteria, such as their risk management plan for high, medium and low risk
posture.
Response
Thank you for your comments. The SDT believes that revisions made to CIP011-3 R1 Part 1.3 allow the
entity to implement a risk assessment methodology commensurate with the type of vendor services
utilized to store, utilize, or analyze BCSI.
Question 13
Do you have any other general recommendations/considerations for the drafting team?
Summary
Several commenters state that many of the proposed changes are not in the scope of the approved SAR
and are too rigid.
Response
Thank you for your comments. The SDT made several updates to the CIP-011 and CIP-004 requirements
and now believe that these revisions are in line with the scope of the SAR and offer more flexibility in their
implementation.
Summary
Several commenters state they prefer to see goal and objective based requirements, not prescriptive.
Response
Thank you for your comments. The SDT has attempted to make the revisions to the requirements more
goal and objective based.
Summary
Several commenters state the risk identification and assessment portion of the requirement overlaps with
CIP-013.
Response
Thank you for your comments. The SDT worked with members from the Project 2019-03 Cyber Security
Supply Chain Risks (CIP-013) drafting team to revise wording and add clarity in order to eliminate the
perceived overlap between the risk assessments prescribed in the CIP-011 and CIP-013 standards.
Summary
Several commenters state that by eliminating the exclusion of Medium Impact BES Cyber Systems without
External Routable Connectivity (ERC), the drafting team is exceeding the SAR.
Response
Project 2019-02 BES Cyber System Information Access Management
16
Thank you for your comments. The SDT has reinstated the Medium Impact BES Cyber Systems without
External Routable Connectivity (ERC) exclusion into the CIP-004 R6 BCSI Access requirement language.
Summary
Some commenters note that Applicability should include “BES Cyber System Information stored in vendor
managed electronic BCSI Repositories” (Various requirements) /SDT should draft separate requirements
for cloud vs in house BCSI.
Response
Thank you for your comments. The SDT believes that it has added clarification in the CIP-011
requirements that identify those that are only applicable when the Responsible Entity uses vendor
services to store, utilize, or analyze BCSI.
Summary
Commenters recommend that the scope of the standards team consider leveraging standards such as
Fedramp to justify the use of cloud services.
Response
Thank you for your comments. The SDT added revised the Measures language within the CIP-011 R1.3
requirement to include Vendor certifications (i.e. Fedramp) as a potential way to confirm compliance with
the CIP-011 R1.3 requirement (Risk Assessment).
Summary
CIP-011-3 R2 Part 2.1 introduces nine terms in its sub-parts 2.1.1 through 2.1.9. These nine terms are not
further discussed or defined.
Response
Thank you for your comments. The SDT has deleted Requirement R2.
Summary
Several commenters state the changes to the standard do not provide any clarification regarding the
definition of BCSI. Entities will need at least 24 months to achieve compliance with these new
requirements. Without splitting EACMS into EACS and EAMS, the issue of third-party analysis systems is
not addressed but is included in the SAR.
Response
Thank you for your comments. Revisions to the definition of BCSI within the NERC Glossary of Terms is not
in the scope of the SAR. By removing some of the revisions made to CIP-004 and CIP-011 as part of the
first comment/ballot posting, the SDT believes that entities can more reasonably achieve compliance
within the 18-month timeframe prescribed as part of the Implementation Plan.
Summary
Commenters state that eliminate is extremely strong wording.
Project 2019-02 BES Cyber System Information Access Management
17
Response
Thank you for your comments. The word “eliminate” was removed from the revised CIP-011 requirement
language.
Summary
Several commenters state it would be better to continue focusing authorization for access to storage
locations and make that more robust; and Focus on Storage location BESCSI repositories.
Response
Thank you for your comments. The SDT believes that the proposed revisions to CIP-004 and CIP-011
support backward compatibility with prior versions that require controlling and authorizing access to BCSI
storage locations. If an Entity wishes to continue in that manner, the revised standards would allow that.
Project 2019-02 BES Cyber System Information Access Management
18
Standards Announcement
Project 2019-02 BES Cyber System Information Access Management
Formal Comment Period Open through February 3, 2020
Ballot Pools Forming through January 20, 2020
Now Available
A 45-day formal comment period for Project 2019-02 BES Cyber System Information Access
Management is open through 8 p.m. Eastern, Monday, February 3, 2020.
Commenting
Use the Standards Balloting and Commenting System (SBS) to submit comments. If you experience
issues navigating the SBS, contact Linda Jenkins. An unofficial Word version of the comment form is
posted on the project page.
•
If you are having difficulty accessing the SBS due to a forgotten password, incorrect credential
error messages, or system lock-out, contact NERC IT support directly at
https://support.nerc.net/ (Monday – Friday, 8 a.m. - 5 p.m. Eastern).
•
Passwords expire every 6 months and must be reset.
•
The SBS is not supported for use on mobile devices.
•
Please be mindful of ballot and comment period closing dates. We ask to allow at least 48 hours
for NERC support staff to assist with inquiries. Therefore, it is recommended that users try logging
into their SBS accounts prior to the last day of a comment/ballot period.
Next Steps
Initial ballots for the Standards and Implementation Plan, along with non-binding polls for each
associated Violation Risk Factors and Violation Severity Levels, will be conducted January 24 –
February 3, 2020.
For more information on the Standards Development Process, refer to the Standard Processes Manual.
For more information or assistance, contact Senior Standards Developer, Latrice Harkness (via email) or at
404-446-9728.
North American Electric Reliability Corporation
3353 Peachtree Rd, NE
Suite 600, North Tower
Atlanta, GA 30326
404-446-2560 | www.nerc.com
RELIABILITY | RESILIENCE | SECURITY
NERC Balloting Tool
Dashboard
Users
Registered Ballot Body
Proxy Ballot Body
My User Profile
Ballots
Ballot Events
Ballot Results
Comment Forms
View Comment Forms
Login / Register
Ballot Results
Comment: View Comment Results
Ballot Name:
2019-02 BES Cyber System Information Access Management CIP-004-7 IN 1 ST
Voting Start Date:
1/24/2020 12:01:00 AM
Voting End Date:
2/3/2020 8:00:00 PM
Ballot Type:
ST
Ballot Activity:
IN
Ballot Series:
1
Total # Votes:
256
Total Ballot Pool:
279
Quorum:
91.76
Quorum Established Date:
2/3/2020 3:22:12 PM
Weighted Segment Value:
15.37
Actions
Actions
Negative
Fraction w/
Comment
Ballot Segment Affirmative Affirmative Negative Votes
Segment
Pool Weight
Votes
Fraction w/ Comment
Segment:
80
1
Segment:
2
2
Segment:
60
3
Segment:
17
4
Segment:
69
5
Segment:
44
6
Segment:
0
7
Segment:
1
8
Negative Votes
No
Abstain
w/o Comment
Vote
1
9
0.129
61
0.871
0
3
7
0.2
0
0
2
0.2
0
0
0
1
7
0.125
49
0.875
1
0
3
1
3
0.176
14
0.824
0
0
0
1
11
0.196
45
0.804
0
2
11
1
5
0.119
37
0.881
0
0
2
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
Segment:
0
9
Segment:
6
10
Totals: 279
0
0
0
0
0
0
0
0
0.3
1
0.1
2
0.2
0
3
0
5.5
36
0.846
210
4.654
1
9
23
Ballot Pool Members
Segment
Organization
Voter
Designated
Proxy
Ballot
Third-Party
Comments
Christopher
Third-Party
Negative
Overberg
Comments
Constantin
Comments
Negative
Chitescu
Submitted
Brian EvansThird-Party
Negative
Mongeon
Comments
Comments
David Jendras
Negative
Submitted
Third-Party
Thomas Breene
Negative
Comments
Comments
Neil Shockey
Negative
Submitted
Comments
Roger Brand
Scott Miller Negative
Submitted
Third-Party
William Winters Daniel Valle Negative
Comments
David Weekley Scott Miller Affirmative N/A
Comments
Laura Nelson
Negative
Submitted
Comments
Jonathan Robbins
Negative
Submitted
Third-Party
Dermot Smyth
Negative
Comments
Third-Party
David Hathaway
Negative
Comments
Comments
Leonard Kula
Negative
Submitted
3
Con Ed - Consolidated Edison Co. of New York Peter Yost
6
Con Ed - Consolidated Edison Co. of New York
5
Ontario Power Generation Inc.
4
Utility Services, Inc.
3
Ameren - Ameren Services
3
WEC Energy Group, Inc.
5
Edison International - Southern California Edison
Company
3
MEAG Power
5
Con Ed - Consolidated Edison Co. of New York
1
MEAG Power
1
IDACORP - Idaho Power Company
4
Seminole Electric Cooperative, Inc.
1
Con Ed - Consolidated Edison Co. of New York
6
WEC Energy Group, Inc.
2
Independent Electricity System Operator
5
Massachusetts Municipal Wholesale Electric
Company
Anthony Stevens
Abstain
3
Sempra - San Diego Gas and Electric
Bridget Silvia
Negative
3
Basin Electric Power Cooperative
Jeremy Voll
3
5
NERC
Memo
Edison International - Southern California Edison
Romel Aquino
Company
NRG - NRG Energy, Inc.
Patricia Lynch
Negative
N/A
Comments
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
1
National Grid USA
Michael Jones
1
Western Area Power Administration
sean erickson
1
Edison International - Southern California Edison
Ayman Samaan
Company
1
Ameren - Ameren Services
Eric Scott
6
Ameren - Ameren Services
Robert Quinlivan
6
Black Hills Corporation
Eric Scherr
3
National Grid USA
Brian Shanahan
5
Ameren - Ameren Missouri
Sam Dwyer
1
Balancing Authority of Northern California
Kevin Smith
6
Sacramento Municipal Utility District
5
Sacramento Municipal Utility District
4
Sacramento Municipal Utility District
1
Sacramento Municipal Utility District
3
Sacramento Municipal Utility District
1
International Transmission Company Holdings
Corporation
Michael Moltane Gail Elliott
6
Seattle City Light
Charles Freeman
3
Puget Sound Energy, Inc.
Tim Womack
6
PPL - Louisville Gas and Electric Co.
Linn Oelker
3
PPL - Louisville Gas and Electric Co.
James Frank
3
APS - Arizona Public Service Co.
Vivian Moser
4
Seattle City Light
Hao Li
5
Puget Sound Energy, Inc.
Eleanor Ewry
6
Western Area Power Administration
Rosemary Jones
5
Sempra - San Diego Gas and Electric
Jennifer Wright
3
Tennessee Valley Authority
Ian Grant
Joe
Tarantino
Joe
Jamie Cutlip
Tarantino
Joe
Nicole Goi
Tarantino
Joe
Beth Tincher
Tarantino
Joe
Arthur Starkovich
Tarantino
Joe
Nicole Looney
Tarantino
Third-Party
Comments
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Third-Party
Negative
Comments
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Third-Party
Negative
Comments
Comments
Negative
Submitted
Third-Party
Negative
Comments
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
Third-Party
Negative
Comments
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Negative
1
Tennessee Valley Authority
Gabe Kurtz
1
Nebraska Public Power District
Jamison Cawley
10
New York State Reliability Council
ALAN
ADAMSON
1
City Utilities of Springfield, Missouri
Michael Bowman
4
City Utilities of Springfield, Missouri
John Allen
5
Avista - Avista Corporation
1
SaskPower
Glen Farmer
Wayne
Guttormson
1
Allete - Minnesota Power, Inc.
1
Submitted
Comments
Negative
Submitted
Third-Party
Negative
Comments
Comments
Negative
Submitted
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Affirmative N/A
Abstain
N/A
Jamie Monette
Negative
Comments
Submitted
APS - Arizona Public Service Co.
Michelle
Amarantos
Affirmative N/A
10
Midwest Reliability Organization
Russel Mountjoy
Negative
5
APS - Arizona Public Service Co.
Public Utility District No. 2 of Grant County,
Washington
Kelsi Rigby
Comments
Submitted
Affirmative N/A
LeRoy Patterson
Affirmative N/A
6
6
APS - Arizona Public Service Co.
Chinedu
Ochonogor
Affirmative N/A
5
Public Utility District No. 2 of Grant County,
Washington
Amy Jones
None
1
Dairyland Power Cooperative
Renee Leidel
3
Berkshire Hathaway Energy - MidAmerican
Energy Co.
Darnez Gresham
3
Tacoma Public Utilities (Tacoma, WA)
Marc Donaldson
6
Tennessee Valley Authority
Marjorie Parsons
5
Austin Energy
1
Puget Sound Energy, Inc.
Lisa Martin
Theresa
Rakowsky
4
WEC Energy Group, Inc.
Matthew Beilfuss
5
Platte River Power Authority
Tyson Archie
1
Glencoe Light and Power Commission
Terry Volkmann
1
Network and Security Technologies
Nicholas Lauriat
1
Public Utility District No. 1 of Pend Oreille
County
Kevin Conway
N/A
Third-Party
Comments
Comments
Negative
Submitted
Third-Party
Jennie Wike Negative
Comments
Comments
Negative
Submitted
Affirmative N/A
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Comments
Negative
Submitted
Negative
Affirmative N/A
Truong Le
Truong Le
Truong Le
Comments
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Third-Party
Negative
Comments
Comments
Negative
Submitted
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
None
N/A
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Affirmative N/A
Affirmative N/A
Affirmative N/A
Truong Le
Affirmative N/A
1
Seattle City Light
Pawel Krupa
Negative
1
Eversource Energy
Quintin Lee
6
Basin Electric Power Cooperative
Jerry Horner
1
Minnkota Power Cooperative Inc.
Theresa Allard
3
Associated Electric Cooperative, Inc.
Todd Bennett
3
Platte River Power Authority
Wade Kiess
6
Associated Electric Cooperative, Inc.
Brian Ackermann
1
Central Electric Power Cooperative (Missouri)
Michael Bax
3
M and A Electric Power Cooperative
Stephen Pogue
1
KAMO Electric Cooperative
Micah Breedlove
5
Associated Electric Cooperative, Inc.
Brad Haralson
3
Northeast Missouri Electric Power Cooperative
Skyler Wiegmann
3
KAMO Electric Cooperative
Tony Gott
3
Sho-Me Power Electric Cooperative
Jarrod Murdaugh
1
Sho-Me Power Electric Cooperative
Peter Dawson
5
4
3
Florida Municipal Power Agency
Florida Municipal Power Agency
Florida Municipal Power Agency
6
Florida Municipal Power Agency
Chris Gowder
Carol Chinn
Dale Ray
Richard
Montgomery
1
Northeast Missouri Electric Power Cooperative
Kevin White
Negative
1
N.W. Electric Power Cooperative, Inc.
Mark Ramsey
Negative
3
NW Electric Power Cooperative, Inc.
John Stickley
Negative
1
Hydro One Networks, Inc.
Payam
Farahbakhsh
Abstain
6
Platte River Power Authority
Sabrina Martz
Negative
5
Los Angeles Department of Water and Power
Glenn Barry
Negative
1
Tacoma Public Utilities (Tacoma, WA)
John Merrell
Jennie Wike Negative
Andy
Fuhrman
Third-Party
Comments
Third-Party
Comments
Third-Party
Comments
N/A
Third-Party
Comments
Comments
Submitted
Comments
Submitted
Third-Party
Comments
5
Brazos Electric Power Cooperative, Inc.
Shari Heino
Negative
5
Herb Schrayshuen
Herb
Schrayshuen
Affirmative N/A
3
Lakeland Electric
Patricia Boody
Negative
6
Great Plains Energy - Kansas City Power and
Light Co.
Jennifer
Flandermeyer
3
Georgia System Operations Corporation
Scott McGough
1
Manitoba Hydro
Bruce Reimer
1
Long Island Power Authority
Robert Ganley
5
Manitoba Hydro
Yuguang Xiao
3
Manitoba Hydro
Karim AbdelHadi
3
Los Angeles Department of Water and Power
Tony Skourtas
1
Tri-State G and T Association, Inc.
Kjersti Drott
5
Tri-State G and T Association, Inc.
Richard
Schlottmann
4
FirstEnergy - FirstEnergy Corporation
Mark Garza
3
Tri-State G and T Association, Inc.
5
1
5
Talen Generation, LLC
Lakeland Electric
Lakeland Electric
Janelle Marriott
Gill
Donald Lock
Larry Watt
Becky Rinier
6
OGE Energy - Oklahoma Gas and Electric Co.
Sing Tay
3
1
Eversource Energy
Tallahassee Electric (City of Tallahassee, FL)
Sharon Flannery
Scott Langston
5
Oglethorpe Power Corporation
Donna Johnson
1
Los Angeles Department of Water and Power
faranak sarbaz
1
Black Hills Corporation
Wes Wingen
5
Black Hills Corporation - Black Hills Power
Don Stahl
1
Seminole Electric Cooperative, Inc.
Bret Galbraith
6
NiSource - Northern Indiana Public Service Co.
Joe O'Brien
No Comment
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Third-Party
Negative
Comments
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
None
N/A
None
N/A
Third-Party
Negative
Comments
Affirmative N/A
Affirmative N/A
Third-Party
Negative
Comments
Comments
Negative
Submitted
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
3
NiSource - Northern Indiana Public Service Co.
Dmitriy Bazylyuk
Negative
6
New York Power Authority
Thomas Savin
Negative
6
Talen Energy Marketing, LLC
Jennifer
Hohenshilt
Affirmative N/A
1
FirstEnergy - FirstEnergy Corporation
Julie Severino
Negative
1
M and A Electric Power Cooperative
William Price
3
Dominion - Dominion Resources, Inc.
Connie Schroeder
3
Muscatine Power and Water
Seth Shoemaker
6
Muscatine Power and Water
Nick Burns
3
OGE Energy - Oklahoma Gas and Electric Co.
Donald Hargrove
3
Westar Energy
Bryan Taggart
3
Great Plains Energy - Kansas City Power and
Light Co.
John Carlson
5
Westar Energy
Derek Brown
1
5
Great Plains Energy - Kansas City Power and
Light Co.
Great Plains Energy - Kansas City Power and
Light Co.
James McBee
Marcus Moor
6
Westar Energy
Grant Wilkerson
5
Southern Company - Southern Company
Generation
William D.
Shultz
6
FirstEnergy - FirstEnergy Solutions
Ann Carey
6
Manitoba Hydro
Blair Mukanik
1
Westar Energy
Allen Klassen
5
Tennessee Valley Authority
M Lee Thomas
3
FirstEnergy - FirstEnergy Corporation
Aaron
Ghodooshim
1
OGE Energy - Oklahoma Gas and Electric Co.
Terri Pyle
1
CMS Energy - Consumers Energy Company
Donald Lynd
3
Black Hills Corporation
Eric Egge
6
PSEG - PSEG Energy Resources and Trade LLC Luiggi Beretta
Submitted
Comments
Submitted
Comments
Submitted
Third-Party
Negative
Comments
Comments
Negative
Submitted
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Third-Party
Negative
Comments
Affirmative N/A
Comments
Negative
Submitted
Third-Party
Negative
Comments
3
Nebraska Public Power District
Tony Eddleman
5
Northern California Power Agency
Marty Hostler
3
CMS Energy - Consumers Energy Company
5
CMS Energy - Consumers Energy Company
Karl Blaszkowski
David
Greyerbiehl
4
Georgia System Operations Corporation
Andrea Barclay
1
New York Power Authority
Salvatore
Spagnolo
1
OTP - Otter Tail Power Company
Charles Wicklund
5
PSEG - PSEG Fossil LLC
Tim Kucey
5
OTP - Otter Tail Power Company
Brett Jacobs
3
OTP - Otter Tail Power Company
Wendi Olson
3
Owensboro Municipal Utilities
Thomas Lyons
1
Hydro-Qu?bec TransEnergie
Nicolas Turcotte
4
MGE Energy - Madison Gas and Electric Co.
Joseph DePoorter
5
Entergy - Entergy Services, Inc.
Gail Golden
6
Portland General Electric Co.
Daniel Mason
1
Muscatine Power and Water
Andy Kurriger
3
New York Power Authority
David Rivera
1
BC Hydro and Power Authority
Adrian Andreoiu
1
NiSource - Northern Indiana Public Service Co.
Steve Toosevich
5
NiSource - Northern Indiana Public Service Co.
Kathryn Tackett
3
BC Hydro and Power Authority
Hootan Jarollahi
6
Los Angeles Department of Water and Power
Anton Vu
1
Omaha Public Power District
Doug Peterchuck
5
FirstEnergy - FirstEnergy Solutions
Robert Loy
10
SERC Reliability Corporation
Dave Krueger
1
Platte River Power Authority
Matt Thompson
5
JEA
John Babik
Third-Party
Comments
Comments
Negative
Submitted
Affirmative N/A
Negative
Affirmative N/A
Comments
Submitted
Comments
Negative
Submitted
Third-Party
Negative
Comments
Third-Party
Negative
Comments
None
N/A
Third-Party
Negative
Comments
Affirmative N/A
Third-Party
Negative
Comments
Third-Party
Negative
Comments
None
N/A
Comments
Negative
Submitted
Third-Party
Negative
Comments
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
None
N/A
Comments
Negative
Submitted
Third-Party
Negative
Comments
Comments
Negative
Submitted
Affirmative N/A
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Comments
Negative
2
Electric Reliability Council of Texas, Inc.
Brandon Gleason
6
Seminole Electric Cooperative, Inc.
David Reinecke
5
1
6
Imperial Irrigation District
Sunflower Electric Power Corporation
Imperial Irrigation District
Tino Zaragoza
Paul Mehlhaff
Diana Torres
1
Public Utility District No. 1 of Chelan County
Ginette Lacasse
5
Public Utility District No. 1 of Chelan County
Meaghan Connell
1
Imperial Irrigation District
Jesus Sammy
Alcaraz
Affirmative N/A
3
Public Utility District No. 1 of Chelan County
Joyce Gundry
Negative
5
BC Hydro and Power Authority
Helen Hamilton
Harding
Affirmative N/A
Lynn Goldstein
None
Nurul Abser
Abstain
1
PNM Resources - Public Service Company of
New Mexico
NB Power Corporation
5
Dairyland Power Cooperative
1
5
Berkshire Hathaway Energy - MidAmerican
Energy Co.
Hydro-Qu?bec Production
5
Tacoma Public Utilities (Tacoma, WA)
3
Imperial Irrigation District
5
Portland General Electric Co.
3
Portland General Electric Co.
5
PPL - Louisville Gas and Electric Co.
5
Berkshire Hathaway - NV Energy
3
Pacific Gas and Electric Company
1
Pacific Gas and Electric Company
1
Santee Cooper
6
Santee Cooper
3
Santee Cooper
5
Santee Cooper
1
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
None
N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Submitted
N/A
N/A
Third-Party
Tommy Drea
Negative
Comments
Comments
Terry Harbour
Negative
Submitted
Carl Pineault
None
N/A
Third-Party
Ozan Ferrin
Jennie Wike Negative
Comments
Denise Sanchez
Affirmative N/A
Comments
Ryan Olson
Negative
Submitted
Third-Party
Dan Zollner
Negative
Comments
JULIE
Comments
Negative
HOSTRANDER
Submitted
Comments
Kevin Salsbury
Negative
Submitted
Michael
Sandra Ellis
None
N/A
Johnson
Michael
Marco Rios
None
N/A
Johnson
Comments
Chris Wagner
Negative
Submitted
Comments
Michael Brown
Negative
Submitted
Comments
James Poston
Negative
Submitted
Comments
Tommy Curtis
Negative
Submitted
Third-Party
Comments
Comments
Negative
Submitted
Comments
Negative
Submitted
Truong Le Affirmative N/A
Third-Party
Negative
Comments
Comments
Jennie Wike Negative
Submitted
Comments
Negative
Submitted
None
N/A
Michael
None
N/A
Johnson
Comments
Jennie Wike Negative
Submitted
Third-Party
Negative
Comments
Affirmative N/A
Comments
Negative
Submitted
None
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Third-Party
Negative
Comments
Abstain
N/A
Comments
Negative
Submitted
None
N/A
Comments
Negative
Submitted
Third-Party
Negative
Comments
Comments
Negative
Submitted
5
WEC Energy Group, Inc.
Janet OBrien
6
Dominion - Dominion Resources, Inc.
Sean Bodkin
1
PPL Electric Utilities Corporation
Brenda Truhe
1
Gainesville Regional Utilities
5
Lincoln Electric System
David Owens
Kayleigh
Wilkerson
4
Tacoma Public Utilities (Tacoma, WA)
Hien Ho
6
Northern California Power Agency
Dennis Sismaet
1
Portland General Electric Co.
Brooke Jockin
5
Pacific Gas and Electric Company
Ed Hanson
6
Tacoma Public Utilities (Tacoma, WA)
Terry Gifford
6
Great River Energy
1
5
NextEra Energy - Florida Power and Light Co.
Southern Company - Southern Company
Matt Carden
Services, Inc.
Choctaw Generation Limited Partnership, LLLP Rob Watson
3
Seminole Electric Cooperative, Inc.
Kristine Ward
5
Dominion - Dominion Resources, Inc.
Rachel Snead
5
Nebraska Public Power District
Ronald Bender
10
Northeast Power Coordinating Council
Guy V. Zito
6
Berkshire Hathaway - PacifiCorp
Sandra Shaffer
6
Powerex Corporation
1
American Transmission Company, LLC
Raj Hundal
LaTroy
Brumfield
4
Alliant Energy Corporation Services, Inc.
Larry Heckert
5
New York Power Authority
Shivaz Chopra
4
Public Utility District No. 2 of Grant County,
Washington
Karla Weaver
Affirmative N/A
1
Exelon
Daniel Gacek
Negative
3
Exelon
Kinte Whitehead
Negative
5
Exelon
Cynthia Lee
Negative
1
Donna
Stephenson
Mike ONeil
Negative
Comments
Submitted
Comments
Submitted
Comments
Submitted
6
Exelon
Becky Webb
1
Entergy - Entergy Services, Inc.
Oliver Burke
3
City Utilities of Springfield, Missouri
Scott Williams
5
Enel Green Power
Mat Bunch
6
Xcel Energy, Inc.
Carrie Dixon
5
Xcel Energy, Inc.
Gerry Huitt
1
Xcel Energy, Inc.
Dean Schiro
4
1
CMS Energy - Consumers Energy Company
Memphis Light, Gas and Water Division
1
Bonneville Power Administration
Dwayne Parker
Allan Long
Kammy RogersHolliday
6
Bonneville Power Administration
Andrew Meyers
3
Bonneville Power Administration
Ken Lanehome
5
Bonneville Power Administration
Scott Winner
5
Great River Energy
Preston Walsh
1
Georgia Transmission Corporation
Greg Davis
3
Xcel Energy, Inc.
Nicholas Friebel
3
Snohomish County PUD No. 1
Holly Chaney
4
5
Public Utility District No. 1 of Snohomish
County
Public Utility District No. 1 of Snohomish
County
John Martinsen
Sam Nietfeld
6
Snohomish County PUD No. 1
John Liang
1
Public Utility District No. 1 of Snohomish
County
Long Duong
5
AEP
Thomas Foltz
1
AEP - AEP Service Corporation
Dennis Sauriol
1
Oncor Electric Delivery
Lee Maurer
6
AEP - AEP Marketing
Yee Chou
10
ReliabilityFirst
Anthony
Jablonski
W. Dwayne
Comments
Submitted
None
N/A
Third-Party
Negative
Comments
Abstain
N/A
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Affirmative N/A
None
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Third-Party
Negative
Comments
Third-Party
Negative
Comments
None
N/A
Comments
Negative
Submitted
Third-Party
Negative
Comments
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Negative
Abstain
N/A
3
Austin Energy
5
Cogentrix Energy Power Management, LLC
Preston
Gerry Adamski
5
Seminole Electric Cooperative, Inc.
David Weber
5
Cowlitz County PUD
Florida Reliability Coordinating Council –
Member Services Division
Deanna Carlson
Affirmative N/A
Comments
Negative
Submitted
None
N/A
Vince Ordax
Abstain
3
AEP
Kent Feliks
Negative
6
10
Lakeland Electric
Texas Reliability Entity, Inc.
Paul Shipps
Rachel Coyne
None
Abstain
6
Duke Energy
Greg Cecil
Negative
5
Duke Energy
Dale Goodwine
Negative
3
Duke Energy
Lee Schuster
Negative
4
National Rural Electric Cooperative Association Barry Lawson
Negative
4
Arkansas Electric Cooperative Corporation
Alice Wright
Negative
1
Arkansas Electric Cooperative Corporation
Jennifer Loiacano
Negative
6
Arkansas Electric Cooperative Corporation
Bruce Walkup
Negative
3
Arkansas Electric Cooperative Corporation
Mark Gann
Negative
5
Arkansas Electric Cooperative Corporation
Adrian Harris
None
1
East Kentucky Power Cooperative
Amber Skillern
Negative
3
East Kentucky Power Cooperative
Patrick Woods
Negative
1
Duke Energy
Laura Lee
Negative
1
Arizona Electric Power Cooperative, Inc.
Ben Engelby
Negative
5
East Kentucky Power Cooperative
mark brewer
Negative
3
Wabash Valley Power Association
Susan Sosbe
Negative
5
SunPower
Bradley Collard
Negative
5
SunPower
Bradley Collard
None
8
© 2021 - NERC Ver 4.3.0.0
Machine Name: ERODVSBSWB02
Affirmative N/A
N/A
Comments
Submitted
N/A
N/A
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Third-Party
Comments
Third-Party
Comments
Third-Party
Comments
Third-Party
Comments
N/A
Third-Party
Comments
Third-Party
Comments
Comments
Submitted
Third-Party
Comments
Third-Party
Comments
Comments
Submitted
Comments
Submitted
N/A
NERC Balloting Tool
Dashboard
Users
Registered Ballot Body
Proxy Ballot Body
My User Profile
Ballots
Ballot Events
Ballot Results
Comment Forms
View Comment Forms
Login / Register
Ballot Results
Comment: View Comment Results
Ballot Name:
2019-02 BES Cyber System Information Access Management CIP-011-3 IN 1 ST
Voting Start Date:
1/24/2020 12:01:00 AM
Voting End Date:
2/3/2020 8:00:00 PM
Ballot Type:
ST
Ballot Activity:
IN
Ballot Series:
1
Total # Votes:
257
Total Ballot Pool:
278
Quorum:
92.45
Quorum Established Date:
2/3/2020 3:22:21 PM
Weighted Segment Value:
13.04
Actions
Actions
Negative
Fraction w/
Comment
Ballot Segment Affirmative Affirmative Negative Votes
Segment
Pool Weight
Votes
Fraction w/ Comment
Segment:
80
1
Segment:
2
2
Segment:
59
3
Segment:
17
4
Segment:
69
5
Segment:
44
6
Segment:
0
7
Segment:
1
8
Negative Votes
No
Abstain
w/o Comment
Vote
1
7
0.1
63
0.9
0
3
7
0.2
0
0
2
0.2
0
0
0
1
6
0.105
51
0.895
0
0
2
1
3
0.176
14
0.824
0
0
0
1
8
0.14
49
0.86
0
2
10
1
4
0.095
38
0.905
0
0
2
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
Segment:
0
9
Segment:
6
10
Totals: 278
0
0
0
0
0
0
0
0
0.3
1
0.1
2
0.2
0
3
0
5.5
29
0.717
219
4.783
0
9
21
Ballot Pool Members
Segment
Organization
Voter
Peter Yost
Designated
Proxy
Ballot
3
Con Ed - Consolidated Edison Co. of New York
6
Con Ed - Consolidated Edison Co. of New York
4
Utility Services, Inc.
3
Ameren - Ameren Services
David Jendras
Negative
3
WEC Energy Group, Inc.
Thomas Breene
Negative
5
Ontario Power Generation Inc.
Constantin
Chitescu
Negative
5
Edison International - Southern California Edison
Neil Shockey
Company
3
MEAG Power
Roger Brand
5
Con Ed - Consolidated Edison Co. of New York
William Winters Daniel Valle Negative
1
MEAG Power
David Weekley
1
IDACORP - Idaho Power Company
Laura Nelson
Negative
4
Seminole Electric Cooperative, Inc.
Jonathan Robbins
Negative
1
Con Ed - Consolidated Edison Co. of New York
Dermot Smyth
Negative
6
WEC Energy Group, Inc.
David Hathaway
Negative
2
Independent Electricity System Operator
Leonard Kula
Negative
5
Massachusetts Municipal Wholesale Electric
Company
Anthony Stevens
Abstain
3
Sempra - San Diego Gas and Electric
Bridget Silvia
Negative
3
Basin Electric Power Cooperative
Jeremy Voll
Negative
3
Edison International - Southern California Edison
Romel Aquino
Company
Christopher
Overberg
Brian EvansMongeon
Negative
Negative
Negative
Negative
Scott Miller Negative
Scott Miller Negative
Negative
NERC
Memo
Third-Party
Comments
Third-Party
Comments
Third-Party
Comments
Comments
Submitted
Third-Party
Comments
Comments
Submitted
Comments
Submitted
Comments
Submitted
Third-Party
Comments
Comments
Submitted
Comments
Submitted
Comments
Submitted
Third-Party
Comments
Third-Party
Comments
Comments
Submitted
N/A
Comments
Submitted
Comments
Submitted
Comments
Submitted
5
NRG - NRG Energy, Inc.
Patricia Lynch
1
National Grid USA
Michael Jones
1
Western Area Power Administration
sean erickson
1
Edison International - Southern California Edison
Ayman Samaan
Company
1
Ameren - Ameren Services
Eric Scott
6
Ameren - Ameren Services
Robert Quinlivan
6
Black Hills Corporation
Eric Scherr
3
National Grid USA
Brian Shanahan
5
Ameren - Ameren Missouri
Sam Dwyer
1
Balancing Authority of Northern California
6
Sacramento Municipal Utility District
5
Sacramento Municipal Utility District
4
Sacramento Municipal Utility District
1
Sacramento Municipal Utility District
3
Sacramento Municipal Utility District
1
International Transmission Company Holdings
Corporation
Michael Moltane Gail Elliott
6
Seattle City Light
Charles Freeman
3
Puget Sound Energy, Inc.
Tim Womack
6
PPL - Louisville Gas and Electric Co.
Linn Oelker
3
PPL - Louisville Gas and Electric Co.
James Frank
3
APS - Arizona Public Service Co.
Vivian Moser
4
Seattle City Light
Hao Li
5
Puget Sound Energy, Inc.
Eleanor Ewry
6
Western Area Power Administration
Rosemary Jones
5
Sempra - San Diego Gas and Electric
Jennifer Wright
Joe
Tarantino
Joe
Jamie Cutlip
Tarantino
Joe
Nicole Goi
Tarantino
Joe
Beth Tincher
Tarantino
Joe
Arthur Starkovich
Tarantino
Joe
Nicole Looney
Tarantino
Kevin Smith
Affirmative N/A
Third-Party
Negative
Comments
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Third-Party
Negative
Comments
Comments
Negative
Submitted
Third-Party
Negative
Comments
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Third-Party
Negative
Comments
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Third-Party
Negative
Comments
Comments
Negative
Submitted
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Affirmative N/A
3
Tennessee Valley Authority
Ian Grant
1
Tennessee Valley Authority
Gabe Kurtz
1
Nebraska Public Power District
Jamison Cawley
10
New York State Reliability Council
ALAN
ADAMSON
1
City Utilities of Springfield, Missouri
Michael Bowman
4
City Utilities of Springfield, Missouri
John Allen
5
Avista - Avista Corporation
1
SaskPower
1
Allete - Minnesota Power, Inc.
1
APS - Arizona Public Service Co.
Glen Farmer
Wayne
Guttormson
Jamie Monette
Michelle
Amarantos
10
Midwest Reliability Organization
Russel Mountjoy
5
APS - Arizona Public Service Co.
Kelsi Rigby
6
Public Utility District No. 2 of Grant County,
Washington
LeRoy Patterson
Affirmative N/A
6
APS - Arizona Public Service Co.
Chinedu
Ochonogor
Negative
Comments
Submitted
5
Public Utility District No. 2 of Grant County,
Washington
Amy Jones
None
N/A
1
Dairyland Power Cooperative
Renee Leidel
3
Berkshire Hathaway Energy - MidAmerican
Energy Co.
Darnez Gresham
3
Tacoma Public Utilities (Tacoma, WA)
Marc Donaldson
6
Tennessee Valley Authority
Marjorie Parsons
5
Austin Energy
1
Puget Sound Energy, Inc.
Lisa Martin
Theresa
Rakowsky
5
San Miguel Electric Cooperative, Inc.
Lana Smith
4
WEC Energy Group, Inc.
Matthew Beilfuss
5
Platte River Power Authority
Tyson Archie
1
Glencoe Light and Power Commission
Terry Volkmann
Abstain
N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Third-Party
Comments
Comments
Negative
Submitted
Comments
Jennie Wike Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Third-Party
Negative
Comments
Comments
Negative
Submitted
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Negative
Comments
Submitted
1
Network and Security Technologies
Nicholas Lauriat
Negative
1
Public Utility District No. 1 of Pend Oreille
County
Kevin Conway
Affirmative N/A
1
Seattle City Light
Pawel Krupa
1
Eversource Energy
Quintin Lee
6
Basin Electric Power Cooperative
Jerry Horner
1
Minnkota Power Cooperative Inc.
Theresa Allard
3
Associated Electric Cooperative, Inc.
Todd Bennett
3
Platte River Power Authority
Wade Kiess
6
Associated Electric Cooperative, Inc.
Brian Ackermann
1
Central Electric Power Cooperative (Missouri)
Michael Bax
3
M and A Electric Power Cooperative
Stephen Pogue
1
KAMO Electric Cooperative
Micah Breedlove
5
Associated Electric Cooperative, Inc.
Brad Haralson
3
Northeast Missouri Electric Power Cooperative
Skyler Wiegmann
3
KAMO Electric Cooperative
Tony Gott
3
Sho-Me Power Electric Cooperative
Jarrod Murdaugh
1
Sho-Me Power Electric Cooperative
Peter Dawson
5
4
3
Florida Municipal Power Agency
Florida Municipal Power Agency
Florida Municipal Power Agency
6
Florida Municipal Power Agency
Chris Gowder
Carol Chinn
Dale Ray
Richard
Montgomery
1
Northeast Missouri Electric Power Cooperative
Kevin White
Negative
1
N.W. Electric Power Cooperative, Inc.
Mark Ramsey
Negative
3
NW Electric Power Cooperative, Inc.
John Stickley
Negative
1
Hydro One Networks, Inc.
Payam
Farahbakhsh
Abstain
N/A
6
Platte River Power Authority
Sabrina Martz
Negative
Third-Party
Comments
Truong Le
Truong Le
Truong Le
Comments
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Third-Party
Negative
Comments
Comments
Negative
Submitted
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
None
N/A
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Affirmative N/A
Affirmative N/A
Affirmative N/A
Truong Le
Affirmative N/A
Negative
Andy
Fuhrman
Third-Party
Comments
Third-Party
Comments
Third-Party
Comments
Comments
Submitted
Comments
Submitted
Third-Party
Comments
5
Los Angeles Department of Water and Power
Glenn Barry
Negative
1
Tacoma Public Utilities (Tacoma, WA)
John Merrell
Jennie Wike Negative
5
Brazos Electric Power Cooperative, Inc.
Shari Heino
Negative
5
Herb Schrayshuen
Herb
Schrayshuen
Affirmative N/A
3
Lakeland Electric
Patricia Boody
Negative
6
Great Plains Energy - Kansas City Power and
Light Co.
Jennifer
Flandermeyer
3
Georgia System Operations Corporation
Scott McGough
1
Manitoba Hydro
Bruce Reimer
1
Long Island Power Authority
Robert Ganley
5
Manitoba Hydro
Yuguang Xiao
3
Manitoba Hydro
Karim AbdelHadi
3
Los Angeles Department of Water and Power
Tony Skourtas
1
Tri-State G and T Association, Inc.
Kjersti Drott
4
FirstEnergy - FirstEnergy Corporation
Mark Garza
3
Tri-State G and T Association, Inc.
5
1
5
Talen Generation, LLC
Lakeland Electric
Lakeland Electric
Janelle Marriott
Gill
Donald Lock
Larry Watt
Becky Rinier
6
OGE Energy - Oklahoma Gas and Electric Co.
Sing Tay
3
1
Eversource Energy
Tallahassee Electric (City of Tallahassee, FL)
Sharon Flannery
Scott Langston
5
Oglethorpe Power Corporation
Donna Johnson
1
Los Angeles Department of Water and Power
faranak sarbaz
1
Black Hills Corporation
Wes Wingen
5
Black Hills Corporation - Black Hills Power
Don Stahl
1
Seminole Electric Cooperative, Inc.
Bret Galbraith
Comments
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Third-Party
Negative
Comments
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
None
N/A
None
N/A
Third-Party
Negative
Comments
Affirmative N/A
Affirmative N/A
Third-Party
Negative
Comments
Comments
Negative
Submitted
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Comments
Negative
Submitted
Comments
6
NiSource - Northern Indiana Public Service Co.
Joe O'Brien
Negative
3
NiSource - Northern Indiana Public Service Co.
Dmitriy Bazylyuk
Negative
6
New York Power Authority
Thomas Savin
Negative
6
Talen Energy Marketing, LLC
Jennifer
Hohenshilt
Affirmative N/A
1
FirstEnergy - FirstEnergy Corporation
Julie Severino
Negative
1
M and A Electric Power Cooperative
William Price
3
Dominion - Dominion Resources, Inc.
Connie Schroeder
3
Muscatine Power and Water
Seth Shoemaker
6
Muscatine Power and Water
Nick Burns
3
OGE Energy - Oklahoma Gas and Electric Co.
Donald Hargrove
3
Westar Energy
Bryan Taggart
3
Great Plains Energy - Kansas City Power and
Light Co.
John Carlson
5
Westar Energy
Derek Brown
1
5
Great Plains Energy - Kansas City Power and
Light Co.
Great Plains Energy - Kansas City Power and
Light Co.
James McBee
Marcus Moor
6
Westar Energy
Grant Wilkerson
5
Southern Company - Southern Company
Generation
William D. Shultz
6
FirstEnergy - FirstEnergy Solutions
Ann Carey
6
Manitoba Hydro
Blair Mukanik
1
Westar Energy
Allen Klassen
5
Tennessee Valley Authority
M Lee Thomas
3
FirstEnergy - FirstEnergy Corporation
Aaron
Ghodooshim
1
OGE Energy - Oklahoma Gas and Electric Co.
Terri Pyle
1
CMS Energy - Consumers Energy Company
Donald Lynd
3
Black Hills Corporation
Eric Egge
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Third-Party
Negative
Comments
Comments
Negative
Submitted
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Third-Party
Negative
Comments
Affirmative N/A
Third-Party
Negative
Comments
6
PSEG - PSEG Energy Resources and Trade LLC Luiggi Beretta
3
Nebraska Public Power District
Tony Eddleman
5
Northern California Power Agency
Marty Hostler
3
CMS Energy - Consumers Energy Company
5
CMS Energy - Consumers Energy Company
Karl Blaszkowski
David
Greyerbiehl
4
Georgia System Operations Corporation
Andrea Barclay
1
New York Power Authority
Salvatore
Spagnolo
1
OTP - Otter Tail Power Company
Charles Wicklund
5
PSEG - PSEG Fossil LLC
Tim Kucey
5
OTP - Otter Tail Power Company
Brett Jacobs
3
OTP - Otter Tail Power Company
Wendi Olson
3
Owensboro Municipal Utilities
Thomas Lyons
1
Hydro-Qu?bec TransEnergie
Nicolas Turcotte
4
MGE Energy - Madison Gas and Electric Co.
Joseph DePoorter
5
Entergy - Entergy Services, Inc.
Gail Golden
6
Portland General Electric Co.
Daniel Mason
1
Muscatine Power and Water
Andy Kurriger
3
New York Power Authority
David Rivera
1
BC Hydro and Power Authority
Adrian Andreoiu
1
NiSource - Northern Indiana Public Service Co.
Steve Toosevich
5
NiSource - Northern Indiana Public Service Co.
Kathryn Tackett
3
BC Hydro and Power Authority
Hootan Jarollahi
6
Los Angeles Department of Water and Power
Anton Vu
1
Omaha Public Power District
Doug Peterchuck
5
FirstEnergy - FirstEnergy Solutions
Robert Loy
10
SERC Reliability Corporation
Dave Krueger
1
Platte River Power Authority
Matt Thompson
Third-Party
Comments
Third-Party
Negative
Comments
Comments
Negative
Submitted
Affirmative N/A
Negative
Affirmative N/A
Comments
Submitted
Comments
Negative
Submitted
Third-Party
Negative
Comments
Third-Party
Negative
Comments
None
N/A
Third-Party
Negative
Comments
Affirmative N/A
Third-Party
Negative
Comments
Third-Party
Negative
Comments
None
N/A
Comments
Negative
Submitted
Third-Party
Negative
Comments
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
None
N/A
Comments
Negative
Submitted
Third-Party
Negative
Comments
Comments
Negative
Submitted
Affirmative N/A
Third-Party
Negative
Comments
Negative
Third-Party
Comments
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
None
N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
5
JEA
John Babik
2
Electric Reliability Council of Texas, Inc.
Brandon Gleason
6
Seminole Electric Cooperative, Inc.
David Reinecke
5
1
6
Imperial Irrigation District
Sunflower Electric Power Corporation
Imperial Irrigation District
Tino Zaragoza
Paul Mehlhaff
Diana Torres
1
Public Utility District No. 1 of Chelan County
Ginette Lacasse
5
Public Utility District No. 1 of Chelan County
Meaghan Connell
1
Imperial Irrigation District
Jesus Sammy
Alcaraz
Affirmative N/A
3
Public Utility District No. 1 of Chelan County
Joyce Gundry
Negative
5
BC Hydro and Power Authority
Helen Hamilton
Harding
Negative
Lynn Goldstein
None
Nurul Abser
Abstain
1
PNM Resources - Public Service Company of
New Mexico
NB Power Corporation
5
Dairyland Power Cooperative
1
5
Berkshire Hathaway Energy - MidAmerican
Energy Co.
Hydro-Qu?bec Production
5
Tacoma Public Utilities (Tacoma, WA)
3
Imperial Irrigation District
5
Portland General Electric Co.
3
Portland General Electric Co.
5
PPL - Louisville Gas and Electric Co.
5
Berkshire Hathaway - NV Energy
3
Pacific Gas and Electric Company
1
Pacific Gas and Electric Company
1
Santee Cooper
6
Santee Cooper
3
Santee Cooper
1
Negative
Comments
Submitted
Third-Party
Comments
N/A
N/A
Third-Party
Tommy Drea
Negative
Comments
Comments
Terry Harbour
Negative
Submitted
Carl Pineault
None
N/A
Comments
Ozan Ferrin
Jennie Wike Negative
Submitted
Denise Sanchez
Affirmative N/A
Comments
Ryan Olson
Negative
Submitted
Third-Party
Dan Zollner
Negative
Comments
JULIE
Comments
Negative
HOSTRANDER
Submitted
Comments
Kevin Salsbury
Negative
Submitted
Michael
Sandra Ellis
None
N/A
Johnson
Michael
Marco Rios
None
N/A
Johnson
Comments
Chris Wagner
Negative
Submitted
Comments
Michael Brown
Negative
Submitted
Comments
James Poston
Negative
Submitted
Comments
Submitted
Third-Party
Negative
Comments
Comments
Negative
Submitted
Comments
Negative
Submitted
Truong Le Affirmative N/A
Third-Party
Negative
Comments
Comments
Jennie Wike Negative
Submitted
Comments
Negative
Submitted
None
N/A
Michael
None
N/A
Johnson
Comments
Jennie Wike Negative
Submitted
Third-Party
Negative
Comments
Affirmative N/A
Comments
Negative
Submitted
None
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Third-Party
Negative
Comments
Abstain
N/A
Comments
Negative
Submitted
None
N/A
Comments
Negative
Submitted
Third-Party
Negative
Comments
Comments
Negative
Submitted
5
Santee Cooper
Tommy Curtis
5
WEC Energy Group, Inc.
Janet OBrien
6
Dominion - Dominion Resources, Inc.
Sean Bodkin
1
PPL Electric Utilities Corporation
Brenda Truhe
1
Gainesville Regional Utilities
5
Lincoln Electric System
David Owens
Kayleigh
Wilkerson
4
Tacoma Public Utilities (Tacoma, WA)
Hien Ho
6
Northern California Power Agency
Dennis Sismaet
1
Portland General Electric Co.
Brooke Jockin
5
Pacific Gas and Electric Company
Ed Hanson
6
Tacoma Public Utilities (Tacoma, WA)
Terry Gifford
6
Great River Energy
1
5
NextEra Energy - Florida Power and Light Co.
Southern Company - Southern Company
Services, Inc.
Choctaw Generation Limited Partnership, LLLP
3
Seminole Electric Cooperative, Inc.
Kristine Ward
5
Dominion - Dominion Resources, Inc.
Rachel Snead
5
Nebraska Public Power District
Ronald Bender
10
Northeast Power Coordinating Council
Guy V. Zito
6
Berkshire Hathaway - PacifiCorp
Sandra Shaffer
6
Powerex Corporation
1
American Transmission Company, LLC
Raj Hundal
LaTroy
Brumfield
4
Alliant Energy Corporation Services, Inc.
Larry Heckert
5
New York Power Authority
Shivaz Chopra
4
Public Utility District No. 2 of Grant County,
Washington
Karla Weaver
Affirmative N/A
1
Exelon
Daniel Gacek
Negative
3
Exelon
Kinte Whitehead
Negative
1
Donna
Stephenson
Mike ONeil
Matt Carden
Rob Watson
Negative
Comments
Submitted
Comments
Submitted
5
Exelon
Cynthia Lee
6
Exelon
Becky Webb
1
Entergy - Entergy Services, Inc.
Oliver Burke
3
City Utilities of Springfield, Missouri
Scott Williams
5
Enel Green Power
Mat Bunch
6
Xcel Energy, Inc.
Carrie Dixon
5
Xcel Energy, Inc.
Gerry Huitt
1
Xcel Energy, Inc.
Dean Schiro
4
1
CMS Energy - Consumers Energy Company
Memphis Light, Gas and Water Division
1
Bonneville Power Administration
Dwayne Parker
Allan Long
Kammy RogersHolliday
6
Bonneville Power Administration
Andrew Meyers
3
Bonneville Power Administration
Ken Lanehome
5
Bonneville Power Administration
Scott Winner
5
Great River Energy
Preston Walsh
1
Georgia Transmission Corporation
Greg Davis
3
Snohomish County PUD No. 1
Holly Chaney
4
Public Utility District No. 1 of Snohomish County John Martinsen
5
Public Utility District No. 1 of Snohomish County Sam Nietfeld
6
Snohomish County PUD No. 1
1
Public Utility District No. 1 of Snohomish County Long Duong
5
AEP
Thomas Foltz
1
AEP - AEP Service Corporation
Dennis Sauriol
1
Oncor Electric Delivery
Lee Maurer
6
AEP - AEP Marketing
Yee Chou
10
ReliabilityFirst
Anthony
Jablonski
John Liang
Comments
Submitted
Comments
Negative
Submitted
None
N/A
Third-Party
Negative
Comments
Abstain
N/A
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Affirmative N/A
None
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Comments
Negative
Submitted
Third-Party
Negative
Comments
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Negative
Abstain
N/A
3
Austin Energy
W. Dwayne
Preston
Affirmative N/A
5
Cogentrix Energy Power Management, LLC
Gerry Adamski
Negative
5
Seminole Electric Cooperative, Inc.
David Weber
Negative
5
Cowlitz County PUD
Florida Reliability Coordinating Council –
Member Services Division
Deanna Carlson
None
Comments
Submitted
Comments
Submitted
N/A
Vince Ordax
Abstain
N/A
8
3
AEP
Kent Feliks
Negative
6
10
Lakeland Electric
Texas Reliability Entity, Inc.
Paul Shipps
Rachel Coyne
None
Abstain
6
Duke Energy
Greg Cecil
Negative
5
Duke Energy
Dale Goodwine
Negative
3
Duke Energy
Lee Schuster
Negative
4
National Rural Electric Cooperative Association
Barry Lawson
Negative
4
Arkansas Electric Cooperative Corporation
Alice Wright
Negative
1
Arkansas Electric Cooperative Corporation
Jennifer Loiacano
Negative
6
Arkansas Electric Cooperative Corporation
Bruce Walkup
Negative
3
Arkansas Electric Cooperative Corporation
Mark Gann
Negative
5
Arkansas Electric Cooperative Corporation
Adrian Harris
Negative
1
East Kentucky Power Cooperative
Amber Skillern
Negative
3
East Kentucky Power Cooperative
Patrick Woods
Negative
1
Duke Energy
Laura Lee
Negative
1
Arizona Electric Power Cooperative, Inc.
Ben Engelby
Negative
5
East Kentucky Power Cooperative
mark brewer
Negative
3
Wabash Valley Power Association
Susan Sosbe
Negative
5
SunPower
Bradley Collard
Negative
5
SunPower
Bradley Collard
None
Comments
Submitted
N/A
N/A
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Third-Party
Comments
Third-Party
Comments
Third-Party
Comments
Third-Party
Comments
Third-Party
Comments
Third-Party
Comments
Third-Party
Comments
Comments
Submitted
Third-Party
Comments
Third-Party
Comments
Comments
Submitted
Comments
Submitted
N/A
© 2021 - NERC Ver 4.3.0.0
Machine Name: ERODVSBSWB02
NERC Balloting Tool
Dashboard
Users
Registered Ballot Body
Proxy Ballot Body
My User Profile
Ballots
Ballot Events
Ballot Results
Comment Forms
View Comment Forms
Login / Register
Ballot Results
Comment: View Comment Results
Ballot Name:
2019-02 BES Cyber System Information Access Management Implementation Plan IN 1 OT
Voting Start Date:
1/24/2020 12:01:00 AM
Voting End Date:
2/3/2020 8:00:00 PM
Ballot Type:
OT
Ballot Activity:
IN
Ballot Series:
1
Total # Votes:
250
Total Ballot Pool:
273
Quorum:
91.58
Quorum Established Date:
2/3/2020 3:31:38 PM
Weighted Segment Value:
22.3
Actions
Actions
Negative
Fraction w/
Comment
Ballot Segment Affirmative Affirmative Negative Votes
Segment
Pool Weight
Votes
Fraction w/ Comment
Segment:
78
1
Segment:
2
2
Segment:
58
3
Segment:
17
4
Segment:
67
5
Segment:
44
6
Segment:
0
7
Segment:
1
8
Negative Votes
No
Abstain
w/o Comment
Vote
1
11
0.175
52
0.825
0
8
7
0.1
0
0
1
0.1
0
1
0
1
11
0.204
43
0.796
1
1
2
1
3
0.231
10
0.769
0
3
1
1
13
0.245
40
0.755
0
4
10
1
6
0.15
34
0.85
0
1
3
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
Segment:
0
9
Segment:
6
10
Totals: 273
0
0
0
0
0
0
0
0
0.3
2
0.2
1
0.1
0
3
0
5.4
46
1.204
181
4.196
1
22
23
Ballot Pool Members
Segment
Organization
Voter
Designated
Proxy
Ballot
3
Con Ed - Consolidated Edison Co. of New York Peter Yost
6
Con Ed - Consolidated Edison Co. of New York
4
Utility Services, Inc.
3
Ameren - Ameren Services
David Jendras
Negative
3
WEC Energy Group, Inc.
Thomas Breene
Negative
5
Ontario Power Generation Inc.
Constantin
Chitescu
Negative
5
Edison International - Southern California Edison
Neil Shockey
Company
3
MEAG Power
5
Con Ed - Consolidated Edison Co. of New York William Winters Daniel Valle Negative
1
MEAG Power
David Weekley
1
4
IDACORP - Idaho Power Company
Seminole Electric Cooperative, Inc.
Laura Nelson
Jonathan Robbins
1
Con Ed - Consolidated Edison Co. of New York Dermot Smyth
Negative
6
WEC Energy Group, Inc.
David Hathaway
Negative
2
Independent Electricity System Operator
Leonard Kula
Negative
5
Massachusetts Municipal Wholesale Electric
Company
Anthony Stevens
Abstain
3
Sempra - San Diego Gas and Electric
Bridget Silvia
Negative
3
Basin Electric Power Cooperative
Jeremy Voll
3
5
Christopher
Overberg
Brian EvansMongeon
Roger Brand
Edison International - Southern California Edison
Romel Aquino
Company
NRG - NRG Energy, Inc.
Patricia Lynch
Negative
Negative
Abstain
Negative
Scott Miller Negative
Scott Miller Negative
Abstain
Abstain
NERC
Memo
Third-Party
Comments
Third-Party
Comments
N/A
Comments
Submitted
Third-Party
Comments
Comments
Submitted
Comments
Submitted
Comments
Submitted
Third-Party
Comments
Comments
Submitted
N/A
N/A
Third-Party
Comments
Third-Party
Comments
Comments
Submitted
N/A
Comments
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Third-Party
1
National Grid USA
Michael Jones
1
Western Area Power Administration
sean erickson
1
Edison International - Southern California Edison
Ayman Samaan
Company
1
Ameren - Ameren Services
Eric Scott
6
Ameren - Ameren Services
Robert Quinlivan
6
Black Hills Corporation
Eric Scherr
3
National Grid USA
Brian Shanahan
5
Ameren - Ameren Missouri
Sam Dwyer
1
Balancing Authority of Northern California
Kevin Smith
6
Sacramento Municipal Utility District
5
Sacramento Municipal Utility District
4
Sacramento Municipal Utility District
1
Sacramento Municipal Utility District
3
Sacramento Municipal Utility District
1
International Transmission Company Holdings
Corporation
Michael Moltane Gail Elliott
6
Seattle City Light
Charles Freeman
3
Puget Sound Energy, Inc.
Tim Womack
6
PPL - Louisville Gas and Electric Co.
Linn Oelker
3
PPL - Louisville Gas and Electric Co.
James Frank
3
APS - Arizona Public Service Co.
Vivian Moser
4
Seattle City Light
Hao Li
5
Puget Sound Energy, Inc.
Eleanor Ewry
6
Western Area Power Administration
Rosemary Jones
5
Sempra - San Diego Gas and Electric
Jennifer Wright
3
Tennessee Valley Authority
Ian Grant
1
Tennessee Valley Authority
Gabe Kurtz
Joe
Tarantino
Joe
Jamie Cutlip
Tarantino
Joe
Nicole Goi
Tarantino
Joe
Beth Tincher
Tarantino
Joe
Arthur Starkovich
Tarantino
Joe
Nicole Looney
Tarantino
Negative
Comments
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Third-Party
Negative
Comments
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
1
Nebraska Public Power District
Jamison Cawley
10
New York State Reliability Council
ALAN
ADAMSON
1
City Utilities of Springfield, Missouri
Michael Bowman
4
City Utilities of Springfield, Missouri
John Allen
5
Avista - Avista Corporation
1
SaskPower
1
Allete - Minnesota Power, Inc.
1
APS - Arizona Public Service Co.
10
5
Midwest Reliability Organization
APS - Arizona Public Service Co.
Public Utility District No. 2 of Grant County,
Washington
Glen Farmer
Wayne
Guttormson
Jamie Monette
Michelle
Amarantos
Russel Mountjoy
Kelsi Rigby
6
Third-Party
Comments
Comments
Negative
Submitted
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Affirmative N/A
Negative
Abstain
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
LeRoy Patterson
Affirmative N/A
6
APS - Arizona Public Service Co.
Chinedu
Ochonogor
Affirmative N/A
5
Public Utility District No. 2 of Grant County,
Washington
Amy Jones
None
1
Dairyland Power Cooperative
Renee Leidel
Negative
3
Berkshire Hathaway Energy - MidAmerican
Energy Co.
3
Tacoma Public Utilities (Tacoma, WA)
6
Tennessee Valley Authority
5
Austin Energy
1
Puget Sound Energy, Inc.
4
WEC Energy Group, Inc.
5
Platte River Power Authority
1
Glencoe Light and Power Commission
1
Network and Security Technologies
Public Utility District No. 1 of Pend Oreille
County
Kevin Conway
Affirmative N/A
1
N/A
Third-Party
Comments
Comments
Darnez Gresham
Negative
Submitted
Third-Party
Marc Donaldson Jennie Wike Negative
Comments
Comments
Marjorie Parsons
Negative
Submitted
Lisa Martin
Affirmative N/A
Theresa
Affirmative N/A
Rakowsky
Third-Party
Matthew Beilfuss
Negative
Comments
Tyson Archie
Affirmative N/A
Third-Party
Terry Volkmann
Negative
Comments
Nicholas Lauriat
Abstain
N/A
1
Seattle City Light
Pawel Krupa
Negative
1
Eversource Energy
Quintin Lee
Negative
6
Basin Electric Power Cooperative
Jerry Horner
Negative
Comments
Submitted
Comments
Submitted
Comments
Submitted
Andy
Fuhrman
1
Minnkota Power Cooperative Inc.
Theresa Allard
3
Associated Electric Cooperative, Inc.
Todd Bennett
3
Platte River Power Authority
Wade Kiess
6
Associated Electric Cooperative, Inc.
Brian Ackermann
1
Central Electric Power Cooperative (Missouri)
Michael Bax
3
M and A Electric Power Cooperative
Stephen Pogue
1
KAMO Electric Cooperative
Micah Breedlove
5
Associated Electric Cooperative, Inc.
Brad Haralson
3
Northeast Missouri Electric Power Cooperative
Skyler Wiegmann
3
KAMO Electric Cooperative
Tony Gott
3
Sho-Me Power Electric Cooperative
Jarrod Murdaugh
1
Sho-Me Power Electric Cooperative
Peter Dawson
5
4
3
Florida Municipal Power Agency
Florida Municipal Power Agency
Florida Municipal Power Agency
6
Florida Municipal Power Agency
Chris Gowder
Carol Chinn
Dale Ray
Richard
Montgomery
1
Northeast Missouri Electric Power Cooperative
Kevin White
Negative
1
N.W. Electric Power Cooperative, Inc.
Mark Ramsey
Negative
3
NW Electric Power Cooperative, Inc.
John Stickley
Negative
1
Hydro One Networks, Inc.
6
Platte River Power Authority
Payam
Farahbakhsh
Sabrina Martz
5
Los Angeles Department of Water and Power
Glenn Barry
1
Tacoma Public Utilities (Tacoma, WA)
John Merrell
5
Brazos Electric Power Cooperative, Inc.
Shari Heino
5
Herb Schrayshuen
Herb
Schrayshuen
Affirmative N/A
3
Lakeland Electric
Patricia Boody
Negative
6
Great Plains Energy - Kansas City Power and
Light Co.
Jennifer
Flandermeyer
Negative
Abstain
N/A
Truong Le
Truong Le
Truong Le
Comments
Submitted
Affirmative N/A
Comments
Negative
Submitted
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
None
N/A
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Affirmative N/A
Affirmative N/A
Affirmative N/A
Truong Le
Affirmative N/A
Negative
Abstain
Third-Party
Comments
Third-Party
Comments
Third-Party
Comments
N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Jennie Wike Negative
Submitted
Third-Party
Negative
Comments
No Comment
Submitted
Comments
Submitted
Comments
Submitted
Third-Party
Negative
Comments
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
None
N/A
None
N/A
Third-Party
Negative
Comments
Affirmative N/A
Affirmative N/A
Third-Party
Negative
Comments
None
N/A
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Abstain
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
3
Georgia System Operations Corporation
Scott McGough
Negative
1
Long Island Power Authority
Robert Ganley
3
Los Angeles Department of Water and Power
Tony Skourtas
1
Tri-State G and T Association, Inc.
Kjersti Drott
4
FirstEnergy - FirstEnergy Corporation
Mark Garza
3
Tri-State G and T Association, Inc.
5
1
5
Talen Generation, LLC
Lakeland Electric
Lakeland Electric
Janelle Marriott
Gill
Donald Lock
Larry Watt
Becky Rinier
6
OGE Energy - Oklahoma Gas and Electric Co.
Sing Tay
3
1
Eversource Energy
Tallahassee Electric (City of Tallahassee, FL)
Sharon Flannery
Scott Langston
5
Oglethorpe Power Corporation
Donna Johnson
1
Los Angeles Department of Water and Power
faranak sarbaz
1
Black Hills Corporation
Wes Wingen
5
Black Hills Corporation - Black Hills Power
Don Stahl
1
Seminole Electric Cooperative, Inc.
Bret Galbraith
6
NiSource - Northern Indiana Public Service Co.
Joe O'Brien
3
NiSource - Northern Indiana Public Service Co.
Dmitriy Bazylyuk
6
New York Power Authority
Thomas Savin
6
Talen Energy Marketing, LLC
Jennifer
Hohenshilt
Affirmative N/A
1
FirstEnergy - FirstEnergy Corporation
Julie Severino
Negative
1
M and A Electric Power Cooperative
William Price
Negative
3
Dominion - Dominion Resources, Inc.
Connie Schroeder
Negative
3
Muscatine Power and Water
Seth Shoemaker
Negative
6
Muscatine Power and Water
Nick Burns
Negative
3
OGE Energy - Oklahoma Gas and Electric Co.
Donald Hargrove
Negative
Comments
Submitted
Third-Party
Comments
Comments
Submitted
Third-Party
Comments
Third-Party
Comments
Third-Party
Comments
Comments
3
Westar Energy
Bryan Taggart
Negative
3
Great Plains Energy - Kansas City Power and
Light Co.
John Carlson
Negative
5
Westar Energy
Derek Brown
Negative
James McBee
Negative
Marcus Moor
Negative
1
5
Great Plains Energy - Kansas City Power and
Light Co.
Great Plains Energy - Kansas City Power and
Light Co.
6
Westar Energy
Grant Wilkerson
Negative
5
Southern Company - Southern Company
Generation
William D.
Shultz
Negative
6
FirstEnergy - FirstEnergy Solutions
Ann Carey
Negative
6
Manitoba Hydro
Simon TanapatAndre
None
1
Westar Energy
Allen Klassen
Negative
5
Tennessee Valley Authority
M Lee Thomas
3
FirstEnergy - FirstEnergy Corporation
Aaron
Ghodooshim
1
OGE Energy - Oklahoma Gas and Electric Co.
Terri Pyle
1
CMS Energy - Consumers Energy Company
Donald Lynd
3
Black Hills Corporation
Eric Egge
6
PSEG - PSEG Energy Resources and Trade LLC Luiggi Beretta
3
Nebraska Public Power District
Tony Eddleman
5
Northern California Power Agency
Marty Hostler
3
CMS Energy - Consumers Energy Company
5
CMS Energy - Consumers Energy Company
Karl Blaszkowski
David
Greyerbiehl
4
Georgia System Operations Corporation
Andrea Barclay
1
New York Power Authority
Salvatore
Spagnolo
1
OTP - Otter Tail Power Company
Charles Wicklund
5
PSEG - PSEG Fossil LLC
Tim Kucey
3
4
5
Owensboro Municipal Utilities
MGE Energy - Madison Gas and Electric Co.
Entergy - Entergy Services, Inc.
Thomas Lyons
Joseph DePoorter
Gail Golden
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
N/A
Comments
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Third-Party
Negative
Comments
Affirmative N/A
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Affirmative N/A
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
Comments
Submitted
Comments
Negative
Submitted
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Affirmative N/A
Abstain
N/A
None
N/A
Negative
5
OTP - Otter Tail Power Company
Brett Jacobs
3
OTP - Otter Tail Power Company
Wendi Olson
6
Portland General Electric Co.
Daniel Mason
1
Muscatine Power and Water
Andy Kurriger
3
New York Power Authority
David Rivera
1
BC Hydro and Power Authority
Adrian Andreoiu
1
NiSource - Northern Indiana Public Service Co.
Steve Toosevich
5
NiSource - Northern Indiana Public Service Co.
Kathryn Tackett
3
BC Hydro and Power Authority
Hootan Jarollahi
6
Los Angeles Department of Water and Power
Anton Vu
1
Omaha Public Power District
Doug Peterchuck
5
FirstEnergy - FirstEnergy Solutions
Robert Loy
10
1
SERC Reliability Corporation
Platte River Power Authority
Dave Krueger
Matt Thompson
5
JEA
John Babik
2
6
5
1
6
Electric Reliability Council of Texas, Inc.
Seminole Electric Cooperative, Inc.
Imperial Irrigation District
Sunflower Electric Power Corporation
Imperial Irrigation District
Brandon Gleason
David Reinecke
Tino Zaragoza
Paul Mehlhaff
Diana Torres
1
Public Utility District No. 1 of Chelan County
Ginette Lacasse
5
Public Utility District No. 1 of Chelan County
Meaghan Connell
1
Imperial Irrigation District
Jesus Sammy
Alcaraz
Affirmative N/A
3
Public Utility District No. 1 of Chelan County
Joyce Gundry
Negative
Comments
Submitted
5
BC Hydro and Power Authority
Helen Hamilton
Harding
Abstain
N/A
1
PNM Resources - Public Service Company of
New Mexico
Lynn Goldstein
None
N/A
1
NB Power Corporation
Nurul Abser
Negative
5
Dairyland Power Cooperative
Tommy Drea
Negative
Terry Harbour
Negative
1
Berkshire Hathaway Energy - MidAmerican
None
N/A
Third-Party
Negative
Comments
Comments
Negative
Submitted
Third-Party
Negative
Comments
Comments
Negative
Submitted
Abstain
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
None
N/A
Comments
Negative
Submitted
Third-Party
Negative
Comments
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
Third-Party
Negative
Comments
Abstain
N/A
Abstain
N/A
Affirmative N/A
None
N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Third-Party
Comments
Third-Party
Comments
Comments
5
Energy Co.
Hydro-Qu?bec Production
5
Tacoma Public Utilities (Tacoma, WA)
3
Imperial Irrigation District
5
Portland General Electric Co.
3
Portland General Electric Co.
5
PPL - Louisville Gas and Electric Co.
5
Berkshire Hathaway - NV Energy
3
Pacific Gas and Electric Company
1
Pacific Gas and Electric Company
1
Santee Cooper
6
Santee Cooper
3
Santee Cooper
5
Santee Cooper
5
WEC Energy Group, Inc.
6
Dominion - Dominion Resources, Inc.
1
PPL Electric Utilities Corporation
1
Gainesville Regional Utilities
5
Lincoln Electric System
4
Tacoma Public Utilities (Tacoma, WA)
6
Northern California Power Agency
1
Portland General Electric Co.
5
Pacific Gas and Electric Company
6
Tacoma Public Utilities (Tacoma, WA)
6
Great River Energy
1
NextEra Energy - Florida Power and Light Co.
Southern Company - Southern Company
Services, Inc.
1
Submitted
Carl Pineault
None
N/A
Comments
Ozan Ferrin
Jennie Wike Negative
Submitted
Denise Sanchez
Affirmative N/A
Comments
Ryan Olson
Negative
Submitted
Third-Party
Dan Zollner
Negative
Comments
JULIE
Comments
Negative
HOSTRANDER
Submitted
Comments
Kevin Salsbury
Negative
Submitted
Michael
Sandra Ellis
None
N/A
Johnson
Michael
Marco Rios
None
N/A
Johnson
Comments
Chris Wagner
Negative
Submitted
Comments
Michael Brown
Negative
Submitted
Comments
James Poston
Negative
Submitted
Comments
Tommy Curtis
Negative
Submitted
Third-Party
Janet OBrien
Negative
Comments
Comments
Sean Bodkin
Negative
Submitted
Comments
Brenda Truhe
Negative
Submitted
David Owens
Truong Le Affirmative N/A
Kayleigh
Third-Party
Negative
Wilkerson
Comments
Comments
Hien Ho
Jennie Wike Negative
Submitted
Comments
Dennis Sismaet
Negative
Submitted
Brooke Jockin
None
N/A
Michael
Ed Hanson
None
N/A
Johnson
Comments
Terry Gifford
Jennie Wike Negative
Submitted
Donna
Third-Party
Negative
Stephenson
Comments
Mike ONeil
Affirmative N/A
Comments
Matt Carden
Negative
Submitted
5
3
Choctaw Generation Limited Partnership, LLLP Rob Watson
Seminole Electric Cooperative, Inc.
Kristine Ward
None
Abstain
N/A
N/A
Comments
Negative
Submitted
Affirmative N/A
Abstain
N/A
Comments
Negative
Submitted
None
N/A
Comments
Negative
Submitted
Third-Party
Negative
Comments
Comments
Negative
Submitted
5
Dominion - Dominion Resources, Inc.
Rachel Snead
5
10
Nebraska Public Power District
Northeast Power Coordinating Council
Ronald Bender
Guy V. Zito
6
Berkshire Hathaway - PacifiCorp
Sandra Shaffer
6
Powerex Corporation
1
American Transmission Company, LLC
Raj Hundal
LaTroy
Brumfield
4
Alliant Energy Corporation Services, Inc.
Larry Heckert
5
New York Power Authority
Shivaz Chopra
4
Public Utility District No. 2 of Grant County,
Washington
Karla Weaver
Affirmative N/A
1
Exelon
Daniel Gacek
Negative
3
Exelon
Kinte Whitehead
5
Exelon
Cynthia Lee
6
Exelon
Becky Webb
1
Entergy - Entergy Services, Inc.
Oliver Burke
3
City Utilities of Springfield, Missouri
Scott Williams
5
Enel Green Power
Mat Bunch
6
Xcel Energy, Inc.
Carrie Dixon
1
Xcel Energy, Inc.
Dean Schiro
5
Xcel Energy, Inc.
Gerry Huitt
4
1
CMS Energy - Consumers Energy Company
Memphis Light, Gas and Water Division
1
Bonneville Power Administration
Dwayne Parker
Allan Long
Kammy RogersHolliday
6
Bonneville Power Administration
Andrew Meyers
3
Bonneville Power Administration
Ken Lanehome
5
Bonneville Power Administration
Scott Winner
5
Great River Energy
Preston Walsh
Comments
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
None
N/A
Third-Party
Negative
Comments
Abstain
N/A
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Third-Party
Negative
Comments
1
Georgia Transmission Corporation
Greg Davis
Negative
3
Snohomish County PUD No. 1
Holly Chaney
Negative
John Martinsen
Negative
Sam Nietfeld
Negative
4
5
Public Utility District No. 1 of Snohomish
County
Public Utility District No. 1 of Snohomish
County
6
Snohomish County PUD No. 1
John Liang
Negative
1
Public Utility District No. 1 of Snohomish
County
Long Duong
Negative
5
AEP
Thomas Foltz
Negative
1
AEP - AEP Service Corporation
Dennis Sauriol
Negative
1
Oncor Electric Delivery
Lee Maurer
Abstain
6
AEP - AEP Marketing
Yee Chou
Negative
10
ReliabilityFirst
3
Austin Energy
5
5
5
Cogentrix Energy Power Management, LLC
Seminole Electric Cooperative, Inc.
Cowlitz County PUD
Florida Reliability Coordinating Council –
Member Services Division
8
Anthony
Jablonski
W. Dwayne
Preston
Gerry Adamski
David Weber
Deanna Carlson
Abstain
Third-Party
Comments
Comments
Submitted
Third-Party
Comments
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
N/A
Comments
Submitted
N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
None
N/A
Vince Ordax
Abstain
3
AEP
Kent Feliks
Negative
6
10
Lakeland Electric
Texas Reliability Entity, Inc.
Paul Shipps
Rachel Coyne
None
Abstain
6
Duke Energy
Greg Cecil
Negative
5
Duke Energy
Dale Goodwine
Negative
3
Duke Energy
Lee Schuster
Negative
4
National Rural Electric Cooperative Association Paul McCurley
None
4
Arkansas Electric Cooperative Corporation
Alice Wright
Negative
1
Arkansas Electric Cooperative Corporation
Jennifer Loiacano
Negative
6
Arkansas Electric Cooperative Corporation
Bruce Walkup
Negative
3
Arkansas Electric Cooperative Corporation
Mark Gann
Negative
N/A
Comments
Submitted
N/A
N/A
Comments
Submitted
Comments
Submitted
Comments
Submitted
N/A
Third-Party
Comments
Third-Party
Comments
Third-Party
Comments
Third-Party
Comments
Third-Party
5
Arkansas Electric Cooperative Corporation
Adrian Harris
1
East Kentucky Power Cooperative
Amber Skillern
3
East Kentucky Power Cooperative
Patrick Woods
1
Duke Energy
Laura Lee
1
Arizona Electric Power Cooperative, Inc.
Ben Engelby
5
East Kentucky Power Cooperative
mark brewer
3
Wabash Valley Power Association
Susan Sosbe
5
SunPower
Bradley Collard
5
SunPower
Bradley Collard
© 2021 - NERC Ver 4.3.0.0
Machine Name: ERODVSBSWB02
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Comments
Negative
Submitted
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Affirmative N/A
Comments
Negative
Submitted
None
N/A
NERC Balloting Tool
Dashboard
Users
Registered Ballot Body
Proxy Ballot Body
My User Profile
Ballots
Ballot Events
Ballot Results
Comment Forms
View Comment Forms
Login / Register
Ballot Results
Ballot Name:
2019-02 BES Cyber System Information Access Management CIP-004-7 Non-Binding Poll IN 1 NB
Voting Start Date:
1/24/2020 12:01:00 AM
Voting End Date:
2/3/2020 8:00:00 PM
Ballot Type:
NB
Ballot Activity:
IN
Ballot Series:
1
Total # Votes:
232
Total Ballot Pool:
262
Quorum:
88.55
Quorum Established Date:
2/3/2020 4:51:25 PM
Weighted Segment Value:
18.88
Actions
Actions
Ballot
Pool
Segment
Segment:
1
Segment:
2
Segment:
3
Segment:
4
Segment:
5
Segment:
6
Segment:
7
Segment:
8
Segment:
Segment
Weight
Affirmative
Votes
Affirmative
Fraction
Negative
Votes
Negative
Fraction
Abstain
No
Vote
73
1
8
0.145
47
0.855
10
8
2
0.2
0
0
2
0.2
0
0
59
1
10
0.204
39
0.796
6
4
14
1
3
0.25
9
0.75
2
0
64
1
10
0.227
34
0.773
8
12
43
1
5
0.156
27
0.844
5
6
0
0
0
0
0
0
0
0
1
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
9
Segment:
6
10
Totals:
262
0.2
1
0.1
1
0.1
4
0
5.4
37
1.083
159
4.317
36
30
Ballot Pool Members
Segment
Organization
3
Con Ed - Consolidated Edison Co. of New York
6
Con Ed - Consolidated Edison Co. of New York
4
Utility Services, Inc.
3
Ameren - Ameren Services
3
5
5
3
5
1
1
4
1
6
2
5
3
3
3
5
1
1
Voter
Peter Yost
Christopher
Overberg
Brian EvansMongeon
David Jendras
Designated
Proxy
Ballot
Negative
Negative
Abstain
Abstain
NERC
Memo
Comments
Submitted
Comments
Submitted
N/A
N/A
Comments
WEC Energy Group, Inc.
Thomas Breene
Negative
Submitted
Constantin
Comments
Ontario Power Generation Inc.
Negative
Chitescu
Submitted
Edison International - Southern California Edison
Comments
Neil Shockey
Negative
Company
Submitted
MEAG Power
Roger Brand
Scott Miller Affirmative N/A
Comments
Con Ed - Consolidated Edison Co. of New York William Winters Daniel Valle Negative
Submitted
MEAG Power
David Weekley Scott Miller Affirmative N/A
Comments
IDACORP - Idaho Power Company
Laura Nelson
Negative
Submitted
Seminole Electric Cooperative, Inc.
Jonathan Robbins
Abstain
N/A
Comments
Con Ed - Consolidated Edison Co. of New York Dermot Smyth
Negative
Submitted
Comments
WEC Energy Group, Inc.
David Hathaway
Negative
Submitted
Comments
Independent Electricity System Operator
Leonard Kula
Negative
Submitted
Massachusetts Municipal Wholesale Electric
Anthony Stevens
Abstain
N/A
Company
Comments
Sempra - San Diego Gas and Electric
Bridget Silvia
Negative
Submitted
Comments
Basin Electric Power Cooperative
Jeremy Voll
Negative
Submitted
Edison International - Southern California Edison
Comments
Romel Aquino
Negative
Company
Submitted
NRG - NRG Energy, Inc.
Patricia Lynch
Affirmative N/A
Comments
National Grid USA
Michael Jones
Negative
Submitted
Western Area Power Administration
sean erickson
Abstain
N/A
1
6
Edison International - Southern California Edison
Ayman Samaan
Company
Ameren - Ameren Services
Eric Scott
Ameren - Ameren Services
Robert Quinlivan
6
Black Hills Corporation
Eric Scherr
3
National Grid USA
Brian Shanahan
5
Ameren - Ameren Missouri
Sam Dwyer
1
Balancing Authority of Northern California
Kevin Smith
6
Sacramento Municipal Utility District
5
Sacramento Municipal Utility District
4
Sacramento Municipal Utility District
1
Sacramento Municipal Utility District
3
Sacramento Municipal Utility District
1
International Transmission Company Holdings
Corporation
Michael Moltane Gail Elliott
6
Seattle City Light
Charles Freeman
3
Puget Sound Energy, Inc.
Tim Womack
6
3
3
PPL - Louisville Gas and Electric Co.
PPL - Louisville Gas and Electric Co.
APS - Arizona Public Service Co.
Linn Oelker
James Frank
Vivian Moser
4
Seattle City Light
Hao Li
5
Puget Sound Energy, Inc.
Eleanor Ewry
6
Western Area Power Administration
Rosemary Jones
5
Sempra - San Diego Gas and Electric
Jennifer Wright
3
1
1
Tennessee Valley Authority
Tennessee Valley Authority
Nebraska Public Power District
10
New York State Reliability Council
Ian Grant
Gabe Kurtz
Jamison Cawley
ALAN
ADAMSON
1
City Utilities of Springfield, Missouri
Michael Bowman
4
City Utilities of Springfield, Missouri
John Allen
1
Joe
Tarantino
Joe
Jamie Cutlip
Tarantino
Joe
Nicole Goi
Tarantino
Joe
Beth Tincher
Tarantino
Joe
Arthur Starkovich
Tarantino
Joe
Nicole Looney
Tarantino
Comments
Submitted
Abstain
N/A
Abstain
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Abstain
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
None
N/A
None
N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Abstain
N/A
Abstain
N/A
Abstain
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Negative
5
Avista - Avista Corporation
1
SaskPower
1
APS - Arizona Public Service Co.
10
5
Midwest Reliability Organization
APS - Arizona Public Service Co.
Public Utility District No. 2 of Grant County,
Washington
6
Glen Farmer
Wayne
Guttormson
Michelle
Amarantos
Russel Mountjoy
Kelsi Rigby
Affirmative N/A
Comments
Negative
Submitted
LeRoy Patterson
Affirmative N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
6
APS - Arizona Public Service Co.
Chinedu
Ochonogor
Affirmative N/A
5
Public Utility District No. 2 of Grant County,
Washington
Amy Jones
None
1
Dairyland Power Cooperative
Renee Leidel
3
Berkshire Hathaway Energy - MidAmerican
Energy Co.
Darnez Gresham
3
Tacoma Public Utilities (Tacoma, WA)
Marc Donaldson
6
5
Tennessee Valley Authority
Austin Energy
1
Puget Sound Energy, Inc.
Marjorie Parsons
Lisa Martin
Theresa
Rakowsky
4
WEC Energy Group, Inc.
Matthew Beilfuss
5
Platte River Power Authority
Tyson Archie
1
Glencoe Light and Power Commission
Terry Volkmann
1
Network and Security Technologies
Nicholas Lauriat
1
Public Utility District No. 1 of Pend Oreille
County
Kevin Conway
Affirmative N/A
1
Seattle City Light
Pawel Krupa
Negative
1
Eversource Energy
Quintin Lee
6
Basin Electric Power Cooperative
Jerry Horner
1
Minnkota Power Cooperative Inc.
Theresa Allard
3
Associated Electric Cooperative, Inc.
Todd Bennett
3
Platte River Power Authority
Wade Kiess
6
Associated Electric Cooperative, Inc.
Brian Ackermann
1
Central Electric Power Cooperative (Missouri)
Michael Bax
N/A
Comments
Submitted
Comments
Negative
Submitted
Comments
Jennie Wike Negative
Submitted
Abstain
N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Negative
Andy
Fuhrman
Comments
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
3
M and A Electric Power Cooperative
Stephen Pogue
1
KAMO Electric Cooperative
Micah Breedlove
5
Associated Electric Cooperative, Inc.
Brad Haralson
3
Northeast Missouri Electric Power Cooperative
Skyler Wiegmann
3
KAMO Electric Cooperative
Tony Gott
3
Sho-Me Power Electric Cooperative
Jarrod Murdaugh
1
Sho-Me Power Electric Cooperative
Peter Dawson
5
4
3
Florida Municipal Power Agency
Florida Municipal Power Agency
Florida Municipal Power Agency
6
Florida Municipal Power Agency
Chris Gowder
Carol Chinn
Dale Ray
Richard
Montgomery
1
Northeast Missouri Electric Power Cooperative
Kevin White
Negative
1
N.W. Electric Power Cooperative, Inc.
Mark Ramsey
Negative
3
NW Electric Power Cooperative, Inc.
John Stickley
Negative
1
Hydro One Networks, Inc.
6
Platte River Power Authority
5
Los Angeles Department of Water and Power
1
Tacoma Public Utilities (Tacoma, WA)
5
Brazos Electric Power Cooperative, Inc.
5
Herb Schrayshuen
3
Lakeland Electric
6
Great Plains Energy - Kansas City Power and
Light Co.
3
Georgia System Operations Corporation
1
3
Long Island Power Authority
Manitoba Hydro
3
Los Angeles Department of Water and Power
1
Tri-State G and T Association, Inc.
4
FirstEnergy - FirstEnergy Corporation
Payam
Farahbakhsh
Sabrina Martz
Negative
Truong Le
Truong Le
Truong Le
Submitted
Comments
Negative
Submitted
None
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
Affirmative N/A
Truong Le
Affirmative N/A
Abstain
Comments
Submitted
Comments
Submitted
Comments
Submitted
N/A
Affirmative N/A
Comments
Glenn Barry
Negative
Submitted
Comments
John Merrell
Jennie Wike Negative
Submitted
Comments
Shari Heino
Negative
Submitted
Herb Schrayshuen
Affirmative N/A
Comments
Patricia Boody
Negative
Submitted
Jennifer
Comments
Negative
Flandermeyer
Submitted
Comments
Scott McGough
Negative
Submitted
Robert Ganley
Abstain
N/A
Mike Smith
None
N/A
Comments
Tony Skourtas
Negative
Submitted
Comments
Kjersti Drott
Negative
Submitted
Comments
Mark Garza
Negative
Submitted
3
Tri-State G and T Association, Inc.
1
5
Lakeland Electric
Lakeland Electric
Janelle Marriott
Gill
Larry Watt
Becky Rinier
6
OGE Energy - Oklahoma Gas and Electric Co.
Sing Tay
3
1
Eversource Energy
Tallahassee Electric (City of Tallahassee, FL)
Sharon Flannery
Scott Langston
5
Oglethorpe Power Corporation
Donna Johnson
1
Los Angeles Department of Water and Power
faranak sarbaz
1
Black Hills Corporation
Wes Wingen
5
Black Hills Corporation - Black Hills Power
Don Stahl
1
Seminole Electric Cooperative, Inc.
Bret Galbraith
6
NiSource - Northern Indiana Public Service Co.
Joe O'Brien
3
NiSource - Northern Indiana Public Service Co.
Dmitriy Bazylyuk
6
New York Power Authority
Thomas Savin
6
Talen Energy Marketing, LLC
Jennifer
Hohenshilt
None
1
FirstEnergy - FirstEnergy Corporation
Julie Severino
Negative
1
M and A Electric Power Cooperative
William Price
Negative
3
Dominion - Dominion Resources, Inc.
Connie Schroeder
Abstain
3
Muscatine Power and Water
Seth Shoemaker
Negative
6
Muscatine Power and Water
Nick Burns
Negative
3
OGE Energy - Oklahoma Gas and Electric Co.
Donald Hargrove
Negative
3
Westar Energy
Bryan Taggart
Negative
3
Great Plains Energy - Kansas City Power and
Light Co.
John Carlson
Negative
5
Westar Energy
Derek Brown
Negative
James McBee
Negative
Marcus Moor
Negative
Grant Wilkerson
Negative
1
5
6
Great Plains Energy - Kansas City Power and
Light Co.
Great Plains Energy - Kansas City Power and
Light Co.
Westar Energy
Comments
Submitted
None
N/A
None
N/A
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Abstain
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Negative
N/A
Comments
Submitted
Comments
Submitted
N/A
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
5
Southern Company - Southern Company
Generation
William D. Shultz
Negative
6
FirstEnergy - FirstEnergy Solutions
Ann Carey
Negative
6
Manitoba Hydro
Simon TanapatAndre
None
1
Westar Energy
Allen Klassen
Negative
5
Tennessee Valley Authority
3
FirstEnergy - FirstEnergy Corporation
M Lee Thomas
Aaron
Ghodooshim
1
OGE Energy - Oklahoma Gas and Electric Co.
Terri Pyle
1
CMS Energy - Consumers Energy Company
Donald Lynd
3
Black Hills Corporation
Eric Egge
6
3
PSEG - PSEG Energy Resources and Trade LLC Luiggi Beretta
Nebraska Public Power District
Tony Eddleman
5
Northern California Power Agency
Marty Hostler
3
CMS Energy - Consumers Energy Company
5
CMS Energy - Consumers Energy Company
Karl Blaszkowski
David
Greyerbiehl
4
Georgia System Operations Corporation
1
New York Power Authority
1
5
5
OTP - Otter Tail Power Company
PSEG - PSEG Fossil LLC
OTP - Otter Tail Power Company
Salvatore
Spagnolo
Charles Wicklund
Tim Kucey
Brett Jacobs
3
OTP - Otter Tail Power Company
Wendi Olson
3
Owensboro Municipal Utilities
Thomas Lyons
1
Hydro-Qu?bec TransEnergie
Nicolas Turcotte
5
Entergy - Entergy Services, Inc.
Gail Golden
6
Portland General Electric Co.
Daniel Mason
1
Muscatine Power and Water
Andy Kurriger
3
New York Power Authority
David Rivera
1
BC Hydro and Power Authority
Adrian Andreoiu
1
NiSource - Northern Indiana Public Service Co.
Steve Toosevich
5
NiSource - Northern Indiana Public Service Co.
Kathryn Tackett
Andrea Barclay
Comments
Submitted
Comments
Submitted
N/A
Comments
Submitted
None
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
Abstain
N/A
Abstain
N/A
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
Comments
Submitted
Comments
Negative
Submitted
None
N/A
Abstain
N/A
None
N/A
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
None
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Abstain
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Negative
3
BC Hydro and Power Authority
Hootan Jarollahi
None
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Abstain
N/A
Affirmative N/A
None
N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
6
Los Angeles Department of Water and Power
Anton Vu
1
Omaha Public Power District
Doug Peterchuck
5
FirstEnergy - FirstEnergy Solutions
Robert Loy
10
SERC Reliability Corporation
Dave Krueger
5
JEA
John Babik
2
Electric Reliability Council of Texas, Inc.
Brandon Gleason
6
5
1
6
Seminole Electric Cooperative, Inc.
Imperial Irrigation District
Sunflower Electric Power Corporation
Imperial Irrigation District
David Reinecke
Tino Zaragoza
Paul Mehlhaff
Diana Torres
1
Public Utility District No. 1 of Chelan County
Ginette Lacasse
5
Public Utility District No. 1 of Chelan County
Meaghan Connell
1
Imperial Irrigation District
Jesus Sammy
Alcaraz
Affirmative N/A
3
Public Utility District No. 1 of Chelan County
Joyce Gundry
Negative
Comments
Submitted
5
BC Hydro and Power Authority
Helen Hamilton
Harding
Abstain
N/A
1
PNM Resources - Public Service Company of
New Mexico
Lynn Goldstein
None
N/A
1
NB Power Corporation
Nurul Abser
5
Dairyland Power Cooperative
Tommy Drea
Comments
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
None
N/A
Comments
Jennie Wike Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Negative
5
Berkshire Hathaway Energy - MidAmerican
Energy Co.
Hydro-Qu?bec Production
5
Tacoma Public Utilities (Tacoma, WA)
Ozan Ferrin
3
Imperial Irrigation District
Denise Sanchez
5
Portland General Electric Co.
Ryan Olson
3
Portland General Electric Co.
Dan Zollner
5
PPL - Louisville Gas and Electric Co.
JULIE
HOSTRANDER
None
N/A
5
Berkshire Hathaway - NV Energy
Kevin Salsbury
Negative
Comments
Submitted
3
Pacific Gas and Electric Company
Sandra Ellis
None
N/A
1
Terry Harbour
Carl Pineault
Michael
Johnson
Michael
Johnson
1
Pacific Gas and Electric Company
Marco Rios
1
Santee Cooper
Chris Wagner
6
Santee Cooper
Michael Brown
3
Santee Cooper
James Poston
5
Santee Cooper
Tommy Curtis
5
WEC Energy Group, Inc.
Janet OBrien
6
Dominion - Dominion Resources, Inc.
Sean Bodkin
1
Gainesville Regional Utilities
Truong Le
5
Lincoln Electric System
David Owens
Kayleigh
Wilkerson
4
Tacoma Public Utilities (Tacoma, WA)
Hien Ho
Jennie Wike Negative
6
Northern California Power Agency
Dennis Sismaet
Negative
1
Portland General Electric Co.
Brooke Jockin
None
Comments
Submitted
Comments
Submitted
N/A
5
Pacific Gas and Electric Company
Ed Hanson
Michael
Johnson
None
N/A
6
Tacoma Public Utilities (Tacoma, WA)
Terry Gifford
Jennie Wike Negative
6
Great River Energy
1
5
3
NextEra Energy - Florida Power and Light Co.
Southern Company - Southern Company Services,
Matt Carden
Inc.
Choctaw Generation Limited Partnership, LLLP Rob Watson
Seminole Electric Cooperative, Inc.
Kristine Ward
5
Dominion - Dominion Resources, Inc.
Rachel Snead
10
Northeast Power Coordinating Council
Guy V. Zito
6
Berkshire Hathaway - PacifiCorp
Sandra Shaffer
6
1
Powerex Corporation
American Transmission Company, LLC
Raj Hundal
LaTroy Brumfield
4
Alliant Energy Corporation Services, Inc.
Larry Heckert
5
New York Power Authority
Shivaz Chopra
4
Public Utility District No. 2 of Grant County,
Washington
Karla Weaver
Affirmative N/A
1
Exelon
Daniel Gacek
Negative
1
Donna
Stephenson
Mike ONeil
None
N/A
Comments
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Negative
Abstain
N/A
Comments
Submitted
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
None
N/A
Abstain
N/A
Comments
Negative
Submitted
Abstain
N/A
Comments
Negative
Submitted
None
N/A
Abstain
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
None
N/A
Comments
Negative
Submitted
Abstain
N/A
Affirmative N/A
Comments
Negative
Submitted
3
Exelon
Kinte Whitehead
5
Exelon
Cynthia Lee
6
Exelon
Becky Webb
1
Entergy - Entergy Services, Inc.
Oliver Burke
3
City Utilities of Springfield, Missouri
Scott Williams
5
4
Enel Green Power
CMS Energy - Consumers Energy Company
Mat Bunch
Dwayne Parker
1
Memphis Light, Gas and Water Division
Allan Long
1
Bonneville Power Administration
Kammy RogersHolliday
None
6
Bonneville Power Administration
Andrew Meyers
Negative
3
Bonneville Power Administration
Ken Lanehome
Negative
5
Bonneville Power Administration
Scott Winner
Negative
5
Great River Energy
Preston Walsh
Negative
1
Georgia Transmission Corporation
Greg Davis
Negative
3
Snohomish County PUD No. 1
Holly Chaney
Negative
4
Public Utility District No. 1 of Snohomish County John Martinsen
Negative
5
Public Utility District No. 1 of Snohomish County Sam Nietfeld
Negative
6
Snohomish County PUD No. 1
Negative
1
Public Utility District No. 1 of Snohomish County Long Duong
Negative
5
1
6
AEP
AEP - AEP Service Corporation
AEP - AEP Marketing
Abstain
Abstain
Abstain
10
ReliabilityFirst
Abstain
N/A
3
Austin Energy
5
5
5
Cogentrix Energy Power Management, LLC
Seminole Electric Cooperative, Inc.
Cowlitz County PUD
Florida Reliability Coordinating Council –
Thomas Foltz
Dennis Sauriol
Yee Chou
Anthony
Jablonski
W. Dwayne
Preston
Gerry Adamski
David Weber
Deanna Carlson
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
N/A
N/A
N/A
Vince Ordax
Abstain
8
John Liang
N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
None
N/A
N/A
3
6
10
Member Services Division
AEP
Lakeland Electric
Texas Reliability Entity, Inc.
Kent Feliks
Paul Shipps
Rachel Coyne
6
Duke Energy
Greg Cecil
5
Duke Energy
Dale Goodwine
3
Duke Energy
Lee Schuster
6
Arkansas Electric Cooperative Corporation
Bruce Walkup
3
Arkansas Electric Cooperative Corporation
Mark Gann
5
Arkansas Electric Cooperative Corporation
Adrian Harris
1
East Kentucky Power Cooperative
Amber Skillern
3
East Kentucky Power Cooperative
Patrick Woods
1
Duke Energy
Laura Lee
1
Arizona Electric Power Cooperative, Inc.
Ben Engelby
5
East Kentucky Power Cooperative
mark brewer
3
Wabash Valley Power Association
Susan Sosbe
5
SunPower
Bradley Collard
5
SunPower
Bradley Collard
© 2021 - NERC Ver 4.3.0.0
Machine Name: ERODVSBSWB02
Abstain
None
Abstain
N/A
N/A
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
None
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
None
N/A
NERC Balloting Tool
Dashboard
Users
Registered Ballot Body
Proxy Ballot Body
My User Profile
Ballots
Ballot Events
Ballot Results
Comment Forms
View Comment Forms
Login / Register
Ballot Results
Ballot Name:
2019-02 BES Cyber System Information Access Management CIP-011-3 Non-Binding Poll IN 1 NB
Voting Start Date:
1/24/2020 12:01:00 AM
Voting End Date:
2/3/2020 8:00:00 PM
Ballot Type:
NB
Ballot Activity:
IN
Ballot Series:
1
Total # Votes:
232
Total Ballot Pool:
263
Quorum:
88.21
Quorum Established Date:
2/3/2020 5:08:16 PM
Weighted Segment Value:
15.31
Actions
Actions
Ballot
Pool
Segment
Segment:
1
Segment:
2
Segment:
3
Segment:
4
Segment:
5
Segment:
6
Segment:
7
Segment:
8
Segment:
Segment
Weight
Affirmative
Votes
Affirmative
Fraction
Negative
Votes
Negative
Fraction
Abstain
No
Vote
73
1
6
0.107
50
0.893
9
8
2
0.2
0
0
2
0.2
0
0
59
1
8
0.163
41
0.837
6
4
14
1
3
0.25
9
0.75
2
0
65
1
8
0.186
35
0.814
9
13
43
1
4
0.125
28
0.875
5
6
0
0
0
0
0
0
0
0
1
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
9
Segment:
6
10
Totals:
263
0.2
1
0.1
1
0.1
4
0
5.4
30
0.931
166
4.469
36
31
Ballot Pool Members
Segment
Organization
Voter
Peter Yost
Designated
Proxy
Ballot
3
Con Ed - Consolidated Edison Co. of New York
6
Con Ed - Consolidated Edison Co. of New York
4
Utility Services, Inc.
3
Ameren - Ameren Services
Christopher
Overberg
Brian EvansMongeon
David Jendras
3
WEC Energy Group, Inc.
Thomas Breene
Negative
5
Ontario Power Generation Inc.
Constantin
Chitescu
Negative
5
Edison International - Southern California Edison
Neil Shockey
Company
3
MEAG Power
Roger Brand
5
Con Ed - Consolidated Edison Co. of New York
William Winters Daniel Valle Negative
1
MEAG Power
David Weekley
1
IDACORP - Idaho Power Company
Laura Nelson
Negative
4
Seminole Electric Cooperative, Inc.
Jonathan Robbins
Abstain
1
Con Ed - Consolidated Edison Co. of New York
Dermot Smyth
Negative
6
WEC Energy Group, Inc.
David Hathaway
Negative
2
Independent Electricity System Operator
Leonard Kula
Negative
5
Massachusetts Municipal Wholesale Electric
Company
Anthony Stevens
Abstain
3
Sempra - San Diego Gas and Electric
Bridget Silvia
Negative
3
Basin Electric Power Cooperative
Jeremy Voll
5
Edison International - Southern California Edison
Romel Aquino
Company
NRG - NRG Energy, Inc.
Patricia Lynch
1
National Grid USA
3
Michael Jones
Negative
Negative
NERC
Memo
Comments
Submitted
Comments
Submitted
Abstain
N/A
Abstain
N/A
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
N/A
Comments
Submitted
Comments
Submitted
Comments
Submitted
Negative
Scott Miller Negative
Scott Miller Negative
N/A
Comments
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
1
Western Area Power Administration
sean erickson
Negative
1
6
Edison International - Southern California Edison
Ayman Samaan
Company
Ameren - Ameren Services
Eric Scott
Ameren - Ameren Services
Robert Quinlivan
6
Black Hills Corporation
Eric Scherr
Negative
3
National Grid USA
Brian Shanahan
Negative
5
Ameren - Ameren Missouri
Sam Dwyer
Abstain
1
Balancing Authority of Northern California
Kevin Smith
6
Sacramento Municipal Utility District
5
Sacramento Municipal Utility District
4
Sacramento Municipal Utility District
1
Sacramento Municipal Utility District
3
Sacramento Municipal Utility District
1
International Transmission Company Holdings
Corporation
Michael Moltane Gail Elliott
Negative
6
Seattle City Light
Charles Freeman
Negative
3
Puget Sound Energy, Inc.
Tim Womack
Negative
6
3
PPL - Louisville Gas and Electric Co.
PPL - Louisville Gas and Electric Co.
Linn Oelker
James Frank
None
None
3
APS - Arizona Public Service Co.
Vivian Moser
Negative
4
Seattle City Light
Hao Li
Negative
5
Puget Sound Energy, Inc.
Eleanor Ewry
Negative
6
Western Area Power Administration
Rosemary Jones
Negative
5
Sempra - San Diego Gas and Electric
Jennifer Wright
Negative
3
1
1
Tennessee Valley Authority
Tennessee Valley Authority
Nebraska Public Power District
Abstain
Abstain
Abstain
10
New York State Reliability Council
Ian Grant
Gabe Kurtz
Jamison Cawley
ALAN
ADAMSON
1
City Utilities of Springfield, Missouri
Michael Bowman
Negative
1
Joe
Tarantino
Joe
Jamie Cutlip
Tarantino
Joe
Nicole Goi
Tarantino
Joe
Beth Tincher
Tarantino
Joe
Arthur Starkovich
Tarantino
Joe
Nicole Looney
Tarantino
Negative
Abstain
Abstain
Negative
Negative
Negative
Negative
Negative
Negative
Negative
Comments
Submitted
Comments
Submitted
N/A
N/A
Comments
Submitted
Comments
Submitted
N/A
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
N/A
N/A
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
N/A
N/A
N/A
Comments
Submitted
Comments
Submitted
Comments
Submitted
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Abstain
N/A
Comments
Negative
Submitted
4
City Utilities of Springfield, Missouri
John Allen
Negative
5
Avista - Avista Corporation
1
SaskPower
1
APS - Arizona Public Service Co.
10
Midwest Reliability Organization
Glen Farmer
Wayne
Guttormson
Michelle
Amarantos
Russel Mountjoy
5
APS - Arizona Public Service Co.
Kelsi Rigby
6
Public Utility District No. 2 of Grant County,
Washington
LeRoy Patterson
Affirmative N/A
6
APS - Arizona Public Service Co.
Chinedu
Ochonogor
Negative
Comments
Submitted
5
Public Utility District No. 2 of Grant County,
Washington
Amy Jones
None
N/A
1
Dairyland Power Cooperative
Renee Leidel
3
Berkshire Hathaway Energy - MidAmerican
Energy Co.
Darnez Gresham
3
Tacoma Public Utilities (Tacoma, WA)
Marc Donaldson
6
5
Tennessee Valley Authority
Austin Energy
1
Puget Sound Energy, Inc.
Marjorie Parsons
Lisa Martin
Theresa
Rakowsky
5
San Miguel Electric Cooperative, Inc.
Lana Smith
4
WEC Energy Group, Inc.
Matthew Beilfuss
5
Platte River Power Authority
Tyson Archie
1
Glencoe Light and Power Commission
Terry Volkmann
1
Network and Security Technologies
Nicholas Lauriat
1
Public Utility District No. 1 of Pend Oreille
County
Kevin Conway
1
Seattle City Light
Pawel Krupa
1
Eversource Energy
Quintin Lee
6
Basin Electric Power Cooperative
Jerry Horner
1
Minnkota Power Cooperative Inc.
Theresa Allard
3
Associated Electric Cooperative, Inc.
Todd Bennett
3
Platte River Power Authority
Wade Kiess
Comments
Submitted
Comments
Negative
Submitted
Comments
Jennie Wike Negative
Submitted
Abstain
N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Negative
Affirmative N/A
Comments
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Negative
Andy
Fuhrman
Truong Le
Truong Le
Truong Le
Comments
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
None
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
Affirmative N/A
Truong Le
Affirmative N/A
6
Associated Electric Cooperative, Inc.
Brian Ackermann
1
Central Electric Power Cooperative (Missouri)
Michael Bax
3
M and A Electric Power Cooperative
Stephen Pogue
1
KAMO Electric Cooperative
Micah Breedlove
5
Associated Electric Cooperative, Inc.
Brad Haralson
3
Northeast Missouri Electric Power Cooperative
Skyler Wiegmann
3
KAMO Electric Cooperative
Tony Gott
3
Sho-Me Power Electric Cooperative
Jarrod Murdaugh
1
Sho-Me Power Electric Cooperative
Peter Dawson
5
4
3
Florida Municipal Power Agency
Florida Municipal Power Agency
Florida Municipal Power Agency
6
Florida Municipal Power Agency
Chris Gowder
Carol Chinn
Dale Ray
Richard
Montgomery
1
Northeast Missouri Electric Power Cooperative
Kevin White
Negative
1
N.W. Electric Power Cooperative, Inc.
Mark Ramsey
Negative
3
NW Electric Power Cooperative, Inc.
John Stickley
Negative
1
Hydro One Networks, Inc.
6
Platte River Power Authority
5
Los Angeles Department of Water and Power
1
Tacoma Public Utilities (Tacoma, WA)
5
Brazos Electric Power Cooperative, Inc.
5
Herb Schrayshuen
3
Lakeland Electric
6
Great Plains Energy - Kansas City Power and
Light Co.
3
Georgia System Operations Corporation
1
3
Long Island Power Authority
Manitoba Hydro
3
Los Angeles Department of Water and Power
Payam
Farahbakhsh
Sabrina Martz
Negative
Abstain
Comments
Submitted
Comments
Submitted
Comments
Submitted
N/A
Affirmative N/A
Comments
Glenn Barry
Negative
Submitted
Comments
John Merrell
Jennie Wike Negative
Submitted
Comments
Shari Heino
Negative
Submitted
Herb Schrayshuen
Affirmative N/A
Comments
Patricia Boody
Negative
Submitted
Jennifer
Comments
Negative
Flandermeyer
Submitted
Comments
Scott McGough
Negative
Submitted
Robert Ganley
Abstain
N/A
Mike Smith
None
N/A
Comments
Tony Skourtas
Negative
Submitted
Comments
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
None
N/A
None
N/A
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Abstain
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
1
Tri-State G and T Association, Inc.
Kjersti Drott
Negative
4
FirstEnergy - FirstEnergy Corporation
Mark Garza
3
Tri-State G and T Association, Inc.
1
5
Lakeland Electric
Lakeland Electric
Janelle Marriott
Gill
Larry Watt
Becky Rinier
6
OGE Energy - Oklahoma Gas and Electric Co.
Sing Tay
3
1
Eversource Energy
Tallahassee Electric (City of Tallahassee, FL)
Sharon Flannery
Scott Langston
5
Oglethorpe Power Corporation
Donna Johnson
1
Los Angeles Department of Water and Power
faranak sarbaz
1
Black Hills Corporation
Wes Wingen
5
Black Hills Corporation - Black Hills Power
Don Stahl
1
Seminole Electric Cooperative, Inc.
Bret Galbraith
6
NiSource - Northern Indiana Public Service Co.
Joe O'Brien
3
NiSource - Northern Indiana Public Service Co.
Dmitriy Bazylyuk
6
New York Power Authority
Thomas Savin
6
Talen Energy Marketing, LLC
Jennifer
Hohenshilt
None
1
FirstEnergy - FirstEnergy Corporation
Julie Severino
Negative
1
M and A Electric Power Cooperative
William Price
Negative
3
Dominion - Dominion Resources, Inc.
Connie Schroeder
Abstain
3
Muscatine Power and Water
Seth Shoemaker
Negative
6
Muscatine Power and Water
Nick Burns
Negative
3
OGE Energy - Oklahoma Gas and Electric Co.
Donald Hargrove
Negative
3
Westar Energy
Bryan Taggart
Negative
3
Great Plains Energy - Kansas City Power and
Light Co.
John Carlson
Negative
5
Westar Energy
Derek Brown
Negative
1
Great Plains Energy - Kansas City Power and
Light Co.
James McBee
Negative
N/A
Comments
Submitted
Comments
Submitted
N/A
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
5
Great Plains Energy - Kansas City Power and
Light Co.
Marcus Moor
Negative
6
Westar Energy
Grant Wilkerson
Negative
5
Southern Company - Southern Company
Generation
William D. Shultz
Negative
6
FirstEnergy - FirstEnergy Solutions
Ann Carey
Negative
6
Manitoba Hydro
Simon TanapatAndre
None
1
Westar Energy
Allen Klassen
Negative
5
Tennessee Valley Authority
3
FirstEnergy - FirstEnergy Corporation
M Lee Thomas
Aaron
Ghodooshim
1
OGE Energy - Oklahoma Gas and Electric Co.
Terri Pyle
1
CMS Energy - Consumers Energy Company
Donald Lynd
3
Black Hills Corporation
Eric Egge
6
3
PSEG - PSEG Energy Resources and Trade LLC Luiggi Beretta
Nebraska Public Power District
Tony Eddleman
5
Northern California Power Agency
Marty Hostler
3
CMS Energy - Consumers Energy Company
5
CMS Energy - Consumers Energy Company
Karl Blaszkowski
David
Greyerbiehl
4
Georgia System Operations Corporation
1
New York Power Authority
1
5
5
OTP - Otter Tail Power Company
PSEG - PSEG Fossil LLC
OTP - Otter Tail Power Company
Salvatore
Spagnolo
Charles Wicklund
Tim Kucey
Brett Jacobs
3
OTP - Otter Tail Power Company
Wendi Olson
3
Owensboro Municipal Utilities
Thomas Lyons
1
Hydro-Qu?bec TransEnergie
Nicolas Turcotte
5
Entergy - Entergy Services, Inc.
Gail Golden
6
Portland General Electric Co.
Daniel Mason
1
Muscatine Power and Water
Andy Kurriger
3
New York Power Authority
David Rivera
1
BC Hydro and Power Authority
Adrian Andreoiu
Andrea Barclay
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
N/A
Comments
Submitted
None
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
Abstain
N/A
Abstain
N/A
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
Comments
Submitted
Comments
Negative
Submitted
None
N/A
Abstain
N/A
None
N/A
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
None
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Abstain
N/A
Negative
Comments
Submitted
Comments
Negative
Submitted
None
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Abstain
N/A
Affirmative N/A
None
N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
1
NiSource - Northern Indiana Public Service Co.
Steve Toosevich
5
NiSource - Northern Indiana Public Service Co.
Kathryn Tackett
3
BC Hydro and Power Authority
Hootan Jarollahi
6
Los Angeles Department of Water and Power
Anton Vu
1
Omaha Public Power District
Doug Peterchuck
5
FirstEnergy - FirstEnergy Solutions
Robert Loy
10
SERC Reliability Corporation
Dave Krueger
5
JEA
John Babik
2
Electric Reliability Council of Texas, Inc.
Brandon Gleason
6
5
1
6
Seminole Electric Cooperative, Inc.
Imperial Irrigation District
Sunflower Electric Power Corporation
Imperial Irrigation District
David Reinecke
Tino Zaragoza
Paul Mehlhaff
Diana Torres
1
Public Utility District No. 1 of Chelan County
Ginette Lacasse
5
Public Utility District No. 1 of Chelan County
Meaghan Connell
1
Imperial Irrigation District
Jesus Sammy
Alcaraz
Affirmative N/A
3
Public Utility District No. 1 of Chelan County
Joyce Gundry
Negative
Comments
Submitted
5
BC Hydro and Power Authority
Helen Hamilton
Harding
Abstain
N/A
1
PNM Resources - Public Service Company of
New Mexico
Lynn Goldstein
None
N/A
1
NB Power Corporation
Nurul Abser
5
Dairyland Power Cooperative
Tommy Drea
5
Berkshire Hathaway Energy - MidAmerican
Energy Co.
Hydro-Qu?bec Production
5
Tacoma Public Utilities (Tacoma, WA)
Ozan Ferrin
3
Imperial Irrigation District
Denise Sanchez
5
Portland General Electric Co.
Ryan Olson
3
Portland General Electric Co.
Dan Zollner
5
PPL - Louisville Gas and Electric Co.
JULIE
HOSTRANDER
1
Terry Harbour
Carl Pineault
Negative
Comments
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
None
N/A
Comments
Jennie Wike Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Negative
None
N/A
Negative
Comments
Submitted
None
N/A
None
N/A
5
Berkshire Hathaway - NV Energy
Kevin Salsbury
3
Pacific Gas and Electric Company
Sandra Ellis
1
Pacific Gas and Electric Company
Marco Rios
1
Santee Cooper
Chris Wagner
6
Santee Cooper
Michael Brown
3
Santee Cooper
James Poston
5
Santee Cooper
Tommy Curtis
5
WEC Energy Group, Inc.
Janet OBrien
6
Dominion - Dominion Resources, Inc.
Sean Bodkin
1
Gainesville Regional Utilities
Truong Le
5
Lincoln Electric System
David Owens
Kayleigh
Wilkerson
4
Tacoma Public Utilities (Tacoma, WA)
Hien Ho
Jennie Wike Negative
6
Northern California Power Agency
Dennis Sismaet
Negative
1
Portland General Electric Co.
Brooke Jockin
None
Comments
Submitted
Comments
Submitted
N/A
5
Pacific Gas and Electric Company
Ed Hanson
Michael
Johnson
None
N/A
6
Tacoma Public Utilities (Tacoma, WA)
Terry Gifford
Jennie Wike Negative
6
Great River Energy
1
5
3
NextEra Energy - Florida Power and Light Co.
Southern Company - Southern Company Services,
Matt Carden
Inc.
Choctaw Generation Limited Partnership, LLLP Rob Watson
Seminole Electric Cooperative, Inc.
Kristine Ward
5
Dominion - Dominion Resources, Inc.
Rachel Snead
10
Northeast Power Coordinating Council
Guy V. Zito
6
Berkshire Hathaway - PacifiCorp
Sandra Shaffer
6
1
Powerex Corporation
American Transmission Company, LLC
Raj Hundal
LaTroy Brumfield
4
Alliant Energy Corporation Services, Inc.
Larry Heckert
5
New York Power Authority
Shivaz Chopra
1
Donna
Stephenson
Mike ONeil
Michael
Johnson
Michael
Johnson
Comments
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Negative
Abstain
N/A
Comments
Submitted
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
None
N/A
Abstain
N/A
Comments
Negative
Submitted
Abstain
N/A
Comments
Negative
Submitted
None
N/A
Abstain
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
4
Public Utility District No. 2 of Grant County,
Washington
Karla Weaver
Affirmative N/A
1
Exelon
Daniel Gacek
Negative
3
Exelon
Kinte Whitehead
5
Exelon
Cynthia Lee
6
Exelon
Becky Webb
1
Entergy - Entergy Services, Inc.
Oliver Burke
3
City Utilities of Springfield, Missouri
Scott Williams
5
4
Enel Green Power
CMS Energy - Consumers Energy Company
Mat Bunch
Dwayne Parker
1
Memphis Light, Gas and Water Division
Allan Long
1
Bonneville Power Administration
Kammy RogersHolliday
None
6
Bonneville Power Administration
Andrew Meyers
Negative
3
Bonneville Power Administration
Ken Lanehome
Negative
5
Bonneville Power Administration
Scott Winner
Negative
5
Great River Energy
Preston Walsh
Negative
1
Georgia Transmission Corporation
Greg Davis
Negative
3
Snohomish County PUD No. 1
Holly Chaney
Negative
4
Public Utility District No. 1 of Snohomish County John Martinsen
Negative
5
Public Utility District No. 1 of Snohomish County Sam Nietfeld
Negative
6
Snohomish County PUD No. 1
Negative
1
Public Utility District No. 1 of Snohomish County Long Duong
Negative
5
1
6
AEP
AEP - AEP Service Corporation
AEP - AEP Marketing
Abstain
Abstain
Abstain
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
N/A
N/A
N/A
10
ReliabilityFirst
Abstain
N/A
3
Austin Energy
5
Cogentrix Energy Power Management, LLC
John Liang
Thomas Foltz
Dennis Sauriol
Yee Chou
Anthony
Jablonski
W. Dwayne
Preston
Gerry Adamski
Comments
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
None
N/A
Comments
Negative
Submitted
Abstain
N/A
Affirmative N/A
Comments
Negative
Submitted
N/A
Affirmative N/A
Abstain
N/A
5
5
David Weber
Deanna Carlson
Abstain
None
N/A
N/A
Vince Ordax
Abstain
N/A
3
6
10
Seminole Electric Cooperative, Inc.
Cowlitz County PUD
Florida Reliability Coordinating Council –
Member Services Division
AEP
Lakeland Electric
Texas Reliability Entity, Inc.
Kent Feliks
Paul Shipps
Rachel Coyne
Abstain
None
Abstain
6
Duke Energy
Greg Cecil
5
Duke Energy
Dale Goodwine
3
Duke Energy
Lee Schuster
6
Arkansas Electric Cooperative Corporation
Bruce Walkup
3
Arkansas Electric Cooperative Corporation
Mark Gann
5
Arkansas Electric Cooperative Corporation
Adrian Harris
1
East Kentucky Power Cooperative
Amber Skillern
3
East Kentucky Power Cooperative
Patrick Woods
1
Duke Energy
Laura Lee
1
Arizona Electric Power Cooperative, Inc.
Ben Engelby
5
East Kentucky Power Cooperative
mark brewer
3
Wabash Valley Power Association
Susan Sosbe
5
SunPower
Bradley Collard
5
SunPower
Bradley Collard
8
© 2021 - NERC Ver 4.3.0.0
Machine Name: ERODVSBSWB02
N/A
N/A
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
None
N/A
Comments
Negative
Submitted
None
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
None
N/A
CIP‐004‐7 — Cyber Security – Personnel & Training
Standard Development Timeline
This section is maintained by the drafting team during the development of the standard and will be
removed when the standard is adopted by the NERC Board of Trustees (Board).
Description of Current Draft
Completed Actions
Standards Committee approved Standard Authorization Request
(SAR) for posting
SAR posted for comment
45‐day formal comment period with ballot
Anticipated Actions
45‐day formal comment period with additional ballot
Date
March 22, 2019
March 28, 2019 –
April 26, 2019
December 20, 2019
– February 3, 2020
Date
August 2020
10‐day final ballot
September 2020
Board adoption
November 2020
New or Modified Term(s) Used in NERC Reliability Standards
This section includes all new or modified terms used in the proposed standard that will be included
in the Glossary of Terms Used in NERC Reliability Standards upon applicable regulatory approval.
Terms used in the proposed standard that are already defined and are not being modified can be
found in the Glossary of Terms Used in NERC Reliability Standards. The new or revised terms listed
below will be presented for approval with the proposed standard. Upon Board adoption, this
section will be removed.
Term(s):
None.
Draft 2
August 2020
Page 1 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
A. Introduction
1. Title:
Cyber Security — Personnel & Training
2. Number:
CIP‐004‐7
3. Purpose:
To minimize the risk against compromise that could lead to misoperation or
instability in the Bulk Electric System (BES) from individuals accessing BES Cyber Systems by
requiring an appropriate level of personnel risk assessment, training, and security awareness in
support of protecting BES Cyber Systems.
4. Applicability:
4.1.
Functional Entities: For the purpose of the requirements contained herein, the following
list of functional entities will be collectively referred to as “Responsible Entities.” For
requirements in this standard where a specific functional entity or subset of functional
entities are the applicable entity or entities, the functional entity or entities are specified
explicitly.
4.1.1. Balancing Authority
4.1.2. Distribution Provider that owns one or more of the following Facilities, systems, and
equipment for the protection or restoration of the BES:
4.1.2.1. Each underfrequency Load shedding (UFLS) or undervoltage Load shedding
(UVLS) system that:
4.1.2.1.1. is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.1.2.1.2. performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation, of
300 MW or more.
4.1.2.2. Each or Remedial Action Scheme (RAS) where the RAS is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.1.2.3. Each Protection System (excluding UFLS and UVLS) that applies to Transmission
where the Protection System is subject to one or more requirements in a NERC
or Regional Reliability Standard.
4.1.2.4. Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.1.3. Generator Operator
4.1.4. Generator Owner
4.1.5. Reliability Coordinator
4.1.6. Transmission Operator
4.1.7. Transmission Owner
Draft 2
August 2020
Page 2 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
4.2.
Facilities: For the purpose of the requirements contained herein, the following
Facilities, systems, and equipment owned by each Responsible Entity in 4.1 above are
those to which these requirements are applicable. For requirements in this standard
where a specific type of Facilities, system, or equipment or subset of Facilities, systems,
and equipment are applicable, these are specified explicitly.
4.2.1. Distribution Provider: One or more of the following Facilities, systems and
equipment owned by the Distribution Provider for the protection or restoration of
the BES:
4.2.1.1. Each UFLS or UVLS System that:
4.2.1.1.1. is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.2.1.1.2. performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation, of
300 MW or more.
4.2.1.2. Each RAS where the RAS is subject to one or more requirements in a NERC or
Regional Reliability Standard.
4.2.1.3. Each Protection System (excluding UFLS and UVLS) that applies to Transmission
where the Protection System is subject to one or more requirements in a NERC
or Regional Reliability Standard.
4.2.1.4. Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.2.2. Responsible Entities listed in 4.1 other than Distribution Providers:
All BES Facilities.
4.2.3. Exemptions: The following are exempt from Standard CIP‐004‐7:
4.2.3.1. Cyber Assets at Facilities regulated by the Canadian Nuclear Safety Commission.
4.2.3.2. Cyber Assets associated with communication networks and data
communication links between discrete Electronic Security Perimeters.
4.2.3.3. The systems, structures, and components that are regulated by the Nuclear
Regulatory Commission under a cyber security plan pursuant to 10 C.F.R.
Section 73.54.
4.2.3.4. For Distribution Providers, the systems and equipment that are not included in
section 4.2.1 above.
4.2.3.5. Responsible Entities that identify that they have no BES Cyber Systems
categorized as high impact or medium impact according to the CIP‐002‐5.1
identification and categorization processes.
Draft 2
August 2020
Page 3 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
5. Effective Dates:
See Implementation Plan for CIP‐004‐7.
6. Background:
Standard CIP‐004 exists as part of a suite of CIP Standards related to cyber security, which
require the initial identification and categorization of BES Cyber Systems and require a
minimum level of organizational, operational, and procedural controls to mitigate risk to BES
Cyber Systems.
Most requirements open with, “Each Responsible Entity shall implement one or more
documented [processes, plan, etc.] that include the applicable items in [Table Reference].” The
referenced table requires the applicable items in the procedures for the common subject
matter of the requirements.
The term documented processes refers to a set of required instructions specific to the
Responsible Entity and to achieve a specific outcome. This term does not imply any particular
naming or approval structure beyond what is stated in the requirements. An entity should
include as much as it believes necessary in its documented processes, but it must address the
applicable requirements in the table.
The terms program and plan are sometimes used in place of documented processes where it
makes sense and is commonly understood. For example, documented processes describing a
response are typically referred to as plans (i.e., incident response plans and recovery plans).
Likewise, a security plan can describe an approach involving multiple procedures to address a
broad subject matter.
Similarly, the term program may refer to the organization’s overall implementation of its
policies, plans and procedures involving a subject matter. Examples in the standards include
the personnel risk assessment program and the personnel training program. The full
implementation of the CIP Cyber Security Standards could also be referred to as a program.
However, the terms program and plan do not imply any additional requirements beyond what
is stated in the standards.
Responsible Entities can implement common controls that meet requirements for multiple high
and medium impact BES Cyber Systems. For example, a single training program could meet the
requirements for training personnel across multiple BES Cyber Systems.
Measures for the initial requirement are simply the documented processes themselves.
Measures in the table rows provide examples of evidence to show documentation and
implementation of applicable items in the documented processes. These measures serve to
provide guidance to entities in acceptable records of compliance and should not be viewed as
an all‐inclusive list.
Throughout the standards, unless otherwise stated, bulleted items in the requirements and
measures are items that are linked with an “or,” and numbered items are items that are linked
with an “and.”
Draft 2
August 2020
Page 4 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
Many references in the Applicability section use a threshold of 300 MW for UFLS and UVLS.
This particular threshold of 300 MW for UVLS and UFLS was provided in Version 1 of the CIP
Cyber Security Standards. The threshold remains at 300 MW since it is specifically addressing
UVLS and UFLS, which are last ditch efforts to save the BES. A review of UFLS tolerances defined
within regional reliability standards for UFLS program requirements to date indicates that the
historical value of 300 MW represents an adequate and reasonable threshold value for
allowable UFLS operational tolerances.
“Applicable Systems” Columns in Tables:
Each table has an “Applicable Systems” or “Applicability” column. The “Applicable Systems”
column further defines the scope of systems to which a specific requirement row applies. The
CSO706 SDT adapted this concept from the National Institute of Standards and Technology
(“NIST”) Risk Management Framework as a way of applying requirements more appropriately
based on impact and connectivity characteristics. The following conventions are used in the
“Applicable Systems” column as described.
High Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as high impact
according to the CIP‐002‐5.1 identification and categorization processes.
Medium Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as medium
impact according to the CIP‐002‐5.1 identification and categorization processes.
Medium Impact BES Cyber Systems with External Routable Connectivity – Only applies to
medium impact BES Cyber Systems with External Routable Connectivity. This also excludes
Cyber Assets in the BES Cyber System that cannot be directly accessed through External
Routable Connectivity.
Electronic Access Control or Monitoring Systems (EACMS) – Applies to each Electronic
Access Control or Monitoring System associated with a referenced high impact BES Cyber
System or medium impact BES Cyber System. Examples may include, but are not limited to,
firewalls, authentication servers, and log monitoring and alerting systems.
Physical Access Control Systems (PACS) – Applies to each Physical Access Control System
associated with a referenced high impact BES Cyber System or medium impact BES Cyber
System with External Routable Connectivity.
Draft 2
August 2020
Page 5 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
B. Requirements and Measures
R1. Each Responsible Entity shall implement one or more documented processes that collectively include each of the
applicable requirement parts in CIP‐004‐7 Table R1 – Security Awareness Program. [Violation Risk Factor: Lower] [Time
Horizon: Operations Planning]
M1. Evidence must include each of the applicable documented processes that collectively include each of the applicable
requirement parts in CIP‐004‐7 Table R1 – Security Awareness Program and additional evidence to demonstrate
implementation as described in the Measures column of the table.
CIP‐004‐7 Table R1 – Security Awareness Program
Part
1.1
Applicable Systems
High Impact BES Cyber Systems
Medium Impact BES Cyber Systems
Requirements
Security awareness that, at least once
each calendar quarter, reinforces cyber
security practices (which may include
associated physical security practices)
for the Responsible Entity’s personnel
who have authorized electronic or
authorized unescorted physical access
to BES Cyber Systems.
Measures
An example of evidence may include,
but is not limited to, documentation
that the quarterly reinforcement has
been provided. Examples of evidence
of reinforcement may include, but are
not limited to, dated copies of
information used to reinforce security
awareness, as well as evidence of
distribution, such as:
Draft 2
August 2020
direct communications (for
example, e‐mails, memos,
computer‐based training); or
indirect communications (for
example, posters, intranet, or
brochures); or
management support and
reinforcement (for example,
presentations or meetings).
Page 6 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
R2. Each Responsible Entity shall implement one or more cyber security training program(s) appropriate to individual roles,
functions, or responsibilities that collectively includes each of the applicable requirement parts in CIP‐004‐7 Table R2 –
Cyber Security Training Program. [Violation Risk Factor: Lower] [Time Horizon: Operations Planning]
M2. Evidence must include the training program that includes each of the applicable requirement parts in CIP‐004‐7 Table R2 –
Cyber Security Training Program and additional evidence to demonstrate implementation of the program(s).
Draft 2
August 2020
Page 7 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
CIP‐004‐7 Table R2 – Cyber Security Training Program
Part
2.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Requirements
Training content on:
2.1.1.
2.1.2.
2.1.3.
2.1.4.
2.1.5.
2.1.6.
2.1.7.
2.1.8.
2.1.9.
Draft 2
August 2020
Cyber security policies;
Physical access controls;
Electronic access controls;
The visitor control program;
Handling of BES Cyber System
Information (BCSI) and its
storage;
Identification of a Cyber
Security Incident and initial
notifications in accordance
with the entity’s incident
response plan;
Recovery plans for BES Cyber
Systems;
Response to Cyber Security
Incidents; and
Cyber security risks associated
with a BES Cyber System’s
electronic interconnectivity
and interoperability with
other Cyber Assets, including
Transient Cyber Assets, and
with Removable Media.
Measures
Examples of evidence may include,
but are not limited to, training
material such as power point
presentations, instructor notes,
student notes, handouts, or other
training materials.
Page 8 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
CIP‐004‐7 Table R2 – Cyber Security Training Program
Part
Applicable Systems
2.2
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Requirements
Measures
Require completion of the training
specified in Part 2.1 prior to granting
authorized electronic access and
authorized unescorted physical access
to applicable Cyber Assets, except
during CIP Exceptional Circumstances.
Examples of evidence may include,
but are not limited to, training
records and documentation of when
CIP Exceptional Circumstances were
invoked.
Require completion of the training
specified in Part 2.1 at least once
every 15 calendar months.
Examples of evidence may include,
but are not limited to, dated
individual training records.
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
2.3
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 2
August 2020
Page 9 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
R3. Each Responsible Entity shall implement one or more documented personnel risk assessment program(s) to attain and
retain authorized electronic or authorized unescorted physical access to BES Cyber Systems that collectively include each of
the applicable requirement parts in CIP‐004‐7 Table R3 – Personnel Risk Assessment Program. [Violation Risk Factor:
Medium] [Time Horizon: Operations Planning].
M3. Evidence must include the documented personnel risk assessment programs that collectively include each of the applicable
requirement parts in CIP‐004‐7 Table R3 – Personnel Risk Assessment Program and additional evidence to demonstrate
implementation of the program(s).
CIP‐004‐7 Table R3 – Personnel Risk Assessment Program
Part
3.1
Applicable Systems
Requirements
High Impact BES Cyber Systems and their Process to confirm identity.
associated:
1. EACMS; and
2. PACS
Measures
An example of evidence may
include, but is not limited to,
documentation of the Responsible
Entity’s process to confirm identity.
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Draft 2
August 2020
Page 10 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
CIP‐004‐6 Table R3 – Personnel Risk Assessment Program
Part
3.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 2
August 2020
Requirements
Measures
Process to perform a seven year
criminal history records check as part of
each personnel risk assessment that
includes:
An example of evidence may include,
but is not limited to, documentation of
the Responsible Entity’s process to
perform a seven year criminal history
3.2.1. current residence, regardless of records check.
duration; and
3.2.2. other locations where, during
the seven years immediately prior to
the date of the criminal history
records check, the subject has resided
for six consecutive months or more.
If it is not possible to perform a full
seven year criminal history records
check, conduct as much of the seven
year criminal history records check as
possible and document the reason the
full seven year criminal history records
check could not be performed.
Page 11 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
CIP‐004‐6 Table R3 – Personnel Risk Assessment Program
Part
3.3
Applicable Systems
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Requirements
Measures
Criteria or process to evaluate criminal
history records checks for authorizing
access.
An example of evidence may
include, but is not limited to,
documentation of the
Responsible Entity’s process to
evaluate criminal history records
checks.
Criteria or process for verifying that
personnel risk assessments performed for
contractors or service vendors are
conducted according to Parts 3.1 through
3.3.
An example of evidence may
include, but is not limited to,
documentation of the
Responsible Entity’s criteria or
process for verifying contractors
or service vendors personnel risk
assessments.
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
3.4
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Draft 2
August 2020
Page 12 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
CIP‐004‐6 Table R3 – Personnel Risk Assessment Program
Part
3.5
Applicable Systems
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Requirements
Measures
Process to ensure that individuals with
authorized electronic or authorized
unescorted physical access have had a
personnel risk assessment completed
according to Parts 3.1 to 3.4 within the last
seven years.
An example of evidence may
include, but is not limited to,
documentation of the
Responsible Entity’s process for
ensuring that individuals with
authorized electronic or
authorized unescorted physical
access have had a personnel risk
assessment completed within the
last seven years.
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Draft 2
August 2020
Page 13 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
R4. Each Responsible Entity shall implement one or more documented access management program(s) that collectively include
each of the applicable requirement parts in CIP‐004‐7 Table R4 – Access Management Program. [Violation Risk Factor:
Medium] [Time Horizon: Operations Planning and Same Day Operations].
M4. Evidence must include the documented processes that collectively include each of the applicable requirement parts in CIP‐
004‐7 Table R4 – Access Management Program and additional evidence to demonstrate that the access management
program was implemented as described in the Measures column of the table.
CIP‐004‐7 Table R4 – Access Management Program
Part
Applicable Systems
4.1
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Process to authorize based on need, as
determined by the Responsible Entity,
except for CIP Exceptional
Circumstances:
4.1.1. Electronic access; and
4.1.2. Unescorted physical access into a
Physical Security Perimeter
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Requirements
Measures
An example of evidence may
include, but is not limited to, dated
documentation of the process to
authorize electronic access and
unescorted physical access in a
Physical Security Perimeter
Draft 2
August 2020
Page 14 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
CIP‐004‐6 Table R4 – Access Management Program
Part
Applicable Systems
Requirements
4.2
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Verify at least once each calendar
quarter that individuals with active
electronic access or unescorted physical
access have authorization records.
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Draft 2
August 2020
Measures
Examples of evidence may include,
but are not limited to:
Dated documentation of the
verification between the system
generated list of individuals who
have been authorized for access
(i.e., workflow database) and a
system generated list of
personnel who have access (i.e.,
user account listing), or
Dated documentation of the
verification between a list of
individuals who have been
authorized for access (i.e.,
authorization forms) and a list
of individuals provisioned for
access (i.e., provisioning forms
or shared account listing).
Page 15 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
CIP‐004‐6 Table R4 – Access Management Program
Part
Applicable Systems
Requirements
4.3
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
For electronic access, verify at least once
every 15 calendar months that all user
accounts, user account groups, or user
role categories, and their specific,
associated privileges are correct and are
those that the Responsible Entity
determines are necessary.
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Measures
An example of evidence may
include, but is not limited to,
documentation of the review that
includes all of the following:
1. A dated listing of all
accounts/account groups or
roles within the system;
2. A summary description of
privileges associated with
each group or role;
3. Accounts assigned to the
group or role; and
4. Dated evidence showing
verification of the privileges
for the group are authorized
and appropriate to the work
function performed by
people assigned to each
account.
Draft 2
August 2020
Page 16 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
R5. Each Responsible Entity shall implement one or more documented access revocation program(s) that collectively include
each of the applicable requirement parts in CIP‐004‐7 Table R5 – Access Revocation. [Violation Risk Factor: Medium] [Time
Horizon: Same Day Operations and Operations Planning].
M5. Evidence must include each of the applicable documented programs that collectively include each of the applicable
requirement parts in CIP‐004‐7 Table R5 – Access Revocation and additional evidence to demonstrate implementation as
described in the Measures column of the table.
CIP‐004‐7 Table R5 – Access Revocation
Part
5.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 2
August 2020
Requirements
Measures
An example of evidence may include,
A process to initiate removal of an
but is not limited to, documentation of
individual’s ability for unescorted
physical access and Interactive Remote all of the following:
Access upon a termination action, and
1. Dated workflow or sign‐off form
complete the removals within 24 hours
verifying access removal
of the termination action (Removal of
associated with the termination
the ability for access may be different
action; and
than deletion, disabling, revocation, or
2. Logs or other demonstration
removal of all access rights).
showing such persons no longer
have access.
Page 17 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
CIP‐004‐6 Table R5 – Access Revocation
Part
5.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 2
August 2020
Requirements
Measures
For reassignments or transfers, revoke
the individual’s authorized electronic
access to individual accounts and
authorized unescorted physical access
that the Responsible Entity determines
are not necessary by the end of the
next calendar day following the date
that the Responsible Entity determines
that the individual no longer requires
retention of that access.
An example of evidence may include,
but is not limited to, documentation of
all of the following:
1. Dated workflow or sign‐off form
showing a review of logical and
physical access; and
2. Logs or other demonstration
showing such persons no longer
have access that the
Responsible Entity determines
is not necessary.
Page 18 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
CIP‐004‐7 Table R5 – Access Revocation
Part
5.3
Applicable Systems
High Impact BES Cyber Systems and
their associated:
EACMS
Draft 2
August 2020
Requirements
Measures
For termination actions, revoke the
individual’s non‐shared user accounts
(unless already revoked according to
Part 5.1) within 30 calendar days of the
effective date of the termination
action.
An example of evidence may include,
but is not limited to, workflow or sign‐
off form showing access removal for
any individual BES Cyber Assets and
software applications as determined
necessary to completing the revocation
of access and dated within thirty
calendar days of the termination
actions.
Page 19 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
CIP‐004‐7 Table R5 – Access Revocation
Part
5.4
Applicable Systems
High Impact BES Cyber Systems and
their associated:
EACMS
Requirements
Measures
For termination actions, change
Examples of evidence may include, but
passwords for shared account(s) known are not limited to:
to the user within 30 calendar days of
Workflow or sign‐off form
the termination action. For
showing password reset within
reassignments or transfers, change
30 calendar days of the
passwords for shared account(s) known
termination;
to the user within 30 calendar days
Workflow or sign‐off form
following the date that the Responsible
showing password reset within
Entity determines that the individual no
30 calendar days of the
longer requires retention of that
reassignments or transfers; or
access.
Documentation of the
extenuating operating
If the Responsible Entity determines
circumstance and workflow or
and documents that extenuating
sign‐off form showing password
operating circumstances require a
reset within 10 calendar days
longer time period, change the
following the end of the
password(s) within 10 calendar days
operating circumstance.
following the end of the operating
circumstances.
Draft 2
August 2020
Page 20 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
R6. Each Responsible Entity shall implement one or more documented access management program(s) for BES Cyber System
Information that collectively include each of the applicable requirement parts in CIP‐004‐7 Table R6 – Access Management
for BES Cyber System Information. [Violation Risk Factor: Medium] [Time Horizon: Same Day Operations and Operations
Planning].
M6. Evidence must include each of the applicable documented programs that collectively include the applicable requirement
parts in CIP‐004‐7 Table R6 – Access Management for BES Cyber System Information and additional evidence to
demonstrate implementation as described in the Measures column of the table.
CIP‐004‐7 Table R6 – Access Management for BES Cyber System Information
Part
6.1
Applicability
BCSI associated with:
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Requirements
Authorize provisioning of access to
BCSI based on need, as determined by
the Responsible Entity, except for CIP
Exceptional Circumstances.
Measures
Examples of evidence may include, but
are not limited to, the following:
Dated authorization records for
provisioned access to BCSI based
on need; or
List of authorized individuals
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 2
August 2020
Page 21 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
CIP‐004‐7 Table R6 – Access Management for BES Cyber System Information
Part
6.2
Applicability
BCSI associated with:
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Requirements
Verify at least once every 15 calendar
months that all provisioned access to
BCSI:
Measures
Examples of evidence may include, but
are not limited to, all of the following:
6.2.1. Is authorized; and
6.2.2. Is appropriate based on need, as
determined by the Responsible Entity.
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
List of authorized individuals; and
List of individuals who have been
provisioned access; and
List of privileges associated with
the authorizations; and
List of privileges associated with
the provisioned access; and
Dated documentation of the 15‐
calendar‐month verification; and
Documented reconciliation
actions, if any.
6.3
BCSI associated with:
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
For termination actions, remove the
individual’s ability to use provisioned
access to BCSI (unless already revoked
according to Part 5.1) by the end of the
next calendar day following the
effective date of the termination
action.
Examples of dated evidence may
include, but are not limited to, access
revocation records associated with the
terminations and dated within the next
calendar day of the termination action.
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 2
August 2020
Page 22 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
C. Compliance
1. Compliance Monitoring Process:
1.1. Compliance Enforcement Authority: “Compliance Enforcement Authority” (CEA)
means NERC or the Regional Entity, or any entity as otherwise designated by an
Applicable Governmental Authority, in their respective roles of monitoring and/or
enforcing compliance with mandatory and enforceable Reliability Standards in their
respective jurisdictions.
1.2. Evidence Retention: The following evidence retention period(s) identify the period of
time an entity is required to retain specific evidence to demonstrate compliance. For
instances where the evidence retention period specified below is shorter than the time
since the last audit, the Compliance Enforcement Authority may ask an entity to
provide other evidence to show that it was compliant for the full time period since the
last audit.
The applicable entity shall keep data or evidence to show compliance as identified
below unless directed by its Compliance Enforcement Authority to retain specific
evidence for a longer period of time as part of an investigation:
The applicable entity shall retain evidence of each requirement in this standard for
three calendar years.
If an applicable entity is found non‐compliant, it shall keep information related to the
non‐compliance until mitigation is complete and approved or for the time specified
above, whichever is longer.
The Compliance Enforcement Authority shall keep the last audit records and all
requested and submitted subsequent audit records.
1.3. Compliance Monitoring and Assessment Processes: As defined in the NERC Rules of
Procedure, “Compliance Monitoring and Enforcement Program” refers to the
identification of the processes that will be used to evaluate data or information for the
purpose of assessing performance or outcomes with the associated Reliability
Standard.
Draft 2
July 2020 Page 23 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
2. Table of Compliance Elements
R #
Time
Horizon
R1
R2
Operations
Planning
Operations
Planning
VRF
Violation Severity Levels (CIP‐004‐7)
Lower VSL
Lower
Lower
Moderate VSL
High VSL
Severe VSL
The
Responsible
Entity did not
reinforce cyber
security
practices
during a
calendar
quarter but did
so less than 10
calendar days
after the start
of a
subsequent
calendar
quarter. (1.1)
The Responsible Entity
did not reinforce cyber
security practices during
a calendar quarter but
did so between 10 and
30 calendar days after
the start of a
subsequent calendar
quarter. (1.1)
The Responsible Entity
did not reinforce cyber
security practices during
a calendar quarter but
did so within the
subsequent quarter but
beyond 30 calendar
days after the start of
that calendar quarter.
(1.1)
The Responsible Entity
did not document or
implement any security
awareness process(es)
to reinforce cyber
security practices. (R1)
The
Responsible
Entity
implemented a
cyber security
training
program but
failed to
include one of
the training
The Responsible Entity
implemented a cyber
security training
program but failed to
include two of the
training content topics
in Requirement Parts
2.1.1 through 2.1.9.
(2.1)
The Responsible Entity
implemented a cyber
security training
program but failed to
include three of the
training content topics
in Requirement Parts
2.1.1 through 2.1.9.
(2.1)
The Responsible Entity
did not implement a
cyber security training
program appropriate to
individual roles,
functions, or
responsibilities. (R2)
OR
OR
OR
The Responsible Entity
did not reinforce cyber
security practices and
associated physical
security practices for at
least two consecutive
calendar quarters. (1.1)
OR
Draft 2
August 2020 Page 24 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐004‐7)
Lower VSL
content topics
in Requirement
Parts 2.1.1
through 2.1.9.
(2.1)
Moderate VSL
The Responsible Entity
implemented a cyber
security training
program but failed to
train two individuals
OR
(with the exception of
CIP Exceptional
The
Circumstances) prior to
Responsible
their being granted
Entity
implemented a authorized electronic
cyber security and authorized
unescorted physical
training
access. (2.2)
program but
OR
failed to train
one individual
(with the
The Responsible Entity
exception of
implemented a cyber
CIP Exceptional security training
Circumstances) program but failed to
prior to their
train two individuals
being granted with authorized
authorized
electronic or authorized
electronic and unescorted physical
authorized
access within 15
unescorted
calendar months of the
physical access.
previous training
(2.2)
completion date. (2.3)
High VSL
The Responsible Entity
implemented a cyber
security training
program but failed to
train three individuals
(with the exception of
CIP Exceptional
Circumstances) prior to
their being granted
authorized electronic
and authorized
unescorted physical
access. (2.2)
Severe VSL
The Responsible Entity
implemented a cyber
security training
program but failed to
include four or more of
the training content
topics in Requirement
Parts 2.1.1 through
2.1.9. (2.1)
OR
The Responsible Entity
implemented a cyber
security training
OR
program but failed to
The Responsible Entity train four or more
implemented a cyber
individuals (with the
security training
exception of CIP
program but failed to
Exceptional
train three individuals
Circumstances) prior to
with authorized
their being granted
electronic or authorized authorized electronic
unescorted physical
and authorized
access within 15
unescorted physical
calendar months of the access. (2.2)
previous training
OR
completion date. (2.3)
Draft 2
August 2020 Page 25 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐004‐7)
Lower VSL
Moderate VSL
High VSL
The Responsible Entity
implemented a cyber
security training
program but failed to
train four or more
individuals with
authorized electronic or
authorized unescorted
physical access within
15 calendar months of
the previous training
completion date. (2.3)
OR
The
Responsible
Entity
implemented a
cyber security
training
program but
failed to train
one individual
with authorized
electronic or
authorized
unescorted
physical access
within 15
calendar
months of the
previous
training
completion
date. (2.3)
R3
Operations
Planning
Medium
The
Responsible
Entity has a
program for
conducting
Severe VSL
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments (PRAs)
for individuals, including
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments (PRAs)
for individuals, including
The Responsible Entity
did not have all of the
required elements as
described by 3.1
through 3.4 included
Draft 2
August 2020 Page 26 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐004‐7)
Lower VSL
Personnel Risk
Assessments
(PRAs) for
individuals,
including
contractors and
service
vendors, but
did not conduct
the PRA as a
condition of
granting
authorized
electronic or
authorized
unescorted
physical access
for one
individual. (R3)
OR
The
Responsible
Entity did
conduct
Personnel Risk
Assessments
(PRAs) for
individuals,
Moderate VSL
contractors and service
vendors, but did not
conduct the PRA as a
condition of granting
authorized electronic or
authorized unescorted
physical access for two
individuals. (R3)
High VSL
contractors and service
vendors, but did not
conduct the PRA as a
condition of granting
authorized electronic or
authorized unescorted
physical access for three
individuals. (R3)
OR
OR
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not confirm identity for
two individuals. (3.1 &
3.4)
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not confirm identity for
three individuals. (3.1 &
3.4)
OR
OR
The Responsible Entity
has a process to
perform seven‐year
criminal history record
checks for individuals,
The Responsible Entity
has a process to
perform seven‐year
criminal history record
checks for individuals,
Severe VSL
within documented
program(s) for
implementing Personnel
Risk Assessments
(PRAs), for individuals,
including contractors
and service vendors, for
obtaining and retaining
authorized cyber or
authorized unescorted
physical access. (R3)
OR
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, but did not
conduct the PRA as a
condition of granting
authorized electronic or
authorized unescorted
physical access for four
or more individuals. (R3)
OR
Draft 2
August 2020 Page 27 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐004‐7)
Lower VSL
including
contractors and
service
vendors, with
authorized
electronic or
authorized
unescorted
physical access
but did not
confirm
identity for one
individual. (3.1
& 3.4)
OR
Moderate VSL
including contractors
and service vendors,
with authorized
electronic or authorized
unescorted physical
access but did not
include the required
checks described in
3.2.1 and 3.2.2 for two
individuals. (3.2 & 3.4)
High VSL
including contractors
and service vendors,
with authorized
electronic or authorized
unescorted physical
access but did not
include the required
checks described in
3.2.1 and 3.2.2 for three
individuals. (3.2 & 3.4)
OR
OR
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not evaluate criminal
history records check
for access authorization
for two individuals. (3.3
& 3.4)
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not evaluate criminal
history records check
for access authorization
for three individuals.
(3.3 & 3.4)
The
Responsible
Entity has a
process to
perform seven‐
year criminal
history record
checks for
individuals,
including
contractors and OR
service
vendors, with
OR
Severe VSL
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not confirm identity for
four or more
individuals. (3.1 & 3.4)
OR
The Responsible Entity
has a process to
perform seven‐year
criminal history record
checks for individuals,
including contractors
and service vendors,
with authorized
electronic or authorized
unescorted physical
access but did not
include the required
checks described in
3.2.1 and 3.2.2 for four
Draft 2
August 2020 Page 28 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐004‐7)
Lower VSL
authorized
electronic or
authorized
unescorted
physical access
but did not
include the
required
checks
described in
3.2.1 and 3.2.2
for one
individual. (3.2
& 3.4)
OR
The
Responsible
Entity did
conduct
Personnel Risk
Assessments
(PRAs) for
individuals,
including
contractors and
service
vendors, with
authorized
Moderate VSL
High VSL
The Responsible Entity The Responsible Entity
did not conduct
did not conduct
Personnel Risk
Personnel Risk
Assessments (PRAs) for Assessments (PRAs) for
three individuals with
two individuals with
authorized electronic or
authorized electronic or
authorized unescorted authorized unescorted
physical access within 7 physical access within 7
calendar years of the
calendar years of the
previous PRA
previous PRA
completion date. (3.5)
completion date. (3.5)
Severe VSL
or more individuals. (3.2
& 3.4)
OR
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not evaluate criminal
history records check
for access authorization
for four or more
individuals. (3.3 & 3.4)
OR
The Responsible Entity
did not conduct
Personnel Risk
Assessments (PRAs) for
four or more individuals
with authorized
electronic or authorized
unescorted physical
access within 7 calendar
Draft 2
August 2020 Page 29 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐004‐7)
Lower VSL
electronic or
authorized
unescorted
physical access
but did not
evaluate
criminal history
records check
for access
authorization
for one
individual. (3.3
& 3.4)
Moderate VSL
High VSL
Severe VSL
years of the previous
PRA completion date.
(3.5)
OR
The
Responsible
Entity did not
conduct
Personnel Risk
Assessments
(PRAs) for one
individual with
authorized
electronic or
authorized
unescorted
physical access
within 7
Draft 2
August 2020 Page 30 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
R #
R4
Time
Horizon
VRF
Operations
Planning
and Same
Day
Operations
Medium
Violation Severity Levels (CIP‐004‐7)
Lower VSL
calendar years
of the previous
PRA
completion
date. (3.5)
The
Responsible
Entity did not
verify that
individuals with
active
electronic or
active
unescorted
physical access
have
authorization
records during
a calendar
quarter but did
so less than 10
calendar days
after the start
of a
subsequent
calendar
quarter. (4.2)
Moderate VSL
High VSL
The Responsible Entity
did not verify that
individuals with active
electronic or active
unescorted physical
access have
authorization records
during a calendar
quarter but did so
between 10 and 20
calendar days after the
start of a subsequent
calendar quarter. (4.2)
OR
The Responsible Entity
did not verify that
individuals with active
electronic or active
unescorted physical
access have
authorization records
during a calendar
quarter but did so
between 20 and 30
calendar days after the
start of a subsequent
calendar quarter. (4.2)
OR
The Responsible Entity
has implemented
processes to verify that
user accounts, user
account groups, or user
role categories, and
their specific, associated
privileges are correct
The Responsible Entity
has implemented
processes to verify that
user accounts, user
account groups, or user
role categories, and
their specific, associated
privileges are correct
Severe VSL
The Responsible Entity
did not implement any
documented program(s)
for access management.
(R4)
OR
The Responsible Entity
has not implemented
one or more
documented program(s)
for access management
that includes a process
to authorize electronic
access or unescorted
physical access. (4.1)
OR
The Responsible Entity
did not verify that
individuals with active
electronic or active
Draft 2
August 2020 Page 31 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐004‐7)
Lower VSL
Moderate VSL
and necessary within 15
OR
calendar months of the
The
previous verification but
Responsible
for more than 5% but
Entity has
less than (or equal to)
implemented
10% of its BES Cyber
processes to
verify that user Systems, privileges were
accounts, user incorrect or
unnecessary. (4.3)
account
groups, or user
role categories,
and their
specific,
associated
privileges are
correct and
necessary
within 15
calendar
months of the
previous
verification but
for 5% or less
of its BES Cyber
Systems,
privileges were
incorrect or
High VSL
and necessary within 15
calendar months of the
previous verification but
for more than 10% but
less than (or equal to)
15% of its BES Cyber
Systems, privileges were
incorrect or
unnecessary. (4.3)
Severe VSL
unescorted physical
access have
authorization records
for at least two
consecutive calendar
quarters. (4.2)
OR
The Responsible Entity
has implemented
processes to verify that
user accounts, user
account groups, or user
role categories, and
their specific, associated
privileges are correct
and necessary within 15
calendar months of the
previous verification but
for more than 15% of its
BES Cyber Systems,
privileges were
incorrect or
unnecessary. (4.3)
Draft 2
August 2020 Page 32 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
R #
Time
Horizon
R5
Same Day
Operations
and
Operations
Planning
VRF
Violation Severity Levels (CIP‐004‐7)
Lower VSL
unnecessary.
(4.3)
Medium
The
Responsible
Entity has
implemented
one or more
process(es) to
revoke the
individual’s
user accounts
upon
termination
action but did
not do so for
within 30
calendar days
of the date of
termination
action for one
or more
individuals.
(5.3)
OR
Moderate VSL
The Responsible Entity
has implemented one or
more process(es) to
remove the ability for
unescorted physical
access and Interactive
Remote Access upon a
termination action or
complete the removal
within 24 hours of the
termination action but
did not initiate those
removals for one
individual. (5.1)
OR
The Responsible Entity
has implemented one or
more process(es) to
determine that an
individual no longer
requires retention of
access following
reassignments or
High VSL
The Responsible Entity
has implemented one or
more process(es) to
remove the ability for
unescorted physical
access and Interactive
Remote Access upon a
termination action or
complete the removal
within 24 hours of the
termination action but
did not initiate those
removals for two
individuals. (5.1)
OR
The Responsible Entity
has implemented one or
more process(es) to
determine that an
individual no longer
requires retention of
access following
reassignments or
Severe VSL
The Responsible Entity
has not implemented
any documented
program(s) for access
revocation for electronic
access or unescorted
physical access. (R5)
OR
The Responsible Entity
has implemented one or
more process(es) to
remove the ability for
unescorted physical
access and Interactive
Remote Access upon a
termination action or
complete the removal
within 24 hours of the
termination action but
did not initiate those
removals for three or
more individuals. (5.1)
OR
Draft 2
August 2020 Page 33 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐004‐7)
Lower VSL
The
Responsible
Entity has
implemented
one or more
process(es) to
change
passwords for
shared
accounts
known to the
user upon
termination
action,
reassignment,
or transfer, but
did not do so
for within 30
calendar days
of the date of
termination
action,
reassignment,
or transfer for
one or more
individuals.
(5.4)
Moderate VSL
transfers but, for one
individual, did not
revoke the authorized
electronic access to
individual accounts and
authorized unescorted
physical access by the
end of the next calendar
day following the
predetermined date.
(5.2)
High VSL
transfers but, for two
individuals, did not
revoke the authorized
electronic access to
individual accounts and
authorized unescorted
physical access by the
end of the next calendar
day following the
predetermined date.
(5.2)
Severe VSL
The Responsible Entity
has implemented one or
more process(es) to
determine that an
individual no longer
requires retention of
access following
reassignments or
transfers but, for three
or more individuals, did
not revoke the
authorized electronic
access to individual
accounts and authorized
unescorted physical
access by the end of the
next calendar day
following the
predetermined date.
(5.2)
OR
Draft 2
August 2020 Page 34 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐004‐7)
Lower VSL
Moderate VSL
High VSL
Severe VSL
The
Responsible
Entity has
implemented
one or more
process(es) to
determine and
document
extenuating
operating
circumstances
following a
termination
action,
reassignment,
or transfer, but
did not change
one or more
passwords for
shared
accounts
known to the
user within 10
calendar days
following the
end of the
extenuating
operating
Draft 2
August 2020 Page 35 of 39
CIP‐004‐7 — Cyber Security – Personnel & Training
R #
R6
Time
Horizon
VRF
Same Day
Operations
Medium
and
Operations
Planning
Violation Severity Levels (CIP‐004‐7)
Lower VSL
circumstances.
(5.4)
The
Responsible
Entity
implemented
one or more
documented
access
management
program(s) for
BCSI but did
not implement
one of the
applicable
items for Parts
6.1 through
6.3. (R6)
Moderate VSL
The Responsible Entity
implemented one or
more documented
access management
program(s) for BCSI but
did not implement two
of the applicable items
for Parts 6.1 through
6.3. (R6)
High VSL
The Responsible Entity
implemented one or
more documented
access management
program(s) for BCSI but
did not implement three
of the applicable items
Parts 6.1 through 6.3.
(R6)
Severe VSL
The Responsible Entity
did not implement one
or more documented
access management
program(s) for BCSI.
(R6)
Draft 2
August 2020 Page 36 of 39
Guidelines and Technical Basis
D. Regional Variances
None.
E. Interpretations
None.
F. Associated Documents
None.
Version History
Version
Date
Action
Change Tracking
1
1/16/06
R3.2 — Change “Control Center” to
“control center.”
2
9/30/09
Modifications to clarify the
requirements and to bring the
compliance elements into conformance
with the latest guidelines for developing
compliance elements of standards.
3/24/06
Removal of reasonable business
judgment.
Replaced the RRO with the RE as a
responsible entity.
Rewording of Effective Date.
Changed compliance monitor to
Compliance Enforcement Authority.
3
12/16/09
Updated Version Number from ‐2 to ‐3
In Requirement 1.6, deleted the
sentence pertaining to removing
component or system from service in
order to perform testing, in response to
FERC order issued September 30, 2009.
3
12/16/09
3
3/31/10
4
1/24/11
Approved by the NERC Board of
Trustees.
Approved by FERC.
Approved by the NERC Board of
Trustees.
Draft 2
August 2020 Page 37 of 39
Guidelines and Technical Basis
Version
Date
Action
Change Tracking
5
11/26/12
Adopted by the NERC Board of
Trustees.
5
11/22/13
FERC Order issued approving CIP‐004‐5.
5.1
9/30/13
Modified two VSLs in R4
Errata
6
11/13/14
Adopted by the NERC Board of
Trustees.
Addressed two
FERC directives
from Order No.
791 related to
identify, assess,
and correct
language and
communication
networks.
6
2/12/15
Adopted by the NERC Board of
Trustees.
Replaces the
version adopted
by the Board on
11/13/2014.
Revised version
addresses
remaining
directives from
Order No. 791
related to
transient devices
and low impact
BES Cyber
Systems.
6
1/21/16
7
TBD
FERC order issued approving CIP‐004‐6.
Docket No. RM15‐14‐000
Adopted by the NERC Board of Trustees Revised to
enhance BES
reliability for
entities to
manage their
BCSI.
Modified to
coordinate with
other CIP
standards and to
revise format to
use RBS
Template.
Draft 2
August 2020 Page 38 of 39
Guidelines and Technical Basis
Note: The Guidelines and Technical Basis section has not been revised as part of Project 2019‐
02. A separate technical rationale document has been created to cover Project 2019‐02
revisions. Future edits to this section will be conducted through the Technical Rationale for
Reliability Standards Project and the Standards Drafting Process.
Draft 2
August 2020 Page 39 of 39
CIP‐004‐67 — Cyber Security – Personnel & Training
Standard Development Timeline
This section is maintained by the drafting team during the development of the standard and will be
removed when the standard is adopted by the NERC Board of Trustees (Board).
Description of Current Draft
Completed Actions
Standards Committee approved Standard Authorization Request
(SAR) for posting
SAR posted for comment
45‐day formal comment period with ballot
Anticipated Actions
45‐day formal comment period with additional ballot
Date
March 22, 2019
March 28, 2019 –
April 26, 2019
December 20, 2019
– February 3, 2020
Date
August 2020
10‐day final ballot
September 2020
Board adoption
November 2020
New or Modified Term(s) Used in NERC Reliability Standards
This section includes all new or modified terms used in the proposed standard that will be included
in the Glossary of Terms Used in NERC Reliability Standards upon applicable regulatory approval.
Terms used in the proposed standard that are already defined and are not being modified can be
found in the Glossary of Terms Used in NERC Reliability Standards. The new or revised terms listed
below will be presented for approval with the proposed standard. Upon Board adoption, this
section will be removed.
Term(s):
None.
Draft 2
August 2020
Page 1 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
A. Introduction
1. Title:
Cyber Security — Personnel & Training
2. Number:
CIP‐004‐76
3. Purpose:
To minimize the risk against compromise that could lead to misoperation or
instability in the Bulk Electric System (BES) from individuals accessing BES Cyber Systems by
requiring an appropriate level of personnel risk assessment, training, and security awareness in
support of protecting BES Cyber Systems.
4. Applicability:
4.1.
Functional Entities: For the purpose of the requirements contained herein, the following
list of functional entities will be collectively referred to as “Responsible Entities.” For
requirements in this standard where a specific functional entity or subset of functional
entities are the applicable entity or entities, the functional entity or entities are specified
explicitly.
4.1.1. Balancing Authority
4.1.2. Distribution Provider that owns one or more of the following Facilities, systems, and
equipment for the protection or restoration of the BES:
4.1.2.1. Each underfrequency Load shedding (UFLS) or undervoltage Load shedding
(UVLS) system that:
4.1.2.1.1. is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.1.2.1.2. performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation, of
300 MW or more.
4.1.2.2. Each Special Protection System (SPS) or Remedial Action Scheme (RAS) where
the SPS or RAS is subject to one or more requirements in a NERC or Regional
Reliability Standard.
4.1.2.3. Each Protection System (excluding UFLS and UVLS) that applies to Transmission
where the Protection System is subject to one or more requirements in a NERC
or Regional Reliability Standard.
4.1.2.4. Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.1.3. Generator Operator
4.1.4. Generator Owner
4.1.5. Interchange Coordinator or Interchange Authority
4.1.6.4.1.5.
Draft 2
August 2020
Reliability Coordinator
Page 2 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
4.1.7.4.1.6.
Transmission Operator
4.1.8.4.1.7.
Transmission Owner
4.2.
Facilities: For the purpose of the requirements contained herein, the following
Facilities, systems, and equipment owned by each Responsible Entity in 4.1 above are
those to which these requirements are applicable. For requirements in this standard
where a specific type of Facilities, system, or equipment or subset of Facilities, systems,
and equipment are applicable, these are specified explicitly.
4.2.1. Distribution Provider: One or more of the following Facilities, systems and
equipment owned by the Distribution Provider for the protection or restoration of
the BES:
4.2.1.1. Each UFLS or UVLS System that:
4.2.1.1.1. is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.2.1.1.2. performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation, of
300 MW or more.
4.2.1.2. Each SPS or RAS where the SPS or RAS is subject to one or more requirements in
a NERC or Regional Reliability Standard.
4.2.1.3. Each Protection System (excluding UFLS and UVLS) that applies to Transmission
where the Protection System is subject to one or more requirements in a NERC
or Regional Reliability Standard.
4.2.1.4. Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.2.2. Responsible Entities listed in 4.1 other than Distribution Providers:
All BES Facilities.
4.2.3. Exemptions: The following are exempt from Standard CIP‐004‐67:
4.2.3.1. Cyber Assets at Facilities regulated by the Canadian Nuclear Safety Commission.
4.2.3.2. Cyber Assets associated with communication networks and data
communication links between discrete Electronic Security Perimeters.
4.2.3.3. The systems, structures, and components that are regulated by the Nuclear
Regulatory Commission under a cyber security plan pursuant to 10 C.F.R.
Section 73.54.
4.2.3.4. For Distribution Providers, the systems and equipment that are not included in
section 4.2.1 above.
Draft 2
August 2020
Page 3 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
4.2.3.5. Responsible Entities that identify that they have no BES Cyber Systems
categorized as high impact or medium impact according to the CIP‐002‐5.1
identification and categorization processes.
5. Effective Dates:
See Implementation Plan for CIP‐004‐67.
6. Background:
Standard CIP‐004 exists as part of a suite of CIP Standards related to cyber security, which
require the initial identification and categorization of BES Cyber Systems and require a
minimum level of organizational, operational, and procedural controls to mitigate risk to BES
Cyber Systems.
Most requirements open with, “Each Responsible Entity shall implement one or more
documented [processes, plan, etc.] that include the applicable items in [Table Reference].” The
referenced table requires the applicable items in the procedures for the common subject
matter of the requirements.
The term documented processes refers to a set of required instructions specific to the
Responsible Entity and to achieve a specific outcome. This term does not imply any particular
naming or approval structure beyond what is stated in the requirements. An entity should
include as much as it believes necessary in its documented processes, but it must address the
applicable requirements in the table.
The terms program and plan are sometimes used in place of documented processes where it
makes sense and is commonly understood. For example, documented processes describing a
response are typically referred to as plans (i.e., incident response plans and recovery plans).
Likewise, a security plan can describe an approach involving multiple procedures to address a
broad subject matter.
Similarly, the term program may refer to the organization’s overall implementation of its
policies, plans and procedures involving a subject matter. Examples in the standards include
the personnel risk assessment program and the personnel training program. The full
implementation of the CIP Cyber Security Standards could also be referred to as a program.
However, the terms program and plan do not imply any additional requirements beyond what
is stated in the standards.
Responsible Entities can implement common controls that meet requirements for multiple high
and medium impact BES Cyber Systems. For example, a single training program could meet the
requirements for training personnel across multiple BES Cyber Systems.
Measures for the initial requirement are simply the documented processes themselves.
Measures in the table rows provide examples of evidence to show documentation and
implementation of applicable items in the documented processes. These measures serve to
provide guidance to entities in acceptable records of compliance and should not be viewed as
an all‐inclusive list.
Draft 2
August 2020
Page 4 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
Throughout the standards, unless otherwise stated, bulleted items in the requirements and
measures are items that are linked with an “or,” and numbered items are items that are linked
with an “and.”
Many references in the Applicability section use a threshold of 300 MW for UFLS and UVLS.
This particular threshold of 300 MW for UVLS and UFLS was provided in Version 1 of the CIP
Cyber Security Standards. The threshold remains at 300 MW since it is specifically addressing
UVLS and UFLS, which are last ditch efforts to save the BES. A review of UFLS tolerances defined
within regional reliability standards for UFLS program requirements to date indicates that the
historical value of 300 MW represents an adequate and reasonable threshold value for
allowable UFLS operational tolerances.
“Applicable Systems” Columns in Tables:
Each table has an “Applicable Systems” or “Applicability” column. The “Applicable Systems”
column to further defines the scope of systems to which a specific requirement row applies.
The CSO706 SDT adapted this concept from the National Institute of Standards and Technology
(“NIST”) Risk Management Framework as a way of applying requirements more appropriately
based on impact and connectivity characteristics. The following conventions are used in the
“Applicable Systems” column as described.
High Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as high impact
according to the CIP‐002‐5.1 identification and categorization processes.
Medium Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as medium
impact according to the CIP‐002‐5.1 identification and categorization processes.
Medium Impact BES Cyber Systems with External Routable Connectivity – Only applies to
medium impact BES Cyber Systems with External Routable Connectivity. This also excludes
Cyber Assets in the BES Cyber System that cannot be directly accessed through External
Routable Connectivity.
Electronic Access Control or Monitoring Systems (EACMS) – Applies to each Electronic
Access Control or Monitoring System associated with a referenced high impact BES Cyber
System or medium impact BES Cyber System. Examples may include, but are not limited to,
firewalls, authentication servers, and log monitoring and alerting systems.
Physical Access Control Systems (PACS) – Applies to each Physical Access Control System
associated with a referenced high impact BES Cyber System or medium impact BES Cyber
System with External Routable Connectivity.
Draft 2
August 2020
Page 5 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
B. Requirements and Measures
R1. Each Responsible Entity shall implement one or more documented processes that collectively include each of the
applicable requirement parts in CIP‐004‐67 Table R1 – Security Awareness Program. [Violation Risk Factor: Lower] [Time
Horizon: Operations Planning]
M1. Evidence must include each of the applicable documented processes that collectively include each of the applicable
requirement parts in CIP‐004‐67 Table R1 – Security Awareness Program and additional evidence to demonstrate
implementation as described in the Measures column of the table.
CIP‐004‐67 Table R1 – Security Awareness Program
Part
1.1
Applicable Systems
High Impact BES Cyber Systems
Medium Impact BES Cyber Systems
Requirements
Security awareness that, at least once
each calendar quarter, reinforces cyber
security practices (which may include
associated physical security practices)
for the Responsible Entity’s personnel
who have authorized electronic or
authorized unescorted physical access
to BES Cyber Systems.
Measures
An example of evidence may include,
but is not limited to, documentation
that the quarterly reinforcement has
been provided. Examples of evidence
of reinforcement may include, but are
not limited to, dated copies of
information used to reinforce security
awareness, as well as evidence of
distribution, such as:
Draft 2
August 2020
direct communications (for
example, e‐mails, memos,
computer‐based training); or
indirect communications (for
example, posters, intranet, or
brochures); or
management support and
reinforcement (for example,
presentations or meetings).
Page 6 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
R2. Each Responsible Entity shall implement one or more cyber security training program(s) appropriate to individual roles,
functions, or responsibilities that collectively includes each of the applicable requirement parts in CIP‐004‐76 Table R2 –
Cyber Security Training Program. [Violation Risk Factor: Lower] [Time Horizon: Operations Planning]
M2. Evidence must include the training program that includes each of the applicable requirement parts in CIP‐004‐76 Table R2 –
Cyber Security Training Program and additional evidence to demonstrate implementation of the program(s).
Draft 2
August 2020
Page 7 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
CIP‐004‐67 Table R2 – Cyber Security Training Program
Part
2.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Requirements
Training content on:
2.1.1.
2.1.2.
2.1.3.
2.1.4.
2.1.5.
2.1.6.
2.1.7.
2.1.8.
2.1.9.
Draft 2
August 2020
Cyber security policies;
Physical access controls;
Electronic access controls;
The visitor control program;
Handling of BES Cyber System
Information (BCSI) and its
storage;
Identification of a Cyber
Security Incident and initial
notifications in accordance
with the entity’s incident
response plan;
Recovery plans for BES Cyber
Systems;
Response to Cyber Security
Incidents; and
Cyber security risks associated
with a BES Cyber System’s
electronic interconnectivity
and interoperability with
other Cyber Assets, including
Transient Cyber Assets, and
with Removable Media.
Measures
Examples of evidence may include,
but are not limited to, training
material such as power point
presentations, instructor notes,
student notes, handouts, or other
training materials.
Page 8 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
CIP‐004‐67 Table R2 – Cyber Security Training Program
Part
Applicable Systems
2.2
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Requirements
Measures
Require completion of the training
specified in Part 2.1 prior to granting
authorized electronic access and
authorized unescorted physical access
to applicable Cyber Assets, except
during CIP Exceptional Circumstances.
Examples of evidence may include,
but are not limited to, training
records and documentation of when
CIP Exceptional Circumstances were
invoked.
Require completion of the training
specified in Part 2.1 at least once
every 15 calendar months.
Examples of evidence may include,
but are not limited to, dated
individual training records.
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
2.3
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 2
August 2020
Page 9 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
R3. Each Responsible Entity shall implement one or more documented personnel risk assessment program(s) to attain and
retain authorized electronic or authorized unescorted physical access to BES Cyber Systems that collectively include each of
the applicable requirement parts in CIP‐004‐67 Table R3 – Personnel Risk Assessment Program. [Violation Risk Factor:
Medium] [Time Horizon: Operations Planning].
M3. Evidence must include the documented personnel risk assessment programs that collectively include each of the applicable
requirement parts in CIP‐004‐67 Table R3 – Personnel Risk Assessment Program and additional evidence to demonstrate
implementation of the program(s).
CIP‐004‐67 Table R3 – Personnel Risk Assessment Program
Part
3.1
Applicable Systems
Requirements
High Impact BES Cyber Systems and their Process to confirm identity.
associated:
1. EACMS; and
2. PACS
Measures
An example of evidence may
include, but is not limited to,
documentation of the Responsible
Entity’s process to confirm identity.
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Draft 2
August 2020
Page 10 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
CIP‐004‐6 Table R3 – Personnel Risk Assessment Program
Part
3.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 2
August 2020
Requirements
Measures
Process to perform a seven year
criminal history records check as part of
each personnel risk assessment that
includes:
An example of evidence may include,
but is not limited to, documentation of
the Responsible Entity’s process to
perform a seven year criminal history
3.2.1. current residence, regardless of records check.
duration; and
3.2.2. other locations where, during
the seven years immediately prior to
the date of the criminal history
records check, the subject has resided
for six consecutive months or more.
If it is not possible to perform a full
seven year criminal history records
check, conduct as much of the seven
year criminal history records check as
possible and document the reason the
full seven year criminal history records
check could not be performed.
Page 11 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
CIP‐004‐6 Table R3 – Personnel Risk Assessment Program
Part
3.3
Applicable Systems
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Requirements
Measures
Criteria or process to evaluate criminal
history records checks for authorizing
access.
An example of evidence may
include, but is not limited to,
documentation of the
Responsible Entity’s process to
evaluate criminal history records
checks.
Criteria or process for verifying that
personnel risk assessments performed for
contractors or service vendors are
conducted according to Parts 3.1 through
3.3.
An example of evidence may
include, but is not limited to,
documentation of the
Responsible Entity’s criteria or
process for verifying contractors
or service vendors personnel risk
assessments.
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
3.4
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Draft 2
August 2020
Page 12 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
CIP‐004‐6 Table R3 – Personnel Risk Assessment Program
Part
3.5
Applicable Systems
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Requirements
Measures
Process to ensure that individuals with
authorized electronic or authorized
unescorted physical access have had a
personnel risk assessment completed
according to Parts 3.1 to 3.4 within the last
seven years.
An example of evidence may
include, but is not limited to,
documentation of the
Responsible Entity’s process for
ensuring that individuals with
authorized electronic or
authorized unescorted physical
access have had a personnel risk
assessment completed within the
last seven years.
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Draft 2
August 2020
Page 13 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
R4. Each Responsible Entity shall implement one or more documented access management program(s) that collectively include
each of the applicable requirement parts in CIP‐004‐67 Table R4 – Access Management Program. [Violation Risk Factor:
Medium] [Time Horizon: Operations Planning and Same Day Operations].
M4. Evidence must include the documented processes that collectively include each of the applicable requirement parts in CIP‐
004‐67 Table R4 – Access Management Program and additional evidence to demonstrate that the access management
program was implemented as described in the Measures column of the table.
CIP‐004‐67 Table R4 – Access Management Program
Part
Applicable Systems
4.1
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Process to authorize based on need, as
determined by the Responsible Entity,
except for CIP Exceptional
Circumstances:
4.1.1. Electronic access; and
4.1.2. Unescorted physical access into a
Physical Security Perimeter; and
4.1.3. Access to designated storage
locations, whether physical or
electronic, for BES Cyber System
Information.
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Draft 2
August 2020
Requirements
Measures
An example of evidence may
include, but is not limited to, dated
documentation of the process to
authorize electronic access and,
unescorted physical access in a
Physical Security Perimeter, and
access to designated storage
locations, whether physical or
electronic, for BES Cyber System
Information.
Page 14 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
CIP‐004‐6 Table R4 – Access Management Program
Part
Applicable Systems
Requirements
4.2
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Verify at least once each calendar
quarter that individuals with active
electronic access or unescorted physical
access have authorization records.
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Draft 2
August 2020
Measures
Examples of evidence may include,
but are not limited to:
Dated documentation of the
verification between the system
generated list of individuals who
have been authorized for access
(i.e., workflow database) and a
system generated list of
personnel who have access (i.e.,
user account listing), or
Dated documentation of the
verification between a list of
individuals who have been
authorized for access (i.e.,
authorization forms) and a list
of individuals provisioned for
access (i.e., provisioning forms
or shared account listing).
Page 15 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
CIP‐004‐6 Table R4 – Access Management Program
Part
Applicable Systems
Requirements
4.3
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
For electronic access, verify at least once
every 15 calendar months that all user
accounts, user account groups, or user
role categories, and their specific,
associated privileges are correct and are
those that the Responsible Entity
determines are necessary.
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Measures
An example of evidence may
include, but is not limited to,
documentation of the review that
includes all of the following:
1. A dated listing of all
accounts/account groups or
roles within the system;
2. A summary description of
privileges associated with
each group or role;
3. Accounts assigned to the
group or role; and
4. Dated evidence showing
verification of the privileges
for the group are authorized
and appropriate to the work
function performed by
people assigned to each
account.
Draft 2
August 2020
Page 16 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
CIP‐004‐6 Table R4 – Access Management Program
Part
Applicable Systems
Requirements
4.4
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Verify at least once every 15 calendar
months that access to the designated
storage locations for BES Cyber System
Information, whether physical or
electronic, are correct and are those that
the Responsible Entity determines are
necessary for performing assigned work
functions.
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
0. EACMS; and
0. PACS
Measures
An example of evidence may
include, but is not limited to, the
documentation of the review that
includes all of the following:
0. A dated listing of
authorizations for BES Cyber
System information;
0. Any privileges associated
with the authorizations; and
0. Dated evidence showing a
verification of the
authorizations and any
privileges were confirmed
correct and the minimum
necessary for performing
assigned work functions.
Draft 2
August 2020
Page 17 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
R5. Each Responsible Entity shall implement one or more documented access revocation program(s) that collectively include
each of the applicable requirement parts in CIP‐004‐67 Table R5 – Access Revocation. [Violation Risk Factor: Medium] [Time
Horizon: Same Day Operations and Operations Planning].
M5. Evidence must include each of the applicable documented programs that collectively include each of the applicable
requirement parts in CIP‐004‐67 Table R5 – Access Revocation and additional evidence to demonstrate implementation as
described in the Measures column of the table.
CIP‐004‐67 Table R5 – Access Revocation
Part
5.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 2
August 2020
Requirements
Measures
An example of evidence may include,
A process to initiate removal of an
but is not limited to, documentation of
individual’s ability for unescorted
physical access and Interactive Remote all of the following:
Access upon a termination action, and
1. Dated workflow or sign‐off form
complete the removals within 24 hours
verifying access removal
of the termination action (Removal of
associated with the termination
the ability for access may be different
action; and
than deletion, disabling, revocation, or
2. Logs or other demonstration
removal of all access rights).
showing such persons no longer
have access.
Page 18 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
CIP‐004‐6 Table R5 – Access Revocation
Part
5.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 2
August 2020
Requirements
Measures
For reassignments or transfers, revoke
the individual’s authorized electronic
access to individual accounts and
authorized unescorted physical access
that the Responsible Entity determines
are not necessary by the end of the
next calendar day following the date
that the Responsible Entity determines
that the individual no longer requires
retention of that access.
An example of evidence may include,
but is not limited to, documentation of
all of the following:
1. Dated workflow or sign‐off form
showing a review of logical and
physical access; and
2. Logs or other demonstration
showing such persons no longer
have access that the
Responsible Entity determines
is not necessary.
Page 19 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
CIP‐004‐6 Table R5 – Access Revocation
Part
5.3
Applicable Systems
High Impact BES Cyber Systems and
their associated:
0. EACMS; and
0. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
0. EACMS; and
0. PACS
Draft 2
August 2020
Requirements
Measures
For termination actions, revoke the
individual’s access to the designated
storage locations for BES Cyber System
Information, whether physical or
electronic (unless already revoked
according to Requirement R5.1), by the
end of the next calendar day following
the effective date of the termination
action.
An example of evidence may include,
but is not limited to, workflow or sign‐
off form verifying access removal to
designated physical areas or cyber
systems containing BES Cyber System
Information associated with the
terminations and dated within the next
calendar day of the termination action.
Page 20 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
CIP‐004‐67 Table R5 – Access Revocation
Part
5.43
Applicable Systems
High Impact BES Cyber Systems and
their associated:
EACMS
Draft 2
August 2020
Requirements
For termination actions, revoke the
individual’s non‐shared user accounts
(unless already revoked according to
Parts 5.1 or 5.3) within 30 calendar
days of the effective date of the
termination action.
Measures
An example of evidence may include,
but is not limited to, workflow or sign‐
off form showing access removal for
any individual BES Cyber Assets and
software applications as determined
necessary to completing the revocation
of access and dated within thirty
calendar days of the termination
actions.
Page 21 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
CIP‐004‐76 Table R5 – Access Revocation
Part
Applicable Systems
5.54 High Impact BES Cyber Systems and
their associated:
EACMS
Requirements
Measures
For termination actions, change
Examples of evidence may include, but
passwords for shared account(s) known are not limited to:
to the user within 30 calendar days of
Workflow or sign‐off form
the termination action. For
showing password reset within
reassignments or transfers, change
30 calendar days of the
passwords for shared account(s) known
termination;
to the user within 30 calendar days
Workflow or sign‐off form
following the date that the Responsible
showing password reset within
Entity determines that the individual no
30 calendar days of the
longer requires retention of that
reassignments or transfers; or
access.
Documentation of the
extenuating operating
If the Responsible Entity determines
circumstance and workflow or
and documents that extenuating
sign‐off form showing password
operating circumstances require a
reset within 10 calendar days
longer time period, change the
following the end of the
password(s) within 10 calendar days
operating circumstance.
following the end of the operating
circumstances.
Draft 2
August 2020
Page 22 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
R6. Each Responsible Entity shall implement one or more documented access management program(s) for BES Cyber System
Information that collectively include each of the applicable requirement parts in CIP‐004‐7 Table R6 – Access Management
for BES Cyber System Information. [Violation Risk Factor: Medium] [Time Horizon: Same Day Operations and Operations
Planning].
M6. Evidence must include each of the applicable documented programs that collectively include the applicable requirement
parts in CIP‐004‐7 Table R6 – Access Management for BES Cyber System Information and additional evidence to
demonstrate implementation as described in the Measures column of the table.
CIP‐004‐7 Table R6 – Access Management for BES Cyber System Information
Part
6.1
Applicability
BCSI associated with:
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Requirements
Authorize provisioning of access to
BCSI based on need, as determined by
the Responsible Entity, except for CIP
Exceptional Circumstances.
Measures
Examples of evidence may include, but
are not limited to, the following:
Dated authorization records for
provisioned access to BCSI based
on need; or
List of authorized individuals
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 2
August 2020
Page 23 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
CIP‐004‐7 Table R6 – Access Management for BES Cyber System Information
Part
6.2
Applicability
BCSI associated with:
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Requirements
Verify at least once every 15 calendar
months that all provisioned access to
BCSI:
Measures
Examples of evidence may include, but
are not limited to, all of the following:
6.2.1. Is authorized; and
6.2.2. Is appropriate based on need, as
determined by the Responsible Entity.
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
List of authorized individuals; and
List of individuals who have been
provisioned access; and
List of privileges associated with
the authorizations; and
List of privileges associated with
the provisioned access; and
Dated documentation of the 15‐
calendar‐month verification; and
Documented reconciliation
actions, if any.
6.3
BCSI associated with:
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
For termination actions, remove the
individual’s ability to use provisioned
access to BCSI (unless already revoked
according to Part 5.1) by the end of the
next calendar day following the
effective date of the termination
action.
Examples of dated evidence may
include, but are not limited to, access
revocation records associated with the
terminations and dated within the next
calendar day of the termination action.
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 2
August 2020
Page 24 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
C. Compliance
1. Compliance Monitoring Process:
1.1. Compliance Enforcement Authority: “Compliance Enforcement Authority” (CEA)
means NERC or the Regional Entity, or any entity as otherwise designated by an
Applicable Governmental Authority, in their respective roles of monitoring and/or
enforcing compliance with mandatory and enforceable Reliability Standards in their
respective jurisdictions.
As defined in the NERC Rules of Procedure, “Compliance Enforcement Authority” (CEA)
means NERC or the Regional Entity in their respective roles of monitoring and enforcing
compliance with the NERC Reliability Standards.
1.3.1.2.
Evidence Retention: The following evidence retention period(s) identify
the period of time an entity is required to retain specific evidence to demonstrate
compliance. For instances where the evidence retention period specified below is
shorter than the time since the last audit, the Compliance Enforcement Authority may
ask an entity to provide other evidence to show that it was compliant for the full time
period since the last audit.
The following evidence retention periods identify the period of time an entity is
required to retain specific evidence to demonstrate compliance. For instances where
the evidence retention period specified below is shorter than the time since the last
audit, the CEA may ask an entity to provide other evidence to show that it was
compliant for the full time period since the last audit.
The Responsible Eapplicable entity shall keep data or evidence to show compliance as
identified below unless directed by its CEA Compliance Enforcement Authority to retain
specific evidence for a longer period of time as part of an investigation:
Each The Responsible Eapplicable entity shall retain evidence of each requirement in
this standard for three calendar years.
If an Responsible Eapplicable entity is found non‐compliant, it shall keep information
related to the non‐compliance until mitigation is complete and approved or for the
time specified above, whichever is longer.
The Compliance Enforcement AuthorityCEA shall keep the last audit records and all
requested and submitted subsequent audit records.
1.4.1.3.
Compliance Monitoring and Assessment Processes: As defined in the
NERC Rules of Procedure, “Compliance Monitoring and Enforcement Program” refers
to the identification of the processes that will be used to evaluate data or information
for the purpose of assessing performance or outcomes with the associated Reliability
Standard.
Compliance Audits
Self‐Certifications
Spot Checking
Compliance Violation Investigations
Draft 2
July 2020 Page 25 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
Self‐Reporting
Complaints
1.5. Additional Compliance Information:
None
Draft 2
July 2020 Page 26 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
2. Table of Compliance Elements
R #
Time
Horizon
R1
R2
Operations
Planning
Operations
Planning
VRF
Violation Severity Levels (CIP‐004‐67)
Lower VSL
Lower
Lower
Moderate VSL
High VSL
Severe VSL
The
Responsible
Entity did not
reinforce cyber
security
practices
during a
calendar
quarter but did
so less than 10
calendar days
after the start
of a
subsequent
calendar
quarter. (1.1)
The Responsible Entity
did not reinforce cyber
security practices during
a calendar quarter but
did so between 10 and
30 calendar days after
the start of a
subsequent calendar
quarter. (1.1)
The Responsible Entity
did not reinforce cyber
security practices during
a calendar quarter but
did so within the
subsequent quarter but
beyond 30 calendar
days after the start of
that calendar quarter.
(1.1)
The Responsible Entity
did not document or
implement any security
awareness process(es)
to reinforce cyber
security practices. (R1)
The
Responsible
Entity
implemented a
cyber security
training
program but
failed to
include one of
the training
The Responsible Entity
implemented a cyber
security training
program but failed to
include two of the
training content topics
in Requirement Parts
2.1.1 through 2.1.9.
(2.1)
The Responsible Entity
implemented a cyber
security training
program but failed to
include three of the
training content topics
in Requirement Parts
2.1.1 through 2.1.9.
(2.1)
The Responsible Entity
did not implement a
cyber security training
program appropriate to
individual roles,
functions, or
responsibilities. (R2)
OR
OR
OR
The Responsible Entity
did not reinforce cyber
security practices and
associated physical
security practices for at
least two consecutive
calendar quarters. (1.1)
OR
Draft 2
August 2020 Page 27 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐004‐67)
Lower VSL
content topics
in Requirement
Parts 2.1.1
through 2.1.9.
(2.1)
Moderate VSL
The Responsible Entity
implemented a cyber
security training
program but failed to
train two individuals
OR
(with the exception of
CIP Exceptional
The
Circumstances) prior to
Responsible
their being granted
Entity
implemented a authorized electronic
cyber security and authorized
unescorted physical
training
access. (2.2)
program but
OR
failed to train
one individual
(with the
The Responsible Entity
exception of
implemented a cyber
CIP Exceptional security training
Circumstances) program but failed to
prior to their
train two individuals
being granted with authorized
authorized
electronic or authorized
electronic and unescorted physical
authorized
access within 15
unescorted
calendar months of the
physical access.
previous training
(2.2)
completion date. (2.3)
High VSL
The Responsible Entity
implemented a cyber
security training
program but failed to
train three individuals
(with the exception of
CIP Exceptional
Circumstances) prior to
their being granted
authorized electronic
and authorized
unescorted physical
access. (2.2)
Severe VSL
The Responsible Entity
implemented a cyber
security training
program but failed to
include four or more of
the training content
topics in Requirement
Parts 2.1.1 through
2.1.9. (2.1)
OR
The Responsible Entity
implemented a cyber
security training
OR
program but failed to
The Responsible Entity train four or more
implemented a cyber
individuals (with the
security training
exception of CIP
program but failed to
Exceptional
train three individuals
Circumstances) prior to
with authorized
their being granted
electronic or authorized authorized electronic
unescorted physical
and authorized
access within 15
unescorted physical
calendar months of the access. (2.2)
previous training
OR
completion date. (2.3)
Draft 2
August 2020 Page 28 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐004‐67)
Lower VSL
Moderate VSL
High VSL
The Responsible Entity
implemented a cyber
security training
program but failed to
train four or more
individuals with
authorized electronic or
authorized unescorted
physical access within
15 calendar months of
the previous training
completion date. (2.3)
OR
The
Responsible
Entity
implemented a
cyber security
training
program but
failed to train
one individual
with authorized
electronic or
authorized
unescorted
physical access
within 15
calendar
months of the
previous
training
completion
date. (2.3)
R3
Operations
Planning
Medium
The
Responsible
Entity has a
program for
conducting
Severe VSL
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments (PRAs)
for individuals, including
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments (PRAs)
for individuals, including
The Responsible Entity
did not have all of the
required elements as
described by 3.1
through 3.4 included
Draft 2
August 2020 Page 29 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐004‐67)
Lower VSL
Personnel Risk
Assessments
(PRAs) for
individuals,
including
contractors and
service
vendors, but
did not conduct
the PRA as a
condition of
granting
authorized
electronic or
authorized
unescorted
physical access
for one
individual. (R3)
OR
The
Responsible
Entity did
conduct
Personnel Risk
Assessments
(PRAs) for
individuals,
Moderate VSL
contractors and service
vendors, but did not
conduct the PRA as a
condition of granting
authorized electronic or
authorized unescorted
physical access for two
individuals. (R3)
High VSL
contractors and service
vendors, but did not
conduct the PRA as a
condition of granting
authorized electronic or
authorized unescorted
physical access for three
individuals. (R3)
OR
OR
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not confirm identity for
two individuals. (3.1 &
3.4)
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not confirm identity for
three individuals. (3.1 &
3.4)
OR
OR
The Responsible Entity
has a process to
perform seven‐year
criminal history record
checks for individuals,
The Responsible Entity
has a process to
perform seven‐year
criminal history record
checks for individuals,
Severe VSL
within documented
program(s) for
implementing Personnel
Risk Assessments
(PRAs), for individuals,
including contractors
and service vendors, for
obtaining and retaining
authorized cyber or
authorized unescorted
physical access. (R3)
OR
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, but did not
conduct the PRA as a
condition of granting
authorized electronic or
authorized unescorted
physical access for four
or more individuals. (R3)
OR
Draft 2
August 2020 Page 30 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐004‐67)
Lower VSL
including
contractors and
service
vendors, with
authorized
electronic or
authorized
unescorted
physical access
but did not
confirm
identity for one
individual. (3.1
& 3.4)
OR
Moderate VSL
including contractors
and service vendors,
with authorized
electronic or authorized
unescorted physical
access but did not
include the required
checks described in
3.2.1 and 3.2.2 for two
individuals. (3.2 & 3.4)
High VSL
including contractors
and service vendors,
with authorized
electronic or authorized
unescorted physical
access but did not
include the required
checks described in
3.2.1 and 3.2.2 for three
individuals. (3.2 & 3.4)
OR
OR
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not evaluate criminal
history records check
for access authorization
for two individuals. (3.3
& 3.4)
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not evaluate criminal
history records check
for access authorization
for three individuals.
(3.3 & 3.4)
The
Responsible
Entity has a
process to
perform seven‐
year criminal
history record
checks for
individuals,
including
contractors and OR
service
vendors, with
OR
Severe VSL
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not confirm identity for
four or more
individuals. (3.1 & 3.4)
OR
The Responsible Entity
has a process to
perform seven‐year
criminal history record
checks for individuals,
including contractors
and service vendors,
with authorized
electronic or authorized
unescorted physical
access but did not
include the required
checks described in
3.2.1 and 3.2.2 for four
Draft 2
August 2020 Page 31 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐004‐67)
Lower VSL
authorized
electronic or
authorized
unescorted
physical access
but did not
include the
required
checks
described in
3.2.1 and 3.2.2
for one
individual. (3.2
& 3.4)
OR
The
Responsible
Entity did
conduct
Personnel Risk
Assessments
(PRAs) for
individuals,
including
contractors and
service
vendors, with
authorized
Moderate VSL
High VSL
The Responsible Entity The Responsible Entity
did not conduct
did not conduct
Personnel Risk
Personnel Risk
Assessments (PRAs) for Assessments (PRAs) for
three individuals with
two individuals with
authorized electronic or
authorized electronic or
authorized unescorted authorized unescorted
physical access within 7 physical access within 7
calendar years of the
calendar years of the
previous PRA
previous PRA
completion date. (3.5)
completion date. (3.5)
Severe VSL
or more individuals. (3.2
& 3.4)
OR
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not evaluate criminal
history records check
for access authorization
for four or more
individuals. (3.3 & 3.4)
OR
The Responsible Entity
did not conduct
Personnel Risk
Assessments (PRAs) for
four or more individuals
with authorized
electronic or authorized
unescorted physical
access within 7 calendar
Draft 2
August 2020 Page 32 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐004‐67)
Lower VSL
electronic or
authorized
unescorted
physical access
but did not
evaluate
criminal history
records check
for access
authorization
for one
individual. (3.3
& 3.4)
Moderate VSL
High VSL
Severe VSL
years of the previous
PRA completion date.
(3.5)
OR
The
Responsible
Entity did not
conduct
Personnel Risk
Assessments
(PRAs) for one
individual with
authorized
electronic or
authorized
unescorted
physical access
within 7
Draft 2
August 2020 Page 33 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
R #
R4
Time
Horizon
VRF
Operations
Planning
and Same
Day
Operations
Medium
Violation Severity Levels (CIP‐004‐67)
Lower VSL
calendar years
of the previous
PRA
completion
date. (3.5)
The
Responsible
Entity did not
verify that
individuals with
active
electronic or
active
unescorted
physical access
have
authorization
records during
a calendar
quarter but did
so less than 10
calendar days
after the start
of a
subsequent
calendar
quarter. (4.2)
Moderate VSL
High VSL
Severe VSL
The Responsible Entity
did not verify that
individuals with active
electronic or active
unescorted physical
access have
authorization records
during a calendar
quarter but did so
between 10 and 20
calendar days after the
start of a subsequent
calendar quarter. (4.2)
OR
The Responsible Entity
did not verify that
individuals with active
electronic or active
unescorted physical
access have
authorization records
during a calendar
quarter but did so
between 20 and 30
calendar days after the
start of a subsequent
calendar quarter. (4.2)
OR
The Responsible Entity
has implemented
processes to verify that
user accounts, user
account groups, or user
role categories, and
their specific, associated
privileges are correct
The Responsible Entity
has implemented
processes to verify that
user accounts, user
account groups, or user
role categories, and
their specific, associated
privileges are correct
The Responsible Entity
did not implement any
documented program(s)
for access management.
(R4)
OR
The Responsible Entity
has not implemented
one or more
documented program(s)
for access management
that includes a process
to authorize electronic
access, or unescorted
physical access, or
access to the designated
storage locations where
BES Cyber System
Information is located.
(4.1)
Draft 2
August 2020 Page 34 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐004‐67)
Lower VSL
Moderate VSL
and necessary within 15
OR
calendar months of the
The
previous verification but
Responsible
for more than 5% but
Entity has
less than (or equal to)
implemented
10% of its BES Cyber
processes to
verify that user Systems, privileges were
accounts, user incorrect or
unnecessary. (4.3)
account
groups, or user
role categories, OR
and their
The Responsible Entity
has implemented
specific,
associated
processes to verify that
privileges are
access to the designated
correct and
storage locations for
necessary
BES Cyber System
within 15
Information is correct
calendar
and necessary within 15
months of the calendar months of the
previous
previous verification but
verification but for more than 5% but
for 5% or less
less than (or equal to)
of its BES Cyber 10% of its BES Cyber
Systems,
System Information
privileges were storage locations,
privileges were
incorrect or
High VSL
and necessary within 15
calendar months of the
previous verification but
for more than 10% but
less than (or equal to)
15% of its BES Cyber
Systems, privileges were
incorrect or
unnecessary. (4.3)
OR
The Responsible Entity
has implemented
processes to verify that
access to the designated
storage locations for
BES Cyber System
Information is correct
and necessary within 15
calendar months of the
previous verification but
for more than 10% but
less than (or equal to)
15% of its BES Cyber
System Information
storage locations,
privileges were
Severe VSL
OR
The Responsible Entity
did not verify that
individuals with active
electronic or active
unescorted physical
access have
authorization records
for at least two
consecutive calendar
quarters. (4.2)
OR
The Responsible Entity
has implemented
processes to verify that
user accounts, user
account groups, or user
role categories, and
their specific, associated
privileges are correct
and necessary within 15
calendar months of the
previous verification but
for more than 15% of its
BES Cyber Systems,
privileges were
Draft 2
August 2020 Page 35 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐004‐67)
Lower VSL
unnecessary.
(4.3)
OR
The
Responsible
Entity has
implemented
processes to
verify that
access to the
designated
storage
locations for
BES Cyber
System
Information is
correct and
necessary
within 15
calendar
months of the
previous
verification but
for 5% or less
of its BES Cyber
System
Information
storage
Moderate VSL
incorrect or
unnecessary. (4.4)
High VSL
incorrect or
unnecessary. (4.4)
Severe VSL
incorrect or
unnecessary. (4.3)
OR
The Responsible Entity
has implemented
processes to verify that
access to the designated
storage locations for
BES Cyber System
Information is correct
and necessary within 15
calendar months of the
previous verification but
for more than 15% of its
BES Cyber System
Information storage
locations, privileges
were incorrect or
unnecessary. (4.4)
Draft 2
August 2020 Page 36 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
R #
R5
Time
Horizon
VRF
Same Day
Operations
Medium
and
Operations
Planning
Violation Severity Levels (CIP‐004‐67)
Lower VSL
locations,
privileges were
incorrect or
unnecessary.
(4.4)
The
Responsible
Entity has
implemented
one or more
process(es) to
revoke the
individual’s
access to the
designated
storage
locations for
BES Cyber
System
Information
but, for one
individual, did
not do so by
the end of the
next calendar
day following
the effective
date and time
Moderate VSL
The Responsible Entity
has implemented one or
more process(es) to
remove the ability for
unescorted physical
access and Interactive
Remote Access upon a
termination action or
complete the removal
within 24 hours of the
termination action but
did not initiate those
removals for one
individual. (5.1)
OR
The Responsible Entity
has implemented one or
more process(es) to
determine that an
individual no longer
requires retention of
High VSL
The Responsible Entity
has implemented one or
more process(es) to
remove the ability for
unescorted physical
access and Interactive
Remote Access upon a
termination action or
complete the removal
within 24 hours of the
termination action but
did not initiate those
removals for two
individuals. (5.1)
OR
The Responsible Entity
has implemented one or
more process(es) to
determine that an
individual no longer
requires retention of
Severe VSL
The Responsible Entity
has not implemented
any documented
program(s) for access
revocation for electronic
access or , unescorted
physical access, or BES
Cyber System
Information storage
locations. (R5)
OR
The Responsible Entity
has implemented one or
more process(es) to
remove the ability for
unescorted physical
access and Interactive
Remote Access upon a
termination action or
complete the removal
within 24 hours of the
termination action but
did not initiate those
Draft 2
August 2020 Page 37 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐004‐67)
Lower VSL
of the
termination
action. (5.3)
OR
The
Responsible
Entity has
implemented
one or more
process(es) to
revoke the
individual’s
user accounts
upon
termination
action but did
not do so for
within 30
calendar days
of the date of
termination
action for one
or more
individuals.
(5.43)
OR
The
Responsible
Moderate VSL
access following
reassignments or
transfers but, for one
individual, did not
revoke the authorized
electronic access to
individual accounts and
authorized unescorted
physical access by the
end of the next calendar
day following the
predetermined date.
(5.2)
OR
High VSL
access following
reassignments or
transfers but, for two
individuals, did not
revoke the authorized
electronic access to
individual accounts and
authorized unescorted
physical access by the
end of the next calendar
day following the
predetermined date.
(5.2)
OR
Severe VSL
removals for three or
more individuals. (5.1)
OR
The Responsible Entity
has implemented one or
more process(es) to
determine that an
individual no longer
requires retention of
access following
reassignments or
transfers but, for three
or more individuals, did
not revoke the
The Responsible Entity The Responsible Entity authorized electronic
has implemented one or has implemented one or access to individual
more process(es) to
more process(es) to
accounts and authorized
revoke the individual’s
revoke the individual’s
unescorted physical
access to the designated access to the designated access by the end of the
next calendar day
storage locations for
storage locations for
BES Cyber System
BES Cyber System
following the
Information but, for two Information but, for
predetermined date.
(5.2)
individuals, did not do
three or more
so by the end of the
individuals, did not do
next calendar day
so by the end of the
following the effective
next calendar day
date and time of the
following the effective
Draft 2
August 2020 Page 38 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐004‐67)
Lower VSL
Moderate VSL
termination action.
Entity has
implemented
(5.3)
one or more
process(es) to
change
passwords for
shared
accounts
known to the
user upon
termination
action,
reassignment,
or transfer, but
did not do so
for within 30
calendar days
of the date of
termination
action,
reassignment,
or transfer for
one or more
individuals.
(5.54)
High VSL
date and time of the
termination action. (5.3)
Severe VSL
OR
The
Responsible
Draft 2
August 2020 Page 39 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐004‐67)
Lower VSL
Entity has
implemented
one or more
process(es) to
determine and
document
extenuating
operating
circumstances
following a
termination
action,
reassignment,
or transfer, but
did not change
one or more
passwords for
shared
accounts
known to the
user within 10
calendar days
following the
end of the
extenuating
operating
circumstances.
(5.54)
Moderate VSL
High VSL
Severe VSL
Draft 2
August 2020 Page 40 of 51
CIP‐004‐67 — Cyber Security – Personnel & Training
R #
R6
Time
Horizon
VRF
Same Day
Operations
Medium
and
Operations
Planning
Violation Severity Levels (CIP‐004‐67)
Lower VSL
The
Responsible
Entity
implemented
one or more
documented
access
management
program(s) for
BCSI but did
not implement
one of the
applicable
items for Parts
6.1 through
6.3. (R6)
Moderate VSL
The Responsible Entity
implemented one or
more documented
access management
program(s) for BCSI but
did not implement two
of the applicable items
for Parts 6.1 through
6.3. (R6)
High VSL
The Responsible Entity
implemented one or
more documented
access management
program(s) for BCSI but
did not implement three
of the applicable items
Parts 6.1 through 6.3.
(R6)
Severe VSL
The Responsible Entity
did not implement one
or more documented
access management
program(s) for BCSI.
(R6)
Draft 2
August 2020 Page 41 of 51
Guidelines and Technical Basis
D. Regional Variances
None.
E. Interpretations
None.
F. Associated Documents
None.
Version History
Version
Date
Action
Change Tracking
1
1/16/06
R3.2 — Change “Control Center” to
“control center.”
2
9/30/09
Modifications to clarify the
requirements and to bring the
compliance elements into conformance
with the latest guidelines for developing
compliance elements of standards.
3/24/06
Removal of reasonable business
judgment.
Replaced the RRO with the RE as a
responsible entity.
Rewording of Effective Date.
Changed compliance monitor to
Compliance Enforcement Authority.
3
12/16/09
Updated Version Number from ‐2 to ‐3
In Requirement 1.6, deleted the
sentence pertaining to removing
component or system from service in
order to perform testing, in response to
FERC order issued September 30, 2009.
3
12/16/09
3
3/31/10
4
1/24/11
Approved by the NERC Board of
Trustees.
Approved by FERC.
Approved by the NERC Board of
Trustees.
Draft 2
August 2020 Page 42 of 51
Guidelines and Technical Basis
Version
Date
Action
Change Tracking
5
11/26/12
Adopted by the NERC Board of
Trustees.
5
11/22/13
FERC Order issued approving CIP‐004‐5.
5.1
9/30/13
Modified two VSLs in R4
Errata
6
11/13/14
Adopted by the NERC Board of
Trustees.
Addressed two
FERC directives
from Order No.
791 related to
identify, assess,
and correct
language and
communication
networks.
6
2/12/15
Adopted by the NERC Board of
Trustees.
Replaces the
version adopted
by the Board on
11/13/2014.
Revised version
addresses
remaining
directives from
Order No. 791
related to
transient devices
and low impact
BES Cyber
Systems.
6
1/21/16
7
TBD
FERC order issued approving CIP‐004‐6.
Docket No. RM15‐14‐000
Adopted by the NERC Board of Trustees Revised to
enhance BES
reliability for
entities to
manage their
BCSI.
Modified to
coordinate with
other CIP
standards and to
revise format to
use RBS
Template.
Draft 2
August 2020 Page 43 of 51
Guidelines and Technical Basis
Note: The Guidelines and Technical Basis section has not been revised as part of Project 2019‐
02. A separate technical rationale document has been created to cover Project 2019‐02
revisions. Future edits to this section will be conducted through the Technical Rationale for
Reliability Standards Project and the Standards Drafting Process.
Guidelines and Technical Basis
Section 4 – Scope of Applicability of the CIP Cyber Security Standards
Section “4. Applicability” of the standards provides important information for Responsible
Entities to determine the scope of the applicability of the CIP Cyber Security Requirements.
Section “4.1. Functional Entities” is a list of NERC functional entities to which the standard
applies. If the entity is registered as one or more of the functional entities listed in Section
4.1, then the NERC CIP Cyber Security Standards apply. Note that there is a qualification in
Section 4.1 that restricts the applicability in the case of Distribution Providers to only those
that own certain types of systems and equipment listed in 4.2.
Section “4.2. Facilities” defines the scope of the Facilities, systems, and equipment owned by
the Responsible Entity, as qualified in Section 4.1, that is subject to the requirements of the
standard. As specified in the exemption section 4.2.3.5, this standard does not apply to
Responsible Entities that do not have High Impact or Medium Impact BES Cyber Systems
under CIP‐002‐5.1’s categorization. In addition to the set of BES Facilities, Control Centers,
and other systems and equipment, the list includes the set of systems and equipment owned
by Distribution Providers. While the NERC Glossary term “Facilities” already includes the BES
characteristic, the additional use of the term BES here is meant to reinforce the scope of
applicability of these Facilities where it is used, especially in this applicability scoping section.
This in effect sets the scope of Facilities, systems, and equipment that is subject to the
standards.
Requirement R1:
The security awareness program is intended to be an informational program, not a formal
training program. It should reinforce security practices to ensure that personnel maintain
awareness of best practices for both physical and electronic security to protect its BES Cyber
Systems. The Responsible Entity is not required to provide records that show that each
individual received or understood the information, but they must maintain documentation of
the program materials utilized in the form of posters, memos, and/or presentations.
Examples of possible mechanisms and evidence, when dated, which can be used are:
Direct communications (e.g., emails, memos, computer based training, etc.);
Indirect communications (e.g., posters, intranet, brochures, etc.);
Draft 2
August 2020 Page 44 of 51
Guidelines and Technical Basis
Management support and reinforcement (e.g., presentations, meetings, etc.).
Requirement R2:
Training shall cover the policies, access controls, and procedures as developed for the BES
Cyber Systems and include, at a minimum, the required items appropriate to personnel roles
and responsibilities from Table R2. The Responsible Entity has the flexibility to define the
training program and it may consist of multiple modules and multiple delivery mechanisms,
but a single training program for all individuals needing to be trained is acceptable. The
training can focus on functions, roles or responsibilities at the discretion of the Responsible
Entity.
One new element in the training content is intended to encompass networking hardware and
software and other issues of electronic interconnectivity supporting the operation and
control of BES Cyber Systems as per FERC Order No. 706, Paragraph 434. Additionally,
training should address the risk posed when connecting and using Transient Cyber Assets and
Removable Media with BES Cyber Systems or within an Electronic Security Perimeter. As
noted in FERC Order No. 791, Paragraph 135, Transient Cyber Assets and Removable Media
have been the source of incidents where malware was introduced into electric generation
industrial control systems in real‐world situations. Training on their use is a key element in
protecting BES Cyber Systems. This is not intended to provide technical training to individuals
supporting networking hardware and software, but educating system users of the cyber
security risks associated with the interconnectedness of these systems. The users, based on
their function, role, or responsibility, should have a basic understanding of which systems can
be accessed from other systems and how the actions they take can affect cyber security.
Each Responsible Entity shall ensure all personnel who are granted authorized electronic
access and/or authorized unescorted physical access to its BES Cyber Systems, including
contractors and service vendors, complete cyber security training prior to their being granted
authorized access, except for CIP Exceptional Circumstances. To retain the authorized
accesses, individuals must complete the training at least one every 15 months.
Requirement R3:
Each Responsible Entity shall ensure a personnel risk assessment is performed for all
personnel who are granted authorized electronic access and/or authorized unescorted
physical access to its BES Cyber Systems, including contractors and service vendors, prior to
their being granted authorized access, except for program specified exceptional
circumstances that are approved by the single senior management official or their delegate
and impact the reliability of the BES or emergency response. Identity should be confirmed in
accordance with federal, state, provincial, and local laws, and subject to existing collective
bargaining unit agreements. Identity only needs to be confirmed prior to initially granting
access and only requires periodic confirmation according to the entity’s process during the
tenure of employment, which may or may not be the same as the initial verification action.
A seven year criminal history check should be performed for those locations where the
individual has resided for at least six consecutive months. This check should also be
performed in accordance with federal, state, provincial, and local laws, and subject to existing
Draft 2
August 2020 Page 45 of 51
Guidelines and Technical Basis
collective bargaining unit agreements. When it is not possible to perform a full seven year
criminal history check, documentation must be made of what criminal history check was
performed, and the reasons a full seven‐year check could not be performed. Examples of this
could include individuals under the age of 25 where a juvenile criminal history may be
protected by law, individuals who may have resided in locations from where it is not possible
to obtain a criminal history records check, violates the law or is not allowed under the
existing collective bargaining agreement. The Responsible Entity should consider the absence
of information for the full seven years when assessing the risk of granting access during the
process to evaluate the criminal history check. There needs to be a personnel risk assessment
that has been completed within the last seven years for each individual with access. A new
criminal history records check must be performed as part of the new PRA. Individuals who
have been granted access under a previous version of these standards need a new PRA within
seven years of the date of their last PRA. The clarifications around the seven year criminal
history check in this version do not require a new PRA be performed by the implementation
date.
Requirement R4:
Authorization for electronic and unescorted physical access and access to BES Cyber System
Information must be on the basis of necessity in the individual performing a work function.
Documentation showing the authorization should have some justification of the business
need included. To ensure proper segregation of duties, access authorization and provisioning
should not be performed by the same person where possible.
This requirement specifies both quarterly reviews and reviews at least once every 15 calendar
months. Quarterly reviews are to perform a validation that only authorized users have been
granted access to BES Cyber Systems. This is achieved by comparing individuals actually
provisioned to a BES Cyber System against records of individuals authorized to the BES Cyber
System. The focus of this requirement is on the integrity of provisioning access rather than
individual accounts on all BES Cyber Assets. The list of provisioned individuals can be an
automatically generated account listing. However, in a BES Cyber System with several
account databases, the list of provisioned individuals may come from other records such as
provisioning workflow or a user account database where provisioning typically initiates.
Draft 2
August 2020 Page 46 of 51
Guidelines and Technical Basis
The privilege review at least once every 15 calendar months is more detailed to ensure an
individual’s associated privileges are the minimum necessary to perform their work function
(i.e., least privilege). Entities can more efficiently perform this review by implementing role‐
based access. This involves determining the specific roles on the system (e.g., system
operator, technician, report viewer, administrator, etc.) then grouping access privileges to the
role and assigning users to the role. Role‐based access does not assume any specific software
and can be implemented by defining specific provisioning processes for each role where
access group assignments cannot be performed. Role‐based access permissions eliminate the
need to perform the privilege review on individual accounts. An example timeline of all the
reviews in Requirement R4 is included below.
Separation of duties should be considered when performing the reviews in Requirement R4.
The person reviewing should be different than the person provisioning access.
If the results of quarterly or at least once every 15 calendar months account reviews indicate
an administrative or clerical error in which access was not actually provisioned, then the SDT
intends that this error should not be considered a violation of this requirement.
For BES Cyber Systems that do not have user accounts defined, the controls listed in
Requirement R4 are not applicable. However, the Responsible Entity should document such
configurations.
Requirement R5:
The requirement to revoke access at the time of the termination action includes procedures
showing revocation of access concurrent with the termination action. This requirement
recognizes that the timing of the termination action may vary depending on the
circumstance. Some common scenarios and possible processes on when the termination
action occurs are provided in the following table. These scenarios are not an exhaustive list of
all scenarios, but are representative of several routine business practices.
Draft 2
August 2020 Page 47 of 51
Guidelines and Technical Basis
Scenario
Possible Process
Immediate involuntary
termination
Human resources or corporate security escorts the
individual off site and the supervisor or human resources
personnel notify the appropriate personnel to begin the
revocation process.
Scheduled involuntary
termination
Human resources personnel are notified of the termination
and work with appropriate personnel to schedule the
revocation of access at the time of termination.
Voluntary termination
Human resources personnel are notified of the termination
and work with appropriate personnel to schedule the
revocation of access at the time of termination.
Retirement where the last
Human resources personnel coordinate with manager to
working day is several weeks determine the final date access is no longer needed and
prior to the termination date schedule the revocation of access on the determined day.
Death
Human resources personnel are notified of the death and
work with appropriate personnel to begin the revocation
process.
Revocation of electronic access should be understood to mean a process with the end result
that electronic access to BES Cyber Systems is no longer possible using credentials assigned to
or known by the individual(s) whose access privileges are being revoked. Steps taken to
accomplish this outcome may include deletion or deactivation of accounts used by the
individual(s), but no specific actions are prescribed. Entities should consider the ramifications
of deleting an account may include incomplete event log entries due to an unrecognized
account or system services using the account to log on.
The initial revocation required in Requirement R5.1 includes unescorted physical access and
Interactive Remote Access. These two actions should prevent any further access by the
individual after termination. If an individual still has local access accounts (i.e., accounts on
the Cyber Asset itself) on BES Cyber Assets, then the Responsible Entity has 30 days to
complete the revocation process for those accounts. However, nothing prevents a
Responsible Entity from performing all of the access revocation at the time of termination.
For transferred or reassigned individuals, a review of access privileges should be performed.
This review could entail a simple listing of all authorizations for an individual and working
with the respective managers to determine which access will still be needed in the new
position. For instances in which the individual still needs to retain access as part of a
transitory period, the entity should schedule a time to review these access privileges or
include the privileges in the quarterly account review or annual privilege review.
Draft 2
August 2020 Page 48 of 51
Guidelines and Technical Basis
Revocation of access to shared accounts is called out separately to prevent the situation
where passwords on substation and generation devices are constantly changed due to staff
turnover.
Requirement 5.5 specified that passwords for shared account are to the changed within 30
calendar days of the termination action or when the Responsible Entity determines an
individual no longer requires access to the account as a result of a reassignment or transfer.
The 30 days applies under normal operating conditions. However, circumstances may occur
where this is not possible. Some systems may require an outage or reboot of the system in
order to complete the password change. In periods of extreme heat or cold, many
Responsible Entities may prohibit system outages and reboots in order to maintain reliability
of the BES. When these circumstances occur, the Responsible Entity must document these
circumstances and prepare to change the password within 10 calendar days following the end
of the operating circumstances. Records of activities must be retained to show that the
Responsible Entity followed the plan they created.
Rationale:
During development of this standard, text boxes were embedded within the standard to
explain the rationale for various parts of the standard. Upon BOT approval, the text from the
rationale text boxes was moved to this section.
Rationale for Requirement R1:
Ensures that Responsible Entities with personnel who have authorized electronic or
authorized unescorted physical access to BES Cyber Assets take action so that those
personnel with such authorized electronic or authorized unescorted physical access maintain
awareness of the Responsible Entity’s security practices.
Rationale for Requirement R2:
To ensure that the Responsible Entity’s training program for personnel who need authorized
electronic access and/or authorized unescorted physical access to BES Cyber Systems covers
the proper policies, access controls, and procedures to protect BES Cyber Systems and are
trained before access is authorized.
Rationale for Requirement R3:
To ensure that individuals who need authorized electronic or authorized unescorted physical
access to BES Cyber Systems have been assessed for risk. Whether initial access or
maintaining access, those with access must have had a personnel risk assessment completed
within the last 7 years.
Rationale for Requirement R4:
Draft 2
August 2020 Page 49 of 51
Guidelines and Technical Basis
To ensure that individuals with access to BES Cyber Systems and the physical and electronic
locations where BES Cyber System Information is stored by the Responsible Entity have been
properly authorized for such access. “Authorization” should be considered to be a grant of
permission by a person or persons empowered by the Responsible Entity to perform such
grants and included in the delegations referenced in CIP‐003‐6. “Provisioning” should be
considered the actions to provide access to an individual.
Access is physical, logical, and remote permissions granted to Cyber Assets composing the
BES Cyber System or allowing access to the BES Cyber System. When granting, reviewing, or
revoking access, the Responsible Entity must address the Cyber Asset specifically as well as
the systems used to enable such access (i.e., physical access control system, remote access
system, directory services).
CIP Exceptional Circumstances are defined in a Responsible Entity’s policy from CIP‐003‐6 and
allow an exception to the requirement for authorization to BES Cyber Systems and BES Cyber
System Information.
Quarterly reviews in Part 4.5 are to perform a validation that only authorized users have been
granted access to BES Cyber Systems. This is achieved by comparing individuals actually
provisioned to a BES Cyber System against records of individuals authorized to access the BES
Cyber System. The focus of this requirement is on the integrity of provisioning access rather
than individual accounts on all BES Cyber Assets. The list of provisioned individuals can be an
automatically generated account listing. However, in a BES Cyber System with several
account databases, the list of provisioned individuals may come from other records such as
provisioning workflow or a user account database where provisioning typically initiates.
If the results of quarterly or annual account reviews indicate an administrative or clerical
error in which access was not actually provisioned, then the SDT intends that the error should
not be considered a violation of this requirement.
For BES Cyber Systems that do not have user accounts defined, the controls listed in
Requirement R4 are not applicable. However, the Responsible Entity should document such
configurations.
Rationale for Requirement R5:
The timely revocation of electronic access to BES Cyber Systems is an essential element of an
access management regime. When an individual no longer requires access to a BES Cyber
System to perform his or her assigned functions, that access should be revoked. This is of
particular importance in situations where a change of assignment or employment is
involuntary, as there is a risk the individual(s) involved will react in a hostile or destructive
manner.
In considering how to address directives in FERC Order No. 706 directing “immediate”
revocation of access for involuntary separation, the SDT chose not to specify hourly time
parameters in the requirement (e.g., revoking access within 1 hour). The point in time at
which an organization terminates a person cannot generally be determined down to the
Draft 2
August 2020 Page 50 of 51
Guidelines and Technical Basis
hour. However, most organizations have formal termination processes, and the timeliest
revocation of access occurs in concurrence with the initial processes of termination.
Access is physical, logical, and remote permissions granted to Cyber Assets composing the
BES Cyber System or allowing access to the BES Cyber System. When granting, reviewing, or
revoking access, the Responsible Entity must address the Cyber Asset specifically as well as
the systems used to enable such access (e.g., physical access control system, remote access
system, directory services).
Draft 2
August 2020 Page 51 of 51
CIP‐004‐7 — Cyber Security – Personnel & Training
Standard Development Timeline
This section is maintained by the drafting team during the development of the standard and will be
removed when the standard is adopted by the NERC Board of Trustees (Board).
Description of Current Draft
Completed Actions
Standards Committee approved Standard Authorization Request
(SAR) for posting
SAR posted for comment
Date
March 22, 2019
March 28, 2019 –
April 26, 2019
45‐day formal comment period with ballot
Anticipated Actions
45‐day formal comment period with additional ballot
December 20, 2019
– February 3, 2020
Date
August 2020
10‐day final ballot
September 2020
Board adoption
November 2020
New or Modified Term(s) Used in NERC Reliability Standards
This section includes all new or modified terms used in the proposed standard that will be included
in the Glossary of Terms Used in NERC Reliability Standards upon applicable regulatory approval.
Terms used in the proposed standard that are already defined and are not being modified can be
found in the Glossary of Terms Used in NERC Reliability Standards. The new or revised terms listed
below will be presented for approval with the proposed standard. Upon Board adoption, this
section will be removed.
Term(s):
None.
Draft 2
August 2020
Page 1 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
A. Introduction
1. Title:
Cyber Security — Personnel & Training
2. Number:
CIP‐004‐7
3. Purpose:
To minimize the risk against compromise that could lead to misoperation or
instability in the Bulk Electric System (BES) from individuals accessing BES Cyber Systems by
requiring an appropriate level of personnel risk assessment, training, and security awareness in
support of protecting BES Cyber Systems.
4. Applicability:
4.1.
Functional Entities: For the purpose of the requirements contained herein, the following
list of functional entities will be collectively referred to as “Responsible Entities.” For
requirements in this standard where a specific functional entity or subset of functional
entities are the applicable entity or entities, the functional entity or entities are specified
explicitly.
4.1.1. Balancing Authority
4.1.2. Distribution Provider that owns one or more of the following Facilities, systems, and
equipment for the protection or restoration of the BES:
4.1.2.1. Each underfrequency Load shedding (UFLS) or undervoltage Load shedding
(UVLS) system that:
4.1.2.1.1. is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.1.2.1.2. performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation, of
300 MW or more.
4.1.2.2. Each Remedial Action Scheme (RAS) where the RAS is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.1.2.3. Each Protection System (excluding UFLS and UVLS) that applies to Transmission
where the Protection System is subject to one or more requirements in a NERC
or Regional Reliability Standard.
4.1.2.4. Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.1.3. Generator Operator
4.1.4. Generator Owner
4.1.5. Reliability Coordinator
4.1.6. Transmission Operator
Draft 2
August 2020
Page 2 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
4.1.7. Transmission Owner
4.2.
Facilities: For the purpose of the requirements contained herein, the following
Facilities, systems, and equipment owned by each Responsible Entity in 4.1 above are
those to which these requirements are applicable. For requirements in this standard
where a specific type of Facilities, system, or equipment or subset of Facilities, systems,
and equipment are applicable, these are specified explicitly.
4.2.1. Distribution Provider: One or more of the following Facilities, systems and
equipment owned by the Distribution Provider for the protection or restoration of
the BES:
4.2.1.1. Each UFLS or UVLS System that:
4.2.1.1.1. is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.2.1.1.2. performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation, of
300 MW or more.
4.2.1.2. Each RAS where the RAS is subject to one or more requirements in a NERC or
Regional Reliability Standard.
4.2.1.3. Each Protection System (excluding UFLS and UVLS) that applies to Transmission
where the Protection System is subject to one or more requirements in a NERC
or Regional Reliability Standard.
4.2.1.4. Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.2.2. Responsible Entities listed in 4.1 other than Distribution Providers:
All BES Facilities.
4.2.3. Exemptions: The following are exempt from Standard CIP‐004‐7:
4.2.3.1. Cyber Assets at Facilities regulated by the Canadian Nuclear Safety Commission.
4.2.3.2. Cyber Assets associated with communication networks and data
communication links between discrete Electronic Security Perimeters.
4.2.3.3. The systems, structures, and components that are regulated by the Nuclear
Regulatory Commission under a cyber security plan pursuant to 10 C.F.R.
Section 73.54.
4.2.3.4. For Distribution Providers, the systems and equipment that are not included in
section 4.2.1 above.
Draft 2
August 2020
Page 3 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
4.2.3.5. Responsible Entities that identify that they have no BES Cyber Systems
categorized as high impact or medium impact according to the CIP‐002‐5.1
identification and categorization processes.
5. Effective Dates:
See Implementation Plan for CIP‐004‐7.
6. Background:
Standard CIP‐004 exists as part of a suite of CIP Standards related to cyber security, which
require the initial identification and categorization of BES Cyber Systems and require a
minimum level of organizational, operational, and procedural controls to mitigate risk to BES
Cyber Systems.
Most requirements open with, “Each Responsible Entity shall implement one or more
documented [processes, plan, etc.] that include the applicable items in [Table Reference].” The
referenced table requires the applicable items in the procedures for the common subject
matter of the requirements.
The term documented processes refers to a set of required instructions specific to the
Responsible Entity and to achieve a specific outcome. This term does not imply any particular
naming or approval structure beyond what is stated in the requirements. An entity should
include as much as it believes necessary in its documented processes, but it must address the
applicable requirements in the table.
The terms program and plan are sometimes used in place of documented processes where it
makes sense and is commonly understood. For example, documented processes describing a
response are typically referred to as plans (i.e., incident response plans and recovery plans).
Likewise, a security plan can describe an approach involving multiple procedures to address a
broad subject matter.
Similarly, the term program may refer to the organization’s overall implementation of its
policies, plans and procedures involving a subject matter. Examples in the standards include
the personnel risk assessment program and the personnel training program. The full
implementation of the CIP Cyber Security Standards could also be referred to as a program.
However, the terms program and plan do not imply any additional requirements beyond what
is stated in the standards.
Responsible Entities can implement common controls that meet requirements for multiple high
and medium impact BES Cyber Systems. For example, a single training program could meet the
requirements for training personnel across multiple BES Cyber Systems.
Measures for the initial requirement are simply the documented processes themselves.
Measures in the table rows provide examples of evidence to show documentation and
implementation of applicable items in the documented processes. These measures serve to
provide guidance to entities in acceptable records of compliance and should not be viewed as
an all‐inclusive list.
Draft 2
August 2020
Page 4 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
Throughout the standards, unless otherwise stated, bulleted items in the requirements and
measures are items that are linked with an “or,” and numbered items are items that are linked
with an “and.”
Many references in the Applicability section use a threshold of 300 MW for UFLS and UVLS.
This particular threshold of 300 MW for UVLS and UFLS was provided in Version 1 of the CIP
Cyber Security Standards. The threshold remains at 300 MW since it is specifically addressing
UVLS and UFLS, which are last ditch efforts to save the BES. A review of UFLS tolerances defined
within regional reliability standards for UFLS program requirements to date indicates that the
historical value of 300 MW represents an adequate and reasonable threshold value for
allowable UFLS operational tolerances.
“Applicable Systems” Columns in Tables:
Each table has an “Applicable Systems” or “Applicability” column. The “Applicable Systems”
column to further defines the scope of systems to which a specific requirement row applies.
The CSO706 SDT adapted this concept from the National Institute of Standards and Technology
(“NIST”) Risk Management Framework as a way of applying requirements more appropriately
based on impact and connectivity characteristics. The following conventions are used in the
“Applicable Systems” column as described.
High Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as high impact
according to the CIP‐002‐5.1 identification and categorization processes.
Medium Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as medium
impact according to the CIP‐002‐5.1 identification and categorization processes.
Medium Impact BES Cyber Systems with External Routable Connectivity – Only applies to
medium impact BES Cyber Systems with External Routable Connectivity. This also excludes
Cyber Assets in the BES Cyber System that cannot be directly accessed through External
Routable Connectivity.
Electronic Access Control or Monitoring Systems (EACMS) – Applies to each Electronic
Access Control or Monitoring System associated with a referenced high impact BES Cyber
System or medium impact BES Cyber System. Examples may include, but are not limited to,
firewalls, authentication servers, and log monitoring and alerting systems.
Physical Access Control Systems (PACS) – Applies to each Physical Access Control System
associated with a referenced high impact BES Cyber System or medium impact BES Cyber
System with External Routable Connectivity.
Draft 2
August 2020
Page 5 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
B. Requirements and Measures
R1. Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement
parts in CIP‐004‐7 Table R1 – Security Awareness Program. [Violation Risk Factor: Lower] [Time Horizon: Operations Planning]
M1. Evidence must include each of the applicable documented processes that collectively include each of the applicable requirement parts in
CIP‐004‐7 Table R1 – Security Awareness Program and additional evidence to demonstrate implementation as described in the Measures
column of the table.
CIP‐004‐7 Table R1 – Security Awareness Program
Part
1.1
Applicable Systems
High Impact BES Cyber Systems
Medium Impact BES Cyber Systems
Requirements
Security awareness that, at least once
each calendar quarter, reinforces cyber
security practices (which may include
associated physical security practices)
for the Responsible Entity’s personnel
who have authorized electronic or
authorized unescorted physical access
to BES Cyber Systems.
Measures
An example of evidence may include,
but is not limited to, documentation
that the quarterly reinforcement has
been provided. Examples of evidence
of reinforcement may include, but are
not limited to, dated copies of
information used to reinforce security
awareness, as well as evidence of
distribution, such as:
Draft 2
August 2020
direct communications (for
example, e‐mails, memos,
computer‐based training); or
indirect communications (for
example, posters, intranet, or
brochures); or
Page 6 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
CIP‐004‐7 Table R1 – Security Awareness Program
Part
Applicable Systems
Requirements
Measures
management support and
reinforcement (for example,
presentations or meetings).
Draft 2
August 2020
Page 7 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
R2. Each Responsible Entity shall implement one or more cyber security training program(s) appropriate to individual roles, functions, or
responsibilities that collectively includes each of the applicable requirement parts in CIP‐004‐7 Table R2 – Cyber Security Training Program.
[Violation Risk Factor: Lower] [Time Horizon: Operations Planning]
M2. Evidence must include the training program that includes each of the applicable requirement parts in CIP‐004‐7 Table R2 – Cyber Security
Training Program and additional evidence to demonstrate implementation of the program(s).
Draft 2
August 2020
Page 8 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
CIP‐004‐7 Table R2 – Cyber Security Training Program
Part
2.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Requirements
Training content on:
2.1.1.
2.1.2.
2.1.3.
2.1.4.
2.1.5.
2.1.6.
2.1.7.
2.1.8.
2.1.9.
Cyber security policies;
Physical access controls;
Electronic access controls;
The visitor control program;
Handling of BES Cyber System
Information (BCSI) and its
storage;
Identification of a Cyber
Security Incident and initial
notifications in accordance
with the entity’s incident
response plan;
Recovery plans for BES Cyber
Systems;
Response to Cyber Security
Incidents; and
Cyber security risks associated
with a BES Cyber System’s
electronic interconnectivity
and interoperability with
other Cyber Assets, including
Transient Cyber Assets, and
with Removable Media.
Measures
Examples of evidence may include,
but are not limited to, training
material such as power point
presentations, instructor notes,
student notes, handouts, or other
training materials.
Draft 2
August 2020
Page 9 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
CIP‐004‐7 Table R2 – Cyber Security Training Program
Part
2.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Requirements
Measures
Require completion of the training
specified in Part 2.1 prior to granting
authorized electronic access and
authorized unescorted physical access
to applicable Cyber Assets, except
during CIP Exceptional Circumstances.
Examples of evidence may include,
but are not limited to, training
records and documentation of when
CIP Exceptional Circumstances were
invoked.
Require completion of the training
specified in Part 2.1 at least once
every 15 calendar months.
Examples of evidence may include,
but are not limited to, dated
individual training records.
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
2.3
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 2
August 2020
Page 10 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
R3. Each Responsible Entity shall implement one or more documented personnel risk assessment program(s) to attain and retain authorized
electronic or authorized unescorted physical access to BES Cyber Systems that collectively include each of the applicable requirement
parts in CIP‐004‐7 Table R3 – Personnel Risk Assessment Program. [Violation Risk Factor: Medium] [Time Horizon: Operations Planning].
M3. Evidence must include the documented personnel risk assessment programs that collectively include each of the applicable requirement
parts in CIP‐004‐7 Table R3 – Personnel Risk Assessment Program and additional evidence to demonstrate implementation of the
program(s).
CIP‐004‐7 Table R3 – Personnel Risk Assessment Program
Part
3.1
Applicable Systems
Requirements
High Impact BES Cyber Systems and their Process to confirm identity.
associated:
1. EACMS; and
2. PACS
Measures
An example of evidence may
include, but is not limited to,
documentation of the Responsible
Entity’s process to confirm identity.
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Draft 2
August 2020
Page 11 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
CIP‐004‐7 Table R3 – Personnel Risk Assessment Program
Part
3.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Requirements
Measures
Process to perform a seven year
criminal history records check as part of
each personnel risk assessment that
includes:
An example of evidence may include,
but is not limited to, documentation of
the Responsible Entity’s process to
perform a seven year criminal history
3.2.1. current residence, regardless of records check.
duration; and
3.2.2. other locations where, during
the seven years immediately prior to
the date of the criminal history
records check, the subject has resided
for six consecutive months or more.
If it is not possible to perform a full
seven year criminal history records
check, conduct as much of the seven
year criminal history records check as
possible and document the reason the
full seven year criminal history records
check could not be performed.
Draft 2
August 2020
Page 12 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
Part
3.3
CIP‐004‐7 Table R3 – Personnel Risk Assessment Program
Applicable Systems
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Requirements
Measures
Criteria or process to evaluate criminal
history records checks for authorizing
access.
An example of evidence may
include, but is not limited to,
documentation of the
Responsible Entity’s process to
evaluate criminal history records
checks.
Criteria or process for verifying that
personnel risk assessments performed for
contractors or service vendors are
conducted according to Parts 3.1 through
3.3.
An example of evidence may
include, but is not limited to,
documentation of the
Responsible Entity’s criteria or
process for verifying contractors
or service vendors personnel risk
assessments.
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
3.4
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Draft 2
August 2020
Page 13 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
CIP‐004‐7 Table R3 – Personnel Risk Assessment Program
Part
3.5
Applicable Systems
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Requirements
Measures
Process to ensure that individuals with
authorized electronic or authorized
unescorted physical access have had a
personnel risk assessment completed
according to Parts 3.1 to 3.4 within the last
seven years.
An example of evidence may
include, but is not limited to,
documentation of the
Responsible Entity’s process for
ensuring that individuals with
authorized electronic or
authorized unescorted physical
access have had a personnel risk
assessment completed within the
last seven years.
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Draft 2
August 2020
Page 14 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
R4. Each Responsible Entity shall implement one or more documented access management program(s) that collectively include each of the
applicable requirement parts in CIP‐004‐7 Table R4 – Access Management Program. [Violation Risk Factor: Medium] [Time Horizon:
Operations Planning and Same Day Operations].
M4. Evidence must include the documented processes that collectively include each of the applicable requirement parts in CIP‐004‐7 Table R4
– Access Management Program and additional evidence to demonstrate that the access management program was implemented as
described in the Measures column of the table.
CIP‐004‐7 Table R4 – Access Management Program
Part
Applicable Systems
4.1
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Process to authorize based on need, as
determined by the Responsible Entity,
except for CIP Exceptional
Circumstances:
4.1.1. Electronic access; and
4.1.2. Unescorted physical access into a
Physical Security Perimeter.
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Requirements
Measures
An example of evidence may
include, but is not limited to, dated
documentation of the process to
authorize electronic access and
unescorted physical access into a
Physical Security Perimeter.
Draft 2
August 2020
Page 15 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
CIP‐004‐7 Table R4 – Access Management Program
Part
Applicable Systems
Requirements
4.2
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Verify at least once each calendar
quarter that individuals with active
electronic access or unescorted physical
access have authorization records.
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Draft 2
August 2020
Measures
Examples of evidence may include,
but are not limited to:
Dated documentation of the
verification between the system
generated list of individuals who
have been authorized for access
(i.e., workflow database) and a
system generated list of
personnel who have access (i.e.,
user account listing), or
Dated documentation of the
verification between a list of
individuals who have been
authorized for access (i.e.,
authorization forms) and a list
of individuals provisioned for
access (i.e., provisioning forms
or shared account listing).
Page 16 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
CIP‐004‐7 Table R4 – Access Management Program
Part
Applicable Systems
Requirements
4.3
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
For electronic access, verify at least once
every 15 calendar months that all user
accounts, user account groups, or user
role categories, and their specific,
associated privileges are correct and are
those that the Responsible Entity
determines are necessary.
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Draft 2
August 2020
Measures
An example of evidence may
include, but is not limited to,
documentation of the review that
includes all of the following:
1. A dated listing of all
accounts/account groups or
roles within the system;
2. A summary description of
privileges associated with
each group or role;
3. Accounts assigned to the
group or role; and
4. Dated evidence showing
verification of the privileges
for the group are authorized
and appropriate to the work
function performed by
people assigned to each
account.
Page 17 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
R5. Each Responsible Entity shall implement one or more documented access revocation program(s) that collectively include each of the
applicable requirement parts in CIP‐004‐7 Table R5 – Access Revocation. [Violation Risk Factor: Medium] [Time Horizon: Same Day
Operations and Operations Planning].
M5. Evidence must include each of the applicable documented programs that collectively include each of the applicable requirement parts in
CIP‐004‐7 Table R5 – Access Revocation and additional evidence to demonstrate implementation as described in the Measures column of
the table.
CIP‐004‐7 Table R5 – Access Revocation
Part
5.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Requirements
Measures
A process to initiate removal of an
An example of evidence may include,
but is not limited to, documentation of
individual’s ability for unescorted
physical access and Interactive Remote all of the following:
Access upon a termination action, and
1. Dated workflow or sign‐off form
complete the removals within 24 hours
verifying access removal
of the termination action (Removal of
associated with the termination
the ability for access may be different
action; and
than deletion, disabling, revocation, or
2. Logs or other demonstration
removal of all access rights).
showing such persons no longer
have access.
Draft 2
August 2020
Page 18 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
CIP‐004‐7 Table R5 – Access Revocation
Part
5.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Requirements
Measures
For reassignments or transfers, revoke
the individual’s authorized electronic
access to individual accounts and
authorized unescorted physical access
that the Responsible Entity determines
are not necessary by the end of the
next calendar day following the date
that the Responsible Entity determines
that the individual no longer requires
retention of that access.
An example of evidence may include,
but is not limited to, documentation of
all of the following:
Draft 2
August 2020
1. Dated workflow or sign‐off form
showing a review of logical and
physical access; and
2. Logs or other demonstration
showing such persons no longer
have access that the
Responsible Entity determines
is not necessary.
Page 19 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
CIP‐004‐7 Table R5 – Access Revocation
Part
5.3
Applicable Systems
High Impact BES Cyber Systems and
their associated:
EACMS
Requirements
Measures
For termination actions, revoke the
individual’s non‐shared user accounts
(unless already revoked according to
Part 5.1) within 30 calendar days of the
effective date of the termination
action.
An example of evidence may include,
but is not limited to, workflow or sign‐
off form showing access removal for
any individual BES Cyber Assets and
software applications as determined
necessary to completing the revocation
of access and dated within thirty
calendar days of the termination
actions.
Draft 2
August 2020
Page 20 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
CIP‐004‐7 Table R5 – Access Revocation
Part
5.4
Applicable Systems
High Impact BES Cyber Systems and
their associated:
EACMS
Requirements
Measures
For termination actions, change
Examples of evidence may include, but
passwords for shared account(s) known are not limited to:
to the user within 30 calendar days of
Workflow or sign‐off form
the termination action. For
showing password reset within
reassignments or transfers, change
30 calendar days of the
passwords for shared account(s) known
termination;
to the user within 30 calendar days
Workflow or sign‐off form
following the date that the Responsible
showing password reset within
Entity determines that the individual no
30 calendar days of the
longer requires retention of that
reassignments or transfers; or
access.
Documentation of the
extenuating operating
If the Responsible Entity determines
circumstance and workflow or
and documents that extenuating
sign‐off form showing password
operating circumstances require a
reset within 10 calendar days
longer time period, change the
following the end of the
password(s) within 10 calendar days
operating circumstance.
following the end of the operating
circumstances.
Draft 2
August 2020
Page 21 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
R6. Each Responsible Entity shall implement one or more documented access management program(s) for BES Cyber System Information
that collectively include each of the applicable requirement parts in CIP‐004‐7 Table R6 – Access Management for BES Cyber System
Information. [Violation Risk Factor: Medium] [Time Horizon: Same Day Operations and Operations Planning].
M6. Evidence must include each of the applicable documented programs that collectively include the applicable requirement parts in CIP‐004‐
7 Table R6 – Access Management for BES Cyber System Information and additional evidence to demonstrate implementation as described
in the Measures column of the table.
CIP‐004‐7 Table R6 – Access Management for BES Cyber System Information
Part
6.1
Applicability
BCSI pertaining to:
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Requirements
Authorize provisioning of access to
BCSI based on need, as determined by
the Responsible Entity, except for CIP
Exceptional Circumstances.
Measures
Examples of evidence may include, but
are not limited to, the following:
Dated authorization records for
provisioned access to BCSI based
on need; or
List of authorized individuals
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 2
August 2020
Page 22 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
CIP‐004‐7 Table R6 – Access Management for BES Cyber System Information
Part
6.2
Applicability
BCSI pertaining to:
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Requirements
Verify at least once every 15 calendar
months that all provisioned access to
BCSI:
BCSI pertaining to:
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Examples of evidence may include, but
are not limited to, all of the following:
6.2.1. Is authorized; and
6.2.2. Is appropriate based on need, as
determined by the Responsible Entity.
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
6.3
Measures
For termination actions, remove the
individual’s ability to use provisioned
access to BCSI (unless already revoked
according to Part 5.1) by the end of the
next calendar day following the
effective date of the termination
action.
List of authorized individuals; and
List of individuals who have been
provisioned access; and
List of privileges associated with
the authorizations; and
List of privileges associated with
the provisioned access; and
Dated documentation of the 15‐
calendar‐month verification; and
Documented reconciliation
actions, if any.
Examples of dated evidence may
include, but are not limited to, access
revocation records associated with the
terminations and dated within the next
calendar day of the termination action.
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 2
August 2020
Page 23 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
C. Compliance
1. Compliance Monitoring Process:
1.1. Compliance Enforcement Authority: “Compliance Enforcement Authority” (CEA) means NERC or the Regional Entity, or any entity as
otherwise designated by an Applicable Governmental Authority, in their respective roles of monitoring and/or enforcing compliance with
mandatory and enforceable Reliability Standards in their respective jurisdictions.
As defined in the NERC Rules of Procedure, “Compliance Enforcement Authority” (CEA) means NERC or the Regional Entity in their
respective roles of monitoring and enforcing compliance with the NERC Reliability Standards.
1.2. Evidence Retention: The following evidence retention period(s) identify the period of time an entity is required to retain specific evidence
to demonstrate compliance. For instances where the evidence retention period specified below is shorter than the time since the last
audit, the Compliance Enforcement Authority may ask an entity to provide other evidence to show that it was compliant for the full time
period since the last audit.
The following evidence retention periods identify the period of time an entity is required to retain specific evidence to demonstrate
compliance. For instances where the evidence retention period specified below is shorter than the time since the last audit, the CEA may
ask an entity to provide other evidence to show that it was compliant for the full time period since the last audit.
The Responsible Eapplicable entity shall keep data or evidence to show compliance as identified below unless directed by its CEA
Compliance Enforcement Authority to retain specific evidence for a longer period of time as part of an investigation:
Each The Responsible applicable Eentity shall retain evidence of each requirement in this standard for three calendar years.
If an Responsible E applicable entity is found non‐compliant, it shall keep information related to the non‐compliance until mitigation
is complete and approved or for the time specified above, whichever is longer.
The Compliance Enforcement AuthorityCEA shall keep the last audit records and all requested and submitted subsequent audit
records.
1.3. Compliance Monitoring and Assessment Processes: As defined in the NERC Rules of Procedure, “Compliance Monitoring and
Enforcement Program” refers to the identification of the processes that will be used to evaluate data or information for the purpose of
assessing performance or outcomes with the associated Reliability Standard.
Compliance Audits
Self‐Certifications
Draft 2
August 2020
Page 24 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
Spot Checking
Compliance Investigations
Self‐Reporting
Complaints
1.4. Additional Compliance Information:
None
Draft 2
August 2020
Page 25 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
2. Table of Compliance Elements
R #
Time
Horizon
R1
R2
Operations
Planning
Operations
Planning
VRF
Violation Severity Levels (CIP‐004‐7)
Lower VSL
Lower
Lower
Moderate VSL
High VSL
Severe VSL
The
Responsible
Entity did not
reinforce cyber
security
practices
during a
calendar
quarter but did
so less than 10
calendar days
after the start
of a
subsequent
calendar
quarter. (1.1)
The Responsible Entity
did not reinforce cyber
security practices during
a calendar quarter but
did so between 10 and
30 calendar days after
the start of a
subsequent calendar
quarter. (1.1)
The Responsible Entity
did not reinforce cyber
security practices during
a calendar quarter but
did so within the
subsequent quarter but
beyond 30 calendar
days after the start of
that calendar quarter.
(1.1)
The Responsible Entity
did not document or
implement any security
awareness process(es)
to reinforce cyber
security practices. (R1)
The
Responsible
Entity
implemented a
cyber security
training
program but
failed to
include one of
the training
The Responsible Entity
implemented a cyber
security training
program but failed to
include two of the
training content topics
in Requirement Parts
2.1.1 through 2.1.9.
(2.1)
The Responsible Entity
implemented a cyber
security training
program but failed to
include three of the
training content topics
in Requirement Parts
2.1.1 through 2.1.9.
(2.1)
The Responsible Entity
did not implement a
cyber security training
program appropriate to
individual roles,
functions, or
responsibilities. (R2)
OR
OR
OR
The Responsible Entity
did not reinforce cyber
security practices and
associated physical
security practices for at
least two consecutive
calendar quarters. (1.1)
OR
Draft 2
August 2020 Page 26 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐004‐7)
Lower VSL
content topics
in Requirement
Parts 2.1.1
through 2.1.9.
(2.1)
Moderate VSL
The Responsible Entity
implemented a cyber
security training
program but failed to
train two individuals
OR
(with the exception of
CIP Exceptional
The
Circumstances) prior to
Responsible
their being granted
Entity
implemented a authorized electronic
cyber security and authorized
unescorted physical
training
access. (2.2)
program but
OR
failed to train
one individual
(with the
The Responsible Entity
exception of
implemented a cyber
CIP Exceptional security training
Circumstances) program but failed to
prior to their
train two individuals
being granted with authorized
authorized
electronic or authorized
electronic and unescorted physical
authorized
access within 15
unescorted
calendar months of the
physical access.
previous training
(2.2)
completion date. (2.3)
High VSL
The Responsible Entity
implemented a cyber
security training
program but failed to
train three individuals
(with the exception of
CIP Exceptional
Circumstances) prior to
their being granted
authorized electronic
and authorized
unescorted physical
access. (2.2)
Severe VSL
The Responsible Entity
implemented a cyber
security training
program but failed to
include four or more of
the training content
topics in Requirement
Parts 2.1.1 through
2.1.9. (2.1)
OR
The Responsible Entity
implemented a cyber
security training
OR
program but failed to
The Responsible Entity train four or more
implemented a cyber
individuals (with the
security training
exception of CIP
program but failed to
Exceptional
train three individuals
Circumstances) prior to
with authorized
their being granted
electronic or authorized authorized electronic
unescorted physical
and authorized
access within 15
unescorted physical
calendar months of the access. (2.2)
previous training
OR
completion date. (2.3)
Draft 2
August 2020 Page 27 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐004‐7)
Lower VSL
Moderate VSL
High VSL
The Responsible Entity
implemented a cyber
security training
program but failed to
train four or more
individuals with
authorized electronic or
authorized unescorted
physical access within
15 calendar months of
the previous training
completion date. (2.3)
OR
The
Responsible
Entity
implemented a
cyber security
training
program but
failed to train
one individual
with authorized
electronic or
authorized
unescorted
physical access
within 15
calendar
months of the
previous
training
completion
date. (2.3)
R3
Operations
Planning
Medium
The
Responsible
Entity has a
program for
conducting
Severe VSL
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments (PRAs)
for individuals, including
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments (PRAs)
for individuals, including
The Responsible Entity
did not have all of the
required elements as
described by 3.1
through 3.4 included
Draft 2
August 2020 Page 28 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐004‐7)
Lower VSL
Personnel Risk
Assessments
(PRAs) for
individuals,
including
contractors and
service
vendors, but
did not conduct
the PRA as a
condition of
granting
authorized
electronic or
authorized
unescorted
physical access
for one
individual. (R3)
OR
The
Responsible
Entity did
conduct
Personnel Risk
Assessments
(PRAs) for
individuals,
Moderate VSL
contractors and service
vendors, but did not
conduct the PRA as a
condition of granting
authorized electronic or
authorized unescorted
physical access for two
individuals. (R3)
High VSL
contractors and service
vendors, but did not
conduct the PRA as a
condition of granting
authorized electronic or
authorized unescorted
physical access for three
individuals. (R3)
OR
OR
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not confirm identity for
two individuals. (3.1 &
3.4)
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not confirm identity for
three individuals. (3.1 &
3.4)
OR
OR
The Responsible Entity
has a process to
perform seven‐year
criminal history record
checks for individuals,
The Responsible Entity
has a process to
perform seven‐year
criminal history record
checks for individuals,
Severe VSL
within documented
program(s) for
implementing Personnel
Risk Assessments
(PRAs), for individuals,
including contractors
and service vendors, for
obtaining and retaining
authorized cyber or
authorized unescorted
physical access. (R3)
OR
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, but did not
conduct the PRA as a
condition of granting
authorized electronic or
authorized unescorted
physical access for four
or more individuals. (R3)
OR
Draft 2
August 2020 Page 29 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐004‐7)
Lower VSL
including
contractors and
service
vendors, with
authorized
electronic or
authorized
unescorted
physical access
but did not
confirm
identity for one
individual. (3.1
& 3.4)
OR
Moderate VSL
including contractors
and service vendors,
with authorized
electronic or authorized
unescorted physical
access but did not
include the required
checks described in
3.2.1 and 3.2.2 for two
individuals. (3.2 & 3.4)
High VSL
including contractors
and service vendors,
with authorized
electronic or authorized
unescorted physical
access but did not
include the required
checks described in
3.2.1 and 3.2.2 for three
individuals. (3.2 & 3.4)
OR
OR
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not evaluate criminal
history records check
for access authorization
for two individuals. (3.3
& 3.4)
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not evaluate criminal
history records check
for access authorization
for three individuals.
(3.3 & 3.4)
The
Responsible
Entity has a
process to
perform seven‐
year criminal
history record
checks for
individuals,
including
contractors and OR
service
vendors, with
OR
Severe VSL
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not confirm identity for
four or more
individuals. (3.1 & 3.4)
OR
The Responsible Entity
has a process to
perform seven‐year
criminal history record
checks for individuals,
including contractors
and service vendors,
with authorized
electronic or authorized
unescorted physical
access but did not
include the required
checks described in
3.2.1 and 3.2.2 for four
Draft 2
August 2020 Page 30 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐004‐7)
Lower VSL
authorized
electronic or
authorized
unescorted
physical access
but did not
include the
required
checks
described in
3.2.1 and 3.2.2
for one
individual. (3.2
& 3.4)
OR
The
Responsible
Entity did
conduct
Personnel Risk
Assessments
(PRAs) for
individuals,
including
contractors and
service
vendors, with
authorized
Moderate VSL
High VSL
The Responsible Entity The Responsible Entity
did not conduct
did not conduct
Personnel Risk
Personnel Risk
Assessments (PRAs) for Assessments (PRAs) for
three individuals with
two individuals with
authorized electronic or
authorized electronic or
authorized unescorted authorized unescorted
physical access within 7 physical access within 7
calendar years of the
calendar years of the
previous PRA
previous PRA
completion date. (3.5)
completion date. (3.5)
Severe VSL
or more individuals. (3.2
& 3.4)
OR
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not evaluate criminal
history records check
for access authorization
for four or more
individuals. (3.3 & 3.4)
OR
The Responsible Entity
did not conduct
Personnel Risk
Assessments (PRAs) for
four or more individuals
with authorized
electronic or authorized
unescorted physical
access within 7 calendar
Draft 2
August 2020 Page 31 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐004‐7)
Lower VSL
electronic or
authorized
unescorted
physical access
but did not
evaluate
criminal history
records check
for access
authorization
for one
individual. (3.3
& 3.4)
Moderate VSL
High VSL
Severe VSL
years of the previous
PRA completion date.
(3.5)
OR
The
Responsible
Entity did not
conduct
Personnel Risk
Assessments
(PRAs) for one
individual with
authorized
electronic or
authorized
unescorted
physical access
within 7
Draft 2
August 2020 Page 32 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
R #
R4
Time
Horizon
VRF
Operations
Planning
and Same
Day
Operations
Medium
Violation Severity Levels (CIP‐004‐7)
Lower VSL
calendar years
of the previous
PRA
completion
date. (3.5)
The
Responsible
Entity did not
verify that
individuals with
active
electronic or
active
unescorted
physical access
have
authorization
records during
a calendar
quarter but did
so less than 10
calendar days
after the start
of a
subsequent
calendar
quarter. (4.2)
Moderate VSL
High VSL
The Responsible Entity
did not verify that
individuals with active
electronic or active
unescorted physical
access have
authorization records
during a calendar
quarter but did so
between 10 and 20
calendar days after the
start of a subsequent
calendar quarter. (4.2)
OR
The Responsible Entity
did not verify that
individuals with active
electronic or active
unescorted physical
access have
authorization records
during a calendar
quarter but did so
between 20 and 30
calendar days after the
start of a subsequent
calendar quarter. (4.2)
OR
The Responsible Entity
has implemented
processes to verify that
user accounts, user
account groups, or user
role categories, and
their specific, associated
privileges are correct
The Responsible Entity
has implemented
processes to verify that
user accounts, user
account groups, or user
role categories, and
their specific, associated
privileges are correct
Severe VSL
The Responsible Entity
did not implement any
documented program(s)
for access management.
(R4)
OR
The Responsible Entity
has not implemented
one or more
documented program(s)
for access management
that includes a process
to authorize electronic
access or unescorted
physical access. (4.1)
OR
The Responsible Entity
did not verify that
individuals with active
electronic or active
Draft 2
August 2020 Page 33 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐004‐7)
Lower VSL
Moderate VSL
and necessary within 15
OR
calendar months of the
The
previous verification but
Responsible
for more than 5% but
Entity has
less than (or equal to)
implemented
10% of its BES Cyber
processes to
verify that user Systems, privileges were
accounts, user incorrect or
unnecessary. (4.3)
account
groups, or user
role categories,
and their
specific,
associated
privileges are
correct and
necessary
within 15
calendar
months of the
previous
verification but
for 5% or less
of its BES Cyber
Systems,
privileges were
incorrect or
High VSL
and necessary within 15
calendar months of the
previous verification but
for more than 10% but
less than (or equal to)
15% of its BES Cyber
Systems, privileges were
incorrect or
unnecessary. (4.3)
Severe VSL
unescorted physical
access have
authorization records
for at least two
consecutive calendar
quarters. (4.2)
OR
The Responsible Entity
has implemented
processes to verify that
user accounts, user
account groups, or user
role categories, and
their specific, associated
privileges are correct
and necessary within 15
calendar months of the
previous verification but
for more than 15% of its
BES Cyber Systems,
privileges were
incorrect or
unnecessary. (4.3)
Draft 2
August 2020 Page 34 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
R #
Time
Horizon
R5
Same Day
Operations
and
Operations
Planning
VRF
Violation Severity Levels (CIP‐004‐7)
Lower VSL
unnecessary.
(4.3)
Medium
The
Responsible
Entity has
implemented
one or more
process(es) to
revoke the
individual’s
user accounts
upon
termination
action but did
not do so for
within 30
calendar days
of the date of
termination
action for one
or more
individuals.
(5.3)
OR
Moderate VSL
The Responsible Entity
has implemented one or
more process(es) to
remove the ability for
unescorted physical
access and Interactive
Remote Access upon a
termination action or
complete the removal
within 24 hours of the
termination action but
did not initiate those
removals for one
individual. (5.1)
OR
The Responsible Entity
has implemented one or
more process(es) to
determine that an
individual no longer
requires retention of
access following
reassignments or
High VSL
The Responsible Entity
has implemented one or
more process(es) to
remove the ability for
unescorted physical
access and Interactive
Remote Access upon a
termination action or
complete the removal
within 24 hours of the
termination action but
did not initiate those
removals for two
individuals. (5.1)
OR
The Responsible Entity
has implemented one or
more process(es) to
determine that an
individual no longer
requires retention of
access following
reassignments or
Severe VSL
The Responsible Entity
has not implemented
any documented
program(s) for access
revocation for electronic
access or unescorted
physical access. (R5)
OR
The Responsible Entity
has implemented one or
more process(es) to
remove the ability for
unescorted physical
access and Interactive
Remote Access upon a
termination action or
complete the removal
within 24 hours of the
termination action but
did not initiate those
removals for three or
more individuals. (5.1)
OR
Draft 2
August 2020 Page 35 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐004‐7)
Lower VSL
The
Responsible
Entity has
implemented
one or more
process(es) to
change
passwords for
shared
accounts
known to the
user upon
termination
action,
reassignment,
or transfer, but
did not do so
for within 30
calendar days
of the date of
termination
action,
reassignment,
or transfer for
one or more
individuals.
(5.4)
Moderate VSL
transfers but, for one
individual, did not
revoke the authorized
electronic access to
individual accounts and
authorized unescorted
physical access by the
end of the next calendar
day following the
predetermined date.
(5.2)
High VSL
transfers but, for two
individuals, did not
revoke the authorized
electronic access to
individual accounts and
authorized unescorted
physical access by the
end of the next calendar
day following the
predetermined date.
(5.2)
Severe VSL
The Responsible Entity
has implemented one or
more process(es) to
determine that an
individual no longer
requires retention of
access following
reassignments or
transfers but, for three
or more individuals, did
not revoke the
authorized electronic
access to individual
accounts and authorized
unescorted physical
access by the end of the
next calendar day
following the
predetermined date.
(5.2)
OR
Draft 2
August 2020 Page 36 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐004‐7)
Lower VSL
Moderate VSL
High VSL
Severe VSL
The
Responsible
Entity has
implemented
one or more
process(es) to
determine and
document
extenuating
operating
circumstances
following a
termination
action,
reassignment,
or transfer, but
did not change
one or more
passwords for
shared
accounts
known to the
user within 10
calendar days
following the
end of the
extenuating
operating
Draft 2
August 2020 Page 37 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
R #
R6
Time
Horizon
VRF
Same Day
Operations
Medium
and
Operations
Planning
Violation Severity Levels (CIP‐004‐7)
Lower VSL
circumstances.
(5.4)
The
Responsible
Entity
implemented
one or more
documented
access
management
program(s) for
BCSI but did
not implement
one of the
applicable
items for Parts
6.1 through
6.3. (R6)
Moderate VSL
The Responsible Entity
implemented one or
more documented
access management
program(s) for BCSI but
did not implement two
of the applicable items
for Parts 6.1 through
6.3. (R6)
High VSL
The Responsible Entity
implemented one or
more documented
access management
program(s) for BCSI but
did not implement three
of the applicable items
for Parts 6.1 through
6.3. (R6)
Severe VSL
The Responsible Entity
did not implement one
or more documented
access management
program(s) for BCSI.
(R6)
Draft 2
August 2020 Page 38 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
D. Regional Variances
None.
E. Interpretations
None.
F. Associated Documents
None.
Version History
Version
Date
Action
Change Tracking
1
1/16/06
R3.2 — Change “Control Center” to
“control center.”
2
9/30/09
Modifications to clarify the
requirements and to bring the
compliance elements into conformance
with the latest guidelines for developing
compliance elements of standards.
3/24/06
Removal of reasonable business
judgment.
Replaced the RRO with the RE as a
responsible entity.
Rewording of Effective Date.
Changed compliance monitor to
Compliance Enforcement Authority.
3
12/16/09
Updated Version Number from ‐2 to ‐3
In Requirement 1.6, deleted the
sentence pertaining to removing
component or system from service in
order to perform testing, in response to
FERC order issued September 30, 2009.
3
12/16/09
3
3/31/10
4
1/24/11
Approved by the NERC Board of
Trustees.
Approved by FERC.
Approved by the NERC Board of
Trustees.
Draft 2
July 2020 Page 39 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
Version
Date
Action
Change Tracking
5
11/26/12
Adopted by the NERC Board of
Trustees.
5
11/22/13
FERC Order issued approving CIP‐004‐5.
5.1
9/30/13
Modified two VSLs in R4
Errata
6
11/13/14
Adopted by the NERC Board of
Trustees.
Addressed two
FERC directives
from Order No.
791 related to
identify, assess,
and correct
language and
communication
networks.
6
2/12/15
Adopted by the NERC Board of
Trustees.
Replaces the
version adopted
by the Board on
11/13/2014.
Revised version
addresses
remaining
directives from
Order No. 791
related to
transient devices
and low impact
BES Cyber
Systems.
6
1/21/16
7
TBD
FERC order issued approving CIP‐004‐6.
Docket No. RM15‐14‐000
Adopted by the NERC Board of Trustees Revised to
enhance BES
reliability for
entities to
manage their
BCSIBES Cyber
Modified to
coordinate with
other CIP
standards and to
revise format to
use RBS
Template.
Draft 2
July 2020 Page 40 of 42
CIP‐004‐7 — Cyber Security – Personnel & Training
Version
Date
Action
Change Tracking
System
Information.
Draft 2
July 2020 Page 41 of 42
CIP‐004‐7 — Guidelines and Technical Basis
Note: The Guidelines and Technical Basis section has not been revised as part of Project 2019‐
02. A separate technical rationale document has been created to cover Project 2019‐02
revisions. Future edits to this section will be conducted through the Technical Rationale for
Reliability Standards Project and the Standards Drafting Process.
Draft 2
July 2020 Page 42 of 42
CIP‐011‐3 — Cyber Security — Information Protection
Standard Development Timeline
This section is maintained by the drafting team during the development of the standard and will
be removed when the standard is adopted by the NERC Board of Trustees (Board).
Description of Current Draft
Completed Actions
Standards Committee approved Standard Authorization Request
(SAR) for posting
SAR posted for comment
45‐day formal comment period with ballot
Anticipated Actions
45‐day formal or informal comment period with ballot
Date
March 22, 2019
March 28, 2019 –
April 26, 2019
December 20, 2019
– February 3, 2020
Date
July 2020
10‐day final ballot
September 2020
Board adoption
November 2020
New or Modified Term(s) Used in NERC Reliability Standards
This section includes all new or modified terms used in the proposed standard that will be
included in the Glossary of Terms Used in NERC Reliability Standards upon applicable regulatory
approval. Terms used in the proposed standard that are already defined and are not being
modified can be found in the Glossary of Terms Used in NERC Reliability Standards. The new or
revised terms listed below will be presented for approval with the proposed standard. Upon
Board adoption, this section will be removed.
Term(s):
None.
Draft 2
August 2020
Page 1 of 19
CIP‐011‐3 — Cyber Security — Information Protection
A. Introduction
1.
Title:
Cyber Security — Information Protection
2.
Number:
3.
Purpose: To prevent unauthorized access to BES Cyber System Information (BCSI)
by specifying information protection requirements in support of protecting BES Cyber
Systems against compromise that could lead to misoperation or instability in the Bulk
Electric System (BES).
4.
Applicability:
CIP‐011‐3
4.1. Functional Entities: For the purpose of the requirements contained herein, the
following list of functional entities will be collectively referred to as “Responsible
Entities.” For requirements in this standard where a specific functional entity or
subset of functional entities are the applicable entity or entities, the functional entity
or entities are specified explicitly.
4.1.1 Balancing Authority
4.1.2 Distribution Provider that owns one or more of the following Facilities, systems,
and equipment for the protection or restoration of the BES:
4.1.2.1 Each underfrequency Load shedding (UFLS) or undervoltage Load shedding
(UVLS) system that:
4.1.2.1.1 is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.1.2.1.2 performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation,
of 300 MW or more.
4.1.2.2 Each Remedial Action Scheme (RAS) where the RAS is subject to one or
more requirements in a NERC or Regional Reliability Standard.
4.1.2.3 Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.1.2.4 Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.1.3 Generator Operator
4.1.4 Generator Owner
4.1.5 Reliability Coordinator
4.1.6 Transmission Operator
Draft 2
August 2020
Page 2 of 19
CIP‐011‐3 — Cyber Security — Information Protection
4.1.7 Transmission Owner
4.2.
Facilities: For the purpose of the requirements contained herein, the following
Facilities, systems, and equipment owned by each Responsible Entity in 4.1 above
are those to which these requirements are applicable. For requirements in this
standard where a specific type of Facilities, system, or equipment or subset of
Facilities, systems, and equipment are applicable, these are specified explicitly.
4.2.1 Distribution Provider: One or more of the following Facilities, systems and
equipment owned by the Distribution Provider for the protection or restoration
of the BES:
4.2.1.1 Each UFLS or UVLS System that:
4.2.1.1.1 is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.2.1.1.2 performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation,
of 300 MW or more.
4.2.1.2 Each RAS where the RAS is subject to one or more requirements in a NERC
or Regional Reliability Standard.
4.2.1.3 Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.2.1.4 Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.2.2 Responsible Entities listed in 4.1 other than Distribution Providers:
All BES Facilities.
4.2.3 Exemptions: The following are exempt from Standard CIP‐011‐3:
4.2.3.1 Cyber Assets at Facilities regulated by the Canadian Nuclear Safety
Commission.
4.2.3.2 Cyber Assets associated with communication networks and data
communication links between discrete Electronic Security Perimeters.
4.2.3.3 The systems, structures, and components that are regulated by the Nuclear
Regulatory Commission under a cyber security plan pursuant to 10 C.F.R.
Section 73.54.
4.2.3.4 For Distribution Providers, the systems and equipment that are not included
in section 4.2.1 above.
Draft 2
August 2020
Page 3 of 19
CIP‐011‐3 — Cyber Security — Information Protection
4.2.3.5 Responsible Entities that identify that they have no BES Cyber Systems
categorized as high impact or medium impact according to the CIP‐002‐5.1
identification and categorization processes.
5. Effective Dates:
See Implementation Plan for CIP‐011‐3.
6. Background:
Standard CIP‐011 exists as part of a suite of CIP Standards related to cyber security,
which require the initial identification and categorization of BES Cyber Systems and
require a minimum level of organizational, operational, and procedural controls to
mitigate risk to BES Cyber Systems.
Most requirements open with, “Each Responsible Entity shall implement one or more
documented [processes, plan, etc.] that include the applicable items in [Table
Reference].” The referenced table requires the applicable items in the procedures for
the requirement’s common subject matter.
The term documented processes refers to a set of required instructions specific to the
Responsible Entity and to achieve a specific outcome. This term does not imply any
particular naming or approval structure beyond what is stated in the requirements.
An entity should include as much as it believes necessary in its documented processes,
but it must address the applicable requirements in the table.
The terms program and plan are sometimes used in place of documented processes
where it makes sense and is commonly understood. For example, documented
processes describing a response are typically referred to as plans (i.e., incident
response plans and recovery plans). Likewise, a security plan can describe an
approach involving multiple procedures to address a broad subject matter.
Similarly, the term program may refer to the organization’s overall implementation of
its policies, plans and procedures involving a subject matter. Examples in the
standards include the personnel risk assessment program and the personnel training
program. The full implementation of the CIP Cyber Security Standards could also be
referred to as a program. However, the terms program and plan do not imply any
additional requirements beyond what is stated in the standards.
Responsible Entities can implement common controls that meet requirements for
multiple high and medium impact BES Cyber Systems. For example, a single training
program could meet the requirements for training personnel across multiple BES
Cyber Systems.
Measures for the initial requirement are simply the documented processes
themselves. Measures in the table rows provide examples of evidence to show
documentation and implementation of applicable items in the documented processes.
These measures serve to provide guidance to entities in acceptable records of
compliance and should not be viewed as an all‐inclusive list.
Draft 2
August 2020
Page 4 of 19
CIP‐011‐3 — Cyber Security — Information Protection
Throughout the standards, unless otherwise stated, bulleted items in the
requirements and measures are items that are linked with an “or,” and numbered
items are items that are linked with an “and.”
Many references in the Applicability section use a threshold of 300 MW for UFLS and
UVLS. This particular threshold of 300 MW for UVLS and UFLS was provided in Version
1 of the CIP Cyber Security Standards. The threshold remains at 300 MW since it is
specifically addressing UVLS and UFLS, which are last ditch efforts to save the BES. A
review of UFLS tolerances defined within regional reliability standards for UFLS
program requirements to date indicates that the historical value of 300 MW
represents an adequate and reasonable threshold value for allowable UFLS
operational tolerances.
“Applicable Systems” and “Applicability” Columns in Tables:
Each table has an “Applicable Systems” or “Applicability” column. The “Applicable
Systems” column further defines the scope of systems to which a specific requirement
row applies. The CSO706 SDT adapted this concept from the National Institute of
Standards and Technology (“NIST”) Risk Management Framework as a way of applying
requirements more appropriately based on impact and connectivity characteristics.
The following conventions are used in the “Applicable Systems” column as described.
High Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as
high impact according to the CIP‐002‐5.1 identification and categorization
processes.
Medium Impact BES Cyber Systems – Applies to BES Cyber Systems categorized
as medium impact according to the CIP‐002‐5.1 identification and categorization
processes.
Electronic Access Control or Monitoring Systems (EACMS) – Applies to each
Electronic Access Control or Monitoring System associated with a referenced
high impact BES Cyber System or medium impact BES Cyber System. Examples
may include, but are not limited to, firewalls, authentication servers, and log
monitoring and alerting systems.
Physical Access Control Systems (PACS) – Applies to each Physical Access
Control System associated with a referenced high impact BES Cyber System or
medium impact BES Cyber System with External Routable Connectivity.
Protected Cyber Assets (PCA) – Applies to each Protected Cyber Asset
associated with a referenced high impact BES Cyber System or medium impact
BES Cyber System.
Draft 2
August 2020
Page 5 of 19
CIP‐011‐3 — Cyber Security — Information Protection
B. Requirements and Measures
R1. Each Responsible Entity shall implement one or more documented information protection program(s) that collectively
includes each of the applicable requirement parts in CIP‐011‐3 Table R1 – Information Protection Program. [Violation Risk
Factor: Medium] [Time Horizon: Operations Planning].
M1. Evidence for the information protection program must include the applicable requirement parts in CIP‐011‐3 Table R1 –
Information Protection Program and additional evidence to demonstrate implementation as described in the Measures
column of the table.
Draft 2
August 2020
Page 6 of 19
CIP‐011‐3 — Cyber Security — Information Protection
CIP‐011‐3 Table R1 – Information Protection Program
Part
1.1
Applicability
Method(s) to identify BCSI.
BCSI pertaining to:
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
and their associated:
1. EACMS; and
2. PACS
Draft 2
August 2020
Requirements
Measures
Examples of acceptable evidence
include, but are not limited to, the
following:
Documented method(s) to identify
BCSI from the entity’s information
protection program; or
Indications on information (e.g.,
labels or classification) that identify
BCSI as designated in the entity’s
information protection program; or
Training materials that provide
personnel with sufficient
knowledge to identify BCSI; or
Storage location identified for
housing BCSI in the entity’s
information protection program.
Page 7 of 19
CIP‐011‐3 — Cyber Security — Information Protection
CIP‐011‐3 Table R1 – Information Protection Program
Part
1.2
Applicability
BCSI as identified in Part 1.1
Requirements
Method(s) to protect and securely
handle BCSI.
Measures
Examples of acceptable evidence
include, but are not limited to, the
following:
Evidence of methods used to
protect and securely handle BCSI
during its lifecycle, including:
o
o
o
o
Draft 2
August 2020
Electronic mechanisms,
Physical mechanisms,
Technical mechanisms, or
Administrative
mechanisms.
BCSI is handled in a manner
consistent with the entity’s
documented procedure(s).
Page 8 of 19
CIP‐011‐3 — Cyber Security — Information Protection
CIP‐011‐3 Table R1 – Information Protection Program
Part
Draft 2
August 2020
Applicability
Requirement
Measure
Page 9 of 19
CIP‐011‐3 — Cyber Security — Information Protection
1.3
BCSI as identified in Part 1.1
When the Responsible Entity engages
vendor services to store, utilize, or
analyze BCSI, implement risk
management method(s) for the
following:
Examples of acceptable evidence may
include, but are not limited to, dated
documentation of the following:
1.3.1 Data governance and rights
management; and
Implementation of the risk
identification and assessment
method(s) (1.3);
List of risk identification and
assessment method(s) per
vendor (1.3.1);
Vendor certification(s) or
Registered Entity verification of
vendor controls implemented
from the under‐layer to the
service provider, including
application, infrastructure, and
network security controls as
well as physical access controls
(1.3.2, 1.3.3, 1.3.4);
Business agreements that
include communication
expectations and protocols for
disclosures of known
vulnerabilities, access
breaches, incident response,
transparency regarding
licensing, data ownership, and
metadata (1.3.1);
Consideration made for data
sovereignty, if any (1.3.1);
1.3.2 Identity and access
management; and
1.3.3 Security management; and
1.3.4 Application, infrastructure,
and network security.
Draft 2
August 2020
Page 10 of 19
CIP‐011‐3 — Cyber Security — Information Protection
CIP‐011‐3 Table R1 – Information Protection Program
Part
Draft 2
August 2020
Applicability
Requirement
Measure
Considerations used to assess
conversion of data from one
form to another and how
information is protected from
creation to disposal (1.3.1,
1.3.3);
Dated documentation of
vendor’s identity and access
management program(1.3.2);
and
Physical and electronic security
management documentation,
(e.g., plans, diagrams) (1.3.3).
Page 11 of 19
CIP‐011‐3 — Cyber Security — Information Protection
CIP‐011‐3 Table R1 – Information Protection Program
Part
1.4
Applicability
BCSI as identified in Part 1.1
Requirement
When the Responsible Entity engages
vendor services to store, utilize, or
analyze BCSI, implement one or more
documented electronic technical
mechanisms to protect BCSI.
Measure
Examples of evidence may include, but
are not limited to, dated
documentation of the following:
Description of the electronic
technical mechanism(s) (e.g., data
masking, encryption, hashing,
tokenization, cypher, electronic key
management method[s]);
Evidence of implementation (e.g.,
configuration files, command
output, architecture documents);
and
Technical mechanism(s) for the
separation of duties,
demonstrating that entity’s
control(s) cannot be subverted by
the custodial vendor.
R2. Each Responsible Entity shall implement one or more documented process(es) that collectively include the applicable
requirement parts in CIP‐011‐3 Table R2 – BES Cyber Asset Reuse and Disposal. [Violation Risk Factor: Lower] [Time Horizon:
Operations Planning].
M2. Evidence must include each of the applicable documented processes that collectively include each of the applicable
requirement parts in CIP‐011‐3 Table R2 – BES Cyber Asset Reuse and Disposal and additional evidence to demonstrate
implementation as described in the Measures column of the table.
Draft 2
August 2020
Page 12 of 19
CIP‐011‐3 — Cyber Security — Information Protection
CIP‐011‐3 Table R2 – BES Cyber Asset Reuse and Disposal
Part
2.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS;
2. PACS; and
3. PCA
Medium Impact BES Cyber Systems
and their associated:
1. EACMS;
2. PACS; and
Requirements
Measures
Prior to the release for reuse of
Examples of acceptable evidence
applicable Cyber Assets that contain include, but are not limited to:
BCSI (except for reuse within other
Records tracking sanitization
systems identified in the “Applicable
actions taken to prevent
Systems” column), the Responsible
unauthorized retrieval of BCSI
Entity shall take action to prevent the
such as clearing, purging, or
unauthorized retrieval of BCSI from
destroying; or
the Cyber Asset data storage media.
Records tracking actions such as
encrypting, retaining in the
Physical Security Perimeter or
other methods used to prevent
unauthorized retrieval of BCSI.
3. PCA
Draft 2
August 2020
Page 13 of 19
CIP‐011‐3 — Cyber Security — Information Protection
CIP‐011‐3 Table R2 – BES Cyber Asset Reuse and Disposal
Part
2.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS;
2. PACS; and
3. PCA
Requirements
Measures
Prior to the disposal of applicable
Examples of acceptable evidence
Cyber Assets that contain BCSI, the
include, but are not limited to:
Responsible Entity shall take action to
Records that indicate that
prevent the unauthorized retrieval of
data storage media was
BCSI from the Cyber Asset or destroy
destroyed prior to the
the data storage media.
disposal of an applicable
Cyber Asset; or
Medium Impact BES Cyber Systems
and their associated:
1. EACMS;
2. PACS; and
Records of actions taken to
prevent unauthorized
retrieval of BCSI prior to the
disposal of an applicable
Cyber Asset.
3. PCA
Draft 2
August 2020
Page 14 of 19
CIP‐011‐3 — Cyber Security — Information Protection
C. Compliance
1.
Compliance Monitoring Process:
1.1. Compliance Enforcement Authority: “Compliance Enforcement Authority” (CEA) means NERC
or the Regional Entity, or any entity as otherwise designated by an Applicable Governmental
Authority, in their respective roles of monitoring and/or enforcing compliance with mandatory
and enforceable Reliability Standards in their respective jurisdictions.
1.2. Evidence Retention: The following evidence retention period(s) identify the period of time an
entity is required to retain specific evidence to demonstrate compliance. For instances where
the evidence retention period specified below is shorter than the time since the last audit, the
Compliance Enforcement Authority may ask an entity to provide other evidence to show that it
was compliant for the full time period since the last audit.
The applicable entity shall keep data or evidence to show compliance as identified below unless
directed by its Compliance Enforcement Authority to retain specific evidence for a longer
period of time as part of an investigation:
The applicable entity shall retain evidence of each requirement in this standard for three
calendar years.
If an applicable entity is found non‐compliant, it shall keep information related to the non‐
compliance until mitigation is complete and approved or for the time specified above,
whichever is longer.
The Compliance Enforcement Authority shall keep the last audit records and all requested
and submitted subsequent audit records.
1.3. Compliance Monitoring and Assessment Processes: As defined in the NERC Rules of Procedure,
“Compliance Monitoring and Enforcement Program” refers to the identification of the
processes that will be used to evaluate data or information for the purpose of assessing
performance or outcomes with the associated Reliability Standard.
Draft 2
August 2020
Page 15 of 19
CIP‐011‐3 — Cyber Security — Information Protection
2. Table of Compliance Elements
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐011‐3)
Lower VSL
Moderate VSL
High VSL
The Responsible
Entity
implemented one
or more
documented
information
protection
program(s) but did
not implement
two of the
applicable items
for Parts 1.1
through 1.4. (R1)
The Responsible
Entity implemented
one or more
documented
information
protection
program(s) but did
not implement
three or more of
the applicable
items for Parts 1.1
through 1.4. (R1)
The Responsible
Entity did not
implement one or
more documented
information
protection
program(s). (R1)
The Responsible
Entity implemented
one or more
documented
processes but did not
include processes for
reuse as to prevent
the unauthorized
retrieval of BCSI from
the BES Cyber Asset.
(2.1)
The Responsible Entity
implemented one or
more documented
processes but did not
include disposal or
media destruction
processes to prevent
the unauthorized
retrieval of BCSI from
the BES Cyber Asset.
(2.2)
The Responsible
Entity has not
documented or
implemented any
processes for
applicable
requirement parts
in CIP‐011‐3 Table
R2 – BES Cyber
Asset Reuse and
Disposal. (R2)
R1
Operations
Planning
Medium
The Responsible
Entity
implemented one
or more
documented
information
protection
program(s) but did
not implement
one of the
applicable items
for Parts 1.1
through 1.4. (R1)
R2
Operations
Planning
Lower
N/A
Severe VSL
Draft 2
August 2020
Page 16 of 19
CIP‐011‐3 — Cyber Security — Information Protection
D. Regional Variances
None.
E. Interpretations
None.
F. Associated Documents
Version History
Version
Date
1
11/26/12
Adopted by the NERC Board of
Trustees.
Developed to define
the information
protection
requirements in
coordination with other
CIP standards and to
address the balance of
the FERC directives in
its Order 706.
1
11/22/13
2
11/13/14
FERC Order issued approving CIP‐
011‐1. (Order becomes effective
on 2/3/14.)
Adopted by the NERC Board of
Trustees.
2
2/12/15
Adopted by the NERC Board of
Trustees.
Replaces the version
adopted by the Board
on 11/13/2014. Revised
version addresses
remaining directives
from Order No. 791
related to transient
devices and low impact
BES Cyber Systems.
2
1/21/16
FERC Order issued approving CIP‐
011‐2. Docket No. RM15‐14‐000
Draft 2
August 2020
Action
Change Tracking
Addressed two FERC
directives from Order
No. 791 related to
identify, assess, and
correct language and
communication
networks.
Page 17 of 19
CIP‐011‐3 — Cyber Security — Information Protection
3
Draft 2
August 2020
TBD
Adopted by the NERC Board of
Trustees
Revised to enhance BES
reliability for entities to
manage their BCSI.
Page 18 of 19
CIP‐011‐3 — Guidelines and Technical Basis
Note: The Guidelines and Technical Basis section has not been revised as part of Project 2019‐
02. A separate technical rationale document has been created to cover Project 2019‐02
revisions. Future edits to this section will be conducted through the Technical Rationale for
Reliability Standards Project and the Standards Drafting Process.
Draft 2
August 2020
Page 19 of 19
CIP‐011‐23 — Cyber Security — Information Protection
Standard Development Timeline
This section is maintained by the drafting team during the development of the standard and will
be removed when the standard is adopted by the NERC Board of Trustees (Board).
Description of Current Draft
Completed Actions
Standards Committee approved Standard Authorization Request
(SAR) for posting
SAR posted for comment
45‐day formal comment period with ballot
Anticipated Actions
45‐day formal or informal comment period with ballot
Date
March 22, 2019
March 28, 2019 –
April 26, 2019
December 20, 2019
– February 3, 2020
Date
July 2020
10‐day final ballot
September 2020
Board adoption
November 2020
New or Modified Term(s) Used in NERC Reliability Standards
This section includes all new or modified terms used in the proposed standard that will be
included in the Glossary of Terms Used in NERC Reliability Standards upon applicable regulatory
approval. Terms used in the proposed standard that are already defined and are not being
modified can be found in the Glossary of Terms Used in NERC Reliability Standards. The new or
revised terms listed below will be presented for approval with the proposed standard. Upon
Board adoption, this section will be removed.
Term(s):
None.
Draft 2
August 2020
Page 1 of 24
CIP‐011‐23 — Cyber Security — Information Protection
A. Introduction
1.
Title:
Cyber Security — Information Protection
2.
Number:
3.
Purpose: To prevent unauthorized access to BES Cyber System Information (BCSI)
by specifying information protection requirements in support of protecting BES Cyber
Systems against compromise that could lead to misoperation or instability in the Bulk
Electric System (BES).
4.
Applicability:
CIP‐011‐23
4.1. Functional Entities: For the purpose of the requirements contained herein, the
following list of functional entities will be collectively referred to as “Responsible
Entities.” For requirements in this standard where a specific functional entity or
subset of functional entities are the applicable entity or entities, the functional entity
or entities are specified explicitly.
4.1.1 Balancing Authority
4.1.2 Distribution Provider that owns one or more of the following Facilities, systems,
and equipment for the protection or restoration of the BES:
4.1.2.1 Each underfrequency Load shedding (UFLS) or undervoltage Load shedding
(UVLS) system that:
4.1.2.1.1 is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.1.2.1.2 performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation,
of 300 MW or more.
4.1.2.2 Each Special Protection System (SPS) or Remedial Action Scheme (RAS)
where the SPS or RAS is subject to one or more requirements in a NERC or
Regional Reliability Standard.
4.1.2.3 Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.1.2.4 Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.1.3 Generator Operator
4.1.4 Generator Owner
4.1.5 Interchange Coordinator or Interchange Authority
4.1.64.1.5
Draft 2
August 2020
Reliability Coordinator
Page 2 of 24
CIP‐011‐23 — Cyber Security — Information Protection
4.1.74.1.6
Transmission Operator
4.1.84.1.7
Transmission Owner
4.2.
Facilities: For the purpose of the requirements contained herein, the following
Facilities, systems, and equipment owned by each Responsible Entity in 4.1 above
are those to which these requirements are applicable. For requirements in this
standard where a specific type of Facilities, system, or equipment or subset of
Facilities, systems, and equipment are applicable, these are specified explicitly.
4.2.1 Distribution Provider: One or more of the following Facilities, systems and
equipment owned by the Distribution Provider for the protection or restoration
of the BES:
4.2.1.1 Each UFLS or UVLS System that:
4.2.1.1.1 is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.2.1.1.2 performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation,
of 300 MW or more.
4.2.1.2 Each SPS or RAS where the SPS or RAS is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.2.1.3 Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.2.1.4 Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.2.2 Responsible Entities listed in 4.1 other than Distribution Providers:
All BES Facilities.
4.2.3 Exemptions: The following are exempt from Standard CIP‐011‐23:
4.2.3.1 Cyber Assets at Facilities regulated by the Canadian Nuclear Safety
Commission.
4.2.3.2 Cyber Assets associated with communication networks and data
communication links between discrete Electronic Security Perimeters.
4.2.3.3 The systems, structures, and components that are regulated by the Nuclear
Regulatory Commission under a cyber security plan pursuant to 10 C.F.R.
Section 73.54.
4.2.3.4 For Distribution Providers, the systems and equipment that are not included
in section 4.2.1 above.
Draft 2
August 2020
Page 3 of 24
CIP‐011‐23 — Cyber Security — Information Protection
4.2.3.5 Responsible Entities that identify that they have no BES Cyber Systems
categorized as high impact or medium impact according to the CIP‐002‐5.1
identification and categorization processes.
5. Effective Dates:
See Implementation Plan for CIP‐011‐23.
6. Background:
Standard CIP‐011 exists as part of a suite of CIP Standards related to cyber security,
which require the initial identification and categorization of BES Cyber Systems and
require a minimum level of organizational, operational, and procedural controls to
mitigate risk to BES Cyber Systems.
Most requirements open with, “Each Responsible Entity shall implement one or more
documented [processes, plan, etc.] that include the applicable items in [Table
Reference].” The referenced table requires the applicable items in the procedures for
the requirement’s common subject matter.
The term documented processes refers to a set of required instructions specific to the
Responsible Entity and to achieve a specific outcome. This term does not imply any
particular naming or approval structure beyond what is stated in the requirements.
An entity should include as much as it believes necessary in its documented processes,
but it must address the applicable requirements in the table.
The terms program and plan are sometimes used in place of documented processes
where it makes sense and is commonly understood. For example, documented
processes describing a response are typically referred to as plans (i.e., incident
response plans and recovery plans). Likewise, a security plan can describe an
approach involving multiple procedures to address a broad subject matter.
Similarly, the term program may refer to the organization’s overall implementation of
its policies, plans and procedures involving a subject matter. Examples in the
standards include the personnel risk assessment program and the personnel training
program. The full implementation of the CIP Cyber Security Standards could also be
referred to as a program. However, the terms program and plan do not imply any
additional requirements beyond what is stated in the standards.
Responsible Entities can implement common controls that meet requirements for
multiple high and medium impact BES Cyber Systems. For example, a single training
program could meet the requirements for training personnel across multiple BES
Cyber Systems.
Measures for the initial requirement are simply the documented processes
themselves. Measures in the table rows provide examples of evidence to show
documentation and implementation of applicable items in the documented processes.
These measures serve to provide guidance to entities in acceptable records of
compliance and should not be viewed as an all‐inclusive list.
Draft 2
August 2020
Page 4 of 24
CIP‐011‐23 — Cyber Security — Information Protection
Throughout the standards, unless otherwise stated, bulleted items in the
requirements and measures are items that are linked with an “or,” and numbered
items are items that are linked with an “and.”
Many references in the Applicability section use a threshold of 300 MW for UFLS and
UVLS. This particular threshold of 300 MW for UVLS and UFLS was provided in Version
1 of the CIP Cyber Security Standards. The threshold remains at 300 MW since it is
specifically addressing UVLS and UFLS, which are last ditch efforts to save the BES. A
review of UFLS tolerances defined within regional reliability standards for UFLS
program requirements to date indicates that the historical value of 300 MW
represents an adequate and reasonable threshold value for allowable UFLS
operational tolerances.
“Applicable Systems” and “Applicability” Columns in Tables:
Each table has an “Applicable Systems” or “Applicability” column. The “Applicable
Systems” column to further defines the scope of systems to which a specific
requirement row applies. The CSO706 SDT adapted this concept from the National
Institute of Standards and Technology (“NIST”) Risk Management Framework as a way
of applying requirements more appropriately based on impact and connectivity
characteristics. The following conventions are used in the “Applicable Systems”
column as described.
High Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as
high impact according to the CIP‐002‐5.1 identification and categorization
processes.
Medium Impact BES Cyber Systems – Applies to BES Cyber Systems categorized
as medium impact according to the CIP‐002‐5.1 identification and categorization
processes.
Electronic Access Control or Monitoring Systems (EACMS) – Applies to each
Electronic Access Control or Monitoring System associated with a referenced
high impact BES Cyber System or medium impact BES Cyber System. Examples
may include, but are not limited to, firewalls, authentication servers, and log
monitoring and alerting systems.
Physical Access Control Systems (PACS) – Applies to each Physical Access
Control System associated with a referenced high impact BES Cyber System or
medium impact BES Cyber System with External Routable Connectivity.
Protected Cyber Assets (PCA) – Applies to each Protected Cyber Asset
associated with a referenced high impact BES Cyber System or medium impact
BES Cyber System.
Draft 2
August 2020
Page 5 of 24
CIP‐011‐23 — Cyber Security — Information Protection
B. Requirements and Measures
R1. Each Responsible Entity shall implement one or more documented information protection program(s) that collectively
includes each of the applicable requirement parts in CIP‐011‐23 Table R1 – Information Protection Program. [Violation Risk
Factor: Medium] [Time Horizon: Operations Planning].
M1. Evidence for the information protection program must include the applicable requirement parts in CIP‐011‐23 Table R1 –
Information Protection Program and additional evidence to demonstrate implementation as described in the Measures
column of the table.
Draft 2
August 2020
Page 6 of 24
CIP‐011‐23 — Cyber Security — Information Protection
CIP‐011‐23 Table R1 – Information Protection Program
Part
1.1
Applicabilityle Systems
BCSI pertaining to:
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
and their associated:
1. EACMS; and
2. PACS
Requirements
Method(s) to identify information that
meets the definition of BES Cyber
System InformationBCSI.
Measures
Examples of acceptable evidence
include, but are not limited to, the
following:
Documented method(s) to identify
BES Cyber System InformationBCSI
from the entity’s information
protection program; or
Indications on information (e.g.,
labels or classification) that identify
BES Cyber System InformationBCSI
as designated in the entity’s
information protection program; or
Training materials that provide
personnel with sufficient
knowledge to recognize identify
BES Cyber System InformationBCSI;
or
Repository or electronic and
physicalStorage location identified
designated for housing BES Cyber
System InformationBCSI in the
entity’s information protection
program.
Draft 2
August 2020
Page 7 of 24
CIP‐011‐23 — Cyber Security — Information Protection
CIP‐011‐23 Table R1 – Information Protection Program
Part
1.2
Applicabilityle Systems
BCSI as identified in Part 1.1
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems and
their associated:
1. EACMS; and
PACS
Requirements
ProcedureMethod(s) to for protecting
andprotect and securely handleing BES
Cyber System InformationBCSI,
including storage, transit, and use.
Measures
Examples of acceptable evidence
include, but are not limited to, the
following:
Evidence of methods used to
protect and securely handle BCSI
during its lifecycle, including:
Electronic mechanisms,
Physical mechanisms,
Technical mechanisms, or
Administrative
mechanisms.
Procedures for protecting and securely
handling, which include topics such as
storage, security during transit, and
use of BES Cyber System Information;
or
o
o
o
o
Draft 2
August 2020
Records indicating that BES Cyber
System InformationBCSI is
handled in a manner consistent
with the entity’s documented
procedure(s).
Page 8 of 24
CIP‐011‐23 — Cyber Security — Information Protection
CIP‐011‐3 Table R1 – Information Protection Program
Part
Draft 2
August 2020
Applicability
Requirement
Measure
Page 9 of 24
CIP‐011‐23 — Cyber Security — Information Protection
1.3
BCSI as identified in Part 1.1
When the Responsible Entity engages
vendor services to store, utilize, or
analyze BCSI, implement risk
management method(s) for the
following:
Examples of acceptable evidence may
include, but are not limited to, dated
documentation of the following:
1.3.1 Data governance and rights
management; and
Implementation of the risk
identification and assessment
method(s) (1.3);
List of risk identification and
assessment method(s) per
vendor (1.3.1);
Vendor certification(s) or
Registered Entity verification of
vendor controls implemented
from the under‐layer to the
service provider, including
application, infrastructure, and
network security controls as
well as physical access controls
(1.3.2, 1.3.3, 1.3.4);
Business agreements that
include communication
expectations and protocols for
disclosures of known
vulnerabilities, access
breaches, incident response,
transparency regarding
licensing, data ownership, and
metadata (1.3.1);
Consideration made for data
sovereignty, if any (1.3.1);
1.3.2 Identity and access
management; and
1.3.3 Security management; and
1.3.4 Application, infrastructure,
and network security.
Draft 2
August 2020
Page 10 of 24
CIP‐011‐23 — Cyber Security — Information Protection
CIP‐011‐3 Table R1 – Information Protection Program
Part
Draft 2
August 2020
Applicability
Requirement
Measure
Considerations used to assess
conversion of data from one
form to another and how
information is protected from
creation to disposal (1.3.1,
1.3.3);
Dated documentation of
vendor’s identity and access
management program(1.3.2);
and
Physical and electronic security
management documentation,
(e.g., plans, diagrams) (1.3.3).
Page 11 of 24
CIP‐011‐23 — Cyber Security — Information Protection
CIP‐011‐3 Table R1 – Information Protection Program
Part
1.4
Applicability
BCSI as identified in Part 1.1
Draft 2
August 2020
Requirement
When the Responsible Entity engages
vendor services to store, utilize, or
analyze BCSI, implement one or more
documented electronic technical
mechanisms to protect BCSI.
Measure
Examples of evidence may include, but
are not limited to, dated
documentation of the following:
Description of the electronic
technical mechanism(s) (e.g., data
masking, encryption, hashing,
tokenization, cypher, electronic key
management method[s]);
Evidence of implementation (e.g.,
configuration files, command
output, architecture documents);
and
Technical mechanism(s) for the
separation of duties,
demonstrating that entity’s
control(s) cannot be subverted by
the custodial vendor.
Page 12 of 24
CIP‐011‐23 — Cyber Security — Information Protection
R2. Each Responsible Entity shall implement one or more documented process(es) that collectively include the applicable
requirement parts in CIP‐011‐23 Table R2 – BES Cyber Asset Reuse and Disposal. [Violation Risk Factor: Lower] [Time Horizon:
Operations Planning].
M2. Evidence must include each of the applicable documented processes that collectively include each of the applicable
requirement parts in CIP‐011‐23 Table R2 – BES Cyber Asset Reuse and Disposal and additional evidence to demonstrate
implementation as described in the Measures column of the table.
CIP‐011‐23 Table R2 – BES Cyber Asset Reuse and Disposal
Part
2.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS;
2. PACS; and
3. PCA
Medium Impact BES Cyber Systems
and their associated:
Requirements
Prior to the release for reuse of
applicable Cyber Assets that contain
BES Cyber System InformationBCSI
(except for reuse within other
systems identified in the “Applicable
Systems” column), the Responsible
Entity shall take action to prevent the
unauthorized retrieval of BES Cyber
System InformationBCSI from the
Cyber Asset data storage media.
Measures
Examples of acceptable evidence
include, but are not limited to:
Records tracking sanitization
actions taken to prevent
unauthorized retrieval of BES
Cyber System InformationBCSI
such as clearing, purging, or
destroying; or
Records tracking actions such as
encrypting, retaining in the
Physical Security Perimeter or
other methods used to prevent
unauthorized retrieval of BES
Cyber System InformationBCSI.
1. EACMS;
2. PACS; and
3. PCA
Draft 2
August 2020
Page 13 of 24
CIP‐011‐23 — Cyber Security — Information Protection
CIP‐011‐23 Table R2 – BES Cyber Asset Reuse and Disposal
Part
2.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS;
2. PACS; and
3. PCA
Requirements
Measures
Prior to the disposal of applicable
Examples of acceptable evidence
Cyber Assets that contain BCSIBES
include, but are not limited to:
Cyber System Information, the
Records that indicate that
Responsible Entity shall take action to
data storage media was
prevent the unauthorized retrieval of
destroyed prior to the
BCSIBES Cyber System Information
disposal of an applicable
from the Cyber Asset or destroy the
Cyber Asset; or
data storage media.
Medium Impact BES Cyber Systems
and their associated:
1. EACMS;
2. PACS; and
Records of actions taken to
prevent unauthorized
retrieval of BCSIBES Cyber
Information prior to the
disposal of an applicable
Cyber Asset.
3. PCA
Draft 2
August 2020
Page 14 of 24
CIP‐011‐23 — Cyber Security — Information Protection
C. Compliance
1.
Compliance Monitoring Process:
1.1. Compliance Enforcement Authority: “Compliance Enforcement Authority” (CEA) means NERC
or the Regional Entity, or any entity as otherwise designated by an Applicable Governmental
Authority, in their respective roles of monitoring and/or enforcing compliance with mandatory
and enforceable Reliability Standards in their respective jurisdictions.
As defined in the NERC Rules of Procedure, “Compliance Enforcement Authority” (CEA) means
NERC or the Regional Entity in their respective roles of monitoring and enforcing compliance
with the NERC Reliability Standards.
1.3.1.2.
Evidence Retention: The following evidence retention period(s) identify the period of
time an entity is required to retain specific evidence to demonstrate compliance. For instances
where the evidence retention period specified below is shorter than the time since the last
audit, the Compliance Enforcement Authority may ask an entity to provide other evidence to
show that it was compliant for the full time period since the last audit.
The following evidence retention periods identify the period of time an entity is required to
retain specific evidence to demonstrate compliance. For instances where the evidence
retention period specified below is shorter than the time since the last audit, the CEA may ask
an entity to provide other evidence to show that it was compliant for the full time period since
the last audit.
The Responsible applicable Eentity shall keep data or evidence to show compliance as identified
below unless directed by its Compliance Enforcement AuthorityCEA to retain specific evidence
for a longer period of time as part of an investigation:
Each The Responsible applicable Eentity shall retain evidence of each requirement in this
standard for three calendar years.
If an Responsible applicable Eentity is found non‐compliant, it shall keep information
related to the non‐compliance until mitigation is complete and approved or for the time
specified above, whichever is longer.
The Compliance Enforcement AuthorityCEA shall keep the last audit records and all
requested and submitted subsequent audit records.
1.4.1.3.
Compliance Monitoring and Assessment Processes: As defined in the NERC Rules of
Procedure, “Compliance Monitoring and Enforcement Program” refers to the identification of
the processes that will be used to evaluate data or information for the purpose of assessing
performance or outcomes with the associated Reliability Standard.
Compliance Audits
Self‐Certifications
Spot Checking
Compliance Violation Investigations
Draft 2
August 2020
Page 15 of 24
CIP‐011‐23 — Cyber Security — Information Protection
Self‐Reporting
Complaints
1.5. Additional Compliance Information:
None
Draft 2
August 2020
Page 16 of 24
CIP‐011‐23 — Cyber Security — Information Protection
2. Table of Compliance Elements
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐011‐23)
Lower VSL
Moderate VSL
High VSL
N/AThe
Responsible Entity
implemented one
or more
documented
information
protection
program(s) but did
not implement
two of the
applicable items
for Parts 1.1
through 1.4. (R1)
N/A The
Responsible Entity
implemented one
or more
documented
information
protection
program(s) but did
not implement
three or more of
the applicable
items for Parts 1.1
through 1.4. (R1)
R1
Operations
Planning
Medium
N/AThe
Responsible Entity
implemented one
or more
documented
information
protection
program(s) but did
not implement
one of the
applicable items
for Parts 1.1
through 1.4. (R1)
R2
Operations
Planning
Lower
N/A
Draft 2
July August 2020
The Responsible
Entity implemented
one or more
documented
processes but did not
include processes for
reuse as to prevent
the unauthorized
retrieval of BES Cyber
System
InformationBCSI from
The Responsible Entity
implemented one or
more documented
processes but did not
include disposal or
media destruction
processes to prevent
the unauthorized
retrieval of BES Cyber
System
InformationBCSI from
Severe VSL
The Responsible
Entity has did not
documented or
implemented one or
more a documented
BES Cyber System
information
protection
program(s). (R1)
The Responsible
Entity has not
documented or
implemented any
processes for
applicable
requirement parts
in CIP‐011‐23 Table
R2 – BES Cyber
Asset Reuse and
Disposal. (R2)
Page 17 of 24
CIP‐011‐23 — Cyber Security — Information Protection
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐011‐23)
Lower VSL
Moderate VSL
High VSL
the BES Cyber Asset.
(2.1)
Severe VSL
the BES Cyber Asset.
(2.2)
Draft 2
July August 2020
Page 18 of 24
CIP‐011‐23 — Cyber Security — Information Protection
D. Regional Variances
None.
E. Interpretations
None.
F. Associated Documents
Guideline and Technical Basis (attached).
Version History
Version
Date
1
11/26/12
Adopted by the NERC Board of
Trustees.
Developed to define
the information
protection
requirements in
coordination with other
CIP standards and to
address the balance of
the FERC directives in
its Order 706.
1
11/22/13
2
11/13/14
FERC Order issued approving CIP‐
011‐1. (Order becomes effective
on 2/3/14.)
Adopted by the NERC Board of
Trustees.
2
2/12/15
Adopted by the NERC Board of
Trustees.
Replaces the version
adopted by the Board
on 11/13/2014. Revised
version addresses
remaining directives
from Order No. 791
related to transient
devices and low impact
BES Cyber Systems.
2
1/21/16
FERC Order issued approving CIP‐
011‐2. Docket No. RM15‐14‐000
Draft 2
August 2020
Action
Change Tracking
Addressed two FERC
directives from Order
No. 791 related to
identify, assess, and
correct language and
communication
networks.
Page 19 of 24
CIP‐011‐23 — Cyber Security — Information Protection
3
Draft 2
August 2020
TBD
Adopted by the NERC Board of
Trustees
Revised to enhance BES
reliability for entities to
manage their BCSI.
Page 20 of 24
CIP‐011‐23 — Guidelines and Technical Basis
Note: The Guidelines and Technical Basis section has not been revised as part of Project 2019‐
02. A separate technical rationale document has been created to cover Project 2019‐02
revisions. Future edits to this section will be conducted through the Technical Rationale for
Reliability Standards Project and the Standards Drafting Process.
Guidelines and Technical Basis
Section 4 – Scope of Applicability of the CIP Cyber Security Standards
Section “4. Applicability” of the standards provides important information for Responsible
Entities to determine the scope of the applicability of the CIP Cyber Security Requirements.
Section “4.1. Functional Entities” is a list of NERC functional entities to which the standard
applies. If the entity is registered as one or more of the functional entities listed in Section 4.1,
then the NERC CIP Cyber Security Standards apply. Note that there is a qualification in Section
4.1 that restricts the applicability in the case of Distribution Providers to only those that own
certain types of systems and equipment listed in 4.2.
Section “4.2. Facilities” defines the scope of the Facilities, systems, and equipment owned by
the Responsible Entity, as qualified in Section 4.1, that is subject to the requirements of the
standard. As specified in the exemption section 4.2.3.5, this standard does not apply to
Responsible Entities that do not have High Impact or Medium Impact BES Cyber Systems under
CIP‐002‐5.1’s categorization. In addition to the set of BES Facilities, Control Centers, and other
systems and equipment, the list includes the set of systems and equipment owned by
Distribution Providers. While the NERC Glossary term “Facilities” already includes the BES
characteristic, the additional use of the term BES here is meant to reinforce the scope of
applicability of these Facilities where it is used, especially in this applicability scoping section.
This in effect sets the scope of Facilities, systems, and equipment that is subject to the
standards.
Requirement R1:
Responsible Entities are free to utilize existing change management and asset management
systems. However, the information contained within those systems must be evaluated, as the
information protection requirements still apply.
The justification for this requirement is pre‐existing from previous versions of CIP and is also
documented in FERC Order No. 706 and its associated Notice of Proposed Rulemaking.
This requirement mandates that BES Cyber System Information be identified. The Responsible
Entity has flexibility in determining how to implement the requirement. The Responsible Entity
should explain the method for identifying the BES Cyber System Information in their
information protection program. For example, the Responsible Entity may decide to mark or
label the documents. Identifying separate classifications of BES Cyber System Information is
not specifically required. However, a Responsible Entity maintains the flexibility to do so if they
desire. As long as the Responsible Entity’s information protection program includes all
applicable items, additional classification levels (e.g., confidential, public, internal use only, etc.)
Draft 2
August 2020
Page 21 of 24
CIP‐011‐23 — Guidelines and Technical Basis
can be created that go above and beyond the requirements. If the entity chooses to use
classifications, then the types of classifications used by the entity and any associated labeling
should be documented in the entity’s BES Cyber System Information Program.
The Responsible Entity may store all of the information about BES Cyber Systems in a separate
repository or location (physical and/or electronic) with access control implemented. For
example, the Responsible Entity’s program could document that all information stored in an
identified repository is considered BES Cyber System Information, the program may state that
all information contained in an identified section of a specific repository is considered BES
Cyber System Information, or the program may document that all hard copies of information
are stored in a secured area of the building. Additional methods for implementing the
requirement are suggested in the measures section. However, the methods listed in measures
are not meant to be an exhaustive list of methods that the entity may choose to utilize for the
identification of BES Cyber System Information.
The SDT does not intend that this requirement cover publicly available information, such as
vendor manuals that are available via public websites or information that is deemed to be
publicly releasable.
Information protection pertains to both digital and hardcopy information. R1.2 requires one or
more procedures for the protection and secure handling BES Cyber System Information,
including storage, transit, and use. This includes information that may be stored on Transient
Cyber Assets or Removable Media.
The entity’s written Information Protection Program should explain how the entity handles
aspects of information protection including specifying how BES Cyber System Information is to
be securely handled during transit in order to protect against unauthorized access, misuse, or
corruption and to protect confidentiality of the communicated BES Cyber System Information.
For example, the use of a third‐party communication service provider instead of organization‐
owned infrastructure may warrant the use of encryption to prevent unauthorized disclosure of
information during transmission. The entity may choose to establish a trusted communications
path for transit of BES Cyber System Information. The trusted communications path would
utilize a logon or other security measures to provide secure handling during transit. The entity
may employ alternative physical protective measures, such as the use of a courier or locked
container for transmission of information. It is not the intent of this standard to mandate the
use of one particular format for secure handling during transit.
A good Information Protection Program will document the circumstances under which BES
Cyber System Information can be shared with or used by third parties. The organization should
distribute or share information on a need‐to‐know basis. For example, the entity may specify
that a confidentiality agreement, non‐disclosure arrangement, contract, or written agreement
of some kind concerning the handling of information must be in place between the entity and
the third party. The entity’s Information Protection Program should specify circumstances for
sharing of BES Cyber System Information with and use by third parties, for example, use of a
non‐disclosure agreement. The entity should then follow their documented program. These
requirements do not mandate one specific type of arrangement.
Draft 2
August 2020
Page 22 of 24
CIP‐011‐23 — Guidelines and Technical Basis
Requirement R2:
This requirement allows for BES Cyber Systems to be removed from service and analyzed with
their media intact, as that should not constitute a release for reuse. However, following the
analysis, if the media is to be reused outside of a BES Cyber System or disposed of, the entity
must take action to prevent the unauthorized retrieval of BES Cyber System Information from
the media.
The justification for this requirement is pre‐existing from previous versions of CIP and is also
documented in FERC Order No. 706 and its associated Notice of Proposed Rulemaking.
If an applicable Cyber Asset is removed from the Physical Security Perimeter prior to action
taken to prevent the unauthorized retrieval of BES Cyber System Information or destroying the
data storage media, the Responsible Entity should maintain documentation that identifies the
custodian for the data storage media while the data storage media is outside of the Physical
Security Perimeter prior to actions taken by the entity as required in R2.
Media sanitization is the process used to remove information from system media such that
reasonable assurance exists that the information cannot be retrieved or reconstructed. Media
sanitization is generally classified into four categories: Disposal, clearing, purging, and
destroying. For the purposes of this requirement, disposal by itself, with the exception of
certain special circumstances, such as the use of strong encryption on a drive used in a SAN or
other media, should never be considered acceptable. The use of clearing techniques may
provide a suitable method of sanitization for media that is to be reused, whereas purging
techniques may be more appropriate for media that is ready for disposal.
The following information from NIST SP800‐88 provides additional guidance concerning the
types of actions that an entity might take to prevent the unauthorized retrieval of BES Cyber
System Information from the Cyber Asset data storage media:
Clear: One method to sanitize media is to use software or hardware products to
overwrite storage space on the media with non‐sensitive data. This process may include
overwriting not only the logical storage location of a file(s) (e.g., file allocation table) but
also may include all addressable locations. The security goal of the overwriting process
is to replace written data with random data. Overwriting cannot be used for media that
are damaged or not rewriteable. The media type and size may also influence whether
overwriting is a suitable sanitization method [SP 800‐36].
Purge: Degaussing and executing the firmware Secure Erase command (for ATA drives
only) are acceptable methods for purging. Degaussing is exposing the magnetic media to
a strong magnetic field in order to disrupt the recorded magnetic domains. A degausser
is a device that generates a magnetic field used to sanitize magnetic media. Degaussers
are rated based on the type (i.e., low energy or high energy) of magnetic media they can
purge. Degaussers operate using either a strong permanent magnet or an
electromagnetic coil. Degaussing can be an effective method for purging damaged or
inoperative media, for purging media with exceptionally large storage capacities, or for
Draft 2
August 2020
Page 23 of 24
CIP‐011‐23 — Guidelines and Technical Basis
quickly purging diskettes. [SP 800‐36] Executing the firmware Secure Erase command
(for ATA drives only) and degaussing are examples of acceptable methods for purging.
Degaussing of any hard drive assembly usually destroys the drive as the firmware that
manages the device is also destroyed.
Destroy: There are many different types, techniques, and procedures for media
destruction. Disintegration, Pulverization, Melting, and Incineration are sanitization
methods designed to completely destroy the media. They are typically carried out at an
outsourced metal destruction or licensed incineration facility with the specific
capabilities to perform these activities effectively, securely, and safely. Optical mass
storage media, including compact disks (CD, CD‐RW, CD‐R, CD‐ROM), optical disks
(DVD), and MO disks, must be destroyed by pulverizing, crosscut shredding or burning.
In some cases such as networking equipment, it may be necessary to contact the
manufacturer for proper sanitization procedure.
It is critical that an organization maintain a record of its sanitization actions to prevent
unauthorized retrieval of BES Cyber System Information. Entities are strongly encouraged to
review NIST SP800‐88 for guidance on how to develop acceptable media sanitization processes.
Rationale:
During development of this standard, text boxes were embedded within the standard to explain
the rationale for various parts of the standard. Upon BOT approval, the text from the rationale
text boxes was moved to this section.
Rationale for Requirement R1:
The SDT’s intent of the information protection program is to prevent unauthorized access to
BES Cyber System Information.
Rationale for Requirement R2:
The intent of the BES Cyber Asset reuse and disposal process is to prevent the unauthorized
dissemination of BES Cyber System Information upon reuse or disposal.
Draft 2
August 2020
Page 24 of 24
CIP‐011‐3 — Cyber Security — Information Protection
Standard Development Timeline
This section is maintained by the drafting team during the development of the standard and will
be removed when the standard is adopted by the NERC Board of Trustees (Board).
Description of Current Draft
Completed Actions
Standards Committee approved Standard Authorization Request
(SAR) for posting
SAR posted for comment
45‐day formal comment period with ballot
Anticipated Actions
45‐day formal or informal comment period with ballot
Date
March 22, 2019
March 28, 2019 –
April 26, 2019
December 20, 2019
– February 3, 2020
Date
August 2020
10‐day final ballot
September 2020
Board adoption
November 2020
New or Modified Term(s) Used in NERC Reliability Standards
This section includes all new or modified terms used in the proposed standard that will be
included in the Glossary of Terms Used in NERC Reliability Standards upon applicable regulatory
approval. Terms used in the proposed standard that are already defined and are not being
modified can be found in the Glossary of Terms Used in NERC Reliability Standards. The new or
revised terms listed below will be presented for approval with the proposed standard. Upon
Board adoption, this section will be removed.
Term(s):
None.
Draft 2
August
2020
Page 1 of 28
CIP‐011‐3 — Cyber Security — Information Protection
A. Introduction
1.
Title:
Cyber Security — Information Protection
2.
Number:
3.
Purpose: To prevent unauthorized access to BES Cyber System Information (BCSI)
by specifying information protection requirements in support of protecting BES Cyber
Systems against compromise that could lead to misoperation or instability in the Bulk
Electric System (BES).
4.
Applicability:
CIP‐011‐3
4.1. Functional Entities: For the purpose of the requirements contained herein, the
following list of functional entities will be collectively referred to as “Responsible
Entities.” For requirements in this standard where a specific functional entity or
subset of functional entities are the applicable entity or entities, the functional entity
or entities are specified explicitly.
4.1.1 Balancing Authority
4.1.2 Distribution Provider that owns one or more of the following Facilities, systems,
and equipment for the protection or restoration of the BES:
4.1.2.1 Each underfrequency Load shedding (UFLS) or undervoltage Load shedding
(UVLS) system that:
4.1.2.1.1 is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.1.2.1.2 performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation,
of 300 MW or more.
4.1.2.2 Each or Remedial Action Scheme (RAS) where the RAS is subject to one or
more requirements in a NERC or Regional Reliability Standard.
4.1.2.3 Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.1.2.4 Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.1.3 Generator Operator
4.1.4 Generator Owner
4.1.5 Reliability Coordinator
4.1.6 Transmission Operator
Draft 2
August
2020
Page 2 of 28
CIP‐011‐3 — Cyber Security — Information Protection
4.1.7 Transmission Owner
4.2.
Facilities: For the purpose of the requirements contained herein, the following
Facilities, systems, and equipment owned by each Responsible Entity in 4.1 above
are those to which these requirements are applicable. For requirements in this
standard where a specific type of Facilities, system, or equipment or subset of
Facilities, systems, and equipment are applicable, these are specified explicitly.
4.2.1 Distribution Provider: One or more of the following Facilities, systems and
equipment owned by the Distribution Provider for the protection or restoration
of the BES:
4.2.1.1 Each UFLS or UVLS System that:
4.2.1.1.1 is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.2.1.1.2 performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation,
of 300 MW or more.
4.2.1.2 Each RAS where the RAS is subject to one or more requirements in a NERC
or Regional Reliability Standard.
4.2.1.3 Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.2.1.4 Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.2.2 Responsible Entities listed in 4.1 other than Distribution Providers:
All BES Facilities.
4.2.3 Exemptions: The following are exempt from Standard CIP‐011‐3:
4.2.3.1 Cyber Assets at Facilities regulated by the Canadian Nuclear Safety
Commission.
4.2.3.2 Cyber Assets associated with communication networks and data
communication links between discrete Electronic Security Perimeters.
4.2.3.3 The systems, structures, and components that are regulated by the Nuclear
Regulatory Commission under a cyber security plan pursuant to 10 C.F.R.
Section 73.54.
4.2.3.4 For Distribution Providers, the systems and equipment that are not included
in section 4.2.1 above.
Draft 2
August
2020
Page 3 of 28
CIP‐011‐3 — Cyber Security — Information Protection
4.2.3.5 Responsible Entities that identify that they have no BES Cyber Systems
categorized as high impact or medium impact according to the CIP‐002‐5.1
identification and categorization processes.
5. Effective Dates:
See Implementation Plan for CIP‐011‐3.
6. Background:
Standard CIP‐011 exists as part of a suite of CIP Standards related to cyber security,
which require the initial identification and categorization of BES Cyber Systems and
require a minimum level of organizational, operational, and procedural controls to
mitigate risk to BES Cyber Systems.
Most requirements open with, “Each Responsible Entity shall implement one or more
documented [processes, plan, etc.] that include the applicable items in [Table
Reference].” The referenced table requires the applicable items in the procedures for
the requirement’s common subject matter.
The term documented processes refers to a set of required instructions specific to the
Responsible Entity and to achieve a specific outcome. This term does not imply any
particular naming or approval structure beyond what is stated in the requirements.
An entity should include as much as it believes necessary in its documented processes,
but it must address the applicable requirements in the table.
The terms program and plan are sometimes used in place of documented processes
where it makes sense and is commonly understood. For example, documented
processes describing a response are typically referred to as plans (i.e., incident
response plans and recovery plans). Likewise, a security plan can describe an
approach involving multiple procedures to address a broad subject matter.
Similarly, the term program may refer to the organization’s overall implementation of
its policies, plans and procedures involving a subject matter. Examples in the
standards include the personnel risk assessment program and the personnel training
program. The full implementation of the CIP Cyber Security Standards could also be
referred to as a program. However, the terms program and plan do not imply any
additional requirements beyond what is stated in the standards.
Responsible Entities can implement common controls that meet requirements for
multiple high and medium impact BES Cyber Systems. For example, a single training
program could meet the requirements for training personnel across multiple BES
Cyber Systems.
Measures for the initial requirement are simply the documented processes
themselves. Measures in the table rows provide examples of evidence to show
documentation and implementation of applicable items in the documented processes.
These measures serve to provide guidance to entities in acceptable records of
compliance and should not be viewed as an all‐inclusive list.
Draft 2
August
2020
Page 4 of 28
CIP‐011‐3 — Cyber Security — Information Protection
Throughout the standards, unless otherwise stated, bulleted items in the
requirements and measures are items that are linked with an “or,” and numbered
items are items that are linked with an “and.”
Many references in the Applicability section use a threshold of 300 MW for UFLS and
UVLS. This particular threshold of 300 MW for UVLS and UFLS was provided in Version
1 of the CIP Cyber Security Standards. The threshold remains at 300 MW since it is
specifically addressing UVLS and UFLS, which are last ditch efforts to save the BES. A
review of UFLS tolerances defined within regional reliability standards for UFLS
program requirements to date indicates that the historical value of 300 MW
represents an adequate and reasonable threshold value for allowable UFLS
operational tolerances.
“Applicable Systems” and “Applicability” Columns in Tables:
Each table has an “Applicable Systems” or “Applicability” column. The “Applicableility
Systems” column further defines the scope of systems to which a specific requirement
row applies. The CSO706 SDT adapted this concept from the National Institute of
Standards and Technology (“NIST”) Risk Management Framework as a way of applying
requirements more appropriately based on impact and connectivity characteristics.
The following conventions are used in the “Applicable Systems” column as described.
Draft 2
August
2020
High Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as
high impact according to the CIP‐002‐5.1 identification and categorization
processes.
Medium Impact BES Cyber Systems – Applies to BES Cyber Systems categorized
as medium impact according to the CIP‐002‐5.1 identification and categorization
processes.
Electronic Access Control or Monitoring Systems (EACMS) – Applies to each
Electronic Access Control or Monitoring System associated with a referenced
high impact BES Cyber System or medium impact BES Cyber System. Examples
may include, but are not limited to, firewalls, authentication servers, and log
monitoring and alerting systems.
Physical Access Control Systems (PACS) – Applies to each Physical Access
Control System associated with a referenced high impact BES Cyber System or
medium impact BES Cyber System with External Routable Connectivity.
Protected Cyber Assets (PCA) – Applies to each Protected Cyber Asset
associated with a referenced high impact BES Cyber System or medium impact
BES Cyber System.
Page 5 of 28
CIP‐011‐3 — Cyber Security — Information Protection
B. Requirements and Measures
R1. Each Responsible Entity shall implement one or more documented information protection program(s) that collectively
includes each of the applicable requirement parts in CIP‐011‐3 Table R1 – Information Protection Program. [Violation Risk
Factor: Medium] [Time Horizon: Operations Planning].
M1. Evidence for the information protection program must include the applicable requirement parts in CIP‐011‐3 Table R1 –
Information Protection Program and additional evidence to demonstrate implementation as described in the Measures
column of the table.
Draft 2
August 2020
Page 6 of 28
CIP‐011‐3 — Cyber Security — Information Protection
CIP‐011‐3 Table R1 – Information Protection Program
Part
1.1
Applicability
Requirements
BCSI System information pertaining to: Method(s)Process(es) to identify
BCSI.information that meets the
High Impact BES Cyber Systems and
definition of BES Cyber System
their associated:
Information and identify applicable
1. EACMS; and
BES Cyber System Information storage
2. PACS; and
locations.
3. PCA
Medium Impact BES Cyber Systems
and their associated:
1. EACMS; and
2. PACS; and
3. PCA
Draft 2
August 2020
Measures
Examples of acceptable evidence
include, but are not limited to, the
following:
Documented process(es)method(s)
to identify BES Cyber System
InformationBCSI from the entity’s
information protection program; or
Indications on information (e.g.,
labels or classification) that identify
BES Cyber System InformationBCSI
as designated in the entity’s
information protection program; or
Training materials that provide
personnel with sufficient
knowledge to identifyrecognize
BCSIBES Cyber System Information;
or
Storage locations identified for
housing BCSIBES Cyber System
Information in the entity’s
information protection program.
Page 7 of 28
CIP‐011‐3 — Cyber Security — Information Protection
CIP‐011‐3 Table R1 – Information Protection Program
Part
1.2
Applicability
BCSIBES Cyber System Information as
identified in Requirement R1 Part 1.1
Draft 2
August 2020
Requirements
Method(s) to protect and securely
handle BCSI.prevent unauthorized
access to BES Cyber System
Information by eliminating the ability
to obtain and use BES Cyber System
Information during storage, transit,
use, and disposal.
Measures
Examples of acceptable evidence
include, but are not limited to, the
following:
Evidence of methods used to
protect and securely handle BCSI
during its lifecycle,
including:prevent the unauthorized
access to BES Cyber System
Information (e.g., encryption of
BES Cyber System Information and
key management program,
retention in the Physical Security
Perimeter).
o Electronic mechanisms,
o Physical mechanisms,
o Technical mechanisms, or
o Administrative mechanisms
BES Cyber System InformationBCSI
is handled in a manner consistent
with the entity’s documented
procedure(s)and key management
program, retention in the Physical
Security Perimeter).
Page 8 of 28
CIP‐011‐3 — Cyber Security — Information Protection
CIP‐011‐3 Table R1 – Information Protection Program
Part
1.3
Applicability
BES Cyber System Information as
identified in Requirement R1 Part 1.1.
Draft 2
August 2020
Requirement
Measure
Process(es) to authorize access to BES
Cyber System Information based on
need, as determined by the
Responsible Entity, except during CIP
Exceptional Circumstances.
Examples of evidence may include, but
are not limited to, the following:
Dated documentation of the
process to authorize access to
BES Cyber System Information
and documentation of when
CIP Exceptional Circumstances
were invoked.
This may include reviewing the
Responsible Entity’s key
management process(es).
Page 9 of 28
CIP‐011‐3 — Cyber Security — Information Protection
CIP‐011‐3 Table R1 – Information Protection Program
Part
Draft 2
August 2020
Applicability
Requirement
Measure
Page 10 of 28
CIP‐011‐3 — Cyber Security — Information Protection
1.43
BCSIBES Cyber System Information as
identified in Requirement R1 Part 1.1.
Draft 2
August 2020
When the Responsible Entity engages Examples of acceptable evidence may
include, but are not limited to, dated
vendor services to store, utilize, or
analyze BCSI, implement risk
documentation of all of the following:
identification and assessment
Implementation of the risk
method(s) for the
identification and assessment
following:Process(es) to identify,
method(s)
assess, and mitigate risks in cases
(1.3);Methodology(ies) used to
where vendors store Responsible
perform risk assessments
Entity’s BES Cyber System Information.
Dated documentation of initial
1.3.1 Data governance and rights
vendor risk assessments
management; and Perform initial
pertaining to BES Cyber System
risk assessments of vendors that
Information that are performed
store the Responsible Entity’s BES
by the Responsible Entity;
Cyber System Information
Vendor certification(s) or
1.3.2 Identity and access
Registered Entity verification of
management; and At least once
vendor controls implemented
every 15 calendar months, perform
from the under‐layer to the
risk assessments of vendors that
service provider, including
store the Responsible Entity’s BES
application, infrastructure, and
Cyber System Information
network security controls as
1.3.3 Security management; and
well as physical access controls
Document the results of the risk
(1.3.2, 1.3.3, 1.3.4);Dated
assessments performed according
documentation of vendor risk
to Parts 1.4.1 and 1.4.2 and the
assessments pertaining to BES
action plan to remediate or
Cyber System Information that
mitigate risk(s) identified in the
are performed by the
assessment, including the planned
Responsible Entity every 15
date of completing the action plan
calendar months;
and the execution status of any
Business agreements that
remediation or mitigation action
include communication
items.
expectations and protocols for
Page 11 of 28
CIP‐011‐3 — Cyber Security — Information Protection
disclosures of known
vulnerabilities, access
breaches, incident response,
transparency regarding
licensing, data ownership, and
metadata (1.3.1);Dated
documentation of results from
the vendor risk assessments
that are performed by the
Responsible Entity; and
1.3.4 Application, infrastructure,
and network security.
Draft 2
August 2020
Consideration made for data
sovereignty, if any
(1.3.1);Dated documentation of
action plans and statuses of
remediation and/or mitigation
action items
Considerations used to assess
conversion of data from one
form to another and how
information is protected from
creation to disposal (1.3.1,
1.3.3);
Dated documentation of
vendor’s identity and access
management program (1.3.2);
and
Physical and electronic security
management documentation,
(e.g., plans, diagrams) (1.3.3).
Page 12 of 28
CIP‐011‐3 — Cyber Security — Information Protection
1.4
BCSI as identified in Part 1.1
Draft 2
August 2020
When the Responsible Entity engages
vendor services to store, utilize, or
analyze BCSI, implement one or more
documented electronic technical
mechanisms to protect BCSI.
Examples of evidence may include, but
are not limited to, dated
documentation of the following:
Description of the electronic
technical mechanism(s) (e.g., data
masking, encryption, hashing,
tokenization, cypher, electronic key
management method[s]);
Evidence of implementation (e.g.,
configuration files, command
output, architecture documents);
and
Technical mechanism(s) for the
separation of duties,
demonstrating that entity’s
control(s) cannot be subverted by
the custodial vendor.
Page 13 of 28
CIP‐011‐3 — Cyber Security — Information Protection
CIP‐011‐3 Table R1 – Information Protection Program
Part
1.5
Applicability
BES Cyber System Information as
identified in Requirement R1 Part 1.1.
Draft 2
August 2020
Requirement
Measure
For termination actions, revoke the
Examples of evidence may include, but
individual’s current access to BES
are not limited to, documentation of
Cyber System Information, unless
the following:
already revoked according to CIP‐004‐
Dated workflow or sign‐off
7 Requirement R5, Part 5.1) by the end
form verifying access removal
of the next calendar day following the
associated with the termination
effective date of the termination
action; and
action.
Logs or other demonstration
showing such persons no
longer have access.
Page 14 of 28
CIP‐011‐3 — Cyber Security — Information Protection
CIP‐011‐3 Table R1 – Information Protection Program
Part
1.6
Applicability
BES Cyber System Information as
identified in Requirement R1 Part 1.1.
Requirement
Verify at least once every 15 calendar
months that access to BES Cyber
System Information is correct and
consists of personnel that the
Responsible Entity determine are
necessary for performing assigned
work functions.
Measure
Examples of evidence may include, but
are not limited to, the documentation
of the review that includes all of the
following:
Draft 2
August 2020
A dated listing of authorizations
for BES Cyber System
information;
Any privileges associated with
the authorizations; and
Dated evidence showing a
verification of the
authorizations and any
privileges were confirmed
correct and the minimum
necessary for performing
assigned work functions.
Page 15 of 28
CIP‐011‐3 — Cyber Security — Information Protection
R1.
Each Responsible Entity shall implement one or more documented key management program that collectively include the
applicable requirement parts in CIP‐011‐3 Table R2 – Information Protection. [Violation Risk Factor: Medium] [Time Horizon:
Operations Planning].
M2. Evidence must include each of the applicable documented processes that collectively include each of the applicable
requirement parts in CIP‐011‐3 Table R2 – Information Protection and additional evidence to demonstrate implementation as
described in the Measures column of the table.
CIP‐011‐3 Table R2 – Key Management Program
Part
2.1
Applicability
BES Cyber System Information as
identified in Requirement R1 Part 1.1.
Requirement
Where applicable, develop a key
management process(es) to restrict
access with revocation ability, which
shall include the following:
Measure
Examples of evidence may include, but
are not limited to, the following:
2.1.1 Key generation
2.1.3 Key distribution
2.1.4 Key storage
2.1.5 Key protection
2.1.6 Key‐periods
2.1.7 Key suppression
2.1.8 Key revocation
2.1.9 Key disposal
Draft 2
August 2020
Dated documentation of key
management method(s),
including key generation, key
distribution, key storage, key
protection, key periods, key
suppression, key revocation
and key disposal are
implemented; and
Configuration files, command
output, or architecture
documents.
Page 16 of 28
CIP‐011‐3 — Cyber Security — Information Protection
CIP‐011‐3 Table R2 – Key Management Program
Part
2.2
Applicability
BES Cyber System Information as
identified in Requirement R1 Part 1.1.
Requirement
Measure
Implement controls to separate the
Examples of evidence may include, but
BES Cyber System Information
are not limited to, the following:
custodial entity’s duties independently
Dated documentation of key
from the key management program
management method(s) that
duties established in Part 2.1.
illustrate the Responsible Entity’s
independence from its vendor
(e.g., locations where keys were
generated, dated key period
records for keys, access records to
key storage locations).
Procedural controls should be
designed to enforce the concept of
separation of duties between the
custodial entity and the key owner.
Draft 2
August 2020
Page 17 of 28
CIP‐011‐3 — Cyber Security — Information Protection
R23. Each Responsible Entity shall implement one or more documented process(es) that collectively include the applicable
requirement parts in CIP‐011‐3 Table R32 – BES Cyber Asset Reuse and Disposal. [Violation Risk Factor: Lower] [Time Horizon:
Operations Planning].
M23. Evidence must include each of the applicable documented processes that collectively include each of the applicable
requirement parts in CIP‐011‐3 Table R32 – BES Cyber Asset Reuse and Disposal and additional evidence to demonstrate
implementation as described in the Measures column of the table.
CIP‐011‐3 Table R32 – BES Cyber Asset Reuse and Disposal
Part
32.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS;
2. PACS; and
3. PCA
Medium Impact BES Cyber Systems
and their associated:
Requirements
Prior to the release for reuse or
disposal of applicable BES Cyber
Assets that contain BCSI (except for
reuse within other systems identified
in the “Applicable Systems” column),
the Responsible Entity shall take
action to prevent the unauthorized
retrieval of BCSI from the Cyber Asset
data storage media shall be sanitized
or destroyed.
Measures
Examples of acceptable evidence
include, but are not limited to, the
following:
Records tracking sanitization
actions taken to prevent
unauthorized retrieval of BCSI
such as clearing, purging, or
destroying; or
Records tracking actions such as
encrypting, retaining in the
Physical Security Perimeter or
other methods used to prevent
unauthorized retrieval of BCSI.
Records that indicate the Cyber
Asset’s data storage media was
sanitized or destroyed before
reuse or disposal.
Records that indicate chain of
custody was implemented.
1. EACMS;
2. PACS; and
3. PCA
Draft 2
August 2020
Page 18 of 28
CIP‐011‐3 — Cyber Security — Information Protection
Draft 2
August 2020
Page 19 of 28
CIP‐011‐3 — Cyber Security — Information Protection
CIP‐011‐3 Table R2 – BES Cyber Asset Reuse and Disposal
Part
2.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS;
2. PACS; and
3. PCA
Requirements
Measures
Prior to the disposal of applicable
Examples of acceptable evidence
Cyber Assets that contain BCSI, the
include, but are not limited to:
Responsible Entity shall take action to
Records that indicate that
prevent the unauthorized retrieval of
data storage media was
BCSI from the Cyber Asset or destroy
destroyed prior to the
the data storage media.
disposal of an applicable
Cyber Asset; or
Medium Impact BES Cyber Systems
and their associated:
1. EACMS;
2. PACS; and
Records of actions taken to
prevent unauthorized
retrieval of BCSIBES Cyber
Information prior to the
disposal of an applicable
Cyber Asset.
3. PCA
Draft 2
August 2020
Page 20 of 28
CIP‐011‐3 — Cyber Security — Information Protection
C. Compliance
1.
Compliance Monitoring Process:
1.1. Compliance Enforcement Authority: “Compliance Enforcement Authority” (CEA) means NERC
or the Regional Entity, or any entity as otherwise designated by an Applicable Governmental
Authority, in their respective roles of monitoring and/or enforcing compliance with mandatory
and enforceable Reliability Standards in their respective jurisdictions.
As defined in the NERC Rules of Procedure, “Compliance Enforcement Authority” (CEA) means
NERC or the Regional Entity in their respective roles of monitoring and enforcing compliance
with the NERC Reliability Standards.
1.3.1.2.
Evidence Retention: The following evidence retention period(s) identify the period of
time an entity is required to retain specific evidence to demonstrate compliance. For instances
where the evidence retention period specified below is shorter than the time since the last
audit, the Compliance Enforcement Authority may ask an entity to provide other evidence to
show that it was compliant for the full time period since the last audit.
The following evidence retention periods identify the period of time an entity is required to
retain specific evidence to demonstrate compliance. For instances where the evidence
retention period specified below is shorter than the time since the last audit, the CEA may ask
an entity to provide other evidence to show that it was compliant for the full time period since
the last audit.
The Responsible applicable Eentity shall keep data or evidence to show compliance as identified
below unless directed by its Compliance Enforcement AuthorityCEA to retain specific evidence
for a longer period of time as part of an investigation:
Each The Responsible applicable Eentity shall retain evidence of each requirement in this
standard for three calendar years.
If an Responsible applicable Eentity is found non‐compliant, it shall keep information
related to the non‐compliance until mitigation is complete and approved or for the time
specified above, whichever is longer.
The Compliance Enforcement AuthorityCEA shall keep the last audit records and all
requested and submitted subsequent audit records.
1.4.1.3.
Compliance Monitoring and Assessment Processes: As defined in the NERC Rules of
Procedure, “Compliance Monitoring and Enforcement Program” refers to the identification of
the processes that will be used to evaluate data or information for the purpose of assessing
performance or outcomes with the associated Reliability Standard.
Compliance Audits
Self‐Certifications
Spot Checking
Compliance Investigations
Draft 2
August 2020
Page 21 of 28
CIP‐011‐3 — Cyber Security — Information Protection
Self‐Reporting
Complaints
1.4. Additional Compliance Information:
None
Draft 2
August 2020
Page 22 of 28
CIP‐011‐3 — Cyber Security — Information Protection
2. Table of Compliance Elements
R #
R1
Time
Horizon
Operations
Planning
VRF
Mediu
m
Violation Severity Levels (CIP‐011‐3)
Lower VSL
Moderate VSL
High VSL
N/AThe
Responsible Entity
implemented one
or more
documented
information
protection
program(s) but did
not implement
one of the
applicable items
for Parts 1.1
through 1.4. (R1)
N/AThe
Responsible Entity
implemented one
or more
documented
information
protection
program(s) but did
not implement
two of the
applicable items
for Parts 1.1
through 1.4. (R1)
The Responsible Entity
has documented or
implemented a BES
Cyber System
Information
protection program,
but did not prevent
unauthorized access
to BES Cyber System
Information by
eliminating the ability
to obtain and use BCSI
during storage, transit,
use and disposal. (1.2)
Severe VSL
The Responsible
Entity has did not
documented or
implemented one or
more a documented
BES Cyber System
information
protection
program(s). (R1)
The Responsible Entity
implemented one or
more documented
information protection
program(s) but did not
implement three or
more of the applicable
items for Parts 1.1
through 1.4. (R1)
Draft 2
August 2020
Page 23 of 28
CIP‐011‐3 — Cyber Security — Information Protection
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐011‐3)
Lower VSL
R2
Operations
Planning
Mediu
m
N/A
R32
Operations
Planning
Lower
N/A
Draft 2
August 2020
Moderate VSL
High VSL
N/A
The Responsible
Entity implemented
one or more
documented
processes but did not
include processes for
reuse as to prevent
the unauthorized
retrieval of BCSIBES
Severe VSL
N/A When the
Responsible Entity
used a vendor’s
services for BCSI as
identified in
Requirement R1, Part
1.1, the Responsible
Entity documented
one or more
electronic technical
mechanisms to
prevent unauthorized
logical access to BCSI
but did not implement
electronic technical
mechanisms to
prevent unauthorized
logical access to BCSI.
(R2)
When the
Responsible Entity
used a vendor’s
services for BCSI as
identified in
Requirement R1,
Part 1.1, Tthe
Responsible Entity
has did not
documented or
implemented
electronic technical
mechanisms to
prevent
unauthorized logical
access processes
forto BCSI key
management
program. (R2)
The Responsible Entity
implemented one or
more documented
processes but did not
include disposal or
media destruction
processes to prevent
the unauthorized
retrieval of BCSIBES
The Responsible
Entity has not
documented or
implemented any
processes for
applicable
requirement parts
in CIP‐011‐3 Table
R3 – BES Cyber
Page 24 of 28
CIP‐011‐3 — Cyber Security — Information Protection
R #
Time
Horizon
VRF
Violation Severity Levels (CIP‐011‐3)
Lower VSL
Moderate VSL
High VSL
Cyber System
Information from the
BES Cyber Asset.
(23.1)
Cyber System
Information from the
BES Cyber Asset.
(23.12)
Severe VSL
Asset Reuse and
Disposal. (R3R2)
Draft 2
August 2020
Page 25 of 28
CIP‐011‐3 — Cyber Security — Information Protection
D. Regional Variances
None.
E. Interpretations
None.
F. Associated Documents
Version History
Version
Date
1
11/26/12
Adopted by the NERC Board of
Trustees.
Developed to define
the information
protection
requirements in
coordination with other
CIP standards and to
address the balance of
the FERC directives in
its Order 706.
1
11/22/13
2
11/13/14
FERC Order issued approving CIP‐
011‐1. (Order becomes effective
on 2/3/14.)
Adopted by the NERC Board of
Trustees.
2
2/12/15
Adopted by the NERC Board of
Trustees.
Replaces the version
adopted by the Board
on 11/13/2014. Revised
version addresses
remaining directives
from Order No. 791
related to transient
devices and low impact
BES Cyber Systems.
2
1/21/16
FERC Order issued approving CIP‐
011‐2. Docket No. RM15‐14‐000
Draft 2
August 2020
Action
Change Tracking
Addressed two FERC
directives from Order
No. 791 related to
identify, assess, and
correct language and
communication
networks.
Page 26 of 28
CIP‐011‐3 — Cyber Security — Information Protection
3
Draft 2
August 2020
TBD
Adopted by the NERC Board of
Trustees
Revised to enhance BES
reliability for entities to
manage their BES
Cyber System
InformationBCSI.
Page 27 of 28
CIP‐011‐3 — Cyber Security — Information ProtectionGuidelines and Technical Basis
Note: The Guidelines and Technical Basis section has not been revised as part of Project 2019‐
02. A separate technical rationale document has been created to cover Project 2019‐02
revisions. Future edits to this section will be conducted through the Technical Rationale for
Reliability Standards Project and the Standards Drafting Process.
Draft 2
August 2020
Page 28 of 28
Implementation Plan
Project 2019-02 BES Cyber System Information Access Management
Reliability Standard CIP-004 and CIP-011
Applicable Standard(s)
CIP‐004‐7 – Cyber Security ‐ Personnel & Training
CIP‐011‐3 – Cyber Security ‐ Information Protection
Requested Retirement(s)
CIP‐004‐6 – Cyber Security ‐ Personnel & Training
CIP‐011‐2 – Cyber Security ‐ Information Protection
Prerequisite Standard(s)
None
Applicable Entities
Balancing Authority
Distribution Provider1
Generator Operator
Reliability Coordinator
Transmission Operator
Transmission Owner
Facilities2
Background
The purpose of Project 2019‐02 BES Cyber System Information Access Management is to clarify the
CIP requirements related to both managing access and securing BES Cyber System Information
(BCSI). This project proposes revisions to Reliability Standards CIP‐004‐6 and CIP‐011‐2.
The proposed revisions enhance BES reliability by creating increased choice, greater flexibility,
higher availability, and reduced‐cost options for entities to manage their BCSI. In addition, the
1 See subject standards for additional information on Distribution Providers subject to the standards.
2 See subject standards for additional information on Facilities subject to the standards.
RELIABILITY | RESILIENCE | SECURITY
proposed revisions clarify the protections expected when utilizing third‐party solutions (e.g., cloud
services).
General Considerations
This standard will become effective 18 months following regulatory approval. The 18‐month period
provides Responsible Entities with sufficient time to come into compliance with new and revised
Requirements, including taking steps to:
Address the increased scope of the CIP‐011 “Applicability” column now present in the updated
Requirement R1 and new Requirement R2, which is focused on protection of BCSI. ;
Implement electronic technical mechanisms to mitigate the risk of unauthorized access to BCSI
when Responsible Entities elect to use vendor services;
Develop a risk management method(s) to evaluate vendors’ environments for data governance
and rights management; identity and access management; security management (physical and
cyber); and application, infrastructure, and network security; and
Establish and/or modify vendor relationships to ensure compliance with the updated CIP‐004
and CIP‐011.
The 18‐month implementation period will allow budgetary cycles for Responsible Entities to allocate
the proper amount of resources to support implementation of the updated CIP‐004 and CIP‐011. In
addition, the implementation period will provide ERO and Responsible Entities flexibility in case of
unforeseen circumstances or events and afford the opportunity for feedback to be provided to the
ERO and Responsible Entities through various communication vehicles within industry (e.g., NERC
Reliability Standards Technical Committee, North American Transmission Form), which will
encourage more ownership and commitment by Responsible Entities to adhere to the updated CIP‐
004 and CIP‐011.
Effective Date
CIP‐004‐7 – Cyber Security ‐ Personnel & Training
Where approval by an applicable governmental authority is required, the standard shall become
effective on the first day of the first calendar quarter that is eighteen (18) months after the effective
date of the applicable governmental authority’s order approving the standard, or as otherwise
provided for by the applicable governmental authority.
Where approval by an applicable governmental authority is not required, the standard shall become
effective on the first day of the first calendar quarter that is eighteen (18) months after the date the
standard is adopted by the NERC Board of Trustees, or as otherwise provided for in that jurisdiction.
CIP‐011‐3 – Cyber Security ‐ Information Protection
Where approval by an applicable governmental authority is required, the standard shall become
effective on the first day of the first calendar quarter that is eighteen (18) months after the effective
Implementation Plan
Project 2019‐02 BES Cyber System Information Access Management | August 2020
2
date of the applicable governmental authority’s order approving the standard, or as otherwise
provided for by the applicable governmental authority.
Where approval by an applicable governmental authority is not required, the standard shall become
effective on the first day of the first calendar quarter that is eighteen (18) months after the date the
standard is adopted by the NERC Board of Trustees, or as otherwise provided for in that jurisdiction.
Retirement Date
CIP‐004‐6 – Cyber Security ‐ Personnel & Training
Reliability Standard CIP‐004‐6 shall be retired immediately prior to the effective date of CIP‐004‐7 in
the particular jurisdiction in which the revised standard is becoming effective.
CIP‐011‐2 – Cyber Security ‐ Information Protection
Reliability Standard CIP‐011‐2 shall be retired immediately prior to the effective date of CIP‐011‐3 in
the particular jurisdiction in which the revised standard is becoming effective.
Implementation Plan
Project 2019‐02 BES Cyber System Information Access Management | August 2020
3
Implementation Plan
Project 2019-02 BES Cyber System Information Access Management
Reliability Standard CIP-004 and CIP-011
Applicable Standard(s)
CIP‐004‐7 – Cyber Security ‐ Personnel & Training
CIP‐011‐3 – Cyber Security ‐ Information Protection
Requested Retirement(s)
CIP‐004‐6 – Cyber Security ‐ Personnel & Training
CIP‐011‐2 – Cyber Security ‐ Information Protection
Prerequisite Standard(s)
None
Applicable Entities
Balancing Authority
Distribution Provider1
Generator Operator
Interchange Coordinator or Interchange Authority
Reliability Coordinator
Transmission Operator
Transmission Owner
Facilities2
Background
The purpose of Project 2019‐02 BES Cyber System Information Access Management is to clarify the
CIP requirements related to both managing access and securing BES Cyber System Information
(BCSI). This project proposes revisions to Reliability Standards CIP‐004‐6 and CIP‐011‐2, including
moving some existing CIP‐004‐6 Requirements to proposed CIP‐011‐3.
1 See subject standards for additional information on Distribution Providers subject to the standards.
2 See subject standards for additional information on Facilities subject to the standards.
RELIABILITY | RESILIENCE | SECURITY
The proposed revisions enhance BES reliability by creating increased choice, greater flexibility,
higher availability, and reduced‐cost options for entities to manage their BCSI. In addition, the
proposed revisions clarify the protections expected when utilizing third‐party solutions (e.g., cloud
services).
General Considerations
This standard will become effective 18 months following regulatory approval. The 18‐month period
provides Responsible Entities with sufficient time to come into compliance with new and revised
Requirements, including taking steps to:
Address the increased scope of the CIP‐011 “Applicability” column now present in the updated
Requirement R1 and new Requirement R2, which is focused on protection of BCSI. Establish
and/or modify vendor relationships to establish compliance with the revised CIP‐011‐3
Requirements;
Implement electronic technical mechanisms to mitigate the risk of unauthorized access to BCSI
when Responsible Entities elect to use vendor servicesAddress the increased scope of the CIP‐
011‐3 “Applicable Systems” and “Applicability” column, which has a focus on BES Cyber System
Information as well as the addition of Protected Cyber Assets (PCA); and
Develop additional sanitization programs for the life cycle of BES Cyber Systems, if necessary;
Develop a risk management method(s) to evaluate vendors’ environments for data governance
and rights management; identity and access management; security management (physical and
cyber); and application, infrastructure, and network security; and
Establish and/or modify vendor relationships to ensure compliance with the updated CIP‐004
and CIP‐011.
The 18‐month implementation period will allow budgetary cycles for Responsible Entities to allocate
the proper amount of resources to support implementation of the updated CIP‐004 and CIP‐011. In
addition, the implementation period will provide ERO and Responsible Entities flexibility in case of
unforeseen circumstances or events and afford the opportunity for feedback to be provided to the
ERO and Responsible Entities through various communication vehicles within industry (e.g., NERC
Reliability Standards Technical Committee, North American Transmission Form), which will
encourage more ownership and commitment by Responsible Entities to adhere to the updated CIP‐
004 and CIP‐011.
Effective Date
CIP‐004‐7 – Cyber Security ‐ Personnel & Training
Where approval by an applicable governmental authority is required, the standard shall become
effective on the first day of the first calendar quarter that is eighteen (18) months after the effective
date of the applicable governmental authority’s order approving the standard, or as otherwise
provided for by the applicable governmental authority.
Implementation Plan
Project 2019‐02 BES Cyber System Information Access Management | August 2020
2
Where approval by an applicable governmental authority is not required, the standard shall become
effective on the first day of the first calendar quarter that is eighteen (18) months after the date the
standard is adopted by the NERC Board of Trustees, or as otherwise provided for in that jurisdiction.
CIP‐011‐3 – Cyber Security ‐ Information Protection
Where approval by an applicable governmental authority is required, the standard shall become
effective on the first day of the first calendar quarter that is eighteen (18) months after the effective
date of the applicable governmental authority’s order approving the standard, or as otherwise
provided for by the applicable governmental authority.
Where approval by an applicable governmental authority is not required, the standard shall become
effective on the first day of the first calendar quarter that is eighteen (18) months after the date the
standard is adopted by the NERC Board of Trustees, or as otherwise provided for in that jurisdiction.
Retirement Date
CIP‐004‐7 6 – Cyber Security ‐ Personnel & Training
Reliability Standard CIP‐004‐6 shall be retired immediately prior to the effective date of CIP‐004‐7 in
the particular jurisdiction in which the revised standard is becoming effective.
CIP‐011‐3 2 – Cyber Security ‐ Information Protection
Reliability Standard CIP‐011‐2 shall be retired immediately prior to the effective date of CIP‐011‐3 in
the particular jurisdiction in which the revised standard is becoming effective.
Implementation Plan
Project 2019‐02 BES Cyber System Information Access Management | August 2020
3
Unofficial Comment Form
Project 2019-02 BES Cyber System Information Access Management
Do not use this form for submitting comments. Use the Standards Balloting and Commenting System
(SBS) to submit comments on Project 2019-02 BES Cyber System Information Access Management by 8
p.m. Eastern, September 21, 2020.
Additional information is available on the project page. If you have questions, contact Senior Standards
Developer, Latrice Harkness (via email), or at 404-446-9728.
Background Information
The purpose of Project 2019-02 BES Cyber System Information Access Management is to clarify the CIP
requirements related to both managing access and securing BES Cyber System Information (BCSI). This
project proposes revisions to Reliability Standards CIP-004-6 and CIP-011-2.
The proposed revisions enhance BES reliability by creating increased choice, greater flexibility, higher
availability, and reduced-cost options for entities to manage their BCSI. In addition, the proposed
revisions clarify the protections expected when utilizing third-party solutions (e.g., cloud services).
RELIABILITY | RESILIENCE | SECURITY
Questions
1. Do you agree the revisions to CIP-004 clarify the requirements for managing provisioned access to
BCSI when utilizing third-party solutions (e.g., cloud services)?
Yes
No
Comments:
2. Do you agree the revisions to CIP-004 clarify that entities are only required to manage the
provisioning of physical access to physical BCSI and electronic access to electronic BCSI?
Yes
No
Comments:
3. Do you agree the revisions to CIP-011 clarify the protections expected when utilizing third-party
solutions (e.g., cloud services)?
Yes
No
Comments:
4. Do you agree the new and revised VSL/VRF descriptions clearly align with the revisions to CIP-004
and CIP-011?
Yes
No
Comments:
5. The SDT is proposing an 18-month implementation plan. Do you agree to the proposed timeframe?
Yes
No
Comments:
Unofficial Comment Form
Project 2019-02 BES Cyber System Information Access Management | August 2020
2
6. The SDT proposes that the modifications in CIP-004 and CIP-011 meet the project scope in a costeffective manner. Do you agree? If you do not agree, or if you agree but have suggestions for
improvement to enable more cost-effective approaches, please provide your recommendation and,
if appropriate, technical or procedural justification.
Yes
No
Comments:
7. Provide any additional comments for the standard drafting team to consider, if desired.
Comments:
Unofficial Comment Form
Project 2019-02 BES Cyber System Information Access Management | August 2020
3
Cyber Security —
Personnel & Training
Technical Rationale and Justification for
Reliability Standard CIP-004-7
August 2020
RELIABILITY | RESILIENCE | SECURITY
NERC | Report Title | Report Date
I
Table of Contents
Preface ........................................................................................................................................................................... iii
Introduction ................................................................................................................................................................... iv
New and Modified Terms Used on NERC Reliability Standards ...................................................................................... 1
Proposed Modified Terms ........................................................................................................................................... 1
Proposed New Terms .................................................................................................................................................. 1
Requirement R1 .............................................................................................................................................................. 2
General Considerations for Requirement R1 ........................................................................................................... 2
Rationale for Requirement R1 ................................................................................................................................. 2
Requirement R2 .............................................................................................................................................................. 3
General Considerations for Requirement R2 ........................................................................................................... 3
Rationale for Requirement R2 ................................................................................................................................. 3
Requirement R3 .............................................................................................................................................................. 4
General Considerations for Requirement R3 ........................................................................................................... 4
Rationale for Requirement R3 ................................................................................................................................. 4
Requirement R4 .............................................................................................................................................................. 5
General Considerations for Requirement R4 ........................................................................................................... 5
Rationale for Requirement R4 ................................................................................................................................. 5
Requirement R5 .............................................................................................................................................................. 6
General Considerations for Requirement R5 ........................................................................................................... 6
Rationale for Requirement R5 ................................................................................................................................. 6
Requirement R6 .............................................................................................................................................................. 7
General Considerations for Requirement R6 ........................................................................................................... 7
Rationale for Requirement R6 ................................................................................................................................. 7
Technical Rationale for Reliability Standard CIP‐004‐6 ................................................................................................. 10
NERC | Technical Rationale and Justification for Reliability Standard CIP‐004‐7 | August 2020
ii
Preface
Electricity is a key component of the fabric of modern society and the Electric Reliability Organization (ERO) Enterprise
serves to strengthen that fabric. The vision for the ERO Enterprise, which is comprised of the North American Electric
Reliability Corporation (NERC) and the six Regional Entities (REs), is a highly reliable and secure North American bulk
power system (BPS). Our mission is to assure the effective and efficient reduction of risks to the reliability and security
of the grid.
Reliability | Resilience | Security
Because nearly 400 million citizens in North America are counting on us
The North American BPS is divided into six RE boundaries as shown in the map and corresponding table below. The
multicolored area denotes overlap as some load‐serving entities participate in one Region while associated
Transmission Owners/Operators participate in another.
MRO
Midwest Reliability Organization
NPCC
Northeast Power Coordinating Council
RF
ReliabilityFirst
SERC
SERC Reliability Corporation
Texas RE Texas Reliability Entity
WECC
Western Electricity Coordinating Council
NERC | Technical Rationale and Justification for Reliability Standard CIP‐004‐7 | August 2020
iii
Introduction
This document explains the technical rationale and justification for the proposed Reliability Standard
CIP‐004‐7. It provides stakeholders and the ERO Enterprise with an understanding of the technology and
technical requirements in the Reliability Standard. It also contains information on the intent of the Standard
Drafting Team (SDT) in drafting the requirements. This Technical Rationale and Justification for CIP‐004‐7
is not a Reliability Standard and should not be considered mandatory and enforceable.
On July 24, 2019, the North American Electric Reliability Corporation (NERC) Standards Committee
accepted a Standard Authorization Request (SAR) approving and initiative to enhance BES reliability by
creating increased choice, greater flexibility, higher availability, and reduced‐cost options for entities to
manage their BES Cyber System Information, by providing a secure path towards utilization of modern
third‐party data storage and analysis systems. In addition, the project intended to clarify the protections
expected when utilizing third‐party solutions (e.g., cloud services).
In response to this SAR, the Project 2019‐02 SDT drafted Reliability Standard CIP‐004‐7 to require
Responsible Entities to implement specific controls in Requirement R6 for provisioning, periodic review,
and revocation of access related to BES Cyber System Information.
NERC | Technical Rationale and Justification for Reliability Standard CIP‐004‐7 | August 2020
iv
New and Modified Terms Used on NERC Reliability Standards
Proposed Modified Terms
None
Proposed New Terms
None
NERC | Technical Rationale and Justification for Reliability Standard CIP‐004‐7 | August 2020
1
Requirement R1
General Considerations for Requirement R1
None
Rationale for Requirement R1
The security awareness program is intended to be an informational program, not a formal training
program. It should reinforce security practices to ensure that personnel maintain awareness of best
practices for both physical and electronic security to protect its BES Cyber Systems. The Responsible
Entity is not required to provide records that show that each individual received or understood the
information, but they must maintain documentation of the program materials utilized in the form of
posters, memos, and/or presentations.
NERC | Technical Rationale and Justification for Reliability Standard CIP‐004‐7 | August 2020
2
Requirement R2
General Considerations for Requirement R2
None
Rationale for Requirement R2
Training shall cover the policies, access controls, and procedures as developed for the BES Cyber Systems
and include, at a minimum, the required items appropriate to personnel roles and responsibilities from
Table R2.
One new element in the training content is intended to encompass networking hardware and software
and other issues of electronic interconnectivity supporting the operation and control of BES Cyber
Systems as per FERC Order No. 706, Paragraph 434. Additionally, training should address the risk posed
when connecting and using Transient Cyber Assets and Removable Media with BES Cyber Systems or
within an Electronic Security Perimeter. As noted in FERC Order No. 791, Paragraph 135, Transient Cyber
Assets and Removable Media have been the source of incidents where malware was introduced into
electric generation industrial control systems in real‐world situations. Training on their use is a key
element in protecting BES Cyber Systems. This is not intended to provide technical training to individuals
supporting networking hardware and software, but educating system users of the cyber security risks
associated with the interconnectedness of these systems. The users, based on their function, role, or
responsibility, should have a basic understanding of which systems can be accessed from other systems
and how the actions they take can affect cyber security.
Each Responsible Entity shall ensure all personnel who are granted authorized electronic access and/or
authorized unescorted physical access to its BES Cyber Systems, including contractors and service
vendors, complete cyber security training prior to their being granted authorized access, except for CIP
Exceptional Circumstances. To retain the authorized accesses, individuals must complete the training at
least one every 15 months.
NERC | Technical Rationale and Justification for Reliability Standard CIP‐004‐7 | August 2020
3
Requirement R3
General Considerations for Requirement R3
None
Rationale for Requirement R3
Each Responsible Entity shall ensure a personnel risk assessment is performed for all personnel who are
granted authorized electronic access and/or authorized unescorted physical access to its BES Cyber
Systems, including contractors and service vendors, prior to their being granted authorized access, except
for program specified exceptional circumstances that are approved by the single senior management
official or their delegate and impact the reliability of the BES or emergency response.
Identity only needs to be confirmed prior to initially granting access and only requires periodic
confirmation according to the entity’s process during the tenure of employment, which may or may not
be the same as the initial verification action.
A seven year criminal history check should be performed for those locations where the individual has
resided for at least six consecutive months. This check should also be performed in accordance with
federal, state, provincial, and local laws, and subject to existing collective bargaining unit agreements.
When it is not possible to perform a full seven year criminal history check, documentation must be made
of what criminal history check was performed, and the reasons a full seven‐year check could not be
performed.
There needs to be a personnel risk assessment that has been completed within the last seven years for
each individual with access. A new criminal history records check must be performed as part of the new
PRA. Individuals who have been granted access under a previous version of these standards need a new
PRA within seven years of the date of their last PRA. The clarifications around the seven year criminal
history check in this version do not require a new PRA be performed by the implementation date.
NERC | Technical Rationale and Justification for Reliability Standard CIP‐004‐7 | August 2020
4
Requirement R4
General Considerations for Requirement R4
None
Rationale for Requirement R4
Authorization for electronic and unescorted physical access must be on the basis of necessity in the
individual performing a work function. Documentation showing the authorization should have some
justification of the business need included. To ensure proper segregation of duties, the SDT intends that
access authorization and provisioning be performed by different people where possible.
This requirement specifies both quarterly reviews and reviews at least once every 15 calendar months.
Quarterly reviews are to perform a validation that only authorized users have been granted access to BES
Cyber Systems. The focus of this requirement is on the integrity of provisioning access rather than
individual accounts on all BES Cyber Assets.
The privilege review at least once every 15 calendar months is more detailed to ensure an individual’s
associated privileges are the minimum necessary to perform their work function.
An example timeline of all the reviews in Requirement R4 is included below.
If the results of quarterly or at least once every 15 calendar months account reviews indicate an
administrative or clerical error in which access was not actually provisioned, then the SDT intends that this
error should not be considered a violation of this requirement.
For BES Cyber Systems that do not have user accounts defined, the controls listed in Requirement R4 are
not applicable. However, the Responsible Entity should document such configurations.
NERC | Technical Rationale and Justification for Reliability Standard CIP‐004‐7 | August 2020
5
Requirement R5
General Considerations for Requirement R5
None
Rationale for Requirement R5
The requirement to revoke access at the time of the termination action includes procedures showing
revocation of access concurrent with the termination action. This requirement recognizes that the timing
of the termination action may vary depending on the circumstance.
Revocation of electronic access should be understood to mean a process with the end result that
electronic access to BES Cyber Systems is no longer possible using credentials assigned to or known by the
individual(s) whose access privileges are being revoked.
The initial revocation required in Requirement R5.1 includes unescorted physical access and Interactive
Remote Access. These two actions should prevent any further access by the individual after termination.
If an individual still has local access accounts (i.e., accounts on the Cyber Asset itself) on BES Cyber Assets,
then the Responsible Entity has 30 days to complete the revocation process for those accounts.
Revocation of access to shared accounts is called out separately to prevent the situation where passwords
on substation and generation devices are constantly changed due to staff turnover.
Requirement 5.5 specified that passwords for shared account are to the changed within 30 calendar days
of the termination action or when the Responsible Entity determines an individual no longer requires
access to the account as a result of a reassignment or transfer. The 30 days applies under normal
operating conditions. However, circumstances may occur where this is not possible. Some systems may
require an outage or reboot of the system in order to complete the password change. In periods of
extreme heat or cold, many Responsible Entities may prohibit system outages and reboots in order to
maintain reliability of the BES. When these circumstances occur, the Responsible Entity must document
these circumstances and prepare to change the password within 10 calendar days following the end of
the operating circumstances. Records of activities must be retained to show that the Responsible Entity
followed the plan they created.
NERC | Technical Rationale and Justification for Reliability Standard CIP‐004‐7 | August 2020
6
Requirement R6
General Considerations for Requirement R6
None
Rationale for Requirement R6
Requirement R6 requires Responsible Entities to implement a BES Cyber System Information access
management program with specific controls for access authorization, periodic review of provisioned
access, and access revocation related to BES Cyber System Information, which, if accidentally or
maliciously misused, could negatively impact the reliable operation of the Bulk Electric System.
Authorization ensures only individuals who have a need are authorized for provisioned access to BES
Cyber System Information. The periodic review ensures access is still required and has been provisioned
appropriately and accurately. Revocation of access when individuals are terminated helps prevent
inappropriate disclosure of sensitive information.
Requirement R6 shifts the focus to authorizing provisioned access to BES Cyber System Information itself.
This is important when considering vendor services in which BES Cyber System Information is outside of
the Responsible Entity’s direct control.
Methods to document and track authorization for access where provisioning of access is a prerequisite of
being able to obtain and/or use the BES Cyber System Information.
The SDT intends that access requirements do not apply to BES Cyber System Information where no
specific provisioning mechanisms are available or feasible, or where provisioning is not specific to
provisioning access to BES Cyber System Information. For example, there is no available or feasible
mechanism to provision access in instances when an individual is merely given, views, or might see BES
Cyber System Information, such as when the individual is handed a piece of paper during a meeting or
views a whiteboard in a conference room. There will likely be no specific provisioning of access to BES
Cyber System Information on work stations, laptops, flash drives, portable equipment, offices, vehicles,
etc., especially when BES Cyber System Information is only temporarily or incidentally located or stored
there. The previous concept of designated storage locations was meant to exclude these locations.
Another example is the provisioning of access to a substation, the intent of which is to enable an
individual to gain access to the substation to perform substation‐related work tasks, not to access BES
Cyber System Information that may be located there. In these cases, access authorization, periodic
review of provisioned access, and access revocation related to BES Cyber System Information would not
be required. However, BES Cyber System Information in these locations and situations still needs to be
protected against unauthorized access per the Responsible Entity’s information protection program as
required in CIP‐011‐3.
The SDT clarified the intent of addressing BES Cyber System Information as opposed to the BES Cyber
System with associated applicable systems, which may contain BES Cyber System Information; the
Applicability column has added language to specify BES Cyber System Information that is affiliated with
associated applicable systems. In addition, the title of the column has been changed to “Applicability” to
accommodate this philosophical change.
Requirement 6.1 has been drafted to ensure access authorization occurs only for individuals who have a
need for provisioned access to BES Cyber System Information. Authorization should be considered to be a
NERC | Technical Rationale and Justification for Reliability Standard CIP‐004‐7 | August 2020
7
Requirement R6
grant of permission by a person or persons empowered by the Responsible Entity to perform such grants.
Authorization for provisioned access to BES Cyber System Information must be on the basis of necessity in
the individual performing a work function. Provisioning should be considered the specific actions taken to
provide an individual the means to access BES Cyber System Information (e.g., physical keys or access
cards, user accounts and associated rights and privileges, encryption keys). For BES Cyber System
Information in physical format, physical access is provisioned to a physical storage location. For BES Cyber
System Information in electronic format, electronic access is provisioned to an electronic system’s front‐
end interface regardless of the geographical or physical location of the server or storage device or to
individual encrypted files. Provisioning physical access to a physical location or storage device that
contains electronic BES Cyber System Information is not considered provisioning access to electronic BES
Cyber System Information. However, the Responsible Entity’s information protection program and
relevant information protection controls should be considered to prevent unauthorized access to BES
Cyber System Information as required in CIP‐011‐3.
The SDT also intends for backwards compatibility with the previous requirement (CIP‐004‐6, Requirement
R4, Part 4.1). Authorization for access to BES Cyber System Information must still be based on necessity
of the individual performing a work function. Documentation showing the authorization should still have
some justification of the business need included. To ensure proper segregation of duties, the SDT intends
that access authorization and provisioning be performed by different people where possible.
Requirement 6.2 has been drafted to ensure the Responsible Entity reviews provisioned access privileges
to BES Cyber System Information at least every 15 calendar months. The privilege review at least once
every 15 calendar months is more detailed to ensure an individual’s associated privileges for BES Cyber
System Information are the minimum necessary to perform their work function.
The SDT intends for backwards compatibility with the previous requirement (CIP‐004‐6, Requirement R4,
Part 4.4). The 15‐calendar‐month review of BES Cyber System Information privilege is still in place to
ensure an individual’s associated privileges to BES Cyber System Information are the minimum necessary
to perform their work function (i.e., least privilege). This involves determining the specific roles with BES
Cyber System Information (e.g., system operator, technician, report viewer, administrator) then grouping
access privileges to the role and assigning users to the role. Role‐based access to BES Cyber System
Information does not assume any specific software, and it can be implemented by defining specific
provisioning processes for each role where access group assignments cannot be performed. Role‐based
access permissions eliminate the need to perform the BES Cyber System Information privilege review on
individual accounts.
Requirement 6.3 ensures an individual who is involved in a termination action has their access to BES
Cyber System Information promptly revoked. Access revocation (also referred to as “deprovisioning of
access”) is still understood to mean a process with the result that electronic access to BES Cyber System
Information is no longer possible using credentials assigned to or known by the individual(s) whose access
privileges are being revoked. Access can only be revoked where access has been provisioned. Revoking
access prevents any further access from that point in time onwards. Steps taken to accomplish this
outcome may include deletion or deactivation of accounts used by the individual(s), but no specific
actions are prescribed. Responsible Entities should still consider the ramifications of deleting an account
might include incomplete event log entries due to an unrecognized account or system services using the
account to log on.
NERC | Technical Rationale and Justification for Reliability Standard CIP‐004‐7 | August 2020
8
Requirement R6
The SDT intends for backwards compatibility with the previous requirement (CIP‐004‐6, Requirement R5,
Part 5.3). The requirement to revoke access to BES Cyber System Information at the time of the
termination action still includes procedures showing revocation of access to BES Cyber System
Information concurrent with the termination action. This requirement also still recognizes the timing of
the termination action might vary depending on the circumstance.
NERC | Technical Rationale and Justification for Reliability Standard CIP‐004‐7 | August 2020
9
Technical Rationale for Reliability Standard CIP-004-6
This section contains a “cut and paste” of the Technical Rationale components of the former Guidelines and
Technical Basis (GTB) as‐is of from CIP‐004‐6 standard to preserve any historical references. Similarly,
former GTB content providing compliance guidance can be found in a separate Implementation Guidance
document for this standard.
Section 4 – Scope of Applicability of the CIP Cyber Security Standards
Section “4. Applicability” of the standards provides important information for Responsible Entities to determine the
scope of the applicability of the CIP Cyber Security Requirements.
Section “4.1. Functional Entities” is a list of NERC functional entities to which the standard applies. If the entity is
registered as one or more of the functional entities listed in Section 4.1, then the NERC CIP Cyber Security Standards
apply. Note that there is a qualification in Section 4.1 that restricts the applicability in the case of Distribution
Providers to only those that own certain types of systems and equipment listed in 4.2.
Section “4.2. Facilities” defines the scope of the Facilities, systems, and equipment owned by the Responsible Entity,
as qualified in Section 4.1, that is subject to the requirements of the standard. As specified in the exemption section
4.2.3.5, this standard does not apply to Responsible Entities that do not have High Impact or Medium Impact BES
Cyber Systems under CIP‐002‐5.1’s categorization. In addition to the set of BES Facilities, Control Centers, and other
systems and equipment, the list includes the set of systems and equipment owned by Distribution Providers. While
the NERC Glossary term “Facilities” already includes the BES characteristic, the additional use of the term BES here is
meant to reinforce the scope of applicability of these Facilities where it is used, especially in this applicability scoping
section. This in effect sets the scope of Facilities, systems, and equipment that is subject to the standards.
Requirement R1:
The security awareness program is intended to be an informational program, not a formal training
program. It should reinforce security practices to ensure that personnel maintain awareness of best
practices for both physical and electronic security to protect its BES Cyber Systems. The Responsible
Entity is not required to provide records that show that each individual received or understood the
information, but they must maintain documentation of the program materials utilized in the form of
posters, memos, and/or presentations.
Requirement R2:
Training shall cover the policies, access controls, and procedures as developed for the BES Cyber Systems
and include, at a minimum, the required items appropriate to personnel roles and responsibilities from
Table R2.
One new element in the training content is intended to encompass networking hardware and software
and other issues of electronic interconnectivity supporting the operation and control of BES Cyber
Systems as per FERC Order No. 706, Paragraph 434. Additionally, training should address the risk posed
when connecting and using Transient Cyber Assets and Removable Media with BES Cyber Systems or
within an Electronic Security Perimeter. As noted in FERC Order No. 791, Paragraph 135, Transient Cyber
Assets and Removable Media have been the source of incidents where malware was introduced into
electric generation industrial control systems in real‐world situations. Training on their use is a key
element in protecting BES Cyber Systems. This is not intended to provide technical training to individuals
supporting networking hardware and software, but educating system users of the cyber security risks
NERC | Technical Rationale and Justification for Reliability Standard CIP‐004‐7 | August 2020
10
Technical Rationale for Reliability Standard CIP‐004‐7
associated with the interconnectedness of these systems. The users, based on their function, role, or
responsibility, should have a basic understanding of which systems can be accessed from other systems
and how the actions they take can affect cyber security.
Each Responsible Entity shall ensure all personnel who are granted authorized electronic access and/or
authorized unescorted physical access to its BES Cyber Systems, including contractors and service
vendors, complete cyber security training prior to their being granted authorized access, except for CIP
Exceptional Circumstances. To retain the authorized accesses, individuals must complete the training at
least one every 15 months.
Requirement R3:
Each Responsible Entity shall ensure a personnel risk assessment is performed for all personnel who are
granted authorized electronic access and/or authorized unescorted physical access to its BES Cyber
Systems, including contractors and service vendors, prior to their being granted authorized access, except
for program specified exceptional circumstances that are approved by the single senior management
official or their delegate and impact the reliability of the BES or emergency response.
Identity only needs to be confirmed prior to initially granting access and only requires periodic
confirmation according to the entity’s process during the tenure of employment, which may or may not
be the same as the initial verification action.
A seven year criminal history check should be performed for those locations where the individual has
resided for at least six consecutive months. This check should also be performed in accordance with
federal, state, provincial, and local laws, and subject to existing collective bargaining unit agreements.
When it is not possible to perform a full seven year criminal history check, documentation must be made
of what criminal history check was performed, and the reasons a full seven‐year check could not be
performed.
There needs to be a personnel risk assessment that has been completed within the last seven years for
each individual with access. A new criminal history records check must be performed as part of the new
PRA. Individuals who have been granted access under a previous version of these standards need a new
PRA within seven years of the date of their last PRA. The clarifications around the seven year criminal
history check in this version do not require a new PRA be performed by the implementation date.
Requirement R4:
Authorization for electronic and unescorted physical access and access to BES Cyber System Information
must be on the basis of necessity in the individual performing a work function. Documentation showing
the authorization should have some justification of the business need included. To ensure proper
segregation of duties, access authorization and provisioning should not be performed by the same person
where possible.
This requirement specifies both quarterly reviews and reviews at least once every 15 calendar months.
Quarterly reviews are to perform a validation that only authorized users have been granted access to BES
Cyber Systems. The focus of this requirement is on the integrity of provisioning access rather than individual
accounts on all BES Cyber Assets.
The privilege review at least once every 15 calendar months is more detailed to ensure an individual’s
associated privileges are the minimum necessary to perform their work function.
An example timeline of all the reviews in Requirement R4 is included below.
NERC | Technical Rationale and Justification for Reliability Standard CIP‐004‐7 | August 2020
11
Technical Rationale for Reliability Standard CIP‐004‐7
If the results of quarterly or at least once every 15 calendar months account reviews indicate an
administrative or clerical error in which access was not actually provisioned, then the SDT intends that this
error should not be considered a violation of this requirement.
For BES Cyber Systems that do not have user accounts defined, the controls listed in Requirement R4 are
not applicable. However, the Responsible Entity should document such configurations.
Requirement R5:
The requirement to revoke access at the time of the termination action includes procedures showing
revocation of access concurrent with the termination action. This requirement recognizes that the timing
of the termination action may vary depending on the circumstance.
Revocation of electronic access should be understood to mean a process with the end result that electronic
access to BES Cyber Systems is no longer possible using credentials assigned to or known by the individual(s)
whose access privileges are being revoked.
The initial revocation required in Requirement R5.1 includes unescorted physical access and Interactive
Remote Access. These two actions should prevent any further access by the individual after termination.
If an individual still has local access accounts (i.e., accounts on the Cyber Asset itself) on BES Cyber Assets,
then the Responsible Entity has 30 days to complete the revocation process for those accounts.
Revocation of access to shared accounts is called out separately to prevent the situation where passwords
on substation and generation devices are constantly changed due to staff turnover.
Requirement 5.5 specified that passwords for shared account are to the changed within 30 calendar days
of the termination action or when the Responsible Entity determines an individual no longer requires access
to the account as a result of a reassignment or transfer. The 30 days applies under normal operating
conditions. However, circumstances may occur where this is not possible. Some systems may require an
outage or reboot of the system in order to complete the password change. In periods of extreme heat or
cold, many Responsible Entities may prohibit system outages and reboots in order to maintain reliability of
the BES. When these circumstances occur, the Responsible Entity must document these circumstances and
prepare to change the password within 10 calendar days following the end of the operating circumstances.
Records of activities must be retained to show that the Responsible Entity followed the plan they created.
NERC | Technical Rationale and Justification for Reliability Standard CIP‐004‐7 | August 2020
12
Technical Rationale for Reliability Standard CIP‐004‐7
Rationale:
During development of this standard, text boxes were embedded within the standard to explain the
rationale for various parts of the standard. Upon BOT approval, the text from the rationale text boxes was
moved to this section.
Rationale for Requirement R1:
Ensures that Responsible Entities with personnel who have authorized electronic or authorized unescorted
physical access to BES Cyber Assets take action so that those personnel with such authorized electronic or
authorized unescorted physical access maintain awareness of the Responsible Entity’s security practices.
Rationale for Requirement R2:
To ensure that the Responsible Entity’s training program for personnel who need authorized electronic
access and/or authorized unescorted physical access to BES Cyber Systems covers the proper policies,
access controls, and procedures to protect BES Cyber Systems and are trained before access is authorized.
Rationale for Requirement R3:
To ensure that individuals who need authorized electronic or authorized unescorted physical access to BES
Cyber Systems have been assessed for risk. Whether initial access or maintaining access, those with access
must have had a personnel risk assessment completed within the last 7 years.
Rationale for Requirement R4:
To ensure that individuals with access to BES Cyber Systems and the physical and electronic locations where
BES Cyber System Information is stored by the Responsible Entity have been properly authorized for such
access. “Authorization” should be considered to be a grant of permission by a person or persons
empowered by the Responsible Entity to perform such grants and included in the delegations referenced
in CIP‐003‐6. “Provisioning” should be considered the actions to provide access to an individual.
Access is physical, logical, and remote permissions granted to Cyber Assets composing the BES Cyber System
or allowing access to the BES Cyber System. When granting, reviewing, or revoking access, the Responsible
Entity must address the Cyber Asset specifically as well as the systems used to enable such access (i.e.,
physical access control system, remote access system, directory services).
CIP Exceptional Circumstances are defined in a Responsible Entity’s policy from CIP‐003‐6 and allow an
exception to the requirement for authorization to BES Cyber Systems and BES Cyber System Information.
Quarterly reviews in Part 4.5 are to perform a validation that only authorized users have been granted
access to BES Cyber Systems. This is achieved by comparing individuals actually provisioned to a BES Cyber
System against records of individuals authorized to access the BES Cyber System. The focus of this
NERC | Technical Rationale and Justification for Reliability Standard CIP‐004‐7 | August 2020
13
Technical Rationale for Reliability Standard CIP‐004‐7
requirement is on the integrity of provisioning access rather than individual accounts on all BES Cyber
Assets.
If the results of quarterly or annual account reviews indicate an administrative or clerical error in which
access was not actually provisioned, then the SDT intends that the error should not be considered a
violation of this requirement.
For BES Cyber Systems that do not have user accounts defined, the controls listed in Requirement R4 are
not applicable. However, the Responsible Entity should document such configurations.
Rationale for Requirement R5:
The timely revocation of electronic access to BES Cyber Systems is an essential element of an access
management regime. When an individual no longer requires access to a BES Cyber System to perform his
or her assigned functions, that access should be revoked. This is of particular importance in situations
where a change of assignment or employment is involuntary, as there is a risk the individual(s) involved will
react in a hostile or destructive manner.
In considering how to address directives in FERC Order No. 706 directing “immediate” revocation of access
for involuntary separation, the SDT chose not to specify hourly time parameters in the requirement (e.g.,
revoking access within 1 hour). The point in time at which an organization terminates a person cannot
generally be determined down to the hour. However, most organizations have formal termination
processes, and the timeliest revocation of access occurs in concurrence with the initial processes of
termination.
Access is physical, logical, and remote permissions granted to Cyber Assets composing the BES Cyber System
or allowing access to the BES Cyber System. When granting, reviewing, or revoking access, the Responsible
Entity must address the Cyber Asset specifically as well as the systems used to enable such access (e.g.,
physical access control system, remote access system, directory services).
NERC | Technical Rationale and Justification for Reliability Standard CIP‐004‐7 | August 2020
14
Cyber Security —
Information Protection
Technical Rationale and Justification for
Reliability Standard CIP-011-3
August 2020
RELIABILITY | RESILIENCE | SECURITY
NERC | Report Title | Report Date
I
Table of Contents
Preface ......................................................................................................................................................................... iii
Introduction ................................................................................................................................................................. iv
Background .............................................................................................................................................................. iv
New and Modified Terms Used on NERC Reliability Standards .................................................................................... 5
Proposed Modified Terms: ........................................................................................................................................ 5
Proposed New Terms: ............................................................................................................................................... 5
Rationale for Applicability Section ............................................................................................................................ 5
Requirement R1 ............................................................................................................................................................ 6
General Considerations for Requirement R1 ............................................................................................ 6
Rationale for Requirement R1: .............................................................................................................................. 6
Requirement R2 ............................................................................................................................................................ 8
General Considerations for Requirement R2 ............................................................................................ 8
Rationale for Requirement R2: .............................................................................................................................. 8
Technical Rationale for Reliability Standard CIP-011-2 ................................................................................................. 9
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-3 | August 2020
ii
Preface
Electricity is a key component of the fabric of modern society and the Electric Reliability Organization (ERO) Enterprise
serves to strengthen that fabric. The vision for the ERO Enterprise, which is comprised of the North American Electric
Reliability Corporation (NERC) and the six Regional Entities (REs), is a highly reliable and secure North American bulk
power system (BPS). Our mission is to assure the effective and efficient reduction of risks to the reliability and security
of the grid.
Reliability | Resilience | Security
Because nearly 400 million citizens in North America are counting on us
The North American BPS is divided into six RE boundaries as shown in the map and corresponding table below. The
multicolored area denotes overlap as some load-serving entities participate in one Region while associated
Transmission Owners/Operators participate in another.
MRO
Midwest Reliability Organization
NPCC
Northeast Power Coordinating Council
RF
ReliabilityFirst
SERC
SERC Reliability Corporation
Texas RE
Texas Reliability Entity
WECC
Western Electricity Coordinating Council
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-3 | August 2020
iii
Introduction
Background
This document explains the technical rationale and justification for the proposed Reliability Standard CIP-011-3. It
provides stakeholders and the ERO Enterprise with an understanding of the technology and technical requirements
in the Reliability Standard. It also contains information on the standard drafting team’s (SDT’s) intent in drafting the
requirements. This Technical Rationale and Justification for CIP-011-3 is not a Reliability Standard and should not be
considered mandatory and enforceable.
On July 24, 2019, the North American Electric Reliability Corporation (NERC) Standards Committee accepted a
Standard Authorization Request (SAR) approving an initiative to enhance BES reliability by creating increased
choice, greater flexibility, higher availability, and reduced‐cost options for entities to manage their BES Cyber
System Information (BCSI), by providing a secure path towards utilization of modern third‐party data storage and
analysis systems. In addition, the project intended to clarify the protections expected when utilizing third‐party
solutions (e.g., cloud services).
In response to this SAR, the Project 2019-02 SDT drafted Reliability Standard CIP-011-3 to require Responsible Entities
to implement specific controls in Requirement R1 and Requirement R2 for procedural and technical controls related
to BCSI during storage, handling, use, and disposal when implementing vendor provided services such as Software as
a Service (SaaS), Infrastructure as a Service (IaaS), or Platform as a Service (PaaS).
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-3 | August 2020
iv
New and Modified Terms Used on NERC Reliability Standards
Proposed Modified Terms:
None
Proposed New Terms:
None
Rationale for Applicability Section
Standard CIP-011 has been modified to enhance protection of BCSI. The modified requirements under CIP-011
address protection of information in several facets that are discussed in this document, which include the following:
-
Modifying the “Applicable Systems” column to “Applicability” where appropriate to specifically include BCSI
-
Implement methods to identify risks involving vendor services related to BCSI
-
Implement technical mechanisms to protect BCSI when engaging vendor services
To provide clarity, the Applicability Systems column, which now contains BCSI, is included to associate the
requirement and address the focus on protecting the BCSI regardless of the location of the BCSI. In addition, the title
of the column is “Applicability” to accommodate this philosophical change.
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-3 | August 2020
1
Requirement R1
General Considerations for Requirement R1
None
Rationale for Requirement R1:
Requirement R1 specifies procedural and technical controls for BCSI handling during storage, transit, use, and
disposal including implementation of vendor-provided services such as Software as a Service (SaaS), Infrastructure as
a Service (IaaS), or Platform as a Service (PaaS).
Requirement R1, Part 1.1, is intended to identify BCSI and provide documented methods to support this identification
process.
The SDT clarified the intent of addressing BCSI as opposed to the BES Cyber System with associated applicable
systems, which may contain BCSI. The Applicable Systems column includes language to specify BCSI “…pertaining to”
the applicable systems. In addition, the title of the column is “Applicability” to accommodate this philosophical
change.
Rationale for Modifications to Requirement R1, Part 1.2
Requirement R1, Part 1.2, addresses methods to protect BCSI. Different states of information from the requirement;
such as “transit” or “storage” are removed. The intent is to reduce confusion of Responsible Entities attempting to
interpret controls specific to different states of information, limiting controls to said states, overlapping controls
between states, and reduce confusion from an enforcement perspective. By removing this language, methods to
protect BCSI becomes explicitly comprehensive.
Requirement language revisions reflect consistency with other CIP requirements.
Rationale for New Requirement R1, Part 1.3
Requirement R1, Part 1.3, addresses the need for the Responsible Entity to understand details of the vendor’s service
environment and the vendor’s controls where the entity’s BCSI would be stored. This requirement contains technical
detail specifically on the protection of BCSI. This is inherently different than CIP-013’s overall risk approach to
applicable systems and vendor-contracted relationships. This requirement is for implementing risk identification and
assessment methods for the following sub requirements:
-
Data governance and rights management
-
Identity and access management
-
Security management
-
Application, infrastructure, and network security
Implemented identification and assessment methods are needed to understand the risks to BCSI when choosing to
engage vendor services. It is important that the Responsible Entity conducts such due diligence to understand the
risks related to the vendor’s environment and controls given the compromise of BCSI involves critical infrastructure
and recovery from compromise may be difficult due to the duration of remediation and related remediation costs.
This is different than many other industries that are capable of superseding compromised information in a relatively
short period of time. There are risks that cannot be mitigated directly in the vendor environment due to the lack of
Responsible Entity control. This requirement ensures that, prior to BCSI entering a vendor’s environment, the
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-3 | August 2020
2
Responsible Entity is well informed regarding the vendor’s environment and controls and influences what, if any,
varying controls offered by a vendor are utilized, or may influence the Responsible Entity’s use of technical
mechanisms (see CIP-011, R1.4) for which the Responsible Entity has more control.
The intent of addressing BCSI is clarified as opposed to the BES Cyber System with associated applicable systems,
which may contain BCSI; the Applicable Systems column includes language to specify BCSI that is pertinent with
associated applicable systems. In addition, the title of the column is “Applicability” to accommodate this
philosophical change.
The SDT’s intent of the information protection program is to protect BCSI.
Responsible Entities are free to utilize existing change management and asset management systems. However, the
information contained within those systems must be evaluated, as the information protection requirements still
apply.
The justification for this requirement is pre-existing from previous versions of CIP and is also documented in FERC
Order No. 706 and its associated Notice of Proposed Rulemaking.
This requirement mandates that BCSI be identified. The Responsible Entity has flexibility in determining how to
implement the requirement.
The SDT does not intend that this requirement cover publicly available information, such as vendor manuals that are
available via public websites or information that is deemed to be publicly releasable.
Information protection pertains to both digital and hardcopy information. Part 1.2 requires one or more methods
for the protection and secure handling of BCSI. This includes information that may be stored on Transient Cyber
Assets or Removable Media.
It is not the intent of this standard to mandate the use of one particular format for secure handling during transit of
BCSI.
Rationale for New Requirement R1, Part 1.4:
The SDT’s intent of the information protection program is to protect BCSI.
Requirement R1, Part 1.4, specifies technical, logical controls for the protection of electronic BES Cyber System
Information during storage, transit, use, and disposal when implementing vendor-provided services such as SaaS,
IaaS, or PaaS.
Requirement R1, Part 1.4, requires Responsible Entities to implement technical mechanisms to protect BCSI when
engaging vendor services. Technical mechanisms provide a layer of defense against compromise needed to ensure a
vendor’s staff might have the means to electronically obtain BCSI but not use or modify BCSI. Technical mechanisms
to protect BCSI are needed regardless of the location or state in which the Responsible Entity’s BCSI resides when
using vendor services. This requirement compliments R1, Part 1.3. Once, the risks are identified, appropriate
technical mechanisms can be used to protect BCSI.
The intent of addressing BCSI is clarified as opposed to the BES Cyber System with associated applicable systems,
which may contain BCSI. The Applicability column accommodates this philosophical change and to be consistent with
the Applicability language added in Requirement R1, Parts 1.2 through 1.4.
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-3 | August 2020
5
Requirement R2
General Considerations for Requirement R2
None
Rationale for Requirement R2:
The intent of the BES Cyber Asset reuse and disposal process is to prevent the unauthorized dissemination of BCSI
upon reuse or disposal.
This requirement allows for BES Cyber Systems to be removed from service and analyzed with their media intact, as
that should not constitute a release for reuse.
The justification for this requirement is pre-existing from previous versions of CIP and is also documented in FERC
Order No. 706 and its associated Notice of Proposed Rulemaking.
Requirement 3 has remained unchanged. The requirements are focused more on the reuse and disposal of BCS rather
than BCSI. While acknowledging that such BCS and other applicable systems may have BCSI residing on them, the
original intent of the requirement is broader than addressing BCSI. This is a lifecycle issue concerning the applicable
systems. CIP-002 focuses on the beginning of the BCS lifecycle but not an end. The potential end of the applicable
systems lifecycle is absent from CIP-011 to reduce confusion with reuse and disposal of BCSI. The 2019 BCSI Access
Management project did not include modification of CIP-002 in the scope of the SAR. This concern has been
communicated for future evaluation.
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-3 | August 2020
2
Technical Rationale for Reliability Standard CIP-011-2
This section contains a “cut and paste” of the Technical Rationale components of the former Guidelines and Technical
Basis (GTB) as-is of from CIP-011-2 standard to preserve any historical references. Similarly, former GTB content
providing compliance guidance can be found in a separate Implementation Guidance document for this standard.
Section 4 – Scope of Applicability of the CIP Cyber Security Standards
Section “4. Applicability” of the standards provides important information for Responsible Entities to determine the
scope of the applicability of the CIP Cyber Security Requirements.
Section “4.1. Functional Entities” is a list of NERC functional entities to which the standard applies. If the entity is
registered as one or more of the functional entities listed in Section 4.1, then the NERC CIP Cyber Security Standards
apply. Note that there is a qualification in Section 4.1 that restricts the applicability in the case of Distribution
Providers to only those that own certain types of systems and equipment listed in 4.2.
Section “4.2. Facilities” defines the scope of the Facilities, systems, and equipment owned by the Responsible
Entity, as qualified in Section 4.1, that is subject to the requirements of the standard. As specified in the exemption
section 4.2.3.5, this standard does not apply to Responsible Entities that do not have High Impact or Medium
Impact BES Cyber Systems under CIP-002-5.1’s categorization. In addition to the set of BES Facilities, Control
Centers, and other systems and equipment, the list includes the set of systems and equipment owned by
Distribution Providers. While the NERC Glossary term “Facilities” already includes the BES characteristic, the
additional use of the term BES here is meant to reinforce the scope of applicability of these Facilities where it is
used, especially in this applicability scoping section. This in effect sets the scope of Facilities, systems, and
equipment that is subject to the standards.
Requirement R1:
Responsible Entities are free to utilize existing change management and asset management systems. However, the
information contained within those systems must be evaluated, as the information protection requirements still
apply.
The justification for this requirement is pre-existing from previous versions of CIP and is also documented in FERC
Order No. 706 and its associated Notice of Proposed Rulemaking.
This requirement mandates that BES Cyber System Information be identified. The Responsible Entity has flexibility
in determining how to implement the requirement.
The SDT does not intend that this requirement cover publicly available information, such as vendor manuals that are
available via public websites or information that is deemed to be publicly releasable.
Information protection pertains to both digital and hardcopy information. R1.2 requires one or more procedures
for the protection and secure handling BES Cyber System Information, including storage, transit, and use. This
includes information that may be stored on Transient Cyber Assets or Removable Media.
It is not the intent of this standard to mandate the use of one particular format for secure handling during transit.
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-3 | August 2020
6
Technical Rationale for Reliability Standard CIP-011-2
Requirement R2:
This requirement allows for BES Cyber Systems to be removed from service and analyzed with their media intact, as
that should not constitute a release for reuse.
The justification for this requirement is pre-existing from previous versions of CIP and is also documented in FERC
Order No. 706 and its associated Notice of Proposed Rulemaking.
Rationale:
During development of this standard, text boxes were embedded within the standard to explain the rationale for
various parts of the standard. Upon Board of Trustees approval, the text from the rationale text boxes was moved
to this section.
Rationale for Requirement R1:
The SDT’s intent of the information protection program is to prevent unauthorized access to BES Cyber System
Information.
Rationale for Requirement R2:
The intent of the BES Cyber Asset reuse and disposal process is to prevent the unauthorized dissemination of BES
Cyber System Information upon reuse or disposal.
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-3 | August 2020
7
Violation Risk Factor and Violation Severity Level
Justifications
Project 2019-02 BES Cyber System Information Access Management
This document provides the standard drafting team’s (SDT’s) justification for assignment of violation risk factors (VRFs) and violation severity
levels (VSLs) for each requirement in Project 2019‐02 BES Cyber System Information Access Management CIP‐004‐7. Each requirement is
assigned a VRF and a VSL. These elements support the determination of an initial value range for the Base Penalty Amount regarding
violations of requirements in FERC‐approved Reliability Standards, as defined in the Electric Reliability Organizations (ERO) Sanction
Guidelines. The SDT applied the following NERC criteria and FERC Guidelines when developing the VRFs and VSLs for the requirements.
NERC Criteria for Violation Risk Factors
High Risk Requirement
A requirement that, if violated, could directly cause or contribute to Bulk Electric System instability, separation, or a cascading sequence of
failures, or could place the Bulk Electric System at an unacceptable risk of instability, separation, or cascading failures; or, a requirement in a
planning time frame that, if violated, could, under emergency, abnormal, or restorative conditions anticipated by the preparations, directly
cause or contribute to Bulk Electric System instability, separation, or a cascading sequence of failures, or could place the Bulk Electric System
at an unacceptable risk of instability, separation, or cascading failures, or could hinder restoration to a normal condition.
Medium Risk Requirement
A requirement that, if violated, could directly affect the electrical state or the capability of the Bulk Electric System, or the ability to effectively
monitor and control the Bulk Electric System. However, violation of a medium risk requirement is unlikely to lead to Bulk Electric System
instability, separation, or cascading failures; or, a requirement in a planning time frame that, if violated, could, under emergency, abnormal,
or restorative conditions anticipated by the preparations, directly and adversely affect the electrical state or capability of the Bulk Electric
System, or the ability to effectively monitor, control, or restore the Bulk Electric System. However, violation of a medium risk requirement is
unlikely, under emergency, abnormal, or restoration conditions anticipated by the preparations, to lead to Bulk Electric System instability,
separation, or cascading failures, nor to hinder restoration to a normal condition.
RELIABILITY | RESILIENCE | SECURITY
Lower Risk Requirement
A requirement that is administrative in nature and a requirement that, if violated, would not be expected to adversely affect the electrical
state or capability of the Bulk Electric System, or the ability to effectively monitor and control the Bulk Electric System; or, a requirement that
is administrative in nature and a requirement in a planning time frame that, if violated, would not, under the emergency, abnormal, or
restorative conditions anticipated by the preparations, be expected to adversely affect the electrical state or capability of the Bulk Electric
System, or the ability to effectively monitor, control, or restore the Bulk Electric System.
FERC Guidelines for Violation Risk Factors
Guideline (1) – Consistency with the Conclusions of the Final Blackout Report
FERC seeks to ensure that VRFs assigned to Requirements of Reliability Standards in these identified areas appropriately reflect their historical
critical impact on the reliability of the Bulk‐Power System. In the VSL Order, FERC listed critical areas (from the Final Blackout Report) where
violations could severely affect the reliability of the Bulk‐Power System:
Emergency operations
Vegetation management
Operator personnel training
Protection systems and their coordination
Operating tools and backup facilities
Reactive power and voltage control
System modeling and data exchange
Communication protocol and facilities
Requirements to determine equipment ratings
Synchronized data recorders
Clearer criteria for operationally critical facilities
Appropriate use of transmission loading relief.
VRF and VSL Justifications
Project 2019‐02 BES Cyber System Information Access Management | August 2020
2
Guideline (2) – Consistency within a Reliability Standard
FERC expects a rational connection between the sub‐Requirement VRF assignments and the main Requirement VRF assignment.
Guideline (3) – Consistency among Reliability Standards
FERC expects the assignment of VRFs corresponding to Requirements that address similar reliability goals in different Reliability Standards
would be treated comparably.
Guideline (4) – Consistency with NERC’s Definition of the Violation Risk Factor Level
Guideline (4) was developed to evaluate whether the assignment of a particular VRF level conforms to NERC’s definition of that risk level.
Guideline (5) – Treatment of Requirements that Co-mingle More Than One Obligation
Where a single Requirement co‐mingles a higher risk reliability objective and a lesser risk reliability objective, the VRF assignment for such
Requirements must not be watered down to reflect the lower risk level associated with the less important objective of the Reliability
Standard.
VRF and VSL Justifications
Project 2019‐02 BES Cyber System Information Access Management | August 2020
3
NERC Criteria for Violation Severity Levels
VSLs define the degree to which compliance with a requirement was not achieved. Each requirement must have at least one VSL. While it is
preferable to have four VSLs for each requirement, some requirements do not have multiple “degrees” of noncompliant performance and
may have only one, two, or three VSLs.
VSLs should be based on NERC’s overarching criteria shown in the table below:
Lower VSL
The performance or product
measured almost meets the full
intent of the requirement.
Moderate VSL
High VSL
The performance or product
The performance or product
measured meets the majority of measured does not meet the
the intent of the requirement. majority of the intent of the
requirement, but does meet
some of the intent.
Severe VSL
The performance or product
measured does not
substantively meet the intent of
the requirement.
FERC Order of Violation Severity Levels
The FERC VSL guidelines are presented below, followed by an analysis of whether the VSLs proposed for each requirement in the standard
meet the FERC Guidelines for assessing VSLs:
Guideline (1) – Violation Severity Level Assignments Should Not Have the Unintended Consequence of Lowering the Current
Level of Compliance
Compare the VSLs to any prior levels of non‐compliance and avoid significant changes that may encourage a lower level of compliance than
was required when levels of non‐compliance were used.
Guideline (2) – Violation Severity Level Assignments Should Ensure Uniformity and Consistency in the Determination of
Penalties
A violation of a “binary” type requirement must be a “Severe” VSL.
Do not use ambiguous terms such as “minor” and “significant” to describe noncompliant performance.
Guideline (3) – Violation Severity Level Assignment Should Be Consistent with the Corresponding Requirement
VSLs should not expand on what is required in the requirement.
VRF and VSL Justifications
Project 2019‐02 BES Cyber System Information Access Management | August 2020
4
Guideline (4) – Violation Severity Level Assignment Should Be Based on a Single Violation, Not on a Cumulative Number of
Violations
Unless otherwise stated in the requirement, each instance of non‐compliance with a requirement is a separate violation. Section 4 of the
Sanction Guidelines states that assessing penalties on a per violation per day basis is the “default” for penalty calculations.
VRF Justification for CIP-004-7, Requirement R1
The VRF did not change from the previously FERC approved CIP‐004‐6 Reliability Standard.
VSL Justification for CIP-004-7, Requirement R1
The VSL did not change from the previously FERC approved CIP‐004‐6 Reliability Standard.
VRF Justification for CIP-004-7, Requirement R2
The VRF did not change from the previously FERC approved CIP‐004‐6 Reliability Standard.
VSL Justification for CIP-004-7, Requirement R2
The VSL did not change from the previously FERC approved CIP‐004‐6 Reliability Standard.
VRF Justification for CIP-004-7, Requirement R3
The VRF did not change from the previously FERC approved CIP‐004‐6 Reliability Standard.
VSL Justification for CIP-004-7, Requirement R3
The VSL did not change from the previously FERC approved CIP‐004‐6 Reliability Standard.
VRF Justification for CIP-004-7, Requirement R4
The VRF did not change from the previously FERC approved CIP‐004‐6 Reliability Standard.
VSL Justification for CIP-004-7, Requirement R4
The VSL has been revised to reflect the removal of Part 4.4 (moved to CIP‐004‐7, Requirement R6, Part 6.2) and a portion of Part 4.1 (moved
to CIP‐004‐7, Requirement R6, Part 6.1). The VSL did not otherwise change from the previously FERC approved CIP‐004‐6 Reliability Standard.
VRF and VSL Justifications
Project 2019‐02 BES Cyber System Information Access Management | August 2020
5
VRF Justification for CIP-004-7, Requirement R5
The VRF did not change from the previously FERC approved CIP‐004‐6 Reliability Standard.
VSL Justification for CIP-004-7, Requirement R5
The VSL has been revised to reflect the removal of Part 5.3 (moved to CIP‐004‐7, Requirement R6, Part 6.3). The VSL did not otherwise
change from the previously FERC approved CIP‐004‐6 Reliability Standard.
VRF Justifications for CIP-004-7 R6
Proposed VRF
Medium
NERC VRF Discussion
Requirement R6 is a Requirement in the Same Day Operations and Operations Planning time horizons to
implement one or more documented access management program(s) for BES Cyber System Information
that collectively include each of the applicable requirement parts in CIP‐004‐7 Table R6 – Access
Management for BES Cyber System Information. If violated, it could directly affect the electrical state or
the capability of the bulk electric system, or the ability to effectively monitor and control the bulk electric
system. However, violation of the requirement is unlikely to lead to bulk electric system instability,
separation, or cascading failures.
FERC VRF G1 Discussion
Guideline 1‐ Consistency w/ Blackout Report
Guideline 1‐ Consistency
with Blackout Report
This requirement does not address any of the critical areas identified in the Final Blackout Report.
FERC VRF G2 Discussion
Guideline 2‐ Consistency within a Reliability Standard
Guideline 2‐ Consistency
within a Reliability Standard
The proposed VRF is consistent among other FERC approved VRFs within the standard, specifically
Requirements R4 and R5 from which Requirement R6 is modified.
.
FERC VRF G3 Discussion
Guideline 3‐ Consistency among Reliability Standards
VRF and VSL Justifications
Project 2019‐02 BES Cyber System Information Access Management | August 2020
6
VRF Justifications for CIP-004-7 R6
Proposed VRF
Medium
Guideline 3‐ Consistency
among Reliability Standards
This is a new requirement addressing specific reliability goals. The VRF assignment is consistent with
similar Requirements in the CIP Reliability Standards.
FERC VRF G4 Discussion
Guideline 4‐ Consistency with NERC Definitions of VRFs
Guideline 4‐ Consistency
with NERC Definitions of
VRFs
A VRF of Medium is consistent with the NERC VRF definition.
FERC VRF G5 Discussion
Guideline 5‐ Treatment of Requirements that Co‐mingle More than One Obligation
Guideline 5‐ Treatment of
Requirements that Co‐
mingle More than One
Obligation
Requirement R6 contains only one objective, which is to implement one or more documented access
management program(s) for BES Cyber System Information that collectively include each of the applicable
requirement parts in CIP‐004‐7 Table R6 – Access Management for BES Cyber System Information. Since
the requirement has only one objective, only one VRF was assigned.
VSLs for CIP-004-7, R6
Lower
Moderate
High
The Responsible Entity
implemented one or more
documented access
management program(s) for BES
Cyber System Information (BCSI)
but did not implement one of
the applicable items for Parts
6.1 through 6.3. (R6)
The Responsible Entity
implemented one or more
documented access
management program(s) for
BCSI but did not implement two
of the applicable items for Parts
6.1 through 6.3. (R6)
The Responsible Entity
implemented one or more
documented access
management program(s) for
BCSI but did not implement
three of the applicable items for
Parts 6.1 through 6.3. (R6)
VRF and VSL Justifications
Project 2019‐02 BES Cyber System Information Access Management | August 2020
Severe
The Responsible Entity did not
implement one or more
documented access
management program(s) for
BCSI. (R6)
7
VSL Justifications for CIP-004-7, R6
FERC VSL G1
There is no prior compliance obligation related to the subject of this standard.
Violation Severity Level
Assignments Should Not
Have the Unintended
Consequence of Lowering
the Current Level of
Compliance
FERC VSL G2
Violation Severity Level
Assignments Should Ensure
Uniformity and Consistency
in the Determination of
Penalties
The proposed VSLs are not binary and do not use any ambiguous terminology, thereby supporting
uniformity and consistency in the determination of similar penalties for similar violations.
Guideline 2a: The Single
Violation Severity Level
Assignment Category for
"Binary" Requirements Is
Not Consistent
Guideline 2b: Violation
Severity Level Assignments
that Contain Ambiguous
Language
VRF and VSL Justifications
Project 2019‐02 BES Cyber System Information Access Management | August 2020
8
FERC VSL G3
Violation Severity Level
Assignment Should Be
Consistent with the
Corresponding Requirement
FERC VSL G4
The proposed VSL uses similar terminology to that used in the associated requirement and is therefore
consistent with the requirement.
Proposed VSLs are based on a single violation and not cumulative violations.
Violation Severity Level
Assignment Should Be Based
on A Single Violation, Not on
A Cumulative Number of
Violations
VRF and VSL Justifications
Project 2019‐02 BES Cyber System Information Access Management | August 2020
9
Violation Risk Factor and Violation Severity Level
Justifications
Project 2019-02 BES Cyber System Information Access Management
This document provides the standard drafting team’s (SDT’s) justification for assignment of violation risk factors (VRFs) and violation severity
levels (VSLs) for each requirement in Project 2019‐02 BES Cyber System Information Access Management CIP‐011‐3. Each requirement is
assigned a VRF and a VSL. These elements support the determination of an initial value range for the Base Penalty Amount regarding
violations of requirements in FERC‐approved Reliability Standards, as defined in the Electric Reliability Organizations (ERO) Sanction
Guidelines. The SDT applied the following NERC criteria and FERC Guidelines when developing the VRFs and VSLs for the requirements.
NERC Criteria for Violation Risk Factors
High Risk Requirement
A requirement that, if violated, could directly cause or contribute to Bulk Electric System instability, separation, or a cascading sequence of
failures, or could place the Bulk Electric System at an unacceptable risk of instability, separation, or cascading failures; or, a requirement in a
planning time frame that, if violated, could, under emergency, abnormal, or restorative conditions anticipated by the preparations, directly
cause or contribute to Bulk Electric System instability, separation, or a cascading sequence of failures, or could place the Bulk Electric System
at an unacceptable risk of instability, separation, or cascading failures, or could hinder restoration to a normal condition.
Medium Risk Requirement
A requirement that, if violated, could directly affect the electrical state or the capability of the Bulk Electric System, or the ability to effectively
monitor and control the Bulk Electric System. However, violation of a medium risk requirement is unlikely to lead to Bulk Electric System
instability, separation, or cascading failures; or, a requirement in a planning time frame that, if violated, could, under emergency, abnormal,
or restorative conditions anticipated by the preparations, directly and adversely affect the electrical state or capability of the Bulk Electric
System, or the ability to effectively monitor, control, or restore the Bulk Electric System. However, violation of a medium risk requirement is
unlikely, under emergency, abnormal, or restoration conditions anticipated by the preparations, to lead to Bulk Electric System instability,
separation, or cascading failures, nor to hinder restoration to a normal condition.
RELIABILITY | RESILIENCE | SECURITY
Lower Risk Requirement
A requirement that is administrative in nature and a requirement that, if violated, would not be expected to adversely affect the electrical
state or capability of the Bulk Electric System, or the ability to effectively monitor and control the Bulk Electric System; or, a requirement that
is administrative in nature and a requirement in a planning time frame that, if violated, would not, under the emergency, abnormal, or
restorative conditions anticipated by the preparations, be expected to adversely affect the electrical state or capability of the Bulk Electric
System, or the ability to effectively monitor, control, or restore the Bulk Electric System.
FERC Guidelines for Violation Risk Factors
Guideline (1) – Consistency with the Conclusions of the Final Blackout Report
FERC seeks to ensure that VRFs assigned to Requirements of Reliability Standards in these identified areas appropriately reflect their historical
critical impact on the reliability of the Bulk‐Power System. In the VSL Order, FERC listed critical areas (from the Final Blackout Report) where
violations could severely affect the reliability of the Bulk‐Power System:
Emergency operations
Vegetation management
Operator personnel training
Protection systems and their coordination
Operating tools and backup facilities
Reactive power and voltage control
System modeling and data exchange
Communication protocol and facilities
Requirements to determine equipment ratings
Synchronized data recorders
Clearer criteria for operationally critical facilities
Appropriate use of transmission loading relief.
VRF and VSL Justifications
Project 2019‐02 BES Cyber System Information Access Management | August 2020
2
Guideline (2) – Consistency within a Reliability Standard
FERC expects a rational connection between the sub‐Requirement VRF assignments and the main Requirement VRF assignment.
Guideline (3) – Consistency among Reliability Standards
FERC expects the assignment of VRFs corresponding to Requirements that address similar reliability goals in different Reliability Standards
would be treated comparably.
Guideline (4) – Consistency with NERC’s Definition of the Violation Risk Factor Level
Guideline (4) was developed to evaluate whether the assignment of a particular VRF level conforms to NERC’s definition of that risk level.
Guideline (5) – Treatment of Requirements that Co-mingle More Than One Obligation
Where a single Requirement co‐mingles a higher risk reliability objective and a lesser risk reliability objective, the VRF assignment for such
Requirements must not be watered down to reflect the lower risk level associated with the less important objective of the Reliability
Standard.
VRF and VSL Justifications
Project 2019‐02 BES Cyber System Information Access Management | August 2020
3
NERC Criteria for Violation Severity Levels
VSLs define the degree to which compliance with a requirement was not achieved. Each requirement must have at least one VSL. While it is
preferable to have four VSLs for each requirement, some requirements do not have multiple “degrees” of noncompliant performance and
may have only one, two, or three VSLs.
VSLs should be based on NERC’s overarching criteria shown in the table below:
Lower VSL
The performance or product
measured almost meets the full
intent of the requirement.
Moderate VSL
High VSL
The performance or product
The performance or product
measured meets the majority of measured does not meet the
the intent of the requirement.
majority of the intent of the
requirement, but does meet
some of the intent.
Severe VSL
The performance or product
measured does not
substantively meet the intent of
the requirement.
FERC Order of Violation Severity Levels
The FERC VSL guidelines are presented below, followed by an analysis of whether the VSLs proposed for each requirement in the standard
meet the FERC Guidelines for assessing VSLs:
Guideline (1) – Violation Severity Level Assignments Should Not Have the Unintended Consequence of Lowering the Current
Level of Compliance
Compare the VSLs to any prior levels of non‐compliance and avoid significant changes that may encourage a lower level of compliance than
was required when levels of non‐compliance were used.
Guideline (2) – Violation Severity Level Assignments Should Ensure Uniformity and Consistency in the Determination of
Penalties
A violation of a “binary” type requirement must be a “Severe” VSL.
Do not use ambiguous terms such as “minor” and “significant” to describe noncompliant performance.
Guideline (3) – Violation Severity Level Assignment Should Be Consistent with the Corresponding Requirement
VSLs should not expand on what is required in the requirement.
VRF and VSL Justifications
Project 2019‐02 BES Cyber System Information Access Management | August 2020
4
Guideline (4) – Violation Severity Level Assignment Should Be Based on a Single Violation, Not on a Cumulative Number of
Violations
Unless otherwise stated in the requirement, each instance of non‐compliance with a requirement is a separate violation. Section 4 of the
Sanction Guidelines states that assessing penalties on a per violation per day basis is the “default” for penalty calculations.
VRF Justification for CIP-011-3, Requirement R1
Requirement R1 was revised to eliminate potential compliance barriers for Responsible Entities that want to engage vendor services to store,
utilize, or analyze BES Cyber System Information. The VRF did not change from the previously FERC approved CIP‐011‐2 Reliability Standard.
VSL Justification for CIP-011-3, Requirement R1
Requirement R1 was revised to include two new Parts (1.3 and 1.4) to eliminate potential compliance barriers for Responsible Entities that
want to engage vendor services to store, utilize, or analyze BES Cyber System Information. Because there are now four Parts, the VSL was
updated to include lower, moderate, and high VSL descriptions, which is more appropriate in case a violation moves beyond the control of the
Responsible Entity (e.g., compromise of BES Cyber System Information while engaging vendor services). The VSL did not change from the
previously FERC approved CIP‐011‐2 Reliability Standard.
VRF Justification for CIP-011-3, Requirement R2
The VRF did not change from the previously FERC approved CIP‐011‐2 Reliability Standard.
VSL Justification for CIP-011-3, Requirement R2
The VSL did not change from the previously FERC approved CIP‐011‐2 Reliability Standard.
VRF and VSL Justifications
Project 2019‐02 BES Cyber System Information Access Management | August 2020
5
Mapping Document
Project 2019-02 BES Cyber System Information Access Management
Mapping of CIP-004-6 R4 to CIP-004-7 R6
Access Management Program control requirements as applied to BES Cyber System Information (BCSI) designated storage locations were
moved to CIP‐004 Requirement R6.
Standard: CIP-004-6
Requirement in Approved Standard
Translation to New Standard or Other
Action
CIP‐004‐6, Requirement R4, Part 4.1.3
CIP‐004‐7, Requirement R6, Part 6.1
Access to designated storage locations,
whether physical or electronic, for BES Cyber
System Information.
Authorize provisioning of access to BCSI
based on need, as determined by the
Responsible Entity, except for CIP
Exceptional Circumstances.
Description and Change Justification
Requirement R6 was created to house all
BCSI related access management
requirements, which include the current
CIP‐004‐6 R4.1.3, R4.4, and R5.3 in a single
requirement (R6).
The modified requirement language
includes a shift from authorization to access
to designated storage locations, to
authorizing the provisioning of BCSI access.
CIP‐004‐6, Requirement R4, Part 4.4
CIP‐004‐7, Requirement R6, Part 6.2, 6.2.1,
Verify at least once every 15 calendar months and 6.2.2.
that access to the designated storage
Verify at least once every 15 calendar
locations for BES Cyber System Information,
months that all provisioned access to BCSI:
Requirement R6 was created to house all
BCSI related access management
requirements, which include the current
RELIABILITY | RESILIENCE | SECURITY
Standard: CIP-004-6
Translation to New Standard or Other
Action
Requirement in Approved Standard
whether physical or electronic, are correct
and are those that the Responsible Entity
determines are necessary for performing
assigned work functions.
CIP‐004‐6, Requirement R4, Part 5.3
For termination actions, revoke the
individual’s current access to the designated
storage locations for BES Cyber System
Information, whether physical or electronic
(unless already revoked according to
Requirement R5.1), by the end of the next
calendar day following the effective date of
the termination action.
6.2.1 Is authorized; and
6.2.2 Is appropriate based on need, as
determined by the Responsible Entity.
Description and Change Justification
CIP‐004‐6 R4.1.3, R4.4, and R5.3 in a single
requirement (R6).
The modified requirement language
includes a two‐part separation of the
current CIP‐004‐6 R4.4 requirement and
that the Responsible Entity 1) Verifies
provisioned access to BCSI is authorized,
and 2) Verifies the provisioned access is
appropriate based on need.
CIP‐004‐7, Requirement R6, Part 6.3
Requirement R6 was created to house all
BCSI related access management
For termination actions, remove the
individual’s ability to use provisioned access requirements, which include the current
to BCSI (unless already revoked according to CIP‐004‐6 R4.1.3, R4.4, and R5.3 in a single
requirement (R6).
Part 5.1) by the end of the next calendar
day following the effective date of the
The change in requirement language
termination action.
focuses on revoking the ability to use
provisioned access to BCSI instead of
revoking access to the designated storage
locations for BCSI.
Mapping Document
Project 2019‐02 BES Cyber System Information Access Management | August 2020
2
Mapping Document
Project 2019-02 BES Cyber System Information Access Management
Modifications to CIP-011-2
The modifications made to requirements within CIP‐011‐2 are intended to focus on preventing unauthorized access to BES Cyber System
Information (BCSI) regardless of state (storage, transit, use). In addition, new requirements have been implemented to mitigate risks
associated with BCSI access when utilized in off‐premises vendor services.
Standard: CIP-011-3
Requirement in Approved Standard
Translation to New Standard or Other
Action
CIP‐011‐2, Requirement R1, Part 1.1
CIP‐011‐3, Requirement R1, Part 1.1
Method(s) to identify information that meets
the definition of BES Cyber System
Information.
Method(s) to identify BCSI.
CIP‐011‐2, Requirement R1, Part 1.2
CIP‐011‐3, Requirement R1, Part 1.2
Procedure(s) for protecting and securely
handling BES Cyber System Information,
including storage, transit, and use.
Method(s) to protect and securely handle
BCSI.
N/A
CIP‐011‐3, Requirement R1, Part 1.3 (NEW)
Description and Change Justification
Requirement language simplified.
When the Responsible Entity engages
vendor services to store, utilize, or analyze
Requirement revised to a focus around the
implementation of controls that prevent the
unauthorized access to BCSI (concurrent
ability to obtain and use) in storage, transit,
and use.
This new CIP‐011‐3 requirement is similar to
the cyber security risk assessment required
as part of CIP‐013 Requirement R1, however
it is intended to focus the risk assessment
RELIABILITY | RESILIENCE | SECURITY
Standard: CIP-011-3
Requirement in Approved Standard
Translation to New Standard or Other
Action
BCSI, implement risk management
method(s) for the following:
1.3.1 Data governance and rights
management; and
Description and Change Justification
on the security controls used by the vendor
to manage the environment that will be
used to host Responsible Entity’s BCSI.
1.3.2 Identity and access management; and
1.3.3 Security management; and
1.3.4 Application, infrastructure, and
network security.
N/A
CIP‐011‐3, Requirement Part 1.4 (NEW)
When the Responsible Entity engages
vendor services to store, utilize, or
analyze BCSI, implement one or more
documented electronic technical
mechanisms to protect BCSI.
This new CIP‐011‐3 requirement is intended
to address any risks identified under CIP‐
011‐3, Requirement R1, Part 1.3 through
the implementation of technical controls to
prevent unauthorized logical access to BCSI.
Mapping Document
Project 2019‐02 BES Cyber System Information Access Management | August 2020
2
Standards Announcement
Project 2019-02 BES Cyber System Information Access
Management
Formal Comment Period Open through September 21, 2020
Now Available
A 45-day formal comment period for Project 2019-02 BES Cyber System Information Access
Management is open through 8 p.m. Eastern, Monday, September 21, 2020 for the following
Standards and Implementation Plan:
CIP-004-7 - Cyber Security - Personnel & Training
CIP-011-3 - Cyber Security - Information Protection
Implementation Plan
Commenting
Use the Standards Balloting and Commenting System (SBS) to submit comments. Contact Linda Jenkins
regarding issues using the SBS. An unofficial Word version of the comment form is posted on the
project page.
•
Contact NERC IT support directly at https://support.nerc.net/ (Monday – Friday, 8 a.m. - 5
p.m. Eastern) for problems regarding accessing the SBS due to a forgotten password,
incorrect credential error messages, or system lock-out.
•
Passwords expire every 6 months and must be reset.
•
The SBS is not supported for use on mobile devices.
•
Please be mindful of ballot and comment period closing dates. We ask to allow at least 48
hours for NERC support staff to assist with inquiries. Therefore, it is recommended that users try
logging into their SBS accounts prior to the last day of a comment/ballot period.
Next Steps
Additional ballots for the standards and implementation plan, along with non-binding polls for each
associated Violation Risk Factors and Violation Severity Levels will be conducted September 11–21,
2020.
For more information on the Standards Development Process, refer to the Standard Processes Manual.
Subscribe to this project's observer mailing list by selecting "NERC Email Distribution Lists" from the
"Service" drop-down menu and specify “Project 2019-02 BES Cyber System Information Access
Management” in the Description Box. For more information or assistance, contact Senior Standards
Developer, Latrice Harkness (via email) or at 404-446-9728.
RELIABILITY | RESILIENCE | SECURITY
North American Electric Reliability Corporation
3353 Peachtree Rd, NE
Suite 600, North Tower
Atlanta, GA 30326
404-446-2560 | www.nerc.com
Standards Announcement
Project 2019-02 BES Cyber System Information Access Management | August 2020
2
Comment Report
Project Name:
2019-02 BES Cyber System Information Access Management (Draft 2)
Comment Period Start Date:
8/6/2020
Comment Period End Date:
9/21/2020
Associated Ballots:
2019-02 BES Cyber System Information Access Management CIP-004-7 AB 2 ST
2019-02 BES Cyber System Information Access Management CIP-011-3 AB 2 ST
2019-02 BES Cyber System Information Access Management Implementation Plan AB 2 OT
There were 68 sets of responses, including comments from approximately 175 different people from approximately 111 companies
representing 10 of the Industry Segments as shown in the table on the following pages.
Questions
1. Do you agree the revisions to CIP-004 clarify the requirements for managing provisioned access to BCSI when utilizing third-party
solutions (e.g., cloud services)?
2. Do you agree the revisions to CIP-004 clarify that entities are only required to manage the provisioning of physical access to physical BCSI
and electronic access to electronic BCSI?
3. Do you agree the revisions to CIP-011 clarify the protections expected when utilizing third-party solutions (e.g., cloud services)?
4. Do you agree the new and revised VSL/VRF descriptions clearly align with the revisions to CIP-004 and CIP-011?
5. The SDT is proposing an 18-month implementation plan. Do you agree to the proposed timeframe?
6. The SDT proposes that the modifications in CIP-004 and CIP-011 meet the project scope in a cost-effective manner. Do you agree? If you
do not agree, or if you agree but have suggestions for improvement to enable more cost-effective approaches, please provide your
recommendation and, if appropriate, technical or procedural justification.
7. Provide any additional comments for the standard drafting team to consider, if desired.
Organization
Name
BC Hydro
and Power
Authority
Name
Adrian
Andreoiu
Midcontinent Bobbi
ISO, Inc.
Welch
Tennessee
Valley
Authority
Douglas
Webb
Brian
Millard
Segment(s)
1
2
1,3,5,6
Douglas
Webb
ACES Power Jodirah
Marketing
Green
Region
WECC
MRO,RF,SERC
SERC
MRO,SPP RE
1,3,4,5,6
Group Name
BC Hydro
ISO/RTO
Council
Standards
Review
Committee
2019-02 BCSI
Access
Management
Group
Member
Name
Group Member
Organization
Group
Member
Segment(s)
Group
Member
Region
Hootan
Jarollahi
BC Hydro and 3
Power Authority
WECC
Helen
Hamilton
Harding
BC Hydro and 5
Power Authority
WECC
Adrian
Andreoiu
BC Hydro and 1
Power Authority
WECC
Bobbi Welch MISO
2
RF
Ali Miremadi
CAISO
2
WECC
Brandon
Gleason
Electric
Reliability
Council of
Texas, Inc.
2
Texas RE
Helen Lainis
IESO
2
NPCC
Kathleen
Goodman
ISO-NE
2
NPCC
Gregory
Campoli
New York
Independent
System
Operator
2
NPCC
Mark Holman PJM
2
Interconnection,
L.L.C.
RF
Charles
Yeung
Southwest
Power Pool,
Inc. (RTO)
MRO
Kurtz, Bryan
G.
Tennessee
1
Valley Authority
SERC
Grant, Ian S.
Tennessee
3
Valley Authority
SERC
Thomas, M.
Lee
Tennessee
5
Valley Authority
SERC
Parsons,
Marjorie S.
Tennessee
6
Valley Authority
SERC
Westar-KCPL Doug Webb
Westar
1,3,5,6
MRO
Doug Webb
KCP&L
1,3,5,6
MRO
Tennessee
Valley
Authority
2
Bob Solomon Hoosier Energy 1
Rural Electric
SERC
MRO,NA - Not
ACES
Applicable,RF,SERC,Texas Standard
RE,WECC
Collaborations Kevin Lyons
DTE Energy - Karie
Detroit
Barczak
Edison
Company
Lincoln
Electric
System
3,4,5
Kayleigh 5
Wilkerson
FirstEnergy - Mark
FirstEnergy Garza
Corporation
4
FE Voter
Central Iowa
Power
Cooperative
1
MRO
Bill Hutchison Southern Illinois 1
Power
Cooperative
SERC
Nick
Fogleman
SERC
Prairie Power
Incorporated
1,3
Frank Owens Rayburn
3
Country Electric
Cooperative,
Inc.
Texas RE
Jim Davis
East Kentucky 1,3
Power
Cooperative
SERC
Carl Behnke
Southern
Maryland
Electric
Cooperative
3
RF
DTE Energy - 5
Detroit Edison
Company
RF
DTE Energy - Adrian
DTE Electric Raducea
Lincoln
Electric
System
Cooperative,
Inc.
Daniel Herring DTE Energy DTE Electric
4
RF
Karie Barczak DTE Energy DTE Electric
3
RF
Kayleigh
Wilkerson
Lincoln Electric 5
System
MRO
Eric Ruskamp Lincoln Electric 6
System
MRO
Jason Fortik
Lincoln Electric 3
System
MRO
Danny
Pudenz
Lincoln Electric 1
System
MRO
Julie Severino FirstEnergy FirstEnergy
Corporation
1
RF
Aaron
Ghodooshim
FirstEnergy FirstEnergy
Corporation
3
RF
Robert Loy
FirstEnergy FirstEnergy
Solutions
5
RF
Northern
California
Power
Agency
Marty
Hostler
Michael
Johnson
Southern
Company -
6
RF
Mark Garza
FirstEnergyFirstEnergy
4
RF
Michael
Whitney
Northern
3
California
Power Agency
WECC
Scott
Northern
4
Tomashefsky California
Power Agency
WECC
Dennis
Sismaet
Northern
6
California
Power Agency
WECC
Marty
Northern
California
Power Agen
5
WECC
FRCC,MRO,RF,SERC,Texas Duke Energy Laura Lee
RE
Dale
Goodwine
Duke Energy
1
SERC
Duke Energy
5
SERC
Greg Cecil
Duke Energy
6
RF
Lee Schuster Duke Energy
3
SERC
NCPA
5
Michael
Johnson
Pamela
Hunter
FirstEnergy FirstEnergy
Solutions
5
Duke Energy Masuncha 1,3,5,6
Bussey
Public Utility Meaghan
District No. 1 Connell
of Chelan
County
Ann Carey
PUD No. 1 of Ginette
Chelan
Lacasse
County
WECC
1,3,5,6
SERC
PG&E All
Segments
Southern
Company
Public Utility
1
District No. 1 of
Chelan County
WECC
Joyce Gundry Public Utility
3
District No. 1 of
Chelan County
WECC
Meaghan
Connell
Public Utility
5
District No. 1 of
Chelan County
WECC
Glen Pruitt
Public Utility
6
District No. 1 of
Chelan County
WECC
Marco Rios
Pacific Gas and 1
Electric
Company
WECC
Sandra Ellis
Pacific Gas and 3
Electric
Company
WECC
James
Mearns
Pacific Gas and 5
Electric
Company
WECC
Matt Carden
Southern
Company -
SERC
1
Southern
Company
Services, Inc.
Northeast
Ruida Shu 1,2,3,4,5,6,7,8,9,10 NPCC
Power
Coordinating
Council
Southern
Company
Services, Inc.
NPCC
Regional
Standards
Committee
Joel
Dembowski
Southern
3
Company Alabama Power
Company
SERC
William D.
Shultz
Southern
Company
Generation
5
SERC
Ron Carlsen
Southern
Company Southern
Company
Generation
6
SERC
Guy V. Zito
Northeast
Power
Coordinating
Council
10
NPCC
Randy
MacDonald
New Brunswick 2
Power
NPCC
Glen Smith
Entergy
Services
4
NPCC
Alan
Adamson
New York State 7
Reliability
Council
NPCC
David Burke
Orange &
Rockland
Utilities
3
NPCC
Michele
Tondalo
UI
1
NPCC
Helen Lainis
IESO
2
NPCC
David Kiguel
Independent
7
NPCC
Paul
Malozewski
Hydro One
3
Networks, Inc.
NPCC
Nick
Kowalczyk
Orange and
Rockland
1
NPCC
Joel
Charlebois
AESI - Acumen 5
Engineered
Solutions
International
Inc.
NPCC
Mike Cooke
Ontario Power 4
Generation, Inc.
NPCC
Salvatore
Spagnolo
New York
1
Power Authority
NPCC
Shivaz
Chopra
New York
5
Power Authority
NPCC
Deidre
Altobell
Con Ed Consolidated
Edison
4
NPCC
Dermot Smyth Con Ed Consolidated
Edison Co. of
New York
1
NPCC
Peter Yost
Con Ed Consolidated
Edison Co. of
New York
3
NPCC
Cristhian
Godoy
Con Ed Consolidated
Edison Co. of
New York
6
NPCC
Nicolas
Turcotte
Hydro-Qu?bec 1
TransEnergie
NPCC
Chantal
Mazza
Hydro Quebec 2
NPCC
Sean Bodkin Dominion 6
Dominion
Resources, Inc.
NPCC
Nurul Abser
NB Power
Corporation
1
NPCC
Randy
MacDonald
NB Power
Corporation
2
NPCC
Michael
Ridolfino
Central Hudson 1
Gas and
Electric
NPCC
Vijay Puran
NYSPS
NPCC
ALAN
ADAMSON
New York State 10
Reliability
Council
NPCC
Sean Cavote
PSEG - Public 1
Service Electric
and Gas Co.
NPCC
Brian
Robinson
Utility Services 5
NPCC
Quintin Lee
Eversource
Energy
1
NPCC
Jim Grant
NYISO
2
NPCC
6
Dominion Dominion
Resources,
Inc.
Sean
Bodkin
OGE Energy Sing Tay
- Oklahoma
Gas and
Electric Co.
Associated Todd
Electric
Bennett
Cooperative,
Inc.
6
6
3
Dominion
SPP RE
OKGE
AECI
John Pearson ISONE
2
NPCC
John Hastings National Grid
USA
1
NPCC
Michael Jones National Grid
USA
1
NPCC
Connie Lowe Dominion 3
Dominion
Resources, Inc.
NA - Not
Applicable
Lou Oberski
Dominion 5
Dominion
Resources, Inc.
NA - Not
Applicable
Larry Nash
Dominion 1
Dominion
Virginia Power
NA - Not
Applicable
Rachel Snead Dominion 5
Dominion
Resources, Inc.
NA - Not
Applicable
Sing Tay
OGE Energy Oklahoma
6
MRO
Terri Pyle
OGE Energy - 1
Oklahoma Gas
and Electric Co.
MRO
Donald
Hargrove
OGE Energy - 3
Oklahoma Gas
and Electric Co.
MRO
Patrick Wells OGE Energy - 5
Oklahoma Gas
and Electric Co.
MRO
Michael Bax
Central Electric 1
Power
Cooperative
(Missouri)
SERC
Adam Weber Central Electric 3
Power
Cooperative
(Missouri)
SERC
Stephen
Pogue
M and A
3
Electric Power
Cooperative
SERC
William Price M and A
1
Electric Power
Cooperative
SERC
Jeff Neas
SERC
Sho-Me Power 3
Electric
Cooperative
Peter Dawson Sho-Me Power 1
Electric
Cooperative
SERC
Mark Ramsey N.W. Electric
Power
Cooperative,
Inc.
1
NPCC
John Stickley NW Electric
Power
Cooperative,
Inc.
3
SERC
Tony Gott
KAMO Electric 3
Cooperative
SERC
Micah
Breedlove
KAMO Electric 1
Cooperative
SERC
Kevin White
Northeast
1
Missouri
Electric Power
Cooperative
SERC
Skyler
Wiegmann
Northeast
3
Missouri
Electric Power
Cooperative
SERC
Ryan Ziegler
Associated
Electric
Cooperative,
Inc.
1
SERC
Brian
Ackermann
Associated
Electric
Cooperative,
Inc.
6
SERC
Brad Haralson Associated
Electric
Cooperative,
Inc.
5
SERC
1. Do you agree the revisions to CIP-004 clarify the requirements for managing provisioned access to BCSI when utilizing third-party
solutions (e.g., cloud services)?
Kjersti Drott - Tri-State G and T Association, Inc. - 1
Answer
No
Document Name
Comment
Tri-State does not agree with all of the revisions.
The measures for R6.2 are too detailed when referring to privileges. Many types of access to BCSI are binary, either you have it or you do not.
Recommend the SDT remove the 3rd and 4th bullets in the measure so that an entity could simply verify that the access is still necessary and
appropriate for their job.
Likes
1
Dislikes
Platte River Power Authority, 5, Archie Tyson
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
No
Document Name
Comment
The SDT should consider either defining the term “provisioned access” or removing it altogether in CIP-004 R6. The use of an undefined term such as
“provisioned access” may lead to misunderstanding of the Standard and therefore may lead to inconsistent audit results. If you take “provisioned
access” to mean only intentionally created individual accounts then administrative access to BCSI will not be governed by any Standard.
Likes
0
Dislikes
0
Response
Joe Tarantino - Joe Tarantino On Behalf of: Arthur Starkovich, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Beth Tincher, Sacramento
Municipal Utility District, 4, 1, 6, 3, 5; Jamie Cutlip, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Kevin Smith, Balancing Authority of
Northern California, 1; Nicole Goi, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Nicole Looney, Sacramento Municipal Utility District, 4, 1,
6, 3, 5; - Joe Tarantino
Answer
Document Name
Comment
No
The addition of requirement 6 for CIP-004 makes it extremely difficult for entities to control access to BCSI. This is because of the requirement to
provision access to individual pieces of information rather than provisioning access to where information is being stored (Storage locations).
We do not see how the changes clarify any requirements related to third-party solutions such as cloud services. Was the thought of changing the
Applicability wording from “BCSI associated with” to “BCSI pertaining to” would provide the clarity that is being referenced? It is not obvious where any
clarity is provided.
Likes
2
Dislikes
American Public Power Association, 4, Cashin Jack; Platte River Power Authority, 5, Archie Tyson
0
Response
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
No
Document Name
Comment
It is unclear in which instances provisioned access is applicable. Suggest include examples to clarify applicability by scenario (i.e.: cloud services).
Likes
0
Dislikes
0
Response
Joshua Andersen - Salt River Project - 1,3,5,6 - WECC
Answer
No
Document Name
Comment
For R6.1, the wording “based on need” is not necessary. SRP is not aware of any other reason that access would be authorized or than the fact there is
a need for it. When access is authorized the fact there is a need is implied in the authorization. If it stays, how will you audit what is a valid “need”? If
SRP authorizes access to everyone in a particular organization because SRP needs to comply with this requirement, is compliance a valid need? The
focus should be on unauthorized access not appropriate business need.
For R6.1, the statement, “except for CIP Exceptional Circumstances” is not necessary. It’s not clear if the exclusion “except for CIP Exceptional
Circumstances” is stating in an Exceptional Circumstance it is not necessary to have business need or if it is not necessary to have authorization. (need
to clarify) Even in an Exceptional Circumstance someone should still authorize the access – even though it might not follow the normal processes, at
some level there is authorization, even if verbal.
For R6.1, in Measures, the statement “Dated authorization records for provisioned access to BCSI based on need”. The statement based on need is
not necessary here. If it is, then be clear on the expectations that the evidence needs to document the business need.
For R6.2, the wording “based on need” is not necessary. SRP supports requiring that the access “is authorized and appropriate as determined by the
Responsible Entity.”
For R6.2, in Measures, if the requirement is to “Verify access to BCSI is appropriate based on needs” then why are the Measures silent on business
need. Either remove business need or provide clarity on what is expected.
For R6.2, in Measures, the concept of “privileges” is not in CIP-004 R6, so it’s not clear how privileges will show compliance with the requirement. The
Technical Rationale document states “Requirement 6.2 has been drafted to ensure the Responsible Entity reviews provisioned access privileges to
BES Cyber System Information at least every 15 calendar months.” SRP does not see that in the R6.2 requirements.
Likes
0
Dislikes
0
Response
Bruce Reimer - Manitoba Hydro - 1
Answer
No
Document Name
Comment
The change from BCSI storage locations to personnel with provisioned access to BCSI creates a significant administrative overhead for entities and is
not practical resulting in no security value. The BCSI repository is the key for controlling access to BCSI and it is impossible to authorize and provision
access to each single piece of BCSI. CIP-011 should require all BCSI must be stored within a repository in the first place. When a BCSI is taken outside
BCSI repository for use, this should fall within CIP-011 on how to protect and handle BCSI. The current CIP-004 R4 and R5 has addressed the thirdparty storage issue as long as the third party is willing to provide evidence for compliance with CIP-004 R5 and R4. Resulting from lack of alternative
controls for meeting CIP-004 requirements, the goal of the SAR is to create increased choices for utilization of modern third-party data storage and
analysis systems. but the change from BCSI storage locations to provisioned access doesn’t resolve the issues and causes more confusion. We
suggest the following wording for CIP-004 R6.1 based on the example 3 of SAR:
Process to authorize based on need, as determined by the Responsible Entity, except for CIP
Exceptional Circumstances:
6.1.1. Physical access to physical BCSI Repository;
6.1.2. Physical access to unencrypted electronic BCSI Repository;
6.1.3. Electronic access to unencrypted electronic BCSI Repository; and
6.1.4. Electronic access to BCSI encryption keys for encrypted BES Cyber System Information.
The above wording The Part 6.14 can fit cloud storage services well. We suggest defining the BCSI Repository term and requiring BCSI Repository
identification in CIP-011.
Likes
0
Dislikes
Response
0
Tim Womack - Puget Sound Energy, Inc. - 3
Answer
No
Document Name
Comment
Puget Sound Energy supports the comments of EEI.
Likes
0
Dislikes
0
Response
David Rivera - New York Power Authority - 3
Answer
No
Document Name
Comment
We do not understand all of the implications of the new term “provisioning.” Until we better understand these implications and expectations, we are
concerned.
Not sure how these changes address our concerns with the third party access
Not sure how the addition of another list helps - - - appears to be more work. Especially for physical security
Request clarification whether the third party access should be managed on an individual basis or on the team
Likes
0
Dislikes
0
Response
Mark Ciufo - Mark Ciufo On Behalf of: Payam Farahbakhsh, Hydro One Networks, Inc., 1, 3; - Mark Ciufo
Answer
No
Document Name
Comment
The intent of this standard development project was to enable entities to utilize third party service providers for storage and analysis of BCSI by defining
the security control requirements should entities choose to utilize third party services. Utilizing third party providers may result in increased reliability,
increased choice, greater flexibility, higher availability, and reduced-cost for entities. Current CIP standards essentially do not address this scenario.
The SDT introduced a requirement to develop and implement an access management program for BCSI brought forward as a new requirement (a new
R6 and previous R4.1.3, R4.4 and R5.3 are moved to the new R6) in the proposed CIP-004-7. Controls introduced as part of this program are similar to
that of access management for electronic and unescorted physical access to BES Cyber Systems.
The addition of Requirement R6 in the proposed CIP-004-7 (draft 2) has introduced additional access management controls applicable to all scenarios
including those who manage their BCSI without utilizing third party. We believe requiring additional security controls outside of the context of utilizing a
third party is out of scope of this project.
Likes
0
Dislikes
0
Response
Sandra Shaffer - Berkshire Hathaway - PacifiCorp - 6
Answer
No
Document Name
Comment
PAC does not agree with the revisions. The proposed revisions does not clarify the protections expected when utilizing third‐ party solutions (e.g., cloud
services). The wording of requirement 6.2 expands the scope of the 15-month review by making it similar to the 4.2 quarterly requirement – verify that
provisioned access is authorized. The requirement should be the same as CIP-004-6 R4.4 – verify that accesses are correct and are those that the
Responsible Entity determines are necessary for performing assigned work functions.
PacifiCorp appreciates the change to the applicability to be consistent with the current version of the requirement.
We do believe this still allows for provisioned access to designated BCSI storage locations.
Likes
0
Dislikes
0
Response
Andrea Jessup - Bonneville Power Administration - 1,3,5,6 - WECC
Answer
No
Document Name
Comment
The applicable portion of the control is R6.1, which BPA believes is very broad and lacking specificity in its wording: “Authorize provisioning of access to
BCSI based on need, as determined by the Responsible Entity, except for CIP Exceptional Circumstances.” The SDT must continue to consider the
physical storage of printed materials as well, so as not to exclude the possibility of protecting physical storage locations under some facsimile of the
current methodology.
Proposed change:
Authorize provisioning of access to BCSI as follows:
R6.1.1 Authorize physical access to physical BCSI based on need, except for CIP Exceptional Circumstances; and
R6.1.2 Authorize electronic access to electronic BCSI (including BCSI maintained by, stored at, or shared with a vendor for purposes of analysis) based
on need, except for CIP Exceptional Circumstances.
Likes
0
Dislikes
0
Response
Adrian Andreoiu - BC Hydro and Power Authority - 1, Group Name BC Hydro
Answer
No
Document Name
Comment
1. There are very clear distinctions and limitations on the concept of what ‘provisioned access’ to BCSI constitutes and what it does not within the
associated CIP-004-7 Technical Rationale document as drafted by the Standard Drafting Team. However, as this is not part of the CIP-004-7
standard itself, there is no guarantee that the Technical Rationale document guidance will be used as part of the compliance
monitoring/enforcement approach, as regional enforcement agencies typically audit to the language of the standard. BC Hydro recommends
that this clarity be incorporated directly into the CIP-004-7 standard requirements language to alleviate the risk of unintended interpretations in
practice.
2. Require clarity as to whether CIP-004-7 Requirement 6 only applies to BCSI to which the Responsible Entity has the ability to directly control
the provisioning of access and not to third-party service provider created or controlled repositories of BCSI (i.e. cloud services). For example,
does this requirement apply to system administrators or support staff employed by a cloud service provider, or only to personnel with
provisioned access to BCSI who are employed (either directly as employees/contractors or indirectly as sub-contractors) and who are
terminated by the Responsible Entity?
3. Pending the answer to b), per CIP-004-7 Requirement 6.3, does the termination concept also apply to the cloud service provider’s staff (or any
other third-party service provider agency’s staff members for that matter) and/or any of their sub-contractors who may be supporting a cloud
service containing BCSI or managing a repository outside of the Responsible Entity’s control?
4. The language of CIP-004-7 Requirement 6.2 only talks to the verification every 15 calendar months of provisioned access to BCSI (for
authorizations and that access is appropriate based on need). The Measures however discuss the collection of evidence regarding specific
privileges associated with authorizations and to compare against specific privileges that are provisioned as well. The concept of privilege
reviews (i.e. least privilege) is also backed by the CIP-004-7 Technical Rationale document. This requirement needs further clarity to confirm
whether 15-calendar month verifications are actually required to examine specific access privileges in addition to authorizations based on need
or whether verifications of authorizations based on need is sufficient. If this is expected, should clarity that ‘access privileges are appropriate
based on need’ be added to the standard requirement language.
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
No
Document Name
Comment
The change from authorizing designated storage location access to “provisioned access to BCSI” does not clarify the requirements, especially since
“provisioned access” is not a defined term. While the term has changed from designated storage locations to “provisioned access,” the meaning seems
to be the same when you review information in the technical rationale. The change in the term creates significant administrative work to update program
documentation, as well as access tracking tools, without commensurate improvement or flexibility in security controls.
In addition, the wording of requirement 6.2 expands the scope of the 15-month review by making it similar to the 4.2 quarterly requirement – verify that
provisioned access is authorized. The requirement should be the same as CIP-004-6 R4.4 – verify that accesses are correct and are those that the
Responsible Entity determines are necessary for performing assigned work functions.
MidAmerican Energy Company appreciates the change to the applicability to be consistent with the current version of the requirement.
Likes
0
Dislikes
0
Response
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
No
Document Name
Comment
The change from authorizing designated storage location access to “provisioned access to BCSI” does not clarify the requirements, especially since
“provisioned access” is not a defined term. While the term has changed from designated storage locations to “provisioned access,” the meaning seems
to be the same when you review information in the technical rationale. The change in the term creates significant administrative work to update program
documentation, as well as access tracking tools, without commensurate improvement or flexibility in security controls.
In addition, the wording of requirement 6.2 expands the scope of the 15-month review by making it similar to the 4.2 quarterly requirement – verify that
provisioned access is authorized. The requirement should be the same as CIP-004-6 R4.4 – verify that accesses are correct and are those that the
Responsible Entity determines are necessary for performing assigned work functions.
MidAmerican Energy Company appreciates the change to the applicability to be consistent with the current version of the requirement.
Likes
Dislikes
0
0
Response
Eli Rivera - CenterPoint Energy Houston Electric, LLC - NA - Not Applicable - Texas RE
Answer
No
Document Name
Comment
CenterPoint Energy Houston Electric, LLC (CEHE) feels that Requirement R6 and its subparts do not provide clarity that one intent of these
requirements is to manage access when utilizing third-party solutions since it doesn’t explicitly make that statement. The phrase “provisioning of
access” does not necessarily imply “when utilizing third party solutions.” It is also ambiguous enough that it creates the impression that the phrase
needs to be defined.
Likes
0
Dislikes
0
Response
Marty Hostler - Northern California Power Agency - 5, Group Name NCPA
Answer
No
Document Name
Comment
See Tristate (SAR originator) and SMUDs comments.
Likes
0
Dislikes
0
Response
Michael Johnson - Michael Johnson On Behalf of: Ed Hanson, Pacific Gas and Electric Company, 1, 3, 5; Marco Rios, Pacific Gas and Electric
Company, 1, 3, 5; Sandra Ellis, Pacific Gas and Electric Company, 1, 3, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
No
Document Name
Comment
PG&E believes the modifications are a good step in clearly indicting that access to BCSI must be defined for the BSCI and not storage locations as
indicated under the current Standards. These changes would make use of third party service providers (i.e. vendor or cloud) possible, but the
language of Requirement Part 6.1 is confusion. Is an Entity authorizing provisioning of access or provisioning authorized access. The Technical
Rational (TR) document has the following for R6:
“Methods to document and track authorization for access where provisioning of access is a prerequisite of being able to obtain and/or use the BES
Cyber System Information”
The above is clearer than the Requirement language in P6.1, but the TR is not the Standard and should not be counted on when audit teams start their
interruption of the Standard. PG&E recommends the language for Part 6.1 be modified to more clearly indicate in the intent, such as:
“Provisioning of authorized access to physical and electronic BCSI based on need as determine by the Responsible Entity, except for CIP Exceptional
Circumstances.”
PG&E also indicates physical and electronic should be indicated in P6.2 and P6.3
Likes
0
Dislikes
0
Response
Sean Bodkin - Dominion - Dominion Resources, Inc. - 6, Group Name Dominion
Answer
No
Document Name
Comment
Dominion Energy supports the comments submitted by EEI.
Likes
0
Dislikes
0
Response
Roger Fradenburgh - Roger Fradenburgh On Behalf of: Nicholas Lauriat, Network and Security Technologies, 1; - Roger Fradenburgh
Answer
No
Document Name
Comment
N&ST notes the proposed revisions say nothing at all about third-party solutions, cloud-based or otherwise.
Likes
0
Dislikes
0
Response
Sing Tay - OGE Energy - Oklahoma Gas and Electric Co. - 6, Group Name OKGE
Answer
No
Document Name
Comment
Oklahoma Gas & Electric supports the comments submitted by EEI.
Likes
0
Dislikes
0
Response
Leonard Kula - Independent Electricity System Operator - 2
Answer
No
Document Name
Comment
We support NPCC comments:
We do not understand all of the implications of the new term “provisioning.” Until we better understand these implications and expectations, we are
concerned.
Not sure how these changes address our concerns with the third party access
Not sure how the addition of another list helps - - - appears to be more work. Especially for physical security
Request clarification whether the third party access should be managed on an individual basis or on the team
Likes
0
Dislikes
0
Response
Jennifer Bray - Arizona Electric Power Cooperative, Inc. - 1
Answer
Document Name
No
Comment
We do not agree that the revisions in CIP-004 clarify the requirements for managing provisioned access to BCSI when utilizing third-party
solutions. There is no mention of utilization of third-party solutions such as cloud services or vendor services in the requirements and or technical
rationale in regards to question 1 above:
https://www.nerc.com/pa/Stand/Project201902BCSIAccessManagement/2019-02_CIP-004-7_Technical_Rationale.pdf
https://www.nerc.com/pa/Stand/Project201902BCSIAccessManagement/2019-02_CIP-004-7_redline_to_last_posted.pdf
Further, the requirements in CIP-011 use the term “vendor services”, which does not match the way question 1 is framed.
The new technical rationale assumes BCSI is outside of the Responsible Entity’s direct control, but with electronic mechanisms implemented to protect
BCSI via CIP-011 R1.4, BCSI would in fact be in the Responsible Entity’s direct control.
The new technical rationale goes on to explain:
“For example, there is no available or feasible mechanism to provision access in instances when an individual is merely given, views, or might see BES
Cyber System Information, such as when the individual is handed a piece of paper during a meeting or views a whiteboard in a conference room.”
Simply being able to view BCSI in a meeting, on a screen, etc., does not constitute access. To access something in which access is controlled, such as
under a CIP-011 Information Protection Program, requires credentials with provisioned privileges, such as a key, username/password, encryption key,
badge, fingerprint, etc. and provisioned permissions to gain access. The new technical rationale is confusing provisioning with credentials:
“Provisioning should be considered the specific actions taken to provide an individual the means to access BES Cyber System Information (e.g.,
physical keys or access cards, user accounts and associated rights and privileges, encryption keys).”
A process to grant access, contains the element of provisioning which is part of the considerations of need to know/access. When an access request is
processed, physical access as an example, an individual isn’t given access to every PSP unless requested. If access to all PSPs were requested, the
request would be reviewed for need, and approved or denied based on need. If approved, the individual would be provisioned with those access rights
and credentials given to access the PSPs. The process of granting of access is the full complement of, request, assessing need, approval,
provisioning, and credentials. Access revocation can be achieved by the removal of ALL provisioned access rights or disabling of credentials. Access
can be reduced or increased by provisioning of rights. In CIP-004-6’s Guidelines and Technical Basis, page 44 states:
“Revocation of electronic access should be understood to mean a process with the end result that electronic access to BES Cyber Systems is no longer
possible using credentials assigned to or known by the individual(s) whose access privileges are being revoked.”
The converse of revocation of access would be granting of access. The process of granting of access would result in providing individual(s) credentials
with provisioned access privileges to access a BES Cyber System. Therefore we do not agree with the use of “provisioned access”.
Likes
0
Dislikes
0
Response
Jack Cashin - American Public Power Association - 4
Answer
No
Document Name
Comment
APPA does not agree with the revisions to CIP-004. While public power supports that the revisions do not limit third party solutions, we also believe that
the revisions are unclear about the requirement’s applicability when using third-party solutions. APPA utilities want to be able to use third party
solutions without unecessary regulatory risk.
Likes
1
Dislikes
Platte River Power Authority, 5, Archie Tyson
0
Response
Andrea Barclay - Georgia System Operations Corporation - 4
Answer
No
Document Name
Comment
Comments: GSOC greatly appreciates the SDT’s consideration of its previous comments regarding the consolidation of all access management related
requirements into CIP-004. However, it does not support the revisions to CIP-004 to clarify the requirements for managing provisioned access to BCSI
when utilizing third-party solutions – as proposed – and provides the following comments for the SDT’s consideration:
1. Modification of Established Format - As stated in its previous comments, while GSOC understands what the SDT was attempting to accomplish,
it does not agree with the replacement of “Applicable Systems” with “Applicability.” “Applicability” is already utilized in each of the reliability standards to
denote whether or not a particular registered function has responsibility under the Standard. Utilization of the same term, but with a different scope of
applicability within body of CIP-004 will result in confusion and ambiguity regarding the overall applicability of this reliability standard. Further, this
change results in this Standard and CIP-011 (where this change has also been proposed) being different from the remaining CIP reliability standards
relative to the CIP reliability standards overall approach to identification of asset scope. GSOC raises, for the SDT’s consideration, that the deviation
from the established format and scoping mechanisms used throughout the CIP reliability standard will create confusion and ambiguity and that any
value achieved by this change will be far outweighed by the continued value associated with the current format and terms.
To address this concern, GSOC proposes that the lead in requirement language for requirement R6 be modified as follows:
Each Responsible Entity shall implement one or more documented access management program(s) for BES Cyber System Information about the
“Applicable Systems” identified in CIP‐ 004‐ 7 Tab le R6 – Access Management for BES Cyber System Information that collectively include each
of the applicable requirement parts in CIP‐004‐ 7 Table R6 – Access Management for BES Cyber System Information. [Violation Risk Factor: Medium]
[Time Horizon: Same Day Operations and Operations Planning].
2. Potential Scope Expansion - GSOC notes that it is also concerned that the modifications to the contents of the “Applicability” column may
potentially expand and obscure the established definition of BCSI set forth in the Glossary of Terms Used in NERC Reliability Standards. Specifically,
the revisions limit the “applicability” to “BCSI associated with …” BCSI is defined as
Information about the BES Cyber System that could be used to gain unauthorized access or pose a security threat to the BES Cyber System. BES
Cyber System Information does not include individual pieces of information that by themselves do not pose a threat or could not be used to allow
unauthorized access to BES Cyber Systems, such as, but not limited to, device names, individual IP addresses without context, ESP names, or policy
statements. Examples of BES Cyber System Information may include, but are not limited to, security procedures or security information about BES
Cyber Systems, Physical Access Control Systems, and Electronic Access Control or Monitoring Systems that is not publicly available and could be used
to allow unauthorized access or unauthorized distribution; collections of network addresses; and network topology of the BES Cyber System.
The use of the term “associated with” is subjective and could be interpreted broadly by some entities and/or regulators. As an example, information
about an external firewall configuration that acts as a first line of defense, but is not part of an applicable system, may contain information that “could be
used to gain unauthorized access or pose a security threat to the BES Cyber System.” It is unclear under the proposed revisions to the applicability
column whether this information would be considered subject to CIP-004 – even if the asset from which it came is not in scope for any other reliability
standards. This potential scope expansion and the associated ambiguity between the scope of CIP-004, the remaining reliability standards, and the
Glossary of Terms Used in NERC Reliability Standards could result in increased compliance obligations without an attendant security or reliability
benefit, confusion, and inconsistency of implementation. The proposed revision above would resolve this issue while preserving the current format of
CIP-004 and its consistency with the remaining reliability standards.
3. Less flexibility/More restrictive language - As GSOC understands the draft, the objective of developing a dedicated requirement for access
authorization to BCSI was to add flexibility for entities utilizing hosted services for BCSI storage, use, transit, etc. GSOC appreciates this objective and
respectfully questions why the SDT utilized significantly different language in this requirement than the current “boilerplate” language utilized in the
existing access authorization requirements – especially considering that the new language appears to be more restrictive. As an example, the current
access authorization requirement language reads as follows:
Process to authorize based on need, as determined by the Responsible Entity, except for CIP Exceptional Circumstances: 4.1.1. Electronic access; and
4.1.2. Unescorted physical access into a Physical Security Perimeter; …
The new language in requirement R6.1 reads as follows:
Authorize provisioning of access to BCSI based on need, as determined by the Responsible Entity, except for CIP Exceptional Circumstances.
In requirement R6, the flexibility afforded to entities to define and implement an access authorization process (which may or may not specifically
address provisioning depending on an entity’s process and needs) has been removed and, although the technical rationale alludes to the ability to have
no authorization or provisioning where such is not possible, the requirement, on its face, as proposed, does not appear to afford such flexibility.
Indeed, a plain reading of the requirement would indicate that access to any individual piece of BCSI would require authorized, provisioned access. For
this reason, GSOC would respectfully suggest that this modification is unnecessarily restrictive and that the retention of the current boilerplate language
(with minor revision) would afford Responsible Entities more flexibility to define their processes for both self-hosted and third-party hosted data within
their BCSI program. For these reasons, GSOC recommends that the SDT revise the lead-in requirement language as indicated above and revise the
proposed language for Requirement R6.1 to
Process to authorize access based on need, as determined by the Responsible Entity, except for CIP Exceptional Circumstances
Finally, the value of driving consistency in rigor and format for access authorization must be considered. GSOC does not foresee that the value of
changing the established format, applicability, and access-related obligations for one piece of the overall security framework that comprises the CIP
reliability standards will outweigh the value of developing enhancements that conform with the established, known format, applicability, and accessrelated obligations currently in place.
4. Maintain consistency with established language – For the same reasons described above, GSOC would respectfully recommend that
requirements R6.2 and R6.3 also be reverted to language similar to that currently utilized within the existing access management requirements, e.g.:
R6.2 Verify at least once every 15 calendar months that access to BCSI or its designated storage location, whether physical or electronic, are correct
and are those that the Responsible Entity determines are necessary for performing assigned work functions.
R6.3 For termination actions, revoke the individual’s access to BCSI or its designated storage location, whether physical or electronic (unless already
revoked according to Requirement R5.1), by the end of the next calendar day following the effective date of the termination action.
5. Backwards compatibility - GSOC appreciates the SDT’s consideration of the important concept of backwards compatibility in the Technical
Rationale; however, the shift from access authorization by repository/location or BCSI to BCSI only appears to remove the ability of Responsible Entities
to manage such authorizations, verifications, and terminations based on the use of designated storage locations or repositories. Many current
programs have been developed and are managed around the concept of repositories or storage locations – not individual pieces of BCSI. For this
reason, GSOC cannot agree that the proposed requirements are actually backwards compatible nor that minimal effort will be required to meet these
new requirements. In particular, the proposed requirements focus solely on each individual piece of information and the management of access
thereto. The obvious implementation method to ensure compliance would be to create and maintain a list of each individual piece of BCSI, its location,
and its format. Such a list would be a new development that would likely not be compatible with existing program implementations.
6. Technical Rationale as support for revisions - GSOC notes the Technical Rationale does not appear to be consistent with the proposed
revisions and does not make a convincing case for the significant changes proposed, e.g., revision of the requirement structure, inability to manage
BCSI by location or repository, etc. To address this, GSOC proposes the above revisions, which would maintain the current format and provide
flexibility for the management of BCSI via documented processes that can address either individual BCSI management, management by
repository/location, or both. To ensure consistency between the Technical Rationale and the proposed revisions, GSOC respectfully suggests that the
SDT review these documents objectively and make necessary revisions.
Likes
0
Dislikes
0
Response
Bridget Silvia - Sempra - San Diego Gas and Electric - 3
Answer
No
Document Name
Comment
SDG&E supports EEI’s comments submitted on our behalf, and in addition, submits the following comments below regarding CIP-004-7 Requirement 6,
part 6.1.
Discussions with the Standard Drafting Team (SDT) have clarified that CIP-004-7 R6.1 was not intended to require provisioning of access to each
individual piece of BCSI. The SDT explained that the language was written to accommodate a use case where the BCSI authorization attaches to the
document so that the authorization follows the document when moved to various locations.
To accommodate both circumstances where entities may fall under the use case scenario or may use designated storage locations for BCSI, SDG&E
proposes the following two options:
1. Provide two parts to the requirement. One part will be similar to the current CIP-004-6 R4.1.3 which requires authorization of access to BCSI
designated storage locations. The other part will authorize the provisioning of access to BCSI for documents not stored in a designated storage
location.
2. Given the possibly low frequency of the described use case, retain the current CIP-004-6 R4.1.3 BCSI designated storage location authorization
requirement while adding a provision to ensure that documents not stored in BCSI storage locations are protected according to the other CIP
information protection requirements.
Two other alternatives are suggested below:
Proposal No. 1:
Authorize provisioning of access to BCSI based on need and as determined by the Responsible Entity’s designated method(s) to protect and
securely handle BCSI, except for CIP Exceptional Circumstances.
Proposal No. 2:
Using one or a combination of the following methods, authorize provisioning of access to BCSI based on need, as determined by the Responsible
Entity, except for CIP Exceptional Circumstances:
•
•
Access to designated storage locations, whether physical or electronic, for BES Cyber System Information; or
Access to BES Cyber System Information, whether physical or electronic.
If the SDT does not adopt any changes to the CIP-004-7 R6.1 Requirement language, please consider adding clarifying language in the Measures
and/or Technical Rationale explicitly stating that authorization of access to BCSI is not required for each individual piece of BCSI.
Likes
0
Dislikes
0
Response
Wayne Guttormson - SaskPower - 1
Answer
No
Document Name
Comment
Support the MRO-NSRF comments.
Likes
0
Dislikes
0
Response
Dennis Sismaet - Northern California Power Agency - 6
Answer
Document Name
Comment
No
See Tristate (SAR originator) and SMUDs comments.
Likes
0
Dislikes
0
Response
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
No
Document Name
Comment
NV Energy does not agree with the revisions. The proposed revisions does not clarify the protections expected when utilizing third‐party solutions (e. g.,
cloud services). The wording of requirement 6.2 expands the scope of the 15-month review by making it similar to the 4.2 quarterly requirement – verify
that provisioned access is authorized. The requirement should be the same as CIP-004-6 R4.4 – verify that accesses are correct and are those that the
Responsible Entity determines are necessary for performing assigned work functions.
NV Energy appreciates the change to the applicability to be consistent with the current version of the requirement.
NVE also supports EEI's comments on providing clarity on the language associated with Requirement R6, Part 6.1, and aligning the language of
Requirement R6, part 6.1 to Requirement R4, part 4.1 by adding the phrase “Process to”, which would place the responsibility on the entity to define its
process.
Likes
0
Dislikes
0
Response
Larry Snow - Cogentrix Energy Power Management, LLC - 4 - NPCC,SERC,RF
Answer
No
Document Name
Comment
The term "provisioning" is ambiguous and could lead to various interpretations of the requirements across the regions. More detailed clarification is
needed of the term is to remain in the language. Concerns over 3rd party access control and what appears to be additional lists and documantation.
Likes
0
Dislikes
Response
0
Bobbi Welch - Midcontinent ISO, Inc. - 2, Group Name ISO/RTO Council Standards Review Committee 2019-02 BCSI Access Management
Answer
No
Document Name
2019-02_Unofficial_Comment_Form_IRC SRC_FINAL_09-21-20.docx
Comment
There is a lack of clarity around the implications of the new term “provisioning.” Until the ISO/RTO Council Standards Review Committee (IRC
SRC) better understand these implications and expectations, we are concerned.
It seems like the SDT has attempted to break the process of providing access to BCSI into two component parts: The authentication process, which we
are assuming is a much broader list, coupled with the technical controls that are being referred to in the standard as “provisioning.” The mandate would
be that no user should be “provisioned” access without (first) being authorized. At first glance this seems to raise the compliance burden without
providing any real security value.
It’s not clear to us how these changes are looking to facilitate the storage of BCSI by third party providers or even how the audit requirements would be
met in the use case of utilizing cloud based services for the processing or storage of BCSI.
Another concern that we have is how this would be applied to physical controls on physical (non-electronic) documents.
We request clarification as to how third party access would be managed.
In lieu of additional work to define “provision,” we request the SDT consider eliminating requirement R6 and focus its efforts on modifying the existing
language in requirement 4.1 using the examples from page 4 of the SAR as a starting point and making as few changes as possible to achieve the
objectives. This would simplify the solution and streamline entity costs associated with transition. For example:
R4.1 Process to authorize the following based on need, as determined by the Responsible Entity, except for CIP Exceptional Circumstances:
4.1.1. Electronic access;
4.1.2. Unescorted physical access into a Physical Security Perimeter;
4.1.3. Physical access to physical BES Cyber System Information storage locations;
4.1.4. Physical access to unencrypted electronic BES Cyber System Information storage locations;
4.1.5. Electronic access to unencrypted electronic BES Cyber System Information storage locations;
4.1.6. Electronic access to BES Cyber System Information encryption keys for encrypted BES Cyber System Information
[1] For purposes of these comments, the IRC SRC includes the following entities: CAISO, ERCOT, IESO, ISO-NE, MISO, NYISO, PJM and SPP.
Likes
0
Dislikes
0
Response
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name NPCC Regional Standards Committee
Answer
Document Name
No
Comment
We do not understand all of the implications of the new term “provisioning.” Until we better understand these implications and expectations, we are
concerned.
Not sure how these changes address our concerns with the third party access
Not sure how the addition of another list helps - - - appears to be more work. Especially for physical security
Request clarification whether the third party access should be managed on an individual basis or on the team
The intent of this standard development project was to enable entities to utilize third party service providers for storage and analysis of BCSI by defining
the security control requirements should entities choose to utilize third party services. Utilizing third party providers may result in increased reliability,
increased choice, greater flexibility, higher availability, and reduced-cost for entities. Current CIP standards essentially do not address this scenario.
The SDT introduced a requirement to develop and implement an access management program for BCSI brought forward as a new requirement (a new
R6 and previous R4.1.3, R4.4 and R5.3 are moved to the new R6) in the proposed CIP-004-7. Controls introduced as part of this program are similar to
that of access management for electronic and unescorted physical access to BES Cyber Systems.
Likes
0
Dislikes
0
Response
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
No
Document Name
Comment
Management of provisioned access to BCSI, when utilizing third-party solutions, needs to be clarified. Requirement R6, part 6.1 states that entities are
required to “authorize provisioning of access to BCSI based on need.” This could be read to mean, among other things, that entities are required to
authorize someone to provision access to BCSI, provision access to all BCSI (i.e. requiring a provisioning authorization for each piece of BCSI), or a
variety of other interpretations. To resolve this issue, EEI suggests aligning the language of Requirement R6, part 6.1 to Requirement R4, part 4.1 by
adding the phrase “Process to”, which would place the responsibility on the entity to define its process.
Additionally, EEI suggests adding the following “Measure” to Requirement 6, Part 6.1:
•
A documented process used to define provisioned access to BCSI.
Likes
0
Dislikes
0
Response
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
No
Document Name
Comment
Provisioned access terminology should be removed. When access revocation is necessary the provisioned access, as well as the authorization for
access shall be removed.
Likes
0
Dislikes
0
Response
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name PUD No. 1 of Chelan County
Answer
No
Document Name
Comment
Please incorporate the guidance from the “Compliance Implementation Guidance Cloud Solutions and Encrypting BES Cyber System Information –
June 2020” document into the CIP-004 and CIP-011 revisions.
Likes
0
Dislikes
0
Response
Carl Pineault - Hydro-Qu?bec Production - 5
Answer
No
Document Name
Comment
We support NPCC Regional Standards Committee comments
Likes
0
Dislikes
0
Response
Monika Montez - California ISO - 2 - WECC
Answer
No
Document Name
Comment
CAISO is in support of the below IRC SRC comments:
There is a lack of clarity around the implications of the new term “provisioning.” Until the ISO/RTO Council Standards Review Committee (IRC SRC)[1]
better understands these implications and expectations, we are concerned.
It seems like the SDT has attempted to break the process of providing access to BCSI into two component parts: The authentication process, which we
are assuming is a much broader list, coupled with the technical controls that are being referred to in the standard as “provisioning.” The mandate would
be that no user should be “provisioned” access without (first) being authorized. At first glance this seems to raise the compliance burden without
providing any real security value.
It’s not clear to us how these changes are looking to facilitate the storage of BCSI by third party providers or even how the audit requirements would be
met in the use case of utilizing cloud based services for the processing or storage of BCSI.
Another concern that we have is how this would be applied to physical controls on physical (non-electronic) documents.
We request clarification as to how third party access would be managed.
In lieu of additional work to define “provision,” we request the SDT consider eliminating requirement R6 and focus its efforts on modifying the existing
language in requirement 4.1 using the examples from page 4 of the SAR as a starting point and making as few changes as possible to achieve the
objectives. This would simplify the solution and streamline entity costs associated with transition. For example:
R4.1 Process to authorize the following based on need, as determined by the Responsible Entity, except for CIP Exceptional Circumstances:
4.1.1. Electronic access;
4.1.2. Unescorted physical access into a Physical Security Perimeter;
4.1.3. Physical access to physical BES Cyber System Information storage locations;
4.1.4. Physical access to unencrypted electronic BES Cyber System Information storage locations;
4.1.5. Electronic access to unencrypted electronic BES Cyber System Information storage locations; and
4.1.6. Electronic access to BES Cyber System Information encryption keys for encrypted BES Cyber System Information.
[1] For purposes of these comments, the IRC SRC includes the following entities: CAISO, ERCOT, IESO, ISO-NE, MISO, NYISO, PJM and SPP.
Likes
0
Dislikes
Response
0
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
No
Document Name
Comment
We do not agree that the revisions in CIP-004 clarify the requirements for managing provisioned access to BCSI when utilizing third-party
solutions. There is no mention of utilization of third-party solutions such as cloud services or vendor services in the requirements and or technical
rationale in regards to question 1 above:
https://www.nerc.com/pa/Stand/Project201902BCSIAccessManagement/2019-02_CIP-004-7_Technical_Rationale.pdf
https://www.nerc.com/pa/Stand/Project201902BCSIAccessManagement/2019-02_CIP-004-7_redline_to_last_posted.pdf
Further, the requirements in CIP-011 use the term “vendor services”, which does not match the way question 1 is framed.
The new technical rationale assumes BCSI is outside of the Responsible Entity’s direct control, but with electronic mechanisms implemented to protect
BCSI via CIP-011 R1.4, BCSI would in fact be in the Responsible Entity’s direct control.
The new technical rationale goes on to explain:
“For example, there is no available or feasible mechanism to provision access in instances when an individual is merely given, views, or might see BES
Cyber System Information, such as when the individual is handed a piece of paper during a meeting or views a whiteboard in a conference room.”
Simply being able to view BCSI in a meeting, on a screen, etc., does not constitute access. To access something in which access is controlled, such as
under a CIP-011 Information Protection Program, requires credentials with provisioned privileges, such as a key, username/password, encryption key,
badge, fingerprint, etc. and provisioned permissions to gain access. The new technical rationale is confusing provisioning with credentials:
“Provisioning should be considered the specific actions taken to provide an individual the means to access BES Cyber System Information (e.g.,
physical keys or access cards, user accounts and associated rights and privileges, encryption keys).”
A process to grant access, contains the element of provisioning which is part of the considerations of need to know/access. When an access request is
processed, physical access as an example, an individual isn’t given access to every PSP unless requested. If access to all PSPs were requested, the
request would be reviewed for need, and approved or denied based on need. If approved, the individual would be provisioned with those access rights
and credentials given to access the PSPs. The process of granting of access is the full complement of, request, assessing need, approval,
provisioning, and credentials. Access revocation can be achieved by the removal of ALL provisioned access rights or disabling of credentials. Access
can be reduced or increased by provisioning of rights. In CIP-004-6’s Guidelines and Technical Basis, page 44 states:
“Revocation of electronic access should be understood to mean a process with the end result that electronic access to BES Cyber Systems is no longer
possible using credentials assigned to or known by the individual(s) whose access privileges are being revoked.”
The converse of revocation of access would be granting of access. The process of granting of access would result in providing individual(s) credentials
with provisioned access privileges to access a BES Cyber System. Therefore we do not agree with the use of “provisioned access”.
Likes
0
Dislikes
Response
0
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
No
Document Name
Comment
Southern does not agree the revisions to CIP-004 provide enough clarity. While the Technical Rationale provides additional clarity, the enforceable
requirement of “Authorize provisioning of access to BCSI based on need” is a virtually unlimited statement and is not scoped to where the BCSI is
stored. It does not exclude BCSI in use. Entities cannot prove the prevention of “unprovisioned” personnel “accessing” BCSI such as hardcopies, or in
discussions in a meeting. The Technical Rationale explicity acknowledges this dilemma, but those concepts do not make it to the enforceable
language. We can provision access to BCSI where it is stored and with the loss of that concept within the language of the requirement, clarity is also
lost.
Likes
0
Dislikes
0
Response
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
No
Document Name
Comment
ITC supports the Comment Form submitted by EEI
Likes
0
Dislikes
0
Response
Larry Heckert - Alliant Energy Corporation Services, Inc. - 4
Answer
No
Document Name
Comment
Alliant Energy agrees with EEI's comments to rephrase R6.1 to mirror 4.1, "Process to authorize access to BCSI based on need…"
Also, the written requirement should be clear about the requirements for authorizing access to BCSI stored in the cloud. Is the expectation that
encryption with key management be utilized? Is merely obtaining access lists of personnel from the vendor sufficient, when the requirement states to
authorize "based on need, as determined by the Responsible Entity"? The concern is that if NERC is looking for encryption, will they find individual
entities who do not utilize encryption for BCSI in the cloud to have insufficient security controls in place, even if they requirement is written so as not to
prevent that scenario.
Likes
0
Dislikes
0
Response
Douglas Webb - Douglas Webb On Behalf of: Allen Klassen, Westar Energy, 1, 5, 3, 6; Bryan Taggart, Westar Energy, 1, 5, 3, 6; Derek Brown,
Westar Energy, 1, 5, 3, 6; Grant Wilkerson, Westar Energy, 1, 5, 3, 6; - Douglas Webb, Group Name Westar-KCPL
Answer
No
Document Name
Comment
Westar and Kansas City Power & Co, Evergy companies, incorporate by reference Edison Electric Institute's response to Question 1.
Likes
0
Dislikes
0
Response
Patrick Wells - OGE Energy - Oklahoma Gas and Electric Co. - 1,3,5,6
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Tho Tran - Tho Tran On Behalf of: Lee Maurer, Oncor Electric Delivery, 1; - Tho Tran
Answer
Yes
Document Name
Comment
Oncor supports EEI's comment.
Likes
0
Dislikes
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Yes
Document Name
Comment
Although the revision facilitates using a third-party solution, FEU suggests the SDT consider using a third-party example in the Measures of the new R6
requirements.
Likes
0
Dislikes
0
Response
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
Yes
Document Name
Comment
MPC supports the change from “designated storage locations” to “provisioned access”. It is backwards compatible, scopes applicability, clarifies
requirements when utilizing cloud services, and better defines what access entities are expected to control.
MPC also appreciates the use of the qualifier “provisioned” in front of the broad term “access” in R6, and the time invested in the technical rationale
document and how it informs industry on what this qualifier means and does not mean. The broad term “access”, when used without context, has led to
significant misinterpretation and unintended consequences of what constitutes “access to BCSI” vs “visibility/sharing of BCSI”, which makes the term
“provisioned” an important differentiator and a good improvement.
Likes
0
Dislikes
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
Document Name
Comment
Yes
ATC appreciates the SDT’s removal of BCSI from CIP-004-6 Requirements R4 and R5, and the result to keep this apart from the realm of physical
access to where electronic BCSI may be physically stored, which has been a point of contention and confusion. Creating the new requirement R6
accomplishes this separation and clarity making it possible for the controls to not only be commensurate with risk, but also to be commensurate with the
format of the BCSI and the types of methods available to protect digital vs hardcopy.
ATC also appreciates the use of the qualifier “provisioned” in front of the broad ranging term “access” in R6, and the time invested in the TR and how it
informs industry on what this qualifier means and doesn’t mean. The broad term “access” when used without context has led to significant
misinterpretation and unintended consequences of what constitutes “access to BCSI” vs “visibility/sharing of BCSI” and making the term “provisioned”
an important differentiator, and a good improvement.
ATC further appreciates how this proposed qualifier “provisioned” scopes CIP-004 to that which the entity can control; meaning that access which we
(the entity) authorizes, we can control what access we (the entity) provisions (configures).
•
•
We cannot control another person’s cognition and retention; and should not have requirements that misconstrue “see/hear/store in brain” as
“access” as opposed to that invoking “handling protections for a business need to share on a temporary basis by a person with authorized
provisioned access”.
Additionally, this approach helps prevent overreach in CIP-004 for controls on the “unauthorized access” side; Here, risk mitigation is more
relevant. CIP-004 is about the controls to address the expected by providing the right access to the people who need it when they need it, and
not about the logging, alerting, monitoring, prevention, detection, deterrence, and response measures that belong somewhere else outside of
CIP-004 to address the unexpected. Mitigating controls like those in CIP-011 are the ones that help prevent the “unauthorized access” from
happening; which is very different than the intent of CIP-004 which is to control the authorization and provisioning aspect.
CIP-004 – control what is in our control and manage authorized provisioned access
authorized = the people we expect to have access based on need;
provisioned = the people who are actually configured for that access;
provisioned can be a subset of authorized; an entity is not in violation if the list of authorized people is greater than the list of provisioned people as
long as all who are provisioned are also authorized
CIP-011 – mitigate risk for that which we cannot completely control; an unauthorized individual gaining unauthorized access. By adding “provisioned” as
a qualifier to CIP-004 access we scope the evidence further than it is today while also starting to remove the ability for industry to get dinged under CIP004 for the unintended types of “access” that are on the wrong side of BOOM.
Likes
0
Dislikes
0
Response
Kyle Hussey - Public Utility District No. 2 of Grant County, Washington - 1,4,5,6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jonathan Robbins - Seminole Electric Cooperative, Inc. - 4
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Scott Langston - Tallahassee Electric (City of Tallahassee, FL) - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jesus Sammy Alcaraz - Imperial Irrigation District - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Laura Nelson - IDACORP - Idaho Power Company - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Todd Bennett - Associated Electric Cooperative, Inc. - 3, Group Name AECI
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Richard Jackson - U.S. Bureau of Reclamation - 1,5
Answer
Yes
Document Name
Comment
Likes
Dislikes
0
0
Response
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 3,4,5 - RF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kent Feliks - AEP - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kelsi Rigby - APS - Arizona Public Service Co. - 5
Answer
Document Name
Yes
Comment
Likes
0
Dislikes
0
Response
David Jendras - Ameren - Ameren Services - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Quintin Lee - Eversource Energy - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Masuncha Bussey - Duke Energy - 1,3,5,6 - MRO,SERC,RF, Group Name Duke Energy
Answer
Document Name
Comment
Duke Energy needs more clarification on authorized provisioning as it applies to repositories versus discrete pieces of BCSI. Duke Energy would also
like to know the difference between Authorized and Authorized provisioniong.Duke Energy needs more clarification on authorized provisioning as it
applies to repositories versus discrete pieces of BCSI. Duke Energy would also like to know the difference between Authorized and Authorized
provisioniong.
Likes
1
Dislikes
Wabash Valley Power Association, 3, Sosbe Susan
0
Response
Daniel Gacek - Exelon - 1
Answer
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Kinte Whitehead - Exelon - 3
Answer
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Cynthia Lee - Exelon - 5
Answer
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
Dislikes
0
0
Response
Becky Webb - Exelon - 6
Answer
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
Response
0
2. Do you agree the revisions to CIP-004 clarify that entities are only required to manage the provisioning of physical access to physical BCSI
and electronic access to electronic BCSI?
Douglas Webb - Douglas Webb On Behalf of: Allen Klassen, Westar Energy, 1, 5, 3, 6; Bryan Taggart, Westar Energy, 1, 5, 3, 6; Derek Brown,
Westar Energy, 1, 5, 3, 6; Grant Wilkerson, Westar Energy, 1, 5, 3, 6; - Douglas Webb, Group Name Westar-KCPL
Answer
No
Document Name
Comment
Westar and Kansas City Power & Co, Evergy companies, incorporate by reference Edison Electric Institute's response to Question 2.
Likes
0
Dislikes
0
Response
Larry Heckert - Alliant Energy Corporation Services, Inc. - 4
Answer
No
Document Name
Comment
Alliant Energy agrees with EEI's comments.
Likes
0
Dislikes
0
Response
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
No
Document Name
Comment
ITC supports the Comment Form submitted by EEI
Likes
0
Dislikes
Response
0
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
No
Document Name
Comment
We do not agree with the new language in R6’s requirements, which does not distinguish between physical and/or electronic access to BCSI and could
cause confusion. We also disagree with the use of “provisioning of.” Part of the process of granting access is provisioning access such as read-only,
read/write, etc. There is no need to change the verbiage used in CIP-004 for access, as it has been used in the standards for years and is clear. If
adding “provisioning of” to access for BCSI it should be added to electronic access and physical access. Adding this would cause further confusion and
ambiguity to the requirements.
Further, while not all measures are necessary to meet the requirement, the measures for R6.2 for entities trying to meet or exceed the requirement are
administratively burdensome and duplicative with the clause “not limited to” in the evidence examples.
Likes
0
Dislikes
0
Response
Monika Montez - California ISO - 2 - WECC
Answer
No
Document Name
Comment
CAISO is in support of the below IRC SRC comments:
There needs to be more clarification on what constitutes “provisioning.”
Today, technical access controls are used as physical security provisioning. We are concerned as to how these requirements are intended to be
applied to non-electronic BCSI.
The IRC SRC would request that the intent of “provisioning” be spelled out more explicitly in the Measures instead of the Technical Guidance - - possibly in 6.1.
In lieu of additional work to define “provision,” we request the SDT consider eliminating requirement R6 and focus its efforts on modifying the existing
language in requirement 4.1 using the examples from page 4 of the SAR as a starting point and making as few changes as possible to achieve the
objectives. This would simplify the solution and streamline entity costs associated with transition. For example:
R4.1 Process to authorize the following based on need, as determined by the Responsible Entity, except for CIP Exceptional Circumstances:
4.1.1. Electronic access;
4.1.2. Unescorted physical access into a Physical Security Perimeter;
4.1.3. Physical access to physical BES Cyber System Information storage locations;
4.1.4. Physical access to unencrypted electronic BES Cyber System Information storage locations;
4.1.5. Electronic access to unencrypted electronic BES Cyber System Information storage locations; and
4.1.6. Electronic access to BES Cyber System Information encryption keys for encrypted BES Cyber System Information.
Likes
0
Dislikes
0
Response
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name PUD No. 1 of Chelan County
Answer
No
Document Name
Comment
Please incorporate the guidance from the “Compliance Implementation Guidance Cloud Solutions and Encrypting BES Cyber System Information –
June 2020” document into the CIP-004 and CIP-011 revisions.
Likes
0
Dislikes
0
Response
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
No
Document Name
Comment
Although the technical rationale provides clarity on this issue, the language contained in CIP-004-7 does not provide similar clarity. Given compliance is
based on the plain language of the Reliability Standard, EEI suggests the following modifications to CIP-004-7to provide greater clarity:
Requirement R6
Part 6.1: Authorize provisioning of physical access and/or electronic access to BCSI as appropriate and based on need,….
Part 6.2: Verify at least once every 15 calendar months that provisioned access to physical and/or electronic BCSI as appropriate:
Part 6.3: For termination actions, remove the individual’s ability to use provisioned access to physical and/or electronic BCSI as appropriate (unless
already revoked according to Part 5.1) by the ……
Likes
0
Dislikes
0
Response
Bobbi Welch - Midcontinent ISO, Inc. - 2, Group Name ISO/RTO Council Standards Review Committee 2019-02 BCSI Access Management
Answer
No
Document Name
Comment
There needs to be more clarification on what constitutes “provisioning.”
Today, technical access controls are used as physical security provisioning. We are concerned as to how these requirements are intended to be
applied to non-electronic BCSI.
The IRC SRC would request that the intent of “provisioning” be spelled out more explicitly in the Measures instead of the Technical Guidance - - possibly in 6.1.
In lieu of additional work to define “provision,” we request the SDT consider eliminating requirement R6 and focus its efforts on modifying the existing
language in requirement 4.1 using the examples from page 4 of the SAR as a starting point and making as few changes as possible to achieve the
objectives. This would simplify the solution and streamline entity costs associated with transition. For example:
R4.1 Process to authorize the following based on need, as determined by the Responsible Entity, except for CIP Exceptional Circumstances:
4.1.1. Electronic access;
4.1.2. Unescorted physical access into a Physical Security Perimeter;
4.1.3. Physical access to physical BES Cyber System Information storage locations;
4.1.4. Physical access to unencrypted electronic BES Cyber System Information storage locations;
4.1.5. Electronic access to unencrypted electronic BES Cyber System Information storage locations;
4.1.6. Electronic access to BES Cyber System Information encryption keys for encrypted BES Cyber System Information
Likes
0
Dislikes
0
Response
Larry Snow - Cogentrix Energy Power Management, LLC - 4 - NPCC,SERC,RF
Answer
Document Name
Comment
No
Again, the term "provisioning" is troublesome and will create confusion and inconsistencies.
Likes
0
Dislikes
0
Response
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
No
Document Name
Comment
NV Energy is aware that clarity on this topic ("...manage the provisioning of physical access to physical BCSI and electronic access to electronic
BCSI") is provided within the supplemental Technical Rationale document for this Project, but this clarification should be added to the language of the
requirement. Entities are audited to the plain language of the Standard, and not the Technical Rationale for the justification of a Requirement, so the
CIP-004-7 should explicitly state that provisioning of access is for physical access to physical BCSI and electronic access to electronic BCSI. This
will remove any ambiguity. Example would be to include the term, "physical access and/or electronic access to...", preceding BCSI in Part 6.1, 6.2, and
6.3
Likes
0
Dislikes
0
Response
Dennis Sismaet - Northern California Power Agency - 6
Answer
No
Document Name
Comment
See SMUDs comments.
Likes
0
Dislikes
0
Response
Wayne Guttormson - SaskPower - 1
Answer
Document Name
No
Comment
Support the MRO-NSRF comments.
Likes
0
Dislikes
0
Response
Bridget Silvia - Sempra - San Diego Gas and Electric - 3
Answer
No
Document Name
Comment
SDG&E supports EEI’s comments submitted on our behalf.
Likes
0
Dislikes
0
Response
Andrea Barclay - Georgia System Operations Corporation - 4
Answer
No
Document Name
Comment
Comments: No. GSOC does not agree that the revisions to CIP-004 clarifies that entities are only required to manage the provisioning of physical
access to physical BCSI and electronic access to electronic BCSI. If this is intended to be connoted by the introduction of the term “provisioned,” GSOC
would respectfully suggest that the insertion of that term is not enough to communicate the above concept and that the SDT consider additional
revisions to clarify their intent. Further, GSOC is concerned that, the guidance in the Technical Rationale notwithstanding, the term “provisioned” is
undefined. Accordingly, both the term and its associated activities could be both implemented and interpreted differently by various Responsible and
Regional Entities.
Finally, GSOC is concerned that the concept indicated above and the guidance provided in the Technical Rationale could leave a potential security gap
around the management of BCSI. For example, what obligation do Responsible Entities have related to BCSI that is typically stored and managed
electronically, but may be printed out or otherwise displayed? Conversely, where BCSI is typically stored and managed physically, but is converted to
an electronic format to facilitate vendor or other review, what would a Responsible Entity’s obligation be to authorize access thereto? GSOC
appreciates that the SDT is trying to create flexibility around access management, but is concerned that the resulting ambiguity could create issues from
both a security and compliance perspective.
Likes
Dislikes
0
0
Response
Jack Cashin - American Public Power Association - 4
Answer
No
Document Name
Comment
Public power does not agee that the CIP-004 revisions specifically separate the compliance between providing physical access to BES cyber system
information and electronic access to BES cyber system information. The requirement language does not distinctly separate the treatment of physical
versus electronic BES cyber system information. APPA recommends that language be added making this distinction between physical and electronic
access clear.
APPA supports the suggested way the language could be revised provided by Tacoma Power in their 2019-02 comments:
"Authorize provisioning of physical access to physical BCSI and electronic access to electronic BCSI, based on need, as determined by the Responsible
Entity, except for CIP Exceptional Circumstances."
Likes
1
Dislikes
Platte River Power Authority, 5, Archie Tyson
0
Response
Jennifer Bray - Arizona Electric Power Cooperative, Inc. - 1
Answer
No
Document Name
Comment
We do not agree with the new language in R6’s requirements, which does not distinguish between physical and/or electronic access to BCSI and could
cause confusion. We also disagree with the use of “provisioning of.” Part of the process of granting access is provisioning access such as read-only,
read/write, etc. There is no need to change the verbiage used in CIP-004 for access, as it has been used in the standards for years and is clear. If
adding “provisioning of” to access for BCSI it should be added to electronic access and physical access. Adding this would cause further confusion and
ambiguity to the requirements.
Further, while not all measures are necessary to meet the requirement, the measures for R6.2 for entities trying to meet or exceed the requirement are
administratively burdensome and duplicative with the clause “not limited to” in the evidence examples.
Likes
0
Dislikes
Response
0
Leonard Kula - Independent Electricity System Operator - 2
Answer
No
Document Name
Comment
We support NPCC comments:
Need to nail down “provisioning” in order to answer Yes or No
Today’s technical access is the physical security provisioning.
Prefer the intent of “provisioning” to be in the Measures instead of the Technical Guidance - - - possibly in Part 6.1
Removing the notion of access to designated storage locations, whether physical or electronic reduces any ambiguity it may have had with respect to
the management of physical access where the BCSI resides on a electronic form.
Emphasis could be placed on the concept introduced in the ERO Enterprise CMEP Practice Guide published on April 26, 2019 where access to the
BCSI is defined by the individual ability to obtain and use the BCSI.
Depending on the security measures in place (e.g. encryption with key management), it makes it explicit that an individual with physical access to a data
center containing BCSI, but without the ability to use the BCSI (due to encryption) would not be within the scope of the requirement.
For exemple:
6.1 Process to authorize based on need, as determined by the Responsible Entity, except for CIP Exceptional Circumstances:
Ability to obtain and use BCSI, wheter physical or electronic.
6.2 Verify at least once every 15 calendar months that all individual’s with ability to obtain and use BCSI:
6.2.1. Is authorized; and
6.2.2. Is appropriate based on need, as determined by the Responsible Entity
6.3 For termination actions, remove the individual’s ability to obtain and use BCSI (unless already revoked according to Part 5.1) by the end of the next
calendar day following the effective date of the termination action.
Likes
0
Dislikes
0
Response
Sing Tay - OGE Energy - Oklahoma Gas and Electric Co. - 6, Group Name OKGE
Answer
Document Name
Comment
No
Oklahoma Gas & Electric supports the comments submitted by EEI.
Likes
0
Dislikes
0
Response
Roger Fradenburgh - Roger Fradenburgh On Behalf of: Nicholas Lauriat, Network and Security Technologies, 1; - Roger Fradenburgh
Answer
No
Document Name
Comment
N&ST believes the proposed revisions neither adequately define nor clearly convey what it means to “provision access” to BCSI. If someone is handed
a piece of paper, on which is printed information classified as BCSI, has that individual been “provisioned” with “physical access to physical BCSI”?
Similarly, has an individual been “provisioned” for “electronic access to electronic BCSI“ if an electronic copy of that same document is sent to him or
her via email? N&ST is concerned, based on 10 years of experience with compliance monitoring and enforcement programs, that if CIP-004 doesn’t
clearly define what “provisioning” means, audit teams will develop their own definitions (use of plural is intentional). N&ST recommends maintaining
CIP-004’s well-understood requirement to manage access to “designated storage locations,” which may be electronic (e.g., a file server) or physical
(e.g., a lockable file cabinet).
Likes
0
Dislikes
0
Response
Sean Bodkin - Dominion - Dominion Resources, Inc. - 6, Group Name Dominion
Answer
No
Document Name
Comment
The plain language of the Standard does not align with the language in the technical rationale for Requirement 6. DOminion Energy recommends the
Requirement language be aligned with thetechnical rationale as follows:
Requirement R6
Part 6.1: Authorize provisioning of physical access and/or electronic access to BCSI as appropriate and based on need,….
Part 6.2: Verify at least once every 15 calendar months that provisioned access to
physical and/or electronic BCSI as appropriate:
Part 6.3: For termination actions, remove the individual’s ability to use provisioned
access to physical and/or electronic BCSI as appropriate (unless already revoked according to Part 5.1) by the ……
Likes
0
Dislikes
0
Response
Michael Johnson - Michael Johnson On Behalf of: Ed Hanson, Pacific Gas and Electric Company, 1, 3, 5; Marco Rios, Pacific Gas and Electric
Company, 1, 3, 5; Sandra Ellis, Pacific Gas and Electric Company, 1, 3, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
No
Document Name
Comment
While this is implied in the language of the Requirement R6 “Parts”, the lack of such words as physical or electronic does not make it clear the
Requirements are for both. PG&E believes this lack of explicit reference to physical or electronic is problematic and should be corrected by clearly
indicating the provisioning of access should be for physical and electronic BCSI as PG&E indicated in the answer to Question 1.
Likes
0
Dislikes
0
Response
Marty Hostler - Northern California Power Agency - 5, Group Name NCPA
Answer
No
Document Name
Comment
See SMUDs comments.
Likes
0
Dislikes
0
Response
Eli Rivera - CenterPoint Energy Houston Electric, LLC - NA - Not Applicable - Texas RE
Answer
Document Name
Comment
No
The CIP-004 Requirement R6 requirement revisions do not provide the clarity that entities are only required to manage the provisioning of physical
access to physical BCSI and electronic access to electronic BCSI. The following suggested modification would make it clear;
·
Part 6.1: Authorize provisioning of physical access to physical BCSI and/or electronic access to electronic BCSI based on need, …
·
Part 6.2: Verify at least once every 15 calendar months that provisioned access to physical and/or electronic BCSI: …
·
Part 6.3: For termination actions, remove the individual’s ability to use provisioned access to physical and/or electronic BCSI (unless already
revoked according to Part 5.1) by the …
Likes
0
Dislikes
0
Response
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
No
Document Name
Comment
Comments: No, this is not clear with the limited wording “provisioning of access.” While there is additional information in the technical rationale, the
requirement text itself does not clarify this point.
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
No
Document Name
Comment
No, this is not clear with the limited wording “provisioning of access.” While there is additional information in the technical rationale, the requirement text
itself does not clarify this point.
Likes
0
Dislikes
Response
0
Adrian Andreoiu - BC Hydro and Power Authority - 1, Group Name BC Hydro
Answer
No
Document Name
Comment
1. The CIP-004-7 Technical Rationale document do explain this concept however this is not clear from the standard language itself. BC Hydro
recommends that the clarity provided per the Technical Rationale be incorporated into the actual standard language or be formally adopted as
NERC endorsed implementation guidance to avoid misinterpretations as the enforcement agencies typically audit to the language of the
reliability standards and not to these additional documents.
2. Within the CIP-004-7 Technical Rationale document, the SDT’s intent around provisioning of electronic access to electronic BCSI is not
clear. There is specific mention of the following:
“For BES Cyber System Information in electronic format, electronic access is provisioned to an electronic system’s front-end interface regardless of the
geographical or physical location of the server or storage device or to individual encrypted files. Provisioning physical access to a physical location or
storage device that contains electronic BES Cyber System Information is not considered provisioning access to electronic BES Cyber System
Information.” Further explanation is required as to what is considered the front-end interface. For example consider a server hosting a SharePoint
platform which in turn contains BCSI. What is/are considered the front-end interface(s) in this case? The server OS? The Sharepoint platform
itself? This should be clarified within the language of the standard or incorporated into a NERC endorsed implementation guidance document instead of
limited to a Technical Rationale document to avoid misinterpretations. Enforcement agencies typically audit to the language of the reliability standards
and not to Technical Rationale documents.
Likes
0
Dislikes
0
Response
Andrea Jessup - Bonneville Power Administration - 1,3,5,6 - WECC
Answer
No
Document Name
Comment
See BPA’s comments to Question 1, above.
Likes
0
Dislikes
0
Response
Mark Ciufo - Mark Ciufo On Behalf of: Payam Farahbakhsh, Hydro One Networks, Inc., 1, 3; - Mark Ciufo
Answer
Document Name
No
Comment
If the intent was to make clarification about explicitly mentioning physical and electronic access, the SDT will need to make further revisions to clarify
that.
CIP-004-6 is currently only require managing physical access to BCSI. The need to manage electronic access is not explicitly stated but falls under the
requirement to protect BCSI under CIP-011-2 Requirement R1 and as part of entities’ Information Protection program.
Likes
0
Dislikes
0
Response
Tim Womack - Puget Sound Energy, Inc. - 3
Answer
No
Document Name
Comment
Puget Sound Energy supports the comments of EEI.
Likes
0
Dislikes
0
Response
Bruce Reimer - Manitoba Hydro - 1
Answer
No
Document Name
Comment
Managing the provisioning of physical access to physical BCSI is misleading. For
instance, if all unencrypted BCSI are stored on a sever, does the server need to have authorized
physical access? Obviously, the answer is Yes. However, if using the provisioned access language,
the BCSI server physical access control would be ignored. The provisioned access to BCSI is not
clear. When the BCSI is taken outside BCSI Repository, it is not practical for CIP-004 to manage the
access to each piece of BCSI outside the BCSI repository. If a BCSI is under the personal control of
the user who has authorized access to BCSI, it should be treated as BCSI access controlled and
should be addressed in CIP-011requirement for protecting and handling BCSI rather than in CIP004. Also “authorized provisioned access to BCSI” has a wrong logical order since provisioning
should happen after the authorization, but the wording can be interpreted to have authorization
after provisioning.
Likes
0
Dislikes
0
Response
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
No
Document Name
Comment
The proposed language is too ambigious and obligates entities to protect BCSI in any form, even though beyond its control. Should BCSI be shared
with NERC/FERC, the way CIP-004 reads in present state could be understood so as to require registered entities to extend their access management
to be inclusive of a copy of that information held by NERC/FERC. And subsequent requirements in CIP-011 would require reviews of access rights
associated with that copy.
The language should be re-scoped to focus on management of access to designated repositories, instead of the information itself.
Likes
0
Dislikes
0
Response
Joe Tarantino - Joe Tarantino On Behalf of: Arthur Starkovich, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Beth Tincher, Sacramento
Municipal Utility District, 4, 1, 6, 3, 5; Jamie Cutlip, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Kevin Smith, Balancing Authority of
Northern California, 1; Nicole Goi, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Nicole Looney, Sacramento Municipal Utility District, 4, 1,
6, 3, 5; - Joe Tarantino
Answer
No
Document Name
Comment
We do not see how the changes make any differentiation from Provisioning of physical access to BCSI and electronic access to BCSI. Was the thought
that changing the Applicability wording from “BCSI associated with” to “BCSI pertaining to”, would provide the clarity that is being referenced? It is not
clear where any clarity is provided.
Likes
1
Platte River Power Authority, 5, Archie Tyson
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
No
Document Name
Comment
The enforceable language in this version does not differentiate between physical and electronic access. If electronic BCSI is not stored or transmitted in
a protected form, then physical access to electronic BCSI could permit the bypass of any electronic access controls.
Likes
0
Dislikes
0
Response
Russel Mountjoy - Midwest Reliability Organization - 10
Answer
No
Document Name
Comment
Part 6.3: We understand provisioned access to be a subset of access, and that access grants can be provisioned, inadvertent, or obtained in other
ways. We think the intent of this Part is to remove all of the terminated individual’s accesses to BCSI, not just provisioned access. The ‘use’
consideration is just perhaps misplaced within the sentence? Consider replacing "remove the individual's ability to use provisioned access to BCSI"
with "remove the individual's ability to access and use BCSI".
Likes
0
Dislikes
0
Response
Patrick Wells - OGE Energy - Oklahoma Gas and Electric Co. - 1,3,5,6
Answer
No
Document Name
Comment
Likes
Dislikes
0
0
Response
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
Yes
Document Name
Comment
Southern agrees this is an important distinction to make and the revision to CIP-004 clarifies this electronic/physical distinction with the deletion of
R4.1.3. The revision does pose an issue as entities cannot prove the prevention of personnel seeing hardcopies (physical/printed) of network diagrams
or other forms of BCSI. However, the Technical Rationale does explicity acknowledge that dilemma. For example, there is no available or feasible
mechanism to provision access in instances when an individual is merely given, views, or might see BCSI, such as when the individual is handed a
piece of paper during a meeting or views a whiteboard in a conference room. There will likely be no specific provisioning of access to BES Cyber
System Information on work stations, laptops, flash drives, portable equipment, offices, vehicles, etc., especially when BCSI is only temporarily or
incidentally located or stored there. That now deleted language was unclear at best if this distinction was even allowed. Removal of R4.1.3 has
clarified that it is now possible to make this distinction. However, making this distinction is implied but never stated in R6.
Likes
0
Dislikes
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
Yes
Document Name
Comment
ATC appreciates the SDT’s removal of BCSI from CIP-004-6 Requirements R4 and R5, and the result to keep this apart from the realm of physical
access to where electronic BCSI may be physically stored, which has been a point of contention and confusion. Creating the new requirement R6
accomplishes this separation and clarity making it possible for the controls to not only be commensurate with risk, but also to be commensurate with the
format of the BCSI and the types of methods available to protect digital vs hardcopy. This is very important in order to enable use of cloud-based
solutions for CIP BCSI.
Likes
0
Dislikes
0
Response
Kent Feliks - AEP - 3
Answer
Document Name
Yes
Comment
BCSI requirements seem cleaner to be consolidated into R6, however the revisions have minimal impact to the provisioning aspects of the
requirements. It has always been AEP’s understanding that AEP is responsible the provisioning of physical access to physical BCSI and electronic
access to electronic BCSI.
Likes
0
Dislikes
0
Response
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
Yes
Document Name
Comment
The concept of provisioned access to BCSI clarifies this, since provisioned access to a room where a physical server is housed does not in itself give
access to the electronic BCSI on that server.
Likes
0
Dislikes
0
Response
Sandra Shaffer - Berkshire Hathaway - PacifiCorp - 6
Answer
Yes
Document Name
Comment
: PAC agrees with the revision. New language verifies provisioned access to BCSI is authorized and the provisioned access is appropriate based on
need.
Likes
0
Dislikes
0
Response
Joshua Andersen - Salt River Project - 1,3,5,6 - WECC
Answer
Yes
Document Name
Comment
SRP agrees, but does not fully agree with the current wording.
Likes
0
Dislikes
0
Response
Tho Tran - Tho Tran On Behalf of: Lee Maurer, Oncor Electric Delivery, 1; - Tho Tran
Answer
Yes
Document Name
Comment
Oncor supports EEI's comment.
Likes
0
Dislikes
0
Response
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Quintin Lee - Eversource Energy - 1
Answer
Document Name
Comment
Yes
Likes
0
Dislikes
0
Response
David Jendras - Ameren - Ameren Services - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kelsi Rigby - APS - Arizona Public Service Co. - 5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 3,4,5 - RF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Richard Jackson - U.S. Bureau of Reclamation - 1,5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Todd Bennett - Associated Electric Cooperative, Inc. - 3, Group Name AECI
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Laura Nelson - IDACORP - Idaho Power Company - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jesus Sammy Alcaraz - Imperial Irrigation District - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Scott Langston - Tallahassee Electric (City of Tallahassee, FL) - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jonathan Robbins - Seminole Electric Cooperative, Inc. - 4
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kjersti Drott - Tri-State G and T Association, Inc. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kyle Hussey - Public Utility District No. 2 of Grant County, Washington - 1,4,5,6
Answer
Yes
Document Name
Comment
Likes
Dislikes
0
0
Response
Carl Pineault - Hydro-Qu?bec Production - 5
Answer
Document Name
Comment
We support NPCC Regional Standards Committee comments
Likes
0
Dislikes
0
Response
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name NPCC Regional Standards Committee
Answer
Document Name
Comment
Need to nail down “provisioning” in order to answer Yes or No
Today’s technical access is the physical security provisioning.
Prefer the intent of “provisioning” to be in the Measures instead of the Technical Guidance - - - possibly in Part 6.1
Removing the notion of access to designated storage locations, whether physical or electronic reduces any ambiguity it may have had with respect to
the management of physical access where the BCSI resides on a electronic form.
Emphasis could be placed on the concept introduced in the ERO Enterprise CMEP Practice Guide published on April 26, 2019 where access to the
BCSI is defined by the individual ability to obtain and use the BCSI.
Depending on the security measures in place (e.g. encryption with key management), it makes it explicit that an individual with physical access to a data
center containing BCSI, but without the ability to use the BCSI (due to encryption) would not be within the scope of the requirement.
For exemple:
6.1 Process to authorize based on need, as determined by the Responsible Entity, except for CIP Exceptional Circumstances:
Ability to obtain and use BCSI, wheter physical or electronic.
6.2 Verify at least once every 15 calendar months that all individual’s with ability to obtain and use BCSI:
6.2.1. Is authorized; and
6.2.2. Is appropriate based on need, as determined by the Responsible Entity.
6.3 For termination actions, remove the individual’s ability to obtain and use BCSI (unless already revoked according to Part 5.1) by the end of the next
calendar day following the effective date of the termination action.
If the intent was to make clarification about explicitly mentioning physical and electronic access, the SDT will need to make further revisions to clarify
that.
Likes
0
Dislikes
0
Response
Becky Webb - Exelon - 6
Answer
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Cynthia Lee - Exelon - 5
Answer
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Kinte Whitehead - Exelon - 3
Answer
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Daniel Gacek - Exelon - 1
Answer
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
David Rivera - New York Power Authority - 3
Answer
Document Name
Comment
Need to nail down “provisioning” in order to answer Yes or No
Today’s technical access is the physical security provisioning.
Prefer the intent of “provisioning” to be in the Measures instead of the Technical Guidance - - - possibly in Part 6.1
Likes
0
Dislikes
0
Response
Masuncha Bussey - Duke Energy - 1,3,5,6 - MRO,SERC,RF, Group Name Duke Energy
Answer
Document Name
Comment
Duke Energy needs more clarification on provisioning and managing as it applies to repositories versus discrete pieces of BCSI and electronic access
to electronic BCSI.
Likes
0
Dislikes
Response
0
3. Do you agree the revisions to CIP-011 clarify the protections expected when utilizing third-party solutions (e.g., cloud services)?
Kjersti Drott - Tri-State G and T Association, Inc. - 1
Answer
No
Document Name
Comment
Tri-State does not agree with the revisions.
We think 1.2 could cause audit approach confusion. In the measures would the expectation be we have identified data in a true data lifecycle
methodology or just during use, transit, rest? We recommend the drafting team provide examples of what could be part of the data's lifecycle so it is
clear what is intended (even though all states may not be applicable to every lifecycle).
As worded, a violation of R1.4 could also be considered a violation of R1.2. (double jeopardy) Instead, recommend combining R1.2 and R1.4 into one
requirement. Additionally, recommend remove "for the separation of duties" from the measure as that could be interpreted in different ways and is not
needed anyway to relay the intent.
Likes
1
Dislikes
Platte River Power Authority, 5, Archie Tyson
0
Response
Jonathan Robbins - Seminole Electric Cooperative, Inc. - 4
Answer
No
Document Name
Comment
While the revisions add clarity for protections expected when utilizing third-party solutions such as cloud services for storage purposes, the "vendor
services to utilize and analyze BCSI" lanuage presents a number of issues. R1.4 risk identification and assessment methods, as written, implies that
this must be completed for all vendors that may have access to electronic of physical documentation containing BCSI. Vendors may only utilize
information while onsite or may be authorized for access to BCSI for an engagement, but may never actually utilize or store this information. In these
situations, the requirements to have to identiy and assess risks (R1.4) and then enforce at least one or more electonic technical controls (R1.5) are not
value-added activities to the organization. To avoid scope creep, NERC may consider defining Vendor Services to define exactly what services are in
scope.
Likes
0
Dislikes
0
Response
Russel Mountjoy - Midwest Reliability Organization - 10
Answer
No
Document Name
Comment
Regarding usage of BCSI: We are unsure if the CIP-011-3 requirements that use the acronym “BCSI” are enforceable when the acronym is not included
in the “BES Cyber System Information” NERC Glossary term. The acronym first appears in the purpose statement for CIP-011-3, but should the
enforcement of the requirement depend on the purpose statement? Consider updating the "BES Cyber System Information" glossary term to include
the new BCSI acronym as part of the CIP-011-3 draft. The acronym field for that glossary term is currently blank.
Part 1.3: The requirement in Part 1.3.1 doesn’t explicitly include data sovereignty, although the measures suggests that data sovereignty should be
included. The omission of data sovereignty risk consideration in the requirement could represent an unaddressed risk for BCSI in a cloud service
provider environment. Consider clarifying intent by aligning the language of the requirement with the language of the measure.
Part 1.3: We are unsure if risk management methods were intended for all vendor services related to BCSI, or just for the storage, utilize, or analyze
cases. Consider changing “storage, utilize, or analyze, to “… including but not limited to storage, utilize, or analyze BCSI…” to ensure that all vendor
services related to BCSI are covered.
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
No
Document Name
Comment
CIP-011-3 R1 Part 1.3 uses these terms without an accompanying definition: Data governance, rights management, identity management, access
management, security management, application security, infrastructure security, and network security. Some examples are given in the Measures, but
clear definitions, or referenced to documents that provide definitions, should be included.
Part 1.3 also groups different concepts into a single sub-part. Consider separating single sub-parts into definied and catergorized separate sub-parts.
For example, 1.3.4 Application security; 1.3.5 Infrastructure security; and 1.3.6 Network security.
Likes
0
Dislikes
0
Response
Joe Tarantino - Joe Tarantino On Behalf of: Arthur Starkovich, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Beth Tincher, Sacramento
Municipal Utility District, 4, 1, 6, 3, 5; Jamie Cutlip, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Kevin Smith, Balancing Authority of
Northern California, 1; Nicole Goi, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Nicole Looney, Sacramento Municipal Utility District, 4, 1,
6, 3, 5; - Joe Tarantino
Answer
No
Document Name
Comment
Having “Data Governance” listed under 1.3 risk management methods seems out of place and maybe duplicative. The measurement for 1.3.1 also
seems to imply requirements that are not in the requirement column. The requirements seem broad and the measures are less clear and seem to add
to the requirements. How does requirement 1.3.3 “Security management” differ from “Application, infrastructure and network security.” Should some of
these requirements fall into CIP-013 when contracts are established for services?
Consider remove Data Governance from the requirement.
Likes
1
Dislikes
Platte River Power Authority, 5, Archie Tyson
0
Response
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
No
Document Name
Comment
TVA does not believe that the CIP-011 Requirements R1.3 and R1.4 are needed. CIP-011 R1.3 is within scope of CIP-013 service procurement and
should be addressed as part of that assessment. R1.4 protections mechanisms are covered in CIP-011 R1.2 and do not need to be duplicated in
R1.4. R1.2 does not put limits on the scope of the mechanisms, and applies to the BCSI in all cases durings its lifecycle. We recommend adding the
clause in the measures first bullet point, Evidence of methods used to protect and securely handle BCSI during its lifecycle, by any authorized party or
individual, including:. We believe inclusion of this statement will clarify that the scope of the protection methods established are inclusive of the
environments, transmission, and any interactions with the information.
Under Requirement 1.1 the changes to the standard moves the protection to the BCSI itself rather than the repositories that housing it. The last
measure, which identifies storage locations, should be removed or modified to allow the entity to demonstrate the data flow of BCSI from the source
BCS after identification. The language as proposed would make every BCA a BCSI storage location.
In requirements R2.1 and R2.2, the scope should be limited to Cyber Assets that contain accessible BCSI.
Likes
0
Dislikes
0
Response
Joshua Andersen - Salt River Project - 1,3,5,6 - WECC
Answer
Document Name
Comment
No
SRP agrees with the overall direction and what this version is trying to accomplish. We struggle with the four sub requirements in R1.3. We believe
there is overlap and potential confusion in terms. For example, isn’t “identity and access management” and “network security” a part of “security
management”? The term “security management” is too broad. How is “rights management” different than “identity and access management”?
Also, when putting the R1.3 Requirement into individual sentences, they read:
•
•
•
•
Implement risk management method(s) for Data governance and rights management
Implement risk management method(s) for Identity and access management
Implement risk management method(s) for Security management
Implement risk management method(s) for Application, infrastructure and network security.
SRP suggests removing each of them from unique subrequirements.
Also, our concern is the wording provides too much flexibility in determining methods and defining the four topics. This will result in a wide range of
methods implemented. We fear as written this requirement will create unintended consequences and become as difficult to interpret and implement as
CIP-013 has been for the industry.
The technical rationale on the bottom of page 2 states “Implemented identification and assessment methods are needed to understand the risks to BCSI
when choosing to use vendor services.” This statement is more clear on what to do for R1.3 than what is written in the proposed
requirement. Consider verbiage like this without subrequirements.
R1.3 and R1.4 read different than R1.1 and R1.2. R1.1 and R1.2 start with “Method” and R1.3 and R1.4 start with an applicability statement. The
applicability statement should be in the applicability column.
Consider updating the Applicability in R1.3 and R1.4 to:
“BCSI as identified in Part 1.1 when the Responsible Entity engages vendor services to store, utilize, or analyze BCSI”
Then the R1.3 requirement can read:
“Implement one or more processes for identifying the risk of using vendor services to store, utilize, or analyze BCSI”
Then the R1.4 requirement can read:
“Implement one or more documented electronic technical mechanisms to protect BCSI when using vendor services to store, utilize, or
analyze BCSI”
Overall, we need better clarification on how this is the same or different than CIP-013.
Likes
1
Dislikes
Platte River Power Authority, 5, Archie Tyson
0
Response
Bruce Reimer - Manitoba Hydro - 1
Answer
Document Name
No
Comment
Part 1.3 should belong to CIP-013 since it is a vendor risk assessment item. Using requirement CIP-004 Part 6.1.4 we suggest in question 1, CIP-011
Part 1.4 should be moved to the Measures of CIP-004 Part 6.1.4 on how to control the access to the BCSI repository. CIP-011 requirements like other
CIP-004 requirements should apply to the responsible entities as well as vendors by default and don’t need to define vendor only requirements in CIP11. The current version of CIP-011, vendor requirements are described in Guidelines and Technical Basis.
Likes
0
Dislikes
0
Response
Tim Womack - Puget Sound Energy, Inc. - 3
Answer
No
Document Name
Comment
Puget Sound Energy supports the comments of EEI.
Likes
0
Dislikes
0
Response
David Rivera - New York Power Authority - 3
Answer
No
Document Name
Comment
Recommend a change to Part 1.4’s requirement to explicitly say “electronically.”
Change from
When the Responsible Entity engages vendor services to store, utilize, or analyze BCSI, implement one or more documented electronic technical
mechanisms to protect BCSI.
To
When the Responsible Entity engages vendor services to electronically store, utilize, or analyze BCSI, implement one or more documented electronic
technical mechanisms to protect BCSI.
Alternatively the Applicability column could specify “electronic.”
Likes
0
Dislikes
0
Response
Mark Ciufo - Mark Ciufo On Behalf of: Payam Farahbakhsh, Hydro One Networks, Inc., 1, 3; - Mark Ciufo
Answer
No
Document Name
Comment
The proposed R1.3 does not state any security controls that need to be implemented. The proposed R1.3 essentially requires entities to have a
framework to manage risks associated with utilizing third party for storing, utilizing or analyzing. The proposed risk management framework needs to be
implemented for 1.3.1 to 1.3.4.
We also believe that the term “utilize” in the proposed R1.3 is too broad. Requirements should focus on storage and analysis only.
While we welcome this approach since a one solution fits all may not exist; however, practicality of implementing such a framework is not
clear. Perhaps, similar language to CIP-013 may be needed (risk-based approach) and use of terms such as the “the risk management methods need
to address”.
The proposed R1.4 no longer suggests that protection at BCSI level (encryption) is a must. Instead, CIP-011 R1 will require a mechanism to protect
BCSI. We still believe that protection must be applied at the BCSI level when stored/analyzed on a third party cloud.
Likes
0
Dislikes
0
Response
Sandra Shaffer - Berkshire Hathaway - PacifiCorp - 6
Answer
No
Document Name
Comment
The SAR is focused on cloud service providers, but the requirement potentially pulls in many other vendor services, such as engineering consultants
who may occasionally be provided temporary access to a document that is considered BCSI. Clarification in the standard language or applicability
should address the intended scope.
CIP-013 doesn’t require audits of vendor performance and adherence, where CIP-011 without similar exception would require these types of
verifications for compliance. This is beyond the scope of the NERC CIP Standards to audit external third parties that are not Registered Entities
compliance to the requirements.
Likes
0
Dislikes
0
Response
Adrian Andreoiu - BC Hydro and Power Authority - 1, Group Name BC Hydro
Answer
No
Document Name
Comment
While the sub-parts of CIP-011-2 R1.3 appear to imply protections are only for electronic BCSI stored by vendor services. The language of the standard
does not explicitly make this distinction. The language should be clarified accordingly to avoid confusion pertaining to physical BCSI for which vendor
services may be engaged to store, utilize, or analyze BCSI.
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
No
Document Name
Comment
The SAR references “third party storage and analysis” but the requirement refers to “vendor services to store, utilize or analyze BCSI.” The SAR is
focused on cloud service providers, but the requirement potentially pulls in many other vendor services, such as engineering consultants who may
occasionally be provided a drawing that is considered BCSI.
Change the text to be consistent with the SAR: “third party storage and analysis.” Consider limiting the scope to “data hosting” vendor services. If it was
the standard drafting team’s intent to exclude temporary use of BCSI, it should be addressed in the technical rationale or requirement text. Also, there is
nothing in the technical rationale excluding other entities and regulators from being considered “vendors.”
CIP-013-1 R2 includes language that should be considered for CIP-011 R1.2: vendor performance and adherence to a contract are beyond the scope of
the requirement.
Remove the prescriptive sub parts on 1.3 and make the requirement simply: implement risk management methods. Allow the Registered Entities the
flexibility to determine the appropriate components of risk management.
Also, limit the requirements to match the applicability of CIP-004-6 R6. This should not be required for medium impact without ERC. To improve clarity,
repeat the applicability on each subpart, rather than referring back to an earlier subpart.
Likes
0
Dislikes
Response
0
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
No
Document Name
Comment
The SAR references “third party storage and analysis” but the requirement refers to “vendor services to store, utilize or analyze BCSI.” The SAR is
focused on cloud service providers, but the requirement potentially pulls in many other vendor services, such as engineering consultants who may
occasionally be provided a drawing that is considered BCSI.
Change the text to be consistent with the SAR: “third party storage and analysis.” Consider limiting the scope to “data hosting” vendor services. If it was
the standard drafting team’s intent to exclude temporary use of BCSI, it should be addressed in the technical rationale or requirement text. Also, there is
nothing in the technical rationale excluding other entities and regulators from being considered “vendors.”
CIP-013-1 R2 includes language that should be considered for CIP-011 R1.2: vendor performance and adherence to a contract are beyond the scope of
the requirement.
Remove the prescriptive sub parts on 1.3 and make the requirement simply: implement risk management methods. Allow the Registered Entities the
flexibility to determine the appropriate components of risk management.
Also, limit the requirements to match the applicability of CIP-004-6 R6. This should not be required for medium impact without ERC. To improve clarity,
repeat the applicability on each subpart, rather than referring back to an earlier subpart.
Likes
0
Dislikes
0
Response
Eli Rivera - CenterPoint Energy Houston Electric, LLC - NA - Not Applicable - Texas RE
Answer
No
Document Name
Comment
CEHE agrees that the CIP-011 Requirement R1, Parts 1.3 and 1.4 clarify the protections expected when using third-party cloud services. However the
requirement has much broader language that could be problematic. First, the term “Vendor services” goes beyond cloud services and could create
unintended issues for other types of vendor services. Second, use of the term “BCSI” can imply both physical and electronic BCSI, which may cause a
problem because sub-part 1.3.4 would not apply to physical BCSI. Additionally, Part 1.4 that requires an entity to “implement documented electronic
technical mechanisms” could not be applied to physical BCSI.
Likes
0
Dislikes
0
Response
Marty Hostler - Northern California Power Agency - 5, Group Name NCPA
Answer
No
Document Name
Comment
See Tristate (SAR originator) and SMUDs comments.
Likes
0
Dislikes
0
Response
Michael Johnson - Michael Johnson On Behalf of: Ed Hanson, Pacific Gas and Electric Company, 1, 3, 5; Marco Rios, Pacific Gas and Electric
Company, 1, 3, 5; Sandra Ellis, Pacific Gas and Electric Company, 1, 3, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
No
Document Name
Comment
PG&E believes the modifications to clarify that third party solutions can be used, but the Requirement language in Parts 1.3 and 1.4 are vague. PG&E
understands the vagueness is necessary to allow for the many possible methods of protecting BCSI with a third-party. PG&E believes the Measures
and Technical Rational (TR) document provide sufficient information to allow an Entity to adequately protect their BCSI, but the Measures and TR are
not the Standard which could lead to interpretation differences between an Entity and Audit Team. PG&E does not have a suggestion at this time to
improve the vagueness but is willing to work with the SDT and industry to address this concern.
Likes
0
Dislikes
0
Response
Sean Bodkin - Dominion - Dominion Resources, Inc. - 6, Group Name Dominion
Answer
Document Name
No
Comment
DOminion Energy supports the comments by EEI and agrees for the need to replace or clarify the term vendor services with a more narrowly and
clearly defined term. There should be a clear deliniation between services that are off-premise and those that are housed on infrastructure directly
controlled by the entity.
Likes
0
Dislikes
0
Response
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
No
Document Name
Comment
Regarding CIP-011-3 R1 Part 1.3, the terminology for the sub-parts do not add value to CIP-011. It is unclear what this terminology would require or
what any of these terms mean, making them subject to broad and differing interpretation. The risk, which is unauthorized access, is currently being
addressed by an entity’s approach to satisfying CIP-011 part 1.2 and CIP-004 R6. What is the justification for this language if protection and access
management is already required? The phrase “implement risk management” is unclear and open to interpretation. This proposed requirement is a
paperwork exercise that adds administrative burden without realizing security benefits. Auditability will be difficult and open to interpretation. For these
reasons, MPC proposes striking this requirement and relying on access management in CIP-004 and CIP-011 part 1.2 for protection of BCSI.
For R1, parts 1.3 and 1.4, the phrase “engages vendor services to store, utilize, or analyze BCSI” does not clarify when or where this requirement is
applicable. This could apply to an onsite vendor or contractor, when it seems this requirement is intended to address cloud service providers.
MPC requests SDT consideration of alternative phrasing for 1.3, if CIP-011 part 1.3 is not struck as requested above, and 1.4 such as: “…service
provider on service provider-owned or -managed premises or computing infrastructure…”
Likes
0
Dislikes
0
Response
Kent Feliks - AEP - 3
Answer
No
Document Name
Comment
‘Utilizing’ leaves room for guessing. Why not consistently say – “transit, storage and use” like everywhere else in the document?
AEP is also concerned with any unintended consequences from the proposed language, as it could be interepted to mean any vendor’s use of BSCI,
even if it is stored on AEP’s systems, and not BSCI that is stored, transmited, or used by a 3rd party vendors on their system(s).
Likes
0
Dislikes
0
Response
Roger Fradenburgh - Roger Fradenburgh On Behalf of: Nicholas Lauriat, Network and Security Technologies, 1; - Roger Fradenburgh
Answer
No
Document Name
Comment
N&ST believes proposed Requirement R1 Part 1.3 has two significant problems. The first is that it seems to have been developed with vendor risk
management in mind. If so, N&ST believes requirements to evaluate the risks associated with allowing any particular vendor to “store, utilize, or
analyze” BCSI should be added to CIP-013, not CIP-011. The second is that in N&ST’s opinion, the language of sub-parts 1.3.1 through 1.3.4, (e.g.,
1.3.1, “Data governance and rights management”) is vague to the point of lacking any intrinsic meaning. Furthermore, while we generally don’t comment
on proposed Measures, we are at a loss to understand what the example, “Vendor certification(s) or Registered Entity verification of vendor controls
implemented from the under‐layer to the service provider, including application, infrastructure, and network security control s as well as physical access
controls” is intended to mean.
N&ST is also concerned about proposed Requirement R1 Part 1.4. While we agree it is a good security practice to “implement one or more documented
electronic technical mechanisms to protect BCSI,” we note the proposed requirement, as written, appears to apply only to situations where “the
Responsible Entity engages vendor services to store, utilize, or analyze BCSI.”
Finally N&ST notes that the latest revisions appear to have removed the requirement to protect BCSI (against, we presume, unauthorized disclosure),
while “in transit.” N&ST assumes this was unintentional.
Likes
0
Dislikes
0
Response
Sing Tay - OGE Energy - Oklahoma Gas and Electric Co. - 6, Group Name OKGE
Answer
No
Document Name
Comment
Oklahoma Gas & Electric supports the comments submitted by EEI.
Likes
0
Dislikes
Response
0
Leonard Kula - Independent Electricity System Operator - 2
Answer
No
Document Name
Comment
We support NPCC comments:
Recommend a change to Part 1.4’s requirement to explicitly say “electronically.”
Change from
When the Responsible Entity engages vendor services to store, utilize, or analyze BCSI, implement one or more documented electronic technical
mechanisms to protect BCSI.
To
When the Responsible Entity engages vendor services to electronically store, utilize, or analyze BCSI, implement one or more documented electronic
technical mechanisms to protect BCSI.
Alternatively the Applicability column could specify “electronic.”
Likes
0
Dislikes
0
Response
Jennifer Bray - Arizona Electric Power Cooperative, Inc. - 1
Answer
No
Document Name
Comment
We agree that the revisions clarify the protections expected to be compliant, however, if it is the SDT’s intent to have a risk assessment performed for
3rd party storage systems, then those requirements should be a part of CIP-013. This is not in the scope of the SAR, but should have been
considered.
Secondly, requirements R1.3.1-1.3.4, are very dynamic for the majority of major Cloud Service Providers (CSP) and would require periodic/continuous
risk assessments due to the nature of 3rd party storage services. As a 3rd party storage service customer, you are at the mercy of the CSP’s terms and
conditions, features, security features, IAM, encryption, etc. which may change at any time causing a change in risks. A change in terms and
conditions, security features, IAM, purchasing additional security features, etc. would trigger a new risk assessment that would make compliance
onerous.
Also, the configuration (hybrid, private, public) of cloud/3rd party services, severely impacts the potential threats to the unauthorized access to BCSI
which is not considered in the requirements. For major CSPs as a 3rd party storage solution provider in a private configuration is no different than the
BCSI being stored on premise.
Lastly, the way the question is being asked using “third-party solutions” (e.g. cloud services) instead of the language used in the requirements makes it
difficult to answer without making assumptions.
Likes
0
Dislikes
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
No
Document Name
Comment
ATC appreciates the use of the word “vendor” instead of “third party” to assure clarity that this refers to an entity that is not a Registered Entity. That
having been said, the proposed words in CIP-011=3 might not go far enough on two points.
1. The words in CIP-011-3 Requirement R1 Parts 1.3 and 1.4 do not accomplish the level of specificity needed to assure the scope is appropriately
limited to cloud type, off-premises solutions/services owned and managed by an entity that is not a Registered Entity. Unfortunately, the words as
currently proposed carry the unintended consequence that a Registered Entity would have to perform a risk assessment on their own on-premises
infrastructure. Additionally, to enable use of cloud-based solutions for BCSI while maintaining an objective, risk-based, and technology/platform agnostic
requirement is equally important
2.
In the current proposed draft, the use of the defined term BCSI without a scoping adjective of “electronic” or “digital” preceding it in these
requirements continues to breed confusion that physical methods may also be needed; creating misalignment with the SAR’s intent is to enable use of
electronic controls as the methods to protect BCSI where off-premises cloud-based solutions are used. The existing CMEP Practice Guide makes a
concerted effort to separate physical controls for physical BCSI from electronic controls for electronic BSCI, bringing great clarity to the fact that
electronic controls can be as secure, if not potentially more secure for electronic format BCSI than the physical controls like a PSP. This requirement
language must achieve that same level of clarity to enable these requirements for cloud to actually be implemented without any misunderstanding that
physical controls also must apply.
For these reasons, ATC requests SDT consideration alternative phrasing like this.
CIP-011-3 Requirement R1 Parts 1.3
1.3 For storage, utilization, or analysis of electronic BSCI performed by a service provider on service provider-owned or -managed premises or
computing infrastructure, implement risk management method(s) for the following:
1.3.1 Data governance and rights management; and
1.3.2 Identity and access management; and
1.3.3 Security management; and
1.3.4 Application, infrastructure, and network security.
CIP-011-3 Requirement R1 Parts 1.4
1.4 For storage, utilization, or analysis of electronic BSCI performed by a service provider on service provider-owned or -managed premises or
computing infrastructure, implement one or more documented electronic technical mechanisms to protect BCSI.
Likes
0
Dislikes
0
Response
Andrea Barclay - Georgia System Operations Corporation - 4
Answer
No
Document Name
Comment
GSOC greatly appreciates the SDT’s consideration of its previous comments regarding the retention of all BCSI program requirements in CIP011. However, it does not support the revisions to CIP-011 to clarify the protections expected when utilizing third-party solutions (e.g., cloud services) –
as proposed – and provides the following comments for the SDT’s consideration:
1. Modification of Established Format - As stated in its previous comments, while GSOC understands what the SDT was attempting to accomplish,
it does not agree with the replacement of “Applicable Systems” with “Applicability.” “Applicability” is already utilized in each of the reliability standards to
denote whether or not a particular registered function has responsibility under the Standard. Utilization of the same term, but with a different scope of
applicability within body of CIP-011 will result in confusion and ambiguity regarding the overall applicability of this reliability standard. Further, this
change results in this Standard and CIP-004 (where this change has also been proposed) being different from the remaining CIP reliability standards
relative to the CIP reliability standards overall approach to identification of asset scope. GSOC raises, for the SDT’s consideration, that the deviation
from the established format and scoping mechanisms used throughout the CIP reliability standard will create confusion and ambiguity and that any
value achieved by this change will be far outweighed by the continued value associated with the current format and terms.
To address this concern, GSOC proposes that the lead in requirement language for requirement R6 be modified as follows:
Each Responsible Entity shall implement one or more documented information protection program(s) for BES Cyber System Information about the
“Applicable Systems” identified in CIP‐0011‐ 3 Table R1 – Information Protection Program that collectively include each of the applicable requirement
parts in CIP‐011‐ 3 Table R1 – Information Protection Program. [Violation Risk Factor: Medium] [Time Horizon: Operations Planning].
2. Potential Scope Expansion - GSOC notes that it is also concerned that the modifications to the contents of the “Applicability” column may
potentially expand and obscure the established definition of BCSI set forth in the Glossary of Terms Used in NERC Reliability Standards. First, GSOC
notes that the Applicability columns proposed between CIP-004 and CIP-011 are different. In particular, CIP-004 utilizes the terms “BCSI associated
with …” while CIP-011 utilizes the terms “BCSI pertaining to…” BCSI is defined as
Information about the BES Cyber System that could be used to gain unauthorized access or pose a security threat to the BES Cyber System. BES
Cyber System Information does not include individual pieces of information that by themselves do not pose a threat or could not be used to allow
unauthorized access to BES Cyber Systems, such as, but not limited to, device names, individual IP addresses without context, ESP names, or policy
statements. Examples of BES Cyber System Information may include, but are not limited to, security procedures or security information about BES
Cyber Systems, Physical Access Control Systems, and Electronic Access Control or Monitoring Systems that is not publicly available and could be used
to allow unauthorized access or unauthorized distribution; collections of network addresses; and network topology of the BES Cyber System.
The use of the term “pertaining to…” is similarly subjective to the term “associated with” and could, therefore, also be interpreted broadly by some
entities and/or regulators. As an example, information about an external firewall configuration that acts as a first line of defense, but is not part of an
applicable system, may contain information that “could be used to gain unauthorized access or pose a security threat to the BES Cyber System.” It is
unclear under the proposed revisions to the applicability column whether this information would be considered subject to CIP-004 – even if the asset
from which it came is not in scope for any other reliability standards. Moreover, these new terms as proposed in CIP-011 and CIP-004, although
similar, could be interpreted differently between these two related standards, between Responsible Entities, and between Responsible Entities and
Regulators. Such differing interpretations could result in both compliance and security-related concerns.
Finally, this potential scope expansion, conflict, and the associated ambiguity between the scope of CIP-004, CIP-011, the remaining reliability
standards, and the Glossary of Terms Used in NERC Reliability Standards could result in increased compliance obligations without an attendant
security or reliability benefit, confusion, and inconsistency of implementation. The proposed revision above would resolve this issue by eliminating the
differing terms, while preserving the current format of CIP-011 and its consistency with the remaining reliability standards.
3. Backwards compatibility – GSOC is concerned that the proposed revisions for requirements R1.1 and R1.2 may not be compatible with
Responsible Entities’ existing programs. More specifically, many current programs have been developed and are managed around the concept of
repositories or storage locations – not individual pieces of BCSI. The modifications of requirements R1.1and R1.2 (when coupled with the revisions to
the Applicability Column) appear to shift focus to each individual piece of information – without flexibility to identify information based on their repository
or storage location.
For this reason, GSOC respectfully suggests that the proposed requirements are not backwards compatible and would require significant effort to
implement. This is because the obvious implementation method to ensure compliance would be to create and maintain a list of each individual piece of
BCSI, its location, and its format. Such a list would be a new development that would likely not be compatible with existing program
implementations. To address these concerns, GSOC recommends rewording requirement R1.1 as follows:
Method(s) to identify BCSI or their storage locations/repositories, as applicable
This would allow entities the flexibility to manage BCSI based on the most secure approach to such management, e.g., by repository or by pieces of
information as it applies to their environment.
4. Ambiguity – GSOC is concerned that a number of the proposed revisions introduce ambiguity that could lead to differing interpretations and
implementation for requirements R1.2 – R1.4. Relative to requirement R1.2, GSOC respectfully suggests that, contrary to the Technical Rationale, the
removal of state references from the requirement and their replacement with more generic terms increases confusion and does not make the obligations
more “explicitly comprehensive.” In particular, GSOC notes that the previous state references (use, storage, transit, etc.) were well known and well
understood concepts. Their replacement with a generic requirement to “protect and securely handle” could result in various interpretations and
implementation of those obligations. Moreover, it could result in a security-related deficiency should an entity construe such terms narrowly.
Additionally, relative to requirements R1.3 and R1.4, GSOC is concerned that the term “vendor solutions” could be interpreted broadly to include “onpremises” vendor solutions that are managed by the responsible entity. For example, if an entity purchases and hosts “on prem” a document
management system provided by a vendor, e.g., IBM, Microsoft, etc., would that “vendor solution” be subject to CIP-011, requirements R1.3 and
R1.4. It is unclear from the language contained in the proposed revisions or the Technical Rationale what comprises or meets the definition of “vendor
services.” Accordingly, this term is open to interpretation and could lead to an overall scope expansion for this small subset of requirements – as
unintended as that scope increase may be. Moreover, such scope expansion may increase Responsible Entity’s obligations without an attendant
increase in overall security or reliability – especially where additional requirements are applied to “on prem” “vendor solutions” that are managed by
responsible Entities.
Further, GSOC notes that the terms introduced in requirement R1.4 may not all be well understood across the industry and should not be introduced
without definitions or other guidance. As an example, the term “data governance” is not a well understood term across the industry and is not defined in
these proposed revisions. Introducing this term and its associated “rights management” without any scope, context, or definition that would elucidate
what it means in this use would be problematic as it has a high potential for confusion, ambiguity, and subjective interpretation. Moreover, as applied to
potential “vendor solutions” (whether on- or off-premises), requirements R1.3 and R1.4 may be duplicative of each other and may be duplicative of what
is required in CIP-004 as well as other reliability standards. At a minimum, GSOC recommends combining requirements R1.3 and R1.4 and better
defining those instances to which they apply.
5. Unintended consequences - GSOC is concerned that the proposed revisions to CIP-011 and CIP-004 result in significant program modifications
and additional obligations for Responsible Entities regardless of whether they are using any cloud services, and, further, without modifications, vendors
who have not engaged any cloud services and have not, therefore, modified their BCSI programs could be found non-compliant with these revised
requirements. It respectfully asserts that requiring Responsible Entities that are not engaging in cloud-based services to overhaul their entire information
program to support others who want to migrate to the cloud is manifestly unfair, unduly burdensome and a risk to reliability.
The placement of new and unnecessary compliance obligations and the potential expansion of the scope of CIP-011 for those entities that have chosen
not to engage in the storage, handling, or use of BCSI in a cloud has the potential to divert resources to the implementation of new and different
program aspects. Such diversion increases the risk of a deficiency or failure for issues that would be better addressed in implementation or compliance
guidance. For these reasons, GSOC is concerned that the proposed revisions are not properly scoped to ensure compatibility with existing programs
while accommodating the evolving storage and other solutions that could be employed in the future.
Likes
0
Dislikes
0
Response
Bridget Silvia - Sempra - San Diego Gas and Electric - 3
Answer
No
Document Name
Comment
SDG&E supports EEI’s comments submitted on our behalf.
Likes
0
Dislikes
0
Response
Wayne Guttormson - SaskPower - 1
Answer
No
Document Name
Comment
Support the MRO-NSRF comments.
Likes
0
Dislikes
Response
0
Dennis Sismaet - Northern California Power Agency - 6
Answer
No
Document Name
Comment
See Tristate (SAR originator) and SMUDs comments.
Likes
0
Dislikes
0
Response
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
No
Document Name
Comment
The SAR is focused on cloud service providers, but the requirement potentially pulls in many other vendor services, such as engineering consultants
who may occasionally be provided temporary access to a document that is considered BCSI. Clarification in the standard language or applicability
should address the intended scope.
CIP-013 doesn’t require audits of vendor performance and adherence, where CIP-011 without similar exception would require these types of
verifications for compliance. This is beyond the scope of the NERC CIP Standards to audit external third parties that are not Registered Entities
compliance to the requirements.
Likes
0
Dislikes
0
Response
Larry Snow - Cogentrix Energy Power Management, LLC - 4 - NPCC,SERC,RF
Answer
No
Document Name
Comment
R1.4 should specify "electronically store".
Likes
Dislikes
0
0
Response
Bobbi Welch - Midcontinent ISO, Inc. - 2, Group Name ISO/RTO Council Standards Review Committee 2019-02 BCSI Access Management
Answer
No
Document Name
Comment
The IRC SRC recommends a change to Part 1.3’s requirement as detailed below. Recommend any additional detail needed to describe risk
management methods be captured under CIP-013.
When the Responsible Entity engages vendor services to store, utilize, or analyze BCSI, implement risk management method(s).
Recommend a change to Part 1.4’s requirement to explicitly say “electronically” as detiled below:
When the Responsible Entity engages vendor services to electronically store, utilize, or analyze BCSI, implement one or more documented electronic
technical mechanisms to protect BCSI.
Alternatively the Applicability column could specify “electronic.”
Likes
0
Dislikes
0
Response
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name NPCC Regional Standards Committee
Answer
No
Document Name
Comment
Recommend a change to Part 1.4’s requirement to explicitly say “electronically.”
Change from
When the Responsible Entity engages vendor services to store, utilize, or analyze BCSI, implement one or more documented electronic technical
mechanisms to protect BCSI.
To
When the Responsible Entity engages vendor services to electronically store, utilize, or analyze BCSI, implement one or more documented electronic
technical mechanisms to protect BCSI.
Alternatively the Applicability column could specify “electronic.”
The proposed R1.3 does not state any security controls that need to be implemented. The proposed R1.3 essentially requires entities to have a
framework to manage risks associated with utilizing third party for storing, utilizing or analyzing. The proposed risk management framework needs to be
implemented for 1.3.1 to 1.3.4.
We also believe that the term “utilize” in the proposed R1.3 is too broad. Requirements should focus on storage and analysis only.
While we welcome this approach since a one solution fits all may not exist; however, practicality of implementing such a framework is not
clear. Perhaps, similar language to CIP-013 may be needed (risk-based approach) and use of terms such as the “the risk management methods need
to address”.
The proposed R1.4 no longer suggests that protection at BCSI level (encryption) is a must. Instead, CIP-011 R1 will require a mechanism to protect
BCSI. We still believe that protection must be applied at the BCSI level when stored/analyzed on a third party cloud.
Likes
0
Dislikes
0
Response
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
No
Document Name
Comment
EEI recognizes SDT efforts to clarify the protection expectations needed by entities when utilizing third-party solutions but suggests the following
changes to better clarify the needed protections:
Requirement 1
Part 1.2 Measures
1. EEI suggests modifying Bullet 2 to begin with the phrase “evidence demonstrating” to further clarify the Measure
2. EEI suggests adding the following measure: A documented process for protecting and securely handling BCSI.
Part 1.3 & 1.4: “Vendor services” is an overly broad term that is not limited to cloud services, and when combined it with the phrase “to utilize or analyze
BCSI”, brings in additional scenarios, such as engaging a vendor service on-premise at the Responsible Entity’s location with the Responsible Entity’s
equipment to analyze BCSI (for example, in an incident response/forensics situation). Additionally, the requirement language does not link vendor
services to BCSI that is stored, used, or analyzed off-premise on a vendor’s infrastructure. “Engaging a vendor service” encompasses more than a
cloud service offering and the resulting 1.3.1-1.3.4 methods are not applicable to a vendor providing services on site using the entity’s own
equipment. Both 1.3 and 1.4 begin with “When the Responsible Entity engages vendor services to store, utilize, or analyze BCSI, implement .…” We
suggest changing both to clarify cloud-based scenarios such as “When the Responsible Entity engages off-premise vendor services to store, utilize, or
analyze BCSI, implement…” or possibly “When the Responsible Entity engages vendor services to store, utilize, or analyze BCSI on the vendor’s
infrastructure, implement…”
Likes
0
Dislikes
0
Response
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
No
Document Name
Comment
While the revisions do clarify the protections expected when utilizing third-party solutions, the revisions do not have a narrowed scope. BCSI may be
shared with mock auditors who will be analyzing BCSI. More clarity is required on the measures to determine the intended scope of the requirement
changes. Unclear if these requirements are retroactive to contracted vendors or if these will apply to only new vendors.
Likes
0
Dislikes
0
Response
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name PUD No. 1 of Chelan County
Answer
No
Document Name
Comment
Please elaborate on what is required for CIP-011 R1.3.1 Data Governance and Rights Management.
Likes
0
Dislikes
0
Response
Carl Pineault - Hydro-Qu?bec Production - 5
Answer
No
Document Name
Comment
We support NPCC Regional Standards Committee comments
Likes
0
Dislikes
0
Response
Monika Montez - California ISO - 2 - WECC
Answer
No
Document Name
Comment
CAISO is in support of the below IRC SRC comments:
The IRC SRC recommends a change to Part 1.3’s requirement as detailed below. Recommend any additional detail needed to describe risk
management methods be captured under CIP-013.
When the Responsible Entity engages vendor services to store, utilize, or analyze BCSI, implement risk management method(s).
Recommend a change to Part 1.4’s requirement to explicitly say “electronically” as detiled below:
When the Responsible Entity engages vendor services to electronically store, utilize, or analyze BCSI, implement one or more documented electronic
technical mechanisms to protect BCSI.
Alternatively the Applicability column could specify “electronic.”
Likes
0
Dislikes
0
Response
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
Document Name
Comment
No
We agree that the revisions clarify the protections expected to be compliant, however, if it is the SDT’s intent to have a risk assessment performed for
3rd party storage systems, then those requirements should be a part of CIP-013. This is not in the scope of the SAR, but should have been
considered.
Secondly, requirements R1.3.1-1.3.4, are very dynamic for the majority of major Cloud Service Providers (CSP) and would require periodic/continuous
risk assessments due to the nature of 3rd party storage services. As a 3rd party storage service customer, you are at the mercy of the CSP’s terms and
conditions, features, security features, IAM, encryption, etc. which may change at any time causing a change in risks. A change in terms and
conditions, security features, IAM, purchasing additional security features, etc. would trigger a new risk assessment that would make compliance
onerous.
Also, the configuration (hybrid, private, public) of cloud/3rd party services, severely impacts the potential threats to the unauthorized access to BCSI
which is not considered in the requirements. For major CSPs as a 3rd party storage solution provider in a private configuration is no different than the
BCSI being stored on premise.
Lastly, the way the question is being asked using “third-party solutions” (e.g. cloud services) instead of the language used in the requirements makes it
difficult to answer without making assumptions.
Likes
0
Dislikes
0
Response
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
No
Document Name
Comment
Southern does not agree that CIP-011 clarifies the protections expected when utilizing third-party solutions. Per the TR, the different states of
information from the requirement have been removed. “By removing this language, methods to protect BCSI becomes explicitly comprehensive.” The
SDT needs to clarify exactly what that means. Removing the language now seems to cause more confusion where this was intended to address.
The methods in requirement R1.2 state to “protect” and “securely handle” BCSI. The two seem to be synonomous with each other and have no
difference. Suggested restatement to simply use “securely handle” which has greater clarity and is sufficient on its own. The final bullet within the
measures reads as a statement rather than an example of evidence as well as restates the information listed in the first bullet and should be changed to
be an example of evidence different than the first bullet, or removed altogether.
R1.3 “Vendor services” is an overly broad term that is not limited to cloud services. When combined with “to utilize or analyze BCSI”, it now includes
numerous scenarios such as engaging a vendor service on-premise at the Responsible Entity’s location with the Responsible Entity’s equipment to
analyze BCSI (example: a computer forensics company on retainer that is brought in to analyze an incident with a BCS). There is nothing in the
requirement language that scopes it to BCSI that is stored, used, or analyzed off-premise on the vendor’s infrastructure. “Engaging a vendor service”
encompasses much more than a cloud service offering and the resulting 1.3.1-1.3.4 methods are not applicable to a vendor providing services on site
using the entity’s own equipment.
R1.3.3 (Security management) is a superset of the other three areas. 1.3.1 covers security of the data, 1.3.2 covers security of people, 1.3.4 covers
security of the technology so 1.3.3 seems duplicative unless the intent is ‘physical security management’ and if that is the intent, we suggest making
that explicit.
The second bullet under Measures states that a list of risk assessment methods is “per vendor”. We suggest striking this bullet as its covered by the
first bullet and entities may have one risk management method that applies to all vendors, not per vendor.
R1.4 has the objective of simply “protect BCSI” but does not clarify “protect from what.” The last bullet point under the Measure implies we are to
protect the BCSI from subversion of the entity’s control(s) by the custodial vendor. If that is the objective, we suggest that be placed in the requirement
language for clarity as to the objective. Without further clarity, R1.4 is simply one scenario of R1.2.
Likes
0
Dislikes
0
Response
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
No
Document Name
Comment
ITC supports the Comment Form submitted by EEI
Likes
0
Dislikes
0
Response
Larry Heckert - Alliant Energy Corporation Services, Inc. - 4
Answer
No
Document Name
Comment
Agree with EEI's comments regarding confusion around "vendor services." If the SDT's intent is not to include BCSI in transit or for vendor services not
storing but utilizing and analyzing BCSI for a short term/temporary engagement, that should be made clearer.
Likes
0
Dislikes
0
Response
Douglas Webb - Douglas Webb On Behalf of: Allen Klassen, Westar Energy, 1, 5, 3, 6; Bryan Taggart, Westar Energy, 1, 5, 3, 6; Derek Brown,
Westar Energy, 1, 5, 3, 6; Grant Wilkerson, Westar Energy, 1, 5, 3, 6; - Douglas Webb, Group Name Westar-KCPL
Answer
No
Document Name
Comment
Westar and Kansas City Power & Co, Evergy companies, incorporate by reference Edison Electric Institute's response to Question 3.
Likes
0
Dislikes
0
Response
Patrick Wells - OGE Energy - Oklahoma Gas and Electric Co. - 1,3,5,6
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Martin Sidor - NRG - NRG Energy, Inc. - 5,6
Answer
Yes
Document Name
Comment
The expectations regarding the utilization of third-party services seem clearer in this draft. However, with respect to CIP-011, specifically R1.4, it is
apparent that a full security assessment will need to be performed on the vendor(s) in order to ensure compliance with the standard. As such, it would
be helpful if the “Measures” section referenced specific acceptable standard certifications, such as SSAE 18 or FedRAMP. It should also be noted that
vendors do not typically provide their security plan, when requested. This may make holistic security assessments difficult to complete.
Likes
0
Dislikes
0
Response
Tho Tran - Tho Tran On Behalf of: Lee Maurer, Oncor Electric Delivery, 1; - Tho Tran
Answer
Yes
Document Name
Comment
Oncor supports EEI's comment.
Likes
0
Dislikes
0
Response
Kyle Hussey - Public Utility District No. 2 of Grant County, Washington - 1,4,5,6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Scott Langston - Tallahassee Electric (City of Tallahassee, FL) - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jesus Sammy Alcaraz - Imperial Irrigation District - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Laura Nelson - IDACORP - Idaho Power Company - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Todd Bennett - Associated Electric Cooperative, Inc. - 3, Group Name AECI
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Richard Jackson - U.S. Bureau of Reclamation - 1,5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Andrea Jessup - Bonneville Power Administration - 1,3,5,6 - WECC
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 3,4,5 - RF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jack Cashin - American Public Power Association - 4
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kelsi Rigby - APS - Arizona Public Service Co. - 5
Answer
Yes
Document Name
Comment
Likes
Dislikes
0
0
Response
David Jendras - Ameren - Ameren Services - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Masuncha Bussey - Duke Energy - 1,3,5,6 - MRO,SERC,RF, Group Name Duke Energy
Answer
Document Name
Comment
Duke Energy needs more clarification on what constitutes “engaging in vendor services” versus need to know sharing of a limited piece of BCSI with a
third-party consultant.
Likes
0
Dislikes
0
Response
Daniel Gacek - Exelon - 1
Answer
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
Response
0
Kinte Whitehead - Exelon - 3
Answer
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Cynthia Lee - Exelon - 5
Answer
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Becky Webb - Exelon - 6
Answer
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
Response
0
4. Do you agree the new and revised VSL/VRF descriptions clearly align with the revisions to CIP-004 and CIP-011?
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
No
Document Name
Comment
We do not agree with the VSL/VRF because of our answer in question #3 above.
Likes
0
Dislikes
0
Response
Monika Montez - California ISO - 2 - WECC
Answer
No
Document Name
Comment
CAISO is in support of the below IRC SRC Comments:
Within CIP-004: Changes were with R4, R5 and new R6.
Within CIP-011: Request clarification that violating more than two of the sub-requirements (ex. Part 1.3), not the items beneath 1.3
Request clarification that violating more than two of the sub-requirements (ex. Part 1.3) counts as just Part 1.3 or a failure at the R1 level.
Earlier version of CIP-011 appeared to be more Pass/Fail. This version has gotten much more granular in its description and implementation in subrequirements. The auditing has generally occurred at the highest level (ex. Level 1 not Level 1.1, 1.2, 1.3). With the greater detail in the subrequirements, flexibility decreases and the administrative burden required to demonstrate compliance increases without commensurate security
benefits. If a Responsible Entity failed on one of the (new) sub-requirements, the violation is still rolled out at the R1 level. In looking through the VSLs,
the changes between Lower and Severe amplify in relation to the number of sub-requirements missed as opposed to how many times the overall
requirement was missed.
Likes
0
Dislikes
0
Response
Carl Pineault - Hydro-Qu?bec Production - 5
Answer
Document Name
No
Comment
We support NPCC Regional Standards Committee comments
Likes
0
Dislikes
0
Response
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name NPCC Regional Standards Committee
Answer
No
Document Name
Comment
Request clarification that violating is at the CIP-004 Part level (6.2) not the items beneath Part 6.2
Request clarification that violating is at the CIP-011 Part level (1.3) not the items beneath Part 1.3
Likes
0
Dislikes
0
Response
Bobbi Welch - Midcontinent ISO, Inc. - 2, Group Name ISO/RTO Council Standards Review Committee 2019-02 BCSI Access Management
Answer
No
Document Name
Comment
Within CIP-004: Changes were with R4, R5 and new R6.
Within CIP-011: Request clarification that violating more than two of the sub-requirements (ex. Part 1.3), not the items beneath 1.3
Request clarification that violating more than two of the sub-requirements (ex. Part 1.3) counts as just Part 1.3 or a failure at the R1 level.
Earlier version of CIP-011 appeared to be more Pass/Fail. This version has gotten much more granular in its description and implementation in subrequirements. The auditing has generally occurred at the highest level (ex. Level 1 not Level 1.1, 1.2, 1.3). With the greater detail in the subrequirements, flexibility decreases and the administrative burden required to demonstrate compliance increases without commensurate security
benefits. If a Responsible Entity failed on one of the (new) sub-requirements, the violation is still rolled out at the R1 level. In looking through the VSLs,
the changes between Lower and Severe amplify in relation to the number of sub-requirements missed as opposed to how many times the overall
requirement was missed.
Likes
0
Dislikes
0
Response
Larry Snow - Cogentrix Energy Power Management, LLC - 4 - NPCC,SERC,RF
Answer
No
Document Name
Comment
Better clarification is needed as to which items fall into the violations versus the items below CIP-004 Part 6.2 and CIP-011 Part 1.3
Likes
0
Dislikes
0
Response
Andrea Barclay - Georgia System Operations Corporation - 4
Answer
No
Document Name
Comment
The proposed VSLs/VRFs align with the proposed revisions for CIP-004 and CIP-011.
Likes
0
Dislikes
0
Response
Jennifer Bray - Arizona Electric Power Cooperative, Inc. - 1
Answer
No
Document Name
Comment
We do not agree with the VSL/VRF because of our answer in question #3 above.
Likes
0
Dislikes
0
Response
Leonard Kula - Independent Electricity System Operator - 2
Answer
No
Document Name
Comment
We support NPCC comments:
Request clarification that violating is at the CIP-004 Part level (6.2) not the items beneath Part 6.2
Request clarification that violating is at the CIP-011 Part level (1.3) not the items beneath Part 1.3
Likes
0
Dislikes
0
Response
Roger Fradenburgh - Roger Fradenburgh On Behalf of: Nicholas Lauriat, Network and Security Technologies, 1; - Roger Fradenburgh
Answer
No
Document Name
Comment
N&ST’s response to this question is based on our objections to the proposed revisions to CIP-004 and CIP-011.
Likes
0
Dislikes
0
Response
Kent Feliks - AEP - 3
Answer
Document Name
No
Comment
AEP believes that with the possible extension of BCSI to cloud providers, and the fact that there have been significantly more sophisticated, and a
greater volume of, attacks against the energy industry, especially through phishing, that the VRF for R1 should be High. Additionally, with known
foreign ownership, control, or involvement in PC reclamation and recycling, and the focus of foreign adversaries trying to gain access, cause damage,
or control the US Power grid, the VRF for R2 should also be High. We agree with the VSLs as written, but believe the VRFs should be changed.
Also, CIP-004-6 VSL/VRF is provided at requirement subpart level, while the revisions summarize at requirement level. Expanding to make CIP-004 R6
to indicate VSL/VRF at requirement subpart level might be more helpful.
Likes
0
Dislikes
0
Response
David Rivera - New York Power Authority - 3
Answer
No
Document Name
Comment
Request clarification that violating is at the CIP-004 Part level (6.2) not the items beneath Part 6.2
Request clarification that violating is at the CIP-011 Part level (1.3) not the items beneath Part 1.3
Likes
0
Dislikes
0
Response
Tim Womack - Puget Sound Energy, Inc. - 3
Answer
No
Document Name
Comment
Puget Sound Energy supports the comments of EEI.
Likes
0
Dislikes
Response
0
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
No
Document Name
Comment
Suggest adding a lower VSL to CIP-011 R2 for not having a documented process, and a High VSL for not following the documented process and
releasing or disposing of a BCA with accessible BCSI. The enforcement of R2 is not the same as the enforcement of R1.
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
No
Document Name
Comment
The VSLs for CIP-004-7 R6 and CIP-011-3 R1 do not adequately reflect the severity of a possible violation. For example, failure to properly identify
BCSI could result in a high reliability risk. But since this would only be a violation of one part of CIP-011-3 R1 the VSL assigned would be “Lower.” This
does not adequately assess the severity of the violation. This is especially true of CIP-011-3 R1 where Parts 1.2, 1.3 and 1.4 apply to BCSI as identified
in Part 1.1.
Likes
0
Dislikes
0
Response
Patrick Wells - OGE Energy - Oklahoma Gas and Electric Co. - 1,3,5,6
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Todd Bennett - Associated Electric Cooperative, Inc. - 3, Group Name AECI
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
Yes
Document Name
Comment
ITC supports the Comment Form submitted by EEI
Likes
0
Dislikes
0
Response
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
Yes
Document Name
Comment
Southern agrees the revisions to VSL/VRF for CIP-004 and CIP-011 are aligned properly based on the revisions in the respected Standards and
Requirements.
Likes
0
Dislikes
0
Response
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
Document Name
Yes
Comment
NVE supports the new and revised VSL/VRF descriptions
Likes
0
Dislikes
0
Response
Bridget Silvia - Sempra - San Diego Gas and Electric - 3
Answer
Yes
Document Name
Comment
SDG&E supports EEI’s comments submitted on our behalf.
Likes
0
Dislikes
0
Response
Michael Johnson - Michael Johnson On Behalf of: Ed Hanson, Pacific Gas and Electric Company, 1, 3, 5; Marco Rios, Pacific Gas and Electric
Company, 1, 3, 5; Sandra Ellis, Pacific Gas and Electric Company, 1, 3, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
Yes
Document Name
Comment
PG&E has no comments on the revised VSL/VRF’s.
Likes
0
Dislikes
0
Response
Sandra Shaffer - Berkshire Hathaway - PacifiCorp - 6
Answer
Document Name
Comment
Yes
PAC agrees with the new and revised VSL/VFR desciptions.
Likes
0
Dislikes
0
Response
Tho Tran - Tho Tran On Behalf of: Lee Maurer, Oncor Electric Delivery, 1; - Tho Tran
Answer
Yes
Document Name
Comment
Oncor supports EEI's comment.
Likes
0
Dislikes
0
Response
Masuncha Bussey - Duke Energy - 1,3,5,6 - MRO,SERC,RF, Group Name Duke Energy
Answer
Yes
Document Name
Comment
Duke Energy generally agrees the VSL/VRF matrix reflects accurately.
Likes
0
Dislikes
0
Response
Douglas Webb - Douglas Webb On Behalf of: Allen Klassen, Westar Energy, 1, 5, 3, 6; Bryan Taggart, Westar Energy, 1, 5, 3, 6; Derek Brown,
Westar Energy, 1, 5, 3, 6; Grant Wilkerson, Westar Energy, 1, 5, 3, 6; - Douglas Webb, Group Name Westar-KCPL
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Larry Heckert - Alliant Energy Corporation Services, Inc. - 4
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name PUD No. 1 of Chelan County
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Quintin Lee - Eversource Energy - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Dennis Sismaet - Northern California Power Agency - 6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
David Jendras - Ameren - Ameren Services - 3
Answer
Yes
Document Name
Comment
Likes
Dislikes
0
0
Response
Kelsi Rigby - APS - Arizona Public Service Co. - 5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jack Cashin - American Public Power Association - 4
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Document Name
Yes
Comment
Likes
0
Dislikes
0
Response
Sing Tay - OGE Energy - Oklahoma Gas and Electric Co. - 6, Group Name OKGE
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Sean Bodkin - Dominion - Dominion Resources, Inc. - 6, Group Name Dominion
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
Response
0
Marty Hostler - Northern California Power Agency - 5, Group Name NCPA
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Eli Rivera - CenterPoint Energy Houston Electric, LLC - NA - Not Applicable - Texas RE
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
Document Name
Comment
Yes
Likes
0
Dislikes
0
Response
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 3,4,5 - RF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Andrea Jessup - Bonneville Power Administration - 1,3,5,6 - WECC
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
Response
0
Bruce Reimer - Manitoba Hydro - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Richard Jackson - U.S. Bureau of Reclamation - 1,5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Joshua Andersen - Salt River Project - 1,3,5,6 - WECC
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Laura Nelson - IDACORP - Idaho Power Company - 1
Answer
Document Name
Comment
Yes
Likes
0
Dislikes
0
Response
Jesus Sammy Alcaraz - Imperial Irrigation District - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Joe Tarantino - Joe Tarantino On Behalf of: Arthur Starkovich, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Beth Tincher, Sacramento
Municipal Utility District, 4, 1, 6, 3, 5; Jamie Cutlip, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Kevin Smith, Balancing Authority of
Northern California, 1; Nicole Goi, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Nicole Looney, Sacramento Municipal Utility District, 4, 1,
6, 3, 5; - Joe Tarantino
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Scott Langston - Tallahassee Electric (City of Tallahassee, FL) - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
Response
0
Jonathan Robbins - Seminole Electric Cooperative, Inc. - 4
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kjersti Drott - Tri-State G and T Association, Inc. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kyle Hussey - Public Utility District No. 2 of Grant County, Washington - 1,4,5,6
Answer
Document Name
Comment
Yes
Likes
0
Dislikes
0
Response
Becky Webb - Exelon - 6
Answer
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Cynthia Lee - Exelon - 5
Answer
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Kinte Whitehead - Exelon - 3
Answer
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Daniel Gacek - Exelon - 1
Answer
Document Name
Comment
Exelon has elected to align with EEI in response to this question.Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
Response
0
5. The SDT is proposing an 18-month implementation plan. Do you agree to the proposed timeframe?
Masuncha Bussey - Duke Energy - 1,3,5,6 - MRO,SERC,RF, Group Name Duke Energy
Answer
No
Document Name
Comment
Duke Energy would like a 24-month implementation plan to allow for contract revisions for vendors who are storing and analyzing data.
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
No
Document Name
Comment
These modifications create no significant new compliance requirements, but instead add flexibility and clarity for the Responsible Entities. A shorter time
window, such as six months, would be more appropriate.
Likes
0
Dislikes
0
Response
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
No
Document Name
Comment
TVA does not believe 18 months is sufficient time to conduct required evaluation and implementation of required controls and associated
processes. Suggest extend to 36 months.
Likes
0
Dislikes
Response
0
Richard Jackson - U.S. Bureau of Reclamation - 1,5
Answer
No
Document Name
Comment
Reclamation recommends a 24-month implementation plan to allow entities flexibility to determine the appropriate implementation actions.
Likes
0
Dislikes
0
Response
Andrea Jessup - Bonneville Power Administration - 1,3,5,6 - WECC
Answer
No
Document Name
Comment
Since the proposed changes to CIP-004 and CIP-011 revolve around the use of vendor services, the time to implement will be influenced by whether or
not an organization uses or is planning to use vendor services to store, utilize, or analyze BCSI and if so, whether they have proactively implemented
any of these controls. In either case, BPA believes 24 months is the minimum necessary due to the need for implementing or modifying contract
language.
Likes
0
Dislikes
0
Response
Adrian Andreoiu - BC Hydro and Power Authority - 1, Group Name BC Hydro
Answer
No
Document Name
Comment
The material changes requiring incremental work are in relation to vendor services per CIP-011-2 R1.3. The requirements need clarity as to whether
the controls are intended for net new engagements with vendor service providers as of the effective date of the standard or if it applies to pre-existing
vendor service providers. There are several other clarity issues that need to be addressed in the standard requirements as per comments BC Hydro
provided to the other questions posed by the SDT in this survey.
Likes
Dislikes
0
0
Response
Roger Fradenburgh - Roger Fradenburgh On Behalf of: Nicholas Lauriat, Network and Security Technologies, 1; - Roger Fradenburgh
Answer
No
Document Name
Comment
N&ST’s response to this question is based on our objections to the proposed revisions to CIP-004 and CIP-011.
Likes
0
Dislikes
0
Response
Andrea Barclay - Georgia System Operations Corporation - 4
Answer
No
Document Name
Comment
Giving due consideration to the likelihood that Responsible Entities will need to revise their existing BCSI programs to manage such information based
on each individual piece of BCSI, instead of based on storage locations or repositories, GSOC would respectfully suggest an implementation period of
24 months.
Likes
0
Dislikes
0
Response
David Jendras - Ameren - Ameren Services - 3
Answer
No
Document Name
Comment
We recommend extending the implementation period to 24 months.
Likes
0
Dislikes
Response
0
Wayne Guttormson - SaskPower - 1
Answer
No
Document Name
Comment
Support the MRO-NSRF comments.
Likes
0
Dislikes
0
Response
Bobbi Welch - Midcontinent ISO, Inc. - 2, Group Name ISO/RTO Council Standards Review Committee 2019-02 BCSI Access Management
Answer
No
Document Name
Comment
Since the intent of these changes is to allow for the use of cloud services, the IRC SRC recommends the SDT consider a phased implementation with
mandatory compliance at the end of 18 months – following the concepts from the CIP-002-6 implementation plan. This would allow for a quicker
adoption where and when possible for entities that choose to adopt cloud services in this capacity.
Likes
0
Dislikes
0
Response
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name PUD No. 1 of Chelan County
Answer
No
Document Name
Comment
Please provide additional guidance on what is required for existing vendors with provisioned BCSI access. This will be helpful in determining
implementation requirements.
Likes
0
Dislikes
Response
0
Monika Montez - California ISO - 2 - WECC
Answer
No
Document Name
Comment
CAISO is in support of the below IRC SRC comments:
Since the intent of these changes is to allow for the use of cloud services, the IRC SRC recommends the SDT consider a phased implementation with
mandatory compliance at the end of 18 months – following the concepts from the CIP-002-6 implementation plan. This would allow for a quicker
adoption where and when possible for entities that choose to adopt cloud services in this capacity.
Likes
0
Dislikes
0
Response
Larry Heckert - Alliant Energy Corporation Services, Inc. - 4
Answer
No
Document Name
Comment
Alliant Energy agrees with the MRO NSRF's comments supporting an 18-month implementation period as a “not to exceed.” That said, we request the
Standard Drafting Team (SDT) allow for implementation flexibility, i.e. so entities who are able and would like to move to the new version more quickly
than 18 months can do so.
Likes
0
Dislikes
0
Response
Kayleigh Wilkerson - Lincoln Electric System - 5, Group Name Lincoln Electric System
Answer
No
Document Name
Comment
LES supports an 18-month implementation period as a “not to exceed.” That said, we request the Standard Drafting Team (SDT) allow for
implementation flexibility, i.e. so entities who are able and would like to move to the new version more quickly than 18 months can do so.
Likes
0
Dislikes
0
Response
Tho Tran - Tho Tran On Behalf of: Lee Maurer, Oncor Electric Delivery, 1; - Tho Tran
Answer
Yes
Document Name
Comment
Oncor supports EEI's comment.
Likes
0
Dislikes
0
Response
David Rivera - New York Power Authority - 3
Answer
Yes
Document Name
Comment
For quicker adoption when possible, per Entity phased adoption is desirable. Recommend a phased implementation with mandatory compliance at the
end of 18 months – following concepts from the CIP-002-6 implementation plan
Request clarification on what is the correct forum (other than the SDT) for discussing implementation plans?
Likes
0
Dislikes
0
Response
Sandra Shaffer - Berkshire Hathaway - PacifiCorp - 6
Answer
Yes
Document Name
Comment
PAC agrees with the proposed timeframe.
Likes
0
Dislikes
0
Response
Michael Johnson - Michael Johnson On Behalf of: Ed Hanson, Pacific Gas and Electric Company, 1, 3, 5; Marco Rios, Pacific Gas and Electric
Company, 1, 3, 5; Sandra Ellis, Pacific Gas and Electric Company, 1, 3, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
Yes
Document Name
Comment
PG&E believes the 18 month implementation plan is appropriate for the modifications.
Likes
0
Dislikes
0
Response
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
Yes
Document Name
Comment
MPC agrees with an 18-month implementation timeline. MPC also requests ERO guidance regarding early implementation of CIP-004-7 and CIP-011-3.
An entity should be permitted to implement procedures to meet compliance with the revised requirements and not be held to previous requirements that
are due to be retired upon the enforceable date of project 2019-02 when implementing such changes prior to the enforceable date.
Likes
0
Dislikes
0
Response
Kent Feliks - AEP - 3
Answer
Yes
Document Name
Comment
Recognizing that each entity is situated differently,the proposed 18 months is enough for AEP, since this will not result in any major changes to
processes.
Likes
0
Dislikes
0
Response
Leonard Kula - Independent Electricity System Operator - 2
Answer
Yes
Document Name
Comment
We support NPCC comments:
For quicker adoption when possible, per Entity phased adoption is desirable. Recommend a phased implementation with mandatory compliance at the
end of 18 months – following concepts from the CIP-002-6 implementation plan
Request clarification on what is the correct forum (other than the SDT) for discussing implementation plans?
Likes
0
Dislikes
0
Response
Bridget Silvia - Sempra - San Diego Gas and Electric - 3
Answer
Yes
Document Name
Comment
SDG&E supports EEI’s comments submitted on our behalf.
Likes
0
Dislikes
0
Response
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
Yes
Document Name
Comment
NVE supports an 18-month implementation period.
Likes
0
Dislikes
0
Response
Larry Snow - Cogentrix Energy Power Management, LLC - 4 - NPCC,SERC,RF
Answer
Yes
Document Name
Comment
This is a critical during purchase of an entity with little time to implement the needed requirements.
Likes
0
Dislikes
0
Response
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name NPCC Regional Standards Committee
Answer
Yes
Document Name
Comment
For quicker adoption when possible, per Entity phased adoption is desirable. Recommend a phased implementation with mandatory compliance at the
end of 18 months – following concepts from the CIP-002-6 implementation plan
Request clarification on what is the correct forum (other than the SDT) for discussing implementation plans?
Likes
0
Dislikes
0
Response
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
Yes
Document Name
Comment
EEI supports the 18-month implementation plan proposed by the SDT.
Likes
0
Dislikes
0
Response
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
Yes
Document Name
Comment
Southern Company agrees the 18-month implementation plan is sufficient.
Likes
0
Dislikes
0
Response
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
Yes
Document Name
Comment
ITC supports the Comment Form submitted by EEI
Likes
0
Dislikes
0
Response
Kyle Hussey - Public Utility District No. 2 of Grant County, Washington - 1,4,5,6
Answer
Document Name
Yes
Comment
Likes
0
Dislikes
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jonathan Robbins - Seminole Electric Cooperative, Inc. - 4
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Martin Sidor - NRG - NRG Energy, Inc. - 5,6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
Response
0
Scott Langston - Tallahassee Electric (City of Tallahassee, FL) - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Joe Tarantino - Joe Tarantino On Behalf of: Arthur Starkovich, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Beth Tincher, Sacramento
Municipal Utility District, 4, 1, 6, 3, 5; Jamie Cutlip, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Kevin Smith, Balancing Authority of
Northern California, 1; Nicole Goi, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Nicole Looney, Sacramento Municipal Utility District, 4, 1,
6, 3, 5; - Joe Tarantino
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jesus Sammy Alcaraz - Imperial Irrigation District - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Laura Nelson - IDACORP - Idaho Power Company - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Joshua Andersen - Salt River Project - 1,3,5,6 - WECC
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Todd Bennett - Associated Electric Cooperative, Inc. - 3, Group Name AECI
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Bruce Reimer - Manitoba Hydro - 1
Answer
Yes
Document Name
Comment
Likes
Dislikes
0
0
Response
Tim Womack - Puget Sound Energy, Inc. - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Mark Ciufo - Mark Ciufo On Behalf of: Payam Farahbakhsh, Hydro One Networks, Inc., 1, 3; - Mark Ciufo
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 3,4,5 - RF
Answer
Document Name
Yes
Comment
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Eli Rivera - CenterPoint Energy Houston Electric, LLC - NA - Not Applicable - Texas RE
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
Response
0
Marty Hostler - Northern California Power Agency - 5, Group Name NCPA
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Sean Bodkin - Dominion - Dominion Resources, Inc. - 6, Group Name Dominion
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Sing Tay - OGE Energy - Oklahoma Gas and Electric Co. - 6, Group Name OKGE
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jennifer Bray - Arizona Electric Power Cooperative, Inc. - 1
Answer
Document Name
Comment
Yes
Likes
0
Dislikes
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jack Cashin - American Public Power Association - 4
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
Response
0
Patrick Wells - OGE Energy - Oklahoma Gas and Electric Co. - 1,3,5,6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kelsi Rigby - APS - Arizona Public Service Co. - 5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Dennis Sismaet - Northern California Power Agency - 6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Quintin Lee - Eversource Energy - 1
Answer
Document Name
Comment
Yes
Likes
0
Dislikes
0
Response
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Carl Pineault - Hydro-Qu?bec Production - 5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
Response
0
Douglas Webb - Douglas Webb On Behalf of: Allen Klassen, Westar Energy, 1, 5, 3, 6; Bryan Taggart, Westar Energy, 1, 5, 3, 6; Derek Brown,
Westar Energy, 1, 5, 3, 6; Grant Wilkerson, Westar Energy, 1, 5, 3, 6; - Douglas Webb, Group Name Westar-KCPL
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Daniel Gacek - Exelon - 1
Answer
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Kinte Whitehead - Exelon - 3
Answer
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Cynthia Lee - Exelon - 5
Answer
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Becky Webb - Exelon - 6
Answer
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
Response
0
6. The SDT proposes that the modifications in CIP-004 and CIP-011 meet the project scope in a cost-effective manner. Do you agree? If you
do not agree, or if you agree but have suggestions for improvement to enable more cost-effective approaches, please provide your
recommendation and, if appropriate, technical or procedural justification.
Larry Heckert - Alliant Energy Corporation Services, Inc. - 4
Answer
No
Document Name
Comment
Clarity is needed to meet the project scope in a cost-effective manner. If encryption for BCSI stored in the cloud is an effective requirement even if the
written requirement is more general, that is difficult for entities to follow and know they are compliant. It introduces compliance risk if entities make
decisions based on an unclear requirement, and entities may think they are saving money by implementing a non-technical solution but that could
backfire if a technical solution is actually required to be sufficient.
Likes
0
Dislikes
0
Response
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
No
Document Name
Comment
ITC supports the Comment Form submitted by EEI
Likes
0
Dislikes
0
Response
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
No
Document Name
Comment
Due to the endless possibilities of 3rd party storage solutions/vendor services for storage, we do not feel CIP-011 R1.3 is necessary and is exceedingly
burdensome. If the currently written controls in R1.4 are implemented, the electronic technical mechanisms are sufficient to protect BCSI from
unauthorized access.
Likes
0
Dislikes
0
Response
Monika Montez - California ISO - 2 - WECC
Answer
No
Document Name
Comment
CAISO is in support of the IRC SRC comments:
The costs to implement the changes cannot be calculated as the standards are currently written; however, there are several areas where proposed
modifications unnecessarily increase cost. We would require a better understanding of the term “provisioning” and the context of how the concepts
outlined in both standards would apply in a use case where third party providers of services are going to be used to store or process BCSI information.
In the spirit of cost-effectiveness, the IRC SRC respectfully requests the SDT consider the following opportunities to consolidate requirements and/or
eliminate duplication and overlap under CIP-004.
Introduction of “provisioning” not commensurate with cost – the proposed change from BCSI designated storage locations to personnel with
provisioned access to BCSI creates significant administrative overhead for entities and is not commensurate with the security value achieved. The
technical rationale identifying repositories for BCSI in the current standards vs “provisioned access” appears to be the same when you review
information in the technical rationale narrative.
Opportunity to consolidate CIP-004 requirements - The addition of proposed new requirement, R6, would require entities to implement an access
management program for BES Cyber System Information (BCSI; i.e. information) on par with the existing (and proposed continuation of)
requirement, R4, to implement an access management program for BES Cyber Systems (BCS; i.e. assets), i.e., to identify, authorize and track
provisioned and authorized personnel with access to BCSI - both hard-copy and electronic copy – at the entity’s managed location and at 3rd party
storage locations (aka “cloud”) as well.
For entities using or considering a move to 3rd party cloud storage without encryption of BCSI (such as MS Office 365), entities will be required to
obtain a list of 3rd party cloud personnel such as systems administrators with Administrative level privileges to systems which store an entity’s BCSI –
which may also be replicated at multiple cloud data centers and multiple sets of personnel. This is not sustainable. To address this, and in keeping with
the criteria of NERC’s Standards Efficiency Review, the IRC SRC proposes requirement R6 be consolidated into R4, so entities are only required to
implement to a single access management program.
Finally, the wording of CIP-004-7, Part 6.2 expands the scope of the 15-month review (i.e. to verify the need for continued access) to include the
quarterly review performed under Part 4.2 (i.e. to verify that provisioned access is authorized). To eliminate duplication, Part 6.2 should be reworded to
mirror that of CIP-004-6, Part 4.4 (i.e. to verify that access is correct and necessary for performing assigned work functions).
Likes
0
Dislikes
0
Response
Carl Pineault - Hydro-Qu?bec Production - 5
Answer
No
Document Name
Comment
We support NPCC Regional Standards Committee comments
Likes
0
Dislikes
0
Response
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name PUD No. 1 of Chelan County
Answer
No
Document Name
Comment
Business agreements with vendors requiring vulnerability and breach disclosures, as well as incident response, may not be cost-effective (or possible)
to establish.
Likes
0
Dislikes
0
Response
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name NPCC Regional Standards Committee
Answer
No
Document Name
Comment
Based on our response to question 1, we believe that a more cost effective approach exists to enable use of third party services for storage and
analysis of BCSI in a secure manner without introducing additional compliance burden on entities.
The proposed revisions should not introduce additional requirements or compliance burden for those entities that do not plan to utilize third party
services for storage or analysis of BCSI. In addition, we encourage a risk-based approach to address prevention of unauthorized access to BCSI while
stored in third party environment or being processed by third-party. See our response to Question 3.
A "cost-effective" approach would be for NERC to agree to rely on independent audit reports (eg SOC2 Type2)
Likes
0
Dislikes
0
Response
Bobbi Welch - Midcontinent ISO, Inc. - 2, Group Name ISO/RTO Council Standards Review Committee 2019-02 BCSI Access Management
Answer
No
Document Name
Comment
The costs to implement the changes cannot be calculated as the standards are currently written; however, there are several areas where proposed
modifications unnecessarily increase cost. We would require a better understanding of the term “provisioning” and the context of how the concepts
outlined in both standards would apply in a use case where third party providers of services are going to be used to store or process BCSI information.
In the spirit of cost-effectiveness, the IRC SRC respectfully requests the SDT consider the following opportunities to consolidate requirements and/or
eliminate duplication and overlap under CIP-004.
Introduction of “provisioning” not commensurate with cost – the proposed change from BCSI designated storage locations to personnel with
provisioned access to BCSI creates significant administrative overhead for entities and is not commensurate with the security value achieved. The
technical rationale identifying repositories for BCSI in the current standards vs “provisioned access” appears to be the same when you review
information in the technical rationale narrative.
Opportunity to consolidate CIP-004 requirements - The addition of proposed new requirement, R6, would require entities to implement an access
management program for BES Cyber System Information (BCSI; i.e. information) on par with the existing (and proposed continuation of)
requirement, R4, to implement an access management program for BES Cyber Systems (BCS; i.e. assets), i.e., to identify, authorize and track
provisioned and authorized personnel with access to BCSI - both hard-copy and electronic copy – at the entity’s managed location and at 3rd party
storage locations (aka “cloud”) as well.
For entities using or considering a move to 3rd party cloud storage without encryption of BCSI (such as MS Office 365), entities will be required to
obtain a list of 3rd party cloud personnel such as systems administrators with Administrative level privileges to systems which store an entity’s BCSI –
which may also be replicated at multiple cloud data centers and multiple sets of personnel. This is not sustainable. To address this, and in keeping with
the criteria of NERC’s Standards Efficiency Review, the IRC SRC proposes requirement R6 be consolidated into R4, so entities are only required to
implement to a single access management program.
Finally, the wording of CIP-004-7, Part 6.2 expands the scope of the 15-month review (i.e. to verify the need for continued access) to include the
quarterly review performed under Part 4.2 (i.e. to verify that provisioned access is authorized). To eliminate duplication, Part 6.2 should be reworded to
mirror that of CIP-004-6, Part 4.4 (i.e. to verify that access is correct and necessary for performing assigned work functions).
Likes
0
Dislikes
0
Response
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
Document Name
No
Comment
NV Energy does not agree. The modifications as proposed by the SDT do not meet the project scope in a cost-effective manner. These modifications
depend on established and/or modified vendor relationships that are being addressed outside of scope. This goes beyond the scope identified by the
FERC Order for CIP-004 & CIP-011 in Project 2019-02. Granting access to individual pieces of information is not cost effective, would be resource
intensive, and is not in line with industry best practices.
The new language in CIP-011 could result in required audits of third parties. CIP-013 doesn’t require audits of vendor performance and adherence,
where CIP-011 without similar exception would require these types of verifications for compliance. This is beyond the scope of the NERC CIP
Standards to audit external third parties compliance to the requirements, thus requiring undue burden on the Responsible Entity.
Likes
0
Dislikes
0
Response
Dennis Sismaet - Northern California Power Agency - 6
Answer
No
Document Name
Comment
The SDT needs to provide a cost/benefit analysis in order for us to determine if their proposal is cost effective. Also see SMUDs comments.
Likes
0
Dislikes
0
Response
Wayne Guttormson - SaskPower - 1
Answer
No
Document Name
Comment
Support the MRO-NSRF comments.
Likes
0
Dislikes
0
Response
Andrea Barclay - Georgia System Operations Corporation - 4
Answer
No
Document Name
Comment
As discussed above, the proposed revisions increase the scope of applicability, ambiguity, compliance activities, and burden without the likelihood of an
associated increase in reliability or security and with the potential to create a security gap related to the management and protection of
BCSI. Moreover, the driver for these revisions do not impact all Responsible Entities. Accordingly, without appropriate backwards compatibility,
Responsible Entities with existing, effective programs and no cloud or other third-party hosted services will be required to expend significant resources
to ensure compliance.
This creates uncertainty and increases the burden of compliance on Responsible Entities for no ostensible enhancement to reliability or security. Taken
together, the proposed revisions do not propose substantive enhancements to security or reliability that would justify the additional cost, resource, or
compliance burden or risk for a large number of Responsible Entities.
Likes
0
Dislikes
0
Response
Jack Cashin - American Public Power Association - 4
Answer
No
Document Name
Comment
The current modifications to CIP-004 and CIP-011 do not meet the project scope in a cost-effective way. This is because there are elements of the
changes to CIP-011 (see answer to question 7 below) that are supply chain risks that should be addressed in CIP-013 (Project 2019-03) rather than in
Project 2019-02. Adding the level of Supply Chain Risk Management proposed within CIP-011 R1 Part 1.3, unecessarily adds significant
implementation and cost burden. Inefficiencies will result from unecessary commingling of requirements for Projects 2016-02, 2019-02 and 2019-03.
Likes
0
Dislikes
0
Response
Jennifer Bray - Arizona Electric Power Cooperative, Inc. - 1
Answer
Document Name
Comment
No
Due to the endless possibilities of 3rd party storage solutions/vendor services for storage, we do not feel CIP-011 R1.3 is necessary and is exceedingly
burdensome. If the currently written controls in R1.4 are implemented, the electronic technical mechanisms are sufficient to protect BCSI from
unauthorized access.
Likes
0
Dislikes
0
Response
Roger Fradenburgh - Roger Fradenburgh On Behalf of: Nicholas Lauriat, Network and Security Technologies, 1; - Roger Fradenburgh
Answer
No
Document Name
Comment
It is N&ST’s understanding that the primary goal of this project is to clarify requirements to prevent unauthorized access to BCSI while “in storage” in
order to facilitate the use of 3rd-party storage solutions, including cloud-based services. If that understanding is correct, N&ST believes total rewrites of
long-standing Information Protection Program and BCSI storage location access management requirements are neither necessary nor desirable.
N&ST believes adding a single, simply-worded requirement to either CIP-004 or CIP-011, stating that all “designated storage locations” must have
documented technical controls that prevent unauthorized access to BCSI, would be quite sufficient.
Likes
0
Dislikes
0
Response
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
No
Document Name
Comment
Regarding CIP-011-3 R1 Part 1.3, the terminology for the sub-parts do not add value to CIP-011. It is unclear what this terminology would require or
what any of these terms mean, making them subject to broad and differing interpretation. This proposed requirement is a paperwork exercise that adds
administrative burden without realizing security benefits. Auditability will be difficult and open to interpretation. For these reasons, MPC does not
consider these changes to be cost-effective.
Likes
0
Dislikes
Response
0
Sean Bodkin - Dominion - Dominion Resources, Inc. - 6, Group Name Dominion
Answer
No
Document Name
Comment
Technology and costs are ever evolving in this area and without NERC performing a cost benefit analysis it is impossibkle to judge the impact ofthis
specific proposal.
Likes
0
Dislikes
0
Response
Michael Johnson - Michael Johnson On Behalf of: Ed Hanson, Pacific Gas and Electric Company, 1, 3, 5; Marco Rios, Pacific Gas and Electric
Company, 1, 3, 5; Sandra Ellis, Pacific Gas and Electric Company, 1, 3, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
No
Document Name
Comment
PG&E at this time cannot determine if the modifications are cost effective. PG&E would like to have an option to select Unknown, instead of just Yes
and No.
Likes
0
Dislikes
0
Response
Marty Hostler - Northern California Power Agency - 5, Group Name NCPA
Answer
No
Document Name
Comment
The SDT needs to provide a cost/benefit analysis in order for us to determine if their proposal is cost effective.
Also see SMUDs comments.
Likes
Dislikes
0
0
Response
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
No
Document Name
Comment
As mentioned in question 1, changing the term from “designated storage locations” to “provisioned access” adds administrative work to update program
documents and access tracking tools, without a commensurate increase in flexibility or security. CIP-011 R1.3 and R1.4 expand the scope of the SAR
to include more than just cloud service providers and for medium impact without ERC. This is a significant expansion of scope that is not cost effective.
The existing versions of the CIP standards already take into consideration potential cloud service providers. One approach could be to allow current
versions to remain effective, while offering the new versions to entities that want to implement them, as is being done with PRC-005 versions -1.1b and 6.
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
No
Document Name
Comment
As mentioned in question 1, changing the term from “designated storage locations” to “provisioned access” adds administrative work to update program
documents and access tracking tools, without a commensurate increase in flexibility or security. CIP-011 R1.3 and R1.4 expand the scope of the SAR
to include more than just cloud service providers and for medium impact without ERC. This is a significant expansion of scope that is not cost effective.
The existing versions of the CIP standards already take into consideration potential cloud service providers. One approach could be to allow current
versions to remain effective, while offering the new versions to entities that want to implement them, as is being done with PRC-005 versions -1.1b and 6.
Likes
0
Dislikes
0
Response
Adrian Andreoiu - BC Hydro and Power Authority - 1, Group Name BC Hydro
Answer
No
Document Name
Comment
BC Hydro has insufficient information to determine how cost effective these modifications are. For additional details, please reference BC Hydro’s
comments to the other questions in this survey.
Likes
0
Dislikes
0
Response
Andrea Jessup - Bonneville Power Administration - 1,3,5,6 - WECC
Answer
No
Document Name
Comment
This is very difficult to quantify across all of industry and various types of registered entities. If the language can be adjusted to account for nonelectronic information storage locations, it has potential.
Likes
0
Dislikes
0
Response
Mark Ciufo - Mark Ciufo On Behalf of: Payam Farahbakhsh, Hydro One Networks, Inc., 1, 3; - Mark Ciufo
Answer
No
Document Name
Comment
Based on our response to question 1, we believe that a more cost effective approach exists to enable use of third party services for storage and
analysis of BCSI in a secure manner without introducing additional compliance burden on entities.
The proposed revisions should not introduce additional requirements or compliance burden for those entities that do not plan to utilize third party
services for storage or analysis of BCSI. In addition, we encourage a risk-based approach to address prevention of unauthorized access to BCSI while
stored in third party environment or being processed by third-party. See our response to Question 3.
Likes
0
Dislikes
Response
0
Sandra Shaffer - Berkshire Hathaway - PacifiCorp - 6
Answer
No
Document Name
Comment
PAC does not agree. The modifications as proposed by the SDT do not meet the project scope in a cost-effective manner. These modifications depend
on established and/or modified vendor relationships that are being addressed outside of scope. This goes beyond the scope identified by the FERC
Order for CIP-004 & CIP-011 in Project 2019-02. Granting access to individual pieces of information is not cost effective, would be resource intensive,
and is not in line with industry best practices.
The new language in CIP-011 could result in required audits of third parties. CIP-013 doesn’t require audits of vendor performance and adherence,
where CIP-011 without similar exception would require these types of verifications for compliance. This is beyond the scope of the NERC CIP
Standards to audit external third parties compliance to the requirements, thus requiring undue burden on the Responsible Entity.
Likes
0
Dislikes
0
Response
Bruce Reimer - Manitoba Hydro - 1
Answer
No
Document Name
Comment
As our comments in question 1, changing the term from “designated storage locations” to “provisioned access” adds administrative workload to update
program documents and manage additional access to BCSI that is not manageable without an automated tool. We suggest using BCSI Repository
approach to manage BCSI access as our comments in question 1. By using this approach, there is no additional cost for the ongoing compliance and
the CIP-006 Part R16. 4.1 we suggest will address the cloud storage third-party access to BCSI.
Likes
0
Dislikes
0
Response
Richard Jackson - U.S. Bureau of Reclamation - 1,5
Answer
Document Name
Comment
No
To minimize churn among standard versions, Reclamation recommends the SDT take additional time to coordinate the modifications in CIP-004-7 and
CIP-011-3 with other existing drafting teams for related standards. This will help minimize the costs associated with the planning and adjustments
required to achieve compliance with frequently changing requirements. NERC should foster a standards development environment that will allow
entities to fully implement technical compliance with current standards before moving to subsequent versions. This will provide entities economic relief
by better aligning the standards for overall improved reliability and by reducing the chances that standards will conflict with one another.
Likes
0
Dislikes
0
Response
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
No
Document Name
Comment
Under the existing version of the standards entities are already required to apply protection mechanisms to BSCI when shared. If requirement R1.3
remains it should not be applied retroactively to vendors.
Likes
0
Dislikes
0
Response
Joe Tarantino - Joe Tarantino On Behalf of: Arthur Starkovich, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Beth Tincher, Sacramento
Municipal Utility District, 4, 1, 6, 3, 5; Jamie Cutlip, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Kevin Smith, Balancing Authority of
Northern California, 1; Nicole Goi, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Nicole Looney, Sacramento Municipal Utility District, 4, 1,
6, 3, 5; - Joe Tarantino
Answer
No
Document Name
Comment
The current approach would be resource intensive and difficult to manage. Many of the new requirements are also vague and broad. This could make
it very difficult to come up with solutions to meet the requirement and may cost much more to implement than it would if the requirements and measures
were clearer. Given the ambiguity, it is hard to imagine how the regional entities will interpret the requirements and how that would impact the
implementation.
Likes
0
Dislikes
Response
0
Masuncha Bussey - Duke Energy - 1,3,5,6 - MRO,SERC,RF, Group Name Duke Energy
Answer
No
Document Name
Comment
Duke Energy does not agree. It is not clear the extent of changes that may be necessary to existing methods that are already effectively protecting
BCSI and to what extent those changes will result in additional risk reduction.
Likes
0
Dislikes
0
Response
Jonathan Robbins - Seminole Electric Cooperative, Inc. - 4
Answer
No
Document Name
Comment
As written, R1.4 and R1.5 will apply to all vendors that also may utilize or analyze BCSI. This would mean that entities would have to utilize resources
to identify/assess risks (R1.4) and would be required to develop/purchase/implement tools to ensure that at least one or more documented electronic
technical mechanisms to protect BCSI (R1.5). While this makes sense when utilizing third-party solutions such as cloud services, these extra
requirements for vendors that simply need to access physical or electronic documentation containing BCSI or that utilize this type of information onsite
on a periodic basis appears unnecessary and costly to implement.
Likes
0
Dislikes
0
Response
Patrick Wells - OGE Energy - Oklahoma Gas and Electric Co. - 1,3,5,6
Answer
No
Document Name
Comment
Likes
0
Dislikes
Response
0
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
Yes
Document Name
Comment
Southern has no comments on the project scope cost effectiveness.
Likes
0
Dislikes
0
Response
Kent Feliks - AEP - 3
Answer
Yes
Document Name
Comment
Again, recognizing that each entity is situated differently,the proposed revisions can likely be implemented by AEP in a cost effective manner, since this
will not result in any major changes to processes.
Likes
0
Dislikes
0
Response
Joshua Andersen - Salt River Project - 1,3,5,6 - WECC
Answer
Yes
Document Name
Comment
The cost to implement will grow quickly with unclear requirements that lead to Responsible Entity concerns of proper interpretation. We would not say
these are cost-effective at this time.
Likes
0
Dislikes
Response
0
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Larry Snow - Cogentrix Energy Power Management, LLC - 4 - NPCC,SERC,RF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Quintin Lee - Eversource Energy - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kelsi Rigby - APS - Arizona Public Service Co. - 5
Answer
Document Name
Comment
Yes
Likes
0
Dislikes
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 3,4,5 - RF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Tim Womack - Puget Sound Energy, Inc. - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Todd Bennett - Associated Electric Cooperative, Inc. - 3, Group Name AECI
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Laura Nelson - IDACORP - Idaho Power Company - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jesus Sammy Alcaraz - Imperial Irrigation District - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Scott Langston - Tallahassee Electric (City of Tallahassee, FL) - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kyle Hussey - Public Utility District No. 2 of Grant County, Washington - 1,4,5,6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kjersti Drott - Tri-State G and T Association, Inc. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Douglas Webb - Douglas Webb On Behalf of: Allen Klassen, Westar Energy, 1, 5, 3, 6; Bryan Taggart, Westar Energy, 1, 5, 3, 6; Derek Brown,
Westar Energy, 1, 5, 3, 6; Grant Wilkerson, Westar Energy, 1, 5, 3, 6; - Douglas Webb, Group Name Westar-KCPL
Answer
Document Name
Comment
No position.
Likes
0
Dislikes
0
Response
David Jendras - Ameren - Ameren Services - 3
Answer
Document Name
Comment
None
Likes
0
Dislikes
0
Response
Bridget Silvia - Sempra - San Diego Gas and Electric - 3
Answer
Document Name
Comment
SDG&E has no comment on the cost effectiveness of the proposed changes.
Likes
0
Dislikes
0
Response
Becky Webb - Exelon - 6
Answer
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Cynthia Lee - Exelon - 5
Answer
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
Dislikes
0
0
Response
Kinte Whitehead - Exelon - 3
Answer
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Document Name
Comment
Texas RE does not have comments on this question.
Likes
0
Dislikes
0
Response
Daniel Gacek - Exelon - 1
Answer
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
Response
0
David Rivera - New York Power Authority - 3
Answer
Document Name
Comment
No comment
Likes
0
Dislikes
0
Response
Tho Tran - Tho Tran On Behalf of: Lee Maurer, Oncor Electric Delivery, 1; - Tho Tran
Answer
Document Name
Comment
N/A
Likes
0
Dislikes
Response
0
7. Provide any additional comments for the standard drafting team to consider, if desired.
Kjersti Drott - Tri-State G and T Association, Inc. - 1
Answer
Document Name
Comment
Technical rationale for CIP-011, part 1.4, implies there would always be the state "use" in all vendor solutions. However, in Tri-State's experience that is
not always the case, and also depends on the individual's interpretation of what "use" of BCSI means. A common example where there would not be
"use" in the cloud is backup storage. (Where the data is sent already encrypted and in order to use it (aka restore) has to be called back to the
customer's premises to be unencrypted.) Recommend the SDT remove "use", or instead change the entire paragraph to refer to the lifecycle of the data
from transit to disposal.
Likes
0
Dislikes
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Document Name
Comment
none at this time, thank you.
Likes
0
Dislikes
0
Response
Jonathan Robbins - Seminole Electric Cooperative, Inc. - 4
Answer
Document Name
Comment
The language is not clear on whether existing vendors will be subject to the new R1.4 and R1.5 requirements or if this will apply only to new vendors
after the future enforcement date.
The R1.4 language "identify and assess" is similar to CIP-013, which entities are finding requires a significant amount of resources to approrpriately
comply with.
Likes
0
Dislikes
0
Response
Joe Tarantino - Joe Tarantino On Behalf of: Arthur Starkovich, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Beth Tincher, Sacramento
Municipal Utility District, 4, 1, 6, 3, 5; Jamie Cutlip, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Kevin Smith, Balancing Authority of
Northern California, 1; Nicole Goi, Sacramento Municipal Utility District, 4, 1, 6, 3, 5; Nicole Looney, Sacramento Municipal Utility District, 4, 1,
6, 3, 5; - Joe Tarantino
Answer
Document Name
Comment
Granting access to individual pieces of information is not cost effective, would be resource intensive, and is not in line with industry best practices. The
approach of managing access to repositories was a more practical approach and was more manageable as well.
Likes
0
Dislikes
0
Response
Tho Tran - Tho Tran On Behalf of: Lee Maurer, Oncor Electric Delivery, 1; - Tho Tran
Answer
Document Name
Comment
N/A
Likes
0
Dislikes
0
Response
Todd Bennett - Associated Electric Cooperative, Inc. - 3, Group Name AECI
Answer
Document Name
Comment
I support the draft CIP-004-7 Standard, however there sonsistent use of defined terms could be implemented. BES Cyber System Information is
established as the anacronym (BCSI) in R2.1, yet it is not used in R6, M6, or Table R6 title.
Conducting CIP-013 vendor risk assessments is a new process for many entities, it would just add additional confusion to have risk assessment
requirements in standards other than CIP-013. The risk assessment required by draft Standard CIP-011-3 R1.3 should be omitted and moved to CIP013.
Likes
0
Dislikes
0
Response
Richard Jackson - U.S. Bureau of Reclamation - 1,5
Answer
Document Name
Comment
The NIST framework adequately addresses these Standards as they pertain to all BES Cyber Systems. The NIST framework is sufficient for guiding
federal entities’ security efforts pertaining to the Bulk-Power System, rather than creating duplicative requirements in the CIP standards. NERC should
leverage and incorporate the existing NIST framework, instead of creating additional, identical requirements in the form of CIP standards. Additional,
identical requirements create an administrative burden without improving overall security posture, thereby creating the potential for security failures
because of the required inefficient use of resources.
Likes
0
Dislikes
0
Response
Bruce Reimer - Manitoba Hydro - 1
Answer
Document Name
Comment
We suggest removing CIP-011 Part 1.3 and P1.4 as our comments in question 3. Define a BCSI Repository term in CIP-011 and use it for the BCSI
access management in CIP-004. Given that BCSI must have a home, there is no access control basis unless a BCSI repository is identified.
Likes
0
Dislikes
Response
0
Tim Womack - Puget Sound Energy, Inc. - 3
Answer
Document Name
Comment
Puget Sound Energy supports the comments of EEI.
Likes
0
Dislikes
0
Response
David Rivera - New York Power Authority - 3
Answer
Document Name
Comment
General comment - Request consistent language in the (CIP-011) Measures. Parts 1.1, 1.2, 2.1, and 2.2 start with “Examples of acceptable evidence
include, but are not limited to, the following:.” Parts 1.3 and 1.4 start with “Examples of acceptable evidence may include, but are not limited to, dated
documentation of the following:.” Part 1.3 is consistent with other Standards. Next, some Parts explicitly end each bullet with “or.” Some Parts are silent
on how to read their bullets (or vs and). Request explicit consistency.
Request consistent redlines because the CIP-011 redline-to-last-approved is not consistent with the CIP-011 redline-to-last-posted
Likes
0
Dislikes
0
Response
Sandra Shaffer - Berkshire Hathaway - PacifiCorp - 6
Answer
Document Name
Comment
Please copy applicabilty and change where appropriate for each part, such as done in CIP-011 R1
Likes
0
Dislikes
0
Response
Adrian Andreoiu - BC Hydro and Power Authority - 1, Group Name BC Hydro
Answer
Document Name
Comment
1. CIP-011 R1.3 is more appropriate to be located in CIP-013.
2. CIP-004-7 addresses access management controls for BCSI in relation to Medium Impact with ERC BES Cyber Systems and associated
EACMS and PACS; however, CIP-011-3 is broader in scope to include Medium Impact BES Cyber Systems and associated EACMS and PACS
without limiting coverage to ERC only. Why is there a discrepancy?
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
Document Name
Comment
The standards drafting team has not provided enough justification for the new CIP-011-3 R1.3 and 1.4 vendor management requirements. The existing
CIP requirements already require protection of BCSI, including BCSI stored, analyzed and used by vendors. The drafts would require almost the same
level of protections as those required for BES Cyber Assets in CIP-013-1.
Likes
0
Dislikes
0
Response
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
Document Name
Comment
The standards drafting team has not provided enough justification for the new CIP-011-3 R1.3 and 1.4 vendor management requirements. The existing
CIP requirements already require protection of BCSI, including BCSI stored, analyzed and used by vendors. The drafts would require almost the same
level of protections as those required for BES Cyber Assets in CIP-013-1.
Likes
0
Dislikes
0
Response
Eli Rivera - CenterPoint Energy Houston Electric, LLC - NA - Not Applicable - Texas RE
Answer
Document Name
Comment
CEHE noticed that CIP-004-7 Requirement R6 does not consider revocation when an individual is reassigned or transferred, in a similar way in which it
is accounted for in Requirement R5 Part 5.2.
Likes
0
Dislikes
0
Response
Marty Hostler - Northern California Power Agency - 5, Group Name NCPA
Answer
Document Name
Comment
No.
Likes
0
Dislikes
0
Response
Michael Johnson - Michael Johnson On Behalf of: Ed Hanson, Pacific Gas and Electric Company, 1, 3, 5; Marco Rios, Pacific Gas and Electric
Company, 1, 3, 5; Sandra Ellis, Pacific Gas and Electric Company, 1, 3, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
Document Name
Comment
PG&E has no additional input.
Likes
0
Dislikes
0
Response
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
Document Name
Comment
Minnkota respectfully states that it is opposed to changing the CIP Standards Requirements table column from “Applicable Systems” to
“Applicability”. This could also be confused with the Applicability in section A.4. of the standard. While we appreciate the SDT’s attempt to clarify that
the requirement is applicable to BCSI about those systems, regardless of if it is stored in those same systems or elsewhere, we propose that this be
done in the requirement language instead. We submit for the SDT’s consideration the following proposal:
CIP-004
6.1 Remove “BCSI associated with:” in Applicability column. Change column heading back to Applicable Systems. Change requirement to “Authorize
based on need, as determined by
the Responsible Entity, provisioneding of access to BCSI pertaining to applicable systems,
except for CIP Exceptional Circumstances.”
6.2 Remove “BCSI associated with:” in Applicability column. Change column heading back to Applicable Systems. Change requirement to “Verify at
least once every 15 calendar months that all provisioned access to BCSI pertaining to applicable systems:”
6.3 Remove “BCSI associated with:” in Applicability column. Change column heading back to Applicable Systems. Change requirement to “For
termination actions, remove the individual’s ability to use provisioned access to BCSI pertaining to applicable systems . . .”
CIP-011
1.1 Remove “BCSI pertaining to:” in Applicability column. Change column heading back to Applicable Systems. Change Requirement to “Method(s)
to identify BCSI pertaining to applicable systems.”
1.2 Revert Applicability column back to currently enforceable. Change Requirement to “Method(s) to protect and securely handle BCSI pertaining to
applicable systems.”
Likes
0
Dislikes
0
Response
Kent Feliks - AEP - 3
Answer
Document Name
Comment
No further comment.
Likes
0
Dislikes
0
Response
Leonard Kula - Independent Electricity System Operator - 2
Answer
Document Name
Comment
No aditional comments
Likes
0
Dislikes
0
Response
Jennifer Bray - Arizona Electric Power Cooperative, Inc. - 1
Answer
Document Name
Comment
We thank you for this opportunity to comment.
Likes
0
Dislikes
0
Response
Daniel Gacek - Exelon - 1
Answer
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Document Name
Comment
Texas RE continues to be concerned about the applicability in CIP-004-7 R4 and R5, and the use of encryption as stated in CIP-011-3. Additionally,
Texas RE is concerned with the removal of key management in CIP-011-3. Regarding applicability, Texas RE recommends the standard drafting team
(SDT) update the Applicable Systems columns in CIP-004-7 R4 (Parts 4.1-4.3) and R5 (Parts 5.1-5.4), to
Medium Impact BES Cyber Systems and their associated:
1. EACMS;
2. PACS; and
3. PCAs.
Since CIP-011-3 Parts 2.1 and 2.2 includes EACMS, PACS, and PCA, this change would align CIP-004-7 better with CIP-011-3 as well as improve an
overall security posture for access management and revocation.
Regarding encryption, Texas RE continues to be concerned that entities could simply use the bare minimum encryption controls in accordance with
CIP-011-3 R1.4. Neither CIP-004 nor CIP-011 contain requirement language specifying a minimum acceptable level of encryption where encryption is
used. The absence of enforceable language results in any encryption algorithm at any key strength, including those algorithm and key strength
combinations that have been determined to not be sufficiently strong, meeting compliance with this requirement as it is written. This may result in
inconsistent enforcement of this requirement across the regions.
Texas RE suggests writing additional Part to CIP-011-3 Requirement R1:
Part 1.5 – For those methods identified in Part 1.4 that use encryption, utilize an encryption key strength of at least 128 bits.
This language is consistent with the NIST framework for medium-impact information and does not mandate the use of encryption. If encryption is used,
however, it provides clear criteria as to what level of encryption is considered acceptable. The inclusion of minimal key strength criteria also squares
with FERC’s observations in its 2018 Staff Report, Lessons Learned from Commission-Led CIP Reliability Audits that select entities could improve their
security posture by enhancing their encryption key strength.
Regarding key management, Texas RE is concerned with the removal of key management process(es) in CIP-011-3, Requirement R2, part 2.1. Key
management is an important part of encryption and reduces the risk of unauthorized electronic access. Key management is also an important control
when implementing third-party cloud service providers. If personnel have access to the encryption keys, they have electronic access to BCSI.
Texas RE has the following additional comments:
•
•
Texas RE inquires as to the difference between the terms “provisioning of access” and “provisioned access”, which are used in CIP-004-7 R6
and the term “access”, which is used in R4 and R5.
In the measure for CIP-011-3 R1 Part 1.3, Texas RE recommends changing “or” to “and”. Vendor certification alone is insufficient to verify
vendor controls. Entities should have vendor certification and Registered Entity verification of vendor controls.
Likes
0
Dislikes
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
Document Name
Comment
ATC thanks the SDT for mindfully approaching the directives of this FERC Order so as to enable the CIP Standards for emerging technologies like offpremises BCSI cloud solutions/platforms, while maintaining backwards compatibility for on-premises BCSI solutions. Permitting the CIP Standards to
stall and lag behind emerging/advancing technology disincentivizes the growth and maturity of our most critical infrastructure; which in and of itself
breeds a security and reliability risk. Thank you also for the continued investment in the supporting materials like IG and TR; this truly helps provide a
common understanding.
Likes
0
Dislikes
0
Response
Kinte Whitehead - Exelon - 3
Answer
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
Response
0
Cynthia Lee - Exelon - 5
Answer
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Becky Webb - Exelon - 6
Answer
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Jack Cashin - American Public Power Association - 4
Answer
Document Name
Comment
APPA agrees with the CIP-011 R1 Parts 1.1, 1.2 and 1.4 revisions. Requirement 1 Part 1.3 is a supply chain risk management requirement and CIP011 should address only information security. The R1, Part 1.3 is a supply chain risk management provision that is more aptly dealt with in CIP013. The language included in CIP-011 is not intended to require technical controls supporting the management of supply chain risk.
Public power finds the that current language of CIP-013 would provide the necessary clarity to implement the vendor assessment practices suggested
in R1, Part 1.3. While the measures do provide some guidance, the measures are not part of the requirement language in R1, Part 1.3. The R1, Part
1.3 proposed language reads like a new requirement rather than something that complements CIP-013 practices.
The RI, Part 1.3 language suggests a gap that needs to be addressed in CIP-013. Attempting to address the risk inappropriately in CIP-011 would only
set up future corrections.
Likes
0
Dislikes
0
Response
Andrea Barclay - Georgia System Operations Corporation - 4
Answer
Document Name
Comment
None
Likes
0
Dislikes
0
Response
David Jendras - Ameren - Ameren Services - 3
Answer
Document Name
Comment
None
Likes
0
Dislikes
0
Response
Wayne Guttormson - SaskPower - 1
Answer
Document Name
Comment
Support the MRO-NSRF comments.
Likes
0
Dislikes
0
Response
Larry Snow - Cogentrix Energy Power Management, LLC - 4 - NPCC,SERC,RF
Answer
Document Name
Comment
Better detail and clarifications are needed throughout multiple sections of the document.
Likes
0
Dislikes
0
Response
Bobbi Welch - Midcontinent ISO, Inc. - 2, Group Name ISO/RTO Council Standards Review Committee 2019-02 BCSI Access Management
Answer
Document Name
Comment
General comment – The IRC SRC requests consistent language in the (CIP-011) Measures. Parts 1.1, 1.2, 2.1, and 2.2 start with “Examples of
acceptable evidence include, but are not limited to, the following:” Parts 1.3 and 1.4 start with “Examples of acceptable evidence may include, but are
not limited to, dated documentation of the following:.” Part 1.3 is consistent with other Standards. Next, some Parts explicitly end each bullet with “or.”
Some Parts are silent on how to read their bullets (or vs and). Request explicit consistency.
CIP-011 Part 1.3’s requirement includes “implement risk management method(s).” However the corresponding measures says “Implementation of the
risk identification and assessment method(s) (1.3).” Consistency between the requirement and measure would reduce the risk of confusion. We would
prefer the use of the terms “risk identification and assessment” as opposed to “risk management.” Risk management is generally understood to include
many things. Request consistent redlines because the redline-to-last-approved is not the same redline-to-last-posted for CIP-011.
The standards drafting team has not provided enough justification for the new CIP-011-3 R1.3 and 1.4 vendor management requirements. The existing
CIP requirements already require protection of BCSI, including BCSI stored, analyzed and used by vendors. The drafts would require almost the same
level of protections as those required for BES Cyber Assets in CIP-013-1. To address this, the IRC SRC requests the SDT consider incorporating any
necessary provisions into CIP-013.
Finally, the wording of CIP-004-7, Part 6.2 expands the scope of the 15-month review (i.e. to verify the need for continued access) to include the
quarterly review performed under Part 4.2 (i.e. to verify that provisioned access is authorized). To eliminate duplication, Part 6.2 should be reworded to
mirror that of CIP-004-6, Part 4.4 (i.e. to verify that access is correct and necessary for performing assigned work functions).
Likes
Dislikes
0
0
Response
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name NPCC Regional Standards Committee
Answer
Document Name
Comment
General comment - Request consistent language in the (CIP-011) Measures. Parts 1.1, 1.2, 2.1, and 2.2 start with “Examples of acceptable evidence
include, but are not limited to, the following:.” Parts 1.3 and 1.4 start with “Examples of acceptable evidence may include, but are not limited to, dated
documentation of the following:.” Part 1.3 is consistent with other Standards. Next, some Parts explicitly end each bullet with “or.” Some Parts are silent
on how to read their bullets (or vs and). Request explicit consistency.
Request consistent redlines because the CIP-011 redline-to-last-approved is not consistent with the CIP-011 redline-to-last-posted
Since technological solutions are often the answer to the various challenges of the electrical industry, there is a tendency to resort to cloud computing
solutions to accelerate deployment and reduce costs. It therefore appears important to us, in order to reduce cybersecurity risks to a minimum while
ensuring the flexibility required by maintaining the reliability of the Bulk Electric System that NERC focus on adapting the CIP Reliability Standards to
cloud computing environments. Exploring ways to integrate certifications (i.e. FedRamp, or Soc II Type 2) will be essential to permit compliance
certification with the CIP requirements by various cloud providers. This support would prevent entities from needing to carry out isolated proceedings
with suppliers, which may be inconsistent across industry.
Likes
0
Dislikes
0
Response
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
Document Name
Comment
CIP-011 Requirement 1.3 does not cleary identify what the requriment is. The measure is providing the clarity.
Likes
0
Dislikes
0
Response
Carl Pineault - Hydro-Qu?bec Production - 5
Answer
Document Name
Comment
N/A
Likes
0
Dislikes
0
Response
Monika Montez - California ISO - 2 - WECC
Answer
Document Name
Comment
CAISO is in support of the below IRC SRC comments:
General comment – The IRC SRC requests consistent language in the (CIP-011) Measures. Parts 1.1, 1.2, 2.1, and 2.2 start with “Examples of
acceptable evidence include, but are not limited to, the following:” Parts 1.3 and 1.4 start with “Examples of acceptable evidence may include, but are
not limited to, dated documentation of the following:.” Part 1.3 is consistent with other Standards. Next, some Parts explicitly end each bullet with “or.”
Some Parts are silent on how to read their bullets (or vs and). Request explicit consistency.
CIP-011 Part 1.3’s requirement includes “implement risk management method(s).” However the corresponding measures says “Implementation of the
risk identification and assessment method(s) (1.3).” Consistency between the requirement and measure would reduce the risk of confusion.
We would prefer the use of the terms “risk identification and assessment” as opposed to “risk management.” Risk management is generally understood
to include many things.
Request consistent redlines because the redline-to-last-approved is not the same redline-to-last-posted for CIP-011.
The standards drafting team has not provided enough justification for the new CIP-011-3 R1.3 and 1.4 vendor management requirements. The existing
CIP requirements already require protection of BCSI, including BCSI stored, analyzed and used by vendors. The drafts would require almost the same
level of protections as those required for BES Cyber Assets in CIP-013-1. To address this, the IRC SRC requests the SDT consider incorporating any
necessary provisions into CIP-013.
Finally, the wording of CIP-004-7, Part 6.2 expands the scope of the 15-month review (i.e. to verify the need for continued access) to include the
quarterly review performed under Part 4.2 (i.e. to verify that provisioned access is authorized). To eliminate duplication, Part 6.2 should be reworded to
mirror that of CIP-004-6, Part 4.4 (i.e. to verify that access is correct and necessary for performing assigned work functions).
Likes
0
Dislikes
Response
0
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
Document Name
Comment
We thank you for this opportunity to comment.
Likes
0
Dislikes
0
Response
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
Document Name
Comment
Southern does not have any additional comments other then those stated in the previous questions.
Likes
0
Dislikes
0
Response
Douglas Webb - Douglas Webb On Behalf of: Allen Klassen, Westar Energy, 1, 5, 3, 6; Bryan Taggart, Westar Energy, 1, 5, 3, 6; Derek Brown,
Westar Energy, 1, 5, 3, 6; Grant Wilkerson, Westar Energy, 1, 5, 3, 6; - Douglas Webb, Group Name Westar-KCPL
Answer
Document Name
Comment
None.
Likes
0
Dislikes
Response
0
Project 2019-02 BES Cyber System
Information Access Management
Summary Response to Comments | Draft 3
Background
Project 2019-02 BES Cyber System Information Access Management (BCSI) enhances BES reliability by
creating increased choice, greater flexibility, higher availability, and reduced-cost options for entities to
manage their BCSI. In addition, the project seeks to clarify the protections expected when utilizing thirdparty solutions (e.g., cloud services).
The Project 2019-02 BCSI standard drafting team (SDT) revised Reliability Standards CIP-004 and CIP-011
and reviewed the Glossary of Terms Used in NERC Reliability Standards pertaining to requirements
addressing BCSI. The 45-day comment period was August 6 through September 21, 2020. There were 68
sets of responses, including comments from approximately 175 different people from approximately 111
companies representing 10 of the Industry Segments as shown in the table on the following pages. Based
on these comments, the SDT has made proposed revisions to CIP-004 and CIP-011. Summary responses
have been developed to address the comments.
CIP-004 Revisions
The SDT appreciates all comments submitted regarding the CIP-004 draft standard. The SDT reviewed each
comment carefully and made respective changes where clarity or examples were needed.
Provisioned access, provisioning, deprovisioning Concepts
Many commenters expressed concern about the phrase “provisioned access, provisioning,
deprovisioning” within the CIP-004 standard. Some entities recommended the term be defined or the
SDT modify the requirements to provide clarity. It was also acknowledged that the Technical Rationale
(TR) does a great job explaining this term, but there is concern as the TR is not enforceable.
Thank you for your comments. The SDT determined that the term provision does not need to be defined.
Provision or provisioned access is a well-known term among technical subject matter experts who provision
access or deprovision access as a part of their job. This is an industry proven and accepted term that aligns
with security best practices and industry frameworks, which is best maintained as a non-defined term. The
SDT made some modifications within the sub-requirements of CIP-004 in hopes to provide clarity around the
requirements regarding provisioned access. Lastly, the SDT encourages industry to review the CIP-004-X
Requirement R6 section of the TR document and use the described concepts and scenarios in written access
management programs.
RELIABILITY | RESILIENCE | SECURITY
Storage Location
Some commenters requested that the SDT revert back to storage locations as seen in the previous
approved standard. In addition, a commenter expressed conversations with the SDT have clarified that
CIP-004-7 R6.1 was not intended to require provisioning of access to each individual piece of BCSI. The
SDT explained that the language was written to accommodate a use case where the BCSI authorization
attaches to the document so that the authorization follows the document when moved to various
locations. However, the entity requested the SDT accommodate both circumstances where entities may
fall under the use case scenario or may use designated storage locations for BCSI. A couple of entities
expressed that the proposed language is more restrictive than objective based. Lastly, some entities are
concerned that the current proposed language will not allow for backwards compatibility.
Thank you for your comments. The SDT determined that reverting back to storage locations would not be
an appropriate path forward for BCSI modifications and would be a detriment for future cloud modifications
to the CIP standards. The provision concept provides a clear path for BCSI and future modifications. While
entities may find Requirement R6 to be more restrictive than objective, the SDT’s focus is on BCSI and
objective based for this specific requirement may bring more into scope than intended and would be outside
the scope of this team. Lastly, using “Storage Locations” is just one method to identify and protect BCSI. The
absence of “Storage Locations” does not preclude an entity from maintaining that approach as their method.
Removing “Storage Locations” adds the needed flexibility for entities that want to use other approaches
such as those that technologies would provide (e.g. Azure Information Protection (AIP)). The term “Storage
Locations” is too prescriptive, and retention of that term encumbers the use of emerging technologies for
entities that should have those methods as an option. The SDT updated the Technical Rationale (TR) with an
explanation of how “provisioned access” is backwards compatible with “designated storage locations”,
while still also allowing certain protections (i.e. encryption) at the file level rather than all entities having to
limit this to specific locations.
Applicability
Many commenters requested that the SDT revert the “Applicability” column language back to
“Applicable Systems” language.
Thank you for your comments. The SDT agrees and modified the applicability column language back to
“Applicable Systems.”
Clarify requirements for managing provisioned access utilizing third-party solutions.
There were concerns expressed about the lack of clarity regarding Requirement R6 and what provisioned
access means and the lack of clarity regarding using cloud vendors.
Thank you for your comments. The SDT reviewed requirement R6 and agrees that some modifications are
necessary. Please see the modifications made to CIP-004, Requirement R6.
Summary Response to Comments | Draft 3
Project 2019-02 BES Cyber System Information Access Management
2
Requirement R6 and Subparts 6.1 and 6.2
A couple of entities expressed that Requirement R6 and its subparts do not provide clarity. The entity
stated that the intent of these requirements is to manage access when utilizing third-party solutions since
it doesn’t explicitly make that statement. The phrase “provisioning of access” does not necessarily imply
“when utilizing third-party solutions.”
Thank you for your comments. The SDT chose not to differentiate between entity and third-party because
the requirement applies to each individual (whether employee or non-employee) and not the hiring company
nor the infrastructure solution (whether on-prem or off-prem). The intent is to keep the requirements
objective and agnostic of the workforce and infrastructure. Thereby permitting entities flexibility to adapt
their program to their changing environment and workforce while still meeting the security objectives and
without having to revise the requirements to catch up.
Many entities expressed that management of provisioned access to BCSI, when utilizing third-party
solutions, needs to be clarified. Requirement R6, part 6.1 states that entities are required to “authorize
provisioning of access to BCSI based on need.” This could be read to mean, among other things, that
entities are required to authorize someone to provision access to BCSI, provision access to all BCSI (i.e.
requiring a provisioning authorization for each piece of BCSI), or a variety of other interpretations. To
resolve this issue, EEI suggests aligning the language of Requirement R6, part 6.1 to Requirement R4, part
4.1 by adding the phrase “Process to”, which would place the responsibility on the entity to define its
process. Additionally, if process is added to the Requirement, the entity proposes adding an example
such as “A documented process used to define provisioned access to BCSI.”
Thank you for your comments. The SDT’s intent in this context is for “provisioned access” to be limited to
what an entity’s program must do (authorize, verify, and revoke) thereby permitting the entity to determine
“how” provisioning occurs. “Provisioned access” is a noun that the represents the result of executing the
program so the security objective is met, and not a verb relating to how provisioning/deprovisioning occurs
(the provisioning/deprovisioning actions and processes are up to the entity to design within the parameters
of the objective.)
An entity expressed that the addition of Requirement R6 for CIP-004 makes it extremely difficult for
entities to control access to BCSI. This is because of the requirement to provision access to individual
pieces of information rather than provisioning access to where information is being stored (Storage
locations).
Thank you for your comments. The SDT’s modifications do not prescribe how to meet the security objective,
nor does it prescribe controls at the individual document level. Using “Storage Locations” is just one method
that could continue to be used within an entity’s access management program when it comes to
authorization, verification, and revocation of access for identified BCSI. The absence of “Storage Locations”
does not preclude an entity from maintaining that approach as their method. The term “Storage Locations”
is too prescriptive (Removing “Storage Locations” provides flexibility), and retention of that term encumbers
the use of emerging technologies and approaches for entities that should have those methods as an option
in addition to (not instead of) the current method.
Summary Response to Comments | Draft 3
Project 2019-02 BES Cyber System Information Access Management
3
Some entities requested clarification whether third-party access should be managed on an individual
or team basis.
Thank you for your comments. The SDT maintained objective language at the requirement level to provide
entities the flexibility to define “how” access is managed. Ultimately, regardless of whether the access is
provisioned on an individual or team basis, the authorization records must trace back to each individual.
There was expressed concern from some entities that Requirement R6 Part 6.1 mirrors Requirement R4
Part 4.1.
Thank you for your comments. The SDT does not agree that the new Requirement R6 Part 6.1 mirrors
Requirement R4 Part 4.1. CIP-004 Requirement R4 focuses on Access Management Programs and CIP-004
Requirement R6 focuses on authorizing, verifying, and revoking provisioned access. The similarities of these
requirements were intentionally drafted. The security concepts and values are comparable, but the
applicability is different. While an entity may leverage one program to support the other, or produce similar
evidence to demonstrate compliance, the difference between them is the existing set of requirements should
focus on BCS Access Management, and the proposed R6 on BCSI Access Management.
A couple of entities expressed concerns about a security gap – Differentiate between state protections
for physical versus electronic BCSI protections.
Thank you for your comments. The SDT does not foresee a security gap. The CIP-004 standard Requirement
R6 is intended to assure personnel (employee and non-employee) authorization, verification, and revocation
of provisioned access to electronic or physical BCSI, whereas CIP-011 Requirement R1 covers the
identification methods for the BCSI itself and the administrative or technical methods (whether electronic or
physical protections) used to assure confidentiality of the BCSI. The SDT determined that, when a
Responsible Entity designates material (whether physical or electronic) as BCSI, it is considered BCSI
regardless of state (storage, transit, or in use) and requires protection under the information protection
program.
Some entities requested the SDT to leverage the language in the current CMEP Practice Guide. State
"access and use" or “obtain and use” in the requirement instead of just "use". Also, incorporate
“Compliance Implementation Guidance Cloud Solutions and Encrypting BES Cyber System Information –
June 2020.”
Thank you for your comments. The SDT considered industry’s concerns about the absence of “obtain and
use” language from the CMEP Practice Guide, which currently provides alignment on a clear a two-pronged
test of what constitutes access in the context of utilizing third-party solutions (e.g., cloud services) for BCSI,
and agrees this is important to incorporate. As a result, the SDT mindfully mirrored this language to assure
future enforceable standards are not reintroducing a gap. The SDT leveraged language from the CMEP
Practice Guide to modify Requirement R6 where necessary. Please see updated modifications.
Summary Response to Comments | Draft 3
Project 2019-02 BES Cyber System Information Access Management
4
An entity expressed the wording “based on need” is not necessary within Requirement R6 Part 6.1.
Thank you for your comments. The SDT considered the wording “based on need” and determined it is
imperative that the Responsible Entity have the authority to determine the business need. Removal of this
language could expose entities to undue compliance risk if it is left subjective as to who determines business
need. Additionally, “based on business need” is included in the current enforceable requirement. Removal
of it could be perceived as materially changing or diluting the requirement that was written to achieve
former FERC directives, or out of scope of the 2019-02 standard authorization request (SAR). As a result, the
SDT chose to retain this language for ultimate clarity that business need is determined by the Responsible
Entity.
An entity expressed that the “CIP Exceptional Circumstances” is not necessary for Requirement R6 Part
6.1.
Thank you for your comments. The SDT has identified use cases where it may not be reasonable to expect
an entity to execute its authorization processes to provision BCSI access, particularly in the case of physical
BCSI and physical access needs of first responders in situations of medical, safety, or other emergencies as
defined by CIP Exceptional Circumstances.
An entity expressed that the measures in Requirement R6 Part 6.1 “Dated authorization records for
provisioned access to BCSI based on need.” The statement “based on need” is not necessary here. If it is,
then be clear on the expectations that the evidence needs to document the business need.
Thank you for your comments. The SDT considered the consistency concern from the presence of “based on
need” in the requirement and the way it had been used within the measure. For clarity, the SDT adjusted the
bullet in the measures to provide meaningful examples of evidence for “business need”.
Measures
An entity expressed concern that the CIP-004 Requirement R6 Part 6.2 measures are too detailed when
referring to privileges. Many types of access to BCSI are binary, either you have it or you do not.
Recommend the SDT remove the 3rd and 4th bullets in the measure so that an entity could simply verify
that the access is still necessary and appropriate for their job.
Thank you for your comments. The SDT reviewed the measures and updated them by removing the third
and fourth bullets.
An entity proposed using a third-party example in the measures for Requirement R6.
Thank you for your comments. The SDT wrote the measures to apply to internal or external personnel. For
this reason, the SDT did not cite a specific third-party example.
Summary Response to Comments | Draft 3
Project 2019-02 BES Cyber System Information Access Management
5
CIP-011 Revisions
The SDT appreciates all comments submitted regarding the CIP-011 draft standard. The SDT reviewed each
comment carefully and made respective changes where clarity or examples were needed.
Many entities expressed concern regarding CIP-011 Requirement R1 Part 1.3 and 1.4. In addition, some
entities expressed that backwards compatibility would be difficult with the additional burden these
subparts place on entities. Lastly, many entities requested clarity around certain wording and language.
(e.g., “utilizing”, consistent language with the standards authorization request (SAR), etc.)
Thank you for your comments. The SDT removed Part 1.3 and 1.4 from the CIP-011 standard which should
alleviate backwards compatibility concerns and consistency with the language from the SAR.
A few entities stated that the new Requirement R1 Part 1.3 should be housed in CIP-013.
Thank you for your comments. The SDT removed Requirement R1 Part 1.3. As far as moving it to CIP-013,
that is outside the scope of this project. Anyone is welcome to submit a SAR. The forms are located on the
NERC Standards Resources page (link).
An entity requested the SDT be consistent between requirements and measures within CP-011
Requirement R3 Part 1.3.
Thank you for your comments. The SDT removed Requirement R3 Part 1.3 from CIP-011 and ensures that
future requirements and measures are closely reviewed for consistency.
An entity requested the SDT confirm redlines posted for ballot and comment are correct.
Thank you for your comments, our apologies for the confusion. The SDT ensures the standard’s redline and
clean versions align for the next posting.
Measures
An entity requested the SDT be consistent throughout the opening of the measures.
Thank you for your comments. The SDT agrees with this request and modified the measures accordingly.
Some entities expressed concern that the measures for CIP-011 Requirement R1 Part 1.2 could provide
audit approach confusion and requested that additional examples be provided.
Thank you for your comments. The SDT modified Requirement R1 Part 1.2 to provide clarity and additional
examples.
Summary Response to Comments | Draft 3
Project 2019-02 BES Cyber System Information Access Management
6
Technical Rationale
An entity expressed that the TR for CIP-011, part 1.4, implies there would always be the state "use" in all
vendor solutions. However, in this entity’s experience that is not always the case, and also depends on
the individual's interpretation of what "use" of BCSI means. A common example where there would not
be "use" in the cloud is backup storage. (Where the data is sent already encrypted and in order to use it
(aka restore) has to be called back to the customer's premises to be unencrypted.) The entity
recommended the SDT remove "use", or instead change the entire paragraph to refer to the lifecycle of
the data from transit to disposal.
Thank you for your comments. The SDT removed CIP-011 Requirement R1 Part 1.4 from the standard;
therefore, it has been removed from the TR.
Violation Risk Factors (VRFs) and Violation Severity Levels (VSLs)
The SDT appreciates all comments submitted regarding the VRF and VSL parts of the standards. The SDT
reviewed each comment carefully and made respective changes where clarity or examples were needed.
Many entities expressed concern that the VSLs do not adequately reflect the severity of a possible
violation for CIP-004 and CIP-011 modifications.
Thank you for your comments. The SDT reviewed the VSLs and modified them based on comments
received.
Any entity requested that the SDT consider updating the VRF for CIP-011 Requirement R1 and
Requirement R2 from a medium to a high. The basis for these reasonings are (R1) on the possible
extension of BCSI to cloud providers, and the fact that there have been significantly more sophisticated,
and a greater volume of, attacks against the energy industry, especially through phishing; (R2) with
known foreign ownership, control, or involvement in PC reclamation and recycling, and the focus of
foreign adversaries trying to gain access, cause damage, or control the US Power grid.
Thank you for your comments. The SDT reviewed the VRFs for CIP-004 and CIP-011 and determined that the
standard requirements and modifications do not directly affect the grid. Therefore, the VRFs should remain
a medium.
Implementation Plan
The SDT appreciates all comments submitted regarding the 18-month proposed implementation plan. The
SDT reviewed each comment carefully and made respective changes where clarity or examples were
needed.
Summary Response to Comments | Draft 3
Project 2019-02 BES Cyber System Information Access Management
7
18-month Implementation
In general, a majority of commenters agreed with the 18-month implementation plan. Some entities
suggested 24-months as a more appropriate timeframe with the option for early adoption. It was further
explained in comments that 24-months would be appropriate based on the need to revise their existing
BCSI programs, an entity working with a vendor service to store, utilize, or analyze BCSI to ensure the
appropriate controls have been implemented, etc.
Thank you for your comments. The SDT determined that a 24-month implementation plan would be an
appropriate timeframe based on the comments received. In addition, Project 2019-02 is working closely with
Project 2016-02 Modification to CIP Standards towards a seamless transition as both projects aim to
combine the implementation plans later this year for NERC Board adoption. The SDT also determined that
an early adoption within the implementation plan would be an appropriate modification. The SDT has
modified the implementation plan to allow entities 24-months for implementation or early adoption based
on discussion and agreement made with the entity’s respective Region.
A couple of entities mentioned that implementation would be difficult based on ambiguity and
uncertainty around respective requirements.
Thank you for your comments. The SDT encourages entities to review the provided responses to the
questions regarding those respective requirements.
A couple of entities mentioned phased-in implementation should be allowed.
Thank you for your comments. The SDT believes that 24-months should allow entities ample time, and a
phased-in approach is not necessary. In addition, an option for early adoption was added to the
implementation plan for entities who wish to adopt the modifications sooner.
Cost-effectiveness
The SDT appreciates all comments submitted regarding cost-effectiveness among the standard
modifications. The SDT reviewed each comment carefully and made respective changes where needed.
Some entities expressed concern around scope of applicability, ambiguity, unclear requirements,
administrative burden, uncertainty around the word provision and how it would be used with third-party
providers, etc.
Thank you for your comments. The SDT encourages entities to review the modifications made throughout
the CIP-004 and CIP-011 Reliability Standards. In regards to the word provisioned, please see the TR
document as it provides a thorough explanation of the word/term provision or provisioned access. This is a
commonly used term among technical experts and should not cause a cost-effectiveness constraint on
entities. Please also refer to the SDT’s explanation under the title “Provisioned Access.”
Summary Response to Comments | Draft 3
Project 2019-02 BES Cyber System Information Access Management
8
Standards Announcement
Project 2019-02 BES Cyber System Information Access
Management
Formal Comment Period Open through September 21, 2020
Now Available
A 45-day formal comment period for Project 2019-02 BES Cyber System Information Access
Management is open through 8 p.m. Eastern, Monday, September 21, 2020 for the following
Standards and Implementation Plan:
CIP-004-7 - Cyber Security - Personnel & Training
CIP-011-3 - Cyber Security - Information Protection
Implementation Plan
Commenting
Use the Standards Balloting and Commenting System (SBS) to submit comments. Contact Linda Jenkins
regarding issues using the SBS. An unofficial Word version of the comment form is posted on the
project page.
•
Contact NERC IT support directly at https://support.nerc.net/ (Monday – Friday, 8 a.m. - 5
p.m. Eastern) for problems regarding accessing the SBS due to a forgotten password,
incorrect credential error messages, or system lock-out.
•
Passwords expire every 6 months and must be reset.
•
The SBS is not supported for use on mobile devices.
•
Please be mindful of ballot and comment period closing dates. We ask to allow at least 48
hours for NERC support staff to assist with inquiries. Therefore, it is recommended that users try
logging into their SBS accounts prior to the last day of a comment/ballot period.
Next Steps
Additional ballots for the standards and implementation plan, along with non-binding polls for each
associated Violation Risk Factors and Violation Severity Levels will be conducted September 11–21,
2020.
For more information on the Standards Development Process, refer to the Standard Processes Manual.
Subscribe to this project's observer mailing list by selecting "NERC Email Distribution Lists" from the
"Service" drop-down menu and specify “Project 2019-02 BES Cyber System Information Access
Management” in the Description Box. For more information or assistance, contact Senior Standards
Developer, Latrice Harkness (via email) or at 404-446-9728.
RELIABILITY | RESILIENCE | SECURITY
North American Electric Reliability Corporation
3353 Peachtree Rd, NE
Suite 600, North Tower
Atlanta, GA 30326
404-446-2560 | www.nerc.com
Standards Announcement
Project 2019-02 BES Cyber System Information Access Management | August 2020
2
NERC Balloting Tool
Dashboard
Users
Registered Ballot Body
Proxy Ballot Body
My User Profile
Ballots
Ballot Events
Ballot Results
Comment Forms
View Comment Forms
Login / Register
Ballot Results
Comment: View Comment Results
Ballot Name:
2019-02 BES Cyber System Information Access Management CIP-004-7 AB 2 ST
Voting Start Date:
9/11/2020 12:01:00 AM
Voting End Date:
9/21/2020 8:00:00 PM
Ballot Type:
ST
Ballot Activity:
AB
Ballot Series:
2
Total # Votes:
232
Total Ballot Pool:
279
Quorum:
83.15
Quorum Established Date:
9/21/2020 2:58:09 PM
Weighted Segment Value:
32.8
Actions
Actions
Negative
Fraction w/
Comment
Ballot Segment Affirmative Affirmative Negative Votes
Segment
Pool Weight
Votes
Fraction w/ Comment
Segment:
79
1
Segment:
2
2
Segment:
60
3
Segment:
17
4
Segment:
69
5
Segment:
45
6
Segment:
0
7
Segment:
1
8
Negative Votes
No
Abstain
w/o Comment
Vote
1
20
0.328
41
0.672
0
5
13
0.2
0
0
2
0.2
0
0
0
1
18
0.375
30
0.625
0
4
8
1
5
0.417
7
0.583
0
0
5
1
17
0.327
35
0.673
0
5
12
1
9
0.29
22
0.71
2
3
9
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
Segment:
0
9
Segment:
6
10
Totals: 279
0
0
0
0
0
0
0
0
0.4
1
0.1
3
0.3
0
2
0
5.6
70
1.837
140
3.763
2
20
47
Ballot Pool Members
Segment
Organization
Voter
Designated
Proxy
Ballot
3
Con Ed - Consolidated Edison Co. of New York Peter Yost
Negative
6
Con Ed - Consolidated Edison Co. of New York Cristhian Godoy
Negative
5
Ontario Power Generation Inc.
4
Utility Services, Inc.
3
Ameren - Ameren Services
3
5
3
5
1
1
4
1
6
2
5
3
3
3
5
1
1
Constantin
Chitescu
Brian EvansMongeon
David Jendras
Negative
None
NERC
Memo
Third-Party
Comments
Third-Party
Comments
Third-Party
Comments
N/A
Affirmative N/A
Third-Party
WEC Energy Group, Inc.
Thomas Breene
Negative
Comments
Edison International - Southern California Edison
Third-Party
Neil Shockey
Negative
Company
Comments
MEAG Power
Roger Brand
Scott Miller Affirmative N/A
Third-Party
Con Ed - Consolidated Edison Co. of New York William Winters
Negative
Comments
MEAG Power
David Weekley Scott Miller Affirmative N/A
IDACORP - Idaho Power Company
Laura Nelson
Affirmative N/A
Seminole Electric Cooperative, Inc.
Jonathan Robbins
Affirmative N/A
Third-Party
Con Ed - Consolidated Edison Co. of New York Dermot Smyth
Negative
Comments
Third-Party
WEC Energy Group, Inc.
David Hathaway
Negative
Comments
Comments
Independent Electricity System Operator
Leonard Kula
Negative
Submitted
Massachusetts Municipal Wholesale Electric
Anthony Stevens
Affirmative N/A
Company
Comments
Sempra - San Diego Gas and Electric
Bridget Silvia
Negative
Submitted
Third-Party
Basin Electric Power Cooperative
Jeremy Voll
Negative
Comments
Edison International - Southern California Edison
Third-Party
Romel Aquino
Negative
Company
Comments
NRG - NRG Energy, Inc.
Patricia Lynch
Affirmative N/A
Third-Party
National Grid USA
Michael Jones
Negative
Comments
Third-Party
Western Area Power Administration
sean erickson
Barry Jones Negative
1
1
6
6
3
5
1
6
5
4
1
3
1
6
3
6
3
3
4
5
6
5
3
1
1
10
1
Comments
Edison International - Southern California Edison Jose Avendano
Third-Party
Negative
Company
Mora
Comments
Ameren - Ameren Services
Tamara Evey
Affirmative N/A
Ameren - Ameren Services
Robert Quinlivan
Affirmative N/A
Black Hills Corporation
Brooke Voorhees
None
N/A
Third-Party
National Grid USA
Brian Shanahan
Negative
Comments
Ameren - Ameren Missouri
Sam Dwyer
Affirmative N/A
Comments
Balancing Authority of Northern California
Kevin Smith
Joe Tarantino Negative
Submitted
Comments
Sacramento Municipal Utility District
Jamie Cutlip
Joe Tarantino Negative
Submitted
Comments
Sacramento Municipal Utility District
Nicole Goi
Joe Tarantino Negative
Submitted
Comments
Sacramento Municipal Utility District
Beth Tincher
Joe Tarantino Negative
Submitted
Arthur
Comments
Sacramento Municipal Utility District
Joe Tarantino Negative
Starkovich
Submitted
Comments
Sacramento Municipal Utility District
Nicole Looney Joe Tarantino Negative
Submitted
International Transmission Company Holdings
Third-Party
Michael Moltane Gail Elliott Negative
Corporation
Comments
Seattle City Light
Brian Belger
None
N/A
Comments
Puget Sound Energy, Inc.
Tim Womack
Negative
Submitted
Third-Party
PPL - Louisville Gas and Electric Co.
Linn Oelker
Negative
Comments
Third-Party
PPL - Louisville Gas and Electric Co.
James Frank
Negative
Comments
APS - Arizona Public Service Co.
Jessica Lopez
Affirmative N/A
Seattle City Light
Hao Li
None
N/A
Comments
Puget Sound Energy, Inc.
Lynn Murphy
Negative
Submitted
Third-Party
Western Area Power Administration
Erin Green
Negative
Comments
Comments
Sempra - San Diego Gas and Electric
Jennifer Wright
Negative
Submitted
Comments
Tennessee Valley Authority
Ian Grant
Negative
Submitted
Comments
Tennessee Valley Authority
Gabe Kurtz
Negative
Submitted
Nebraska Public Power District
Jamison Cawley
Affirmative N/A
ALAN
Third-Party
New York State Reliability Council
Negative
ADAMSON
Comments
Third-Party
City Utilities of Springfield, Missouri
Michael Bowman
Negative
Comments
Third-Party
Comments
Affirmative N/A
Comments
Negative
Submitted
Third-Party
Negative
Comments
4
City Utilities of Springfield, Missouri
John Allen
5
Avista - Avista Corporation
1
SaskPower
Glen Farmer
Wayne
Guttormson
1
Allete - Minnesota Power, Inc.
Jamie Monette
1
APS - Arizona Public Service Co.
Daniela
Atanasovski
Affirmative N/A
10
Midwest Reliability Organization
Russel Mountjoy
Negative
5
APS - Arizona Public Service Co.
Public Utility District No. 2 of Grant County,
Washington
APS - Arizona Public Service Co.
Public Utility District No. 2 of Grant County,
Washington
Kelsi Rigby
Comments
Submitted
Affirmative N/A
LeRoy Patterson
Affirmative N/A
Marcus Bortman
Affirmative N/A
Amy Jones
Affirmative N/A
6
6
5
1
Dairyland Power Cooperative
3
Berkshire Hathaway Energy - MidAmerican
Energy Co.
Tacoma Public Utilities (Tacoma, WA)
6
Tennessee Valley Authority
5
Austin Energy
1
Puget Sound Energy, Inc.
4
WEC Energy Group, Inc.
5
Platte River Power Authority
1
Glencoe Light and Power Commission
1
Network and Security Technologies
3
Third-Party
Comments
Comments
Darnez Gresham
Negative
Submitted
Marc Donaldson Jennie Wike None
N/A
Comments
Marjorie Parsons
Negative
Submitted
Lisa Martin
Affirmative N/A
Comments
Chelsey Neil
Negative
Submitted
Third-Party
Matthew Beilfuss
Negative
Comments
Third-Party
Tyson Archie
Negative
Comments
Third-Party
Terry Volkmann
Negative
Comments
Roger
Comments
Nicholas Lauriat
Negative
Fradenburgh
Submitted
Renee Leidel
Negative
Kevin Conway
Abstain
Michael Jang
Quintin Lee
None
N/A
Affirmative N/A
Third-Party
Negative
Comments
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
Affirmative N/A
1
1
Public Utility District No. 1 of Pend Oreille
County
Seattle City Light
Eversource Energy
6
Basin Electric Power Cooperative
Jerry Horner
1
Minnkota Power Cooperative Inc.
Theresa Allard
3
Associated Electric Cooperative, Inc.
Todd Bennett
3
Platte River Power Authority
Wade Kiess
6
Associated Electric Cooperative, Inc.
Brian Ackermann
1
Negative
Andy
Fuhrman
N/A
1
3
1
5
Central Electric Power Cooperative (Missouri)
M and A Electric Power Cooperative
KAMO Electric Cooperative
Associated Electric Cooperative, Inc.
Michael Bax
Stephen Pogue
Micah Breedlove
Brad Haralson
Skyler
Wiegmann
Tony Gott
Jarrod Murdaugh
Peter Dawson
Chris Gowder
Carol Chinn
Dale Ray
Richard
Montgomery
Kevin White
Mark Ramsey
John Stickley
Payam
Farahbakhsh
3
Northeast Missouri Electric Power Cooperative
3
3
1
5
4
3
KAMO Electric Cooperative
Sho-Me Power Electric Cooperative
Sho-Me Power Electric Cooperative
Florida Municipal Power Agency
Florida Municipal Power Agency
Florida Municipal Power Agency
6
Florida Municipal Power Agency
1
1
3
Northeast Missouri Electric Power Cooperative
N.W. Electric Power Cooperative, Inc.
NW Electric Power Cooperative, Inc.
1
Hydro One Networks, Inc.
6
Platte River Power Authority
Sabrina Martz
5
1
Los Angeles Department of Water and Power
Tacoma Public Utilities (Tacoma, WA)
Glenn Barry
John Merrell
5
Brazos Electric Power Cooperative, Inc.
Shari Heino
5
Herb Schrayshuen
3
Lakeland Electric
Herb
Schrayshuen
Steve Marshall
3
Georgia System Operations Corporation
Scott McGough
1
Manitoba Hydro
Bruce Reimer
1
Long Island Power Authority
Robert Ganley
5
Manitoba Hydro
Yuguang Xiao
3
Manitoba Hydro
3
Los Angeles Department of Water and Power
Karim AbdelHadi
Tony Skourtas
1
Tri-State G and T Association, Inc.
Kjersti Drott
5
Tri-State G and T Association, Inc.
Ryan Walter
4
FirstEnergy - FirstEnergy Corporation
3
Tri-State G and T Association, Inc.
5
Talen Generation, LLC
Mark Garza
Janelle Marriott
Gill
Donald Lock
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Truong Le
Truong Le
Truong Le
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Truong Le
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Comments
Mark Ciufo Negative
Submitted
Comments
Negative
Submitted
Abstain
N/A
Jennie Wike None
N/A
Third-Party
Negative
Comments
Affirmative N/A
None
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Third-Party
Negative
Comments
Comments
Negative
Submitted
Comments
Negative
Submitted
Abstain
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
None
N/A
1
5
Lakeland Electric
Lakeland Electric
Larry Watt
Becky Rinier
6
OGE Energy - Oklahoma Gas and Electric Co.
Sing Tay
3
1
Eversource Energy
Tallahassee Electric (City of Tallahassee, FL)
Sharon Flannery
Scott Langston
5
Oglethorpe Power Corporation
Donna Johnson
1
1
5
1
Los Angeles Department of Water and Power
Black Hills Corporation
Black Hills Corporation
Seminole Electric Cooperative, Inc.
faranak sarbaz
Seth Nelson
Derek Silbaugh
Bret Galbraith
6
NiSource - Northern Indiana Public Service Co. Joe O'Brien
3
NiSource - Northern Indiana Public Service Co. Steven Taddeucci
6
New York Power Authority
6
Talen Energy Marketing, LLC
1
1
FirstEnergy - FirstEnergy Corporation
M and A Electric Power Cooperative
3
Dominion - Dominion Resources, Inc.
3
Muscatine Power and Water
Seth Shoemaker
6
Muscatine Power and Water
Nick Burns
3
OGE Energy - Oklahoma Gas and Electric Co.
Donald Hargrove
3
Westar Energy
Bryan Taggart
5
Westar Energy
Derek Brown
6
Westar Energy
Grant Wilkerson
6
Southern Company - Southern Company
Generation
FirstEnergy - FirstEnergy Solutions
William D.
Shultz
Ann Carey
6
Manitoba Hydro
Blair Mukanik
1
Westar Energy
Allen Klassen
5
Tennessee Valley Authority
M Lee Thomas
3
FirstEnergy - FirstEnergy Corporation
Aaron
Ghodooshim
5
Erick Barrios
Jennifer
Hohenshilt
Julie Severino
William Price
Connie
Schroeder
None
None
N/A
N/A
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
Third-Party
Negative
Comments
Abstain
N/A
None
N/A
None
N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
None
N/A
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
1
OGE Energy - Oklahoma Gas and Electric Co.
Terri Pyle
3
Black Hills Corporation
Don Stahl
6
PSEG - PSEG Energy Resources and Trade LLC Joseph Neglia
3
Nebraska Public Power District
Tony Eddleman
5
Northern California Power Agency
Marty Hostler
3
CMS Energy - Consumers Energy Company
5
CMS Energy - Consumers Energy Company
Karl Blaszkowski
David
Greyerbiehl
4
Georgia System Operations Corporation
1
New York Power Authority
1
OTP - Otter Tail Power Company
5
PSEG - PSEG Fossil LLC
Tim Kucey
5
3
3
OTP - Otter Tail Power Company
OTP - Otter Tail Power Company
Owensboro Municipal Utilities
Brett Jacobs
Wendi Olson
Thomas Lyons
1
Hydro-Qu?bec TransEnergie
Nicolas Turcotte
4
MGE Energy - Madison Gas and Electric Co.
Joseph DePoorter
5
6
Entergy - Entergy Services, Inc.
Portland General Electric Co.
Gail Golden
Daniel Mason
1
Muscatine Power and Water
Andy Kurriger
3
New York Power Authority
David Rivera
1
BC Hydro and Power Authority
Adrian Andreoiu
1
NiSource - Northern Indiana Public Service Co. Steve Toosevich
5
NiSource - Northern Indiana Public Service Co. Kathryn Tackett
3
BC Hydro and Power Authority
Hootan Jarollahi
6
Los Angeles Department of Water and Power
Anton Vu
1
Omaha Public Power District
Doug Peterchuck
5
10
FirstEnergy - FirstEnergy Solutions
SERC Reliability Corporation
Robert Loy
Dave Krueger
1
Platte River Power Authority
Matt Thompson
Andrea Barclay
Salvatore
Spagnolo
Charles
Wicklund
Comments
Submitted
None
N/A
No Comment
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
Affirmative N/A
Negative
Affirmative N/A
Negative
Negative
None
Comments
Submitted
Comments
Submitted
N/A
Third-Party
Comments
None
N/A
None
N/A
Abstain
N/A
Comments
Negative
Submitted
Third-Party
Negative
Comments
None
N/A
None
N/A
Third-Party
Negative
Comments
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Abstain
N/A
Third-Party
Negative
Comments
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Negative
5
JEA
John Babik
2
Electric Reliability Council of Texas, Inc.
Brandon Gleason
6
5
1
6
Seminole Electric Cooperative, Inc.
Imperial Irrigation District
Sunflower Electric Power Corporation
Imperial Irrigation District
David Reinecke
Tino Zaragoza
Paul Mehlhaff
Diana Torres
1
Public Utility District No. 1 of Chelan County
Ginette Lacasse
5
Public Utility District No. 1 of Chelan County
Meaghan Connell
1
Imperial Irrigation District
Jesus Sammy
Alcaraz
Affirmative N/A
3
Public Utility District No. 1 of Chelan County
Joyce Gundry
Negative
5
BC Hydro and Power Authority
Helen Hamilton
Harding
Negative
Lynn Goldstein
None
Nurul Abser
Abstain
1
PNM Resources - Public Service Company of
New Mexico
NB Power Corporation
5
Dairyland Power Cooperative
1
Berkshire Hathaway Energy - MidAmerican
Energy Co.
5
Hydro-Qu?bec Production
5
3
5
3
Tacoma Public Utilities (Tacoma, WA)
Imperial Irrigation District
Portland General Electric Co.
Portland General Electric Co.
5
PPL - Louisville Gas and Electric Co.
5
Berkshire Hathaway - NV Energy
3
Pacific Gas and Electric Company
1
Pacific Gas and Electric Company
1
6
3
5
Santee Cooper
Santee Cooper
Santee Cooper
Santee Cooper
5
WEC Energy Group, Inc.
6
Dominion - Dominion Resources, Inc.
1
Abstain
N/A
Third-Party
Negative
Comments
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Submitted
Comments
Submitted
N/A
N/A
Third-Party
Tommy Drea
Negative
Comments
Comments
Terry Harbour
Negative
Submitted
Comments
Carl Pineault
Negative
Submitted
Ozan Ferrin
Jennie Wike None
N/A
Glen Allegranza
Affirmative N/A
Ryan Olson
None
N/A
Dan Zollner
None
N/A
JULIE
Third-Party
Negative
HOSTRANDER
Comments
Comments
Kevin Salsbury
Negative
Submitted
Michael
Comments
Sandra Ellis
Negative
Johnson
Submitted
Michael
Comments
Marco Rios
Negative
Johnson
Submitted
Chris Wagner
Abstain
N/A
Marty Watson
Abstain
N/A
James Poston
Abstain
N/A
Tommy Curtis
Abstain
N/A
Third-Party
Janet OBrien
Negative
Comments
Comments
Sean Bodkin
Negative
Submitted
Third-Party
1
1
5
4
6
1
5
6
6
1
1
5
3
5
5
10
6
6
1
4
5
4
1
3
5
6
1
3
5
PPL Electric Utilities Corporation
Preston Walker
Negative
Comments
Gainesville Regional Utilities
David Owens
Truong Le
Affirmative N/A
Kayleigh
Comments
Lincoln Electric System
Negative
Wilkerson
Submitted
Tacoma Public Utilities (Tacoma, WA)
Hien Ho
Jennie Wike None
N/A
Comments
Northern California Power Agency
Dennis Sismaet
Negative
Submitted
Portland General Electric Co.
Brooke Jockin
None
N/A
Michael
Comments
Pacific Gas and Electric Company
Ed Hanson
Negative
Johnson
Submitted
Tacoma Public Utilities (Tacoma, WA)
Terry Gifford
Jennie Wike None
N/A
Donna
Third-Party
Great River Energy
Negative
Stephenson
Comments
NextEra Energy - Florida Power and Light Co. Mike ONeil
Affirmative N/A
Southern Company - Southern Company
Comments
Matt Carden
Negative
Services, Inc.
Submitted
Third-Party
Choctaw Generation Limited Partnership, LLLP Rob Watson
Negative
Comments
Seminole Electric Cooperative, Inc.
Jeremy Lorigan
Affirmative N/A
Comments
Dominion - Dominion Resources, Inc.
Rachel Snead
Negative
Submitted
Nebraska Public Power District
Ronald Bender
Affirmative N/A
Northeast Power Coordinating Council
Guy V. Zito
Abstain
N/A
Comments
Berkshire Hathaway - PacifiCorp
Sandra Shaffer
Negative
Submitted
Gordon DobsonThird-Party
Powerex Corporation
Negative
Mack
Comments
LaTroy
American Transmission Company, LLC
Affirmative N/A
Brumfield
Comments
Alliant Energy Corporation Services, Inc.
Larry Heckert
Negative
Submitted
Comments
New York Power Authority
Shivaz Chopra
Negative
Submitted
Public Utility District No. 2 of Grant County,
Karla Weaver
Affirmative N/A
Washington
Comments
Exelon
Daniel Gacek
Negative
Submitted
Comments
Exelon
Kinte Whitehead
Negative
Submitted
Comments
Exelon
Cynthia Lee
Negative
Submitted
Comments
Exelon
Becky Webb
Negative
Submitted
Entergy - Entergy Services, Inc.
Oliver Burke
Affirmative N/A
City Utilities of Springfield, Missouri
Duan Gavel
None
N/A
Enel Green Power
Mat Bunch
Abstain
N/A
No Comment
6
Xcel Energy, Inc.
Carrie Dixon
5
Xcel Energy, Inc.
Gerry Huitt
1
Xcel Energy, Inc.
Dean Schiro
4
1
CMS Energy - Consumers Energy Company
Memphis Light, Gas and Water Division
1
Bonneville Power Administration
Aric Root
Allan Long
Kammy RogersHolliday
6
Bonneville Power Administration
Andrew Meyers
3
Bonneville Power Administration
Ken Lanehome
5
Bonneville Power Administration
Scott Winner
5
Great River Energy
Jacalynn Bentz
1
Georgia Transmission Corporation
Greg Davis
3
Xcel Energy, Inc.
Ray Jasicki
3
Snohomish County PUD No. 1
Holly Chaney
4
5
6
Public Utility District No. 1 of Snohomish
County
Public Utility District No. 1 of Snohomish
County
Snohomish County PUD No. 1
5
1
1
6
Public Utility District No. 1 of Snohomish
County
AEP
AEP - AEP Service Corporation
Oncor Electric Delivery
AEP
10
ReliabilityFirst
3
Austin Energy
5
5
5
Cogentrix Energy Power Management, LLC
Seminole Electric Cooperative, Inc.
Cowlitz County PUD
Florida Reliability Coordinating Council –
Member Services Division
AEP
Lakeland Electric
Texas Reliability Entity, Inc.
1
8
3
6
10
John Martinsen
Sam Nietfeld
John Liang
Alyssia Rhoads
Thomas Foltz
Dennis Sauriol
Lee Maurer
JT Kuehne
Anthony
Jablonski
W. Dwayne
Preston
Gerry Adamski
Mickey Bellard
Deanna Carlson
Negative
Submitted
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Affirmative N/A
None
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Vince Ordax
Abstain
N/A
Kent Feliks
Paul Shipps
Rachel Coyne
Affirmative N/A
None
N/A
Abstain
N/A
6
5
3
4
4
Duke Energy
Duke Energy
Duke Energy
National Rural Electric Cooperative Association
Arkansas Electric Cooperative Corporation
Abstain
Abstain
Abstain
None
None
N/A
N/A
N/A
N/A
N/A
None
N/A
Arkansas Electric Cooperative Corporation
Arkansas Electric Cooperative Corporation
Arkansas Electric Cooperative Corporation
Greg Cecil
Dale Goodwine
Lee Schuster
Paul McCurley
Alice Wright
Jennifer
Loiacano
Bruce Walkup
Mark Gann
Adrian Harris
1
Arkansas Electric Cooperative Corporation
6
3
5
None
None
None
1
East Kentucky Power Cooperative
Amber Skillern
Negative
3
East Kentucky Power Cooperative
Patrick Woods
Negative
1
Duke Energy
Laura Lee
Abstain
1
Arizona Electric Power Cooperative, Inc.
Jennifer Bray
Negative
5
East Kentucky Power Cooperative
mark brewer
Negative
3
Wabash Valley Power Association
Susan Sosbe
Negative
5
SunPower
None
6
Evergy
None
N/A
1
3
5
5
6
Evergy
Evergy
Evergy
FirstEnergy - FirstEnergy Corporation
FirstEnergy - FirstEnergy Corporation
Bradley Collard
Thomas
ROBBEN
Allen Klassen
Marcus Moor
Derek Brown
Robert Loy
Ann Carey
N/A
N/A
N/A
Third-Party
Comments
Third-Party
Comments
N/A
Comments
Submitted
Third-Party
Comments
Third-Party
Comments
N/A
None
None
None
None
None
N/A
N/A
N/A
N/A
N/A
© 2021 - NERC Ver 4.3.0.0
Machine Name: ERODVSBSWB02
NERC Balloting Tool
Dashboard
Users
Registered Ballot Body
Proxy Ballot Body
My User Profile
Ballots
Ballot Events
Ballot Results
Comment Forms
View Comment Forms
Login / Register
Ballot Results
Comment: View Comment Results
Ballot Name:
2019-02 BES Cyber System Information Access Management CIP-011-3 AB 2 ST
Voting Start Date:
9/11/2020 12:01:00 AM
Voting End Date:
9/21/2020 8:00:00 PM
Ballot Type:
ST
Ballot Activity:
AB
Ballot Series:
2
Total # Votes:
228
Total Ballot Pool:
278
Quorum:
82.01
Quorum Established Date:
9/21/2020 3:01:23 PM
Weighted Segment Value:
23.06
Actions
Actions
Negative
Fraction w/
Comment
Ballot Segment Affirmative Affirmative Negative Votes
Segment
Pool Weight
Votes
Fraction w/ Comment
Segment:
79
1
Segment:
2
2
Segment:
59
3
Segment:
17
4
Segment:
69
5
Segment:
45
6
Segment:
0
7
Segment:
1
8
Negative Votes
No
Abstain
w/o Comment
Vote
1
12
0.197
49
0.803
0
5
13
0.2
0
0
2
0.2
0
0
0
1
9
0.196
37
0.804
0
4
9
1
4
0.333
8
0.667
0
0
5
1
13
0.255
38
0.745
1
4
13
1
6
0.188
26
0.813
1
3
9
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
Segment:
0
9
Segment:
6
10
Totals: 278
0
0
0
0
0
0
0
0
0.3
1
0.1
2
0.2
0
2
1
5.5
45
1.268
162
4.232
2
19
50
Ballot Pool Members
Segment
Organization
Voter
Designated
Proxy
Ballot
3
Con Ed - Consolidated Edison Co. of New York Peter Yost
Negative
6
Con Ed - Consolidated Edison Co. of New York Cristhian Godoy
Negative
4
Utility Services, Inc.
3
Ameren - Ameren Services
3
5
5
3
5
1
1
4
1
6
2
5
3
3
3
5
1
Brian EvansMongeon
David Jendras
None
NERC
Memo
Third-Party
Comments
Third-Party
Comments
N/A
Affirmative N/A
Third-Party
WEC Energy Group, Inc.
Thomas Breene
Negative
Comments
Constantin
Third-Party
Ontario Power Generation Inc.
Negative
Chitescu
Comments
Edison International - Southern California Edison
Third-Party
Neil Shockey
Negative
Company
Comments
MEAG Power
Roger Brand
Scott Miller Affirmative N/A
Third-Party
Con Ed - Consolidated Edison Co. of New York William Winters
Negative
Comments
MEAG Power
David Weekley Scott Miller Affirmative N/A
IDACORP - Idaho Power Company
Laura Nelson
Affirmative N/A
Comments
Seminole Electric Cooperative, Inc.
Jonathan Robbins
Negative
Submitted
Third-Party
Con Ed - Consolidated Edison Co. of New York Dermot Smyth
Negative
Comments
Third-Party
WEC Energy Group, Inc.
David Hathaway
Negative
Comments
Comments
Independent Electricity System Operator
Leonard Kula
Negative
Submitted
Massachusetts Municipal Wholesale Electric
Anthony Stevens
Affirmative N/A
Company
Comments
Sempra - San Diego Gas and Electric
Bridget Silvia
Negative
Submitted
Third-Party
Basin Electric Power Cooperative
Jeremy Voll
Negative
Comments
Edison International - Southern California Edison
Third-Party
Romel Aquino
Negative
Company
Comments
NRG - NRG Energy, Inc.
Patricia Lynch
Affirmative N/A
Third-Party
National Grid USA
Michael Jones
Negative
Comments
1
Western Area Power Administration
sean erickson
1
6
6
Edison International - Southern California Edison Jose Avendano
Company
Mora
Ameren - Ameren Services
Tamara Evey
Ameren - Ameren Services
Robert Quinlivan
Black Hills Corporation
Brooke Voorhees
3
National Grid USA
Brian Shanahan
5
Ameren - Ameren Missouri
Sam Dwyer
1
Balancing Authority of Northern California
Kevin Smith
6
Sacramento Municipal Utility District
Jamie Cutlip
5
Sacramento Municipal Utility District
Nicole Goi
4
Sacramento Municipal Utility District
Beth Tincher
1
Sacramento Municipal Utility District
Arthur
Starkovich
3
Sacramento Municipal Utility District
Nicole Looney
1
6
International Transmission Company Holdings
Corporation
Seattle City Light
Brian Belger
3
Puget Sound Energy, Inc.
Tim Womack
6
PPL - Louisville Gas and Electric Co.
Linn Oelker
3
PPL - Louisville Gas and Electric Co.
James Frank
3
4
APS - Arizona Public Service Co.
Seattle City Light
Jessica Lopez
Hao Li
5
Puget Sound Energy, Inc.
Lynn Murphy
6
Western Area Power Administration
Erin Green
5
Sempra - San Diego Gas and Electric
Jennifer Wright
3
Tennessee Valley Authority
Ian Grant
1
Tennessee Valley Authority
Gabe Kurtz
1
Nebraska Public Power District
Jamison Cawley
10
New York State Reliability Council
ALAN
ADAMSON
1
Michael Moltane
Third-Party
Comments
Third-Party
Negative
Comments
Affirmative N/A
Affirmative N/A
None
N/A
Third-Party
Negative
Comments
Affirmative N/A
Comments
Joe Tarantino Negative
Submitted
Comments
Joe Tarantino Negative
Submitted
Comments
Joe Tarantino Negative
Submitted
Comments
Joe Tarantino Negative
Submitted
Comments
Joe Tarantino Negative
Submitted
Comments
Joe Tarantino Negative
Submitted
Third-Party
Gail Elliott Negative
Comments
None
N/A
Comments
Negative
Submitted
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Affirmative N/A
None
N/A
Comments
Negative
Submitted
Third-Party
Negative
Comments
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Barry Jones
Negative
1
City Utilities of Springfield, Missouri
Michael Bowman
4
City Utilities of Springfield, Missouri
John Allen
5
Avista - Avista Corporation
1
SaskPower
Glen Farmer
Wayne
Guttormson
1
Allete - Minnesota Power, Inc.
1
APS - Arizona Public Service Co.
10
5
Midwest Reliability Organization
APS - Arizona Public Service Co.
Public Utility District No. 2 of Grant County,
Washington
APS - Arizona Public Service Co.
Public Utility District No. 2 of Grant County,
Washington
6
6
5
1
Dairyland Power Cooperative
3
Berkshire Hathaway Energy - MidAmerican
Energy Co.
Tacoma Public Utilities (Tacoma, WA)
6
Tennessee Valley Authority
5
Austin Energy
1
Puget Sound Energy, Inc.
5
San Miguel Electric Cooperative, Inc.
4
WEC Energy Group, Inc.
5
Platte River Power Authority
1
Glencoe Light and Power Commission
1
Network and Security Technologies
3
Comments
Third-Party
Negative
Comments
Affirmative N/A
Comments
Negative
Submitted
Third-Party
Negative
Comments
Jamie Monette
Daniela
Atanasovski
William Steiner
Kelsi Rigby
Affirmative N/A
None
N/A
Affirmative N/A
LeRoy Patterson
Affirmative N/A
Marcus Bortman
Affirmative N/A
Amy Jones
Affirmative N/A
Third-Party
Comments
Comments
Darnez Gresham
Negative
Submitted
Marc Donaldson Jennie Wike None
N/A
Comments
Marjorie Parsons
Negative
Submitted
Lisa Martin
Affirmative N/A
Comments
Chelsey Neil
Negative
Submitted
No Comment
Lana Smith
Negative
Submitted
Third-Party
Matthew Beilfuss
Negative
Comments
Third-Party
Tyson Archie
Negative
Comments
Third-Party
Terry Volkmann
Negative
Comments
Roger
Comments
Nicholas Lauriat
Negative
Fradenburgh
Submitted
Renee Leidel
Negative
Kevin Conway
Abstain
Michael Jang
Quintin Lee
None
N/A
Affirmative N/A
Third-Party
Negative
Comments
Comments
Negative
Submitted
Comments
Negative
Submitted
1
1
Public Utility District No. 1 of Pend Oreille
County
Seattle City Light
Eversource Energy
6
Basin Electric Power Cooperative
Jerry Horner
1
Minnkota Power Cooperative Inc.
Theresa Allard
3
Associated Electric Cooperative, Inc.
Todd Bennett
1
Negative
Andy
Fuhrman
N/A
Truong Le
Truong Le
Truong Le
Comments
Submitted
Comments
Negative
Submitted
None
N/A
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Comments
Negative
Submitted
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Truong Le
Affirmative N/A
3
Platte River Power Authority
Wade Kiess
Negative
6
Associated Electric Cooperative, Inc.
Brian Ackermann
1
Central Electric Power Cooperative (Missouri)
Michael Bax
3
M and A Electric Power Cooperative
Stephen Pogue
1
KAMO Electric Cooperative
Micah Breedlove
5
Associated Electric Cooperative, Inc.
Brad Haralson
3
Northeast Missouri Electric Power Cooperative
Skyler
Wiegmann
3
KAMO Electric Cooperative
Tony Gott
3
Sho-Me Power Electric Cooperative
Jarrod Murdaugh
1
5
4
3
Sho-Me Power Electric Cooperative
Florida Municipal Power Agency
Florida Municipal Power Agency
Florida Municipal Power Agency
6
Florida Municipal Power Agency
Peter Dawson
Chris Gowder
Carol Chinn
Dale Ray
Richard
Montgomery
1
Northeast Missouri Electric Power Cooperative
Kevin White
Negative
1
N.W. Electric Power Cooperative, Inc.
Mark Ramsey
Negative
3
NW Electric Power Cooperative, Inc.
John Stickley
Negative
1
Hydro One Networks, Inc.
Payam
Farahbakhsh
6
Platte River Power Authority
Sabrina Martz
5
1
Los Angeles Department of Water and Power
Tacoma Public Utilities (Tacoma, WA)
Glenn Barry
John Merrell
5
Brazos Electric Power Cooperative, Inc.
Shari Heino
5
Herb Schrayshuen
3
Lakeland Electric
Herb
Schrayshuen
Steve Marshall
3
Georgia System Operations Corporation
Scott McGough
Negative
1
Manitoba Hydro
Bruce Reimer
Negative
1
Long Island Power Authority
Robert Ganley
Negative
5
Manitoba Hydro
Yuguang Xiao
Negative
Mark Ciufo
Negative
Negative
Abstain
Jennie Wike None
Negative
Third-Party
Comments
Third-Party
Comments
Third-Party
Comments
Comments
Submitted
Comments
Submitted
N/A
N/A
Third-Party
Comments
Affirmative N/A
None
N/A
Comments
Submitted
Comments
Submitted
Third-Party
Comments
Comments
Submitted
3
Manitoba Hydro
3
Los Angeles Department of Water and Power
Karim AbdelHadi
Tony Skourtas
1
Tri-State G and T Association, Inc.
Kjersti Drott
4
FirstEnergy - FirstEnergy Corporation
3
Tri-State G and T Association, Inc.
5
1
5
Talen Generation, LLC
Lakeland Electric
Lakeland Electric
Mark Garza
Janelle Marriott
Gill
Donald Lock
Larry Watt
Becky Rinier
6
OGE Energy - Oklahoma Gas and Electric Co.
Sing Tay
3
1
Eversource Energy
Tallahassee Electric (City of Tallahassee, FL)
Sharon Flannery
Scott Langston
5
Oglethorpe Power Corporation
Donna Johnson
1
1
5
Los Angeles Department of Water and Power
Black Hills Corporation
Black Hills Corporation
faranak sarbaz
Seth Nelson
Derek Silbaugh
1
Seminole Electric Cooperative, Inc.
Bret Galbraith
6
NiSource - Northern Indiana Public Service Co. Joe O'Brien
3
NiSource - Northern Indiana Public Service Co. Steven Taddeucci
6
New York Power Authority
6
Talen Energy Marketing, LLC
1
FirstEnergy - FirstEnergy Corporation
Jennifer
Hohenshilt
Julie Severino
1
M and A Electric Power Cooperative
William Price
3
Dominion - Dominion Resources, Inc.
Connie
Schroeder
3
Muscatine Power and Water
Seth Shoemaker
6
Muscatine Power and Water
Nick Burns
3
OGE Energy - Oklahoma Gas and Electric Co.
Donald Hargrove
3
Westar Energy
Bryan Taggart
5
Westar Energy
Derek Brown
6
Westar Energy
Grant Wilkerson
Erick Barrios
Comments
Submitted
Abstain
N/A
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
None
N/A
None
N/A
None
N/A
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
Third-Party
Negative
Comments
Abstain
N/A
None
N/A
None
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Negative
None
N/A
Affirmative N/A
Third-Party
Negative
Comments
Comments
Negative
Submitted
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
6
Southern Company - Southern Company
Generation
FirstEnergy - FirstEnergy Solutions
William D.
Shultz
Ann Carey
6
Manitoba Hydro
Blair Mukanik
1
Westar Energy
Allen Klassen
5
Tennessee Valley Authority
M Lee Thomas
3
FirstEnergy - FirstEnergy Corporation
Aaron
Ghodooshim
Affirmative N/A
1
OGE Energy - Oklahoma Gas and Electric Co.
Terri Pyle
Negative
3
Black Hills Corporation
Don Stahl
6
PSEG - PSEG Energy Resources and Trade LLC Joseph Neglia
3
Nebraska Public Power District
Tony Eddleman
5
Northern California Power Agency
Marty Hostler
3
CMS Energy - Consumers Energy Company
5
CMS Energy - Consumers Energy Company
Karl Blaszkowski
David
Greyerbiehl
4
Georgia System Operations Corporation
1
New York Power Authority
1
OTP - Otter Tail Power Company
5
PSEG - PSEG Fossil LLC
Tim Kucey
Negative
5
3
3
OTP - Otter Tail Power Company
OTP - Otter Tail Power Company
Owensboro Municipal Utilities
Brett Jacobs
Wendi Olson
Thomas Lyons
None
None
Abstain
1
Hydro-Qu?bec TransEnergie
Nicolas Turcotte
Negative
4
MGE Energy - Madison Gas and Electric Co.
Joseph DePoorter
Negative
5
6
Entergy - Entergy Services, Inc.
Portland General Electric Co.
Gail Golden
Daniel Mason
None
None
1
Muscatine Power and Water
Andy Kurriger
Negative
3
New York Power Authority
David Rivera
Negative
1
BC Hydro and Power Authority
Adrian Andreoiu
Negative
1
NiSource - Northern Indiana Public Service Co. Steve Toosevich
Negative
5
Andrea Barclay
Salvatore
Spagnolo
Charles
Wicklund
Comments
Submitted
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Negative
Comments
Submitted
None
N/A
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
Negative
Negative
None
Comments
Submitted
Comments
Submitted
N/A
Third-Party
Comments
N/A
N/A
N/A
Comments
Submitted
Third-Party
Comments
N/A
N/A
Third-Party
Comments
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Negative
Submitted
Abstain
N/A
Third-Party
Negative
Comments
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Abstain
N/A
Third-Party
Negative
Comments
Comments
Negative
Submitted
Affirmative N/A
None
N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
5
NiSource - Northern Indiana Public Service Co. Kathryn Tackett
3
BC Hydro and Power Authority
Hootan Jarollahi
6
Los Angeles Department of Water and Power
Anton Vu
1
Omaha Public Power District
Doug Peterchuck
5
10
FirstEnergy - FirstEnergy Solutions
SERC Reliability Corporation
Robert Loy
Dave Krueger
1
Platte River Power Authority
Matt Thompson
5
JEA
John Babik
2
Electric Reliability Council of Texas, Inc.
Brandon Gleason
6
Seminole Electric Cooperative, Inc.
David Reinecke
5
1
6
Imperial Irrigation District
Sunflower Electric Power Corporation
Imperial Irrigation District
Tino Zaragoza
Paul Mehlhaff
Diana Torres
1
Public Utility District No. 1 of Chelan County
Ginette Lacasse
5
Public Utility District No. 1 of Chelan County
Meaghan Connell
1
Imperial Irrigation District
Jesus Sammy
Alcaraz
Affirmative N/A
3
Public Utility District No. 1 of Chelan County
Joyce Gundry
Negative
5
BC Hydro and Power Authority
Helen Hamilton
Harding
Negative
Lynn Goldstein
None
Nurul Abser
Abstain
1
PNM Resources - Public Service Company of
New Mexico
NB Power Corporation
5
Dairyland Power Cooperative
1
Berkshire Hathaway Energy - MidAmerican
Energy Co.
5
Hydro-Qu?bec Production
5
3
5
3
Tacoma Public Utilities (Tacoma, WA)
Imperial Irrigation District
Portland General Electric Co.
Portland General Electric Co.
5
PPL - Louisville Gas and Electric Co.
5
Berkshire Hathaway - NV Energy
3
Pacific Gas and Electric Company
1
Negative
Comments
Submitted
Comments
Submitted
N/A
N/A
Third-Party
Tommy Drea
Negative
Comments
Comments
Terry Harbour
Negative
Submitted
Comments
Carl Pineault
Negative
Submitted
Ozan Ferrin
Jennie Wike None
N/A
Glen Allegranza
Affirmative N/A
Ryan Olson
None
N/A
Dan Zollner
None
N/A
JULIE
Third-Party
Negative
HOSTRANDER
Comments
Comments
Kevin Salsbury
Negative
Submitted
Michael
Comments
Sandra Ellis
Negative
1
1
6
3
5
5
6
1
1
5
4
6
1
5
6
6
1
1
5
3
5
5
10
6
6
1
4
5
Johnson
Michael
Johnson
Submitted
Comments
Pacific Gas and Electric Company
Marco Rios
Negative
Submitted
Santee Cooper
Chris Wagner
Abstain
N/A
Santee Cooper
Marty Watson
Abstain
N/A
Santee Cooper
James Poston
Abstain
N/A
Santee Cooper
Tommy Curtis
Abstain
N/A
Third-Party
WEC Energy Group, Inc.
Janet OBrien
Negative
Comments
Comments
Dominion - Dominion Resources, Inc.
Sean Bodkin
Negative
Submitted
Third-Party
PPL Electric Utilities Corporation
Preston Walker
Negative
Comments
Gainesville Regional Utilities
David Owens
Truong Le
Affirmative N/A
Kayleigh
Comments
Lincoln Electric System
Negative
Wilkerson
Submitted
Tacoma Public Utilities (Tacoma, WA)
Hien Ho
Jennie Wike None
N/A
Comments
Northern California Power Agency
Dennis Sismaet
Negative
Submitted
Portland General Electric Co.
Brooke Jockin
None
N/A
Michael
Comments
Pacific Gas and Electric Company
Ed Hanson
Negative
Johnson
Submitted
Tacoma Public Utilities (Tacoma, WA)
Terry Gifford
Jennie Wike None
N/A
Donna
Third-Party
Great River Energy
Negative
Stephenson
Comments
NextEra Energy - Florida Power and Light Co. Mike ONeil
Affirmative N/A
Southern Company - Southern Company
Comments
Matt Carden
Negative
Services, Inc.
Submitted
Third-Party
Choctaw Generation Limited Partnership, LLLP Rob Watson
Negative
Comments
Comments
Seminole Electric Cooperative, Inc.
Jeremy Lorigan
Negative
Submitted
Comments
Dominion - Dominion Resources, Inc.
Rachel Snead
Negative
Submitted
Third-Party
Nebraska Public Power District
Ronald Bender
Negative
Comments
Northeast Power Coordinating Council
Guy V. Zito
Abstain
N/A
Comments
Berkshire Hathaway - PacifiCorp
Sandra Shaffer
Negative
Submitted
Gordon DobsonThird-Party
Powerex Corporation
Negative
Mack
Comments
LaTroy
Comments
American Transmission Company, LLC
Negative
Brumfield
Submitted
Comments
Alliant Energy Corporation Services, Inc.
Larry Heckert
Negative
Submitted
Comments
New York Power Authority
Shivaz Chopra
Negative
Submitted
4
Public Utility District No. 2 of Grant County,
Washington
Karla Weaver
Affirmative N/A
1
Exelon
Daniel Gacek
Negative
3
Exelon
Kinte Whitehead
5
Exelon
Cynthia Lee
6
Exelon
Becky Webb
1
3
5
Entergy - Entergy Services, Inc.
City Utilities of Springfield, Missouri
Enel Green Power
Oliver Burke
Duan Gavel
Mat Bunch
6
Xcel Energy, Inc.
Carrie Dixon
5
Xcel Energy, Inc.
Gerry Huitt
1
Xcel Energy, Inc.
Dean Schiro
4
1
CMS Energy - Consumers Energy Company
Memphis Light, Gas and Water Division
1
Bonneville Power Administration
Aric Root
Allan Long
Kammy RogersHolliday
6
Bonneville Power Administration
Andrew Meyers
3
Bonneville Power Administration
Ken Lanehome
5
Bonneville Power Administration
Scott Winner
5
Great River Energy
Jacalynn Bentz
1
Georgia Transmission Corporation
Greg Davis
3
Snohomish County PUD No. 1
Holly Chaney
4
5
Public Utility District No. 1 of Snohomish
County
Public Utility District No. 1 of Snohomish
County
John Martinsen
Sam Nietfeld
6
Snohomish County PUD No. 1
John Liang
1
Public Utility District No. 1 of Snohomish
County
Alyssia Rhoads
5
AEP
Thomas Foltz
1
AEP - AEP Service Corporation
Dennis Sauriol
1
Oncor Electric Delivery
Lee Maurer
Comments
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
None
N/A
None
N/A
No Comment
Negative
Submitted
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Affirmative N/A
None
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
AEP
10
ReliabilityFirst
3
Austin Energy
5
Cogentrix Energy Power Management, LLC
Anthony
Jablonski
W. Dwayne
Preston
Gerry Adamski
5
Seminole Electric Cooperative, Inc.
Mickey Bellard
5
Cowlitz County PUD
Florida Reliability Coordinating Council –
Member Services Division
Deanna Carlson
N/A
Comments
Negative
Submitted
Affirmative N/A
Vince Ordax
Abstain
3
AEP
Kent Feliks
Negative
6
10
6
5
3
4
4
Lakeland Electric
Texas Reliability Entity, Inc.
Duke Energy
Duke Energy
Duke Energy
National Rural Electric Cooperative Association
Arkansas Electric Cooperative Corporation
None
Abstain
Abstain
Abstain
Abstain
None
None
1
Arkansas Electric Cooperative Corporation
None
N/A
6
3
5
Arkansas Electric Cooperative Corporation
Arkansas Electric Cooperative Corporation
Arkansas Electric Cooperative Corporation
Paul Shipps
Rachel Coyne
Greg Cecil
Dale Goodwine
Lee Schuster
Paul McCurley
Alice Wright
Jennifer
Loiacano
Bruce Walkup
Mark Gann
Adrian Harris
Comments
Submitted
N/A
N/A
N/A
N/A
N/A
N/A
N/A
None
None
None
1
East Kentucky Power Cooperative
Amber Skillern
Negative
3
East Kentucky Power Cooperative
Patrick Woods
Negative
1
Duke Energy
Laura Lee
Abstain
1
Arizona Electric Power Cooperative, Inc.
Jennifer Bray
Negative
5
East Kentucky Power Cooperative
mark brewer
Negative
3
5
Wabash Valley Power Association
SunPower
None
None
6
Evergy
None
N/A
1
3
5
5
6
Evergy
Evergy
Evergy
FirstEnergy - FirstEnergy Corporation
FirstEnergy - FirstEnergy Corporation
Susan Sosbe
Bradley Collard
Thomas
ROBBEN
Allen Klassen
Marcus Moor
Derek Brown
Robert Loy
Ann Carey
N/A
N/A
N/A
Third-Party
Comments
Third-Party
Comments
N/A
Comments
Submitted
Third-Party
Comments
N/A
N/A
None
None
None
None
None
N/A
N/A
N/A
N/A
N/A
8
JT Kuehne
© 2021 - NERC Ver 4.3.0.0
Machine Name: ERODVSBSWB02
Negative
Comments
Submitted
Comments
Submitted
6
Negative
Affirmative N/A
None
N/A
NERC Balloting Tool
Dashboard
Users
Registered Ballot Body
Proxy Ballot Body
My User Profile
Ballots
Ballot Events
Ballot Results
Comment Forms
View Comment Forms
Login / Register
Ballot Results
Comment: View Comment Results
Ballot Name:
2019-02 BES Cyber System Information Access Management Implementation Plan AB 2 OT
Voting Start Date:
9/11/2020 12:01:00 AM
Voting End Date:
9/21/2020 8:00:00 PM
Ballot Type:
OT
Ballot Activity:
AB
Ballot Series:
2
Total # Votes:
222
Total Ballot Pool:
274
Quorum:
81.02
Quorum Established Date:
9/21/2020 3:09:50 PM
Weighted Segment Value:
50.49
Actions
Actions
Negative
Fraction w/
Comment
Ballot Segment Affirmative Affirmative Negative Votes
Segment
Pool Weight
Votes
Fraction w/ Comment
Segment:
78
1
Segment:
2
2
Segment:
58
3
Segment:
17
4
Segment:
67
5
Segment:
45
6
Segment:
0
7
Segment:
1
8
Negative Votes
No
Abstain
w/o Comment
Vote
1
29
0.483
31
0.517
0
5
13
0.2
0
0
2
0.2
0
0
0
1
25
0.568
19
0.432
0
4
10
1
6
0.545
5
0.455
0
1
5
1
29
0.58
21
0.42
0
5
12
1
15
0.5
15
0.5
1
3
11
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
Segment:
0
9
Segment:
6
10
Totals: 274
0
0
0
0
0
0
0
0
0.3
1
0.1
2
0.2
0
2
1
5.5
105
2.777
95
2.723
1
21
52
Ballot Pool Members
Segment
Organization
Voter
Designated
Proxy
Ballot
3
Con Ed - Consolidated Edison Co. of New York Peter Yost
Negative
6
Con Ed - Consolidated Edison Co. of New York Cristhian Godoy
Negative
4
Utility Services, Inc.
Brian EvansMongeon
None
3
Ameren - Ameren Services
David Jendras
Negative
3
WEC Energy Group, Inc.
5
Ontario Power Generation Inc.
Thomas Breene
Constantin
Chitescu
5
3
5
1
1
4
1
6
2
5
3
3
3
5
1
1
1
Edison International - Southern California Edison
Neil Shockey
Company
MEAG Power
Roger Brand
NERC
Memo
Third-Party
Comments
Third-Party
Comments
N/A
Comments
Submitted
Affirmative N/A
Third-Party
Negative
Comments
Affirmative N/A
Scott Miller Affirmative N/A
Third-Party
Con Ed - Consolidated Edison Co. of New York William Winters
Negative
Comments
MEAG Power
David Weekley Scott Miller Affirmative N/A
IDACORP - Idaho Power Company
Laura Nelson
Affirmative N/A
Seminole Electric Cooperative, Inc.
Jonathan Robbins
Affirmative N/A
Third-Party
Con Ed - Consolidated Edison Co. of New York Dermot Smyth
Negative
Comments
WEC Energy Group, Inc.
David Hathaway
Affirmative N/A
Comments
Independent Electricity System Operator
Leonard Kula
Negative
Submitted
Massachusetts Municipal Wholesale Electric
Anthony Stevens
Affirmative N/A
Company
Sempra - San Diego Gas and Electric
Bridget Silvia
Affirmative N/A
Third-Party
Basin Electric Power Cooperative
Jeremy Voll
Negative
Comments
Edison International - Southern California Edison
Third-Party
Romel Aquino
Negative
Company
Comments
NRG - NRG Energy, Inc.
Patricia Lynch
Affirmative N/A
Third-Party
National Grid USA
Michael Jones
Negative
Comments
Third-Party
Western Area Power Administration
sean erickson
Barry Jones Negative
Comments
Edison International - Southern California Edison Jose Avendano
Third-Party
Negative
Company
1
Ameren - Ameren Services
6
Ameren - Ameren Services
6
Black Hills Corporation
3
National Grid USA
5
Ameren - Ameren Missouri
1
Balancing Authority of Northern California
6
Sacramento Municipal Utility District
5
Sacramento Municipal Utility District
4
Sacramento Municipal Utility District
1
Sacramento Municipal Utility District
3
Sacramento Municipal Utility District
6
3
6
3
3
4
5
International Transmission Company Holdings
Corporation
Seattle City Light
Puget Sound Energy, Inc.
PPL - Louisville Gas and Electric Co.
PPL - Louisville Gas and Electric Co.
APS - Arizona Public Service Co.
Seattle City Light
Puget Sound Energy, Inc.
6
Western Area Power Administration
5
Sempra - San Diego Gas and Electric
3
Tennessee Valley Authority
1
Tennessee Valley Authority
1
Nebraska Public Power District
10
New York State Reliability Council
1
City Utilities of Springfield, Missouri
4
5
City Utilities of Springfield, Missouri
Avista - Avista Corporation
1
SaskPower
1
Mora
Comments
Comments
Tamara Evey
Negative
Submitted
Comments
Robert Quinlivan
Negative
Submitted
Brooke Voorhees
None
N/A
Third-Party
Brian Shanahan
Negative
Comments
Comments
Sam Dwyer
Negative
Submitted
Comments
Kevin Smith
Joe Tarantino Negative
Submitted
Comments
Jamie Cutlip
Joe Tarantino Negative
Submitted
Comments
Nicole Goi
Joe Tarantino Negative
Submitted
Comments
Beth Tincher
Joe Tarantino Negative
Submitted
Arthur
Comments
Joe Tarantino Negative
Starkovich
Submitted
Comments
Nicole Looney Joe Tarantino Negative
Submitted
Third-Party
Michael Moltane Gail Elliott Negative
Comments
Brian Belger
None
N/A
Tim Womack
Affirmative N/A
Linn Oelker
Affirmative N/A
James Frank
Affirmative N/A
Jessica Lopez
Affirmative N/A
Hao Li
None
N/A
Lynn Murphy
Affirmative N/A
Third-Party
Erin Green
Negative
Comments
Jennifer Wright
Affirmative N/A
Comments
Ian Grant
Negative
Submitted
Comments
Gabe Kurtz
Negative
Submitted
Jamison Cawley
Affirmative N/A
ALAN
Third-Party
Negative
ADAMSON
Comments
Third-Party
Michael Bowman
Negative
Comments
John Allen
Abstain
N/A
Glen Farmer
Affirmative N/A
Wayne
Comments
Negative
Guttormson
Submitted
1
Allete - Minnesota Power, Inc.
1
APS - Arizona Public Service Co.
10
5
Midwest Reliability Organization
APS - Arizona Public Service Co.
Public Utility District No. 2 of Grant County,
Washington
APS - Arizona Public Service Co.
Public Utility District No. 2 of Grant County,
Washington
6
6
5
1
Dairyland Power Cooperative
3
Berkshire Hathaway Energy - MidAmerican
Energy Co.
Tacoma Public Utilities (Tacoma, WA)
6
Tennessee Valley Authority
5
1
4
5
Austin Energy
Puget Sound Energy, Inc.
WEC Energy Group, Inc.
Platte River Power Authority
1
Glencoe Light and Power Commission
1
Network and Security Technologies
3
Jamie Monette
Daniela
Atanasovski
William Steiner
Kelsi Rigby
Third-Party
Comments
Affirmative N/A
None
N/A
Affirmative N/A
LeRoy Patterson
Affirmative N/A
Marcus Bortman
Affirmative N/A
Amy Jones
Affirmative N/A
Third-Party
Comments
Comments
Darnez Gresham
Negative
Submitted
Marc Donaldson Jennie Wike None
N/A
Comments
Marjorie Parsons
Negative
Submitted
Lisa Martin
Affirmative N/A
Chelsey Neil
Affirmative N/A
Matthew Beilfuss
Affirmative N/A
Tyson Archie
Affirmative N/A
Third-Party
Terry Volkmann
Negative
Comments
Roger
Comments
Nicholas Lauriat
Negative
Fradenburgh
Submitted
Renee Leidel
Negative
Kevin Conway
Abstain
Michael Jang
Quintin Lee
None
N/A
Affirmative N/A
Third-Party
Negative
Comments
Comments
Negative
Submitted
Affirmative N/A
Abstain
N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
1
1
Public Utility District No. 1 of Pend Oreille
County
Seattle City Light
Eversource Energy
6
Basin Electric Power Cooperative
Jerry Horner
1
Minnkota Power Cooperative Inc.
Theresa Allard
3
3
6
1
3
1
5
Associated Electric Cooperative, Inc.
Platte River Power Authority
Associated Electric Cooperative, Inc.
Central Electric Power Cooperative (Missouri)
M and A Electric Power Cooperative
KAMO Electric Cooperative
Associated Electric Cooperative, Inc.
3
Northeast Missouri Electric Power Cooperative
3
3
1
KAMO Electric Cooperative
Sho-Me Power Electric Cooperative
Sho-Me Power Electric Cooperative
Todd Bennett
Wade Kiess
Brian Ackermann
Michael Bax
Stephen Pogue
Micah Breedlove
Brad Haralson
Skyler
Wiegmann
Tony Gott
Jarrod Murdaugh
Peter Dawson
1
Negative
Andy
Fuhrman
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
5
4
3
Florida Municipal Power Agency
Florida Municipal Power Agency
Florida Municipal Power Agency
6
Florida Municipal Power Agency
1
1
3
Northeast Missouri Electric Power Cooperative
N.W. Electric Power Cooperative, Inc.
NW Electric Power Cooperative, Inc.
1
Hydro One Networks, Inc.
6
5
1
Platte River Power Authority
Los Angeles Department of Water and Power
Tacoma Public Utilities (Tacoma, WA)
Chris Gowder
Carol Chinn
Dale Ray
Richard
Montgomery
Kevin White
Mark Ramsey
John Stickley
Payam
Farahbakhsh
Sabrina Martz
Glenn Barry
John Merrell
5
Brazos Electric Power Cooperative, Inc.
Shari Heino
5
Herb Schrayshuen
3
Lakeland Electric
Herb
Schrayshuen
Steve Marshall
3
Georgia System Operations Corporation
Scott McGough
1
3
Long Island Power Authority
Los Angeles Department of Water and Power
Robert Ganley
Tony Skourtas
1
Tri-State G and T Association, Inc.
Kjersti Drott
4
FirstEnergy - FirstEnergy Corporation
3
Tri-State G and T Association, Inc.
5
1
5
6
3
1
Talen Generation, LLC
Lakeland Electric
Lakeland Electric
OGE Energy - Oklahoma Gas and Electric Co.
Eversource Energy
Tallahassee Electric (City of Tallahassee, FL)
Mark Garza
Janelle Marriott
Gill
Donald Lock
Larry Watt
Becky Rinier
Sing Tay
Sharon Flannery
Scott Langston
5
Oglethorpe Power Corporation
Donna Johnson
1
1
5
1
6
3
Los Angeles Department of Water and Power
Black Hills Corporation
Black Hills Corporation
Seminole Electric Cooperative, Inc.
NiSource - Northern Indiana Public Service Co.
NiSource - Northern Indiana Public Service Co.
faranak sarbaz
Seth Nelson
Derek Silbaugh
Bret Galbraith
Joe O'Brien
Steven Taddeucci
6
New York Power Authority
Erick Barrios
6
Talen Energy Marketing, LLC
1
FirstEnergy - FirstEnergy Corporation
Jennifer
Hohenshilt
Julie Severino
Truong Le
Truong Le
Truong Le
Affirmative N/A
Affirmative N/A
Affirmative N/A
Truong Le
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Comments
Mark Ciufo Negative
Submitted
Affirmative N/A
Abstain
N/A
Jennie Wike None
N/A
Third-Party
Negative
Comments
Affirmative N/A
None
N/A
Comments
Negative
Submitted
Affirmative N/A
None
N/A
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
None
N/A
None
N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Third-Party
Negative
Comments
Abstain
N/A
None
N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
None
N/A
Affirmative N/A
1
M and A Electric Power Cooperative
3
Dominion - Dominion Resources, Inc.
3
Muscatine Power and Water
Seth Shoemaker
6
Muscatine Power and Water
Nick Burns
3
3
5
6
6
OGE Energy - Oklahoma Gas and Electric Co.
Westar Energy
Westar Energy
Westar Energy
Southern Company - Southern Company
Generation
FirstEnergy - FirstEnergy Solutions
6
Manitoba Hydro
1
Westar Energy
Donald Hargrove
Bryan Taggart
Derek Brown
Grant Wilkerson
William D.
Shultz
Ann Carey
Simon TanapatAndre
Allen Klassen
5
Tennessee Valley Authority
M Lee Thomas
3
FirstEnergy - FirstEnergy Corporation
5
William Price
Connie
Schroeder
1
3
6
3
Aaron
Ghodooshim
OGE Energy - Oklahoma Gas and Electric Co. Terri Pyle
Black Hills Corporation
Don Stahl
PSEG - PSEG Energy Resources and Trade LLC Joseph Neglia
Nebraska Public Power District
Tony Eddleman
5
Northern California Power Agency
Marty Hostler
3
CMS Energy - Consumers Energy Company
5
CMS Energy - Consumers Energy Company
Karl Blaszkowski
David
Greyerbiehl
4
Georgia System Operations Corporation
1
New York Power Authority
1
OTP - Otter Tail Power Company
5
3
1
PSEG - PSEG Fossil LLC
Owensboro Municipal Utilities
Hydro-Qu?bec TransEnergie
Salvatore
Spagnolo
Charles
Wicklund
Tim Kucey
Thomas Lyons
Nicolas Turcotte
4
MGE Energy - Madison Gas and Electric Co.
Joseph DePoorter
5
5
3
6
Entergy - Entergy Services, Inc.
OTP - Otter Tail Power Company
OTP - Otter Tail Power Company
Portland General Electric Co.
Gail Golden
Brett Jacobs
Wendi Olson
Daniel Mason
1
Muscatine Power and Water
Andy Kurriger
Andrea Barclay
Affirmative N/A
Comments
Negative
Submitted
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Affirmative N/A
None
N/A
Affirmative N/A
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
Negative
Negative
None
Comments
Submitted
Comments
Submitted
N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
Third-Party
Negative
Comments
None
N/A
None
N/A
None
N/A
None
N/A
Third-Party
Negative
Comments
Comments
Submitted
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Abstain
N/A
Third-Party
Negative
Comments
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Third-Party
Negative
Comments
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
3
New York Power Authority
David Rivera
1
BC Hydro and Power Authority
Adrian Andreoiu
1
5
NiSource - Northern Indiana Public Service Co. Steve Toosevich
NiSource - Northern Indiana Public Service Co. Kathryn Tackett
3
BC Hydro and Power Authority
Hootan Jarollahi
6
Los Angeles Department of Water and Power
Anton Vu
1
Omaha Public Power District
Doug Peterchuck
5
10
1
5
FirstEnergy - FirstEnergy Solutions
SERC Reliability Corporation
Platte River Power Authority
JEA
Robert Loy
Dave Krueger
Matt Thompson
John Babik
2
Electric Reliability Council of Texas, Inc.
Brandon Gleason
6
5
1
6
Seminole Electric Cooperative, Inc.
Imperial Irrigation District
Sunflower Electric Power Corporation
Imperial Irrigation District
David Reinecke
Tino Zaragoza
Paul Mehlhaff
Diana Torres
1
Public Utility District No. 1 of Chelan County
Ginette Lacasse
5
Public Utility District No. 1 of Chelan County
Meaghan Connell
1
Imperial Irrigation District
Jesus Sammy
Alcaraz
Affirmative N/A
3
Public Utility District No. 1 of Chelan County
Joyce Gundry
Negative
5
BC Hydro and Power Authority
Helen Hamilton
Harding
Negative
Lynn Goldstein
None
N/A
Nurul Abser
Abstain
Tommy Drea
Negative
N/A
Third-Party
Comments
Terry Harbour
Affirmative N/A
Carl Pineault
Ozan Ferrin
Jennie Wike
Glen Allegranza
Ryan Olson
Dan Zollner
JULIE
HOSTRANDER
Kevin Salsbury
Affirmative N/A
None
N/A
Affirmative N/A
None
N/A
None
N/A
1
PNM Resources - Public Service Company of
New Mexico
NB Power Corporation
5
Dairyland Power Cooperative
1
5
5
3
5
3
Berkshire Hathaway Energy - MidAmerican
Energy Co.
Hydro-Qu?bec Production
Tacoma Public Utilities (Tacoma, WA)
Imperial Irrigation District
Portland General Electric Co.
Portland General Electric Co.
5
PPL - Louisville Gas and Electric Co.
5
Berkshire Hathaway - NV Energy
1
Negative
Comments
Submitted
Comments
Submitted
Affirmative N/A
Affirmative N/A
3
Pacific Gas and Electric Company
Sandra Ellis
1
Pacific Gas and Electric Company
Marco Rios
1
6
3
5
5
6
1
1
Santee Cooper
Santee Cooper
Santee Cooper
Santee Cooper
WEC Energy Group, Inc.
Dominion - Dominion Resources, Inc.
PPL Electric Utilities Corporation
Gainesville Regional Utilities
Chris Wagner
Marty Watson
James Poston
Tommy Curtis
Janet OBrien
Sean Bodkin
Preston Walker
David Owens
Kayleigh
Wilkerson
Hien Ho
5
4
6
1
5
6
6
1
1
5
3
5
5
10
6
6
1
4
5
4
1
Michael
Johnson
Michael
Johnson
Affirmative N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
Abstain
N/A
Abstain
N/A
Affirmative N/A
None
N/A
Affirmative N/A
Truong Le
Affirmative N/A
Comments
Lincoln Electric System
Negative
Submitted
Tacoma Public Utilities (Tacoma, WA)
Jennie Wike None
N/A
Comments
Northern California Power Agency
Dennis Sismaet
Negative
Submitted
Portland General Electric Co.
Brooke Jockin
None
N/A
Michael
Pacific Gas and Electric Company
Ed Hanson
Affirmative N/A
Johnson
Tacoma Public Utilities (Tacoma, WA)
Terry Gifford
Jennie Wike None
N/A
Donna
Third-Party
Great River Energy
Negative
Stephenson
Comments
NextEra Energy - Florida Power and Light Co. Mike ONeil
Affirmative N/A
Southern Company - Southern Company
Comments
Matt Carden
Negative
Services, Inc.
Submitted
Third-Party
Choctaw Generation Limited Partnership, LLLP Rob Watson
Negative
Comments
Seminole Electric Cooperative, Inc.
Jeremy Lorigan
Affirmative N/A
Dominion - Dominion Resources, Inc.
Rachel Snead
Affirmative N/A
Nebraska Public Power District
Ronald Bender
Affirmative N/A
Northeast Power Coordinating Council
Guy V. Zito
Abstain
N/A
Comments
Berkshire Hathaway - PacifiCorp
Sandra Shaffer
Negative
Submitted
Gordon DobsonThird-Party
Powerex Corporation
Negative
Mack
Comments
LaTroy
American Transmission Company, LLC
Affirmative N/A
Brumfield
Comments
Alliant Energy Corporation Services, Inc.
Larry Heckert
Negative
Submitted
Comments
New York Power Authority
Shivaz Chopra
Negative
Submitted
Public Utility District No. 2 of Grant County,
Karla Weaver
Affirmative N/A
Washington
Comments
Exelon
Daniel Gacek
Negative
Submitted
Comments
3
Exelon
Kinte Whitehead
5
Exelon
Cynthia Lee
6
Exelon
Becky Webb
1
3
5
Entergy - Entergy Services, Inc.
City Utilities of Springfield, Missouri
Enel Green Power
Oliver Burke
Duan Gavel
Mat Bunch
6
Xcel Energy, Inc.
Carrie Dixon
1
Xcel Energy, Inc.
Dean Schiro
5
Xcel Energy, Inc.
Gerry Huitt
4
1
CMS Energy - Consumers Energy Company
Memphis Light, Gas and Water Division
1
Bonneville Power Administration
Aric Root
Allan Long
Kammy RogersHolliday
6
Bonneville Power Administration
Andrew Meyers
3
Bonneville Power Administration
Ken Lanehome
5
Bonneville Power Administration
Scott Winner
5
Great River Energy
Jacalynn Bentz
1
Georgia Transmission Corporation
Greg Davis
3
Snohomish County PUD No. 1
Holly Chaney
4
5
6
Public Utility District No. 1 of Snohomish
County
Public Utility District No. 1 of Snohomish
County
Snohomish County PUD No. 1
5
1
1
6
Public Utility District No. 1 of Snohomish
County
AEP
AEP - AEP Service Corporation
Oncor Electric Delivery
AEP
10
ReliabilityFirst
3
Austin Energy
5
Cogentrix Energy Power Management, LLC
1
John Martinsen
Sam Nietfeld
John Liang
Alyssia Rhoads
Thomas Foltz
Dennis Sauriol
Lee Maurer
JT Kuehne
Anthony
Jablonski
W. Dwayne
Preston
Gerry Adamski
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
None
N/A
Abstain
N/A
No Comment
Negative
Submitted
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Affirmative N/A
None
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Affirmative N/A
None
N/A
5
5
3
6
10
6
5
3
4
4
Seminole Electric Cooperative, Inc.
Cowlitz County PUD
Florida Reliability Coordinating Council –
Member Services Division
AEP
Lakeland Electric
Texas Reliability Entity, Inc.
Duke Energy
Duke Energy
Duke Energy
National Rural Electric Cooperative Association
Arkansas Electric Cooperative Corporation
1
Arkansas Electric Cooperative Corporation
6
3
5
Arkansas Electric Cooperative Corporation
Arkansas Electric Cooperative Corporation
Arkansas Electric Cooperative Corporation
Kent Feliks
Paul Shipps
Rachel Coyne
Greg Cecil
Dale Goodwine
Lee Schuster
Paul McCurley
Alice Wright
Jennifer
Loiacano
Bruce Walkup
Mark Gann
Adrian Harris
1
East Kentucky Power Cooperative
Amber Skillern
Negative
3
East Kentucky Power Cooperative
Patrick Woods
Negative
1
Duke Energy
Laura Lee
Abstain
1
Arizona Electric Power Cooperative, Inc.
Jennifer Bray
Negative
5
East Kentucky Power Cooperative
mark brewer
Negative
3
5
Wabash Valley Power Association
SunPower
6
Evergy
1
3
5
5
6
Evergy
Evergy
Evergy
FirstEnergy - FirstEnergy Corporation
FirstEnergy - FirstEnergy Corporation
Susan Sosbe
Bradley Collard
Thomas
ROBBEN
Allen Klassen
Marcus Moor
Derek Brown
Robert Loy
Ann Carey
8
Mickey Bellard
Deanna Carlson
Affirmative N/A
Affirmative N/A
Vince Ordax
Abstain
Affirmative N/A
None
N/A
Abstain
N/A
Abstain
N/A
Abstain
N/A
Abstain
N/A
None
N/A
None
N/A
© 2021 - NERC Ver 4.3.0.0
Machine Name: ERODVSBSWB02
N/A
None
N/A
None
None
None
None
None
N/A
N/A
N/A
Third-Party
Comments
Third-Party
Comments
N/A
Comments
Submitted
Third-Party
Comments
N/A
N/A
None
N/A
None
None
None
None
None
N/A
N/A
N/A
N/A
N/A
NERC Balloting Tool
Dashboard
Users
Registered Ballot Body
Proxy Ballot Body
My User Profile
Ballots
Ballot Events
Ballot Results
Comment Forms
View Comment Forms
Login / Register
Ballot Results
Ballot Name:
2019-02 BES Cyber System Information Access Management CIP-004-7 Non-Binding Poll AB 2 NB
Voting Start Date:
9/11/2020 12:01:00 AM
Voting End Date:
9/21/2020 8:00:00 PM
Ballot Type:
NB
Ballot Activity:
AB
Ballot Series:
2
Total # Votes:
210
Total Ballot Pool:
262
Quorum:
80.15
Quorum Established Date:
9/21/2020 3:09:27 PM
Weighted Segment Value:
32.08
Actions
Actions
Ballot
Pool
Segment
Segment:
1
Segment:
2
Segment:
3
Segment:
4
Segment:
5
Segment:
6
Segment:
7
Segment:
8
Segment:
Segment
Weight
Affirmative
Votes
Affirmative
Fraction
Negative
Votes
Negative
Fraction
Abstain
No
Vote
72
1
12
0.273
32
0.727
14
14
2
0.2
0
0
2
0.2
0
0
59
1
13
0.361
23
0.639
12
11
14
1
5
0.5
5
0.5
1
3
64
1
13
0.333
26
0.667
12
13
44
1
6
0.25
18
0.75
9
11
0
0
0
0
0
0
0
0
1
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
9
Segment:
6
10
Totals:
262
0.4
2
0.2
2
0.2
2
0
5.6
51
1.917
108
3.683
51
52
Ballot Pool Members
Segment
Organization
Voter
Designated
Proxy
Ballot
3
Con Ed - Consolidated Edison Co. of New York
Peter Yost
Negative
6
Con Ed - Consolidated Edison Co. of New York
Cristhian Godoy
Negative
4
Utility Services, Inc.
3
Ameren - Ameren Services
Brian EvansMongeon
David Jendras
3
WEC Energy Group, Inc.
Thomas Breene
5
Ontario Power Generation Inc.
Constantin
Chitescu
None
NERC
Memo
Comments
Submitted
Comments
Submitted
N/A
Abstain
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
Affirmative N/A
Abstain
N/A
Abstain
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
3
Edison International - Southern California Edison
Neil Shockey
Company
MEAG Power
Roger Brand
5
Con Ed - Consolidated Edison Co. of New York
William Winters
1
1
4
MEAG Power
IDACORP - Idaho Power Company
Seminole Electric Cooperative, Inc.
David Weekley Scott Miller
Laura Nelson
Jonathan Robbins
1
Con Ed - Consolidated Edison Co. of New York
Dermot Smyth
6
WEC Energy Group, Inc.
David Hathaway
2
Independent Electricity System Operator
Leonard Kula
5
Massachusetts Municipal Wholesale Electric
Company
Anthony Stevens
Affirmative N/A
3
Sempra - San Diego Gas and Electric
Bridget Silvia
Negative
3
Basin Electric Power Cooperative
Jeremy Voll
5
5
Edison International - Southern California Edison
Romel Aquino
Company
NRG - NRG Energy, Inc.
Patricia Lynch
1
National Grid USA
Michael Jones
1
Western Area Power Administration
sean erickson
3
Scott Miller
Barry Jones
Comments
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
1
6
6
Edison International - Southern California Edison
Company
Ameren - Ameren Services
Ameren - Ameren Services
Black Hills Corporation
Jose Avendano
Mora
Tamara Evey
Robert Quinlivan
Brooke Voorhees
3
National Grid USA
Brian Shanahan
5
Ameren - Ameren Missouri
Sam Dwyer
1
Balancing Authority of Northern California
Kevin Smith
Joe Tarantino
6
Sacramento Municipal Utility District
Jamie Cutlip
Joe Tarantino
5
Sacramento Municipal Utility District
Nicole Goi
Joe Tarantino
4
Sacramento Municipal Utility District
Beth Tincher
Joe Tarantino
1
Sacramento Municipal Utility District
Arthur Starkovich Joe Tarantino
3
Sacramento Municipal Utility District
Nicole Looney
1
6
International Transmission Company Holdings
Corporation
Seattle City Light
3
Puget Sound Energy, Inc.
Tim Womack
6
3
3
4
PPL - Louisville Gas and Electric Co.
PPL - Louisville Gas and Electric Co.
APS - Arizona Public Service Co.
Seattle City Light
Linn Oelker
James Frank
Jessica Lopez
Hao Li
5
Puget Sound Energy, Inc.
Lynn Murphy
6
Western Area Power Administration
Erin Green
5
Sempra - San Diego Gas and Electric
Jennifer Wright
3
1
1
Tennessee Valley Authority
Tennessee Valley Authority
Nebraska Public Power District
10
New York State Reliability Council
Ian Grant
Gabe Kurtz
Jamison Cawley
ALAN
ADAMSON
1
City Utilities of Springfield, Missouri
Michael Bowman
4
City Utilities of Springfield, Missouri
John Allen
5
Avista - Avista Corporation
1
SaskPower
Glen Farmer
Wayne
Guttormson
1
None
Abstain
Abstain
None
Joe Tarantino
Michael Moltane Gail Elliott
Brian Belger
N/A
N/A
N/A
N/A
Comments
Negative
Submitted
Abstain
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
None
N/A
Comments
Negative
Submitted
None
N/A
None
N/A
Affirmative N/A
None
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Abstain
N/A
Abstain
N/A
Abstain
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Abstain
N/A
1
APS - Arizona Public Service Co.
10
5
Midwest Reliability Organization
APS - Arizona Public Service Co.
Public Utility District No. 2 of Grant County,
Washington
APS - Arizona Public Service Co.
Public Utility District No. 2 of Grant County,
Washington
6
6
5
1
Dairyland Power Cooperative
3
6
5
Berkshire Hathaway Energy - MidAmerican
Energy Co.
Tacoma Public Utilities (Tacoma, WA)
Tennessee Valley Authority
Austin Energy
1
Puget Sound Energy, Inc.
4
WEC Energy Group, Inc.
5
Platte River Power Authority
1
Glencoe Light and Power Commission
1
Network and Security Technologies
3
Daniela
Atanasovski
Russel Mountjoy
Kelsi Rigby
Affirmative N/A
Affirmative N/A
Affirmative N/A
LeRoy Patterson
Affirmative N/A
Marcus Bortman
Affirmative N/A
Amy Jones
Abstain
Comments
Submitted
Comments
Darnez Gresham
Negative
Submitted
Marc Donaldson Jennie Wike None
N/A
Marjorie Parsons
Abstain
N/A
Lisa Martin
Affirmative N/A
Comments
Chelsey Neil
Negative
Submitted
Comments
Matthew Beilfuss
Negative
Submitted
Tyson Archie
Abstain
N/A
Comments
Terry Volkmann
Negative
Submitted
Roger
Comments
Nicholas Lauriat
Negative
Fradenburgh
Submitted
Renee Leidel
Negative
Kevin Conway
Abstain
Michael Jang
Quintin Lee
None
Abstain
1
1
Public Utility District No. 1 of Pend Oreille
County
Seattle City Light
Eversource Energy
6
Basin Electric Power Cooperative
Jerry Horner
1
Minnkota Power Cooperative Inc.
Theresa Allard
3
3
6
1
3
1
5
3
3
3
1
5
4
Associated Electric Cooperative, Inc.
Platte River Power Authority
Associated Electric Cooperative, Inc.
Central Electric Power Cooperative (Missouri)
M and A Electric Power Cooperative
KAMO Electric Cooperative
Associated Electric Cooperative, Inc.
Northeast Missouri Electric Power Cooperative
KAMO Electric Cooperative
Sho-Me Power Electric Cooperative
Sho-Me Power Electric Cooperative
Florida Municipal Power Agency
Florida Municipal Power Agency
Todd Bennett
Wade Kiess
Brian Ackermann
Michael Bax
Stephen Pogue
Micah Breedlove
Brad Haralson
Skyler Wiegmann
Tony Gott
Jarrod Murdaugh
Peter Dawson
Chris Gowder
Truong Le
Carol Chinn
Truong Le
1
N/A
Andy
Fuhrman
N/A
N/A
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Abstain
N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
3
Florida Municipal Power Agency
6
Florida Municipal Power Agency
1
1
3
Northeast Missouri Electric Power Cooperative
N.W. Electric Power Cooperative, Inc.
NW Electric Power Cooperative, Inc.
1
Hydro One Networks, Inc.
6
5
1
Platte River Power Authority
Los Angeles Department of Water and Power
Tacoma Public Utilities (Tacoma, WA)
Dale Ray
Richard
Montgomery
Kevin White
Mark Ramsey
John Stickley
Payam
Farahbakhsh
Sabrina Martz
Glenn Barry
John Merrell
5
Brazos Electric Power Cooperative, Inc.
Shari Heino
5
Herb Schrayshuen
3
Lakeland Electric
Herb
Schrayshuen
Steve Marshall
3
Georgia System Operations Corporation
Scott McGough
1
3
3
Long Island Power Authority
Manitoba Hydro
Los Angeles Department of Water and Power
Robert Ganley
Mike Smith
Tony Skourtas
1
Tri-State G and T Association, Inc.
Kjersti Drott
4
FirstEnergy - FirstEnergy Corporation
3
Tri-State G and T Association, Inc.
1
5
Lakeland Electric
Lakeland Electric
Mark Garza
Janelle Marriott
Gill
Larry Watt
Becky Rinier
6
OGE Energy - Oklahoma Gas and Electric Co.
Sing Tay
3
1
Eversource Energy
Tallahassee Electric (City of Tallahassee, FL)
Sharon Flannery
Scott Langston
5
Oglethorpe Power Corporation
Donna Johnson
1
1
5
1
Los Angeles Department of Water and Power
Black Hills Corporation
Black Hills Corporation
Seminole Electric Cooperative, Inc.
faranak sarbaz
Seth Nelson
Derek Silbaugh
Bret Galbraith
6
NiSource - Northern Indiana Public Service Co.
Joe O'Brien
3
NiSource - Northern Indiana Public Service Co.
Steven Taddeucci
6
New York Power Authority
Erick Barrios
6
Talen Energy Marketing, LLC
Jennifer
Hohenshilt
Truong Le
Affirmative N/A
Truong Le
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Comments
Mark Ciufo Negative
Submitted
Abstain
N/A
Abstain
N/A
Jennie Wike None
N/A
Comments
Negative
Submitted
Affirmative N/A
None
N/A
Comments
Negative
Submitted
Abstain
N/A
None
N/A
Abstain
N/A
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
None
N/A
None
N/A
Comments
Negative
Submitted
Abstain
N/A
Affirmative N/A
Comments
Negative
Submitted
Abstain
N/A
None
N/A
None
N/A
Abstain
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
None
N/A
1
1
3
FirstEnergy - FirstEnergy Corporation
M and A Electric Power Cooperative
Dominion - Dominion Resources, Inc.
Julie Severino
William Price
Connie Schroeder
3
Muscatine Power and Water
Seth Shoemaker
6
Muscatine Power and Water
Nick Burns
3
OGE Energy - Oklahoma Gas and Electric Co.
Donald Hargrove
3
Westar Energy
Bryan Taggart
5
Westar Energy
Derek Brown
6
Westar Energy
Grant Wilkerson
Affirmative N/A
Affirmative N/A
Abstain
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
6
Southern Company - Southern Company
Generation
FirstEnergy - FirstEnergy Solutions
6
Manitoba Hydro
1
Westar Energy
Allen Klassen
Negative
5
Tennessee Valley Authority
None
3
FirstEnergy - FirstEnergy Corporation
M Lee Thomas
Aaron
Ghodooshim
1
OGE Energy - Oklahoma Gas and Electric Co.
Terri Pyle
Negative
3
6
3
Black Hills Corporation
Don Stahl
PSEG - PSEG Energy Resources and Trade LLC Joseph Neglia
Nebraska Public Power District
Tony Eddleman
5
Northern California Power Agency
Marty Hostler
3
CMS Energy - Consumers Energy Company
5
CMS Energy - Consumers Energy Company
Karl Blaszkowski
David
Greyerbiehl
4
Georgia System Operations Corporation
1
New York Power Authority
1
5
5
3
3
OTP - Otter Tail Power Company
PSEG - PSEG Fossil LLC
OTP - Otter Tail Power Company
OTP - Otter Tail Power Company
Owensboro Municipal Utilities
Salvatore
Spagnolo
Charles Wicklund
Tim Kucey
Brett Jacobs
Wendi Olson
Thomas Lyons
1
Hydro-Qu?bec TransEnergie
Nicolas Turcotte
Negative
5
Entergy - Entergy Services, Inc.
Gail Golden
None
5
William D. Shultz
Ann Carey
Simon TanapatAndre
Andrea Barclay
None
N/A
Comments
Submitted
N/A
Affirmative N/A
Comments
Submitted
None
N/A
Abstain
N/A
Abstain
N/A
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
Negative
Negative
None
Abstain
None
None
Abstain
Comments
Submitted
Comments
Submitted
N/A
N/A
N/A
N/A
N/A
Comments
Submitted
N/A
6
Portland General Electric Co.
Daniel Mason
1
Muscatine Power and Water
Andy Kurriger
3
New York Power Authority
David Rivera
1
BC Hydro and Power Authority
Adrian Andreoiu
1
NiSource - Northern Indiana Public Service Co.
Steve Toosevich
5
NiSource - Northern Indiana Public Service Co.
Kathryn Tackett
3
6
BC Hydro and Power Authority
Los Angeles Department of Water and Power
Hootan Jarollahi
Anton Vu
1
Omaha Public Power District
Doug Peterchuck
5
10
5
FirstEnergy - FirstEnergy Solutions
SERC Reliability Corporation
JEA
Robert Loy
Dave Krueger
John Babik
2
Electric Reliability Council of Texas, Inc.
Brandon Gleason
6
5
1
6
Seminole Electric Cooperative, Inc.
Imperial Irrigation District
Sunflower Electric Power Corporation
Imperial Irrigation District
David Reinecke
Tino Zaragoza
Paul Mehlhaff
Diana Torres
1
Public Utility District No. 1 of Chelan County
Ginette Lacasse
5
Public Utility District No. 1 of Chelan County
Meaghan Connell
1
Imperial Irrigation District
Jesus Sammy
Alcaraz
Affirmative N/A
3
Public Utility District No. 1 of Chelan County
Joyce Gundry
Negative
Comments
Submitted
5
BC Hydro and Power Authority
Helen Hamilton
Harding
Abstain
N/A
Lynn Goldstein
None
N/A
Nurul Abser
Abstain
1
PNM Resources - Public Service Company of
New Mexico
NB Power Corporation
5
Dairyland Power Cooperative
1
Berkshire Hathaway Energy - MidAmerican
Energy Co.
5
Hydro-Qu?bec Production
5
3
5
3
Tacoma Public Utilities (Tacoma, WA)
Imperial Irrigation District
Portland General Electric Co.
Portland General Electric Co.
1
None
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Abstain
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Abstain
N/A
Abstain
N/A
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
Abstain
N/A
Comments
Negative
Submitted
Abstain
N/A
Affirmative N/A
None
N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
N/A
Comments
Tommy Drea
Negative
Submitted
Comments
Terry Harbour
Negative
Submitted
Comments
Carl Pineault
Negative
Submitted
Ozan Ferrin
Jennie Wike None
N/A
Glen Allegranza
Affirmative N/A
Ryan Olson
None
N/A
Dan Zollner
None
N/A
JULIE
5
PPL - Louisville Gas and Electric Co.
5
Berkshire Hathaway - NV Energy
HOSTRANDER
Kevin Salsbury
3
Pacific Gas and Electric Company
Sandra Ellis
1
Pacific Gas and Electric Company
Marco Rios
1
6
3
5
Santee Cooper
Santee Cooper
Santee Cooper
Santee Cooper
Chris Wagner
Marty Watson
James Poston
Tommy Curtis
5
WEC Energy Group, Inc.
Janet OBrien
6
Dominion - Dominion Resources, Inc.
Sean Bodkin
1
Gainesville Regional Utilities
5
Lincoln Electric System
4
Tacoma Public Utilities (Tacoma, WA)
David Owens
Kayleigh
Wilkerson
Hien Ho
6
Northern California Power Agency
Dennis Sismaet
1
Portland General Electric Co.
Brooke Jockin
5
Pacific Gas and Electric Company
Ed Hanson
6
Tacoma Public Utilities (Tacoma, WA)
6
Great River Energy
1
Terry Gifford
Donna
Stephenson
Mike ONeil
NextEra Energy - Florida Power and Light Co.
Southern Company - Southern Company Services,
Matt Carden
Inc.
1
5
Choctaw Generation Limited Partnership, LLLP
Rob Watson
3
Seminole Electric Cooperative, Inc.
Jeremy Lorigan
5
Dominion - Dominion Resources, Inc.
Rachel Snead
10
Northeast Power Coordinating Council
Guy V. Zito
6
Berkshire Hathaway - PacifiCorp
Sandra Shaffer
6
Powerex Corporation
1
American Transmission Company, LLC
4
Alliant Energy Corporation Services, Inc.
Gordon DobsonMack
LaTroy
Brumfield
Larry Heckert
5
New York Power Authority
Shivaz Chopra
4
Public Utility District No. 2 of Grant County,
Washington
Karla Weaver
None
Michael
Johnson
Michael
Johnson
Truong Le
N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Abstain
N/A
Abstain
N/A
Abstain
N/A
Abstain
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Abstain
N/A
Jennie Wike None
N/A
Comments
Negative
Submitted
None
N/A
Michael
Comments
Negative
Johnson
Submitted
Jennie Wike None
N/A
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Abstain
N/A
Comments
Negative
Submitted
Abstain
N/A
Comments
Negative
Submitted
Abstain
N/A
None
N/A
Affirmative N/A
Comments
Negative
Submitted
Affirmative N/A
1
Exelon
Daniel Gacek
3
Exelon
Kinte Whitehead
5
Exelon
Cynthia Lee
6
Exelon
Becky Webb
1
3
5
4
1
Entergy - Entergy Services, Inc.
City Utilities of Springfield, Missouri
Enel Green Power
CMS Energy - Consumers Energy Company
Memphis Light, Gas and Water Division
1
Bonneville Power Administration
Oliver Burke
Duan Gavel
Mat Bunch
Aric Root
Allan Long
Kammy RogersHolliday
6
Bonneville Power Administration
Andrew Meyers
3
Bonneville Power Administration
Ken Lanehome
5
Bonneville Power Administration
Scott Winner
5
Great River Energy
Jacalynn Bentz
1
Georgia Transmission Corporation
Greg Davis
3
Snohomish County PUD No. 1
Holly Chaney
4
Public Utility District No. 1 of Snohomish County John Martinsen
5
Public Utility District No. 1 of Snohomish County Sam Nietfeld
6
Snohomish County PUD No. 1
1
Public Utility District No. 1 of Snohomish County Alyssia Rhoads
5
AEP
Thomas Foltz
1
AEP - AEP Service Corporation
Dennis Sauriol
6
AEP
JT Kuehne
10
ReliabilityFirst
3
Austin Energy
5
5
5
Cogentrix Energy Power Management, LLC
Seminole Electric Cooperative, Inc.
Cowlitz County PUD
John Liang
Anthony
Jablonski
W. Dwayne
Preston
Gerry Adamski
Mickey Bellard
Deanna Carlson
Comments
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
None
N/A
Abstain
N/A
Affirmative N/A
None
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Negative
Affirmative N/A
None
N/A
Abstain
N/A
Affirmative N/A
8
Florida Reliability Coordinating Council –
Member Services Division
Vince Ordax
Abstain
3
AEP
Kent Feliks
Negative
6
10
6
5
3
6
3
5
Lakeland Electric
Texas Reliability Entity, Inc.
Duke Energy
Duke Energy
Duke Energy
Arkansas Electric Cooperative Corporation
Arkansas Electric Cooperative Corporation
Arkansas Electric Cooperative Corporation
Paul Shipps
Rachel Coyne
Greg Cecil
Dale Goodwine
Lee Schuster
Bruce Walkup
Mark Gann
Adrian Harris
None
Abstain
Abstain
Abstain
Abstain
None
None
None
1
East Kentucky Power Cooperative
Amber Skillern
Negative
3
East Kentucky Power Cooperative
Patrick Woods
Negative
1
Duke Energy
Laura Lee
Abstain
1
Arizona Electric Power Cooperative, Inc.
Jennifer Bray
Negative
5
East Kentucky Power Cooperative
mark brewer
Negative
3
5
Wabash Valley Power Association
SunPower
None
None
6
Evergy
None
N/A
1
3
5
5
6
Evergy
Evergy
Evergy
FirstEnergy - FirstEnergy Corporation
FirstEnergy - FirstEnergy Corporation
Susan Sosbe
Bradley Collard
Thomas
ROBBEN
Allen Klassen
Marcus Moor
Derek Brown
Robert Loy
Ann Carey
Comments
Submitted
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
Comments
Submitted
Comments
Submitted
N/A
Comments
Submitted
Comments
Submitted
N/A
N/A
None
None
None
None
None
N/A
N/A
N/A
N/A
N/A
© 2021 - NERC Ver 4.3.0.0
Machine Name: ERODVSBSWB02
N/A
NERC Balloting Tool
Dashboard
Users
Registered Ballot Body
Proxy Ballot Body
My User Profile
Ballots
Ballot Events
Ballot Results
Comment Forms
View Comment Forms
Login / Register
Ballot Results
Ballot Name:
2019-02 BES Cyber System Information Access Management CIP-011-3 Non-Binding Poll AB 2 NB
Voting Start Date:
9/11/2020 12:01:00 AM
Voting End Date:
9/21/2020 8:00:00 PM
Ballot Type:
NB
Ballot Activity:
AB
Ballot Series:
2
Total # Votes:
209
Total Ballot Pool:
263
Quorum:
79.47
Quorum Established Date:
9/21/2020 3:25:14 PM
Weighted Segment Value:
24.36
Actions
Actions
Ballot
Pool
Segment
Segment:
1
Segment:
2
Segment:
3
Segment:
4
Segment:
5
Segment:
6
Segment:
7
Segment:
8
Segment:
Segment
Weight
Affirmative
Votes
Affirmative
Fraction
Negative
Votes
Negative
Fraction
Abstain
No
Vote
72
1
8
0.186
35
0.814
15
14
2
0.2
0
0
2
0.2
0
0
59
1
7
0.194
29
0.806
12
11
14
1
5
0.5
5
0.5
1
3
65
1
12
0.308
27
0.692
12
14
44
1
5
0.217
18
0.783
10
11
0
0
0
0
0
0
0
0
1
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
9
Segment:
6
10
Totals:
263
0.3
1
0.1
2
0.2
2
1
5.5
38
1.506
118
3.994
53
54
Ballot Pool Members
Segment
Organization
Voter
Designated
Proxy
Ballot
3
Con Ed - Consolidated Edison Co. of New York
Peter Yost
Negative
6
Con Ed - Consolidated Edison Co. of New York
Cristhian Godoy
Negative
4
Utility Services, Inc.
3
Ameren - Ameren Services
Brian EvansMongeon
David Jendras
3
WEC Energy Group, Inc.
Thomas Breene
5
Ontario Power Generation Inc.
Constantin
Chitescu
None
NERC
Memo
Comments
Submitted
Comments
Submitted
N/A
Abstain
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
Affirmative N/A
Abstain
N/A
Abstain
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
3
Edison International - Southern California Edison
Neil Shockey
Company
MEAG Power
Roger Brand
5
Con Ed - Consolidated Edison Co. of New York
William Winters
1
1
4
MEAG Power
IDACORP - Idaho Power Company
Seminole Electric Cooperative, Inc.
David Weekley Scott Miller
Laura Nelson
Jonathan Robbins
1
Con Ed - Consolidated Edison Co. of New York
Dermot Smyth
6
WEC Energy Group, Inc.
David Hathaway
2
Independent Electricity System Operator
Leonard Kula
5
Massachusetts Municipal Wholesale Electric
Company
Anthony Stevens
Affirmative N/A
3
Sempra - San Diego Gas and Electric
Bridget Silvia
Negative
3
Basin Electric Power Cooperative
Jeremy Voll
5
5
Edison International - Southern California Edison
Romel Aquino
Company
NRG - NRG Energy, Inc.
Patricia Lynch
1
National Grid USA
1
Western Area Power Administration
sean erickson
Edison International - Southern California Edison Jose Avendano
3
1
Scott Miller
Michael Jones
Barry Jones
Comments
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
Abstain
N/A
None
N/A
1
6
6
Company
Ameren - Ameren Services
Ameren - Ameren Services
Black Hills Corporation
Mora
Tamara Evey
Robert Quinlivan
Brooke Voorhees
3
National Grid USA
Brian Shanahan
5
Ameren - Ameren Missouri
Sam Dwyer
1
Balancing Authority of Northern California
Kevin Smith
Joe Tarantino
6
Sacramento Municipal Utility District
Jamie Cutlip
Joe Tarantino
5
Sacramento Municipal Utility District
Nicole Goi
Joe Tarantino
4
Sacramento Municipal Utility District
Beth Tincher
Joe Tarantino
1
Sacramento Municipal Utility District
Arthur Starkovich Joe Tarantino
3
Sacramento Municipal Utility District
Nicole Looney
6
International Transmission Company Holdings
Corporation
Seattle City Light
3
Puget Sound Energy, Inc.
Tim Womack
6
3
3
4
PPL - Louisville Gas and Electric Co.
PPL - Louisville Gas and Electric Co.
APS - Arizona Public Service Co.
Seattle City Light
Linn Oelker
James Frank
Jessica Lopez
Hao Li
5
Puget Sound Energy, Inc.
Lynn Murphy
6
Western Area Power Administration
Erin Green
5
Sempra - San Diego Gas and Electric
Jennifer Wright
3
1
1
Tennessee Valley Authority
Tennessee Valley Authority
Nebraska Public Power District
10
New York State Reliability Council
Ian Grant
Gabe Kurtz
Jamison Cawley
ALAN
ADAMSON
1
City Utilities of Springfield, Missouri
Michael Bowman
4
City Utilities of Springfield, Missouri
John Allen
5
Avista - Avista Corporation
1
SaskPower
1
APS - Arizona Public Service Co.
Glen Farmer
Wayne
Guttormson
Daniela
Atanasovski
1
Abstain
Abstain
None
Joe Tarantino
Michael Moltane Gail Elliott
Brian Belger
N/A
N/A
N/A
Comments
Negative
Submitted
Abstain
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
None
N/A
Comments
Negative
Submitted
None
N/A
None
N/A
Affirmative N/A
None
N/A
Comments
Negative
Submitted
Abstain
N/A
Comments
Negative
Submitted
Abstain
N/A
Abstain
N/A
Abstain
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Abstain
N/A
Affirmative N/A
10
5
6
6
5
1
Midwest Reliability Organization
APS - Arizona Public Service Co.
Public Utility District No. 2 of Grant County,
Washington
APS - Arizona Public Service Co.
Public Utility District No. 2 of Grant County,
Washington
William Steiner
Kelsi Rigby
None
N/A
Affirmative N/A
LeRoy Patterson
Affirmative N/A
Marcus Bortman
Affirmative N/A
Amy Jones
Abstain
Dairyland Power Cooperative
Renee Leidel
Negative
Kevin Conway
Abstain
N/A
Michael Jang
Quintin Lee
None
Abstain
Negative
N/A
N/A
Comments
Submitted
Comments
Submitted
Comments
Submitted
N/A
Comments
Submitted
N/A
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
3
6
5
Berkshire Hathaway Energy - MidAmerican
Energy Co.
Tacoma Public Utilities (Tacoma, WA)
Tennessee Valley Authority
Austin Energy
1
Puget Sound Energy, Inc.
5
San Miguel Electric Cooperative, Inc.
4
WEC Energy Group, Inc.
5
Platte River Power Authority
1
Glencoe Light and Power Commission
1
Network and Security Technologies
3
Comments
Submitted
Comments
Darnez Gresham
Negative
Submitted
Marc Donaldson Jennie Wike None
N/A
Marjorie Parsons
Abstain
N/A
Lisa Martin
Affirmative N/A
Comments
Chelsey Neil
Negative
Submitted
Lana Smith
None
N/A
Comments
Matthew Beilfuss
Negative
Submitted
Tyson Archie
Abstain
N/A
Comments
Terry Volkmann
Negative
Submitted
Roger
Comments
Nicholas Lauriat
Negative
Fradenburgh
Submitted
1
1
Public Utility District No. 1 of Pend Oreille
County
Seattle City Light
Eversource Energy
6
Basin Electric Power Cooperative
Jerry Horner
1
Minnkota Power Cooperative Inc.
Theresa Allard
3
Associated Electric Cooperative, Inc.
Todd Bennett
Negative
3
Platte River Power Authority
Wade Kiess
Abstain
6
Associated Electric Cooperative, Inc.
Brian Ackermann
Negative
1
Central Electric Power Cooperative (Missouri)
Michael Bax
None
3
M and A Electric Power Cooperative
Stephen Pogue
Negative
1
KAMO Electric Cooperative
Micah Breedlove
Negative
5
Associated Electric Cooperative, Inc.
Brad Haralson
Negative
3
Northeast Missouri Electric Power Cooperative
Skyler Wiegmann
Negative
3
KAMO Electric Cooperative
Tony Gott
Negative
1
N/A
Andy
Fuhrman
Negative
Truong Le
Truong Le
Truong Le
Submitted
Comments
Negative
Submitted
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Truong Le
Affirmative N/A
3
Sho-Me Power Electric Cooperative
Jarrod Murdaugh
1
5
4
3
Sho-Me Power Electric Cooperative
Florida Municipal Power Agency
Florida Municipal Power Agency
Florida Municipal Power Agency
6
Florida Municipal Power Agency
Peter Dawson
Chris Gowder
Carol Chinn
Dale Ray
Richard
Montgomery
1
Northeast Missouri Electric Power Cooperative
Kevin White
Negative
1
N.W. Electric Power Cooperative, Inc.
Mark Ramsey
Negative
3
NW Electric Power Cooperative, Inc.
John Stickley
Negative
1
Hydro One Networks, Inc.
6
5
1
Platte River Power Authority
Los Angeles Department of Water and Power
Tacoma Public Utilities (Tacoma, WA)
Payam
Farahbakhsh
Sabrina Martz
Glenn Barry
John Merrell
5
Brazos Electric Power Cooperative, Inc.
Shari Heino
5
Herb Schrayshuen
3
Lakeland Electric
Herb
Schrayshuen
Steve Marshall
3
Georgia System Operations Corporation
Scott McGough
1
3
3
Long Island Power Authority
Manitoba Hydro
Los Angeles Department of Water and Power
Robert Ganley
Mike Smith
Tony Skourtas
1
Tri-State G and T Association, Inc.
Kjersti Drott
4
FirstEnergy - FirstEnergy Corporation
3
Tri-State G and T Association, Inc.
1
5
Lakeland Electric
Lakeland Electric
Mark Garza
Janelle Marriott
Gill
Larry Watt
Becky Rinier
6
OGE Energy - Oklahoma Gas and Electric Co.
Sing Tay
3
1
Eversource Energy
Tallahassee Electric (City of Tallahassee, FL)
Sharon Flannery
Scott Langston
5
Oglethorpe Power Corporation
Donna Johnson
1
1
5
Los Angeles Department of Water and Power
Black Hills Corporation
Black Hills Corporation
faranak sarbaz
Seth Nelson
Derek Silbaugh
Mark Ciufo
Negative
Abstain
Abstain
Jennie Wike None
Negative
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
N/A
N/A
N/A
Comments
Submitted
Affirmative N/A
None
N/A
Comments
Negative
Submitted
Abstain
N/A
None
N/A
Abstain
N/A
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
None
N/A
None
N/A
Comments
Negative
Submitted
Abstain
N/A
Affirmative N/A
Comments
Negative
Submitted
Abstain
N/A
None
N/A
None
N/A
1
Seminole Electric Cooperative, Inc.
Bret Galbraith
Abstain
6
NiSource - Northern Indiana Public Service Co.
Joe O'Brien
Negative
3
NiSource - Northern Indiana Public Service Co.
Steven Taddeucci
Negative
6
New York Power Authority
Erick Barrios
Negative
6
Talen Energy Marketing, LLC
1
FirstEnergy - FirstEnergy Corporation
Jennifer
Hohenshilt
Julie Severino
1
M and A Electric Power Cooperative
William Price
3
Dominion - Dominion Resources, Inc.
Connie Schroeder
3
Muscatine Power and Water
Seth Shoemaker
6
Muscatine Power and Water
Nick Burns
3
OGE Energy - Oklahoma Gas and Electric Co.
Donald Hargrove
3
Westar Energy
Bryan Taggart
5
Westar Energy
Derek Brown
6
Westar Energy
Grant Wilkerson
None
6
6
Manitoba Hydro
1
Westar Energy
Allen Klassen
Negative
5
Tennessee Valley Authority
None
3
FirstEnergy - FirstEnergy Corporation
M Lee Thomas
Aaron
Ghodooshim
1
OGE Energy - Oklahoma Gas and Electric Co.
Terri Pyle
Negative
3
6
3
Black Hills Corporation
Don Stahl
PSEG - PSEG Energy Resources and Trade LLC Joseph Neglia
Nebraska Public Power District
Tony Eddleman
5
Northern California Power Agency
Marty Hostler
3
CMS Energy - Consumers Energy Company
5
CMS Energy - Consumers Energy Company
Karl Blaszkowski
David
Greyerbiehl
4
Georgia System Operations Corporation
William D. Shultz
Ann Carey
Simon TanapatAndre
Andrea Barclay
N/A
Affirmative N/A
Comments
Negative
Submitted
Abstain
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Southern Company - Southern Company
Generation
FirstEnergy - FirstEnergy Solutions
5
N/A
Comments
Submitted
Comments
Submitted
Comments
Submitted
None
N/A
Comments
Submitted
N/A
Affirmative N/A
Comments
Submitted
None
N/A
Abstain
N/A
Abstain
N/A
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
Negative
Comments
Submitted
1
New York Power Authority
1
5
5
3
3
OTP - Otter Tail Power Company
PSEG - PSEG Fossil LLC
OTP - Otter Tail Power Company
OTP - Otter Tail Power Company
Owensboro Municipal Utilities
Salvatore
Spagnolo
Charles Wicklund
Tim Kucey
Brett Jacobs
Wendi Olson
Thomas Lyons
1
Hydro-Qu?bec TransEnergie
Nicolas Turcotte
5
6
Entergy - Entergy Services, Inc.
Portland General Electric Co.
Gail Golden
Daniel Mason
1
Muscatine Power and Water
Andy Kurriger
3
New York Power Authority
David Rivera
1
BC Hydro and Power Authority
Adrian Andreoiu
1
NiSource - Northern Indiana Public Service Co.
Steve Toosevich
5
NiSource - Northern Indiana Public Service Co.
Kathryn Tackett
3
6
BC Hydro and Power Authority
Los Angeles Department of Water and Power
Hootan Jarollahi
Anton Vu
1
Omaha Public Power District
Doug Peterchuck
5
10
5
FirstEnergy - FirstEnergy Solutions
SERC Reliability Corporation
JEA
Robert Loy
Dave Krueger
John Babik
2
Electric Reliability Council of Texas, Inc.
Brandon Gleason
6
5
1
6
Seminole Electric Cooperative, Inc.
Imperial Irrigation District
Sunflower Electric Power Corporation
Imperial Irrigation District
David Reinecke
Tino Zaragoza
Paul Mehlhaff
Diana Torres
1
Public Utility District No. 1 of Chelan County
Ginette Lacasse
5
Public Utility District No. 1 of Chelan County
Meaghan Connell
1
Imperial Irrigation District
Jesus Sammy
Alcaraz
Affirmative N/A
3
Public Utility District No. 1 of Chelan County
Joyce Gundry
Negative
Comments
Submitted
5
BC Hydro and Power Authority
Helen Hamilton
Harding
Abstain
N/A
Lynn Goldstein
None
N/A
Nurul Abser
Abstain
N/A
Comments
1
1
PNM Resources - Public Service Company of
New Mexico
NB Power Corporation
Comments
Submitted
None
N/A
Abstain
N/A
None
N/A
None
N/A
Abstain
N/A
Comments
Negative
Submitted
None
N/A
None
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Abstain
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Abstain
N/A
Abstain
N/A
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
Abstain
N/A
Comments
Negative
Submitted
Abstain
N/A
Affirmative N/A
None
N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Negative
5
1
5
5
3
5
3
5
5
3
1
1
6
3
5
5
6
1
5
4
6
1
5
6
6
1
1
5
3
5
10
6
Dairyland Power Cooperative
Tommy Drea
Negative
Submitted
Berkshire Hathaway Energy - MidAmerican
Comments
Terry Harbour
Negative
Energy Co.
Submitted
Comments
Hydro-Qu?bec Production
Carl Pineault
Negative
Submitted
Tacoma Public Utilities (Tacoma, WA)
Ozan Ferrin
Jennie Wike None
N/A
Imperial Irrigation District
Glen Allegranza
Affirmative N/A
Portland General Electric Co.
Ryan Olson
None
N/A
Portland General Electric Co.
Dan Zollner
None
N/A
JULIE
PPL - Louisville Gas and Electric Co.
None
N/A
HOSTRANDER
Berkshire Hathaway - NV Energy
Kevin Salsbury
Affirmative N/A
Michael
Comments
Pacific Gas and Electric Company
Sandra Ellis
Negative
Johnson
Submitted
Michael
Comments
Pacific Gas and Electric Company
Marco Rios
Negative
Johnson
Submitted
Santee Cooper
Chris Wagner
Abstain
N/A
Santee Cooper
Marty Watson
Abstain
N/A
Santee Cooper
James Poston
Abstain
N/A
Santee Cooper
Tommy Curtis
Abstain
N/A
Comments
WEC Energy Group, Inc.
Janet OBrien
Negative
Submitted
Comments
Dominion - Dominion Resources, Inc.
Sean Bodkin
Negative
Submitted
Gainesville Regional Utilities
David Owens
Truong Le
Affirmative N/A
Kayleigh
Lincoln Electric System
Abstain
N/A
Wilkerson
Tacoma Public Utilities (Tacoma, WA)
Hien Ho
Jennie Wike None
N/A
Comments
Northern California Power Agency
Dennis Sismaet
Negative
Submitted
Portland General Electric Co.
Brooke Jockin
None
N/A
Michael
Comments
Pacific Gas and Electric Company
Ed Hanson
Negative
Johnson
Submitted
Tacoma Public Utilities (Tacoma, WA)
Terry Gifford
Jennie Wike None
N/A
Donna
Comments
Great River Energy
Negative
Stephenson
Submitted
NextEra Energy - Florida Power and Light Co.
Mike ONeil
Affirmative N/A
Southern Company - Southern Company Services,
Comments
Matt Carden
Negative
Inc.
Submitted
Comments
Choctaw Generation Limited Partnership, LLLP Rob Watson
Negative
Submitted
Seminole Electric Cooperative, Inc.
Jeremy Lorigan
Abstain
N/A
Comments
Dominion - Dominion Resources, Inc.
Rachel Snead
Negative
Submitted
Northeast Power Coordinating Council
Guy V. Zito
Abstain
N/A
Comments
Berkshire Hathaway - PacifiCorp
Sandra Shaffer
Negative
Submitted
6
Powerex Corporation
1
American Transmission Company, LLC
4
Alliant Energy Corporation Services, Inc.
Gordon DobsonMack
LaTroy
Brumfield
Larry Heckert
5
New York Power Authority
Shivaz Chopra
4
Public Utility District No. 2 of Grant County,
Washington
Karla Weaver
Affirmative N/A
1
Exelon
Daniel Gacek
Negative
3
Exelon
Kinte Whitehead
5
Exelon
Cynthia Lee
6
Exelon
Becky Webb
1
3
5
4
1
Entergy - Entergy Services, Inc.
City Utilities of Springfield, Missouri
Enel Green Power
CMS Energy - Consumers Energy Company
Memphis Light, Gas and Water Division
1
Bonneville Power Administration
Oliver Burke
Duan Gavel
Mat Bunch
Aric Root
Allan Long
Kammy RogersHolliday
6
Bonneville Power Administration
Andrew Meyers
3
Bonneville Power Administration
Ken Lanehome
5
Bonneville Power Administration
Scott Winner
5
Great River Energy
Jacalynn Bentz
1
Georgia Transmission Corporation
Greg Davis
3
Snohomish County PUD No. 1
Holly Chaney
4
Public Utility District No. 1 of Snohomish County John Martinsen
5
Public Utility District No. 1 of Snohomish County Sam Nietfeld
6
Snohomish County PUD No. 1
1
Public Utility District No. 1 of Snohomish County Alyssia Rhoads
5
AEP
John Liang
Thomas Foltz
Abstain
N/A
None
N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
None
N/A
Abstain
N/A
Affirmative N/A
None
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
1
AEP - AEP Service Corporation
Dennis Sauriol
Negative
6
AEP
JT Kuehne
Negative
10
ReliabilityFirst
3
Austin Energy
5
5
5
Cogentrix Energy Power Management, LLC
Seminole Electric Cooperative, Inc.
Cowlitz County PUD
Florida Reliability Coordinating Council –
Member Services Division
8
Anthony
Jablonski
W. Dwayne
Preston
Gerry Adamski
Mickey Bellard
Deanna Carlson
Negative
Submitted
Comments
Submitted
Comments
Submitted
Affirmative N/A
None
N/A
Abstain
N/A
Affirmative N/A
Vince Ordax
Abstain
N/A
3
AEP
Kent Feliks
Negative
6
10
6
5
3
6
3
5
Lakeland Electric
Texas Reliability Entity, Inc.
Duke Energy
Duke Energy
Duke Energy
Arkansas Electric Cooperative Corporation
Arkansas Electric Cooperative Corporation
Arkansas Electric Cooperative Corporation
Paul Shipps
Rachel Coyne
Greg Cecil
Dale Goodwine
Lee Schuster
Bruce Walkup
Mark Gann
Adrian Harris
None
Abstain
Abstain
Abstain
Abstain
None
None
None
1
East Kentucky Power Cooperative
Amber Skillern
Negative
3
East Kentucky Power Cooperative
Patrick Woods
Negative
1
Duke Energy
Laura Lee
Abstain
1
Arizona Electric Power Cooperative, Inc.
Jennifer Bray
Negative
5
East Kentucky Power Cooperative
mark brewer
Negative
3
5
Wabash Valley Power Association
SunPower
None
None
6
Evergy
None
N/A
1
3
5
5
6
Evergy
Evergy
Evergy
FirstEnergy - FirstEnergy Corporation
FirstEnergy - FirstEnergy Corporation
Susan Sosbe
Bradley Collard
Thomas
ROBBEN
Allen Klassen
Marcus Moor
Derek Brown
Robert Loy
Ann Carey
Comments
Submitted
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
Comments
Submitted
Comments
Submitted
N/A
Comments
Submitted
Comments
Submitted
N/A
N/A
None
None
None
None
None
N/A
N/A
N/A
N/A
N/A
© 2021 - NERC Ver 4.3.0.0
Machine Name: ERODVSBSWB02
CIP-004-X — Cyber Security – Personnel & Training
Standard Development Timeline
This section is maintained by the drafting team during the development of the standard and will be
removed when the standard is adopted by the NERC Board of Trustees (Board).
Description of Current Draft
Completed Actions
Standards Committee approved Standard Authorization Request
(SAR) for posting
SAR posted for comment
Date
March 22, 2019
March 28, 2019 –
April 26, 2019
45-day formal comment period with ballot
December 20, 2019
– February 3, 2020
45-day formal comment period with ballot
August 6 –
September 21, 2020
45-day formal comment period with ballot
March 25 – May 10,
2021
Anticipated Actions
10-day final ballot
Board adoption
Draft 3
March 2021
Date
May 2021
November 2021
Page 1 of 36
CIP-004-X — Cyber Security – Personnel & Training
A. Introduction
1. Title:
Cyber Security — Personnel & Training
2. Number:
CIP-004-X
3. Purpose:
To minimize the risk against compromise that could lead to misoperation or
instability in the Bulk Electric System (BES) from individuals accessing BES Cyber
Systems by requiring an appropriate level of personnel risk assessment, training,
security awareness, and access management in support of protecting BES Cyber
Systems.
4. Applicability:
4.1.
Functional Entities: For the purpose of the requirements contained herein, the following
list of functional entities will be collectively referred to as “Responsible Entities.” For
requirements in this standard where a specific functional entity or subset of functional
entities are the applicable entity or entities, the functional entity or entities are specified
explicitly.
4.1.1. Balancing Authority
4.1.2. Distribution Provider that owns one or more of the following Facilities, systems, and
equipment for the protection or restoration of the BES:
4.1.2.1. Each underfrequency Load shedding (UFLS) or undervoltage Load shedding
(UVLS) system that:
4.1.2.1.1. is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.1.2.1.2. performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation, of
300 MW or more.
4.1.2.2. Each Remedial Action Scheme (RAS) where the RAS is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.1.2.3. Each Protection System (excluding UFLS and UVLS) that applies to Transmission
where the Protection System is subject to one or more requirements in a NERC
or Regional Reliability Standard.
4.1.2.4. Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.1.3. Generator Operator
4.1.4. Generator Owner
4.1.5. Reliability Coordinator
4.1.6. Transmission Operator
Draft 3
March 2021
Page 2 of 36
CIP-004-X — Cyber Security – Personnel & Training
4.1.7. Transmission Owner
4.2.
Facilities: For the purpose of the requirements contained herein, the following
Facilities, systems, and equipment owned by each Responsible Entity in 4.1 above are
those to which these requirements are applicable. For requirements in this standard
where a specific type of Facilities, system, or equipment or subset of Facilities, systems,
and equipment are applicable, these are specified explicitly.
4.2.1. Distribution Provider: One or more of the following Facilities, systems and
equipment owned by the Distribution Provider for the protection or restoration of
the BES:
4.2.1.1. Each UFLS or UVLS System that:
4.2.1.1.1. is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.2.1.1.2. performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation, of
300 MW or more.
4.2.1.2. Each RAS where the RAS is subject to one or more requirements in a NERC or
Regional Reliability Standard.
4.2.1.3. Each Protection System (excluding UFLS and UVLS) that applies to Transmission
where the Protection System is subject to one or more requirements in a NERC
or Regional Reliability Standard.
4.2.1.4. Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.2.2. Responsible Entities listed in 4.1 other than Distribution Providers:
All BES Facilities.
4.2.3. Exemptions: The following are exempt from Standard CIP-004-X:
4.2.3.1. Cyber Assets at Facilities regulated by the Canadian Nuclear Safety Commission.
4.2.3.2. Cyber Assets associated with communication networks and data
communication links between discrete Electronic Security Perimeters.
4.2.3.3. The systems, structures, and components that are regulated by the Nuclear
Regulatory Commission under a cyber security plan pursuant to 10 C.F.R.
Section 73.54.
4.2.3.4. For Distribution Providers, the systems and equipment that are not included in
section 4.2.1 above.
Draft 3
March 2021
Page 3 of 36
CIP-004-X — Cyber Security – Personnel & Training
4.2.3.5. Responsible Entities that identify that they have no BES Cyber Systems
categorized as high impact or medium impact according to the CIP-002-5.1a
identification and categorization processes.
5. Effective Dates: See Implementation Plan for CIP-004-X.
6. Background:
Standard CIP-004 exists as part of a suite of CIP Standards related to cyber security, which
require the initial identification and categorization of BES Cyber Systems and require a
minimum level of organizational, operational, and procedural controls to mitigate risk to BES
Cyber Systems.
Most requirements open with, “Each Responsible Entity shall implement one or more
documented [processes, plan, etc.] that include the applicable items in [Table Reference].” The
referenced table requires the applicable items in the procedures for the common subject
matter of the requirements.
The term documented processes refers to a set of required instructions specific to the
Responsible Entity and to achieve a specific outcome. This term does not imply any particular
naming or approval structure beyond what is stated in the requirements. An entity should
include as much as it believes necessary in its documented processes, but it must address the
applicable requirements in the table.
The terms program and plan are sometimes used in place of documented processes where it
makes sense and is commonly understood. For example, documented processes describing a
response are typically referred to as plans (i.e., incident response plans and recovery plans).
Likewise, a security plan can describe an approach involving multiple procedures to address a
broad subject matter.
Similarly, the term program may refer to the organization’s overall implementation of its
policies, plans and procedures involving a subject matter. Examples in the standards include
the personnel risk assessment program and the personnel training program. The full
implementation of the CIP Cyber Security Standards could also be referred to as a program.
However, the terms program and plan do not imply any additional requirements beyond what
is stated in the standards.
Responsible Entities can implement common controls that meet requirements for multiple high
and medium impact BES Cyber Systems. For example, a single training program could meet the
requirements for training personnel across multiple BES Cyber Systems.
Measures for the initial requirement are simply the documented processes themselves.
Measures in the table rows provide examples of evidence to show documentation and
implementation of applicable items in the documented processes. These measures serve to
provide guidance to entities in acceptable records of compliance and should not be viewed as
an all-inclusive list.
Throughout the standards, unless otherwise stated, bulleted items in the requirements and
measures are items that are linked with an “or,” and numbered items are items that are linked
with an “and.”
Draft 3
March 2021
Page 4 of 36
CIP-004-X — Cyber Security – Personnel & Training
Many references in the Applicability section use a threshold of 300 MW for UFLS and UVLS.
This particular threshold of 300 MW for UVLS and UFLS was provided in Version 1 of the CIP
Cyber Security Standards. The threshold remains at 300 MW since it is specifically addressing
UVLS and UFLS, which are last ditch efforts to save the BES. A review of UFLS tolerances defined
within regional reliability standards for UFLS program requirements to date indicates that the
historical value of 300 MW represents an adequate and reasonable threshold value for
allowable UFLS operational tolerances.
“Applicable Systems” Columns in Tables:
Each table has an “Applicable Systems” column to further define the scope of systems to which
a specific requirement row applies. The CSO706 SDT adapted this concept from the National
Institute of Standards and Technology (“NIST”) Risk Management Framework as a way of
applying requirements more appropriately based on impact and connectivity characteristics.
The following conventions are used in the “Applicable Systems” column as described.
• High Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as high impact
according to the CIP-002-5.1a identification and categorization processes.
• Medium Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as medium
impact according to the CIP-002-5.1a identification and categorization processes.
• Medium Impact BES Cyber Systems with External Routable Connectivity – Only applies to
medium impact BES Cyber Systems with External Routable Connectivity. This also excludes
Cyber Assets in the BES Cyber System that cannot be directly accessed through External
Routable Connectivity.
• Electronic Access Control or Monitoring Systems (EACMS) – Applies to each Electronic
Access Control or Monitoring System associated with a referenced high impact BES Cyber
System or medium impact BES Cyber System. Examples may include, but are not limited to,
firewalls, authentication servers, and log monitoring and alerting systems.
• Physical Access Control Systems (PACS) – Applies to each Physical Access Control System
associated with a referenced high impact BES Cyber System or medium impact BES Cyber
System with External Routable Connectivity.
Draft 3
March 2021
Page 5 of 36
CIP-004-X — Cyber Security – Personnel & Training
B. Requirements and Measures
R1.
Each Responsible Entity shall implement one or more documented processes that collectively include each of the
applicable requirement parts in CIP-004-X Table R1 – Security Awareness Program. [Violation Risk Factor: Lower] [Time
Horizon: Operations Planning]
M1. Evidence must include each of the applicable documented processes that collectively include each of the applicable
requirement parts in CIP-004-X Table R1 – Security Awareness Program and additional evidence to demonstrate
implementation as described in the Measures column of the table.
CIP-004-X Table R1 – Security Awareness Program
Part
1.1
Applicable Systems
High Impact BES Cyber Systems
Medium Impact BES Cyber Systems
Requirements
Security awareness that, at least once
each calendar quarter, reinforces cyber
security practices (which may include
associated physical security practices)
for the Responsible Entity’s personnel
who have authorized electronic or
authorized unescorted physical access
to BES Cyber Systems.
Measures
An example of evidence may include,
but is not limited to, documentation
that the quarterly reinforcement has
been provided. Examples of evidence
of reinforcement may include, but are
not limited to, dated copies of
information used to reinforce security
awareness, as well as evidence of
distribution, such as:
•
•
•
Draft 3
March 2021
direct communications (for
example, e-mails, memos,
computer-based training); or
indirect communications (for
example, posters, intranet, or
brochures); or
management support and
reinforcement (for example,
presentations or meetings).
Page 6 of 36
CIP-004-X — Cyber Security – Personnel & Training
R2. Each Responsible Entity shall implement one or more cyber security training program(s) appropriate to individual roles,
functions, or responsibilities that collectively includes each of the applicable requirement parts in CIP-004-X Table R2 –
Cyber Security Training Program. [Violation Risk Factor: Lower] [Time Horizon: Operations Planning]
M2. Evidence must include the training program that includes each of the applicable requirement parts in CIP-004-X Table R2 –
Cyber Security Training Program and additional evidence to demonstrate implementation of the program(s).
CIP-004-X Table R2 – Cyber Security Training Program
Part
2.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Requirements
Training content on:
2.1.1. Cyber security policies;
2.1.2. Physical access controls;
2.1.3. Electronic access controls;
2.1.4. The visitor control program;
Measures
Examples of evidence may include,
but are not limited to, training
material such as power point
presentations, instructor notes,
student notes, handouts, or other
training materials.
2.1.5. Handling of BES Cyber System
Information and its storage;
2.1.6. Identification of a Cyber
Security Incident and initial
notifications in accordance
with the entity’s incident
response plan;
2.1.7. Recovery plans for BES Cyber
Systems;
2.1.8. Response to Cyber Security
Incidents; and
2.1.9. Cyber security risks associated
with a BES Cyber System’s
electronic interconnectivity
and interoperability with
Draft 3
March 2021
Page 7 of 36
CIP-004-X — Cyber Security – Personnel & Training
CIP-004-X Table R2 – Cyber Security Training Program
Part
Applicable Systems
Requirements
Measures
other Cyber Assets, including
Transient Cyber Assets, and
with Removable Media.
2.2
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
Require completion of the training
specified in Part 2.1 prior to granting
authorized electronic access and
authorized unescorted physical access
to applicable Cyber Assets, except
during CIP Exceptional Circumstances.
Examples of evidence may include,
but are not limited to, training
records and documentation of when
CIP Exceptional Circumstances were
invoked.
Require completion of the training
specified in Part 2.1 at least once
every 15 calendar months.
Examples of evidence may include,
but are not limited to, dated
individual training records.
1. EACMS; and
2. PACS
2.3
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 3
March 2021
Page 8 of 36
CIP-004-X — Cyber Security – Personnel & Training
R3.
Each Responsible Entity shall implement one or more documented personnel risk assessment program(s) to attain and
retain authorized electronic or authorized unescorted physical access to BES Cyber Systems that collectively include each of
the applicable requirement parts in CIP-004-X Table R3 – Personnel Risk Assessment Program. [Violation Risk Factor:
Medium] [Time Horizon: Operations Planning].
M3. Evidence must include the documented personnel risk assessment programs that collectively include each of the applicable
requirement parts in CIP-004-X Table R3 – Personnel Risk Assessment Program and additional evidence to demonstrate
implementation of the program(s).
CIP-004-X Table R2 – Cyber Security Training Program
Part
3.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
Requirements
Process to confirm identity.
1. EACMS; and
2. PACS
Measures
An example of evidence may include,
but is not limited to, documentation
of the Responsible Entity’s process to
confirm identity.
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
3.2
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
Draft 3
March 2021
Process to perform a seven year
criminal history records check as part
of each personnel risk assessment
that includes:
3.2.1. current residence, regardless
of duration; and
An example of evidence may include,
but is not limited to, documentation
of the Responsible Entity’s process to
perform a seven year criminal history
records check.
3.2.2. other locations where, during
the seven years immediately prior
to the date of the criminal history
Page 9 of 36
CIP-004-X — Cyber Security – Personnel & Training
CIP-004-X Table R2 – Cyber Security Training Program
Part
Applicable Systems
2. PACS
Requirements
Measures
records check, the subject has
resided for six consecutive months
or more.
If it is not possible to perform a full
seven year criminal history records
check, conduct as much of the seven
year criminal history records check as
possible and document the reason
the full seven year criminal history
records check could not be
performed.
3.3
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
Criteria or process to evaluate
criminal history records checks for
authorizing access.
An example of evidence may include,
but is not limited to, documentation
of the Responsible Entity’s process to
evaluate criminal history records
checks.
Criteria or process for verifying that
personnel risk assessments
performed for contractors or service
vendors are conducted according to
Parts 3.1 through 3.3.
An example of evidence may include,
but is not limited to, documentation
of the Responsible Entity’s criteria or
process for verifying contractors or
service vendors personnel risk
assessments.
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
3.4
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
Draft 3
March 2021
Page 10 of 36
CIP-004-X — Cyber Security – Personnel & Training
CIP-004-X Table R2 – Cyber Security Training Program
Part
Applicable Systems
Requirements
Measures
Process to ensure that individuals
with authorized electronic or
authorized unescorted physical access
have had a personnel risk assessment
completed according to Parts 3.1 to
3.4 within the last seven years.
An example of evidence may include,
but is not limited to, documentation
of the Responsible Entity’s process
for ensuring that individuals with
authorized electronic or authorized
unescorted physical access have had
a personnel risk assessment
completed within the last seven
years.
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
3.5
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
PACS
Draft 3
March 2021
Page 11 of 36
CIP-004-X — Cyber Security – Personnel & Training
R4. Each Responsible Entity shall implement one or more documented access management program(s) that collectively include
each of the applicable requirement parts in CIP-004-X Table R4 – Access Management Program. [Violation Risk Factor:
Medium] [Time Horizon: Operations Planning and Same Day Operations].
M4. Evidence must include the documented processes that collectively include each of the applicable requirement parts in CIP004-X Table R4 – Access Management Program and additional evidence to demonstrate that the access management
program was implemented as described in the Measures column of the table.
CIP-004-X Table R4 – Access Management Program
Part
Applicable Systems
4.1
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
Requirements
Process to authorize based on need, as
determined by the Responsible Entity,
except for CIP Exceptional
Circumstances:
4.1.1. Electronic access; and
4.1.2. Unescorted physical access into a
Physical Security Perimeter
Measures
An example of evidence may
include, but is not limited to, dated
documentation of the process to
authorize electronic access, and
unescorted physical access in a
Physical Security Perimeter.
1. EACMS; and
2. PACS
Draft 3
March 2021
Page 12 of 36
CIP-004-X — Cyber Security – Personnel & Training
CIP-004-X Table R4 – Access Management Program
Part
Applicable Systems
4.2
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Requirements
Verify at least once each calendar
quarter that individuals with active
electronic access or unescorted physical
access have authorization records.
Measures
Examples of evidence may include,
but are not limited to:
•
Dated documentation of the
verification between the system
generated list of individuals who
have been authorized for access
(i.e., workflow database) and a
system generated list of
personnel who have access (i.e.,
user account listing), or
•
Dated documentation of the
verification between a list of
individuals who have been
authorized for access (i.e.,
authorization forms) and a list
of individuals provisioned for
access (i.e., provisioning forms
or shared account listing).
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Draft 3
March 2021
Page 13 of 36
CIP-004-X — Cyber Security – Personnel & Training
CIP-004-X Table R4 – Access Management Program
Part
Applicable Systems
Requirements
4.3
High Impact BES Cyber Systems and their
associated:
For electronic access, verify at least once
every 15 calendar months that all user
accounts, user account groups, or user
role categories, and their specific,
associated privileges are correct and are
those that the Responsible Entity
determines are necessary.
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Measures
An example of evidence may
include, but is not limited to,
documentation of the review that
includes all of the following:
1. A dated listing of all
accounts/account groups or
roles within the system;
2. A summary description of
privileges associated with
each group or role;
3. Accounts assigned to the
group or role; and
4. Dated evidence showing
verification of the privileges
for the group are authorized
and appropriate to the work
function performed by
people assigned to each
account.
Draft 3
March 2021
Page 14 of 36
CIP-004-X — Cyber Security – Personnel & Training
R5. Each Responsible Entity shall implement one or more documented access revocation program(s) that collectively include
each of the applicable requirement parts in CIP-004-X Table R5 – Access Revocation. [Violation Risk Factor: Medium] [Time
Horizon: Same Day Operations and Operations Planning].
M5. Evidence must include each of the applicable documented programs that collectively include each of the applicable
requirement parts in CIP-004-X Table R5 – Access Revocation and additional evidence to demonstrate implementation as
described in the Measures column of the table.
CIP-004-X Table R5 – Access Revocation
Part
5.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 3
March 2021
Requirements
Measures
A process to initiate removal of an
individual’s ability for unescorted
physical access and Interactive Remote
Access upon a termination action, and
complete the removals within 24 hours
of the termination action (Removal of
the ability for access may be different
than deletion, disabling, revocation, or
removal of all access rights).
An example of evidence may include,
but is not limited to, documentation of
all of the following:
1. Dated workflow or sign-off form
verifying access removal
associated with the termination
action; and
2. Logs or other demonstration
showing such persons no longer
have access.
Page 15 of 36
CIP-004-X — Cyber Security – Personnel & Training
CIP-004-X Table R5 – Access Revocation
Part
5.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 3
March 2021
Requirements
Measures
For reassignments or transfers, revoke
the individual’s authorized electronic
access to individual accounts and
authorized unescorted physical access
that the Responsible Entity determines
are not necessary by the end of the
next calendar day following the date
that the Responsible Entity determines
that the individual no longer requires
retention of that access.
An example of evidence may include,
but is not limited to, documentation of
all of the following:
1. Dated workflow or sign-off form
showing a review of logical and
physical access; and
2. Logs or other demonstration
showing such persons no longer
have access that the
Responsible Entity determines
is not necessary.
Page 16 of 36
CIP-004-X — Cyber Security – Personnel & Training
CIP-004-X Table R5 – Access Revocation
Part
5.3
Applicable Systems
High Impact BES Cyber Systems and
their associated:
•
Draft 3
March 2021
EACMS
Requirements
Measures
For termination actions, revoke the
individual’s non-shared user accounts
(unless already revoked according to
Part 5.1) within 30 calendar days of the
effective date of the termination
action.
An example of evidence may include,
but is not limited to, workflow or signoff form showing access removal for
any individual BES Cyber Assets and
software applications as determined
necessary to completing the revocation
of access and dated within thirty
calendar days of the termination
actions.
Page 17 of 36
CIP-004-X — Cyber Security – Personnel & Training
CIP-004-X Table R5 – Access Revocation
Part
5.4
Applicable Systems
High Impact BES Cyber Systems and
their associated:
•
EACMS
Requirements
For termination actions, change
Examples of evidence may include, but
passwords for shared account(s) known are not limited to:
to the user within 30 calendar days of
• Workflow or sign-off form
the termination action. For
showing password reset within
reassignments or transfers, change
30 calendar days of the
passwords for shared account(s) known
termination;
to the user within 30 calendar days
• Workflow or sign-off form
following the date that the Responsible
showing password reset within
Entity determines that the individual no
30 calendar days of the
longer requires retention of that
reassignments or transfers; or
access.
If the Responsible Entity determines
and documents that extenuating
operating circumstances require a
longer time period, change the
password(s) within 10 calendar days
following the end of the operating
circumstances.
Draft 3
March 2021
Measures
•
Documentation of the
extenuating operating
circumstance and workflow or
sign-off form showing password
reset within 10 calendar days
following the end of the
operating circumstance.
Page 18 of 36
CIP-004-X — Cyber Security – Personnel & Training
R6. Each Responsible Entity shall implement one or more documented access management program(s) to authorize, verify, and
revoke provisioned access to BCSI pertaining to the “Applicable Systems” identified in CIP-004-X Table R6 – Access
Management for BES Cyber System Information that collectively include each of the applicable requirement parts in CIP‐
004‐X Table R6 – Access Management for BES Cyber System Information. To be considered access to BCSI in the context of
this requirement, an individual has both the ability to obtain and use BCSI. [Violation Risk Factor: Medium] [Time Horizon:
Same Day Operations and Operations Planning].
M6. Evidence must include each of the applicable documented programs that collectively include the applicable requirement
parts in CIP-004-X Table R6 – Access Management for BES Cyber System Information and additional evidence to
demonstrate implementation as described in the Measures column of the table.
CIP-004-X Table R6 – Access Management for BES Cyber System Information
Part
6.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 3
March 2021
Requirements
Measures
Prior to provisioning, authorize (unless
already authorized according to Part
4.1.) based on need, as determined by
the Responsible Entity, except for CIP
Exceptional Circumstances:
Examples of evidence may include, but
are not limited to, individual records or
lists that include who is authorized, the
date of the authorization, and the
justification of business need for the
provisioned access.
6.1.1. Provisioned electronic access to
electronic BCSI; and
6.1.2. Provisioned physical access to
physical BCSI.
Note: Provisioned access is to be
considered the result of the specific
actions taken to provide an
individual(s) the means to access BCSI
(e.g., may include physical keys or
access cards, user accounts and
associated rights and privileges,
encryption keys).
Page 19 of 36
CIP-004-X — Cyber Security – Personnel & Training
CIP-004-X Table R6 – Access Management for BES Cyber System Information
Part
6.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
Requirements
Verify at least once every 15 calendar
months that all individuals with
provisioned access to BCSI:
6.2.1. have an authorization record;
and
6.2.2. still need the provisioned access
to perform their current work
functions, as determined by the
Responsible Entity.
Measures
Examples of evidence may include, but
are not limited to, the documentation
of the review that includes all of the
following:
•
List of authorized individuals;
•
List of individuals who have been
provisioned access;
•
Verification that provisioned
access is appropriate based on
need; and
•
Documented reconciliation
actions, if any.
2. PACS
6.3
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
For termination actions, remove the
individual’s ability to use provisioned
access to BCSI (unless already revoked
according to Part 5.1) by the end of the
next calendar day following the
effective date of the termination
action.
Examples of dated evidence may
include, but are not limited to, access
revocation records associated with the
terminations and dated within the next
calendar day of the termination action.
1. EACMS; and
2. PACS
Draft 3
March 2021
Page 20 of 36
CIP-004-X — Cyber Security – Personnel & Training
C. Compliance
1. Compliance Monitoring Process:
1.1. Compliance Enforcement Authority:
“Compliance Enforcement Authority” (CEA) means NERC or the Regional Entity, or any
entity as otherwise designated by an Applicable Governmental Authority, in their
respective roles of monitoring and/or enforcing compliance with mandatory and
enforceable Reliability Standards in their respective jurisdictions.
1.2. Evidence Retention:
The following evidence retention periods identify the period of time an entity is
required to retain specific evidence to demonstrate compliance. For instances where
the evidence retention period specified below is shorter than the time since the last
audit, the CEA may ask an entity to provide other evidence to show that it was
compliant for the full time period since the last audit.
The applicable entity shall keep data or evidence to show compliance as identified
below unless directed by its CEA to retain specific evidence for a longer period of time
as part of an investigation:
•
The applicable entity shall retain evidence of each requirement in this standard for
three calendar years.
•
The applicable entity is found non-compliant, it shall keep information related to the
non-compliance until mitigation is complete and approved or for the time specified
above, whichever is longer.
•
The CEA shall keep the last audit records and all requested and submitted subsequent
audit records.
1.3. Compliance Monitoring and Enforcement Program:
As defined in the NERC Rules of Procedure, “Compliance Monitoring and Enforcement
Program” refers to the identification of the processes that will be used to evaluate data
or information for the purpose of assessing performance or outcomes with the
associated Reliability Standard.
Draft 3
March
2021
Page 21 of 36
CIP-004-X — Cyber Security – Personnel & Training
2. Table of Compliance Elements
R#
R1
R2
Draft 3
March 2021
Time
Horizon
VRF
Operation
s Planning
Lower
Operation
s Planning
Violation Severity Levels (CIP-004-X)
Lower VSL
Lower
Moderate VSL
High VSL
Severe VSL
The Responsible
Entity did not
reinforce cyber
security practices
during a calendar
quarter but did so
less than 10
calendar days after
the start of a
subsequent
calendar quarter.
(1.1)
The Responsible
Entity did not
reinforce cyber
security practices
during a calendar
quarter but did so
between 10 and 30
calendar days after
the start of a
subsequent calendar
quarter. (1.1)
The Responsible Entity
did not reinforce cyber
security practices during
a calendar quarter but
did so within the
subsequent quarter but
beyond 30 calendar
days after the start of
that calendar quarter.
(1.1)
The Responsible Entity
did not document or
implement any security
awareness process(es)
to reinforce cyber
security practices. (R1)
The Responsible
Entity implemented
a cyber security
training program
but failed to
include one of the
training content
topics in
Requirement Parts
2.1.1 through 2.1.9.
(2.1)
The Responsible
Entity implemented a
cyber security
training program but
failed to include two
of the training
content topics in
Requirement Parts
2.1.1 through 2.1.9.
(2.1)
The Responsible Entity
implemented a cyber
security training
program but failed to
include three of the
training content topics
in Requirement Parts
2.1.1 through 2.1.9.
(2.1)
The Responsible Entity
did not implement a
cyber security training
program appropriate to
individual roles,
functions, or
responsibilities. (R2)
OR
OR
OR
The Responsible Entity
did not reinforce cyber
security practices and
associated physical
security practices for at
least two consecutive
calendar quarters. (1.1)
OR
The Responsible Entity
implemented a cyber
Page 22 of 36
CIP-004-X — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-X)
Lower VSL
OR
Moderate VSL
The Responsible
Entity implemented a
The Responsible
Entity implemented cyber security
training program but
a cyber security
failed to train two
training program
individuals (with the
but failed to train
one individual (with exception of CIP
Exceptional
the exception of
Circumstances) prior
CIP Exceptional
to their being
Circumstances)
prior to their being granted authorized
granted authorized electronic and
authorized
electronic and
unescorted physical
authorized
unescorted physical access. (2.2)
access. (2.2)
OR
High VSL
The Responsible Entity
implemented a cyber
security training
program but failed to
train three individuals
(with the exception of
CIP Exceptional
Circumstances) prior to
their being granted
authorized electronic
and authorized
unescorted physical
access. (2.2)
OR
The Responsible Entity
implemented a cyber
security training
OR
program but failed to
The Responsible
The Responsible
train three individuals
Entity
implemented
a
Entity implemented
with authorized
cyber security
a cyber security
training program but electronic or authorized
training program
unescorted physical
failed to train two
but failed to train
access within 15
one individual with individuals with
authorized electronic calendar months of the
authorized
previous training
or authorized
electronic or
completion date. (2.3)
unescorted physical
authorized
unescorted physical access within 15
Draft 3
March 2021
Severe VSL
security training
program but failed to
include four or more of
the training content
topics in Requirement
Parts 2.1.1 through
2.1.9. (2.1)
OR
The Responsible Entity
implemented a cyber
security training
program but failed to
train four or more
individuals (with the
exception of CIP
Exceptional
Circumstances) prior to
their being granted
authorized electronic
and authorized
unescorted physical
access. (2.2)
OR
The Responsible Entity
implemented a cyber
security training
program but failed to
Page 23 of 36
CIP-004-X — Cyber Security – Personnel & Training
R#
Time
Horizon
R3
Operation
s Planning
VRF
Violation Severity Levels (CIP-004-X)
Lower VSL
access within 15
calendar months of
the previous
training completion
date. (2.3)
Moderate VSL
calendar months of
the previous training
completion date.
(2.3)
Medium The Responsible
Entity has a
program for
conducting
Personnel Risk
Assessments (PRAs)
for individuals,
including
contractors and
service vendors,
but did not conduct
the PRA as a
condition of
granting authorized
electronic or
authorized
unescorted physical
access for one
individual. (R3)
The Responsible
Entity has a program
for conducting
Personnel Risk
Assessments (PRAs)
for individuals,
including contractors
and service vendors,
but did not conduct
the PRA as a
condition of granting
authorized electronic
or authorized
unescorted physical
access for two
individuals. (R3)
OR
Draft 3
March 2021
OR
The Responsible
Entity did conduct
High VSL
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, but did not
conduct the PRA as a
condition of granting
authorized electronic or
authorized unescorted
physical access for three
individuals. (R3)
OR
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
Severe VSL
train four or more
individuals with
authorized electronic or
authorized unescorted
physical access within
15 calendar months of
the previous training
completion date. (2.3)
The Responsible Entity
did not have all of the
required elements as
described by 3.1
through 3.4 included
within documented
program(s) for
implementing Personnel
Risk Assessments
(PRAs), for individuals,
including contractors
and service vendors, for
obtaining and retaining
authorized cyber or
authorized unescorted
physical access. (R3)
OR
The Responsible Entity
has a program for
Page 24 of 36
CIP-004-X — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-X)
Lower VSL
Moderate VSL
Personnel Risk
The Responsible
Assessments (PRAs)
Entity did conduct
for individuals,
Personnel Risk
including contractors
Assessments (PRAs)
and service vendors,
for individuals,
with authorized
including
electronic or
contractors and
authorized
service vendors,
unescorted physical
with authorized
access but did not
electronic or
confirm identity for
authorized
unescorted physical two individuals. (3.1
& 3.4)
access but did not
confirm identity for OR
one individual. (3.1 The Responsible
& 3.4)
Entity has a process
OR
to perform sevenyear criminal history
The Responsible
record checks for
Entity has a process
individuals, including
to perform sevencontractors and
year criminal
service vendors, with
history record
authorized electronic
checks for
or authorized
individuals,
unescorted physical
including
access but did not
contractors and
include the required
service vendors,
checks described in
Draft 3
March 2021
High VSL
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not confirm identity for
three individuals. (3.1 &
3.4)
OR
The Responsible Entity
has a process to
perform seven-year
criminal history record
checks for individuals,
including contractors
and service vendors,
with authorized
electronic or authorized
unescorted physical
access but did not
include the required
checks described in
3.2.1 and 3.2.2 for three
individuals. (3.2 & 3.4)
Severe VSL
conducting Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, but did not
conduct the PRA as a
condition of granting
authorized electronic or
authorized unescorted
physical access for four
or more individuals. (R3)
OR
OR
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not confirm identity for
four or more
individuals. (3.1 & 3.4)
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
The Responsible Entity
has a process to
OR
Page 25 of 36
CIP-004-X — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-X)
Lower VSL
with authorized
electronic or
authorized
unescorted physical
access but did not
include the
required checks
described in 3.2.1
and 3.2.2 for one
individual. (3.2 &
3.4)
Moderate VSL
3.2.1 and 3.2.2 for
two individuals. (3.2
& 3.4)
OR
The Responsible
Entity did conduct
Personnel Risk
Assessments (PRAs)
for individuals,
including contractors
and service vendors,
OR
with authorized
The Responsible
electronic or
Entity did conduct
authorized
Personnel Risk
unescorted physical
Assessments (PRAs) access but did not
for individuals,
evaluate criminal
including
history records check
contractors and
for access
service vendors,
authorization for two
individuals. (3.3 &
with authorized
3.4)
electronic or
authorized
OR
unescorted physical
The Responsible
access but did not
Entity did not
evaluate criminal
conduct Personnel
history records
Risk Assessments
check for access
Draft 3
March 2021
High VSL
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not evaluate criminal
history records check
for access authorization
for three individuals.
(3.3 & 3.4)
OR
The Responsible Entity
did not conduct
Personnel Risk
Assessments (PRAs) for
three individuals with
authorized electronic or
authorized unescorted
physical access within 7
calendar years of the
previous PRA
completion date. (3.5)
Severe VSL
perform seven-year
criminal history record
checks for individuals,
including contractors
and service vendors,
with authorized
electronic or authorized
unescorted physical
access but did not
include the required
checks described in
3.2.1 and 3.2.2 for four
or more individuals. (3.2
& 3.4)
OR
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not evaluate criminal
history records check
for access authorization
Page 26 of 36
CIP-004-X — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-X)
Lower VSL
authorization for
one individual. (3.3
& 3.4)
OR
The Responsible
Entity did not
conduct Personnel
Risk Assessments
(PRAs) for one
individual with
authorized
electronic or
authorized
unescorted physical
access within 7
calendar years of
the previous PRA
completion date.
(3.5)
R4
Draft 3
March 2021
Operation
s Planning
and Same
Day
Operation
s
Medium The Responsible
Entity did not verify
that individuals
with active
electronic or active
unescorted physical
access have
authorization
Moderate VSL
(PRAs) for two
individuals with
authorized electronic
or authorized
unescorted physical
access within 7
calendar years of the
previous PRA
completion date.
(3.5)
The Responsible
Entity did not verify
that individuals with
active electronic or
active unescorted
physical access have
authorization records
during a calendar
High VSL
Severe VSL
for four or more
individuals. (3.3 & 3.4)
OR
The Responsible Entity
did not conduct
Personnel Risk
Assessments (PRAs) for
four or more individuals
with authorized
electronic or authorized
unescorted physical
access within 7 calendar
years of the previous
PRA completion date.
(3.5)
The Responsible Entity
did not verify that
individuals with active
electronic or active
unescorted physical
access have
authorization records
during a calendar
The Responsible Entity
did not implement any
documented program(s)
for access management.
(R4)
OR
Page 27 of 36
CIP-004-X — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-X)
Lower VSL
records during a
calendar quarter
but did so less than
10 calendar days
after the start of a
subsequent
calendar quarter.
(4.2)
Moderate VSL
quarter but did so
between 10 and 20
calendar days after
the start of a
subsequent calendar
quarter. (4.2)
High VSL
quarter but did so
between 20 and 30
calendar days after the
start of a subsequent
calendar quarter. (4.2)
OR
The Responsible Entity
has implemented
processes to verify that
user accounts, user
account groups, or user
role categories, and
their specific, associated
privileges are correct
and necessary within 15
calendar months of the
previous verification but
for more than 10% but
less than (or equal to)
15% of its BES Cyber
Systems, privileges were
incorrect or
unnecessary. (4.3)
The Responsible
Entity has
The Responsible
implemented
Entity has
processes to verify
implemented
that user accounts,
processes to verify user account groups,
that user accounts, or user role
user account
categories, and their
groups, or user role specific, associated
categories, and
privileges are correct
their specific,
and necessary within
associated
15 calendar months
privileges are
of the previous
correct and
verification but for
necessary within 15 more than 5% but
calendar months of less than (or equal
the previous
to) 10% of its BES
verification but for Cyber Systems,
5% or less of its BES privileges were
Cyber Systems,
OR
Draft 3
March 2021
OR
Severe VSL
The Responsible Entity
has implemented one or
more documented
program(s) for access
management that
includes a process to
authorize electronic
access or unescorted
physical access. (4.1)
OR
The Responsible Entity
did not verify that
individuals with active
electronic or active
unescorted physical
access have
authorization records
for at least two
consecutive calendar
quarters. (4.2)
OR
The Responsible Entity
has implemented
processes to verify that
user accounts, user
Page 28 of 36
CIP-004-X — Cyber Security – Personnel & Training
R#
Time
Horizon
R5
Same Day
Operation
s
and
Operation
s Planning
VRF
Violation Severity Levels (CIP-004-X)
Lower VSL
privileges were
incorrect or
unnecessary. (4.3)
Medium The Responsible
Entity has
implemented one
or more process(es)
to revoke the
individual’s user
accounts upon
termination action
but did not do so
for within 30
calendar days of
the date of
termination action
for one or more
individuals. (5.3)
OR
Draft 3
March 2021
Moderate VSL
incorrect or
unnecessary. (4.3)
The Responsible
Entity has
implemented one or
more process(es) to
remove the ability
for unescorted
physical access and
Interactive Remote
Access upon a
termination action or
complete the
removal within 24
hours of the
termination action
but did not initiate
High VSL
Severe VSL
account groups, or user
role categories, and
their specific, associated
privileges are correct
and necessary within 15
calendar months of the
previous verification but
for more than 15% of its
BES Cyber Systems,
privileges were
incorrect or
unnecessary. (4.3)
The Responsible Entity
The Responsible Entity
has implemented one or has not implemented
more process(es) to
any documented
remove the ability for
program(s) for access
unescorted physical
revocation for electronic
access and Interactive
access or unescorted
Remote Access upon a
physical access. (R5)
termination action or
OR
complete the removal
The Responsible Entity
within 24 hours of the
has implemented one or
termination action but
more process(es) to
did not initiate those
remove the ability for
removals for two
unescorted physical
individuals. (5.1)
access and Interactive
Remote Access upon a
OR
termination action or
Page 29 of 36
CIP-004-X — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-X)
Lower VSL
The Responsible
Entity has
implemented one
or more process(es)
to change
passwords for
shared accounts
known to the user
upon termination
action,
reassignment, or
transfer, but did
not do so for within
30 calendar days of
the date of
termination action,
reassignment, or
transfer for one or
more individuals.
(5.4)
Moderate VSL
those removals for
one individual. (5.1)
OR
The Responsible
Entity has
implemented one or
more process(es) to
determine that an
individual no longer
requires retention of
access following
reassignments or
transfers but, for one
individual, did not
revoke the
authorized electronic
access to individual
accounts and
authorized
OR
unescorted physical
The Responsible
access by the end of
Entity has
the next calendar day
implemented one
following the
or more process(es) predetermined date.
to determine and
(5.2)
document
extenuating
Draft 3
March 2021
High VSL
Severe VSL
complete the removal
The Responsible Entity
within 24 hours of the
has implemented one or termination action but
more process(es) to
did not initiate those
determine that an
removals for three or
individual no longer
more individuals. (5.1)
requires retention of
access following
OR
reassignments or
The Responsible Entity
transfers but, for two
has implemented one or
individuals, did not
more process(es) to
revoke the authorized
determine that an
electronic access to
individual no longer
individual accounts and requires retention of
authorized unescorted
access following
physical access by the
reassignments or
end of the next calendar transfers but, for three
day following the
or more individuals, did
predetermined date.
not revoke the
(5.2)
authorized electronic
access to individual
accounts and authorized
unescorted physical
access by the end of the
next calendar day
following the
predetermined date.
(5.2)
Page 30 of 36
CIP-004-X — Cyber Security – Personnel & Training
R#
Time
Horizon
R6
Draft 3
March 2021
Same Day
Operations
and
Operations
Planning
VRF
Violation Severity Levels (CIP-004-X)
Lower VSL
operating
circumstances
following a
termination action,
reassignment, or
transfer, but did
not change one or
more passwords for
shared accounts
known to the user
within 10 calendar
days following the
end of the
extenuating
operating
circumstances.
(5.4)
Medium The Responsible
Entity has
implemented one
or more program(s)
as required by
Requirement R6
Part 6.1 but, for
one individual, did
not authorize
provisioned
electronic access to
Moderate VSL
The Responsible
Entity has
implemented one or
more program(s) as
required by
Requirement R6 Part
6.1 but, for two
individuals, did not
authorize
provisioned
electronic access to
High VSL
The Responsible Entity
has implemented one or
more program(s) as
required by
Requirement R6 Part 6.1
but, for three
individuals, did not
authorize provisioned
electronic access to
electronic BCSI or
provisioned physical
Severe VSL
The Responsible Entity
did not implement one
or more documented
access management
program(s) for BCSI.
(R6)
OR
The Responsible Entity
has implemented one or
more program(s) as
Page 31 of 36
CIP-004-X — Cyber Security – Personnel & Training
R#
Draft 3
March 2021
Time
Horizon
VRF
Violation Severity Levels (CIP-004-X)
Lower VSL
electronic BCSI or
provisioned
physical access to
physical BCSI. (6.1)
Moderate VSL
electronic BCSI or
provisioned physical
access to physical
BCSI. (6.1)
High VSL
access to physical BCSI.
(6.1)
Severe VSL
required by
Requirement R6 Part 6.1
but, for four or more
OR
individuals, did not
The Responsible Entity
authorize provisioned
OR
OR
performed the
electronic access to
The Responsible
The Responsible
verification required by electronic BCSI or
Entity performed
Entity performed the Requirement R6 Part 6.2 provisioned physical
the verification
verification required more than 17 calendar
access to physical BCSI.
required by
by Requirement R6
months but less than or (6.1)
Requirement R6
Part 6.2 more than
equal to 18 calendar
OR
Part 6.2 more than 16 calendar months
months of the previous
The Responsible Entity
15 calendar months but less than or equal verification. (6.2)
but less than or
to 17 calendar
performed the
OR
equal to 16
months of the
verification required by
The Responsible Entity
Requirement R6 Part 6.2
calendar months of previous verification.
has implemented one or
more than 18 calendar
the previous
(6.2)
more program(s) to
months of the previous
verification. (6.2)
OR
remove the individual’s verification. (6.2)
OR
ability to use
The Responsible
OR
provisioned access to
The Responsible
Entity has
Entity has
implemented one or BCSI but, for three
The Responsible Entity
implemented one
more program(s) to
has implemented one or
individuals, did not do
or more program(s) remove the
more program(s) to
so by the timeframe
to remove the
individual’s ability to required in
remove the individual’s
individual’s ability
use provisioned
ability to use
Requirement R6, Part
to use provisioned access to BCSI but,
provisioned access to
6.3.
access to BCSI but, for two individuals,
BCSI but, for four or
for one individual,
did not do so by the
more individuals, did
Page 32 of 36
CIP-004-X — Cyber Security – Personnel & Training
R#
Draft 3
March 2021
Time
Horizon
VRF
Violation Severity Levels (CIP-004-X)
Lower VSL
did not do so by
the timeframe
required in
Requirement R6,
Part 6.3.
Moderate VSL
timeframe required
in Requirement R6,
Part 6.3.
High VSL
Severe VSL
not do so by the
timeframe required in
Requirement R6, Part
6.3.
Page 33 of 36
Guidelines and Technical Basis
D. Regional Variances
None.
E. Interpretations
None.
F. Associated Documents
None.
Version History
Version
Date
Action
1
1/16/06
R3.2 — Change “Control Center” to
“control center.”
2
9/30/09
Modifications to clarify the
requirements and to bring the
compliance elements into conformance
with the latest guidelines for developing
compliance elements of standards.
Change Tracking
3/24/06
Removal of reasonable business
judgment.
Replaced the RRO with the RE as a
responsible entity.
Rewording of Effective Date.
Changed compliance monitor to
Compliance Enforcement Authority.
3
12/16/09
Updated Version Number from -2 to -3
In Requirement 1.6, deleted the
sentence pertaining to removing
component or system from service in
order to perform testing, in response to
FERC order issued September 30, 2009.
3
12/16/09
3
3/31/10
4
1/24/11
Draft 3
March 2021
Approved by the NERC Board of
Trustees.
Approved by FERC.
Approved by the NERC Board of
Trustees.
Page 34 of 36
Guidelines and Technical Basis
Version
Date
5
11/26/12
Adopted by the NERC Board of
Trustees.
5
11/22/13
FERC Order issued approving CIP-004-5.
5.1
9/30/13
Modified two VSLs in R4
Errata
6
11/13/14
Adopted by the NERC Board of
Trustees.
Addressed two
FERC directives
from Order No.
791 related to
identify, assess,
and correct
language and
communication
networks.
6
2/12/15
Adopted by the NERC Board of
Trustees.
Replaces the
version adopted
by the Board on
11/13/2014.
Revised version
addresses
remaining
directives from
Order No. 791
related to
transient devices
and low impact
BES Cyber
Systems.
6
1/21/16
7
TBD
FERC order issued approving CIP-004-6.
Docket No. RM15-14-000
Adopted by the NERC Board of Trustees
Draft 3
March 2021
Action
Change Tracking
Modified to
coordinate with
other CIP
standards and to
revise format to
use RBS
Template.
Revised to
enhance BES
reliability for
entities to
manage their
BCSI.
Page 35 of 36
Guidelines and Technical Basis
Draft 3
March 2021
Page 36 of 36
CIP-004-X7 — Cyber Security – Personnel & Training
Standard Development Timeline
This section is maintained by the drafting team during the development of the standard and will be
removed when the standard is adopted by the NERC Board of Trustees (Board).
Description of Current Draft
Completed Actions
Standards Committee approved Standard Authorization Request
(SAR) for posting
SAR posted for comment
Date
March 22, 2019
March 28, 2019 –
April 26, 2019
45-day formal comment period with ballot
December 20, 2019
– February 3, 2020
45-day formal comment period with ballot
August 6 –
September 21, 2020
45-day formal comment period with ballot
March 25 – May 10,
2021
Anticipated Actions
45-day formal comment period with additional ballot
Date
August 2020
10-day final ballot
September May
20210
Board adoption
November 20210
Draft 32
August March 20210
Page 1 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
A. Introduction
1. Title:
Cyber Security — Personnel & Training
2. Number:
CIP-004-X7
3. Purpose:
To minimize the risk against compromise that could lead to misoperation or
instability in the Bulk Electric System (BES) from individuals accessing BES Cyber
Systems by requiring an appropriate level of personnel risk assessment, training,
and security awareness, and access management in support of protecting BES
Cyber Systems.
4. Applicability:
4.1.
Functional Entities: For the purpose of the requirements contained herein, the following
list of functional entities will be collectively referred to as “Responsible Entities.” For
requirements in this standard where a specific functional entity or subset of functional
entities are the applicable entity or entities, the functional entity or entities are specified
explicitly.
4.1.1. Balancing Authority
4.1.2. Distribution Provider that owns one or more of the following Facilities, systems, and
equipment for the protection or restoration of the BES:
4.1.2.1. Each underfrequency Load shedding (UFLS) or undervoltage Load shedding
(UVLS) system that:
4.1.2.1.1. is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.1.2.1.2. performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation, of
300 MW or more.
4.1.2.2. Each Remedial Action Scheme (RAS) where the RAS is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.1.2.3. Each Protection System (excluding UFLS and UVLS) that applies to Transmission
where the Protection System is subject to one or more requirements in a NERC
or Regional Reliability Standard.
4.1.2.4. Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.1.3. Generator Operator
4.1.4. Generator Owner
4.1.5. Reliability Coordinator
4.1.6. Transmission Operator
Draft 32
August March 20210
Page 2 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
4.1.7. Transmission Owner
4.2.
Facilities: For the purpose of the requirements contained herein, the following
Facilities, systems, and equipment owned by each Responsible Entity in 4.1 above are
those to which these requirements are applicable. For requirements in this standard
where a specific type of Facilities, system, or equipment or subset of Facilities, systems,
and equipment are applicable, these are specified explicitly.
4.2.1. Distribution Provider: One or more of the following Facilities, systems and
equipment owned by the Distribution Provider for the protection or restoration of
the BES:
4.2.1.1. Each UFLS or UVLS System that:
4.2.1.1.1. is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.2.1.1.2. performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation, of
300 MW or more.
4.2.1.2. Each RAS where the RAS is subject to one or more requirements in a NERC or
Regional Reliability Standard.
4.2.1.3. Each Protection System (excluding UFLS and UVLS) that applies to Transmission
where the Protection System is subject to one or more requirements in a NERC
or Regional Reliability Standard.
4.2.1.4. Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.2.2. Responsible Entities listed in 4.1 other than Distribution Providers:
All BES Facilities.
4.2.3. Exemptions: The following are exempt from Standard CIP-004-X7:
4.2.3.1. Cyber Assets at Facilities regulated by the Canadian Nuclear Safety Commission.
4.2.3.2. Cyber Assets associated with communication networks and data
communication links between discrete Electronic Security Perimeters.
4.2.3.3. The systems, structures, and components that are regulated by the Nuclear
Regulatory Commission under a cyber security plan pursuant to 10 C.F.R.
Section 73.54.
4.2.3.4. For Distribution Providers, the systems and equipment that are not included in
section 4.2.1 above.
Draft 32
August March 20210
Page 3 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
4.2.3.5. Responsible Entities that identify that they have no BES Cyber Systems
categorized as high impact or medium impact according to the CIP-002-5.1a
identification and categorization processes.
5. Effective Dates:
See Implementation Plan for CIP-004-X7.
6. Background:
Standard CIP-004 exists as part of a suite of CIP Standards related to cyber security, which
require the initial identification and categorization of BES Cyber Systems and require a
minimum level of organizational, operational, and procedural controls to mitigate risk to BES
Cyber Systems.
Most requirements open with, “Each Responsible Entity shall implement one or more
documented [processes, plan, etc.] that include the applicable items in [Table Reference].” The
referenced table requires the applicable items in the procedures for the common subject
matter of the requirements.
The term documented processes refers to a set of required instructions specific to the
Responsible Entity and to achieve a specific outcome. This term does not imply any particular
naming or approval structure beyond what is stated in the requirements. An entity should
include as much as it believes necessary in its documented processes, but it must address the
applicable requirements in the table.
The terms program and plan are sometimes used in place of documented processes where it
makes sense and is commonly understood. For example, documented processes describing a
response are typically referred to as plans (i.e., incident response plans and recovery plans).
Likewise, a security plan can describe an approach involving multiple procedures to address a
broad subject matter.
Similarly, the term program may refer to the organization’s overall implementation of its
policies, plans and procedures involving a subject matter. Examples in the standards include
the personnel risk assessment program and the personnel training program. The full
implementation of the CIP Cyber Security Standards could also be referred to as a program.
However, the terms program and plan do not imply any additional requirements beyond what
is stated in the standards.
Responsible Entities can implement common controls that meet requirements for multiple high
and medium impact BES Cyber Systems. For example, a single training program could meet the
requirements for training personnel across multiple BES Cyber Systems.
Measures for the initial requirement are simply the documented processes themselves.
Measures in the table rows provide examples of evidence to show documentation and
implementation of applicable items in the documented processes. These measures serve to
provide guidance to entities in acceptable records of compliance and should not be viewed as
an all-inclusive list.
Draft 32
August March 20210
Page 4 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
Throughout the standards, unless otherwise stated, bulleted items in the requirements and
measures are items that are linked with an “or,” and numbered items are items that are linked
with an “and.”
Many references in the Applicability section use a threshold of 300 MW for UFLS and UVLS.
This particular threshold of 300 MW for UVLS and UFLS was provided in Version 1 of the CIP
Cyber Security Standards. The threshold remains at 300 MW since it is specifically addressing
UVLS and UFLS, which are last ditch efforts to save the BES. A review of UFLS tolerances defined
within regional reliability standards for UFLS program requirements to date indicates that the
historical value of 300 MW represents an adequate and reasonable threshold value for
allowable UFLS operational tolerances.
“Applicable Systems” Columns in Tables:
Each table has an “Applicable Systems” or “Applicability” column. The “Applicable Systems”
column to further defines the scope of systems to which a specific requirement row applies.
The CSO706 SDT adapted this concept from the National Institute of Standards and Technology
(“NIST”) Risk Management Framework as a way of applying requirements more appropriately
based on impact and connectivity characteristics. The following conventions are used in the
“Applicable Systems” column as described.
• High Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as high impact
according to the CIP-002-5.1a identification and categorization processes.
• Medium Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as medium
impact according to the CIP-002-5.1a identification and categorization processes.
• Medium Impact BES Cyber Systems with External Routable Connectivity – Only applies to
medium impact BES Cyber Systems with External Routable Connectivity. This also excludes
Cyber Assets in the BES Cyber System that cannot be directly accessed through External
Routable Connectivity.
• Electronic Access Control or Monitoring Systems (EACMS) – Applies to each Electronic
Access Control or Monitoring System associated with a referenced high impact BES Cyber
System or medium impact BES Cyber System. Examples may include, but are not limited to,
firewalls, authentication servers, and log monitoring and alerting systems.
• Physical Access Control Systems (PACS) – Applies to each Physical Access Control System
associated with a referenced high impact BES Cyber System or medium impact BES Cyber
System with External Routable Connectivity.
Draft 32
August March 20210
Page 5 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
B. Requirements and Measures
R1.
Each Responsible Entity shall implement one or more documented processes that collectively include each of the applicable requirement
parts in CIP-004-X7 Table R1 – Security Awareness Program. [Violation Risk Factor: Lower] [Time Horizon: Operations Planning]
M1. Evidence must include each of the applicable documented processes that collectively include each of the applicable requirement parts in
CIP-004-X7 Table R1 – Security Awareness Program and additional evidence to demonstrate implementation as described in the Measures
column of the table.
CIP-004-X7 Table R1 – Security Awareness Program
Part
1.1
Applicable Systems
High Impact BES Cyber Systems
Medium Impact BES Cyber Systems
Requirements
Security awareness that, at least once
each calendar quarter, reinforces cyber
security practices (which may include
associated physical security practices)
for the Responsible Entity’s personnel
who have authorized electronic or
authorized unescorted physical access
to BES Cyber Systems.
Measures
An example of evidence may include,
but is not limited to, documentation
that the quarterly reinforcement has
been provided. Examples of evidence
of reinforcement may include, but are
not limited to, dated copies of
information used to reinforce security
awareness, as well as evidence of
distribution, such as:
•
•
•
Draft 32
August March 20201
direct communications (for
example, e-mails, memos,
computer-based training); or
indirect communications (for
example, posters, intranet, or
brochures); or
management support and
reinforcement (for example,
presentations or meetings).
Page 6 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
R2. Each Responsible Entity shall implement one or more cyber security training program(s) appropriate to individual roles, functions, or
responsibilities that collectively includes each of the applicable requirement parts in CIP-004-X7 Table R2 – Cyber Security Training
Program. [Violation Risk Factor: Lower] [Time Horizon: Operations Planning]
M2. Evidence must include the training program that includes each of the applicable requirement parts in CIP-004-X7 Table R2 – Cyber Security
Training Program and additional evidence to demonstrate implementation of the program(s).
Draft 32
August March 20201
Page 7 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
CIP-004-X7 Table R2 – Cyber Security Training Program
Part
2.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
Requirements
Training content on:
2.1.1. Cyber security policies;
1. EACMS; and
2.1.2. Physical access controls;
2. PACS
2.1.3. Electronic access controls;
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
2.1.4. The visitor control program;
Measures
Examples of evidence may include,
but are not limited to, training
material such as power point
presentations, instructor notes,
student notes, handouts, or other
training materials.
2.1.5. Handling of BES Cyber System
Information (BCSI) and its
storage;
2.1.6. Identification of a Cyber
Security Incident and initial
notifications in accordance
with the entity’s incident
response plan;
2.1.7. Recovery plans for BES Cyber
Systems;
2.1.8. Response to Cyber Security
Incidents; and
2.1.9. Cyber security risks associated
with a BES Cyber System’s
electronic interconnectivity
and interoperability with
other Cyber Assets, including
Transient Cyber Assets, and
with Removable Media.
Draft 32
August March 20201
Page 8 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
CIP-004-X7 Table R2 – Cyber Security Training Program
Part
2.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
Requirements
Measures
Require completion of the training
specified in Part 2.1 prior to granting
authorized electronic access and
authorized unescorted physical access
to applicable Cyber Assets, except
during CIP Exceptional Circumstances.
Examples of evidence may include,
but are not limited to, training
records and documentation of when
CIP Exceptional Circumstances were
invoked.
Require completion of the training
specified in Part 2.1 at least once
every 15 calendar months.
Examples of evidence may include,
but are not limited to, dated
individual training records.
1. EACMS; and
2. PACS
2.3
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 32
August March 20201
Page 9 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
R3.
Each Responsible Entity shall implement one or more documented personnel risk assessment program(s) to attain and retain authorized
electronic or authorized unescorted physical access to BES Cyber Systems that collectively include each of the applicable requirement
parts in CIP-004-X7 Table R3 – Personnel Risk Assessment Program. [Violation Risk Factor: Medium] [Time Horizon: Operations Planning].
M3. Evidence must include the documented personnel risk assessment programs that collectively include each of the applicable requirement
parts in CIP-004-X7 Table R3 – Personnel Risk Assessment Program and additional evidence to demonstrate implementation of the
program(s).
CIP-004-X7 Table R3 – Personnel Risk Assessment Program
Part
3.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Requirements
Process to confirm identity.
Measures
An example of evidence may include, but
is not limited to, documentation of the
Responsible Entity’s process to confirm
identity.
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 32
August March 20201
Page 10 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
CIP-004-X7 Table R3 – Personnel Risk Assessment Program
Part
3.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Requirements
Measures
Process to perform a seven year
criminal history records check as part
of each personnel risk assessment
that includes:
An example of evidence may include, but is
not limited to, documentation of the
Responsible Entity’s process to perform a
seven year criminal history records check.
3.2.1. current residence, regardless
of duration; and
3.2.2. other locations where, during
the seven years immediately prior
to the date of the criminal history
records check, the subject has
resided for six consecutive months
or more.
If it is not possible to perform a full
seven year criminal history records
check, conduct as much of the seven
year criminal history records check as
possible and document the reason
the full seven year criminal history
records check could not be
performed.
Draft 32
August March 20201
Page 11 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
CIP-004-X7 Table R3 – Personnel Risk Assessment Program
Part
3.3
Applicable Systems
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
Requirements
Measures
Criteria or process to evaluate criminal
history records checks for authorizing
access.
An example of evidence may
include, but is not limited to,
documentation of the
Responsible Entity’s process to
evaluate criminal history records
checks.
Criteria or process for verifying that
personnel risk assessments performed for
contractors or service vendors are
conducted according to Parts 3.1 through
3.3.
An example of evidence may
include, but is not limited to,
documentation of the
Responsible Entity’s criteria or
process for verifying contractors
or service vendors personnel risk
assessments.
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
3.4
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Draft 32
August March 20201
Page 12 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
CIP-004-X7 Table R3 – Personnel Risk Assessment Program
Part
3.5
Applicable Systems
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
Requirements
Measures
Process to ensure that individuals with
authorized electronic or authorized
unescorted physical access have had a
personnel risk assessment completed
according to Parts 3.1 to 3.4 within the last
seven years.
An example of evidence may
include, but is not limited to,
documentation of the
Responsible Entity’s process for
ensuring that individuals with
authorized electronic or
authorized unescorted physical
access have had a personnel risk
assessment completed within the
last seven years.
2. PACS
Draft 32
August March 20201
Page 13 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
R4. Each Responsible Entity shall implement one or more documented access management program(s) that collectively include each of the
applicable requirement parts in CIP-004-X7 Table R4 – Access Management Program. [Violation Risk Factor: Medium] [Time Horizon:
Operations Planning and Same Day Operations].
M4. Evidence must include the documented processes that collectively include each of the applicable requirement parts in CIP-004-X7 Table
R4 – Access Management Program and additional evidence to demonstrate that the access management program was implemented as
described in the Measures column of the table.
CIP-004-X7 Table R4 – Access Management Program
Part
Applicable Systems
4.1
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
Requirements
Process to authorize based on need, as
determined by the Responsible Entity,
except for CIP Exceptional
Circumstances:
4.1.1. Electronic access; and
4.1.2. Unescorted physical access into a
Physical Security Perimeter.
Measures
An example of evidence may
include, but is not limited to, dated
documentation of the process to
authorize electronic access and
unescorted physical access in a
Physical Security Perimeter.
1. EACMS; and
2. PACS
3.2.
Draft 32
August March 20201
Page 14 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
CIP-004-X7 Table R4 – Access Management Program
Part
Applicable Systems
4.2
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Requirements
Verify at least once each calendar
quarter that individuals with active
electronic access or unescorted physical
access have authorization records.
Measures
Examples of evidence may include,
but are not limited to:
•
Dated documentation of the
verification between the system
generated list of individuals who
have been authorized for access
(i.e., workflow database) and a
system generated list of
personnel who have access (i.e.,
user account listing), or
•
Dated documentation of the
verification between a list of
individuals who have been
authorized for access (i.e.,
authorization forms) and a list
of individuals provisioned for
access (i.e., provisioning forms
or shared account listing).
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Draft 32
August March 20201
Page 15 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
CIP-004-X7 Table R4 – Access Management Program
Part
Applicable Systems
Requirements
4.3
High Impact BES Cyber Systems and their
associated:
For electronic access, verify at least once
every 15 calendar months that all user
accounts, user account groups, or user
role categories, and their specific,
associated privileges are correct and are
those that the Responsible Entity
determines are necessary.
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Measures
An example of evidence may
include, but is not limited to,
documentation of the review that
includes all of the following:
1. A dated listing of all
accounts/account groups or
roles within the system;
2. A summary description of
privileges associated with
each group or role;
3. Accounts assigned to the
group or role; and
4. Dated evidence showing
verification of the privileges
for the group are authorized
and appropriate to the work
function performed by
people assigned to each
account.
Draft 32
August March 20201
Page 16 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
R5. Each Responsible Entity shall implement one or more documented access revocation program(s) that collectively include each of the
applicable requirement parts in CIP-004-X7 Table R5 – Access Revocation. [Violation Risk Factor: Medium] [Time Horizon: Same Day
Operations and Operations Planning].
M5. Evidence must include each of the applicable documented programs that collectively include each of the applicable requirement parts in
CIP-004-X7 Table R5 – Access Revocation and additional evidence to demonstrate implementation as described in the Measures column
of the table.
CIP-004-X7 Table R5 – Access Revocation
Part
5.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 32
August March 20201
Requirements
Measures
A process to initiate removal of an
individual’s ability for unescorted
physical access and Interactive Remote
Access upon a termination action, and
complete the removals within 24 hours
of the termination action (Removal of
the ability for access may be different
than deletion, disabling, revocation, or
removal of all access rights).
An example of evidence may include,
but is not limited to, documentation of
all of the following:
1. Dated workflow or sign-off form
verifying access removal
associated with the termination
action; and
2. Logs or other demonstration
showing such persons no longer
have access.
Page 17 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
CIP-004-X7 Table R5 – Access Revocation
Part
5.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 32
August March 20201
Requirements
Measures
For reassignments or transfers, revoke
the individual’s authorized electronic
access to individual accounts and
authorized unescorted physical access
that the Responsible Entity determines
are not necessary by the end of the
next calendar day following the date
that the Responsible Entity determines
that the individual no longer requires
retention of that access.
An example of evidence may include,
but is not limited to, documentation of
all of the following:
1. Dated workflow or sign-off form
showing a review of logical and
physical access; and
2. Logs or other demonstration
showing such persons no longer
have access that the
Responsible Entity determines
is not necessary.
Page 18 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
CIP-004-X7 Table R5 – Access Revocation
Part
5.3
Applicable Systems
High Impact BES Cyber Systems and
their associated:
•
Draft 32
August March 20201
EACMS
Requirements
Measures
For termination actions, revoke the
individual’s non-shared user accounts
(unless already revoked according to
Part 5.1) within 30 calendar days of the
effective date of the termination
action.
An example of evidence may include,
but is not limited to, workflow or signoff form showing access removal for
any individual BES Cyber Assets and
software applications as determined
necessary to completing the revocation
of access and dated within thirty
calendar days of the termination
actions.
Page 19 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
CIP-004-X7 Table R5 – Access Revocation
Part
5.4
Applicable Systems
High Impact BES Cyber Systems and
their associated:
• EACMS
Requirements
For termination actions, change
Examples of evidence may include, but
passwords for shared account(s) known are not limited to:
to the user within 30 calendar days of
• Workflow or sign-off form
the termination action. For
showing password reset within
reassignments or transfers, change
30 calendar days of the
passwords for shared account(s) known
termination;
to the user within 30 calendar days
• Workflow or sign-off form
following the date that the Responsible
showing password reset within
Entity determines that the individual no
30 calendar days of the
longer requires retention of that
reassignments or transfers; or
access.
If the Responsible Entity determines
and documents that extenuating
operating circumstances require a
longer time period, change the
password(s) within 10 calendar days
following the end of the operating
circumstances.
Draft 32
August March 20201
Measures
•
Documentation of the
extenuating operating
circumstance and workflow or
sign-off form showing password
reset within 10 calendar days
following the end of the
operating circumstance.
Page 20 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
R6. Each Responsible Entity shall implement one or more documented access management program(s) to authorize, verify, and revoke
provisioned access to for BES Cyber System InformationBCSI pertaining to the “Applicable Systems” identified in CIP-004-X Table R6 –
Access Management for BES Cyber System Information that collectively include each of the applicable requirement parts in CIP‐004‐X7
Table R6 – Access Management for BES Cyber System Information. To be considered access to BCSI in the context of this requirement, an
individual has both the ability to obtain and use BCSI. [Violation Risk Factor: Medium] [Time Horizon: Same Day Operations and Operations
Planning].
M6. Evidence must include each of the applicable documented programs that collectively include the applicable requirement parts in CIP-004X7 Table R6 – Access Management for BES Cyber System Information and additional evidence to demonstrate implementation as
described in the Measures column of the table.
Draft 32
August March 20201
Page 21 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
CIP-004-X7 Table R6 – Access Management for BES Cyber System Information
Part
6.1
Applicableility Systems
BCSI pertaining to:
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Requirements
Measures
Prior to provisioning, Aauthorize
(unless already authorized according to
Part 4.1.)provisioning of access to BCSI
based on need (unless already
authorized according to Part 4.1.), as
determined by the Responsible Entity,
except for CIP Exceptional
Circumstances:.
Examples of evidence may include, but
are not limited to, the following:
individual records or lists that include
who is authorized, the date of the
authorization, and the justification of
business need for the provisioned
access.
6.1.1. Provisioned electronic access to
electronic BCSI; and
6.1.2 Provisioned physical access to
physical BCSI.
•
Dated authorization records for
provisioned access to BCSI based
on need; or
•
List of authorized individuals
Note: Provisioned access is to be
considered the result of the specific
actions taken to provide an
individual(s) the means to access BCSI
(e.g., may include physical keys or
access cards, user accounts and
associated rights and privileges,
encryption keys).
Draft 32
August March 20201
Page 22 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
CIP-004-X7 Table R6 – Access Management for BES Cyber System Information
Part
6.2
Applicableility Systems
BCSI pertaining to:
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
Requirements
Verify at least once every 15 calendar
months that all individuals with
provisioned access to BCSI:
6.2.1. have an Is authorizationed
record; and
6.2.2. Is still need the provisioned
access to perform their current
work functions, appropriate
based on need, as determined by
the Responsible Entity.
Measures
Examples of evidence may include, but
are not limited to, the documentation
of the review that includes all of the
following:
•
List of authorized individuals; and
•
List of individuals who have been
provisioned access; and
•
List of privileges associated with
the authorizations; and
•
List of privileges associated with
the provisioned access; and
•
Dated documentation of the 15calendar-month verification; and
•
Verification that provisioned
access is appropriate based on
need; and
•
Documented reconciliation
actions, if any.
2. PACS
Draft 32
August March 20201
Page 23 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
CIP-004-X7 Table R6 – Access Management for BES Cyber System Information
Part
6.3
Applicableility Systems
BCSI pertaining to:
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Requirements
Measures
For termination actions, remove the
individual’s ability to use provisioned
access to BCSI (unless already revoked
according to Part 5.1) by the end of the
next calendar day following the
effective date of the termination
action.
Examples of dated evidence may
include, but are not limited to, access
revocation records associated with the
terminations and dated within the next
calendar day of the termination action.
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 32
August March 20201
Page 24 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
C. Compliance
1. Compliance Monitoring Process:
1.1. Compliance Enforcement Authority: “Compliance Enforcement Authority” (CEA)
means NERC or the Regional Entity, or any entity as otherwise designated by an
Applicable Governmental Authority, in their respective roles of monitoring and/or
enforcing compliance with mandatory and enforceable Reliability Standards in their
respective jurisdictions.
1.2. Evidence Retention: The following evidence retention period(s) identify the period of
time an entity is required to retain specific evidence to demonstrate compliance. For
instances where the evidence retention period specified below is shorter than the time
since the last audit, the Compliance Enforcement AuthorityCEA may ask an entity to
provide other evidence to show that it was compliant for the full time period since the
last audit.
The applicable entity shall keep data or evidence to show compliance as identified
below unless directed by its Compliance Enforcement AuthorityCEA to retain specific
evidence for a longer period of time as part of an investigation:
•
The applicable entity shall retain evidence of each requirement in this standard
for three calendar years.
•
If an applicable entity is found non-compliant, it shall keep information related to
the non-compliance until mitigation is complete and approved or for the time
specified above, whichever is longer.
•
The Compliance Enforcement Authority CEA shall keep the last audit records and
all requested and submitted subsequent audit records.
1.3. Compliance Monitoring and Assessment ProcessesEnforcement Program: As defined
in the NERC Rules of Procedure, “Compliance Monitoring and Enforcement Program”
refers to the identification of the processes that will be used to evaluate data or
information for the purpose of assessing performance or outcomes with the associated
Reliability Standard.
Draft 32
AugustMarch 20210
Page 25 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
Violation Severity Levels
R#
R1
R2
Time
Horizon
Operations
Planning
Operations
Planning
Draft 32
August March 20210
VRF
Violation Severity Levels (CIP-004-X7)
Lower VSL
Lower
Lower
The Responsible Entity did
not reinforce cyber
security practices during a
calendar quarter but did
so less than 10 calendar
days after the start of a
subsequent calendar
quarter. (1.1)
Moderate VSL
The Responsible Entity
did not reinforce cyber
security practices
during a calendar
quarter but did so
between 10 and 30
calendar days after the
start of a subsequent
calendar quarter. (1.1)
High VSL
The Responsible Entity
did not reinforce
cyber security
practices during a
calendar quarter but
did so within the
subsequent quarter
but beyond 30
calendar days after
the start of that
calendar quarter. (1.1)
The Responsible Entity
implemented a cyber
security training
program but failed to
include one of the
training content topics
in Requirement Parts
2.1.1 through 2.1.9.
(2.1)
The Responsible Entity
implemented a cyber
security training
program but failed to
include two of the
training content topics
in Requirement Parts
2.1.1 through 2.1.9.
(2.1)
The Responsible Entity
implemented a cyber
security training
program but failed to
include three of the
training content topics
in Requirement Parts
2.1.1 through 2.1.9.
(2.1)
OR
OR
OR
Severe VSL
The Responsible Entity
did not document or
implement any security
awareness process(es)
to reinforce cyber
security practices. (R1)
OR
The Responsible Entity
did not reinforce cyber
security practices and
associated physical
security practices for at
least two consecutive
calendar quarters. (1.1)
The Responsible Entity
did not implement a
cyber security training
program appropriate to
individual roles,
functions, or
responsibilities. (R2)
OR
The Responsible Entity
implemented a cyber
Page 26 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
R#
Time
Horizon
Draft 32
August March 20210
VRF
Violation Severity Levels (CIP-004-X7)
Lower VSL
Moderate VSL
High VSL
The Responsible Entity
implemented a cyber
security training
program but failed to
train one individual
(with the exception of
CIP Exceptional
Circumstances) prior to
their being granted
authorized electronic
and authorized
unescorted physical
access. (2.2)
The Responsible Entity
implemented a cyber
security training
program but failed to
train two individuals
(with the exception of
CIP Exceptional
Circumstances) prior to
their being granted
authorized electronic
and authorized
unescorted physical
access. (2.2)
The Responsible Entity
implemented a cyber
security training
program but failed to
train three individuals
(with the exception of
CIP Exceptional
Circumstances) prior to
their being granted
authorized electronic
and authorized
unescorted physical
access. (2.2)
OR
OR
OR
The Responsible Entity
implemented a cyber
security training
program but failed to
train one individual
with authorized
electronic or authorized
unescorted physical
access within 15
calendar months of the
previous training
completion date. (2.3)
The Responsible Entity
implemented a cyber
security training
program but failed to
train two individuals
with authorized
electronic or authorized
unescorted physical
access within 15
calendar months of the
previous training
completion date. (2.3)
The Responsible Entity
implemented a cyber
security training
program but failed to
train three individuals
with authorized
electronic or authorized
unescorted physical
access within 15
calendar months of the
previous training
completion date. (2.3)
Severe VSL
security training
program but failed to
include four or more of
the training content
topics in Requirement
Parts 2.1.1 through
2.1.9. (2.1)
OR
The Responsible Entity
implemented a cyber
security training
program but failed to
train four or more
individuals (with the
exception of CIP
Exceptional
Circumstances) prior to
their being granted
authorized electronic
and authorized
unescorted physical
access. (2.2)
OR
The Responsible Entity
implemented a cyber
security training
program but failed to
Page 27 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
R#
R3
Time
Horizon
VRF
Operations
Planning
Medium
Draft 32
August March 20210
Violation Severity Levels (CIP-004-X7)
Lower VSL
The Responsible Entity
has a program for
conducting Personnel Risk
Assessments (PRAs) for
individuals, including
contractors and service
vendors, but did not
conduct the PRA as a
condition of granting
authorized electronic or
authorized unescorted
physical access for one
individual. (R3)
Moderate VSL
High VSL
Severe VSL
train four or more
individuals with
authorized electronic or
authorized unescorted
physical access within
15 calendar months of
the previous training
completion date. (2.3)
OR
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
but did not conduct
the PRA as a condition
of granting authorized
electronic or
authorized unescorted
physical access for two
individuals. (R3)
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
but did not conduct
the PRA as a condition
of granting authorized
electronic or
authorized unescorted
physical access for
three individuals. (R3)
The Responsible Entity
did not have all of the
required elements as
described by 3.1
through 3.4 included
within documented
program(s) for
implementing Personnel
Risk Assessments
(PRAs), for individuals,
including contractors
and service vendors, for
obtaining and retaining
authorized cyber or
authorized unescorted
physical access. (R3)
The Responsible Entity did
conduct Personnel Risk
Assessments (PRAs) for
individuals, including
contractors and service
OR
OR
The Responsible Entity
did conduct Personnel
Risk Assessments
(PRAs) for individuals,
The Responsible Entity
did conduct Personnel OR
Risk Assessments
The Responsible Entity
(PRAs) for individuals, has a program for
Page 28 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-X7)
Lower VSL
vendors, with authorized
electronic or authorized
unescorted physical
access but did not confirm
identity for one
individual. (3.1 & 3.4)
OR
The Responsible Entity
has a process to perform
seven-year criminal
history record checks for
individuals, including
contractors and service
vendors, with authorized
electronic or authorized
unescorted physical
access but did not include
the required checks
described in 3.2.1 and
3.2.2 for one individual.
(3.2 & 3.4)
Moderate VSL
including contractors
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
not confirm identity for
two individuals. (3.1 &
3.4)
High VSL
including contractors
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
not confirm identity
for three individuals.
(3.1 & 3.4)
OR
OR
The Responsible Entity
has a process to
perform seven-year
criminal history record
checks for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
not include the
OR
required checks
The Responsible Entity did described in 3.2.1 and
conduct Personnel Risk
3.2.2 for two
Assessments (PRAs) for
individuals. (3.2 & 3.4)
individuals, including
OR
contractors and service
Draft 32
August March 20210
The Responsible Entity
has a process to
perform seven-year
criminal history record
checks for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
not include the
required checks
described in 3.2.1 and
3.2.2 for three
individuals. (3.2 & 3.4)
OR
Severe VSL
conducting Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, but did not
conduct the PRA as a
condition of granting
authorized electronic or
authorized unescorted
physical access for four
or more individuals. (R3)
OR
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with
authorized electronic or
authorized unescorted
physical access but did
not confirm identity for
four or more
individuals. (3.1 & 3.4)
OR
The Responsible Entity
has a process to
Page 29 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-X7)
Lower VSL
vendors, with authorized
electronic or authorized
unescorted physical
access but did not
evaluate criminal history
records check for access
authorization for one
individual. (3.3 & 3.4)
Moderate VSL
The Responsible Entity
did conduct Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
with authorized
electronic or
OR
authorized unescorted
The Responsible Entity did physical access but did
not evaluate criminal
not conduct Personnel
history records check
Risk Assessments (PRAs)
for access
for one individual with
authorization for two
authorized electronic or
individuals. (3.3 & 3.4)
authorized unescorted
physical access within 7
OR
calendar years of the
The Responsible Entity
previous PRA completion
did not conduct
date. (3.5)
Personnel Risk
Assessments (PRAs) for
two individuals with
authorized electronic
or authorized
unescorted physical
access within 7
calendar years of the
Draft 32
August March 20210
High VSL
Severe VSL
The Responsible Entity perform seven-year
did conduct Personnel criminal history record
checks for individuals,
Risk Assessments
(PRAs) for individuals, including contractors
and service vendors,
including contractors
with authorized
and service vendors,
electronic or authorized
with authorized
unescorted physical
electronic or
authorized unescorted access but did not
physical access but did include the required
checks described in
not evaluate criminal
history records check 3.2.1 and 3.2.2 for four
or more individuals. (3.2
for access
& 3.4)
authorization for
three individuals. (3.3 OR
& 3.4)
The Responsible Entity
OR
did conduct Personnel
The Responsible Entity Risk Assessments (PRAs)
for individuals, including
did not conduct
contractors and service
Personnel Risk
vendors, with
Assessments (PRAs)
authorized electronic or
for three individuals
authorized unescorted
with authorized
physical access but did
electronic or
authorized unescorted not evaluate criminal
physical access within history records check
for access authorization
7 calendar years of
Page 30 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-X7)
Lower VSL
Moderate VSL
previous PRA
completion date. (3.5)
High VSL
the previous PRA
completion date. (3.5)
Severe VSL
for four or more
individuals. (3.3 & 3.4)
OR
R4
Operations
Planning
and Same
Day
Operations
Medium
The Responsible Entity did
not verify that individuals
with active electronic or
active unescorted physical
access have authorization
records during a calendar
quarter but did so less
than 10 calendar days
after the start of a
subsequent calendar
quarter. (4.2)
OR
Draft 32
August March 20210
The Responsible Entity
did not verify that
individuals with active
electronic or active
unescorted physical
access have
authorization records
during a calendar
quarter but did so
between 10 and 20
calendar days after the
start of a subsequent
calendar quarter. (4.2)
The Responsible Entity
did not conduct
Personnel Risk
Assessments (PRAs) for
four or more individuals
with authorized
electronic or authorized
unescorted physical
access within 7 calendar
years of the previous
PRA completion date.
(3.5)
The Responsible Entity The Responsible Entity
did not verify that
did not implement any
individuals with active documented program(s)
electronic or active
for access management.
unescorted physical
(R4)
access have
OR
authorization records
The Responsible Entity
during a calendar
has not implemented
quarter but did so
one or more
between 20 and 30
documented program(s)
calendar days after
for access management
the start of a
that includes a process
Page 31 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-X7)
Lower VSL
The Responsible Entity
has implemented
processes to verify that
user accounts, user
account groups, or user
role categories, and their
specific, associated
privileges are correct and
necessary within 15
calendar months of the
previous verification but
for 5% or less of its BES
Cyber Systems, privileges
were incorrect or
unnecessary. (4.3)
Draft 32
August March 20210
OR
Moderate VSL
The Responsible Entity
has implemented
processes to verify that
user accounts, user
account groups, or user
role categories, and
their specific,
associated privileges
are correct and
necessary within 15
calendar months of the
previous verification
but for more than 5%
but less than (or equal
to) 10% of its BES
Cyber Systems,
privileges were
incorrect or
unnecessary. (4.3)
High VSL
subsequent calendar
quarter. (4.2)
OR
The Responsible Entity
has implemented
processes to verify
that user accounts,
user account groups,
or user role
categories, and their
specific, associated
privileges are correct
and necessary within
15 calendar months of
the previous
verification but for
more than 10% but
less than (or equal to)
15% of its BES Cyber
Systems, privileges
were incorrect or
unnecessary. (4.3)
Severe VSL
to authorize electronic
access or unescorted
physical access. (4.1)
OR
The Responsible Entity
did not verify that
individuals with active
electronic or active
unescorted physical
access have
authorization records
for at least two
consecutive calendar
quarters. (4.2)
OR
The Responsible Entity
has implemented
processes to verify that
user accounts, user
account groups, or user
role categories, and
their specific, associated
privileges are correct
and necessary within 15
calendar months of the
previous verification but
Page 32 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
R#
R5
Time
Horizon
VRF
Same Day
Operations
and
Operations
Planning
Medium
Draft 32
August March 20210
Violation Severity Levels (CIP-004-X7)
Lower VSL
Moderate VSL
The Responsible Entity
The Responsible Entity
has implemented one
has implemented one or
or more process(es) to
more process(es) to
remove the ability for
revoke the individual’s
unescorted physical
user accounts upon
access and Interactive
termination action but did Remote Access upon a
not do so for within 30
termination action or
calendar days of the date complete the removal
of termination action for
within 24 hours of the
one or more individuals.
termination action but
(5.3)
did not initiate those
removals for one
OR
individual. (5.1)
The Responsible Entity
OR
has implemented one or
more process(es) to
The Responsible Entity
change passwords for
has implemented one
shared accounts known to or more process(es) to
the user upon
determine that an
termination action,
individual no longer
High VSL
The Responsible Entity
has implemented one
or more process(es) to
remove the ability for
unescorted physical
access and Interactive
Remote Access upon a
termination action or
complete the removal
within 24 hours of the
termination action but
did not initiate those
removals for two
individuals. (5.1)
Severe VSL
for more than 15% of its
BES Cyber Systems,
privileges were
incorrect or
unnecessary. (4.3)
The Responsible Entity
has not implemented
any documented
program(s) for access
revocation for electronic
access or unescorted
physical access. (R5)
OR
The Responsible Entity
has implemented one or
more process(es) to
remove the ability for
unescorted physical
access and Interactive
OR
Remote Access upon a
The Responsible Entity termination action or
has implemented one complete the removal
or more process(es) to within 24 hours of the
determine that an
termination action but
individual no longer
did not initiate those
Page 33 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-X7)
Lower VSL
reassignment, or transfer,
but did not do so for
within 30 calendar days of
the date of termination
action, reassignment, or
transfer for one or more
individuals. (5.4)
OR
The Responsible Entity
has implemented one or
more process(es) to
determine and document
extenuating operating
circumstances following a
termination action,
reassignment, or transfer,
but did not change one or
more passwords for
shared accounts known to
the user within 10
calendar days following
the end of the
extenuating operating
circumstances. (5.4)
R6
Same Day
Operations
and
Draft 32
August March 20210
Medium
The Responsible Entity
has implemented one or
more progam(s) as
Moderate VSL
requires retention of
access following
reassignments or
transfers but, for one
individual, did not
revoke the authorized
electronic access to
individual accounts and
authorized unescorted
physical access by the
end of the next
calendar day following
the predetermined
date. (5.2)
High VSL
requires retention of
access following
reassignments or
transfers but, for two
individuals, did not
revoke the authorized
electronic access to
individual accounts
and authorized
unescorted physical
access by the end of
the next calendar day
following the
predetermined date.
(5.2)
Severe VSL
removals for three or
more individuals. (5.1)
The Responsible Entity
has implemented one
or more program(s) as
The Responsible Entity The Responsible Entity
has implemented one did not implement one
or more program(s) as or more documented
OR
The Responsible Entity
has implemented one or
more process(es) to
determine that an
individual no longer
requires retention of
access following
reassignments or
transfers but, for three
or more individuals, did
not revoke the
authorized electronic
access to individual
accounts and authorized
unescorted physical
access by the end of the
next calendar day
following the
predetermined date.
(5.2)
Page 34 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
R#
Time
Horizon
Operations
Planning
VRF
Violation Severity Levels (CIP-004-X7)
Lower VSL
required by Requirement
R6 Part 6.1 but, for one
individual, did not
authorize provisioned
electronic access to
electronic BCSI or
provisioned physical
access to physical BCSI.
(6.1)
OR
The Responsible Entity
performed the
verification required by
Requirement R6 Part 6.2
more than 15 calendar
months but less than or
equal to 16 calendar
months of the previous
verification. (6.2)
OR
The Responsible Entity
has implemented one or
more process(es) to
remove the individual’s
ability to use provisioned
access to BCSI but, for
one individual, did not do
Draft 32
August March 20210
Moderate VSL
required by
Requirement R6 Part
6.1 but, for two
individuals, did not
authorize provisioned
electronic access to
electronic BCSI or
provisioned physical
access to physical BCSI.
(6.1)
High VSL
required by
Requirement R6 Part
6.1 but, for three
individuals, did not
authorize provisioned
electronic access to
electronic BCSI or
provisioned physical
access to physical
BCSI. (6.1)
Severe VSL
access management
program(s) for BCSI.
(R6)
OR
The Responsible Entity
has implemented one or
more process(es) as
required by
Requirement R6 Part 6.1
but, for four or more
OR
OR
individuals, did not
The Responsible Entity The Responsible Entity authorize provisioned
performed the
performed the
electronic access to
verification required by verification required
electronic BCSI or
Requirement R6 Part
by Requirement R6
provisioned physical
6.2 more than 16
Part 6.2 more than 17 access to physical BCSI.
calendar months but
calendar months but
(6.1)
less than or equal to 17 less than or equal to
OR
calendar months of the 18 calendar months of
The Responsible Entity
previous verification.
the previous
performed the
(6.2)
verification. (6.2)
verification required by
OR
OR
Requirement R6 Part 6.2
The
Responsible
Entity
The Responsible Entity
more than 18 calendar
has implemented one months of the previous
has implemented one
or more process(es) to or more process(es) to verification. (6.2)
remove the individual’s remove the
OR
individual’s ability to
ability to use
Page 35 of 38
CIP-004-X7 — Cyber Security – Personnel & Training
R#
Time
Horizon
Draft 32
August March 20210
VRF
Violation Severity Levels (CIP-004-X7)
Lower VSL
so by the timeframe
required in Requirement
R6, Part 6.3.
The Responsible Entity
has implemented one or
more documented access
management program(s)
for BCSI but did not
implement one of the
applicable items for Parts
6.1 through 6.3. (R6)
Moderate VSL
provisioned access to
BCSI but, for two
individuals, did not do
so by timeframe
required in
Requirement R6, Part
6.3.
The Responsible Entiy
implemented one or
more documented
access management
program(s) for BCSI but
did not implement two
of the applicable items
for Parts 6.1 through
6.3 (R6)
High VSL
use provisioned
access to BCSI but, for
three individuals, did
not do so by
timeframe required in
Requirement R6, Part
6.3.
Severe VSL
The Responsible Entity
has implemented one or
more process(es) to
remove the individual’s
ability to use
provisioned access to
BCSI but, for four or
more individuals, did
The Responsible Entity not do so by timeframe
implemented one or
required in
more documented
Requirement R6, Part
access management
6.3.
The Responsible Entity
program(s) for BCSI
but did not implement did not implement one
three of the applicable or more documented
access management
items for Parts 6.1
program(s) for BCSI (R6)
through 6.3 (R6)
Page 36 of 38
CIP-004-X7 — Guidelines and Technical Basis
D. Regional Variances
None.
E. Interpretations
None.
F. Associated Documents
None.
Version History
Version
Date
Action
1
1/16/06
R3.2 — Change “Control Center” to “control
center.”
2
9/30/09
Modifications to clarify the requirements and
to bring the compliance elements into
conformance with the latest guidelines for
developing compliance elements of
standards.
Change Tracking
3/24/06
Removal of reasonable business judgment.
Replaced the RRO with the RE as a
responsible entity.
Rewording of Effective Date.
Changed compliance monitor to Compliance
Enforcement Authority.
3
12/16/09
Updated Version Number from -2 to -3
In Requirement 1.6, deleted the sentence
pertaining to removing component or system
from service in order to perform testing, in
response to FERC order issued September 30,
2009.
3
12/16/09
Approved by the NERC Board of Trustees.
3
3/31/10
Approved by FERC.
4
1/24/11
Approved by the NERC Board of Trustees.
5
11/26/12
Adopted by the NERC Board of Trustees.
Draft 32
August March 20210
Modified to
coordinate with
other CIP
standards and to
Page 37 of 38
CIP-004-X7 — Guidelines and Technical Basis
Version
Date
Action
Change Tracking
revise format to
use RBS
Template.
5
11/22/13
FERC Order issued approving CIP-004-5.
5.1
9/30/13
Modified two VSLs in R4
Errata
6
11/13/14
Adopted by the NERC Board of Trustees.
Addressed two
FERC directives
from Order No.
791 related to
identify, assess,
and correct
language and
communication
networks.
6
2/12/15
Adopted by the NERC Board of Trustees.
Replaces the
version adopted
by the Board on
11/13/2014.
Revised version
addresses
remaining
directives from
Order No. 791
related to
transient devices
and low impact
BES Cyber
Systems.
6
1/21/16
7
TBD
FERC order issued approving CIP-004-6.
Docket No. RM15-14-000
Adopted by the NERC Board of Trustees
Draft 32
August March 20210
Revised to
enhance BES
reliability for
entities to
manage their
BCSI.
Page 38 of 38
CIP-004-X6 — Cyber Security – Personnel & Training
Standard Development Timeline
This section is maintained by the drafting team during the development of the standard and will be
removed when the standard is adopted by the NERC Board of Trustees (Board).
Description of Current Draft
Completed Actions
Standards Committee approved Standard Authorization Request
(SAR) for posting
SAR posted for comment
Date
March 22, 2019
March 28, 2019 –
April 26, 2019
45-day formal comment period with ballot
December 20, 2019
– February 3, 2020
45-day formal comment period with ballot
August 6 –
September 21, 2020
45-day formal comment period with ballot
March 25 – May 10,
2021
Anticipated Actions
10-day final ballot
Board adoption
Draft 3
March 2021
Date
May 2021
November 2021
Page 1 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
A. Introduction
1. Title:
Cyber Security — Personnel & Training
2. Number:
CIP-004-X6
3. Purpose:
To minimize the risk against compromise that could lead to misoperation or
instability in the Bulk Electric System (BES) from individuals accessing BES Cyber
Systems by requiring an appropriate level of personnel risk assessment, training,
and security awareness, and access management in support of protecting BES
Cyber Systems.
4. Applicability:
4.1.
Functional Entities: For the purpose of the requirements contained herein, the following
list of functional entities will be collectively referred to as “Responsible Entities.” For
requirements in this standard where a specific functional entity or subset of functional
entities are the applicable entity or entities, the functional entity or entities are specified
explicitly.
4.1.1. Balancing Authority
4.1.2. Distribution Provider that owns one or more of the following Facilities, systems, and
equipment for the protection or restoration of the BES:
4.1.2.1. Each underfrequency Load shedding (UFLS) or undervoltage Load shedding
(UVLS) system that:
4.1.2.1.1. is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.1.2.1.2. performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation, of
300 MW or more.
4.1.2.2. Each Special Protection System (SPS) or Remedial Action Scheme (RAS) where
the SPS or RAS is subject to one or more requirements in a NERC or Regional
Reliability Standard.
4.1.2.3. Each Protection System (excluding UFLS and UVLS) that applies to Transmission
where the Protection System is subject to one or more requirements in a NERC
or Regional Reliability Standard.
4.1.2.4. Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.1.3. Generator Operator
4.1.4. Generator Owner
4.1.5. Interchange Coordinator or Interchange Authority
Draft 3
March 2021
Page 2 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
4.1.6.4.1.5.
Reliability Coordinator
4.1.7.4.1.6.
Transmission Operator
4.1.8.4.1.7.
Transmission Owner
4.2.
Facilities: For the purpose of the requirements contained herein, the following
Facilities, systems, and equipment owned by each Responsible Entity in 4.1 above are
those to which these requirements are applicable. For requirements in this standard
where a specific type of Facilities, system, or equipment or subset of Facilities, systems,
and equipment are applicable, these are specified explicitly.
4.2.1. Distribution Provider: One or more of the following Facilities, systems and
equipment owned by the Distribution Provider for the protection or restoration of
the BES:
4.2.1.1. Each UFLS or UVLS System that:
4.2.1.1.1. is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.2.1.1.2. performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation, of
300 MW or more.
4.2.1.2. Each SPS or RAS where the SPS or RAS is subject to one or more requirements in
a NERC or Regional Reliability Standard.
4.2.1.3. Each Protection System (excluding UFLS and UVLS) that applies to Transmission
where the Protection System is subject to one or more requirements in a NERC
or Regional Reliability Standard.
4.2.1.4. Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.2.2. Responsible Entities listed in 4.1 other than Distribution Providers:
All BES Facilities.
4.2.3. Exemptions: The following are exempt from Standard CIP-004-X6:
4.2.3.1. Cyber Assets at Facilities regulated by the Canadian Nuclear Safety Commission.
4.2.3.2. Cyber Assets associated with communication networks and data
communication links between discrete Electronic Security Perimeters.
4.2.3.3. The systems, structures, and components that are regulated by the Nuclear
Regulatory Commission under a cyber security plan pursuant to 10 C.F.R.
Section 73.54.
4.2.3.4. For Distribution Providers, the systems and equipment that are not included in
section 4.2.1 above.
Draft 3
March 2021
Page 3 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
4.2.3.5. Responsible Entities that identify that they have no BES Cyber Systems
categorized as high impact or medium impact according to the CIP-002-5.1a
identification and categorization processes.
5. Effective Dates: See Implementation Plan for CIP-004-X6.
6. Background:
Standard CIP-004 exists as part of a suite of CIP Standards related to cyber security, which
require the initial identification and categorization of BES Cyber Systems and require a
minimum level of organizational, operational, and procedural controls to mitigate risk to BES
Cyber Systems.
Most requirements open with, “Each Responsible Entity shall implement one or more
documented [processes, plan, etc.] that include the applicable items in [Table Reference].” The
referenced table requires the applicable items in the procedures for the common subject
matter of the requirements.
The term documented processes refers to a set of required instructions specific to the
Responsible Entity and to achieve a specific outcome. This term does not imply any particular
naming or approval structure beyond what is stated in the requirements. An entity should
include as much as it believes necessary in its documented processes, but it must address the
applicable requirements in the table.
The terms program and plan are sometimes used in place of documented processes where it
makes sense and is commonly understood. For example, documented processes describing a
response are typically referred to as plans (i.e., incident response plans and recovery plans).
Likewise, a security plan can describe an approach involving multiple procedures to address a
broad subject matter.
Similarly, the term program may refer to the organization’s overall implementation of its
policies, plans and procedures involving a subject matter. Examples in the standards include
the personnel risk assessment program and the personnel training program. The full
implementation of the CIP Cyber Security Standards could also be referred to as a program.
However, the terms program and plan do not imply any additional requirements beyond what
is stated in the standards.
Responsible Entities can implement common controls that meet requirements for multiple high
and medium impact BES Cyber Systems. For example, a single training program could meet the
requirements for training personnel across multiple BES Cyber Systems.
Measures for the initial requirement are simply the documented processes themselves.
Measures in the table rows provide examples of evidence to show documentation and
implementation of applicable items in the documented processes. These measures serve to
provide guidance to entities in acceptable records of compliance and should not be viewed as
an all-inclusive list.
Throughout the standards, unless otherwise stated, bulleted items in the requirements and
measures are items that are linked with an “or,” and numbered items are items that are linked
with an “and.”
Draft 3
March 2021
Page 4 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
Many references in the Applicability section use a threshold of 300 MW for UFLS and UVLS.
This particular threshold of 300 MW for UVLS and UFLS was provided in Version 1 of the CIP
Cyber Security Standards. The threshold remains at 300 MW since it is specifically addressing
UVLS and UFLS, which are last ditch efforts to save the BES. A review of UFLS tolerances defined
within regional reliability standards for UFLS program requirements to date indicates that the
historical value of 300 MW represents an adequate and reasonable threshold value for
allowable UFLS operational tolerances.
“Applicable Systems” Columns in Tables:
Each table has an “Applicable Systems” column to further define the scope of systems to which
a specific requirement row applies. The CSO706 SDT adapted this concept from the National
Institute of Standards and Technology (“NIST”) Risk Management Framework as a way of
applying requirements more appropriately based on impact and connectivity characteristics.
The following conventions are used in the “Applicable Systems” column as described.
• High Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as high impact
according to the CIP-002-5.1a identification and categorization processes.
• Medium Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as medium
impact according to the CIP-002-5.1a identification and categorization processes.
• Medium Impact BES Cyber Systems with External Routable Connectivity – Only applies to
medium impact BES Cyber Systems with External Routable Connectivity. This also excludes
Cyber Assets in the BES Cyber System that cannot be directly accessed through External
Routable Connectivity.
• Electronic Access Control or Monitoring Systems (EACMS) – Applies to each Electronic
Access Control or Monitoring System associated with a referenced high impact BES Cyber
System or medium impact BES Cyber System. Examples may include, but are not limited to,
firewalls, authentication servers, and log monitoring and alerting systems.
• Physical Access Control Systems (PACS) – Applies to each Physical Access Control System
associated with a referenced high impact BES Cyber System or medium impact BES Cyber
System with External Routable Connectivity.
Draft 3
March 2021
Page 5 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
B. Requirements and Measures
R1.
Each Responsible Entity shall implement one or more documented processes that collectively include each of the
applicable requirement parts in CIP-004-X6 Table R1 – Security Awareness Program. [Violation Risk Factor: Lower] [Time
Horizon: Operations Planning]
M1. Evidence must include each of the applicable documented processes that collectively include each of the applicable
requirement parts in CIP-004-X6 Table R1 – Security Awareness Program and additional evidence to demonstrate
implementation as described in the Measures column of the table.
CIP-004-X6 Table R1 – Security Awareness Program
Part
1.1
Applicable Systems
High Impact BES Cyber Systems
Medium Impact BES Cyber Systems
Requirements
Security awareness that, at least once
each calendar quarter, reinforces cyber
security practices (which may include
associated physical security practices)
for the Responsible Entity’s personnel
who have authorized electronic or
authorized unescorted physical access
to BES Cyber Systems.
Measures
An example of evidence may include,
but is not limited to, documentation
that the quarterly reinforcement has
been provided. Examples of evidence
of reinforcement may include, but are
not limited to, dated copies of
information used to reinforce security
awareness, as well as evidence of
distribution, such as:
•
•
•
Draft 3
March 2021
direct communications (for
example, e-mails, memos,
computer-based training); or
indirect communications (for
example, posters, intranet, or
brochures); or
management support and
reinforcement (for example,
presentations or meetings).
Page 6 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
R2. Each Responsible Entity shall implement one or more cyber security training program(s) appropriate to individual roles,
functions, or responsibilities that collectively includes each of the applicable requirement parts in CIP-004-X6 Table R2 –
Cyber Security Training Program. [Violation Risk Factor: Lower] [Time Horizon: Operations Planning]
M2. Evidence must include the training program that includes each of the applicable requirement parts in CIP-004-X6 Table R2 –
Cyber Security Training Program and additional evidence to demonstrate implementation of the program(s).
Draft 3
March 2021
Page 7 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
CIP-004-X6 Table R2 – Cyber Security Training Program
Part
2.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Requirements
Training content on:
2.1.1. Cyber security policies;
2.1.2. Physical access controls;
2.1.3. Electronic access controls;
2.1.4. The visitor control program;
Measures
Examples of evidence may include,
but are not limited to, training
material such as power point
presentations, instructor notes,
student notes, handouts, or other
training materials.
2.1.5. Handling of BES Cyber System
Information and its storage;
2.1.6. Identification of a Cyber
Security Incident and initial
notifications in accordance
with the entity’s incident
response plan;
2.1.7. Recovery plans for BES Cyber
Systems;
2.1.8. Response to Cyber Security
Incidents; and
2.1.9. Cyber security risks associated
with a BES Cyber System’s
electronic interconnectivity
and interoperability with
other Cyber Assets, including
Transient Cyber Assets, and
with Removable Media.
Draft 3
March 2021
Page 8 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
CIP-004-X6 Table R2 – Cyber Security Training Program
Part
2.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
Requirements
Measures
Require completion of the training
specified in Part 2.1 prior to granting
authorized electronic access and
authorized unescorted physical access
to applicable Cyber Assets, except
during CIP Exceptional Circumstances.
Examples of evidence may include,
but are not limited to, training
records and documentation of when
CIP Exceptional Circumstances were
invoked.
Require completion of the training
specified in Part 2.1 at least once
every 15 calendar months.
Examples of evidence may include,
but are not limited to, dated
individual training records.
1. EACMS; and
2. PACS
2.3
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 3
March 2021
Page 9 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
R3.
Each Responsible Entity shall implement one or more documented personnel risk assessment program(s) to attain and
retain authorized electronic or authorized unescorted physical access to BES Cyber Systems that collectively include each of
the applicable requirement parts in CIP-004-X6 Table R3 – Personnel Risk Assessment Program. [Violation Risk Factor:
Medium] [Time Horizon: Operations Planning].
M3. Evidence must include the documented personnel risk assessment programs that collectively include each of the applicable
requirement parts in CIP-004-X6 Table R3 – Personnel Risk Assessment Program and additional evidence to demonstrate
implementation of the program(s).
CIP-004-X6 Table R3 – Personnel Risk Assessment Program
Part
Applicable Systems
3.1
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Requirements
Process to confirm identity.
Measures
An example of evidence may
include, but is not limited to,
documentation of the Responsible
Entity’s process to confirm identity.
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Draft 3
March 2021
Page 10 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
CIP-004-X6 Table R3 – Personnel Risk Assessment Program
Part
3.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Requirements
Measures
Process to perform a seven year
criminal history records check as part of
each personnel risk assessment that
includes:
An example of evidence may include,
but is not limited to, documentation of
the Responsible Entity’s process to
perform a seven year criminal history
records check.
3.2.1. current residence, regardless of
duration; and
3.2.2. other locations where, during
the seven years immediately prior to
the date of the criminal history
records check, the subject has resided
for six consecutive months or more.
If it is not possible to perform a full
seven year criminal history records
check, conduct as much of the seven
year criminal history records check as
possible and document the reason the
full seven year criminal history records
check could not be performed.
Draft 3
March 2021
Page 11 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
CIP-004-X6 Table R3 – Personnel Risk Assessment Program
Part
3.3
Applicable Systems
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
Requirements
Measures
Criteria or process to evaluate criminal
history records checks for authorizing
access.
An example of evidence may
include, but is not limited to,
documentation of the
Responsible Entity’s process to
evaluate criminal history records
checks.
Criteria or process for verifying that
personnel risk assessments performed for
contractors or service vendors are
conducted according to Parts 3.1 through
3.3.
An example of evidence may
include, but is not limited to,
documentation of the
Responsible Entity’s criteria or
process for verifying contractors
or service vendors personnel risk
assessments.
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
3.4
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Draft 3
March 2021
Page 12 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
CIP-004-X6 Table R3 – Personnel Risk Assessment Program
Part
3.5
Applicable Systems
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Draft 3
March 2021
Requirements
Measures
Process to ensure that individuals with
authorized electronic or authorized
unescorted physical access have had a
personnel risk assessment completed
according to Parts 3.1 to 3.4 within the last
seven years.
An example of evidence may
include, but is not limited to,
documentation of the
Responsible Entity’s process for
ensuring that individuals with
authorized electronic or
authorized unescorted physical
access have had a personnel risk
assessment completed within the
last seven years.
Page 13 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
R4. Each Responsible Entity shall implement one or more documented access management program(s) that collectively include
each of the applicable requirement parts in CIP-004-X6 Table R4 – Access Management Program. [Violation Risk Factor:
Medium] [Time Horizon: Operations Planning and Same Day Operations].
M4. Evidence must include the documented processes that collectively include each of the applicable requirement parts in CIP004-X6 Table R4 – Access Management Program and additional evidence to demonstrate that the access management
program was implemented as described in the Measures column of the table.
CIP-004-X6 Table R4 – Access Management Program
Part
Applicable Systems
4.1
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Draft 3
March 2021
Requirements
Process to authorize based on need, as
determined by the Responsible Entity,
except for CIP Exceptional
Circumstances:
4.1.1. Electronic access; and
4.1.2. Unescorted physical access into a
Physical Security Perimeter; and
4.1.3. Access to designated storage
locations, whether physical or
electronic, for BES Cyber System
Information.
Measures
An example of evidence may
include, but is not limited to, dated
documentation of the process to
authorize electronic access and
unescorted physical access in a
Physical Security Perimeter, and
access to designated storage
locations, whether physical or
electronic, for BES Cyber System
Information.
Page 14 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
CIP-004-X6 Table R4 – Access Management Program
Part
Applicable Systems
4.2
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Requirements
Verify at least once each calendar
quarter that individuals with active
electronic access or unescorted physical
access have authorization records.
Measures
Examples of evidence may include,
but are not limited to:
•
Dated documentation of the
verification between the system
generated list of individuals who
have been authorized for access
(i.e., workflow database) and a
system generated list of
personnel who have access (i.e.,
user account listing), or
•
Dated documentation of the
verification between a list of
individuals who have been
authorized for access (i.e.,
authorization forms) and a list
of individuals provisioned for
access (i.e., provisioning forms
or shared account listing).
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Draft 3
March 2021
Page 15 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
CIP-004-X6 Table R4 – Access Management Program
Part
Applicable Systems
Requirements
4.3
High Impact BES Cyber Systems and their
associated:
For electronic access, verify at least once
every 15 calendar months that all user
accounts, user account groups, or user
role categories, and their specific,
associated privileges are correct and are
those that the Responsible Entity
determines are necessary.
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Measures
An example of evidence may
include, but is not limited to,
documentation of the review that
includes all of the following:
1. A dated listing of all
accounts/account groups or
roles within the system;
2. A summary description of
privileges associated with
each group or role;
3. Accounts assigned to the
group or role; and
4. Dated evidence showing
verification of the privileges
for the group are authorized
and appropriate to the work
function performed by
people assigned to each
account.
Draft 3
March 2021
Page 16 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
CIP-004-X6 Table R4 – Access Management Program
Part
Applicable Systems
Requirements
4.4
High Impact BES Cyber Systems and their
associated:
Verify at least once every 15 calendar
months that access to the designated
storage locations for BES Cyber System
Information, whether physical or
electronic, are correct and are those that
the Responsible Entity determines are
necessary for performing assigned work
functions.
1. EACMS; and
PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
0. EACMS; and
0. PACS
Draft 3
March 2021
Measures
An example of evidence may
include, but is not limited to, the
documentation of the review that
includes all of the following:
0. A dated listing of
authorizations for BES Cyber
System information;
0. Any privileges associated
with the authorizations; and
0. Dated evidence showing a
verification of the
authorizations and any
privileges were confirmed
correct and the minimum
necessary for performing
assigned work functions.
Page 17 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
R5. Each Responsible Entity shall implement one or more documented access revocation program(s) that collectively include
each of the applicable requirement parts in CIP-004-X6 Table R5 – Access Revocation. [Violation Risk Factor: Medium] [Time
Horizon: Same Day Operations and Operations Planning].
M5. Evidence must include each of the applicable documented programs that collectively include each of the applicable
requirement parts in CIP-004-X6 Table R5 – Access Revocation and additional evidence to demonstrate implementation as
described in the Measures column of the table.
CIP-004-X6 Table R5 – Access Revocation
Part
5.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 3
March 2021
Requirements
Measures
A process to initiate removal of an
individual’s ability for unescorted
physical access and Interactive Remote
Access upon a termination action, and
complete the removals within 24 hours
of the termination action (Removal of
the ability for access may be different
than deletion, disabling, revocation, or
removal of all access rights).
An example of evidence may include,
but is not limited to, documentation of
all of the following:
1. Dated workflow or sign-off form
verifying access removal
associated with the termination
action; and
2. Logs or other demonstration
showing such persons no longer
have access.
Page 18 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
CIP-004-X6 Table R5 – Access Revocation
Part
5.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 3
March 2021
Requirements
Measures
For reassignments or transfers, revoke
the individual’s authorized electronic
access to individual accounts and
authorized unescorted physical access
that the Responsible Entity determines
are not necessary by the end of the
next calendar day following the date
that the Responsible Entity determines
that the individual no longer requires
retention of that access.
An example of evidence may include,
but is not limited to, documentation of
all of the following:
1. Dated workflow or sign-off form
showing a review of logical and
physical access; and
2. Logs or other demonstration
showing such persons no longer
have access that the
Responsible Entity determines
is not necessary.
Page 19 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
CIP-004-X6 Table R5 – Access Revocation
Part
5.3
Applicable Systems
High Impact BES Cyber Systems and
their associated:
EACMS; and
PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
EACMS; and
Requirements
Measures
For termination actions, revoke the
individual’s access to the designated
storage locations for BES Cyber System
Information, whether physical or
electronic (unless already revoked
according to Requirement R5.1), by the
end of the next calendar day following
the effective date of the termination
action.
An example of evidence may include,
but is not limited to, workflow or signoff form verifying access removal to
designated physical areas or cyber
systems containing BES Cyber System
Information associated with the
terminations and dated within the next
calendar day of the termination action.
For termination actions, revoke the
individual’s non-shared user accounts
(unless already revoked according to
Parts 5.1 or 5.3) within 30 calendar
days of the effective date of the
termination action.
An example of evidence may include,
but is not limited to, workflow or signoff form showing access removal for
any individual BES Cyber Assets and
software applications as determined
necessary to completing the revocation
of access and dated within thirty
calendar days of the termination
actions.
PACS
5.34
High Impact BES Cyber Systems and
their associated:
•
Draft 3
March 2021
EACMS
Page 20 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
CIP-004-X6 Table R5 – Access Revocation
Part
Applicable Systems
5.45 High Impact BES Cyber Systems and
their associated:
•
EACMS
Requirements
For termination actions, change
Examples of evidence may include, but
passwords for shared account(s) known are not limited to:
to the user within 30 calendar days of
• Workflow or sign-off form
the termination action. For
showing password reset within
reassignments or transfers, change
30 calendar days of the
passwords for shared account(s) known
termination;
to the user within 30 calendar days
• Workflow or sign-off form
following the date that the Responsible
showing password reset within
Entity determines that the individual no
30 calendar days of the
longer requires retention of that
reassignments or transfers; or
access.
If the Responsible Entity determines
and documents that extenuating
operating circumstances require a
longer time period, change the
password(s) within 10 calendar days
following the end of the operating
circumstances.
Draft 3
March 2021
Measures
•
Documentation of the
extenuating operating
circumstance and workflow or
sign-off form showing password
reset within 10 calendar days
following the end of the
operating circumstance.
Page 21 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
R6. Each Responsible Entity shall implement one or more documented access management program(s) to authorize, verify, and
revoke provisioned access to BCSI pertaining to the “Applicable Systems” identified in CIP-004-X Table R6 – Access
Management for BES Cyber System Information that collectively include each of the applicable requirement parts in CIP‐
004‐X Table R6 – Access Management for BES Cyber System Information. To be considered access to BCSI in the context of
this requirement, an individual has both the ability to obtain and use BCSI. [Violation Risk Factor: Medium] [Time Horizon:
Same Day Operations and Operations Planning].
M6. Evidence must include each of the applicable documented programs that collectively include the applicable requirement
parts in CIP-004-X Table R6 – Access Management for BES Cyber System Information and additional evidence to
demonstrate implementation as described in the Measures column of the table.
Draft 3
March 2021
Page 22 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
CIP-004-X Table R6 – Access Management for BES Cyber System Information
Part
6.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Draft 3
March 2021
Requirements
Measures
Prior to provisioning, authorize (unless
already authorized according to Part
4.1.) based on need, as determined by
the Responsible Entity, except for CIP
Exceptional Circumstances:
Examples of evidence may include, but
are not limited to, individual records or
lists that include who is authorized, the
date of the authorization, and the
justification of business need for the
provisioned access.
6.1.1. Provisioned electronic access to
electronic BCSI; and
6.1.2. Provisioned physical access to
physical BCSI.
Note: Provisioned access is to be
considered the result of the specific
actions taken to provide an
individual(s) the means to access BCSI
(e.g., may include physical keys or
access cards, user accounts and
associated rights and privileges,
encryption keys).
Page 23 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
CIP-004-X Table R6 – Access Management for BES Cyber System Information
Part
6.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
Requirements
Verify at least once every 15 calendar
months that all individuals with
provisioned access to BCSI:
6.2.1. have an authorization record;
and
6.2.2. still need the provisioned access
to perform their current work
functions, as determined by the
Responsible Entity.
Measures
Examples of evidence may include, but
are not limited to, the documentation
of the review that includes all of the
following:
•
List of authorized individuals;
•
List of individuals who have been
provisioned access;
•
Verification that provisioned
access is appropriate based on
need; and
•
Documented reconciliation
actions, if any.
2. PACS
6.3
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
For termination actions, remove the
individual’s ability to use provisioned
access to BCSI (unless already revoked
according to Part 5.1) by the end of the
next calendar day following the
effective date of the termination
action.
Examples of dated evidence may
include, but are not limited to, access
revocation records associated with the
terminations and dated within the next
calendar day of the termination action.
1. EACMS; and
2. PACS
Draft 3
March 2021
Page 24 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
C. Compliance
1. Compliance Monitoring Process:
1.1. Compliance Enforcement Authority:
As defined in the NERC Rules of Procedure, “Compliance Enforcement Authority” (CEA)
means NERC or the Regional Entity, or any entity as otherwise designated by an
Applicable Governmental Authority, in their respective roles of monitoring and/or
enforcing compliance with mandatory and enforceable the NERC Reliability Standards
in their respective jurisdictions.
1.2. Evidence Retention:
The following evidence retention periods identify the period of time an entity is
required to retain specific evidence to demonstrate compliance. For instances where
the evidence retention period specified below is shorter than the time since the last
audit, the CEA may ask an entity to provide other evidence to show that it was
compliant for the full time period since the last audit.
The Responsible Eapplicable entity shall keep data or evidence to show compliance as
identified below unless directed by its CEA to retain specific evidence for a longer
period of time as part of an investigation:
•
Each Responsible EThe applicable entity shall retain evidence of each requirement in
this standard for three calendar years.
•
If a Responsible EThe applicable entity is found non-compliant, it shall keep information
related to the non-compliance until mitigation is complete and approved or for the
time specified above, whichever is longer.
•
The CEA shall keep the last audit records and all requested and submitted subsequent
audit records.
1.3. Compliance Monitoring and EnforceAssessment Programcesses:
As defined in the NERC Rules of Procedure, “Compliance Monitoring and Enforcement
Program” refers to the identification of the processes that will be used to evaluate data
or information for the purpose of assessing performance or outcomes with the
associated Reliability Standard.
Compliance Audits
Self-Certifications
Spot Checking
Compliance Violation Investigations
Self-Reporting
Complaints
1.4. Additional Compliance Information:
None
Draft 3
March
2021
Page 25 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
2. Table of Compliance Elements
R#
R1
R2
Time
Horizon
VRF
Operations
Planning
Lower
Operations
Planning
Violation Severity Levels (CIP-004-X6)
Lower VSL
Lower
Moderate VSL
Severe VSL
The Responsible Entity did
not reinforce cyber
security practices during a
calendar quarter but did
so less than 10 calendar
days after the start of a
subsequent calendar
quarter. (1.1)
The Responsible
Entity did not
reinforce cyber
security practices
during a calendar
quarter but did so
between 10 and 30
calendar days after
the start of a
subsequent calendar
quarter. (1.1)
The Responsible Entity
did not reinforce cyber
security practices
during a calendar
quarter but did so
within the subsequent
quarter but beyond 30
calendar days after the
start of that calendar
quarter. (1.1)
The Responsible Entity
did not document or
implement any security
awareness process(es)
to reinforce cyber
security practices. (R1)
The Responsible Entity
implemented a cyber
security training program
but failed to include one
of the training content
topics in Requirement
Parts 2.1.1 through 2.1.9.
(2.1)
The Responsible
Entity implemented a
cyber security
training program but
failed to include two
of the training
content topics in
Requirement Parts
2.1.1 through 2.1.9.
(2.1)
The Responsible Entity
implemented a cyber
security training
program but failed to
include three of the
training content topics
in Requirement Parts
2.1.1 through 2.1.9.
(2.1)
The Responsible Entity
did not implement a
cyber security training
program appropriate to
individual roles,
functions, or
responsibilities. (R2)
OR
OR
Draft 3
March 2021
High VSL
OR
OR
The Responsible Entity
did not reinforce cyber
security practices and
associated physical
security practices for at
least two consecutive
calendar quarters. (1.1)
OR
The Responsible Entity
implemented a cyber
Page 26 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-X6)
Lower VSL
The Responsible Entity
implemented a cyber
security training program
but failed to train one
individual (with the
exception of CIP
Exceptional
Circumstances) prior to
their being granted
authorized electronic and
authorized unescorted
physical access. (2.2)
OR
The Responsible Entity
implemented a cyber
security training program
but failed to train one
individual with authorized
electronic or authorized
unescorted physical
access within 15 calendar
months of the previous
training completion date.
(2.3)
Draft 3
March 2021
Moderate VSL
The Responsible
Entity implemented a
cyber security
training program but
failed to train two
individuals (with the
exception of CIP
Exceptional
Circumstances) prior
to their being
granted authorized
electronic and
authorized
unescorted physical
access. (2.2)
High VSL
The Responsible Entity
implemented a cyber
security training
program but failed to
train three individuals
(with the exception of
CIP Exceptional
Circumstances) prior to
their being granted
authorized electronic
and authorized
unescorted physical
access. (2.2)
OR
The Responsible Entity
implemented a cyber
security training
program but failed to
The Responsible
Entity implemented a train three individuals
with authorized
cyber security
training program but electronic or authorized
unescorted physical
failed to train two
access within 15
individuals with
authorized electronic calendar months of the
previous training
or authorized
completion date. (2.3)
unescorted physical
access within 15
OR
Severe VSL
security training
program but failed to
include four or more of
the training content
topics in Requirement
Parts 2.1.1 through
2.1.9. (2.1)
OR
The Responsible Entity
implemented a cyber
security training
program but failed to
train four or more
individuals (with the
exception of CIP
Exceptional
Circumstances) prior to
their being granted
authorized electronic
and authorized
unescorted physical
access. (2.2)
OR
The Responsible Entity
implemented a cyber
security training
program but failed to
Page 27 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
R#
R3
Draft 3
March 2021
Time
Horizon
VRF
Operations
Planning
Medium
Violation Severity Levels (CIP-004-X6)
Lower VSL
The Responsible Entity
has a program for
conducting Personnel Risk
Assessments (PRAs) for
individuals, including
contractors and service
vendors, but did not
conduct the PRA as a
condition of granting
authorized electronic or
authorized unescorted
physical access for one
individual. (R3)
Moderate VSL
calendar months of
the previous training
completion date.
(2.3)
The Responsible
Entity has a program
for conducting
Personnel Risk
Assessments (PRAs)
for individuals,
including contractors
and service vendors,
but did not conduct
the PRA as a
condition of granting
authorized electronic
or authorized
unescorted physical
OR
access for two
The Responsible Entity did individuals. (R3)
conduct Personnel Risk
OR
Assessments (PRAs) for
individuals, including
The Responsible
contractors and service
Entity did conduct
High VSL
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments (PRAs)
for individuals,
including contractors
and service vendors,
but did not conduct the
PRA as a condition of
granting authorized
electronic or authorized
unescorted physical
access for three
individuals. (R3)
OR
Severe VSL
train four or more
individuals with
authorized electronic or
authorized unescorted
physical access within 15
calendar months of the
previous training
completion date. (2.3)
The Responsible Entity
did not have all of the
required elements as
described by 3.1 through
3.4 included within
documented program(s)
for implementing
Personnel Risk
Assessments (PRAs), for
individuals, including
contractors and service
vendors, for obtaining
and retaining authorized
cyber or authorized
unescorted physical
access. (R3)
The Responsible Entity
OR
did conduct Personnel
Risk Assessments (PRAs) The Responsible Entity
for individuals,
has a program for
Page 28 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-X6)
Lower VSL
vendors, with authorized
electronic or authorized
unescorted physical
access but did not confirm
identity for one
individual. (3.1 & 3.4)
OR
The Responsible Entity
has a process to perform
seven-year criminal
history record checks for
individuals, including
contractors and service
vendors, with authorized
electronic or authorized
unescorted physical
access but did not include
the required checks
described in 3.2.1 and
3.2.2 for one individual.
(3.2 & 3.4)
Moderate VSL
Personnel Risk
Assessments (PRAs)
for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized
unescorted physical
access but did not
confirm identity for
two individuals. (3.1
& 3.4)
OR
The Responsible
Entity has a process
to perform sevenyear criminal history
record checks for
individuals, including
contractors and
service vendors, with
OR
authorized electronic
The Responsible Entity did or authorized
conduct Personnel Risk
unescorted physical
Assessments (PRAs) for
access but did not
individuals, including
include the required
contractors and service
checks described in
Draft 3
March 2021
High VSL
including contractors
and service vendors,
with authorized
electronic or authorized
unescorted physical
access but did not
confirm identity for
three individuals. (3.1 &
3.4)
OR
The Responsible Entity
has a process to
perform seven-year
criminal history record
checks for individuals,
including contractors
and service vendors,
with authorized
electronic or authorized
unescorted physical
access but did not
include the required
checks described in
3.2.1 and 3.2.2 for three
individuals. (3.2 & 3.4)
OR
Severe VSL
conducting Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, but did not
conduct the PRA as a
condition of granting
authorized electronic or
authorized unescorted
physical access for four
or more individuals. (R3)
OR
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with authorized
electronic or authorized
unescorted physical
access but did not
confirm identity for four
or more individuals. (3.1
& 3.4)
OR
The Responsible Entity
has a process to perform
Page 29 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-X6)
Lower VSL
vendors, with authorized
electronic or authorized
unescorted physical
access but did not
evaluate criminal history
records check for access
authorization for one
individual. (3.3 & 3.4)
Moderate VSL
3.2.1 and 3.2.2 for
two individuals. (3.2
& 3.4)
OR
The Responsible
Entity did conduct
Personnel Risk
Assessments (PRAs)
OR
for individuals,
The Responsible Entity did including contractors
not conduct Personnel
and service vendors,
Risk Assessments (PRAs)
with authorized
for one individual with
electronic or
authorized electronic or
authorized
authorized unescorted
unescorted physical
physical access within 7
access but did not
calendar years of the
evaluate criminal
previous PRA completion history records check
date. (3.5)
for access
authorization for two
individuals. (3.3 &
3.4)
OR
The Responsible
Entity did not
conduct Personnel
Risk Assessments
Draft 3
March 2021
High VSL
Severe VSL
seven-year criminal
The Responsible Entity
history record checks for
did conduct Personnel
Risk Assessments (PRAs) individuals, including
contractors and service
for individuals,
vendors, with authorized
including contractors
electronic or authorized
and service vendors,
unescorted physical
with authorized
electronic or authorized access but did not
include the required
unescorted physical
checks described in 3.2.1
access but did not
and 3.2.2 for four or
evaluate criminal
more individuals. (3.2 &
history records check
for access authorization 3.4)
for three individuals.
OR
(3.3 & 3.4)
The Responsible Entity
OR
did conduct Personnel
Risk Assessments (PRAs)
The Responsible Entity
for individuals, including
did not conduct
contractors and service
Personnel Risk
Assessments (PRAs) for vendors, with authorized
electronic or authorized
three individuals with
authorized electronic or unescorted physical
access but did not
authorized unescorted
physical access within 7 evaluate criminal history
records check for access
calendar years of the
authorization for four or
previous PRA
more individuals. (3.3 &
completion date. (3.5)
3.4)
Page 30 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
R#
R4
Time
Horizon
Operations
Planning
and Same
Day
Operations
VRF
Violation Severity Levels (CIP-004-X6)
Lower VSL
Medium
The Responsible Entity did
not verify that individuals
with active electronic or
active unescorted physical
access have authorization
records during a calendar
quarter but did so less
than 10 calendar days
after the start of a
subsequent calendar
quarter. (4.2)
OR
Draft 3
March 2021
Moderate VSL
(PRAs) for two
individuals with
authorized electronic
or authorized
unescorted physical
access within 7
calendar years of the
previous PRA
completion date.
(3.5)
The Responsible
Entity did not verify
that individuals with
active electronic or
active unescorted
physical access have
authorization records
during a calendar
quarter but did so
between 10 and 20
calendar days after
the start of a
subsequent calendar
quarter. (4.2)
High VSL
Severe VSL
OR
The Responsible Entity
did not verify that
individuals with active
electronic or active
unescorted physical
access have
authorization records
during a calendar
quarter but did so
between 20 and 30
calendar days after the
start of a subsequent
calendar quarter. (4.2)
OR
The Responsible Entity
did not conduct
Personnel Risk
Assessments (PRAs) for
four or more individuals
with authorized
electronic or authorized
unescorted physical
access within 7 calendar
years of the previous
PRA completion date.
(3.5)
The Responsible Entity
did not implement any
documented program(s)
for access management.
(R4)
OR
The Responsible Entity
has implemented one or
more documented
program(s) for access
management that
includes a process to
authorize electronic
Page 31 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-X6)
Lower VSL
The Responsible Entity
has implemented
processes to verify that
user accounts, user
account groups, or user
role categories, and their
specific, associated
privileges are correct and
necessary within 15
calendar months of the
previous verification but
for 5% or less of its BES
Cyber Systems, privileges
were incorrect or
unnecessary. (4.3)
OR
The Responsible Entity
has implemented
processes to verify that
access to the designated
storage locations for BES
Cyber System Information
is correct and necessary
within 15 calendar
months of the previous
verification but for 5% or
less of its BES Cyber
System Information
Draft 3
March 2021
OR
Moderate VSL
The Responsible
Entity has
implemented
processes to verify
that user accounts,
user account groups,
or user role
categories, and their
specific, associated
privileges are correct
and necessary within
15 calendar months
of the previous
verification but for
more than 5% but
less than (or equal
to) 10% of its BES
Cyber Systems,
privileges were
incorrect or
unnecessary. (4.3)
OR
The Responsible
Entity has
implemented
High VSL
The Responsible Entity
has implemented
processes to verify that
user accounts, user
account groups, or user
role categories, and
their specific,
associated privileges
are correct and
necessary within 15
calendar months of the
previous verification
but for more than 10%
but less than (or equal
to) 15% of its BES Cyber
Systems, privileges
were incorrect or
unnecessary. (4.3)
OR
The Responsible Entity
has implemented
processes to verify that
access to the
designated storage
locations for BES Cyber
System Information is
Severe VSL
access, or unescorted
physical access, or
access to the designated
storage locations where
BES Cyber System
Information is located.
(4.1)
OR
The Responsible Entity
did not verify that
individuals with active
electronic or active
unescorted physical
access have
authorization records for
at least two consecutive
calendar quarters. (4.2)
OR
The Responsible Entity
has implemented
processes to verify that
user accounts, user
account groups, or user
role categories, and their
specific, associated
Page 32 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
R#
Draft 3
March 2021
Time
Horizon
VRF
Violation Severity Levels (CIP-004-X6)
Lower VSL
storage locations,
privileges were incorrect
or unnecessary. (4.4)
Moderate VSL
processes to verify
that access to the
designated storage
locations for BES
Cyber System
Information is
correct and
necessary within 15
calendar months of
the previous
verification but for
more than 5% but
less than (or equal
to) 10% of its BES
Cyber System
Information storage
locations, privileges
were incorrect or
unnecessary. (4.4)
High VSL
correct and necessary
within 15 calendar
months of the previous
verification but for
more than 10% but less
than (or equal to) 15%
of its BES Cyber System
Information storage
locations, privileges
were incorrect or
unnecessary. (4.4)
Severe VSL
privileges are correct
and necessary within 15
calendar months of the
previous verification but
for more than 15% of its
BES Cyber Systems,
privileges were incorrect
or unnecessary. (4.3)
OR
The Responsible Entity
has implemented
processes to verify that
access to the designated
storage locations for BES
Cyber System
Information is correct
and necessary within 15
calendar months of the
previous verification but
for more than 15% of its
BES Cyber System
Information storage
locations, privileges
were incorrect or
unnecessary. (4.4)
Page 33 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
R#
R5
Time
Horizon
Same Day
Operations
and
Operations
Planning
VRF
Medium
Violation Severity Levels (CIP-004-X6)
Lower VSL
The Responsible Entity
has implemented one or
more process(es) to
revoke the individual’s
access to the designated
storage locations for BES
Cyber System Information
but, for one individual,
did not do so by the end
of the next calendar day
following the effective
date and time of the
termination action. (5.3)
OR
The Responsible Entity
has implemented one or
more process(es) to
revoke the individual’s
user accounts upon
termination action but did
not do so for within 30
calendar days of the date
of termination action for
one or more individuals.
(5.43)
OR
The Responsible Entity
has implemented one or
Draft 3
March 2021
Moderate VSL
The Responsible
Entity has
implemented one or
more process(es) to
remove the ability
for unescorted
physical access and
Interactive Remote
Access upon a
termination action or
complete the
removal within 24
hours of the
termination action
but did not initiate
those removals for
one individual. (5.1)
OR
The Responsible
Entity has
implemented one or
more process(es) to
determine that an
individual no longer
requires retention of
access following
High VSL
The Responsible Entity
has implemented one
or more process(es) to
remove the ability for
unescorted physical
access and Interactive
Remote Access upon a
termination action or
complete the removal
within 24 hours of the
termination action but
did not initiate those
removals for two
individuals. (5.1)
OR
The Responsible Entity
has implemented one
or more process(es) to
determine that an
individual no longer
requires retention of
access following
reassignments or
transfers but, for two
individuals, did not
revoke the authorized
Severe VSL
The Responsible Entity
has not implemented
any documented
program(s) for access
revocation for electronic
access, or unescorted
physical access, or BES
Cyber System
Information storage
locations. (R5)
OR
The Responsible Entity
has implemented one or
more process(es) to
remove the ability for
unescorted physical
access and Interactive
Remote Access upon a
termination action or
complete the removal
within 24 hours of the
termination action but
did not initiate those
removals for three or
more individuals. (5.1)
OR
Page 34 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
R#
Draft 3
March 2021
Time
Horizon
VRF
Violation Severity Levels (CIP-004-X6)
Lower VSL
more process(es) to
change passwords for
shared accounts known to
the user upon termination
action, reassignment, or
transfer, but did not do so
for within 30 calendar
days of the date of
termination action,
reassignment, or transfer
for one or more
individuals. (5.45)
Moderate VSL
reassignments or
transfers but, for one
individual, did not
revoke the
authorized electronic
access to individual
accounts and
authorized
unescorted physical
access by the end of
the next calendar day
following the
predetermined date.
OR
(5.2)
The Responsible Entity
OR
has implemented one or
The Responsible
more process(es) to
Entity has
determine and document implemented one or
extenuating operating
more process(es) to
circumstances following a revoke the
termination action,
individual’s access to
reassignment, or transfer, the designated
but did not change one or storage locations for
more passwords for
BES Cyber System
shared accounts known to Information but, for
the user within 10
two individuals, did
calendar days following
not do so by the end
the end of the
of the next calendar
High VSL
electronic access to
individual accounts and
authorized unescorted
physical access by the
end of the next
calendar day following
the predetermined
date. (5.2)
OR
The Responsible Entity
has implemented one
or more process(es) to
revoke the individual’s
access to the
designated storage
locations for BES Cyber
System Information but,
for three or more
individuals, did not do
so by the end of the
next calendar day
following the effective
date and time of the
termination action.
(5.3)
Severe VSL
The Responsible Entity
has implemented one or
more process(es) to
determine that an
individual no longer
requires retention of
access following
reassignments or
transfers but, for three
or more individuals, did
not revoke the
authorized electronic
access to individual
accounts and authorized
unescorted physical
access by the end of the
next calendar day
following the
predetermined date.
(5.2)
Page 35 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
R#
R6
Time
Horizon
VRF
Same Day
Operations
and
Operations
Planning
Medium
Violation Severity Levels (CIP-004-X6)
Lower VSL
extenuating operating
circumstances. (5.54)
Moderate VSL
day following the
effective date and
time of the
termination action.
(5.3)
The Responsible Entity
has implemented one or
more program(s) as
required by Requirement
R6 Part 6.1 but, for one
individual, did not
authorize provisioned
electronic access to
electronic BCSI or
provisioned physical
access to physical BCSI.
(6.1)
The Responsible
Entity has
implemented one or
more program(s) as
required by
Requirement R6 Part
6.1 but, for two
individuals, did not
authorize
provisioned
electronic access to
electronic BCSI or
provisioned physical
access to physical
BCSI. (6.1)
OR
The Responsible Entity
performed the
verification required by
Requirement R6 Part 6.2
more than 15 calendar
months but less than or
equal to 16 calendar
months of the previous
verification. (6.2)
Draft 3
March 2021
OR
The Responsible
Entity performed the
verification required
by Requirement R6
Part 6.2 more than
16 calendar months
High VSL
The Responsible Entity
has implemented one
or more program(s) as
required by
Requirement R6 Part
6.1 but, for three
individuals, did not
authorize provisioned
electronic access to
electronic BCSI or
provisioned physical
access to physical BCSI.
(6.1)
OR
The Responsible Entity
performed the
verification required by
Requirement R6 Part
6.2 more than 17
calendar months but
less than or equal to 18
calendar months of the
Severe VSL
The Responsible Entity
did not implement one
or more documented
access management
program(s) for BCSI.
(R6)
OR
The Responsible Entity
has implemented one or
more program(s) as
required by
Requirement R6 Part 6.1
but, for four or more
individuals, did not
authorize provisioned
electronic access to
electronic BCSI or
provisioned physical
access to physical BCSI.
(6.1)
OR
Page 36 of 47
CIP-004-X6 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-X6)
Lower VSL
OR
The Responsible Entity
has implemented one or
more program(s) to
remove the individual’s
ability to use provisioned
access to BCSI but, for
one individual, did not do
so by the timeframe
required in Requirement
R6, Part 6.3.
Draft 3
March 2021
Moderate VSL
but less than or equal
to 17 calendar
months of the
previous verification.
(6.2)
OR
The Responsible
Entity has
implemented one or
more program(s) to
remove the
individual’s ability to
use provisioned
access to BCSI but,
for two individuals,
did not do so by the
timeframe required
in Requirement R6,
Part 6.3.
High VSL
previous verification.
(6.2)
OR
The Responsible Entity
has implemented one
or more program(s) to
remove the individual’s
ability to use
provisioned access to
BCSI but, for three
individuals, did not do
so by the timeframe
required in
Requirement R6, Part
6.3.
Severe VSL
The Responsible Entity
performed the
verification required by
Requirement R6 Part 6.2
more than 18 calendar
months of the previous
verification. (6.2)
OR
The Responsible Entity
has implemented one or
more program(s) to
remove the individual’s
ability to use
provisioned access to
BCSI but, for four or
more individuals, did not
do so by the timeframe
required in Requirement
R6, Part 6.3.
Page 37 of 47
Guidelines and Technical Basis
D. Regional Variances
None.
E. Interpretations
None.
F. Associated Documents
None.
Version History
Version
Date
Action
1
1/16/06
R3.2 — Change “Control Center” to
“control center.”
2
9/30/09
Modifications to clarify the
requirements and to bring the
compliance elements into conformance
with the latest guidelines for developing
compliance elements of standards.
Change Tracking
3/24/06
Removal of reasonable business
judgment.
Replaced the RRO with the RE as a
responsible entity.
Rewording of Effective Date.
Changed compliance monitor to
Compliance Enforcement Authority.
3
12/16/09
Updated Version Number from -2 to -3
In Requirement 1.6, deleted the
sentence pertaining to removing
component or system from service in
order to perform testing, in response to
FERC order issued September 30, 2009.
3
12/16/09
3
3/31/10
4
1/24/11
Draft 3
March 2021
Approved by the NERC Board of
Trustees.
Approved by FERC.
Approved by the NERC Board of
Trustees.
Page 38 of 47
Guidelines and Technical Basis
Version
Date
5
11/26/12
Adopted by the NERC Board of
Trustees.
5
11/22/13
FERC Order issued approving CIP-004-5.
5.1
9/30/13
Modified two VSLs in R4
Errata
6
11/13/14
Adopted by the NERC Board of
Trustees.
Addressed two
FERC directives
from Order No.
791 related to
identify, assess,
and correct
language and
communication
networks.
6
2/12/15
Adopted by the NERC Board of
Trustees.
Replaces the
version adopted
by the Board on
11/13/2014.
Revised version
addresses
remaining
directives from
Order No. 791
related to
transient devices
and low impact
BES Cyber
Systems.
6
1/21/16
7
TBD
FERC order issued approving CIP-004-6.
Docket No. RM15-14-000
Adopted by the NERC Board of Trustees
Draft 3
March 2021
Action
Change Tracking
Modified to
coordinate with
other CIP
standards and to
revise format to
use RBS
Template.
Revised to
enhance BES
reliability for
entities to
manage their
BCSI.
Page 39 of 47
Guidelines and Technical Basis
Guidelines and Technical Basis
Section 4 – Scope of Applicability of the CIP Cyber Security Standards
Section “4. Applicability” of the standards provides important information for Responsible
Entities to determine the scope of the applicability of the CIP Cyber Security Requirements.
Section “4.1. Functional Entities” is a list of NERC functional entities to which the standard
applies. If the entity is registered as one or more of the functional entities listed in Section
4.1, then the NERC CIP Cyber Security Standards apply. Note that there is a qualification in
Section 4.1 that restricts the applicability in the case of Distribution Providers to only those
that own certain types of systems and equipment listed in 4.2.
Section “4.2. Facilities” defines the scope of the Facilities, systems, and equipment owned by
the Responsible Entity, as qualified in Section 4.1, that is subject to the requirements of the
standard. As specified in the exemption section 4.2.3.5, this standard does not apply to
Responsible Entities that do not have High Impact or Medium Impact BES Cyber Systems
under CIP-002-5.1’s categorization. In addition to the set of BES Facilities, Control Centers,
and other systems and equipment, the list includes the set of systems and equipment owned
by Distribution Providers. While the NERC Glossary term “Facilities” already includes the BES
characteristic, the additional use of the term BES here is meant to reinforce the scope of
applicability of these Facilities where it is used, especially in this applicability scoping section.
This in effect sets the scope of Facilities, systems, and equipment that is subject to the
standards.
Requirement R1:
The security awareness program is intended to be an informational program, not a formal
training program. It should reinforce security practices to ensure that personnel maintain
awareness of best practices for both physical and electronic security to protect its BES Cyber
Systems. The Responsible Entity is not required to provide records that show that each
individual received or understood the information, but they must maintain documentation of
the program materials utilized in the form of posters, memos, and/or presentations.
Examples of possible mechanisms and evidence, when dated, which can be used are:
Direct communications (e.g., emails, memos, computer based training, etc.);
Indirect communications (e.g., posters, intranet, brochures, etc.);
Management support and reinforcement (e.g., presentations, meetings, etc.).
Requirement R2:
Draft 3
March 2021
Page 40 of 47
Guidelines and Technical Basis
Training shall cover the policies, access controls, and procedures as developed for the BES
Cyber Systems and include, at a minimum, the required items appropriate to personnel roles
and responsibilities from Table R2. The Responsible Entity has the flexibility to define the
training program and it may consist of multiple modules and multiple delivery mechanisms,
but a single training program for all individuals needing to be trained is acceptable. The
training can focus on functions, roles or responsibilities at the discretion of the Responsible
Entity.
One new element in the training content is intended to encompass networking hardware and
software and other issues of electronic interconnectivity supporting the operation and
control of BES Cyber Systems as per FERC Order No. 706, Paragraph 434. Additionally,
training should address the risk posed when connecting and using Transient Cyber Assets and
Removable Media with BES Cyber Systems or within an Electronic Security Perimeter. As
noted in FERC Order No. 791, Paragraph 135, Transient Cyber Assets and Removable Media
have been the source of incidents where malware was introduced into electric generation
industrial control systems in real-world situations. Training on their use is a key element in
protecting BES Cyber Systems. This is not intended to provide technical training to individuals
supporting networking hardware and software, but educating system users of the cyber
security risks associated with the interconnectedness of these systems. The users, based on
their function, role, or responsibility, should have a basic understanding of which systems can
be accessed from other systems and how the actions they take can affect cyber security.
Each Responsible Entity shall ensure all personnel who are granted authorized electronic
access and/or authorized unescorted physical access to its BES Cyber Systems, including
contractors and service vendors, complete cyber security training prior to their being granted
authorized access, except for CIP Exceptional Circumstances. To retain the authorized
accesses, individuals must complete the training at least one every 15 months.
Requirement R3:
Each Responsible Entity shall ensure a personnel risk assessment is performed for all
personnel who are granted authorized electronic access and/or authorized unescorted
physical access to its BES Cyber Systems, including contractors and service vendors, prior to
their being granted authorized access, except for program specified exceptional
circumstances that are approved by the single senior management official or their delegate
and impact the reliability of the BES or emergency response. Identity should be confirmed in
accordance with federal, state, provincial, and local laws, and subject to existing collective
bargaining unit agreements. Identity only needs to be confirmed prior to initially granting
access and only requires periodic confirmation according to the entity’s process during the
tenure of employment, which may or may not be the same as the initial verification action.
A seven year criminal history check should be performed for those locations where the
individual has resided for at least six consecutive months. This check should also be
performed in accordance with federal, state, provincial, and local laws, and subject to existing
collective bargaining unit agreements. When it is not possible to perform a full seven year
criminal history check, documentation must be made of what criminal history check was
performed, and the reasons a full seven-year check could not be performed. Examples of this
Draft 3
March 2021
Page 41 of 47
Guidelines and Technical Basis
could include individuals under the age of 25 where a juvenile criminal history may be
protected by law, individuals who may have resided in locations from where it is not possible
to obtain a criminal history records check, violates the law or is not allowed under the
existing collective bargaining agreement. The Responsible Entity should consider the absence
of information for the full seven years when assessing the risk of granting access during the
process to evaluate the criminal history check. There needs to be a personnel risk assessment
that has been completed within the last seven years for each individual with access. A new
criminal history records check must be performed as part of the new PRA. Individuals who
have been granted access under a previous version of these standards need a new PRA within
seven years of the date of their last PRA. The clarifications around the seven year criminal
history check in this version do not require a new PRA be performed by the implementation
date.
Requirement R4:
Authorization for electronic and unescorted physical access and access to BES Cyber System
Information must be on the basis of necessity in the individual performing a work function.
Documentation showing the authorization should have some justification of the business
need included. To ensure proper segregation of duties, access authorization and provisioning
should not be performed by the same person where possible.
This requirement specifies both quarterly reviews and reviews at least once every 15 calendar
months. Quarterly reviews are to perform a validation that only authorized users have been
granted access to BES Cyber Systems. This is achieved by comparing individuals actually
provisioned to a BES Cyber System against records of individuals authorized to the BES Cyber
System. The focus of this requirement is on the integrity of provisioning access rather than
individual accounts on all BES Cyber Assets. The list of provisioned individuals can be an
automatically generated account listing. However, in a BES Cyber System with several
account databases, the list of provisioned individuals may come from other records such as
provisioning workflow or a user account database where provisioning typically initiates.
Draft 3
March 2021
Page 42 of 47
Guidelines and Technical Basis
The privilege review at least once every 15 calendar months is more detailed to ensure an
individual’s associated privileges are the minimum necessary to perform their work function
(i.e., least privilege). Entities can more efficiently perform this review by implementing rolebased access. This involves determining the specific roles on the system (e.g., system
operator, technician, report viewer, administrator, etc.) then grouping access privileges to the
role and assigning users to the role. Role-based access does not assume any specific software
and can be implemented by defining specific provisioning processes for each role where
access group assignments cannot be performed. Role-based access permissions eliminate the
1/1
1) Quarterly access review
2) privilege review (at least once every
15 calendar months)
3) BES Cyber
System Information
review (at least once every
4/1
15 calendar months)
Quarterly access review
2/1
3/1
4/1
7/1
Quarterly access review
5/1
6/1
7/1
1/1
1) Quarterly access review
2) privilege review
(at least once every
15 calendar months)
3) BES Cyber System
Information review
(at least once every
15 calendar months)
10/1
Quarterly access review
8/1
9/1
10/1
11/1
12/1
1/1
1/1
need to perform the privilege review on individual accounts. An example timeline of all the
reviews in Requirement R4 is included below.
Separation of duties should be considered when performing the reviews in Requirement R4.
The person reviewing should be different than the person provisioning access.
If the results of quarterly or at least once every 15 calendar months account reviews indicate
an administrative or clerical error in which access was not actually provisioned, then the SDT
intends that this error should not be considered a violation of this requirement.
For BES Cyber Systems that do not have user accounts defined, the controls listed in
Requirement R4 are not applicable. However, the Responsible Entity should document such
configurations.
Requirement R5:
The requirement to revoke access at the time of the termination action includes procedures
showing revocation of access concurrent with the termination action. This requirement
recognizes that the timing of the termination action may vary depending on the
circumstance. Some common scenarios and possible processes on when the termination
action occurs are provided in the following table. These scenarios are not an exhaustive list of
all scenarios, but are representative of several routine business practices.
Draft 3
March 2021
Page 43 of 47
Guidelines and Technical Basis
Scenario
Possible Process
Immediate involuntary
termination
Human resources or corporate security escorts the
individual off site and the supervisor or human resources
personnel notify the appropriate personnel to begin the
revocation process.
Scheduled involuntary
termination
Human resources personnel are notified of the termination
and work with appropriate personnel to schedule the
revocation of access at the time of termination.
Voluntary termination
Human resources personnel are notified of the termination
and work with appropriate personnel to schedule the
revocation of access at the time of termination.
Retirement where the last
working day is several weeks
prior to the termination date
Human resources personnel coordinate with manager to
determine the final date access is no longer needed and
schedule the revocation of access on the determined day.
Death
Human resources personnel are notified of the death and
work with appropriate personnel to begin the revocation
process.
Revocation of electronic access should be understood to mean a process with the end result
that electronic access to BES Cyber Systems is no longer possible using credentials assigned to
or known by the individual(s) whose access privileges are being revoked. Steps taken to
accomplish this outcome may include deletion or deactivation of accounts used by the
individual(s), but no specific actions are prescribed. Entities should consider the ramifications
of deleting an account may include incomplete event log entries due to an unrecognized
account or system services using the account to log on.
The initial revocation required in Requirement R5.1 includes unescorted physical access and
Interactive Remote Access. These two actions should prevent any further access by the
individual after termination. If an individual still has local access accounts (i.e., accounts on
the Cyber Asset itself) on BES Cyber Assets, then the Responsible Entity has 30 days to
complete the revocation process for those accounts. However, nothing prevents a
Responsible Entity from performing all of the access revocation at the time of termination.
For transferred or reassigned individuals, a review of access privileges should be performed.
This review could entail a simple listing of all authorizations for an individual and working
with the respective managers to determine which access will still be needed in the new
position. For instances in which the individual still needs to retain access as part of a
transitory period, the entity should schedule a time to review these access privileges or
include the privileges in the quarterly account review or annual privilege review.
Draft 3
March 2021
Page 44 of 47
Guidelines and Technical Basis
Revocation of access to shared accounts is called out separately to prevent the situation
where passwords on substation and generation devices are constantly changed due to staff
turnover.
Requirement 5.5 specified that passwords for shared account are to the changed within 30
calendar days of the termination action or when the Responsible Entity determines an
individual no longer requires access to the account as a result of a reassignment or transfer.
The 30 days applies under normal operating conditions. However, circumstances may occur
where this is not possible. Some systems may require an outage or reboot of the system in
order to complete the password change. In periods of extreme heat or cold, many
Responsible Entities may prohibit system outages and reboots in order to maintain reliability
of the BES. When these circumstances occur, the Responsible Entity must document these
circumstances and prepare to change the password within 10 calendar days following the end
of the operating circumstances. Records of activities must be retained to show that the
Responsible Entity followed the plan they created.
Rationale:
During development of this standard, text boxes were embedded within the standard to
explain the rationale for various parts of the standard. Upon BOT approval, the text from the
rationale text boxes was moved to this section.
Rationale for Requirement R1:
Ensures that Responsible Entities with personnel who have authorized electronic or
authorized unescorted physical access to BES Cyber Assets take action so that those
personnel with such authorized electronic or authorized unescorted physical access maintain
awareness of the Responsible Entity’s security practices.
Rationale for Requirement R2:
To ensure that the Responsible Entity’s training program for personnel who need authorized
electronic access and/or authorized unescorted physical access to BES Cyber Systems covers
the proper policies, access controls, and procedures to protect BES Cyber Systems and are
trained before access is authorized.
Rationale for Requirement R3:
To ensure that individuals who need authorized electronic or authorized unescorted physical
access to BES Cyber Systems have been assessed for risk. Whether initial access or
maintaining access, those with access must have had a personnel risk assessment completed
within the last 7 years.
Rationale for Requirement R4:
Draft 3
March 2021
Page 45 of 47
Guidelines and Technical Basis
To ensure that individuals with access to BES Cyber Systems and the physical and electronic
locations where BES Cyber System Information is stored by the Responsible Entity have been
properly authorized for such access. “Authorization” should be considered to be a grant of
permission by a person or persons empowered by the Responsible Entity to perform such
grants and included in the delegations referenced in CIP-003-6. “Provisioning” should be
considered the actions to provide access to an individual.
Access is physical, logical, and remote permissions granted to Cyber Assets composing the
BES Cyber System or allowing access to the BES Cyber System. When granting, reviewing, or
revoking access, the Responsible Entity must address the Cyber Asset specifically as well as
the systems used to enable such access (i.e., physical access control system, remote access
system, directory services).
CIP Exceptional Circumstances are defined in a Responsible Entity’s policy from CIP-003-6 and
allow an exception to the requirement for authorization to BES Cyber Systems and BES Cyber
System Information.
Quarterly reviews in Part 4.5 are to perform a validation that only authorized users have been
granted access to BES Cyber Systems. This is achieved by comparing individuals actually
provisioned to a BES Cyber System against records of individuals authorized to access the BES
Cyber System. The focus of this requirement is on the integrity of provisioning access rather
than individual accounts on all BES Cyber Assets. The list of provisioned individuals can be an
automatically generated account listing. However, in a BES Cyber System with several
account databases, the list of provisioned individuals may come from other records such as
provisioning workflow or a user account database where provisioning typically initiates.
If the results of quarterly or annual account reviews indicate an administrative or clerical
error in which access was not actually provisioned, then the SDT intends that the error should
not be considered a violation of this requirement.
For BES Cyber Systems that do not have user accounts defined, the controls listed in
Requirement R4 are not applicable. However, the Responsible Entity should document such
configurations.
Rationale for Requirement R5:
The timely revocation of electronic access to BES Cyber Systems is an essential element of an
access management regime. When an individual no longer requires access to a BES Cyber
System to perform his or her assigned functions, that access should be revoked. This is of
particular importance in situations where a change of assignment or employment is
involuntary, as there is a risk the individual(s) involved will react in a hostile or destructive
manner.
In considering how to address directives in FERC Order No. 706 directing “immediate”
revocation of access for involuntary separation, the SDT chose not to specify hourly time
parameters in the requirement (e.g., revoking access within 1 hour). The point in time at
which an organization terminates a person cannot generally be determined down to the
Draft 3
March 2021
Page 46 of 47
Guidelines and Technical Basis
hour. However, most organizations have formal termination processes, and the timeliest
revocation of access occurs in concurrence with the initial processes of termination.
Access is physical, logical, and remote permissions granted to Cyber Assets composing the
BES Cyber System or allowing access to the BES Cyber System. When granting, reviewing, or
revoking access, the Responsible Entity must address the Cyber Asset specifically as well as
the systems used to enable such access (e.g., physical access control system, remote access
system, directory services).
Draft 3
March 2021
Page 47 of 47
CIP-011-X — Cyber Security — Information Protection
Standard Development Timeline
This section is maintained by the drafting team during the development of the standard and will
be removed when the standard is adopted by the NERC Board of Trustees (Board).
Description of Current Draft
Completed Actions
Standards Committee approved Standard Authorization Request
(SAR) for posting
SAR posted for comment
Date
March 22, 2019
March 28, 2019 –
April 26, 2019
45-day formal comment period with ballot
December 20, 2019
– February 3, 2020
45-day formal comment period with ballot
August 6–
September 21, 2020
45-day formal comment period with ballot
March 25 – May 10,
2021
Anticipated Actions
10-day final ballot
Board adoption
Draft 3
March 2021
Date
May 2021
November 2021
Page 1 of 15
CIP-011-X — Cyber Security — Information Protection
A. Introduction
1.
Title:
Cyber Security — Information Protection
2.
Number:
CIP-011-X
3.
Purpose: To prevent unauthorized access to BES Cyber System Information (BCSI)
by specifying information protection requirements in support of protecting BES Cyber
Systems against compromise that could lead to misoperation or instability in the Bulk
Electric System (BES).
4.
Applicability:
4.1. Functional Entities: For the purpose of the requirements contained herein, the
following list of functional entities will be collectively referred to as “Responsible
Entities.” For requirements in this standard where a specific functional entity or
subset of functional entities are the applicable entity or entities, the functional entity
or entities are specified explicitly.
4.1.1 Balancing Authority
4.1.2 Distribution Provider that owns one or more of the following Facilities, systems,
and equipment for the protection or restoration of the BES:
4.1.2.1 Each underfrequency Load shedding (UFLS) or undervoltage Load shedding
(UVLS) system that:
4.1.2.1.1 is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.1.2.1.2 performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation,
of 300 MW or more.
4.1.2.2 Each Remedial Action Scheme (RAS) where the RAS is subject to one or
more requirements in a NERC or Regional Reliability Standard.
4.1.2.3 Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.1.2.4 Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.1.3 Generator Operator
4.1.4 Generator Owner
4.1.5 Reliability Coordinator
4.1.6 Transmission Operator
Draft 3
March 2021
Page 2 of 15
CIP-011-X — Cyber Security — Information Protection
4.1.7 Transmission Owner
4.2.
Facilities: For the purpose of the requirements contained herein, the following
Facilities, systems, and equipment owned by each Responsible Entity in 4.1 above
are those to which these requirements are applicable. For requirements in this
standard where a specific type of Facilities, system, or equipment or subset of
Facilities, systems, and equipment are applicable, these are specified explicitly.
4.2.1 Distribution Provider: One or more of the following Facilities, systems and
equipment owned by the Distribution Provider for the protection or restoration
of the BES:
4.2.1.1 Each UFLS or UVLS System that:
4.2.1.1.1 is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.2.1.1.2 performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation,
of 300 MW or more.
4.2.1.2 Each RAS where the RAS is subject to one or more requirements in a NERC
or Regional Reliability Standard.
4.2.1.3 Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.2.1.4 Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.2.2 Responsible Entities listed in 4.1 other than Distribution Providers:
All BES Facilities.
4.2.3 Exemptions: The following are exempt from Standard CIP-011-X:
4.2.3.1 Cyber Assets at Facilities regulated by the Canadian Nuclear Safety
Commission.
4.2.3.2 Cyber Assets associated with communication networks and data
communication links between discrete Electronic Security Perimeters.
4.2.3.3 The systems, structures, and components that are regulated by the Nuclear
Regulatory Commission under a cyber security plan pursuant to 10 C.F.R.
Section 73.54.
4.2.3.4 For Distribution Providers, the systems and equipment that are not included
in section 4.2.1 above.
Draft 3
March 2021
Page 3 of 15
CIP-011-X — Cyber Security — Information Protection
4.2.3.5 Responsible Entities that identify that they have no BES Cyber Systems
categorized as high impact or medium impact according to the CIP-002-5.1a
identification and categorization processes.
5.
Effective Dates: See Implementation Plan for CIP-011-X.
6.
Background:
Standard CIP-011 exists as part of a suite of CIP Standards related to cyber security,
which require the initial identification and categorization of BES Cyber Systems and
require a minimum level of organizational, operational, and procedural controls to
mitigate risk to BES Cyber Systems.
Most requirements open with, “Each Responsible Entity shall implement one or more
documented [processes, plan, etc.] that include the applicable items in [Table
Reference].” The referenced table requires the applicable items in the procedures for
the requirement’s common subject matter.
The term documented processes refers to a set of required instructions specific to the
Responsible Entity and to achieve a specific outcome. This term does not imply any
particular naming or approval structure beyond what is stated in the requirements.
An entity should include as much as it believes necessary in its documented processes,
but it must address the applicable requirements in the table.
The terms program and plan are sometimes used in place of documented processes
where it makes sense and is commonly understood. For example, documented
processes describing a response are typically referred to as plans (i.e., incident
response plans and recovery plans). Likewise, a security plan can describe an
approach involving multiple procedures to address a broad subject matter.
Similarly, the term program may refer to the organization’s overall implementation of
its policies, plans and procedures involving a subject matter. Examples in the
standards include the personnel risk assessment program and the personnel training
program. The full implementation of the CIP Cyber Security Standards could also be
referred to as a program. However, the terms program and plan do not imply any
additional requirements beyond what is stated in the standards.
Responsible Entities can implement common controls that meet requirements for
multiple high and medium impact BES Cyber Systems. For example, a single training
program could meet the requirements for training personnel across multiple BES
Cyber Systems.
Measures for the initial requirement are simply the documented processes
themselves. Measures in the table rows provide examples of evidence to show
documentation and implementation of applicable items in the documented processes.
These measures serve to provide guidance to entities in acceptable records of
compliance and should not be viewed as an all-inclusive list.
Draft 3
March 2021
Page 4 of 15
CIP-011-X — Cyber Security — Information Protection
Throughout the standards, unless otherwise stated, bulleted items in the
requirements and measures are items that are linked with an “or,” and numbered
items are items that are linked with an “and.”
Many references in the Applicability section use a threshold of 300 MW for UFLS and
UVLS. This particular threshold of 300 MW for UVLS and UFLS was provided in Version
1 of the CIP Cyber Security Standards. The threshold remains at 300 MW since it is
specifically addressing UVLS and UFLS, which are last ditch efforts to save the BES. A
review of UFLS tolerances defined within regional reliability standards for UFLS
program requirements to date indicates that the historical value of 300 MW
represents an adequate and reasonable threshold value for allowable UFLS
operational tolerances.
“Applicable Systems” Columns in Tables:
Each table has an “Applicable Systems” column to further define the scope of systems
to which a specific requirement row applies. The CSO706 SDT adapted this concept
from the National Institute of Standards and Technology (“NIST”) Risk Management
Framework as a way of applying requirements more appropriately based on impact
and connectivity characteristics. The following conventions are used in the
“Applicable Systems” column as described.
Draft 3
March 2021
•
High Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as
high impact according to the CIP-002-5.1a identification and categorization
processes.
•
Medium Impact BES Cyber Systems – Applies to BES Cyber Systems categorized
as medium impact according to the CIP-002-5.1a identification and
categorization processes.
•
Electronic Access Control or Monitoring Systems (EACMS) – Applies to each
Electronic Access Control or Monitoring System associated with a referenced
high impact BES Cyber System or medium impact BES Cyber System. Examples
may include, but are not limited to, firewalls, authentication servers, and log
monitoring and alerting systems.
•
Physical Access Control Systems (PACS) – Applies to each Physical Access
Control System associated with a referenced high impact BES Cyber System or
medium impact BES Cyber System with External Routable Connectivity.
•
Protected Cyber Assets (PCA) – Applies to each Protected Cyber Asset
associated with a referenced high impact BES Cyber System or medium impact
BES Cyber System.
Page 5 of 15
CIP-011-X — Cyber Security — Information Protection
B. Requirements and Measures
R1. Each Responsible Entity shall implement one or more documented information protection program(s) for BES Cyber System
Information (BCSI) pertaining to “Applicable Systems” identified in CIP-011-X Table R1 – Information Protection Program
that collectively includes each of the applicable requirement parts in CIP-011-X Table R1 – Information Protection Program.
[Violation Risk Factor: Medium] [Time Horizon: Operations Planning].
M1. Evidence for the information protection program must include the applicable requirement parts in CIP-011-X Table R1 –
Information Protection Program and additional evidence to demonstrate implementation as described in the Measures
column of the table.
Draft 3
March 2021
Page 6 of 15
CIP-011-X — Cyber Security — Information Protection
CIP-011-X Table R1 – Information Protection Program
Part
1.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
Requirements
Method(s) to identify BCSI.
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
and their associated:
Measures
Examples of acceptable evidence may
include, but are not limited to, the
following:
•
Documented method(s) to identify
BCSI from the entity’s information
protection program; or
•
Indications on information (e.g.,
labels or classification) that identify
BCSI as designated in the entity’s
information protection program; or
•
Training materials that provide
personnel with sufficient
knowledge to identify BCSI; or
•
Storage locations identified for
housing BCSI in the entity’s
information protection program.
1. EACMS; and
2. PACS
1.2
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
and their associated:
Draft 3
March 2021
Method(s) to protect and securely
handle BCSI to mitigate risks of
compromising confidentiality.
Examples of evidence for on-premise
BCSI may include, but are not limited
to, the following:
•
Procedures for protecting and
securely handling, which
include topics such as storage,
security during transit, and use
of BCSI; or
Page 7 of 15
CIP-011-X — Cyber Security — Information Protection
CIP-011-X Table R1 – Information Protection Program
Part
Applicable Systems
1. EACMS; and
Requirements
Measures
•
2. PACS
Records indicating that BCSI is
handled in a manner consistent
with the entity’s documented
procedure(s).
Examples of evidence for off-premise
BCSI may include, but are not limited
to, the following:
Draft 3
March 2021
•
Implementation of electronic
technical method(s) to protect
electronic BCSI (e.g., data
masking, encryption, hashing,
tokenization, cipher, electronic
key management); or
•
Implementation of physical
technical method(s) to protect
physical BCSI (e.g., physical lock
and key management, physical
badge management,
biometrics, alarm system); or
•
Implementation of
administrative method(s) to
protect BCSI (e.g., vendor
service risk assessments,
business agreements).
Page 8 of 15
CIP-011-X — Cyber Security — Information Protection
R2.
Each Responsible Entity shall implement one or more documented process(es) that collectively include the applicable
requirement parts in CIP-011-X Table R2 – BES Cyber Asset Reuse and Disposal. [Violation Risk Factor: Lower] [Time Horizon:
Operations Planning].
M2. Evidence must include each of the applicable documented processes that collectively include each of the applicable
requirement parts in CIP-011-X Table R2 – BES Cyber Asset Reuse and Disposal and additional evidence to demonstrate
implementation as described in the Measures column of the table.
CIP-011-X Table R2 – BES Cyber Asset Reuse and Disposal
Part
2.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS;
2. PACS; and
3. PCA
Medium Impact BES Cyber Systems
and their associated:
1. EACMS;
2. PACS; and
3. PCA
Draft 3
March 2021
Requirements
Measures
Prior to the release for reuse of
applicable Cyber Assets that contain
BCSI (except for reuse within other
systems identified in the “Applicable
Systems” column), the Responsible
Entity shall take action to prevent the
unauthorized retrieval of BCSI from
the Cyber Asset data storage media.
Examples of acceptable evidence may
include, but are not limited to, the
following:
•
Records tracking sanitization
actions taken to prevent
unauthorized retrieval of BCSI
such as clearing, purging, or
destroying; or
•
Records tracking actions such as
encrypting, retaining in the
Physical Security Perimeter or
other methods used to prevent
unauthorized retrieval of BCSI.
Page 9 of 15
CIP-011-X — Cyber Security — Information Protection
CIP-011-X Table R2 – BES Cyber Asset Reuse and Disposal
Part
2.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS;
2. PACS; and
3. PCA
Medium Impact BES Cyber Systems
and their associated:
1. EACMS;
2. PACS; and
3. PCA
Draft 3
March 2021
Requirements
Prior to the disposal of applicable
Cyber Assets that contain BCSI, the
Responsible Entity shall take action to
prevent the unauthorized retrieval of
BCSI from the Cyber Asset or destroy
the data storage media.
Measures
Examples of acceptable evidence may
include, but are not limited to, the
following:
•
Records that indicate that
data storage media was
destroyed prior to the
disposal of an applicable
Cyber Asset; or
•
Records of actions taken to
prevent unauthorized
retrieval of BCSI prior to the
disposal of an applicable
Cyber Asset.
Page 10 of 15
CIP-011-X — Cyber Security — Information Protection
B. Compliance
1.
Compliance Monitoring Process:
1.1. Compliance Enforcement Authority: “Compliance Enforcement Authority” (CEA) means NERC
or the Regional Entity, or any entity as otherwise designated by an Applicable Governmental
Authority, in their respective roles of monitoring and/or enforcing compliance with mandatory
and enforceable Reliability Standards in their respective jurisdictions.
1.2. Evidence Retention: The following evidence retention period(s) identify the period of time an
entity is required to retain specific evidence to demonstrate compliance. For instances where
the evidence retention period specified below is shorter than the time since the last audit, the
CEA may ask an entity to provide other evidence to show that it was compliant for the full time
period since the last audit.
The applicable entity shall keep data or evidence to show compliance as identified below unless
directed by its CEA to retain specific evidence for a longer period of time as part of an
investigation:
•
The applicable entity shall retain evidence of each requirement in this standard for three
calendar years.
•
If an applicable entity is found non-compliant, it shall keep information related to the noncompliance until mitigation is complete and approved or for the time specified above,
whichever is longer.
•
The CEA shall keep the last audit records and all requested and submitted subsequent audit
records.
1.3. Compliance Monitoring and Enforcement Program: As defined in the NERC Rules of Procedure,
“Compliance Monitoring and Enforcement Program” refers to the identification of the
processes that will be used to evaluate data or information for the purpose of assessing
performance or outcomes with the associated Reliability Standard.
Draft 3
March 2021
Page 11 of 15
CIP-011-X — Cyber Security — Information Protection
Violation Severity Levels
R#
R1
Time
Horizon
VRF
Operations
Planning
Medium
Violation Severity Levels (CIP-011-X)
Lower VSL
N/A
Moderate VSL
N/A
High VSL
The Responsible Entity
documented, but did
not, implement one or
more BCSI protection
program(s). (R1)
OR
The Responsible Entity
documented but did
not implement at least
one method to identify
BCSI. (1.1)
Severe VSL
The Responsible
Entity neither
documented nor
implemented one or
more BCSI
protection
program(s). (R1)
OR
The Responsible Entity
documented but did
not implement at least
one method to protect
and securely handle
BCSI. (1.2)
R2
Operations
Planning
Draft 3
March 2021
Lower
N/A
The Responsible
Entity implemented
one or more
documented
processes but did not
The Responsible Entity
implemented one or
more documented
processes but did not
include disposal or
The Responsible
Entity has not
documented or
implemented any
processes for
Draft 2
Page 12 of 15
CIP-011-X — Cyber Security — Information Protection
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-011-X)
Lower VSL
Moderate VSL
include processes for
reuse as to prevent
the unauthorized
retrieval of BCSI from
the BES Cyber Asset.
(2.1)
Draft 3
March 2021
High VSL
media destruction
processes to prevent
the unauthorized
retrieval of BCSI from
the BES Cyber Asset.
(2.2)
Severe VSL
applicable
requirement parts
in CIP-011-X Table
R3 – BES Cyber
Asset Reuse and
Disposal. (R2)
Draft 2
Page 13 of 15
CIP-011-X — Cyber Security — Information Protection
C. Regional Variances
None.
D. Interpretations
None.
E. Associated Documents
Version History
Version
Date
1
11/26/12
Adopted by the NERC Board of
Trustees.
1
11/22/13
2
11/13/14
FERC Order issued approving CIP011-1. (Order becomes effective
on 2/3/14.)
Adopted by the NERC Board of
Trustees.
2
2/12/15
Adopted by the NERC Board of
Trustees.
2
1/21/16
FERC Order issued approving CIP011-2. Docket No. RM15-14-000
Draft 3
March 2021
Action
Change Tracking
Developed to define
the information
protection
requirements in
coordination with other
CIP standards and to
address the balance of
the FERC directives in
its Order 706.
Addressed two FERC
directives from Order
No. 791 related to
identify, assess, and
correct language and
communication
networks.
Replaces the version
adopted by the Board
on 11/13/2014. Revised
version addresses
remaining directives
from Order No. 791
related to transient
devices and low impact
BES Cyber Systems.
Page 14 of 15
CIP-011-X — Cyber Security — Information Protection
3
Draft 3
March 2021
TBD
Adopted by the NERC Board of
Trustees
Revised to enhance BES
reliability for entities to
manage their BCSI.
Page 15 of 15
CIP-011-X3 — Cyber Security — Information Protection
Standard Development Timeline
This section is maintained by the drafting team during the development of the standard and will
be removed when the standard is adopted by the NERC Board of Trustees (Board).
Description of Current Draft
Completed Actions
Standards Committee approved Standard Authorization Request
(SAR) for posting
SAR posted for comment
Date
March 22, 2019
March 28, 2019 –
April 26, 2019
45-day formal comment period with ballot
December 20, 2019
– February 3, 2020
45-day formal comment period with ballot
August 6–
September 21, 2020
45-day formal comment period with ballot
March 25 – May 10,
2021
Anticipated Actions
45-day formal or informal comment period with ballot
Date
August 2020
10-day final ballot
September May
20210
Board adoption
November 20210
Draft 32
August March 20210
Page 1 of 18
CIP-011-X3 — Cyber Security — Information Protection
A. Introduction
1.
Title:
Cyber Security — Information Protection
2.
Number:
CIP-011-X3
3.
Purpose: To prevent unauthorized access to BES Cyber System Information (BCSI)
by specifying information protection requirements in support of protecting BES Cyber
Systems against compromise that could lead to misoperation or instability in the Bulk
Electric System (BES).
4.
Applicability:
4.1. Functional Entities: For the purpose of the requirements contained herein, the
following list of functional entities will be collectively referred to as “Responsible
Entities.” For requirements in this standard where a specific functional entity or
subset of functional entities are the applicable entity or entities, the functional entity
or entities are specified explicitly.
4.1.1 Balancing Authority
4.1.2 Distribution Provider that owns one or more of the following Facilities, systems,
and equipment for the protection or restoration of the BES:
4.1.2.1 Each underfrequency Load shedding (UFLS) or undervoltage Load shedding
(UVLS) system that:
4.1.2.1.1 is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.1.2.1.2 performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation,
of 300 MW or more.
4.1.2.2 Each Remedial Action Scheme (RAS) where the RAS is subject to one or
more requirements in a NERC or Regional Reliability Standard.
4.1.2.3 Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.1.2.4 Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.1.3 Generator Operator
4.1.4 Generator Owner
4.1.5 Reliability Coordinator
4.1.6 Transmission Operator
Draft 32
August March 20210
Page 2 of 18
CIP-011-X3 — Cyber Security — Information Protection
4.1.7 Transmission Owner
4.2.
Facilities: For the purpose of the requirements contained herein, the following
Facilities, systems, and equipment owned by each Responsible Entity in 4.1 above
are those to which these requirements are applicable. For requirements in this
standard where a specific type of Facilities, system, or equipment or subset of
Facilities, systems, and equipment are applicable, these are specified explicitly.
4.2.1 Distribution Provider: One or more of the following Facilities, systems and
equipment owned by the Distribution Provider for the protection or restoration
of the BES:
4.2.1.1 Each UFLS or UVLS System that:
4.2.1.1.1 is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.2.1.1.2 performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation,
of 300 MW or more.
4.2.1.2 Each RAS where the RAS is subject to one or more requirements in a NERC
or Regional Reliability Standard.
4.2.1.3 Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.2.1.4 Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.2.2 Responsible Entities listed in 4.1 other than Distribution Providers:
All BES Facilities.
4.2.3 Exemptions: The following are exempt from Standard CIP-011-X3:
4.2.3.1 Cyber Assets at Facilities regulated by the Canadian Nuclear Safety
Commission.
4.2.3.2 Cyber Assets associated with communication networks and data
communication links between discrete Electronic Security Perimeters.
4.2.3.3 The systems, structures, and components that are regulated by the Nuclear
Regulatory Commission under a cyber security plan pursuant to 10 C.F.R.
Section 73.54.
4.2.3.4 For Distribution Providers, the systems and equipment that are not included
in section 4.2.1 above.
Draft 32
August March 20210
Page 3 of 18
CIP-011-X3 — Cyber Security — Information Protection
4.2.3.5 Responsible Entities that identify that they have no BES Cyber Systems
categorized as high impact or medium impact according to the CIP-002-5.1a
identification and categorization processes.
5.
Effective Dates: See Implementation Plan for CIP-011-X3.
6.
Background:
Standard CIP-011 exists as part of a suite of CIP Standards related to cyber security,
which require the initial identification and categorization of BES Cyber Systems and
require a minimum level of organizational, operational, and procedural controls to
mitigate risk to BES Cyber Systems.
Most requirements open with, “Each Responsible Entity shall implement one or more
documented [processes, plan, etc.] that include the applicable items in [Table
Reference].” The referenced table requires the applicable items in the procedures for
the requirement’s common subject matter.
The term documented processes refers to a set of required instructions specific to the
Responsible Entity and to achieve a specific outcome. This term does not imply any
particular naming or approval structure beyond what is stated in the requirements.
An entity should include as much as it believes necessary in its documented processes,
but it must address the applicable requirements in the table.
The terms program and plan are sometimes used in place of documented processes
where it makes sense and is commonly understood. For example, documented
processes describing a response are typically referred to as plans (i.e., incident
response plans and recovery plans). Likewise, a security plan can describe an
approach involving multiple procedures to address a broad subject matter.
Similarly, the term program may refer to the organization’s overall implementation of
its policies, plans and procedures involving a subject matter. Examples in the
standards include the personnel risk assessment program and the personnel training
program. The full implementation of the CIP Cyber Security Standards could also be
referred to as a program. However, the terms program and plan do not imply any
additional requirements beyond what is stated in the standards.
Responsible Entities can implement common controls that meet requirements for
multiple high and medium impact BES Cyber Systems. For example, a single training
program could meet the requirements for training personnel across multiple BES
Cyber Systems.
Measures for the initial requirement are simply the documented processes
themselves. Measures in the table rows provide examples of evidence to show
documentation and implementation of applicable items in the documented processes.
These measures serve to provide guidance to entities in acceptable records of
compliance and should not be viewed as an all-inclusive list.
Draft 32
August March 20210
Page 4 of 18
CIP-011-X3 — Cyber Security — Information Protection
Throughout the standards, unless otherwise stated, bulleted items in the
requirements and measures are items that are linked with an “or,” and numbered
items are items that are linked with an “and.”
Many references in the Applicability section use a threshold of 300 MW for UFLS and
UVLS. This particular threshold of 300 MW for UVLS and UFLS was provided in Version
1 of the CIP Cyber Security Standards. The threshold remains at 300 MW since it is
specifically addressing UVLS and UFLS, which are last ditch efforts to save the BES. A
review of UFLS tolerances defined within regional reliability standards for UFLS
program requirements to date indicates that the historical value of 300 MW
represents an adequate and reasonable threshold value for allowable UFLS
operational tolerances.
“Applicable Systems” and “Applicability” Columns in Tables:
Each table has an “Applicable Systems” or “Applicability” column. The “Applicable
Systems” column to further defines the scope of systems to which a specific
requirement row applies. The CSO706 SDT adapted this concept from the National
Institute of Standards and Technology (“NIST”) Risk Management Framework as a way
of applying requirements more appropriately based on impact and connectivity
characteristics. The following conventions are used in the “Applicable Systems”
column as described.
•
High Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as
high impact according to the CIP-002-5.1a identification and categorization
processes.
•
Medium Impact BES Cyber Systems – Applies to BES Cyber Systems categorized
as medium impact according to the CIP-002-5.1a identification and
categorization processes.
•
Electronic Access Control or Monitoring Systems (EACMS) – Applies to each
Electronic Access Control or Monitoring System associated with a referenced
high impact BES Cyber System or medium impact BES Cyber System. Examples
may include, but are not limited to, firewalls, authentication servers, and log
monitoring and alerting systems.
•
Physical Access Control Systems (PACS) – Applies to each Physical Access
Control System associated with a referenced high impact BES Cyber System or
medium impact BES Cyber System with External Routable Connectivity.
•
Protected Cyber Assets (PCA) – Applies to each Protected Cyber Asset
associated with a referenced high impact BES Cyber System or medium impact
BES Cyber System.
Draft 32
August March 20210
Page 5 of 18
CIP-011-X3 — Cyber Security — Information Protection
B. Requirements and Measures
R1. Each Responsible Entity shall implement one or more documented information protection program(s) for BES Cyber System
Information (BCSI) pertaining to “Applicable Systems” identified in CIP-011-X Table R1 – Information Protection Program
that collectively includes each of the applicable requirement parts in CIP-011-X3 Table R1 – Information Protection
Program. [Violation Risk Factor: Medium] [Time Horizon: Operations Planning].
M1. Evidence for the information protection program must include the applicable requirement parts in CIP-011-X3 Table R1 –
Information Protection Program and additional evidence to demonstrate implementation as described in the Measures
column of the table.
Draft 32
August March 20210
Page 6 of 18
CIP-011-X3 — Cyber Security — Information Protection
CIP-011-X3 Table R1 – Information Protection Program
Part
1.1
Applicable Systemsility
BCSI pertaining to:
Requirements
Method(s) to identify BCSI.
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
Measures
Examples of acceptable evidence may
include, but are not limited to, the
following:
•
Documented method(s) to identify
BCSI from the entity’s information
protection program; or
•
Indications on information (e.g.,
labels or classification) that identify
BCSI as designated in the entity’s
information protection program; or
•
Training materials that provide
personnel with sufficient
knowledge to identify BCSI; or
•
Storage locations identified for
housing BCSI in the entity’s
information protection program.
2. PACS
Medium Impact BES Cyber Systems
and their associated:
1. EACMS; and
2. PACS
1.2
BCSI as identified in Part 1.1High
Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
and their associated:
Draft 32
August March 20210
Method(s) to protect and securely
handle BCSI to mitigate risks of
compromising confidentiality.
Examples of acceptable evidence for
on-premise BCSI may include, but are
not limited to, the following:
•
Procedures for protecting and
securely handling BCSI, which
include topics such as storage,
security during transit, and use;
or
Page 7 of 18
CIP-011-X3 — Cyber Security — Information Protection
1. EACMS; and
•
2. PACS
Records indicating that BCSI is
handled in a manner consistent
with the entity’s documented
procedure(s).
Examples of evidence for off-premise
BCSI may include, but are not limited
to, the following:
•
Implementation of electronic
technical method(s) to protect
electronic BCSI (e.g., data
masking, encryption, hashing,
tokenization, cipher, electronic
key management); or
•
Implementation of physical
technical method(s) to protect
physical BCSI (e.g., physical lock
and key management, physical
badge management,
biometrics, alarm system); or
•
Implementation of
administrative method(s) to
protect BCSI (e.g., vendor
service risk assessments,
business agreements).
Evidence of methods used to
protect and securely handle
BCSI during its lifecycle,
including:
Electronic mechanisms,
Physical mechanisms,
•
•
•
Draft 32
August March 20210
Page 8 of 18
CIP-011-X3 — Cyber Security — Information Protection
CIP-011-X3 Table R1 – Information Protection Program
Part
Applicable Systemsility
Requirements
Measures
•
•
Draft 32
August March 20210
Technical mechanisms, or
Administrative mechanisms
Page 9 of 18
CIP-011-X3 — Cyber Security — Information Protection
CIP-011-X3 Table R1 – Information Protection Program
Part
1.3
Applicability
BCSI as identified in Part 1.1
Requirement
When the Responsible Entity engages
vendor services to store, utilize, or
analyze BCSI, implement risk
identification and assessment
method(s) for the following:
1.3.1 Data governance and rights
management; and
1.3.2 Identity and access
management; and
Measure
Examples of acceptable evidence may
include, but are not limited to, dated
documentation of the following:
•
Implementation of the risk
identification and assessment
method(s) (1.3);
•
Vendor certification(s) or
Registered Entity verification of
vendor controls implemented
from the under-layer to the
service provider, including
application, infrastructure, and
network security controls as
well as physical access controls
(1.3.2, 1.3.3, 1.3.4);
•
Business agreements that
include communication
expectations and protocols for
disclosures of known
vulnerabilities, access
breaches, incident response,
transparency regarding
licensing, data ownership, and
metadata (1.3.1);
•
Consideration made for data
sovereignty, if any (1.3.1);
1.3.3 Security management; and
1.3.4 Application, infrastructure,
and network security.
Draft 32
August March 20210
Page 10 of 18
CIP-011-X3 — Cyber Security — Information Protection
1.4
BCSI as identified in Part 1.1
Draft 32
August March 20210
When the Responsible Entity engages
vendor services to store, utilize, or
analyze BCSI, implement one or more
documented electronic technical
mechanisms to protect BCSI.
•
Considerations used to assess
conversion of data from one
form to another and how
information is protected from
creation to disposal (1.3.1,
1.3.3);
•
Dated documentation of
vendor’s identity and access
management program (1.3.2);
and
•
Physical and electronic security
management documentation,
(e.g., plans, diagrams) (1.3.3).
Examples of evidence may include, but
are not limited to, dated
documentation of the following:
•
Description of the electronic
technical mechanism(s) (e.g., data
masking, encryption, hashing,
tokenization, cypher, electronic key
management method[s]);
•
Evidence of implementation (e.g.,
configuration files, command
output, architecture documents);
and
•
Technical mechanism(s) for the
separation of duties,
demonstrating that entity’s
control(s) cannot be subverted by
the custodial vendor.
Page 11 of 18
CIP-011-X3 — Cyber Security — Information Protection
R2.
Each Responsible Entity shall implement one or more documented process(es) that collectively include the applicable
requirement parts in CIP-011-X3 Table R2 – BES Cyber Asset Reuse and Disposal. [Violation Risk Factor: Lower] [Time Horizon:
Operations Planning].
M2. Evidence must include each of the applicable documented processes that collectively include each of the applicable
requirement parts in CIP-011-X3 Table R2 – BES Cyber Asset Reuse and Disposal and additional evidence to demonstrate
implementation as described in the Measures column of the table.
CIP-011-X3 Table R2 – BES Cyber Asset Reuse and Disposal
Part
2.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS;
2. PACS; and
3. PCA
Medium Impact BES Cyber Systems
and their associated:
1. EACMS;
2. PACS; and
3. PCA
Draft 32
August March 20210
Requirements
Measures
Prior to the release for reuse of
applicable Cyber Assets that contain
BCSI (except for reuse within other
systems identified in the “Applicable
Systems” column), the Responsible
Entity shall take action to prevent the
unauthorized retrieval of BCSI from
the Cyber Asset data storage media.
Examples of acceptable evidence may
include, but are not limited to, the
following:
•
Records tracking sanitization
actions taken to prevent
unauthorized retrieval of BCSI
such as clearing, purging, or
destroying; or
•
Records tracking actions such as
encrypting, retaining in the
Physical Security Perimeter or
other methods used to prevent
unauthorized retrieval of BCSI.
Page 12 of 18
CIP-011-X3 — Cyber Security — Information Protection
CIP-011-X3 Table R2 – BES Cyber Asset Reuse and Disposal
Part
2.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS;
2. PACS; and
3. PCA
Medium Impact BES Cyber Systems
and their associated:
1. EACMS;
2. PACS; and
3. PCA
Draft 32
August March 20210
Requirements
Measures
Prior to the disposal of applicable
Cyber Assets that contain BCSI, the
Responsible Entity shall take action to
prevent the unauthorized retrieval of
BCSI from the Cyber Asset or destroy
the data storage media.
Examples of acceptable evidence may
include, but are not limited to, the
following:
•
Records that indicate that
data storage media was
destroyed prior to the
disposal of an applicable
Cyber Asset; or
•
Records of actions taken to
prevent unauthorized
retrieval of BCSIBES Cyber
Information prior to the
disposal of an applicable
Cyber Asset.
Page 13 of 18
CIP-011-X3 — Cyber Security — Information Protection
C. Compliance
1.
Compliance Monitoring Process:
1.1. Compliance Enforcement Authority: “Compliance Enforcement Authority” (CEA) means NERC
or the Regional Entity, or any entity as otherwise designated by an Applicable Governmental
Authority, in their respective roles of monitoring and/or enforcing compliance with mandatory
and enforceable Reliability Standards in their respective jurisdictions.
1.2. Evidence Retention: The following evidence retention period(s) identify the period of time an
entity is required to retain specific evidence to demonstrate compliance. For instances where
the evidence retention period specified below is shorter than the time since the last audit, the
Compliance Enforcement Authority CEA may ask an entity to provide other evidence to show
that it was compliant for the full time period since the last audit.
The applicable entity shall keep data or evidence to show compliance as identified below unless
directed by its Compliance Enforcement AuthorityCEA to retain specific evidence for a longer
period of time as part of an investigation:
•
The applicable entity shall retain evidence of each requirement in this standard for three
calendar years.
•
If an applicable entity is found non-compliant, it shall keep information related to the noncompliance until mitigation is complete and approved or for the time specified above,
whichever is longer.
•
The Compliance Enforcement AuthorityCEA shall keep the last audit records and all
requested and submitted subsequent audit records.
1.3. Compliance Monitoring and Assessment ProcessesEnforcement Program,: As defined in the
NERC Rules of Procedure, “Compliance Monitoring and Enforcement Program” refers to the
identification of the processes that will be used to evaluate data or information for the purpose
of assessing performance or outcomes with the associated Reliability Standard.
Draft 32
August March 20210
Page 14 of 18
CIP-011-X3 — Cyber Security — Information Protection
2. Table of Compliance Elements
Violation Severity Levels
R#
R1
Time
Horizon
VRF
Operations
Planning
Medium
Violation Severity Levels (CIP-011-X3)
Lower VSL
N/A The Responsible
Entity implemented
one or more
documented
information
protection
program(s) but did
not implement one
of the applicable
items for Parts 1.1
through 1.4. (R1)
Moderate VSL
N/A
The Responsible
Entity implemented
one or more
documented
information
protection program(s)
but did not
implement two of the
applicable items for
Parts 1.1 through 1.4.
(R1)
High VSL
The Responsible Entity
documented, but did
not, implement one or
more BCSI protection
program(s). (R1)
OR
The Responsible Entity
documented but did
not implement at least
one method to identify
BCSI. (1.1)
Severe VSL
The Responsible
Entity neither
documented nor
implemented did
not implement one
or more BCSI
documented
information
protection
program(s). (R1)
OR
The Responsible Entity
documented but did
not implement at least
one method to protect
and securely handle
BCSI. (1.2)
The Responsible
Entity implemented
one or more
Draft 32
August March 20210
Page 15 of 18
CIP-011-X3 — Cyber Security — Information Protection
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-011-X3)
Lower VSL
Moderate VSL
High VSL
Severe VSL
documented
information
protection
program(s) but did
not implement
three or more of
the applicable
items for Parts 1.1
through 1.4. (R1)
R2
Operations
Planning
Draft 32
August March 20210
Lower
N/A
The Responsible
Entity implemented
one or more
documented
processes but did not
include processes for
reuse as to prevent
the unauthorized
retrieval of BCSI from
the BES Cyber Asset.
(2.1)
The Responsible Entity
implemented one or
more documented
processes but did not
include disposal or
media destruction
processes to prevent
the unauthorized
retrieval of BCSI from
the BES Cyber Asset.
(2.2)
The Responsible
Entity has not
documented or
implemented any
processes for
applicable
requirement parts
in CIP-011-X3 Table
R3 – BES Cyber
Asset Reuse and
Disposal. (R2)
Page 16 of 18
CIP-011-X3 — Cyber Security — Information Protection
C. Regional Variances
None.
D. Interpretations
None.
E. Associated Documents
Version History
Version
Date
1
11/26/12
Adopted by the NERC Board of
Trustees.
1
11/22/13
2
11/13/14
FERC Order issued approving CIP011-1. (Order becomes effective
on 2/3/14.)
Adopted by the NERC Board of
Trustees.
2
2/12/15
Adopted by the NERC Board of
Trustees.
2
1/21/16
FERC Order issued approving CIP011-2. Docket No. RM15-14-000
Draft 32
August March 20210
Action
Change Tracking
Developed to define
the information
protection
requirements in
coordination with other
CIP standards and to
address the balance of
the FERC directives in
its Order 706.
Addressed two FERC
directives from Order
No. 791 related to
identify, assess, and
correct language and
communication
networks.
Replaces the version
adopted by the Board
on 11/13/2014. Revised
version addresses
remaining directives
from Order No. 791
related to transient
devices and low impact
BES Cyber Systems.
Page 17 of 18
CIP-011-X3 — Cyber Security — Information Protection
3
Draft 32
August March 20210
TBD
Adopted by the NERC Board of
Trustees
Revised to enhance BES
reliability for entities to
manage their BCSI.
Page 18 of 18
CIP-011-2X — Cyber Security — Information Protection
Standard Development Timeline
This section is maintained by the drafting team during the development of the standard and will
be removed when the standard is adopted by the NERC Board of Trustees (Board).
Description of Current Draft
Completed Actions
Standards Committee approved Standard Authorization Request
(SAR) for posting
SAR posted for comment
Date
March 22, 2019
March 28, 2019 –
April 26, 2019
45-day formal comment period with ballot
December 20, 2019
– February 3, 2020
45-day formal comment period with ballot
August 6–
September 21, 2020
45-day formal comment period with ballot
March 25 – May 10,
2021
Anticipated Actions
10-day final ballot
Board adoption
Draft 3
March 2021
Date
May 2021
November 2021
Page 1 of 20
CIP-011-2X — Cyber Security — Information Protection
A. Introduction
1.
Title:
Cyber Security — Information Protection
2.
Number:
CIP-011-X2
3.
Purpose:
To prevent unauthorized access to BES Cyber System Information (BCSI)
by specifying information protection requirements in support of
protecting BES Cyber Systems against compromise that could lead to
misoperation or instability in the Bulk Electric System (BES).
4.
Applicability:
4.1. Functional Entities: For the purpose of the requirements contained herein, the
following list of functional entities will be collectively referred to as “Responsible
Entities.” For requirements in this standard where a specific functional entity or
subset of functional entities are the applicable entity or entities, the functional entity
or entities are specified explicitly.
4.1.1 Balancing Authority
4.1.2 Distribution Provider that owns one or more of the following Facilities, systems,
and equipment for the protection or restoration of the BES:
4.1.2.1 Each underfrequency Load shedding (UFLS) or undervoltage Load shedding
(UVLS) system that:
4.1.2.1.1 is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.1.2.1.2 performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation,
of 300 MW or more.
4.1.2.2 Each Special Protection System (SPS) or Remedial Action Scheme (RAS)
where the SPS or RAS is subject to one or more requirements in a NERC or
Regional Reliability Standard.
4.1.2.3 Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.1.2.4 Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.1.3 Generator Operator
4.1.4 Generator Owner
4.1.5 Interchange Coordinator or Interchange Authority
4.1.64.1.5
Draft 3
March 2021
Reliability Coordinator
Page 2 of 20
CIP-011-2X — Cyber Security — Information Protection
4.1.74.1.6
Transmission Operator
4.1.84.1.7
Transmission Owner
4.2.
Facilities: For the purpose of the requirements contained herein, the following
Facilities, systems, and equipment owned by each Responsible Entity in 4.1 above
are those to which these requirements are applicable. For requirements in this
standard where a specific type of Facilities, system, or equipment or subset of
Facilities, systems, and equipment are applicable, these are specified explicitly.
4.2.1 Distribution Provider: One or more of the following Facilities, systems and
equipment owned by the Distribution Provider for the protection or restoration
of the BES:
4.2.1.1 Each UFLS or UVLS System that:
4.2.1.1.1 is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.2.1.1.2 performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation,
of 300 MW or more.
4.2.1.2 Each SPS or RAS where the SPS or RAS is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.2.1.3 Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.2.1.4 Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.2.2 Responsible Entities listed in 4.1 other than Distribution Providers:
All BES Facilities.
4.2.3 Exemptions: The following are exempt from Standard CIP-011-X2:
4.2.3.1 Cyber Assets at Facilities regulated by the Canadian Nuclear Safety
Commission.
4.2.3.2 Cyber Assets associated with communication networks and data
communication links between discrete Electronic Security Perimeters.
4.2.3.3 The systems, structures, and components that are regulated by the Nuclear
Regulatory Commission under a cyber security plan pursuant to 10 C.F.R.
Section 73.54.
4.2.3.4 For Distribution Providers, the systems and equipment that are not included
in section 4.2.1 above.
Draft 3
March 2021
Page 3 of 20
CIP-011-2X — Cyber Security — Information Protection
4.2.3.5 Responsible Entities that identify that they have no BES Cyber Systems
categorized as high impact or medium impact according to the CIP-002-5.1a
identification and categorization processes.
5.
Effective Dates: See Implementation Plan for CIP-011-X2.
6.
Background:
Standard CIP-011 exists as part of a suite of CIP Standards related to cyber security,
which require the initial identification and categorization of BES Cyber Systems and
require a minimum level of organizational, operational, and procedural controls to
mitigate risk to BES Cyber Systems.
Most requirements open with, “Each Responsible Entity shall implement one or more
documented [processes, plan, etc.] that include the applicable items in [Table
Reference].” The referenced table requires the applicable items in the procedures for
the requirement’s common subject matter.
The term documented processes refers to a set of required instructions specific to the
Responsible Entity and to achieve a specific outcome. This term does not imply any
particular naming or approval structure beyond what is stated in the requirements.
An entity should include as much as it believes necessary in its documented processes,
but it must address the applicable requirements in the table.
The terms program and plan are sometimes used in place of documented processes
where it makes sense and is commonly understood. For example, documented
processes describing a response are typically referred to as plans (i.e., incident
response plans and recovery plans). Likewise, a security plan can describe an
approach involving multiple procedures to address a broad subject matter.
Similarly, the term program may refer to the organization’s overall implementation of
its policies, plans and procedures involving a subject matter. Examples in the
standards include the personnel risk assessment program and the personnel training
program. The full implementation of the CIP Cyber Security Standards could also be
referred to as a program. However, the terms program and plan do not imply any
additional requirements beyond what is stated in the standards.
Responsible Entities can implement common controls that meet requirements for
multiple high and medium impact BES Cyber Systems. For example, a single training
program could meet the requirements for training personnel across multiple BES
Cyber Systems.
Measures for the initial requirement are simply the documented processes
themselves. Measures in the table rows provide examples of evidence to show
documentation and implementation of applicable items in the documented processes.
These measures serve to provide guidance to entities in acceptable records of
compliance and should not be viewed as an all-inclusive list.
Draft 3
March 2021
Page 4 of 20
CIP-011-2X — Cyber Security — Information Protection
Throughout the standards, unless otherwise stated, bulleted items in the
requirements and measures are items that are linked with an “or,” and numbered
items are items that are linked with an “and.”
Many references in the Applicability section use a threshold of 300 MW for UFLS and
UVLS. This particular threshold of 300 MW for UVLS and UFLS was provided in Version
1 of the CIP Cyber Security Standards. The threshold remains at 300 MW since it is
specifically addressing UVLS and UFLS, which are last ditch efforts to save the BES. A
review of UFLS tolerances defined within regional reliability standards for UFLS
program requirements to date indicates that the historical value of 300 MW
represents an adequate and reasonable threshold value for allowable UFLS
operational tolerances.
“Applicable Systems” Columns in Tables:
Each table has an “Applicable Systems” column to further define the scope of systems
to which a specific requirement row applies. The CSO706 SDT adapted this concept
from the National Institute of Standards and Technology (“NIST”) Risk Management
Framework as a way of applying requirements more appropriately based on impact
and connectivity characteristics. The following conventions are used in the
“Applicable Systems” column as described.
Draft 3
March 2021
•
High Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as
high impact according to the CIP-002-5.1a identification and categorization
processes.
•
Medium Impact BES Cyber Systems – Applies to BES Cyber Systems categorized
as medium impact according to the CIP-002-5.1a identification and
categorization processes.
•
Electronic Access Control or Monitoring Systems (EACMS) – Applies to each
Electronic Access Control or Monitoring System associated with a referenced
high impact BES Cyber System or medium impact BES Cyber System. Examples
may include, but are not limited to, firewalls, authentication servers, and log
monitoring and alerting systems.
•
Physical Access Control Systems (PACS) – Applies to each Physical Access
Control System associated with a referenced high impact BES Cyber System or
medium impact BES Cyber System with External Routable Connectivity.
•
Protected Cyber Assets (PCA) – Applies to each Protected Cyber Asset
associated with a referenced high impact BES Cyber System or medium impact
BES Cyber System.
Page 5 of 20
CIP-011-2X — Cyber Security — Information Protection
B. Requirements and Measures
R1. Each Responsible Entity shall implement one or more documented information protection program(s) for BES Cyber System
Information (BCSI) pertaining to “Applicable Systems” identified in CIP-011-X Table R1 – Information Protection Program
that collectively includes each of the applicable requirement parts in CIP-011-X2 Table R1 – Information Protection
Program. [Violation Risk Factor: Medium] [Time Horizon: Operations Planning].
M1. Evidence for the information protection program must include the applicable requirement parts in CIP-011-X2 Table R1 –
Information Protection Program and additional evidence to demonstrate implementation as described in the Measures
column of the table.
Draft 3
March 2021
Page 6 of 20
CIP-011-2X — Cyber Security — Information Protection
CIP-011-X2 Table R1 – Information Protection Program
Part
1.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
and their associated:
1. EACMS; and
Requirements
Method(s) to identify information that
meets the definition of BES Cyber
sytem Information BCSI.
Measures
Examples of acceptable evidence may
include, but are not limited to, the
following:
•
Documented method(s) to identify
BES Cyber System Information BCSI
from the entity’s information
protection program; or
•
Indications on information (e.g.,
labels or classification) that identify
BES Cyber System Information BCSI
as designated in the entity’s
information protection program; or
•
Training materials that provide
personnel with sufficient
knowledge to identify BES Cyber
System Information BCSI; or
•
Repository or electronic and
physical location designated for
housing BES Cyber System
Information in the entity’s
information protection program.
•
Storage locations identified for
housing BCSI in the entity’s
information protection program.
2. PACS
Draft 3
March 2021
Page 7 of 20
CIP-011-2X — Cyber Security — Information Protection
CIP-011-X2 Table R1 – Information Protection Program
Part
1.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Requirements
Procedure(s) for protecting
andMethod(s) to protect and
securely handleing BES Cyber System
InformationBCSI, including storage,
transit, and useto mitigate risks of
compromising confidentiality.
Measures
Examples of acceptable evidence for
on-premise BCSI may include, but are
not limited to, the following:
•
Medium Impact BES Cyber Systems
and their associated:
1. EACMS; and
2. PACS
•
Procedures for protecting and
securely handling BCSI, which
include topics such as storage,
security during transit, and use
of BES Cyber System
information; or
Records indicating that BES
Cyber System Information BCSI
is handled in a manner
consistent with the entity’s
documented procedure(s).
Examples of evidence for off-premise
BCSI may include, but are not limited
to, the following:
Draft 3
March 2021
•
Implementation of electronic
technical method(s) to protect
electronic BCSI (e.g., data
masking, encryption, hashing,
tokenization, cipher, electronic
key management); or
•
Implementation of physical
technical method(s) to protect
physical BCSI (e.g., physical lock
and key management, physical
Page 8 of 20
CIP-011-2X — Cyber Security — Information Protection
CIP-011-X2 Table R1 – Information Protection Program
Part
Applicable Systems
Requirements
Measures
badge management,
biometrics, alarm system); or
•
Draft 3
March 2021
Implementation of
administrative method(s) to
protect BCSI (e.g., vendor
service risk assessments,
business agreements).
Page 9 of 20
CIP-011-2X — Cyber Security — Information Protection
R2.
Each Responsible Entity shall implement one or more documented process(es) that collectively include the applicable
requirement parts in CIP-011-X2 Table R2 – BES Cyber Asset Reuse and Disposal. [Violation Risk Factor: Lower] [Time Horizon:
Operations Planning].
M2. Evidence must include each of the applicable documented processes that collectively include each of the applicable
requirement parts in CIP-011-X2 Table R2 – BES Cyber Asset Reuse and Disposal and additional evidence to demonstrate
implementation as described in the Measures column of the table.
CIP-011-X2 Table R2 – BES Cyber Asset Reuse and Disposal
Part
2.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS;
2. PACS; and
3. PCA
Medium Impact BES Cyber Systems
and their associated:
1. EACMS;
2. PACS; and
3. PCA
Draft 3
March 2021
Requirements
Measures
Prior to the release for reuse of
applicable Cyber Assets that contain
BES Cyber System Information BCSI
(except for reuse within other
systems identified in the “Applicable
Systems” column), the Responsible
Entity shall take action to prevent the
unauthorized retrieval of BES Cyber
System InformationBCSI from the
Cyber Asset data storage media.
Examples of acceptable evidence may
include, but are not limited to, the
following:
•
Records tracking sanitization
actions taken to prevent
unauthorized retrieval of BES
Cyebr System Information BCSI
such as clearing, purging, or
destroying; or
•
Records tracking actions such as
encrypting, retaining in the
Physical Security Perimeter or
other methods used to prevent
unauthorized retrieval of BES
Cyber System InformationBCSI.
Page 10 of 20
CIP-011-2X — Cyber Security — Information Protection
CIP-011-X2 Table R2 – BES Cyber Asset Reuse and Disposal
Part
2.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS;
2. PACS; and
3. PCA
Medium Impact BES Cyber Systems
and their associated:
1. EACMS;
2. PACS; and
3. PCA
Draft 3
March 2021
Requirements
Measures
Prior to the disposal of applicable
Cyber Assets that contain BES Cyber
System InformationBCSI, the
Responsible Entity shall take action to
prevent the unauthorized retrieval of
BES Cyber System Information BCSI
from the Cyber Asset or destroy the
data storage media.
Examples of acceptable evidence may
include, but are not limited to, the
following:
•
Records that indicate that
data storage media was
destroyed prior to the
disposal of an applicable
Cyber Asset; or
•
Records of actions taken to
prevent unauthorized
retrieval of BES Cyber System
Information BCSI prior to the
disposal of an applicable
Cyber Asset.
Page 11 of 20
CIP-011-2X — Cyber Security — Information Protection
B. Compliance
1.
Compliance Monitoring Process:
1.1. Compliance Enforcement Authority:
As defined in the NERC Rules of Procedure, “Compliance Enforcement Authority” (CEA) means
NERC or the Regional Entity, or any entity as otherwise designated by an Applicable
Governmental Authority, in their respective roles of monitoring and/or enforcing compliance
with mandatory and enforceable the NERC Reliability Standards in their respective jurisdictions.
1.2. Evidence Retention: The following evidence retention period(s) identify the period of time an
entity is required to retain specific evidence to demonstrate compliance. For instances where
the evidence retention period specified below is shorter than the time since the last audit, the
CEA may ask an entity to provide other evidence to show that it was compliant for the full time
period since the last audit.
The applicable entity shall keep data or evidence to show compliance as identified below unless
directed by its CEA to retain specific evidence for a longer period of time as part of an
investigation.:
The Responsible Entity shall keep data or evidence to show compliance as identified below
unless directed by its CEA to retain specific evidence for a longer period of time as part of an
investigation:
•
Each Responsible The applicable Eentity shall retain evidence of each requirement in this
standard for three calendar years.
•
If a Responsible applicable Eentity is found non-compliant, it shall keep information related
to the noncompliance until mitigation is complete and approved or for the time specified
above, whichever is longer.
•
The CEA shall keep the last audit records and all requested and submitted subsequent audit
records.
1.3. Compliance Monitoring and Assessment Process Enforcement Program: As defined in the
NERC Rules of Procedure, “Compliance Monitoring and Enforcement Program” refers to the
identification of the processes that will be used to evaluate data or information for the purpose
of assessing performance or outcomes with the associated Reliability Standard.
• Compliance Audits
• Self-Certifications
• Spot Checking
• Compliance Violation Investigations
• Self-Reporting
• Complaints
1.4. Additional Compliance Information:
None
Draft 3
March 2021
Page 12 of 20
CIP-011-2X — Cyber Security — Information Protection
Violation Severity Levels
R#
R1
Time
Horizon
VRF
Operations
Planning
Medium
Violation Severity Levels (CIP-011-X2)
Lower VSL
N/A
Moderate VSL
N/A
High VSL
The Responsible Entity
documented, but did
not, implement one or
more BCSI protection
program(s). (R1)
OR
The Responsible Entity
documented but did
not implement at least
one method to identify
BCSI. (1.1)
Severe VSL
The Responsible
Entity has not
neither documented
nor implemented a
one or more BES
Cyber System
Information BCSI
protection
program(s). (R1)
OR
The Responsible Entity
documented but did
not implement at least
one method to protect
and securely handle
BCSI. (1.2)
N/A
R2
Draft 3
March 2021
Operations
Planning
Lower
N/A
The Responsible
Entity implemented
one or more
documented
The Responsible Entity
implemented one or
more documented
processes but did not
The Responsible
Entity has not
documented or
implemented any
Page 13 of 20
CIP-011-2X — Cyber Security — Information Protection
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-011-X2)
Lower VSL
Moderate VSL
processes but did not
include processes for
reuse as to prevent
the unauthorized
retrieval of BES Cyber
System Information
BCSI from the BES
Cyber Asset. (2.1)
Draft 3
March 2021
High VSL
include disposal or
media destruction
processes to prevent
the unauthorized
retrieval of BES Cyber
System Information
BCSI from the BES
Cyber Asset. (2.2)
Severe VSL
processes for
applicable
requirement parts
in CIP-011-X2 Table
R3 – BES Cyber
Asset Reuse and
Disposal. (R2)
Page 14 of 20
CIP-011-2X — Cyber Security — Information Protection
C. Regional Variances
None.
D. Interpretations
None.
E. Associated Documents
Version History
Version
Date
1
11/26/12
Adopted by the NERC Board of
Trustees.
1
11/22/13
2
11/13/14
FERC Order issued approving CIP011-1. (Order becomes effective
on 2/3/14.)
Adopted by the NERC Board of
Trustees.
2
2/12/15
Adopted by the NERC Board of
Trustees.
2
1/21/16
FERC Order issued approving CIP011-2. Docket No. RM15-14-000
Draft 3
March 2021
Action
Change Tracking
Developed to define
the information
protection
requirements in
coordination with other
CIP standards and to
address the balance of
the FERC directives in
its Order 706.
Addressed two FERC
directives from Order
No. 791 related to
identify, assess, and
correct language and
communication
networks.
Replaces the version
adopted by the Board
on 11/13/2014. Revised
version addresses
remaining directives
from Order No. 791
related to transient
devices and low impact
BES Cyber Systems.
Page 15 of 20
CIP-011-2X — Cyber Security — Information Protection
3
Draft 3
March 2021
TBD
Adopted by the NERC Board of
Trustees
Revised to enhance BES
reliability for entities to
manage their BCSI.
Page 16 of 20
CIP-011-2X — Cyber Security — Information Protection
Guidelines and Technical Basis
Section 4 – Scope of Applicability of the CIP Cyber Security Standards
Section “4. Applicability” of the standards provides important information for Responsible
Entities to determine the scope of the applicability of the CIP Cyber Security Requirements.
Section “4.1. Functional Entities” is a list of NERC functional entities to which the standard
applies. If the entity is registered as one or more of the functional entities listed in Section 4.1,
then the NERC CIP Cyber Security Standards apply. Note that there is a qualification in Section
4.1 that restricts the applicability in the case of Distribution Providers to only those that own
certain types of systems and equipment listed in 4.2.
Section “4.2. Facilities” defines the scope of the Facilities, systems, and equipment owned by
the Responsible Entity, as qualified in Section 4.1, that is subject to the requirements of the
standard. As specified in the exemption section 4.2.3.5, this standard does not apply to
Responsible Entities that do not have High Impact or Medium Impact BES Cyber Systems under
CIP-002-5.1’s categorization. In addition to the set of BES Facilities, Control Centers, and other
systems and equipment, the list includes the set of systems and equipment owned by
Distribution Providers. While the NERC Glossary term “Facilities” already includes the BES
characteristic, the additional use of the term BES here is meant to reinforce the scope of
applicability of these Facilities where it is used, especially in this applicability scoping section.
This in effect sets the scope of Facilities, systems, and equipment that is subject to the
standards.
Requirement R1:
Responsible Entities are free to utilize existing change management and asset management
systems. However, the information contained within those systems must be evaluated, as the
information protection requirements still apply.
The justification for this requirement is pre-existing from previous versions of CIP and is also
documented in FERC Order No. 706 and its associated Notice of Proposed Rulemaking.
This requirement mandates that BES Cyber System Information be identified. The Responsible
Entity has flexibility in determining how to implement the requirement. The Responsible Entity
should explain the method for identifying the BES Cyber System Information in their
information protection program. For example, the Responsible Entity may decide to mark or
label the documents. Identifying separate classifications of BES Cyber System Information is
not specifically required. However, a Responsible Entity maintains the flexibility to do so if they
desire. As long as the Responsible Entity’s information protection program includes all
applicable items, additional classification levels (e.g., confidential, public, internal use only, etc.)
can be created that go above and beyond the requirements. If the entity chooses to use
classifications, then the types of classifications used by the entity and any associated labeling
should be documented in the entity’s BES Cyber System Information Program.
Draft 3
March 2021
Page 17 of 20
CIP-011-2X — Cyber Security — Information Protection
The Responsible Entity may store all of the information about BES Cyber Systems in a separate
repository or location (physical and/or electronic) with access control implemented. For
example, the Responsible Entity’s program could document that all information stored in an
identified repository is considered BES Cyber System Information, the program may state that
all information contained in an identified section of a specific repository is considered BES
Cyber System Information, or the program may document that all hard copies of information
are stored in a secured area of the building. Additional methods for implementing the
requirement are suggested in the measures section. However, the methods listed in measures
are not meant to be an exhaustive list of methods that the entity may choose to utilize for the
identification of BES Cyber System Information.
The SDT does not intend that this requirement cover publicly available information, such as
vendor manuals that are available via public websites or information that is deemed to be
publicly releasable.
Information protection pertains to both digital and hardcopy information. R1.2 requires one or
more procedures for the protection and secure handling BES Cyber System Information,
including storage, transit, and use. This includes information that may be stored on Transient
Cyber Assets or Removable Media.
The entity’s written Information Protection Program should explain how the entity handles
aspects of information protection including specifying how BES Cyber System Information is to
be securely handled during transit in order to protect against unauthorized access, misuse, or
corruption and to protect confidentiality of the communicated BES Cyber System Information.
For example, the use of a third-party communication service provider instead of organizationowned infrastructure may warrant the use of encryption to prevent unauthorized disclosure of
information during transmission. The entity may choose to establish a trusted communications
path for transit of BES Cyber System Information. The trusted communications path would
utilize a logon or other security measures to provide secure handling during transit. The entity
may employ alternative physical protective measures, such as the use of a courier or locked
container for transmission of information. It is not the intent of this standard to mandate the
use of one particular format for secure handling during transit.
A good Information Protection Program will document the circumstances under which BES
Cyber System Information can be shared with or used by third parties. The organization should
distribute or share information on a need-to-know basis. For example, the entity may specify
that a confidentiality agreement, non-disclosure arrangement, contract, or written agreement
of some kind concerning the handling of information must be in place between the entity and
the third party. The entity’s Information Protection Program should specify circumstances for
sharing of BES Cyber System Information with and use by third parties, for example, use of a
non-disclosure agreement. The entity should then follow their documented program. These
requirements do not mandate one specific type of arrangement.
Requirement R2:
Draft 3
March 2021
Page 18 of 20
CIP-011-2X — Cyber Security — Information Protection
This requirement allows for BES Cyber Systems to be removed from service and analyzed with
their media intact, as that should not constitute a release for reuse. However, following the
analysis, if the media is to be reused outside of a BES Cyber System or disposed of, the entity
must take action to prevent the unauthorized retrieval of BES Cyber System Information from
the media.
The justification for this requirement is pre-existing from previous versions of CIP and is also
documented in FERC Order No. 706 and its associated Notice of Proposed Rulemaking.
If an applicable Cyber Asset is removed from the Physical Security Perimeter prior to action
taken to prevent the unauthorized retrieval of BES Cyber System Information or destroying the
data storage media, the Responsible Entity should maintain documentation that identifies the
custodian for the data storage media while the data storage media is outside of the Physical
Security Perimeter prior to actions taken by the entity as required in R2.
Media sanitization is the process used to remove information from system media such that
reasonable assurance exists that the information cannot be retrieved or reconstructed. Media
sanitization is generally classified into four categories: Disposal, clearing, purging, and
destroying. For the purposes of this requirement, disposal by itself, with the exception of
certain special circumstances, such as the use of strong encryption on a drive used in a SAN or
other media, should never be considered acceptable. The use of clearing techniques may
provide a suitable method of sanitization for media that is to be reused, whereas purging
techniques may be more appropriate for media that is ready for disposal.
The following information from NIST SP800-88 provides additional guidance concerning the
types of actions that an entity might take to prevent the unauthorized retrieval of BES Cyber
System Information from the Cyber Asset data storage media:
Clear: One method to sanitize media is to use software or hardware products to
overwrite storage space on the media with non-sensitive data. This process may include
overwriting not only the logical storage location of a file(s) (e.g., file allocation table) but
also may include all addressable locations. The security goal of the overwriting process
is to replace written data with random data. Overwriting cannot be used for media that
are damaged or not rewriteable. The media type and size may also influence whether
overwriting is a suitable sanitization method [SP 800-36].
Purge: Degaussing and executing the firmware Secure Erase command (for ATA drives
only) are acceptable methods for purging. Degaussing is exposing the magnetic media to
a strong magnetic field in order to disrupt the recorded magnetic domains. A degausser
is a device that generates a magnetic field used to sanitize magnetic media. Degaussers
are rated based on the type (i.e., low energy or high energy) of magnetic media they can
purge. Degaussers operate using either a strong permanent magnet or an
electromagnetic coil. Degaussing can be an effective method for purging damaged or
inoperative media, for purging media with exceptionally large storage capacities, or for
Draft 3
March 2021
Page 19 of 20
CIP-011-2X — Cyber Security — Information Protection
quickly purging diskettes. [SP 800-36] Executing the firmware Secure Erase command
(for ATA drives only) and degaussing are examples of acceptable methods for purging.
Degaussing of any hard drive assembly usually destroys the drive as the firmware that
manages the device is also destroyed.
Destroy: There are many different types, techniques, and procedures for media
destruction. Disintegration, Pulverization, Melting, and Incineration are sanitization
methods designed to completely destroy the media. They are typically carried out at an
outsourced metal destruction or licensed incineration facility with the specific
capabilities to perform these activities effectively, securely, and safely. Optical mass
storage media, including compact disks (CD, CD-RW, CD-R, CD-ROM), optical disks
(DVD), and MO disks, must be destroyed by pulverizing, crosscut shredding or burning.
In some cases such as networking equipment, it may be necessary to contact the
manufacturer for proper sanitization procedure.
It is critical that an organization maintain a record of its sanitization actions to prevent
unauthorized retrieval of BES Cyber System Information. Entities are strongly encouraged to
review NIST SP800-88 for guidance on how to develop acceptable media sanitization processes.
Rationale:
During development of this standard, text boxes were embedded within the standard to explain
the rationale for various parts of the standard. Upon BOT approval, the text from the rationale
text boxes was moved to this section.
Rationale for Requirement R1:
The SDT’s intent of the information protection program is to prevent unauthorized access to
BES Cyber System Information.
Rationale for Requirement R2:
The intent of the BES Cyber Asset reuse and disposal process is to prevent the unauthorized
dissemination of BES Cyber System Information upon reuse or disposal.
Draft 3
March 2021
Page 20 of 20
Implementation Plan
Project 2019-02 BES Cyber System Information Access Management
Reliability Standard CIP-004 and CIP-011
Applicable Standard(s)
•
CIP-004-X – Cyber Security - Personnel & Training
•
CIP-011-X – Cyber Security - Information Protection
Requested Retirement(s)
•
CIP-004-6 – Cyber Security - Personnel & Training
•
CIP-011-2 – Cyber Security - Information Protection
Prerequisite Standard(s)
•
None
Applicable Entities
•
Balancing Authority
•
Distribution Provider 1
•
Generator Operator
•
Reliability Coordinator
•
Transmission Operator
•
Transmission Owner
Background
The purpose of Project 2019-02 BES Cyber System Information (BCSI) Access Management is to
clarify the CIP requirements related to both managing access and securing BCSI. This project
proposes revisions to Reliability Standards CIP-004-6 and CIP-011-2.
The proposed revisions enhance BES reliability by creating increased choice, greater flexibility,
higher availability, and reduced-cost options for entities to manage their BCSI. In addition, the
proposed revisions clarify the protections expected when utilizing third-party solutions (e.g., cloud
services).
1
See subject standards for additional information on Distribution Providers subject to the standards.
RELIABILITY | RESILIENCE | SECURITY
General Considerations
The 24-month period provides Responsible Entities with sufficient time to come into compliance
with new and revised Requirements, including taking steps to:
•
Implement electronic technical mechanisms to mitigate the risk of unauthorized access to
BCSI when Responsible Entities elect to use vendor services;
•
Establish and/or modify vendor relationships to ensure compliance with the updated CIP-004
and CIP-011; and
•
Administrative overhead to review their program.
The 24-month implementation period will allow budgetary cycles for Responsible Entities to allocate
the proper amount of resources to support implementation of the updated CIP-004 and CIP-011. In
addition, the implementation period will provide Electric Reliability Organization (ERO) and
Responsible Entities flexibility in case of unforeseen circumstances or events and afford the
opportunity for feedback to be provided to the ERO and Responsible Entities through various
communication vehicles within industry (e.g., NERC Reliability Standards Technical Committee,
North American Transmission Form), which will encourage more ownership and commitment by
Responsible Entities to adhere to the updated CIP-004 and CIP-011.
Effective Date
CIP-004-X – Cyber Security - Personnel & Training
Where approval by an applicable governmental authority is required, the standard shall become
effective on the first day of the first calendar quarter that is twenty-four (24) months after the
effective date of the applicable governmental authority’s order approving the standard, or as
otherwise provided for by the applicable governmental authority.
Where approval by an applicable governmental authority is not required, the standard shall become
effective on the first day of the first calendar quarter that is twenty-four (24) months after the date
the standard is adopted by the NERC Board of Trustees, or as otherwise provided for in that
jurisdiction.
CIP-011-X – Cyber Security - Information Protection
Where approval by an applicable governmental authority is required, the standard shall become
effective on the first day of the first calendar quarter that is twenty-four (24) months after the
effective date of the applicable governmental authority’s order approving the standard, or as
otherwise provided for by the applicable governmental authority.
Where approval by an applicable governmental authority is not required, the standard shall become
effective on the first day of the first calendar quarter that is twenty-four (24) months after the date
the standard is adopted by the NERC Board of Trustees, or as otherwise provided for in that
jurisdiction.
Implementation Plan | March 2021
Project 2019-02 BES Cyber System Information Access Management
2
Initial Performance of Periodic Requirements
Responsible Entities shall initially comply with the periodic requirements in the CIP-004-X and CIP011-X within the periodic timeframes of their last performance under the CIP-004-6 and CIP-011-2.
Compliance Dates for Early Adoption of Revised CIP Standards
A Responsible Entity may elect to comply with the requirements in CIP-004-X and CIP-011-X
following their approval by the applicable governmental authority, but prior to their Effective Date.
In such a case, the Responsible Entity shall notify the applicable Regional Entities of the date of
compliance with the CIP-004-X and CIP-011-X Reliability Standards. Responsible Entities must
comply with CIP-004-6 and CIP-011-2 until that date.
Retirement Date
CIP-004-6 – Cyber Security - Personnel & Training
Reliability Standard CIP-004-6 shall be retired immediately prior to the effective date of CIP-004-X in
the particular jurisdiction in which the revised standard is becoming effective.
CIP-011-2 – Cyber Security - Information Protection
Reliability Standard CIP-011-2 shall be retired immediately prior to the effective date of CIP-011-X in
the particular jurisdiction in which the revised standard is becoming effective.
Implementation Plan | March 2021
Project 2019-02 BES Cyber System Information Access Management
3
Unofficial Comment Form
Project 2019-02 BES Cyber System Information Access Management
Do not use this form for submitting comments. Use the Standards Balloting and Commenting System
(SBS) to submit comments on Project 2019-02 BES Cyber System Information Access Management by
8 p.m. Eastern, Monday, May 10, 2021.
Additional information is available on the project page. If you have questions, contact Senior Standards
Developer, Jordan Mallory (via email), or at 404-446-2589.
Background Information
The purpose of Project 2019-02 BES Cyber System Information Access Management is to clarify the CIP
requirements related to both managing access and securing BES Cyber System Information (BCSI). This
project proposes revisions to Reliability Standards CIP-004-6 and CIP-011-2.
The proposed revisions enhance BES reliability by creating increased choice, greater flexibility, higher
availability, and reduced-cost options for entities to manage their BCSI. In addition, the proposed
revisions clarify the protections expected when utilizing third-party solutions (e.g., cloud services).
RELIABILITY | RESILIENCE | SECURITY
Questions
1. The standards drafting team (SDT) considered industry’s concerns about the phrase “provisioning
of access” requesting clarity on this terminology. The SDT added “authorize, verify, and revoke
provisioned access” to the parent requirement CIP-004-X, Requirement R6, and changed
“provisioning of access” to “provisioned access” in the requirement parts. This should clarify the
intent that it is a noun which scopes what the Registered Entity must authorize, verify, and revoke,
rather than a verb relating to how provisioning should occur. That is up to the entity to determine.
Do you agree with the proposed change? If not, please provide the basis for your disagreement and
an alternate proposal.
Yes
No
Comments:
2. The SDT considered industry’s concerns about the absence of “obtain and use” language from the
CMEP Practice Guide, which currently provides alignment on a clear two-pronged test of what
constitutes access in the context of utilizing third-party solutions (e.g., cloud services) for BCSI. The
SDT mindfully mirrored this language to assure future enforceable standards are not reintroducing
a gap. Do you agree this clarifying language makes it clear both parameters of this two-pronged test
for “obtain and use” must be met to constitute “access” to BCSI? If not, please provide the basis for
your disagreement and an alternate proposal.
Yes
No
Comments:
3. The SDT considered industry comments regarding the removal of storage locations. The SDT must
enable the CIP standards for the use of third-party solutions (e.g., cloud services) for BCSI, and
retention of that language hinders meeting those FERC directives. The absence of this former
language does not preclude an entity from defining storage locations as the method used within an
entity’s access management program. CIP-004-X, Requirement R6, is at an objective level to permit
more than that one approach. Do you agree the requirement retains the flexibility for storage
locations to be used as one way to meet the objective? If not, please provide the basis for your
disagreement and an alternate proposal.
Yes
No
Comments:
Unofficial Comment Form | March-May, 2021
Project 2019-02 BES Cyber System Information Access Management
2
4. To address industry comments while also enabling entities to use third-party solutions (e.g., cloud
services) for BCSI, in CIP-004-X, Requirement R6 Part 6.1, the SDT made a distinction between
“electronic access to electronic BCSI” versus “physical access to physical BCSI”. This clarifies physical
access alone to hardware containing electronic BCSI, which is protected with methods that do not
permit an individual to concurrently obtain and use the electronic BCSI, is not provisioned access to
electronic BCSI. Do you agree with the proposed change? If not, please provide the basis for your
disagreement and an alternate proposal.
Yes
No
Comments:
5. The SDT considered industry comments about defining the word “access”. “Access” is broadly used
across both the CIP and Operations & Planning Standards (e.g., open access) and carries different
meanings in different contexts. Therefore, the SDT chose not to define “access” in the NERC Glossary
of Terms. Instead, the SDT used the adjective “provisioned” to add context, thereby scoping CIP004-X, Requirement R6. Do you agree the adjective “provisioned” in conjunction with the “Note”
clarifies what “provisioned access” is? If not, please provide the basis for your disagreement and an
alternate proposal.
Yes
No
Comments:
6. In response to industry concerns regarding double jeopardy or confusion with CIP-013, the SDT
removed CIP-011-X, Requirement R1 Parts 1.3 and 1.4, in favor of simplifying CIP-011-X,
Requirement R1 Part 1.1, and adjusting Part 1.2 to broaden the focus around the implementation
of protective methods and secure handling methods to mitigate risks of compromising
confidentiality. Do you agree with the proposed changes? If not, please provide the basis for your
disagreement and an alternate proposal.
Yes
No
Comments:
7. The SDT extended the implementation plan to 24-months in an attempt to align with the Project
2016-02 modifications that are on the same drafting timeline, and added an optional provision for
early adoption. Do you agree this approach gives industry adequate time to implement without
encumbering entities who are planning to, or are already using, third-party solutions (e.g., cloud
services) for BCSI? If not, please provide the basis for your disagreement and an alternate
proposal.
Yes
No
Comments:
Unofficial Comment Form | March-May, 2021
Project 2019-02 BES Cyber System Information Access Management
3
8. In looking at all proposed recommendations from the standard drafting team, are the proposed
changes a cost-effective approach?
Yes
No
Comments:
9. Please provide any additional comments for the SDT to consider, if desired.
Comments:
Unofficial Comment Form | March-May, 2021
Project 2019-02 BES Cyber System Information Access Management
4
Cyber Security —
Personnel & Training
Technical Rationale and Justification for
Reliability Standard CIP-004-X
March 2021
RELIABILITY | RESILIENCE | SECURITY
NERC | Report Title | Report Date
I
Table of Contents
Preface ........................................................................................................................................................................... iii
Introduction ................................................................................................................................................................... iv
Requirement R1 .............................................................................................................................................................. 1
General Considerations for Requirement R1........................................................................................................... 1
Rationale for Requirement R1 ................................................................................................................................. 1
Requirement R2 .............................................................................................................................................................. 2
General Considerations for Requirement R2........................................................................................................... 2
Rationale for Requirement R2 ................................................................................................................................. 2
Requirement R3 .............................................................................................................................................................. 3
General Considerations for Requirement R3........................................................................................................... 3
Rationale for Requirement R3 ................................................................................................................................. 3
Requirement R4 .............................................................................................................................................................. 4
General Considerations for Requirement R4........................................................................................................... 4
Rationale for Requirement R4 ................................................................................................................................. 4
Requirement R5 .............................................................................................................................................................. 5
General Considerations for Requirement R5........................................................................................................... 5
Rationale for Requirement R5 ................................................................................................................................. 5
Requirement R6 .............................................................................................................................................................. 0
General Considerations for Requirement R6........................................................................................................... 0
Rationale for Requirement R6 ................................................................................................................................. 0
Attachment 1: Technical Rationale for Reliability Standard CIP-004-6 .......................................................................... 0
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-7 | March 2021
ii
Preface
Electricity is a key component of the fabric of modern society and the Electric Reliability Organization (ERO) Enterprise
serves to strengthen that fabric. The vision for the ERO Enterprise, which is comprised of the North American Electric
Reliability Corporation (NERC) and the six Regional Entities (REs), is a highly reliable and secure North American bulk
power system (BPS). Our mission is to assure the effective and efficient reduction of risks to the reliability and security
of the grid.
Reliability | Resilience | Security
Because nearly 400 million citizens in North America are counting on us
The North American BPS is divided into six RE boundaries as shown in the map and corresponding table below. The
multicolored area denotes overlap as some load-serving entities participate in one Region while associated
Transmission Owners/Operators participate in another.
MRO
Midwest Reliability Organization
NPCC
Northeast Power Coordinating Council
RF
ReliabilityFirst
SERC
SERC Reliability Corporation
Texas RE
Texas Reliability Entity
WECC
Western Electricity Coordinating Council
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-7 | March 2021
iii
Introduction
This document explains the technical rationale and justification for the proposed Reliability Standard CIP-004-X. It
provides stakeholders and the ERO Enterprise with an understanding of the technology and technical requirements
in the Reliability Standard. It also contains information on the intent of the Standard Drafting Team (SDT) in drafting
the requirements. This Technical Rationale and Justification for CIP-004-X is not a Reliability Standard and should not
be considered mandatory and enforceable.
On July 24, 2019, the North American Electric Reliability Corporation (NERC) Standards Committee accepted a
Standard Authorization Request (SAR) approving and initiative to enhance BES reliability by creating increased choice,
greater flexibility, higher availability, and reduced‐cost options for entities to manage their BES Cyber System
Information, by providing a secure path towards utilization of modern third‐party data storage and analysis systems.
In addition, the project intended to clarify the protections expected when utilizing third‐party solutions (e.g., cloud
services).
In response to this SAR, the Project 2019-02 SDT modified Reliability Standard CIP-004-X to require Responsible
Entities to implement specific controls in Requirement R6 to authorize, verify, and revoke provisioned access to BES
Cyber System Information (BCSI).
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-7 | March 2021
iv
Requirement R1
General Considerations for Requirement R1
None
Rationale for Requirement R1
The security awareness program is intended to be an informational program, not a formal training program. It should
reinforce security practices to ensure that personnel maintain awareness of best practices for both physical and
electronic security to protect its BES Cyber Systems. The Responsible Entity is not required to provide records that
show each individual received or understood the information, but they must maintain documentation of the program
materials utilized in the form of posters, memos, and/or presentations.
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-X | March 2021
1
Requirement R2
General Considerations for Requirement R2
None
Rationale for Requirement R2
Training shall cover the policies, access controls, and procedures as developed for the BES Cyber Systems and include,
at a minimum, the required items appropriate to personnel roles and responsibilities from Table Requirement R2.
One new element in the training content is intended to encompass networking hardware and software and other
issues of electronic interconnectivity supporting the operation and control of BES Cyber Systems as per FERC Order
No. 706, Paragraph 434. Additionally, training should address the risk posed when connecting and using Transient
Cyber Assets (TCA) and Removable Media with BES Cyber Systems or within an Electronic Security Perimeter. As
noted in FERC Order No. 791, Paragraph 135, TCA and Removable Media have been the source of incidents where
malware was introduced into electric generation industrial control systems in real-world situations. Training on their
use is a key element in protecting BES Cyber Systems. This is not intended to provide technical training to individuals
supporting networking hardware and software, but educating system users of the cyber security risks associated with
the interconnectedness of these systems. The users, based on their function, role, or responsibility, should have a
basic understanding of which systems can be accessed from other systems and how the actions they take can affect
cyber security.
Each Responsible Entity shall ensure all personnel who are granted authorized electronic access and/or authorized
unescorted physical access to its BES Cyber Systems, including contractors and service vendors, complete cyber
security training prior to their being granted authorized access, except for CIP Exceptional Circumstances. To retain
the authorized accesses, individuals must complete the training at least one every 15 months.
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-X | March 2021
2
Requirement R3
General Considerations for Requirement R3
None
Rationale for Requirement R3
Each Responsible Entity shall ensure a personnel risk assessment is performed for all personnel who are granted
authorized electronic access and/or authorized unescorted physical access to its BES Cyber Systems, including
contractors and service vendors, prior to their being granted authorized access, except for program specified
exceptional circumstances that are approved by the single senior management official or their delegate and impact
the reliability of the BES or emergency response. Identity should be confirmed in accordance with federal, state,
provincial, and local laws, and subject to existing collective bargaining unit agreements. Identity only needs to be
confirmed prior to initially granting access and only requires periodic confirmation according to the entity’s process
during the tenure of employment, which may or may not be the same as the initial verification action.
A seven year criminal history check should be performed for those locations where the individual has resided for at
least six consecutive months. This check should also be performed in accordance with federal, state, provincial, and
local laws, and subject to existing collective bargaining unit agreements. When it is not possible to perform a full
seven year criminal history check, documentation must be made of what criminal history check was performed, and
the reasons a full seven-year check could not be performed. Examples of this could include individuals under the age
of 25 where a juvenile criminal history may be protected by law, individuals who may have resided in locations from
where it is not possible to obtain a criminal history records check, violates the law or is not allowed under the existing
collective bargaining agreement. The Responsible Entity should consider the absence of information for the full seven
years when assessing the risk of granting access during the process to evaluate the criminal history check. There
needs to be a personnel risk assessment that has been completed within the last seven years for each individual with
access. A new criminal history records check must be performed as part of the new personnel risk assessment (PRA).
Individuals who have been granted access under a previous version of these standards need a new PRA within seven
years of the date of their last PRA. The clarifications around the seven year criminal history check in this version do
not require a new PRA be performed by the implementation date.
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-X | March 2021
3
Requirement R4
General Considerations for Requirement R4
None
Rationale for Requirement R4
Authorization for electronic and unescorted physical access must be on the basis of necessity in the individual
performing a work function. Documentation showing the authorization should have some justification of the business
need included.
This requirement specifies both quarterly reviews and reviews at least once every 15 calendar months. Quarterly
reviews are to perform a validation that only authorized users have been granted access to BES Cyber Systems. The
focus of this requirement is on the integrity of provisioning access rather than individual accounts on all BES Cyber
Assets.
The privilege review at least once every 15 calendar months is more detailed to ensure an individual’s associated
privileges are the minimum necessary to perform their work function.
If the results of quarterly or at least once every 15 calendar months account reviews indicate an administrative or
clerical error in which access was not actually provisioned, then the SDT intends that this error should not be
considered a violation of this requirement.
For BES Cyber Systems that do not have user accounts defined, the controls listed in Requirement R4 are not
applicable. However, the Responsible Entity should document such configurations.
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-X | March 2021
4
Requirement R5
General Considerations for Requirement R5
None
Rationale for Requirement R5
Revocation of electronic access should be understood to mean a process with the end result that electronic access
to BES Cyber Systems is no longer possible using credentials assigned to or known by the individual(s) whose access
privileges are being revoked.
The initial revocation required in Requirement R5 Part 5.1 includes unescorted physical access and Interactive
Remote Access. These two actions should prevent any further access by the individual after termination. If an
individual still has local access accounts (i.e., accounts on the Cyber Asset itself) on BES Cyber Assets, then the
Responsible Entity has 30 days to complete the revocation process for those accounts. However, nothing prevents a
Responsible Entity from performing all of the access revocation at the time of termination.
Revocation of access to shared accounts is called out separately to prevent the situation where passwords on
substation and generation devices are constantly changed due to staff turnover.
Requirement R5 Part 5.5 specified that passwords for shared account are to be changed within 30 calendar days of
the termination action or when the Responsible Entity determines an individual no longer requires access to the
account as a result of a reassignment or transfer. The 30 days applies under normal operating conditions. However,
circumstances may occur where this is not possible. Some systems may require an outage or reboot of the system in
order to complete the password change. In periods of extreme heat or cold, many Responsible Entities may prohibit
system outages and reboots in order to maintain reliability of the Bulk Electric System. When these circumstances
occur, the Responsible Entity must document these circumstances and prepare to change the password within 10
calendar days following the end of the operating circumstances. Records of activities must be retained to show that
the Responsible Entity followed the plan they created.
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-X | March 2021
5
Requirement R6
General Considerations for Requirement R6
None
Rationale for Requirement R6
Requirement R6 requires Responsible Entities to implement a BES Cyber System Information (BCSI) access
management program to ensure that provisioned access to BCSI is authorized, verified, and promptly revoked.
Authorization ensures only individuals who have a need are authorized for provisioned access to BCSI. Prompt
revocation of terminated individuals’ ability to access BCSI helps prevent inappropriate disclosure or use of BCSI.
Periodic verification ensures that what is currently provisioned is authorized and still required, and allows the
Responsible Entity the opportunity to correct any errors in provisioning.
The change to “provisioned access” instead of “designated storage locations” enables the use of third-party solutions
(e.g., cloud services) for BCSI. The concept of “designated storage locations” is too prescriptive and limiting for
entities that want to implement file-level rights and permissions (i.e., policy based credentials or encryption keys that
follow the file and the provisioned individual), which provide BCSI access controls regardless of storage location. The
concept of provisioned access provides the needed flexibility for entities to use other technologies and approaches
instead of or in addition to storage locations as a way to meet the access management requirements for BCSI,
especially that which is stored in third-party cloud solutions or is protected at the information/file level no matter
where it is located.
According to Requirement R6, Part 6.1, the Responsible Entity must authorize individuals to be given provisioned
access to BCSI. First, the Responsible Entity determines who needs the ability to obtain and use BCSI for performing
legitimate work functions. Next, a person empowered by the Responsible Entity to do so authorizes—gives
permission or approval for—those individuals to be given provisioned access to BCSI. Only then would the
Responsible Entity provision access to BCSI as authorized.
Provisioned access is to be considered the result of specific actions taken to provide an individual the means to access
BCSI (e.g., physical keys or access cards, user accounts and associated rights and privileges, encryption keys, etc.). In
the context of this requirement, an individual is considered to have been provisioned access if they concurrently have
the means to both obtain and use the BCSI. To illustrate, an individual who can obtain encrypted BCSI but does not
have the encryption keys to be able to use the BCSI has not been provisioned access to the BCSI.
For BCSI in physical format, physical access is provisioned to a physical storage location designated for BCSI and for
which access can be provisioned, such as a lockable file cabinet. For BCSI in electronic format, electronic access is
provisioned to an electronic system or its contents, or to individual files. Provisioned physical access alone to a
physical location housing hardware that contains electronic BCSI is not considered to be provisioned access to the
electronic BCSI. Take, for instance, storing BCSI with a cloud service provider. In this case, the cloud service provider’s
personnel with physical access to the data center is not, by itself, considered provisioned access to the electronic
BCSI stored on servers in that data center, as the personnel would also need to be provisioned electronic access to
the servers or system. In scenarios like this, the Responsible Entity should implement appropriate information
protection controls to help prevent unauthorized access to BCSI per its information protection program, as required
in CIP-011-X. The subparts in Requirement R6, Part 6.1 were written to reinforce this concept and clarify access
management requirements.
The periodic verification required by Requirement R6 Part 6.2 is to ensure that only authorized individuals have been
provisioned access to BCSI and that what is provisioned is what each individual currently needs to perform work
functions. For example, by performing the verification, the Responsible Entity might identify individuals who have
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-7 | August 2020
0
Requirement R6
changed jobs and no longer have a need for provisioned access to BCSI, and would therefore revoke provisioned
access.
For Requirement R6 Part 6.3, removal of an individual’s ability to use provisioned access to BCSI is considered to
mean a process with the result that electronic access to electronic BCSI and physical access to physical BCSI is no
longer possible from that point in time onwards using the means the individual had been given to obtain and use
BCSI in those circumstances. Either what was specifically provisioned to give an individual access to BCSI (e.g., keys,
local user or database accounts and associated privileges, etc.) is taken away, deleted, disabled, revoked, etc. (also
known as “deprovisioning”), or some primary access is removed which prevents the individual from using the
specifically provisioned means. Requirement R6 Part 6.3 acknowledges that where removing unescorted physical
access and Interactive Remote Access, such as is required in Requirement R5 Part 5.1, prevents any further access to
BCSI by the individual after termination, then this would constitute removal of an individual’s ability to use
provisioned access to BCSI. Access can only be revoked or removed where access has been provisioned. The intent is
not to have to retrieve individual pieces of BCSI (e.g., documents) that might be in someone’s possession (although
you should if you can, but the individual cannot un-see what they have already seen).
Where no specific mechanisms are available or feasible for provisioning access to BCSI, these requirements are not
applicable. For example, there is no available or feasible mechanism to provision access in instances when an
individual is merely given, views, or might see BCSI, such as when the individual is handed a piece of paper during a
meeting or sees a whiteboard in a conference room. Likewise, these requirements are not applicable where
provisioned electronic or physical access is not specifically intended to provide an individual the means to obtain and
use BCSI. There will likely be no specific provisioning of access to BCSI on work stations, laptops, flash drives, portable
equipment, offices, vehicles, etc., especially when BCSI is only temporarily or incidentally located or stored there.
Another example is the provisioning of access to a substation, the intent of which is to enable an individual to gain
access to the substation to perform substation-related work tasks, not to access BCSI that may be located there.
However, BCSI in these locations and situations still needs to be protected against unauthorized access per the
Responsible Entity’s information protection program as required by CIP-011-X.
The change to “provisioned access” to BCSI is backwards compatible with the previous “designated storage locations”
concept. Entities have likely designated only those storage locations to which access can be provisioned, rather than
any location where BCSI might be found. Both concepts intend to exclude those locations where BCSI is temporarily
stored, as explained in the previous paragraph. Provisioned access, like designated storage locations, maintains the
scope to a finite and discrete object that is manageable and auditable, rather than trying to manage access to
individual pieces of information. The removal of the term “designated storage location” does not preclude an entity
from defining storage locations for the entity’s access management program for authorization, verification, and
revocation of access to BCSI.
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-X | March 2021
1
Attachment 1: Technical Rationale for Reliability Standard CIP-004-6
This section contains a “cut and paste” of the Technical Rationale components of the former Guidelines and Technical
Basis (GTB) as-is of from CIP-004-6 standard to preserve any historical references. Similarly, former GTB content
providing compliance guidance can be found in a separate Implementation Guidance document for this standard.
Section 4 – Scope of Applicability of the CIP Cyber Security Standards
Section “4. Applicability” of the standards provides important information for Responsible Entities to determine the
scope of the applicability of the CIP Cyber Security Requirements.
Section “4.1. Functional Entities” is a list of NERC functional entities to which the standard applies. If the entity is
registered as one or more of the functional entities listed in Section 4.1, then the NERC CIP Cyber Security Standards
apply. Note that there is a qualification in Section 4.1 that restricts the applicability in the case of Distribution
Providers to only those that own certain types of systems and equipment listed in 4.2.
Section “4.2. Facilities” defines the scope of the Facilities, systems, and equipment owned by the Responsible Entity,
as qualified in Section 4.1, that is subject to the requirements of the standard. As specified in the exemption section
4.2.3.5, this standard does not apply to Responsible Entities that do not have High Impact or Medium Impact BES
Cyber Systems under CIP-002-5.1’s categorization. In addition to the set of BES Facilities, Control Centers, and other
systems and equipment, the list includes the set of systems and equipment owned by Distribution Providers. While
the NERC Glossary term “Facilities” already includes the BES characteristic, the additional use of the term BES here is
meant to reinforce the scope of applicability of these Facilities where it is used, especially in this applicability scoping
section. This in effect sets the scope of Facilities, systems, and equipment that is subject to the standards.
Requirement R1:
The security awareness program is intended to be an informational program, not a formal training program. It
should reinforce security practices to ensure that personnel maintain awareness of best practices for both physical
and electronic security to protect its BES Cyber Systems. The Responsible Entity is not required to provide records
that show that each individual received or understood the information, but they must maintain documentation of
the program materials utilized in the form of posters, memos, and/or presentations.
Requirement R2:
Training shall cover the policies, access controls, and procedures as developed for the BES Cyber Systems and
include, at a minimum, the required items appropriate to personnel roles and responsibilities from Table R2.
One new element in the training content is intended to encompass networking hardware and software and other
issues of electronic interconnectivity supporting the operation and control of BES Cyber Systems as per FERC Order
No. 706, Paragraph 434. Additionally, training should address the risk posed when connecting and using Transient
Cyber Assets and Removable Media with BES Cyber Systems or within an Electronic Security Perimeter. As noted in
FERC Order No. 791, Paragraph 135, Transient Cyber Assets and Removable Media have been the source of
incidents where malware was introduced into electric generation industrial control systems in real-world situations.
Training on their use is a key element in protecting BES Cyber Systems. This is not intended to provide technical
training to individuals supporting networking hardware and software, but educating system users of the cyber
security risks associated with the interconnectedness of these systems. The users, based on their function, role, or
responsibility, should have a basic understanding of which systems can be accessed from other systems and how
the actions they take can affect cyber security.
Each Responsible Entity shall ensure all personnel who are granted authorized electronic access and/or authorized
unescorted physical access to its BES Cyber Systems, including contractors and service vendors, complete cyber
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-7 | August 2020
0
Attachment 1: Technical Rationale for Reliability Standard CIP-004-6
security training prior to their being granted authorized access, except for CIP Exceptional Circumstances. To retain
the authorized accesses, individuals must complete the training at least one every 15 months.
Requirement R3:
Each Responsible Entity shall ensure a personnel risk assessment is performed for all personnel who are granted
authorized electronic access and/or authorized unescorted physical access to its BES Cyber Systems, including
contractors and service vendors, prior to their being granted authorized access, except for program specified
exceptional circumstances that are approved by the single senior management official or their delegate and impact
the reliability of the BES or emergency response.
Identity only needs to be confirmed prior to initially granting access and only requires periodic confirmation
according to the entity’s process during the tenure of employment, which may or may not be the same as the initial
verification action.
A seven year criminal history check should be performed for those locations where the individual has resided for at
least six consecutive months. This check should also be performed in accordance with federal, state, provincial, and
local laws, and subject to existing collective bargaining unit agreements. When it is not possible to perform a full
seven year criminal history check, documentation must be made of what criminal history check was performed, and
the reasons a full seven-year check could not be performed.
There needs to be a personnel risk assessment that has been completed within the last seven years for each
individual with access. A new criminal history records check must be performed as part of the new PRA. Individuals
who have been granted access under a previous version of these standards need a new PRA within seven years of
the date of their last PRA. The clarifications around the seven year criminal history check in this version do not
require a new PRA be performed by the implementation date.
Requirement R4:
Authorization for electronic and unescorted physical access and access to BES Cyber System Information must be
on the basis of necessity in the individual performing a work function. Documentation showing the authorization
should have some justification of the business need included. To ensure proper segregation of duties, access
authorization and provisioning should not be performed by the same person where possible.
This requirement specifies both quarterly reviews and reviews at least once every 15 calendar months. Quarterly
reviews are to perform a validation that only authorized users have been granted access to BES Cyber Systems. The
focus of this requirement is on the integrity of provisioning access rather than individual accounts on all BES Cyber
Assets.
The privilege review at least once every 15 calendar months is more detailed to ensure an individual’s associated
privileges are the minimum necessary to perform their work function.
An example timeline of all the reviews in Requirement R4 is included below.
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-X | March 2021
1
Attachment 1: Technical Rationale for Reliability Standard CIP-004-6
1/1
1) Quarterly access review
2) privilege review (at least once every
15 calendar months)
3) BES Cyber
System Information
review (at least once every
4/1
15 calendar months)
Quarterly access review
2/1
3/1
4/1
7/1
Quarterly access review
5/1
6/1
7/1
1/1
1) Quarterly access review
2) privilege review
(at least once every
15 calendar months)
3) BES Cyber System
Information review
(at least once every
15 calendar months)
10/1
Quarterly access review
8/1
9/1
10/1
11/1
12/1
1/1
1/1
If the results of quarterly or at least once every 15 calendar months account reviews indicate an administrative or
clerical error in which access was not actually provisioned, then the SDT intends that this error should not be
considered a violation of this requirement.
For BES Cyber Systems that do not have user accounts defined, the controls listed in Requirement R4 are not
applicable. However, the Responsible Entity should document such configurations.
Requirement R5:
The requirement to revoke access at the time of the termination action includes procedures showing revocation of
access concurrent with the termination action. This requirement recognizes that the timing of the termination action
may vary depending on the circumstance.
Revocation of electronic access should be understood to mean a process with the end result that electronic access
to BES Cyber Systems is no longer possible using credentials assigned to or known by the individual(s) whose access
privileges are being revoked.
The initial revocation required in Requirement R5.1 includes unescorted physical access and Interactive Remote
Access. These two actions should prevent any further access by the individual after termination. If an individual still
has local access accounts (i.e., accounts on the Cyber Asset itself) on BES Cyber Assets, then the Responsible Entity
has 30 days to complete the revocation process for those accounts.
Revocation of access to shared accounts is called out separately to prevent the situation where passwords on
substation and generation devices are constantly changed due to staff turnover.
Requirement 5.5 specified that passwords for shared account are to the changed within 30 calendar days of the
termination action or when the Responsible Entity determines an individual no longer requires access to the account
as a result of a reassignment or transfer. The 30 days applies under normal operating conditions. However,
circumstances may occur where this is not possible. Some systems may require an outage or reboot of the system in
order to complete the password change. In periods of extreme heat or cold, many Responsible Entities may prohibit
system outages and reboots in order to maintain reliability of the BES. When these circumstances occur, the
Responsible Entity must document these circumstances and prepare to change the password within 10 calendar days
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-X | March 2021
2
Attachment 1: Technical Rationale for Reliability Standard CIP-004-6
following the end of the operating circumstances. Records of activities must be retained to show that the Responsible
Entity followed the plan they created.
Rationale:
During development of this standard, text boxes were embedded within the standard to explain the rationale for
various parts of the standard. Upon BOT approval, the text from the rationale text boxes was moved to this section.
Rationale for Requirement R1:
Ensures that Responsible Entities with personnel who have authorized electronic or authorized unescorted physical
access to BES Cyber Assets take action so that those personnel with such authorized electronic or authorized
unescorted physical access maintain awareness of the Responsible Entity’s security practices.
Rationale for Requirement R2:
To ensure that the Responsible Entity’s training program for personnel who need authorized electronic access and/or
authorized unescorted physical access to BES Cyber Systems covers the proper policies, access controls, and
procedures to protect BES Cyber Systems and are trained before access is authorized.
Rationale for Requirement R3:
To ensure that individuals who need authorized electronic or authorized unescorted physical access to BES Cyber
Systems have been assessed for risk. Whether initial access or maintaining access, those with access must have had
a personnel risk assessment completed within the last 7 years.
Rationale for Requirement R4:
To ensure that individuals with access to BES Cyber Systems and the physical and electronic locations where BES
Cyber System Information is stored by the Responsible Entity have been properly authorized for such access.
“Authorization” should be considered to be a grant of permission by a person or persons empowered by the
Responsible Entity to perform such grants and included in the delegations referenced in CIP-003-6. “Provisioning”
should be considered the actions to provide access to an individual.
Access is physical, logical, and remote permissions granted to Cyber Assets composing the BES Cyber System or
allowing access to the BES Cyber System. When granting, reviewing, or revoking access, the Responsible Entity must
address the Cyber Asset specifically as well as the systems used to enable such access (i.e., physical access control
system, remote access system, directory services).
CIP Exceptional Circumstances are defined in a Responsible Entity’s policy from CIP-003-6 and allow an exception to
the requirement for authorization to BES Cyber Systems and BES Cyber System Information.
Quarterly reviews in Part 4.5 are to perform a validation that only authorized users have been granted access to BES
Cyber Systems. This is achieved by comparing individuals actually provisioned to a BES Cyber System against records
of individuals authorized to access the BES Cyber System. The focus of this requirement is on the integrity of
provisioning access rather than individual accounts on all BES Cyber Assets.
If the results of quarterly or annual account reviews indicate an administrative or clerical error in which access was
not actually provisioned, then the SDT intends that the error should not be considered a violation of this requirement.
For BES Cyber Systems that do not have user accounts defined, the controls listed in Requirement R4 are not
applicable. However, the Responsible Entity should document such configurations.
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-X | March 2021
3
Attachment 1: Technical Rationale for Reliability Standard CIP-004-6
Rationale for Requirement R5:
The timely revocation of electronic access to BES Cyber Systems is an essential element of an access management
regime. When an individual no longer requires access to a BES Cyber System to perform his or her assigned functions,
that access should be revoked. This is of particular importance in situations where a change of assignment or
employment is involuntary, as there is a risk the individual(s) involved will react in a hostile or destructive manner.
In considering how to address directives in FERC Order No. 706 directing “immediate” revocation of access for
involuntary separation, the SDT chose not to specify hourly time parameters in the requirement (e.g., revoking access
within 1 hour). The point in time at which an organization terminates a person cannot generally be determined down
to the hour. However, most organizations have formal termination processes, and the timeliest revocation of access
occurs in concurrence with the initial processes of termination.
Access is physical, logical, and remote permissions granted to Cyber Assets composing the BES Cyber System or
allowing access to the BES Cyber System. When granting, reviewing, or revoking access, the Responsible Entity must
address the Cyber Asset specifically as well as the systems used to enable such access (e.g., physical access control
system, remote access system, directory services).
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-X | March 2021
4
Cyber Security —
Information Protection
Technical Rationale and Justification for
Reliability Standard CIP-011-X
March 2021
RELIABILITY | RESILIENCE | SECURITY
NERC | Report Title | Report Date
I
Table of Contents
Preface ........................................................................................................................................................................... iii
Introduction ................................................................................................................................................................... iv
Background ................................................................................................................................................................. iv
Requirement R1 .............................................................................................................................................................. 5
General Considerations for Requirement R1 .............................................................................................................. 5
Rationale for Modifications to Requirement R1:..................................................................................................... 5
Requirement R2 .............................................................................................................................................................. 6
General Considerations for Requirement R2 .............................................................................................................. 6
Rationale for Requirement R2: ................................................................................................................................ 6
Attachment 1: Technical Rationale for Reliability Standard CIP-011-2 .......................................................................... 7
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-X | March 2021
ii
Preface
Electricity is a key component of the fabric of modern society and the Electric Reliability Organization (ERO) Enterprise
serves to strengthen that fabric. The vision for the ERO Enterprise, which is comprised of the North American Electric
Reliability Corporation (NERC) and the six Regional Entities (REs), is a highly reliable and secure North American bulk
power system (BPS). Our mission is to assure the effective and efficient reduction of risks to the reliability and security
of the grid.
Reliability | Resilience | Security
Because nearly 400 million citizens in North America are counting on us
The North American BPS is divided into six RE boundaries as shown in the map and corresponding table below. The
multicolored area denotes overlap as some load-serving entities participate in one Region while associated
Transmission Owners/Operators participate in another.
MRO
Midwest Reliability Organization
NPCC
Northeast Power Coordinating Council
RF
ReliabilityFirst
SERC
SERC Reliability Corporation
Texas RE
Texas Reliability Entity
WECC
Western Electricity Coordinating Council
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-X | March 2021
iii
Introduction
Background
This document explains the technical rationale and justification for the proposed Reliability Standard CIP-011-X. It
provides stakeholders and the ERO Enterprise with an understanding of the technology and technical requirements
in the Reliability Standard. It also contains information on the standard drafting team’s (SDT’s) intent in drafting the
requirements. This Technical Rationale and Justification for CIP-011-X is not a Reliability Standard and should not be
considered mandatory and enforceable.
On July 24, 2019, the North American Electric Reliability Corporation (NERC) Standards Committee accepted a
Standard Authorization Request (SAR) approving an initiative to enhance BES reliability by creating increased
choice, greater flexibility, higher availability, and reduced‐cost options for entities to manage their BES Cyber
System Information (BCSI), by providing a secure path towards utilization of modern third‐party data storage and
analysis systems. In addition, the project intended to clarify the protections expected when utilizing third‐party
solutions (e.g., cloud services).
In response to this SAR, the Project 2019-02 SDT drafted Reliability Standard CIP-011-X to require Responsible Entities
to implement specific methods in Requirement R1 for administrative, technical, and physical controls related to BCSI
during storage, handling and use including when utilizing vendor provided cloud services such as Software as a Service
(SaaS), Infrastructure as a Service (IaaS), or Platform as a Service (PaaS).
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-X | March 2021
iv
Requirement R1
General Considerations for Requirement R1
None
Rationale for Modifications to Requirement R1:
Requirement R1 still specifies the need to implement one or more documented information protection program(s).
The SDT does not intend that this requirement cover publicly available information, such as vendor manuals or
information that is deemed to be publicly releasable. Information protection pertains to both digital and hardcopy
information.
The SDT clarified the intent of protecting BCSI as opposed to protecting the BES Cyber System(s) and associated
applicable systems which may contain BCSI. This was achieved by modifying the parent CIP-011-X R1 requirement
language to include “for BES Cyber System Information (BCSI) pertaining to Applicable Systems”.
Rationale for Modifications to Requirement R1, Part 1.1
Requirement R1, Part 1.1, is an objective level requirement focused on identifying BES Cyber System Information
(BCSI). The intent of the SDT was to simplify the requirement language from CIP-011-2 Part 1.1.
Rationale for Modifications to Requirement R1, Part 1.2
Requirement R1, Part 1.2, is an objective level requirement focused on protecting and securely handling
BES Cyber System Information (BCSI) in order to mitigate risks of compromising confidentiality. The
reference to different states of information such as “transit” or “storage” or “use” was removed. The
intent is to reduce confusion of Responsible Entities attempting to interpret controls specific to different
states of information, limiting controls to said states, overlapping controls between states, and reduce
confusion from an enforcement perspective. By removing this language, methods to protect BCSI
becomes explicitly comprehensive.
Requirement language revisions reflect consistency with other CIP requirements.
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-X | March 2021
5
Requirement R2
General Considerations for Requirement R2
None
Rationale for Requirement R2:
The intent of the BES Cyber Asset reuse and disposal process is to prevent the unauthorized dissemination of BCSI
upon reuse or disposal.
This requirement allows for BES Cyber Systems to be removed from service and analyzed with their media intact, as
that should not constitute a release for reuse.
The justification for this requirement is pre-existing from previous versions of CIP and is also documented in FERC
Order No. 706 and its associated Notice of Proposed Rulemaking.
Requirement 2 has remained unchanged. The requirements are focused more on the reuse and disposal of BCS rather
than BCSI. While acknowledging that such BCS and other applicable systems may have BCSI residing on them, the
original intent of the requirement is broader than addressing BCSI. This is a lifecycle issue concerning the applicable
systems. CIP-002 focuses on the beginning of the BCS lifecycle but not an end. The potential end of the applicable
systems lifecycle is absent from CIP-011 to reduce confusion with reuse and disposal of BCSI. The 2019 BCSI Access
Management project did not include modification of CIP-002 in the scope of the SAR. This concern has been
communicated for future evaluation.
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-X | March 2021
6
Attachment 1: Technical Rationale for Reliability Standard CIP-011-2
This section contains a “cut and paste” of the Technical Rationale components of the former Guidelines and Technical
Basis (GTB) as-is of from CIP-011-2 standard to preserve any historical references. Similarly, former GTB content
providing compliance guidance can be found in a separate Implementation Guidance document for this standard.
Section 4 – Scope of Applicability of the CIP Cyber Security Standards
Section “4. Applicability” of the standards provides important information for Responsible Entities to determine the
scope of the applicability of the CIP Cyber Security Requirements.
Section “4.1. Functional Entities” is a list of NERC functional entities to which the standard applies. If the entity is
registered as one or more of the functional entities listed in Section 4.1, then the NERC CIP Cyber Security Standards
apply. Note that there is a qualification in Section 4.1 that restricts the applicability in the case of Distribution
Providers to only those that own certain types of systems and equipment listed in 4.2.
Section “4.2. Facilities” defines the scope of the Facilities, systems, and equipment owned by the Responsible Entity,
as qualified in Section 4.1, that is subject to the requirements of the standard. As specified in the exemption section
4.2.3.5, this standard does not apply to Responsible Entities that do not have High Impact or Medium Impact BES
Cyber Systems under CIP-002-5.1’s categorization. In addition to the set of BES Facilities, Control Centers, and other
systems and equipment, the list includes the set of systems and equipment owned by Distribution Providers. While
the NERC Glossary term “Facilities” already includes the BES characteristic, the additional use of the term BES here is
meant to reinforce the scope of applicability of these Facilities where it is used, especially in this applicability scoping
section. This in effect sets the scope of Facilities, systems, and equipment that is subject to the standards.
Requirement R1:
Responsible Entities are free to utilize existing change management and asset management systems.
However, the information contained within those systems must be evaluated, as the information protection
requirements still apply.
The justification for this requirement is pre-existing from previous versions of CIP and is also documented in FERC
Order No. 706 and its associated Notice of Proposed Rulemaking.
This requirement mandates that BES Cyber System Information be identified. The Responsible Entity has flexibility in
determining how to implement the requirement. The Responsible Entity should explain the method for identifying
the BES Cyber System Information in their information protection program. For example, the Responsible Entity may
decide to mark or label the documents. Identifying separate classifications of BES Cyber System Information is not
specifically required. However, a Responsible Entity maintains the flexibility to do so if they desire. As long as the
Responsible Entity’s information protection program includes all applicable items, additional classification levels (e.g.,
confidential, public, internal use only, etc.) can be created that go above and beyond the requirements. If the entity
chooses to use classifications, then the types of classifications used by the entity and any associated labeling should
be documented in the entity’s BES Cyber System Information Program.
The Responsible Entity may store all of the information about BES Cyber Systems in a separate repository or location
(physical and/or electronic) with access control implemented. For example, the Responsible Entity’s program could
document that all information stored in an identified repository is considered BES Cyber System Information, the
program may state that all information contained in an identified section of a specific repository is considered BES
Cyber System Information, or the program may document that all hard copies of information are stored in a secured
area of the building. Additional methods for implementing the requirement are suggested in the measures section.
However, the methods listed in measures are not meant to be an exhaustive list of methods that the entity may
choose to utilize for the identification of BES Cyber System Information.
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-X | March 2021
7
The SDT does not intend that this requirement cover publicly available information, such as vendor manuals that are
available via public websites or information that is deemed to be publicly releasable. Information protection pertains
to both digital and hardcopy information. Requirement R1 Part 1.2 requires one or more procedures for the
protection and secure handling BES Cyber System Information, including storage, transit, and use. This includes
information that may be stored on Transient Cyber Assets or Removable Media.
The entity’s written Information Protection Program should explain how the entity handles aspects of information
protection including specifying how BES Cyber System Information is to be securely handled during transit in order
to protect against unauthorized access, misuse, or corruption and to protect confidentiality of the communicated BES
Cyber System Information. For example, the use of a third-party communication service provider instead of
organization-owned infrastructure may warrant the use of encryption to prevent unauthorized disclosure of
information during transmission. The entity may choose to establish a trusted communications path for transit of BES
Cyber System Information. The trusted communications path would utilize a logon or other security measures to
provide secure handling during transit. The entity may employ alternative physical protective measures, such as the
use of a courier or locked container for transmission of information. It is not the intent of this standard to mandate
the use of one particular format for secure handling during transit.
A good Information Protection Program will document the circumstances under which BES Cyber System
Information can be shared with or used by third parties. The organization should distribute or share information on
a need-to-know basis. For example, the entity may specify that a confidentiality agreement, non-disclosure
arrangement, contract, or written agreement of some kind concerning the handling of information must be in place
between the entity and the third party. The entity’s Information Protection Program should specify circumstances for
sharing of BES Cyber System Information with and use by third parties, for example, use of a non-disclosure
agreement. The entity should then follow their documented program. These requirements do not mandate one
specific type of arrangement.
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-X | March 2021
8
Technical Rationale for Reliability Standard CIP-011-2
Requirement R2:
This requirement allows for BES Cyber Systems to be removed from service and analyzed with their media intact, as
that should not constitute a release for reuse. However, following the analysis, if the media is to be reused outside
of a BES Cyber System or disposed of, the entity must take action to prevent the unauthorized retrieval of BES Cyber
System Information from the media.
The justification for this requirement is pre-existing from previous versions of CIP and is also documented in FERC
Order No. 706 and its associated Notice of Proposed Rulemaking.
If an applicable Cyber Asset is removed from the Physical Security Perimeter prior to action taken to prevent the
unauthorized retrieval of BES Cyber System Information or destroying the data storage media, the Responsible Entity
should maintain documentation that identifies the custodian for the data storage media while the data storage media
is outside of the Physical Security Perimeter prior to actions taken by the entity as required in Requirement R2.
Media sanitization is the process used to remove information from system media such that reasonable assurance
exists that the information cannot be retrieved or reconstructed. Media sanitization is generally classified into four
categories: Disposal, clearing, purging, and destroying. For the purposes of this requirement, disposal by itself, with
the exception of certain special circumstances, such as the use of strong encryption on a drive used in a SAN or other
media, should never be considered acceptable. The use of clearing techniques may provide a suitable method of
sanitization for media that is to be reused, whereas purging techniques may be more appropriate for media that is
ready for disposal. The following information from NIST SP800-88 provides additional guidance concerning the types
of actions that an entity might take to prevent the unauthorized retrieval of BES Cyber System Information from the
Cyber Asset data storage media:
Clear: One method to sanitize media is to use software or hardware products to overwrite storage space on
the media with non-sensitive data. This process may include overwriting not only the logical storage location
of a file(s) (e.g., file allocation table) but also may include all addressable locations. The security goal of the
overwriting process is to replace written data with random data. Overwriting cannot be used for media that
are damaged or not rewriteable. The media type and size may also influence whether overwriting is a suitable
sanitization method [SP 800-36].
Purge: Degaussing and executing the firmware Secure Erase command (for ATA drives only) are acceptable
methods for purging. Degaussing is exposing the magnetic media to a strong magnetic field in order to disrupt
the recorded magnetic domains. A degausser is a device that generates a magnetic field used to sanitize
magnetic media. Degaussers are rated based on the type (i.e., low energy or high energy) of magnetic media
they can purge. Degaussers operate using either a strong permanent magnet or an electromagnetic coil.
Degaussing can be an effective method for purging damaged or inoperative media, for purging media with
exceptionally large storage capacities, or for quickly purging diskettes. [SP 800-36] Executing the firmware
Secure Erase command (for ATA drives only) and degaussing are examples of acceptable methods for purging.
Degaussing of any hard drive assembly usually destroys the drive as the firmware that manages the device is
also destroyed.
Destroy: There are many different types, techniques, and procedures for media destruction. Disintegration,
Pulverization, Melting, and Incineration are sanitization methods designed to completely destroy the media.
They are typically carried out at an outsourced metal destruction or licensed incineration facility with the
specific capabilities to perform these activities effectively, securely, and safely. Optical mass storage media,
including compact disks (CD, CDRW, CD-R, CD-ROM), optical disks (DVD), and MO disks, must be destroyed
by pulverizing, crosscut shredding or burning. In some cases such as networking equipment, it may be
necessary to contact the manufacturer for proper sanitization procedure.
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-X | March 2021
9
It is critical that an organization maintain a record of its sanitization actions to prevent unauthorized retrieval of BES
Cyber System Information. Entities are strongly encouraged to review NIST SP800-88 for guidance on how to develop
acceptable media sanitization processes.
Rationale:
During development of this standard, text boxes were embedded within the standard to explain the rationale for
various parts of the standard. Upon Board of Trustees approval, the text from the rationale text boxes was moved
to this section.
Rationale for Requirement R1:
The SDT’s intent of the information protection program is to prevent unauthorized access to BES Cyber System
Information.
Rationale for Requirement R2:
The intent of the BES Cyber Asset reuse and disposal process is to prevent the unauthorized dissemination of BES
Cyber System Information upon reuse or disposal.
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-X | March 2021
10
DRAFT
Cyber Security —
Personnel & Training
Implementation Guidance for Reliability Standard
CIP-004-X
March 2021
RELIABILITY | RESILIENCE | SECURITY
NERC | Report Title | Report Date
I
Table of Contents
Preface ........................................................................................................................................................................... iii
Introduction ................................................................................................................................................................... iv
Requirement R1 .............................................................................................................................................................. 1
General Considerations for Requirement R1 .............................................................................................................. 1
Implementation Guidance for R1 ................................................................................................................................ 1
Requirement R2 .............................................................................................................................................................. 2
General Considerations for Requirement R2 .............................................................................................................. 2
Implementation Guidance for R2 ................................................................................................................................ 2
Requirement R3 .............................................................................................................................................................. 3
General Considerations for Requirement R3 .............................................................................................................. 3
Implementation Guidance for R3 ................................................................................................................................ 3
Requirement R4 .............................................................................................................................................................. 4
General Considerations for Requirement R4 .............................................................................................................. 4
Implementation Guidance for R4 ................................................................................................................................ 4
Requirement R5 .............................................................................................................................................................. 5
General Considerations for Requirement R5 .............................................................................................................. 5
Implementation Guidance for R5 ................................................................................................................................ 5
Requirement R6 .............................................................................................................................................................. 0
General Considerations for Requirement R6 .............................................................................................................. 0
Implementation Guidance for R6 ................................................................................................................................ 0
Apendix 1: Implementation Guidance for CIP-004-6 ...................................................................................................... 2
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
ii
Preface
Electricity is a key component of the fabric of modern society and the Electric Reliability Organization (ERO) Enterprise
serves to strengthen that fabric. The vision for the ERO Enterprise, which is comprised of the North American Electric
Reliability Corporation (NERC) and the six Regional Entities (REs), is a highly reliable and secure North American bulk
power system (BPS). Our mission is to assure the effective and efficient reduction of risks to the reliability and security
of the grid.
Reliability | Resilience | Security
Because nearly 400 million citizens in North America are counting on us
The North American BPS is divided into six RE boundaries as shown in the map and corresponding table below. The
multicolored area denotes overlap as some load-serving entities participate in one Region while associated
Transmission Owners/Operators participate in another.
MRO
Midwest Reliability Organization
NPCC
Northeast Power Coordinating Council
RF
ReliabilityFirst
SERC
SERC Reliability Corporation
Texas RE
Texas Reliability Entity
WECC
Western Electricity Coordinating Council
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
iii
Introduction
This Implementation Guidance was prepared to provide example approaches for compliance with CIP-004-X.
Implementation Guidance does not prescribe the only approach but highlights one or more approaches that could be
effective in achieving compliance with the standard. Because Implementation Guidance only provides examples,
entities may choose alternative approaches that better fit their individual situations. 1 This Implementation Guidance
for CIP-004-X is not a Reliability Standard and should not be considered mandatory and enforceable.
Responsible entities may find it useful to consider this Implementation Guidance document along with the
additional context and background provided in the SDT developed Technical Rationale and Justification for the
modifications to CIP-004-X.
1
NERC’s Compliance Guidance Policy
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
iv
Requirement R1
General Considerations for Requirement R1
None
Implementation Guidance for R1
None
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
1
Requirement R2
General Considerations for Requirement R2
None
Implementation Guidance for R2
The Responsible Entity has the flexibility to define the training program, and it may consist of multiple modules and
multiple delivery mechanisms, but a single training program for all individuals needing to be trained is acceptable.
The training can focus on functions, roles, or responsibilities at the discretion of the Responsible Entity.
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
2
Requirement R3
General Considerations for Requirement R3
None
Implementation Guidance for R3
None
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
3
Requirement R4
General Considerations for Requirement R4
None
Implementation Guidance for R4
Consider including the person or persons empowered by the Responsible Entity to authorize access in the delegations
referenced in CIP-003-8.
To ensure proper segregation of duties, access authorization and provisioning should not be performed by the same
person where possible. Separation of duties should also be considered when performing the reviews in Requirement
R4. The person reviewing should be different than the person provisioning access.
Quarterly reviews can be achieved by comparing individuals actually provisioned access against records of individuals
authorized for provisioned access. The list of provisioned individuals can be an automatically generated account
listing. However, in a BES Cyber System with several account databases, the list of provisioned individuals may come
from other records such as provisioning workflow or a user account database where provisioning typically initiates.
Entities can more efficiently perform the 15-calendar-month review by implementing role-based access. This involves
determining the specific roles on the system (e.g., system operator, technician, report viewer, administrator, etc.)
then grouping access privileges to the role and assigning users to the role. Role-based access does not assume any
specific software and can be implemented by defining specific provisioning processes for each role where access
group assignments cannot be performed.
An example timeline of all the reviews in Requirements R4 and R6 is included below.
1/1
1) Quarterly access review
2) privilege review (at least once every
15 calendar months)
3) BES Cyber
System Information
review (at least once every
4/1
15 calendar months)
Quarterly access review
2/1
3/1
4/1
7/1
Quarterly access review
5/1
6/1
7/1
1/1
1) Quarterly access review
2) privilege review
(at least once every
15 calendar months)
3) BES Cyber System
Information review
(at least once every
15 calendar months)
10/1
Quarterly access review
8/1
9/1
10/1
11/1
1/1
12/1
1/1
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
4
Requirement R5
General Considerations for Requirement R5
None
Implementation Guidance for R5
The requirement to revoke access at the time of the termination action includes procedures showing revocation of
access concurrent with the termination action. This requirement recognizes that the timing of the termination action
may vary depending on the circumstance. Some common scenarios and possible processes on when the termination
action occurs are provided in the following table. These scenarios are not an exhaustive list of all scenarios, but are
representative of several routine business practices.
Scenario
Possible Process
Immediate involuntary termination
Human resources or corporate security escorts the individual off site
and the supervisor or human resources personnel notify the
appropriate personnel to begin the revocation process.
Scheduled involuntary termination
Human resources personnel are notified of the termination and work
with appropriate personnel to schedule the revocation of access at the
time of termination.
Voluntary termination
Human resources personnel are notified of the termination and work
with appropriate personnel to schedule the revocation of access at the
time of termination.
Retirement where the last working
day is several weeks prior to the
termination date
Human resources personnel coordinate with manager to determine the
final date access is no longer needed and schedule the revocation of
access on the determined day.
Death
Human resources personnel are notified of the death and work with
appropriate personnel to begin the revocation process.
Steps taken to accomplish revocation of access may include deletion or deactivation of accounts used by the
individual(s). Entities should consider the ramifications of deleting an account may include incomplete event log
entries due to an unrecognized account or system services using the account to log on.
For transferred or reassigned individuals, a review of access privileges should be performed. This review could entail
a simple listing of all authorizations for an individual and working with the respective managers to determine which
access will still be needed in the new position. For instances in which the individual still needs to retain access as part
of a transitory period, the entity should schedule a time to review these access privileges or include the privileges in
the quarterly account review or annual privilege review.
If an entity considers transitioning a contracted individual to a direct hire, an entity should consider how they will
meet the evidentiary requirements for Requirements R1 through R4. If evidence for compliance with Requirements
R1 through R4 cannot be provided, the entity should consider invoking the applicable sub-requirements in
Requirement R5 for this administrative transfer scenario. Entities should also consider including this scenario in their
access management program, including a higher-level approval to minimize the instances to which this scenario
would apply.
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
5
Requirement R6
General Considerations for Requirement R6
None
Implementation Guidance for R6
This requirement recognizes that the timing of the termination action may vary depending on the circumstance. Some
common scenarios and possible processes on when the termination action occurs are provided in the following table.
These scenarios are not an exhaustive list of all scenarios, but are representative of several routine business practices.
Scenario
Possible Process
Immediate involuntary termination
Human resources or corporate security escorts the individual off site
and the supervisor or human resources personnel notify the
appropriate personnel to begin the revocation process.
Scheduled involuntary termination
Human resources personnel are notified of the termination and work
with appropriate personnel to schedule the revocation of access at the
time of termination.
Voluntary termination
Human resources personnel are notified of the termination and work
with appropriate personnel to schedule the revocation of access at the
time of termination.
Retirement where the last working
day is several weeks prior to the
termination date
Human resources personnel coordinate with manager to determine the
final date access is no longer needed and schedule the revocation of
access on the determined day.
Death
Human resources personnel are notified of the death and work with
appropriate personnel to begin the revocation process.
Steps taken to accomplish revocation of access may include deletion or deactivation of accounts used by the
individual(s). Entities should consider the ramifications of deleting an account may include incomplete event log
entries due to an unrecognized account or system services using the account to log on.
To ensure proper segregation of duties, access authorization and provisioning should not be performed by the same
person where possible. Separation of duties should also be considered when performing the 15-calendar-month
verification in Requirement R6. The person reviewing should be different than the person provisioning access.
Entities may choose not to provision access, or provision temporary rather than persistent access, for authorized
users. In other words, an authorized individual does not have to have any access provisioned, but all provisioned
access must be authorized.
An entity can choose to give an authorization to access any BCSI, or they can have authorizations for specific storage
locations or types of BCSI, if they so choose.
While Part 6.1 only requires authorization for provisioned access to BCSI, entities may also choose to have a process
to authorize individuals (that is, grant them permission or make them eligible) to receive, see, or use BCSI that is
disclosed to them, much like a security clearance. This can be helpful from an information protection standpoint
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
0
Requirement R6
where individuals can be instructed to only share BCSI with others who are authorized to see it, and entities could
implement this as part of their CIP-011 Information Protection Program. In this case, the review required in
Requirement R6 Part 6.2 should still be performed, and the revocation required in Requirement R6 Part 6.3 could
consist of removing the individual’s name from the authorized list at the time of termination or upon review when it
is determined the individual no longer has a need.
Entities can more efficiently perform the 15-calendar-month BCSI review by implementing role-based access. This
involves determining the specific roles on the system (e.g., system operator, technician, report viewer, administrator)
then grouping access privileges to the role and assigning users to the role. Role-based access does not assume any
specific software and can be implemented by defining specific provisioning processes for each role where access
group assignments cannot be performed. For an example timeline to perform the 15-calendar-month BCSI review,
refer to the graphic in the Implementation Guidance for R4 section.
An example where a termination action in Requirement R5 Part 5.1, satisfies Requirement R6 Part 6.3, would be the
Responsible Entity revoking an individual’s means of unescorted physical access and Interactive Remote Access (e.g.,
physical access card, virtual private network, Active Directory user account). By revoking both physical and electronic
access, the individual could ultimately not have access to BES Cyber System Information. The Responsible Entity
should still revoke access that is manually provisioned (e.g., local user account, relay, site area network server, cloud
based BCSI that is not tied to an active directory account).
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
1
Appendix 1: Implementation Guidance for CIP-004-6
This section contains a “cut and paste” of the Implementation Guidance components of the former Guidelines and
Technical Basis (GTB) as-is of from CIP-004-6 standard to preserve any historical references. Similarly, former GTB
content providing SDT intent and technical rationale sencan be found in a separate Technical Rational document for
this standard.
Section 4 – Scope of Applicability of the CIP Cyber Security Standards
Requirement R1:
Examples of possible mechanisms and evidence, when dated, which can be used are:
•
Direct communications (e.g., emails, memos, computer based training, etc.);
•
Indirect communications (e.g., posters, intranet, brochures, etc.);
•
Management support and reinforcement (e.g., presentations, meetings, etc.).
Requirement R2:
The Responsible Entity has the flexibility to define the training program and it may consist of multiple modules and
multiple delivery mechanisms, but a single training program for all individuals needing to be trained is acceptable.
The training can focus on functions, roles or responsibilities at the discretion of the Responsible Entity.
Requirement R3:
Identity should be confirmed in accordance with federal, state, provincial, and local laws, and subject to existing
collective bargaining unit agreements.
Examples of this could include individuals under the age of 25 where a juvenile criminal history may be protected
by law, individuals who may have resided in locations from where it is not possible to obtain a criminal history
records check, violates the law or is not allowed under the existing collective bargaining agreement. The
Responsible Entity should consider the absence of information for the full seven years when assessing the risk of
granting access during the process to evaluate the criminal history check.
Requirement R4:
To ensure proper segregation of duties, access authorization and provisioning should not be performed by the
same person where possible.
This is achieved by comparing individuals actually provisioned to a BES Cyber System against records of individuals
authorized to the BES Cyber System. The list of provisioned individuals can be an automatically generated account
listing. However, in a BES Cyber System with several account databases, the list of provisioned individuals may come
from other records such as provisioning workflow or a user account database where provisioning typically initiates.
(i.e., least privilege). Entities can more efficiently perform this review by implementing role-based access. This
involves determining the specific roles on the system (e.g., system operator, technician, report viewer, administrator,
etc.) then grouping access privileges to the role and assigning users to the role. Role-based access does not assume
any specific software and can be implemented by defining specific provisioning processes for each role where access
group assignments cannot be performed. Role-based access permissions eliminate the need to perform the privilege
review on individual accounts.
This is achieved by comparing individuals actually provisioned to a BES Cyber System against records of individuals
authorized to access the BES Cyber System. The list of provisioned individuals can be an automatically generated
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
2
Appendix 1: Implementation Guidance for CIP-004-6
account listing. However, in a BES Cyber System with several account databases, the list of provisioned individuals
may come from other records such as provisioning workflow or a user account database where provisioning typically
initiates.
Separation of duties should be considered when performing the reviews in Requirement R4. The person reviewing
should be different than the person provisioning access.
Requirement R5:
Some common scenarios and possible processes on when the termination action occurs are provided in the
following table. These scenarios are not an exhaustive list of all scenarios, but are representative of several routine
business practices.
Scenario
Possible Process
Immediate involuntary
termination
Human resources or corporate security escorts the individual off site and
the supervisor or human resources personnel notify the appropriate
personnel to begin the revocation process.
Scheduled involuntary
termination
Human resources personnel are notified of the termination and work with
appropriate personnel to schedule the revocation of access at the time of
termination.
Voluntary termination
Human resources personnel are notified of the termination and work with
appropriate personnel to schedule the revocation of access at the time of
termination.
Retirement where the last
working day is several weeks
prior to the termination date
Human resources personnel coordinate with manager to determine the
final date access is no longer needed and schedule the revocation of
access on the determined day.
Death
Human resources personnel are notified of the death and work with
appropriate personnel to begin the revocation process.
Steps taken to accomplish this outcome may include deletion or deactivation of accounts used by the individual(s),
but no specific actions are prescribed. Entities should consider the ramifications of deleting an account may include
incomplete event log entries due to an unrecognized account or system services using the account to log on.
However, nothing prevents a Responsible Entity from performing all of the access revocation at the time of
termination.
For transferred or reassigned individuals, a review of access privileges should be performed. This review could
entail a simple listing of all authorizations for an individual and working with the respective managers to determine
which access will still be needed in the new position. For instances in which the individual still needs to retain
access as part of a transitory period, the entity should schedule a time to review these access privileges or include
the privileges in the quarterly account review or annual privilege review.
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
3
Violation Risk Factor and Violation Severity Level
Justifications
Project 2019-02 BES Cyber System Information Access Management
This document provides the standard drafting team’s (SDT’s) justification for assignment of violation risk factors (VRFs) and violation severity
levels (VSLs) for each requirement in Project 2019-02 BES Cyber System Information Access Management CIP-004-X. Each requirement is
assigned a VRF and a VSL. These elements support the determination of an initial value range for the Base Penalty Amount regarding
violations of requirements in FERC-approved Reliability Standards, as defined in the Electric Reliability Organizations (ERO) Sanction
Guidelines. The SDT applied the following NERC criteria and FERC Guidelines when developing the VRFs and VSLs for the requirements.
NERC Criteria for Violation Risk Factors
High Risk Requirement
A requirement that, if violated, could directly cause or contribute to Bulk Electric System instability, separation, or a cascading sequence of
failures, or could place the Bulk Electric System at an unacceptable risk of instability, separation, or cascading failures; or, a requirement in a
planning time frame that, if violated, could, under emergency, abnormal, or restorative conditions anticipated by the preparations, directly
cause or contribute to Bulk Electric System instability, separation, or a cascading sequence of failures, or could place the Bulk Electric System
at an unacceptable risk of instability, separation, or cascading failures, or could hinder restoration to a normal condition.
Medium Risk Requirement
A requirement that, if violated, could directly affect the electrical state or the capability of the Bulk Electric System, or the ability to effectively
monitor and control the Bulk Electric System. However, violation of a medium risk requirement is unlikely to lead to Bulk Electric System
instability, separation, or cascading failures; or, a requirement in a planning time frame that, if violated, could, under emergency, abnormal,
or restorative conditions anticipated by the preparations, directly and adversely affect the electrical state or capability of the Bulk Electric
System, or the ability to effectively monitor, control, or restore the Bulk Electric System. However, violation of a medium risk requirement is
unlikely, under emergency, abnormal, or restoration conditions anticipated by the preparations, to lead to Bulk Electric System instability,
separation, or cascading failures, nor to hinder restoration to a normal condition.
RELIABILITY | RESILIENCE | SECURITY
Lower Risk Requirement
A requirement that is administrative in nature and a requirement that, if violated, would not be expected to adversely affect the electrical
state or capability of the Bulk Electric System, or the ability to effectively monitor and control the Bulk Electric System; or, a requirement that
is administrative in nature and a requirement in a planning time frame that, if violated, would not, under the emergency, abnormal, or
restorative conditions anticipated by the preparations, be expected to adversely affect the electrical state or capability of the Bulk Electric
System, or the ability to effectively monitor, control, or restore the Bulk Electric System.
FERC Guidelines for Violation Risk Factors
Guideline (1) – Consistency with the Conclusions of the Final Blackout Report
FERC seeks to ensure that VRFs assigned to Requirements of Reliability Standards in these identified areas appropriately reflect their historical
critical impact on the reliability of the Bulk-Power System. In the VSL Order, FERC listed critical areas (from the Final Blackout Report) where
violations could severely affect the reliability of the Bulk-Power System:
•
Emergency operations
•
Vegetation management
•
Operator personnel training
•
Protection systems and their coordination
•
Operating tools and backup facilities
•
Reactive power and voltage control
•
System modeling and data exchange
•
Communication protocol and facilities
•
Requirements to determine equipment ratings
•
Synchronized data recorders
•
Clearer criteria for operationally critical facilities
•
Appropriate use of transmission loading relief.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | March 2021
2
Guideline (2) – Consistency within a Reliability Standard
FERC expects a rational connection between the sub-Requirement VRF assignments and the main Requirement VRF assignment.
Guideline (3) – Consistency among Reliability Standards
FERC expects the assignment of VRFs corresponding to Requirements that address similar reliability goals in different Reliability Standards
would be treated comparably.
Guideline (4) – Consistency with NERC’s Definition of the Violation Risk Factor Level
Guideline (4) was developed to evaluate whether the assignment of a particular VRF level conforms to NERC’s definition of that risk level.
Guideline (5) – Treatment of Requirements that Co-mingle More Than One Obligation
Where a single Requirement co-mingles a higher risk reliability objective and a lesser risk reliability objective, the VRF assignment for such
Requirements must not be watered down to reflect the lower risk level associated with the less important objective of the Reliability
Standard.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | March 2021
3
NERC Criteria for Violation Severity Levels
VSLs define the degree to which compliance with a requirement was not achieved. Each requirement must have at least one VSL. While it is
preferable to have four VSLs for each requirement, some requirements do not have multiple “degrees” of noncompliant performance and
may have only one, two, or three VSLs.
VSLs should be based on NERC’s overarching criteria shown in the table below:
Lower VSL
Moderate VSL
The performance or product
measured almost meets the full
intent of the requirement.
The performance or product
measured meets the majority of
the intent of the requirement.
High VSL
The performance or product
measured does not meet the
majority of the intent of the
requirement, but does meet
some of the intent.
Severe VSL
The performance or product
measured does not
substantively meet the intent of
the requirement.
FERC Order of Violation Severity Levels
The FERC VSL guidelines are presented below, followed by an analysis of whether the VSLs proposed for each requirement in the standard
meet the FERC Guidelines for assessing VSLs:
Guideline (1) – Violation Severity Level Assignments Should Not Have the Unintended Consequence of Lowering the Current
Level of Compliance
Compare the VSLs to any prior levels of non-compliance and avoid significant changes that may encourage a lower level of compliance than
was required when levels of non-compliance were used.
Guideline (2) – Violation Severity Level Assignments Should Ensure Uniformity and Consistency in the Determination of
Penalties
A violation of a “binary” type requirement must be a “Severe” VSL.
Do not use ambiguous terms such as “minor” and “significant” to describe noncompliant performance.
Guideline (3) – Violation Severity Level Assignment Should Be Consistent with the Corresponding Requirement
VSLs should not expand on what is required in the requirement.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | March 2021
4
Guideline (4) – Violation Severity Level Assignment Should Be Based on a Single Violation, Not on a Cumulative Number of
Violations
Unless otherwise stated in the requirement, each instance of non-compliance with a requirement is a separate violation. Section 4 of the
Sanction Guidelines states that assessing penalties on a per violation per day basis is the “default” for penalty calculations.
VRF Justification for CIP-004-X, Requirement R1
The VRF did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VSL Justification for CIP-004-X, Requirement R1
The VSL did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VRF Justification for CIP-004-X, Requirement R2
The VRF did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VSL Justification for CIP-004-X, Requirement R2
The VSL did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VRF Justification for CIP-004-X, Requirement R3
The VRF did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VSL Justification for CIP-004-X, Requirement R3
The VSL did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VRF Justification for CIP-004-X, Requirement R4
The VRF did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VSL Justification for CIP-004-X, Requirement R4
The VSL has been revised to reflect the removal of Part 4.4 (moved to CIP-004-X, Requirement R6, Part 6.2) and a portion of Part 4.1 (moved
to CIP-004-X, Requirement R6, Part 6.1). The VSL did not otherwise change from the previously FERC approved CIP-004-6 Reliability Standard.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | March 2021
5
VRF Justification for CIP-004-X, Requirement R5
The VRF did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VSL Justification for CIP-004-X, Requirement R5
The VSL has been revised to reflect the removal of Part 5.3 (moved to CIP-004-X, Requirement R6, Part 6.3). The VSL did not otherwise
change from the previously FERC approved CIP-004-6 Reliability Standard.
VRF Justifications for CIP-004-X R6
Proposed VRF
Medium
NERC VRF Discussion
Requirement R6 is a Requirement in the Same Day Operations and Operations Planning time horizons to
implement one or more documented access management program(s) to authorize, verify, and revoke
provisioned access to BCSI pertaining to the “Applicable System” identified in CIP-004-X Table R6 – Access
Management for BCSI that collectively include each of the applicable requirement parts in CIP-004-X Table
R6 – Access Management for BES Cyber System Information. To be considered access to BCSI in the
context of this requirement, an individual has both the ability to obtain and use BCSI. If violated, it could
directly affect the electrical state or the capability of the bulk electric system, or the ability to effectively
monitor and control the bulk electric system. However, violation of the requirement is unlikely to lead to
bulk electric system instability, separation, or cascading failures.
FERC VRF G1 Discussion
Guideline 1- Consistency w/ Blackout Report
Guideline 1- Consistency
with Blackout Report
This requirement does not address any of the critical areas identified in the Final Blackout Report.
FERC VRF G2 Discussion
Guideline 2- Consistency within a Reliability Standard
Guideline 2- Consistency
within a Reliability Standard
The proposed VRF is consistent among other FERC approved VRFs within the standard, specifically
Requirements R4 and R5 from which Requirement R6 is modified.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | March 2021
6
VRF Justifications for CIP-004-X R6
Proposed VRF
Medium
FERC VRF G3 Discussion
Guideline 3- Consistency among Reliability Standards
Guideline 3- Consistency
among Reliability Standards
This is a new requirement addressing specific reliability goals. The VRF assignment is consistent with
similar Requirements in the CIP Reliability Standards.
FERC VRF G4 Discussion
Guideline 4- Consistency with NERC Definitions of VRFs
Guideline 4- Consistency
with NERC Definitions of
VRFs
A VRF of Medium is consistent with the NERC VRF definition.
FERC VRF G5 Discussion
Guideline 5- Treatment of Requirements that Co-mingle More than One Obligation
Guideline 5- Treatment of
Requirements that Comingle More than One
Obligation
Requirement R6 contains only one objective, which is to implement one or more documented access
management program(s) to authorize, verify, and revoke provisioned access to BCSI pertaining to the
“Applicable System” identified in CIP-004-X Table R6 – Access Management for BCSI that collectively
include each of the applicable requirement parts in CIP-004-X Table R6 – Access Management for BES
Cyber System Information. To be considered access to BCSI in the context of this requirement, an
individual has both the ability to obtain and use BCSI. Since the requirement has only one objective, only
one VRF was assigned.
VSLs for CIP-004-X R6
Lower
Moderate
High
The Responsible Entity has
implemented one or more
program(s) as required by
Requirement R6 Part 6.1 but, for
one individual, did not authorize
The Responsible Entity has
implemented one or more
program(s) as required by
Requirement R6 Part 6.1 but, for
two individuals, did not
The Responsible Entity has
implemented one or more
program(s) as required by
Requirement R6 Part 6.1 but, for
three individuals, did not
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | March 2021
Severe
The Responsible Entity did not
implement one or more
documented access
management program(s) for
BCSI. (R6)
7
provisioned electronic access to
electronic BCSI or provisioned
physical access to physical BCSI.
(6.1)
authorize provisioned electronic
access to electronic BCSI or
provisioned physical access to
physical BCSI. (6.1)
authorize provisioned electronic
access to electronic BCSI or
provisioned physical access to
physical BCSI. (6.1)
OR
OR
OR
The Responsible Entity
performed the verification
required by Requirement R6
Part 6.2 more than 15 calendar
months but less than or equal to
16 calendar months of the
previous verification. (6.2)
The Responsible Entity
performed the verification
required by Requirement R6
Part 6.2 more than 16 calendar
months but less than or equal to
17 calendar months of the
previous verification. (6.2)
The Responsible Entity
performed the verification
required by Requirement R6
Part 6.2 more than 17 calendar
months but less than or equal to
18 calendar months of the
previous verification. (6.2)
OR
The Responsible Entity has
implemented one or more
program(s) to remove the
individual’s ability to use
provisioned access to BCSI but,
for one individual, did not do so
by the timeframe required in
Requirement R6, Part 6.3.
OR
OR
The Responsible Entity has
The Responsible Entity has
implemented one or more
implemented one or more
program(s) to remove the
program(s) to remove the
individual’s ability to use
individual’s ability to use
provisioned access to BCSI but,
provisioned access to BCSI but,
for two individuals, did not do so for three individuals, did not do
by the timeframe required in
so by the timeframe required in
Requirement R6, Part 6.3.
Requirement R6, Part 6.3.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | March 2021
OR
The Responsible Entity has
implemented one or more
program(s) as required by
Requirement R6 Part 6.1 but, for
four or more individuals, did not
authorize provisioned electronic
access to electronic BCSI or
provisioned physical access to
physical BCSI. (6.1)
OR
The Responsible Entity
performed the verification
required by Requirement R6
Part 6.2 more than 18 calendar
months of the previous
verification. (6.2)
OR
The Responsible Entity has
implemented one or more
program(s) to remove the
individual’s ability to use
provisioned access to BCSI but,
for four or more individuals, did
not do so by the timeframe
required in Requirement R6,
Part 6.3.
8
VSL Justifications for CIP-004-X R6
FERC VSL G1
There is no prior compliance obligation related to the subject of this requirement.
Violation Severity Level
Assignments Should Not
Have the Unintended
Consequence of Lowering
the Current Level of
Compliance
FERC VSL G2
Violation Severity Level
Assignments Should Ensure
Uniformity and Consistency
in the Determination of
Penalties
The proposed VSLs are not binary and do not use any ambiguous terminology, thereby supporting
uniformity and consistency in the determination of similar penalties for similar violations.
Guideline 2a: The Single
Violation Severity Level
Assignment Category for
"Binary" Requirements Is
Not Consistent
Guideline 2b: Violation
Severity Level Assignments
that Contain Ambiguous
Language
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | March 2021
9
FERC VSL G3
Violation Severity Level
Assignment Should Be
Consistent with the
Corresponding Requirement
FERC VSL G4
The proposed VSL uses similar terminology to that used in the associated requirement and is therefore
consistent with the requirement.
Proposed VSLs are based on a single violation and not cumulative violations.
Violation Severity Level
Assignment Should Be Based
on A Single Violation, Not on
A Cumulative Number of
Violations
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | March 2021
10
Violation Risk Factor and Violation Severity Level
Justifications
Project 2019-02 BES Cyber System Information Access Management
This document provides the standard drafting team’s (SDT’s) justification for assignment of violation risk factors (VRFs) and violation severity
levels (VSLs) for each requirement in Project 2019-02 BES Cyber System Information Access Management CIP-011-X. Each requirement is
assigned a VRF and a VSL. These elements support the determination of an initial value range for the Base Penalty Amount regarding
violations of requirements in FERC-approved Reliability Standards, as defined in the Electric Reliability Organizations (ERO) Sanction
Guidelines. The SDT applied the following NERC criteria and FERC Guidelines when developing the VRFs and VSLs for the requirements.
NERC Criteria for Violation Risk Factors
High Risk Requirement
A requirement that, if violated, could directly cause or contribute to Bulk Electric System instability, separation, or a cascading sequence of
failures, or could place the Bulk Electric System at an unacceptable risk of instability, separation, or cascading failures; or, a requirement in a
planning time frame that, if violated, could, under emergency, abnormal, or restorative conditions anticipated by the preparations, directly
cause or contribute to Bulk Electric System instability, separation, or a cascading sequence of failures, or could place the Bulk Electric System
at an unacceptable risk of instability, separation, or cascading failures, or could hinder restoration to a normal condition.
Medium Risk Requirement
A requirement that, if violated, could directly affect the electrical state or the capability of the Bulk Electric System, or the ability to effectively
monitor and control the Bulk Electric System. However, violation of a medium risk requirement is unlikely to lead to Bulk Electric System
instability, separation, or cascading failures; or, a requirement in a planning time frame that, if violated, could, under emergency, abnormal,
or restorative conditions anticipated by the preparations, directly and adversely affect the electrical state or capability of the Bulk Electric
System, or the ability to effectively monitor, control, or restore the Bulk Electric System. However, violation of a medium risk requirement is
unlikely, under emergency, abnormal, or restoration conditions anticipated by the preparations, to lead to Bulk Electric System instability,
separation, or cascading failures, nor to hinder restoration to a normal condition.
RELIABILITY | RESILIENCE | SECURITY
Lower Risk Requirement
A requirement that is administrative in nature and a requirement that, if violated, would not be expected to adversely affect the electrical
state or capability of the Bulk Electric System, or the ability to effectively monitor and control the Bulk Electric System; or, a requirement that
is administrative in nature and a requirement in a planning time frame that, if violated, would not, under the emergency, abnormal, or
restorative conditions anticipated by the preparations, be expected to adversely affect the electrical state or capability of the Bulk Electric
System, or the ability to effectively monitor, control, or restore the Bulk Electric System.
FERC Guidelines for Violation Risk Factors
Guideline (1) – Consistency with the Conclusions of the Final Blackout Report
FERC seeks to ensure that VRFs assigned to Requirements of Reliability Standards in these identified areas appropriately reflect their historical
critical impact on the reliability of the Bulk-Power System. In the VSL Order, FERC listed critical areas (from the Final Blackout Report) where
violations could severely affect the reliability of the Bulk-Power System:
•
Emergency operations
•
Vegetation management
•
Operator personnel training
•
Protection systems and their coordination
•
Operating tools and backup facilities
•
Reactive power and voltage control
•
System modeling and data exchange
•
Communication protocol and facilities
•
Requirements to determine equipment ratings
•
Synchronized data recorders
•
Clearer criteria for operationally critical facilities
•
Appropriate use of transmission loading relief.
VRF and VSL Justifications | March 2021
Project 2019-02 BES Cyber System Information Access Management
2
Guideline (2) – Consistency within a Reliability Standard
FERC expects a rational connection between the sub-Requirement VRF assignments and the main Requirement VRF assignment.
Guideline (3) – Consistency among Reliability Standards
FERC expects the assignment of VRFs corresponding to Requirements that address similar reliability goals in different Reliability Standards
would be treated comparably.
Guideline (4) – Consistency with NERC’s Definition of the Violation Risk Factor Level
Guideline (4) was developed to evaluate whether the assignment of a particular VRF level conforms to NERC’s definition of that risk level.
Guideline (5) – Treatment of Requirements that Co-mingle More Than One Obligation
Where a single Requirement co-mingles a higher risk reliability objective and a lesser risk reliability objective, the VRF assignment for such
Requirements must not be watered down to reflect the lower risk level associated with the less important objective of the Reliability
Standard.
VRF and VSL Justifications | March 2021
Project 2019-02 BES Cyber System Information Access Management
3
NERC Criteria for Violation Severity Levels
VSLs define the degree to which compliance with a requirement was not achieved. Each requirement must have at least one VSL. While it is
preferable to have four VSLs for each requirement, some requirements do not have multiple “degrees” of noncompliant performance and
may have only one, two, or three VSLs.
VSLs should be based on NERC’s overarching criteria shown in the table below:
Lower VSL
Moderate VSL
The performance or product
measured almost meets the full
intent of the requirement.
The performance or product
measured meets the majority of
the intent of the requirement.
High VSL
The performance or product
measured does not meet the
majority of the intent of the
requirement, but does meet
some of the intent.
Severe VSL
The performance or product
measured does not
substantively meet the intent of
the requirement.
FERC Order of Violation Severity Levels
The FERC VSL guidelines are presented below, followed by an analysis of whether the VSLs proposed for each requirement in the standard
meet the FERC Guidelines for assessing VSLs:
Guideline (1) – Violation Severity Level Assignments Should Not Have the Unintended Consequence of Lowering the Current
Level of Compliance
Compare the VSLs to any prior levels of non-compliance and avoid significant changes that may encourage a lower level of compliance than
was required when levels of non-compliance were used.
Guideline (2) – Violation Severity Level Assignments Should Ensure Uniformity and Consistency in the Determination of
Penalties
A violation of a “binary” type requirement must be a “Severe” VSL.
Do not use ambiguous terms such as “minor” and “significant” to describe noncompliant performance.
Guideline (3) – Violation Severity Level Assignment Should Be Consistent with the Corresponding Requirement
VSLs should not expand on what is required in the requirement.
VRF and VSL Justifications | March 2021
Project 2019-02 BES Cyber System Information Access Management
4
Guideline (4) – Violation Severity Level Assignment Should Be Based on a Single Violation, Not on a Cumulative Number of
Violations
Unless otherwise stated in the requirement, each instance of non-compliance with a requirement is a separate violation. Section 4 of the
Sanction Guidelines states that assessing penalties on a per violation per day basis is the “default” for penalty calculations.
VRF Justification for CIP-011-X, Requirement R1
The VRF did not change from the previously FERC approved CIP-011-2 Reliability Standard.
VSL Justification for CIP-011-X, Requirement R1
The VSL justification is below.
VSLs for CIP-011-X, R1
Lower
N/A
Moderate
N/A
High
The Responsible Entity
documented, but did not,
implement one or more BCSI
protection program(s). (R1)
Severe
The Responsible Entity neither
documented nor implemented
one or more BCSI protection
program(s). (R1)
OR
The Responsible Entity
documented but did not
implement at least one method
to identify BCSI. (1.1)
OR
The Responsible Entity
documented but did not
implement at least one method
to protect and securely handle
BCSI. (1.2)
VRF and VSL Justifications | March 2021
Project 2019-02 BES Cyber System Information Access Management
5
VSL Justifications for CIP-011-X, R1
FERC VSL G1
The proposed revisions do not lower the current level of compliance.
Violation Severity Level
Assignments Should Not
Have the Unintended
Consequence of Lowering
the Current Level of
Compliance
FERC VSL G2
Violation Severity Level
Assignments Should Ensure
Uniformity and Consistency
in the Determination of
Penalties
Guideline 2a:
The VSLs are not binary.
Guideline 2b:
The proposed VSL does not use ambiguous terms, supporting uniformity and consistency in the
determination of similar penalties for similar violations.
Guideline 2a: The Single
Violation Severity Level
Assignment Category for
"Binary" Requirements Is
Not Consistent
Guideline 2b: Violation
Severity Level Assignments
that Contain Ambiguous
Language
FERC VSL G3
Violation Severity Level
Assignment Should Be
Consistent with the
Corresponding Requirement
The proposed VSL uses similar terminology to that used in the associated requirement, and is therefore
consistent with the requirement.
VRF and VSL Justifications | March 2021
Project 2019-02 BES Cyber System Information Access Management
6
FERC VSL G4
Violation Severity Level
Assignment Should Be Based
on A Single Violation, Not on
A Cumulative Number of
Violations
Proposed VSLs are based on a single violation and not a cumulative violation methodology. The VSL is
assigned for a single instance of failing to implement one or more documented information protection
program(s) that collectively include the applicable requirement parts in CIP-011-X Table R1 – Information
Protection Program.
VRF Justification for CIP-011-X Requirement R2
The VRF did not change from the previously FERC approved CIP-011-2 Reliability Standard.
VSL Justification for CIP-011-X Requirement R2
The VSL did not change from the previously FERC approved CIP-011-2 Reliability Standard.
VRF and VSL Justifications | March 2021
Project 2019-02 BES Cyber System Information Access Management
7
Mapping Document
Project 2019-02 BES Cyber System Information Access Management
Mapping of CIP-004-6 R4 and R5 to CIP-004-X R6
Access Management Program control requirements as applied to BES Cyber System Information (BCSI) designated storage locations were
moved to CIP-004 Requirement R6.
Standard: CIP-004-6
Requirement in Approved Standard
CIP-004-6, Requirement R4, Part 4.1.3
Translation to New Standard or Other Action
Description and Change Justification
CIP-004-X, Requirement R6. Each Responsible
Entity shall implement one or more documented
access management program(s) to authorize,
verify, and revoke provisioned access to BCSI
pertaining to the “Applicable Systems” identified
in CIP-004-X Table R6 – Access Management for
BES Cyber System Information that collectively
include each of the applicable requirement parts
in CIP‐004‐X Table R6 – Access Management for
BES Cyber System Information. To be considered
access to BCSI in the context of this requirement,
an individual has both the ability to obtain and
use BCSI. [Violation Risk Factor: Medium] [Time
Horizon: Same Day Operations and Operations
Planning].
Requirement R6 was created to house all BCSI
related access management requirements,
which include the current CIP-004-6 R4.1.3,
R4.4, and R5.3 in a single requirement (R6).
CIP-004-X, Requirement R6, Part 6.1, 6.1.1, and
6.1.2
The modified requirement language includes a
shift from authorizing access to designated
The modified requirement language includes
clarification on the specific elements within an
access management program that need to be
implemented. In addition, a definition of what
constitutes BCSI access was included in the
parent R6 requirement language.
RELIABILITY | RESILIENCE | SECURITY
Standard: CIP-004-6
Requirement in Approved Standard
Translation to New Standard or Other Action
Description and Change Justification
Process to authorize based on need, as
determined by the Responsible Entity, except for
CIP Exceptional Circumstances:
Prior to provisioning, authorize (unless already
authorized according to Part 4.1.) based on need,
as determined by the Responsible Entity, except
for CIP Exceptional Circumstances:
storage locations, to authorizing the provisioned
access to BCSI.
Access to designated storage locations, whether
physical or electronic, for BES Cyber System
Information.
6.1.1. Provisioned electronic access to electronic
BCSI; and
The Note was included to specify the type of
access to be authorized (6.1), verified (6.2) and
revoked (6.3).
6.1.2. Provisioned physical access to physical
BCSI.
Note: Provisioned access is to be considered the
result of the specific actions taken to provide an
individual(s) the means to access BCSI (e.g., may
include physical keys or access cards, user
accounts and associated rights and privileges,
encryption keys).
CIP-004-6, Requirement R4, Part 4.4
Verify at least once every 15 calendar months
that access to the designated storage locations
for BES Cyber System Information, whether
physical or electronic, are correct and are those
that the Responsible Entity determines are
necessary for performing assigned work
functions.
CIP-004-X, Requirement R6, Part 6.2, 6.2.1, and
6.2.2.
Verify at least once every 15 calendar months
that all individuals with provisioned access to
BCSI:
6.2.1. have an authorization record; and
The modified requirement language includes a
two-part separation of the current CIP-004-6
R4.4 requirement and that the Responsible
Entity 1) Verifies provisioned access to BCSI is
authorized, and 2) Verifies the provisioned
access is still needed.
6.2.2. still need the provisioned access to perform
their current work functions, as
determined by the Responsible Entity.
Mapping Document | March 2021
Project 2019-02 BES Cyber System Information Access Management
2
Standard: CIP-004-6
Requirement in Approved Standard
Translation to New Standard or Other Action
CIP-004-6, Requirement R5, Part 5.3
CIP-004-X, Requirement R6, Part 6.3
For termination actions, revoke the individual’s
current access to the designated storage
locations for BES Cyber System Information,
whether physical or electronic (unless already
revoked according to Requirement R5.1), by the
end of the next calendar day following the
effective date of the termination action.
For termination actions, remove the individual’s
ability to use provisioned access to BCSI (unless
already revoked according to Part 5.1) by the end
of the next calendar day following the effective
date of the termination action.
CIP-004-6, Requirement R5, Part 5.4
CIP-004-6, Requirement R5, Part 5.3
For termination actions, revoke the individual’s
non-shared user accounts (unless already
revoked according to Parts 5.1 or 5.3) within 30
calendar days of the effective date of the
termination action.
For termination actions, revoke the individual’s
non-shared user accounts (unless already revoked
according to Part 5.1) within 30 calendar days of
the effective date of the termination action.
CIP-004-6, Requirement R5, Part 5.5
CIP-004-6, Requirement R5, Part 5.4
For termination actions, change passwords for
shared account(s) known to the user within 30
calendar days of the termination action. For
reassignments or transfers, change passwords
for shared account(s) known to the user within
30 calendar days following the date that the
Responsible Entity determines that the
For termination actions, change passwords for
shared account(s) known to the user within 30
calendar days of the termination action. For
reassignments or transfers, change passwords for
shared account(s) known to the user within 30
calendar days following the date that the
Responsible Entity determines that the individual
no longer requires retention of that access.
Description and Change Justification
The change in requirement language focuses on
revoking the ability to use provisioned access to
BCSI instead of revoking access to the
designated storage locations for BCSI.
This Part was renumbed from 5.4 to 5.3 after
Part 5.3 was removed and incorporated into the
new R6 Part 6.3.
The reference within the Part was changed to
just Part 5.1.
This Part was renumbed from 5.5 to 5.4 after
Part 5.3 was removed and incorporated into the
new R6 Part 6.3. This is a renumbering change
only, no changes were made to the Part’s
requirement language.
If the Responsible Entity determines and
documents that extenuating operating
Mapping Document | March 2021
Project 2019-02 BES Cyber System Information Access Management
3
Standard: CIP-004-6
Requirement in Approved Standard
individual no longer requires retention of that
access.
If the Responsible Entity determines and
documents that extenuating operating
circumstances require a longer time period,
change the password(s) within 10 calendar days
following the end of the operating
circumstances.
Translation to New Standard or Other Action
Description and Change Justification
circumstances require a longer time period,
change the password(s) within 10 calendar days
following the end of the operating circumstances.
Mapping Document | March 2021
Project 2019-02 BES Cyber System Information Access Management
4
Mapping Document
Project 2019-02 BES Cyber System Information Access Management
Modifications to CIP-011-X
The modifications made to requirements within CIP-011-X are intended to focus on preventing unauthorized access to BES Cyber System
Information (BCSI) regardless of state (storage, transit, use).
Standard: CIP-011-X
Requirement in Approved Standard
Translation to New Standard or Other
Action
CIP-011-2, Requirement R1.
CIP-011-X, Requirement R1.
Each Responsible Entity shall implement one
or more documented information protection
program(s) that collectively includes each of
the applicable requirement parts in CIP-011-2
Table R1 – Information Protection Program.
Each Responsible Entity shall implement
one or more documented information
protection program(s) for BES Cyber
System Information (BCSI) pertaining to
Applicable Systems that collectively
includes each of the applicable
requirement parts in CIP-011-X Table R1 –
Information Protection Program.
CIP-011-2, Requirement R1, Part 1.1
CIP-011-X, Requirement R1, Part 1.1
Method(s) to identify information that meets
the definition of BES Cyber System
Information.
Method(s) to identify BCSI.
Description and Change Justification
Parent CIP-011-X Requirement R1 language
modified to sharpen focus on protecting
BCSI as opposed to protecting the BES Cyber
System(s) and associated applicable
systems, which may contain BCSI.
Requirement language simplified.
RELIABILITY | RESILIENCE | SECURITY
Standard: CIP-011-X
Requirement in Approved Standard
Translation to New Standard or Other
Action
CIP-011-2, Requirement R1, Part 1.2
CIP-011-X, Requirement R1, Part 1.2
Procedure(s) for protecting and securely
handling BES Cyber System Information,
including storage, transit, and use.
Method(s) to protect and securely handle
BCSI to mitigate the risks of compromising
confidentiality.
Mapping Document | March 2021
Project 2019-02 BES Cyber System Information Access Management
Description and Change Justification
Requirement revised to broaden the focus
around the implementation of controls that
mitigate the risks of compromising
confidentiality in any state, not just storage,
transit, and use.
2
Standards Announcement
Project 2019-02 BES Cyber System Information Access
Management
Formal Comment Period Open through May 10, 2021
Now Available
A 45-day formal comment period is open through 8 p.m. Eastern, Monday, May 10, 2021 for the
following:
•
CIP-004-X – Cyber Security - Personnel & Training
•
CIP-011-X – Cyber Security - Information Protection
•
Implementation Plan
Due to projects 2019-02 BES Cyber System Information Access Management (BCSI) and 2016-02
Modification to CIP Standards (2016-02) both modifying CIP-004 and CIP-011, an “-X” has been added in
place of the version numbers for BCSI and a “-Y” for the 2016-02 standards. Once both projects are
completed, they will be combined together with one version, prior to submission to the NERC Board.
The standard drafting team’s considerations of the responses received from the previous comment
period are reflected in these drafts of the standards.
Commenting
Use the Standards Balloting and Commenting System (SBS) to submit comments. An unofficial Word
version of the comment form is posted on the project page.
•
Contact NERC IT support directly at https://support.nerc.net/ (Monday – Friday, 8 a.m. - 5 p.m.
Eastern) for problems regarding accessing the SBS due to a forgotten password, incorrect
credential error messages, or system lock-out.
•
Passwords expire every 6 months and must be reset.
•
The SBS is not supported for use on mobile devices.
•
Please be mindful of ballot and comment period closing dates. We ask to allow at least 48 hours
for NERC support staff to assist with inquiries. Therefore, it is recommended that users try logging
into their SBS accounts prior to the last day of a comment/ballot period.
Next Steps
Additional ballots for the standards and non-binding polls of the associated Violation Risk Factors and
Violation Severity Levels will be conducted April 30 – May 10, 2021.
RELIABILITY | RESILIENCE | SECURITY
For more information on the Standards Development Process, refer to the Standard Processes Manual.
Subscribe to this project's observer mailing list by selecting "NERC Email Distribution Lists" from the
"Service" drop-down menu and specify “Project 2019-02 BCSI Observer List” in the Description Box. For
more information or assistance, contact Senior Standards Developer, Jordan Mallory (via email) or at (404)
446-2589.
North American Electric Reliability Corporation
3353 Peachtree Rd, NE
Suite 600, North Tower
Atlanta, GA 30326
404-446-2560 | www.nerc.com
Standards Announcement
Project 2019-02 BCSI | March 25, 2021
2
Comment Report
Project Name:
2019-02 BES Cyber System Information Access Management (Draft 3)
Comment Period Start Date:
3/25/2021
Comment Period End Date:
5/10/2021
Associated Ballots:
2019-02 BES Cyber System Information Access Management CIP-004-7 AB 3 ST
2019-02 BES Cyber System Information Access Management CIP-011-3 AB 3 ST
2019-02 BES Cyber System Information Access Management Implementation Plan AB 3 OT
There were 64 sets of responses, including comments from approximately 157 different people from approximately 98 companies
representing 10 of the Industry Segments as shown in the table on the following pages.
Questions
1. The standards drafting team (SDT) considered industry’s concerns about the phrase “provisioning of access” requesting clarity on this
terminology. The SDT added “authorize, verify, and revoke provisioned access” to the parent requirement CIP-004-X, Requirement R6, and
changed “provisioning of access” to “provisioned access” in the requirement parts. This should clarify the intent that it is a noun which
scopes what the Registered Entity must authorize, verify, and revoke, rather than a verb relating to how provisioning should occur. That is up
to the entity to determine. Do you agree with the proposed change? If not, please provide the basis for your disagreement and an alternate
proposal.
2. The SDT considered industry’s concerns about the absence of “obtain and use” language from the CMEP Practice Guide, which currently
provides alignment on a clear two-pronged test of what constitutes access in the context of utilizing third-party solutions (e.g., cloud
services) for BCSI. The SDT mindfully mirrored this language to assure future enforceable standards are not reintroducing a gap. Do you
agree this clarifying language makes it clear both parameters of this two-pronged test for “obtain and use” must be met to constitute
“access” to BCSI? If not, please provide the basis for your disagreement and an alternate proposal.
3. The SDT considered industry comments regarding the removal of storage locations. The SDT must enable the CIP standards for the use of
third-party solutions (e.g., cloud services) for BCSI, and retention of that language hinders meeting those FERC directives. The absence of
this former language does not preclude an entity from defining storage locations as the method used within an entity’s access management
program. CIP-004-X, Requirement R6, is at an objective level to permit more than that one approach. Do you agree the requirement retains the
flexibility for storage locations to be used as one way to meet the objective? If not, please provide the basis for your disagreement and an
alternate proposal.
4. To address industry comments while also enabling entities to use third-party solutions (e.g., cloud services) for BCSI, in CIP-004-X,
Requirement R6 Part 6.1, the SDT made a distinction between “electronic access to electronic BCSI” versus “physical access to physical
BCSI”. This clarifies physical access alone to hardware containing electronic BCSI, which is protected with methods that do not permit an
individual to concurrently obtain and use the electronic BCSI, is not provisioned access to electronic BCSI. Do you agree with the proposed
change? If not, please provide the basis for your disagreement and an alternate proposal.
5. The SDT considered industry comments about defining the word “access”. “Access” is broadly used across both the CIP and Operations
& Planning Standards (e.g., open access) and carries different meanings in different contexts. Therefore, the SDT chose not to define
“access” in the NERC Glossary of Terms. Instead, the SDT used the adjective “provisioned” to add context, thereby scoping CIP-004-X,
Requirement R6. Do you agree the adjective “provisioned” in conjunction with the “Note” clarifies what “provisioned access” is? If not,
please provide the basis for your disagreement and an alternate proposal.
6. In response to industry concerns regarding double jeopardy or confusion with CIP-013, the SDT removed CIP-011-X, Requirement R1 Parts
1.3 and 1.4, in favor of simplifying CIP-011-X, Requirement R1 Part 1.1, and adjusting Part 1.2 to broaden the focus around the
implementation of protective methods and secure handling methods to mitigate risks of compromising confidentiality. Do you agree with the
proposed changes? If not, please provide the basis for your disagreement and an alternate proposal.
7. The SDT extended the implementation plan to 24-months in an attempt to align with the Project 2016-02 modifications that are on the same
drafting timeline, and added an optional provision for early adoption. Do you agree this approach gives industry adequate time to implement
without encumbering entities who are planning to, or are already using, third-party solutions (e.g., cloud services) for BCSI? If not, please
provide the basis for your disagreement and an alternate proposal
8. In looking at all proposed recommendations from the standard drafting team, are the proposed changes a cost-effective approach?
9. Please provide any additional comments for the SDT to consider, if desired.
Organization
Name
Name
Midcontinent Bobbi
ISO, Inc.
Welch
Tennessee
Valley
Authority
Jennie Wike
Brian
Millard
Jennie
Wike
Segment(s)
2
1,3,5,6
Region
MRO,RF,SERC
SERC
WECC
Group Name
ISO/RTO
Council
Standards
Review
Committee
2019-02 BCSI
Access
Management
(Draft 3)
Tennessee
Valley
Authority
Tacoma
Power
Group
Member
Name
Group
Group
Member
Member
Organization Segment(s)
Group
Member
Region
Ali Miremadi
CAISO
2
WECC
Brandon
Gleason
Electric
Reliability
Council of
Texas, Inc.
2
Texas RE
Helen Lainis
IESO
2
NPCC
Kathleen
Goodman
ISO-NE
2
NPCC
Bobbi Welch
MISO
2
RF
Gregory
Campoli
New York
Independent
System
Operator
2
NPCC
Michael Del
Viscio
PJM
2
RF
Charles
Yeung
Southwest
Power Pool,
Inc. (RTO)
2
MRO
Kurtz, Bryan
G.
Tennessee
Valley
Authority
1
SERC
Grant, Ian S.
Tennessee
Valley
Authority
3
SERC
Thomas, M.
Lee
Tennessee
Valley
Authority
5
SERC
Parsons,
Marjorie S.
Tennessee
Valley
Authority
6
SERC
Jennie Wike
Tacoma
1,3,4,5,6
Public Utilities
WECC
John Merrell
Tacoma
1
Public Utilities
(Tacoma,
WA)
WECC
Marc
Donaldson
Tacoma
3
Public Utilities
(Tacoma,
WA)
WECC
ACES Power Jodirah
Marketing
Green
1,3,4,5,6
MRO,NA - Not
Applicable,RF,SERC,Texas
RE,WECC
Hien Ho
Tacoma
4
Public Utilities
(Tacoma,
WA)
WECC
Terry Gifford
Tacoma
6
Public Utilities
(Tacoma,
WA)
WECC
Ozan Ferrin
Tacoma
5
Public Utilities
(Tacoma,
WA)
WECC
ACES
Bob Solomon Hoosier
1
Standard
Energy Rural
Collaborations
Electric
Cooperative,
Inc.
SERC
Kevin Lyons
Central Iowa
Power
Cooperative
Southwest
Power Pool,
Inc. (RTO)
3,4,5
Kimberly
2
Van Brimer
SERC
Jennifer Bray
Arizona
1
Electric
Power
Cooperative,
Inc.
WECC
Nick
Fogleman
Prairie Power 1,3
Incorporated
SERC
DTE Energy - Adrian
DTE Electric Raducea
MRO,WECC
Southwest
Power Pool
Standards
Review Group
(SSRG)
MRO
Bill Hutchison Southern
1
Illinois Power
Cooperative
Amber Skillern East
Kentucky
Power
Cooperative
DTE Energy - Karie
Detroit
Barczak
Edison
Company
1
1
SERC
DTE Energy - 5
Detroit
Edison
Company
RF
Daniel Herring DTE Energy - 4
DTE Electric
RF
Karie Barczak DTE Energy - 3
DTE Electric
RF
Kim Van
Brimer
SPP
2
MRO
Jim Williams
SPP
2
MRO
Matt Harward SPP
2
MRO
FirstEnergy - Mark Garza 4
FirstEnergy
Corporation
Duke Energy Masuncha
Bussey
Public Utility Meaghan
District No. 1 Connell
of Chelan
County
Michael
Johnson
Michael
Johnson
1,3,5,6
FE Voter
FRCC,MRO,RF,SERC,Texas Duke Energy
RE
5
CHPD
WECC
PG&E All
Segments
Shannon
Mickens
SPP
2
MRO
Alan
Wahlstrom
SPP
2
MRO
Julie Severino FirstEnergy - 1
FirstEnergy
Corporation
RF
Aaron
Ghodooshim
FirstEnergy - 3
FirstEnergy
Corporation
RF
Robert Loy
FirstEnergy - 5
FirstEnergy
Solutions
RF
Ann Carey
FirstEnergy - 6
FirstEnergy
Solutions
RF
Mark Garza
FirstEnergyFirstEnergy
RF
Laura Lee
Duke Energy 1
SERC
Dale
Goodwine
Duke Energy 5
SERC
Greg Cecil
Duke Energy 6
RF
Lee Schuster
Duke Energy 3
SERC
Joyce Gundry Public Utility 3
District No. 1
of Chelan
County
WECC
Ginette
Lacasse
Public Utility 1
District No. 1
of Chelan
County
WECC
Glen Pruitt
Public Utility 6
District No. 1
of Chelan
County
WECC
Meaghan
Connell
Public Utility 5
District No. 1
Chelan
County
WECC
Marco Rios
Pacific Gas
and Electric
Company
1
WECC
Sandra Ellis
Pacific Gas
and Electric
Company
3
WECC
4
Southern
Pamela
Company Hunter
Southern
Company
Services, Inc.
Northeast
Ruida Shu
Power
Coordinating
Council
1,3,5,6
SERC
1,2,3,4,5,6,7,8,9,10 NPCC
Southern
Company
NPCC
Regional
Standards
Committee
James
Mearns
Pacific Gas
and Electric
Company
5
WECC
Matt Carden
Southern
1
Company Southern
Company
Services, Inc.
SERC
Joel
Dembowski
Southern
Company Alabama
Power
Company
3
SERC
Ron Carlsen
Southern
Company Southern
Company
Generation
6
SERC
Jim Howell
Southern
5
Company Southern
Company
Services, Inc.
- Gen
SERC
Guy V. Zito
Northeast
10
Power
Coordinating
Council
NPCC
Randy
MacDonald
New
Brunswick
Power
2
NPCC
Glen Smith
Entergy
Services
4
NPCC
Alan Adamson New York
State
Reliability
Council
7
NPCC
David Burke
Orange &
Rockland
Utilities
3
NPCC
Helen Lainis
IESO
2
NPCC
David Kiguel
Independent
7
NPCC
Nick
Kowalczyk
Orange and
Rockland
1
NPCC
Joel
Charlebois
AESI Acumen
5
NPCC
Engineered
Solutions
International
Inc.
Mike Cooke
Ontario
Power
Generation,
Inc.
4
NPCC
Salvatore
Spagnolo
New York
Power
Authority
1
NPCC
Shivaz
Chopra
New York
Power
Authority
5
NPCC
Deidre Altobell Con Ed 4
Consolidated
Edison
NPCC
Dermot Smyth Con Ed 1
Consolidated
Edison Co. of
New York
NPCC
Peter Yost
Con Ed 3
Consolidated
Edison Co. of
New York
NPCC
Cristhian
Godoy
Con Ed 6
Consolidated
Edison Co. of
New York
NPCC
Nurul Abser
NB Power
Corporation
1
NPCC
Randy
MacDonald
NB Power
Corporation
2
NPCC
Michael
Ridolfino
Central
Hudson Gas
and Electric
1
NPCC
Vijay Puran
NYSPS
6
NPCC
ALAN
ADAMSON
New York
State
Reliability
Council
10
NPCC
Sean Cavote
PSEG Public
Service
Electric and
Gas Co.
1
NPCC
Dominion Dominion
Resources,
Inc.
Sean
Bodkin
OGE Energy Sing Tay
- Oklahoma
Gas and
Electric Co.
6
6
Dominion
SPP RE
OKGE
Brian
Robinson
Utility
Services
5
NPCC
Quintin Lee
Eversource
Energy
1
NPCC
Jim Grant
NYISO
2
NPCC
John Pearson ISONE
2
NPCC
John Hastings National Grid 1
USA
NPCC
Michael Jones National Grid 1
USA
NPCC
Nicolas
Turcotte
Hydro1
Qu?bec
TransEnergie
NPCC
Chantal
Mazza
HydroQuebec
2
NPCC
Michele
Tondalo
United
Illuminating
Co.
1
NPCC
Paul
Malozewski
Hydro One
Networks,
Inc.
3
NPCC
Sean Bodkin
Dominion Dominion
Resources,
Inc.
6
NPCC
Connie Lowe
Dominion Dominion
Resources,
Inc.
3
NA - Not
Applicable
Lou Oberski
Dominion Dominion
Resources,
Inc.
5
NA - Not
Applicable
Larry Nash
Dominion Dominion
Virginia
Power
1
NA - Not
Applicable
Rachel Snead Dominion Dominion
Resources,
Inc.
5
NA - Not
Applicable
Sing Tay
OGE Energy 6
- Oklahoma
MRO
Terri Pyle
OGE Energy 1
- Oklahoma
MRO
Gas and
Electric Co.
Western
Steven
Electricity
Rueckert
Coordinating
Council
10
WECC CIP
Donald
Hargrove
OGE Energy 3
- Oklahoma
Gas and
Electric Co.
MRO
Patrick Wells
OGE Energy 5
- Oklahoma
Gas and
Electric Co.
MRO
Steve
Rueckert
WECC
10
WECC
Morgan King
WECC
10
WECC
Deb
McEndaffer
WECC
10
WECC
Tom Williams WECC
10
WECC
1. The standards drafting team (SDT) considered industry’s concerns about the phrase “provisioning of access” requesting clarity on this
terminology. The SDT added “authorize, verify, and revoke provisioned access” to the parent requirement CIP-004-X, Requirement R6, and
changed “provisioning of access” to “provisioned access” in the requirement parts. This should clarify the intent that it is a noun which
scopes what the Registered Entity must authorize, verify, and revoke, rather than a verb relating to how provisioning should occur. That is up
to the entity to determine. Do you agree with the proposed change? If not, please provide the basis for your disagreement and an alternate
proposal.
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
No
Document Name
Comment
The use of provisioned access is not addressed in CIP-004-X Requirement 5. The CIP-004-X requirements should use consistent terminology.
Likes
0
Dislikes
0
Response
Barry Jones - Barry Jones On Behalf of: sean erickson, Western Area Power Administration, 1, 6; - Barry Jones
Answer
No
Document Name
2019-02_Unofficial_Comment_Form_03252021_Information-Protection-NSRF-draft-1_JC.docx
Comment
Comments: WAPA believes the SDT is moving in the correct direction from the past version. WAPA does not support the term “provisioned access” as
it is a non-definable term which has the potential to confuse regulators (auditors, risk, enforcement, FERC, NERC, etc…) and industry. The term also
does not address the requirements in the SAR for entities storing BCSI off-prem (such as cloud data centers).
“Provisioned access” creates a security loophole whereas entities only require authorization for a provisioned access. For example, if access to BCSI is
not provisioned, no authorization to BCSI is required. This does not meet the goal of SAR for controlling access to BCSI. Given the R6 definition
whereas “access to BCSI” occurs when an individual has both “the ability to obtain and use BCSI,” we recommend changing “provisioned access” to
“access” that ensures only authorized individual can possess BCSI.
The use of “provisioned, provision or provisioning” of “access,” regardless of tense, would require entities to be audited to, maintain, and provide
documented lists of people and the “provisioned” configurations of entity BES Cyber System Information repositories in order to “verify” the
“authorization” of such provisioned access.
The Measures section highlights this expectation where evidence may include individual records, or lists of whom is authorized. To achieve this
evidence, entities would need to provide evidence of systems accounts of on-premises or off premises system repositories of BCSI. Cloud providers
may not provide such lists of personnel who have administrative level access to cloud BCSI server repositories and entities will be unable to verify what
3rd party off-prem systems administrators have access to BCSI without litigation, yet entities will be asked to provide this information for an entire audit
cycle
Recommendations:
1. Focus only on addressing electronic and physical access to BCSI in off-prem or cloud situations.
2. Consider the following language for R6 Part 6.1:
Authorize access to BCSI based on need, as determined by the Responsible Entity, except for CIP Exceptional Circumstances. Access to BCSI
includes:
6.1.1. Electronic access to electronic BCSI;
6.1.2 Physical access to physical BCSI;
6.1.3 Physical access to unencrypted electronic BCSI (See our comments in Q4).
3. Consider using the perspective of language in CIP-011 “ to prevent unauthorized access to BES Cyber System Information.” This allows entities to
determine the risk and methods to protect BCSI
4. WAPA recommends addressing the two potential controls for access to off-prem BCS, 1) encrypting BCSI or 2) purchasing services which allow the
entity to manage the off-prem authentication systems – thereby preventing 3rd party systems administrators or others from compromising entity BCSI
stored in cloud data centers. This could be as simple as:
Implement at least one control to authorize access to BCSI based on need, as determined by the Responsible Entity, except for CIP Exceptional
Circumstances. Access to BCSI includes:
6.1.1. Electronic access to electronic BCSI;
6.1.2 Physical access to physical BCSI;
6.1.3 Physical access to unencrypted electronic BCSI (See our comments in Q4).
Likes
0
Dislikes
0
Response
Dennis Sismaet - Northern California Power Agency - 6
Answer
No
Document Name
Comment
Please reference Marty Hostler's comments. Thanks.
Likes
0
Dislikes
Response
0
JT Kuehne - AEP - 6
Answer
No
Document Name
Comment
In AEP’s opinion, the updated language leaves room for interpretation. It might be simplistic to refer to the subparts of R6 instead of using specific
words from the subparts.
The updated Requirement 6 would read: “Each Responsible Entity shall implement one or more documented access management program(s) to meet
subparts of R6 for provisioned access to BCSI pertaining to the “Applicable Systems” identified in CIP-004-X Table R6 – Access Management for BES
Cyber System Information that collectively include each of the applicable requirement parts in CIP‐ 004‐ X Table R6 – Access Management for BES
Cyber System Information. To be considered access to BCSI in the context of this requirement, an individual has both the ability to obtain and use
BCSI. [Violation Risk Factor: Medium] [Time Horizon: Same Day Operations and Operations Planning].”
Likes
0
Dislikes
0
Response
Bruce Reimer - Manitoba Hydro - 1
Answer
No
Document Name
Comment
We disagree with “provisioned access” since there is a security concern where it only requires authorization for a provisioned access. If an access to
BCSI is not provisioned, it means no authorization is required. This doesn’t meet the goal of SAR for controlling access to BCSI. Given that R6 has
defined “access to BCSI” as an individual has both the ability to obtain and use BCSI, we suggest changing “provisioned access” to “access” that
ensures only authorized individual can possess the BCSI. Also “unless already authorized according to Part 4.1” should be removed as having
authorized access to CIP Cyber Assets does not preclude the authorization for having access to BCSI.
Recommendations:
We have the following suggested language for R6 Part 6.1:
Authorize access to BCSI based on need, as determined by the Responsible Entity, except for CIP Exceptional Circumstances. Access to BCSI
includes:
6.1.1. Electronic access to electronic BCSI;
6.1.2 Physical access to physical BCSI;
6.1.3 Physical access to unencrypted electronic BCSI (See our comments in Q4).
Likes
Dislikes
0
0
Response
Jennie Wike - Jennie Wike On Behalf of: Hien Ho, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; John Merrell, Tacoma Public Utilities
(Tacoma, WA), 3, 1, 4, 5, 6; Marc Donaldson, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Ozan Ferrin, Tacoma Public Utilities (Tacoma,
WA), 3, 1, 4, 5, 6; Terry Gifford, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; - Jennie Wike, Group Name Tacoma Power
Answer
No
Document Name
Comment
Providing the definition of “provisioned access” within the Standard via the Note: within CIP-004 R6 Part 6.1 does not provide sufficient clarity to
Industry. Tacoma Power suggests that it would be beneficial to create a NERC Glossary defined term for “Provisioned Access.”
Likes
1
Dislikes
Snohomish County PUD No. 1, 3, Chaney Holly
0
Response
Steven Rueckert - Western Electricity Coordinating Council - 10, Group Name WECC CIP
Answer
No
Document Name
Comment
•"Prior to provisioning, authorize provisioned access"? Wouldn't it be more appropriate to remove "provisioned" in 6.1.1 and 6.1.2? How can an
entity authorize provisioned access if it hasn't been provisioned yet?
• R6 requires provisioned access to BCSI to be authorized based on need, reviewed, and revoked upon a termination action.
• R6 makes no mention of “Transfers or reassignments”. R5 does not address revoking provisioned access to BCSI either, therefore entities are
not required to revoke provisioned access to BCSI unless they are terminated.
• Provisioned access to BCSI does not require an individual to have Cyber Security Awareness training or a PRA. Could an individual have no
access to a BCS but have all of the information relating to the BCS.
•In the Note section of R6.1 “Provisioned access is to be considered the result of the specific actions taken to provide an individual the means to
access BCSI (e.g., physical keys or access cards, user accounts and associated rights and privileges, encryption keys).”
{C}Recommend changing the e.g., section to read “physical keys or access control key cards, user accounts and associated rights and
privileges, encryption keys).
Likes
0
Dislikes
Response
0
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
No
Document Name
Comment
While the SDT did well in clarifying the intent of the provisioning, we do not feel a “Note” inserted into the requirement is sufficient to serve as a NERC
definition. See Q5 comments.
Likes
0
Dislikes
0
Response
Jennifer Bray - Arizona Electric Power Cooperative, Inc. - 1
Answer
No
Document Name
Comment
While the SDT did well in clarifying the intent of the provisioning, we do not feel a “Note” inserted into the requirement is sufficient to serve as a NERC
definition. See Q5 comments.
AEPC has signed on to ACES comments.
Likes
0
Dislikes
0
Response
Thomas Standifur - Austin Energy - 1,3,4,5,6
Answer
No
Document Name
TPWR_2019-02_Unofficial_Comment_Form_2021-05-10.docx20210504-17090-hsevrj.docx
Comment
In support of Tacoma Powers' comments. Attached.
Likes
0
Dislikes
Response
0
Benjamin Winslett - Georgia System Operations Corporation - 4
Answer
No
Document Name
2019-02_Unofficial_Comment_Form_Final Draft.docx
Comment
For the purposes of providing for cloud storage and processing of BCSI information, the proposed changes are sufficient to provide for its
use. However, the changes are silent with regard to the authorized incidental access of BCSI in a physical environment such as a meeting. It is
recommended that clarification be provided in the requirement language for such circumstances. This is addressed in the Technical Rationale:
however, it was not included in the standard.
The following modification is suggested to the Note in requirement part 6.1:
Note: Provisioned access is to be considered the result of the specific actions taken to provide an individual(s) the means to access BCSI (e.g., may
include physical keys or access cards, user accounts and associated rights and privileges, encryption keys). Provisioned access does not include
temporary or incidental access when a specific mechanism for provisioning access is not available or feasible such as when an individual is given,
merely views, or might see BCSI such as during a meeting or visiting a PSP, or when the BCSI is temporarily or incidentally located or stored on work
stations, laptops, flash drives, portable equipment, offices, vehicles, etc.
Likes
1
Dislikes
Georgia Transmission Corporation, 1, Davis Greg
0
Response
Gladys DeLaO - CPS Energy - 1,3,5
Answer
No
Document Name
Comment
Part 6.1 perhaps should read as follows:
Unless already authorized according to Part 4.1, authorize provisioned access based on need, as determined by the Responsible Entity, except for CIP
Exceptional Circumstances:
CPS Energy suggests creating a NERC Glossary defined term for “Provisioned Access” instead of adding the Note: within CIP-004 R6 Part
6.1. Additionally, “obtain and use” should be included in the definition.
Likes
0
Dislikes
0
Response
Michael Brytowski - Great River Energy - 1,3,5,6
Answer
No
Document Name
Comment
The term “provisioned access” adds another undefined term to the NERC standards and doesn’t provide a clear path to regulatory off-prem or cloud
data center services as proposed in the SAR. The only methods to control access to off-prem (cloud) BCSI is either by 1) encrypting BCSI or 2)
purchasing services which allow the entity to manage the off-prem authentication systems – thereby preventing 3rd party systems administrators or
others from compromising entity BCSI stored in cloud data centers. Option 2 is highly unlikely.
a. “Provisioned access” creates a security loophole whereas entities only require authorization for a provisioned access. For example, if access to BCSI
is not provisioned, no authorization to BCSI is required. This does not meet the goal of SAR for controlling access to BCSI. Given the R6 definition
whereas “access to BCSI” occurs when an individual has both “the ability to obtain and use BCSI,” we recommend changing “provisioned access” to
“access to BCSI”.
b. The term “unless already authorized according to Part 4.1” should be removed. Why? Because having authorized access to CIP Cyber Assets does
not preclude the authorization for having access to BCSI.
c. The use of “provisioned, provision or provisioning” of “access,” regardless of tense, would require entities to be audited to, maintain, and provide
documented lists of people and the “provisioned” configurations of entity BES Cyber System Information repositories in order to “verify” the
“authorization” of such provisioned access. The Measures section highlights this expectation where evidence may include individual records, or lists of
whom is authorized. To achieve this evidence, entities would need to provide evidence of systems accounts of on-premises or off premises system
repositories of BCSI. Cloud providers will not provide such lists of personnel who have administrative level access to cloud BCSI server repositories and
entities will be unable to verify what 3rd party off-prem systems administrators have access to BCSI, yet entities will be asked to provide this information
for an entire audit cycle
d. The current language requiring entities to 1) identify repositories and 2) authorize access based on need can also work for 3rd party off-prem or cloud
locations without requiring lists of personnel or configurations of systems accounts for repositories of BCSI. (see recommendations)
Recommendations:
1. Focus only on addressing electronic and physical access to BCSI in off-prem or cloud situations.
2. Consider the following language for R6 Part 6.1:
Authorize access to BCSI based on need, as determined by the Responsible Entity, except for CIP Exceptional Circumstances. Access to BCSI
includes:
6.1.1. Electronic access to electronic BCSI;
6.1.2 Physical access to physical BCSI;
6.1.3 Physical access to unencrypted electronic BCSI (See our comments in Q4).
3. Consider using the perspective of language in CIP-011 “ to prevent unauthorized access to BES Cyber System Information.” This allows entities to
determine the risk and methods to protect BCSI
4. Consider using “authentication systems or encryption of BCSI” for personnel accessing electronic BCSI on cloud prem providers locations
Likes
Dislikes
0
0
Response
Roger Fradenburgh - Roger Fradenburgh On Behalf of: Nicholas Lauriat, Network and Security Technologies, 1; - Roger Fradenburgh
Answer
No
Document Name
Comment
N&ST notes that words can only be nouns, verbs, adjectives, etc. on an individual basis. Calling any two-word phrase a noun is grammatically incorrect.
Beyond that, the phrase, “provisioned access,” as used in proposed CIP-004 requirements, is itself grammatically incorrect by virtue of the fact
“provisioned” is the past tense of the verb, “provision.” It is not an adjective. An individual can be given access or can be provisioned access but cannot
be given provisioned access. Since the SDT has adopted NERC’s informal definition of “access to BCSI” as the ability to “obtain and use” it, N&ST
suggests the SDT maintain consistency with existing CIP-004 language and continue to require that Responsible Entities authorize access to BCSI (or
BCSI storage locations), dropping the misunderstood and grammatically incorrect “provisioned access.”
Likes
0
Dislikes
0
Response
Donna Wood - Tri-State G and T Association, Inc. - 1
Answer
Yes
Document Name
Comment
Tri-State Generation and Transmission appreciates the time and effort given to this project and agrees with the revisions/changes.
Likes
0
Dislikes
0
Response
Masuncha Bussey - Duke Energy - 1,3,5,6 - MRO,Texas RE,SERC, Group Name Duke Energy
Answer
Yes
Document Name
Comment
Duke Energy agrees with the proposed change to “provisioned access” and that the entity will determine how that provisioning will occur.
Likes
0
Dislikes
0
Response
Marty Hostler - Northern California Power Agency - 3,4,5,6
Answer
Yes
Document Name
Comment
NO. See WAPA and Indiana Comments
Likes
1
Dislikes
Northern California Power Agency, 6, Sismaet Dennis
0
Response
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
Yes
Document Name
Comment
MPC agrees that this change provides greater clarity regarding the intent of this requirement and understands that it is the provisioned access that must
be authorized, verified, and revoked.
Likes
0
Dislikes
0
Response
Patrick Wells - OGE Energy - Oklahoma Gas and Electric Co. - 1,3,5,6
Answer
Yes
Document Name
EEI Near Final Draft Comments_ Project 2019-02_Rev_0f_For Review FOR MEMBER REVIEW.docx
Comment
OG&E agrees with EEI's comments
Likes
0
Dislikes
Response
0
Sing Tay - OGE Energy - Oklahoma Gas and Electric Co. - 6, Group Name OKGE
Answer
Yes
Document Name
Comment
OKGE supports comments provided by EEI.
Likes
0
Dislikes
0
Response
Dan Bamber - ATCO Electric - 1
Answer
Yes
Document Name
Comment
Assuming that “provisioned access” means when someone gains and keeps BCSI access? Meaning if someone sees (screen sharing in view mode
only) does not fall under “provisioned access”?
Likes
0
Dislikes
0
Response
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
Yes
Document Name
Comment
Move the note to the parent requirement (R6), since it applies to more than 6.1, and remove the word “Note.”
Likes
0
Dislikes
Response
0
Michael Johnson - Michael Johnson On Behalf of: Ed Hanson, Pacific Gas and Electric Company, 3, 1, 5; Marco Rios, Pacific Gas and Electric
Company, 3, 1, 5; Sandra Ellis, Pacific Gas and Electric Company, 3, 1, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
Yes
Document Name
Comment
PG&E agrees with the proposed modifications. PG&E will define what is “provisioning of access” for our environment and will not need a defined NERC
term since a NERC term may not cover all possible conditions for PG&E.
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
Yes
Document Name
Comment
Move the note to the parent requirement (R6), since it applies to more than 6.1, and remove the word “Note.”
Likes
0
Dislikes
0
Response
Thomas Breene - WEC Energy Group, Inc. - 3
Answer
Yes
Document Name
Comment
We support EEI comments.
Likes
0
Dislikes
Response
0
David Hathaway - WEC Energy Group, Inc. - 6
Answer
Yes
Document Name
Comment
Support comments made by EEI.
Likes
0
Dislikes
0
Response
Clarice Zellmer - WEC Energy Group, Inc. - 5
Answer
Yes
Document Name
Comment
Agree with the proposed change. Would like the SDT to incorporate EEI comments as a non-substantive change during the final EEI review.
Likes
0
Dislikes
0
Response
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
Yes
Document Name
Comment
Southern agrees as with EEI that the change provides greater clarity regarding the intent of the Requirement.
Likes
0
Dislikes
0
Response
Daniel Gacek - Exelon - 1
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
John Galloway - ISO New England, Inc. - 2 - NPCC
Answer
Yes
Document Name
Comment
ISO New England supports this change.
Likes
0
Dislikes
0
Response
Kinte Whitehead - Exelon - 3
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Cynthia Lee - Exelon - 5
Answer
Document Name
Yes
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Becky Webb - Exelon - 6
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Joshua Andersen - Salt River Project - 1,3,5,6 - WECC
Answer
Yes
Document Name
Comment
Be careful adding “NOTES” to requirements. If the purpose is to increase clarity, then consider re-writing the requirement to improve clarify. NOTES
may become overused across CIP standards and cause confusion.
Likes
0
Dislikes
0
Response
Leonard Kula - Independent Electricity System Operator - 2
Answer
Document Name
Comment
Yes
IESO supports the comments submitted by NPCC.
Likes
0
Dislikes
0
Response
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name NPCC Regional Standards Committee
Answer
Yes
Document Name
Comment
We support these changes.
Likes
0
Dislikes
0
Response
Eli Rivera - CenterPoint Energy Houston Electric, LLC - NA - Not Applicable - Texas RE
Answer
Yes
Document Name
Comment
CenterPoint Energy Houston Electric, LLC (CEHE) agrees that “provisioned access” is an improvement and supports the proposed change.
Likes
0
Dislikes
0
Response
Jennifer Flandermeyer - Jennifer Flandermeyer On Behalf of: Allen Klassen, Evergy, 6, 1, 3, 5; Derek Brown, Evergy, 6, 1, 3, 5; Marcus Moor,
Evergy, 6, 1, 3, 5; Thomas ROBBEN, Evergy, 6, 1, 3, 5; - Jennifer Flandermeyer
Answer
Yes
Document Name
Comment
Evergy supports and endorses the comments filed by the Edison Electric Institute.
Likes
0
Dislikes
0
Response
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
Yes
Document Name
Comment
NV Energy agrees that this change provides greater clarity regarding the intent of this Requirement.
Likes
0
Dislikes
0
Response
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
Yes
Document Name
Comment
None.
Likes
0
Dislikes
0
Response
Constantin Chitescu - Ontario Power Generation Inc. - 5
Answer
Yes
Document Name
Comment
OPG supports NPCC Regional Standards Committee’s comments.
Likes
Dislikes
0
0
Response
Larry Heckert - Alliant Energy Corporation Services, Inc. - 4
Answer
Yes
Document Name
Comment
Alliant Energy supports comments submitted by EEI.
Likes
0
Dislikes
0
Response
Bobbi Welch - Midcontinent ISO, Inc. - 2, Group Name ISO/RTO Council Standards Review Committee 2019-02 BCSI Access Management (Draft 3)
Answer
Yes
Document Name
Comment
The ISO/RTO Council Standards Review Committee (IRC SRC) acknowledges the SDT for addressing our prior concerns surrounding the lack of clarity
associated with “provision of access.”
Likes
0
Dislikes
0
Response
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
Yes
Document Name
Comment
ITC supports the response submitted by EEI
Likes
0
Dislikes
Response
0
Lindsay Wickizer - Berkshire Hathaway - PacifiCorp - 6
Answer
Yes
Document Name
Comment
PAC requests the SDT provide better definition of “provisioned access” than what was currently provided in Part 6.1
Likes
0
Dislikes
0
Response
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
Yes
Document Name
Comment
EEI agrees that this change provides greater clarity regarding the intent of this Requirement. However, use of the term “note” creates ambiguity
because it is not clear whether the language in the note creates mandatory obligations. The use of the word “note” should be removed and the
language contained in the note in Requirement R6, Part 6.1 should be elevated to the parent Requirement R6 because the term “provisioned access” is
used in other parts of Requirement R6. Additionally, the note language should be strengthened for additional clarity (e.g., “is to be considered” may not
be clear for industry to understand what the note means)
Likes
0
Dislikes
0
Response
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name CHPD
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 3,4,5 - RF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kimberly Van Brimer - Southwest Power Pool, Inc. (RTO) - 2 - MRO,WECC, Group Name Southwest Power Pool Standards Review Group (SSRG)
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
William Steiner - Midwest Reliability Organization - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Sean Bodkin - Dominion - Dominion Resources, Inc. - 6, Group Name Dominion
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
David Jendras - Ameren - Ameren Services - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Amy Bratkovic - PNM Resources - Public Service Company of New Mexico - 1,3
Answer
Yes
Document Name
Comment
Likes
Dislikes
0
0
Response
Gail Golden - Entergy - Entergy Services, Inc. - 5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Maryanne Darling-Reich - Black Hills Corporation - 1,3,5,6 - MRO,WECC
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Chris Carnesi - Northern California Power Agency - 3,4,5,6 - WECC
Answer
Document Name
Comment
disregard
Likes
0
Dislikes
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Document Name
Comment
Texas RE seeks clarification regarding the scope of the revised CIP-004, Part 6.1. Specifically, Texas RE interprets “provisioned access” to include all
instances in which an individual is “provisioned access” to BCSI. Accordingly, accidental or mistaken provisioned access would be within the scope of
the requirement. Conversely, compromise of BCSI without any specific entity actions to provide the means to access BCSI (such as a data breach)
would not be within the scope of the proposed requirement. Texas RE inquires as to whether this is the SDT’s intent.
Likes
0
Dislikes
0
Response
Doug Peterchuck - Omaha Public Power District - 1
Answer
Document Name
Comment
Likes
0
Dislikes
Response
0
2019-02_Unofficial_Comment_Form_Information-Protection-OPPD.docx
2. The SDT considered industry’s concerns about the absence of “obtain and use” language from the CMEP Practice Guide, which currently
provides alignment on a clear two-pronged test of what constitutes access in the context of utilizing third-party solutions (e.g., cloud
services) for BCSI. The SDT mindfully mirrored this language to assure future enforceable standards are not reintroducing a gap. Do you
agree this clarifying language makes it clear both parameters of this two-pronged test for “obtain and use” must be met to constitute
“access” to BCSI? If not, please provide the basis for your disagreement and an alternate proposal.
Lindsay Wickizer - Berkshire Hathaway - PacifiCorp - 6
Answer
No
Document Name
Comment
Please provide additional clarification in the Standard, and in the technical rationale.
Does the term, ‘use’ allow a user to unencrypt? Potential here for resulting in a potential data manipulation.
Recommendation:
Only use the term, “access.”
See the new R6 versus the former R4 language changes for clarification.
Likes
0
Dislikes
0
Response
Michael Brytowski - Great River Energy - 1,3,5,6
Answer
No
Document Name
Comment
GRE agrees to adding “obtain and use” language to clarify what constitutes an access to BCSI, but disagree to the use of “provisioned access”. After
clarifying the access to BCSI, the language “provisioned” should be removed since it has a security flaw and requires extensive records from
repositories of BCSI (See our comments in Q1).
Recommendations:
1. Only use the term “access” as recommended in Q1
Likes
0
Dislikes
Response
0
Gladys DeLaO - CPS Energy - 1,3,5
Answer
No
Document Name
Comment
CPS Energy suggests “obtain and use” be included within R6 statement.
“Each Responsible Entity shall implement one or more documented access management program(s) to authorize, verify, and revoke provisioned
access that grants the ability to obtain and use BCSI pertaining to the “Applicable Systems” identified in CIP-004-X Table R6 – Access Management
for BES Cyber System Information.
Likes
0
Dislikes
0
Response
Eli Rivera - CenterPoint Energy Houston Electric, LLC - NA - Not Applicable - Texas RE
Answer
No
Document Name
Comment
Additional clarity is needed for what constitutes access by “obtain and use”. Specifically, clarify what “use” means by defining the point at which
information is considered “used”. Does “use” mean immediately when the information is read by someone, or does it mean when the information is
applied for some purpose? For example, if someone obtains information and can read it, and there are additional physical or electronic controls in place
to prevent unauthorized use of the obtained information, do those controls then prevent “access to BCSI” based on the premise that information must be
obtained and used to constitute access to BCSI?
Likes
0
Dislikes
0
Response
Thomas Standifur - Austin Energy - 1,3,4,5,6
Answer
No
Document Name
TPWR_2019-02_Unofficial_Comment_Form_2021-05-10.docx20210504-17090-hsevrj.docx
Comment
In support of Tacoma Powers' comments. Attached.
Likes
0
Dislikes
0
Response
Steven Rueckert - Western Electricity Coordinating Council - 10, Group Name WECC CIP
Answer
No
Document Name
Comment
Integrity should also be included as a security objective for BCSI in addition to confidentiality. Removing “obtain and use” is not consistent with the ERO
Enterprise CMEP Practice Guide nor is it consistent with
https://www.nerc.com/pa/comp/guidance/CMEPPracticeGuidesDL/ERO%20Enterprise%20CMEP%20Practice%20Guide%20_%20BCSI%20%20v0.2%20CLEAN.pdf
In the R6 Requirement language "To be considered access to BCSI in the context of this requirement, an individual has both the ability to obtain and
use BCSI."
- This statement contradicts the Requirement of R6.1. If a user must concurrently have the ability to both, obtain and use BCSI how does that provide
the entity the ability to authorize based on need, as determined by the Responsible Entity?
- The webinar on 4/27/2021 attempted to clarify what the right and left lateral limits of BCSI “use” could be, but further clarifications might be needed to
ensure a consistent approach is expected for authorization and provisioning.
Likes
0
Dislikes
0
Response
Joshua Andersen - Salt River Project - 1,3,5,6 - WECC
Answer
No
Document Name
Comment
Access needs to be better defined, in particular the phrase “use BCSI” – being able to view a document or taking advantage of the information in the
document. Is it “I have access to the file but not able to open it”, or is it “I have BES cyber system IP address, but no ability to get to those systems
because there are other controls preventing me from using that information”?
Where is it in the standard that this is spelled out as a clear definition – “two-prong test”? This is not clear in the question above – shouldn’t the
requirement be more clear?
Likes
0
Dislikes
0
Response
Jennie Wike - Jennie Wike On Behalf of: Hien Ho, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; John Merrell, Tacoma Public Utilities
(Tacoma, WA), 3, 1, 4, 5, 6; Marc Donaldson, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Ozan Ferrin, Tacoma Public Utilities (Tacoma,
WA), 3, 1, 4, 5, 6; Terry Gifford, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; - Jennie Wike, Group Name Tacoma Power
Answer
No
Document Name
Comment
The placement of the “obtain and use” statement gets lost within the construct of the Requirement Language, it appears as an add-on to the high level
R6 language.
Suggested alternative:
“Each Responsible Entity shall implement one or more documented access management program(s) to authorize, verify, and revoke the provisioned
access that grants the ability to obtain and use BCSI pertaining to the “Applicable Systems” identified in CIP-004-X Table R6 – Access Management for
BES Cyber System Information that collectively include each of the applicable requirement parts in CIP-004-X Table R6 – Access Management for BES
Cyber System Information. [Violation Risk Factor: Medium] [Time Horizon: Same Day Operations and Operations Planning]”
Likes
1
Dislikes
Snohomish County PUD No. 1, 3, Chaney Holly
0
Response
Bruce Reimer - Manitoba Hydro - 1
Answer
No
Document Name
Comment
We agree to adding “obtain and use” language to clarify what constitutes an access to BCSI, but disagree to “provisioned access”. After clarifying the
access to BCSI, the language “provisioned” should be removed since it has a security flaw (See our comments in Q1).
Likes
0
Dislikes
0
Response
Sean Bodkin - Dominion - Dominion Resources, Inc. - 6, Group Name Dominion
Answer
Document Name
No
Comment
Dominion Energy is of the opinion that the terms“obtain and use” are ambiguous. We suggest additional language that provides for the Registered
Entity to have the felxibility to define how these terms are applied by adding some additional language to the proposed Requirement as follows: …an
individual has both the ability to obtain and use BCSI as defined by the Registered Entity.
Likes
0
Dislikes
0
Response
Dennis Sismaet - Northern California Power Agency - 6
Answer
No
Document Name
Comment
Please reference Marty Hostler's comments. Thanks.
Likes
0
Dislikes
0
Response
Barry Jones - Barry Jones On Behalf of: sean erickson, Western Area Power Administration, 1, 6; - Barry Jones
Answer
No
Document Name
Comment
1. We agree to adding “obtain and use” language to clarify what constitutes an access to BCSI, but disagree to the use of “provisioned access”.
After clarifying the access to BCSI, the language “provisioned” should be removed since it has a security flaw and requires extensive records
from repositories of BCSI (See our comments in Q1).
Recommendations:
1. Only use the term “access” as recommended in Q1
Likes
0
Dislikes
Response
0
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
No
Document Name
Comment
A user can have provisioned access to obtain BCSI and not use it. The Registered Entity is currently receiving an authorization for a user based on
need to access BCSI. Access to BCSI is enough to constitute an authorization regardless of use. While this clarification assists in the context of thirdparty solutions it does not provide clarity for electronic or physical access to BCSI.
Likes
0
Dislikes
0
Response
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
Yes
Document Name
Comment
EEI agrees that the clarifying language contained in the two-prong test (i.e., “obtain and use”) provides reasonable protections for controlling access to
BCSI, particularly as it relates to BCSI that might be stored in a third-party cloud environment. EEI also agrees that having physical access to BCSI but
not having the ability to use it is impractical because it does not represent access from a functional standpoint or for a useful purpose.
Likes
0
Dislikes
0
Response
Maryanne Darling-Reich - Black Hills Corporation - 1,3,5,6 - MRO,WECC
Answer
Yes
Document Name
Comment
Black Hills would recommend that 6.1’s “Note” section use the same language as R6 opening paragraph. Specifically “ability to obtain and use” should
be used whenever possible, in this instance the “Note” section may read like this, “Provisioned access is to be considered the result of the specific
actions resulting in an individual’s ability to obtain and use BCSI.”
Likes
0
Dislikes
0
Response
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
Yes
Document Name
Comment
ITC supports the response submitted by EEI
Likes
0
Dislikes
0
Response
Bobbi Welch - Midcontinent ISO, Inc. - 2, Group Name ISO/RTO Council Standards Review Committee 2019-02 BCSI Access Management (Draft 3)
Answer
Yes
Document Name
Comment
The IRC SRC supports the reinstatement of “obtain and use” concepts.
Likes
0
Dislikes
0
Response
Larry Heckert - Alliant Energy Corporation Services, Inc. - 4
Answer
Yes
Document Name
Comment
Alliant Energy supports comments submitted by EEI.
Likes
0
Dislikes
Response
0
Constantin Chitescu - Ontario Power Generation Inc. - 5
Answer
Yes
Document Name
Comment
OPG supports NPCC Regional Standards Committee’s comments.
Likes
0
Dislikes
0
Response
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
Yes
Document Name
Comment
None.
Likes
0
Dislikes
0
Response
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
Yes
Document Name
Comment
NVE agrees that the clarifying language contained in the two-prong test (i.e., “obtain and use”) provides reasonable protections for controlling access to
BCSI, particularly as it relates to BCSI that might be stored in a third-party cloud environment. NVE also agrees that having physical access to BCSI
but not having the ability to use it is impractical because it does not represent access from a functional standpoint or for a useful purpose.
Likes
0
Dislikes
Response
0
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Yes
Document Name
Comment
Texas RE agrees that the two-pronged test is an improvement over the existing language. Texas RE is concerned, however, that the verbiage “obtain
and use” is subject to further interpretation. One approach could be to clarify the verbiage to read: “the authorized ability to retrieve, modify, copy, or
move BCSI”. Alternatively, Texas RE recommends creating bright line criteria establishing what it means for the BCSI to be usable.
Likes
0
Dislikes
0
Response
Benjamin Winslett - Georgia System Operations Corporation - 4
Answer
Yes
Document Name
Comment
The ‘obtain and use’ language introduced provides valuable clarification with regard to provisioning and deprovisioning of access and provides context
that will enable clearly defined opportunities to leverage cloud services. However, as drafted, the standard effectively provides different explanations for
"access” versus “provisioned access.” It would increase clarity if these explanations were combined. It is recommended that the note explaining
provisioned access be moved to the main requirement so that all explanatory statements regarding access or provisioned access are in the same
place. In this manner, it is clear that the clarifications to “provisioned access” apply across all parts of requirement R6.
Consistent with our recommendation to question 1 regarding incidental access, this would modify the main requirement of R6 as follows:
…To be considered access to BCSI in the context of this requirement, an individual has both the ability to obtain and use BCSI. Provisioned access is
to be considered the result of the specific actions taken to provide an individual(s) the means to access BCSI (e.g., may include physical keys or access
cards, user accounts and associated rights and privileges, encryption keys). Provisioned access does not include temporary or incidental access when
a specific mechanism for provisioning access is not available or feasible such as when an individual is given, merely views, or might see BCSI such as
during a meeting or visiting a PSP, or when the BCSI is temporarily or incidentally located or stored on work stations, laptops, flash drives, portable
equipment, offices, vehicles etc.
Likes
1
Dislikes
Georgia Transmission Corporation, 1, Davis Greg
0
Response
Jennifer Flandermeyer - Jennifer Flandermeyer On Behalf of: Allen Klassen, Evergy, 6, 1, 3, 5; Derek Brown, Evergy, 6, 1, 3, 5; Marcus Moor,
Evergy, 6, 1, 3, 5; Thomas ROBBEN, Evergy, 6, 1, 3, 5; - Jennifer Flandermeyer
Answer
Document Name
Yes
Comment
Evergy supports and endorses the comments filed by the Edison Electric Institute.
Likes
0
Dislikes
0
Response
Gail Golden - Entergy - Entergy Services, Inc. - 5
Answer
Yes
Document Name
Comment
Entergy supports the inclusion of the “obtain and use” language from the CMEP Practice Guide. This language clarifies that users with
“access” for purposes of the requirement must be able to obtain and use BCSI, which addresses industry’s concern regarding encrypted
data. In particular, the prior language could present a grey area where a user could receive an encrypted BCSI item and be considered as
having the BCSI even though they (conceivably) could not use it. This approach aligns with Entergy’s interpretation under both its current
BCSI program, as well as the guidance and position we are pursuing for BCSI in the cloud
Likes
0
Dislikes
0
Response
Jennifer Bray - Arizona Electric Power Cooperative, Inc. - 1
Answer
Yes
Document Name
Comment
AEPC has signed on to ACES comments.
Likes
0
Dislikes
0
Response
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name NPCC Regional Standards Committee
Answer
Document Name
Yes
Comment
We support the update to this Requirement language.
Likes
0
Dislikes
0
Response
Leonard Kula - Independent Electricity System Operator - 2
Answer
Yes
Document Name
Comment
Support the update to this Requirement language.
Likes
0
Dislikes
0
Response
Becky Webb - Exelon - 6
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Cynthia Lee - Exelon - 5
Answer
Document Name
Comment
Yes
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Kinte Whitehead - Exelon - 3
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
John Galloway - ISO New England, Inc. - 2 - NPCC
Answer
Yes
Document Name
Comment
ISO New England supports this update.
Likes
0
Dislikes
0
Response
Daniel Gacek - Exelon - 1
Answer
Document Name
Comment
Yes
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
Yes
Document Name
Comment
Southern agrees that for access to occur, a user must both obtain BCSI and possess the ability to use BCSI according to the CMEP dated April 26,
2019.
Likes
0
Dislikes
0
Response
David Hathaway - WEC Energy Group, Inc. - 6
Answer
Yes
Document Name
Comment
Support comments made by EEI.
Likes
0
Dislikes
0
Response
Thomas Breene - WEC Energy Group, Inc. - 3
Answer
Document Name
Comment
We support EEI comments.
Yes
Likes
0
Dislikes
0
Response
Michael Johnson - Michael Johnson On Behalf of: Ed Hanson, Pacific Gas and Electric Company, 3, 1, 5; Marco Rios, Pacific Gas and Electric
Company, 3, 1, 5; Sandra Ellis, Pacific Gas and Electric Company, 3, 1, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
Yes
Document Name
Comment
PG&E agrees that the clarification is sufficient.
Likes
0
Dislikes
0
Response
Sing Tay - OGE Energy - Oklahoma Gas and Electric Co. - 6, Group Name OKGE
Answer
Yes
Document Name
Comment
OKGE supports comments provided by EEI.
Likes
0
Dislikes
0
Response
JT Kuehne - AEP - 6
Answer
Yes
Document Name
Comment
AEP agrees with the addition of “obtain and use” language in R6 parent requirement, as this is in alignment with AEP’s BCSInfo program.
Likes
Dislikes
0
0
Response
Kimberly Van Brimer - Southwest Power Pool, Inc. (RTO) - 2 - MRO,WECC, Group Name Southwest Power Pool Standards Review Group (SSRG)
Answer
Yes
Document Name
Comment
The SPP Standards Review Group (SSRG) recommends the word “use” have clarity supplied around the term.
Likes
0
Dislikes
0
Response
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
Yes
Document Name
Comment
MPC appreciates the SDT’s efforts to include the concept from the CMEP Practice Guide. However, we would prefer the language be more specific to
CIP-004, rather than re-introduce the broader “access” concept that goes beyond CIP-004 by using this language instead: “An individual is considered
to have provisioned access to BCSI if they concurrently have the means to both obtain and use the BCSI (e.g., an individual who obtains encrypted
BCSI but does not have the encryption keys does not have provisioned access).” The example is helpful in understanding what is meant by “obtain and
use.”
Likes
0
Dislikes
0
Response
Marty Hostler - Northern California Power Agency - 3,4,5,6
Answer
Yes
Document Name
Comment
NO. See WAPA Contents.
Likes
Dislikes
1
Northern California Power Agency, 6, Sismaet Dennis
0
Response
Masuncha Bussey - Duke Energy - 1,3,5,6 - MRO,Texas RE,SERC, Group Name Duke Energy
Answer
Yes
Document Name
Comment
Duke Energy agrees the proposed changes make it clear that both parameters of the two-pronged test for “obtain and use” must be met to constitute
“access” to BCSI.
Likes
0
Dislikes
0
Response
Roger Fradenburgh - Roger Fradenburgh On Behalf of: Nicholas Lauriat, Network and Security Technologies, 1; - Roger Fradenburgh
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Amy Bratkovic - PNM Resources - Public Service Company of New Mexico - 1,3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
David Jendras - Ameren - Ameren Services - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Clarice Zellmer - WEC Energy Group, Inc. - 5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Dan Bamber - ATCO Electric - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Patrick Wells - OGE Energy - Oklahoma Gas and Electric Co. - 1,3,5,6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
William Steiner - Midwest Reliability Organization - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Yes
Document Name
Comment
Likes
Dislikes
0
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 3,4,5 - RF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name CHPD
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
Document Name
Yes
Comment
Likes
0
Dislikes
0
Response
Donna Wood - Tri-State G and T Association, Inc. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
Response
0
3. The SDT considered industry comments regarding the removal of storage locations. The SDT must enable the CIP standards for the use of
third-party solutions (e.g., cloud services) for BCSI, and retention of that language hinders meeting those FERC directives. The absence of
this former language does not preclude an entity from defining storage locations as the method used within an entity’s access management
program. CIP-004-X, Requirement R6, is at an objective level to permit more than that one approach. Do you agree the requirement retains
the flexibility for storage locations to be used as one way to meet the objective? If not, please provide the basis for your disagreement and an
alternate proposal.
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
No
Document Name
Comment
Storage locations identified for using BCSI is reference in CIP-011-X. CIP-004-X and CIP-011-X should provide consistent terminology.
Likes
0
Dislikes
0
Response
Barry Jones - Barry Jones On Behalf of: sean erickson, Western Area Power Administration, 1, 6; - Barry Jones
Answer
No
Document Name
Comment
1.
i.
We agree to retaining the flexibility for storage locations to be used as one way to meet the objective of SAR, but disagree to using
“provisioned access” (See our comments regarding “provisioned access” in Q1).
ii.
The requirement to provide lists of personnel with “provisioned access” would also require entities to identify the locations of BCSI and
by auditors whom are required to make the link between the repository of BCSI which has been provisioned for access.
Recommendation:
Retain the current language and focus on auditable methods to protect BCSI at 3rd party off-prem (cloud) locations.
Likes
0
Dislikes
0
Response
Dennis Sismaet - Northern California Power Agency - 6
Answer
No
Document Name
Comment
Please reference Marty Hostler's comments. Thanks.
Likes
0
Dislikes
0
Response
JT Kuehne - AEP - 6
Answer
No
Document Name
Comment
The currently effective Requirement Part 4.1.3 of CIP-004-6 reads, “Access to designated storage locations, whether physical or electronic, for BES
Cyber System Information.” Removing “storage locations” from R6 and its subparts, makes it difficult for the entities to comply, as the entities need to
expand their searches for access control when providing compliance evidence. Similar to “Provisioned access” noun, simply stating “BCSI” will make it
intangible where keeping “storage locations” will make the requirement and its subparts tangible.
AEP understands the intent but it is not clear based on how it is currently worded. AEP requests SDT to provide further clarification on the intent and to
provide better definition on “provisioned access” than what was currently provided in Part 6.1 (“Note: Provisioned access is to be considered the result
of the specific actions taken to provide an individual(s) the means to access BCSI (e.g., may include physical keys or access cards, user accounts and
associated rights and privileges, encryption keys).)” AEP also recommends SDT to focus on auditable methods to protect BCSI at 3rd party off-premise
(cloud) locations.
AEP currently defines what constitutes as storage locations in CIP-011-2 R1 information protection program, but for other smaller entities this may
become further complicated to define besides managing access to BCSI storage locations.
Likes
0
Dislikes
0
Response
Sean Bodkin - Dominion - Dominion Resources, Inc. - 6, Group Name Dominion
Answer
No
Document Name
Comment
To ensure a consistent understanding of the issues surrounding information storage on the cloud, Dominion Energy suggests using language similiar to
that in CIP-011 that addresses cloud storage in the proposed CIP-004.
Likes
0
Dislikes
0
Response
Bruce Reimer - Manitoba Hydro - 1
Answer
No
Document Name
Comment
We agree to retaining the flexibility for storage locations to be used as one way to meet the objective of SAR, but disagree to using “provisioned access”
(See our comments regarding “provisioned access” in Q1). The objective of SAR and NERC CMEP BCSI guidance is to prevent unauthorized access to
BCSI rather than “provisioned access to BCSI”. Using “provisioned access to BCSI is lowing the bar for the BCSI authorization doesn’t meet the goal of
SAR for controlling unauthorized access to BCSI. Also “provisioned access” is subjective resulting in no audit consistency since the NERC entities and
auditors may have different ways to interpret it.
Likes
0
Dislikes
0
Response
Jennie Wike - Jennie Wike On Behalf of: Hien Ho, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; John Merrell, Tacoma Public Utilities
(Tacoma, WA), 3, 1, 4, 5, 6; Marc Donaldson, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Ozan Ferrin, Tacoma Public Utilities (Tacoma,
WA), 3, 1, 4, 5, 6; Terry Gifford, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; - Jennie Wike, Group Name Tacoma Power
Answer
No
Document Name
Comment
Tacoma Power supports the objective of the Project 2019-02 SAR, which includes providing a path to allow the use of modern third-party data storage
and analysis systems. While the use of third-party data storage may be enabled to a degree with these modifications, the use of third-party analysis
systems is likely not. Any managed security provider’s solution would likely be considered an EACMS based on the current EACMS definition, which
carries a host of CIP Requirements, not the least of which are found in CIP-004, which would preclude the use of these services in almost every case.
Additionally many modern cybersecurity tools such as local endpoint protection systems, now make use of Cloud services to provide additional context
to the information seen on local systems, and require that much of the system log data be pushed to the Cloud to enable this analysis.
Tacoma Power suggests modification of the EACMS definition to split off access control from access monitoring, which then would allow for requirement
applicability based on risk for access control systems versus access monitoring systems.
Likes
1
Dislikes
Response
Snohomish County PUD No. 1, 3, Chaney Holly
0
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
No
Document Name
Comment
While we agree with the SDT retaining the flexibility for storage locations to be used as one way to meet the objective of SAR, we disagree with using
“provisioned access” based on our concerns in Q5.
Likes
0
Dislikes
0
Response
Jennifer Bray - Arizona Electric Power Cooperative, Inc. - 1
Answer
No
Document Name
Comment
While we agree with the SDT retaining the flexibility for storage locations to be used as one way to meet the objective of SAR, we disagree with using
“provisioned access” based on our concerns in Q5.
AEPC has signed on to ACES comments.
Likes
0
Dislikes
0
Response
Thomas Standifur - Austin Energy - 1,3,4,5,6
Answer
No
Document Name
TPWR_2019-02_Unofficial_Comment_Form_2021-05-10.docx20210504-17090-hsevrj.docx
Comment
In support of Tacoma Powers' comments. Attached.
Likes
0
Dislikes
Response
0
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
No
Document Name
Comment
NVE agrees that the approach provides entities with the additional flexibility to develop and define their own internal procedures regardless of whether
they are using off-premise storage or simply maintaining backward compatibility with their legacy systems. However, we also recognize that the
removal of the term “storage locations” does present challenges for entities trying to reconcile internal processes for legacy systems. For this reason,
we recommend the SDT provide greater clarity through Implementation Guidance, to assist those entities with developing effective processes resulting
from these changes. Specifically, the SDT should develop guidance that would be useful in understanding how to define storage locations as a method
within registered entities’ access management programs. Such guidance would be helpful to ensure backward compatibility.
Likes
0
Dislikes
0
Response
Gladys DeLaO - CPS Energy - 1,3,5
Answer
No
Document Name
Comment
CPS Energy suggests creating a NERC Glossary defined term for “Provisioned Access” instead of adding the Note: within CIP-004 R6 Part
6.1. Additionally, “obtain and use” should be included in the definition.
Likes
0
Dislikes
0
Response
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
No
Document Name
Comment
ERCOT hereby incorporates the comments filed by the ISO/RTO Council Standards Review Committee.
Likes
0
Dislikes
Response
0
Michael Brytowski - Great River Energy - 1,3,5,6
Answer
No
Document Name
Comment
a. GRE agrees to retaining the flexibility for storage locations to be used as one way to meet the objective of SAR, but disagree to using “provisioned
access” (See our comments regarding “provisioned access” in Q1).
b. The requirement to provide lists of personnel with “provisioned access” would also require entities to identify the locations of BCSI and by auditors
whom are required to make the link between the repository of BCSI which has been provisioned for access.
Recommendation:
Retain the current language and focus on auditable methods to protect BCSI at 3rd party off-prem (cloud) locations.
Likes
0
Dislikes
0
Response
Bobbi Welch - Midcontinent ISO, Inc. - 2, Group Name ISO/RTO Council Standards Review Committee 2019-02 BCSI Access Management (Draft 3)
Answer
No
Document Name
Comment
The IRC SRC is concerned that keeping “storage locations” without defining it in the standard or the NERC Glossary will require entities to define it for
themselves. This will create a variety of interpretations throughout the regions.
The IRC SRC recommends the SDT consider defining the term “storage locations” to indicate that storage locations may be physical locations or virtual
locations that are protected using technologies such as access control or encryption
Likes
0
Dislikes
0
Response
Roger Fradenburgh - Roger Fradenburgh On Behalf of: Nicholas Lauriat, Network and Security Technologies, 1; - Roger Fradenburgh
Answer
Document Name
Comment
No
N&ST strongly disagrees with the SDT’s assertion that retention of “designated storage locations,” is a hindrance to using third party / cloud services,
and notes that the SAR for this project states the project will provide “…a secure path towards utilization of modern third-party data storage and analysis
systems.” The real roadblock here, for which solutions are already available, is encryption key management (see our response to Question 9). In
addition, N&ST is concerned that one or more Regional Entities may or may not agree with the SDT’s frequently repeated promise that managing
access to BSCI storage locations will be accepted as a fully compliant equivalent to managing access to BCSI, and that Responsible Entities have the
option of maintaining current practices. As a compromise, N&ST recommends the proposed CIP-004 changes be amended to state explicitly that
Responsible Entities must manage access to one or more of: BCSI, designated electronic storage locations, and designated physical storage locations.
This change would give entities the flexibility of maintaining or dropping “storage locations” or perhaps implementing a hybrid approach.
Likes
0
Dislikes
0
Response
Lindsay Wickizer - Berkshire Hathaway - PacifiCorp - 6
Answer
No
Document Name
Comment
The currently effective Requirement Part 4.1.3 of CIP-004-6 reads, “Access to designated storage locations, whether physical or electronic, for BES
Cyber System Information.” The removal of, “storage locations” from R6 and its subparts, makes it difficult for the entities to comply, as the entities
need to expand their searches for access control when providing compliance evidence.
We disagree with using, “provisioned access” as it is currently defined. The requirement to provide lists of personnel with “provisioned access” would
also require entities to identify the locations of BCSI, and for auditors to make that link to the repository of BCSI, to determine which has been
provisioned for access.
Similar to “Provisioned access” noun, simply stating “BCSI” will make it intangible where keeping “storage locations” will make the requirement and its
subparts tangible. See Q1 comment.
Recommendation:
Retain the current language and focus on auditable methods to protect BCSI at third-party off-prem (cloud based) locations.
Use language similar to that in CIP-011 that addresses cloud storage for the proposed CIP-004.
Recommend creating a NERC Glossary defined term for “Provisioned Access.”
Likes
0
Dislikes
0
Response
Masuncha Bussey - Duke Energy - 1,3,5,6 - MRO,Texas RE,SERC, Group Name Duke Energy
Answer
Yes
Document Name
Comment
Duke Energy agrees the proposed changes retain the flexibility for storage locations to be used as one way to meet the objective.
Likes
0
Dislikes
0
Response
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
Yes
Document Name
Comment
See comments in response to #9 below.
Likes
0
Dislikes
0
Response
Marty Hostler - Northern California Power Agency - 3,4,5,6
Answer
Yes
Document Name
Comment
NO. See WAPA and Indianca Comments.
Likes
1
Dislikes
Northern California Power Agency, 6, Sismaet Dennis
0
Response
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
Document Name
Comment
Yes
MPC agrees that this approach provided entities with the flexibility to define their own internal procedures, which may include continuing to designate
storage locations for BCSI to which individuals can have provisioned access. Provisioned access for those individuals can be authorized, verified, and
revoked.
Likes
0
Dislikes
0
Response
Sing Tay - OGE Energy - Oklahoma Gas and Electric Co. - 6, Group Name OKGE
Answer
Yes
Document Name
Comment
OKGE supports comments provided by EEI.
Likes
0
Dislikes
0
Response
Michael Johnson - Michael Johnson On Behalf of: Ed Hanson, Pacific Gas and Electric Company, 3, 1, 5; Marco Rios, Pacific Gas and Electric
Company, 3, 1, 5; Sandra Ellis, Pacific Gas and Electric Company, 3, 1, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
Yes
Document Name
Comment
PG&E agrees with the modifications which make the Requirement more objective-based.
Likes
0
Dislikes
0
Response
Thomas Breene - WEC Energy Group, Inc. - 3
Answer
Document Name
Comment
Yes
We support EEI comments.
Likes
0
Dislikes
0
Response
David Hathaway - WEC Energy Group, Inc. - 6
Answer
Yes
Document Name
Comment
Support comments made by EEI.
Likes
0
Dislikes
0
Response
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
Yes
Document Name
Comment
Southern agrees as with EEI and industry that this approach provided entities with the needed flexibility to develop and define their own internal
procedures of what constitutes storage for current and future use.
Likes
0
Dislikes
0
Response
Daniel Gacek - Exelon - 1
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
John Galloway - ISO New England, Inc. - 2 - NPCC
Answer
Yes
Document Name
Comment
ISO New England supports this change.
Likes
0
Dislikes
0
Response
Kinte Whitehead - Exelon - 3
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Cynthia Lee - Exelon - 5
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Becky Webb - Exelon - 6
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Leonard Kula - Independent Electricity System Operator - 2
Answer
Yes
Document Name
Comment
If the entity continues using storage location, the entity is responsible for defining storage location. Request confirmation of this expectation.
Likes
0
Dislikes
0
Response
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name NPCC Regional Standards Committee
Answer
Yes
Document Name
Comment
If the entity continues using storage location, the entity is responsible for defining storage location. Request confirmation of this expectation.
Likes
0
Dislikes
Response
0
Gail Golden - Entergy - Entergy Services, Inc. - 5
Answer
Yes
Document Name
Comment
An organization should be able to define storage locations as well as decommission them, as long as appropriate controls are applied in
both processes. The revised standard allows entities to apply controls at either the data level or storage level, without requiring either so
long as data security is achieved.
Likes
0
Dislikes
0
Response
Jennifer Flandermeyer - Jennifer Flandermeyer On Behalf of: Allen Klassen, Evergy, 6, 1, 3, 5; Derek Brown, Evergy, 6, 1, 3, 5; Marcus Moor,
Evergy, 6, 1, 3, 5; Thomas ROBBEN, Evergy, 6, 1, 3, 5; - Jennifer Flandermeyer
Answer
Yes
Document Name
Comment
Evergy supports and endorses the comments filed by the Edison Electric Institute.
Likes
0
Dislikes
0
Response
Benjamin Winslett - Georgia System Operations Corporation - 4
Answer
Yes
Document Name
Comment
Yes, this modification retains the flexibility for storage locations to be used as one way to meet the objective. However, absent clarifying language in the
requirement regarding temporary and incidental access, the standard may inadvertently significantly expand the scope over the currently approved
standard. This language is included in the Technical Rationale, but is not included in any enforceable language. It is recommended that additional
clarification be added as outlined in the response to questions 1 and 2.
Likes
1
Dislikes
Georgia Transmission Corporation, 1, Davis Greg
0
Response
Constantin Chitescu - Ontario Power Generation Inc. - 5
Answer
Yes
Document Name
Comment
OPG supports NPCC Regional Standards Committee’s comments.
Likes
0
Dislikes
0
Response
Larry Heckert - Alliant Energy Corporation Services, Inc. - 4
Answer
Yes
Document Name
Comment
Alliant Energy supports comments submitted by EEI.
Likes
0
Dislikes
0
Response
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
Yes
Document Name
Comment
ITC supports the response submitted by EEI
Likes
0
Dislikes
0
Response
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
Yes
Document Name
Comment
EEI agrees that the approach provides entities with the needed flexibility to develop and define their own internal procedures regardless of whether they
are using off-premise storage or simply maintaining backward compatibility with their legacy systems. However, we also recognize that the removal of
the term “storage locations” does present challenges for entities trying to reconcile internal processes for legacy systems. For this reason, we
recommend the SDT provide greater clarity through Implementation Guidance, to assist those entities with developing effective processes resulting from
these changes. Specifically, the SDT should develop guidance that would be useful in understanding how to define storage locations as a method
within registered entities’ access management programs. Such guidance would be helpful to ensure backward compatibility.
Likes
0
Dislikes
0
Response
Donna Wood - Tri-State G and T Association, Inc. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name CHPD
Answer
Document Name
Comment
Yes
Likes
0
Dislikes
0
Response
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 3,4,5 - RF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kimberly Van Brimer - Southwest Power Pool, Inc. (RTO) - 2 - MRO,WECC, Group Name Southwest Power Pool Standards Review Group (SSRG)
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
William Steiner - Midwest Reliability Organization - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Patrick Wells - OGE Energy - Oklahoma Gas and Electric Co. - 1,3,5,6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Dan Bamber - ATCO Electric - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Clarice Zellmer - WEC Energy Group, Inc. - 5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
David Jendras - Ameren - Ameren Services - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Amy Bratkovic - PNM Resources - Public Service Company of New Mexico - 1,3
Answer
Yes
Document Name
Comment
Likes
Dislikes
0
0
Response
Joshua Andersen - Salt River Project - 1,3,5,6 - WECC
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Steven Rueckert - Western Electricity Coordinating Council - 10, Group Name WECC CIP
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Eli Rivera - CenterPoint Energy Houston Electric, LLC - NA - Not Applicable - Texas RE
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Document Name
Yes
Comment
Likes
0
Dislikes
0
Response
Maryanne Darling-Reich - Black Hills Corporation - 1,3,5,6 - MRO,WECC
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
Response
0
4. To address industry comments while also enabling entities to use third-party solutions (e.g., cloud services) for BCSI, in CIP-004-X,
Requirement R6 Part 6.1, the SDT made a distinction between “electronic access to electronic BCSI” versus “physical access to physical
BCSI”. This clarifies physical access alone to hardware containing electronic BCSI, which is protected with methods that do not permit an
individual to concurrently obtain and use the electronic BCSI, is not provisioned access to electronic BCSI. Do you agree with the proposed
change? If not, please provide the basis for your disagreement and an alternate proposal.
Maryanne Darling-Reich - Black Hills Corporation - 1,3,5,6 - MRO,WECC
Answer
No
Document Name
Comment
Black Hills does not find the distinction necessary. If consistent use of the language “obtain and use” then it should be evident that physical access to a
computer, device, etc. does not constitute access to BCSI. The same logic that applies to a locked filing cabinet should apply to cyber access as well.
Likes
0
Dislikes
0
Response
Bobbi Welch - Midcontinent ISO, Inc. - 2, Group Name ISO/RTO Council Standards Review Committee 2019-02 BCSI Access Management (Draft 3)
Answer
No
Document Name
Comment
The IRC SRC observes that this approach appears to compensate for the removal of the concept of BCSI repositories. We suggest changing “physical
access to physical BCSI” to “physical access to physical BCSI storage locations” as “physical BCSI” limits the definition to the information itself (e.g.
the drawings) and would not extend to include the protection of the storage location or repository as well (e.g. the drawer where the drawings are
stored).
Likes
0
Dislikes
0
Response
Michael Brytowski - Great River Energy - 1,3,5,6
Answer
Document Name
Comment
No
GRE disagrees that the physical access only applies to physical BCSI since controlling access to unencrypted BCSI has not been addressed but will be
required for 3rd party off-prem (cloud) repositories. The physical access to Cyber Assets is a fast avenue to owning the unencrypted electronic BCSI it
contains, which meets “obtain and use” condition and constitutes an access to BCSI.
Recommendation:
Adding “Physical access to unencrypted electronic BCSI” to R6 Part 6.1.3 (See our suggested R6 Part 6.1 changes in Q1).
Likes
0
Dislikes
0
Response
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
No
Document Name
Comment
ERCOT hereby incorporates the comments filed by the ISO/RTO Council Standards Review Committee.
Likes
0
Dislikes
0
Response
Gladys DeLaO - CPS Energy - 1,3,5
Answer
No
Document Name
Comment
CPS Energy disagrees with the proposed changes, including a statement for both physical and electronic access only leads to further questions. CPS
Energy propose defining what is considered Physical BCSI and Electronic BCSI as those terms are not defined by NERC – although should be
understood Physical BSCI could be BSCI on printed medium, white board scribbles, photograph and electronic BCSI would be word docs, pdf, text file,
digital photos – each person could define or scope the words physical and electronic in different ways.
Likes
0
Dislikes
0
Response
Benjamin Winslett - Georgia System Operations Corporation - 4
Answer
No
Document Name
Comment
It is recommended that the SDT directly clarify the understanding that access to data or a tangible item that contains information does not equate to
access to that information. The addition of such a clarification in the standard would simplify the understanding of the applicability of controls to the
protection of BCSI.
Likes
1
Dislikes
Georgia Transmission Corporation, 1, Davis Greg
0
Response
Jennifer Bray - Arizona Electric Power Cooperative, Inc. - 1
Answer
No
Document Name
Comment
See our comments around “provisioned access” in Q5
AEPC has signed on to ACES comments.
Likes
0
Dislikes
0
Response
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
No
Document Name
Comment
See our comments around “provisioned access” in Q5
Likes
0
Dislikes
Response
0
Amy Bratkovic - PNM Resources - Public Service Company of New Mexico - 1,3
Answer
No
Document Name
Comment
In the measures for R6.1, suggested evidence includes “the justification of business need for the provisioned access.” However, similar requirement 4.1
states “authorize based on need” but does not call out the justification of business need in the measures. 6.1 and 4.1 should be consistent in measures.
Likes
0
Dislikes
0
Response
Bruce Reimer - Manitoba Hydro - 1
Answer
No
Document Name
Comment
We disagree that the physical access only applies to physical BCSI since the controlling access to unencrypted BCSI has not been addressed. The
physical access to Cyber Assets is a fast avenue to owning the unencrypted electronic BCSI it contains, which meets “obtain and use” condition and
constitutes an access to BCSI. We suggest adding “Physical access to unencrypted electronic BCSI” to R6 Part 6.1.3 (See our suggested R6 Part 6.1
changes in Q1).
Likes
0
Dislikes
0
Response
Sean Bodkin - Dominion - Dominion Resources, Inc. - 6, Group Name Dominion
Answer
No
Document Name
Comment
Dominion Energy is concerned the the SDT is attempting to define the term "provisioned access" in a footnote. Leaving a term open to interpretation
across Standards is concerning and if a term is being used inconsistently it should be defined in the Glossary of Terms rather than through a footnte for
a Standard.
Likes
0
Dislikes
Response
0
JT Kuehne - AEP - 6
Answer
No
Document Name
Comment
“Physical BCSI” is not a defined term. AEP recommends SDT to either define “physical BCSI” or add further clarifications in Requirement 6. AEP
recommends using the existing language, “Access to designated storage locations, whether physical or electronic, for BES Cyber System Information”
under 6.1.
Likes
0
Dislikes
0
Response
Dennis Sismaet - Northern California Power Agency - 6
Answer
No
Document Name
Comment
Please reference Marty Hostler's comments. Thanks.
Likes
0
Dislikes
0
Response
Barry Jones - Barry Jones On Behalf of: sean erickson, Western Area Power Administration, 1, 6; - Barry Jones
Answer
No
Document Name
Comment
We disagree that the physical access only applies to physical BCSI since controlling access to unencrypted BCSI has not been addressed but will be
required for 3rd party off-prem (cloud) repositories. The physical access to Cyber Assets is a fast avenue to owning the unencrypted electronic BCSI it
contains, which meets “obtain and use” condition and constitutes an access to BCSI.
Recommendation:
Adding “Physical access to unencrypted electronic BCSI” to R6 Part 6.1.3 (See our suggested R6 Part 6.1 changes in Q1).
Likes
0
Dislikes
0
Response
Marty Hostler - Northern California Power Agency - 3,4,5,6
Answer
No
Document Name
Comment
NO. Cloud services should be allowed. However, there is no need to make a distinction between electronic access and physical access.
Likes
1
Dislikes
Northern California Power Agency, 6, Sismaet Dennis
0
Response
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
No
Document Name
Comment
Further clarification should be made to CIP-004-X Part 4.1.2 and Part 6.1.2 to address the difference between physical access to a Physical Security
Perimeter that may house BCSI versus physical access to a physical piece of hardware that houses BCSI. Where does the physical piece of hardware
that houses BCSI need to be stored?
Likes
0
Dislikes
0
Response
Masuncha Bussey - Duke Energy - 1,3,5,6 - MRO,Texas RE,SERC, Group Name Duke Energy
Answer
Document Name
Comment
No
Duke Energy agrees the proposed changes enabling entities to use third-party solutions (e.g., cloud services) for BCSI, in CIP-004-X, Requirement R6
Part 6.1, the SDT made a distinction between “electronic access to electronic BCSI” versus “physical access to physical BCSI”.
Duke Energy does not agree with, and recommends removing, “and the justification of business need for the provisioned access” as a measure in CIP004 R6.1. Managers must be able to authorize access to a large number of employees where they would likely cut and paste a blanket justification for
each person or group. All that should be required is documented authorization and removal along with the record of authorized individuals. The act of
authorization should be considered sufficient that a business need for access exists. There is no risk reduction in documenting this justification, but
there is significant overhead in adding such functionality to existing authorization tools.
Likes
0
Dislikes
0
Response
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
Yes
Document Name
Comment
EEI supports the distinctions made between “electronic access to electronic BCSI” and “physical access to physical BCSI”.
Likes
0
Dislikes
0
Response
Lindsay Wickizer - Berkshire Hathaway - PacifiCorp - 6
Answer
Yes
Document Name
Comment
“Physical BCSI” is not a defined term.
Likes
0
Dislikes
0
Response
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
Yes
Document Name
Comment
ITC supports the response submitted by EEI
Likes
0
Dislikes
0
Response
Larry Heckert - Alliant Energy Corporation Services, Inc. - 4
Answer
Yes
Document Name
Comment
Alliant Energy supports comments submitted by EEI.
Likes
0
Dislikes
0
Response
Constantin Chitescu - Ontario Power Generation Inc. - 5
Answer
Yes
Document Name
Comment
OPG supports NPCC Regional Standards Committee’s comments, and has the following additional comments:
For 6.2 and 6.3, OPG suggest to specify that the requirement is applicable to both physical and electronic provisioned access to BCSI similar to 6.1.
Likes
0
Dislikes
0
Response
Jennifer Flandermeyer - Jennifer Flandermeyer On Behalf of: Allen Klassen, Evergy, 6, 1, 3, 5; Derek Brown, Evergy, 6, 1, 3, 5; Marcus Moor,
Evergy, 6, 1, 3, 5; Thomas ROBBEN, Evergy, 6, 1, 3, 5; - Jennifer Flandermeyer
Answer
Document Name
Yes
Comment
Evergy supports and endorses the comments filed by the Edison Electric Institute.
Likes
0
Dislikes
0
Response
Gail Golden - Entergy - Entergy Services, Inc. - 5
Answer
Yes
Document Name
Comment
Entergy does not oppose distinguishing electronic BCSI from physical BCSI; however, the change raises the question of how entities are to
comply with 6.1.2. If someone prints out the ESP drawings on paper, must they then provide evidence of who has access to their office and
how it was provisioned? Are we just going to expect that no hard copies of BCSI are created, or if so, they are only stored in a secure
physical location with access controls?
Specifying both electronic and/or physical access to BCSI will also mirror treatment of classified information – i.e. different protection
strategies apply depending on the medium. It might be cleaner to just differentiate between electronic access and physical access. If you
have physical access to a Cyber Asset, you still need to somehow get access to the electronic information stored on the physical asset electronic info protection strategies apply. If the physical asset is paper (or maybe removable media) then you may rely more heavily on
physical protection strategies.
Likes
0
Dislikes
0
Response
Thomas Standifur - Austin Energy - 1,3,4,5,6
Answer
Yes
Document Name
TPWR_2019-02_Unofficial_Comment_Form_2021-05-10.docx20210504-17090-hsevrj.docx
Comment
In support of Tacoma Powers' comments. Attached.
Likes
0
Dislikes
Response
0
Leonard Kula - Independent Electricity System Operator - 2
Answer
Yes
Document Name
Comment
N/A.
Likes
0
Dislikes
0
Response
Becky Webb - Exelon - 6
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Cynthia Lee - Exelon - 5
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Kinte Whitehead - Exelon - 3
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
John Galloway - ISO New England, Inc. - 2 - NPCC
Answer
Yes
Document Name
Comment
ISO New England supports this change.
Likes
0
Dislikes
0
Response
Daniel Gacek - Exelon - 1
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
Document Name
Yes
Comment
Southern supports the distinction between “electronic access to electronic BCSI” and “physical access to physical BCSI.”
Likes
0
Dislikes
0
Response
David Hathaway - WEC Energy Group, Inc. - 6
Answer
Yes
Document Name
Comment
Support comments made by EEI.
Likes
0
Dislikes
0
Response
Thomas Breene - WEC Energy Group, Inc. - 3
Answer
Yes
Document Name
Comment
We support EEI comments.
Likes
0
Dislikes
0
Response
Michael Johnson - Michael Johnson On Behalf of: Ed Hanson, Pacific Gas and Electric Company, 3, 1, 5; Marco Rios, Pacific Gas and Electric
Company, 3, 1, 5; Sandra Ellis, Pacific Gas and Electric Company, 3, 1, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
Document Name
Comment
Yes
PG&E agrees with the modifications and clarifications.
Likes
0
Dislikes
0
Response
Dan Bamber - ATCO Electric - 1
Answer
Yes
Document Name
Comment
By this change, can it be clarified that an entity’s IT service provider server rooms (where electronic BCSI is hosted) does not fall under physical BCSI.
Likes
0
Dislikes
0
Response
Sing Tay - OGE Energy - Oklahoma Gas and Electric Co. - 6, Group Name OKGE
Answer
Yes
Document Name
Comment
OKGE supports comments provided by EEI.
Likes
0
Dislikes
0
Response
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
Document Name
Comment
Yes
MPC appreciates this distinction to enable the use of cloud service providers for entities that wish to use them and eliminate the interpretation that every
possible encounter with BCSI cannot be access controlled in the way required by CIP-004, but would still be protected in another way under the entity’s
Information Protection Plan per CIP-011.
Likes
0
Dislikes
0
Response
Roger Fradenburgh - Roger Fradenburgh On Behalf of: Nicholas Lauriat, Network and Security Technologies, 1; - Roger Fradenburgh
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Yes
Document Name
Comment
Likes
Dislikes
0
0
Response
Eli Rivera - CenterPoint Energy Houston Electric, LLC - NA - Not Applicable - Texas RE
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Steven Rueckert - Western Electricity Coordinating Council - 10, Group Name WECC CIP
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name NPCC Regional Standards Committee
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Joshua Andersen - Salt River Project - 1,3,5,6 - WECC
Answer
Document Name
Yes
Comment
Likes
0
Dislikes
0
Response
Jennie Wike - Jennie Wike On Behalf of: Hien Ho, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; John Merrell, Tacoma Public Utilities
(Tacoma, WA), 3, 1, 4, 5, 6; Marc Donaldson, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Ozan Ferrin, Tacoma Public Utilities (Tacoma,
WA), 3, 1, 4, 5, 6; Terry Gifford, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; - Jennie Wike, Group Name Tacoma Power
Answer
Yes
Document Name
Comment
Likes
1
Dislikes
Snohomish County PUD No. 1, 3, Chaney Holly
0
Response
David Jendras - Ameren - Ameren Services - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Clarice Zellmer - WEC Energy Group, Inc. - 5
Answer
Yes
Document Name
Comment
Likes
Dislikes
0
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
Document Name
Yes
Comment
Likes
0
Dislikes
0
Response
Patrick Wells - OGE Energy - Oklahoma Gas and Electric Co. - 1,3,5,6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
William Steiner - Midwest Reliability Organization - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
Response
0
Kimberly Van Brimer - Southwest Power Pool, Inc. (RTO) - 2 - MRO,WECC, Group Name Southwest Power Pool Standards Review Group (SSRG)
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 3,4,5 - RF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name CHPD
Answer
Document Name
Comment
Yes
Likes
0
Dislikes
0
Response
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Donna Wood - Tri-State G and T Association, Inc. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
Response
0
5. The SDT considered industry comments about defining the word “access”. “Access” is broadly used across both the CIP and Operations
& Planning Standards (e.g., open access) and carries different meanings in different contexts. Therefore, the SDT chose not to define
“access” in the NERC Glossary of Terms. Instead, the SDT used the adjective “provisioned” to add context, thereby scoping CIP-004-X,
Requirement R6. Do you agree the adjective “provisioned” in conjunction with the “Note” clarifies what “provisioned access” is? If not,
please provide the basis for your disagreement and an alternate proposal.
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
No
Document Name
Comment
CIP-004-X R2, R3, and R4 discusses authorized access. A user is to be authorized prior to being provisioned. If the CIP-004-X R6 requirements focus
on provisioned users there is a gap of users who may be authorized and not yet provisioned. The SDT should chose to define authorized access in
place of or in conjunction with provisioned access.
Likes
0
Dislikes
0
Response
Marty Hostler - Northern California Power Agency - 3,4,5,6
Answer
No
Document Name
Comment
NO. NERC Terms need a definition which is to be used for both CIP and O&P standards. Else Registered Entities will be subject to Regional Entity
auditor interpretations not vetted by industry.
Likes
1
Dislikes
Northern California Power Agency, 6, Sismaet Dennis
0
Response
Barry Jones - Barry Jones On Behalf of: sean erickson, Western Area Power Administration, 1, 6; - Barry Jones
Answer
Document Name
Comment
No
1. Based on WAPA’s disagreement of the term“provisioned access” and given that the SDT has defined “access to BCSI” in R6, the term
“provisioned access” should be removed due to the creation of an unintended security loophole (See our comments in Q1).
2. Access, which occurs in CIP standards language, whether it is electronic and/or logical access, physical access, unescorted physical access,
remote access, or interactive remote access is clearly understood, has been widely adopted by industry and regulators, and has been subject to
hundreds of audits across all regions for the past 14 years. Entities have developed internal documentation, configured systems, implemented
controls tasks and standardized programs on these terms. The adjective “provisioned” adds further terms, requires changes and is of little value
regarding the actions required of entities and the output deliverables or evidence.
Recommendation:
3. Revise the language to focus on access to BCSI and the auditable methods to protect BCSI at 3rd party off-prem (cloud) locations.
Likes
0
Dislikes
0
Response
Dennis Sismaet - Northern California Power Agency - 6
Answer
No
Document Name
Comment
Please reference Marty Hostler's comments. Thanks.
Likes
0
Dislikes
0
Response
JT Kuehne - AEP - 6
Answer
No
Document Name
Comment
The currently effective Requirement Part 4.1.3 of CIP-004-6 reads, “Access to designated storage locations, whether physical or electronic, for BES
Cyber System Information.” AEP suggests to use similar language from Part 4.1.3 as suggested in our response to Question #4 above. AEP
recommends 6.1 use similar language to 4.1, i.e., “Process to authorize based on need, as determined by the Responsible Entity, except for CIP
Exceptional Circumstances: Access to designated storage locations, whether physical or electronic, for BES Cyber System Information”
Likes
0
Dislikes
0
Response
Sean Bodkin - Dominion - Dominion Resources, Inc. - 6, Group Name Dominion
Answer
No
Document Name
Comment
Dominion Energy is concerned the the SDT is attempting to define the term "provisioned access" in a footnote. Leaving a term open to interpretation
across Standards is concerning and if a term is being used inconsistently it should be defined in the Glossary of Terms rather than through a footnte for
a Standard.
Likes
0
Dislikes
0
Response
Bruce Reimer - Manitoba Hydro - 1
Answer
No
Document Name
Comment
Given that SDT has defined the “access to BCSI” in R6, the provisioned access needs to be removed since it has a unintended security loophole (See
our comments in Q1).
Likes
0
Dislikes
0
Response
Jennie Wike - Jennie Wike On Behalf of: Hien Ho, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; John Merrell, Tacoma Public Utilities
(Tacoma, WA), 3, 1, 4, 5, 6; Marc Donaldson, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Ozan Ferrin, Tacoma Public Utilities (Tacoma,
WA), 3, 1, 4, 5, 6; Terry Gifford, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; - Jennie Wike, Group Name Tacoma Power
Answer
No
Document Name
Comment
Providing the definition of “provisioned access” within the Standard via the Note: within CIP-004 R6 Part 6.1 does not provide sufficient clarity to
Industry. Tacoma Power suggests that it would be beneficial to create a NERC Glossary defined term for “Provisioned Access.”
Likes
1
Dislikes
Snohomish County PUD No. 1, 3, Chaney Holly
0
Response
Joshua Andersen - Salt River Project - 1,3,5,6 - WECC
Answer
No
Document Name
Comment
If “provisioned” is needed, then what is non-provisioned access? SRP does don’t think “provisioned” is necessary, but adding it does not cause much
concern. Access might need to be a defined term rather than using notes even if broken down between O&P and CIP.
Likes
0
Dislikes
0
Response
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
No
Document Name
Comment
While we agree with the SDT usage of “provisioned” and the use of the “Note” to help clarify access, the “Note” does not reduce the audit risk to an
Entity. The “Note” is purely there for explanation and is not a NERC accepted definition nor does it have to be accepted by an auditor. The fact this has
to be explained or even noted shows the ongoing existing problem with the way “access” is used in the CIP standards.
If a “Note” for “provisioned access” is needed to help scope “access”, then EVERY requirement with “access” in the CIP standards should have a
“Note”. Defining “access” is not part of this SAR thus any modifications to “access” is out of the scope of the SAR and not a part of this change.
Further the fact that the “Note” uses “is to be considered” is not binding to the requirement. It either is considered or not considered. The way the
“Note” is written, access could or could not be “considered the result of the specific actions taken to provide an individual(s) the means to access
BCSI”. If there was a way to make the “Note” binding, to be acceptable, the “Note” should be specific: “Provisioned access is the result of the specific
actions taken to provide an individual(s) the means to access BCSI”. Due to the first sentence of the question, it is not possible to define “access”
alone, thus definitions for various types of access could be defined such as BCSI Access in this case.
Likes
0
Dislikes
0
Response
Jennifer Bray - Arizona Electric Power Cooperative, Inc. - 1
Answer
No
Document Name
Comment
While we agree with the SDT usage of “provisioned” and the use of the “Note” to help clarify access, the “Note” does not reduce the audit risk to an
Entity. The “Note” is purely there for explanation and is not a NERC accepted definition nor does it have to be accepted by an auditor. The fact this has
to be explained or even noted shows the ongoing existing problem with the way “access” is used in the CIP standards.
If a “Note” for “provisioned access” is needed to help scope “access”, then EVERY requirement with “access” in the CIP standards should have a
“Note”. Defining “access” is not part of this SAR thus any modifications to “access” is out of the scope of the SAR and not a part of this change.
Further the fact that the “Note” uses “is to be considered” is not binding to the requirement. It either is considered or not considered. The way the
“Note” is written, access could or could not be “considered the result of the specific actions taken to provide an individual(s) the means to access
BCSI”. If there was a way to make the “Note” binding, to be acceptable, the “Note” should be specific: “Provisioned access is the result of the specific
actions taken to provide an individual(s) the means to access BCSI”. Due to the first sentence of the question, it is not possible to define “access”
alone, thus definitions for various types of access could be defined such as BCSI Access in this case.
AEPC has signed on to ACES comments.
Likes
0
Dislikes
0
Response
Thomas Standifur - Austin Energy - 1,3,4,5,6
Answer
No
Document Name
TPWR_2019-02_Unofficial_Comment_Form_2021-05-10.docx20210504-17090-hsevrj.docx
Comment
In support of Tacoma Powers' comments. Attached.
Likes
0
Dislikes
0
Response
Gladys DeLaO - CPS Energy - 1,3,5
Answer
Document Name
Comment
No
CPS Energy suggests creating a NERC Glossary defined term for “Provisioned Access” instead of adding the Note: within CIP-004 R6 Part
6.1. Additionally, “obtain and use” should be included in the definition.
Likes
0
Dislikes
0
Response
Michael Brytowski - Great River Energy - 1,3,5,6
Answer
No
Document Name
Comment
a. Given that the SDT has defined “access to BCSI” in R6, and the term “provisioned access” should be removed due to the creation of an unintended
security loophole (See our comments in Q1).
b. Access, which occurs in CIP standards language, whether it is electronic and/or logical access, physical access, unescorted physical access, remote
access, or interactive remote access is clearly understood, has been widely adopted by industry and regulators, and has been subject to hundreds of
audits across all regions for the past 14 years. Entities have developed internal documentation, configured systems, implemented controls tasks and
standardized programs on these terms. The adjective “provisioned” adds further terms, requires changes and is of little value regarding the actions
required of entities and the output deliverables or evidence.
Recommendation:
1. Revise the language to focus on access to BCSI and the auditable methods to protect BCSI at 3rd party off-prem (cloud) locations
Likes
0
Dislikes
0
Response
Roger Fradenburgh - Roger Fradenburgh On Behalf of: Nicholas Lauriat, Network and Security Technologies, 1; - Roger Fradenburgh
Answer
No
Document Name
Comment
N&ST notes that “provisioned” is not an adjective. Beyond that, “access” has already been given a contextual definition: “Obtain and use.” N&ST
suggests the SDT maintain consistency with existing CIP-004 language and continue to require that Responsible Entities authorize access to BCSI
and/or BCSI storage locations.
Likes
Dislikes
0
0
Response
Masuncha Bussey - Duke Energy - 1,3,5,6 - MRO,Texas RE,SERC, Group Name Duke Energy
Answer
Yes
Document Name
Comment
Duke Energy agrees the adjective “provisioned” in conjunction with the “Note” clarifies what “provisioned access” is.
Likes
0
Dislikes
0
Response
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
Yes
Document Name
Comment
MPC supports not defining “access” as a NERC glossary term, as this could be difficult and have unintended consequences for other standards. MPC
agrees that the use of “provisioned” and the note adds enough context to clarify what kind of access the requirements are about.
Likes
0
Dislikes
0
Response
William Steiner - Midwest Reliability Organization - 10
Answer
Yes
Document Name
Comment
Provisioned access’ in Part 6.3 doesn’t necessarily trigger the removal of accesses granted maliciously or inadvertently, and accepts a security and
reliability risk that is mitigated in today’s language. The use of provisioned access in Part 6.1 (authorize) and 6.2 (verify) is fine. Consider “… ability to
access BCSI…” instead of “…ability to use provisioned access…” for Part 6.3 only
Likes
Dislikes
0
0
Response
Sing Tay - OGE Energy - Oklahoma Gas and Electric Co. - 6, Group Name OKGE
Answer
Yes
Document Name
Comment
OKGE supports comments provided by EEI.
Likes
0
Dislikes
0
Response
Michael Johnson - Michael Johnson On Behalf of: Ed Hanson, Pacific Gas and Electric Company, 3, 1, 5; Marco Rios, Pacific Gas and Electric
Company, 3, 1, 5; Sandra Ellis, Pacific Gas and Electric Company, 3, 1, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
Yes
Document Name
Comment
PG&E agrees with the adjective “provisioned” and as noted in the comment for Question 1, will define what “provisioned” means to PG&E and following
the definition in our implementation of the modifications.
Likes
0
Dislikes
0
Response
Thomas Breene - WEC Energy Group, Inc. - 3
Answer
Yes
Document Name
Comment
We support EEI comments.
Likes
0
Dislikes
Response
0
David Hathaway - WEC Energy Group, Inc. - 6
Answer
Yes
Document Name
Comment
Support comments made by EEI.
Likes
0
Dislikes
0
Response
Clarice Zellmer - WEC Energy Group, Inc. - 5
Answer
Yes
Document Name
Comment
Agree with the use of term provisioned. Would like the SDT to incorporate EEI comments as a non-substantive change during the final EEI review.
Likes
0
Dislikes
0
Response
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
Yes
Document Name
Comment
Southern agrees with the defining adjective of “provisioned” as the actions that may be taken to provide access to both electronic and physical
BCSI. The “Note” further clarifies what possible specific actions may be considered as provisioned.
Likes
0
Dislikes
0
Response
John Galloway - ISO New England, Inc. - 2 - NPCC
Answer
Yes
Document Name
Comment
ISO New England supports the clarification in the “Note”.
Likes
0
Dislikes
0
Response
Kinte Whitehead - Exelon - 3
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Cynthia Lee - Exelon - 5
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Becky Webb - Exelon - 6
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Amy Bratkovic - PNM Resources - Public Service Company of New Mexico - 1,3
Answer
Yes
Document Name
Comment
Suggest reiterating the “Obtain and use” qualifier in the Main R6 requirement. This well better explain what “Access” really means.
Likes
0
Dislikes
0
Response
Leonard Kula - Independent Electricity System Operator - 2
Answer
Yes
Document Name
Comment
We agree that the Note clarifies provisioned access.
We have concerns – 1) as written the reference to Part 4.1 could result in double jeopardy; 2) request clarification on how granting access in Part 4.1
could provide authorization to BCSI required in Part 6.1
Likes
0
Dislikes
0
Response
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name NPCC Regional Standards Committee
Answer
Yes
Document Name
Comment
We agree that the Note clarifies provisioned access.
We have concerns – 1) as written the reference to Part 4.1 could result in double jeopardy; 2) request clarification on how granting access in Part 4.1
could provide authorization to BCSI required in Part 6.1
Likes
0
Dislikes
0
Response
Steven Rueckert - Western Electricity Coordinating Council - 10, Group Name WECC CIP
Answer
Yes
Document Name
Comment
Considering the R6.1 ‘Note,’ the SDT should further clarify “provisioned access” in the IG/Technical Rationale and specifically address the “underlay”
(CSP environment) from the “overlay” (SaaS, IaaS, PaaS) where “provisioned access” to BCSI is given.
Likes
0
Dislikes
0
Response
Jennifer Flandermeyer - Jennifer Flandermeyer On Behalf of: Allen Klassen, Evergy, 6, 1, 3, 5; Derek Brown, Evergy, 6, 1, 3, 5; Marcus Moor,
Evergy, 6, 1, 3, 5; Thomas ROBBEN, Evergy, 6, 1, 3, 5; - Jennifer Flandermeyer
Answer
Yes
Document Name
Comment
Evergy supports and endorses the comments filed by the Edison Electric Institute.
Likes
0
Dislikes
0
Response
Benjamin Winslett - Georgia System Operations Corporation - 4
Answer
Yes
Document Name
Comment
From a technical standpoint, the addition of ‘provisioned’ provides clear delineation regarding the definition of ‘access’ in this context. Please reference
the above comments in questions 1 and 2 regarding inclusion of clarifying language and guidance provided in the Technical Rationale within the
standard. Additionally, it is recommended that the Note regarding provisioned access be moved to the main requirement in R6 where the term
“provisioned access” is first used. This will also provide clarification that the note applies to all uses of the term within the requirement and not just part
6.1.
Likes
1
Dislikes
Georgia Transmission Corporation, 1, Davis Greg
0
Response
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
Yes
Document Name
Comment
None.
Likes
0
Dislikes
0
Response
Constantin Chitescu - Ontario Power Generation Inc. - 5
Answer
Yes
Document Name
Comment
OPG supports NPCC Regional Standards Committee’s comments, and has the following additional comments:
Please provide additional clarification why the use of term “provisioned” is limited to access to BCSI and not also in Requirement 4 and 5.
Likes
0
Dislikes
Response
0
Larry Heckert - Alliant Energy Corporation Services, Inc. - 4
Answer
Yes
Document Name
Comment
Alliant Energy supports comments submitted by EEI.
Likes
0
Dislikes
0
Response
Bobbi Welch - Midcontinent ISO, Inc. - 2, Group Name ISO/RTO Council Standards Review Committee 2019-02 BCSI Access Management (Draft 3)
Answer
Yes
Document Name
Comment
The IRC SRC has no concerns about adding “provisioned” to provide context, however, we are unsure if this helps clarify what constitutes access.
Additional attempts to clarify “access” by the SDT may not be necessary. Individual entities have been successful in defining “access” for themselves
and their programs whereby Attachment C and prior audit records can continue to support this approach.
Likes
0
Dislikes
0
Response
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
Yes
Document Name
Comment
ITC supports the response submitted by EEI
Likes
0
Dislikes
0
Response
Maryanne Darling-Reich - Black Hills Corporation - 1,3,5,6 - MRO,WECC
Answer
Yes
Document Name
Comment
Black Hills agrees with the decision, it should be evident that access is simply the ability to obtain and use, any further specifications beyond that should
be an entity decision.
Likes
0
Dislikes
0
Response
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
Yes
Document Name
Comment
EEI supports not defining “Access” and agrees that providing a NERC glossary definition could have unintended consequences. EEI supports the
decision to define “provisioned access” in the context of CIP-004 to be sufficient for the purposes of this standard but also recommends that this
definition be elevated to the parent Requirement R6 given that “provision access” is used throughout this requirement. (See EEI comments to Question
1)
Likes
0
Dislikes
0
Response
Donna Wood - Tri-State G and T Association, Inc. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name CHPD
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 3,4,5 - RF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kimberly Van Brimer - Southwest Power Pool, Inc. (RTO) - 2 - MRO,WECC, Group Name Southwest Power Pool Standards Review Group (SSRG)
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Patrick Wells - OGE Energy - Oklahoma Gas and Electric Co. - 1,3,5,6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Dan Bamber - ATCO Electric - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
Yes
Document Name
Comment
Likes
Dislikes
0
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
David Jendras - Ameren - Ameren Services - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Eli Rivera - CenterPoint Energy Houston Electric, LLC - NA - Not Applicable - Texas RE
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Gail Golden - Entergy - Entergy Services, Inc. - 5
Answer
Document Name
Yes
Comment
Likes
0
Dislikes
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Lindsay Wickizer - Berkshire Hathaway - PacifiCorp - 6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
Response
0
Daniel Gacek - Exelon - 1
Answer
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
Response
0
6. In response to industry concerns regarding double jeopardy or confusion with CIP-013, the SDT removed CIP-011-X, Requirement R1 Parts
1.3 and 1.4, in favor of simplifying CIP-011-X, Requirement R1 Part 1.1, and adjusting Part 1.2 to broaden the focus around the
implementation of protective methods and secure handling methods to mitigate risks of compromising confidentiality. Do you agree with the
proposed changes? If not, please provide the basis for your disagreement and an alternate proposal.
Lindsay Wickizer - Berkshire Hathaway - PacifiCorp - 6
Answer
No
Document Name
Comment
These proposed changes have not met the requirement of the SAR to prevent unauthorized access.
CIP-011 R1 Part 1.2, should be in alignment with CIP-004 R6 Part 6.1.
While detailed instructions are addressed in, “Measures” instead of in the “requirements.” Comparing with the previous draft; this version is less
burdensome, and covers broader situations, and, it reduces the repeated way to present methods used in different states of transit, storage, and use.
However, in ‘Part 1.2 to broaden the focus on protecting and securely handling BCSI….’ in this current form it is contradictory with, ‘methods to protect’
in the Rationale, as their objectives are different.
Recommendation:
We suggest adding “prevent unauthorized access to BCSI” to R1 Part 1.2 so that it is in alignment with CIP-004 R6.1:
“Method(s) to protect and securely handle BCSI Information to prevent unauthorized access to BCSI, including storage, transit, and use.”
See the question to ‘broaden’ the focus of the language, and then the Technical Rationale says to be ‘explicit’…this seems to be contradictory – this
needs further investigation. See the new language in 1.2 as compared to the previous 1.3 & 1.4. This could result in a burden to industry here.
Likes
0
Dislikes
0
Response
Roger Fradenburgh - Roger Fradenburgh On Behalf of: Nicholas Lauriat, Network and Security Technologies, 1; - Roger Fradenburgh
Answer
No
Document Name
Comment
N&ST agrees with the SDT’s decision to drop proposed Requirement R1 Parts 1.3 and 1.4. However, we disagree with the proposed changes to Parts
1.1 and 1.2, as we believe the existing language adequately defines the required elements of an Information Protection Program.
Likes
Dislikes
0
0
Response
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
No
Document Name
Comment
While detailed instructions are addressed in, “Measures” instead of in the “requirements.” Comparing with the previous draft; this version is less
burdensome, and covers broader situations, and, it reduces the repeated way to present methods used in different states of transit, storage, and use.
However, in ‘Part 1.2 to broaden the focus on protecting and securely handling BCSI….’ in this current form it is contradictory with, ‘methods to protect’
in the Rationale, as their objectives are different.
NVE suggests adding “prevent unauthorized access to BCSI” to R1 Part 1.2 so that it is in alignment with CIP-004 R6.1:
“Method(s) to protect and securely handle BCSI Information to prevent unauthorized access to BCSI, including storage, transit, and use.”
See the question to ‘broaden’ the focus of the language, and then the Technical Rationale says to be ‘explicit’…this seems to be contradictory – this
needs further investigation. See the new language in 1.2 as compared to the previous 1.3 & 1.4. This could result in a burden to industry here.
Likes
0
Dislikes
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
No
Document Name
Comment
Texas RE is concerned that the proposed changes remove the concept of integrity, which is as equally important as the concept of confidentiality. The
current approved language in Requirement Part 1.2 specifically supports the concept of integrity through the phrase “storage, transit, and use.” Texas
RE asserts that such comprehensive language regarding BCSI storage, transit, and use – that is ensuring confidentiality and integrity – should continue
to be included. Texas RE recommends adding “and integrity” after confidentiality in Requirement Part 1.2.
Additionally, Texas RE recommends the removal of “[i]mplementation of administrative methods” as an example of evidence for off-premise BCSI. If a
Registered Entity intends to make use of third-party services for storing BCSI the Registered Entity is still responsible for ensuring the safety of the
BCSI. A risk assessment or business agreement with the third-party vendor does not provide sufficient risk mitigation should the third-party vendor be
compromised.
Lastly, as mentioned in response to Question #2, Texas RE recommends adding bright line criteria for determining usability of BCSI to CIP-011
Requirement Part 1.2. Texas RE recommends the following language:
1.2.1 - Method(s) to limit the ability of unauthorized individuals from obtaining or using BCSI. 1.2.2 - Method(s) to limit the ability of unauthorized
individuals from modifying BCSI without being detected.
For those methods that use encryption, utilize an encryption key strength of at least 128 bits, in accordance with NIST.
For those methods that use hashing, utilize a hash function with an output size of at least 256 bits, in accordance with NIST.
Likes
0
Dislikes
0
Response
Benjamin Winslett - Georgia System Operations Corporation - 4
Answer
No
Document Name
Comment
The proposed simplification is useful with the exception of the verbiage added to Requirement R1.2. Specifically, the term to mitigate the risk of
compromising confidentiality is overly broad and ambiguous and could result in subjective interpretation during audits. The technical rational states that
this change was made to “reduce confusion” but instead it has only added ambiguity. The existing language does not hinder the objectives of this SDT
in any manner. Keeping this language consistent with the approved version of the standard will prevent unnecessary modification of existing CIP-011
programs, especially for those entities who have no desire to use cloud-hosted solutions.
As such, it is recommended that the language to R1.2 remain as follows:
Method(s) to protect and securely handle BCSI, including storage, transit, and use.
Likes
1
Dislikes
Georgia Transmission Corporation, 1, Davis Greg
0
Response
Thomas Standifur - Austin Energy - 1,3,4,5,6
Answer
No
Document Name
TPWR_2019-02_Unofficial_Comment_Form_2021-05-10.docx20210504-17090-hsevrj.docx
Comment
In support of Tacoma Powers' comments. Attached.
Likes
0
Dislikes
0
Response
Steven Rueckert - Western Electricity Coordinating Council - 10, Group Name WECC CIP
Answer
No
Document Name
Comment
Integrity is an important security objective for ‘Real-time Assessment and Real-time monitoring data’ and is address in CIP-012. However, this should
not negate the need to ensure the integrity of BCSI remains a security objective as well as confidentiality.
Likes
0
Dislikes
0
Response
Amy Bratkovic - PNM Resources - Public Service Company of New Mexico - 1,3
Answer
No
Document Name
Comment
We agree with comments from Duke Energy.
Likes
0
Dislikes
0
Response
Jennie Wike - Jennie Wike On Behalf of: Hien Ho, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; John Merrell, Tacoma Public Utilities
(Tacoma, WA), 3, 1, 4, 5, 6; Marc Donaldson, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Ozan Ferrin, Tacoma Public Utilities (Tacoma,
WA), 3, 1, 4, 5, 6; Terry Gifford, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; - Jennie Wike, Group Name Tacoma Power
Answer
No
Document Name
Comment
Tacoma Power supports the inclusion of method(s) as opposed to procedure(s); however, the inclusion of the objective of “mitigate the risk of
compromising confidentiality” does not follow the current language provided in CIP-012 on order to maintain Standards consistency.
Therefore, Tacoma Power suggests the following alternative language:
“Method(s) to protect and securely handle BCSI to mitigate the risks posed by unauthorized disclosure and unauthorized modification of BCSI.”
The inclusion of unauthorized modification supports the fact that entities rely on the integrity of their BCSI in many instances, and should provide
protections for data integrity where there is a risk associated with data integrity.
Likes
1
Dislikes
Snohomish County PUD No. 1, 3, Chaney Holly
0
Response
Bruce Reimer - Manitoba Hydro - 1
Answer
No
Document Name
Comment
We disagree with R1 Part 1.2 changes since these changes haven’t resolved the goal of SAR that is to prevent unauthorized access to BCSI while in
transit, storage, and in use. CIP-011 requirements should be in alignment with CIP-004 R6 Part 6.1 to ensure only authorized personnel can possess
BCSI. Using “mitigate the risks..” is subjective resulting in no audit consistency since the NERC entities and auditors may have different ways to
interpret it.
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
No
Document Name
Comment
We agree with the removal of language of “storage, security during transit, and use” from the requirement. However, we do not see the need to mention
this language again in the measures and ask that this language be removed.
Likes
0
Dislikes
0
Response
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
No
Document Name
Comment
MidAmerican Energy agrees with removal of Parts 1.3 and 1.4. However, we are concerned with the lack of clarity of the language of Part 1.2. The CIP011-X Technical Rationale states that methods to protect BCSI “becomes explicitly comprehensive.” This question refers to a “broadened” focus, but the
requirement does not clearly explain the broadened focus and comprehensive expectations. We request additional information be added to Technical
Rationale regarding expectations of the requirement, including the difference between version 2 and the proposed version X.
We agree with the removal of language of “storage, security during transit, and use” from the requirement. However, we do not see the need to mention
this language again in the measures and ask that this language be removed.
Likes
0
Dislikes
0
Response
Sean Bodkin - Dominion - Dominion Resources, Inc. - 6, Group Name Dominion
Answer
No
Document Name
Comment
Dominion Energy is concerned with the addition of “to mitigate risks of compromising confidentiality”. This additional language seems to require that
Registered Entities develop methodologies and processes to determine levels of risk. Furthermore, the term mitigate risks is very subjective and could
be interpreted differently by the respective parties involved. This addition doesn’t appear to address any risks or identified gaps. Please clarify the intent
of the use of the language.
Likes
0
Dislikes
0
Response
JT Kuehne - AEP - 6
Answer
No
Document Name
Comment
AEP supports the removal of Requirement R1 Parts 1.3 and 1.4, and the minor adjustment made to Requirement R1, Part 1.1.
AEP has concerns that the adjustments made to Requirement R1, Part 1.2, made this requirement overly broad, especially considering the
management of the off-premise BCSI. Specifically, AEP is concerned with the breadth and depth of L1 and L2 evidence that would be required to
demonstrate compliance and mitigating risks of compromising confidentiality associated with Requirement R1, Part 1.2 with regard to off-premise
BCSI. Further, it is not clear what would constitute acceptable methodologies or procedures (self-audit, independent audits, SOC1/SOC2 reviews, etc.)
for AEP to validate a third party's control environment (provided the third party cooperates with AEP's request) sufficient to demonstrate compliance and
mitigating risks of compromising confidentiality associated with Requirement R1, Part 1.2 with regard to off-premise BCSI. Finally, it is not clear to what
level AEP will need to document, monitor, and enforce controls implemented and administered by a third party who maintains AEP's BCSI off-premise.
AEP is also concerned with any unintended consequences from the proposed language, as it could be interpreted to mean any vendor’s use of BSCI,
even if it is stored on AEP’s systems, and not BSCI that is stored, transmitted, or used by a 3rd party vendors on their system(s).
Likes
0
Dislikes
0
Response
William Steiner - Midwest Reliability Organization - 10
Answer
No
Document Name
Comment
In CIP-011-X, Part 1.2, the proposed draft excludes risks related to data integrity. Omission of data integrity would require supplemental Practice
Guides by the ERO Enterprise to determine what cloud environment risks are related to confidentiality vs. integrity. In practicality most data access
risks overlap between those two legs of the CIA triad, and will be difficult or impossible to enforce some data risk scenarios with data confidentiality
alone.
Also, the mapping document ‘Description and Change Justification’ indicates that the focus for CIP-011-X Part 1.2 was intended to be broader, but the
change appears to be narrower than existing language. One or the other must be in error, but we are not sure which.
Likes
0
Dislikes
0
Response
Dennis Sismaet - Northern California Power Agency - 6
Answer
No
Document Name
Comment
Please reference Marty Hostler's comments. Thanks.
Likes
0
Dislikes
Response
0
Barry Jones - Barry Jones On Behalf of: sean erickson, Western Area Power Administration, 1, 6; - Barry Jones
Answer
No
Document Name
Comment
We do not agree with R1 Part 1.2 changes since these changes haven’t resolved the goal of SAR that is to prevent unauthorized access to BCSI while
in transit, storage, and in use. CIP-011 requirements should be in alignment with CIP-004 R6 Part 6.1 to ensure only authorized personnel can possess
BCSI.
Recommendations:
We suggest adding “prevent unauthorized access to BCSI” to R1 Part 1.2 so that it is in alignment with CIP-004 R6.1:
“Method(s) to protect and securely handle BCSI Information to prevent unauthorized access to BCSI, including storage, transit, and use.”
Likes
0
Dislikes
0
Response
Marty Hostler - Northern California Power Agency - 3,4,5,6
Answer
No
Document Name
Comment
NO. We agree with removing CIP-011XX R1 Parts 1.3 & 1.4.
We do not agree with adjusting Part 1.2.
Likes
1
Dislikes
Northern California Power Agency, 6, Sismaet Dennis
0
Response
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
Document Name
Comment
No
While more clear than the previously proposed CIP-011-3, the provided measures for CIP-011-X Part 1.2 it states, implementation of administrative
method(s) to protect BCSI (e.g., vendor service risk assessments, business agreements). Business agreements and vendor service risk assessments
does lead to confusion with CIP-013.
Likes
0
Dislikes
0
Response
Masuncha Bussey - Duke Energy - 1,3,5,6 - MRO,Texas RE,SERC, Group Name Duke Energy
Answer
No
Document Name
Comment
Duke Energy generally agrees with the proposed changes of simplifying CIP-011-X, Requirement R1 Part 1.1, and adjusting Part 1.2 to broaden the
focus around the implementation of protective methods and secure handling methods to mitigate risks of compromising confidentiality.
Duke Energy has concerns with the wording of measures for R1.2. ‘on-premise BCSI’ and ‘off-premise BCSI’ are open to interperetation. Is it the intent
that a third party managed BCSI repository that is implemented on ‘on-premise’ servers not be subject to the ‘off-premise’ measures? Can a risk
assessment determine the actual controls, physical, technical or administrative, needed?
Duke Energy recommends that for third party (or ‘off-premise’) managed or hosted storage, a risk assessment for physical, technical and administrative
controls be performed and mitigating controls be implemented as determined.
Likes
0
Dislikes
0
Response
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
Yes
Document Name
Comment
EEI agrees with removal of Parts 1.3 and 1.4. However, we suggest additional clarity of the language in Part 1.2. The CIP-011-X Technical Rationale
states that methods to protect BCSI “becomes explicitly comprehensive.” This question refers to a “broadened” focus, but the requirement does not
clearly explain the broadened focus and comprehensive expectations. We request additional information be added to the Technical Rationale regarding
the expectations of this requirement, including the difference between Draft 2 and the proposed Draft 3 version.
EEI agrees with protection of BCSI itself over the physical location in which BCSI is stored. We also support the removal of the language “storage,
security during transit, and use” from this requirement. However, the language within the measure should also be removed. Furthermore, EEI does not
support the use of the term “in use,” because this language is not necessary or auditable.
Likes
0
Dislikes
0
Response
Maryanne Darling-Reich - Black Hills Corporation - 1,3,5,6 - MRO,WECC
Answer
Yes
Document Name
Comment
This draft is much more favorable than the previous. It’s more open ended and the “confidentiality” statement aligns better with the spirit of what BCSI
protection programs should aim to achieve.
Likes
0
Dislikes
0
Response
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
Yes
Document Name
Comment
ITC supports the response submitted by EEI
Likes
0
Dislikes
0
Response
Bobbi Welch - Midcontinent ISO, Inc. - 2, Group Name ISO/RTO Council Standards Review Committee 2019-02 BCSI Access Management (Draft 3)
Answer
Yes
Document Name
Comment
The IRC SRC supports the SDT’s removal of parts 1.3 and 1.4 as retaining them in CIP-011 would have added another CIP standard to the scope of
supply chain requirements. We view this as a good change.
Likes
0
Dislikes
0
Response
Larry Heckert - Alliant Energy Corporation Services, Inc. - 4
Answer
Yes
Document Name
Comment
Alliant Energy supports comments submitted by EEI.
Likes
0
Dislikes
0
Response
Constantin Chitescu - Ontario Power Generation Inc. - 5
Answer
Yes
Document Name
Comment
OPG supports NPCC Regional Standards Committee’s comments.
Likes
0
Dislikes
0
Response
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
Yes
Document Name
Comment
None.
Likes
0
Dislikes
Response
0
Jennifer Flandermeyer - Jennifer Flandermeyer On Behalf of: Allen Klassen, Evergy, 6, 1, 3, 5; Derek Brown, Evergy, 6, 1, 3, 5; Marcus Moor,
Evergy, 6, 1, 3, 5; Thomas ROBBEN, Evergy, 6, 1, 3, 5; - Jennifer Flandermeyer
Answer
Yes
Document Name
Comment
Evergy supports and endorses the comments filed by the Edison Electric Institute.
Likes
0
Dislikes
0
Response
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name NPCC Regional Standards Committee
Answer
Yes
Document Name
Comment
We agree with this simplification.
Likes
0
Dislikes
0
Response
Leonard Kula - Independent Electricity System Operator - 2
Answer
Yes
Document Name
Comment
We agree with this simplification.
Likes
0
Dislikes
0
Response
Becky Webb - Exelon - 6
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Cynthia Lee - Exelon - 5
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Kinte Whitehead - Exelon - 3
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
John Galloway - ISO New England, Inc. - 2 - NPCC
Answer
Yes
Document Name
Comment
ISO New England agrees with this simplification.
Likes
0
Dislikes
0
Response
Daniel Gacek - Exelon - 1
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
Yes
Document Name
Comment
Southern supports the deletion of CIP-011-X Requirement R1 Parts 1.3 and 1.4 and simplifying Parts 1.1 and 1.2. The SDT has made it clear the
protection of BCSI itself is what is addressed here over where the BCSI is actually stored.
Likes
0
Dislikes
0
Response
David Hathaway - WEC Energy Group, Inc. - 6
Answer
Document Name
Comment
Yes
Support comments made by EEI.
Likes
0
Dislikes
0
Response
Thomas Breene - WEC Energy Group, Inc. - 3
Answer
Yes
Document Name
Comment
We support EEI comments.
Likes
0
Dislikes
0
Response
Michael Johnson - Michael Johnson On Behalf of: Ed Hanson, Pacific Gas and Electric Company, 3, 1, 5; Marco Rios, Pacific Gas and Electric
Company, 3, 1, 5; Sandra Ellis, Pacific Gas and Electric Company, 3, 1, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
Yes
Document Name
Comment
PG&E does not believe there is any double jeopardy between the proposed modifications to CIP-011-X and CIP-013.
Likes
0
Dislikes
0
Response
Sing Tay - OGE Energy - Oklahoma Gas and Electric Co. - 6, Group Name OKGE
Answer
Yes
Document Name
Comment
OKGE supports comments provided by EEI.
Likes
0
Dislikes
0
Response
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
Yes
Document Name
Comment
MPC agrees with the proposed changes and believes that CIP-011 requires protection of BCSI no matter where it is located. To do this, entities must
conduct assessments to understand what BCSI they have, where it can be found, how it transmits, what is done with it, and understand how
confidentiality could be compromised at any of these times and locations in order to implement appropriate controls to protect it.
While MPC appreciates the reminder in the measures to consider BCSI that is located on-premises and off-premises, using these terms here may be
confusing. MPC suggests including additional information in Technical Rationale or Implementation Guidance instead.
Likes
0
Dislikes
0
Response
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name CHPD
Answer
Yes
Document Name
Comment
In the Measures for R1.2, change "on-premise" to "on-premises” and “off-premise” to “off-premises”.
Likes
0
Dislikes
0
Response
Michael Brytowski - Great River Energy - 1,3,5,6
Answer
Document Name
Comment
Yes
Likes
0
Dislikes
0
Response
Gladys DeLaO - CPS Energy - 1,3,5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Gail Golden - Entergy - Entergy Services, Inc. - 5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Eli Rivera - CenterPoint Energy Houston Electric, LLC - NA - Not Applicable - Texas RE
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jennifer Bray - Arizona Electric Power Cooperative, Inc. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Joshua Andersen - Salt River Project - 1,3,5,6 - WECC
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
David Jendras - Ameren - Ameren Services - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Clarice Zellmer - WEC Energy Group, Inc. - 5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Dan Bamber - ATCO Electric - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Patrick Wells - OGE Energy - Oklahoma Gas and Electric Co. - 1,3,5,6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kimberly Van Brimer - Southwest Power Pool, Inc. (RTO) - 2 - MRO,WECC, Group Name Southwest Power Pool Standards Review Group (SSRG)
Answer
Yes
Document Name
Comment
Likes
Dislikes
0
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 3,4,5 - RF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Donna Wood - Tri-State G and T Association, Inc. - 1
Answer
Document Name
Yes
Comment
Likes
0
Dislikes
Response
0
7. The SDT extended the implementation plan to 24-months in an attempt to align with the Project 2016-02 modifications that are on the same
drafting timeline, and added an optional provision for early adoption. Do you agree this approach gives industry adequate time to implement
without encumbering entities who are planning to, or are already using, third-party solutions (e.g., cloud services) for BCSI? If not, please
provide the basis for your disagreement and an alternate proposal
Dennis Sismaet - Northern California Power Agency - 6
Answer
No
Document Name
Comment
Please reference Marty Hostler's comments. Thanks.
Likes
0
Dislikes
0
Response
Masuncha Bussey - Duke Energy - 1,3,5,6 - MRO,Texas RE,SERC, Group Name Duke Energy
Answer
Yes
Document Name
Comment
Duke Energy agrees with the extension of the 24-months implementation plan provided the CIP-004 R6.1 requirement to document justification of the
need for authorization is eliminated.
Likes
0
Dislikes
0
Response
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
Yes
Document Name
Comment
MPC agrees with this approach.
Likes
Dislikes
0
0
Response
Michael Johnson - Michael Johnson On Behalf of: Ed Hanson, Pacific Gas and Electric Company, 3, 1, 5; Marco Rios, Pacific Gas and Electric
Company, 3, 1, 5; Sandra Ellis, Pacific Gas and Electric Company, 3, 1, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
Yes
Document Name
Comment
PG&E agrees with the 24-month implementation plan and the ability for early adoption.
Likes
0
Dislikes
0
Response
David Hathaway - WEC Energy Group, Inc. - 6
Answer
Yes
Document Name
Comment
Support comments made by EEI.
Likes
0
Dislikes
0
Response
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
Yes
Document Name
Comment
Southern agrees with the 24-month timeline. It will allow enough time to reach implementation.
Likes
0
Dislikes
Response
0
Daniel Gacek - Exelon - 1
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
John Galloway - ISO New England, Inc. - 2 - NPCC
Answer
Yes
Document Name
Comment
ISO New England agrees with aligning timelines.
Likes
0
Dislikes
0
Response
Kinte Whitehead - Exelon - 3
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Cynthia Lee - Exelon - 5
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Becky Webb - Exelon - 6
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response
Leonard Kula - Independent Electricity System Operator - 2
Answer
Yes
Document Name
Comment
We agree with aligning timelines.
Likes
0
Dislikes
0
Response
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name NPCC Regional Standards Committee
Answer
Document Name
Yes
Comment
We agree with aligning timelines.
Likes
0
Dislikes
0
Response
Jennifer Flandermeyer - Jennifer Flandermeyer On Behalf of: Allen Klassen, Evergy, 6, 1, 3, 5; Derek Brown, Evergy, 6, 1, 3, 5; Marcus Moor,
Evergy, 6, 1, 3, 5; Thomas ROBBEN, Evergy, 6, 1, 3, 5; - Jennifer Flandermeyer
Answer
Yes
Document Name
Comment
Evergy supports and endorses the comments filed by the Edison Electric Institute.
Likes
0
Dislikes
0
Response
Benjamin Winslett - Georgia System Operations Corporation - 4
Answer
Yes
Document Name
Comment
Yes, 24 months is sufficient and aligning the changes with the Project 2016-02 SDT modifications will improve the efficiency and cost-effectiveness of
the adjustments required to comply with these modifications.
Likes
1
Dislikes
Georgia Transmission Corporation, 1, Davis Greg
0
Response
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
Document Name
Comment
Yes
None.
Likes
0
Dislikes
0
Response
Constantin Chitescu - Ontario Power Generation Inc. - 5
Answer
Yes
Document Name
Comment
OPG supports NPCC Regional Standards Committee’s comments.
Likes
0
Dislikes
0
Response
Larry Heckert - Alliant Energy Corporation Services, Inc. - 4
Answer
Yes
Document Name
Comment
Alliant Energy supports comments submitted by EEI.
Likes
0
Dislikes
0
Response
Bobbi Welch - Midcontinent ISO, Inc. - 2, Group Name ISO/RTO Council Standards Review Committee 2019-02 BCSI Access Management (Draft 3)
Answer
Yes
Document Name
Comment
The IRC SRC acknowledges the SDT for incorporating our prior suggestion for added flexibility.
Likes
0
Dislikes
0
Response
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
Yes
Document Name
Comment
ITC supports the response submitted by EEI
Likes
0
Dislikes
0
Response
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
Yes
Document Name
Comment
EEI supports the proposal to extend the implementation plan to 24-months because changes will be necessary to align processes and training with the
new requirements for both entities planning to utilize cloud services as well as those not planning to do so. EEI also supports the option for early
adoption.
Likes
0
Dislikes
0
Response
Donna Wood - Tri-State G and T Association, Inc. - 1
Answer
Yes
Document Name
Comment
Likes
Dislikes
0
0
Response
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name CHPD
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Marty Hostler - Northern California Power Agency - 3,4,5,6
Answer
Document Name
Yes
Comment
Likes
1
Dislikes
Northern California Power Agency, 6, Sismaet Dennis
0
Response
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 3,4,5 - RF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Barry Jones - Barry Jones On Behalf of: sean erickson, Western Area Power Administration, 1, 6; - Barry Jones
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
Response
0
Kimberly Van Brimer - Southwest Power Pool, Inc. (RTO) - 2 - MRO,WECC, Group Name Southwest Power Pool Standards Review Group (SSRG)
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
William Steiner - Midwest Reliability Organization - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
JT Kuehne - AEP - 6
Answer
Document Name
Comment
Yes
Likes
0
Dislikes
0
Response
Sean Bodkin - Dominion - Dominion Resources, Inc. - 6, Group Name Dominion
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Patrick Wells - OGE Energy - Oklahoma Gas and Electric Co. - 1,3,5,6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
Response
0
Sing Tay - OGE Energy - Oklahoma Gas and Electric Co. - 6, Group Name OKGE
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Dan Bamber - ATCO Electric - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
Document Name
Comment
Yes
Likes
0
Dislikes
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Bruce Reimer - Manitoba Hydro - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Clarice Zellmer - WEC Energy Group, Inc. - 5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
David Jendras - Ameren - Ameren Services - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jennie Wike - Jennie Wike On Behalf of: Hien Ho, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; John Merrell, Tacoma Public Utilities
(Tacoma, WA), 3, 1, 4, 5, 6; Marc Donaldson, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Ozan Ferrin, Tacoma Public Utilities (Tacoma,
WA), 3, 1, 4, 5, 6; Terry Gifford, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; - Jennie Wike, Group Name Tacoma Power
Answer
Yes
Document Name
Comment
Likes
1
Dislikes
Snohomish County PUD No. 1, 3, Chaney Holly
0
Response
Amy Bratkovic - PNM Resources - Public Service Company of New Mexico - 1,3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Joshua Andersen - Salt River Project - 1,3,5,6 - WECC
Answer
Document Name
Comment
Yes
Likes
0
Dislikes
0
Response
Steven Rueckert - Western Electricity Coordinating Council - 10, Group Name WECC CIP
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jennifer Bray - Arizona Electric Power Cooperative, Inc. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Eli Rivera - CenterPoint Energy Houston Electric, LLC - NA - Not Applicable - Texas RE
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Gail Golden - Entergy - Entergy Services, Inc. - 5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Gladys DeLaO - CPS Energy - 1,3,5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Michael Brytowski - Great River Energy - 1,3,5,6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Roger Fradenburgh - Roger Fradenburgh On Behalf of: Nicholas Lauriat, Network and Security Technologies, 1; - Roger Fradenburgh
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Lindsay Wickizer - Berkshire Hathaway - PacifiCorp - 6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Maryanne Darling-Reich - Black Hills Corporation - 1,3,5,6 - MRO,WECC
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Thomas Standifur - Austin Energy - 1,3,4,5,6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Thomas Breene - WEC Energy Group, Inc. - 3
Answer
Document Name
Comment
We support EEI comments.
Likes
0
Dislikes
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Document Name
Comment
Texas RE does not have comments on this question.
Likes
0
Dislikes
Response
0
8. In looking at all proposed recommendations from the standard drafting team, are the proposed changes a cost-effective approach?
Lindsay Wickizer - Berkshire Hathaway - PacifiCorp - 6
Answer
No
Document Name
Comment
Unknown fiscal impacts without a cost impact analysis and further clarifications.
PAC has strong concerns regarding the broadened and “explicitly comprehensive” expectations for CIP-011-X R1.2, which could result in significant
impacts that are not cost-effective.
Standards should not be approved by until each SDT develop a detailed cost estimate.
There is no information to determine if the modifications are a cost-effective approach
Likes
0
Dislikes
0
Response
Roger Fradenburgh - Roger Fradenburgh On Behalf of: Nicholas Lauriat, Network and Security Technologies, 1; - Roger Fradenburgh
Answer
No
Document Name
Comment
N&ST’s selection of “No” reflects our belief that currently proposed changes should be amended.
Likes
0
Dislikes
0
Response
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
No
Document Name
Comment
Unknown at this time. The broadened approach to BCSI protections in CIP-011, could lead to potential high costs to an Entity.
Likes
0
Dislikes
0
Response
Joshua Andersen - Salt River Project - 1,3,5,6 - WECC
Answer
No
Document Name
Comment
SRP still holds to our comments from last time - the cost to implement will grow quickly with unclear requirements that lead to Responsible Entity
concerns of proper interpretation. We would not say these are cost-effective at this time
Likes
0
Dislikes
0
Response
Becky Webb - Exelon - 6
Answer
No
Document Name
Comment
Unfortunately we wouldnt be able to properly answer this question at this time.
Likes
0
Dislikes
0
Response
Kinte Whitehead - Exelon - 3
Answer
Document Name
Comment
No
Unfortunately we wouldnt be able to properly answer this question at this time.
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
No
Document Name
Comment
MidAmerican Energy is concerned with broadened and “explicitly comprehensive” expectations for CIP-011-X R1.2, which could result in a costly
approach.
Likes
0
Dislikes
0
Response
Michael Johnson - Michael Johnson On Behalf of: Ed Hanson, Pacific Gas and Electric Company, 3, 1, 5; Marco Rios, Pacific Gas and Electric
Company, 3, 1, 5; Sandra Ellis, Pacific Gas and Electric Company, 3, 1, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
No
Document Name
Comment
At this time PG&E does not have information to determine if the modifications are a cost-effective approach.
Likes
0
Dislikes
0
Response
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
Document Name
No
Comment
MidAmerican Energy is concerned with broadened and “explicitly comprehensive” expectations for CIP-011-X R1.2, which could result in a costly
approach.
Likes
0
Dislikes
0
Response
Dennis Sismaet - Northern California Power Agency - 6
Answer
No
Document Name
Comment
Please reference Marty Hostler's comments. Thanks.
Likes
0
Dislikes
0
Response
Marty Hostler - Northern California Power Agency - 3,4,5,6
Answer
No
Document Name
Comment
The SDT has not provided a cost estimate. Consequently, we have no idea if the proposal is cost effective.
Standards should not be approved by Industry until each Standard Drafting Team develops a detailed cost estimate (capital and maintenance).
This means including internal controls, more staff, management/board approval, budgetting, revising all Internal Compliance Documents to account for
the new standard or modifications, etc. All these changes end up costing real people, our customer, they certainly would not blindly tell the STD I just
want that product and don't care what the cost is.
Likes
1
Dislikes
Response
Northern California Power Agency, 6, Sismaet Dennis
0
Masuncha Bussey - Duke Energy - 1,3,5,6 - MRO,Texas RE,SERC, Group Name Duke Energy
Answer
No
Document Name
Comment
Duke Energy recommends removing “and the justification of business need for the provisioned access” as a measure in CIP-004 R6.1. Managers must
be able to authorize access to a large number of employees without need to cut and paste a blanket justification for each person or group. All that
should be required is documented authorization and removal along with the record of authorized individuals. The act of authorization should be
considered sufficient that a business need for access exists. There is no risk reduction in documenting this justification, but there is significant overhead
in adding such functionality to existing authorization tools.
Likes
0
Dislikes
0
Response
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Bobbi Welch - Midcontinent ISO, Inc. - 2, Group Name ISO/RTO Council Standards Review Committee 2019-02 BCSI Access Management (Draft 3)
Answer
Yes
Document Name
Comment
The proposed changes appear to be backwards compatible, allowing entities to quickly adapt current compliance programs to incorporate the changes
and are a substantial improvement over the last draft.
Likes
0
Dislikes
Response
0
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
Yes
Document Name
Comment
None.
Likes
0
Dislikes
0
Response
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
Yes
Document Name
Comment
Southern agrees that the proposed changes are cost effective. There may be additional costs in the future for the use of different technology or
applications but would be budgeted for any planned upgrades.
Likes
0
Dislikes
0
Response
Thomas Breene - WEC Energy Group, Inc. - 3
Answer
Yes
Document Name
Comment
We think this is a cost effective way to address the issue.
Likes
0
Dislikes
0
Response
Barry Jones - Barry Jones On Behalf of: sean erickson, Western Area Power Administration, 1, 6; - Barry Jones
Answer
Yes
Document Name
Comment
Any changes made result in a cost to industry.
Likes
0
Dislikes
0
Response
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
Yes
Document Name
Comment
See comments in response to #9 below.
Likes
0
Dislikes
0
Response
Thomas Standifur - Austin Energy - 1,3,4,5,6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Maryanne Darling-Reich - Black Hills Corporation - 1,3,5,6 - MRO,WECC
Answer
Document Name
Comment
Yes
Likes
0
Dislikes
0
Response
Larry Heckert - Alliant Energy Corporation Services, Inc. - 4
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Michael Brytowski - Great River Energy - 1,3,5,6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Gladys DeLaO - CPS Energy - 1,3,5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
Response
0
Benjamin Winslett - Georgia System Operations Corporation - 4
Answer
Yes
Document Name
Comment
Likes
1
Dislikes
Georgia Transmission Corporation, 1, Davis Greg
0
Response
Gail Golden - Entergy - Entergy Services, Inc. - 5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jennifer Bray - Arizona Electric Power Cooperative, Inc. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
Document Name
Comment
Yes
Likes
0
Dislikes
0
Response
Steven Rueckert - Western Electricity Coordinating Council - 10, Group Name WECC CIP
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Amy Bratkovic - PNM Resources - Public Service Company of New Mexico - 1,3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Clarice Zellmer - WEC Energy Group, Inc. - 5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
David Hathaway - WEC Energy Group, Inc. - 6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Bruce Reimer - Manitoba Hydro - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Dan Bamber - ATCO Electric - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
JT Kuehne - AEP - 6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
William Steiner - Midwest Reliability Organization - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kimberly Van Brimer - Southwest Power Pool, Inc. (RTO) - 2 - MRO,WECC, Group Name Southwest Power Pool Standards Review Group (SSRG)
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
Yes
Document Name
Comment
Likes
Dislikes
0
0
Response
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 3,4,5 - RF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name CHPD
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Donna Wood - Tri-State G and T Association, Inc. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
Document Name
Comment
No comment
Likes
0
Dislikes
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Document Name
Comment
Texas RE does not have comments on this question.
Likes
0
Dislikes
0
Response
Jennifer Flandermeyer - Jennifer Flandermeyer On Behalf of: Allen Klassen, Evergy, 6, 1, 3, 5; Derek Brown, Evergy, 6, 1, 3, 5; Marcus Moor,
Evergy, 6, 1, 3, 5; Thomas ROBBEN, Evergy, 6, 1, 3, 5; - Jennifer Flandermeyer
Answer
Document Name
Comment
Evergy supports and endorses the comments filed by the Edison Electric Institute.
Likes
0
Dislikes
0
Response
Leonard Kula - Independent Electricity System Operator - 2
Answer
Document Name
Comment
N/A.
Likes
0
Dislikes
0
Response
Cynthia Lee - Exelon - 5
Answer
Document Name
Comment
Unfortunately we wouldnt be able to properly answer this question at this time.
Likes
0
Dislikes
0
Response
Daniel Gacek - Exelon - 1
Answer
Document Name
Comment
Unfortunately we wouldnt be able to properly answer this question at this time.
Likes
0
Dislikes
Response
0
9. Please provide any additional comments for the SDT to consider, if desired.
Donna Wood - Tri-State G and T Association, Inc. - 1
Answer
Document Name
Comment
Tri-State Generation and Transmission appreciates the time and effort given to this project and agrees with the revisions/changes.
Likes
0
Dislikes
0
Response
Masuncha Bussey - Duke Energy - 1,3,5,6 - MRO,Texas RE,SERC, Group Name Duke Energy
Answer
Document Name
Comment
No additional comments.
Likes
0
Dislikes
0
Response
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
Document Name
Comment
The proposed language is too ambigious and obligates entities to protect BCSI in any form, even though beyond its control. Should BCSI be shared
with NERC/FERC, the proposed standard would require registered entities to extend their access management to include the copy of that information
held by NERC/FERC. Subsequent requirements in CIP-011 would require reviews of access rights associated with that copy.
The language should be re-scoped to focus on management of access to designated repositories, instead of the information itself.
Likes
Dislikes
0
0
Response
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
Document Name
Comment
The CIP-004-X and CIP-011-X proposal is more favorable than the previous CIP-004-7 and CIP-011-3 approach of moving access management of
BCSI from CIP-004 and adding it to CIP-011.
Likes
0
Dislikes
0
Response
Marty Hostler - Northern California Power Agency - 3,4,5,6
Answer
Document Name
Comment
none.
Likes
1
Dislikes
Northern California Power Agency, 6, Sismaet Dennis
0
Response
Barry Jones - Barry Jones On Behalf of: sean erickson, Western Area Power Administration, 1, 6; - Barry Jones
Answer
Document Name
Comment
The SDT should work to simplify but clarify the standards. Years down the road auditors make interpretations and companies need to be clear what is
required. Secondly the SDT should look at ISO and NIST standards for guidance. Per our comments in question 1, WAPA recommends changing
“provisioned access” to “access to BCSI” for whole R6 and its parts as suggested here:
“Except our suggested changes to R6 Part 6.1, we also have the following recommendations for R6 Part 6.2 and 6.3:
•
For changes to R6 Part 6.2:
Verify at least once every 15 calendar months that all individuals with access to BCSI:
6.2.1. have an Is authorization record;
6.2.2. Is still need the access to BCSI to perform their current work functions, as determined by the Responsible Entity.
•
For changes to R6 Part 6.3:
For termination actions, remove the individual’s ability to access to BCSI (unless already revoked according to Part 5.1) by the end of the next
calendar day following the effective date of the termination action.”
As we suggested in Q1, changing from “provisioned access to BCSI” to “access to BCSI” provides the clarity and flexibility for authorizing, verifying, and
revoking access” to BCSI using various approaches including BCSI repository level or BCSI file level protection, which make the R6 backwards
compatible.
Likes
0
Dislikes
0
Response
Dennis Sismaet - Northern California Power Agency - 6
Answer
Document Name
Comment
Please reference Marty Hostler's comments. Thanks.
Likes
0
Dislikes
0
Response
Kimberly Van Brimer - Southwest Power Pool, Inc. (RTO) - 2 - MRO,WECC, Group Name Southwest Power Pool Standards Review Group (SSRG)
Answer
Document Name
Comment
The SSRG wants to thank the drafting team for their time and efforts on this project.
Likes
0
Dislikes
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Document Name
Comment
N/A
Likes
0
Dislikes
0
Response
JT Kuehne - AEP - 6
Answer
Document Name
Comment
No further comments.
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
Document Name
Comment
CIP-004-X R6 and CIP-011-X R1 have different applicability. In the Draft 3 language, BCSI pertaining to medium impact BCS without ERC must be
protected (CIP-011-X R1), but access to this BCSI need not be controlled (CIP-004-X R6). Without mandated access controls, the entity will be left to
determine what is an effective protection to BCSI pertaining to medium impact BCS without ERC. The SDT should consider revisiting the differences in
applicability between CIP-004-X R6 and CIP-011-X R1. Since this issue is beyond the scope of the 2019-02 SAR, please add this concern to the list of
SAR items for the next revision of CIP-004.
The Background sections of CIP-004-x and CIP-011-X should be moved to their respective Technical Rationale documents.
CIP-004-X Implementation Guidance: 1) Implementation Guidance for R2 states that “a single training program for all individuals needing to be trained
is acceptable” which is in conflict with the language in R2, “appropriate to individual roles, functions, or responsibilities.” 2) Page numbers for R6 are
incorrect. 3) Appendix 1 should be moved to the Technical Rationale document as it does not fit the requirements for Implementation Guidance.
Implementation Plan: The “Early Adoption” paragraph should make it clear that all of the updated Requirements must be adopted at the same time. An
entity should not be permitted to early-adopt only parts of the revised Standards.
Likes
0
Dislikes
0
Response
Sing Tay - OGE Energy - Oklahoma Gas and Electric Co. - 6, Group Name OKGE
Answer
Document Name
Comment
OKGE supports comments provided by EEI.
Likes
0
Dislikes
0
Response
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
Document Name
Comment
MidAmerican Energy continues to have concern with the revised text of CIP-004-X R6.2. Please add a statement to the CIP-004-X Technical Rationale
document: The review expected in CIP-004-X R6.2 is expected to be the same as CIP-004-6 R4.4.
While we are generally supportive of the changes to CIP-004, we are concerned about creating a new separate requirement for BCSI authorization,
revocation and review. This creates the potential for non compliance of multiple requirements for a single situation, such as revocation of accesses for a
termination. We ask the SDT to consider making changes that will reconcile this issue.
Likes
0
Dislikes
0
Response
Michael Johnson - Michael Johnson On Behalf of: Ed Hanson, Pacific Gas and Electric Company, 3, 1, 5; Marco Rios, Pacific Gas and Electric
Company, 3, 1, 5; Sandra Ellis, Pacific Gas and Electric Company, 3, 1, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
Document Name
Comment
PG&E thanks the SDT for the effort in making the modifications objective based that will allow PG&E to implement them to fit our environment.
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
Document Name
Comment
MidAmerican Energy continues to have concern with the revised text of CIP-004-X R6.2. Please add a statement to the CIP-004-X Technical Rationale
document: The review expected in CIP-004-X R6.2 is expected to be the same as CIP-004-6 R4.4.
While we are generally supportive of the changes to CIP-004, we are concerned about creating a new separate requirement for BCSI authorization,
revocation and review. This creates the potential for non compliance of multiple requirements for a single situation, such as revocation of accesses for a
termination. We ask the SDT to consider making changes that will reconcile this issue.
Likes
0
Dislikes
Response
0
Thomas Breene - WEC Energy Group, Inc. - 3
Answer
Document Name
Comment
We support EEI comments.
Likes
0
Dislikes
0
Response
Bruce Reimer - Manitoba Hydro - 1
Answer
Document Name
Comment
Resulting from our comments in Q1, we suggest changing “provisioned access” to “access to BCSI” for whole R6 and its parts.
Recommendations:
Except our suggested changes to R6 Part 6.1, we also have the following recommendations for R6 Part 6.2 and 6.3:
For changes to R6 Part 6.2:
Verify at least once every 15 calendar months that all individuals with access to BCSI:
6.2.1. have an authorization record;
6.2.2. Is still need the access to BCSI to perform their current work functions, as determined by the Responsible Entity.
For changes to R6 Part 6.3:
For termination actions, remove the individual’s ability to access to BCSI (unless already revoked according to Part 5.1) by the end of the next calendar
day following the effective date of the termination action.
As we suggested in Q1, changing from “provisioned access to BCSI” to “access to BCSI” would provide the clarity and the flexibility for authorizing,
verifying, and revoking access” to BCSI using various approaches including BCSI repository level or BCSI file level protection, which make the R6
backwards compatible.
Likes
0
Dislikes
Response
0
David Hathaway - WEC Energy Group, Inc. - 6
Answer
Document Name
Comment
Support comments made by EEI.
Likes
0
Dislikes
0
Response
Clarice Zellmer - WEC Energy Group, Inc. - 5
Answer
Document Name
Comment
Supportive of EEI comments on this project.
Likes
0
Dislikes
0
Response
Jennie Wike - Jennie Wike On Behalf of: Hien Ho, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; John Merrell, Tacoma Public Utilities
(Tacoma, WA), 3, 1, 4, 5, 6; Marc Donaldson, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Ozan Ferrin, Tacoma Public Utilities (Tacoma,
WA), 3, 1, 4, 5, 6; Terry Gifford, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; - Jennie Wike, Group Name Tacoma Power
Answer
Document Name
Comment
Tacoma Power supports the objective of the Project 2019-02 SAR, which includes providing a path to allow the use of modern third-party data storage
and analysis systems. While the use of third-party data storage may be enabled to a degree with these modifications, the use of third-party analysis
systems is likely not. Any managed security provider’s solution would likely be considered an EACMS based on the current definition, which carries a
host of CIP Requirements, not the least of which are found in CIP-004, which would preclude the use of these services in almost every case.
Tacoma Power suggests modification of the EACMS NERC Glossary definition to split off access control from access monitoring, which then would
allow for requirement applicability based on risk for access control systems versus access monitoring systems.
Likes
1
Dislikes
Snohomish County PUD No. 1, 3, Chaney Holly
0
Response
Amy Bratkovic - PNM Resources - Public Service Company of New Mexico - 1,3
Answer
Document Name
Comment
PNM Resources appreciates the work of the SDT and the opportunity to provide feedback.
Likes
0
Dislikes
0
Response
Joshua Andersen - Salt River Project - 1,3,5,6 - WECC
Answer
Document Name
Comment
CIP-004 R6.2, in the Measures, suggest removing “Verification that provisioned access is appropriate based on need” – the need is confirmed by the
authorization of access. Also, the measure should align with the requirement 6.2.2, which does not say “based on need”
Likes
0
Dislikes
0
Response
Leonard Kula - Independent Electricity System Operator - 2
Answer
Document Name
Comment
Request clarification on Part 6.2’s Measures. Will auditing / enforcement expect every item? This Measure starts with “Examples of evidence may
include.” Does the SDT mean this “may” is a “shall?” Recommend changing “Examples” to “Example.”
We look forward to seeing the final combined version of this update and the virtualization update.
Likes
0
Dislikes
0
Response
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name NPCC Regional Standards Committee
Answer
Document Name
Comment
Request clarification on Part 6.2’s Measures. Will auditing/enforcement expect every item? This Measure starts with “Examples of evidence may
include.” Does the SDT mean this “may” is a “shall?” Recommend changing “Examples” to “Example.”
We look forward to seeing the final combined version of this update and the virtualization update.
Likes
0
Dislikes
0
Response
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
Document Name
Comment
We would like to thank the SDT for allowing us to comment.
Likes
0
Dislikes
0
Response
Jennifer Bray - Arizona Electric Power Cooperative, Inc. - 1
Answer
Document Name
Comment
Thank you for the opportunity to comment.
Likes
0
Dislikes
0
Response
Jennifer Flandermeyer - Jennifer Flandermeyer On Behalf of: Allen Klassen, Evergy, 6, 1, 3, 5; Derek Brown, Evergy, 6, 1, 3, 5; Marcus Moor,
Evergy, 6, 1, 3, 5; Thomas ROBBEN, Evergy, 6, 1, 3, 5; - Jennifer Flandermeyer
Answer
Document Name
Comment
Evergy supports and endorses the comments filed by the Edison Electric Institute.
Likes
0
Dislikes
0
Response
Benjamin Winslett - Georgia System Operations Corporation - 4
Answer
Document Name
Comment
These changes are viewed as an overall improvement to the requirements around BCSI in CIP-004 and CIP-011. However, it would be more effective if
these requirements were integrated into the existing framework of CIP-004 R4 and R5 rather than creating a new requirement R6. As it is now
proposed, entities will need to recognize that authorizations are now covered in R4 and R6, periodic access reviews now exist in R4 and R6, and
revocations are required in both R5 and R6. While the requirements are outlined reasonably, this separation creates a new burden on readability of the
standards and training new staff regarding compliance expectations.
Likes
1
Dislikes
Georgia Transmission Corporation, 1, Davis Greg
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Document Name
Comment
Texas RE is concerned by now explicitly including the concept of confidentiality in CIP-011, Part 1.2, the SDT has inadvertently removed the concept of
integrity from the scope of the proposed CIP-011. As noted in Texas RE’s response to Question 6, the current approved language in CIP-011 that
states “storage, transit, and use” in Part 1.2 supports the concept of integrity. Texas RE recommends adding “and integrity” after confidentiality in
Requirement Part 1.2.
Texas RE also recommends including a bright line criteria for determining usability of BCSI to CIP-011 Requirement Part 1.2 should be established to
ensure consistent application of the standard.
Likes
0
Dislikes
0
Response
Gladys DeLaO - CPS Energy - 1,3,5
Answer
Document Name
Comment
CPS Energy does not have any additional comments at this time.
Likes
0
Dislikes
0
Response
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
Document Name
Comment
ERCOT hereby incorporates the comments filed by the ISO/RTO Council Standards Review Committee. In addition the ISO/RTO Council comments,
ERCOT offers the following additional comments. First, with respect to Reliability Standard CIP-004-x, Requirement 6, Parts 6.1 and 6.2, the concept of
roles should be allowed to be consistent with Requirement R4. This could be addressed in the requirement language or accompanying measure. If this
is not permitted, ERCOT would appreciate an explanation explain why in the consideration of comments. Second, ERCOT believes the SDT should
address the ability to use third-party audit reports in verifying the controls for third parties. Similarly, ERCOT would appreciate an explanation whether
this is allowed or not, and why.
Likes
0
Dislikes
0
Response
Constantin Chitescu - Ontario Power Generation Inc. - 5
Answer
Document Name
Comment
OPG supports NPCC Regional Standards Committee’s comments, and has the following additional comments:
CIP 004-X 4.1 requires entity to have a “process”; where 6.1 requires the entity to authorize but a “process” is not required. Both requirements seem to
have similar intent with 4.1 applying to the Applicable System and 6.1 applying to BSCI. Please provide clarification whether the discrepancy is
intentional.
Likes
0
Dislikes
0
Response
Michael Brytowski - Great River Energy - 1,3,5,6
Answer
Document Name
Comment
1. Resulting from our comments in Q1, we suggest changing “provisioned access” to “access to BCSI” for whole R6 and its parts. Except our suggested
changes to R6 Part 6.1, we also have the following recommendations for R6 Part 6.2 and 6.3:
• For changes to R6 Part 6.2:
Verify at least once every 15 calendar months that all individuals with access to BCSI:
6.2.1. have an Is authorization record;
6.2.2. Is still need the access to BCSI to perform their current work functions, appropriate based on need, as determined by the Responsible Entity.
• For changes to R6 Part 6.3:
For termination actions, remove the individual’s ability to access to BCSI (unless already revoked according to Part 5.1) by the end of the next calendar
day following the effective date of the termination action.
We believe “access to BCSI” provides the flexibility for authorizing, verifying, and revoking access” to BCSI using various approaches including BCSI
repositories and BCSI files, which make the R6 backwards compatible.
2. The SDT may consider cleaning up the language to potentially the following language:
R6. Each Responsible Entity shall implement an access management program(s) to authorize, verify, and revoke access to BCSI pertaining to the
“Applicable Systems” identified in CIP-004-X Table R6 – Access Management for BES Cyber System Information - that collectively include each of the
applicable requirement parts in CIP004-X Table R6 – Access Management for BES Cyber System Information.
[Violation Risk Factor: Medium] [Time Horizon: Same Day Operations and Operations Planning]
Revised Language Recommendations
6.1 Prior to authorization (unless already authorized according to Part 4.1.) based on need, as determined by the Responsible Entity, except for CIP
Exceptional Circumstances:
6.1.1. Electronic access to electronic BCSI; and
6.1.2. Physical access to physical BCSI. Note: Access is to be considered the result of the specific actions taken to provide an individual(s) the means
to access BCSI (e.g., may include physical keys or access cards, user accounts and associated rights)
6.2 Verify at least once every 15 calendar months that all individuals with access to BCSI:
6.2.1. Have a current authorization record; and
6.2.2. A justification for authorization to perform their current work functions, as determined by the Responsible Entity.
Likes
0
Dislikes
0
Response
Larry Heckert - Alliant Energy Corporation Services, Inc. - 4
Answer
Document Name
Comment
Alliant Energy supports comments submitted by EEI.
Likes
0
Dislikes
0
Response
Bobbi Welch - Midcontinent ISO, Inc. - 2, Group Name ISO/RTO Council Standards Review Committee 2019-02 BCSI Access Management (Draft 3)
Answer
Document Name
Comment
2019-02_Unofficial_Comment_Form_BCSI Access Management_IRC SRC_05-10-21_FINAL.docx
CIP-011-X, Part 1.2, Measures: The IRC SRC recommends the SDT clarify that encrypted information, also known as cipher text, is not BCSI.
Examples of evidence for off-premise BCSI may include, but are not limited to, the following:
• Implementation of electronic technical method(s) to protect electronic BCSI (e.g., data masking, encryption, hashing, tokenization, electronic key management); or
Note: MISO abstains from the response to item 9.
Likes
0
Dislikes
0
Response
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
Document Name
Comment
ITC supports the response submitted by EEI
Likes
0
Dislikes
0
Response
Roger Fradenburgh - Roger Fradenburgh On Behalf of: Nicholas Lauriat, Network and Security Technologies, 1; - Roger Fradenburgh
Answer
Document Name
Comment
N&ST has two additional comments, and associated recommendations, to respectfully offer.
The first comment is that in our opinion, the proposed changes do not address one of the project’s stated goals, which is “…to clarify the protections
expected when utilizing third‐party solutions (e.g., cloud services).” N&ST is aware of the SDT’s desire to avoid writing overly prescriptive
requirements, such as was done in the first set of proposed revisions to CIP-011, but we nonetheless believe the issue of who is creating, and has the
potential ability to use, authentication credentials such as encryption keys must be addressed in the Standards in one or more Requirements (vs. in
“Measures” or guidance documents). We are aware of one Responsible Entity that was found by a Regional Entity audit team to be out of compliance
with CIP-004 for storing BCSI in the cloud and relying on the cloud service provider’s default encryption. Simply dropping “storage locations” from CIP004 would not, by itself, have helped the Responsible Entity avoid this problem. N&ST therefore recommends the following or similar language be
added to either CIP-004 or CIP-011:
“The Responsible Entity shall ensure that all individuals, including those affiliated with third parties such as vendors and cloud service providers, who
possess the means to obtain and use BCSI that is protected by one or more electronic and/or physical access controls (login credentials, unlock
passwords, encryption keys, cardkeys, brass keys, etc.) have been authorized in accordance with CIP-004 requirements.”
N&ST’s second comment is that we are concerned there is insufficient clarity with regards to what distinguishes “provisioning” from “sharing.” During the
recent SDT webinar, a member of the SDT gave listeners a good example: (paraphrasing) Person A, who has been provisioned access to a file cabinet
and has a key, opens it and gives a BCSI document to Person B, who has not been authorized for access to the file cabinet and cannot open it. Person
A has shared BCSI with Person B. The SDT has already created a contextual definition of “access to BCSI.” N&ST recommends that a similar
contextual definition of “sharing” be added to either CIP-004 or CIP-011, working off the example the SDT itself created.
Likes
0
Dislikes
0
Response
Lindsay Wickizer - Berkshire Hathaway - PacifiCorp - 6
Answer
Document Name
Comment
Recommend creating a NERC Glossary defined term for “Provisioned Access.”
“Physical BCSI” is not a defined term.
“Storage Locations” is no longer explicitly stated.
The language should be re-scoped to focus on management of access to designated repositories
We appreciate all the time and effort given to this project to develop these revisions/changes.
However, if you are approving a new set of Standards, we recommend that the Technical Guidance is also published at the same time. The excessive
delay between these publications, is causing industry confusion.
The VSL – this is excessively severe (Proposed VSLs are based on a single violation and not cumulative violations.)
Recommend:
Use the same language as previously in R4:
R4: Operations Planning and Same Day Operations – VRF Medium The Responsible Entity did not verify that individuals with active electronic or
active unescorted physical access have authorization records during a calendar quarter but did so less than 10 calendar days after the start of a
subsequent calendar quarter. (4.2)
Authorize happens prior to provisioning access R6.R1 – See Note: The SDT is relying HEAVILY on the CMEP guide for definition parameters, and not
the STD language.
Clarify BOTH CIP-004 & CIP-011 requirements relating to managing access and protecting BCSI.
Likes
0
Dislikes
0
Response
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
Document Name
Comment
EEI is concerned with having two separate requirements within CIP-004-X that address access removal. (See Requirement R5 (BCS) and R6 (BCSI)
While we understand the intent and reasons for this change, often access is provided to individuals for both BCS and BCSI and any failure in the
termination of access in these cases will result in two violations for the same error. We recommend that this issue be reconciled.
Likes
0
Dislikes
0
Response
Jose Avendano Mora - Edison International - Southern California Edison Company - 1
Answer
Document Name
Comment
See comments submitted by Edison Electric Institute
Likes
0
Dislikes
0
Response
Thomas Standifur - Austin Energy - 1,3,4,5,6
Answer
Document Name
Comment
Likes
0
Dislikes
Response
0
TPWR_2019-02_Unofficial_Comment_Form_2021-05-10.docx20210504-17090-hsevrj.docx
Comments received from Basin Electric Power Cooperative
1. The standards drafting team (SDT) considered industry’s concerns about the phrase “provisioning of access” requesting clarity on this
terminology. The SDT added “authorize, verify, and revoke provisioned access” to the parent requirement CIP-004-X, Requirement R6,
and changed “provisioning of access” to “provisioned access” in the requirement parts. This should clarify the intent that it is a noun
which scopes what the Registered Entity must authorize, verify, and revoke, rather than a verb relating to how provisioning should occur.
That is up to the entity to determine. Do you agree with the proposed change? If not, please provide the basis for your disagreement and
an alternate proposal.
Yes
No
Comments: The term “provisioned access” adds another undefined term to the NERC standards and doesn’t provide a clear path to
regulatory off-prem or cloud data center services as proposed in the SAR. The only methods to control access to off-prem (cloud) BCSI
is either by 1) encrypting BCSI or 2) purchasing services which allow the entity to manage the off-prem authentication systems –
thereby preventing 3rd party systems administrators or others from compromising entity BCSI stored in cloud data centers. Option 2 is
highly unlikely.
a. “Provisioned access” creates a security loophole whereas entities only require authorization for a provisioned access. For example,
if access to BCSI is not provisioned, no authorization to BCSI is required. This does not meet the goal of SAR for controlling access to
BCSI. Given the R6 definition whereas “access to BCSI” occurs when an individual has both “the ability to obtain and use BCSI,” we
recommend changing “provisioned access” to “access to BCSI”.
b. The term “unless already authorized according to Part 4.1” should be removed. Why? Because having authorized access to CIP
Cyber Assets does not preclude the authorization for having access to BCSI.
c. The use of “provisioned, provision or provisioning” of “access,” regardless of tense, would require entities to be audited to,
maintain, and provide documented lists of people and the “provisioned” configurations of entity BES Cyber System Information
repositories in order to “verify” the “authorization” of such provisioned access. The Measures section highlights this expectation
where evidence may include individual records, or lists of whom is authorized. To achieve this evidence, entities would need to
provide evidence of systems accounts of on-premises or off premises system repositories of BCSI. Cloud providers will not provide
such lists of personnel who have administrative level access to cloud BCSI server repositories and entities will be unable to verify
what 3rd party off-prem systems administrators have access to BCSI, yet entities will be asked to provide this information for an
entire audit cycle
d. The current language requiring entities to 1) identify repositories and 2) authorize access based on need can also work for 3rd party
off-prem or cloud locations without requiring lists of personnel or configurations of systems accounts for repositories of BCSI. (see
recommendations)
Recommendations:
1. Focus only on addressing electronic and physical access to BCSI in off-prem or cloud situations.
2. Consider the following language for R6 Part 6.1:
Authorize access to BCSI based on need, as determined by the Responsible Entity, except for CIP Exceptional Circumstances. Access
to BCSI includes:
6.1.1. Electronic access to electronic BCSI;
6.1.2 Physical access to physical BCSI;
6.1.3 Physical access to unencrypted electronic BCSI (See our comments in Q4).
3. Consider using the perspective of language in CIP-011 “ to prevent unauthorized access to BES Cyber System Information.” This allows
entities to determine the risk and methods to protect BCSI
4. Consider using “authentication systems or encryption of BCSI” for personnel accessing electronic BCSI on cloud prem providers locations.
2. The SDT considered industry’s concerns about the absence of “obtain and use” language from the CMEP Practice Guide, which currently
provides alignment on a clear two-pronged test of what constitutes access in the context of utilizing third-party solutions (e.g., cloud
services) for BCSI. The SDT mindfully mirrored this language to assure future enforceable standards are not reintroducing a gap. Do you
agree this clarifying language makes it clear both parameters of this two-pronged test for “obtain and use” must be met to constitute
“access” to BCSI? If not, please provide the basis for your disagreement and an alternate proposal.
Yes
No
Comments:
a. We agree to adding “obtain and use” language to clarify what constitutes an access to BCSI, but disagree to the use of “provisioned
access”. After clarifying the access to BCSI, the language “provisioned” should be removed since it has a security flaw and requires
extensive records from repositories of BCSI (See our comments in Q1).
Recommendations:
1. Only use the term “access” as recommended in Q1
3. The SDT considered industry comments regarding the removal of storage locations. The SDT must enable the CIP standards for the use of
third-party solutions (e.g., cloud services) for BCSI, and retention of that language hinders meeting those FERC directives. The absence of
this former language does not preclude an entity from defining storage locations as the method used within an entity’s access
management program. CIP-004-X, Requirement R6, is at an objective level to permit more than that one approach. Do you agree the
requirement retains the flexibility for storage locations to be used as one way to meet the objective? If not, please provide the basis for
your disagreement and an alternate proposal.
Yes
No
Comments:
a. We agree to retaining the flexibility for storage locations to be used as one way to meet the objective of SAR, but disagree to using
“provisioned access” (See our comments regarding “provisioned access” in Q1).
b. The requirement to provide lists of personnel with “provisioned access” would also require entities to identify the locations of BCSI
and by auditors whom are required to make the link between the repository of BCSI which has been provisioned for access.
Recommendation:
Retain the current language and focus on auditable methods to protect BCSI at 3rd party off-prem (cloud) locations.
4. To address industry comments while also enabling entities to use third-party solutions (e.g., cloud services) for BCSI, in CIP-004-X,
Requirement R6 Part 6.1, the SDT made a distinction between “electronic access to electronic BCSI” versus “physical access to physical
BCSI”. This clarifies physical access alone to hardware containing electronic BCSI, which is protected with methods that do not permit an
individual to concurrently obtain and use the electronic BCSI, is not provisioned access to electronic BCSI. Do you agree with the proposed
change? If not, please provide the basis for your disagreement and an alternate proposal.
Yes
No
Comments:
We disagree that the physical access only applies to physical BCSI since controlling access to unencrypted BCSI has not been addressed
but will be required for 3rd party off-prem (cloud) repositories. The physical access to Cyber Assets is a fast avenue to owning the
unencrypted electronic BCSI it contains, which meets “obtain and use” condition and constitutes an access to BCSI.
Recommendation:
Adding “Physical access to unencrypted electronic BCSI” to R6 Part 6.1.3 (See our suggested R6 Part 6.1 changes in Q1).
5. The SDT considered industry comments about defining the word “access”. “Access” is broadly used across both the CIP and Operations &
Planning Standards (e.g., open access) and carries different meanings in different contexts. Therefore, the SDT chose not to define “access”
in the NERC Glossary of Terms. Instead, the SDT used the adjective “provisioned” to add context, thereby scoping CIP-004-X, Requirement
R6. Do you agree the adjective “provisioned” in conjunction with the “Note” clarifies what “provisioned access” is? If not, please provide
the basis for your disagreement and an alternate proposal.
Yes
No
Comments:
a. Given that the SDT has defined “access to BCSI” in R6, and the term “provisioned access” should be removed due to the creation of
an unintended security loophole (See our comments in Q1).
b. Access, which occurs in CIP standards language, whether it is electronic and/or logical access, physical access, unescorted physical
access, remote access, or interactive remote access is clearly understood, has been widely adopted by industry and regulators, and
has been subject to hundreds of audits across all regions for the past 14 years. Entities have developed internal documentation,
configured systems, implemented controls tasks and standardized programs on these terms. The adjective “provisioned” adds
further terms, requires changes and is of little value regarding the actions required of entities and the output deliverables or
evidence.
Recommendation:
1. Revise the language to focus on access to BCSI and the auditable methods to protect BCSI at 3rd party off-prem (cloud) locations.
6. In response to industry concerns regarding double jeopardy or confusion with CIP-013, the SDT removed CIP-011-X, Requirement R1
Parts 1.3 and 1.4, in favor of simplifying CIP-011-X, Requirement R1 Part 1.1, and adjusting Part 1.2 to broaden the focus around the
implementation of protective methods and secure handling methods to mitigate risks of compromising confidentiality. Do you agree
with the proposed changes? If not, please provide the basis for your disagreement and an alternate proposal.
Yes
No
Comments: does not explain Prior language in the Rationale for Modifications to Requirement R1, Part 1.2 “By removing this
language, methods to protect BCSI becomes explicitly comprehensive.”
7. The SDT extended the implementation plan to 24-months in an attempt to align with the Project 2016-02 modifications that are on
the same drafting timeline, and added an optional provision for early adoption. Do you agree this approach gives industry adequate
time to implement without encumbering entities who are planning to, or are already using, third-party solutions (e.g., cloud
services) for BCSI? If not, please provide the basis for your disagreement and an alternate proposal.
Yes
No
Comments:
8. In looking at all proposed recommendations from the standard drafting team, are the proposed changes a cost-effective approach?
Yes
No
Comments:
9. Please provide any additional comments for the SDT to consider, if desired.
Comments:
1. Resulting from our comments in Q1, we suggest changing “provisioned access” to “access to BCSI” for whole R6 and its parts.
Except our suggested changes to R6 Part 6.1, we also have the following recommendations for R6 Part 6.2 and 6.3:
•
For changes to R6 Part 6.2:
Verify at least once every 15 calendar months that all individuals with access to BCSI:
6.2.1. have an Is authorization record;
6.2.2. Is still need the access to BCSI to perform their current work functions, appropriate based on need, as determined by
the Responsible Entity.
•
For changes to R6 Part 6.3:
For termination actions, remove the individual’s ability to access to BCSI (unless already revoked according to Part 5.1) by the
end of the next calendar day following the effective date of the termination action.
We believe “access to BCSI” provides the flexibility for authorizing, verifying, and revoking access” to BCSI using various
approaches including BCSI repositories and BCSI files, which make the R6 backwards compatible.
2. The SDT may consider cleaning up the language to potentially the following language:
R6. Each Responsible Entity shall implement an access management program(s) to authorize, verify, and revoke access to BCSI
pertaining to the “Applicable Systems” identified in CIP-004-X Table R6 – Access Management for BES Cyber System Information
- that collectively include each of the applicable requirement parts in CIP004-X Table R6 – Access Management for BES Cyber
System Information.
[Violation Risk Factor: Medium] [Time Horizon: Same Day Operations and Operations Planning]
Part
6.1
6.2
Revised Language Recommendations
Prior to authorization (unless already authorized according to Part 4.1.) based on
need, as determined by the Responsible Entity, except for CIP Exceptional
Circumstances:
6.1.1. Electronic access to electronic BCSI; and
6.1.2. Physical access to physical BCSI. Note: Access is to be considered the
result of the specific actions taken to provide an individual(s) the means to
access BCSI (e.g., may include physical keys or access cards, user accounts and
associated rights)
Verify at least once every 15 calendar months that all individuals with access to
BCSI:
6.2.1. Have a current authorization record; and
6.2.2. A justification for authorization to perform their current work functions,
as determined by the Responsible Entity.
Consideration of Comments
Project Name:
2019-02 BES Cyber System Information Access Management (Draft 3)
Comment Period Start Date: 3/25/2021
Comment Period End Date:
5/10/2021
Associated Ballots:
2019-02 BES Cyber System Information Access Management CIP-004-7 AB 3 ST
2019-02 BES Cyber System Information Access Management CIP-011-3 AB 3 ST
2019-02 BES Cyber System Information Access Management Implementation Plan AB 3 OT
There were 64 sets of responses, including comments from approximately 157 different people from approximately 98
companies representing 10 of the Industry Segments as shown in the table on the following pages.
All comments submitted can be reviewed in their original format on the project page.
If you feel that your comment has been overlooked, let us know immediately. Our goal is to give every comment serious consideration in
this process. If you feel there has been an error or omission, contact Vice President of Engineering and Standards Howard Gugel (via
email) or at (404) 446‐9693.
RELIABILITY | RESILIENCE | SECURITY
Questions
1. The standards drafting team (SDT) considered industry’s concerns about the phrase “provisioning of access” requesting clarity on
this terminology. The SDT added “authorize, verify, and revoke provisioned access” to the parent requirement CIP-004-X, Requirement
R6, and changed “provisioning of access” to “provisioned access” in the requirement parts. This should clarify the intent that it is a
noun which scopes what the Registered Entity must authorize, verify, and revoke, rather than a verb relating to how provisioning
should occur. That is up to the entity to determine. Do you agree with the proposed change? If not, please provide the basis for your
disagreement and an alternate proposal.
2. The SDT considered industry’s concerns about the absence of “obtain and use” language from the CMEP Practice Guide, which
currently provides alignment on a clear two-pronged test of what constitutes access in the context of utilizing third-party solutions
(e.g., cloud services) for BCSI. The SDT mindfully mirrored this language to assure future enforceable standards are not reintroducing a
gap. Do you agree this clarifying language makes it clear both parameters of this two-pronged test for “obtain and use” must be met to
constitute “access” to BCSI? If not, please provide the basis for your disagreement and an alternate proposal.
3. The SDT considered industry comments regarding the removal of storage locations. The SDT must enable the CIP standards for the
use of third-party solutions (e.g., cloud services) for BCSI, and retention of that language hinders meeting those FERC directives. The
absence of this former language does not preclude an entity from defining storage locations as the method used within an entity’s
access management program. CIP-004-X, Requirement R6, is at an objective level to permit more than that one approach. Do you
agree the requirement retains the flexibility for storage locations to be used as one way to meet the objective? If not, please provide
the basis for your disagreement and an alternate proposal.
4. To address industry comments while also enabling entities to use third-party solutions (e.g., cloud services) for BCSI, in CIP-004-X,
Requirement R6 Part 6.1, the SDT made a distinction between “electronic access to electronic BCSI” versus “physical access to physical
BCSI”. This clarifies physical access alone to hardware containing electronic BCSI, which is protected with methods that do not permit
an individual to concurrently obtain and use the electronic BCSI, is not provisioned access to electronic BCSI. Do you agree with the
proposed change? If not, please provide the basis for your disagreement and an alternate proposal.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
2
5. The SDT considered industry comments about defining the word “access”. “Access” is broadly used across both the CIP and
Operations & Planning Standards (e.g., open access) and carries different meanings in different contexts. Therefore, the SDT chose not
to define “access” in the NERC Glossary of Terms. Instead, the SDT used the adjective “provisioned” to add context, thereby scoping
CIP-004-X, Requirement R6. Do you agree the adjective “provisioned” in conjunction with the “Note” clarifies what “provisioned
access” is? If not, please provide the basis for your disagreement and an alternate proposal.
6. In response to industry concerns regarding double jeopardy or confusion with CIP-013, the SDT removed CIP-011-X, Requirement R1
Parts 1.3 and 1.4, in favor of simplifying CIP-011-X, Requirement R1 Part 1.1, and adjusting Part 1.2 to broaden the focus around the
implementation of protective methods and secure handling methods to mitigate risks of compromising confidentiality. Do you agree
with the proposed changes? If not, please provide the basis for your disagreement and an alternate proposal.
7. The SDT extended the implementation plan to 24-months in an attempt to align with the Project 2016-02 modifications that are on
the same drafting timeline, and added an optional provision for early adoption. Do you agree this approach gives industry adequate
time to implement without encumbering entities who are planning to, or are already using, third-party solutions (e.g., cloud services)
for BCSI? If not, please provide the basis for your disagreement and an alternate proposal
8. In looking at all proposed recommendations from the standard drafting team, are the proposed changes a cost-effective approach?
9. Please provide any additional comments for the SDT to consider, if desired.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
3
The Industry Segments are:
1 — Transmission Owners
2 — RTOs, ISOs
3 — Load-serving Entities
4 — Transmission-dependent Utilities
5 — Electric Generators
6 — Electricity Brokers, Aggregators, and Marketers
7 — Large Electricity End Users
8 — Small Electricity End Users
9 — Federal, State, Provincial Regulatory or other Government Entities
10 — Regional Reliability Organizations, Regional Entities
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
4
Organization
Name
Name
Midcontinent Bobbi
ISO, Inc.
Welch
Tennessee
Valley
Authority
Brian
Millard
Segment(s)
2
1,3,5,6
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
Region
MRO,RF,SERC
SERC
Group Name
Group Member
Name
ISO/RTO Council
Ali Miremadi
Standards Review
Brandon Gleason
Committee 2019-02 BCSI
Access Management
(Draft 3)
Tennessee Valley
Authority
Group
Group
Member
Member
Organization Segment(s)
Group
Member
Region
CAISO
2
WECC
Electric
Reliability
Council of
Texas, Inc.
2
Texas RE
Helen Lainis
IESO
2
NPCC
Kathleen
Goodman
ISO-NE
2
NPCC
Bobbi Welch
MISO
2
RF
Gregory Campoli New York
2
Independent
System
Operator
NPCC
Michael Del
Viscio
PJM
RF
Charles Yeung
Southwest 2
Power Pool,
Inc. (RTO)
MRO
Kurtz, Bryan G.
Tennessee
Valley
Authority
SERC
2
1
5
Organization
Name
Name
Segment(s)
Jennie Wike Jennie
Wike
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
Region
WECC
Group Name
Tacoma Power
Group Member
Name
Group
Group
Member
Member
Organization Segment(s)
Group
Member
Region
Grant, Ian S.
Tennessee
Valley
Authority
3
SERC
Thomas, M. Lee
Tennessee
Valley
Authority
5
SERC
Parsons,
Marjorie S.
Tennessee
Valley
Authority
6
SERC
Jennie Wike
Tacoma
Public
Utilities
1,3,4,5,6
WECC
John Merrell
Tacoma
Public
Utilities
(Tacoma,
WA)
1
WECC
Marc Donaldson Tacoma
Public
Utilities
(Tacoma,
WA)
3
WECC
Hien Ho
4
WECC
Tacoma
Public
Utilities
6
Organization
Name
Name
Segment(s)
Region
Group Name
Group Member
Name
Group
Group
Member
Member
Organization Segment(s)
Group
Member
Region
(Tacoma,
WA)
ACES Power Jodirah
Marketing
Green
1,3,4,5,6
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
MRO,NA - Not
ACES Standard
Applicable,RF,SER Collaborations
C,Texas RE,WECC
Terry Gifford
Tacoma
Public
Utilities
(Tacoma,
WA)
6
WECC
Ozan Ferrin
Tacoma
Public
Utilities
(Tacoma,
WA)
5
WECC
Bob Solomon
Hoosier
1
Energy Rural
Electric
Cooperative,
Inc.
SERC
Kevin Lyons
Central Iowa 1
Power
Cooperative
MRO
Bill Hutchison
Southern
1
Illinois
Power
Cooperative
SERC
7
Organization
Name
Name
DTE Energy - Karie
Detroit
Barczak
Edison
Company
Segment(s)
Region
3,4,5
Southwest
Kimberly 2
Power Pool, Van Brimer
Inc. (RTO)
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
Group Name
Group Member
Name
Group
Member
Region
Jennifer Bray
Arizona
1
Electric
Power
Cooperative,
Inc.
WECC
Nick Fogleman
Prairie
1,3
Power
Incorporated
SERC
Amber Skillern
East
1
Kentucky
Power
Cooperative
SERC
DTE Energy - 5
Detroit
Edison
Company
RF
Daniel Herring
DTE Energy - 4
DTE Electric
RF
Karie Barczak
DTE Energy - 3
DTE Electric
RF
SPP
2
MRO
SPP
2
MRO
SPP
2
MRO
DTE Energy - DTE Electric Adrian Raducea
MRO,WECC
Group
Group
Member
Member
Organization Segment(s)
Southwest Power Pool Kim Van Brimer
Standards Review Group Jim Williams
(SSRG)
Matt Harward
8
Organization
Name
Name
Segment(s)
Region
Group Name
Group Member
Name
Shannon
Mickens
FirstEnergy - Mark
FirstEnergy Garza
Corporation
4
Duke Energy Masuncha 1,3,5,6
Bussey
Public Utility Meaghan
District No. 1 Connell
5
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
FE Voter
FRCC,MRO,RF,SER Duke Energy
C,Texas RE
CHPD
Group
Group
Member
Member
Organization Segment(s)
Group
Member
Region
SPP
2
MRO
Alan Wahlstrom SPP
2
MRO
Julie Severino
FirstEnergy - 1
FirstEnergy
Corporation
RF
Aaron
Ghodooshim
FirstEnergy - 3
FirstEnergy
Corporation
RF
Robert Loy
FirstEnergy - 5
FirstEnergy
Solutions
RF
Ann Carey
FirstEnergy - 6
FirstEnergy
Solutions
RF
Mark Garza
FirstEnergy- 4
FirstEnergy
RF
Laura Lee
Duke Energy 1
SERC
Dale Goodwine
Duke Energy 5
SERC
Greg Cecil
Duke Energy 6
RF
Lee Schuster
Duke Energy 3
SERC
Joyce Gundry
Public Utility 3
District No. 1
WECC
9
Organization
Name
Name
Segment(s)
Region
Group Name
Group Member
Name
of Chelan
County
Michael
Johnson
Southern
Company -
Group
Group
Member
Member
Organization Segment(s)
Group
Member
Region
of Chelan
County
Michael
Johnson
Pamela
Hunter
WECC
1,3,5,6
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
SERC
PG&E All Segments
Southern Company
Ginette Lacasse
Public Utility 1
District No. 1
of Chelan
County
WECC
Glen Pruitt
Public Utility 6
District No. 1
of Chelan
County
WECC
Meaghan Connell Public Utility 5
District No. 1
Chelan
County
WECC
Marco Rios
Pacific Gas 1
and Electric
Company
WECC
Sandra Ellis
Pacific Gas 3
and Electric
Company
WECC
James Mearns
Pacific Gas 5
and Electric
Company
WECC
Matt Carden
Southern
Company -
SERC
1
10
Organization
Name
Name
Segment(s)
Region
Group Name
Group Member
Name
Southern
Company
Services, Inc.
Northeast
Ruida Shu 1,2,3,4,5,6, NPCC
Power
7,8,9,10
Coordinating
Council
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
Group
Group
Member
Member
Organization Segment(s)
Group
Member
Region
Southern
Company
Services, Inc.
NPCC Regional
Standards Committee
Joel Dembowski Southern
Company Alabama
Power
Company
3
SERC
Ron Carlsen
Southern
Company Southern
Company
Generation
6
SERC
Jim Howell
Southern
5
Company Southern
Company
Services, Inc.
- Gen
SERC
Guy V. Zito
Northeast
10
Power
Coordinating
Council
NPCC
Randy
MacDonald
New
Brunswick
Power
NPCC
2
11
Organization
Name
Name
Segment(s)
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
Region
Group Name
Group Member
Name
Group
Group
Member
Member
Organization Segment(s)
Group
Member
Region
Glen Smith
Entergy
Services
4
NPCC
Alan Adamson
New York
State
Reliability
Council
7
NPCC
David Burke
Orange &
Rockland
Utilities
3
NPCC
Helen Lainis
IESO
2
NPCC
David Kiguel
Independent 7
NPCC
Nick Kowalczyk
Orange and 1
Rockland
NPCC
Joel Charlebois
AESI 5
Acumen
Engineered
Solutions
International
Inc.
NPCC
Mike Cooke
Ontario
4
Power
Generation,
Inc.
NPCC
12
Organization
Name
Name
Segment(s)
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
Region
Group Name
Group Member
Name
Group
Group
Member
Member
Organization Segment(s)
Group
Member
Region
Salvatore
Spagnolo
New York
Power
Authority
1
NPCC
Shivaz Chopra
New York
Power
Authority
5
NPCC
Deidre Altobell
Con Ed 4
Consolidated
Edison
NPCC
Dermot Smyth
Con Ed 1
Consolidated
Edison Co. of
New York
NPCC
Peter Yost
Con Ed 3
Consolidated
Edison Co. of
New York
NPCC
Cristhian Godoy Con Ed 6
Consolidated
Edison Co. of
New York
NPCC
Nurul Abser
NB Power
1
Corporation
NPCC
Randy
MacDonald
NB Power
2
Corporation
NPCC
13
Organization
Name
Name
Segment(s)
Region
Group Name
Group Member
Name
Group
Group
Member
Member
Organization Segment(s)
Michael Ridolfino Central
1
Hudson Gas
and Electric
NPCC
Vijay Puran
6
NPCC
10
NPCC
NYSPS
ALAN ADAMSON New York
State
Reliability
Council
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
Group
Member
Region
Sean Cavote
PSEG - Public 1
Service
Electric and
Gas Co.
NPCC
Brian Robinson
Utility
Services
5
NPCC
Quintin Lee
Eversource
Energy
1
NPCC
Jim Grant
NYISO
2
NPCC
John Pearson
ISONE
2
NPCC
John Hastings
National
Grid USA
1
NPCC
Michael Jones
National
Grid USA
1
NPCC
14
Organization
Name
Dominion Dominion
Resources,
Inc.
Name
Sean
Bodkin
Segment(s)
6
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
Region
Group Name
Dominion
Group Member
Name
Group
Group
Member
Member
Organization Segment(s)
Group
Member
Region
Nicolas Turcotte Hydro1
Qu?bec
TransEnergie
NPCC
Chantal Mazza
2
NPCC
Michele Tondalo United
1
Illuminating
Co.
NPCC
Paul Malozewski Hydro One
Networks,
Inc.
3
NPCC
Sean Bodkin
Dominion Dominion
Resources,
Inc.
6
NPCC
Connie Lowe
Dominion Dominion
Resources,
Inc.
3
NA - Not
Applicable
Lou Oberski
Dominion Dominion
Resources,
Inc.
5
NA - Not
Applicable
Larry Nash
Dominion Dominion
1
NA - Not
Applicable
HydroQuebec
15
Organization
Name
Name
Segment(s)
Region
Group Name
Group Member
Name
Group
Group
Member
Member
Organization Segment(s)
Group
Member
Region
Virginia
Power
OGE Energy - Sing Tay
Oklahoma
Gas and
Electric Co.
Western
Steven
Electricity
Rueckert
Coordinating
Council
6
10
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
SPP RE
OKGE
WECC CIP
Rachel Snead
Dominion Dominion
Resources,
Inc.
Sing Tay
OGE Energy - 6
Oklahoma
MRO
Terri Pyle
OGE Energy - 1
Oklahoma
Gas and
Electric Co.
MRO
Donald Hargrove OGE Energy - 3
Oklahoma
Gas and
Electric Co.
MRO
Patrick Wells
OGE Energy - 5
Oklahoma
Gas and
Electric Co.
MRO
Steve Rueckert
WECC
10
WECC
Morgan King
WECC
10
WECC
Deb McEndaffer WECC
10
WECC
Tom Williams
10
WECC
WECC
5
NA - Not
Applicable
16
1. The standards drafting team (SDT) considered industry’s concerns about the phrase “provisioning of access” requesting clarity on
this terminology. The SDT added “authorize, verify, and revoke provisioned access” to the parent requirement CIP-004-X, Requirement
R6, and changed “provisioning of access” to “provisioned access” in the requirement parts. This should clarify the intent that it is a
noun which scopes what the Registered Entity must authorize, verify, and revoke, rather than a verb relating to how provisioning
should occur. That is up to the entity to determine. Do you agree with the proposed change? If not, please provide the basis for your
disagreement and an alternate proposal.
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
No
Document Name
Comment
The use of provisioned access is not addressed in CIP-004-X Requirement 5. The CIP-004-X requirements should use consistent
terminology.
Likes
0
Dislikes
0
Response: Thank you for your comment. CIP-004-X (and also CIP-004-6, the currently enforceable standard) R4 and R5 is/was already
properly scoped to the kind of access to be authorized, verified, and revoked (i.e., electronic access to applicable cyber systems and
unescorted physical access into a Physical Security Perimeter). Although this is also provisioned access, it is not necessary to add the
qualifier to R4 and R5. However, it is necessary to include the word “provisioned” to scope the kind of access to BCSI the R6
requirements pertain to.
Barry Jones - Barry Jones On Behalf of: sean erickson, Western Area Power Administration, 1, 6; - Barry Jones
Answer
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
No
17
Document Name
2019-02_Unofficial_Comment_Form_03252021_Information-Protection-NSRF-draft-1_JC.docx
Comment
Comments: WAPA believes the SDT is moving in the correct direction from the past version. WAPA does not support the term
“provisioned access” as it is a non-definable term which has the potential to confuse regulators (auditors, risk, enforcement, FERC, NERC,
etc…) and industry. The term also does not address the requirements in the SAR for entities storing BCSI off-prem (such as cloud data
centers).
“Provisioned access” creates a security loophole whereas entities only require authorization for a provisioned access. For example, if
access to BCSI is not provisioned, no authorization to BCSI is required. This does not meet the goal of SAR for controlling access to BCSI.
Given the R6 definition whereas “access to BCSI” occurs when an individual has both “the ability to obtain and use BCSI,” we recommend
changing “provisioned access” to “access” that ensures only authorized individual can possess BCSI.
The use of “provisioned, provision or provisioning” of “access,” regardless of tense, would require entities to be audited to, maintain, and
provide documented lists of people and the “provisioned” configurations of entity BES Cyber System Information repositories in order to
“verify” the “authorization” of such provisioned access.
The Measures section highlights this expectation where evidence may include individual records, or lists of whom is authorized. To
achieve this evidence, entities would need to provide evidence of systems accounts of on-premises or off premises system repositories of
BCSI. Cloud providers may not provide such lists of personnel who have administrative level access to cloud BCSI server repositories and
entities will be unable to verify what 3rd party off-prem systems administrators have access to BCSI without litigation, yet entities will be
asked to provide this information for an entire audit cycle
Recommendations:
1.
Focus only on addressing electronic and physical access to BCSI in off-prem or cloud situations.
2.
Consider the following language for R6 Part 6.1:
Authorize access to BCSI based on need, as determined by the Responsible Entity, except for CIP Exceptional Circumstances. Access to
BCSI includes:
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
18
6.1.1. Electronic access to electronic BCSI;
6.1.2 Physical access to physical BCSI;
6.1.3 Physical access to unencrypted electronic BCSI (See our comments in Q4).
3. Consider using the perspective of language in CIP-011 “ to prevent unauthorized access to BES Cyber System Information.” This allows
entities to determine the risk and methods to protect BCSI
4. WAPA recommends addressing the two potential controls for access to off-prem BCS, 1) encrypting BCSI or 2) purchasing services
which allow the entity to manage the off-prem authentication systems – thereby preventing 3rd party systems administrators or others
from compromising entity BCSI stored in cloud data centers. This could be as simple as:
Implement at least one control to authorize access to BCSI based on need, as determined by the Responsible Entity, except for CIP
Exceptional Circumstances. Access to BCSI includes:
6.1.1. Electronic access to electronic BCSI;
6.1.2 Physical access to physical BCSI;
6.1.3 Physical access to unencrypted electronic BCSI (See our comments in Q4).
Likes
Dislikes
0
0
Response: Thank you for your comments. The SDT determined that the term “provisioned” does not need to be defined. Provision or
provisioned access is a well-known term among technical subject matter experts who provision access or deprovision access as a part
of their job. This is an industry-proven and accepted term that aligns with security best practices and industry frameworks, which is
best maintained as a non-defined term.
Regarding the security loophole, the SDT respectfully disagrees since the concept of provisioned access is the scoping mechanism for
the requirement, not a loophole. Provisioned access provides the needed flexibility for a Responsible Entity to use other technologies
and approaches instead of or in addition to storage locations as a way to meet the access management requirements for BCSI,
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
19
especially that which is stored in third-party cloud solutions or is protected at the information/file level no matter where it is located.
While Part 6.1 only requires authorization for provisioned access to BCSI, entities may also choose to have a process to authorize
individuals (that is, grant them permission or make them eligible) to receive, see, or use BCSI that is disclosed to them, much like a
security clearance. This can be helpful from an information protection standpoint where individuals can be instructed to only share
BCSI with others who are authorized to see it, and entities could implement this as part of their CIP-011 Information Protection
Program.
The CIP-004 standard includes contractors and service vendors, so cloud service provider personnel must be included in an entity’s
access management program (authorize, verify, and revoke provisioned access).
Dennis Sismaet - Northern California Power Agency - 6
Answer
No
Document Name
Comment
Please reference Marty Hostler's comments. Thanks.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to Marty Hostler.
JT Kuehne - AEP - 6
Answer
No
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
20
In AEP’s opinion, the updated language leaves room for interpretation. It might be simplistic to refer to the subparts of R6 instead of using
specific words from the subparts.
The updated Requirement 6 would read: “Each Responsible Entity shall implement one or more documented access management
program(s) to meet subparts of R6 for provisioned access to BCSI pertaining to the “Applicable Systems” identified in CIP-004-X Table R6 –
Access Management for BES Cyber System Information that collectively include each of the applicable requirement parts in CIP‐004‐X
Table R6 – Access Management for BES Cyber System Information. To be considered access to BCSI in the context of this requirement, an
individual has both the ability to obtain and use BCSI. [Violation Risk Factor: Medium] [Time Horizon: Same Day Operations and
Operations Planning].”
Likes
0
Dislikes
0
Response: Thank you for your comment. It is understood that all subparts follow suit of the parent requirement. The parent
requirement is requiring that an entity authorize, verify, and revoke access for the respective parts. In addition, the SDT added
authorize, verify and revoke during the last round of edits based on entities requesting additional clarification for provisioned access.
Bruce Reimer - Manitoba Hydro - 1
Answer
No
Document Name
Comment
We disagree with “provisioned access” since there is a security concern where it only requires authorization for a provisioned access. If
an access to BCSI is not provisioned, it means no authorization is required. This doesn’t meet the goal of SAR for controlling access to
BCSI. Given that R6 has defined “access to BCSI” as an individual has both the ability to obtain and use BCSI, we suggest changing
“provisioned access” to “access” that ensures only authorized individual can possess the BCSI. Also “unless already authorized according
to Part 4.1” should be removed as having authorized access to CIP Cyber Assets does not preclude the authorization for having access to
BCSI.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
21
Recommendations:
We have the following suggested language for R6 Part 6.1:
Authorize access to BCSI based on need, as determined by the Responsible Entity, except for CIP Exceptional Circumstances. Access to
BCSI includes:
6.1.1. Electronic access to electronic BCSI;
6.1.2 Physical access to physical BCSI;
6.1.3 Physical access to unencrypted electronic BCSI (See our comments in Q4).
Likes
Dislikes
0
0
Response Thank you for your comments. The SDT determined that the term “provisioned” does not need to be defined. Provision or
provisioned access is a well-known term among technical subject matter experts who provision access or deprovision access as a part
of their job. This is an industry-proven and accepted term that aligns with security best practices and industry frameworks, which is
best maintained as a non-defined term.
Regarding the security loophole, the SDT respectfully disagrees since the concept of provisioned access is the scoping mechanism for
the requirement, not a loophole. Provisioned access provides the needed flexibility for a Responsible Entity to use other technologies
and approaches instead of or in addition to storage locations as a way to meet the access management requirements for BCSI,
especially that which is stored in third-party cloud solutions or is protected at the information/file level no matter where it is located.
While Part 6.1 only requires authorization for provisioned access to BCSI, entities may also choose to have a process to authorize
individuals (that is, grant them permission or make them eligible) to receive, see, or use BCSI that is disclosed to them, much like a
security clearance. This can be helpful from an information protection standpoint where individuals can be instructed to only share
BCSI with others who are authorized to see it, and entities could implement this as part of their CIP-011 Information Protection
Program.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
22
Jennie Wike - Jennie Wike On Behalf of: Hien Ho, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; John Merrell, Tacoma Public
Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Marc Donaldson, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Ozan Ferrin, Tacoma Public
Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Terry Gifford, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; - Jennie Wike, Group Name
Tacoma Power
Answer
No
Document Name
Comment
Providing the definition of “provisioned access” within the Standard via the Note: within CIP-004 R6 Part 6.1 does not provide sufficient
clarity to Industry. Tacoma Power suggests that it would be beneficial to create a NERC Glossary defined term for “Provisioned Access.”
Likes
1
Dislikes
Snohomish County PUD No. 1, 3, Chaney Holly
0
Response: Thank you for your comments. The SDT determined that the term “provisioned” does not need to be defined. Provision or
provisioned access is a well-known term among technical subject matter experts who provision access or deprovision access as a part
of their job. This is an industry-proven and accepted term that aligns with security best practices and industry frameworks, which is
best maintained as a non-defined term.
Steven Rueckert - Western Electricity Coordinating Council - 10, Group Name WECC CIP
Answer
No
Document Name
Comment
•"Prior to provisioning, authorize provisioned access"? Wouldn't it be more appropriate to remove "provisioned" in 6.1.1 and 6.1.2?
How can an entity authorize provisioned access if it hasn't been provisioned yet?
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
23
• R6 requires provisioned access to BCSI to be authorized based on need, reviewed, and revoked upon a termination action.
• R6 makes no mention of “Transfers or reassignments”. R5 does not address revoking provisioned access to BCSI either, therefore
entities are not required to revoke provisioned access to BCSI unless they are terminated.
• Provisioned access to BCSI does not require an individual to have Cyber Security Awareness training or a PRA. Could an individual
have no access to a BCS but have all of the information relating to the BCS.
•In the Note section of R6.1 “Provisioned access is to be considered the result of the specific actions taken to provide an individual
the means to access BCSI (e.g., physical keys or access cards, user accounts and associated rights and privileges, encryption keys).”
{C}Recommend changing the e.g., section to read “physical keys or access control key cards, user accounts and associated rights
and privileges, encryption keys).
Likes
Dislikes
0
0
Response: Thank you for your comment. Response by topic is as follows:
1) The term “provisioned access” is to be read as a noun/concept. The Note that had been included in the requirement defines
what provisioned access means in the context of this requirement. Responsible Entities are to authorize individuals to be given
provisioned access to BCSI. First, the Responsible Entity determines who needs the ability to obtain and use BCSI for performing
legitimate work functions. Next, a person empowered by the Responsible Entity to do so authorizes—gives permission or
approval for—those individuals to be given provisioned access to BCSI. Only then would the Responsible Entity provision access
to BCSI as authorized. In addition, the “note” has been removed from the subpart and the language that was within the note
has been moved up into the parent requirement R6.
2) Current CIP requirements related to BCSI are not concerned with “Transfers or reassignments” and neither are the
requirements that this SDT has drafted. Modifying the BCSI requirements to address this concern is beyond the scope of this
SAR. However, we do not believe it is accurate to say that provisioned access to BCSI is not required to be revoked unless
someone is terminated, either in the current or drafted requirements. Responsible Entities are required to review BCSI access
once every 15 months and take appropriate actions, including removal of access.
3) Regarding Cyber Security Awareness Training, this is not required for access to BCSI in the current CIP requirements; adding
that requirement is beyond the scope of this SAR.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
24
4) Regarding the modification of the note to say “access control key cards”, the SDT considered but did not make this revison to
our final updates. Adding additional adjectives may cause confusion or limitations to the SDT’s intent and the broader
language.
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
No
Document Name
Comment
While the SDT did well in clarifying the intent of the provisioning, we do not feel a “Note” inserted into the requirement is sufficient to
serve as a NERC definition. See Q5 comments.
Likes
0
Dislikes
0
Response: Thank you for your comments. The SDT determined that the term “provisioned” does not need to be defined. Provision or
provisioned access is a well-known term among technical subject matter experts who provision access or deprovision access as a part
of their job. This is an industry-proven and accepted term that aligns with security best practices and industry frameworks, which is
best maintained as a non-defined term. In addition, the “note” has been removed from the subpart and the language that was within
the note has been moved up into the parent requirement R6.
Jennifer Bray - Arizona Electric Power Cooperative, Inc. - 1
Answer
No
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
25
While the SDT did well in clarifying the intent of the provisioning, we do not feel a “Note” inserted into the requirement is sufficient to
serve as a NERC definition. See Q5 comments.
AEPC has signed on to ACES comments.
Likes
0
Dislikes
0
Response: Thank you for your comments. The SDT determined that the term “provisioned” does not need to be defined. Provision or
provisioned access is a well-known term among technical subject matter experts who provision access or deprovision access as a part
of their job. This is an industry-proven and accepted term that aligns with security best practices and industry frameworks, which is
best maintained as a non-defined term. In addition, the “note” has been removed from the subpart and the language that was within
the note has been moved up into the parent requirement R6.
Please see the SDT’s response to ACES.
Thomas Standifur - Austin Energy - 1,3,4,5,6
Answer
No
Document Name
TPWR_2019-02_Unofficial_Comment_Form_2021-05-10.docx20210504-17090-hsevrj.docx
Comment
In support of Tacoma Powers' comments. Attached.
Likes
Dislikes
0
0
Response: Please see the SDT’s response to Tacoma Power.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
26
Benjamin Winslett - Georgia System Operations Corporation - 4
Answer
No
Document Name
2019-02_Unofficial_Comment_Form_Final Draft.docx
Comment
For the purposes of providing for cloud storage and processing of BCSI information, the proposed changes are sufficient to provide for its
use. However, the changes are silent with regard to the authorized incidental access of BCSI in a physical environment such as a
meeting. It is recommended that clarification be provided in the requirement language for such circumstances. This is addressed in the
Technical Rationale: however, it was not included in the standard.
The following modification is suggested to the Note in requirement part 6.1:
Note: Provisioned access is to be considered the result of the specific actions taken to provide an individual(s) the means to access BCSI
(e.g., may include physical keys or access cards, user accounts and associated rights and privileges, encryption keys). Provisioned access
does not include temporary or incidental access when a specific mechanism for provisioning access is not available or feasible such as
when an individual is given, merely views, or might see BCSI such as during a meeting or visiting a PSP, or when the BCSI is temporarily or
incidentally located or stored on work stations, laptops, flash drives, portable equipment, offices, vehicles, etc.
Likes
1
Dislikes
Georgia Transmission Corporation, 1, Davis Greg
0
Response: Thank you for your comment. The team removed the “note” from 6.1 and moved the language to the parent requirement
R6. Based on the comments received and ballot results, the SDT determined the language is sufficient as written.
Gladys DeLaO - CPS Energy - 1,3,5
Answer
No
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
27
Part 6.1 perhaps should read as follows:
Unless already authorized according to Part 4.1, authorize provisioned access based on need, as determined by the Responsible Entity,
except for CIP Exceptional Circumstances:
CPS Energy suggests creating a NERC Glossary defined term for “Provisioned Access” instead of adding the Note: within CIP-004 R6 Part
6.1. Additionally, “obtain and use” should be included in the definition.
Likes
0
Dislikes
0
Response: Thank you for your comments. The SDT determined that the term “provisioned” does not need to be defined. Provision or
provisioned access is a well-known term among technical subject matter experts who provision access or deprovision access as a part
of their job. This is an industry-proven and accepted term that aligns with security best practices and industry frameworks, which is
best maintained as a non-defined term. In addition, the “note” has been removed from the subpart and the language that was within
the note has been moved up into the parent requirement R6.
Michael Brytowski - Great River Energy - 1,3,5,6
Answer
No
Document Name
Comment
The term “provisioned access” adds another undefined term to the NERC standards and doesn’t provide a clear path to regulatory offprem or cloud data center services as proposed in the SAR. The only methods to control access to off-prem (cloud) BCSI is either by 1)
encrypting BCSI or 2) purchasing services which allow the entity to manage the off-prem authentication systems – thereby preventing 3rd
party systems administrators or others from compromising entity BCSI stored in cloud data centers. Option 2 is highly unlikely.
a. “Provisioned access” creates a security loophole whereas entities only require authorization for a provisioned access. For example, if
access to BCSI is not provisioned, no authorization to BCSI is required. This does not meet the goal of SAR for controlling access to BCSI.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
28
Given the R6 definition whereas “access to BCSI” occurs when an individual has both “the ability to obtain and use BCSI,” we recommend
changing “provisioned access” to “access to BCSI”.
b. The term “unless already authorized according to Part 4.1” should be removed. Why? Because having authorized access to CIP Cyber
Assets does not preclude the authorization for having access to BCSI.
c. The use of “provisioned, provision or provisioning” of “access,” regardless of tense, would require entities to be audited to, maintain,
and provide documented lists of people and the “provisioned” configurations of entity BES Cyber System Information repositories in
order to “verify” the “authorization” of such provisioned access. The Measures section highlights this expectation where evidence may
include individual records, or lists of whom is authorized. To achieve this evidence, entities would need to provide evidence of systems
accounts of on-premises or off premises system repositories of BCSI. Cloud providers will not provide such lists of personnel who have
administrative level access to cloud BCSI server repositories and entities will be unable to verify what 3rd party off-prem systems
administrators have access to BCSI, yet entities will be asked to provide this information for an entire audit cycle
d. The current language requiring entities to 1) identify repositories and 2) authorize access based on need can also work for 3rd party offprem or cloud locations without requiring lists of personnel or configurations of systems accounts for repositories of BCSI. (see
recommendations)
Recommendations:
1. Focus only on addressing electronic and physical access to BCSI in off-prem or cloud situations.
2. Consider the following language for R6 Part 6.1:
Authorize access to BCSI based on need, as determined by the Responsible Entity, except for CIP Exceptional Circumstances. Access to
BCSI includes:
6.1.1. Electronic access to electronic BCSI;
6.1.2 Physical access to physical BCSI;
6.1.3 Physical access to unencrypted electronic BCSI (See our comments in Q4).
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
29
3. Consider using the perspective of language in CIP-011 “ to prevent unauthorized access to BES Cyber System Information.” This allows
entities to determine the risk and methods to protect BCSI
4. Consider using “authentication systems or encryption of BCSI” for personnel accessing electronic BCSI on cloud prem providers
locations
Likes
0
Dislikes
0
Response: Thank you for your comments. The SDT determined that the term “provisioned” does not need to be defined. Provision or
provisioned access is a well-known term among technical subject matter experts who provision access or deprovision access as a part
of their job. This is an industry-proven and accepted term that aligns with security best practices and industry frameworks, which is
best maintained as a non-defined term.
Regarding the security loophole, the SDT respectfully disagrees since the concept of provisioned access is the scoping mechanism for
the requirement, not a loophole. Provisioned access provides the needed flexibility for a Responsible Entity to use other technologies
and approaches instead of or in addition to storage locations as a way to meet the access management requirements for BCSI,
especially that which is stored in third-party cloud solutions or is protected at the information/file level no matter where it is located.
While Part 6.1 only requires authorization for provisioned access to BCSI, entities may also choose to have a process to authorize
individuals (that is, grant them permission or make them eligible) to receive, see, or use BCSI that is disclosed to them, much like a
security clearance. This can be helpful from an information protection standpoint where individuals can be instructed to only share
BCSI with others who are authorized to see it, and entities could implement this as part of their CIP-011 Information Protection
Program.
Roger Fradenburgh - Roger Fradenburgh On Behalf of: Nicholas Lauriat, Network and Security Technologies, 1; - Roger Fradenburgh
Answer
No
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
30
N&ST notes that words can only be nouns, verbs, adjectives, etc. on an individual basis. Calling any two-word phrase a noun is
grammatically incorrect. Beyond that, the phrase, “provisioned access,” as used in proposed CIP-004 requirements, is itself grammatically
incorrect by virtue of the fact “provisioned” is the past tense of the verb, “provision.” It is not an adjective. An individual can be given
access or can be provisioned access but cannot be given provisioned access. Since the SDT has adopted NERC’s informal definition of
“access to BCSI” as the ability to “obtain and use” it, N&ST suggests the SDT maintain consistency with existing CIP-004 language and
continue to require that Responsible Entities authorize access to BCSI (or BCSI storage locations), dropping the misunderstood and
grammatically incorrect “provisioned access.”
Likes
0
Dislikes
0
Response: Thank you for your comments. The SDT determined that the term “provisioned” does not need to be defined. Provision or
provisioned access is a well-known term among technical subject matter experts who provision access or deprovision access as a part
of their job. This is an industry-proven and accepted term that aligns with security best practices and industry frameworks, which is
best maintained as a non-defined term.
Donna Wood - Tri-State G and T Association, Inc. - 1
Answer
Yes
Document Name
Comment
Tri-State Generation and Transmission appreciates the time and effort given to this project and agrees with the revisions/changes.
Likes
Dislikes
0
0
Response: Thank you for your support.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
31
Masuncha Bussey - Duke Energy - 1,3,5,6 - MRO,Texas RE,SERC, Group Name Duke Energy
Answer
Yes
Document Name
Comment
Duke Energy agrees with the proposed change to “provisioned access” and that the entity will determine how that provisioning will occur.
Likes
0
Dislikes
0
Response: Thank you for your support.
Marty Hostler - Northern California Power Agency - 3,4,5,6
Answer
Yes
Document Name
Comment
NO. See WAPA and Indiana Comments
Likes
1
Dislikes
Northern California Power Agency, 6, Sismaet Dennis
0
Response: Please see the SDT’s response to WAPA.
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
Yes
Document Name
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
32
Comment
MPC agrees that this change provides greater clarity regarding the intent of this requirement and understands that it is the provisioned
access that must be authorized, verified, and revoked.
Likes
0
Dislikes
0
Response: Thank you for your support.
Patrick Wells - OGE Energy - Oklahoma Gas and Electric Co. - 1,3,5,6
Answer
Yes
Document Name
EEI Near Final Draft Comments_ Project 2019-02_Rev_0f_For Review FOR MEMBER REVIEW.docx
Comment
OG&E agrees with EEI's comments
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Sing Tay - OGE Energy - Oklahoma Gas and Electric Co. - 6, Group Name OKGE
Answer
Yes
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
33
OKGE supports comments provided by EEI.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Dan Bamber - ATCO Electric - 1
Answer
Yes
Document Name
Comment
Assuming that “provisioned access” means when someone gains and keeps BCSI access? Meaning if someone sees (screen sharing in view
mode only) does not fall under “provisioned access”?
Likes
0
Dislikes
0
Response: Thank you for your comment. Items such as see/hear/memorize type encounters with BCSI such as a red only screen share
do not constitue access under CIP-004. Instead, this falls under the realm of information sharing that is subject to the Information
Protection Program within CIP-011 and is accomplished through an entity’s handling methods.
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
Yes
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
34
Move the note to the parent requirement (R6), since it applies to more than 6.1, and remove the word “Note.”
Likes
0
Dislikes
0
Response: Thank you for your comment. The team removed the “note” from 6.1 and moved the language to the parent requirement
R6.
Michael Johnson - Michael Johnson On Behalf of: Ed Hanson, Pacific Gas and Electric Company, 3, 1, 5; Marco Rios, Pacific Gas and
Electric Company, 3, 1, 5; Sandra Ellis, Pacific Gas and Electric Company, 3, 1, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
Yes
Document Name
Comment
PG&E agrees with the proposed modifications. PG&E will define what is “provisioning of access” for our environment and will not need a
defined NERC term since a NERC term may not cover all possible conditions for PG&E.
Likes
0
Dislikes
0
Response: Thank you for your support.
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
Yes
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
35
Move the note to the parent requirement (R6), since it applies to more than 6.1, and remove the word “Note.”
Likes
0
Dislikes
0
Response: Thank you for your comment. The team removed the “note” from 6.1 and moved the language from the note to the parent
requirement R6.
Thomas Breene - WEC Energy Group, Inc. - 3
Answer
Yes
Document Name
Comment
We support EEI comments.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
David Hathaway - WEC Energy Group, Inc. - 6
Answer
Yes
Document Name
Comment
Support comments made by EEI.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
36
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Clarice Zellmer - WEC Energy Group, Inc. - 5
Answer
Yes
Document Name
Comment
Agree with the proposed change. Would like the SDT to incorporate EEI comments as a non-substantive change during the final EEI
review.
Likes
0
Dislikes
0
Response: Thank you for your support. Please see the SDT’s response to EEI.
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
Yes
Document Name
Comment
Southern agrees as with EEI that the change provides greater clarity regarding the intent of the Requirement.
Likes
Dislikes
0
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
37
Response: Please see the SDT’s response to EEI.
Daniel Gacek - Exelon - 1
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
John Galloway - ISO New England, Inc. - 2 - NPCC
Answer
Yes
Document Name
Comment
ISO New England supports this change.
Likes
Dislikes
0
0
Response: Thank you for your support.
Kinte Whitehead - Exelon - 3
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
38
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Cynthia Lee - Exelon - 5
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Becky Webb - Exelon - 6
Answer
Yes
Document Name
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
39
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Joshua Andersen - Salt River Project - 1,3,5,6 - WECC
Answer
Yes
Document Name
Comment
Be careful adding “NOTES” to requirements. If the purpose is to increase clarity, then consider re-writing the requirement to improve
clarify. NOTES may become overused across CIP standards and cause confusion.
Likes
0
Dislikes
0
Response: Thank you for your comment. The team removed the “note” from 6.1 and moved the language from the note to the parent
requirement R6.
Leonard Kula - Independent Electricity System Operator - 2
Answer
Yes
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
40
IESO supports the comments submitted by NPCC.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to NPCC.
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name NPCC Regional Standards Committee
Answer
Yes
Document Name
Comment
We support these changes.
Likes
0
Dislikes
0
Response: Thank you for your support.
Eli Rivera - CenterPoint Energy Houston Electric, LLC - NA - Not Applicable - Texas RE
Answer
Yes
Document Name
Comment
CenterPoint Energy Houston Electric, LLC (CEHE) agrees that “provisioned access” is an improvement and supports the proposed change.
Likes
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
41
Dislikes
0
Response: Thank you for your support.
Jennifer Flandermeyer - Jennifer Flandermeyer On Behalf of: Allen Klassen, Evergy, 6, 1, 3, 5; Derek Brown, Evergy, 6, 1, 3, 5; Marcus
Moor, Evergy, 6, 1, 3, 5; Thomas ROBBEN, Evergy, 6, 1, 3, 5; - Jennifer Flandermeyer
Answer
Yes
Document Name
Comment
Evergy supports and endorses the comments filed by the Edison Electric Institute.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
Yes
Document Name
Comment
NV Energy agrees that this change provides greater clarity regarding the intent of this Requirement.
Likes
Dislikes
0
0
Response: Thank you for your support.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
42
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
Yes
Document Name
Comment
None.
Likes
0
Dislikes
0
Response
Constantin Chitescu - Ontario Power Generation Inc. - 5
Answer
Yes
Document Name
Comment
OPG supports NPCC Regional Standards Committee’s comments.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to NPCC Regional Standards Committee.
Larry Heckert - Alliant Energy Corporation Services, Inc. - 4
Answer
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
Yes
43
Document Name
Comment
Alliant Energy supports comments submitted by EEI.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Bobbi Welch - Midcontinent ISO, Inc. - 2, Group Name ISO/RTO Council Standards Review Committee 2019-02 BCSI Access Management
(Draft 3)
Answer
Yes
Document Name
Comment
The ISO/RTO Council Standards Review Committee (IRC SRC) acknowledges the SDT for addressing our prior concerns surrounding the
lack of clarity associated with “provision of access.”
Likes
0
Dislikes
0
Response: Thank you for the acknowledgment, the SDT appreciates your support.
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
Yes
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
44
ITC supports the response submitted by EEI
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Lindsay Wickizer - Berkshire Hathaway - PacifiCorp - 6
Answer
Yes
Document Name
Comment
PAC requests the SDT provide better definition of “provisioned access” than what was currently provided in Part 6.1
Likes
0
Dislikes
0
Response: Thank you for your comment. Based on the comments received and the ballot results, the SDT considered comments and
determined the language is sufficient.
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
Yes
Document Name
Comment
EEI agrees that this change provides greater clarity regarding the intent of this Requirement. However, use of the term “note” creates
ambiguity because it is not clear whether the language in the note creates mandatory obligations. The use of the word “note” should be
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
45
removed and the language contained in the note in Requirement R6, Part 6.1 should be elevated to the parent Requirement R6 because
the term “provisioned access” is used in other parts of Requirement R6. Additionally, the note language should be strengthened for
additional clarity (e.g., “is to be considered” may not be clear for industry to understand what the note means)
Likes
0
Dislikes
0
Response: Thank you for your comment. The team removed the “note” from 6.1 and moved the language from the note to the parent
requirement R6. Based on the comments received and the ballot results, the SDT considered comments and determined the language
is sufficient.
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name CHPD
Answer
Yes
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
46
Likes
0
Dislikes
0
Response
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 3,4,5 - RF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
47
Kimberly Van Brimer - Southwest Power Pool, Inc. (RTO) - 2 - MRO,WECC, Group Name Southwest Power Pool Standards Review Group
(SSRG)
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
William Steiner - Midwest Reliability Organization - 10
Answer
Yes
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
48
Likes
0
Dislikes
0
Response
Sean Bodkin - Dominion - Dominion Resources, Inc. - 6, Group Name Dominion
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
49
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
David Jendras - Ameren - Ameren Services - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Amy Bratkovic - PNM Resources - Public Service Company of New Mexico - 1,3
Answer
Yes
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
50
Likes
0
Dislikes
0
Response
Gail Golden - Entergy - Entergy Services, Inc. - 5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Maryanne Darling-Reich - Black Hills Corporation - 1,3,5,6 - MRO,WECC
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Chris Carnesi - Northern California Power Agency - 3,4,5,6 - WECC
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
51
Answer
Document Name
Comment
disregard
Likes
0
Dislikes
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Document Name
Comment
Texas RE seeks clarification regarding the scope of the revised CIP-004, Part 6.1. Specifically, Texas RE interprets “provisioned access” to
include all instances in which an individual is “provisioned access” to BCSI. Accordingly, accidental or mistaken provisioned access would
be within the scope of the requirement. Conversely, compromise of BCSI without any specific entity actions to provide the means to
access BCSI (such as a data breach) would not be within the scope of the proposed requirement. Texas RE inquires as to whether this is
the SDT’s intent.
Likes
Dislikes
0
0
Response: Thank you for your comment. With regards to the human performance examples of accidental or mistaken provisioned
access, it would be the understanding that an entity would correct and self-report in those instances. CIP-004 requirements are
designed to manage that which the entity controls (authorization, verification, provisioning, and revocation), and not designed to
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
52
address mallicious acts such as data exfiltration/breaches; the SDT intention is for CIP-011 protections to serve to detect, prevent,
deter those conditions.
Doug Peterchuck - Omaha Public Power District - 1
Answer
Document Name
2019-02_Unofficial_Comment_Form_Information-Protection-OPPD.docx
Comment
Likes
Dislikes
0
0
Response: Thank you for your comments. The SDT determined that the term “provisioned” does not need to be defined. Provision or
provisioned access is a well-known term among technical subject matter experts who provision access or deprovision access as a part
of their job. This is an industry-proven and accepted term that aligns with security best practices and industry frameworks, which is
best maintained as a non-defined term.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
53
2. The SDT considered industry’s concerns about the absence of “obtain and use” language from the CMEP Practice Guide, which currently
provides alignment on a clear two-pronged test of what constitutes access in the context of utilizing third-party solutions (e.g., cloud
services) for BCSI. The SDT mindfully mirrored this language to assure future enforceable standards are not reintroducing a gap. Do you
agree this clarifying language makes it clear both parameters of this two-pronged test for “obtain and use” must be met to constitute
“access” to BCSI? If not, please provide the basis for your disagreement and an alternate proposal.
Lindsay Wickizer - Berkshire Hathaway - PacifiCorp - 6
Answer
No
Document Name
Comment
Please provide additional clarification in the Standard, and in the technical rationale.
Does the term, ‘use’ allow a user to unencrypt? Potential here for resulting in a potential data manipulation.
Recommendation:
Only use the term, “access.”
See the new R6 versus the former R4 language changes for clarification.
Likes
Dislikes
0
0
Response: Thank you for your comment. If the person can unencrypt the data, they would have provisioned access. The SDT determined
that the term “provisioned” would be the appropriate phrase instead of access. Provision or provisioned access is a well-known term
among technical subject matter experts who provision access or deprovision access as a part of their job. This is an industry-proven and
accepted term that aligns with security best practices and industry frameworks, which is best maintained as a non-defined term.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
54
Michael Brytowski - Great River Energy - 1,3,5,6
Answer
No
Document Name
Comment
GRE agrees to adding “obtain and use” language to clarify what constitutes an access to BCSI, but disagree to the use of “provisioned
access”. After clarifying the access to BCSI, the language “provisioned” should be removed since it has a security flaw and requires extensive
records from repositories of BCSI (See our comments in Q1).
Recommendations:
1. Only use the term “access” as recommended in Q1
Likes
0
Dislikes
0
Response: Thank you for your comment. The SDT determined that the term “provisioned” would be the appropriate phrase instead of
access. Provision or provisioned access is a well-known term among technical subject matter experts who provision access or deprovision
access as a part of their job. This is an industry-proven and accepted term that aligns with security best practices and industry
frameworks, which is best maintained as a non-defined term.
Gladys DeLaO - CPS Energy - 1,3,5
Answer
No
Document Name
Comment
CPS Energy suggests “obtain and use” be included within R6 statement.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
55
“Each Responsible Entity shall implement one or more documented access management program(s) to authorize, verify, and revoke
provisioned access that grants the ability to obtain and use BCSI pertaining to the “Applicable Systems” identified in CIP-004-X Table R6 –
Access Management for BES Cyber System Information.
Likes
0
Dislikes
0
Response: Thank you for your comment. The phrase “obtain and use” is included in Requirement R6. Based on the recent comments and
ballot results, the SDT determined that the language currently drafted accomplishes the objective.
Eli Rivera - CenterPoint Energy Houston Electric, LLC - NA - Not Applicable - Texas RE
Answer
No
Document Name
Comment
Additional clarity is needed for what constitutes access by “obtain and use”. Specifically, clarify what “use” means by defining the point at
which information is considered “used”. Does “use” mean immediately when the information is read by someone, or does it mean when
the information is applied for some purpose? For example, if someone obtains information and can read it, and there are additional
physical or electronic controls in place to prevent unauthorized use of the obtained information, do those controls then prevent “access to
BCSI” based on the premise that information must be obtained and used to constitute access to BCSI?
Likes
Dislikes
0
0
Response: Thank you for your comment. In the context of this requirement, an individual is considered to have been provisioned access if
they concurrently have the means to both obtain and use the BCSI. To illustrate, an individual who can obtain encrypted BCSI but does
not have the encryption keys to be able to use the BCSI has not been provisioned access to the BCSI.
Thomas Standifur - Austin Energy - 1,3,4,5,6
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
56
Answer
No
Document Name
TPWR_2019-02_Unofficial_Comment_Form_2021-05-10.docx20210504-17090-hsevrj.docx
Comment
In support of Tacoma Powers' comments. Attached.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to Tacoma Power.
Steven Rueckert - Western Electricity Coordinating Council - 10, Group Name WECC CIP
Answer
No
Document Name
Comment
Integrity should also be included as a security objective for BCSI in addition to confidentiality. Removing “obtain and use” is not consistent
with the ERO Enterprise CMEP Practice Guide nor is it consistent with
https://www.nerc.com/pa/comp/guidance/CMEPPracticeGuidesDL/ERO%20Enterprise%20CMEP%20Practice%20Guide%20_%20BCSI%20%20v0.2%20CLEAN.pdf
In the R6 Requirement language "To be considered access to BCSI in the context of this requirement, an individual has both the ability to
obtain and use BCSI."
- This statement contradicts the Requirement of R6.1. If a user must concurrently have the ability to both, obtain and use BCSI how does
that provide the entity the ability to authorize based on need, as determined by the Responsible Entity?
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
57
- The webinar on 4/27/2021 attempted to clarify what the right and left lateral limits of BCSI “use” could be, but further clarifications might
be needed to ensure a consistent approach is expected for authorization and provisioning.
Likes
0
Dislikes
0
Response: Thank you for your comment.
1) Regarding the comment speaking to adding Integrity as a security objective for BCSI. That is beyond the scope of this SAR and it is
not the intent of the SDT to include Integrity requirements/objectives in this draft. The security objective of the BCSI
requirements is to protect BES Cyber Systems. If the confidentiality of the BCSI is protected, then the risk of BCSI being misused
by a bad actor and that bad actor impacting BES Cyber Systems is also reduced and the security goal has been achieved.
2) Regarding the comments speaking to the “obtain and use” language, the comment is somewhat confusing. The SDT did not
remove the obtain and use language. In the context of this requirement, an individual is considered to have provisioned access if
they concurrently have the means to both obtain and use the BCSI. To illustrate, an individual who can obtain encrypted BCSI but
does not have the encryption keys to be able to use the BCSI has not been provisioned access to the BCSI. Putting the
requirement language and the clarification of what access means together, a Responsible Entity must authorize individuals to be
given provisioned access to BCSI. First, the Responsible Entity determines who needs the ability to obtain and use BCSI for
performing legitimate work functions. Next, a person empowered by the Responsible Entity to do so authorizes—gives permission
or approval for—those individuals to be given provisioned access to BCSI. Only then would the Responsible Entity provision access
to BCSI as authorized.
3) Regarding the comment speaking to the limits of BCSI “use”, the SDT will consider this feedback when drafting implementation
guidance. The SDT also invites you, and other entities, to also draft implementation guidance that would speak to your concern.
Joshua Andersen - Salt River Project - 1,3,5,6 - WECC
Answer
No
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
58
Access needs to be better defined, in particular the phrase “use BCSI” – being able to view a document or taking advantage of the
information in the document. Is it “I have access to the file but not able to open it”, or is it “I have BES cyber system IP address, but no
ability to get to those systems because there are other controls preventing me from using that information”?
Where is it in the standard that this is spelled out as a clear definition – “two-prong test”? This is not clear in the question above – shouldn’t
the requirement be more clear?
Likes
0
Dislikes
0
Response: Thank you for your comment. In the context of this requirement, an individual is considered to have been provisioned access if
they concurrently have the means to both obtain and use the BCSI. To illustrate, an individual who can obtain encrypted BCSI but does
not have the encryption keys to be able to use the BCSI has not been provisioned access to the BCSI. The SDT also invites you, and other
entities, to also draft implementation guidance that would speak to your concern.
Jennie Wike - Jennie Wike On Behalf of: Hien Ho, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; John Merrell, Tacoma Public Utilities
(Tacoma, WA), 3, 1, 4, 5, 6; Marc Donaldson, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Ozan Ferrin, Tacoma Public Utilities
(Tacoma, WA), 3, 1, 4, 5, 6; Terry Gifford, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; - Jennie Wike, Group Name Tacoma Power
Answer
No
Document Name
Comment
The placement of the “obtain and use” statement gets lost within the construct of the Requirement Language, it appears as an add-on to the
high level R6 language.
Suggested alternative:
“Each Responsible Entity shall implement one or more documented access management program(s) to authorize, verify, and revoke the
provisioned access that grants the ability to obtain and use BCSI pertaining to the “Applicable Systems” identified in CIP-004-X Table R6 –
Access Management for BES Cyber System Information that collectively include each of the applicable requirement parts in CIP-004-X Table
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
59
R6 – Access Management for BES Cyber System Information. [Violation Risk Factor: Medium] [Time Horizon: Same Day Operations and
Operations Planning]”
Likes
1
Dislikes
Snohomish County PUD No. 1, 3, Chaney Holly
0
Response: Thank you for your comment. Based on the favorable vote from industry, the SDT determined the language of R6 aligns with
the CMEP Practice Guide and accomplishes the objective.
Bruce Reimer - Manitoba Hydro - 1
Answer
No
Document Name
Comment
We agree to adding “obtain and use” language to clarify what constitutes an access to BCSI, but disagree to “provisioned access”. After
clarifying the access to BCSI, the language “provisioned” should be removed since it has a security flaw (See our comments in Q1).
Likes
Dislikes
0
0
Response: Thank you for your comments. The SDT determined that the term “provisioned” does not need to be defined. Provision or
provisioned access is a well-known term among technical subject matter experts who provision access or deprovision access as a part of
their job. This is an industry-proven and accepted term that aligns with security best practices and industry frameworks, which is best
maintained as a non-defined term.
Regarding the security loophole, the SDT respectfully disagrees since the concept of provisioned access is the scoping mechanism for the
requirement, not a loophole. Provisioned access provides the needed flexibility for a Responsible Entity to use other technologies and
approaches instead of or in addition to storage locations as a way to meet the access management requirements for BCSI, especially that
which is stored in third-party cloud solutions or is protected at the information/file level no matter where it is located. While Part 6.1
only requires authorization for provisioned access to BCSI, entities may also choose to have a process to authorize individuals (that is,
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
60
grant them permission or make them eligible) to receive, see, or use BCSI that is disclosed to them, much like a security clearance. This
can be helpful from an information protection standpoint where individuals can be instructed to only share BCSI with others who are
authorized to see it, and entities could implement this as part of their CIP-011 Information Protection Program.
Sean Bodkin - Dominion - Dominion Resources, Inc. - 6, Group Name Dominion
Answer
No
Document Name
Comment
Dominion Energy is of the opinion that the terms“obtain and use” are ambiguous. We suggest additional language that provides for the
Registered Entity to have the felxibility to define how these terms are applied by adding some additional language to the proposed
Requirement as follows: …an individual has both the ability to obtain and use BCSI as defined by the Registered Entity.
Likes
0
Dislikes
0
Response: Thank you for your comment. Provisioned access is to be considered the result of specific actions taken to provide an
individual the means to access BCSI (e.g., physical keys or access cards, user accounts and associated rights and privileges, encryption
keys, etc.). In the context of this requirement, an individual is considered to have been provisioned access if they concurrently have the
means to both obtain and use the BCSI. To illustrate, an individual who can obtain encrypted BCSI but does not have the encryption keys
to be able to use the BCSI has not been provisioned access to the BCSI. The SDT also invites you, and other entities, to also draft
implementation guidance that would speak to your concern.
Dennis Sismaet - Northern California Power Agency - 6
Answer
No
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
61
Please reference Marty Hostler's comments. Thanks.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to Marty Hostler.
Barry Jones - Barry Jones On Behalf of: sean erickson, Western Area Power Administration, 1, 6; - Barry Jones
Answer
No
Document Name
Comment
1.
We agree to adding “obtain and use” language to clarify what constitutes an access to BCSI, but disagree to the use of “provisioned
access”. After clarifying the access to BCSI, the language “provisioned” should be removed since it has a security flaw and requires
extensive records from repositories of BCSI (See our comments in Q1).
Recommendations:
1.
Only use the term “access” as recommended in Q1
Likes
Dislikes
0
0
Response: Thank you for your comments. The SDT determined that the term “provisioned” does not need to be defined. Provision or
provisioned access is a well-known term among technical subject matter experts who provision access or deprovision access as a part of
their job. This is an industry-proven and accepted term that aligns with security best practices and industry frameworks, which is best
maintained as a non-defined term.
Regarding the security loophole, the SDT respectfully disagrees since the concept of provisioned access is the scoping mechanism for the
requirement, not a loophole. Provisioned access provides the needed flexibility for a Responsible Entity to use other technologies and
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
62
approaches instead of or in addition to storage locations as a way to meet the access management requirements for BCSI, especially that
which is stored in third-party cloud solutions or is protected at the information/file level no matter where it is located. While Part 6.1
only requires authorization for provisioned access to BCSI, entities may also choose to have a process to authorize individuals (that is,
grant them permission or make them eligible) to receive, see, or use BCSI that is disclosed to them, much like a security clearance. This
can be helpful from an information protection standpoint where individuals can be instructed to only share BCSI with others who are
authorized to see it, and entities could implement this as part of their CIP-011 Information Protection Program.
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
No
Document Name
Comment
A user can have provisioned access to obtain BCSI and not use it. The Registered Entity is currently receiving an authorization for a user
based on need to access BCSI. Access to BCSI is enough to constitute an authorization regardless of use. While this clarification assists in the
context of third-party solutions it does not provide clarity for electronic or physical access to BCSI.
Likes
Dislikes
0
0
Response: Thank you for your comment. BCSI in physical format, physical access is provisioned to a physical storage location designated
for BCSI and for which access can be provisioned, such as a lockable file cabinet. For BCSI in electronic format, electronic access is
provisioned to an electronic system or its contents, or to individual files. Provisioned physical access alone to a physical location housing
hardware that contains electronic BCSI is not considered to be provisioned access to the electronic BCSI. Take, for instance, storing BCSI
with a cloud service provider. In this case, the cloud service provider’s personnel with physical access to the data center is not, by itself,
considered provisioned access to the electronic BCSI stored on servers in that data center, as the personnel would also need to be
provisioned electronic access to the servers or system. In scenarios like this, the Responsible Entity should implement appropriate
information protection controls to help prevent unauthorized access to BCSI per its information protection program, as required in CIP011-X. The subparts in Requirement R6, Part 6.1 were written to reinforce this concept and clarify access management requirements.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
63
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
Yes
Document Name
Comment
EEI agrees that the clarifying language contained in the two-prong test (i.e., “obtain and use”) provides reasonable protections for
controlling access to BCSI, particularly as it relates to BCSI that might be stored in a third-party cloud environment. EEI also agrees that
having physical access to BCSI but not having the ability to use it is impractical because it does not represent access from a functional
standpoint or for a useful purpose.
Likes
0
Dislikes
0
Response: Thank you for your support.
Maryanne Darling-Reich - Black Hills Corporation - 1,3,5,6 - MRO,WECC
Answer
Yes
Document Name
Comment
Black Hills would recommend that 6.1’s “Note” section use the same language as R6 opening paragraph. Specifically “ability to obtain and
use” should be used whenever possible, in this instance the “Note” section may read like this, “Provisioned access is to be considered the
result of the specific actions resulting in an individual’s ability to obtain and use BCSI.”
Likes
Dislikes
0
0
Response: Thank you for your comment. The team removed the “note” from 6.1 and moved the language from the note to the parent
requirement R6.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
64
In the context of this requirement, an individual is considered to have been provisioned access if they concurrently have the means to
both obtain and use the BCSI. To illustrate, an individual who can obtain encrypted BCSI but does not have the encryption keys to be able
to use the BCSI has not been provisioned access to the BCSI.
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
Yes
Document Name
Comment
ITC supports the response submitted by EEI
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Bobbi Welch - Midcontinent ISO, Inc. - 2, Group Name ISO/RTO Council Standards Review Committee 2019-02 BCSI Access Management
(Draft 3)
Answer
Yes
Document Name
Comment
The IRC SRC supports the reinstatement of “obtain and use” concepts.
Likes
Dislikes
0
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
65
Response: Thank you for your support.
Larry Heckert - Alliant Energy Corporation Services, Inc. - 4
Answer
Yes
Document Name
Comment
Alliant Energy supports comments submitted by EEI.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Constantin Chitescu - Ontario Power Generation Inc. - 5
Answer
Yes
Document Name
Comment
OPG supports NPCC Regional Standards Committee’s comments.
Likes
Dislikes
0
0
Response: Please see the SDT’s response to NPCC SRC.
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
66
Answer
Yes
Document Name
Comment
None.
Likes
0
Dislikes
0
Response
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
Yes
Document Name
Comment
NVE agrees that the clarifying language contained in the two-prong test (i.e., “obtain and use”) provides reasonable protections for
controlling access to BCSI, particularly as it relates to BCSI that might be stored in a third-party cloud environment. NVE also agrees that
having physical access to BCSI but not having the ability to use it is impractical because it does not represent access from a functional
standpoint or for a useful purpose.
Likes
0
Dislikes
0
Response: Thank you for your support.
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
Yes
67
Document Name
Comment
Texas RE agrees that the two-pronged test is an improvement over the existing language. Texas RE is concerned, however, that the verbiage
“obtain and use” is subject to further interpretation. One approach could be to clarify the verbiage to read: “the authorized ability to
retrieve, modify, copy, or move BCSI”. Alternatively, Texas RE recommends creating bright line criteria establishing what it means for the
BCSI to be usable.
Likes
0
Dislikes
0
Response: Thank you for your comment. Provisioned access is to be considered the result of specific actions taken to provide an
individual the means to access BCSI (e.g., physical keys or access cards, user accounts and associated rights and privileges, encryption
keys, etc.). In the context of this requirement, an individual is considered to have been provisioned access if they concurrently have the
means to both obtain and use the BCSI. To illustrate, an individual who can obtain encrypted BCSI but does not have the encryption keys
to be able to use the BCSI has not been provisioned access to the BCSI. The SDT also invites you, and other entities, to also draft
implementation guidance that would speak to your concern.
Benjamin Winslett - Georgia System Operations Corporation - 4
Answer
Yes
Document Name
Comment
The ‘obtain and use’ language introduced provides valuable clarification with regard to provisioning and deprovisioning of access and
provides context that will enable clearly defined opportunities to leverage cloud services. However, as drafted, the standard effectively
provides different explanations for "access” versus “provisioned access.” It would increase clarity if these explanations were combined. It is
recommended that the note explaining provisioned access be moved to the main requirement so that all explanatory statements regarding
access or provisioned access are in the same place. In this manner, it is clear that the clarifications to “provisioned access” apply across all
parts of requirement R6.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
68
Consistent with our recommendation to question 1 regarding incidental access, this would modify the main requirement of R6 as follows:
…To be considered access to BCSI in the context of this requirement, an individual has both the ability to obtain and use BCSI. Provisioned
access is to be considered the result of the specific actions taken to provide an individual(s) the means to access BCSI (e.g., may include
physical keys or access cards, user accounts and associated rights and privileges, encryption keys). Provisioned access does not include
temporary or incidental access when a specific mechanism for provisioning access is not available or feasible such as when an individual is
given, merely views, or might see BCSI such as during a meeting or visiting a PSP, or when the BCSI is temporarily or incidentally located or
stored on work stations, laptops, flash drives, portable equipment, offices, vehicles etc.
Likes
1
Dislikes
Georgia Transmission Corporation, 1, Davis Greg
0
Response: Thank you for your comment. The SDT determined that the language is clear as written based on the favorable votes received
from industry and that an inclusion is not needed at this time. The SDT did remove the note from 6.1 and added the language to the
parent requirement. Plese see those edits.
Jennifer Flandermeyer - Jennifer Flandermeyer On Behalf of: Allen Klassen, Evergy, 6, 1, 3, 5; Derek Brown, Evergy, 6, 1, 3, 5; Marcus
Moor, Evergy, 6, 1, 3, 5; Thomas ROBBEN, Evergy, 6, 1, 3, 5; - Jennifer Flandermeyer
Answer
Yes
Document Name
Comment
Evergy supports and endorses the comments filed by the Edison Electric Institute.
Likes
Dislikes
0
0
Response: Please see the SDT’s response to EEI.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
69
Gail Golden - Entergy - Entergy Services, Inc. - 5
Answer
Yes
Document Name
Comment
Entergy supports the inclusion of the “obtain and use” language from the CMEP Practice Guide. This language clarifies that users with
“access” for purposes of the requirement must be able to obtain and use BCSI, which addresses industry’s concern regarding encrypted
data. In particular, the prior language could present a grey area where a user could receive an encrypted BCSI item and be considered as
having the BCSI even though they (conceivably) could not use it. This approach aligns with Entergy’s interpretation under both its current
BCSI program, as well as the guidance and position we are pursuing for BCSI in the cloud
Likes
0
Dislikes
0
Response: Thank you for your support.
Jennifer Bray - Arizona Electric Power Cooperative, Inc. - 1
Answer
Yes
Document Name
Comment
AEPC has signed on to ACES comments.
Likes
Dislikes
0
0
Response: Please see the SDT’s response to ACES.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
70
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name NPCC Regional Standards Committee
Answer
Yes
Document Name
Comment
We support the update to this Requirement language.
Likes
0
Dislikes
0
Response: Thank you for your support.
Leonard Kula - Independent Electricity System Operator - 2
Answer
Yes
Document Name
Comment
Support the update to this Requirement language.
Likes
0
Dislikes
0
Response: Thank you for your support.
Becky Webb - Exelon - 6
Answer
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
Yes
71
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Cynthia Lee - Exelon - 5
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Kinte Whitehead - Exelon - 3
Answer
Yes
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
72
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
John Galloway - ISO New England, Inc. - 2 - NPCC
Answer
Yes
Document Name
Comment
ISO New England supports this update.
Likes
0
Dislikes
0
Response: Thank you for your support.
Daniel Gacek - Exelon - 1
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
73
Dislikes
0
Response: Please see the SDT’s response to EEI.
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
Yes
Document Name
Comment
Southern agrees that for access to occur, a user must both obtain BCSI and possess the ability to use BCSI according to the CMEP dated April
26, 2019.
Likes
0
Dislikes
0
Response: Thank you for your support.
David Hathaway - WEC Energy Group, Inc. - 6
Answer
Yes
Document Name
Comment
Support comments made by EEI.
Likes
Dislikes
0
0
Response: Please see the SDT’s response to EEI.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
74
Thomas Breene - WEC Energy Group, Inc. - 3
Answer
Yes
Document Name
Comment
We support EEI comments.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Michael Johnson - Michael Johnson On Behalf of: Ed Hanson, Pacific Gas and Electric Company, 3, 1, 5; Marco Rios, Pacific Gas and Electric
Company, 3, 1, 5; Sandra Ellis, Pacific Gas and Electric Company, 3, 1, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
Yes
Document Name
Comment
PG&E agrees that the clarification is sufficient.
Likes
Dislikes
0
0
Response: Thank you for your support.
Sing Tay - OGE Energy - Oklahoma Gas and Electric Co. - 6, Group Name OKGE
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
75
Answer
Yes
Document Name
Comment
OKGE supports comments provided by EEI.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
JT Kuehne - AEP - 6
Answer
Yes
Document Name
Comment
AEP agrees with the addition of “obtain and use” language in R6 parent requirement, as this is in alignment with AEP’s BCSInfo program.
Likes
0
Dislikes
0
Response: Thank you for your support.
Kimberly Van Brimer - Southwest Power Pool, Inc. (RTO) - 2 - MRO,WECC, Group Name Southwest Power Pool Standards Review Group
(SSRG)
Answer
Yes
Document Name
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
76
Comment
The SPP Standards Review Group (SSRG) recommends the word “use” have clarity supplied around the term.
Likes
0
Dislikes
0
Response: Thank you for your comment. In the context of this requirement, an individual is considered to have been provisioned access if
they concurrently have the means to both obtain and use the BCSI. To illustrate, an individual who can obtain encrypted BCSI but does
not have the encryption keys to be able to use the BCSI has not been provisioned access to the BCSI. The SDT also invites you, and other
entities, to also draft implementation guidance that would speak to your concern.
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
Yes
Document Name
Comment
MPC appreciates the SDT’s efforts to include the concept from the CMEP Practice Guide. However, we would prefer the language be more
specific to CIP-004, rather than re-introduce the broader “access” concept that goes beyond CIP-004 by using this language instead: “An
individual is considered to have provisioned access to BCSI if they concurrently have the means to both obtain and use the BCSI (e.g., an
individual who obtains encrypted BCSI but does not have the encryption keys does not have provisioned access).” The example is helpful in
understanding what is meant by “obtain and use.”
Likes
Dislikes
0
0
Response: Thank you for your support and comment. Based on the favorable votes, the team determined that the current language is
well understood among industry and made some non-substinative changes. Please see the minor changes made by the SDT to CIP-004.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
77
Marty Hostler - Northern California Power Agency - 3,4,5,6
Answer
Yes
Document Name
Comment
NO. See WAPA Contents.
Likes
1
Dislikes
Northern California Power Agency, 6, Sismaet Dennis
0
Response: Please see the SDT’s response to WAPA.
Masuncha Bussey - Duke Energy - 1,3,5,6 - MRO,Texas RE,SERC, Group Name Duke Energy
Answer
Yes
Document Name
Comment
Duke Energy agrees the proposed changes make it clear that both parameters of the two-pronged test for “obtain and use” must be met to
constitute “access” to BCSI.
Likes
0
Dislikes
0
Response: Thank you for your support.
Roger Fradenburgh - Roger Fradenburgh On Behalf of: Nicholas Lauriat, Network and Security Technologies, 1; - Roger Fradenburgh
Answer
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
Yes
78
Document Name
Comment
Likes
0
Dislikes
0
Response
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Amy Bratkovic - PNM Resources - Public Service Company of New Mexico - 1,3
Answer
Yes
Document Name
Comment
Likes
Dislikes
0
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
79
Response
David Jendras - Ameren - Ameren Services - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Clarice Zellmer - WEC Energy Group, Inc. - 5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Yes
Document Name
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
80
Comment
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
81
Dan Bamber - ATCO Electric - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Patrick Wells - OGE Energy - Oklahoma Gas and Electric Co. - 1,3,5,6
Answer
Yes
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
82
Likes
0
Dislikes
0
Response
William Steiner - Midwest Reliability Organization - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
83
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 3,4,5 - RF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name CHPD
Answer
Yes
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
84
Likes
0
Dislikes
0
Response
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Donna Wood - Tri-State G and T Association, Inc. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
85
3. The SDT considered industry comments regarding the removal of storage locations. The SDT must enable the CIP standards for the
use of third-party solutions (e.g., cloud services) for BCSI, and retention of that language hinders meeting those FERC directives. The
absence of this former language does not preclude an entity from defining storage locations as the method used within an entity’s
access management program. CIP-004-X, Requirement R6, is at an objective level to permit more than that one approach. Do you
agree the requirement retains the flexibility for storage locations to be used as one way to meet the objective? If not, please provide
the basis for your disagreement and an alternate proposal.
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
No
Document Name
Comment
Storage locations identified for using BCSI is reference in CIP-011-X. CIP-004-X and CIP-011-X should provide consistent terminology.
Likes
0
Dislikes
0
Response: Thank you for your comment. Utilizing a designated storage location is still an acceptable method to both control access to
BCSI (CIP-004-X) and to protect and securely handle BCSI (CIP-011-X). Even though the use of the term storage location is only
referenced in the CIP-011-X Measures, the SDT did not intend that use of such was limited to CIP-011-X. Both the Webinar materials
and CIP-004-X Technical Rational both stress that storage locations are still an acceptable method to control access to BCSI.
Barry Jones - Barry Jones On Behalf of: sean erickson, Western Area Power Administration, 1, 6; - Barry Jones
Answer
No
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
86
1.
i.
We agree to retaining the flexibility for storage locations to be used as one way to meet the objective of SAR, but disagree
to using “provisioned access” (See our comments regarding “provisioned access” in Q1).
ii.
The requirement to provide lists of personnel with “provisioned access” would also require entities to identify the locations
of BCSI and by auditors whom are required to make the link between the repository of BCSI which has been provisioned for
access.
Recommendation:
Retain the current language and focus on auditable methods to protect BCSI at 3rd party off-prem (cloud) locations.
Likes
0
Dislikes
0
Response: The SDT respectfully disagrees since the concept of provisioned access is the scoping mechanism for the requirement.
Provisioned access provides the needed flexibility for a Responsible Entity to use other technologies and approaches instead of or in
addition to storage locations as a way to meet the access management requirements for BCSI, especially that which is stored in thirdparty cloud solutions or is protected at the information/file level no matter where it is located.
Dennis Sismaet - Northern California Power Agency - 6
Answer
No
Document Name
Comment
Please reference Marty Hostler's comments. Thanks.
Likes
Dislikes
0
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
87
Response: Please see the SDT’s response to Marty Hostler.
JT Kuehne - AEP - 6
Answer
No
Document Name
Comment
The currently effective Requirement Part 4.1.3 of CIP-004-6 reads, “Access to designated storage locations, whether physical or
electronic, for BES Cyber System Information.” Removing “storage locations” from R6 and its subparts, makes it difficult for the entities
to comply, as the entities need to expand their searches for access control when providing compliance evidence. Similar to “Provisioned
access” noun, simply stating “BCSI” will make it intangible where keeping “storage locations” will make the requirement and its subparts
tangible.
AEP understands the intent but it is not clear based on how it is currently worded. AEP requests SDT to provide further clarification on
the intent and to provide better definition on “provisioned access” than what was currently provided in Part 6.1 (“Note: Provisioned
access is to be considered the result of the specific actions taken to provide an individual(s) the means to access BCSI (e.g., may include
physical keys or access cards, user accounts and associated rights and privileges, encryption keys).)” AEP also recommends SDT to focus
on auditable methods to protect BCSI at 3rd party off-premise (cloud) locations.
AEP currently defines what constitutes as storage locations in CIP-011-2 R1 information protection program, but for other smaller entities
this may become further complicated to define besides managing access to BCSI storage locations.
Likes
Dislikes
0
0
Response: Thank you for your comment. The concept of provisioned access provides the needed flexibility for entities to use other
technologies and approaches instead of or in addition to storage locations as a way to meet the access management requirements for
BCSI, especially that which is stored in third-party cloud solutions or is protected at the information/file level no matter where it is
located.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
88
Provisioned access, like designated storage locations, maintains the scope to a finite and discrete object that is manageable and
auditable, rather than trying to manage access to individual pieces of information. The removal of the term “designated storage
location” does not preclude an entity from defining storage locations for the entity’s access management program for authorization,
verification, and revocation of access to BCSI.
Sean Bodkin - Dominion - Dominion Resources, Inc. - 6, Group Name Dominion
Answer
No
Document Name
Comment
To ensure a consistent understanding of the issues surrounding information storage on the cloud, Dominion Energy suggests using
language similiar to that in CIP-011 that addresses cloud storage in the proposed CIP-004.
Likes
0
Dislikes
0
Response: The SDT respectfully disagrees since the concept of provisioned access is the scoping mechanism for the requirement.
Provisioned access provides the needed flexibility for a Responsible Entity to use other technologies and approaches instead of or in
addition to storage locations as a way to meet the access management requirements for BCSI, especially that which is stored in thirdparty cloud solutions or is protected at the information/file level no matter where it is located.
Bruce Reimer - Manitoba Hydro - 1
Answer
No
Document Name
Comment
We agree to retaining the flexibility for storage locations to be used as one way to meet the objective of SAR, but disagree to using
“provisioned access” (See our comments regarding “provisioned access” in Q1). The objective of SAR and NERC CMEP BCSI guidance is to
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
89
prevent unauthorized access to BCSI rather than “provisioned access to BCSI”. Using “provisioned access to BCSI is lowing the bar for the
BCSI authorization doesn’t meet the goal of SAR for controlling unauthorized access to BCSI. Also “provisioned access” is subjective
resulting in no audit consistency since the NERC entities and auditors may have different ways to interpret it.
Likes
0
Dislikes
0
Response: Thank you for your comment. The SDT respectfully disagrees since the concept of provisioned access is the scoping
mechanism for the requirement. Provisioned access provides the needed flexibility for a Responsible Entity to use other technologies
and approaches instead of or in addition to storage locations as a way to meet the access management requirements for BCSI,
especially that which is stored in third-party cloud solutions or is protected at the information/file level no matter where it is located.
The focus of the BCSI requirements in CIP-004 is managing individuals’ access to BCSI where access can be provisioned, and the focus
of CIP-011 is protecting BCSI from unauthorized access no matter where it is located.
Jennie Wike - Jennie Wike On Behalf of: Hien Ho, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; John Merrell, Tacoma Public
Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Marc Donaldson, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Ozan Ferrin, Tacoma Public
Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Terry Gifford, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; - Jennie Wike, Group Name
Tacoma Power
Answer
No
Document Name
Comment
Tacoma Power supports the objective of the Project 2019-02 SAR, which includes providing a path to allow the use of modern third-party
data storage and analysis systems. While the use of third-party data storage may be enabled to a degree with these modifications, the
use of third-party analysis systems is likely not. Any managed security provider’s solution would likely be considered an EACMS based on
the current EACMS definition, which carries a host of CIP Requirements, not the least of which are found in CIP-004, which would
preclude the use of these services in almost every case. Additionally many modern cybersecurity tools such as local endpoint protection
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
90
systems, now make use of Cloud services to provide additional context to the information seen on local systems, and require that much
of the system log data be pushed to the Cloud to enable this analysis.
Tacoma Power suggests modification of the EACMS definition to split off access control from access monitoring, which then would allow
for requirement applicability based on risk for access control systems versus access monitoring systems.
Likes
1
Dislikes
Snohomish County PUD No. 1, 3, Chaney Holly
0
Response: Thank you for your comment. The EACMS modification is outside the scope of this project’s SAR.
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
No
Document Name
Comment
While we agree with the SDT retaining the flexibility for storage locations to be used as one way to meet the objective of SAR, we
disagree with using “provisioned access” based on our concerns in Q5.
Likes
0
Dislikes
0
Response: Thank you for your comment. The SDT respectfully disagrees since the concept of provisioned access is the scoping
mechanism for the requirement. Provisioned access provides the needed flexibility for a Responsible Entity to use other technologies
and approaches instead of or in addition to storage locations as a way to meet the access management requirements for BCSI,
especially that which is stored in third-party cloud solutions or is protected at the information/file level no matter where it is located.
Jennifer Bray - Arizona Electric Power Cooperative, Inc. - 1
Answer
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
No
91
Document Name
Comment
While we agree with the SDT retaining the flexibility for storage locations to be used as one way to meet the objective of SAR, we
disagree with using “provisioned access” based on our concerns in Q5.
AEPC has signed on to ACES comments.
Likes
0
Dislikes
0
Response: Thank you for your comment. The SDT respectfully disagrees since the concept of provisioned access is the scoping
mechanism for the requirement. Provisioned access provides the needed flexibility for a Responsible Entity to use other technologies
and approaches instead of or in addition to storage locations as a way to meet the access management requirements for BCSI,
especially that which is stored in third-party cloud solutions or is protected at the information/file level no matter where it is located.
Thomas Standifur - Austin Energy - 1,3,4,5,6
Answer
No
Document Name
TPWR_2019-02_Unofficial_Comment_Form_2021-05-10.docx20210504-17090-hsevrj.docx
Comment
In support of Tacoma Powers' comments. Attached.
Likes
Dislikes
0
0
Response: Thank you for your comment. Spliting EACMS is outside the scope of this project’s SAR.
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
92
Answer
No
Document Name
Comment
NVE agrees that the approach provides entities with the additional flexibility to develop and define their own internal procedures
regardless of whether they are using off-premise storage or simply maintaining backward compatibility with their legacy
systems. However, we also recognize that the removal of the term “storage locations” does present challenges for entities trying to
reconcile internal processes for legacy systems. For this reason, we recommend the SDT provide greater clarity through Implementation
Guidance, to assist those entities with developing effective processes resulting from these changes. Specifically, the SDT should develop
guidance that would be useful in understanding how to define storage locations as a method within registered entities’ access
management programs. Such guidance would be helpful to ensure backward compatibility.
Likes
0
Dislikes
0
Response: Thank you for your comment. The change to “provisioned access” to BCSI is backwards compatible with the previous
“designated storage locations” concept. Entities have likely designated only those storage locations to which access can be
provisioned, rather than any location where BCSI might be found. Provisioned access, like designated storage locations, maintains the
scope to a finite and discrete object that is manageable and auditable, rather than trying to manage access to individual pieces of
information. The removal of the term “designated storage location” does not preclude an entity from defining storage locations for the
entity’s access management program for authorization, verification, and revocation of access to BCSI.
Gladys DeLaO - CPS Energy - 1,3,5
Answer
No
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
93
CPS Energy suggests creating a NERC Glossary defined term for “Provisioned Access” instead of adding the Note: within CIP-004 R6 Part
6.1. Additionally, “obtain and use” should be included in the definition.
Likes
0
Dislikes
0
Response: Thank you for your comments. The SDT determined that the term “provisioned” does not need to be defined. Provision or
provisioned access is a well-known term among technical subject matter experts who provision access or deprovision access as a part
of their job. This is an industry-proven and accepted term that aligns with security best practices and industry frameworks, which is
best maintained as a non-defined term.
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
No
Document Name
Comment
ERCOT hereby incorporates the comments filed by the ISO/RTO Council Standards Review Committee.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to the ISO/RTO Council SRC.
Michael Brytowski - Great River Energy - 1,3,5,6
Answer
No
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
94
a. GRE agrees to retaining the flexibility for storage locations to be used as one way to meet the objective of SAR, but disagree to using
“provisioned access” (See our comments regarding “provisioned access” in Q1).
b. The requirement to provide lists of personnel with “provisioned access” would also require entities to identify the locations of BCSI and
by auditors whom are required to make the link between the repository of BCSI which has been provisioned for access.
Recommendation:
Retain the current language and focus on auditable methods to protect BCSI at 3rd party off-prem (cloud) locations.
Likes
0
Dislikes
0
Response: Thank you for your comment. The SDT respectfully disagrees since the concept of provisioned access is the scoping
mechanism for the requirement. Provisioned access provides the needed flexibility for a Responsible Entity to use other technologies
and approaches instead of or in addition to storage locations as a way to meet the access management requirements for BCSI,
especially that which is stored in third-party cloud solutions or is protected at the information/file level no matter where it is located.
Bobbi Welch - Midcontinent ISO, Inc. - 2, Group Name ISO/RTO Council Standards Review Committee 2019-02 BCSI Access Management
(Draft 3)
Answer
No
Document Name
Comment
The IRC SRC is concerned that keeping “storage locations” without defining it in the standard or the NERC Glossary will require entities to
define it for themselves. This will create a variety of interpretations throughout the regions.
The IRC SRC recommends the SDT consider defining the term “storage locations” to indicate that storage locations may be physical
locations or virtual locations that are protected using technologies such as access control or encryption
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
95
Likes
0
Dislikes
0
Response: Thank you for your comment. The term “storage locations” has been removed.
Roger Fradenburgh - Roger Fradenburgh On Behalf of: Nicholas Lauriat, Network and Security Technologies, 1; - Roger Fradenburgh
Answer
No
Document Name
Comment
N&ST strongly disagrees with the SDT’s assertion that retention of “designated storage locations,” is a hindrance to using third party /
cloud services, and notes that the SAR for this project states the project will provide “…a secure path towards utilization of modern thirdparty data storage and analysis systems.” The real roadblock here, for which solutions are already available, is encryption key
management (see our response to Question 9). In addition, N&ST is concerned that one or more Regional Entities may or may not agree
with the SDT’s frequently repeated promise that managing access to BSCI storage locations will be accepted as a fully compliant
equivalent to managing access to BCSI, and that Responsible Entities have the option of maintaining current practices. As a compromise,
N&ST recommends the proposed CIP-004 changes be amended to state explicitly that Responsible Entities must manage access to one or
more of: BCSI, designated electronic storage locations, and designated physical storage locations. This change would give entities the
flexibility of maintaining or dropping “storage locations” or perhaps implementing a hybrid approach.
Likes
Dislikes
0
0
Response: Thank you for your comment. Based on the favorable vote from industry, the SDT determined the language of R6
accomplishes the objective to add flexibility for industry to leverage additional secure methods to protect BCSI; “designated storage
locations,” is one way to accomplish the objective and R6 as written does not precluded entities from using that approach. . It is up to
each entity to determine how best to implement their programs to meet the requirements.
Lindsay Wickizer - Berkshire Hathaway - PacifiCorp - 6
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
96
Answer
No
Document Name
Comment
The currently effective Requirement Part 4.1.3 of CIP-004-6 reads, “Access to designated storage locations, whether physical or
electronic, for BES Cyber System Information.” The removal of, “storage locations” from R6 and its subparts, makes it difficult for the
entities to comply, as the entities need to expand their searches for access control when providing compliance evidence.
We disagree with using, “provisioned access” as it is currently defined. The requirement to provide lists of personnel with “provisioned
access” would also require entities to identify the locations of BCSI, and for auditors to make that link to the repository of BCSI, to
determine which has been provisioned for access.
Similar to “Provisioned access” noun, simply stating “BCSI” will make it intangible where keeping “storage locations” will make the
requirement and its subparts tangible. See Q1 comment.
Recommendation:
Retain the current language and focus on auditable methods to protect BCSI at third-party off-prem (cloud based) locations.
Use language similar to that in CIP-011 that addresses cloud storage for the proposed CIP-004.
Recommend creating a NERC Glossary defined term for “Provisioned Access.”
Likes
Dislikes
0
0
Response: Thank you for your comment. The concept of provisioned access provides the needed flexibility for entities to use other
technologies and approaches instead of or in addition to storage locations as a way to meet the access management requirements for
BCSI, especially that which is stored in third-party cloud solutions or is protected at the information/file level no matter where it is
located.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
97
Provisioned access, like designated storage locations, maintains the scope to a finite and discrete object that is manageable and
auditable, rather than trying to manage access to individual pieces of information. The removal of the term “designated storage
location” does not preclude an entity from defining storage locations for the entity’s access management program for authorization,
verification, and revocation of access to BCSI.The SDT determined that the term “provisioned” does not need to be defined. Provision
or provisioned access is a well-known term among technical subject matter experts who provision access or deprovision access as a
part of their job. This is an industry-proven and accepted term that aligns with security best practices and industry frameworks, which
is best maintained as a non-defined term.
Masuncha Bussey - Duke Energy - 1,3,5,6 - MRO,Texas RE,SERC, Group Name Duke Energy
Answer
Yes
Document Name
Comment
Duke Energy agrees the proposed changes retain the flexibility for storage locations to be used as one way to meet the objective.
Likes
0
Dislikes
0
Response: Thank you for your support.
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
Yes
Document Name
Comment
See comments in response to #9 below.
Likes
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
98
Dislikes
0
Response: Please see the SDT’s response to #9 below.
Marty Hostler - Northern California Power Agency - 3,4,5,6
Answer
Yes
Document Name
Comment
NO. See WAPA and Indianca Comments.
Likes
1
Dislikes
Northern California Power Agency, 6, Sismaet Dennis
0
Response: Please see the SDT’s response to WAPA.
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
Yes
Document Name
Comment
MPC agrees that this approach provided entities with the flexibility to define their own internal procedures, which may include continuing
to designate storage locations for BCSI to which individuals can have provisioned access. Provisioned access for those individuals can be
authorized, verified, and revoked.
Likes
Dislikes
0
0
Response: Thank you for your support.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
99
Sing Tay - OGE Energy - Oklahoma Gas and Electric Co. - 6, Group Name OKGE
Answer
Yes
Document Name
Comment
OKGE supports comments provided by EEI.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Michael Johnson - Michael Johnson On Behalf of: Ed Hanson, Pacific Gas and Electric Company, 3, 1, 5; Marco Rios, Pacific Gas and
Electric Company, 3, 1, 5; Sandra Ellis, Pacific Gas and Electric Company, 3, 1, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
Yes
Document Name
Comment
PG&E agrees with the modifications which make the Requirement more objective-based.
Likes
Dislikes
0
0
Response: Thank you for your support.
Thomas Breene - WEC Energy Group, Inc. - 3
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
100
Answer
Yes
Document Name
Comment
We support EEI comments.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
David Hathaway - WEC Energy Group, Inc. - 6
Answer
Yes
Document Name
Comment
Support comments made by EEI.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
Yes
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
101
Southern agrees as with EEI and industry that this approach provided entities with the needed flexibility to develop and define their own
internal procedures of what constitutes storage for current and future use.
Likes
0
Dislikes
0
Response: Thank you for your support.
Daniel Gacek - Exelon - 1
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
John Galloway - ISO New England, Inc. - 2 - NPCC
Answer
Yes
Document Name
Comment
ISO New England supports this change.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
102
Likes
0
Dislikes
0
Response: Thank you for your support.
Kinte Whitehead - Exelon - 3
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Cynthia Lee - Exelon - 5
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
Dislikes
0
0
Response: Please see the SDT’s response to EEI.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
103
Becky Webb - Exelon - 6
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Leonard Kula - Independent Electricity System Operator - 2
Answer
Yes
Document Name
Comment
If the entity continues using storage location, the entity is responsible for defining storage location. Request confirmation of this
expectation.
Likes
Dislikes
0
0
Response: Thank you for your comment.
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name NPCC Regional Standards Committee
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
104
Answer
Yes
Document Name
Comment
If the entity continues using storage location, the entity is responsible for defining storage location. Request confirmation of this
expectation.
Likes
0
Dislikes
0
Response: Thank you for your comment.
Gail Golden - Entergy - Entergy Services, Inc. - 5
Answer
Yes
Document Name
Comment
An organization should be able to define storage locations as well as decommission them, as long as appropriate controls are applied
in both processes. The revised standard allows entities to apply controls at either the data level or storage level, without requiring
either so long as data security is achieved.
Likes
Dislikes
0
0
Response: Thank you for your comment.
Jennifer Flandermeyer - Jennifer Flandermeyer On Behalf of: Allen Klassen, Evergy, 6, 1, 3, 5; Derek Brown, Evergy, 6, 1, 3, 5; Marcus
Moor, Evergy, 6, 1, 3, 5; Thomas ROBBEN, Evergy, 6, 1, 3, 5; - Jennifer Flandermeyer
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
105
Answer
Yes
Document Name
Comment
Evergy supports and endorses the comments filed by the Edison Electric Institute.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Benjamin Winslett - Georgia System Operations Corporation - 4
Answer
Yes
Document Name
Comment
Yes, this modification retains the flexibility for storage locations to be used as one way to meet the objective. However, absent clarifying
language in the requirement regarding temporary and incidental access, the standard may inadvertently significantly expand the scope
over the currently approved standard. This language is included in the Technical Rationale, but is not included in any enforceable
language. It is recommended that additional clarification be added as outlined in the response to questions 1 and 2.
Likes
1
Dislikes
Georgia Transmission Corporation, 1, Davis Greg
0
Response: Thank you for your comment. Please see the SDT’s response to questions 1 and 2.
Constantin Chitescu - Ontario Power Generation Inc. - 5
Answer
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
Yes
106
Document Name
Comment
OPG supports NPCC Regional Standards Committee’s comments.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to NPCC RSC.
Larry Heckert - Alliant Energy Corporation Services, Inc. - 4
Answer
Yes
Document Name
Comment
Alliant Energy supports comments submitted by EEI.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
Yes
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
107
ITC supports the response submitted by EEI
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
Yes
Document Name
Comment
EEI agrees that the approach provides entities with the needed flexibility to develop and define their own internal procedures regardless
of whether they are using off-premise storage or simply maintaining backward compatibility with their legacy systems. However, we also
recognize that the removal of the term “storage locations” does present challenges for entities trying to reconcile internal processes for
legacy systems. For this reason, we recommend the SDT provide greater clarity through Implementation Guidance, to assist those
entities with developing effective processes resulting from these changes. Specifically, the SDT should develop guidance that would be
useful in understanding how to define storage locations as a method within registered entities’ access management programs. Such
guidance would be helpful to ensure backward compatibility.
Likes
Dislikes
0
0
Response: Thank you for your comment. The change to “provisioned access” to BCSI is backwards compatible with the previous
“designated storage locations” concept. Entities have likely designated only those storage locations to which access can be
provisioned, rather than any location where BCSI might be found. Provisioned access, like designated storage locations, maintains the
scope to a finite and discrete object that is manageable and auditable, rather than trying to manage access to individual pieces of
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
108
information. The removal of the term “designated storage location” does not preclude an entity from defining storage locations for the
entity’s access management program for authorization, verification, and revocation of access to BCSI.
Donna Wood - Tri-State G and T Association, Inc. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name CHPD
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 3,4,5 - RF
Answer
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
Yes
109
Document Name
Comment
Likes
0
Dislikes
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kimberly Van Brimer - Southwest Power Pool, Inc. (RTO) - 2 - MRO,WECC, Group Name Southwest Power Pool Standards Review Group
(SSRG)
Answer
Yes
Document Name
Comment
Likes
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
110
Dislikes
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
William Steiner - Midwest Reliability Organization - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Patrick Wells - OGE Energy - Oklahoma Gas and Electric Co. - 1,3,5,6
Answer
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
Yes
111
Document Name
Comment
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Dan Bamber - ATCO Electric - 1
Answer
Yes
Document Name
Comment
Likes
Dislikes
0
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
112
Response
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Yes
Document Name
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
113
Comment
Likes
0
Dislikes
0
Response
Clarice Zellmer - WEC Energy Group, Inc. - 5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
David Jendras - Ameren - Ameren Services - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
114
Amy Bratkovic - PNM Resources - Public Service Company of New Mexico - 1,3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Joshua Andersen - Salt River Project - 1,3,5,6 - WECC
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Steven Rueckert - Western Electricity Coordinating Council - 10, Group Name WECC CIP
Answer
Yes
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
115
Likes
0
Dislikes
0
Response
Eli Rivera - CenterPoint Energy Houston Electric, LLC - NA - Not Applicable - Texas RE
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
116
Maryanne Darling-Reich - Black Hills Corporation - 1,3,5,6 - MRO,WECC
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
117
4. To address industry comments while also enabling entities to use third-party solutions (e.g., cloud services) for BCSI, in CIP-004-X,
Requirement R6 Part 6.1, the SDT made a distinction between “electronic access to electronic BCSI” versus “physical access to physical
BCSI”. This clarifies physical access alone to hardware containing electronic BCSI, which is protected with methods that do not permit
an individual to concurrently obtain and use the electronic BCSI, is not provisioned access to electronic BCSI. Do you agree with the
proposed change? If not, please provide the basis for your disagreement and an alternate proposal.
Maryanne Darling-Reich - Black Hills Corporation - 1,3,5,6 - MRO,WECC
Answer
No
Document Name
Comment
Black Hills does not find the distinction necessary. If consistent use of the language “obtain and use” then it should be evident that
physical access to a computer, device, etc. does not constitute access to BCSI. The same logic that applies to a locked filing cabinet should
apply to cyber access as well.
Likes
0
Dislikes
0
Response: Thank you for your comment.
Bobbi Welch - Midcontinent ISO, Inc. - 2, Group Name ISO/RTO Council Standards Review Committee 2019-02 BCSI Access Management
(Draft 3)
Answer
No
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
118
The IRC SRC observes that this approach appears to compensate for the removal of the concept of BCSI repositories. We suggest changing
“physical access to physical BCSI” to “physical access to physical BCSI storage locations” as “physical BCSI” limits the definition to the
information itself (e.g. the drawings) and would not extend to include the protection of the storage location or repository as well (e.g. the
drawer where the drawings are stored).
Likes
0
Dislikes
0
Response: Thank you for your comment. Provisioned physical access to physical BCSI may very well be to a storage location.
Michael Brytowski - Great River Energy - 1,3,5,6
Answer
No
Document Name
Comment
GRE disagrees that the physical access only applies to physical BCSI since controlling access to unencrypted BCSI has not been addressed
but will be required for 3rd party off-prem (cloud) repositories. The physical access to Cyber Assets is a fast avenue to owning the
unencrypted electronic BCSI it contains, which meets “obtain and use” condition and constitutes an access to BCSI.
Recommendation:
Adding “Physical access to unencrypted electronic BCSI” to R6 Part 6.1.3 (See our suggested R6 Part 6.1 changes in Q1).
Likes
Dislikes
0
0
Response: Thank you for your comment. Although provisioned physical access to a physical location or storage device that contains
electronic BCSI is not considered provisioned access to the electronic BCSI, entities should implement appropriate information
protection controls to help prevent unauthorized access to BCSI per its information protection program, as required in CIP-011. If
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
119
there are specific mechanisms available or feasible for provisioning electronic access to the unencrypted electronic BCSI, then this
would be part of the R6 access management program.
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
No
Document Name
Comment
ERCOT hereby incorporates the comments filed by the ISO/RTO Council Standards Review Committee.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to the ISO/RTO Council SRC.
Gladys DeLaO - CPS Energy - 1,3,5
Answer
No
Document Name
Comment
CPS Energy disagrees with the proposed changes, including a statement for both physical and electronic access only leads to further
questions. CPS Energy propose defining what is considered Physical BCSI and Electronic BCSI as those terms are not defined by NERC –
although should be understood Physical BSCI could be BSCI on printed medium, white board scribbles, photograph and electronic BCSI
would be word docs, pdf, text file, digital photos – each person could define or scope the words physical and electronic in different ways.
Likes
Dislikes
0
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
120
Response: Thank you for your comment. The significance of this is not so much about the format of the BCSI, but what access must be
managed. As the currently enforceable requirement is written, it is unclear if an entity is required to manage physical access to
electronic BCSI, an issue that is compounded when storing BCSI with a cloud service provider. The CMEP Practice Guide makes it clear
that the intent is to manage electronic access to electronic BCSI, and physical access to physical BCSI, so the SDT spelled that out here.
The CIP-004 R6 requirements are applicable when specific mechanisms are available or feasible for provisioning access to BCSI. Please
see the Technical Rationale for further explanation.
Benjamin Winslett - Georgia System Operations Corporation - 4
Answer
No
Document Name
Comment
It is recommended that the SDT directly clarify the understanding that access to data or a tangible item that contains information does
not equate to access to that information. The addition of such a clarification in the standard would simplify the understanding of the
applicability of controls to the protection of BCSI.
Likes
1
Dislikes
Georgia Transmission Corporation, 1, Davis Greg
0
Response: Thank you for your comment. The focus of the BCSI requirements in CIP-004 is managing individuals’ access to BCSI where
access can be provisioned, and the focus of CIP-011 is protecting the BCSI itself from unauthorized access no matter where the BCSI is
located.
Jennifer Bray - Arizona Electric Power Cooperative, Inc. - 1
Answer
No
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
121
See our comments around “provisioned access” in Q5
AEPC has signed on to ACES comments.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to Q5 and to ACES.
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
No
Document Name
Comment
See our comments around “provisioned access” in Q5
Likes
0
Dislikes
0
Response: Please see the SDT’s response to Q5.
Amy Bratkovic - PNM Resources - Public Service Company of New Mexico - 1,3
Answer
No
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
122
In the measures for R6.1, suggested evidence includes “the justification of business need for the provisioned access.” However, similar
requirement 4.1 states “authorize based on need” but does not call out the justification of business need in the measures. 6.1 and 4.1
should be consistent in measures.
Likes
0
Dislikes
0
Response: Thank you for your comment. Evidence should show compliance with all aspects of the requirements, hence the measure
for justification of business need. The SDT felt it was out of scope to make changes to 4.1 that were not related to BCSI, but encourage
entities to include justification of business need for that part as well.
Bruce Reimer - Manitoba Hydro - 1
Answer
No
Document Name
Comment
We disagree that the physical access only applies to physical BCSI since the controlling access to unencrypted BCSI has not been
addressed. The physical access to Cyber Assets is a fast avenue to owning the unencrypted electronic BCSI it contains, which meets
“obtain and use” condition and constitutes an access to BCSI. We suggest adding “Physical access to unencrypted electronic BCSI” to R6
Part 6.1.3 (See our suggested R6 Part 6.1 changes in Q1).
Likes
Dislikes
0
0
Response: Thank you for your comment. Although provisioned physical access to a physical location or storage device that contains
electronic BCSI is not considered provisioned access to the electronic BCSI, entities should implement appropriate information
protection controls to help prevent unauthorized access to BCSI per its information protection program, as required in CIP-011. If
there are specific mechanisms available or feasible for provisioning electronic access to the unencrypted electronic BCSI, then this
would be part of the R6 access management program.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
123
The CIP-004 R6 requirements are applicable when specific mechanisms are available or feasible for provisioning access to BCSI. Please
see the Technical Rationale for further explanation.
Sean Bodkin - Dominion - Dominion Resources, Inc. - 6, Group Name Dominion
Answer
No
Document Name
Comment
Dominion Energy is concerned the the SDT is attempting to define the term "provisioned access" in a footnote. Leaving a term open to
interpretation across Standards is concerning and if a term is being used inconsistently it should be defined in the Glossary of Terms
rather than through a footnte for a Standard.
Likes
0
Dislikes
0
Response: Thank you for your comment. The team removed the “note” from 6.1 and moved the language from the note to the parent
requirement R6. In addition, the SDT determined that the term “provisioned” does not need to be defined. Provision or provisioned
access is a well-known term among technical subject matter experts who provision access or deprovision access as a part of their job.
This is an industry-proven and accepted term that aligns with security best practices and industry frameworks, which is best
maintained as a non-defined term.
JT Kuehne - AEP - 6
Answer
No
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
124
“Physical BCSI” is not a defined term. AEP recommends SDT to either define “physical BCSI” or add further clarifications in Requirement
6. AEP recommends using the existing language, “Access to designated storage locations, whether physical or electronic, for BES Cyber
System Information” under 6.1.
Likes
0
Dislikes
0
Response: Thank you for your commnet. The significance of this is not so much about the format of the BCSI, but what access must be
managed. As the currently enforceable requirement is written, it is unclear if an entity is required to manage physical access to
electronic BCSI, an issue that is compounded when storing BCSI with a cloud service provider. The CMEP Practice Guide makes it clear
that the intent is to manage electronic access to electronic BCSI, and physical access to physical BCSI, so the SDT spelled that out here.
The CIP-004 R6 requirements are applicable when specific mechanisms are available or feasible for provisioning access to BCSI. Please
see the Technical Rationale for further explanation.
Dennis Sismaet - Northern California Power Agency - 6
Answer
No
Document Name
Comment
Please reference Marty Hostler's comments. Thanks.
Likes
Dislikes
0
0
Response: Please see the SDT”s response to Marty Hostler.
Barry Jones - Barry Jones On Behalf of: sean erickson, Western Area Power Administration, 1, 6; - Barry Jones
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
125
Answer
No
Document Name
Comment
We disagree that the physical access only applies to physical BCSI since controlling access to unencrypted BCSI has not been addressed
but will be required for 3rd party off-prem (cloud) repositories. The physical access to Cyber Assets is a fast avenue to owning the
unencrypted electronic BCSI it contains, which meets “obtain and use” condition and constitutes an access to BCSI.
Recommendation:
Adding “Physical access to unencrypted electronic BCSI” to R6 Part 6.1.3 (See our suggested R6 Part 6.1 changes in Q1).
Likes
0
Dislikes
0
Response: Thank you for your comment. Although provisioned physical access to a physical location or storage device that contains
electronic BCSI is not considered provisioned access to the electronic BCSI, entities should implement appropriate information
protection controls to help prevent unauthorized access to BCSI per its information protection program, as required in CIP-011. If
there are specific mechanisms available or feasible for provisioning electronic access to the unencrypted electronic BCSI, then this
would be part of the R6 access management program.
Marty Hostler - Northern California Power Agency - 3,4,5,6
Answer
No
Document Name
Comment
NO. Cloud services should be allowed. However, there is no need to make a distinction between electronic access and physical access.
Likes
1
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
Northern California Power Agency, 6, Sismaet Dennis
126
Dislikes
0
Response: Thank you for your comment. As the currently enforceable requirement is written, it is unclear if an entity is required to
manage physical access to electronic BCSI, an issue that is compounded when storing BCSI with a cloud service provider. The CMEP
Practice Guide makes it clear that the intent is to manage electronic access to electronic BCSI, and physical access to physical BCSI, so
the SDT spelled that out here.
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
No
Document Name
Comment
Further clarification should be made to CIP-004-X Part 4.1.2 and Part 6.1.2 to address the difference between physical access to a Physical
Security Perimeter that may house BCSI versus physical access to a physical piece of hardware that houses BCSI. Where does the physical
piece of hardware that houses BCSI need to be stored?
Likes
0
Dislikes
0
Response: Thank you for your comment. The CIP-004 R6 requirements are applicable when specific mechanisms are available or
feasible for provisioning access to BCSI. Please see the Technical Rationale for further explanation.
Masuncha Bussey - Duke Energy - 1,3,5,6 - MRO,Texas RE,SERC, Group Name Duke Energy
Answer
No
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
127
Duke Energy agrees the proposed changes enabling entities to use third-party solutions (e.g., cloud services) for BCSI, in CIP-004-X,
Requirement R6 Part 6.1, the SDT made a distinction between “electronic access to electronic BCSI” versus “physical access to physical
BCSI”.
Duke Energy does not agree with, and recommends removing, “and the justification of business need for the provisioned access” as a
measure in CIP-004 R6.1. Managers must be able to authorize access to a large number of employees where they would likely cut and
paste a blanket justification for each person or group. All that should be required is documented authorization and removal along with
the record of authorized individuals. The act of authorization should be considered sufficient that a business need for access exists. There
is no risk reduction in documenting this justification, but there is significant overhead in adding such functionality to existing
authorization tools.
Likes
0
Dislikes
0
Response: Thank you for your comment. Evidence should show compliance with all aspects of the requirements, hence the measure
for justification of business need.
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
Yes
Document Name
Comment
EEI supports the distinctions made between “electronic access to electronic BCSI” and “physical access to physical BCSI”.
Likes
Dislikes
0
0
Response: Thank you for your support.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
128
Lindsay Wickizer - Berkshire Hathaway - PacifiCorp - 6
Answer
Yes
Document Name
Comment
“Physical BCSI” is not a defined term.
Likes
0
Dislikes
0
Response: Thank you for your comment. The significance of this is not so much about the format of the BCSI, but what access must be
managed. As the currently enforceable requirement is written, it is unclear if an entity is required to manage physical access to
electronic BCSI, an issue that is compounded when storing BCSI with a cloud service provider. The CMEP Practice Guide makes it clear
that the intent is to manage electronic access to electronic BCSI, and physical access to physical BCSI, so the SDT spelled that out here.
The CIP-004 R6 requirements are applicable when specific mechanisms are available or feasible for provisioning access to BCSI. Please
see the Technical Rationale for further explanation.
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
Yes
Document Name
Comment
ITC supports the response submitted by EEI
Likes
Dislikes
0
0
Response: Please see the SDT’s response to EEI.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
129
Larry Heckert - Alliant Energy Corporation Services, Inc. - 4
Answer
Yes
Document Name
Comment
Alliant Energy supports comments submitted by EEI.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Constantin Chitescu - Ontario Power Generation Inc. - 5
Answer
Yes
Document Name
Comment
OPG supports NPCC Regional Standards Committee’s comments, and has the following additional comments:
For 6.2 and 6.3, OPG suggest to specify that the requirement is applicable to both physical and electronic provisioned access to BCSI
similar to 6.1.
Likes
Dislikes
0
0
Response: Thank you for your comment. 6.2 and 6.3 are about provisioned access to BCSI. Based on the favorable ballot results, the
SDT does not plan to make any substantive changes.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
130
Jennifer Flandermeyer - Jennifer Flandermeyer On Behalf of: Allen Klassen, Evergy, 6, 1, 3, 5; Derek Brown, Evergy, 6, 1, 3, 5; Marcus
Moor, Evergy, 6, 1, 3, 5; Thomas ROBBEN, Evergy, 6, 1, 3, 5; - Jennifer Flandermeyer
Answer
Yes
Document Name
Comment
Evergy supports and endorses the comments filed by the Edison Electric Institute.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Gail Golden - Entergy - Entergy Services, Inc. - 5
Answer
Yes
Document Name
Comment
Entergy does not oppose distinguishing electronic BCSI from physical BCSI; however, the change raises the question of how entities are
to comply with 6.1.2. If someone prints out the ESP drawings on paper, must they then provide evidence of who has access to their
office and how it was provisioned? Are we just going to expect that no hard copies of BCSI are created, or if so, they are only stored in a
secure physical location with access controls?
Specifying both electronic and/or physical access to BCSI will also mirror treatment of classified information – i.e. different protection
strategies apply depending on the medium. It might be cleaner to just differentiate between electronic access and physical access. If
you have physical access to a Cyber Asset, you still need to somehow get access to the electronic information stored on the physical
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
131
asset - electronic info protection strategies apply. If the physical asset is paper (or maybe removable media) then you may rely more
heavily on physical protection strategies.
Likes
0
Dislikes
0
Response: Thank you for your comment. The significance of this is not so much about the format of the BCSI, but what access must be
managed. As the currently enforceable requirement is written, it is unclear if an entity is required to manage physical access to
electronic BCSI, an issue that is compounded when storing BCSI with a cloud service provider. The CMEP Practice Guide makes it clear
that the intent is to manage electronic access to electronic BCSI, and physical access to physical BCSI, so the SDT spelled that out here.
The focus of the BCSI requirements in CIP-004 is managing individuals’ access to BCSI where access can be provisioned, whereas
The focus of CIP-011 is protecting the BCSI itself from unauthorized access no matter where the BCSI is located. The CIP-004 R6
requirements are applicable when specific mechanisms are available or feasible for provisioning access to BCSI. Please see the
Technical Rationale for further explanation.
Thomas Standifur - Austin Energy - 1,3,4,5,6
Answer
Yes
Document Name
TPWR_2019-02_Unofficial_Comment_Form_2021-05-10.docx20210504-17090-hsevrj.docx
Comment
In support of Tacoma Powers' comments. Attached.
Providing the definition of “provisioned access” within the Standard via the Note: within CIP-004 R6 Part 6.1 does not provide sufficient
clarity to Industry. Tacoma Power suggests that it would be beneficial to create a NERC Glossary defined term for “Provisioned Access.”
Likes
Dislikes
0
0
Response: Thank youy for your comment. The SDT determined that the term “provisioned” does not need to be defined. Provision or
provisioned access is a well-known term among technical subject matter experts who provision access or deprovision access as a part
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
132
of their job. This is an industry-proven and accepted term that aligns with security best practices and industry frameworks, which is
best maintained as a non-defined term.
Leonard Kula - Independent Electricity System Operator - 2
Answer
Yes
Document Name
Comment
N/A.
Likes
0
Dislikes
0
Response
Becky Webb - Exelon - 6
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
Dislikes
0
0
Response: Please see the SDT’s response to EEI.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
133
Cynthia Lee - Exelon - 5
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Kinte Whitehead - Exelon - 3
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
John Galloway - ISO New England, Inc. - 2 - NPCC
Answer
Yes
Document Name
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
134
Comment
ISO New England supports this change.
Likes
0
Dislikes
0
Response: Thank you for your support.
Daniel Gacek - Exelon - 1
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
Yes
Document Name
Comment
Southern supports the distinction between “electronic access to electronic BCSI” and “physical access to physical BCSI.”
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
135
Likes
0
Dislikes
0
Response: Thank you for your support.
David Hathaway - WEC Energy Group, Inc. - 6
Answer
Yes
Document Name
Comment
Support comments made by EEI.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Thomas Breene - WEC Energy Group, Inc. - 3
Answer
Yes
Document Name
Comment
We support EEI comments.
Likes
Dislikes
0
0
Response: Please see the SDT’s response to EEI.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
136
Michael Johnson - Michael Johnson On Behalf of: Ed Hanson, Pacific Gas and Electric Company, 3, 1, 5; Marco Rios, Pacific Gas and
Electric Company, 3, 1, 5; Sandra Ellis, Pacific Gas and Electric Company, 3, 1, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
Yes
Document Name
Comment
PG&E agrees with the modifications and clarifications.
Likes
0
Dislikes
0
Response: Thank you for your support.
Dan Bamber - ATCO Electric - 1
Answer
Yes
Document Name
Comment
By this change, can it be clarified that an entity’s IT service provider server rooms (where electronic BCSI is hosted) does not fall under
physical BCSI.
Likes
Dislikes
0
0
Response: Thank you for your comment. Although provisioned physical access to a physical location or storage device that contains
electronic BCSI is not considered provisioned access to the electronic BCSI, entities should implement appropriate information
protection controls to help prevent unauthorized access to BCSI per its information protection program, as required in CIP-011. If
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
137
there are specific mechanisms available or feasible for provisioning electronic access to the unencrypted electronic BCSI, then this
would be part of the R6 access management program.
Sing Tay - OGE Energy - Oklahoma Gas and Electric Co. - 6, Group Name OKGE
Answer
Yes
Document Name
Comment
OKGE supports comments provided by EEI.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
Yes
Document Name
Comment
MPC appreciates this distinction to enable the use of cloud service providers for entities that wish to use them and eliminate the
interpretation that every possible encounter with BCSI cannot be access controlled in the way required by CIP-004, but would still be
protected in another way under the entity’s Information Protection Plan per CIP-011.
Likes
Dislikes
0
0
Response: Thank you for your support.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
138
Roger Fradenburgh - Roger Fradenburgh On Behalf of: Nicholas Lauriat, Network and Security Technologies, 1; - Roger Fradenburgh
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Yes
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
139
Likes
0
Dislikes
0
Response
Eli Rivera - CenterPoint Energy Houston Electric, LLC - NA - Not Applicable - Texas RE
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Steven Rueckert - Western Electricity Coordinating Council - 10, Group Name WECC CIP
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
140
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name NPCC Regional Standards Committee
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Joshua Andersen - Salt River Project - 1,3,5,6 - WECC
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jennie Wike - Jennie Wike On Behalf of: Hien Ho, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; John Merrell, Tacoma Public
Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Marc Donaldson, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Ozan Ferrin, Tacoma Public
Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Terry Gifford, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; - Jennie Wike, Group Name
Tacoma Power
Answer
Yes
Document Name
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
141
Comment
Likes
1
Dislikes
Snohomish County PUD No. 1, 3, Chaney Holly
0
Response
David Jendras - Ameren - Ameren Services - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Clarice Zellmer - WEC Energy Group, Inc. - 5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
142
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
Yes
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
143
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Patrick Wells - OGE Energy - Oklahoma Gas and Electric Co. - 1,3,5,6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
144
William Steiner - Midwest Reliability Organization - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kimberly Van Brimer - Southwest Power Pool, Inc. (RTO) - 2 - MRO,WECC, Group Name Southwest Power Pool Standards Review Group
(SSRG)
Answer
Yes
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
145
Likes
0
Dislikes
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 3,4,5 - RF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
146
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name CHPD
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Donna Wood - Tri-State G and T Association, Inc. - 1
Answer
Yes
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
147
Likes
0
Dislikes
0
Response
5. The SDT considered industry comments about defining the word “access”. “Access” is broadly used across both the CIP and
Operations & Planning Standards (e.g., open access) and carries different meanings in different contexts. Therefore, the SDT chose not
to define “access” in the NERC Glossary of Terms. Instead, the SDT used the adjective “provisioned” to add context, thereby scoping
CIP-004-X, Requirement R6. Do you agree the adjective “provisioned” in conjunction with the “Note” clarifies what “provisioned
access” is? If not, please provide the basis for your disagreement and an alternate proposal.
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
No
Document Name
Comment
CIP-004-X R2, R3, and R4 discusses authorized access. A user is to be authorized prior to being provisioned. If the CIP-004-X R6
requirements focus on provisioned users there is a gap of users who may be authorized and not yet provisioned. The SDT should chose to
define authorized access in place of or in conjunction with provisioned access.
Likes
Dislikes
0
0
Response: Thank you for your comment. It is true that an individual is to be authorized prior to being provisioned access. This is the
intent of R4 as well as R6. R2 (training) and R3 (personnel risk assessment) are prerequisites for authorization and provisioning of
electronic access to applicable cyber systems and unescorted physical access into a PSP, but not for BCSI. It is also true that some
individuals may be authorized for provisioned access to BCSI, but do not have provisioned access to BCSI at any given time. This is up
to the entity to decide how best to implement.The SDT determined that the term “provisioned” does not need to be defined. Provision
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
148
or provisioned access is a well-known term among technical subject matter experts who provision access or deprovision access as a
part of their job. This is an industry-proven and accepted term that aligns with security best practices and industry frameworks, which
is best maintained as a non-defined term.
Marty Hostler - Northern California Power Agency - 3,4,5,6
Answer
No
Document Name
Comment
NO. NERC Terms need a definition which is to be used for both CIP and O&P standards. Else Registered Entities will be subject to Regional
Entity auditor interpretations not vetted by industry.
Likes
1
Dislikes
Northern California Power Agency, 6, Sismaet Dennis
0
Response: Thank you for your comment. The SDT determined that the term “provisioned” does not need to be defined. Provision or
provisioned access is a well-known term among technical subject matter experts who provision access or deprovision access as a part
of their job. This is an industry-proven and accepted term that aligns with security best practices and industry frameworks, which is
best maintained as a non-defined term.
Barry Jones - Barry Jones On Behalf of: sean erickson, Western Area Power Administration, 1, 6; - Barry Jones
Answer
No
Document Name
Comment
1.
Based on WAPA’s disagreement of the term“provisioned access” and given that the SDT has defined “access to BCSI” in R6, the
term “provisioned access” should be removed due to the creation of an unintended security loophole (See our comments in Q1).
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
149
2.
Access, which occurs in CIP standards language, whether it is electronic and/or logical access, physical access, unescorted physical
access, remote access, or interactive remote access is clearly understood, has been widely adopted by industry and regulators,
and has been subject to hundreds of audits across all regions for the past 14 years. Entities have developed internal
documentation, configured systems, implemented controls tasks and standardized programs on these terms. The adjective
“provisioned” adds further terms, requires changes and is of little value regarding the actions required of entities and the output
deliverables or evidence.
Recommendation:
3.
Revise the language to focus on access to BCSI and the auditable methods to protect BCSI at 3rd party off-prem (cloud) locations.
Likes
Dislikes
0
0
Response: Thank you for your comments. The SDT determined that the term “provisioned” does not need to be defined. Provision or
provisioned access is a well-known term among technical subject matter experts who provision access or deprovision access as a part
of their job. This is an industry-proven and accepted term that aligns with security best practices and industry frameworks, which is
best maintained as a non-defined term.
Regarding the security loophole, the SDT respectfully disagrees since the concept of provisioned access is the scoping mechanism for
the requirement, not a loophole. Provisioned access provides the needed flexibility for a Responsible Entity to use other technologies
and approaches instead of or in addition to storage locations as a way to meet the access management requirements for BCSI,
especially that which is stored in third-party cloud solutions or is protected at the information/file level no matter where it is located.
While Part 6.1 only requires authorization for provisioned access to BCSI, entities may also choose to have a process to authorize
individuals (that is, grant them permission or make them eligible) to receive, see, or use BCSI that is disclosed to them, much like a
security clearance. This can be helpful from an information protection standpoint where individuals can be instructed to only share
BCSI with others who are authorized to see it, and entities could implement this as part of their CIP-011 Information Protection
Program.
Dennis Sismaet - Northern California Power Agency - 6
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
150
Answer
No
Document Name
Comment
Please reference Marty Hostler's comments. Thanks.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to Marty Hostler.
JT Kuehne - AEP - 6
Answer
No
Document Name
Comment
The currently effective Requirement Part 4.1.3 of CIP-004-6 reads, “Access to designated storage locations, whether physical or
electronic, for BES Cyber System Information.” AEP suggests to use similar language from Part 4.1.3 as suggested in our response to
Question #4 above. AEP recommends 6.1 use similar language to 4.1, i.e., “Process to authorize based on need, as determined by the
Responsible Entity, except for CIP Exceptional Circumstances: Access to designated storage locations, whether physical or electronic, for
BES Cyber System Information”
Likes
Dislikes
0
0
Response: Thank you for your comment. Please see the SDT”s response to Q3 comments.
Sean Bodkin - Dominion - Dominion Resources, Inc. - 6, Group Name Dominion
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
151
Answer
No
Document Name
Comment
Dominion Energy is concerned the the SDT is attempting to define the term "provisioned access" in a footnote. Leaving a term open to
interpretation across Standards is concerning and if a term is being used inconsistently it should be defined in the Glossary of Terms
rather than through a footnte for a Standard.
Likes
0
Dislikes
0
Response: Thank you for your comment. The team removed the “note” from 6.1 and moved the language to the parent requirement
R6. Based on the comments received and ballot results, the SDT determined the language is sufficient as written.
The SDT determined that the term “provisioned” does not need to be defined. Provision or provisioned access is a well-known term
among technical subject matter experts who provision access or deprovision access as a part of their job. This is an industry-proven
and accepted term that aligns with security best practices and industry frameworks, which is best maintained as a non-defined term.
Bruce Reimer - Manitoba Hydro - 1
Answer
No
Document Name
Comment
Given that SDT has defined the “access to BCSI” in R6, the provisioned access needs to be removed since it has a unintended security
loophole (See our comments in Q1).
Likes
Dislikes
0
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
152
Response: Thank you for your comment. Please see responses to comments in Q1.
Jennie Wike - Jennie Wike On Behalf of: Hien Ho, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; John Merrell, Tacoma Public
Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Marc Donaldson, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Ozan Ferrin, Tacoma Public
Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Terry Gifford, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; - Jennie Wike, Group Name
Tacoma Power
Answer
No
Document Name
Comment
Providing the definition of “provisioned access” within the Standard via the Note: within CIP-004 R6 Part 6.1 does not provide sufficient
clarity to Industry. Tacoma Power suggests that it would be beneficial to create a NERC Glossary defined term for “Provisioned Access.”
Likes
1
Dislikes
Snohomish County PUD No. 1, 3, Chaney Holly
0
Response: Thank you for your comment. The team removed the “note” from 6.1 and moved the language to the parent requirement
R6. Based on the comments received and ballot results, the SDT determined the language is sufficient as written.
The SDT determined that the term “provisioned” does not need to be defined. Provision or provisioned access is a well-known term
among technical subject matter experts who provision access or deprovision access as a part of their job. This is an industry-proven
and accepted term that aligns with security best practices and industry frameworks, which is best maintained as a non-defined term.
Joshua Andersen - Salt River Project - 1,3,5,6 - WECC
Answer
No
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
153
If “provisioned” is needed, then what is non-provisioned access? SRP does don’t think “provisioned” is necessary, but adding it does not
cause much concern. Access might need to be a defined term rather than using notes even if broken down between O&P and CIP.
Likes
0
Dislikes
0
Response: Thank you for your comment. Although some may consider instances when an individual is merely given, views, or might
see BCSI as “access to BCSI”, that is NOT “provisioned access to BCSI”. An example of this is when an individual is handed a piece of
paper during a meeting or sees a whiteboard in a conference room. This “access” should be considered in the entity’s Information
Protection Plan for CIP-011.
The SDT determined that the term “provisioned” does not need to be defined. Provision or provisioned access is a well-known term
among technical subject matter experts who provision access or deprovision access as a part of their job. This is an industry-proven
and accepted term that aligns with security best practices and industry frameworks, which is best maintained as a non-defined term.
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
No
Document Name
Comment
While we agree with the SDT usage of “provisioned” and the use of the “Note” to help clarify access, the “Note” does not reduce the
audit risk to an Entity. The “Note” is purely there for explanation and is not a NERC accepted definition nor does it have to be accepted
by an auditor. The fact this has to be explained or even noted shows the ongoing existing problem with the way “access” is used in the
CIP standards.
If a “Note” for “provisioned access” is needed to help scope “access”, then EVERY requirement with “access” in the CIP standards should
have a “Note”. Defining “access” is not part of this SAR thus any modifications to “access” is out of the scope of the SAR and not a part of
this change.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
154
Further the fact that the “Note” uses “is to be considered” is not binding to the requirement. It either is considered or not
considered. The way the “Note” is written, access could or could not be “considered the result of the specific actions taken to provide an
individual(s) the means to access BCSI”. If there was a way to make the “Note” binding, to be acceptable, the “Note” should be specific:
“Provisioned access is the result of the specific actions taken to provide an individual(s) the means to access BCSI”. Due to the first
sentence of the question, it is not possible to define “access” alone, thus definitions for various types of access could be defined such as
BCSI Access in this case.
Likes
0
Dislikes
0
Response: Thank you for your comment. The team removed the “note” from 6.1 and moved the language to the parent requirement
R6. Based on the comments received and ballot results, the SDT determined the language is sufficient as written.
Jennifer Bray - Arizona Electric Power Cooperative, Inc. - 1
Answer
No
Document Name
Comment
While we agree with the SDT usage of “provisioned” and the use of the “Note” to help clarify access, the “Note” does not reduce the
audit risk to an Entity. The “Note” is purely there for explanation and is not a NERC accepted definition nor does it have to be accepted
by an auditor. The fact this has to be explained or even noted shows the ongoing existing problem with the way “access” is used in the
CIP standards.
If a “Note” for “provisioned access” is needed to help scope “access”, then EVERY requirement with “access” in the CIP standards should
have a “Note”. Defining “access” is not part of this SAR thus any modifications to “access” is out of the scope of the SAR and not a part of
this change.
Further the fact that the “Note” uses “is to be considered” is not binding to the requirement. It either is considered or not
considered. The way the “Note” is written, access could or could not be “considered the result of the specific actions taken to provide an
individual(s) the means to access BCSI”. If there was a way to make the “Note” binding, to be acceptable, the “Note” should be specific:
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
155
“Provisioned access is the result of the specific actions taken to provide an individual(s) the means to access BCSI”. Due to the first
sentence of the question, it is not possible to define “access” alone, thus definitions for various types of access could be defined such as
BCSI Access in this case.
AEPC has signed on to ACES comments.
Likes
0
Dislikes
0
Response: Thank you for your comment. The team removed the “note” from 6.1 and moved the language to the parent requirement
R6. Based on the comments received and ballot results, the SDT determined the language is sufficient as written. The SDT determined
that the term “provisioned” does not need to be defined. Provision or provisioned access is a well-known term among technical
subject matter experts who provision access or deprovision access as a part of their job. This is an industry-proven and accepted term
that aligns with security best practices and industry frameworks, which is best maintained as a non-defined term.
Please see the SDT’s response to ACES.
Thomas Standifur - Austin Energy - 1,3,4,5,6
Answer
No
Document Name
TPWR_2019-02_Unofficial_Comment_Form_2021-05-10.docx20210504-17090-hsevrj.docx
Comment
In support of Tacoma Powers' comments. Attached.
Likes
Dislikes
0
0
Response: Please see the SDT’s response to Tacoma Power.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
156
Gladys DeLaO - CPS Energy - 1,3,5
Answer
No
Document Name
Comment
CPS Energy suggests creating a NERC Glossary defined term for “Provisioned Access” instead of adding the Note: within CIP-004 R6 Part
6.1. Additionally, “obtain and use” should be included in the definition.
Likes
0
Dislikes
0
Response: Thank you for your comments. The SDT determined that the term “provisioned” does not need to be defined. Provision or
provisioned access is a well-known term among technical subject matter experts who provision access or deprovision access as a part
of their job. This is an industry-proven and accepted term that aligns with security best practices and industry frameworks, which is
best maintained as a non-defined term.
Michael Brytowski - Great River Energy - 1,3,5,6
Answer
No
Document Name
Comment
a. Given that the SDT has defined “access to BCSI” in R6, and the term “provisioned access” should be removed due to the creation of an
unintended security loophole (See our comments in Q1).
b. Access, which occurs in CIP standards language, whether it is electronic and/or logical access, physical access, unescorted physical
access, remote access, or interactive remote access is clearly understood, has been widely adopted by industry and regulators, and has
been subject to hundreds of audits across all regions for the past 14 years. Entities have developed internal documentation, configured
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
157
systems, implemented controls tasks and standardized programs on these terms. The adjective “provisioned” adds further terms,
requires changes and is of little value regarding the actions required of entities and the output deliverables or evidence.
Recommendation:
1. Revise the language to focus on access to BCSI and the auditable methods to protect BCSI at 3rd party off-prem (cloud) locations
Likes
0
Dislikes
0
Response: Thank you for your comments. Please see responses to comments for Q1.
Regarding the security loophole, the SDT respectfully disagrees since the concept of provisioned access is the scoping mechanism for
the requirement, not a loophole. Provisioned access provides the needed flexibility for a Responsible Entity to use other technologies
and approaches instead of or in addition to storage locations as a way to meet the access management requirements for BCSI,
especially that which is stored in third-party cloud solutions or is protected at the information/file level no matter where it is located.
While Part 6.1 only requires authorization for provisioned access to BCSI, entities may also choose to have a process to authorize
individuals (that is, grant them permission or make them eligible) to receive, see, or use BCSI that is disclosed to them, much like a
security clearance. This can be helpful from an information protection standpoint where individuals can be instructed to only share
BCSI with others who are authorized to see it, and entities could implement this as part of their CIP-011 Information Protection
Program.
Roger Fradenburgh - Roger Fradenburgh On Behalf of: Nicholas Lauriat, Network and Security Technologies, 1; - Roger Fradenburgh
Answer
No
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
158
N&ST notes that “provisioned” is not an adjective. Beyond that, “access” has already been given a contextual definition: “Obtain and
use.” N&ST suggests the SDT maintain consistency with existing CIP-004 language and continue to require that Responsible Entities
authorize access to BCSI and/or BCSI storage locations.
Likes
0
Dislikes
0
Response: Thank you for your comment. The concept of provisioned access provides the needed flexibility for entities to use other
technologies and approaches instead of or in addition to storage locations as a way to meet the access management requirements for
BCSI, especially that which is stored in third-party cloud solutions or is protected at the information/file level no matter where it is
located.
Masuncha Bussey - Duke Energy - 1,3,5,6 - MRO,Texas RE,SERC, Group Name Duke Energy
Answer
Yes
Document Name
Comment
Duke Energy agrees the adjective “provisioned” in conjunction with the “Note” clarifies what “provisioned access” is.
Likes
0
Dislikes
0
Response: Thank you for your support.
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
Yes
Document Name
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
159
Comment
MPC supports not defining “access” as a NERC glossary term, as this could be difficult and have unintended consequences for other
standards. MPC agrees that the use of “provisioned” and the note adds enough context to clarify what kind of access the requirements
are about.
Likes
0
Dislikes
0
Response: Thank you for your support.
William Steiner - Midwest Reliability Organization - 10
Answer
Yes
Document Name
Comment
Provisioned access’ in Part 6.3 doesn’t necessarily trigger the removal of accesses granted maliciously or inadvertently, and accepts a
security and reliability risk that is mitigated in today’s language. The use of provisioned access in Part 6.1 (authorize) and 6.2 (verify) is
fine. Consider “… ability to access BCSI…” instead of “…ability to use provisioned access…” for Part 6.3 only
Likes
Dislikes
0
0
Response: Thank you for your comment. The trigger to remove access granted maliciously or inadvertently would be whenever it is
found, such as during the verification required by 6.2. Part 6.3 is consistent with CIP-004-6 R5.3, with a termination action being the
trigger. All of R6 is scoped to provisioned access, including revocation, as only that which is provisioned can be revoked. Please refer
to the paragraph regarding R6 Part 6.3 in the Technical Rationale.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
160
Sing Tay - OGE Energy - Oklahoma Gas and Electric Co. - 6, Group Name OKGE
Answer
Yes
Document Name
Comment
OKGE supports comments provided by EEI.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Michael Johnson - Michael Johnson On Behalf of: Ed Hanson, Pacific Gas and Electric Company, 3, 1, 5; Marco Rios, Pacific Gas and
Electric Company, 3, 1, 5; Sandra Ellis, Pacific Gas and Electric Company, 3, 1, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
Yes
Document Name
Comment
PG&E agrees with the adjective “provisioned” and as noted in the comment for Question 1, will define what “provisioned” means to
PG&E and following the definition in our implementation of the modifications.
Likes
0
Dislikes
0
Response: Thank you for your support.
Thomas Breene - WEC Energy Group, Inc. - 3
Answer
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
Yes
161
Document Name
Comment
We support EEI comments.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
David Hathaway - WEC Energy Group, Inc. - 6
Answer
Yes
Document Name
Comment
Support comments made by EEI.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Clarice Zellmer - WEC Energy Group, Inc. - 5
Answer
Yes
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
162
Agree with the use of term provisioned. Would like the SDT to incorporate EEI comments as a non-substantive change during the final EEI
review.
Likes
0
Dislikes
0
Response: Thank you for your support and comment. Please see the SDT’s response to EEI.
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
Yes
Document Name
Comment
Southern agrees with the defining adjective of “provisioned” as the actions that may be taken to provide access to both electronic and
physical BCSI. The “Note” further clarifies what possible specific actions may be considered as provisioned.
Likes
0
Dislikes
0
Response: Thank you for your support.
John Galloway - ISO New England, Inc. - 2 - NPCC
Answer
Yes
Document Name
Comment
ISO New England supports the clarification in the “Note”.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
163
Likes
0
Dislikes
0
Response: Thank you for your support.
Kinte Whitehead - Exelon - 3
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Cynthia Lee - Exelon - 5
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
Dislikes
0
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
164
Response: Please see the SDT’s response to EEI.
Becky Webb - Exelon - 6
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Amy Bratkovic - PNM Resources - Public Service Company of New Mexico - 1,3
Answer
Yes
Document Name
Comment
Suggest reiterating the “Obtain and use” qualifier in the Main R6 requirement. This well better explain what “Access” really means.
Likes
Dislikes
0
0
Response: Thank you for your comment. The team removed the “note” from 6.1 and moved the language to the parent requirement
R6.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
165
Leonard Kula - Independent Electricity System Operator - 2
Answer
Yes
Document Name
Comment
We agree that the Note clarifies provisioned access.
We have concerns – 1) as written the reference to Part 4.1 could result in double jeopardy; 2) request clarification on how granting access
in Part 4.1 could provide authorization to BCSI required in Part 6.1
Likes
0
Dislikes
0
Response: Thank you for your comment. Part 4.1 requires a process to authorize access based on need. An entity may implement
their program in such a way as to use the same authorization for both Part 4.1 and Part 6.1.
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name NPCC Regional Standards Committee
Answer
Yes
Document Name
Comment
We agree that the Note clarifies provisioned access.
We have concerns – 1) as written the reference to Part 4.1 could result in double jeopardy; 2) request clarification on how granting access
in Part 4.1 could provide authorization to BCSI required in Part 6.1
Likes
Dislikes
0
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
166
Response: Thank you for your comment. Part 4.1 requires a process to authorize access based on need. An entity may implement their
program in such a way as to use the same authorization for both Part 4.1 and Part 6.1.
Steven Rueckert - Western Electricity Coordinating Council - 10, Group Name WECC CIP
Answer
Yes
Document Name
Comment
Considering the R6.1 ‘Note,’ the SDT should further clarify “provisioned access” in the IG/Technical Rationale and specifically address the
“underlay” (CSP environment) from the “overlay” (SaaS, IaaS, PaaS) where “provisioned access” to BCSI is given.
Likes
0
Dislikes
0
Response: Thank you for your comment.
Jennifer Flandermeyer - Jennifer Flandermeyer On Behalf of: Allen Klassen, Evergy, 6, 1, 3, 5; Derek Brown, Evergy, 6, 1, 3, 5; Marcus
Moor, Evergy, 6, 1, 3, 5; Thomas ROBBEN, Evergy, 6, 1, 3, 5; - Jennifer Flandermeyer
Answer
Yes
Document Name
Comment
Evergy supports and endorses the comments filed by the Edison Electric Institute.
Likes
Dislikes
0
0
Response: Please see the SDT’s response to EEI.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
167
Benjamin Winslett - Georgia System Operations Corporation - 4
Answer
Yes
Document Name
Comment
From a technical standpoint, the addition of ‘provisioned’ provides clear delineation regarding the definition of ‘access’ in this
context. Please reference the above comments in questions 1 and 2 regarding inclusion of clarifying language and guidance provided in
the Technical Rationale within the standard. Additionally, it is recommended that the Note regarding provisioned access be moved to the
main requirement in R6 where the term “provisioned access” is first used. This will also provide clarification that the note applies to all
uses of the term within the requirement and not just part 6.1.
Likes
1
Dislikes
Georgia Transmission Corporation, 1, Davis Greg
0
Response: Thank you for your comment. The team removed the “note” from 6.1 and moved the language to the parent requirement
R6.
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
Yes
Document Name
Comment
None.
Likes
Dislikes
0
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
168
Response
Constantin Chitescu - Ontario Power Generation Inc. - 5
Answer
Yes
Document Name
Comment
OPG supports NPCC Regional Standards Committee’s comments, and has the following additional comments:
Please provide additional clarification why the use of term “provisioned” is limited to access to BCSI and not also in Requirement 4 and 5.
Likes
0
Dislikes
0
Response: Please see the SDT”s response to NPCC Regional Standards Committee. CIP-004-X (and also CIP-004-6, the currently
enforceable standard) R4 and R5 is/was already properly scoped to the kind of access to be authorized, verified, and revoked (i.e.,
electronic access to applicable cyber systems and unescorted physical access into a Physical Security Perimeter). Although this is also
provisioned access, it is not necessary to add the qualifier to R4 and R5. However, it is necessary to include the word “provisioned” to
scope the kind of access to BCSI the R6 requirements pertain to.
Larry Heckert - Alliant Energy Corporation Services, Inc. - 4
Answer
Yes
Document Name
Comment
Alliant Energy supports comments submitted by EEI.
Likes
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
169
Dislikes
0
Response: Please see the SDT’s response to EEI.
Bobbi Welch - Midcontinent ISO, Inc. - 2, Group Name ISO/RTO Council Standards Review Committee 2019-02 BCSI Access Management
(Draft 3)
Answer
Yes
Document Name
Comment
The IRC SRC has no concerns about adding “provisioned” to provide context, however, we are unsure if this helps clarify what constitutes
access. Additional attempts to clarify “access” by the SDT may not be necessary. Individual entities have been successful in defining
“access” for themselves and their programs whereby Attachment C and prior audit records can continue to support this approach.
Likes
0
Dislikes
0
Response: Thank you for your support.
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
Yes
Document Name
Comment
ITC supports the response submitted by EEI
Likes
Dislikes
0
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
170
Response: Please see the SDT’s response to EEI.
Maryanne Darling-Reich - Black Hills Corporation - 1,3,5,6 - MRO,WECC
Answer
Yes
Document Name
Comment
Black Hills agrees with the decision, it should be evident that access is simply the ability to obtain and use, any further specifications
beyond that should be an entity decision.
Likes
0
Dislikes
0
Response: Thank you for your support.
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
Yes
Document Name
Comment
EEI supports not defining “Access” and agrees that providing a NERC glossary definition could have unintended consequences. EEI
supports the decision to define “provisioned access” in the context of CIP-004 to be sufficient for the purposes of this standard but also
recommends that this definition be elevated to the parent Requirement R6 given that “provision access” is used throughout this
requirement. (See EEI comments to Question 1)
Likes
Dislikes
0
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
171
Response: Thank you for your comment. The team removed the “note” from 6.1 and moved the language to the parent requirement
R6.
Donna Wood - Tri-State G and T Association, Inc. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name CHPD
Answer
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
Yes
172
Document Name
Comment
Likes
0
Dislikes
0
Response
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 3,4,5 - RF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
Yes
Document Name
Comment
Likes
Dislikes
0
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
173
Response
Kimberly Van Brimer - Southwest Power Pool, Inc. (RTO) - 2 - MRO,WECC, Group Name Southwest Power Pool Standards Review Group
(SSRG)
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Patrick Wells - OGE Energy - Oklahoma Gas and Electric Co. - 1,3,5,6
Answer
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
Yes
174
Document Name
Comment
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Dan Bamber - ATCO Electric - 1
Answer
Yes
Document Name
Comment
Likes
Dislikes
0
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
175
Response
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Yes
Document Name
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
176
Comment
Likes
0
Dislikes
0
Response
David Jendras - Ameren - Ameren Services - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Eli Rivera - CenterPoint Energy Houston Electric, LLC - NA - Not Applicable - Texas RE
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
177
Gail Golden - Entergy - Entergy Services, Inc. - 5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
Yes
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
178
Likes
0
Dislikes
0
Response
Lindsay Wickizer - Berkshire Hathaway - PacifiCorp - 6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Daniel Gacek - Exelon - 1
Answer
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
Dislikes
0
0
Response: Please see the SDT”s response to EEI.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
179
6. In response to industry concerns regarding double jeopardy or confusion with CIP-013, the SDT removed CIP-011-X, Requirement R1
Parts 1.3 and 1.4, in favor of simplifying CIP-011-X, Requirement R1 Part 1.1, and adjusting Part 1.2 to broaden the focus around the
implementation of protective methods and secure handling methods to mitigate risks of compromising confidentiality. Do you agree
with the proposed changes? If not, please provide the basis for your disagreement and an alternate proposal.
Lindsay Wickizer - Berkshire Hathaway - PacifiCorp - 6
Answer
No
Document Name
Comment
These proposed changes have not met the requirement of the SAR to prevent unauthorized access.
CIP-011 R1 Part 1.2, should be in alignment with CIP-004 R6 Part 6.1.
While detailed instructions are addressed in, “Measures” instead of in the “requirements.” Comparing with the previous draft; this
version is less burdensome, and covers broader situations, and, it reduces the repeated way to present methods used in different states
of transit, storage, and use. However, in ‘Part 1.2 to broaden the focus on protecting and securely handling BCSI….’ in this current form
it is contradictory with, ‘methods to protect’ in the Rationale, as their objectives are different.
Recommendation:
We suggest adding “prevent unauthorized access to BCSI” to R1 Part 1.2 so that it is in alignment with CIP-004 R6.1:
“Method(s) to protect and securely handle BCSI Information to prevent unauthorized access to BCSI, including storage, transit, and use.”
See the question to ‘broaden’ the focus of the language, and then the Technical Rationale says to be ‘explicit’…this seems to be
contradictory – this needs further investigation. See the new language in 1.2 as compared to the previous 1.3 & 1.4. This could result in a
burden to industry here.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
180
Likes
0
Dislikes
0
Response: Thank you for your comment. The requirement has been drafted in an objective based way with the intent of protecting
BCSI regardless of the state (i.e., storage transit and use) it exists in. In this way, the SDT has clarified or broadened the intent by
explicitly protecting BCSI in all states.
Please see the webinar from April 27, 2021 that explained CIP-004 being the access control and CIP-011 is the protective measures.
The focus of the BCSI requirements in CIP-004 is managing individuals’ access to BCSI where access can be provisioned, and the focus
of CIP-011 is protecting the BCSI itself from unauthorized access no matter where the BCSI is located.
Roger Fradenburgh - Roger Fradenburgh On Behalf of: Nicholas Lauriat, Network and Security Technologies, 1; - Roger Fradenburgh
Answer
No
Document Name
Comment
N&ST agrees with the SDT’s decision to drop proposed Requirement R1 Parts 1.3 and 1.4. However, we disagree with the proposed
changes to Parts 1.1 and 1.2, as we believe the existing language adequately defines the required elements of an Information Protection
Program.
Likes
0
Dislikes
0
Response: Thank you for your comment. Based on the comments received and ballot results, the SDT determined the language is
sufficient as written.
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
No
Document Name
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
181
Comment
While detailed instructions are addressed in, “Measures” instead of in the “requirements.” Comparing with the previous draft; this
version is less burdensome, and covers broader situations, and, it reduces the repeated way to present methods used in different states
of transit, storage, and use. However, in ‘Part 1.2 to broaden the focus on protecting and securely handling BCSI….’ in this current form
it is contradictory with, ‘methods to protect’ in the Rationale, as their objectives are different.
NVE suggests adding “prevent unauthorized access to BCSI” to R1 Part 1.2 so that it is in alignment with CIP-004 R6.1:
“Method(s) to protect and securely handle BCSI Information to prevent unauthorized access to BCSI, including storage, transit, and use.”
See the question to ‘broaden’ the focus of the language, and then the Technical Rationale says to be ‘explicit’…this seems to be
contradictory – this needs further investigation. See the new language in 1.2 as compared to the previous 1.3 & 1.4. This could result in a
burden to industry here.
Likes
0
Dislikes
0
Response: Thank you for your comment. The team determined that the language is sufficient as is based on the favorable ballot body.
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
No
Document Name
Comment
Texas RE is concerned that the proposed changes remove the concept of integrity, which is as equally important as the concept of
confidentiality. The current approved language in Requirement Part 1.2 specifically supports the concept of integrity through the phrase
“storage, transit, and use.” Texas RE asserts that such comprehensive language regarding BCSI storage, transit, and use – that is ensuring
confidentiality and integrity – should continue to be included. Texas RE recommends adding “and integrity” after confidentiality in
Requirement Part 1.2.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
182
Additionally, Texas RE recommends the removal of “[i]mplementation of administrative methods” as an example of evidence for offpremise BCSI. If a Registered Entity intends to make use of third-party services for storing BCSI the Registered Entity is still responsible for
ensuring the safety of the BCSI. A risk assessment or business agreement with the third-party vendor does not provide sufficient risk
mitigation should the third-party vendor be compromised.
Lastly, as mentioned in response to Question #2, Texas RE recommends adding bright line criteria for determining usability of BCSI to CIP011 Requirement Part 1.2. Texas RE recommends the following language:
1.2.1 - Method(s) to limit the ability of unauthorized individuals from obtaining or using BCSI. 1.2.2 - Method(s) to limit the ability of
unauthorized individuals from modifying BCSI without being detected.
For those methods that use encryption, utilize an encryption key strength of at least 128 bits, in accordance with NIST.
For those methods that use hashing, utilize a hash function with an output size of at least 256 bits, in accordance with NIST.
Likes
0
Dislikes
0
Response: Thank you for your comment. The integrity concern is beyond the scope of this SAR and it is not the intent of the SDT to
include integrity requirements/objectives in this draft. Furthermore, the security objective of the BCSI requirements is to protect BES
Cyber Systems. If the confidentiality of the BCSI is protected, then the risk of BCSI being misused by a bad actor and that bad actor
impacting BES Cyber Systems is also protected and the security goal has been achieved.
A single measure by itself does not tell an entity that they have met the entire requirement. The measures are suggested methods to
assist. This measure is a good practice along with technical controls.
Benjamin Winslett - Georgia System Operations Corporation - 4
Answer
No
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
183
The proposed simplification is useful with the exception of the verbiage added to Requirement R1.2. Specifically, the term to mitigate the
risk of compromising confidentiality is overly broad and ambiguous and could result in subjective interpretation during audits. The
technical rational states that this change was made to “reduce confusion” but instead it has only added ambiguity. The existing language
does not hinder the objectives of this SDT in any manner. Keeping this language consistent with the approved version of the standard will
prevent unnecessary modification of existing CIP-011 programs, especially for those entities who have no desire to use cloud-hosted
solutions.
As such, it is recommended that the language to R1.2 remain as follows:
Method(s) to protect and securely handle BCSI, including storage, transit, and use.
Likes
1
Dislikes
Georgia Transmission Corporation, 1, Davis Greg
0
Response: Thank you for your comment. The “mitigate risk” language takes into account the application of controls in a more targeted
manner. This concept objectively addresses the removal of the previously proposed CIP 11 R1.3 and 1.4. This also aids in auditing and
methodologies to perform a mitigation function to protect, as opposed to being a methodology to protect. This was used to aid auding
/ enforcement concerns within the SDT. The “storage, transit, and use” language was dropped to clarify that BCSI is protected
comprehensively, regardless of being in “storage, transit, and use”. This reduces confusion on interpreting, defining, and mapping
controls to whatever state BCSI is in. This brings more consistency for Responsible Entity’s and auditors alike. The “storage, transit, and
use” language was maintained in the measures to aid in the clarity to the Responsible Entity that the concept of “storage, transit, and
use” is still accounted for. BCSI, regardless of state or format, comprehensively requires protection.
Thomas Standifur - Austin Energy - 1,3,4,5,6
Answer
No
Document Name
TPWR_2019-02_Unofficial_Comment_Form_2021-05-10.docx20210504-17090-hsevrj.docx
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
184
In support of Tacoma Powers' comments. Attached.
Likes
0
Dislikes
0
Response: Thank you for your comment. The integrity concern is beyond the scope of this SAR and it is not the intent of the SDT to
include integrity requirements/objectives in this draft. Furthermore, the security objective of the BCSI requirements is to protect BES
Cyber Systems. If the confidentiality of the BCSI is protected, then the risk of BCSI being misused by a bad actor and that bad actor
impacting BES Cyber Systems is also protected and the security goal has been achieved.
Steven Rueckert - Western Electricity Coordinating Council - 10, Group Name WECC CIP
Answer
No
Document Name
Comment
Integrity is an important security objective for ‘Real-time Assessment and Real-time monitoring data’ and is address in CIP-012. However,
this should not negate the need to ensure the integrity of BCSI remains a security objective as well as confidentiality.
Likes
0
Dislikes
0
Response: Thank you for your comment. The integrity concern is beyond the scope of this SAR and it is not the intent of the SDT to
include integrity requirements/objectives in this draft. Furthermore, the security objective of the BCSI requirements is to protect BES
Cyber Systems. If the confidentiality of the BCSI is protected, then the risk of BCSI being misused by a bad actor and that bad actor
impacting BES Cyber Systems is also protected and the security goal has been achieved.
Amy Bratkovic - PNM Resources - Public Service Company of New Mexico - 1,3
Answer
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
No
185
Document Name
Comment
We agree with comments from Duke Energy.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to Duke Energy.
Jennie Wike - Jennie Wike On Behalf of: Hien Ho, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; John Merrell, Tacoma Public
Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Marc Donaldson, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Ozan Ferrin, Tacoma Public
Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Terry Gifford, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; - Jennie Wike, Group Name
Tacoma Power
Answer
No
Document Name
Comment
Tacoma Power supports the inclusion of method(s) as opposed to procedure(s); however, the inclusion of the objective of “mitigate the
risk of compromising confidentiality” does not follow the current language provided in CIP-012 on order to maintain Standards
consistency.
Therefore, Tacoma Power suggests the following alternative language:
“Method(s) to protect and securely handle BCSI to mitigate the risks posed by unauthorized disclosure and unauthorized modification of
BCSI.”
The inclusion of unauthorized modification supports the fact that entities rely on the integrity of their BCSI in many instances, and should
provide protections for data integrity where there is a risk associated with data integrity.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
186
Likes
1
Dislikes
Snohomish County PUD No. 1, 3, Chaney Holly
0
Response: Thank you for your comment. The integrity concern is beyond the scope of this SAR and it is not the intent of the SDT to
include integrity requirements/objectives in this draft. Furthermore, the security objective of the BCSI requirements is to protect BES
Cyber Systems. If the confidentiality of the BCSI is protected, then the risk of BCSI being misused by a bad actor and that bad actor
impacting BES Cyber Systems is also protected and the security goal has been achieved.
Bruce Reimer - Manitoba Hydro - 1
Answer
No
Document Name
Comment
We disagree with R1 Part 1.2 changes since these changes haven’t resolved the goal of SAR that is to prevent unauthorized access to BCSI
while in transit, storage, and in use. CIP-011 requirements should be in alignment with CIP-004 R6 Part 6.1 to ensure only authorized
personnel can possess BCSI. Using “mitigate the risks..” is subjective resulting in no audit consistency since the NERC entities and auditors
may have different ways to interpret it.
Likes
0
Dislikes
0
Response: Thank you for your comment. The security objective of the BCSI requirements is to protect BES Cyber Systems. If the
confidentiality of the BCSI is protected, then the risk of BCSI being misused by a bad actor and that bad actor impacting BES Cyber
Systems is also protected and the security goal has been achieved.
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
No
Document Name
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
187
Comment
We agree with the removal of language of “storage, security during transit, and use” from the requirement. However, we do not see the
need to mention this language again in the measures and ask that this language be removed.
Likes
0
Dislikes
0
Response: Thank you for your comment. The “storage, transit, and use” may be considered unnecessary or redundant due to the
proposed requirement language being more comprehensive; the “storage transit, and use” language in the measures brings clarity and
aids some Responsible Entity’s in the application, accounting, or evidence of controls that address BCSI.
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
No
Document Name
Comment
MidAmerican Energy agrees with removal of Parts 1.3 and 1.4. However, we are concerned with the lack of clarity of the language of Part
1.2. The CIP-011-X Technical Rationale states that methods to protect BCSI “becomes explicitly comprehensive.” This question refers to a
“broadened” focus, but the requirement does not clearly explain the broadened focus and comprehensive expectations. We request
additional information be added to Technical Rationale regarding expectations of the requirement, including the difference between
version 2 and the proposed version X.
We agree with the removal of language of “storage, security during transit, and use” from the requirement. However, we do not see the
need to mention this language again in the measures and ask that this language be removed.
Likes
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
188
Dislikes
0
Response: Thank you for your comment. The “explicitly comprehensive” language in the Technical Rationale will be clarified. The
“storage, transit, and use” may be considered unnecessary or redundant due to the proposed requirement language being more
comprehensive; the “storage transit, and use” language in the measures brings clarity and aids some Responsible Entity’s in the
application, accounting, or evidence of controls that address BCSI.
Sean Bodkin - Dominion - Dominion Resources, Inc. - 6, Group Name Dominion
Answer
No
Document Name
Comment
Dominion Energy is concerned with the addition of “to mitigate risks of compromising confidentiality”. This additional language seems to
require that Registered Entities develop methodologies and processes to determine levels of risk. Furthermore, the term mitigate risks is
very subjective and could be interpreted differently by the respective parties involved. This addition doesn’t appear to address any risks
or identified gaps. Please clarify the intent of the use of the language.
Likes
0
Dislikes
0
Response: Thank you for your comment. The “mitigate risk” language takes into account the application of controls in a more targeted
manner. This concept objectively addresses the removal of the previously proposed CIP 11 R1.3 and 1.4. This also aids in auditing and
methodologies to perform a mitigation function to protect, as opposed to being a methodology to protect. This was used to aid auding
/ enforcement concerns within the SDT.
JT Kuehne - AEP - 6
Answer
No
Document Name
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
189
Comment
AEP supports the removal of Requirement R1 Parts 1.3 and 1.4, and the minor adjustment made to Requirement R1, Part 1.1.
AEP has concerns that the adjustments made to Requirement R1, Part 1.2, made this requirement overly broad, especially considering the
management of the off-premise BCSI. Specifically, AEP is concerned with the breadth and depth of L1 and L2 evidence that would be
required to demonstrate compliance and mitigating risks of compromising confidentiality associated with Requirement R1, Part 1.2 with
regard to off-premise BCSI. Further, it is not clear what would constitute acceptable methodologies or procedures (self-audit,
independent audits, SOC1/SOC2 reviews, etc.) for AEP to validate a third party's control environment (provided the third party cooperates
with AEP's request) sufficient to demonstrate compliance and mitigating risks of compromising confidentiality associated with
Requirement R1, Part 1.2 with regard to off-premise BCSI. Finally, it is not clear to what level AEP will need to document, monitor, and
enforce controls implemented and administered by a third party who maintains AEP's BCSI off-premise.
AEP is also concerned with any unintended consequences from the proposed language, as it could be interpreted to mean any vendor’s
use of BSCI, even if it is stored on AEP’s systems, and not BSCI that is stored, transmitted, or used by a 3rd party vendors on their
system(s).
Likes
0
Dislikes
0
Response: Thank you for your comment. The process that an entity would employ to assess risks associated with the management of
the off-premise BCSI would determine the breadth and depth of L1 and L2 evidence that would be required to demonstrate
compliance. The SDT was not intending to prescribe a one size fits all, but that an entity would adjust the risk assessment to the type
of vendor service involved. If an entity believes that the risk assessment currently utilized for CIP-013 is an appropriate methodology
focused on specific “risks” within the Responsible Entity’s Information Protection Plan, then the SDT believes leveraging that would be
an acceptable approach. Evidence demonstating self-audits, independent audits, SOC1/SOC2 reviews could be all be acceptable based
upon how an Entity chooses to define their assessment methodology.
William Steiner - Midwest Reliability Organization - 10
Answer
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
No
190
Document Name
Comment
In CIP-011-X, Part 1.2, the proposed draft excludes risks related to data integrity. Omission of data integrity would require supplemental
Practice Guides by the ERO Enterprise to determine what cloud environment risks are related to confidentiality vs. integrity. In
practicality most data access risks overlap between those two legs of the CIA triad, and will be difficult or impossible to enforce some data
risk scenarios with data confidentiality alone.
Also, the mapping document ‘Description and Change Justification’ indicates that the focus for CIP-011-X Part 1.2 was intended to be
broader, but the change appears to be narrower than existing language. One or the other must be in error, but we are not sure which.
Likes
0
Dislikes
0
Response: Thank you for your comment. The integrity concern is beyond the scope of this SAR and it is not the intent of the SDT to
include integrity requirements/objectives in this draft. Furthermore, the security objective of the BCSI requirements is to protect BES
Cyber Systems. If the confidentiality of the BCSI is protected, then the risk of BCSI being misused by a bad actor and that bad actor
impacting BES Cyber Systems is also protected and the security goal has been achieved.
Dennis Sismaet - Northern California Power Agency - 6
Answer
No
Document Name
Comment
Please reference Marty Hostler's comments. Thanks.
Likes
Dislikes
0
0
Response: Please see the SDT’s response to Marty Hostler.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
191
Barry Jones - Barry Jones On Behalf of: sean erickson, Western Area Power Administration, 1, 6; - Barry Jones
Answer
No
Document Name
Comment
We do not agree with R1 Part 1.2 changes since these changes haven’t resolved the goal of SAR that is to prevent unauthorized access to
BCSI while in transit, storage, and in use. CIP-011 requirements should be in alignment with CIP-004 R6 Part 6.1 to ensure only authorized
personnel can possess BCSI.
Recommendations:
We suggest adding “prevent unauthorized access to BCSI” to R1 Part 1.2 so that it is in alignment with CIP-004 R6.1:
“Method(s) to protect and securely handle BCSI Information to prevent unauthorized access to BCSI, including storage, transit, and use.”
Likes
0
Dislikes
0
Response: Thank you for your comment. The SDT believes that the current proposed language within R1 Part 1.2 does not preclude an
Entity from needing to prevent the unauthorized access to BCSI while in transit, storage, and in use.
Marty Hostler - Northern California Power Agency - 3,4,5,6
Answer
No
Document Name
Comment
NO. We agree with removing CIP-011XX R1 Parts 1.3 & 1.4.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
192
We do not agree with adjusting Part 1.2.
Likes
1
Dislikes
Northern California Power Agency, 6, Sismaet Dennis
0
Response: Thank you for your comment.
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
No
Document Name
Comment
While more clear than the previously proposed CIP-011-3, the provided measures for CIP-011-X Part 1.2 it states, implementation of
administrative method(s) to protect BCSI (e.g., vendor service risk assessments, business agreements). Business agreements and vendor
service risk assessments does lead to confusion with CIP-013.
Likes
0
Dislikes
0
Response: Thank you for your comment. The SDTs intent by including “Implementation of administrative method(s) to protect BCSI
(e.g., vendor service risk assessments, business agreements)” within the Measures of R1 Part 1.2 was acknowledge that Entities could
leverage CIP-013 risk assessment processes for the storage and analysis of BCSI by third party vendors.
Masuncha Bussey - Duke Energy - 1,3,5,6 - MRO,Texas RE,SERC, Group Name Duke Energy
Answer
No
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
193
Duke Energy generally agrees with the proposed changes of simplifying CIP-011-X, Requirement R1 Part 1.1, and adjusting Part 1.2 to
broaden the focus around the implementation of protective methods and secure handling methods to mitigate risks of compromising
confidentiality.
Duke Energy has concerns with the wording of measures for R1.2. ‘on-premise BCSI’ and ‘off-premise BCSI’ are open to interperetation. Is
it the intent that a third party managed BCSI repository that is implemented on ‘on-premise’ servers not be subject to the ‘off-premise’
measures? Can a risk assessment determine the actual controls, physical, technical or administrative, needed?
Duke Energy recommends that for third party (or ‘off-premise’) managed or hosted storage, a risk assessment for physical, technical and
administrative controls be performed and mitigating controls be implemented as determined.
Likes
0
Dislikes
0
Response: Thank you for your comments. The SDT agrees with your approach that each Entity should perform a risk assessment for
physical, technical and administrative controls and implement mitigating controls for each third party service provider that handles
BCSI. The type (depth) of assessment and resulting mitigating controls would depend upon the type and location of the servies
provided. Additionally, an Entity may need to rely upon a 3rd party independent audit report, SOC1/SOC2 reviews, etc. to achieve that
objective.
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
Yes
Document Name
Comment
EEI agrees with removal of Parts 1.3 and 1.4. However, we suggest additional clarity of the language in Part 1.2. The CIP-011-X Technical
Rationale states that methods to protect BCSI “becomes explicitly comprehensive.” This question refers to a “broadened” focus, but the
requirement does not clearly explain the broadened focus and comprehensive expectations. We request additional information be added
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
194
to the Technical Rationale regarding the expectations of this requirement, including the difference between Draft 2 and the proposed
Draft 3 version.
EEI agrees with protection of BCSI itself over the physical location in which BCSI is stored. We also support the removal of the language
“storage, security during transit, and use” from this requirement. However, the language within the measure should also be removed.
Furthermore, EEI does not support the use of the term “in use,” because this language is not necessary or auditable.
Likes
0
Dislikes
0
Response: Thank you for your comment.
Maryanne Darling-Reich - Black Hills Corporation - 1,3,5,6 - MRO,WECC
Answer
Yes
Document Name
Comment
This draft is much more favorable than the previous. It’s more open ended and the “confidentiality” statement aligns better with the
spirit of what BCSI protection programs should aim to achieve.
Likes
0
Dislikes
0
Response: Thank you for you support.
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
Yes
Document Name
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
195
Comment
ITC supports the response submitted by EEI
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Bobbi Welch - Midcontinent ISO, Inc. - 2, Group Name ISO/RTO Council Standards Review Committee 2019-02 BCSI Access Management
(Draft 3)
Answer
Yes
Document Name
Comment
The IRC SRC supports the SDT’s removal of parts 1.3 and 1.4 as retaining them in CIP-011 would have added another CIP standard to the
scope of supply chain requirements. We view this as a good change.
Likes
0
Dislikes
0
Response: Thank you for your support.
Larry Heckert - Alliant Energy Corporation Services, Inc. - 4
Answer
Yes
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
196
Alliant Energy supports comments submitted by EEI.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Constantin Chitescu - Ontario Power Generation Inc. - 5
Answer
Yes
Document Name
Comment
OPG supports NPCC Regional Standards Committee’s comments.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to NPCC Regional Standards Committee.
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
Yes
Document Name
Comment
None.
Likes
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
197
Dislikes
0
Response
Jennifer Flandermeyer - Jennifer Flandermeyer On Behalf of: Allen Klassen, Evergy, 6, 1, 3, 5; Derek Brown, Evergy, 6, 1, 3, 5; Marcus
Moor, Evergy, 6, 1, 3, 5; Thomas ROBBEN, Evergy, 6, 1, 3, 5; - Jennifer Flandermeyer
Answer
Yes
Document Name
Comment
Evergy supports and endorses the comments filed by the Edison Electric Institute.
Likes
0
Dislikes
0
Response: Please see the SDT”s response to EEI.
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name NPCC Regional Standards Committee
Answer
Yes
Document Name
Comment
We agree with this simplification.
Likes
Dislikes
0
0
Response: Thank you for your support.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
198
Leonard Kula - Independent Electricity System Operator - 2
Answer
Yes
Document Name
Comment
We agree with this simplification.
Likes
0
Dislikes
0
Response: Thank you for your support.
Becky Webb - Exelon - 6
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Cynthia Lee - Exelon - 5
Answer
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
Yes
199
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Kinte Whitehead - Exelon - 3
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response: Please see the SDT”s response to EEI.
John Galloway - ISO New England, Inc. - 2 - NPCC
Answer
Yes
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
200
ISO New England agrees with this simplification.
Likes
0
Dislikes
0
Response: Thank you for your support.
Daniel Gacek - Exelon - 1
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
Yes
Document Name
Comment
Southern supports the deletion of CIP-011-X Requirement R1 Parts 1.3 and 1.4 and simplifying Parts 1.1 and 1.2. The SDT has made it
clear the protection of BCSI itself is what is addressed here over where the BCSI is actually stored.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
201
Likes
0
Dislikes
0
Response: Thank you for your support.
David Hathaway - WEC Energy Group, Inc. - 6
Answer
Yes
Document Name
Comment
Support comments made by EEI.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Thomas Breene - WEC Energy Group, Inc. - 3
Answer
Yes
Document Name
Comment
We support EEI comments.
Likes
Dislikes
0
0
Response: Please see the SDT’s response to EEI.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
202
Michael Johnson - Michael Johnson On Behalf of: Ed Hanson, Pacific Gas and Electric Company, 3, 1, 5; Marco Rios, Pacific Gas and
Electric Company, 3, 1, 5; Sandra Ellis, Pacific Gas and Electric Company, 3, 1, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
Yes
Document Name
Comment
PG&E does not believe there is any double jeopardy between the proposed modifications to CIP-011-X and CIP-013.
Likes
0
Dislikes
0
Response: Thank you for your support.
Sing Tay - OGE Energy - Oklahoma Gas and Electric Co. - 6, Group Name OKGE
Answer
Yes
Document Name
Comment
OKGE supports comments provided by EEI.
Likes
Dislikes
0
0
Response: Please see the SDT’s response to EEI.
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
203
Answer
Yes
Document Name
Comment
MPC agrees with the proposed changes and believes that CIP-011 requires protection of BCSI no matter where it is located. To do this,
entities must conduct assessments to understand what BCSI they have, where it can be found, how it transmits, what is done with it, and
understand how confidentiality could be compromised at any of these times and locations in order to implement appropriate controls to
protect it.
While MPC appreciates the reminder in the measures to consider BCSI that is located on-premises and off-premises, using these terms
here may be confusing. MPC suggests including additional information in Technical Rationale or Implementation Guidance instead.
Likes
0
Dislikes
0
Response: Thank you for your comments.
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name CHPD
Answer
Yes
Document Name
Comment
In the Measures for R1.2, change "on-premise" to "on-premises” and “off-premise” to “off-premises”.
Likes
Dislikes
0
0
Response: Thank you for your comments. The SDT will make this non-substantive change.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
204
Michael Brytowski - Great River Energy - 1,3,5,6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Gladys DeLaO - CPS Energy - 1,3,5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Gail Golden - Entergy - Entergy Services, Inc. - 5
Answer
Yes
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
205
Likes
0
Dislikes
0
Response
Eli Rivera - CenterPoint Energy Houston Electric, LLC - NA - Not Applicable - Texas RE
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jennifer Bray - Arizona Electric Power Cooperative, Inc. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
206
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Joshua Andersen - Salt River Project - 1,3,5,6 - WECC
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
David Jendras - Ameren - Ameren Services - 3
Answer
Yes
Document Name
Comment
Likes
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
207
Dislikes
0
Response
Clarice Zellmer - WEC Energy Group, Inc. - 5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Dan Bamber - ATCO Electric - 1
Answer
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
Yes
208
Document Name
Comment
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Patrick Wells - OGE Energy - Oklahoma Gas and Electric Co. - 1,3,5,6
Answer
Yes
Document Name
Comment
Likes
Dislikes
0
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
209
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kimberly Van Brimer - Southwest Power Pool, Inc. (RTO) - 2 - MRO,WECC, Group Name Southwest Power Pool Standards Review Group
(SSRG)
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
Yes
210
Document Name
Comment
Likes
0
Dislikes
0
Response
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 3,4,5 - RF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
Yes
Document Name
Comment
Likes
Dislikes
0
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
211
Response
Donna Wood - Tri-State G and T Association, Inc. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
212
7. The SDT extended the implementation plan to 24-months in an attempt to align with the Project 2016-02 modifications that are on
the same drafting timeline, and added an optional provision for early adoption. Do you agree this approach gives industry adequate
time to implement without encumbering entities who are planning to, or are already using, third-party solutions (e.g., cloud services)
for BCSI? If not, please provide the basis for your disagreement and an alternate proposal
Dennis Sismaet - Northern California Power Agency - 6
Answer
No
Document Name
Comment
Please reference Marty Hostler's comments. Thanks.
Likes
0
Dislikes
0
Response: Please see SDT’s response to Marty Hostler.
Masuncha Bussey - Duke Energy - 1,3,5,6 - MRO,Texas RE,SERC, Group Name Duke Energy
Answer
Yes
Document Name
Comment
Duke Energy agrees with the extension of the 24-months implementation plan provided the CIP-004 R6.1 requirement to document
justification of the need for authorization is eliminated.
Likes
Dislikes
0
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
213
Response: Thank you for your support.
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
Yes
Document Name
Comment
MPC agrees with this approach.
Likes
0
Dislikes
0
Response: Thank you for your support.
Michael Johnson - Michael Johnson On Behalf of: Ed Hanson, Pacific Gas and Electric Company, 3, 1, 5; Marco Rios, Pacific Gas and
Electric Company, 3, 1, 5; Sandra Ellis, Pacific Gas and Electric Company, 3, 1, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
Yes
Document Name
Comment
PG&E agrees with the 24-month implementation plan and the ability for early adoption.
Likes
Dislikes
0
0
Response: Thank you for your support.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
214
David Hathaway - WEC Energy Group, Inc. - 6
Answer
Yes
Document Name
Comment
Support comments made by EEI.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
Yes
Document Name
Comment
Southern agrees with the 24-month timeline. It will allow enough time to reach implementation.
Likes
0
Dislikes
0
Response: Thank you for your support.
Daniel Gacek - Exelon - 1
Answer
Yes
Document Name
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
215
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response: Please see the SDT”s response to EEI.
John Galloway - ISO New England, Inc. - 2 - NPCC
Answer
Yes
Document Name
Comment
ISO New England agrees with aligning timelines.
Likes
0
Dislikes
0
Response: Thank you for your support.
Kinte Whitehead - Exelon - 3
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
216
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Cynthia Lee - Exelon - 5
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Becky Webb - Exelon - 6
Answer
Yes
Document Name
Comment
Exelon has elected to align with EEI in response to this question.
Likes
Dislikes
0
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
217
Response: Please see the SDT’s response to EEI.
Leonard Kula - Independent Electricity System Operator - 2
Answer
Yes
Document Name
Comment
We agree with aligning timelines.
Likes
0
Dislikes
0
Response: Thank you for your support.
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name NPCC Regional Standards Committee
Answer
Yes
Document Name
Comment
We agree with aligning timelines.
Likes
Dislikes
0
0
Response: Thank you for your support.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
218
Jennifer Flandermeyer - Jennifer Flandermeyer On Behalf of: Allen Klassen, Evergy, 6, 1, 3, 5; Derek Brown, Evergy, 6, 1, 3, 5; Marcus
Moor, Evergy, 6, 1, 3, 5; Thomas ROBBEN, Evergy, 6, 1, 3, 5; - Jennifer Flandermeyer
Answer
Yes
Document Name
Comment
Evergy supports and endorses the comments filed by the Edison Electric Institute.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Benjamin Winslett - Georgia System Operations Corporation - 4
Answer
Yes
Document Name
Comment
Yes, 24 months is sufficient and aligning the changes with the Project 2016-02 SDT modifications will improve the efficiency and costeffectiveness of the adjustments required to comply with these modifications.
Likes
1
Dislikes
Georgia Transmission Corporation, 1, Davis Greg
0
Response: Thank you for your support.
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
Yes
219
Document Name
Comment
None.
Likes
0
Dislikes
0
Response
Constantin Chitescu - Ontario Power Generation Inc. - 5
Answer
Yes
Document Name
Comment
OPG supports NPCC Regional Standards Committee’s comments.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to NPCC RSC.
Larry Heckert - Alliant Energy Corporation Services, Inc. - 4
Answer
Yes
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
220
Alliant Energy supports comments submitted by EEI.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Bobbi Welch - Midcontinent ISO, Inc. - 2, Group Name ISO/RTO Council Standards Review Committee 2019-02 BCSI Access Management
(Draft 3)
Answer
Yes
Document Name
Comment
The IRC SRC acknowledges the SDT for incorporating our prior suggestion for added flexibility.
Likes
0
Dislikes
0
Response: Thank you for your support.
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
Yes
Document Name
Comment
ITC supports the response submitted by EEI
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
221
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
Yes
Document Name
Comment
EEI supports the proposal to extend the implementation plan to 24-months because changes will be necessary to align processes and
training with the new requirements for both entities planning to utilize cloud services as well as those not planning to do so. EEI also
supports the option for early adoption.
Likes
0
Dislikes
0
Response: Thank you for your support.
Donna Wood - Tri-State G and T Association, Inc. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
222
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name CHPD
Answer
Yes
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
223
Likes
0
Dislikes
0
Response
Marty Hostler - Northern California Power Agency - 3,4,5,6
Answer
Yes
Document Name
Comment
Likes
1
Dislikes
Northern California Power Agency, 6, Sismaet Dennis
0
Response
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 3,4,5 - RF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
224
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Barry Jones - Barry Jones On Behalf of: sean erickson, Western Area Power Administration, 1, 6; - Barry Jones
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kimberly Van Brimer - Southwest Power Pool, Inc. (RTO) - 2 - MRO,WECC, Group Name Southwest Power Pool Standards Review Group
(SSRG)
Answer
Yes
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
225
Likes
0
Dislikes
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
William Steiner - Midwest Reliability Organization - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
226
JT Kuehne - AEP - 6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Sean Bodkin - Dominion - Dominion Resources, Inc. - 6, Group Name Dominion
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Patrick Wells - OGE Energy - Oklahoma Gas and Electric Co. - 1,3,5,6
Answer
Yes
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
227
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Sing Tay - OGE Energy - Oklahoma Gas and Electric Co. - 6, Group Name OKGE
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Dan Bamber - ATCO Electric - 1
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
228
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
Yes
Document Name
Comment
Likes
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
229
Dislikes
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Bruce Reimer - Manitoba Hydro - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Clarice Zellmer - WEC Energy Group, Inc. - 5
Answer
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
Yes
230
Document Name
Comment
Likes
0
Dislikes
0
Response
David Jendras - Ameren - Ameren Services - 3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jennie Wike - Jennie Wike On Behalf of: Hien Ho, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; John Merrell, Tacoma Public
Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Marc Donaldson, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Ozan Ferrin, Tacoma Public
Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Terry Gifford, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; - Jennie Wike, Group Name
Tacoma Power
Answer
Yes
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
231
Likes
1
Dislikes
Snohomish County PUD No. 1, 3, Chaney Holly
0
Response
Amy Bratkovic - PNM Resources - Public Service Company of New Mexico - 1,3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Joshua Andersen - Salt River Project - 1,3,5,6 - WECC
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Steven Rueckert - Western Electricity Coordinating Council - 10, Group Name WECC CIP
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
232
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jennifer Bray - Arizona Electric Power Cooperative, Inc. - 1
Answer
Yes
Document Name
Comment
Likes
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
233
Dislikes
0
Response
Eli Rivera - CenterPoint Energy Houston Electric, LLC - NA - Not Applicable - Texas RE
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Gail Golden - Entergy - Entergy Services, Inc. - 5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
Yes
234
Document Name
Comment
Likes
0
Dislikes
0
Response
Gladys DeLaO - CPS Energy - 1,3,5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Michael Brytowski - Great River Energy - 1,3,5,6
Answer
Yes
Document Name
Comment
Likes
Dislikes
0
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
235
Response
Roger Fradenburgh - Roger Fradenburgh On Behalf of: Nicholas Lauriat, Network and Security Technologies, 1; - Roger Fradenburgh
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Lindsay Wickizer - Berkshire Hathaway - PacifiCorp - 6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Maryanne Darling-Reich - Black Hills Corporation - 1,3,5,6 - MRO,WECC
Answer
Yes
Document Name
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
236
Comment
Likes
0
Dislikes
0
Response
Thomas Standifur - Austin Energy - 1,3,4,5,6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Thomas Breene - WEC Energy Group, Inc. - 3
Answer
Document Name
Comment
We support EEI comments.
Likes
Dislikes
0
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
237
Response: Please see the SDT’s response to EEI.
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Document Name
Comment
Texas RE does not have comments on this question.
Likes
0
Dislikes
0
Response
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
238
8. In looking at all proposed recommendations from the standard drafting team, are the proposed changes a cost-effective approach?
Lindsay Wickizer - Berkshire Hathaway - PacifiCorp - 6
Answer
No
Document Name
Comment
Unknown fiscal impacts without a cost impact analysis and further clarifications.
PAC has strong concerns regarding the broadened and “explicitly comprehensive” expectations for CIP-011-X R1.2, which could result in
significant impacts that are not cost-effective.
Standards should not be approved by until each SDT develop a detailed cost estimate.
There is no information to determine if the modifications are a cost-effective approach
Likes
0
Dislikes
0
Response: Thank you for your comment.
Roger Fradenburgh - Roger Fradenburgh On Behalf of: Nicholas Lauriat, Network and Security Technologies, 1; - Roger Fradenburgh
Answer
No
Document Name
Comment
N&ST’s selection of “No” reflects our belief that currently proposed changes should be amended.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
239
Likes
0
Dislikes
0
Response: Thank you for your comment.
Kevin Salsbury - Berkshire Hathaway - NV Energy - 5
Answer
No
Document Name
Comment
Unknown at this time. The broadened approach to BCSI protections in CIP-011, could lead to potential high costs to an Entity.
Likes
0
Dislikes
0
Response: Thank you for your comment.
Joshua Andersen - Salt River Project - 1,3,5,6 - WECC
Answer
No
Document Name
Comment
SRP still holds to our comments from last time - the cost to implement will grow quickly with unclear requirements that lead to
Responsible Entity concerns of proper interpretation. We would not say these are cost-effective at this time
Likes
Dislikes
0
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
240
Response: Thank you for your comment.
Becky Webb - Exelon - 6
Answer
No
Document Name
Comment
Unfortunately we wouldnt be able to properly answer this question at this time.
Likes
0
Dislikes
0
Response
Kinte Whitehead - Exelon - 3
Answer
No
Document Name
Comment
Unfortunately we wouldnt be able to properly answer this question at this time.
Likes
0
Dislikes
0
Response
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
241
Answer
No
Document Name
Comment
MidAmerican Energy is concerned with broadened and “explicitly comprehensive” expectations for CIP-011-X R1.2, which could result in a
costly approach.
Likes
0
Dislikes
0
Response: Thank you for your comment.
Michael Johnson - Michael Johnson On Behalf of: Ed Hanson, Pacific Gas and Electric Company, 3, 1, 5; Marco Rios, Pacific Gas and
Electric Company, 3, 1, 5; Sandra Ellis, Pacific Gas and Electric Company, 3, 1, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
No
Document Name
Comment
At this time PG&E does not have information to determine if the modifications are a cost-effective approach.
Likes
0
Dislikes
0
Response
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
No
Document Name
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
242
Comment
MidAmerican Energy is concerned with broadened and “explicitly comprehensive” expectations for CIP-011-X R1.2, which could result in a
costly approach.
Likes
0
Dislikes
0
Response: Thank you for your comment.
Dennis Sismaet - Northern California Power Agency - 6
Answer
No
Document Name
Comment
Please reference Marty Hostler's comments. Thanks.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to Marty Hostler.
Marty Hostler - Northern California Power Agency - 3,4,5,6
Answer
No
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
243
The SDT has not provided a cost estimate. Consequently, we have no idea if the proposal is cost effective.
Standards should not be approved by Industry until each Standard Drafting Team develops a detailed cost estimate (capital and
maintenance).
This means including internal controls, more staff, management/board approval, budgetting, revising all Internal Compliance Documents
to account for the new standard or modifications, etc. All these changes end up costing real people, our customer, they certainly would
not blindly tell the STD I just want that product and don't care what the cost is.
Likes
1
Dislikes
Northern California Power Agency, 6, Sismaet Dennis
0
Response: Thank you for your comment.
Masuncha Bussey - Duke Energy - 1,3,5,6 - MRO,Texas RE,SERC, Group Name Duke Energy
Answer
No
Document Name
Comment
Duke Energy recommends removing “and the justification of business need for the provisioned access” as a measure in CIP-004 R6.1.
Managers must be able to authorize access to a large number of employees without need to cut and paste a blanket justification for each
person or group. All that should be required is documented authorization and removal along with the record of authorized individuals.
The act of authorization should be considered sufficient that a business need for access exists. There is no risk reduction in documenting
this justification, but there is significant overhead in adding such functionality to existing authorization tools.
Likes
Dislikes
0
0
Response: Thank you for your comment.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
244
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
No
Document Name
Comment
Likes
0
Dislikes
0
Response
Bobbi Welch - Midcontinent ISO, Inc. - 2, Group Name ISO/RTO Council Standards Review Committee 2019-02 BCSI Access Management
(Draft 3)
Answer
Yes
Document Name
Comment
The proposed changes appear to be backwards compatible, allowing entities to quickly adapt current compliance programs to incorporate
the changes and are a substantial improvement over the last draft.
Likes
0
Dislikes
0
Response: Thank you for your support.
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
Yes
245
Document Name
Comment
None.
Likes
0
Dislikes
0
Response
Pamela Hunter - Southern Company - Southern Company Services, Inc. - 1,3,5,6 - SERC, Group Name Southern Company
Answer
Yes
Document Name
Comment
Southern agrees that the proposed changes are cost effective. There may be additional costs in the future for the use of different
technology or applications but would be budgeted for any planned upgrades.
Likes
0
Dislikes
0
Response: Thank you for your support.
Thomas Breene - WEC Energy Group, Inc. - 3
Answer
Yes
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
246
We think this is a cost effective way to address the issue.
Likes
0
Dislikes
0
Response: Thank you for your support.
Barry Jones - Barry Jones On Behalf of: sean erickson, Western Area Power Administration, 1, 6; - Barry Jones
Answer
Yes
Document Name
Comment
Any changes made result in a cost to industry.
Likes
0
Dislikes
0
Response: Thank you for your comment.
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Answer
Yes
Document Name
Comment
See comments in response to #9 below.
Likes
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
247
Dislikes
0
Response: Please see the SDT’s response to #9 below.
Thomas Standifur - Austin Energy - 1,3,4,5,6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Maryanne Darling-Reich - Black Hills Corporation - 1,3,5,6 - MRO,WECC
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Larry Heckert - Alliant Energy Corporation Services, Inc. - 4
Answer
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
Yes
248
Document Name
Comment
Likes
0
Dislikes
0
Response
Michael Brytowski - Great River Energy - 1,3,5,6
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Gladys DeLaO - CPS Energy - 1,3,5
Answer
Yes
Document Name
Comment
Likes
Dislikes
0
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
249
Response
Benjamin Winslett - Georgia System Operations Corporation - 4
Answer
Yes
Document Name
Comment
Likes
1
Dislikes
Georgia Transmission Corporation, 1, Davis Greg
0
Response
Gail Golden - Entergy - Entergy Services, Inc. - 5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Jennifer Bray - Arizona Electric Power Cooperative, Inc. - 1
Answer
Yes
Document Name
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
250
Comment
Likes
0
Dislikes
0
Response
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Steven Rueckert - Western Electricity Coordinating Council - 10, Group Name WECC CIP
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
251
Amy Bratkovic - PNM Resources - Public Service Company of New Mexico - 1,3
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Clarice Zellmer - WEC Energy Group, Inc. - 5
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
David Hathaway - WEC Energy Group, Inc. - 6
Answer
Yes
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
252
Likes
0
Dislikes
0
Response
Bruce Reimer - Manitoba Hydro - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Karie Barczak - DTE Energy - Detroit Edison Company - 3,4,5, Group Name DTE Energy - DTE Electric
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
253
Dan Bamber - ATCO Electric - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
JT Kuehne - AEP - 6
Answer
Yes
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
254
Likes
0
Dislikes
0
Response
William Steiner - Midwest Reliability Organization - 10
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
255
Kimberly Van Brimer - Southwest Power Pool, Inc. (RTO) - 2 - MRO,WECC, Group Name Southwest Power Pool Standards Review Group
(SSRG)
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Andy Fuhrman - Andy Fuhrman On Behalf of: Theresa Allard, Minnkota Power Cooperative Inc., 1; - Andy Fuhrman
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
LaTroy Brumfield - American Transmission Company, LLC - 1
Answer
Yes
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
256
Likes
0
Dislikes
0
Response
Jeanne Kurzynowski - CMS Energy - Consumers Energy Company - 3,4,5 - RF
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Meaghan Connell - Public Utility District No. 1 of Chelan County - 5, Group Name CHPD
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
257
Donna Wood - Tri-State G and T Association, Inc. - 1
Answer
Yes
Document Name
Comment
Likes
0
Dislikes
0
Response
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
Document Name
Comment
No comment
Likes
0
Dislikes
0
Response
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Document Name
Comment
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
258
Texas RE does not have comments on this question.
Likes
0
Dislikes
0
Response
Jennifer Flandermeyer - Jennifer Flandermeyer On Behalf of: Allen Klassen, Evergy, 6, 1, 3, 5; Derek Brown, Evergy, 6, 1, 3, 5; Marcus
Moor, Evergy, 6, 1, 3, 5; Thomas ROBBEN, Evergy, 6, 1, 3, 5; - Jennifer Flandermeyer
Answer
Document Name
Comment
Evergy supports and endorses the comments filed by the Edison Electric Institute.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Leonard Kula - Independent Electricity System Operator - 2
Answer
Document Name
Comment
N/A.
Likes
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
259
Dislikes
0
Response
Cynthia Lee - Exelon - 5
Answer
Document Name
Comment
Unfortunately we wouldnt be able to properly answer this question at this time.
Likes
0
Dislikes
0
Response
Daniel Gacek - Exelon - 1
Answer
Document Name
Comment
Unfortunately we wouldnt be able to properly answer this question at this time.
Likes
0
Dislikes
0
Response
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
260
9. Please provide any additional comments for the SDT to consider, if desired.
Donna Wood - Tri-State G and T Association, Inc. - 1
Answer
Document Name
Comment
Tri-State Generation and Transmission appreciates the time and effort given to this project and agrees with the revisions/changes.
Likes
0
Dislikes
0
Response: Thank you for your support.
Masuncha Bussey - Duke Energy - 1,3,5,6 - MRO,Texas RE,SERC, Group Name Duke Energy
Answer
Document Name
Comment
No additional comments.
Likes
0
Dislikes
0
Response
Brian Millard - Tennessee Valley Authority - 1,3,5,6 - SERC, Group Name Tennessee Valley Authority
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
261
Answer
Document Name
Comment
The proposed language is too ambigious and obligates entities to protect BCSI in any form, even though beyond its control. Should BCSI
be shared with NERC/FERC, the proposed standard would require registered entities to extend their access management to include the
copy of that information held by NERC/FERC. Subsequent requirements in CIP-011 would require reviews of access rights associated with
that copy.
The language should be re-scoped to focus on management of access to designated repositories, instead of the information itself.
Likes
0
Dislikes
0
Response: Thank you for your comment. Based on the favorable ballot results, the SDT does not foresee this as an issue.
Steve Toosevich - NiSource - Northern Indiana Public Service Co. - 1
Answer
Document Name
Comment
The CIP-004-X and CIP-011-X proposal is more favorable than the previous CIP-004-7 and CIP-011-3 approach of moving access
management of BCSI from CIP-004 and adding it to CIP-011.
Likes
Dislikes
0
0
Response: Thank you for your support.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
262
Marty Hostler - Northern California Power Agency - 3,4,5,6
Answer
Document Name
Comment
none.
Likes
1
Dislikes
Northern California Power Agency, 6, Sismaet Dennis
0
Response
Barry Jones - Barry Jones On Behalf of: sean erickson, Western Area Power Administration, 1, 6; - Barry Jones
Answer
Document Name
Comment
The SDT should work to simplify but clarify the standards. Years down the road auditors make interpretations and companies need to be
clear what is required. Secondly the SDT should look at ISO and NIST standards for guidance. Per our comments in question 1, WAPA
recommends changing “provisioned access” to “access to BCSI” for whole R6 and its parts as suggested here:
“Except our suggested changes to R6 Part 6.1, we also have the following recommendations for R6 Part 6.2 and 6.3:
•
For changes to R6 Part 6.2:
Verify at least once every 15 calendar months that all individuals with access to BCSI:
6.2.1. have an Is authorization record;
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
263
6.2.2. Is still need the access to BCSI to perform their current work functions, as determined by the Responsible Entity.
•
For changes to R6 Part 6.3:
For termination actions, remove the individual’s ability to access to BCSI (unless already revoked according to Part 5.1) by the end of
the next calendar day following the effective date of the termination action.”
As we suggested in Q1, changing from “provisioned access to BCSI” to “access to BCSI” provides the clarity and flexibility for authorizing,
verifying, and revoking access” to BCSI using various approaches including BCSI repository level or BCSI file level protection, which make
the R6 backwards compatible.
Likes
0
Dislikes
0
Response: Thank you for your comment. Provisioned access is to be considered the result of specific actions taken to provide an
individual the means to access BCSI (e.g., physical keys or access cards, user accounts and associated rights and privileges, encryption
keys, etc.). In the context of this requirement, an individual is considered to have been provisioned access if they concurrently have
the means to both obtain and use the BCSI. To illustrate, an individual who can obtain encrypted BCSI but does not have the
encryption keys to be able to use the BCSI has not been provisioned access to the BCSI. Therefore, the SDT does not see the need to
remove “provisioned” from the language.
Dennis Sismaet - Northern California Power Agency - 6
Answer
Document Name
Comment
Please reference Marty Hostler's comments. Thanks.
Likes
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
264
Dislikes
0
Response: Please see the SDT’s response to Marty Hostler.
Kimberly Van Brimer - Southwest Power Pool, Inc. (RTO) - 2 - MRO,WECC, Group Name Southwest Power Pool Standards Review Group
(SSRG)
Answer
Document Name
Comment
The SSRG wants to thank the drafting team for their time and efforts on this project.
Likes
0
Dislikes
0
Response: Thank you for your support.
Mark Garza - FirstEnergy - FirstEnergy Corporation - 4, Group Name FE Voter
Answer
Document Name
Comment
N/A
Likes
0
Dislikes
0
Response
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
265
JT Kuehne - AEP - 6
Answer
Document Name
Comment
No further comments.
Likes
0
Dislikes
0
Response
Anthony Jablonski - ReliabilityFirst - 10
Answer
Document Name
Comment
CIP-004-X R6 and CIP-011-X R1 have different applicability. In the Draft 3 language, BCSI pertaining to medium impact BCS without ERC
must be protected (CIP-011-X R1), but access to this BCSI need not be controlled (CIP-004-X R6). Without mandated access controls, the
entity will be left to determine what is an effective protection to BCSI pertaining to medium impact BCS without ERC. The SDT should
consider revisiting the differences in applicability between CIP-004-X R6 and CIP-011-X R1. Since this issue is beyond the scope of the
2019-02 SAR, please add this concern to the list of SAR items for the next revision of CIP-004.
The Background sections of CIP-004-x and CIP-011-X should be moved to their respective Technical Rationale documents.
CIP-004-X Implementation Guidance: 1) Implementation Guidance for R2 states that “a single training program for all individuals needing
to be trained is acceptable” which is in conflict with the language in R2, “appropriate to individual roles, functions, or responsibilities.” 2)
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
266
Page numbers for R6 are incorrect. 3) Appendix 1 should be moved to the Technical Rationale document as it does not fit the
requirements for Implementation Guidance.
Implementation Plan: The “Early Adoption” paragraph should make it clear that all of the updated Requirements must be adopted at the
same time. An entity should not be permitted to early-adopt only parts of the revised Standards.
Likes
0
Dislikes
0
Response: Thank you for your comments. The team will provide your proposed edits to NERC staff for future project consideration. The
team did not make edits to Requirement R2. Regarding early adoption, this is a discussion you will need to hold with your Regional
Entity upon considering early adoption.
Sing Tay - OGE Energy - Oklahoma Gas and Electric Co. - 6, Group Name OKGE
Answer
Document Name
Comment
OKGE supports comments provided by EEI.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Darnez Gresham - Berkshire Hathaway Energy - MidAmerican Energy Co. - 3
Answer
Document Name
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
267
Comment
MidAmerican Energy continues to have concern with the revised text of CIP-004-X R6.2. Please add a statement to the CIP-004-X
Technical Rationale document: The review expected in CIP-004-X R6.2 is expected to be the same as CIP-004-6 R4.4.
While we are generally supportive of the changes to CIP-004, we are concerned about creating a new separate requirement for BCSI
authorization, revocation and review. This creates the potential for non compliance of multiple requirements for a single situation, such
as revocation of accesses for a termination. We ask the SDT to consider making changes that will reconcile this issue.
Likes
0
Dislikes
0
Response: Thank you for yoru comment. Based on the favorable ballot results, the SDT does not plan to make any substantive
changes.
Michael Johnson - Michael Johnson On Behalf of: Ed Hanson, Pacific Gas and Electric Company, 3, 1, 5; Marco Rios, Pacific Gas and
Electric Company, 3, 1, 5; Sandra Ellis, Pacific Gas and Electric Company, 3, 1, 5; - Michael Johnson, Group Name PG&E All Segments
Answer
Document Name
Comment
PG&E thanks the SDT for the effort in making the modifications objective based that will allow PG&E to implement them to fit our
environment.
Likes
Dislikes
0
0
Response: Thank you for your support.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
268
Terry Harbour - Berkshire Hathaway Energy - MidAmerican Energy Co. - 1
Answer
Document Name
Comment
MidAmerican Energy continues to have concern with the revised text of CIP-004-X R6.2. Please add a statement to the CIP-004-X
Technical Rationale document: The review expected in CIP-004-X R6.2 is expected to be the same as CIP-004-6 R4.4.
While we are generally supportive of the changes to CIP-004, we are concerned about creating a new separate requirement for BCSI
authorization, revocation and review. This creates the potential for non compliance of multiple requirements for a single situation, such
as revocation of accesses for a termination. We ask the SDT to consider making changes that will reconcile this issue.
Likes
0
Dislikes
0
Response: Thank you for yoru comment. Based on the favorable ballot results, the SDT does not plan to make any substantive
changes.
Thomas Breene - WEC Energy Group, Inc. - 3
Answer
Document Name
Comment
We support EEI comments.
Likes
Dislikes
0
0
Response: Please see the SDT’s response to EEI.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
269
Bruce Reimer - Manitoba Hydro - 1
Answer
Document Name
Comment
Resulting from our comments in Q1, we suggest changing “provisioned access” to “access to BCSI” for whole R6 and its parts.
Recommendations:
Except our suggested changes to R6 Part 6.1, we also have the following recommendations for R6 Part 6.2 and 6.3:
For changes to R6 Part 6.2:
Verify at least once every 15 calendar months that all individuals with access to BCSI:
6.2.1. have an authorization record;
6.2.2. Is still need the access to BCSI to perform their current work functions, as determined by the Responsible Entity.
For changes to R6 Part 6.3:
For termination actions, remove the individual’s ability to access to BCSI (unless already revoked according to Part 5.1) by the end of the
next calendar day following the effective date of the termination action.
As we suggested in Q1, changing from “provisioned access to BCSI” to “access to BCSI” would provide the clarity and the flexibility for
authorizing, verifying, and revoking access” to BCSI using various approaches including BCSI repository level or BCSI file level protection,
which make the R6 backwards compatible.
Likes
Dislikes
0
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
270
Response: Thank you for your comment. Provisioned access is to be considered the result of specific actions taken to provide an
individual the means to access BCSI (e.g., physical keys or access cards, user accounts and associated rights and privileges, encryption
keys, etc.). In the context of this requirement, an individual is considered to have been provisioned access if they concurrently have
the means to both obtain and use the BCSI. To illustrate, an individual who can obtain encrypted BCSI but does not have the
encryption keys to be able to use the BCSI has not been provisioned access to the BCSI. Therefore, the SDT does not foresee changes
needed.
David Hathaway - WEC Energy Group, Inc. - 6
Answer
Document Name
Comment
Support comments made by EEI.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Clarice Zellmer - WEC Energy Group, Inc. - 5
Answer
Document Name
Comment
Supportive of EEI comments on this project.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
271
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Jennie Wike - Jennie Wike On Behalf of: Hien Ho, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; John Merrell, Tacoma Public
Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Marc Donaldson, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Ozan Ferrin, Tacoma Public
Utilities (Tacoma, WA), 3, 1, 4, 5, 6; Terry Gifford, Tacoma Public Utilities (Tacoma, WA), 3, 1, 4, 5, 6; - Jennie Wike, Group Name
Tacoma Power
Answer
Document Name
Comment
Tacoma Power supports the objective of the Project 2019-02 SAR, which includes providing a path to allow the use of modern third-party
data storage and analysis systems. While the use of third-party data storage may be enabled to a degree with these modifications, the
use of third-party analysis systems is likely not. Any managed security provider’s solution would likely be considered an EACMS based on
the current definition, which carries a host of CIP Requirements, not the least of which are found in CIP-004, which would preclude the
use of these services in almost every case.
Tacoma Power suggests modification of the EACMS NERC Glossary definition to split off access control from access monitoring, which
then would allow for requirement applicability based on risk for access control systems versus access monitoring systems.
Likes
Dislikes
1
Snohomish County PUD No. 1, 3, Chaney Holly
0
Response: Thank you for your comment. The EACMS modification is outside the scope of this projects SAR.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
272
Amy Bratkovic - PNM Resources - Public Service Company of New Mexico - 1,3
Answer
Document Name
Comment
PNM Resources appreciates the work of the SDT and the opportunity to provide feedback.
Likes
0
Dislikes
0
Response: Thank you for your support.
Joshua Andersen - Salt River Project - 1,3,5,6 - WECC
Answer
Document Name
Comment
CIP-004 R6.2, in the Measures, suggest removing “Verification that provisioned access is appropriate based on need” – the need is
confirmed by the authorization of access. Also, the measure should align with the requirement 6.2.2, which does not say “based on
need”
Likes
Dislikes
0
0
Response: Thank you for your comment. Evidence should show compliance with all aspects of the requirements, hence the measure
for justification of business need.
Leonard Kula - Independent Electricity System Operator - 2
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
273
Answer
Document Name
Comment
Request clarification on Part 6.2’s Measures. Will auditing / enforcement expect every item? This Measure starts with “Examples of
evidence may include.” Does the SDT mean this “may” is a “shall?” Recommend changing “Examples” to “Example.”
We look forward to seeing the final combined version of this update and the virtualization update.
Likes
0
Dislikes
0
Response: Evidence should show compliance with all aspects of the requirements, and that measure is one example of the several
items of evidence that would do so.
Ruida Shu - Northeast Power Coordinating Council - 1,2,3,4,5,6,7,8,9,10 - NPCC, Group Name NPCC Regional Standards Committee
Answer
Document Name
Comment
Request clarification on Part 6.2’s Measures. Will auditing/enforcement expect every item? This Measure starts with “Examples of
evidence may include.” Does the SDT mean this “may” is a “shall?” Recommend changing “Examples” to “Example.”
We look forward to seeing the final combined version of this update and the virtualization update.
Likes
Dislikes
0
0
Response: Evidence should show compliance with all aspects of the requirements, and that measure is one example of the several
items of evidence that would do so.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
274
Jodirah Green - ACES Power Marketing - 1,3,4,5,6 - MRO,WECC,Texas RE,SERC,RF, Group Name ACES Standard Collaborations
Answer
Document Name
Comment
We would like to thank the SDT for allowing us to comment.
Likes
0
Dislikes
0
Response: Thank you for your support.
Jennifer Bray - Arizona Electric Power Cooperative, Inc. - 1
Answer
Document Name
Comment
Thank you for the opportunity to comment.
Likes
Dislikes
0
0
Response: Thank you for your support.
Jennifer Flandermeyer - Jennifer Flandermeyer On Behalf of: Allen Klassen, Evergy, 6, 1, 3, 5; Derek Brown, Evergy, 6, 1, 3, 5; Marcus
Moor, Evergy, 6, 1, 3, 5; Thomas ROBBEN, Evergy, 6, 1, 3, 5; - Jennifer Flandermeyer
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
275
Answer
Document Name
Comment
Evergy supports and endorses the comments filed by the Edison Electric Institute.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Benjamin Winslett - Georgia System Operations Corporation - 4
Answer
Document Name
Comment
These changes are viewed as an overall improvement to the requirements around BCSI in CIP-004 and CIP-011. However, it would be
more effective if these requirements were integrated into the existing framework of CIP-004 R4 and R5 rather than creating a new
requirement R6. As it is now proposed, entities will need to recognize that authorizations are now covered in R4 and R6, periodic access
reviews now exist in R4 and R6, and revocations are required in both R5 and R6. While the requirements are outlined reasonably, this
separation creates a new burden on readability of the standards and training new staff regarding compliance expectations.
Likes
Dislikes
1
Georgia Transmission Corporation, 1, Davis Greg
0
Response: Thank you for your comments. The SDT does support an Entities ability to leverage third-party audit reports to assess the
risk and controls for to demonstrate compliance with CIP-011-X R1 Part 1.2. The Implementation Guidance will reflect this approach.
ion of business need. The SDT felt it was out of scope to make changes to 4.1 that were not related to BCSI, but encourage entities to
include justification of business need for that part as well.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
276
Rachel Coyne - Texas Reliability Entity, Inc. - 10
Answer
Document Name
Comment
Texas RE is concerned by now explicitly including the concept of confidentiality in CIP-011, Part 1.2, the SDT has inadvertently removed
the concept of integrity from the scope of the proposed CIP-011. As noted in Texas RE’s response to Question 6, the current approved
language in CIP-011 that states “storage, transit, and use” in Part 1.2 supports the concept of integrity. Texas RE recommends adding
“and integrity” after confidentiality in Requirement Part 1.2.
Texas RE also recommends including a bright line criteria for determining usability of BCSI to CIP-011 Requirement Part 1.2 should be
established to ensure consistent application of the standard.
Likes
0
Dislikes
0
Response: Thank you for your comment. The integrity concern is beyond the scope of this SAR and it is not the intent of the SDT to
include Integrity requirements/objectives in this draft. Furthermore, the security objective of the BCSI requirements is to protect BES
Cyber Systems. If the confidentiality of the BCSI is protected, then the risk of BCSI being misused by a bad actor and that bad actor
impacting BES Cyber Systems is also protected and the security goal has been achieved.
Gladys DeLaO - CPS Energy - 1,3,5
Answer
Document Name
Comment
CPS Energy does not have any additional comments at this time.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
277
Likes
0
Dislikes
0
Response
Brandon Gleason - Electric Reliability Council of Texas, Inc. - 2
Answer
Document Name
Comment
ERCOT hereby incorporates the comments filed by the ISO/RTO Council Standards Review Committee. In addition the ISO/RTO Council
comments, ERCOT offers the following additional comments. First, with respect to Reliability Standard CIP-004-x, Requirement 6, Parts
6.1 and 6.2, the concept of roles should be allowed to be consistent with Requirement R4. This could be addressed in the requirement
language or accompanying measure. If this is not permitted, ERCOT would appreciate an explanation explain why in the consideration of
comments. Second, ERCOT believes the SDT should address the ability to use third-party audit reports in verifying the controls for third
parties. Similarly, ERCOT would appreciate an explanation whether this is allowed or not, and why.
Likes
0
Dislikes
0
Response: Thank you for your comments. The SDT does support an Entities ability to leverage third-party audit reports to assess the
risk and controls for to demonstrate compliance with CIP-011-X R1 Part 1.2. The Implementation Guidance will reflect this approach.
ion of business need. The SDT felt it was out of scope to make changes to 4.1 that were not related to BCSI, but encourage entities to
include justification of business need for that part as well.
Constantin Chitescu - Ontario Power Generation Inc. - 5
Answer
Document Name
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
278
Comment
OPG supports NPCC Regional Standards Committee’s comments, and has the following additional comments:
CIP 004-X 4.1 requires entity to have a “process”; where 6.1 requires the entity to authorize but a “process” is not required. Both
requirements seem to have similar intent with 4.1 applying to the Applicable System and 6.1 applying to BSCI. Please provide clarification
whether the discrepancy is intentional.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to NPCC RSC. Both requirements do have similar intent in that authorization is required prior
to provisioning access, and the discrepancy is intentional.
Michael Brytowski - Great River Energy - 1,3,5,6
Answer
Document Name
Comment
1. Resulting from our comments in Q1, we suggest changing “provisioned access” to “access to BCSI” for whole R6 and its parts. Except
our suggested changes to R6 Part 6.1, we also have the following recommendations for R6 Part 6.2 and 6.3:
• For changes to R6 Part 6.2:
Verify at least once every 15 calendar months that all individuals with access to BCSI:
6.2.1. have an Is authorization record;
6.2.2. Is still need the access to BCSI to perform their current work functions, appropriate based on need, as determined by the
Responsible Entity.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
279
• For changes to R6 Part 6.3:
For termination actions, remove the individual’s ability to access to BCSI (unless already revoked according to Part 5.1) by the end of the
next calendar day following the effective date of the termination action.
We believe “access to BCSI” provides the flexibility for authorizing, verifying, and revoking access” to BCSI using various approaches
including BCSI repositories and BCSI files, which make the R6 backwards compatible.
2. The SDT may consider cleaning up the language to potentially the following language:
R6. Each Responsible Entity shall implement an access management program(s) to authorize, verify, and revoke access to BCSI pertaining
to the “Applicable Systems” identified in CIP-004-X Table R6 – Access Management for BES Cyber System Information - that collectively
include each of the applicable requirement parts in CIP004-X Table R6 – Access Management for BES Cyber System Information.
[Violation Risk Factor: Medium] [Time Horizon: Same Day Operations and Operations Planning]
Revised Language Recommendations
6.1 Prior to authorization (unless already authorized according to Part 4.1.) based on need, as determined by the Responsible Entity,
except for CIP Exceptional Circumstances:
6.1.1. Electronic access to electronic BCSI; and
6.1.2. Physical access to physical BCSI. Note: Access is to be considered the result of the specific actions taken to provide an individual(s)
the means to access BCSI (e.g., may include physical keys or access cards, user accounts and associated rights)
6.2 Verify at least once every 15 calendar months that all individuals with access to BCSI:
6.2.1. Have a current authorization record; and
6.2.2. A justification for authorization to perform their current work functions, as determined by the Responsible Entity.
Likes
Dislikes
0
0
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
280
Response: Thank you for your comment. Based on the comments received and ballot results, the SDT determined the language is
sufficient as written.
Larry Heckert - Alliant Energy Corporation Services, Inc. - 4
Answer
Document Name
Comment
Alliant Energy supports comments submitted by EEI.
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Bobbi Welch - Midcontinent ISO, Inc. - 2, Group Name ISO/RTO Council Standards Review Committee 2019-02 BCSI Access Management
(Draft 3)
Answer
Document Name
2019-02_Unofficial_Comment_Form_BCSI Access Management_IRC SRC_05-10-21_FINAL.docx
Comment
CIP-011-X, Part 1.2, Measures: The IRC SRC recommends the SDT clarify that encrypted information, also known as cipher text, is not
BCSI.
Examples of evidence for off-premise BCSI may include, but are not limited to, the following:
• Implementation of electronic technical method(s) to protect electronic BCSI (e.g., data masking, encryption, hashing, tokenization,
electronic key management); or
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
281
Note: MISO abstains from the response to item 9.
Likes
0
Dislikes
0
Response: Thank you for your comment. Based on the favorable votes, the SDT does not plan to make substatitive changes.
Gail Elliott - Gail Elliott On Behalf of: Michael Moltane, International Transmission Company Holdings Corporation, 1; - Gail Elliott
Answer
Document Name
Comment
ITC supports the response submitted by EEI
Likes
0
Dislikes
0
Response: Please see the SDT’s response to EEI.
Roger Fradenburgh - Roger Fradenburgh On Behalf of: Nicholas Lauriat, Network and Security Technologies, 1; - Roger Fradenburgh
Answer
Document Name
Comment
N&ST has two additional comments, and associated recommendations, to respectfully offer.
The first comment is that in our opinion, the proposed changes do not address one of the project’s stated goals, which is “…to clarify the
protections expected when utilizing third‐party solutions (e.g., cloud services).” N&ST is aware of the SDT’s desire to avoid writing overly
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
282
prescriptive requirements, such as was done in the first set of proposed revisions to CIP-011, but we nonetheless believe the issue of who
is creating, and has the potential ability to use, authentication credentials such as encryption keys must be addressed in the Standards in
one or more Requirements (vs. in “Measures” or guidance documents). We are aware of one Responsible Entity that was found by a
Regional Entity audit team to be out of compliance with CIP-004 for storing BCSI in the cloud and relying on the cloud service provider’s
default encryption. Simply dropping “storage locations” from CIP-004 would not, by itself, have helped the Responsible Entity avoid this
problem. N&ST therefore recommends the following or similar language be added to either CIP-004 or CIP-011:
“The Responsible Entity shall ensure that all individuals, including those affiliated with third parties such as vendors and cloud service
providers, who possess the means to obtain and use BCSI that is protected by one or more electronic and/or physical access controls
(login credentials, unlock passwords, encryption keys, cardkeys, brass keys, etc.) have been authorized in accordance with CIP-004
requirements.”
N&ST’s second comment is that we are concerned there is insufficient clarity with regards to what distinguishes “provisioning” from
“sharing.” During the recent SDT webinar, a member of the SDT gave listeners a good example: (paraphrasing) Person A, who has been
provisioned access to a file cabinet and has a key, opens it and gives a BCSI document to Person B, who has not been authorized for
access to the file cabinet and cannot open it. Person A has shared BCSI with Person B. The SDT has already created a contextual definition
of “access to BCSI.” N&ST recommends that a similar contextual definition of “sharing” be added to either CIP-004 or CIP-011, working off
the example the SDT itself created.
Likes
Dislikes
0
0
Response: Thank you for your comment. According to Requirement R6, Part 6.1, the Responsible Entity must authorize individuals to
be given provisioned access to BCSI. First, the Responsible Entity determines who needs the ability to obtain and use BCSI for
performing legitimate work functions. Next, a person empowered by the Responsible Entity to do so authorizes—gives permission or
approval for—those individuals to be given provisioned access to BCSI. Only then would the Responsible Entity provision access to
BCSI as authorized.
Provisioned access is to be considered the result of specific actions taken to provide an individual the means to access BCSI (e.g.,
physical keys or access cards, user accounts and associated rights and privileges, encryption keys, etc.). In the context of this
requirement, an individual is considered to have been provisioned access if they concurrently have the means to both obtain and use
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
283
the BCSI. To illustrate, an individual who can obtain encrypted BCSI but does not have the encryption keys to be able to use the BCSI
has not been provisioned access to the BCSI.
CIP-004 focuses on protection for provisioned accses and does not in any way state sharing.
Lindsay Wickizer - Berkshire Hathaway - PacifiCorp - 6
Answer
Document Name
Comment
Recommend creating a NERC Glossary defined term for “Provisioned Access.”
“Physical BCSI” is not a defined term.
“Storage Locations” is no longer explicitly stated.
The language should be re-scoped to focus on management of access to designated repositories
We appreciate all the time and effort given to this project to develop these revisions/changes.
However, if you are approving a new set of Standards, we recommend that the Technical Guidance is also published at the same time.
The excessive delay between these publications, is causing industry confusion.
The VSL – this is excessively severe (Proposed VSLs are based on a single violation and not cumulative violations.)
Recommend:
Use the same language as previously in R4:
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
284
R4: Operations Planning and Same Day Operations – VRF Medium The Responsible Entity did not verify that individuals with active
electronic or active unescorted physical access have authorization records during a calendar quarter but did so less than 10 calendar days
after the start of a subsequent calendar quarter. (4.2)
Authorize happens prior to provisioning access R6.R1 – See Note: The SDT is relying HEAVILY on the CMEP guide for definition
parameters, and not the STD language.
Clarify BOTH CIP-004 & CIP-011 requirements relating to managing access and protecting BCSI.
Likes
0
Dislikes
0
Response: Thank you for your comments. Based on the comments received and ballot results, the SDT determined the language is
sufficient as written.
Mark Gray - Edison Electric Institute - NA - Not Applicable - NA - Not Applicable
Answer
Document Name
Comment
EEI is concerned with having two separate requirements within CIP-004-X that address access removal. (See Requirement R5 (BCS) and R6
(BCSI) While we understand the intent and reasons for this change, often access is provided to individuals for both BCS and BCSI and any
failure in the termination of access in these cases will result in two violations for the same error. We recommend that this issue be
reconciled.
Likes
Dislikes
0
0
Response: Thank you for your comments. The SDT determined that the term “provisioned” does not need to be defined. Provision or
provisioned access is a well-known term among technical subject matter experts who provision access or deprovision access as a part
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
285
of their job. This is an industry-proven and accepted term that aligns with security best practices and industry frameworks, which is
best maintained as a non-defined term.
Jose Avendano Mora - Edison International - Southern California Edison Company - 1
Answer
Document Name
Comment
See comments submitted by Edison Electric Institute
Likes
0
Dislikes
0
Response: Please see the SDT”s response to EEI.
Thomas Standifur - Austin Energy - 1,3,4,5,6
Answer
Document Name
TPWR_2019-02_Unofficial_Comment_Form_2021-05-10.docx20210504-17090-hsevrj.docx
Comment
Likes
0
Dislikes
0
Response
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
286
Comments received from Basin Electric Power Cooperative
1. The standards drafting team (SDT) considered industry’s concerns about the phrase “provisioning of access” requesting clarity on this
terminology. The SDT added “authorize, verify, and revoke provisioned access” to the parent requirement CIP-004-X, Requirement R6, and
changed “provisioning of access” to “provisioned access” in the requirement parts. This should clarify the intent that it is a noun which
scopes what the Registered Entity must authorize, verify, and revoke, rather than a verb relating to how provisioning should occur. That
is up to the entity to determine. Do you agree with the proposed change? If not, please provide the basis for your disagreement and an
alternate proposal.
Yes
No
Comments: The term “provisioned access” adds another undefined term to the NERC standards and doesn’t provide a clear path to
regulatory off-prem or cloud data center services as proposed in the SAR. The only methods to control access to off-prem (cloud) BCSI
is either by 1) encrypting BCSI or 2) purchasing services which allow the entity to manage the off-prem authentication systems –
thereby preventing 3rd party systems administrators or others from compromising entity BCSI stored in cloud data centers. Option 2 is
highly unlikely.
a. “Provisioned access” creates a security loophole whereas entities only require authorization for a provisioned access. For
example, if access to BCSI is not provisioned, no authorization to BCSI is required. This does not meet the goal of SAR for
controlling access to BCSI. Given the R6 definition whereas “access to BCSI” occurs when an individual has both “the ability to
obtain and use BCSI,” we recommend changing “provisioned access” to “access to BCSI”.
b. The term “unless already authorized according to Part 4.1” should be removed. Why? Because having authorized access to CIP
Cyber Assets does not preclude the authorization for having access to BCSI.
c. The use of “provisioned, provision or provisioning” of “access,” regardless of tense, would require entities to be audited to,
maintain, and provide documented lists of people and the “provisioned” configurations of entity BES Cyber System Information
repositories in order to “verify” the “authorization” of such provisioned access. The Measures section highlights this expectation
where evidence may include individual records, or lists of whom is authorized. To achieve this evidence, entities would need to
provide evidence of systems accounts of on-premises or off premises system repositories of BCSI. Cloud providers will not provide
such lists of personnel who have administrative level access to cloud BCSI server repositories and entities will be unable to verify
what 3rd party off-prem systems administrators have access to BCSI, yet entities will be asked to provide this information for an
entire audit cycle
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
287
d. The current language requiring entities to 1) identify repositories and 2) authorize access based on need can also work for 3rd
party off-prem or cloud locations without requiring lists of personnel or configurations of systems accounts for repositories of
BCSI. (see recommendations)
Recommendations:
1. Focus only on addressing electronic and physical access to BCSI in off-prem or cloud situations.
2. Consider the following language for R6 Part 6.1:
Authorize access to BCSI based on need, as determined by the Responsible Entity, except for CIP Exceptional Circumstances. Access
to BCSI includes:
6.1.1. Electronic access to electronic BCSI;
6.1.2 Physical access to physical BCSI;
6.1.3 Physical access to unencrypted electronic BCSI (See our comments in Q4).
3. Consider using the perspective of language in CIP-011 “ to prevent unauthorized access to BES Cyber System Information.” This
allows entities to determine the risk and methods to protect BCSI
4. Consider using “authentication systems or encryption of BCSI” for personnel accessing electronic BCSI on cloud prem providers
locations.
2. The SDT considered industry’s concerns about the absence of “obtain and use” language from the CMEP Practice Guide, which currently
provides alignment on a clear two-pronged test of what constitutes access in the context of utilizing third-party solutions (e.g., cloud
services) for BCSI. The SDT mindfully mirrored this language to assure future enforceable standards are not reintroducing a gap. Do you
agree this clarifying language makes it clear both parameters of this two-pronged test for “obtain and use” must be met to constitute
“access” to BCSI? If not, please provide the basis for your disagreement and an alternate proposal.
Yes
No
Comments:
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
288
a. We agree to adding “obtain and use” language to clarify what constitutes an access to BCSI, but disagree to the use of “provisioned
access”. After clarifying the access to BCSI, the language “provisioned” should be removed since it has a security flaw and requires
extensive records from repositories of BCSI (See our comments in Q1).
Recommendations:
1. Only use the term “access” as recommended in Q1
3. The SDT considered industry comments regarding the removal of storage locations. The SDT must enable the CIP standards for the use of
third-party solutions (e.g., cloud services) for BCSI, and retention of that language hinders meeting those FERC directives. The absence of
this former language does not preclude an entity from defining storage locations as the method used within an entity’s access
management program. CIP-004-X, Requirement R6, is at an objective level to permit more than that one approach. Do you agree the
requirement retains the flexibility for storage locations to be used as one way to meet the objective? If not, please provide the basis for
your disagreement and an alternate proposal.
Yes
No
Comments:
a. We agree to retaining the flexibility for storage locations to be used as one way to meet the objective of SAR, but disagree to using
“provisioned access” (See our comments regarding “provisioned access” in Q1).
b. The requirement to provide lists of personnel with “provisioned access” would also require entities to identify the locations of BCSI
and by auditors whom are required to make the link between the repository of BCSI which has been provisioned for access.
Recommendation:
Retain the current language and focus on auditable methods to protect BCSI at 3rd party off-prem (cloud) locations.
4. To address industry comments while also enabling entities to use third-party solutions (e.g., cloud services) for BCSI, in CIP-004-X,
Requirement R6 Part 6.1, the SDT made a distinction between “electronic access to electronic BCSI” versus “physical access to physical
BCSI”. This clarifies physical access alone to hardware containing electronic BCSI, which is protected with methods that do not permit an
individual to concurrently obtain and use the electronic BCSI, is not provisioned access to electronic BCSI. Do you agree with the proposed
change? If not, please provide the basis for your disagreement and an alternate proposal.
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
289
Yes
No
Comments:
We disagree that the physical access only applies to physical BCSI since controlling access to unencrypted BCSI has not been addressed
but will be required for 3rd party off-prem (cloud) repositories. The physical access to Cyber Assets is a fast avenue to owning the
unencrypted electronic BCSI it contains, which meets “obtain and use” condition and constitutes an access to BCSI.
Recommendation:
Adding “Physical access to unencrypted electronic BCSI” to R6 Part 6.1.3 (See our suggested R6 Part 6.1 changes in Q1).
5. The SDT considered industry comments about defining the word “access”. “Access” is broadly used across both the CIP and Operations &
Planning Standards (e.g., open access) and carries different meanings in different contexts. Therefore, the SDT chose not to define “access”
in the NERC Glossary of Terms. Instead, the SDT used the adjective “provisioned” to add context, thereby scoping CIP-004-X, Requirement
R6. Do you agree the adjective “provisioned” in conjunction with the “Note” clarifies what “provisioned access” is? If not, please provide
the basis for your disagreement and an alternate proposal.
Yes
No
Comments:
a. Given that the SDT has defined “access to BCSI” in R6, and the term “provisioned access” should be removed due to the creation of
an unintended security loophole (See our comments in Q1).
b. Access, which occurs in CIP standards language, whether it is electronic and/or logical access, physical access, unescorted physical
access, remote access, or interactive remote access is clearly understood, has been widely adopted by industry and regulators, and
has been subject to hundreds of audits across all regions for the past 14 years. Entities have developed internal documentation,
configured systems, implemented controls tasks and standardized programs on these terms. The adjective “provisioned” adds
further terms, requires changes and is of little value regarding the actions required of entities and the output deliverables or
evidence.
Recommendation:
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
290
1. Revise the language to focus on access to BCSI and the auditable methods to protect BCSI at 3rd party off-prem (cloud) locations.
6. In response to industry concerns regarding double jeopardy or confusion with CIP-013, the SDT removed CIP-011-X, Requirement R1 Parts
1.3 and 1.4, in favor of simplifying CIP-011-X, Requirement R1 Part 1.1, and adjusting Part 1.2 to broaden the focus around the
implementation of protective methods and secure handling methods to mitigate risks of compromising confidentiality. Do you agree with
the proposed changes? If not, please provide the basis for your disagreement and an alternate proposal.
Yes
No
Comments: does not explain Prior language in the Rationale for Modifications to Requirement R1, Part 1.2 “By removing this language,
methods to protect BCSI becomes explicitly comprehensive.”
7. The SDT extended the implementation plan to 24-months in an attempt to align with the Project 2016-02 modifications that are on the
same drafting timeline, and added an optional provision for early adoption. Do you agree this approach gives industry adequate time to
implement without encumbering entities who are planning to, or are already using, third-party solutions (e.g., cloud services) for BCSI? If
not, please provide the basis for your disagreement and an alternate proposal.
Yes
No
Comments:
8. In looking at all proposed recommendations from the standard drafting team, are the proposed changes a cost-effective approach?
Yes
No
Comments:
9. Please provide any additional comments for the SDT to consider, if desired.
Comments:
1. Resulting from our comments in Q1, we suggest changing “provisioned access” to “access to BCSI” for whole R6 and its parts. Except
our suggested changes to R6 Part 6.1, we also have the following recommendations for R6 Part 6.2 and 6.3:
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
291
•
For changes to R6 Part 6.2:
Verify at least once every 15 calendar months that all individuals with access to BCSI:
6.2.1. have an Is authorization record;
6.2.2. Is still need the access to BCSI to perform their current work functions, appropriate based on need, as determined by the
Responsible Entity.
•
For changes to R6 Part 6.3:
For termination actions, remove the individual’s ability to access to BCSI (unless already revoked according to Part 5.1) by the
end of the next calendar day following the effective date of the termination action.
We believe “access to BCSI” provides the flexibility for authorizing, verifying, and revoking access” to BCSI using various approaches
including BCSI repositories and BCSI files, which make the R6 backwards compatible.
2. The SDT may consider cleaning up the language to potentially the following language:
R6. Each Responsible Entity shall implement an access management program(s) to authorize, verify, and revoke access to BCSI
pertaining to the “Applicable Systems” identified in CIP-004-X Table R6 – Access Management for BES Cyber System Information that collectively include each of the applicable requirement parts in CIP004-X Table R6 – Access Management for BES Cyber System
Information.
[Violation Risk Factor: Medium] [Time Horizon: Same Day Operations and Operations Planning]
Part
Revised Language Recommendations
6.1
Prior to authorization (unless already authorized according to Part 4.1.) based on
need, as determined by the Responsible Entity, except for CIP Exceptional
Circumstances:
6.1.1. Electronic access to electronic BCSI; and
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
292
6.1.2. Physical access to physical BCSI. Note: Access is to be considered the
result of the specific actions taken to provide an individual(s) the means to
access BCSI (e.g., may include physical keys or access cards, user accounts and
associated rights)
6.2
Verify at least once every 15 calendar months that all individuals with access to
BCSI:
6.2.1. Have a current authorization record; and
6.2.2. A justification for authorization to perform their current work functions,
as determined by the Responsible Entity.
End of Report
Consideration of Comments | Project 2019-02 BCSI
[Insert posting date here]
293
REMINDER
Standards Announcement
Project 2019-02 BES Cyber System Information Access
Management
Additional Ballots and Non-binding Polls Open through May 10, 2021
Now Available
Additional ballots and non-binding polls for the associated Violation Risk Factors and Violation
Severity Levels are open through 8 p.m. Eastern, Monday, May 10, 2021 for the following:
•
CIP-004-X – Cyber Security - Personnel & Training
•
CIP-011-X – Cyber Security - Information Protection
•
Implementation Plan
Due to projects 2019-02 BES Cyber System Information Access Management (BCSI) and 2016-02
Modification to CIP Standards (2016-02) both modifying CIP-004 and CIP-011, an “-X” has been added in
place of the version numbers for BCSI and a “-Y” for the 2016-02 standards. Once both projects are
completed, they will be combined together into one version, prior to submission to the NERC Board.
Balloting
Ballot pool members can log into the Standards Balloting and Commenting System (SBS) and submit
votes.
Note: Votes cast in the previous ballots will not carry over to the additional ballots. It is the
responsibility of the registered voter in the ballot pool(s) to vote again.
•
Contact NERC IT support directly at https://support.nerc.net/ (Monday – Friday, 8 a.m. - 5 p.m.
Eastern) for problems regarding accessing the SBS due to a forgotten password, incorrect
credential error messages, or system lock-out.
•
Passwords expire every 6 months and must be reset.
•
The SBS is not supported for use on mobile devices.
•
Please be mindful of ballot and comment period closing dates. We ask to allow at least 48 hours
for NERC support staff to assist with inquiries. Therefore, it is recommended that users try logging
into their SBS accounts prior to the last day of a comment/ballot period.
Next Steps
The ballot results will be announced and posted on the project page. The drafting team will review all
responses received during the comment period and determine the next steps of the project.
RELIABILITY | RESILIENCE | SECURITY
For more information on the Standards Development Process, refer to the Standard Processes Manual.
For more information or assistance, contact Senior Standards Developer, Jordan Mallory (via email) or at
(404) 446-2589. Subscribe to this project's observer mailing list by selecting "NERC Email Distribution Lists"
from the "Service" drop-down menu and specify “Project 2019-02 BCSI Observer List” in the Description
Box.
North American Electric Reliability Corporation
3353 Peachtree Rd, NE
Suite 600, North Tower
Atlanta, GA 30326
404-446-2560 | www.nerc.com
Standards Announcement
Project 2019-02 BCSI | March 25, 2021
2
Standards Announcement
Project 2019-02 BES Cyber System Information Access
Management
Formal Comment Period Open through May 10, 2021
Now Available
A 45-day formal comment period is open through 8 p.m. Eastern, Monday, May 10, 2021 for the
following:
•
CIP-004-X – Cyber Security - Personnel & Training
•
CIP-011-X – Cyber Security - Information Protection
•
Implementation Plan
Due to projects 2019-02 BES Cyber System Information Access Management (BCSI) and 2016-02
Modification to CIP Standards (2016-02) both modifying CIP-004 and CIP-011, an “-X” has been added in
place of the version numbers for BCSI and a “-Y” for the 2016-02 standards. Once both projects are
completed, they will be combined together with one version, prior to submission to the NERC Board.
The standard drafting team’s considerations of the responses received from the previous comment
period are reflected in these drafts of the standards.
Commenting
Use the Standards Balloting and Commenting System (SBS) to submit comments. An unofficial Word
version of the comment form is posted on the project page.
•
Contact NERC IT support directly at https://support.nerc.net/ (Monday – Friday, 8 a.m. - 5 p.m.
Eastern) for problems regarding accessing the SBS due to a forgotten password, incorrect
credential error messages, or system lock-out.
•
Passwords expire every 6 months and must be reset.
•
The SBS is not supported for use on mobile devices.
•
Please be mindful of ballot and comment period closing dates. We ask to allow at least 48 hours
for NERC support staff to assist with inquiries. Therefore, it is recommended that users try logging
into their SBS accounts prior to the last day of a comment/ballot period.
Next Steps
Additional ballots for the standards and non-binding polls of the associated Violation Risk Factors and
Violation Severity Levels will be conducted April 30 – May 10, 2021.
RELIABILITY | RESILIENCE | SECURITY
For more information on the Standards Development Process, refer to the Standard Processes Manual.
Subscribe to this project's observer mailing list by selecting "NERC Email Distribution Lists" from the
"Service" drop-down menu and specify “Project 2019-02 BCSI Observer List” in the Description Box. For
more information or assistance, contact Senior Standards Developer, Jordan Mallory (via email) or at (404)
446-2589.
North American Electric Reliability Corporation
3353 Peachtree Rd, NE
Suite 600, North Tower
Atlanta, GA 30326
404-446-2560 | www.nerc.com
Standards Announcement
Project 2019-02 BCSI | March 25, 2021
2
NERC Balloting Tool
Dashboard
Users
Registered Ballot Body
Proxy Ballot Body
My User Profile
Ballots
Ballot Events
Ballot Results
Comment Forms
View Comment Forms
Login / Register
Ballot Results
Comment: View Comment Results
Ballot Name:
2019-02 BES Cyber System Information Access Management CIP-004-7 AB 3 ST
Voting Start Date:
4/30/2021 12:01:00 AM
Voting End Date:
5/10/2021 8:00:00 PM
Ballot Type:
ST
Ballot Activity:
AB
Ballot Series:
3
Total # Votes:
231
Total Ballot Pool:
274
Quorum:
84.31
Quorum Established Date:
5/10/2021 4:48:09 PM
Weighted Segment Value:
83.75
Actions
Actions
Negative
Fraction w/
Comment
Ballot Segment Affirmative Affirmative Negative Votes
Segment
Pool Weight
Votes
Fraction w/ Comment
Segment:
77
1
Segment:
2
2
Segment:
60
3
Segment:
17
4
Segment:
67
5
Segment:
44
6
Segment:
0
7
Segment:
1
8
Negative Votes
No
Abstain
w/o Comment
Vote
1
40
0.8
10
0.2
2
9
16
0.2
1
0.1
1
0.1
0
0
0
1
40
0.833
8
0.167
0
4
8
1
11
1
0
0
0
2
4
1
43
0.827
9
0.173
0
7
8
1
23
0.697
10
0.303
0
4
7
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
Segment:
0
9
Segment:
6
10
Totals: 274
0
0
0
0
0
0
0
0
0.6
6
0.6
0
0
0
0
0
5.8
164
4.857
38
0.943
2
27
43
Ballot Pool Members
Segment
3
6
Organization
Voter
Designated
Proxy
3
Con Ed - Consolidated Edison Co. of New York Peter Yost
Con Ed - Consolidated Edison Co. of New York Cristhian Godoy
Constantin
Ontario Power Generation Inc.
Chitescu
Brian EvansUtility Services, Inc.
Mongeon
Ameren - Ameren Services
David Jendras
WEC Energy Group, Inc.
Thomas Breene
Edison International - Southern California Edison
Selene Willis
Company
MEAG Power
Roger Brand
Scott Miller
Con Ed - Consolidated Edison Co. of New York Avani Pandya
MEAG Power
David Weekley Scott Miller
IDACORP - Idaho Power Company
Mike Marshall
Seminole Electric Cooperative, Inc.
Jonathan Robbins
Con Ed - Consolidated Edison Co. of New York Dermot Smyth
WEC Energy Group, Inc.
David Hathaway
Independent Electricity System Operator
Leonard Kula
Massachusetts Municipal Wholesale Electric
Anthony Stevens
Company
Sempra - San Diego Gas and Electric
Bridget Silvia
3
Basin Electric Power Cooperative
5
4
3
3
5
3
5
1
1
4
1
6
2
5
Jeremy Voll
5
1
Edison International - Southern California Edison
Romel Aquino
Company
NRG - NRG Energy, Inc.
Patricia Lynch
National Grid USA
Michael Jones
1
Western Area Power Administration
3
1
1
6
6
3
5
sean erickson
Edison International - Southern California Edison Jose Avendano
Company
Mora
Ameren - Ameren Services
Tamara Evey
Ameren - Ameren Services
Robert Quinlivan
Black Hills Corporation
Brooke Voorhees
National Grid USA
Brian Shanahan
Ameren - Ameren Missouri
Sam Dwyer
Barry Jones
NERC
Memo
Affirmative N/A
Affirmative N/A
Ballot
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Affirmative N/A
None
N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
1
6
5
4
Balancing Authority of Northern California
Sacramento Municipal Utility District
Sacramento Municipal Utility District
Sacramento Municipal Utility District
1
Sacramento Municipal Utility District
3
6
Sacramento Municipal Utility District
International Transmission Company Holdings
Corporation
Seattle City Light
3
Puget Sound Energy, Inc.
6
3
3
4
5
1
Kevin Smith
Jamie Cutlip
Nicole Goi
Beth Tincher
Arthur
Starkovich
Nicole Looney
Joe Tarantino Affirmative N/A
Joe Tarantino Affirmative N/A
Joe Tarantino Affirmative N/A
Joe Tarantino Affirmative N/A
Joe Tarantino Affirmative N/A
Joe Tarantino Affirmative N/A
Michael Moltane Gail Elliott
Affirmative N/A
Abstain
PPL - Louisville Gas and Electric Co.
PPL - Louisville Gas and Electric Co.
APS - Arizona Public Service Co.
Seattle City Light
Puget Sound Energy, Inc.
Brian Belger
Nicolas
Pacholski
Linn Oelker
James Frank
Jessica Lopez
Hao Li
Lynn Murphy
6
Western Area Power Administration
Erin Green
5
3
1
1
Sempra - San Diego Gas and Electric
Tennessee Valley Authority
Tennessee Valley Authority
Nebraska Public Power District
10
New York State Reliability Council
1
4
5
City Utilities of Springfield, Missouri
City Utilities of Springfield, Missouri
Avista - Avista Corporation
1
SaskPower
1
Allete - Minnesota Power, Inc.
1
APS - Arizona Public Service Co.
10
Midwest Reliability Organization
5
APS - Arizona Public Service Co.
Jennifer Wright
Ian Grant
Gabe Kurtz
Jamison Cawley
ALAN
ADAMSON
Michael Bowman
John Allen
Glen Farmer
Wayne
Guttormson
Jamie Monette
Daniela
Atanasovski
William Steiner
Michelle
Amarantos
6
6
5
1
3
3
6
Public Utility District No. 2 of Grant County,
Washington
APS - Arizona Public Service Co.
Public Utility District No. 2 of Grant County,
Washington
Dairyland Power Cooperative
Berkshire Hathaway Energy - MidAmerican
Energy Co.
Tacoma Public Utilities (Tacoma, WA)
Tennessee Valley Authority
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
LeRoy Patterson
Affirmative N/A
Marcus Bortman
Affirmative N/A
Amy Jones
Affirmative N/A
Steve Ritscher
Abstain
Darnez Gresham
Affirmative N/A
N/A
Marc Donaldson Jennie Wike Affirmative N/A
Marjorie Parsons
Affirmative N/A
5
1
4
5
Austin Energy
Puget Sound Energy, Inc.
WEC Energy Group, Inc.
Platte River Power Authority
1
Glencoe Light and Power Commission
1
Network and Security Technologies
Michael Dillard
Chelsey Neil
Matthew Beilfuss
Tyson Archie
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
No Comment
Terry Volkmann
Negative
Submitted
Roger
Comments
Nicholas Lauriat
Negative
Fradenburgh
Submitted
1
1
Public Utility District No. 1 of Pend Oreille
County
Seattle City Light
Eversource Energy
6
Basin Electric Power Cooperative
Jerry Horner
1
Minnkota Power Cooperative Inc.
Theresa Allard
3
3
6
1
3
1
5
Associated Electric Cooperative, Inc.
Platte River Power Authority
Associated Electric Cooperative, Inc.
Central Electric Power Cooperative (Missouri)
M and A Electric Power Cooperative
KAMO Electric Cooperative
Associated Electric Cooperative, Inc.
3
Northeast Missouri Electric Power Cooperative
3
3
1
5
4
3
KAMO Electric Cooperative
Sho-Me Power Electric Cooperative
Sho-Me Power Electric Cooperative
Florida Municipal Power Agency
Florida Municipal Power Agency
Florida Municipal Power Agency
6
Florida Municipal Power Agency
1
1
3
Northeast Missouri Electric Power Cooperative
N.W. Electric Power Cooperative, Inc.
NW Electric Power Cooperative, Inc.
1
Hydro One Networks, Inc.
6
5
1
5
Platte River Power Authority
Los Angeles Department of Water and Power
Tacoma Public Utilities (Tacoma, WA)
Brazos Electric Power Cooperative, Inc.
5
Herb Schrayshuen
3
3
Lakeland Electric
Georgia System Operations Corporation
Todd Bennett
Wade Kiess
Brian Ackermann
Michael Bax
Stephen Pogue
Micah Breedlove
Brad Haralson
Skyler
Wiegmann
Tony Gott
Jarrod Murdaugh
Peter Dawson
Chris Gowder
Truong Le
Dan O'Hagan
Truong Le
Carl Turner
Truong Le
Richard
Truong Le
Montgomery
Kevin White
Mark Ramsey
John Stickley
Payam
Mark Ciufo
Farahbakhsh
Sabrina Martz
Glenn Barry
John Merrell
Jennie Wike
Shari Heino
Herb
Schrayshuen
Steve Marshall
Scott McGough
1
Kevin Conway
Abstain
Michael Jang
Quintin Lee
Abstain
N/A
Affirmative N/A
Comments
Negative
Submitted
Andy
Fuhrman
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
None
N/A
None
N/A
None
N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
None
N/A
Affirmative N/A
1
Manitoba Hydro
Bruce Reimer
1
Long Island Power Authority
Isidoro Behar
5
Manitoba Hydro
Yuguang Xiao
3
3
1
5
4
Manitoba Hydro
Los Angeles Department of Water and Power
Tri-State G and T Association, Inc.
Tri-State G and T Association, Inc.
FirstEnergy - FirstEnergy Corporation
3
Tri-State G and T Association, Inc.
5
1
5
6
Talen Generation, LLC
Lakeland Electric
Lakeland Electric
OGE Energy - Oklahoma Gas and Electric Co.
3
Eversource Energy
1
5
1
1
5
1
Tallahassee Electric (City of Tallahassee, FL)
Oglethorpe Power Corporation
Los Angeles Department of Water and Power
Black Hills Corporation
Black Hills Corporation
Seminole Electric Cooperative, Inc.
Mike Smith
Tony Skourtas
Donna Wood
Ryan Walter
Mark Garza
Janelle Marriott
Gill
Donald Lock
Larry Watt
Becky Rinier
Sing Tay
Christopher
McKinnon
Scott Langston
Donna Johnson
faranak sarbaz
Seth Nelson
Derek Silbaugh
Bret Galbraith
6
NiSource - Northern Indiana Public Service Co. Joe O'Brien
3
NiSource - Northern Indiana Public Service Co. Steven Taddeucci
6
New York Power Authority
6
Talen Energy Marketing, LLC
1
1
FirstEnergy - FirstEnergy Corporation
M and A Electric Power Cooperative
3
Dominion - Dominion Resources, Inc.
3
6
3
3
6
Muscatine Power and Water
Muscatine Power and Water
OGE Energy - Oklahoma Gas and Electric Co.
Westar Energy
Westar Energy
Southern Company - Southern Company
Generation
5
Erick Barrios
Jennifer
Hohenshilt
Julie Severino
William Price
Connie
Schroeder
Seth Shoemaker
Nick Burns
Donald Hargrove
Bryan Taggart
Grant Wilkerson
Comments
Submitted
None
N/A
Comments
Negative
Submitted
None
N/A
None
N/A
Affirmative N/A
None
N/A
Affirmative N/A
Negative
Affirmative N/A
Affirmative N/A
None
N/A
None
N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
None
N/A
None
N/A
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Abstain
N/A
Abstain
N/A
Affirmative N/A
None
N/A
None
N/A
James Howell
Affirmative N/A
Negative
6
Manitoba Hydro
Blair Mukanik
5
Tennessee Valley Authority
M Lee Thomas
Aaron
Comments
Submitted
Affirmative N/A
3
FirstEnergy - FirstEnergy Corporation
1
3
6
3
Ghodooshim
OGE Energy - Oklahoma Gas and Electric Co. Terri Pyle
Black Hills Corporation
Don Stahl
PSEG - PSEG Energy Resources and Trade LLC Joseph Neglia
Nebraska Public Power District
Tony Eddleman
5
Northern California Power Agency
Jeremy Lawson
3
CMS Energy - Consumers Energy Company
5
CMS Energy - Consumers Energy Company
4
Georgia System Operations Corporation
1
New York Power Authority
1
OTP - Otter Tail Power Company
5
5
3
3
4
5
PSEG - PSEG Fossil LLC
OTP - Otter Tail Power Company
OTP - Otter Tail Power Company
Owensboro Municipal Utilities
MGE Energy - Madison Gas and Electric Co.
Entergy - Entergy Services, Inc.
Karl Blaszkowski
David
Greyerbiehl
Benjamin
Winslett
Salvatore
Spagnolo
Charles
Wicklund
Tim Kucey
Brett Jacobs
Wendi Olson
Thomas Lyons
Joseph DePoorter
Gail Golden
6
Portland General Electric Co.
Daniel Mason
1
3
1
Muscatine Power and Water
New York Power Authority
BC Hydro and Power Authority
Andy Kurriger
David Rivera
Adrian Andreoiu
1
NiSource - Northern Indiana Public Service Co. Steve Toosevich
5
NiSource - Northern Indiana Public Service Co. Kathryn Tackett
3
6
BC Hydro and Power Authority
Los Angeles Department of Water and Power
Hootan Jarollahi
Anton Vu
1
Omaha Public Power District
Doug Peterchuck
10
1
5
SERC Reliability Corporation
Platte River Power Authority
JEA
Dave Krueger
Matt Thompson
John Babik
2
Electric Reliability Council of Texas, Inc.
Brandon Gleason
6
Seminole Electric Cooperative, Inc.
David Reinecke
5
Imperial Irrigation District
Tino Zaragoza
1
Sunflower Electric Power Corporation
Paul Mehlhaff
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
None
N/A
None
N/A
Abstain
N/A
Abstain
N/A
Affirmative N/A
Stefanie
Burke
Affirmative N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Abstain
N/A
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
None
N/A
Comments
Negative
Submitted
Affirmative N/A
Denise
Sanchez
Affirmative N/A
Negative
Denise
No Comment
Submitted
6
Imperial Irrigation District
Diana Torres
1
5
Public Utility District No. 1 of Chelan County
Public Utility District No. 1 of Chelan County
1
Imperial Irrigation District
3
Public Utility District No. 1 of Chelan County
5
BC Hydro and Power Authority
Ginette Lacasse
Meaghan Connell
Jesus Sammy
Denise
Alcaraz
Sanchez
Joyce Gundry
Helen Hamilton
Harding
5
5
PNM Resources - Public Service Company of
New Mexico
NB Power Corporation
Dairyland Power Cooperative
Berkshire Hathaway Energy - MidAmerican
Energy Co.
Hydro-Qu?bec Production
Tacoma Public Utilities (Tacoma, WA)
3
Imperial Irrigation District
5
3
Portland General Electric Co.
Portland General Electric Co.
5
PPL - Louisville Gas and Electric Co.
5
Berkshire Hathaway - NV Energy
3
Pacific Gas and Electric Company
1
Pacific Gas and Electric Company
1
6
3
5
5
Santee Cooper
Santee Cooper
Santee Cooper
Santee Cooper
WEC Energy Group, Inc.
6
Dominion - Dominion Resources, Inc.
1
1
PPL Electric Utilities Corporation
Gainesville Regional Utilities
5
Lincoln Electric System
4
Tacoma Public Utilities (Tacoma, WA)
6
Northern California Power Agency
1
Portland General Electric Co.
5
Pacific Gas and Electric Company
6
Tacoma Public Utilities (Tacoma, WA)
1
1
5
1
Sanchez
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Lynn Goldstein
None
Nurul Abser
Tommy Drea
Affirmative N/A
Abstain
N/A
Terry Harbour
Affirmative N/A
Carl Pineault
Ozan Ferrin
N/A
Affirmative N/A
Jennie Wike Affirmative N/A
Denise
Glen Allegranza
Affirmative N/A
Sanchez
Ryan Olson
Affirmative N/A
Dan Zollner
Affirmative N/A
JULIE
Affirmative N/A
HOSTRANDER
Kevin Salsbury
Affirmative N/A
Michael
Sandra Ellis
Affirmative N/A
Johnson
Michael
Marco Rios
Affirmative N/A
Johnson
Chris Wagner
Abstain
N/A
Marty Watson
Abstain
N/A
James Poston
Abstain
N/A
Tommy Curtis
Abstain
N/A
Clarice Zellmer
Affirmative N/A
Comments
Sean Bodkin
Negative
Submitted
Michelle Longo
Affirmative N/A
David Owens
Truong Le
None
N/A
Kayleigh
Affirmative N/A
Wilkerson
Hien Ho
Jennie Wike Affirmative N/A
Comments
Dennis Sismaet
Negative
Submitted
Brooke Jockin
Affirmative N/A
Michael
Ed Hanson
Affirmative N/A
Johnson
Terry Gifford
Jennie Wike Affirmative N/A
Donna
6
Great River Energy
1
5
3
NextEra Energy - Florida Power and Light Co.
Southern Company - Southern Company
Matt Carden
Services, Inc.
Choctaw Generation Limited Partnership, LLLP Rob Watson
Seminole Electric Cooperative, Inc.
Jeremy Lorigan
5
Dominion - Dominion Resources, Inc.
Rachel Snead
5
10
Nebraska Public Power District
Northeast Power Coordinating Council
Ronald Bender
Guy V. Zito
6
Berkshire Hathaway - PacifiCorp
Lindsay Wickizer
6
Powerex Corporation
1
American Transmission Company, LLC
4
5
1
3
5
6
1
3
5
Alliant Energy Corporation Services, Inc.
New York Power Authority
Public Utility District No. 2 of Grant County,
Washington
Exelon
Exelon
Exelon
Exelon
Entergy - Entergy Services, Inc.
City Utilities of Springfield, Missouri
Enel Green Power
Raj Hundal
LaTroy
Brumfield
Larry Heckert
Zahid Qayyum
6
Xcel Energy, Inc.
Carrie Dixon
5
Xcel Energy, Inc.
Gerry Huitt
1
Xcel Energy, Inc.
Dean Schiro
4
1
CMS Energy - Consumers Energy Company
Memphis Light, Gas and Water Division
1
Bonneville Power Administration
6
3
5
Bonneville Power Administration
Bonneville Power Administration
Bonneville Power Administration
Aric Root
Allan Long
Kammy RogersHolliday
Andrew Meyers
Ken Lanehome
Scott Winner
5
Great River Energy
Jacalynn Bentz
1
Georgia Transmission Corporation
Greg Davis
3
Xcel Energy, Inc.
Nicholas Friebel
3
Snohomish County PUD No. 1
Public Utility District No. 1 of Snohomish
Holly Chaney
1
4
Stephenson
Mike ONeil
None
N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Karla Weaver
Affirmative N/A
Daniel Gacek
Kinte Whitehead
Cynthia Lee
Becky Webb
Oliver Burke
Duan Gavel
Mat Bunch
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Affirmative N/A
Third-Party
Negative
Comments
Affirmative N/A
4
5
6
1
County
Public Utility District No. 1 of Snohomish
County
Snohomish County PUD No. 1
Public Utility District No. 1 of Snohomish
County
John Martinsen
Affirmative N/A
Sam Nietfeld
Affirmative N/A
John Liang
Affirmative N/A
Alyssia Rhoads
Affirmative N/A
5
AEP
Thomas Foltz
Negative
1
AEP - AEP Service Corporation
Dennis Sauriol
Negative
1
Oncor Electric Delivery
Lee Maurer
6
AEP
JT Kuehne
10
ReliabilityFirst
3
Austin Energy
5
5
5
Cogentrix Energy Power Management, LLC
Seminole Electric Cooperative, Inc.
Cowlitz County PUD
Florida Reliability Coordinating Council –
Member Services Division
8
Anthony
Jablonski
W. Dwayne
Preston
Gerry Adamski
Trena Haynes
Deanna Carlson
Byron
Booker
None
N/A
Negative
Comments
Submitted
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Vince Ordax
Abstain
Negative
N/A
Comments
Submitted
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
None
N/A
None
N/A
3
AEP
Kent Feliks
6
10
Lakeland Electric
Texas Reliability Entity, Inc.
Paul Shipps
Rachel Coyne
6
Duke Energy
Greg Cecil
5
Duke Energy
Dale Goodwine
3
Duke Energy
Lee Schuster
4
4
6
3
5
National Rural Electric Cooperative Association Paul McCurley
Arkansas Electric Cooperative Corporation
Alice Wright
Jennifer
Arkansas Electric Cooperative Corporation
Loiacano
Arkansas Electric Cooperative Corporation
Bruce Walkup
Arkansas Electric Cooperative Corporation
Mark Gann
Arkansas Electric Cooperative Corporation
Adrian Harris
1
East Kentucky Power Cooperative
Amber Skillern
Negative
3
East Kentucky Power Cooperative
Patrick Woods
Negative
1
Duke Energy
Laura Lee
Negative
1
Comments
Submitted
Comments
Submitted
None
N/A
None
None
None
N/A
N/A
N/A
Third-Party
Comments
Third-Party
Comments
Comments
Submitted
Comments
1
Arizona Electric Power Cooperative, Inc.
Jennifer Bray
Negative
5
East Kentucky Power Cooperative
David Meade
Negative
3
5
Wabash Valley Power Association
SunPower
None
None
6
Evergy
1
3
5
5
6
Evergy
Evergy
Evergy
FirstEnergy - FirstEnergy Corporation
FirstEnergy - FirstEnergy Corporation
Susan Sosbe
Bradley Collard
Thomas
ROBBEN
Allen Klassen
Marcus Moor
Derek Brown
Robert Loy
Ann Carey
© 2021 - NERC Ver 4.3.0.0
Machine Name: ERODVSBSWB02
Submitted
Third-Party
Comments
N/A
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
NERC Balloting Tool
Dashboard
Users
Registered Ballot Body
Proxy Ballot Body
My User Profile
Ballots
Ballot Events
Ballot Results
Comment Forms
View Comment Forms
Login / Register
Ballot Results
Comment: View Comment Results
Ballot Name:
2019-02 BES Cyber System Information Access Management CIP-011-3 AB 3 ST
Voting Start Date:
4/30/2021 12:01:00 AM
Voting End Date:
5/10/2021 8:00:00 PM
Ballot Type:
ST
Ballot Activity:
AB
Ballot Series:
3
Total # Votes:
231
Total Ballot Pool:
273
Quorum:
84.62
Quorum Established Date:
5/10/2021 4:43:25 PM
Weighted Segment Value:
81.39
Actions
Actions
Negative
Fraction w/
Comment
Ballot Segment Affirmative Affirmative Negative Votes
Segment
Pool Weight
Votes
Fraction w/ Comment
Segment:
77
1
Segment:
2
2
Segment:
59
3
Segment:
17
4
Segment:
67
5
Segment:
44
6
Segment:
0
7
Segment:
1
8
Negative Votes
No
Abstain
w/o Comment
Vote
1
39
0.796
10
0.204
2
10
16
0.2
2
0.2
0
0
0
0
0
1
38
0.826
8
0.174
0
5
8
1
10
1
0
0
0
3
4
1
43
0.811
10
0.189
0
7
7
1
22
0.688
10
0.313
0
5
7
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
Segment:
0
9
Segment:
6
10
Totals: 273
0
0
0
0
0
0
0
0
0.6
4
0.4
2
0.2
0
0
0
5.8
158
4.721
40
1.079
2
31
42
Ballot Pool Members
Segment
3
6
Organization
Voter
Designated
Proxy
3
Con Ed - Consolidated Edison Co. of New York Peter Yost
Con Ed - Consolidated Edison Co. of New York Cristhian Godoy
Brian EvansUtility Services, Inc.
Mongeon
Ameren - Ameren Services
David Jendras
WEC Energy Group, Inc.
Thomas Breene
Constantin
Ontario Power Generation Inc.
Chitescu
Edison International - Southern California Edison
Selene Willis
Company
MEAG Power
Roger Brand
Scott Miller
Con Ed - Consolidated Edison Co. of New York Avani Pandya
MEAG Power
David Weekley Scott Miller
IDACORP - Idaho Power Company
Mike Marshall
Seminole Electric Cooperative, Inc.
Jonathan Robbins
Con Ed - Consolidated Edison Co. of New York Dermot Smyth
WEC Energy Group, Inc.
David Hathaway
Independent Electricity System Operator
Leonard Kula
Massachusetts Municipal Wholesale Electric
Anthony Stevens
Company
Sempra - San Diego Gas and Electric
Bridget Silvia
3
Basin Electric Power Cooperative
4
3
3
5
5
3
5
1
1
4
1
6
2
5
Jeremy Voll
5
1
Edison International - Southern California Edison
Romel Aquino
Company
NRG - NRG Energy, Inc.
Patricia Lynch
National Grid USA
Michael Jones
1
Western Area Power Administration
3
1
1
6
6
3
5
sean erickson
Edison International - Southern California Edison Jose Avendano
Company
Mora
Ameren - Ameren Services
Tamara Evey
Ameren - Ameren Services
Robert Quinlivan
Black Hills Corporation
Brooke Voorhees
National Grid USA
Brian Shanahan
Ameren - Ameren Missouri
Sam Dwyer
Barry Jones
NERC
Memo
Affirmative N/A
Affirmative N/A
Ballot
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Affirmative N/A
None
N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
1
6
5
4
Balancing Authority of Northern California
Sacramento Municipal Utility District
Sacramento Municipal Utility District
Sacramento Municipal Utility District
1
Sacramento Municipal Utility District
3
6
Sacramento Municipal Utility District
International Transmission Company Holdings
Corporation
Seattle City Light
3
Puget Sound Energy, Inc.
6
3
3
4
5
1
Kevin Smith
Jamie Cutlip
Nicole Goi
Beth Tincher
Arthur
Starkovich
Nicole Looney
Joe Tarantino Affirmative N/A
Joe Tarantino Affirmative N/A
Joe Tarantino Affirmative N/A
Joe Tarantino Affirmative N/A
Joe Tarantino Affirmative N/A
Joe Tarantino Affirmative N/A
Michael Moltane Gail Elliott
Affirmative N/A
Abstain
PPL - Louisville Gas and Electric Co.
PPL - Louisville Gas and Electric Co.
APS - Arizona Public Service Co.
Seattle City Light
Puget Sound Energy, Inc.
Brian Belger
Nicolas
Pacholski
Linn Oelker
James Frank
Jessica Lopez
Hao Li
Lynn Murphy
6
Western Area Power Administration
Erin Green
5
3
1
1
Sempra - San Diego Gas and Electric
Tennessee Valley Authority
Tennessee Valley Authority
Nebraska Public Power District
10
New York State Reliability Council
1
4
5
City Utilities of Springfield, Missouri
City Utilities of Springfield, Missouri
Avista - Avista Corporation
1
SaskPower
1
Allete - Minnesota Power, Inc.
1
APS - Arizona Public Service Co.
Jennifer Wright
Ian Grant
Gabe Kurtz
Jamison Cawley
ALAN
ADAMSON
Michael Bowman
John Allen
Glen Farmer
Wayne
Guttormson
Jamie Monette
Daniela
Atanasovski
10
Midwest Reliability Organization
William Steiner
Negative
5
APS - Arizona Public Service Co.
Michelle
Amarantos
Affirmative N/A
LeRoy Patterson
Affirmative N/A
Marcus Bortman
Affirmative N/A
Amy Jones
Affirmative N/A
Steve Ritscher
Abstain
6
6
5
1
3
3
Public Utility District No. 2 of Grant County,
Washington
APS - Arizona Public Service Co.
Public Utility District No. 2 of Grant County,
Washington
Dairyland Power Cooperative
Berkshire Hathaway Energy - MidAmerican
Energy Co.
Tacoma Public Utilities (Tacoma, WA)
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
None
N/A
Affirmative N/A
Comments
Submitted
N/A
Comments
Darnez Gresham
Negative
Submitted
Marc Donaldson Jennie Wike Affirmative N/A
6
5
1
5
4
5
Tennessee Valley Authority
Austin Energy
Puget Sound Energy, Inc.
San Miguel Electric Cooperative, Inc.
WEC Energy Group, Inc.
Platte River Power Authority
1
Glencoe Light and Power Commission
1
Network and Security Technologies
Marjorie Parsons
Michael Dillard
Chelsey Neil
Lana Smith
Matthew Beilfuss
Tyson Archie
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
No Comment
Terry Volkmann
Negative
Submitted
Roger
Comments
Nicholas Lauriat
Negative
Fradenburgh
Submitted
1
1
Public Utility District No. 1 of Pend Oreille
County
Seattle City Light
Eversource Energy
6
Basin Electric Power Cooperative
Jerry Horner
1
Minnkota Power Cooperative Inc.
Theresa Allard
3
3
6
1
3
1
5
Associated Electric Cooperative, Inc.
Platte River Power Authority
Associated Electric Cooperative, Inc.
Central Electric Power Cooperative (Missouri)
M and A Electric Power Cooperative
KAMO Electric Cooperative
Associated Electric Cooperative, Inc.
3
Northeast Missouri Electric Power Cooperative
3
3
1
5
4
3
KAMO Electric Cooperative
Sho-Me Power Electric Cooperative
Sho-Me Power Electric Cooperative
Florida Municipal Power Agency
Florida Municipal Power Agency
Florida Municipal Power Agency
6
Florida Municipal Power Agency
1
1
3
Northeast Missouri Electric Power Cooperative
N.W. Electric Power Cooperative, Inc.
NW Electric Power Cooperative, Inc.
1
Hydro One Networks, Inc.
6
5
1
5
Platte River Power Authority
Los Angeles Department of Water and Power
Tacoma Public Utilities (Tacoma, WA)
Brazos Electric Power Cooperative, Inc.
5
Herb Schrayshuen
Todd Bennett
Wade Kiess
Brian Ackermann
Michael Bax
Stephen Pogue
Micah Breedlove
Brad Haralson
Skyler
Wiegmann
Tony Gott
Jarrod Murdaugh
Peter Dawson
Chris Gowder
Truong Le
Dan O'Hagan
Truong Le
Carl Turner
Truong Le
Richard
Truong Le
Montgomery
Kevin White
Mark Ramsey
John Stickley
Payam
Mark Ciufo
Farahbakhsh
Sabrina Martz
Glenn Barry
John Merrell
Jennie Wike
Shari Heino
Herb
Schrayshuen
1
Kevin Conway
Abstain
Michael Jang
Quintin Lee
Abstain
N/A
Affirmative N/A
Comments
Negative
Submitted
Andy
Fuhrman
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
None
N/A
None
N/A
None
N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
3
3
Lakeland Electric
Georgia System Operations Corporation
Steve Marshall
Scott McGough
1
Manitoba Hydro
Bruce Reimer
1
Long Island Power Authority
Isidoro Behar
5
Manitoba Hydro
Yuguang Xiao
3
3
1
4
Manitoba Hydro
Los Angeles Department of Water and Power
Tri-State G and T Association, Inc.
FirstEnergy - FirstEnergy Corporation
3
Tri-State G and T Association, Inc.
5
1
5
6
Talen Generation, LLC
Lakeland Electric
Lakeland Electric
OGE Energy - Oklahoma Gas and Electric Co.
3
Eversource Energy
1
5
1
1
5
1
Tallahassee Electric (City of Tallahassee, FL)
Oglethorpe Power Corporation
Los Angeles Department of Water and Power
Black Hills Corporation
Black Hills Corporation
Seminole Electric Cooperative, Inc.
Mike Smith
Tony Skourtas
Donna Wood
Mark Garza
Janelle Marriott
Gill
Donald Lock
Larry Watt
Becky Rinier
Sing Tay
Christopher
McKinnon
Scott Langston
Donna Johnson
faranak sarbaz
Seth Nelson
Derek Silbaugh
Bret Galbraith
6
NiSource - Northern Indiana Public Service Co. Joe O'Brien
3
NiSource - Northern Indiana Public Service Co. Steven Taddeucci
6
New York Power Authority
6
Talen Energy Marketing, LLC
1
1
FirstEnergy - FirstEnergy Corporation
M and A Electric Power Cooperative
3
Dominion - Dominion Resources, Inc.
3
6
3
3
6
Muscatine Power and Water
Muscatine Power and Water
OGE Energy - Oklahoma Gas and Electric Co.
Westar Energy
Westar Energy
Southern Company - Southern Company
Generation
5
Erick Barrios
Jennifer
Hohenshilt
Julie Severino
William Price
Connie
Schroeder
Seth Shoemaker
Nick Burns
Donald Hargrove
Bryan Taggart
Grant Wilkerson
None
N/A
Affirmative N/A
Comments
Negative
Submitted
None
N/A
Comments
Negative
Submitted
None
N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
None
N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
None
N/A
None
N/A
Affirmative N/A
Abstain
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Abstain
N/A
Abstain
N/A
Affirmative N/A
None
N/A
None
N/A
James Howell
Affirmative N/A
Negative
6
Manitoba Hydro
Blair Mukanik
5
Tennessee Valley Authority
M Lee Thomas
Comments
Submitted
Affirmative N/A
1
3
6
3
Aaron
Ghodooshim
OGE Energy - Oklahoma Gas and Electric Co. Terri Pyle
Black Hills Corporation
Don Stahl
PSEG - PSEG Energy Resources and Trade LLC Joseph Neglia
Nebraska Public Power District
Tony Eddleman
5
Northern California Power Agency
Jeremy Lawson
3
CMS Energy - Consumers Energy Company
5
CMS Energy - Consumers Energy Company
4
Georgia System Operations Corporation
1
New York Power Authority
1
OTP - Otter Tail Power Company
5
5
3
3
4
5
6
1
3
1
PSEG - PSEG Fossil LLC
OTP - Otter Tail Power Company
OTP - Otter Tail Power Company
Owensboro Municipal Utilities
MGE Energy - Madison Gas and Electric Co.
Entergy - Entergy Services, Inc.
Portland General Electric Co.
Muscatine Power and Water
New York Power Authority
BC Hydro and Power Authority
Karl Blaszkowski
David
Greyerbiehl
Benjamin
Winslett
Salvatore
Spagnolo
Charles
Wicklund
Tim Kucey
Brett Jacobs
Wendi Olson
Thomas Lyons
Joseph DePoorter
Gail Golden
Daniel Mason
Andy Kurriger
David Rivera
Adrian Andreoiu
1
NiSource - Northern Indiana Public Service Co. Steve Toosevich
5
NiSource - Northern Indiana Public Service Co. Kathryn Tackett
3
6
BC Hydro and Power Authority
Los Angeles Department of Water and Power
Hootan Jarollahi
Anton Vu
1
Omaha Public Power District
Doug Peterchuck
10
1
5
2
6
SERC Reliability Corporation
Platte River Power Authority
JEA
Electric Reliability Council of Texas, Inc.
Seminole Electric Cooperative, Inc.
Dave Krueger
Matt Thompson
John Babik
Brandon Gleason
David Reinecke
5
Imperial Irrigation District
Tino Zaragoza
1
Sunflower Electric Power Corporation
Paul Mehlhaff
6
Imperial Irrigation District
Diana Torres
3
FirstEnergy - FirstEnergy Corporation
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
None
N/A
None
N/A
Abstain
N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Abstain
N/A
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Abstain
N/A
Denise
Sanchez
Affirmative N/A
Negative
Denise
Sanchez
No Comment
Submitted
Affirmative N/A
1
5
Public Utility District No. 1 of Chelan County
Public Utility District No. 1 of Chelan County
1
Imperial Irrigation District
3
Public Utility District No. 1 of Chelan County
5
BC Hydro and Power Authority
5
5
PNM Resources - Public Service Company of
New Mexico
NB Power Corporation
Dairyland Power Cooperative
Berkshire Hathaway Energy - MidAmerican
Energy Co.
Hydro-Qu?bec Production
Tacoma Public Utilities (Tacoma, WA)
3
Imperial Irrigation District
5
3
Portland General Electric Co.
Portland General Electric Co.
5
PPL - Louisville Gas and Electric Co.
5
Berkshire Hathaway - NV Energy
3
Pacific Gas and Electric Company
1
Pacific Gas and Electric Company
1
6
3
5
5
Santee Cooper
Santee Cooper
Santee Cooper
Santee Cooper
WEC Energy Group, Inc.
6
Dominion - Dominion Resources, Inc.
1
1
PPL Electric Utilities Corporation
Gainesville Regional Utilities
5
Lincoln Electric System
4
Tacoma Public Utilities (Tacoma, WA)
6
Northern California Power Agency
1
Portland General Electric Co.
5
Pacific Gas and Electric Company
6
Tacoma Public Utilities (Tacoma, WA)
6
Great River Energy
1
1
5
1
Ginette Lacasse
Meaghan Connell
Jesus Sammy
Denise
Alcaraz
Sanchez
Joyce Gundry
Helen Hamilton
Harding
Lynn Goldstein
Nurul Abser
Tommy Drea
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Abstain
N/A
Comments
Terry Harbour
Negative
Submitted
Carl Pineault
Affirmative N/A
Ozan Ferrin
Jennie Wike Affirmative N/A
Denise
Glen Allegranza
Affirmative N/A
Sanchez
Ryan Olson
Affirmative N/A
Dan Zollner
Affirmative N/A
JULIE
Affirmative N/A
HOSTRANDER
Comments
Kevin Salsbury
Negative
Submitted
Michael
Sandra Ellis
Affirmative N/A
Johnson
Michael
Marco Rios
Affirmative N/A
Johnson
Chris Wagner
Abstain
N/A
Marty Watson
Abstain
N/A
James Poston
Abstain
N/A
Tommy Curtis
Abstain
N/A
Clarice Zellmer
Affirmative N/A
Comments
Sean Bodkin
Negative
Submitted
Michelle Longo
Affirmative N/A
David Owens
Truong Le
None
N/A
Kayleigh
Affirmative N/A
Wilkerson
Hien Ho
Jennie Wike Affirmative N/A
Comments
Dennis Sismaet
Negative
Submitted
Brooke Jockin
Affirmative N/A
Michael
Ed Hanson
Affirmative N/A
Johnson
Terry Gifford
Jennie Wike Affirmative N/A
Donna
None
N/A
Stephenson
1
Mike ONeil
Affirmative N/A
Matt Carden
Affirmative N/A
5
3
NextEra Energy - Florida Power and Light Co.
Southern Company - Southern Company
Services, Inc.
Choctaw Generation Limited Partnership, LLLP
Seminole Electric Cooperative, Inc.
Rob Watson
Jeremy Lorigan
None
Abstain
5
Dominion - Dominion Resources, Inc.
Rachel Snead
5
10
Nebraska Public Power District
Northeast Power Coordinating Council
Ronald Bender
Guy V. Zito
6
Berkshire Hathaway - PacifiCorp
Lindsay Wickizer
6
Powerex Corporation
1
American Transmission Company, LLC
4
5
1
3
5
6
1
3
5
Alliant Energy Corporation Services, Inc.
New York Power Authority
Public Utility District No. 2 of Grant County,
Washington
Exelon
Exelon
Exelon
Exelon
Entergy - Entergy Services, Inc.
City Utilities of Springfield, Missouri
Enel Green Power
Raj Hundal
LaTroy
Brumfield
Larry Heckert
Zahid Qayyum
6
Xcel Energy, Inc.
Carrie Dixon
5
Xcel Energy, Inc.
Gerry Huitt
1
Xcel Energy, Inc.
Dean Schiro
4
1
CMS Energy - Consumers Energy Company
Memphis Light, Gas and Water Division
1
Bonneville Power Administration
6
3
5
Bonneville Power Administration
Bonneville Power Administration
Bonneville Power Administration
Aric Root
Allan Long
Kammy RogersHolliday
Andrew Meyers
Ken Lanehome
Scott Winner
5
Great River Energy
Jacalynn Bentz
1
3
Georgia Transmission Corporation
Snohomish County PUD No. 1
Public Utility District No. 1 of Snohomish
County
Public Utility District No. 1 of Snohomish
County
Greg Davis
Holly Chaney
Affirmative N/A
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
John Martinsen
Affirmative N/A
Sam Nietfeld
Affirmative N/A
1
4
4
5
N/A
N/A
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Karla Weaver
Affirmative N/A
Daniel Gacek
Kinte Whitehead
Cynthia Lee
Becky Webb
Oliver Burke
Duan Gavel
Mat Bunch
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Affirmative N/A
None
N/A
Affirmative N/A
6
Snohomish County PUD No. 1
Public Utility District No. 1 of Snohomish
County
John Liang
Affirmative N/A
Alyssia Rhoads
Affirmative N/A
5
AEP
Thomas Foltz
Negative
1
AEP - AEP Service Corporation
Dennis Sauriol
Negative
1
Oncor Electric Delivery
Lee Maurer
6
AEP
JT Kuehne
10
ReliabilityFirst
3
Austin Energy
5
5
5
Cogentrix Energy Power Management, LLC
Seminole Electric Cooperative, Inc.
Cowlitz County PUD
Florida Reliability Coordinating Council –
Member Services Division
1
8
Anthony
Jablonski
W. Dwayne
Preston
Gerry Adamski
Trena Haynes
Deanna Carlson
None
N/A
Negative
Comments
Submitted
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Vince Ordax
Abstain
Negative
3
AEP
Kent Feliks
6
Lakeland Electric
Paul Shipps
10
Texas Reliability Entity, Inc.
Rachel Coyne
6
Duke Energy
Greg Cecil
5
Duke Energy
Dale Goodwine
3
Duke Energy
Lee Schuster
4
4
6
3
5
National Rural Electric Cooperative Association Paul McCurley
Arkansas Electric Cooperative Corporation
Alice Wright
Jennifer
Arkansas Electric Cooperative Corporation
Loiacano
Arkansas Electric Cooperative Corporation
Bruce Walkup
Arkansas Electric Cooperative Corporation
Mark Gann
Arkansas Electric Cooperative Corporation
Adrian Harris
1
East Kentucky Power Cooperative
Amber Skillern
3
East Kentucky Power Cooperative
Patrick Woods
1
Duke Energy
Laura Lee
1
Arizona Electric Power Cooperative, Inc.
Jennifer Bray
5
East Kentucky Power Cooperative
David Meade
1
Byron
Booker
Comments
Submitted
Comments
Submitted
N/A
Comments
Submitted
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
None
N/A
None
N/A
None
None
None
None
N/A
N/A
N/A
N/A
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Comments
Negative
Submitted
Affirmative N/A
Third-Party
Negative
Comments
3
5
Wabash Valley Power Association
SunPower
6
Evergy
1
3
5
5
6
Evergy
Evergy
Evergy
FirstEnergy - FirstEnergy Corporation
FirstEnergy - FirstEnergy Corporation
Susan Sosbe
Bradley Collard
Thomas
ROBBEN
Allen Klassen
Marcus Moor
Derek Brown
Robert Loy
Ann Carey
© 2021 - NERC Ver 4.3.0.0
Machine Name: ERODVSBSWB02
None
None
N/A
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
NERC Balloting Tool
Dashboard
Users
Registered Ballot Body
Proxy Ballot Body
My User Profile
Ballots
Ballot Events
Ballot Results
Comment Forms
View Comment Forms
Login / Register
Ballot Results
Comment: View Comment Results
Ballot Name:
2019-02 BES Cyber System Information Access Management Implementation Plan AB 3 OT
Voting Start Date:
4/30/2021 12:01:00 AM
Voting End Date:
5/10/2021 8:00:00 PM
Ballot Type:
OT
Ballot Activity:
AB
Ballot Series:
3
Total # Votes:
225
Total Ballot Pool:
269
Quorum:
83.64
Quorum Established Date:
5/10/2021 5:04:33 PM
Weighted Segment Value:
92.51
Actions
Actions
Negative
Fraction w/
Comment
Ballot Segment Affirmative Affirmative Negative Votes
Segment
Pool Weight
Votes
Fraction w/ Comment
Segment:
76
1
Segment:
2
2
Segment:
58
3
Segment:
17
4
Segment:
65
5
Segment:
44
6
Segment:
0
7
Segment:
1
8
Negative Votes
No
Abstain
w/o Comment
Vote
1
43
0.915
4
0.085
1
12
16
0.2
2
0.2
0
0
0
0
0
1
41
0.891
5
0.109
0
5
7
1
10
1
0
0
0
3
4
1
43
0.896
5
0.104
0
9
8
1
27
0.871
4
0.129
0
4
9
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
Segment:
0
9
Segment:
6
10
Totals: 269
0
0
0
0
0
0
0
0
0.5
5
0.5
0
0
0
1
0
5.7
171
5.273
18
0.427
1
35
44
Ballot Pool Members
Segment
3
6
Organization
Voter
Designated
Proxy
3
Con Ed - Consolidated Edison Co. of New York Peter Yost
Con Ed - Consolidated Edison Co. of New York Cristhian Godoy
Brian EvansUtility Services, Inc.
Mongeon
Ameren - Ameren Services
David Jendras
WEC Energy Group, Inc.
Thomas Breene
Constantin
Ontario Power Generation Inc.
Chitescu
Edison International - Southern California Edison
Selene Willis
Company
MEAG Power
Roger Brand
Scott Miller
Con Ed - Consolidated Edison Co. of New York Avani Pandya
MEAG Power
David Weekley Scott Miller
IDACORP - Idaho Power Company
Mike Marshall
Seminole Electric Cooperative, Inc.
Jonathan Robbins
Con Ed - Consolidated Edison Co. of New York Dermot Smyth
WEC Energy Group, Inc.
David Hathaway
Independent Electricity System Operator
Leonard Kula
Massachusetts Municipal Wholesale Electric
Anthony Stevens
Company
Sempra - San Diego Gas and Electric
Bridget Silvia
3
Basin Electric Power Cooperative
4
3
3
5
5
3
5
1
1
4
1
6
2
5
3
5
1
1
1
1
6
6
3
5
1
Jeremy Voll
NERC
Memo
Affirmative N/A
Affirmative N/A
Ballot
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
Affirmative N/A
Edison International - Southern California Edison
Romel Aquino
Company
NRG - NRG Energy, Inc.
Patricia Lynch
National Grid USA
Michael Jones
Western Area Power Administration
sean erickson
Barry Jones
Edison International - Southern California Edison Jose Avendano
Affirmative N/A
Company
Mora
Ameren - Ameren Services
Tamara Evey
None
N/A
Ameren - Ameren Services
Robert Quinlivan
Affirmative N/A
Black Hills Corporation
Brooke Voorhees
None
N/A
National Grid USA
Brian Shanahan
Affirmative N/A
Ameren - Ameren Missouri
Sam Dwyer
Affirmative N/A
Balancing Authority of Northern California
Kevin Smith
Joe Tarantino Affirmative N/A
6
5
4
Sacramento Municipal Utility District
Sacramento Municipal Utility District
Sacramento Municipal Utility District
1
Sacramento Municipal Utility District
3
6
Sacramento Municipal Utility District
International Transmission Company Holdings
Corporation
Seattle City Light
3
Puget Sound Energy, Inc.
6
3
3
4
5
6
5
3
1
1
PPL - Louisville Gas and Electric Co.
PPL - Louisville Gas and Electric Co.
APS - Arizona Public Service Co.
Seattle City Light
Puget Sound Energy, Inc.
Western Area Power Administration
Sempra - San Diego Gas and Electric
Tennessee Valley Authority
Tennessee Valley Authority
Nebraska Public Power District
10
New York State Reliability Council
1
4
5
City Utilities of Springfield, Missouri
City Utilities of Springfield, Missouri
Avista - Avista Corporation
1
SaskPower
1
Allete - Minnesota Power, Inc.
1
APS - Arizona Public Service Co.
10
Midwest Reliability Organization
5
APS - Arizona Public Service Co.
1
6
6
5
1
3
3
6
5
1
Public Utility District No. 2 of Grant County,
Washington
APS - Arizona Public Service Co.
Public Utility District No. 2 of Grant County,
Washington
Dairyland Power Cooperative
Berkshire Hathaway Energy - MidAmerican
Energy Co.
Tacoma Public Utilities (Tacoma, WA)
Tennessee Valley Authority
Austin Energy
Puget Sound Energy, Inc.
Jamie Cutlip
Nicole Goi
Beth Tincher
Arthur
Starkovich
Nicole Looney
Joe Tarantino Affirmative N/A
Joe Tarantino Affirmative N/A
Joe Tarantino Affirmative N/A
Joe Tarantino Affirmative N/A
Joe Tarantino Affirmative N/A
Michael Moltane Gail Elliott
Abstain
N/A
Brian Belger
Nicolas
Pacholski
Linn Oelker
James Frank
Jessica Lopez
Hao Li
Lynn Murphy
Erin Green
Jennifer Wright
Ian Grant
Gabe Kurtz
Jamison Cawley
ALAN
ADAMSON
Michael Bowman
John Allen
Glen Farmer
Wayne
Guttormson
Jamie Monette
Daniela
Atanasovski
William Steiner
Michelle
Amarantos
None
N/A
LeRoy Patterson
Affirmative N/A
Marcus Bortman
Affirmative N/A
Amy Jones
Affirmative N/A
Steve Ritscher
Abstain
Darnez Gresham
Affirmative N/A
Marc Donaldson Jennie Wike
Marjorie Parsons
Michael Dillard
Chelsey Neil
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
N/A
4
5
1
WEC Energy Group, Inc.
Platte River Power Authority
Glencoe Light and Power Commission
Matthew Beilfuss
Tyson Archie
Terry Volkmann
1
Network and Security Technologies
Nicholas Lauriat
Affirmative N/A
Affirmative N/A
Abstain
N/A
Roger
Affirmative N/A
Fradenburgh
1
1
Public Utility District No. 1 of Pend Oreille
County
Seattle City Light
Eversource Energy
6
Basin Electric Power Cooperative
Jerry Horner
1
Minnkota Power Cooperative Inc.
Theresa Allard
3
3
6
1
3
1
5
Associated Electric Cooperative, Inc.
Platte River Power Authority
Associated Electric Cooperative, Inc.
Central Electric Power Cooperative (Missouri)
M and A Electric Power Cooperative
KAMO Electric Cooperative
Associated Electric Cooperative, Inc.
3
Northeast Missouri Electric Power Cooperative
3
3
1
5
4
3
KAMO Electric Cooperative
Sho-Me Power Electric Cooperative
Sho-Me Power Electric Cooperative
Florida Municipal Power Agency
Florida Municipal Power Agency
Florida Municipal Power Agency
6
Florida Municipal Power Agency
1
1
3
Northeast Missouri Electric Power Cooperative
N.W. Electric Power Cooperative, Inc.
NW Electric Power Cooperative, Inc.
1
Hydro One Networks, Inc.
6
5
1
5
Platte River Power Authority
Los Angeles Department of Water and Power
Tacoma Public Utilities (Tacoma, WA)
Brazos Electric Power Cooperative, Inc.
5
Herb Schrayshuen
3
3
1
3
Lakeland Electric
Georgia System Operations Corporation
Long Island Power Authority
Los Angeles Department of Water and Power
Todd Bennett
Wade Kiess
Brian Ackermann
Michael Bax
Stephen Pogue
Micah Breedlove
Brad Haralson
Skyler
Wiegmann
Tony Gott
Jarrod Murdaugh
Peter Dawson
Chris Gowder
Truong Le
Dan O'Hagan
Truong Le
Carl Turner
Truong Le
Richard
Truong Le
Montgomery
Kevin White
Mark Ramsey
John Stickley
Payam
Mark Ciufo
Farahbakhsh
Sabrina Martz
Glenn Barry
John Merrell
Jennie Wike
Shari Heino
Herb
Schrayshuen
Steve Marshall
Scott McGough
Isidoro Behar
Tony Skourtas
1
Kevin Conway
Abstain
Michael Jang
Quintin Lee
Abstain
N/A
Affirmative N/A
Comments
Negative
Submitted
Andy
Fuhrman
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
None
N/A
None
N/A
None
N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
None
N/A
Affirmative N/A
None
N/A
None
N/A
1
4
Tri-State G and T Association, Inc.
FirstEnergy - FirstEnergy Corporation
3
Tri-State G and T Association, Inc.
5
1
5
6
Talen Generation, LLC
Lakeland Electric
Lakeland Electric
OGE Energy - Oklahoma Gas and Electric Co.
3
Eversource Energy
1
5
1
1
5
1
Tallahassee Electric (City of Tallahassee, FL)
Oglethorpe Power Corporation
Los Angeles Department of Water and Power
Black Hills Corporation
Black Hills Corporation
Seminole Electric Cooperative, Inc.
6
NiSource - Northern Indiana Public Service Co. Joe O'Brien
3
NiSource - Northern Indiana Public Service Co. Steven Taddeucci
6
New York Power Authority
6
Talen Energy Marketing, LLC
1
1
FirstEnergy - FirstEnergy Corporation
M and A Electric Power Cooperative
3
Dominion - Dominion Resources, Inc.
3
6
3
3
6
Muscatine Power and Water
Muscatine Power and Water
OGE Energy - Oklahoma Gas and Electric Co.
Westar Energy
Westar Energy
Southern Company - Southern Company
Generation
5
Donna Wood
Mark Garza
Janelle Marriott
Gill
Donald Lock
Larry Watt
Becky Rinier
Sing Tay
Christopher
McKinnon
Scott Langston
Donna Johnson
faranak sarbaz
Seth Nelson
Derek Silbaugh
Bret Galbraith
Erick Barrios
Jennifer
Hohenshilt
Julie Severino
William Price
Connie
Schroeder
Seth Shoemaker
Nick Burns
Donald Hargrove
Bryan Taggart
Grant Wilkerson
James Howell
1
3
6
3
Simon TanapatAndre
Tennessee Valley Authority
M Lee Thomas
Aaron
FirstEnergy - FirstEnergy Corporation
Ghodooshim
OGE Energy - Oklahoma Gas and Electric Co. Terri Pyle
Black Hills Corporation
Don Stahl
PSEG - PSEG Energy Resources and Trade LLC Joseph Neglia
Nebraska Public Power District
Tony Eddleman
5
Northern California Power Agency
Jeremy Lawson
3
CMS Energy - Consumers Energy Company
Karl Blaszkowski
6
5
3
Manitoba Hydro
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
None
N/A
None
N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
None
N/A
None
N/A
Affirmative N/A
Abstain
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Abstain
N/A
Abstain
N/A
Affirmative N/A
None
N/A
None
N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Affirmative N/A
David
Greyerbiehl
Benjamin
Winslett
Salvatore
Spagnolo
Charles
Wicklund
Tim Kucey
Thomas Lyons
Joseph DePoorter
Gail Golden
Brett Jacobs
Wendi Olson
Daniel Mason
Andy Kurriger
David Rivera
Adrian Andreoiu
5
CMS Energy - Consumers Energy Company
4
Georgia System Operations Corporation
1
New York Power Authority
1
OTP - Otter Tail Power Company
5
3
4
5
5
3
6
1
3
1
PSEG - PSEG Fossil LLC
Owensboro Municipal Utilities
MGE Energy - Madison Gas and Electric Co.
Entergy - Entergy Services, Inc.
OTP - Otter Tail Power Company
OTP - Otter Tail Power Company
Portland General Electric Co.
Muscatine Power and Water
New York Power Authority
BC Hydro and Power Authority
1
NiSource - Northern Indiana Public Service Co. Steve Toosevich
5
NiSource - Northern Indiana Public Service Co. Kathryn Tackett
3
6
BC Hydro and Power Authority
Los Angeles Department of Water and Power
Hootan Jarollahi
Anton Vu
1
Omaha Public Power District
Doug Peterchuck
10
1
5
2
6
SERC Reliability Corporation
Platte River Power Authority
JEA
Electric Reliability Council of Texas, Inc.
Seminole Electric Cooperative, Inc.
Dave Krueger
Matt Thompson
John Babik
Brandon Gleason
David Reinecke
5
Imperial Irrigation District
Tino Zaragoza
1
Sunflower Electric Power Corporation
Paul Mehlhaff
6
Imperial Irrigation District
Diana Torres
1
5
Public Utility District No. 1 of Chelan County
Public Utility District No. 1 of Chelan County
1
Imperial Irrigation District
3
Public Utility District No. 1 of Chelan County
5
BC Hydro and Power Authority
Ginette Lacasse
Meaghan Connell
Jesus Sammy
Denise
Alcaraz
Sanchez
Joyce Gundry
Helen Hamilton
Harding
1
PNM Resources - Public Service Company of
New Mexico
Lynn Goldstein
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
Affirmative N/A
None
N/A
None
N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Abstain
N/A
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Abstain
N/A
Denise
Sanchez
Affirmative N/A
Negative
Denise
Sanchez
No Comment
Submitted
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
1
5
5
5
NB Power Corporation
Dairyland Power Cooperative
Berkshire Hathaway Energy - MidAmerican
Energy Co.
Hydro-Qu?bec Production
Tacoma Public Utilities (Tacoma, WA)
3
Imperial Irrigation District
5
3
Portland General Electric Co.
Portland General Electric Co.
5
PPL - Louisville Gas and Electric Co.
5
Berkshire Hathaway - NV Energy
3
Pacific Gas and Electric Company
1
Pacific Gas and Electric Company
1
6
3
5
5
6
1
1
Santee Cooper
Santee Cooper
Santee Cooper
Santee Cooper
WEC Energy Group, Inc.
Dominion - Dominion Resources, Inc.
PPL Electric Utilities Corporation
Gainesville Regional Utilities
5
Lincoln Electric System
4
Tacoma Public Utilities (Tacoma, WA)
6
Northern California Power Agency
1
Portland General Electric Co.
5
Pacific Gas and Electric Company
6
Tacoma Public Utilities (Tacoma, WA)
6
Great River Energy
1
NextEra Energy - Florida Power and Light Co.
Southern Company - Southern Company
Services, Inc.
Choctaw Generation Limited Partnership, LLLP
Seminole Electric Cooperative, Inc.
Dominion - Dominion Resources, Inc.
Nebraska Public Power District
Northeast Power Coordinating Council
Berkshire Hathaway - PacifiCorp
Powerex Corporation
1
1
5
3
5
5
10
6
6
Nurul Abser
Tommy Drea
Affirmative N/A
Abstain
N/A
Terry Harbour
Affirmative N/A
Carl Pineault
Ozan Ferrin
Affirmative N/A
Jennie Wike Affirmative N/A
Denise
Glen Allegranza
Affirmative N/A
Sanchez
Ryan Olson
Affirmative N/A
Dan Zollner
Affirmative N/A
JULIE
Affirmative N/A
HOSTRANDER
Kevin Salsbury
Affirmative N/A
Michael
Sandra Ellis
Affirmative N/A
Johnson
Michael
Marco Rios
Affirmative N/A
Johnson
Chris Wagner
Abstain
N/A
Marty Watson
Abstain
N/A
James Poston
Abstain
N/A
Tommy Curtis
Abstain
N/A
Clarice Zellmer
Affirmative N/A
Sean Bodkin
Affirmative N/A
Michelle Longo
Affirmative N/A
David Owens
Truong Le
None
N/A
Kayleigh
Abstain
N/A
Wilkerson
Hien Ho
Jennie Wike Affirmative N/A
Comments
Dennis Sismaet
Negative
Submitted
Brooke Jockin
Affirmative N/A
Michael
Ed Hanson
Affirmative N/A
Johnson
Terry Gifford
Jennie Wike Affirmative N/A
Donna
None
N/A
Stephenson
Mike ONeil
Affirmative N/A
Matt Carden
Affirmative N/A
Rob Watson
Jeremy Lorigan
Rachel Snead
Ronald Bender
Guy V. Zito
Lindsay Wickizer
Raj Hundal
None
N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
LaTroy
Brumfield
Larry Heckert
Zahid Qayyum
1
American Transmission Company, LLC
4
5
1
3
5
6
1
3
5
Alliant Energy Corporation Services, Inc.
New York Power Authority
Public Utility District No. 2 of Grant County,
Washington
Exelon
Exelon
Exelon
Exelon
Entergy - Entergy Services, Inc.
City Utilities of Springfield, Missouri
Enel Green Power
6
Xcel Energy, Inc.
Carrie Dixon
1
Xcel Energy, Inc.
Dean Schiro
5
Xcel Energy, Inc.
Gerry Huitt
4
1
CMS Energy - Consumers Energy Company
Memphis Light, Gas and Water Division
1
Bonneville Power Administration
6
3
5
Bonneville Power Administration
Bonneville Power Administration
Bonneville Power Administration
Aric Root
Allan Long
Kammy RogersHolliday
Andrew Meyers
Ken Lanehome
Scott Winner
5
Great River Energy
Jacalynn Bentz
1
3
Greg Davis
Holly Chaney
John Martinsen
Affirmative N/A
Sam Nietfeld
Affirmative N/A
John Liang
Affirmative N/A
Alyssia Rhoads
Affirmative N/A
5
1
Georgia Transmission Corporation
Snohomish County PUD No. 1
Public Utility District No. 1 of Snohomish
County
Public Utility District No. 1 of Snohomish
County
Snohomish County PUD No. 1
Public Utility District No. 1 of Snohomish
County
AEP
AEP - AEP Service Corporation
Affirmative N/A
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
Thomas Foltz
Dennis Sauriol
Affirmative N/A
Affirmative N/A
1
Oncor Electric Delivery
Lee Maurer
6
AEP
10
ReliabilityFirst
3
Austin Energy
JT Kuehne
Anthony
Jablonski
W. Dwayne
Preston
4
4
5
6
1
Affirmative N/A
Affirmative N/A
Affirmative N/A
Karla Weaver
Affirmative N/A
Daniel Gacek
Kinte Whitehead
Cynthia Lee
Becky Webb
Oliver Burke
Duan Gavel
Mat Bunch
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Affirmative N/A
None
N/A
Affirmative N/A
Byron
Booker
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
5
5
5
3
6
10
6
5
3
4
4
Cogentrix Energy Power Management, LLC
Seminole Electric Cooperative, Inc.
Cowlitz County PUD
Florida Reliability Coordinating Council –
Member Services Division
AEP
Lakeland Electric
Texas Reliability Entity, Inc.
Duke Energy
Duke Energy
Duke Energy
National Rural Electric Cooperative Association
Arkansas Electric Cooperative Corporation
1
Arkansas Electric Cooperative Corporation
6
3
5
Arkansas Electric Cooperative Corporation
Arkansas Electric Cooperative Corporation
Arkansas Electric Cooperative Corporation
Kent Feliks
Paul Shipps
Rachel Coyne
Greg Cecil
Dale Goodwine
Lee Schuster
Paul McCurley
Alice Wright
Jennifer
Loiacano
Bruce Walkup
Mark Gann
Adrian Harris
1
East Kentucky Power Cooperative
Amber Skillern
3
East Kentucky Power Cooperative
Patrick Woods
1
1
Duke Energy
Arizona Electric Power Cooperative, Inc.
Laura Lee
Jennifer Bray
5
East Kentucky Power Cooperative
David Meade
3
5
Wabash Valley Power Association
SunPower
6
Evergy
1
3
5
5
6
Evergy
Evergy
Evergy
FirstEnergy - FirstEnergy Corporation
FirstEnergy - FirstEnergy Corporation
Susan Sosbe
Bradley Collard
Thomas
ROBBEN
Allen Klassen
Marcus Moor
Derek Brown
Robert Loy
Ann Carey
8
Gerry Adamski
Trena Haynes
Deanna Carlson
Affirmative N/A
Abstain
N/A
Abstain
N/A
Vince Ordax
Abstain
Affirmative N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
None
N/A
© 2021 - NERC Ver 4.3.0.0
Machine Name: ERODVSBSWB02
None
N/A
N/A
None
None
None
N/A
N/A
N/A
Third-Party
Negative
Comments
Third-Party
Negative
Comments
Affirmative N/A
Affirmative N/A
Third-Party
Negative
Comments
None
N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
NERC Balloting Tool
Dashboard
Users
Registered Ballot Body
Proxy Ballot Body
My User Profile
Ballots
Ballot Events
Ballot Results
Comment Forms
View Comment Forms
Login / Register
Ballot Results
Ballot Name:
2019-02 BES Cyber System Information Access Management CIP-004-7 Non-Binding Poll AB 3 NB
Voting Start Date:
4/30/2021 12:01:00 AM
Voting End Date:
5/10/2021 8:00:00 PM
Ballot Type:
NB
Ballot Activity:
AB
Ballot Series:
3
Total # Votes:
213
Total Ballot Pool:
257
Quorum:
82.88
Quorum Established Date:
5/10/2021 4:58:31 PM
Weighted Segment Value:
84.57
Actions
Actions
Ballot
Pool
Segment
Segment:
1
Segment:
2
Segment:
3
Segment:
4
Segment:
5
Segment:
6
Segment:
7
Segment:
8
Segment:
Segment
Weight
Affirmative
Votes
Affirmative
Fraction
Negative
Votes
Negative
Fraction
Abstain
No
Vote
70
1
35
0.833
7
0.167
14
14
2
0.2
1
0.1
1
0.1
0
0
59
1
34
0.872
5
0.128
11
9
14
1
10
1
0
0
2
2
62
1
34
0.85
6
0.15
13
9
43
1
17
0.739
6
0.261
10
10
0
0
0
0
0
0
0
0
1
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
9
Segment:
6
10
Totals:
257
0.6
6
0.6
0
0
0
0
5.8
137
4.994
25
0.806
51
44
Ballot Pool Members
Segment
Organization
3
6
Con Ed - Consolidated Edison Co. of New York
Con Ed - Consolidated Edison Co. of New York
4
Utility Services, Inc.
3
3
Ameren - Ameren Services
WEC Energy Group, Inc.
5
Ontario Power Generation Inc.
3
Edison International - Southern California Edison
Company
MEAG Power
Con Ed - Consolidated Edison Co. of New York
MEAG Power
IDACORP - Idaho Power Company
Seminole Electric Cooperative, Inc.
Con Ed - Consolidated Edison Co. of New York
WEC Energy Group, Inc.
Independent Electricity System Operator
Massachusetts Municipal Wholesale Electric
Company
Sempra - San Diego Gas and Electric
3
Basin Electric Power Cooperative
5
3
5
1
1
4
1
6
2
5
3
5
1
1
1
1
6
6
3
5
1
6
Edison International - Southern California Edison
Company
NRG - NRG Energy, Inc.
National Grid USA
Western Area Power Administration
Edison International - Southern California Edison
Company
Ameren - Ameren Services
Ameren - Ameren Services
Black Hills Corporation
National Grid USA
Ameren - Ameren Missouri
Balancing Authority of Northern California
Sacramento Municipal Utility District
Voter
Designated
Proxy
Peter Yost
Cristhian Godoy
Brian EvansMongeon
David Jendras
Thomas Breene
Constantin
Chitescu
NERC
Memo
Affirmative N/A
Affirmative N/A
Ballot
None
N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Selene Willis
None
Roger Brand
Scott Miller
Avani Pandya
David Weekley Scott Miller
Mike Marshall
Jonathan Robbins
Dermot Smyth
David Hathaway
Leonard Kula
Abstain
N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Anthony Stevens
Affirmative N/A
Bridget Silvia
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
Abstain
N/A
Jeremy Voll
Romel Aquino
Patricia Lynch
Michael Jones
sean erickson
Barry Jones
Jose Avendano
Mora
Tamara Evey
Robert Quinlivan
Brooke Voorhees
Brian Shanahan
Sam Dwyer
Kevin Smith
Joe Tarantino
Jamie Cutlip
Joe Tarantino
N/A
Affirmative N/A
None
N/A
Abstain
N/A
None
N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
5
4
1
3
6
3
6
3
3
4
5
6
5
3
1
1
Sacramento Municipal Utility District
Sacramento Municipal Utility District
Sacramento Municipal Utility District
Sacramento Municipal Utility District
International Transmission Company Holdings
Corporation
Seattle City Light
Puget Sound Energy, Inc.
PPL - Louisville Gas and Electric Co.
PPL - Louisville Gas and Electric Co.
APS - Arizona Public Service Co.
Seattle City Light
Puget Sound Energy, Inc.
Western Area Power Administration
Sempra - San Diego Gas and Electric
Tennessee Valley Authority
Tennessee Valley Authority
Nebraska Public Power District
10
New York State Reliability Council
1
4
5
City Utilities of Springfield, Missouri
City Utilities of Springfield, Missouri
Avista - Avista Corporation
1
SaskPower
1
APS - Arizona Public Service Co.
10
Midwest Reliability Organization
5
APS - Arizona Public Service Co.
1
6
6
5
1
3
3
6
5
1
4
5
1
Public Utility District No. 2 of Grant County,
Washington
APS - Arizona Public Service Co.
Public Utility District No. 2 of Grant County,
Washington
Dairyland Power Cooperative
Berkshire Hathaway Energy - MidAmerican
Energy Co.
Tacoma Public Utilities (Tacoma, WA)
Tennessee Valley Authority
Austin Energy
Puget Sound Energy, Inc.
WEC Energy Group, Inc.
Platte River Power Authority
Glencoe Light and Power Commission
Nicole Goi
Beth Tincher
Arthur Starkovich
Nicole Looney
Joe Tarantino
Joe Tarantino
Joe Tarantino
Joe Tarantino
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Michael Moltane Gail Elliott
Affirmative N/A
Brian Belger
Nicolas Pacholski
Linn Oelker
James Frank
Jessica Lopez
Hao Li
Lynn Murphy
Erin Green
Jennifer Wright
Ian Grant
Gabe Kurtz
Jamison Cawley
ALAN
ADAMSON
Michael Bowman
John Allen
Glen Farmer
Wayne
Guttormson
Daniela
Atanasovski
William Steiner
Michelle
Amarantos
None
N/A
Affirmative N/A
None
N/A
None
N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
Abstain
N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
None
N/A
LeRoy Patterson
Affirmative N/A
Marcus Bortman
Affirmative N/A
Amy Jones
Affirmative N/A
Steve Ritscher
Abstain
Darnez Gresham
Affirmative N/A
Marc Donaldson Jennie Wike
Marjorie Parsons
Michael Dillard
Chelsey Neil
Matthew Beilfuss
Tyson Archie
Terry Volkmann
Affirmative N/A
Abstain
N/A
Affirmative N/A
None
N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
N/A
1
Network and Security Technologies
Nicholas Lauriat
1
1
Public Utility District No. 1 of Pend Oreille
County
Seattle City Light
Eversource Energy
6
Basin Electric Power Cooperative
Jerry Horner
1
Minnkota Power Cooperative Inc.
Theresa Allard
3
3
6
1
3
1
5
3
3
3
1
5
4
3
Associated Electric Cooperative, Inc.
Platte River Power Authority
Associated Electric Cooperative, Inc.
Central Electric Power Cooperative (Missouri)
M and A Electric Power Cooperative
KAMO Electric Cooperative
Associated Electric Cooperative, Inc.
Northeast Missouri Electric Power Cooperative
KAMO Electric Cooperative
Sho-Me Power Electric Cooperative
Sho-Me Power Electric Cooperative
Florida Municipal Power Agency
Florida Municipal Power Agency
Florida Municipal Power Agency
6
Florida Municipal Power Agency
1
1
3
Northeast Missouri Electric Power Cooperative
N.W. Electric Power Cooperative, Inc.
NW Electric Power Cooperative, Inc.
1
Hydro One Networks, Inc.
6
5
1
5
Platte River Power Authority
Los Angeles Department of Water and Power
Tacoma Public Utilities (Tacoma, WA)
Brazos Electric Power Cooperative, Inc.
5
Herb Schrayshuen
3
3
1
3
3
1
4
Lakeland Electric
Georgia System Operations Corporation
Long Island Power Authority
Manitoba Hydro
Los Angeles Department of Water and Power
Tri-State G and T Association, Inc.
FirstEnergy - FirstEnergy Corporation
3
Tri-State G and T Association, Inc.
Todd Bennett
Wade Kiess
Brian Ackermann
Michael Bax
Stephen Pogue
Micah Breedlove
Brad Haralson
Skyler Wiegmann
Tony Gott
Jarrod Murdaugh
Peter Dawson
Chris Gowder
Dan O'Hagan
Carl Turner
Richard
Montgomery
Kevin White
Mark Ramsey
John Stickley
Payam
Farahbakhsh
Sabrina Martz
Glenn Barry
John Merrell
Shari Heino
Herb
Schrayshuen
Steve Marshall
Scott McGough
Isidoro Behar
Mike Smith
Tony Skourtas
Donna Wood
Mark Garza
Janelle Marriott
1
Roger
Negative
Fradenburgh
Comments
Submitted
Kevin Conway
Abstain
Michael Jang
Quintin Lee
Abstain
N/A
Affirmative N/A
Comments
Negative
Submitted
Andy
Fuhrman
N/A
Affirmative N/A
Truong Le
Truong Le
Truong Le
Affirmative N/A
Abstain
N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
None
N/A
None
N/A
None
N/A
Truong Le
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Mark Ciufo
Affirmative N/A
Abstain
N/A
Abstain
N/A
Jennie Wike Affirmative N/A
Abstain
N/A
Affirmative N/A
None
N/A
Affirmative N/A
None
N/A
None
N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
1
5
6
Lakeland Electric
Lakeland Electric
OGE Energy - Oklahoma Gas and Electric Co.
3
Eversource Energy
1
5
1
1
5
1
Tallahassee Electric (City of Tallahassee, FL)
Oglethorpe Power Corporation
Los Angeles Department of Water and Power
Black Hills Corporation
Black Hills Corporation
Seminole Electric Cooperative, Inc.
Gill
Larry Watt
Becky Rinier
Sing Tay
Christopher
McKinnon
Scott Langston
Donna Johnson
faranak sarbaz
Seth Nelson
Derek Silbaugh
Bret Galbraith
6
NiSource - Northern Indiana Public Service Co.
Joe O'Brien
3
NiSource - Northern Indiana Public Service Co.
Steven Taddeucci
6
New York Power Authority
6
Talen Energy Marketing, LLC
1
1
3
3
6
3
3
6
FirstEnergy - FirstEnergy Corporation
M and A Electric Power Cooperative
Dominion - Dominion Resources, Inc.
Muscatine Power and Water
Muscatine Power and Water
OGE Energy - Oklahoma Gas and Electric Co.
Westar Energy
Westar Energy
Southern Company - Southern Company
Generation
Erick Barrios
Jennifer
Hohenshilt
Julie Severino
William Price
Connie Schroeder
Seth Shoemaker
Nick Burns
Donald Hargrove
Bryan Taggart
Grant Wilkerson
5
James Howell
1
3
6
3
Simon TanapatAndre
Tennessee Valley Authority
M Lee Thomas
Aaron
FirstEnergy - FirstEnergy Corporation
Ghodooshim
OGE Energy - Oklahoma Gas and Electric Co.
Terri Pyle
Black Hills Corporation
Don Stahl
PSEG - PSEG Energy Resources and Trade LLC Joseph Neglia
Nebraska Public Power District
Tony Eddleman
5
Northern California Power Agency
Jeremy Lawson
3
CMS Energy - Consumers Energy Company
5
CMS Energy - Consumers Energy Company
4
Georgia System Operations Corporation
Karl Blaszkowski
David
Greyerbiehl
Benjamin
Winslett
Salvatore
6
5
3
Manitoba Hydro
None
N/A
None
N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
None
N/A
None
N/A
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
Abstain
N/A
Affirmative N/A
None
N/A
None
N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
Affirmative N/A
1
New York Power Authority
1
5
5
3
3
5
OTP - Otter Tail Power Company
PSEG - PSEG Fossil LLC
OTP - Otter Tail Power Company
OTP - Otter Tail Power Company
Owensboro Municipal Utilities
Entergy - Entergy Services, Inc.
Spagnolo
Charles Wicklund
Tim Kucey
Brett Jacobs
Wendi Olson
Thomas Lyons
Gail Golden
6
Portland General Electric Co.
Daniel Mason
1
3
1
Muscatine Power and Water
New York Power Authority
BC Hydro and Power Authority
Andy Kurriger
David Rivera
Adrian Andreoiu
1
NiSource - Northern Indiana Public Service Co.
Steve Toosevich
5
NiSource - Northern Indiana Public Service Co.
Kathryn Tackett
3
6
BC Hydro and Power Authority
Los Angeles Department of Water and Power
Hootan Jarollahi
Anton Vu
1
Omaha Public Power District
Doug Peterchuck
10
5
SERC Reliability Corporation
JEA
Dave Krueger
John Babik
2
Electric Reliability Council of Texas, Inc.
Brandon Gleason
6
Seminole Electric Cooperative, Inc.
David Reinecke
5
Imperial Irrigation District
Tino Zaragoza
1
Sunflower Electric Power Corporation
Paul Mehlhaff
6
Imperial Irrigation District
Diana Torres
1
5
Public Utility District No. 1 of Chelan County
Public Utility District No. 1 of Chelan County
Affirmative N/A
Affirmative N/A
1
Imperial Irrigation District
3
Public Utility District No. 1 of Chelan County
5
BC Hydro and Power Authority
Ginette Lacasse
Meaghan Connell
Jesus Sammy
Denise
Alcaraz
Sanchez
Joyce Gundry
Helen Hamilton
Harding
Lynn Goldstein
None
Nurul Abser
Tommy Drea
Affirmative N/A
Abstain
N/A
Terry Harbour
Affirmative N/A
1
1
5
1
5
5
PNM Resources - Public Service Company of
New Mexico
NB Power Corporation
Dairyland Power Cooperative
Berkshire Hathaway Energy - MidAmerican
Energy Co.
Hydro-Qu?bec Production
Tacoma Public Utilities (Tacoma, WA)
Carl Pineault
Ozan Ferrin
Affirmative N/A
None
N/A
Abstain
N/A
None
N/A
None
N/A
Abstain
N/A
Affirmative N/A
Stefanie
Burke
Abstain
N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Abstain
N/A
Comments
Negative
Submitted
Affirmative N/A
None
N/A
Comments
Negative
Submitted
Affirmative N/A
Denise
Sanchez
Affirmative N/A
Negative
Denise
Sanchez
Comments
Submitted
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
N/A
Affirmative N/A
Jennie Wike Affirmative N/A
3
Imperial Irrigation District
Glen Allegranza
5
3
Portland General Electric Co.
Portland General Electric Co.
5
PPL - Louisville Gas and Electric Co.
5
Berkshire Hathaway - NV Energy
Ryan Olson
Dan Zollner
JULIE
HOSTRANDER
Kevin Salsbury
3
Pacific Gas and Electric Company
Sandra Ellis
1
Pacific Gas and Electric Company
Marco Rios
1
6
3
5
5
Santee Cooper
Santee Cooper
Santee Cooper
Santee Cooper
WEC Energy Group, Inc.
Chris Wagner
Marty Watson
James Poston
Tommy Curtis
Clarice Zellmer
6
Dominion - Dominion Resources, Inc.
Sean Bodkin
1
Gainesville Regional Utilities
5
Lincoln Electric System
4
Tacoma Public Utilities (Tacoma, WA)
David Owens
Kayleigh
Wilkerson
Hien Ho
6
Northern California Power Agency
Dennis Sismaet
1
Portland General Electric Co.
Brooke Jockin
5
Pacific Gas and Electric Company
Ed Hanson
6
Tacoma Public Utilities (Tacoma, WA)
6
Great River Energy
1
Terry Gifford
Donna
Stephenson
Mike ONeil
5
3
NextEra Energy - Florida Power and Light Co.
Southern Company - Southern Company Services,
Matt Carden
Inc.
Choctaw Generation Limited Partnership, LLLP Rob Watson
Seminole Electric Cooperative, Inc.
Jeremy Lorigan
5
Dominion - Dominion Resources, Inc.
Rachel Snead
10
Northeast Power Coordinating Council
Guy V. Zito
6
Berkshire Hathaway - PacifiCorp
Lindsay Wickizer
6
Powerex Corporation
1
American Transmission Company, LLC
4
5
Alliant Energy Corporation Services, Inc.
New York Power Authority
Public Utility District No. 2 of Grant County,
Washington
Raj Hundal
LaTroy
Brumfield
Larry Heckert
Zahid Qayyum
1
4
Karla Weaver
Denise
Sanchez
Affirmative N/A
Abstain
Abstain
N/A
N/A
None
N/A
Affirmative N/A
Michael
Johnson
Michael
Johnson
Truong Le
Affirmative N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
Abstain
N/A
Abstain
N/A
Affirmative N/A
Comments
Negative
Submitted
None
N/A
Abstain
N/A
Jennie Wike Affirmative N/A
Comments
Negative
Submitted
Abstain
N/A
Michael
Affirmative N/A
Johnson
Jennie Wike Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
None
N/A
None
N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
1
3
5
6
1
3
5
4
1
Exelon
Exelon
Exelon
Exelon
Entergy - Entergy Services, Inc.
City Utilities of Springfield, Missouri
Enel Green Power
CMS Energy - Consumers Energy Company
Memphis Light, Gas and Water Division
1
Bonneville Power Administration
6
3
5
Bonneville Power Administration
Bonneville Power Administration
Bonneville Power Administration
Daniel Gacek
Kinte Whitehead
Cynthia Lee
Becky Webb
Oliver Burke
Duan Gavel
Mat Bunch
Aric Root
Allan Long
Kammy RogersHolliday
Andrew Meyers
Ken Lanehome
Scott Winner
5
Great River Energy
Jacalynn Bentz
1
3
4
5
6
1
5
1
6
Georgia Transmission Corporation
Snohomish County PUD No. 1
Public Utility District No. 1 of Snohomish County
Public Utility District No. 1 of Snohomish County
Snohomish County PUD No. 1
Public Utility District No. 1 of Snohomish County
AEP
AEP - AEP Service Corporation
AEP
10
ReliabilityFirst
3
Austin Energy
5
5
5
3
6
10
Cogentrix Energy Power Management, LLC
Seminole Electric Cooperative, Inc.
Cowlitz County PUD
Florida Reliability Coordinating Council –
Member Services Division
AEP
Lakeland Electric
Texas Reliability Entity, Inc.
Greg Davis
Holly Chaney
John Martinsen
Sam Nietfeld
John Liang
Alyssia Rhoads
Thomas Foltz
Dennis Sauriol
JT Kuehne
Anthony
Jablonski
W. Dwayne
Preston
Gerry Adamski
Trena Haynes
Deanna Carlson
6
Duke Energy
Greg Cecil
5
Duke Energy
Dale Goodwine
3
Duke Energy
Lee Schuster
6
3
Arkansas Electric Cooperative Corporation
Arkansas Electric Cooperative Corporation
Bruce Walkup
Mark Gann
8
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Vince Ordax
Abstain
N/A
Kent Feliks
Paul Shipps
Rachel Coyne
Abstain
N/A
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
None
N/A
None
N/A
5
Arkansas Electric Cooperative Corporation
Adrian Harris
None
1
East Kentucky Power Cooperative
Amber Skillern
Negative
3
East Kentucky Power Cooperative
Patrick Woods
Negative
1
Duke Energy
Laura Lee
Negative
1
Arizona Electric Power Cooperative, Inc.
Jennifer Bray
Negative
5
East Kentucky Power Cooperative
David Meade
Negative
3
5
Wabash Valley Power Association
SunPower
None
None
6
Evergy
1
3
5
5
6
Evergy
Evergy
Evergy
FirstEnergy - FirstEnergy Corporation
FirstEnergy - FirstEnergy Corporation
Susan Sosbe
Bradley Collard
Thomas
ROBBEN
Allen Klassen
Marcus Moor
Derek Brown
Robert Loy
Ann Carey
© 2021 - NERC Ver 4.3.0.0
Machine Name: ERODVSBSWB02
N/A
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
Comments
Submitted
N/A
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
NERC Balloting Tool
Dashboard
Users
Registered Ballot Body
Proxy Ballot Body
My User Profile
Ballots
Ballot Events
Ballot Results
Comment Forms
View Comment Forms
Login / Register
Ballot Results
Ballot Name:
2019-02 BES Cyber System Information Access Management CIP-011-3 Non-Binding Poll AB 3 NB
Voting Start Date:
4/30/2021 12:01:00 AM
Voting End Date:
5/10/2021 8:00:00 PM
Ballot Type:
NB
Ballot Activity:
AB
Ballot Series:
3
Total # Votes:
214
Total Ballot Pool:
258
Quorum:
82.95
Quorum Established Date:
5/10/2021 5:03:23 PM
Weighted Segment Value:
82.61
Actions
Actions
Ballot
Pool
Segment
Segment:
1
Segment:
2
Segment:
3
Segment:
4
Segment:
5
Segment:
6
Segment:
7
Segment:
8
Segment:
Segment
Weight
Affirmative
Votes
Affirmative
Fraction
Negative
Votes
Negative
Fraction
Abstain
No
Vote
70
1
35
0.833
7
0.167
14
14
2
0.2
2
0.2
0
0
0
0
59
1
33
0.846
6
0.154
11
9
14
1
10
1
0
0
2
2
63
1
32
0.821
7
0.179
15
9
43
1
17
0.739
6
0.261
10
10
0
0
0
0
0
0
0
0
1
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
9
Segment:
6
10
Totals:
258
0.6
4
0.4
2
0.2
0
0
5.8
133
4.839
28
0.961
53
44
Ballot Pool Members
Segment
Organization
3
6
Con Ed - Consolidated Edison Co. of New York
Con Ed - Consolidated Edison Co. of New York
4
Utility Services, Inc.
3
3
Ameren - Ameren Services
WEC Energy Group, Inc.
5
Ontario Power Generation Inc.
3
Edison International - Southern California Edison
Company
MEAG Power
Con Ed - Consolidated Edison Co. of New York
MEAG Power
IDACORP - Idaho Power Company
Seminole Electric Cooperative, Inc.
Con Ed - Consolidated Edison Co. of New York
WEC Energy Group, Inc.
Independent Electricity System Operator
Massachusetts Municipal Wholesale Electric
Company
Sempra - San Diego Gas and Electric
3
Basin Electric Power Cooperative
5
3
5
1
1
4
1
6
2
5
3
5
1
1
1
1
6
6
3
5
1
6
Edison International - Southern California Edison
Company
NRG - NRG Energy, Inc.
National Grid USA
Western Area Power Administration
Edison International - Southern California Edison
Company
Ameren - Ameren Services
Ameren - Ameren Services
Black Hills Corporation
National Grid USA
Ameren - Ameren Missouri
Balancing Authority of Northern California
Sacramento Municipal Utility District
Voter
Designated
Proxy
Peter Yost
Cristhian Godoy
Brian EvansMongeon
David Jendras
Thomas Breene
Constantin
Chitescu
NERC
Memo
Affirmative N/A
Affirmative N/A
Ballot
None
N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Selene Willis
None
Roger Brand
Scott Miller
Avani Pandya
David Weekley Scott Miller
Mike Marshall
Jonathan Robbins
Dermot Smyth
David Hathaway
Leonard Kula
Abstain
N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Anthony Stevens
Affirmative N/A
Bridget Silvia
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
Abstain
N/A
Jeremy Voll
Romel Aquino
Patricia Lynch
Michael Jones
sean erickson
Barry Jones
Jose Avendano
Mora
Tamara Evey
Robert Quinlivan
Brooke Voorhees
Brian Shanahan
Sam Dwyer
Kevin Smith
Joe Tarantino
Jamie Cutlip
Joe Tarantino
N/A
Affirmative N/A
None
N/A
Abstain
N/A
None
N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
5
4
1
3
6
3
6
3
3
4
5
6
5
3
1
1
Sacramento Municipal Utility District
Sacramento Municipal Utility District
Sacramento Municipal Utility District
Sacramento Municipal Utility District
International Transmission Company Holdings
Corporation
Seattle City Light
Puget Sound Energy, Inc.
PPL - Louisville Gas and Electric Co.
PPL - Louisville Gas and Electric Co.
APS - Arizona Public Service Co.
Seattle City Light
Puget Sound Energy, Inc.
Western Area Power Administration
Sempra - San Diego Gas and Electric
Tennessee Valley Authority
Tennessee Valley Authority
Nebraska Public Power District
10
New York State Reliability Council
1
4
5
City Utilities of Springfield, Missouri
City Utilities of Springfield, Missouri
Avista - Avista Corporation
1
SaskPower
1
APS - Arizona Public Service Co.
10
Midwest Reliability Organization
William Steiner
Negative
5
APS - Arizona Public Service Co.
Michelle
Amarantos
Affirmative N/A
LeRoy Patterson
Affirmative N/A
Marcus Bortman
Affirmative N/A
Amy Jones
Affirmative N/A
Steve Ritscher
Abstain
1
6
6
5
1
3
3
6
5
1
5
4
5
Public Utility District No. 2 of Grant County,
Washington
APS - Arizona Public Service Co.
Public Utility District No. 2 of Grant County,
Washington
Dairyland Power Cooperative
Berkshire Hathaway Energy - MidAmerican
Energy Co.
Tacoma Public Utilities (Tacoma, WA)
Tennessee Valley Authority
Austin Energy
Puget Sound Energy, Inc.
San Miguel Electric Cooperative, Inc.
WEC Energy Group, Inc.
Platte River Power Authority
Nicole Goi
Beth Tincher
Arthur Starkovich
Nicole Looney
Joe Tarantino
Joe Tarantino
Joe Tarantino
Joe Tarantino
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Michael Moltane Gail Elliott
Affirmative N/A
Brian Belger
Nicolas Pacholski
Linn Oelker
James Frank
Jessica Lopez
Hao Li
Lynn Murphy
Erin Green
Jennifer Wright
Ian Grant
Gabe Kurtz
Jamison Cawley
ALAN
ADAMSON
Michael Bowman
John Allen
Glen Farmer
Wayne
Guttormson
Daniela
Atanasovski
None
N/A
Affirmative N/A
None
N/A
None
N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
Abstain
N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
None
N/A
Darnez Gresham
Marc Donaldson
Marjorie Parsons
Michael Dillard
Chelsey Neil
Lana Smith
Matthew Beilfuss
Tyson Archie
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
Comments
Submitted
N/A
Comments
Negative
Submitted
Jennie Wike Affirmative N/A
Abstain
N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
1
Glencoe Light and Power Commission
Terry Volkmann
1
Network and Security Technologies
Nicholas Lauriat
1
1
Public Utility District No. 1 of Pend Oreille
County
Seattle City Light
Eversource Energy
6
Basin Electric Power Cooperative
Jerry Horner
1
Minnkota Power Cooperative Inc.
Theresa Allard
3
3
6
1
3
1
5
3
3
3
1
5
4
3
Associated Electric Cooperative, Inc.
Platte River Power Authority
Associated Electric Cooperative, Inc.
Central Electric Power Cooperative (Missouri)
M and A Electric Power Cooperative
KAMO Electric Cooperative
Associated Electric Cooperative, Inc.
Northeast Missouri Electric Power Cooperative
KAMO Electric Cooperative
Sho-Me Power Electric Cooperative
Sho-Me Power Electric Cooperative
Florida Municipal Power Agency
Florida Municipal Power Agency
Florida Municipal Power Agency
6
Florida Municipal Power Agency
1
1
3
Northeast Missouri Electric Power Cooperative
N.W. Electric Power Cooperative, Inc.
NW Electric Power Cooperative, Inc.
1
Hydro One Networks, Inc.
6
5
1
5
Platte River Power Authority
Los Angeles Department of Water and Power
Tacoma Public Utilities (Tacoma, WA)
Brazos Electric Power Cooperative, Inc.
5
Herb Schrayshuen
3
3
1
3
3
1
4
Lakeland Electric
Georgia System Operations Corporation
Long Island Power Authority
Manitoba Hydro
Los Angeles Department of Water and Power
Tri-State G and T Association, Inc.
FirstEnergy - FirstEnergy Corporation
Todd Bennett
Wade Kiess
Brian Ackermann
Michael Bax
Stephen Pogue
Micah Breedlove
Brad Haralson
Skyler Wiegmann
Tony Gott
Jarrod Murdaugh
Peter Dawson
Chris Gowder
Dan O'Hagan
Carl Turner
Richard
Montgomery
Kevin White
Mark Ramsey
John Stickley
Payam
Farahbakhsh
Sabrina Martz
Glenn Barry
John Merrell
Shari Heino
Herb
Schrayshuen
Steve Marshall
Scott McGough
Isidoro Behar
Mike Smith
Tony Skourtas
Donna Wood
Mark Garza
1
Abstain
Roger
Negative
Fradenburgh
N/A
Comments
Submitted
Kevin Conway
Abstain
Michael Jang
Quintin Lee
Abstain
N/A
Affirmative N/A
Comments
Negative
Submitted
Andy
Fuhrman
N/A
Affirmative N/A
Truong Le
Truong Le
Truong Le
Affirmative N/A
Abstain
N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
None
N/A
None
N/A
None
N/A
Truong Le
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Mark Ciufo
Affirmative N/A
Abstain
N/A
Abstain
N/A
Jennie Wike Affirmative N/A
Abstain
N/A
Affirmative N/A
None
N/A
Affirmative N/A
None
N/A
None
N/A
None
N/A
Affirmative N/A
Affirmative N/A
3
Tri-State G and T Association, Inc.
1
5
6
Lakeland Electric
Lakeland Electric
OGE Energy - Oklahoma Gas and Electric Co.
3
Eversource Energy
1
5
1
1
5
1
Tallahassee Electric (City of Tallahassee, FL)
Oglethorpe Power Corporation
Los Angeles Department of Water and Power
Black Hills Corporation
Black Hills Corporation
Seminole Electric Cooperative, Inc.
Janelle Marriott
Gill
Larry Watt
Becky Rinier
Sing Tay
Christopher
McKinnon
Scott Langston
Donna Johnson
faranak sarbaz
Seth Nelson
Derek Silbaugh
Bret Galbraith
6
NiSource - Northern Indiana Public Service Co.
Joe O'Brien
3
NiSource - Northern Indiana Public Service Co.
Steven Taddeucci
6
New York Power Authority
6
Talen Energy Marketing, LLC
1
1
3
3
6
3
3
6
FirstEnergy - FirstEnergy Corporation
M and A Electric Power Cooperative
Dominion - Dominion Resources, Inc.
Muscatine Power and Water
Muscatine Power and Water
OGE Energy - Oklahoma Gas and Electric Co.
Westar Energy
Westar Energy
Southern Company - Southern Company
Generation
Erick Barrios
Jennifer
Hohenshilt
Julie Severino
William Price
Connie Schroeder
Seth Shoemaker
Nick Burns
Donald Hargrove
Bryan Taggart
Grant Wilkerson
5
James Howell
1
3
6
3
Simon TanapatAndre
Tennessee Valley Authority
M Lee Thomas
Aaron
FirstEnergy - FirstEnergy Corporation
Ghodooshim
OGE Energy - Oklahoma Gas and Electric Co.
Terri Pyle
Black Hills Corporation
Don Stahl
PSEG - PSEG Energy Resources and Trade LLC Joseph Neglia
Nebraska Public Power District
Tony Eddleman
5
Northern California Power Agency
Jeremy Lawson
3
CMS Energy - Consumers Energy Company
5
CMS Energy - Consumers Energy Company
4
Georgia System Operations Corporation
Karl Blaszkowski
David
Greyerbiehl
Benjamin
Winslett
6
5
3
Manitoba Hydro
Affirmative N/A
None
N/A
None
N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
None
N/A
None
N/A
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
Abstain
N/A
Affirmative N/A
None
N/A
None
N/A
Affirmative N/A
None
N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
Affirmative N/A
1
New York Power Authority
1
5
5
3
3
5
6
1
3
1
OTP - Otter Tail Power Company
PSEG - PSEG Fossil LLC
OTP - Otter Tail Power Company
OTP - Otter Tail Power Company
Owensboro Municipal Utilities
Entergy - Entergy Services, Inc.
Portland General Electric Co.
Muscatine Power and Water
New York Power Authority
BC Hydro and Power Authority
Salvatore
Spagnolo
Charles Wicklund
Tim Kucey
Brett Jacobs
Wendi Olson
Thomas Lyons
Gail Golden
Daniel Mason
Andy Kurriger
David Rivera
Adrian Andreoiu
1
NiSource - Northern Indiana Public Service Co.
Steve Toosevich
5
NiSource - Northern Indiana Public Service Co.
Kathryn Tackett
3
6
BC Hydro and Power Authority
Los Angeles Department of Water and Power
Hootan Jarollahi
Anton Vu
1
Omaha Public Power District
Doug Peterchuck
10
5
2
6
SERC Reliability Corporation
JEA
Electric Reliability Council of Texas, Inc.
Seminole Electric Cooperative, Inc.
Dave Krueger
John Babik
Brandon Gleason
David Reinecke
5
Imperial Irrigation District
Tino Zaragoza
1
Sunflower Electric Power Corporation
Paul Mehlhaff
6
Imperial Irrigation District
Diana Torres
1
5
Public Utility District No. 1 of Chelan County
Public Utility District No. 1 of Chelan County
Affirmative N/A
Affirmative N/A
1
Imperial Irrigation District
3
Public Utility District No. 1 of Chelan County
5
BC Hydro and Power Authority
Ginette Lacasse
Meaghan Connell
Jesus Sammy
Denise
Alcaraz
Sanchez
Joyce Gundry
Helen Hamilton
Harding
Lynn Goldstein
None
5
5
PNM Resources - Public Service Company of
New Mexico
NB Power Corporation
Dairyland Power Cooperative
Berkshire Hathaway Energy - MidAmerican
Energy Co.
Hydro-Qu?bec Production
Tacoma Public Utilities (Tacoma, WA)
3
Imperial Irrigation District
1
1
5
1
Nurul Abser
Tommy Drea
Affirmative N/A
None
N/A
Abstain
N/A
None
N/A
None
N/A
Abstain
N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Abstain
N/A
Comments
Negative
Submitted
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Denise
Sanchez
Affirmative N/A
Negative
Denise
Sanchez
Comments
Submitted
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
N/A
Affirmative N/A
Abstain
N/A
Comments
Terry Harbour
Negative
Submitted
Carl Pineault
Affirmative N/A
Ozan Ferrin
Jennie Wike Affirmative N/A
Denise
Glen Allegranza
Affirmative N/A
Sanchez
5
3
Portland General Electric Co.
Portland General Electric Co.
Ryan Olson
Dan Zollner
JULIE
HOSTRANDER
Abstain
Abstain
N/A
N/A
5
PPL - Louisville Gas and Electric Co.
None
N/A
5
Berkshire Hathaway - NV Energy
Kevin Salsbury
Negative
Comments
Submitted
3
Pacific Gas and Electric Company
Sandra Ellis
1
Pacific Gas and Electric Company
Marco Rios
1
6
3
5
5
Santee Cooper
Santee Cooper
Santee Cooper
Santee Cooper
WEC Energy Group, Inc.
Chris Wagner
Marty Watson
James Poston
Tommy Curtis
Clarice Zellmer
6
Dominion - Dominion Resources, Inc.
Sean Bodkin
1
Gainesville Regional Utilities
5
Lincoln Electric System
4
Tacoma Public Utilities (Tacoma, WA)
David Owens
Kayleigh
Wilkerson
Hien Ho
6
Northern California Power Agency
Dennis Sismaet
1
Portland General Electric Co.
Brooke Jockin
5
Pacific Gas and Electric Company
Ed Hanson
6
Tacoma Public Utilities (Tacoma, WA)
6
Great River Energy
1
Terry Gifford
Donna
Stephenson
Mike ONeil
5
3
NextEra Energy - Florida Power and Light Co.
Southern Company - Southern Company Services,
Matt Carden
Inc.
Choctaw Generation Limited Partnership, LLLP Rob Watson
Seminole Electric Cooperative, Inc.
Jeremy Lorigan
5
Dominion - Dominion Resources, Inc.
Rachel Snead
10
Northeast Power Coordinating Council
Guy V. Zito
6
Berkshire Hathaway - PacifiCorp
Lindsay Wickizer
6
Powerex Corporation
1
American Transmission Company, LLC
4
5
Alliant Energy Corporation Services, Inc.
New York Power Authority
Public Utility District No. 2 of Grant County,
Washington
Raj Hundal
LaTroy
Brumfield
Larry Heckert
Zahid Qayyum
1
4
Karla Weaver
Michael
Johnson
Michael
Johnson
Truong Le
Affirmative N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
Abstain
N/A
Abstain
N/A
Affirmative N/A
Comments
Negative
Submitted
None
N/A
Abstain
N/A
Jennie Wike Affirmative N/A
Comments
Negative
Submitted
Abstain
N/A
Michael
Affirmative N/A
Johnson
Jennie Wike Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
None
N/A
None
N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
1
3
5
6
1
3
5
4
1
Exelon
Exelon
Exelon
Exelon
Entergy - Entergy Services, Inc.
City Utilities of Springfield, Missouri
Enel Green Power
CMS Energy - Consumers Energy Company
Memphis Light, Gas and Water Division
1
Bonneville Power Administration
6
3
5
Bonneville Power Administration
Bonneville Power Administration
Bonneville Power Administration
Daniel Gacek
Kinte Whitehead
Cynthia Lee
Becky Webb
Oliver Burke
Duan Gavel
Mat Bunch
Aric Root
Allan Long
Kammy RogersHolliday
Andrew Meyers
Ken Lanehome
Scott Winner
5
Great River Energy
Jacalynn Bentz
1
3
4
5
6
1
5
1
6
Georgia Transmission Corporation
Snohomish County PUD No. 1
Public Utility District No. 1 of Snohomish County
Public Utility District No. 1 of Snohomish County
Snohomish County PUD No. 1
Public Utility District No. 1 of Snohomish County
AEP
AEP - AEP Service Corporation
AEP
10
ReliabilityFirst
3
Austin Energy
5
5
5
3
6
Cogentrix Energy Power Management, LLC
Seminole Electric Cooperative, Inc.
Cowlitz County PUD
Florida Reliability Coordinating Council –
Member Services Division
AEP
Lakeland Electric
Greg Davis
Holly Chaney
John Martinsen
Sam Nietfeld
John Liang
Alyssia Rhoads
Thomas Foltz
Dennis Sauriol
JT Kuehne
Anthony
Jablonski
W. Dwayne
Preston
Gerry Adamski
Trena Haynes
Deanna Carlson
10
Texas Reliability Entity, Inc.
Rachel Coyne
6
Duke Energy
Greg Cecil
5
Duke Energy
Dale Goodwine
3
Duke Energy
Lee Schuster
6
Arkansas Electric Cooperative Corporation
Bruce Walkup
8
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Comments
Negative
Submitted
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
Vince Ordax
Abstain
N/A
Kent Feliks
Paul Shipps
Abstain
N/A
Affirmative N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
None
N/A
3
5
Arkansas Electric Cooperative Corporation
Arkansas Electric Cooperative Corporation
Mark Gann
Adrian Harris
1
East Kentucky Power Cooperative
Amber Skillern
3
East Kentucky Power Cooperative
Patrick Woods
1
Duke Energy
Laura Lee
1
Arizona Electric Power Cooperative, Inc.
Jennifer Bray
5
East Kentucky Power Cooperative
David Meade
3
5
Wabash Valley Power Association
SunPower
6
Evergy
1
3
5
5
6
Evergy
Evergy
Evergy
FirstEnergy - FirstEnergy Corporation
FirstEnergy - FirstEnergy Corporation
Susan Sosbe
Bradley Collard
Thomas
ROBBEN
Allen Klassen
Marcus Moor
Derek Brown
Robert Loy
Ann Carey
© 2021 - NERC Ver 4.3.0.0
Machine Name: ERODVSBSWB02
None
None
N/A
N/A
Comments
Negative
Submitted
Comments
Negative
Submitted
Comments
Negative
Submitted
Affirmative N/A
Comments
Negative
Submitted
None
N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
CIP-004-X — Cyber Security – Personnel & Training
Standard Development Timeline
This section is maintained by the drafting team during the development of the standard and will be
removed when the standard is adopted by the NERC Board of Trustees (Board).
Description of Current Draft
Completed Actions
Standards Committee approved Standard Authorization
Request (SAR) for posting
Date
March 22, 2019
SAR posted for comment
March 28, 2019 – April 26, 2019
45-day formal comment period with ballot
December 20, 2019 – February
3, 2020
45-day formal comment period with ballot
August 6 – September 21, 2020
45-day formal comment period with ballot
March 25 – May 10, 2021
10-day final ballot
June 2 – 11, 2021
Anticipated Actions
Board adoption
Final Draft
June 2021
Date
November 2021
Page 1 of 32
CIP-004-X — Cyber Security – Personnel & Training
A. Introduction
1. Title:
Cyber Security — Personnel & Training
2. Number:
CIP-004-X
3. Purpose: To minimize the risk against compromise that could lead to misoperation or
instability in the Bulk Electric System (BES) from individuals accessing BES Cyber Systems by
requiring an appropriate level of personnel risk assessment, training, security awareness,
and access management in support of protecting BES Cyber Systems.
4. Applicability:
4.1.
Functional Entities: For the purpose of the requirements contained herein, the
following list of functional entities will be collectively referred to as “Responsible
Entities.” For requirements in this standard where a specific functional entity or
subset of functional entities are the applicable entity or entities, the functional
entity or entities are specified explicitly.
4.1.1. Balancing Authority
4.1.2. Distribution Provider that owns one or more of the following Facilities,
systems, and equipment for the protection or restoration of the BES:
4.1.2.1. Each underfrequency Load shedding (UFLS) or undervoltage Load
shedding (UVLS) system that:
4.1.2.1.1. is part of a Load shedding program that is subject to one
or more requirements in a NERC or Regional Reliability
Standard; and
4.1.2.1.2. performs automatic Load shedding under a common
control system owned by the Responsible Entity, without
human operator initiation, of 300 MW or more.
4.1.2.2. Each Remedial Action Scheme (RAS) where the RAS is subject to one
or more requirements in a NERC or Regional Reliability Standard.
4.1.2.3. Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.1.2.4. Each Cranking Path and group of Elements meeting the initial
switching requirements from a Blackstart Resource up to and
including the first interconnection point of the starting station
service of the next generation unit(s) to be started.
4.1.3. Generator Operator
4.1.4. Generator Owner
4.1.5. Reliability Coordinator
4.1.6. Transmission Operator
Final Draft
June 2021
Page 2 of 32
CIP-004-X — Cyber Security – Personnel & Training
4.1.7. Transmission Owner
4.2.
Facilities: For the purpose of the requirements contained herein, the following
Facilities, systems, and equipment owned by each Responsible Entity in 4.1 above
are those to which these requirements are applicable. For requirements in this
standard where a specific type of Facilities, system, or equipment or subset of
Facilities, systems, and equipment are applicable, these are specified explicitly.
4.2.1. Distribution Provider: One or more of the following Facilities, systems and
equipment owned by the Distribution Provider for the protection or
restoration of the BES:
4.2.1.1. Each UFLS or UVLS System that:
4.2.1.1.1. is part of a Load shedding program that is subject to one
or more requirements in a NERC or Regional Reliability
Standard; and
4.2.1.1.2. performs automatic Load shedding under a common
control system owned by the Responsible Entity, without
human operator initiation, of 300 MW or more.
4.2.1.2. Each RAS where the RAS is subject to one or more requirements in a
NERC or Regional Reliability Standard.
4.2.1.3. Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.2.1.4. Each Cranking Path and group of Elements meeting the initial
switching requirements from a Blackstart Resource up to and
including the first interconnection point of the starting station
service of the next generation unit(s) to be started.
4.2.2. Responsible Entities listed in 4.1 other than Distribution Providers: All BES
Facilities.
4.2.3. Exemptions: The following are exempt from Standard CIP-004-X:
4.2.3.1. Cyber Assets at Facilities regulated by the Canadian Nuclear Safety
Commission.
4.2.3.2. Cyber Assets associated with communication networks and data
communication links between discrete Electronic Security
Perimeters.
4.2.3.3. The systems, structures, and components that are regulated by the
Nuclear Regulatory Commission under a cyber security plan pursuant
to 10 C.F.R. Section 73.54.
4.2.3.4. For Distribution Providers, the systems and equipment that are not
included in section 4.2.1 above.
Final Draft
June 2021
Page 3 of 32
CIP-004-X — Cyber Security – Personnel & Training
4.2.3.5. Responsible Entities that identify that they have no BES Cyber
Systems categorized as high impact or medium impact according to
the CIP-002-5.1a identification and categorization processes.
5. Effective Dates: See Implementation Plan for CIP-004-X.
6. Background: Standard CIP-004 exists as part of a suite of CIP Standards related to cyber
security, which require the initial identification and categorization of BES Cyber Systems and
require a minimum level of organizational, operational, and procedural controls to mitigate
risk to BES Cyber Systems.
Most requirements open with, “Each Responsible Entity shall implement one or more
documented [processes, plan, etc.] that include the applicable items in [Table Reference].”
The referenced table requires the applicable items in the procedures for the common
subject matter of the requirements.
The term documented processes refers to a set of required instructions specific to the
Responsible Entity and to achieve a specific outcome. This term does not imply any
particular naming or approval structure beyond what is stated in the requirements. An
entity should include as much as it believes necessary in its documented processes, but it
must address the applicable requirements in the table.
The terms program and plan are sometimes used in place of documented processes where it
makes sense and is commonly understood. For example, documented processes describing
a response are typically referred to as plans (i.e., incident response plans and recovery
plans). Likewise, a security plan can describe an approach involving multiple procedures to
address a broad subject matter.
Similarly, the term program may refer to the organization’s overall implementation of its
policies, plans and procedures involving a subject matter. Examples in the standards
include the personnel risk assessment program and the personnel training program. The
full implementation of the CIP Cyber Security Standards could also be referred to as a
program. However, the terms program and plan do not imply any additional requirements
beyond what is stated in the standards.
Responsible Entities can implement common controls that meet requirements for multiple
high and medium impact BES Cyber Systems. For example, a single training program could
meet the requirements for training personnel across multiple BES Cyber Systems.
Measures for the initial requirement are simply the documented processes themselves.
Measures in the table rows provide examples of evidence to show documentation and
implementation of applicable items in the documented processes. These measures serve to
provide guidance to entities in acceptable records of compliance and should not be viewed
as an all-inclusive list.
Final Draft
June 2021
Page 4 of 32
CIP-004-X — Cyber Security – Personnel & Training
Throughout the standards, unless otherwise stated, bulleted items in the requirements and
measures are items that are linked with an “or,” and numbered items are items that are
linked with an “and.”
Many references in the Applicability section use a threshold of 300 MW for UFLS and UVLS.
This particular threshold of 300 MW for UVLS and UFLS was provided in Version 1 of the CIP
Cyber Security Standards. The threshold remains at 300 MW since it is specifically
addressing UVLS and UFLS, which are last ditch efforts to save the BES. A review of UFLS
tolerances defined within regional reliability standards for UFLS program requirements to
date indicates that the historical value of 300 MW represents an adequate and reasonable
threshold value for allowable UFLS operational tolerances.
“Applicable Systems” Columns in Tables:
Each table has an “Applicable Systems” column to further define the scope of systems to
which a specific requirement row applies. The CSO706 SDT adapted this concept from the
National Institute of Standards and Technology (“NIST”) Risk Management Framework as a
way of applying requirements more appropriately based on impact and connectivity
characteristics. The following conventions are used in the “Applicable Systems” column as
described.
•
High Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as high
impact according to the CIP-002-5.1a identification and categorization processes.
•
Medium Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as
medium impact according to the CIP-002-5.1a identification and categorization
processes.
•
Medium Impact BES Cyber Systems with External Routable Connectivity – Only applies
to medium impact BES Cyber Systems with External Routable Connectivity. This also
excludes Cyber Assets in the BES Cyber System that cannot be directly accessed through
External Routable Connectivity.
•
Electronic Access Control or Monitoring Systems (EACMS) – Applies to each Electronic
Access Control or Monitoring System associated with a referenced high impact BES
Cyber System or medium impact BES Cyber System. Examples may include, but are not
limited to, firewalls, authentication servers, and log monitoring and alerting systems.
•
Physical Access Control Systems (PACS) – Applies to each Physical Access Control
System associated with a referenced high impact BES Cyber System or medium impact
BES Cyber System with External Routable Connectivity.
Final Draft
June 2021
Page 5 of 32
CIP-004-X — Cyber Security – Personnel & Training
B. Requirements and Measures
R1. Each Responsible Entity shall implement one or more documented processes that collectively include each of the
applicable requirement parts in CIP-004-X Table R1 – Security Awareness Program. [Violation Risk Factor: Lower] [Time
Horizon: Operations Planning]
M1. Evidence must include each of the applicable documented processes that collectively include each of the applicable
requirement parts in CIP-004-X Table R1 – Security Awareness Program and additional evidence to demonstrate
implementation as described in the Measures column of the table.
CIP-004-X Table R1 – Security Awareness Program
Part
1.1
Applicable Systems
High Impact BES Cyber Systems
Medium Impact BES Cyber Systems
Requirements
Security awareness that, at least once
each calendar quarter, reinforces cyber
security practices (which may include
associated physical security practices)
for the Responsible Entity’s personnel
who have authorized electronic or
authorized unescorted physical access
to BES Cyber Systems.
Measures
An example of evidence may include,
but is not limited to, documentation
that the quarterly reinforcement has
been provided. Examples of evidence
of reinforcement may include, but are
not limited to, dated copies of
information used to reinforce security
awareness, as well as evidence of
distribution, such as:
•
•
•
Final Draft
June 2021
direct communications (for
example, e-mails, memos,
computer-based training); or
indirect communications (for
example, posters, intranet, or
brochures); or
management support and
reinforcement (for example,
presentations or meetings).
Page 6 of 32
CIP-004-X — Cyber Security – Personnel & Training
R2. Each Responsible Entity shall implement one or more cyber security training program(s) appropriate to individual roles,
functions, or responsibilities that collectively includes each of the applicable requirement parts in CIP-004-X Table R2 –
Cyber Security Training Program. [Violation Risk Factor: Lower] [Time Horizon: Operations Planning]
M2. Evidence must include the training program that includes each of the applicable requirement parts in CIP-004-X Table R2 –
Cyber Security Training Program and additional evidence to demonstrate implementation of the program(s).
CIP-004-X Table R2 – Cyber Security Training Program
Part
2.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Requirements
Training content on:
2.1.1. Cyber security policies;
2.1.2. Physical access controls;
2.1.3. Electronic access controls;
Measures
Examples of evidence may include, but
are not limited to, training material such
as power point presentations, instructor
notes, student notes, handouts, or other
training materials.
2.1.4. The visitor control program;
2.1.5. Handling of BES Cyber System
Information and its storage;
2.1.6. Identification of a Cyber
Security Incident and initial
notifications in accordance with
the entity’s incident response
plan;
2.1.7. Recovery plans for BES Cyber
Systems;
2.1.8. Response to Cyber Security
Incidents; and
2.1.9. Cyber security risks associated
with a BES Cyber System’s
electronic interconnectivity and
interoperability with other
Final Draft
June 2021
Page 7 of 32
CIP-004-X — Cyber Security – Personnel & Training
CIP-004-X Table R2 – Cyber Security Training Program
Part
Applicable Systems
Requirements
Measures
Cyber Assets, including
Transient Cyber Assets, and
with Removable Media.
2.2
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
Require completion of the training
specified in Part 2.1 prior to granting
authorized electronic access and
authorized unescorted physical access
to applicable Cyber Assets, except
during CIP Exceptional Circumstances.
Examples of evidence may include, but
are not limited to, training records and
documentation of when CIP Exceptional
Circumstances were invoked.
1. EACMS; and
2. PACS
2.3
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
Require completion of the training
Examples of evidence may include, but
specified in Part 2.1 at least once every are not limited to, dated individual
15 calendar months.
training records.
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Final Draft
June 2021
Page 8 of 32
CIP-004-X — Cyber Security – Personnel & Training
R3. Each Responsible Entity shall implement one or more documented personnel risk assessment program(s) to attain and
retain authorized electronic or authorized unescorted physical access to BES Cyber Systems that collectively include each of
the applicable requirement parts in CIP-004-X Table R3 – Personnel Risk Assessment Program. [Violation Risk Factor:
Medium] [Time Horizon: Operations Planning].
M3. Evidence must include the documented personnel risk assessment programs that collectively include each of the applicable
requirement parts in CIP-004-X Table R3 – Personnel Risk Assessment Program and additional evidence to demonstrate
implementation of the program(s).
CIP-004-X Table R2 – Cyber Security Training Program
Part
3.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
Requirements
Measures
Process to confirm identity.
An example of evidence may include,
but is not limited to, documentation of
the Responsible Entity’s process to
confirm identity.
Process to perform a seven year
criminal history records check as part of
each personnel risk assessment that
includes:
An example of evidence may include,
but is not limited to, documentation of
the Responsible Entity’s process to
perform a seven year criminal history
records check.
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and
their associated:
1. EACMS; and
2. PACS
3.2
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and
their associated:
1. EACMS; and
Final Draft
June 2021
3.2.1. current residence, regardless of
duration; and
3.2.2. other locations where, during
the seven years immediately prior to
the date of the criminal history
Page 9 of 32
CIP-004-X — Cyber Security – Personnel & Training
CIP-004-X Table R2 – Cyber Security Training Program
Part
Applicable Systems
2. PACS
Requirements
Measures
records check, the subject has resided
for six consecutive months or more.
If it is not possible to perform a full
seven year criminal history records
check, conduct as much of the seven
year criminal history records check as
possible and document the reason the
full seven year criminal history records
check could not be performed.
3.3
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
Criteria or process to evaluate criminal
history records checks for authorizing
access.
An example of evidence may include,
but is not limited to, documentation of
the Responsible Entity’s process to
evaluate criminal history records
checks.
Criteria or process for verifying that
personnel risk assessments performed
for contractors or service vendors are
conducted according to Parts 3.1
through 3.3.
An example of evidence may include,
but is not limited to, documentation of
the Responsible Entity’s criteria or
process for verifying contractors or
service vendors personnel risk
assessments.
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and
their associated:
1. EACMS; and
2. PACS
3.4
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and
Final Draft
June 2021
Page 10 of 32
CIP-004-X — Cyber Security – Personnel & Training
CIP-004-X Table R2 – Cyber Security Training Program
Part
Applicable Systems
Requirements
Measures
their associated:
1. EACMS; and
2. PACS
3.5
High Impact BES Cyber Systems and
their associated:
Process to ensure that individuals with
authorized electronic or authorized
unescorted physical access have had a
1. EACMS; and
personnel risk assessment completed
2. PACS
according to Parts 3.1 to 3.4 within the
Medium Impact BES Cyber Systems with last seven years.
External Routable Connectivity and
their associated:
An example of evidence may include,
but is not limited to, documentation of
the Responsible Entity’s process for
ensuring that individuals with
authorized electronic or authorized
unescorted physical access have had a
personnel risk assessment completed
within the last seven years.
1. EACMS; and
2. PACS
Final Draft
June 2021
Page 11 of 32
CIP-004-X — Cyber Security – Personnel & Training
R4. Each Responsible Entity shall implement one or more documented access management program(s) that collectively
include each of the applicable requirement parts in CIP-004-X Table R4 – Access Management Program. [Violation Risk
Factor: Medium] [Time Horizon: Operations Planning and Same Day Operations].
M4. Evidence must include the documented processes that collectively include each of the applicable requirement parts in CIP004-X Table R4 – Access Management Program and additional evidence to demonstrate that the access management
program was implemented as described in the Measures column of the table.
CIP-004-X Table R2 – Cyber Security Training Program
Part
4.1
Applicable Systems
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
Requirements
Process to authorize based on need,
as determined by the Responsible
Entity, except for CIP Exceptional
Circumstances:
4.1.1. Electronic access; and
4.1.2. Unescorted physical access
into a Physical Security
Perimeter
Measures
An example of evidence may include,
but is not limited to, dated
documentation of the process to
authorize electronic access, and
unescorted physical access in a
Physical Security Perimeter.
2. PACS
4.2
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
Final Draft
June 2021
Verify at least once each calendar
quarter that individuals with active
electronic access or unescorted
physical access have authorization
records.
Examples of evidence may include,
but are not limited to:
•
Dated documentation of the
verification between the system
generated list of individuals who
have been authorized for access
(i.e., workflow database) and a
system generated list of
personnel who have access (i.e.,
user account listing), or
Page 12 of 32
CIP-004-X — Cyber Security – Personnel & Training
CIP-004-X Table R2 – Cyber Security Training Program
Part
Applicable Systems
Requirements
2. PACS
4.3
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Measures
Dated documentation of the
verification between a list of
individuals who have been
authorized for access (i.e.,
authorization forms) and a list of
individuals provisioned for access
(i.e., provisioning forms or shared
account listing).
For electronic access, verify at least
once every 15 calendar months that
all user accounts, user account
groups, or user role categories, and
their specific, associated privileges are
correct and are those that the
Responsible Entity determines are
necessary.
An example of evidence may include,
but is not limited to, documentation
of the review that includes all of the
following:
1. A dated listing of all
accounts/account groups or
roles within the system;
2. A summary description of
privileges associated with
each group or role;
3. Accounts assigned to the
group or role; and
Dated evidence showing verification
of the privileges for the group are
authorized and appropriate to the
work function performed by people
assigned to each account.
Final Draft
June 2021
Page 13 of 32
CIP-004-X — Cyber Security – Personnel & Training
R5. Each Responsible Entity shall implement one or more documented access revocation program(s) that collectively include
each of the applicable requirement parts in CIP-004-X Table R5 – Access Revocation. [Violation Risk Factor: Medium] [Time
Horizon: Same Day Operations and Operations Planning].
M5. Evidence must include each of the applicable documented programs that collectively include each of the applicable
requirement parts in CIP-004-X Table R5 – Access Revocation and additional evidence to demonstrate implementation as
described in the Measures column of the table.
CIP-004-X Table R2 – Cyber Security Training Program
Part
5.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
Requirements
A process to initiate removal of an
individual’s ability for unescorted
physical access and Interactive Remote
Access upon a termination action, and
complete the removals within 24 hours
of the termination action (Removal of
the ability for access may be different
than deletion, disabling, revocation, or
removal of all access rights).
An example of evidence may include,
but is not limited to, documentation of
all of the following:
For reassignments or transfers, revoke
the individual’s authorized electronic
access to individual accounts and
authorized unescorted physical access
that the Responsible Entity determines
are not necessary by the end of the
next calendar day following the date
that the Responsible Entity determines
that the individual no longer requires
retention of that access.
An example of evidence may include,
but is not limited to, documentation of
all of the following:
For termination actions, revoke the
An example of evidence may include,
2. PACS
5.2
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
5.3
High Impact BES Cyber Systems and their
Final Draft
June 2021
Measures
1. Dated workflow or sign-off form
verifying access removal
associated with the termination
action; and
Logs or other demonstration showing
such persons no longer have access.
1. Dated workflow or sign-off form
showing a review of logical and
physical access; and
Logs or other demonstration showing
such persons no longer have access
that the Responsible Entity determines
is not necessary.
Page 14 of 32
CIP-004-X — Cyber Security – Personnel & Training
CIP-004-X Table R2 – Cyber Security Training Program
Part
Applicable Systems
associated:
•
5.4
EACMS
High Impact BES Cyber Systems and their
associated:
•
EACMS
Requirements
Measures
individual’s non-shared user accounts
(unless already revoked according to
Part 5.1) within 30 calendar days of
the effective date of the termination
action.
but is not limited to, workflow or signoff form showing access removal for
any individual BES Cyber Assets and
software applications as determined
necessary to completing the
revocation of access and dated within
thirty calendar days of the termination
actions.
For termination actions, change
passwords for shared account(s)
known to the user within 30 calendar
days of the termination action. For
reassignments or transfers, change
passwords for shared account(s)
known to the user within 30 calendar
days following the date that the
Responsible Entity determines that
the individual no longer requires
retention of that access.
Examples of evidence may include, but
are not limited to:
If the Responsible Entity determines
and documents that extenuating
operating circumstances require a
longer time period, change the
password(s) within 10 calendar days
following the end of the operating
circumstances.
Final Draft
June 2021
•
Workflow or sign-off form
showing password reset within
30 calendar days of the
termination;
•
Workflow or sign-off form
showing password reset within
30 calendar days of the
reassignments or transfers; or
Documentation of the extenuating
operating circumstance and workflow
or sign-off form showing password
reset within 10 calendar days following
the end of the operating circumstance.
Page 15 of 32
CIP-004-X — Cyber Security – Personnel & Training
R6. Each Responsible Entity shall implement one or more documented access management program(s) to authorize, verify,
and revoke provisioned access to BCSI pertaining to the “Applicable Systems” identified in CIP-004-X Table R6 – Access
Management for BES Cyber System Information that collectively include each of the applicable requirement parts in CIP‐
004‐X Table R6 – Access Management for BES Cyber System Information. To be considered access to BCSI in the context of
this requirement, an individual has both the ability to obtain and use BCSI. Provisioned access is to be considered the
result of the specific actions taken to provide an individual(s) the means to access BCSI (e.g., may include physical keys or
access cards, user accounts and associated rights and privileges, encryption keys). [Violation Risk Factor: Medium] [Time
Horizon: Same Day Operations and Operations Planning].
M6. Evidence must include each of the applicable documented programs that collectively include the applicable requirement
parts in CIP-004-X Table R6 – Access Management for BES Cyber System Information and additional evidence to
demonstrate implementation as described in the Measures column of the table.
CIP-004-X Table R6 – Access Management for BES Cyber System Information
Part
6.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
Requirements
Measures
Prior to provisioning, authorize (unless
already authorized according to Part
4.1.) based on need, as determined by
the Responsible Entity, except for CIP
Exceptional Circumstances:
Examples of evidence may include, but
are not limited to, individual records or
lists that include who is authorized, the
date of the authorization, and the
justification of business need for the
provisioned access.
6.1.1. Provisioned electronic access to
electronic BCSI; and
6.1.2. Provisioned physical access to
physical BCSI.
2. PACS
Final Draft
June 2021
Page 16 of 32
CIP-004-X — Cyber Security – Personnel & Training
CIP-004-X Table R6 – Access Management for BES Cyber System Information
Part
6.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
Requirements
Verify at least once every 15 calendar
months that all individuals with
provisioned access to BCSI:
6.2.1. have an authorization record;
and
6.2.2. still need the provisioned access
to perform their current work
functions, as determined by the
Responsible Entity.
Measures
Examples of evidence may include, but
are not limited to, the documentation
of the review that includes all of the
following:
•
List of authorized individuals;
•
List of individuals who have been
provisioned access;
•
Verification that provisioned
access is appropriate based on
need; and
•
Documented reconciliation
actions, if any.
2. PACS
6.3
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
For termination actions, remove the
individual’s ability to use provisioned
access to BCSI (unless already revoked
according to Part 5.1) by the end of the
next calendar day following the
effective date of the termination
action.
Examples of dated evidence may
include, but are not limited to, access
revocation records associated with the
terminations and dated within the next
calendar day of the termination action.
1. EACMS; and
2. PACS
Final Draft
June 2021
Page 17 of 32
CIP-004-X — Cyber Security – Personnel & Training
C. Compliance
1. Compliance Monitoring Process:
1.1. Compliance Enforcement Authority: “Compliance Enforcement Authority” (CEA)
means NERC or the Regional Entity, or any entity as otherwise designated by an
Applicable Governmental Authority, in their respective roles of monitoring and/or
enforcing compliance with mandatory and enforceable Reliability Standards in
their respective jurisdictions.
1.2. Evidence Retention: The following evidence retention periods identify the period
of time an entity is required to retain specific evidence to demonstrate
compliance. For instances where the evidence retention period specified below is
shorter than the time since the last audit, the CEA may ask an entity to provide
other evidence to show that it was compliant for the full time period since the last
audit.
The applicable entity shall keep data or evidence to show compliance as identified
below unless directed by its CEA to retain specific evidence for a longer period of
time as part of an investigation:
•
The applicable entity shall retain evidence of each requirement in this standard
for three calendar years.
•
The applicable entity is found non-compliant, it shall keep information related
to the non-compliance until mitigation is complete and approved or for the
time specified above, whichever is longer.
•
The CEA shall keep the last audit records and all requested and submitted
subsequent audit records.
1.3. Compliance Monitoring and Enforcement Program: As defined in the NERC Rules
of Procedure, “Compliance Monitoring and Enforcement Program” refers to the
identification of the processes that will be used to evaluate data or information for
the purpose of assessing performance or outcomes with the associated Reliability
Standard.
Final Draft
June 2021
Page 18 of 32
CIP-004-X — Cyber Security – Personnel & Training
2. Table of Compliance Elements
R#
R1
R2
Final Draft
June 2021
Time Horizon
Operations
Planning
Operations
Planning
VRF
Lower
Lower
Violation Severity Levels (CIP-004-X)
Lower VSL
Moderate VSL
High VSL
Severe VSL
The Responsible Entity
did not reinforce
cyber security
practices during a
calendar quarter but
did so less than 10
calendar days after
the start of a
subsequent calendar
quarter. (1.1)
The Responsible Entity
did not reinforce
cyber security
practices during a
calendar quarter but
did so between 10 and
30 calendar days after
the start of a
subsequent calendar
quarter. (1.1)
The Responsible Entity
did not reinforce
cyber security
practices during a
calendar quarter but
did so within the
subsequent quarter
but beyond 30
calendar days after
the start of that
calendar quarter. (1.1)
The Responsible Entity
did not document or
implement any
security awareness
process(es) to
reinforce cyber
security practices. (R1)
The Responsible Entity
implemented a cyber
security training
program but failed to
include one of the
training content topics
in Requirement Parts
The Responsible Entity
implemented a cyber
security training
program but failed to
include two of the
training content topics
in Requirement Parts
The Responsible Entity
implemented a cyber
security training
program but failed to
include three of the
training content topics
in Requirement Parts
The Responsible Entity
did not implement a
cyber security training
program appropriate
to individual roles,
functions, or
responsibilities. (R2)
OR
The Responsible Entity
did not reinforce
cyber security
practices and
associated physical
security practices for
at least two
consecutive calendar
quarters. (1.1)
Page 19 of 32
CIP-004-X — Cyber Security – Personnel & Training
R#
Time Horizon
Violation Severity Levels (CIP-004-X)
VRF
Lower VSL
Moderate VSL
High VSL
2.1.1 through 2.1.9.
(2.1)
2.1.1 through 2.1.9.
(2.1)
2.1.1 through 2.1.9.
(2.1)
OR
OR
OR
Severe VSL
OR
The Responsible Entity
implemented a cyber
The Responsible Entity The Responsible Entity The Responsible Entity security training
implemented a cyber implemented a cyber implemented a cyber program but failed to
include four or more
security training
security training
security training
program but failed to program but failed to program but failed to of the training content
train one individual
train two individuals
train three individuals topics in Requirement
(with the exception of (with the exception of (with the exception of Parts 2.1.1 through
2.1.9. (2.1)
CIP Exceptional
CIP Exceptional
CIP Exceptional
Circumstances) prior
Circumstances) prior
Circumstances) prior
OR
to their being granted to their being granted to their being granted
authorized electronic authorized electronic authorized electronic The Responsible Entity
implemented a cyber
and authorized
and authorized
and authorized
security training
unescorted physical
unescorted physical
unescorted physical
program but failed to
access. (2.2)
access. (2.2)
access. (2.2)
train four or more
OR
OR
OR
individuals (with the
The Responsible Entity The Responsible Entity The Responsible Entity exception of CIP
implemented a cyber implemented a cyber implemented a cyber Exceptional
Circumstances) prior
security training
security training
security training
program but failed to program but failed to program but failed to to their being granted
train one individual
train two individuals
train three individuals authorized electronic
and authorized
with authorized
with authorized
with authorized
unescorted physical
electronic or
electronic or
electronic or
authorized unescorted authorized unescorted authorized unescorted access. (2.2)
physical access within physical access within physical access within OR
Final Draft
June 2021
Page 20 of 32
CIP-004-X — Cyber Security – Personnel & Training
R#
Time Horizon
VRF
Violation Severity Levels (CIP-004-X)
Lower VSL
Moderate VSL
High VSL
Severe VSL
15 calendar months of 15 calendar months of 15 calendar months of The Responsible Entity
the previous training
the previous training
the previous training
implemented a cyber
completion date. (2.3) completion date. (2.3) completion date. (2.3)
security training
program but failed to
train four or more
individuals with
authorized electronic
or authorized
unescorted physical
access within 15
calendar months of
the previous training
completion date. (2.3)
R3
Final Draft
June 2021
Operations
Planning
Medium
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
but did not conduct
the PRA as a condition
of granting authorized
electronic or
authorized unescorted
physical access for
one individual. (R3)
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
but did not conduct
the PRA as a condition
of granting authorized
electronic or
authorized unescorted
physical access for
two individuals. (R3)
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
but did not conduct
the PRA as a condition
of granting authorized
electronic or
authorized unescorted
physical access for
three individuals. (R3)
The Responsible Entity
did not have all of the
required elements as
described by 3.1
through 3.4 included
within documented
program(s) for
implementing
Personnel Risk
Assessments (PRAs),
for individuals,
including contractors
and service vendors,
for obtaining and
Page 21 of 32
CIP-004-X — Cyber Security – Personnel & Training
R#
Final Draft
June 2021
Time Horizon
Violation Severity Levels (CIP-004-X)
VRF
Lower VSL
Moderate VSL
OR
OR
The Responsible Entity
did conduct Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
not confirm identity
for one individual. (3.1
& 3.4)
The Responsible Entity
did conduct Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
not confirm identity
for two individuals.
(3.1 & 3.4)
OR
OR
The Responsible Entity
has a process to
perform seven-year
criminal history record
checks for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
The Responsible Entity
has a process to
perform seven-year
criminal history record
checks for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
High VSL
Severe VSL
retaining authorized
cyber or authorized
The Responsible Entity unescorted physical
did conduct Personnel access. (R3)
Risk Assessments
OR
(PRAs) for individuals,
The Responsible Entity
including contractors
and service vendors,
has a program for
with authorized
conducting Personnel
Risk Assessments
electronic or
authorized unescorted (PRAs) for individuals,
physical access but did including contractors
and service vendors,
not confirm identity
but did not conduct
for three individuals.
the PRA as a condition
(3.1 & 3.4)
of granting authorized
OR
electronic or
The Responsible Entity authorized unescorted
has a process to
physical access for
perform seven-year
four or more
criminal history record individuals. (R3)
checks for individuals,
OR
including contractors
and service vendors,
The Responsible Entity
with authorized
did conduct Personnel
electronic or
Risk Assessments
authorized unescorted (PRAs) for individuals,
physical access but did including contractors
OR
Page 22 of 32
CIP-004-X — Cyber Security – Personnel & Training
R#
Final Draft
June 2021
Time Horizon
Violation Severity Levels (CIP-004-X)
VRF
Lower VSL
Moderate VSL
High VSL
not include the
required checks
described in 3.2.1 and
3.2.2 for one
individual. (3.2 & 3.4)
not include the
required checks
described in 3.2.1 and
3.2.2 for two
individuals. (3.2 & 3.4)
not include the
required checks
described in 3.2.1 and
3.2.2 for three
individuals. (3.2 & 3.4)
OR
OR
The Responsible Entity
did conduct Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
not evaluate criminal
history records check
for access
authorization for one
individual. (3.3 & 3.4)
The Responsible Entity
did conduct Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
not evaluate criminal
history records check
for access
authorization for two
individuals. (3.3 & 3.4)
OR
OR
The Responsible Entity
did not conduct
Personnel Risk
Assessments (PRAs)
The Responsible Entity
did not conduct
Personnel Risk
Assessments (PRAs)
Severe VSL
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
not confirm identity
OR
for four or more
The Responsible Entity individuals. (3.1 & 3.4)
did conduct Personnel
OR
Risk Assessments
(PRAs) for individuals, The Responsible Entity
including contractors
has a process to
and service vendors,
perform seven-year
with authorized
criminal history record
electronic or
checks for individuals,
authorized unescorted including contractors
physical access but did and service vendors,
not evaluate criminal
with authorized
history records check electronic or
for access
authorized unescorted
authorization for
physical access but did
three individuals. (3.3 not include the
& 3.4)
required checks
described in 3.2.1 and
OR
3.2.2 for four or more
The Responsible Entity individuals. (3.2 & 3.4)
did not conduct
OR
Personnel Risk
Page 23 of 32
CIP-004-X — Cyber Security – Personnel & Training
R#
Time Horizon
VRF
Violation Severity Levels (CIP-004-X)
Lower VSL
Moderate VSL
High VSL
Severe VSL
for one individual with
authorized electronic
or authorized
unescorted physical
access within 7
calendar years of the
previous PRA
completion date. (3.5)
for two individuals
with authorized
electronic or
authorized unescorted
physical access within
7 calendar years of
the previous PRA
completion date. (3.5)
Assessments (PRAs)
for three individuals
with authorized
electronic or
authorized unescorted
physical access within
7 calendar years of
the previous PRA
completion date. (3.5)
The Responsible Entity
did conduct Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
not evaluate criminal
history records check
for access
authorization for four
or more individuals.
(3.3 & 3.4)
OR
The Responsible Entity
did not conduct
Personnel Risk
Assessments (PRAs)
for four or more
individuals with
authorized electronic
or authorized
unescorted physical
access within 7
Final Draft
June 2021
Page 24 of 32
CIP-004-X — Cyber Security – Personnel & Training
R#
R4
Final Draft
June 2021
Time Horizon
Operations
Planning and
Same Day
Operations
VRF
Medium
Violation Severity Levels (CIP-004-X)
Lower VSL
Moderate VSL
High VSL
Severe VSL
calendar years of the
previous PRA
completion date. (3.5)
The Responsible Entity The Responsible Entity The Responsible Entity The Responsible Entity
did not verify that
did not verify that
did not verify that
did not implement any
individuals with active individuals with active individuals with active documented
electronic or active
electronic or active
electronic or active
program(s) for access
unescorted physical
unescorted physical
unescorted physical
management. (R4)
access have
access have
access have
OR
authorization records authorization records authorization records
The Responsible Entity
during a calendar
during a calendar
during a calendar
did not implement
quarter but did so less quarter but did so
quarter but did so
one or more
than 10 calendar days between 10 and 20
between 20 and 30
documented
after the start of a
calendar days after
calendar days after
program(s) for access
subsequent calendar
the start of a
the start of a
management that
quarter. (4.2)
subsequent calendar
subsequent calendar
includes a process to
quarter. (4.2)
quarter. (4.2)
OR
authorize electronic
OR
OR
The Responsible Entity
access or unescorted
The Responsible Entity The Responsible Entity physical access. (4.1)
has implemented
processes to verify
has implemented
has implemented
OR
that user accounts,
processes to verify
processes to verify
The Responsible Entity
that user accounts,
that user accounts,
user account groups,
did not verify that
or user role
user account groups,
user account groups,
individuals with active
categories, and their
or user role
or user role
electronic or active
specific, associated
categories, and their
categories, and their
unescorted physical
privileges are correct
specific, associated
specific, associated
access have
and necessary within
privileges are correct
privileges are correct
Page 25 of 32
CIP-004-X — Cyber Security – Personnel & Training
R#
R5
Final Draft
June 2021
Time Horizon
Same Day
Operations
VRF
Medium
Violation Severity Levels (CIP-004-X)
Lower VSL
Moderate VSL
High VSL
Severe VSL
15 calendar months of
the previous
verification but for 5%
or less of its BES Cyber
Systems, privileges
were incorrect or
unnecessary. (4.3)
and necessary within
15 calendar months of
the previous
verification but for
more than 5% but less
than (or equal to) 10%
of its BES Cyber
Systems, privileges
were incorrect or
unnecessary. (4.3)
and necessary within
15 calendar months of
the previous
verification but for
more than 10% but
less than (or equal to)
15% of its BES Cyber
Systems, privileges
were incorrect or
unnecessary. (4.3)
authorization records
for at least two
consecutive calendar
quarters. (4.2)
The Responsible Entity
has implemented one
or more process(es) to
revoke the individual’s
The Responsible Entity
has implemented one
or more process(es) to
remove the ability for
The Responsible Entity
has implemented one
or more process(es) to
remove the ability for
The Responsible Entity
has not implemented
any documented
program(s) for access
OR
The Responsible Entity
has implemented
processes to verify
that user accounts,
user account groups,
or user role
categories, and their
specific, associated
privileges are correct
and necessary within
15 calendar months of
the previous
verification but for
more than 15% of its
BES Cyber Systems,
privileges were
incorrect or
unnecessary. (4.3)
Page 26 of 32
CIP-004-X — Cyber Security – Personnel & Training
R#
Time Horizon
and Operations
Planning
VRF
Violation Severity Levels (CIP-004-X)
Lower VSL
Moderate VSL
High VSL
user accounts upon
termination action but
did not do so for
within 30 calendar
days of the date of
termination action for
one or more
individuals. (5.3)
unescorted physical
access and Interactive
Remote Access upon a
termination action or
complete the removal
within 24 hours of the
termination action but
did not initiate those
removals for one
individual. (5.1)
unescorted physical
access and Interactive
Remote Access upon a
termination action or
complete the removal
within 24 hours of the
termination action but
did not initiate those
removals for two
individuals. (5.1)
Severe VSL
revocation for
electronic access or
unescorted physical
access. (R5)
OR
The Responsible Entity
has implemented one
or more process(es) to
OR
remove the ability for
unescorted physical
The Responsible Entity
OR
OR
access and Interactive
has implemented one
or more process(es) to The Responsible Entity The Responsible Entity Remote Access upon a
change passwords for has implemented one has implemented one termination action or
shared accounts
or more process(es) to or more process(es) to complete the removal
known to the user
determine that an
determine that an
within 24 hours of the
upon termination
individual no longer
individual no longer
termination action but
requires retention of
did not initiate those
action, reassignment, requires retention of
access following
access following
removals for three or
or transfer, but did
reassignments or
reassignments or
more individuals. (5.1)
not do so for within
transfers but, for one transfers but, for two OR
30 calendar days of
individual, did not
individuals, did not
the date of
termination action,
revoke the authorized revoke the authorized The Responsible Entity
has implemented one
reassignment, or
electronic access to
electronic access to
or more process(es) to
transfer for one or
individual accounts
individual accounts
determine that an
more individuals. (5.4) and authorized
and authorized
individual no longer
unescorted physical
unescorted physical
OR
requires retention of
access by the end of
access by the end of
Final Draft
June 2021
Page 27 of 32
CIP-004-X — Cyber Security – Personnel & Training
R#
R6
Final Draft
June 2021
Time Horizon
VRF
Same Day
Medium
Operations and
Operations
Planning
Violation Severity Levels (CIP-004-X)
Lower VSL
Moderate VSL
High VSL
Severe VSL
The Responsible Entity
has implemented one
or more process(es) to
determine and
document extenuating
operating
circumstances
following a
termination action,
reassignment, or
transfer, but did not
change one or more
passwords for shared
accounts known to
the user within 10
calendar days
following the end of
the extenuating
operating
circumstances. (5.4)
the next calendar day
following the
predetermined date.
(5.2)
the next calendar day
following the
predetermined date.
(5.2)
access following
reassignments or
transfers but, for
three or more
individuals, did not
revoke the authorized
electronic access to
individual accounts
and authorized
unescorted physical
access by the end of
the next calendar day
following the
predetermined date.
(5.2)
The Responsible Entity
has implemented one
or more program(s) as
required by
Requirement R6 Part
6.1 but, for one
individual, did not
The Responsible Entity
has implemented one
or more program(s) as
required by
Requirement R6 Part
6.1 but, for two
individuals, did not
The Responsible Entity
has implemented one
or more program(s) as
required by
Requirement R6 Part
6.1 but, for three
individuals, did not
The Responsible Entity
did not implement
one or more
documented access
management
program(s) for BCSI.
(R6)
Page 28 of 32
CIP-004-X — Cyber Security – Personnel & Training
R#
Time Horizon
VRF
Violation Severity Levels (CIP-004-X)
Lower VSL
Moderate VSL
High VSL
authorize provisioned
electronic access to
electronic BCSI or
provisioned physical
access to physical
BCSI. (6.1)
authorize provisioned
electronic access to
electronic BCSI or
provisioned physical
access to physical
BCSI. (6.1)
authorize provisioned
electronic access to
electronic BCSI or
provisioned physical
access to physical
BCSI. (6.1)
Severe VSL
OR
The Responsible Entity
has implemented one
or more program(s) as
required by
Requirement R6 Part
OR
OR
OR
6.1 but, for four or
The Responsible Entity The Responsible Entity The Responsible Entity more individuals, did
performed the
performed the
performed the
not authorize
provisioned electronic
verification required
verification required
verification required
access to electronic
by Requirement R6
by Requirement R6
by Requirement R6
Part 6.2 more than 15 Part 6.2 more than 16 Part 6.2 more than 17 BCSI or provisioned
calendar months but
calendar months but
calendar months but
physical access to
physical BCSI. (6.1)
less than or equal to
less than or equal to
less than or equal to
16 calendar months of 17 calendar months of 18 calendar months of OR
the previous
the previous
the previous
The Responsible Entity
verification. (6.2)
verification. (6.2)
verification. (6.2)
performed the
OR
OR
OR
verification required
The
Responsible
Entity
The Responsible Entity The Responsible Entity
by Requirement R6
has implemented one has implemented one has implemented one Part 6.2 more than 18
or more program(s) to or more program(s) to or more program(s) to calendar months of
remove the
remove the
remove the
the previous
individual’s ability to
individual’s ability to
individual’s ability to
verification. (6.2)
use provisioned
use provisioned
use provisioned
OR
access to BCSI but, for access to BCSI but, for access to BCSI but, for
one individual, did not two individuals, did
three individuals, did
Final Draft
June 2021
Page 29 of 32
CIP-004-X — Cyber Security – Personnel & Training
R#
Final Draft
June 2021
Time Horizon
VRF
Violation Severity Levels (CIP-004-X)
Lower VSL
Moderate VSL
High VSL
Severe VSL
do so by the
timeframe required in
Requirement R6, Part
6.3.
not do so by the
timeframe required in
Requirement R6, Part
6.3.
not do so by the
timeframe required in
Requirement R6, Part
6.3.
The Responsible Entity
has implemented one
or more program(s) to
remove the
individual’s ability to
use provisioned
access to BCSI but, for
four or more
individuals, did not do
so by the timeframe
required in
Requirement R6, Part
6.3.
Page 30 of 32
CIP-004-X — Cyber Security – Personnel & Training
D. Regional Variances
None.
E. Interpretations
None.
F. Associated Documents
None.
Version History
Version
Date
1
1/16/06
Action
R3.2 — Change “Control Center” to
“control center.”
Change Tracking
3/24/06
Modifications to clarify the requirements
and to bring the compliance elements
into conformance with the latest
guidelines for developing compliance
elements of standards.
2
9/30/09
Removal of reasonable business
judgment.
Replaced the RRO with the RE as a
responsible entity.
Rewording of Effective Date.
Changed compliance monitor to
Compliance Enforcement Authority.
Updated Version Number from -2 to -3
In Requirement 1.6, deleted the
sentence pertaining to removing
component or system from service in
order to perform testing, in response to
FERC order issued September 30, 2009.
3
12/16/09
3
12/16/09
Approved by the NERC Board of
Trustees.
3
3/31/10
Approved by FERC.
4
1/24/11
Approved by the NERC Board of
Trustees.
Final Draft
June 2021
Page 31 of 32
CIP-004-X — Cyber Security – Personnel & Training
Version
Date
Action
Change Tracking
Modified to coordinate
with other CIP
standards and to revise
format to use RBS
Template.
5
11/26/12
Adopted by the NERC Board of Trustees.
5
11/22/13
FERC Order issued approving CIP-004-5.
5.1
9/30/13
Modified two VSLs in R4
Errata
Adopted by the NERC Board of Trustees.
Addressed two FERC
directives from Order No.
791 related to identify,
assess, and correct
language and
communication
networks.
Replaces the version
adopted by the Board on
11/13/2014. Revised
version addresses
remaining directives
from Order No. 791
related to transient
devices and low impact
BES Cyber Systems.
6
11/13/14
6
2/12/15
Adopted by the NERC Board of Trustees.
6
1/21/16
FERC order issued approving CIP-004-6.
Docket No. RM15-14-000
7
TBD
Final Draft
June 2021
Adopted by the NERC Board of Trustees
Revised to enhance BES
reliability for entities to
manage their BCSI.
Page 32 of 32
CIP-004-X — Cyber Security – Personnel & Training
Standard Development Timeline
This section is maintained by the drafting team during the development of the standard and will be
removed when the standard is adopted by the NERC Board of Trustees (Board).
Description of Current Draft
Completed Actions
Standards Committee approved Standard Authorization
Request (SAR) for posting
Date
March 22, 2019
SAR posted for comment
March 28, 2019 – April 26, 2019
45-day formal comment period with ballot
December 20, 2019 – February
3, 2020
45-day formal comment period with ballot
August 6 – September 21, 2020
45-day formal comment period with ballot
March 25 – May 10, 2021
10-day final ballot
June 2 – 11, 2021
Anticipated Actions
10-day final ballot
Board adoption
Final Draft 3
MarchJune 2021
Date
May 2021
November 2021
Page 1 of 33
CIP-004-X — Cyber Security – Personnel & Training
A. Introduction
1. Title:
Cyber Security — Personnel & Training
2. Number:
CIP-004-X
3. Purpose: To minimize the risk against compromise that could lead to misoperation or
instability in the Bulk Electric System (BES) from individuals accessing BES Cyber Systems by
requiring an appropriate level of personnel risk assessment, training, security awareness,
and access management in support of protecting BES Cyber Systems.
4. Applicability:
4.1.
Functional Entities: For the purpose of the requirements contained herein, the
following list of functional entities will be collectively referred to as “Responsible
Entities.” For requirements in this standard where a specific functional entity or
subset of functional entities are the applicable entity or entities, the functional
entity or entities are specified explicitly.
4.1.1. Balancing Authority
4.1.2. Distribution Provider that owns one or more of the following Facilities,
systems, and equipment for the protection or restoration of the BES:
4.1.2.1. Each underfrequency Load shedding (UFLS) or undervoltage Load
shedding (UVLS) system that:
4.1.2.1.1. is part of a Load shedding program that is subject to one
or more requirements in a NERC or Regional Reliability
Standard; and
4.1.2.1.2. performs automatic Load shedding under a common
control system owned by the Responsible Entity, without
human operator initiation, of 300 MW or more.
4.1.2.2. Each Remedial Action Scheme (RAS) where the RAS is subject to one
or more requirements in a NERC or Regional Reliability Standard.
4.1.2.3. Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.1.2.4. Each Cranking Path and group of Elements meeting the initial
switching requirements from a Blackstart Resource up to and
including the first interconnection point of the starting station
service of the next generation unit(s) to be started.
4.1.3. Generator Operator
4.1.4. Generator Owner
4.1.5. Reliability Coordinator
4.1.6. Transmission Operator
Final Draft 3
MarchJune 2021
Page 2 of 33
CIP-004-X — Cyber Security – Personnel & Training
4.1.7. Transmission Owner
4.2.
Facilities: For the purpose of the requirements contained herein, the following
Facilities, systems, and equipment owned by each Responsible Entity in 4.1 above
are those to which these requirements are applicable. For requirements in this
standard where a specific type of Facilities, system, or equipment or subset of
Facilities, systems, and equipment are applicable, these are specified explicitly.
4.2.1. Distribution Provider: One or more of the following Facilities, systems and
equipment owned by the Distribution Provider for the protection or
restoration of the BES:
4.2.1.1. Each UFLS or UVLS System that:
4.2.1.1.1. is part of a Load shedding program that is subject to one
or more requirements in a NERC or Regional Reliability
Standard; and
4.2.1.1.2. performs automatic Load shedding under a common
control system owned by the Responsible Entity, without
human operator initiation, of 300 MW or more.
4.2.1.2. Each RAS where the RAS is subject to one or more requirements in a
NERC or Regional Reliability Standard.
4.2.1.3. Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.2.1.4. Each Cranking Path and group of Elements meeting the initial
switching requirements from a Blackstart Resource up to and
including the first interconnection point of the starting station
service of the next generation unit(s) to be started.
4.2.2. Responsible Entities listed in 4.1 other than Distribution Providers: All BES
Facilities.
4.2.3. Exemptions: The following are exempt from Standard CIP-004-X:
4.2.3.1. Cyber Assets at Facilities regulated by the Canadian Nuclear Safety
Commission.
4.2.3.2. Cyber Assets associated with communication networks and data
communication links between discrete Electronic Security
Perimeters.
4.2.3.3. The systems, structures, and components that are regulated by the
Nuclear Regulatory Commission under a cyber security plan pursuant
to 10 C.F.R. Section 73.54.
4.2.3.4. For Distribution Providers, the systems and equipment that are not
included in section 4.2.1 above.
Final Draft 3
MarchJune 2021
Page 3 of 33
CIP-004-X — Cyber Security – Personnel & Training
4.2.3.5. Responsible Entities that identify that they have no BES Cyber
Systems categorized as high impact or medium impact according to
the CIP-002-5.1a identification and categorization processes.
5. Effective Dates: See Implementation Plan for CIP-004-X.
6. Background: Standard CIP-004 exists as part of a suite of CIP Standards related to cyber
security, which require the initial identification and categorization of BES Cyber Systems and
require a minimum level of organizational, operational, and procedural controls to mitigate
risk to BES Cyber Systems.
Most requirements open with, “Each Responsible Entity shall implement one or more
documented [processes, plan, etc.] that include the applicable items in [Table Reference].”
The referenced table requires the applicable items in the procedures for the common
subject matter of the requirements.
The term documented processes refers to a set of required instructions specific to the
Responsible Entity and to achieve a specific outcome. This term does not imply any
particular naming or approval structure beyond what is stated in the requirements. An
entity should include as much as it believes necessary in its documented processes, but it
must address the applicable requirements in the table.
The terms program and plan are sometimes used in place of documented processes where it
makes sense and is commonly understood. For example, documented processes describing
a response are typically referred to as plans (i.e., incident response plans and recovery
plans). Likewise, a security plan can describe an approach involving multiple procedures to
address a broad subject matter.
Similarly, the term program may refer to the organization’s overall implementation of its
policies, plans and procedures involving a subject matter. Examples in the standards
include the personnel risk assessment program and the personnel training program. The
full implementation of the CIP Cyber Security Standards could also be referred to as a
program. However, the terms program and plan do not imply any additional requirements
beyond what is stated in the standards.
Responsible Entities can implement common controls that meet requirements for multiple
high and medium impact BES Cyber Systems. For example, a single training program could
meet the requirements for training personnel across multiple BES Cyber Systems.
Measures for the initial requirement are simply the documented processes themselves.
Measures in the table rows provide examples of evidence to show documentation and
implementation of applicable items in the documented processes. These measures serve to
provide guidance to entities in acceptable records of compliance and should not be viewed
as an all-inclusive list.
Final Draft 3
MarchJune 2021
Page 4 of 33
CIP-004-X — Cyber Security – Personnel & Training
Throughout the standards, unless otherwise stated, bulleted items in the requirements and
measures are items that are linked with an “or,” and numbered items are items that are
linked with an “and.”
Many references in the Applicability section use a threshold of 300 MW for UFLS and UVLS.
This particular threshold of 300 MW for UVLS and UFLS was provided in Version 1 of the CIP
Cyber Security Standards. The threshold remains at 300 MW since it is specifically
addressing UVLS and UFLS, which are last ditch efforts to save the BES. A review of UFLS
tolerances defined within regional reliability standards for UFLS program requirements to
date indicates that the historical value of 300 MW represents an adequate and reasonable
threshold value for allowable UFLS operational tolerances.
“Applicable Systems” Columns in Tables:
Each table has an “Applicable Systems” column to further define the scope of systems to
which a specific requirement row applies. The CSO706 SDT adapted this concept from the
National Institute of Standards and Technology (“NIST”) Risk Management Framework as a
way of applying requirements more appropriately based on impact and connectivity
characteristics. The following conventions are used in the “Applicable Systems” column as
described.
•
High Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as high
impact according to the CIP-002-5.1a identification and categorization processes.
•
Medium Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as
medium impact according to the CIP-002-5.1a identification and categorization
processes.
•
Medium Impact BES Cyber Systems with External Routable Connectivity – Only applies
to medium impact BES Cyber Systems with External Routable Connectivity. This also
excludes Cyber Assets in the BES Cyber System that cannot be directly accessed through
External Routable Connectivity.
•
Electronic Access Control or Monitoring Systems (EACMS) – Applies to each Electronic
Access Control or Monitoring System associated with a referenced high impact BES
Cyber System or medium impact BES Cyber System. Examples may include, but are not
limited to, firewalls, authentication servers, and log monitoring and alerting systems.
•
Physical Access Control Systems (PACS) – Applies to each Physical Access Control
System associated with a referenced high impact BES Cyber System or medium impact
BES Cyber System with External Routable Connectivity.
Final Draft 3
MarchJune 2021
Page 5 of 33
CIP-004-X — Cyber Security – Personnel & Training
B. Requirements and Measures
R1. Each Responsible Entity shall implement one or more documented processes that collectively include each of the
applicable requirement parts in CIP-004-X Table R1 – Security Awareness Program. [Violation Risk Factor: Lower] [Time
Horizon: Operations Planning]
M1. Evidence must include each of the applicable documented processes that collectively include each of the applicable
requirement parts in CIP-004-X Table R1 – Security Awareness Program and additional evidence to demonstrate
implementation as described in the Measures column of the table.
CIP-004-X Table R1 – Security Awareness Program
Part
1.1
Applicable Systems
High Impact BES Cyber Systems
Medium Impact BES Cyber Systems
Requirements
Security awareness that, at least once
each calendar quarter, reinforces cyber
security practices (which may include
associated physical security practices)
for the Responsible Entity’s personnel
who have authorized electronic or
authorized unescorted physical access
to BES Cyber Systems.
Measures
An example of evidence may include,
but is not limited to, documentation
that the quarterly reinforcement has
been provided. Examples of evidence
of reinforcement may include, but are
not limited to, dated copies of
information used to reinforce security
awareness, as well as evidence of
distribution, such as:
•
•
•
Final Draft 3
March June 2021
direct communications (for
example, e-mails, memos,
computer-based training); or
indirect communications (for
example, posters, intranet, or
brochures); or
management support and
reinforcement (for example,
presentations or meetings).
Page 6 of 33
CIP-004-X — Cyber Security – Personnel & Training
R2. Each Responsible Entity shall implement one or more cyber security training program(s) appropriate to individual roles,
functions, or responsibilities that collectively includes each of the applicable requirement parts in CIP-004-X Table R2 –
Cyber Security Training Program. [Violation Risk Factor: Lower] [Time Horizon: Operations Planning]
M2. Evidence must include the training program that includes each of the applicable requirement parts in CIP-004-X Table R2 –
Cyber Security Training Program and additional evidence to demonstrate implementation of the program(s).
CIP-004-X Table R2 – Cyber Security Training Program
Part
2.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Requirements
Training content on:
2.1.1. Cyber security policies;
2.1.2. Physical access controls;
2.1.3. Electronic access controls;
Measures
Examples of evidence may include, but
are not limited to, training material such
as power point presentations, instructor
notes, student notes, handouts, or other
training materials.
2.1.4. The visitor control program;
2.1.5. Handling of BES Cyber System
Information and its storage;
2.1.6. Identification of a Cyber
Security Incident and initial
notifications in accordance with
the entity’s incident response
plan;
2.1.7. Recovery plans for BES Cyber
Systems;
2.1.8. Response to Cyber Security
Incidents; and
2.1.9. Cyber security risks associated
with a BES Cyber System’s
electronic interconnectivity and
interoperability with other
Final Draft 3
March June 2021
Page 7 of 33
CIP-004-X — Cyber Security – Personnel & Training
CIP-004-X Table R2 – Cyber Security Training Program
Part
Applicable Systems
Requirements
Measures
Cyber Assets, including
Transient Cyber Assets, and
with Removable Media.
2.2
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
Require completion of the training
specified in Part 2.1 prior to granting
authorized electronic access and
authorized unescorted physical access
to applicable Cyber Assets, except
during CIP Exceptional Circumstances.
Examples of evidence may include, but
are not limited to, training records and
documentation of when CIP Exceptional
Circumstances were invoked.
1. EACMS; and
2. PACS
2.3
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
Require completion of the training
Examples of evidence may include, but
specified in Part 2.1 at least once every are not limited to, dated individual
15 calendar months.
training records.
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Final Draft 3
March June 2021
Page 8 of 33
CIP-004-X — Cyber Security – Personnel & Training
R3. Each Responsible Entity shall implement one or more documented personnel risk assessment program(s) to attain and
retain authorized electronic or authorized unescorted physical access to BES Cyber Systems that collectively include each of
the applicable requirement parts in CIP-004-X Table R3 – Personnel Risk Assessment Program. [Violation Risk Factor:
Medium] [Time Horizon: Operations Planning].
M3. Evidence must include the documented personnel risk assessment programs that collectively include each of the applicable
requirement parts in CIP-004-X Table R3 – Personnel Risk Assessment Program and additional evidence to demonstrate
implementation of the program(s).
CIP-004-X Table R2 – Cyber Security Training Program
Part
3.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
Requirements
Measures
Process to confirm identity.
An example of evidence may include,
but is not limited to, documentation of
the Responsible Entity’s process to
confirm identity.
Process to perform a seven year
criminal history records check as part of
each personnel risk assessment that
includes:
An example of evidence may include,
but is not limited to, documentation of
the Responsible Entity’s process to
perform a seven year criminal history
records check.
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and
their associated:
1. EACMS; and
2. PACS
3.2
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and
their associated:
1. EACMS; and
Final Draft 3
March June 2021
3.2.1. current residence, regardless of
duration; and
3.2.2. other locations where, during
the seven years immediately prior to
the date of the criminal history
Page 9 of 33
CIP-004-X — Cyber Security – Personnel & Training
CIP-004-X Table R2 – Cyber Security Training Program
Part
Applicable Systems
2. PACS
Requirements
Measures
records check, the subject has resided
for six consecutive months or more.
If it is not possible to perform a full
seven year criminal history records
check, conduct as much of the seven
year criminal history records check as
possible and document the reason the
full seven year criminal history records
check could not be performed.
3.3
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
Criteria or process to evaluate criminal
history records checks for authorizing
access.
An example of evidence may include,
but is not limited to, documentation of
the Responsible Entity’s process to
evaluate criminal history records
checks.
Criteria or process for verifying that
personnel risk assessments performed
for contractors or service vendors are
conducted according to Parts 3.1
through 3.3.
An example of evidence may include,
but is not limited to, documentation of
the Responsible Entity’s criteria or
process for verifying contractors or
service vendors personnel risk
assessments.
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and
their associated:
1. EACMS; and
2. PACS
3.4
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and
Final Draft 3
March June 2021
Page 10 of 33
CIP-004-X — Cyber Security – Personnel & Training
CIP-004-X Table R2 – Cyber Security Training Program
Part
Applicable Systems
Requirements
Measures
their associated:
1. EACMS; and
2. PACS
3.5
High Impact BES Cyber Systems and
their associated:
Process to ensure that individuals with
authorized electronic or authorized
unescorted physical access have had a
1. EACMS; and
personnel risk assessment completed
2. PACS
according to Parts 3.1 to 3.4 within the
Medium Impact BES Cyber Systems with last seven years.
External Routable Connectivity and
their associated:
An example of evidence may include,
but is not limited to, documentation of
the Responsible Entity’s process for
ensuring that individuals with
authorized electronic or authorized
unescorted physical access have had a
personnel risk assessment completed
within the last seven years.
1. EACMS; and
2. PACS
Final Draft 3
March June 2021
Page 11 of 33
CIP-004-X — Cyber Security – Personnel & Training
R4. Each Responsible Entity shall implement one or more documented access management program(s) that collectively
include each of the applicable requirement parts in CIP-004-X Table R4 – Access Management Program. [Violation Risk
Factor: Medium] [Time Horizon: Operations Planning and Same Day Operations].
M4. Evidence must include the documented processes that collectively include each of the applicable requirement parts in CIP004-X Table R4 – Access Management Program and additional evidence to demonstrate that the access management
program was implemented as described in the Measures column of the table.
CIP-004-X Table R2 – Cyber Security Training Program
Part
4.1
Applicable Systems
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
Requirements
Process to authorize based on need,
as determined by the Responsible
Entity, except for CIP Exceptional
Circumstances:
4.1.1. Electronic access; and
4.1.2. Unescorted physical access
into a Physical Security
Perimeter
Measures
An example of evidence may include,
but is not limited to, dated
documentation of the process to
authorize electronic access, and
unescorted physical access in a
Physical Security Perimeter.
2. PACS
4.2
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
Final Draft 3
March June 2021
Verify at least once each calendar
quarter that individuals with active
electronic access or unescorted
physical access have authorization
records.
Examples of evidence may include,
but are not limited to:
•
Dated documentation of the
verification between the system
generated list of individuals who
have been authorized for access
(i.e., workflow database) and a
system generated list of
personnel who have access (i.e.,
user account listing), or
Page 12 of 33
CIP-004-X — Cyber Security – Personnel & Training
CIP-004-X Table R2 – Cyber Security Training Program
Part
Applicable Systems
Requirements
2. PACS
4.3
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Measures
Dated documentation of the
verification between a list of
individuals who have been
authorized for access (i.e.,
authorization forms) and a list of
individuals provisioned for access
(i.e., provisioning forms or shared
account listing).
For electronic access, verify at least
once every 15 calendar months that
all user accounts, user account
groups, or user role categories, and
their specific, associated privileges are
correct and are those that the
Responsible Entity determines are
necessary.
An example of evidence may include,
but is not limited to, documentation
of the review that includes all of the
following:
1. A dated listing of all
accounts/account groups or
roles within the system;
2. A summary description of
privileges associated with
each group or role;
3. Accounts assigned to the
group or role; and
Dated evidence showing verification
of the privileges for the group are
authorized and appropriate to the
work function performed by people
assigned to each account.
Final Draft 3
March June 2021
Page 13 of 33
CIP-004-X — Cyber Security – Personnel & Training
R5. Each Responsible Entity shall implement one or more documented access revocation program(s) that collectively include
each of the applicable requirement parts in CIP-004-X Table R5 – Access Revocation. [Violation Risk Factor: Medium] [Time
Horizon: Same Day Operations and Operations Planning].
M5. Evidence must include each of the applicable documented programs that collectively include each of the applicable
requirement parts in CIP-004-X Table R5 – Access Revocation and additional evidence to demonstrate implementation as
described in the Measures column of the table.
CIP-004-X Table R2 – Cyber Security Training Program
Part
5.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
Requirements
A process to initiate removal of an
individual’s ability for unescorted
physical access and Interactive Remote
Access upon a termination action, and
complete the removals within 24 hours
of the termination action (Removal of
the ability for access may be different
than deletion, disabling, revocation, or
removal of all access rights).
An example of evidence may include,
but is not limited to, documentation of
all of the following:
For reassignments or transfers, revoke
the individual’s authorized electronic
access to individual accounts and
authorized unescorted physical access
that the Responsible Entity determines
are not necessary by the end of the
next calendar day following the date
that the Responsible Entity determines
that the individual no longer requires
retention of that access.
An example of evidence may include,
but is not limited to, documentation of
all of the following:
For termination actions, revoke the
An example of evidence may include,
2. PACS
5.2
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
5.3
High Impact BES Cyber Systems and their
Final Draft 3
March June 2021
Measures
1. Dated workflow or sign-off form
verifying access removal
associated with the termination
action; and
Logs or other demonstration showing
such persons no longer have access.
1. Dated workflow or sign-off form
showing a review of logical and
physical access; and
Logs or other demonstration showing
such persons no longer have access
that the Responsible Entity determines
is not necessary.
Page 14 of 33
CIP-004-X — Cyber Security – Personnel & Training
CIP-004-X Table R2 – Cyber Security Training Program
Part
Applicable Systems
associated:
•
5.4
EACMS
High Impact BES Cyber Systems and their
associated:
•
EACMS
Requirements
Measures
individual’s non-shared user accounts
(unless already revoked according to
Part 5.1) within 30 calendar days of
the effective date of the termination
action.
but is not limited to, workflow or signoff form showing access removal for
any individual BES Cyber Assets and
software applications as determined
necessary to completing the
revocation of access and dated within
thirty calendar days of the termination
actions.
For termination actions, change
passwords for shared account(s)
known to the user within 30 calendar
days of the termination action. For
reassignments or transfers, change
passwords for shared account(s)
known to the user within 30 calendar
days following the date that the
Responsible Entity determines that
the individual no longer requires
retention of that access.
Examples of evidence may include, but
are not limited to:
If the Responsible Entity determines
and documents that extenuating
operating circumstances require a
longer time period, change the
password(s) within 10 calendar days
following the end of the operating
circumstances.
Final Draft 3
March June 2021
•
Workflow or sign-off form
showing password reset within
30 calendar days of the
termination;
•
Workflow or sign-off form
showing password reset within
30 calendar days of the
reassignments or transfers; or
Documentation of the extenuating
operating circumstance and workflow
or sign-off form showing password
reset within 10 calendar days following
the end of the operating circumstance.
Page 15 of 33
CIP-004-X — Cyber Security – Personnel & Training
R6. Each Responsible Entity shall implement one or more documented access management program(s) to authorize, verify,
and revoke provisioned access to BCSI pertaining to the “Applicable Systems” identified in CIP-004-X Table R6 – Access
Management for BES Cyber System Information that collectively include each of the applicable requirement parts in CIP‐
004‐X Table R6 – Access Management for BES Cyber System Information. To be considered access to BCSI in the context of
this requirement, an individual has both the ability to obtain and use BCSI. Provisioned access is to be considered the
result of the specific actions taken to provide an individual(s) the means to access BCSI (e.g., may include physical keys or
access cards, user accounts and associated rights and privileges, encryption keys). [Violation Risk Factor: Medium] [Time
Horizon: Same Day Operations and Operations Planning].
M6. Evidence must include each of the applicable documented programs that collectively include the applicable requirement
parts in CIP-004-X Table R6 – Access Management for BES Cyber System Information and additional evidence to
demonstrate implementation as described in the Measures column of the table.
Final Draft 3
March June 2021
Page 16 of 33
CIP-004-X — Cyber Security – Personnel & Training
CIP-004-X Table R6 – Access Management for BES Cyber System Information
Part
6.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Final Draft 3
March June 2021
Requirements
Measures
Prior to provisioning, authorize (unless
already authorized according to Part
4.1.) based on need, as determined by
the Responsible Entity, except for CIP
Exceptional Circumstances:
Examples of evidence may include, but
are not limited to, individual records or
lists that include who is authorized, the
date of the authorization, and the
justification of business need for the
provisioned access.
6.1.1. Provisioned electronic access to
electronic BCSI; and
6.1.2. Provisioned physical access to
physical BCSI.
Note: Provisioned access is to be
considered the result of the specific
actions taken to provide an
individual(s) the means to access BCSI
(e.g., may include physical keys or
access cards, user accounts and
associated rights and privileges,
encryption keys).
Page 17 of 33
CIP-004-X — Cyber Security – Personnel & Training
CIP-004-X Table R6 – Access Management for BES Cyber System Information
Part
6.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
Requirements
Verify at least once every 15 calendar
months that all individuals with
provisioned access to BCSI:
6.2.1. have an authorization record;
and
6.2.2. still need the provisioned access
to perform their current work
functions, as determined by the
Responsible Entity.
Measures
Examples of evidence may include, but
are not limited to, the documentation
of the review that includes all of the
following:
•
List of authorized individuals;
•
List of individuals who have been
provisioned access;
•
Verification that provisioned
access is appropriate based on
need; and
•
Documented reconciliation
actions, if any.
2. PACS
6.3
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
For termination actions, remove the
individual’s ability to use provisioned
access to BCSI (unless already revoked
according to Part 5.1) by the end of the
next calendar day following the
effective date of the termination
action.
Examples of dated evidence may
include, but are not limited to, access
revocation records associated with the
terminations and dated within the next
calendar day of the termination action.
1. EACMS; and
2. PACS
Final Draft 3
March June 2021
Page 18 of 33
CIP-004-X — Cyber Security – Personnel & Training
C. Compliance
1. Compliance Monitoring Process:
1.1. Compliance Enforcement Authority: “Compliance Enforcement Authority” (CEA)
means NERC or the Regional Entity, or any entity as otherwise designated by an
Applicable Governmental Authority, in their respective roles of monitoring and/or
enforcing compliance with mandatory and enforceable Reliability Standards in
their respective jurisdictions.
1.2. Evidence Retention: The following evidence retention periods identify the period
of time an entity is required to retain specific evidence to demonstrate
compliance. For instances where the evidence retention period specified below is
shorter than the time since the last audit, the CEA may ask an entity to provide
other evidence to show that it was compliant for the full time period since the last
audit.
The applicable entity shall keep data or evidence to show compliance as identified
below unless directed by its CEA to retain specific evidence for a longer period of
time as part of an investigation:
•
The applicable entity shall retain evidence of each requirement in this standard
for three calendar years.
•
The applicable entity is found non-compliant, it shall keep information related
to the non-compliance until mitigation is complete and approved or for the
time specified above, whichever is longer.
•
The CEA shall keep the last audit records and all requested and submitted
subsequent audit records.
1.3. Compliance Monitoring and Enforcement Program: As defined in the NERC Rules
of Procedure, “Compliance Monitoring and Enforcement Program” refers to the
identification of the processes that will be used to evaluate data or information for
the purpose of assessing performance or outcomes with the associated Reliability
Standard.
Final Draft 3
MarchMay 2021
Page 19 of 33
CIP-004-X — Cyber Security – Personnel & Training
2. Table of Compliance Elements
R#
R1
R2
Time Horizon
Operations
Planning
Operations
Planning
Final Draft 3
March June 2021
VRF
Lower
Lower
Violation Severity Levels (CIP-004-X)
Lower VSL
Moderate VSL
High VSL
Severe VSL
The Responsible Entity
did not reinforce
cyber security
practices during a
calendar quarter but
did so less than 10
calendar days after
the start of a
subsequent calendar
quarter. (1.1)
The Responsible Entity
did not reinforce
cyber security
practices during a
calendar quarter but
did so between 10 and
30 calendar days after
the start of a
subsequent calendar
quarter. (1.1)
The Responsible Entity
did not reinforce
cyber security
practices during a
calendar quarter but
did so within the
subsequent quarter
but beyond 30
calendar days after
the start of that
calendar quarter. (1.1)
The Responsible Entity
did not document or
implement any
security awareness
process(es) to
reinforce cyber
security practices. (R1)
The Responsible Entity
implemented a cyber
security training
program but failed to
include one of the
training content topics
in Requirement Parts
The Responsible Entity
implemented a cyber
security training
program but failed to
include two of the
training content topics
in Requirement Parts
The Responsible Entity
implemented a cyber
security training
program but failed to
include three of the
training content topics
in Requirement Parts
The Responsible Entity
did not implement a
cyber security training
program appropriate
to individual roles,
functions, or
responsibilities. (R2)
OR
The Responsible Entity
did not reinforce
cyber security
practices and
associated physical
security practices for
at least two
consecutive calendar
quarters. (1.1)
Page 20 of 33
CIP-004-X — Cyber Security – Personnel & Training
R#
Time Horizon
Violation Severity Levels (CIP-004-X)
VRF
Lower VSL
Moderate VSL
High VSL
2.1.1 through 2.1.9.
(2.1)
2.1.1 through 2.1.9.
(2.1)
2.1.1 through 2.1.9.
(2.1)
OR
OR
OR
Severe VSL
OR
The Responsible Entity
implemented a cyber
The Responsible Entity The Responsible Entity The Responsible Entity security training
implemented a cyber implemented a cyber implemented a cyber program but failed to
include four or more
security training
security training
security training
program but failed to program but failed to program but failed to of the training content
train one individual
train two individuals
train three individuals topics in Requirement
(with the exception of (with the exception of (with the exception of Parts 2.1.1 through
2.1.9. (2.1)
CIP Exceptional
CIP Exceptional
CIP Exceptional
Circumstances) prior
Circumstances) prior
Circumstances) prior
OR
to their being granted to their being granted to their being granted
authorized electronic authorized electronic authorized electronic The Responsible Entity
implemented a cyber
and authorized
and authorized
and authorized
security training
unescorted physical
unescorted physical
unescorted physical
program but failed to
access. (2.2)
access. (2.2)
access. (2.2)
train four or more
OR
OR
OR
individuals (with the
The Responsible Entity The Responsible Entity The Responsible Entity exception of CIP
implemented a cyber implemented a cyber implemented a cyber Exceptional
Circumstances) prior
security training
security training
security training
program but failed to program but failed to program but failed to to their being granted
train one individual
train two individuals
train three individuals authorized electronic
and authorized
with authorized
with authorized
with authorized
unescorted physical
electronic or
electronic or
electronic or
authorized unescorted authorized unescorted authorized unescorted access. (2.2)
physical access within physical access within physical access within OR
Final Draft 3
March June 2021
Page 21 of 33
CIP-004-X — Cyber Security – Personnel & Training
R#
Time Horizon
VRF
Violation Severity Levels (CIP-004-X)
Lower VSL
Moderate VSL
High VSL
Severe VSL
15 calendar months of 15 calendar months of 15 calendar months of The Responsible Entity
the previous training
the previous training
the previous training
implemented a cyber
completion date. (2.3) completion date. (2.3) completion date. (2.3)
security training
program but failed to
train four or more
individuals with
authorized electronic
or authorized
unescorted physical
access within 15
calendar months of
the previous training
completion date. (2.3)
R3
Operations
Planning
Final Draft 3
March June 2021
Medium
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
but did not conduct
the PRA as a condition
of granting authorized
electronic or
authorized unescorted
physical access for
one individual. (R3)
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
but did not conduct
the PRA as a condition
of granting authorized
electronic or
authorized unescorted
physical access for
two individuals. (R3)
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
but did not conduct
the PRA as a condition
of granting authorized
electronic or
authorized unescorted
physical access for
three individuals. (R3)
The Responsible Entity
did not have all of the
required elements as
described by 3.1
through 3.4 included
within documented
program(s) for
implementing
Personnel Risk
Assessments (PRAs),
for individuals,
including contractors
and service vendors,
for obtaining and
Page 22 of 33
CIP-004-X — Cyber Security – Personnel & Training
R#
Time Horizon
Final Draft 3
March June 2021
Violation Severity Levels (CIP-004-X)
VRF
Lower VSL
Moderate VSL
OR
OR
The Responsible Entity
did conduct Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
not confirm identity
for one individual. (3.1
& 3.4)
The Responsible Entity
did conduct Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
not confirm identity
for two individuals.
(3.1 & 3.4)
OR
OR
The Responsible Entity
has a process to
perform seven-year
criminal history record
checks for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
The Responsible Entity
has a process to
perform seven-year
criminal history record
checks for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
High VSL
Severe VSL
retaining authorized
cyber or authorized
The Responsible Entity unescorted physical
did conduct Personnel access. (R3)
Risk Assessments
OR
(PRAs) for individuals,
The Responsible Entity
including contractors
and service vendors,
has a program for
with authorized
conducting Personnel
Risk Assessments
electronic or
authorized unescorted (PRAs) for individuals,
physical access but did including contractors
and service vendors,
not confirm identity
but did not conduct
for three individuals.
the PRA as a condition
(3.1 & 3.4)
of granting authorized
OR
electronic or
The Responsible Entity authorized unescorted
has a process to
physical access for
perform seven-year
four or more
criminal history record individuals. (R3)
checks for individuals,
OR
including contractors
and service vendors,
The Responsible Entity
with authorized
did conduct Personnel
electronic or
Risk Assessments
authorized unescorted (PRAs) for individuals,
physical access but did including contractors
OR
Page 23 of 33
CIP-004-X — Cyber Security – Personnel & Training
R#
Time Horizon
Final Draft 3
March June 2021
Violation Severity Levels (CIP-004-X)
VRF
Lower VSL
Moderate VSL
High VSL
not include the
required checks
described in 3.2.1 and
3.2.2 for one
individual. (3.2 & 3.4)
not include the
required checks
described in 3.2.1 and
3.2.2 for two
individuals. (3.2 & 3.4)
not include the
required checks
described in 3.2.1 and
3.2.2 for three
individuals. (3.2 & 3.4)
OR
OR
The Responsible Entity
did conduct Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
not evaluate criminal
history records check
for access
authorization for one
individual. (3.3 & 3.4)
The Responsible Entity
did conduct Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
not evaluate criminal
history records check
for access
authorization for two
individuals. (3.3 & 3.4)
OR
OR
The Responsible Entity
did not conduct
Personnel Risk
Assessments (PRAs)
The Responsible Entity
did not conduct
Personnel Risk
Assessments (PRAs)
Severe VSL
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
not confirm identity
OR
for four or more
The Responsible Entity individuals. (3.1 & 3.4)
did conduct Personnel
OR
Risk Assessments
(PRAs) for individuals, The Responsible Entity
including contractors
has a process to
and service vendors,
perform seven-year
with authorized
criminal history record
electronic or
checks for individuals,
authorized unescorted including contractors
physical access but did and service vendors,
not evaluate criminal
with authorized
history records check electronic or
for access
authorized unescorted
authorization for
physical access but did
three individuals. (3.3 not include the
& 3.4)
required checks
described in 3.2.1 and
OR
3.2.2 for four or more
The Responsible Entity individuals. (3.2 & 3.4)
did not conduct
OR
Personnel Risk
Page 24 of 33
CIP-004-X — Cyber Security – Personnel & Training
R#
Time Horizon
VRF
Violation Severity Levels (CIP-004-X)
Lower VSL
Moderate VSL
High VSL
Severe VSL
for one individual with
authorized electronic
or authorized
unescorted physical
access within 7
calendar years of the
previous PRA
completion date. (3.5)
for two individuals
with authorized
electronic or
authorized unescorted
physical access within
7 calendar years of
the previous PRA
completion date. (3.5)
Assessments (PRAs)
for three individuals
with authorized
electronic or
authorized unescorted
physical access within
7 calendar years of
the previous PRA
completion date. (3.5)
The Responsible Entity
did conduct Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
not evaluate criminal
history records check
for access
authorization for four
or more individuals.
(3.3 & 3.4)
OR
The Responsible Entity
did not conduct
Personnel Risk
Assessments (PRAs)
for four or more
individuals with
authorized electronic
or authorized
unescorted physical
access within 7
Final Draft 3
March June 2021
Page 25 of 33
CIP-004-X — Cyber Security – Personnel & Training
R#
R4
Time Horizon
Operations
Planning and
Same Day
Operations
Final Draft 3
March June 2021
VRF
Medium
Violation Severity Levels (CIP-004-X)
Lower VSL
Moderate VSL
High VSL
Severe VSL
calendar years of the
previous PRA
completion date. (3.5)
The Responsible Entity The Responsible Entity The Responsible Entity The Responsible Entity
did not verify that
did not verify that
did not verify that
did not implement any
individuals with active individuals with active individuals with active documented
electronic or active
electronic or active
electronic or active
program(s) for access
unescorted physical
unescorted physical
unescorted physical
management. (R4)
access have
access have
access have
OR
authorization records authorization records authorization records
The Responsible Entity
during a calendar
during a calendar
during a calendar
has did not
quarter but did so less quarter but did so
quarter but did so
implemented one or
than 10 calendar days between 10 and 20
between 20 and 30
more documented
after the start of a
calendar days after
calendar days after
program(s) for access
subsequent calendar
the start of a
the start of a
management that
quarter. (4.2)
subsequent calendar
subsequent calendar
includes a process to
quarter. (4.2)
quarter. (4.2)
OR
authorize electronic
OR
OR
The Responsible Entity
access or unescorted
The Responsible Entity The Responsible Entity physical access. (4.1)
has implemented
processes to verify
has implemented
has implemented
OR
that user accounts,
processes to verify
processes to verify
The Responsible Entity
that user accounts,
that user accounts,
user account groups,
did not verify that
or user role
user account groups,
user account groups,
individuals with active
categories, and their
or user role
or user role
electronic or active
specific, associated
categories, and their
categories, and their
unescorted physical
privileges are correct
specific, associated
specific, associated
access have
and necessary within
privileges are correct
privileges are correct
Page 26 of 33
CIP-004-X — Cyber Security – Personnel & Training
R#
R5
Time Horizon
Same Day
Operations
Final Draft 3
March June 2021
VRF
Medium
Violation Severity Levels (CIP-004-X)
Lower VSL
Moderate VSL
High VSL
Severe VSL
15 calendar months of
the previous
verification but for 5%
or less of its BES Cyber
Systems, privileges
were incorrect or
unnecessary. (4.3)
and necessary within
15 calendar months of
the previous
verification but for
more than 5% but less
than (or equal to) 10%
of its BES Cyber
Systems, privileges
were incorrect or
unnecessary. (4.3)
and necessary within
15 calendar months of
the previous
verification but for
more than 10% but
less than (or equal to)
15% of its BES Cyber
Systems, privileges
were incorrect or
unnecessary. (4.3)
authorization records
for at least two
consecutive calendar
quarters. (4.2)
The Responsible Entity
has implemented one
or more process(es) to
revoke the individual’s
The Responsible Entity
has implemented one
or more process(es) to
remove the ability for
The Responsible Entity
has implemented one
or more process(es) to
remove the ability for
The Responsible Entity
has not implemented
any documented
program(s) for access
OR
The Responsible Entity
has implemented
processes to verify
that user accounts,
user account groups,
or user role
categories, and their
specific, associated
privileges are correct
and necessary within
15 calendar months of
the previous
verification but for
more than 15% of its
BES Cyber Systems,
privileges were
incorrect or
unnecessary. (4.3)
Page 27 of 33
CIP-004-X — Cyber Security – Personnel & Training
R#
Time Horizon
and Operations
Planning
VRF
Violation Severity Levels (CIP-004-X)
Lower VSL
Moderate VSL
High VSL
user accounts upon
termination action but
did not do so for
within 30 calendar
days of the date of
termination action for
one or more
individuals. (5.3)
unescorted physical
access and Interactive
Remote Access upon a
termination action or
complete the removal
within 24 hours of the
termination action but
did not initiate those
removals for one
individual. (5.1)
unescorted physical
access and Interactive
Remote Access upon a
termination action or
complete the removal
within 24 hours of the
termination action but
did not initiate those
removals for two
individuals. (5.1)
Severe VSL
revocation for
electronic access or
unescorted physical
access. (R5)
OR
The Responsible Entity
has implemented one
or more process(es) to
OR
remove the ability for
unescorted physical
The Responsible Entity
OR
OR
access and Interactive
has implemented one
or more process(es) to The Responsible Entity The Responsible Entity Remote Access upon a
change passwords for has implemented one has implemented one termination action or
shared accounts
or more process(es) to or more process(es) to complete the removal
known to the user
determine that an
determine that an
within 24 hours of the
upon termination
individual no longer
individual no longer
termination action but
requires retention of
did not initiate those
action, reassignment, requires retention of
access following
access following
removals for three or
or transfer, but did
reassignments or
reassignments or
more individuals. (5.1)
not do so for within
transfers but, for one transfers but, for two OR
30 calendar days of
individual, did not
individuals, did not
the date of
termination action,
revoke the authorized revoke the authorized The Responsible Entity
has implemented one
reassignment, or
electronic access to
electronic access to
or more process(es) to
transfer for one or
individual accounts
individual accounts
determine that an
more individuals. (5.4) and authorized
and authorized
individual no longer
unescorted physical
unescorted physical
OR
requires retention of
access by the end of
access by the end of
Final Draft 3
March June 2021
Page 28 of 33
CIP-004-X — Cyber Security – Personnel & Training
R#
R6
Time Horizon
VRF
Same Day
Medium
Operations and
Operations
Planning
Final Draft 3
March June 2021
Violation Severity Levels (CIP-004-X)
Lower VSL
Moderate VSL
High VSL
Severe VSL
The Responsible Entity
has implemented one
or more process(es) to
determine and
document extenuating
operating
circumstances
following a
termination action,
reassignment, or
transfer, but did not
change one or more
passwords for shared
accounts known to
the user within 10
calendar days
following the end of
the extenuating
operating
circumstances. (5.4)
the next calendar day
following the
predetermined date.
(5.2)
the next calendar day
following the
predetermined date.
(5.2)
access following
reassignments or
transfers but, for
three or more
individuals, did not
revoke the authorized
electronic access to
individual accounts
and authorized
unescorted physical
access by the end of
the next calendar day
following the
predetermined date.
(5.2)
The Responsible Entity
has implemented one
or more program(s) as
required by
Requirement R6 Part
6.1 but, for one
individual, did not
The Responsible Entity
has implemented one
or more program(s) as
required by
Requirement R6 Part
6.1 but, for two
individuals, did not
The Responsible Entity
has implemented one
or more program(s) as
required by
Requirement R6 Part
6.1 but, for three
individuals, did not
The Responsible Entity
did not implement
one or more
documented access
management
program(s) for BCSI.
(R6)
Page 29 of 33
CIP-004-X — Cyber Security – Personnel & Training
R#
Time Horizon
VRF
Violation Severity Levels (CIP-004-X)
Lower VSL
Moderate VSL
High VSL
authorize provisioned
electronic access to
electronic BCSI or
provisioned physical
access to physical
BCSI. (6.1)
authorize provisioned
electronic access to
electronic BCSI or
provisioned physical
access to physical
BCSI. (6.1)
authorize provisioned
electronic access to
electronic BCSI or
provisioned physical
access to physical
BCSI. (6.1)
Severe VSL
OR
The Responsible Entity
has implemented one
or more program(s) as
required by
Requirement R6 Part
OR
OR
OR
6.1 but, for four or
The Responsible Entity The Responsible Entity The Responsible Entity more individuals, did
performed the
performed the
performed the
not authorize
provisioned electronic
verification required
verification required
verification required
access to electronic
by Requirement R6
by Requirement R6
by Requirement R6
Part 6.2 more than 15 Part 6.2 more than 16 Part 6.2 more than 17 BCSI or provisioned
calendar months but
calendar months but
calendar months but
physical access to
physical BCSI. (6.1)
less than or equal to
less than or equal to
less than or equal to
16 calendar months of 17 calendar months of 18 calendar months of OR
the previous
the previous
the previous
The Responsible Entity
verification. (6.2)
verification. (6.2)
verification. (6.2)
performed the
OR
OR
OR
verification required
The
Responsible
Entity
The Responsible Entity The Responsible Entity
by Requirement R6
has implemented one has implemented one has implemented one Part 6.2 more than 18
or more program(s) to or more program(s) to or more program(s) to calendar months of
remove the
remove the
remove the
the previous
individual’s ability to
individual’s ability to
individual’s ability to
verification. (6.2)
use provisioned
use provisioned
use provisioned
OR
access to BCSI but, for access to BCSI but, for access to BCSI but, for
one individual, did not two individuals, did
three individuals, did
Final Draft 3
March June 2021
Page 30 of 33
CIP-004-X — Cyber Security – Personnel & Training
R#
Time Horizon
Final Draft 3
March June 2021
VRF
Violation Severity Levels (CIP-004-X)
Lower VSL
Moderate VSL
High VSL
Severe VSL
do so by the
timeframe required in
Requirement R6, Part
6.3.
not do so by the
timeframe required in
Requirement R6, Part
6.3.
not do so by the
timeframe required in
Requirement R6, Part
6.3.
The Responsible Entity
has implemented one
or more program(s) to
remove the
individual’s ability to
use provisioned
access to BCSI but, for
four or more
individuals, did not do
so by the timeframe
required in
Requirement R6, Part
6.3.
Page 31 of 33
CIP-004-X — Cyber Security – Personnel & Training
D. Regional Variances
None.
E. Interpretations
None.
F. Associated Documents
None.
Version History
Version
Date
1
1/16/06
Action
R3.2 — Change “Control Center” to
“control center.”
Change Tracking
3/24/06
Modifications to clarify the requirements
and to bring the compliance elements
into conformance with the latest
guidelines for developing compliance
elements of standards.
2
9/30/09
Removal of reasonable business
judgment.
Replaced the RRO with the RE as a
responsible entity.
Rewording of Effective Date.
Changed compliance monitor to
Compliance Enforcement Authority.
Updated Version Number from -2 to -3
In Requirement 1.6, deleted the
sentence pertaining to removing
component or system from service in
order to perform testing, in response to
FERC order issued September 30, 2009.
3
12/16/09
3
12/16/09
Approved by the NERC Board of
Trustees.
3
3/31/10
Approved by FERC.
4
1/24/11
Approved by the NERC Board of
Trustees.
Final Draft 3
JuneMarch 2021
Page 32 of 33
CIP-004-X — Cyber Security – Personnel & Training
Version
Date
Action
Change Tracking
Modified to coordinate
with other CIP
standards and to revise
format to use RBS
Template.
5
11/26/12
Adopted by the NERC Board of Trustees.
5
11/22/13
FERC Order issued approving CIP-004-5.
5.1
9/30/13
Modified two VSLs in R4
Errata
Adopted by the NERC Board of Trustees.
Addressed two FERC
directives from Order No.
791 related to identify,
assess, and correct
language and
communication
networks.
Replaces the version
adopted by the Board on
11/13/2014. Revised
version addresses
remaining directives
from Order No. 791
related to transient
devices and low impact
BES Cyber Systems.
6
11/13/14
6
2/12/15
Adopted by the NERC Board of Trustees.
6
1/21/16
FERC order issued approving CIP-004-6.
Docket No. RM15-14-000
7
TBD
Final Draft 3
JuneMarch 2021
Adopted by the NERC Board of Trustees
Revised to enhance BES
reliability for entities to
manage their BCSI.
Page 33 of 33
CIP-004-X6 — Cyber Security – Personnel & Training
Standard Development Timeline
This section is maintained by the drafting team during the development of the standard and will be
removed when the standard is adopted by the NERC Board of Trustees (Board).
Description of Current Draft
Completed Actions
Standards Committee approved Standard Authorization Request
(SAR) for posting
SAR posted for comment
Date
March 22, 2019
March 28, 2019 –
April 26, 2019
45-day formal comment period with ballot
December 20, 2019
– February 3, 2020
45-day formal comment period with ballot
August 6 –
September 21, 2020
45-day formal comment period with ballot
March 25 – May 10,
2021
10-day final ballot
June 2-11, 2021
Anticipated Actions
Board adoption
Final Draft
June 2021
Date
November 2021
Page 1 of 46
CIP-004-X6 — Cyber Security – Personnel & Training
A. Introduction
1. Title:
Cyber Security — Personnel & Training
2. Number:
CIP-004-X6
3. Purpose:
To minimize the risk against compromise that could lead to misoperation or
instability in the Bulk Electric System (BES) from individuals accessing BES Cyber
Systems by requiring an appropriate level of personnel risk assessment, training,
and security awareness, and access management in support of protecting BES
Cyber Systems.
4. Applicability:
4.1.
Functional Entities: For the purpose of the requirements contained herein, the following
list of functional entities will be collectively referred to as “Responsible Entities.” For
requirements in this standard where a specific functional entity or subset of functional
entities are the applicable entity or entities, the functional entity or entities are specified
explicitly.
4.1.1. Balancing Authority
4.1.2. Distribution Provider that owns one or more of the following Facilities, systems, and
equipment for the protection or restoration of the BES:
4.1.2.1. Each underfrequency Load shedding (UFLS) or undervoltage Load shedding
(UVLS) system that:
4.1.2.1.1. is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.1.2.1.2. performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation, of
300 MW or more.
4.1.2.2. Each Special Protection System (SPS) or Remedial Action Scheme (RAS) where
the SPS or RAS is subject to one or more requirements in a NERC or Regional
Reliability Standard.
4.1.2.3. Each Protection System (excluding UFLS and UVLS) that applies to Transmission
where the Protection System is subject to one or more requirements in a NERC
or Regional Reliability Standard.
4.1.2.4. Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.1.3. Generator Operator
4.1.4. Generator Owner
4.1.5. Interchange Coordinator or Interchange Authority
Final Draft
June 2021
Page 2 of 46
CIP-004-X6 — Cyber Security – Personnel & Training
4.1.6.4.1.5.
Reliability Coordinator
4.1.7.4.1.6.
Transmission Operator
4.1.8.4.1.7.
Transmission Owner
4.2.
Facilities: For the purpose of the requirements contained herein, the following
Facilities, systems, and equipment owned by each Responsible Entity in 4.1 above are
those to which these requirements are applicable. For requirements in this standard
where a specific type of Facilities, system, or equipment or subset of Facilities, systems,
and equipment are applicable, these are specified explicitly.
4.2.1. Distribution Provider: One or more of the following Facilities, systems and
equipment owned by the Distribution Provider for the protection or restoration of
the BES:
4.2.1.1. Each UFLS or UVLS System that:
4.2.1.1.1. is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.2.1.1.2. performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation, of
300 MW or more.
4.2.1.2. Each SPS or RAS where the SPS or RAS is subject to one or more requirements in
a NERC or Regional Reliability Standard.
4.2.1.3. Each Protection System (excluding UFLS and UVLS) that applies to Transmission
where the Protection System is subject to one or more requirements in a NERC
or Regional Reliability Standard.
4.2.1.4. Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.2.2. Responsible Entities listed in 4.1 other than Distribution Providers:
All BES Facilities.
4.2.3. Exemptions: The following are exempt from Standard CIP-004-X6:
4.2.3.1. Cyber Assets at Facilities regulated by the Canadian Nuclear Safety Commission.
4.2.3.2. Cyber Assets associated with communication networks and data
communication links between discrete Electronic Security Perimeters.
4.2.3.3. The systems, structures, and components that are regulated by the Nuclear
Regulatory Commission under a cyber security plan pursuant to 10 C.F.R.
Section 73.54.
4.2.3.4. For Distribution Providers, the systems and equipment that are not included in
section 4.2.1 above.
Final Draft
June 2021
Page 3 of 46
CIP-004-X6 — Cyber Security – Personnel & Training
4.2.3.5. Responsible Entities that identify that they have no BES Cyber Systems
categorized as high impact or medium impact according to the CIP-002-5.1a
identification and categorization processes.
5. Effective Dates: See Implementation Plan for CIP-004-X6.
6. Background:
Standard CIP-004 exists as part of a suite of CIP Standards related to cyber security, which
require the initial identification and categorization of BES Cyber Systems and require a
minimum level of organizational, operational, and procedural controls to mitigate risk to BES
Cyber Systems.
Most requirements open with, “Each Responsible Entity shall implement one or more
documented [processes, plan, etc.] that include the applicable items in [Table Reference].” The
referenced table requires the applicable items in the procedures for the common subject
matter of the requirements.
The term documented processes refers to a set of required instructions specific to the
Responsible Entity and to achieve a specific outcome. This term does not imply any particular
naming or approval structure beyond what is stated in the requirements. An entity should
include as much as it believes necessary in its documented processes, but it must address the
applicable requirements in the table.
The terms program and plan are sometimes used in place of documented processes where it
makes sense and is commonly understood. For example, documented processes describing a
response are typically referred to as plans (i.e., incident response plans and recovery plans).
Likewise, a security plan can describe an approach involving multiple procedures to address a
broad subject matter.
Similarly, the term program may refer to the organization’s overall implementation of its
policies, plans and procedures involving a subject matter. Examples in the standards include
the personnel risk assessment program and the personnel training program. The full
implementation of the CIP Cyber Security Standards could also be referred to as a program.
However, the terms program and plan do not imply any additional requirements beyond what
is stated in the standards.
Responsible Entities can implement common controls that meet requirements for multiple high
and medium impact BES Cyber Systems. For example, a single training program could meet the
requirements for training personnel across multiple BES Cyber Systems.
Measures for the initial requirement are simply the documented processes themselves.
Measures in the table rows provide examples of evidence to show documentation and
implementation of applicable items in the documented processes. These measures serve to
provide guidance to entities in acceptable records of compliance and should not be viewed as
an all-inclusive list.
Throughout the standards, unless otherwise stated, bulleted items in the requirements and
measures are items that are linked with an “or,” and numbered items are items that are linked
with an “and.”
Final Draft
June 2021
Page 4 of 46
CIP-004-X6 — Cyber Security – Personnel & Training
Many references in the Applicability section use a threshold of 300 MW for UFLS and UVLS.
This particular threshold of 300 MW for UVLS and UFLS was provided in Version 1 of the CIP
Cyber Security Standards. The threshold remains at 300 MW since it is specifically addressing
UVLS and UFLS, which are last ditch efforts to save the BES. A review of UFLS tolerances defined
within regional reliability standards for UFLS program requirements to date indicates that the
historical value of 300 MW represents an adequate and reasonable threshold value for
allowable UFLS operational tolerances.
“Applicable Systems” Columns in Tables:
Each table has an “Applicable Systems” column to further define the scope of systems to which
a specific requirement row applies. The CSO706 SDT adapted this concept from the National
Institute of Standards and Technology (“NIST”) Risk Management Framework as a way of
applying requirements more appropriately based on impact and connectivity characteristics.
The following conventions are used in the “Applicable Systems” column as described.
• High Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as high impact
according to the CIP-002-5.1a identification and categorization processes.
• Medium Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as medium
impact according to the CIP-002-5.1a identification and categorization processes.
• Medium Impact BES Cyber Systems with External Routable Connectivity – Only applies to
medium impact BES Cyber Systems with External Routable Connectivity. This also excludes
Cyber Assets in the BES Cyber System that cannot be directly accessed through External
Routable Connectivity.
• Electronic Access Control or Monitoring Systems (EACMS) – Applies to each Electronic
Access Control or Monitoring System associated with a referenced high impact BES Cyber
System or medium impact BES Cyber System. Examples may include, but are not limited to,
firewalls, authentication servers, and log monitoring and alerting systems.
• Physical Access Control Systems (PACS) – Applies to each Physical Access Control System
associated with a referenced high impact BES Cyber System or medium impact BES Cyber
System with External Routable Connectivity.
Final Draft
June 2021
Page 5 of 46
CIP-004-X6 — Cyber Security – Personnel & Training
B. Requirements and Measures
R1.
Each Responsible Entity shall implement one or more documented processes that collectively include each of the
applicable requirement parts in CIP-004-X6 Table R1 – Security Awareness Program. [Violation Risk Factor: Lower] [Time
Horizon: Operations Planning]
M1. Evidence must include each of the applicable documented processes that collectively include each of the applicable
requirement parts in CIP-004-X6 Table R1 – Security Awareness Program and additional evidence to demonstrate
implementation as described in the Measures column of the table.
CIP-004-X6 Table R1 – Security Awareness Program
Part
1.1
Applicable Systems
High Impact BES Cyber Systems
Medium Impact BES Cyber Systems
Requirements
Measures
Security awareness that, at least once
each calendar quarter, reinforces cyber
security practices (which may include
associated physical security practices)
for the Responsible Entity’s personnel
who have authorized electronic or
authorized unescorted physical access
to BES Cyber Systems.
An example of evidence may include,
but is not limited to, documentation
that the quarterly reinforcement has
been provided. Examples of evidence
of reinforcement may include, but are
not limited to, dated copies of
information used to reinforce security
awareness, as well as evidence of
distribution, such as:
•
•
•
Final Draft
June 2021
Page 6 of 46
direct communications (for
example, e-mails, memos,
computer-based training); or
indirect communications (for
example, posters, intranet, or
brochures); or
management support and
reinforcement (for example,
presentations or meetings).
CIP-004-X6 — Cyber Security – Personnel & Training
R2. Each Responsible Entity shall implement one or more cyber security training program(s) appropriate to individual roles,
functions, or responsibilities that collectively includes each of the applicable requirement parts in CIP-004-X6 Table R2 –
Cyber Security Training Program. [Violation Risk Factor: Lower] [Time Horizon: Operations Planning]
M2. Evidence must include the training program that includes each of the applicable requirement parts in CIP-004-X6 Table R2 –
Cyber Security Training Program and additional evidence to demonstrate implementation of the program(s).
Final Draft
June 2021
Page 7 of 46
CIP-004-X6 — Cyber Security – Personnel & Training
CIP-004-X6 Table R2 – Cyber Security Training Program
Part
2.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Requirements
Measures
Training content on:
2.1.1. Cyber security policies;
2.1.2. Physical access controls;
2.1.3. Electronic access controls;
2.1.4. The visitor control program;
2.1.5. Handling of BES Cyber System
Information and its storage;
2.1.6. Identification of a Cyber
Security Incident and initial
notifications in accordance
with the entity’s incident
response plan;
2.1.7. Recovery plans for BES Cyber
Systems;
2.1.8. Response to Cyber Security
Incidents; and
2.1.9. Cyber security risks associated
with a BES Cyber System’s
electronic interconnectivity
and interoperability with
other Cyber Assets, including
Transient Cyber Assets, and
with Removable Media.
Final Draft
June 2021
Page 8 of 46
Examples of evidence may include,
but are not limited to, training
material such as power point
presentations, instructor notes,
student notes, handouts, or other
training materials.
CIP-004-X6 — Cyber Security – Personnel & Training
CIP-004-X6 Table R2 – Cyber Security Training Program
Part
2.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
Requirements
Measures
Require completion of the training
specified in Part 2.1 prior to granting
authorized electronic access and
authorized unescorted physical access
to applicable Cyber Assets, except
during CIP Exceptional Circumstances.
Examples of evidence may include,
but are not limited to, training
records and documentation of when
CIP Exceptional Circumstances were
invoked.
Require completion of the training
specified in Part 2.1 at least once
every 15 calendar months.
Examples of evidence may include,
but are not limited to, dated
individual training records.
1. EACMS; and
2. PACS
2.3
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Final Draft
June 2021
Page 9 of 46
CIP-004-X6 — Cyber Security – Personnel & Training
R3.
Each Responsible Entity shall implement one or more documented personnel risk assessment program(s) to attain and
retain authorized electronic or authorized unescorted physical access to BES Cyber Systems that collectively include each of
the applicable requirement parts in CIP-004-X6 Table R3 – Personnel Risk Assessment Program. [Violation Risk Factor:
Medium] [Time Horizon: Operations Planning].
M3. Evidence must include the documented personnel risk assessment programs that collectively include each of the applicable
requirement parts in CIP-004-X6 Table R3 – Personnel Risk Assessment Program and additional evidence to demonstrate
implementation of the program(s).
CIP-004-X6 Table R3 – Personnel Risk Assessment Program
Part
Applicable Systems
3.1
High Impact BES Cyber Systems and their
associated:
Requirements
Measures
Process to confirm identity.
An example of evidence may
include, but is not limited to,
documentation of the Responsible
Entity’s process to confirm identity.
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Final Draft
June 2021
Page 10 of 46
CIP-004-X6 — Cyber Security – Personnel & Training
CIP-004-X6 Table R3 – Personnel Risk Assessment Program
Part
3.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Requirements
Measures
Process to perform a seven year
criminal history records check as part of
each personnel risk assessment that
includes:
An example of evidence may include,
but is not limited to, documentation of
the Responsible Entity’s process to
perform a seven year criminal history
records check.
3.2.1. current residence, regardless of
duration; and
3.2.2. other locations where, during
the seven years immediately prior to
the date of the criminal history
records check, the subject has resided
for six consecutive months or more.
If it is not possible to perform a full
seven year criminal history records
check, conduct as much of the seven
year criminal history records check as
possible and document the reason the
full seven year criminal history records
check could not be performed.
Final Draft
June 2021
Page 11 of 46
CIP-004-X6 — Cyber Security – Personnel & Training
CIP-004-X6 Table R3 – Personnel Risk Assessment Program
Part
3.3
Applicable Systems
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
Requirements
Measures
Criteria or process to evaluate criminal
history records checks for authorizing
access.
An example of evidence may
include, but is not limited to,
documentation of the
Responsible Entity’s process to
evaluate criminal history records
checks.
Criteria or process for verifying that
personnel risk assessments performed for
contractors or service vendors are
conducted according to Parts 3.1 through
3.3.
An example of evidence may
include, but is not limited to,
documentation of the
Responsible Entity’s criteria or
process for verifying contractors
or service vendors personnel risk
assessments.
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
3.4
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Final Draft
June 2021
Page 12 of 46
CIP-004-X6 — Cyber Security – Personnel & Training
CIP-004-X6 Table R3 – Personnel Risk Assessment Program
Part
3.5
Applicable Systems
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
Requirements
Measures
Process to ensure that individuals with
authorized electronic or authorized
unescorted physical access have had a
personnel risk assessment completed
according to Parts 3.1 to 3.4 within the last
seven years.
An example of evidence may
include, but is not limited to,
documentation of the
Responsible Entity’s process for
ensuring that individuals with
authorized electronic or
authorized unescorted physical
access have had a personnel risk
assessment completed within the
last seven years.
1. EACMS; and
2. PACS
Final Draft
June 2021
Page 13 of 46
CIP-004-X6 — Cyber Security – Personnel & Training
R4. Each Responsible Entity shall implement one or more documented access management program(s) that collectively include
each of the applicable requirement parts in CIP-004-X6 Table R4 – Access Management Program. [Violation Risk Factor:
Medium] [Time Horizon: Operations Planning and Same Day Operations].
M4. Evidence must include the documented processes that collectively include each of the applicable requirement parts in CIP004-X6 Table R4 – Access Management Program and additional evidence to demonstrate that the access management
program was implemented as described in the Measures column of the table.
CIP-004-X6 Table R4 – Access Management Program
Part
Applicable Systems
4.1
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Final Draft
June 2021
Requirements
Measures
Process to authorize based on need, as
determined by the Responsible Entity,
except for CIP Exceptional
Circumstances:
4.1.1. Electronic access; and
4.1.2. Unescorted physical access into a
Physical Security Perimeter; and
4.1.3. Access to designated storage
locations, whether physical or
electronic, for BES Cyber System
Information.
Page 14 of 46
An example of evidence may
include, but is not limited to, dated
documentation of the process to
authorize electronic access and
unescorted physical access in a
Physical Security Perimeter, and
access to designated storage
locations, whether physical or
electronic, for BES Cyber System
Information.
CIP-004-X6 — Cyber Security – Personnel & Training
CIP-004-X6 Table R4 – Access Management Program
Part
Applicable Systems
Requirements
4.2
High Impact BES Cyber Systems and their
associated:
Verify at least once each calendar
quarter that individuals with active
electronic access or unescorted physical
access have authorization records.
1. EACMS; and
2. PACS
Measures
Examples of evidence may include,
but are not limited to:
•
Dated documentation of the
verification between the system
generated list of individuals who
have been authorized for access
(i.e., workflow database) and a
system generated list of
personnel who have access (i.e.,
user account listing), or
•
Dated documentation of the
verification between a list of
individuals who have been
authorized for access (i.e.,
authorization forms) and a list
of individuals provisioned for
access (i.e., provisioning forms
or shared account listing).
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Final Draft
June 2021
Page 15 of 46
CIP-004-X6 — Cyber Security – Personnel & Training
CIP-004-X6 Table R4 – Access Management Program
Part
Applicable Systems
Requirements
4.3
High Impact BES Cyber Systems and their
associated:
For electronic access, verify at least once
every 15 calendar months that all user
accounts, user account groups, or user
role categories, and their specific,
associated privileges are correct and are
those that the Responsible Entity
determines are necessary.
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
Measures
An example of evidence may
include, but is not limited to,
documentation of the review that
includes all of the following:
1. A dated listing of all
accounts/account groups or
roles within the system;
2. A summary description of
privileges associated with
each group or role;
1. EACMS; and
2. PACS
3. Accounts assigned to the
group or role; and
4. Dated evidence showing
verification of the privileges
for the group are authorized
and appropriate to the work
function performed by
people assigned to each
account.
Final Draft
June 2021
Page 16 of 46
CIP-004-X6 — Cyber Security – Personnel & Training
CIP-004-X6 Table R4 – Access Management Program
Part
Applicable Systems
Requirements
4.4
High Impact BES Cyber Systems and their
associated:
Verify at least once every 15 calendar
months that access to the designated
storage locations for BES Cyber System
Information, whether physical or
electronic, are correct and are those that
the Responsible Entity determines are
necessary for performing assigned work
functions.
EACMS; and
1. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
Measures
0. EACMS; and
0. PACS
Final Draft
June 2021
An example of evidence may
include, but is not limited to, the
documentation of the review that
includes all of the following:
0. A dated listing of
authorizations for BES Cyber
System information;
0. Any privileges associated
with the authorizations; and
0. Dated evidence showing a
verification of the
authorizations and any
privileges were confirmed
correct and the minimum
necessary for performing
assigned work functions.
Page 17 of 46
CIP-004-X6 — Cyber Security – Personnel & Training
R5. Each Responsible Entity shall implement one or more documented access revocation program(s) that collectively include
each of the applicable requirement parts in CIP-004-X6 Table R5 – Access Revocation. [Violation Risk Factor: Medium] [Time
Horizon: Same Day Operations and Operations Planning].
M5. Evidence must include each of the applicable documented programs that collectively include each of the applicable
requirement parts in CIP-004-X6 Table R5 – Access Revocation and additional evidence to demonstrate implementation as
described in the Measures column of the table.
CIP-004-X6 Table R5 – Access Revocation
Part
5.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
Requirements
Measures
A process to initiate removal of an
individual’s ability for unescorted
physical access and Interactive Remote
Access upon a termination action, and
complete the removals within 24 hours
of the termination action (Removal of
the ability for access may be different
than deletion, disabling, revocation, or
removal of all access rights).
An example of evidence may include,
but is not limited to, documentation of
all of the following:
2. PACS
Final Draft
June 2021
Page 18 of 46
1. Dated workflow or sign-off form
verifying access removal
associated with the termination
action; and
2. Logs or other demonstration
showing such persons no longer
have access.
CIP-004-X6 — Cyber Security – Personnel & Training
CIP-004-X6 Table R5 – Access Revocation
Part
5.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Final Draft
June 2021
Requirements
Measures
For reassignments or transfers, revoke
the individual’s authorized electronic
access to individual accounts and
authorized unescorted physical access
that the Responsible Entity determines
are not necessary by the end of the
next calendar day following the date
that the Responsible Entity determines
that the individual no longer requires
retention of that access.
An example of evidence may include,
but is not limited to, documentation of
all of the following:
Page 19 of 46
1. Dated workflow or sign-off form
showing a review of logical and
physical access; and
2. Logs or other demonstration
showing such persons no longer
have access that the
Responsible Entity determines
is not necessary.
CIP-004-X6 — Cyber Security – Personnel & Training
CIP-004-X6 Table R5 – Access Revocation
Part
5.3
Applicable Systems
High Impact BES Cyber Systems and
their associated:
EACMS; and
PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
EACMS; and
Requirements
Measures
For termination actions, revoke the
individual’s access to the designated
storage locations for BES Cyber System
Information, whether physical or
electronic (unless already revoked
according to Requirement R5.1), by the
end of the next calendar day following
the effective date of the termination
action.
An example of evidence may include,
but is not limited to, workflow or signoff form verifying access removal to
designated physical areas or cyber
systems containing BES Cyber System
Information associated with the
terminations and dated within the next
calendar day of the termination action.
For termination actions, revoke the
individual’s non-shared user accounts
(unless already revoked according to
Parts 5.1 or 5.3) within 30 calendar
days of the effective date of the
termination action.
An example of evidence may include,
but is not limited to, workflow or signoff form showing access removal for
any individual BES Cyber Assets and
software applications as determined
necessary to completing the revocation
of access and dated within thirty
calendar days of the termination
actions.
PACS
5.34
High Impact BES Cyber Systems and
their associated:
•
Final Draft
June 2021
EACMS
Page 20 of 46
CIP-004-X6 — Cyber Security – Personnel & Training
CIP-004-X6 Table R5 – Access Revocation
Part
Applicable Systems
5.45 High Impact BES Cyber Systems and
their associated:
•
EACMS
Requirements
Measures
For termination actions, change
Examples of evidence may include, but
passwords for shared account(s) known are not limited to:
to the user within 30 calendar days of
• Workflow or sign-off form
the termination action. For
showing password reset within
reassignments or transfers, change
30 calendar days of the
passwords for shared account(s) known
termination;
to the user within 30 calendar days
• Workflow or sign-off form
following the date that the Responsible
showing password reset within
Entity determines that the individual no
30 calendar days of the
longer requires retention of that
reassignments or transfers; or
access.
If the Responsible Entity determines
and documents that extenuating
operating circumstances require a
longer time period, change the
password(s) within 10 calendar days
following the end of the operating
circumstances.
Final Draft
June 2021
Page 21 of 46
•
Documentation of the
extenuating operating
circumstance and workflow or
sign-off form showing password
reset within 10 calendar days
following the end of the
operating circumstance.
CIP-004-X6 — Cyber Security – Personnel & Training
R6. Each Responsible Entity shall implement one or more documented access management program(s) to authorize, verify, and
revoke provisioned access to BCSI pertaining to the “Applicable Systems” identified in CIP-004-X Table R6 – Access
Management for BES Cyber System Information that collectively include each of the applicable requirement parts in CIP‐
004‐X Table R6 – Access Management for BES Cyber System Information. To be considered access to BCSI in the context of
this requirement, an individual has both the ability to obtain and use BCSI. Provisioned access is to be considered the result
of the specific actions taken to provide an individual(s) the means to access BCSI (e.g., may include physical keys or access
cards, user accounts and associated rights and privileges, encryption keys). [Violation Risk Factor: Medium] [Time Horizon:
Same Day Operations and Operations Planning].
M6. Evidence must include each of the applicable documented programs that collectively include the applicable requirement
parts in CIP-004-X Table R6 – Access Management for BES Cyber System Information and additional evidence to
demonstrate implementation as described in the Measures column of the table.
CIP-004-X Table R6 – Access Management for BES Cyber System Information
Part
6.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
Requirements
Measures
Prior to provisioning, authorize (unless
already authorized according to Part
4.1.) based on need, as determined by
the Responsible Entity, except for CIP
Exceptional Circumstances:
Examples of evidence may include, but
are not limited to, individual records or
lists that include who is authorized, the
date of the authorization, and the
justification of business need for the
provisioned access.
6.1.1. Provisioned electronic access to
electronic BCSI; and
6.1.2. Provisioned physical access to
physical BCSI.
2. PACS
Final Draft
June 2021
Page 22 of 46
CIP-004-X6 — Cyber Security – Personnel & Training
CIP-004-X Table R6 – Access Management for BES Cyber System Information
Part
6.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
Requirements
Measures
Verify at least once every 15 calendar
months that all individuals with
provisioned access to BCSI:
6.2.1. have an authorization record;
and
6.2.2. still need the provisioned access
to perform their current work
functions, as determined by the
Responsible Entity.
Examples of evidence may include, but
are not limited to, the documentation
of the review that includes all of the
following:
•
List of authorized individuals;
•
List of individuals who have been
provisioned access;
•
Verification that provisioned
access is appropriate based on
need; and
•
Documented reconciliation
actions, if any.
2. PACS
6.3
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
For termination actions, remove the
individual’s ability to use provisioned
access to BCSI (unless already revoked
according to Part 5.1) by the end of the
next calendar day following the
effective date of the termination
action.
1. EACMS; and
2. PACS
Final Draft
June 2021
Page 23 of 46
Examples of dated evidence may
include, but are not limited to, access
revocation records associated with the
terminations and dated within the next
calendar day of the termination action.
CIP-004-X6 — Cyber Security – Personnel & Training
C. Compliance
1. Compliance Monitoring Process:
1.1. Compliance Enforcement Authority:
As defined in the NERC Rules of Procedure, “Compliance Enforcement Authority” (CEA)
means NERC or the Regional Entity, or any entity as otherwise designated by an
Applicable Governmental Authority, in their respective roles of monitoring and/or
enforcing compliance with mandatory and enforceable the NERC Reliability Standards
in their respective jurisdictions.
1.2. Evidence Retention:
The following evidence retention periods identify the period of time an entity is
required to retain specific evidence to demonstrate compliance. For instances where
the evidence retention period specified below is shorter than the time since the last
audit, the CEA may ask an entity to provide other evidence to show that it was
compliant for the full time period since the last audit.
The Responsible Eapplicable entity shall keep data or evidence to show compliance as
identified below unless directed by its CEA to retain specific evidence for a longer
period of time as part of an investigation:
•
Each Responsible EThe applicable entity shall retain evidence of each requirement in
this standard for three calendar years.
•
If a Responsible EThe applicable entity is found non-compliant, it shall keep information
related to the non-compliance until mitigation is complete and approved or for the
time specified above, whichever is longer.
•
The CEA shall keep the last audit records and all requested and submitted subsequent
audit records.
1.3. Compliance Monitoring and EnforceAssessment Programcesses:
As defined in the NERC Rules of Procedure, “Compliance Monitoring and Enforcement
Program” refers to the identification of the processes that will be used to evaluate data
or information for the purpose of assessing performance or outcomes with the
associated Reliability Standard.
Compliance Audits
Self-Certifications
Spot Checking
Compliance Violation Investigations
Self-Reporting
Complaints
1.4. Additional Compliance Information:
None
Final Draft
June
2021
Page 24 of 46
CIP-004-X6 — Cyber Security – Personnel & Training
2. Table of Compliance Elements
R#
R1
R2
Time
Horizon
VRF
Operations
Planning
Lower
Operations
Planning
Violation Severity Levels (CIP-004-X6)
Lower VSL
Lower
Moderate VSL
Severe VSL
The Responsible Entity did
not reinforce cyber
security practices during a
calendar quarter but did
so less than 10 calendar
days after the start of a
subsequent calendar
quarter. (1.1)
The Responsible
Entity did not
reinforce cyber
security practices
during a calendar
quarter but did so
between 10 and 30
calendar days after
the start of a
subsequent calendar
quarter. (1.1)
The Responsible Entity
did not reinforce cyber
security practices
during a calendar
quarter but did so
within the subsequent
quarter but beyond 30
calendar days after the
start of that calendar
quarter. (1.1)
The Responsible Entity
did not document or
implement any security
awareness process(es)
to reinforce cyber
security practices. (R1)
The Responsible Entity
implemented a cyber
security training program
but failed to include one
of the training content
topics in Requirement
Parts 2.1.1 through 2.1.9.
(2.1)
The Responsible
Entity implemented a
cyber security
training program but
failed to include two
of the training
content topics in
Requirement Parts
2.1.1 through 2.1.9.
(2.1)
The Responsible Entity
implemented a cyber
security training
program but failed to
include three of the
training content topics
in Requirement Parts
2.1.1 through 2.1.9.
(2.1)
The Responsible Entity
did not implement a
cyber security training
program appropriate to
individual roles,
functions, or
responsibilities. (R2)
OR
OR
Final Draft
June 2021
High VSL
OR
OR
The Responsible Entity
did not reinforce cyber
security practices and
associated physical
security practices for at
least two consecutive
calendar quarters. (1.1)
OR
The Responsible Entity
implemented a cyber
Page 25 of 46
CIP-004-X6 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-X6)
Lower VSL
The Responsible Entity
implemented a cyber
security training program
but failed to train one
individual (with the
exception of CIP
Exceptional
Circumstances) prior to
their being granted
authorized electronic and
authorized unescorted
physical access. (2.2)
OR
The Responsible Entity
implemented a cyber
security training program
but failed to train one
individual with authorized
electronic or authorized
unescorted physical
access within 15 calendar
months of the previous
training completion date.
(2.3)
Final Draft
June 2021
Moderate VSL
The Responsible
Entity implemented a
cyber security
training program but
failed to train two
individuals (with the
exception of CIP
Exceptional
Circumstances) prior
to their being
granted authorized
electronic and
authorized
unescorted physical
access. (2.2)
High VSL
The Responsible Entity
implemented a cyber
security training
program but failed to
train three individuals
(with the exception of
CIP Exceptional
Circumstances) prior to
their being granted
authorized electronic
and authorized
unescorted physical
access. (2.2)
OR
The Responsible Entity
implemented a cyber
security training
program but failed to
The Responsible
Entity implemented a train three individuals
with authorized
cyber security
training program but electronic or authorized
unescorted physical
failed to train two
access within 15
individuals with
authorized electronic calendar months of the
previous training
or authorized
completion date. (2.3)
unescorted physical
access within 15
OR
Severe VSL
security training
program but failed to
include four or more of
the training content
topics in Requirement
Parts 2.1.1 through
2.1.9. (2.1)
OR
The Responsible Entity
implemented a cyber
security training
program but failed to
train four or more
individuals (with the
exception of CIP
Exceptional
Circumstances) prior to
their being granted
authorized electronic
and authorized
unescorted physical
access. (2.2)
OR
The Responsible Entity
implemented a cyber
security training
program but failed to
Page 26 of 46
CIP-004-X6 — Cyber Security – Personnel & Training
R#
R3
Final Draft
June 2021
Time
Horizon
VRF
Operations
Planning
Medium
Violation Severity Levels (CIP-004-X6)
Lower VSL
The Responsible Entity
has a program for
conducting Personnel Risk
Assessments (PRAs) for
individuals, including
contractors and service
vendors, but did not
conduct the PRA as a
condition of granting
authorized electronic or
authorized unescorted
physical access for one
individual. (R3)
Moderate VSL
calendar months of
the previous training
completion date.
(2.3)
The Responsible
Entity has a program
for conducting
Personnel Risk
Assessments (PRAs)
for individuals,
including contractors
and service vendors,
but did not conduct
the PRA as a
condition of granting
authorized electronic
or authorized
unescorted physical
OR
access for two
The Responsible Entity did individuals. (R3)
conduct Personnel Risk
OR
Assessments (PRAs) for
individuals, including
The Responsible
contractors and service
Entity did conduct
High VSL
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments (PRAs)
for individuals,
including contractors
and service vendors,
but did not conduct the
PRA as a condition of
granting authorized
electronic or authorized
unescorted physical
access for three
individuals. (R3)
OR
Severe VSL
train four or more
individuals with
authorized electronic or
authorized unescorted
physical access within 15
calendar months of the
previous training
completion date. (2.3)
The Responsible Entity
did not have all of the
required elements as
described by 3.1 through
3.4 included within
documented program(s)
for implementing
Personnel Risk
Assessments (PRAs), for
individuals, including
contractors and service
vendors, for obtaining
and retaining authorized
cyber or authorized
unescorted physical
access. (R3)
The Responsible Entity
OR
did conduct Personnel
Risk Assessments (PRAs) The Responsible Entity
for individuals,
has a program for
Page 27 of 46
CIP-004-X6 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-X6)
Lower VSL
vendors, with authorized
electronic or authorized
unescorted physical
access but did not confirm
identity for one
individual. (3.1 & 3.4)
OR
The Responsible Entity
has a process to perform
seven-year criminal
history record checks for
individuals, including
contractors and service
vendors, with authorized
electronic or authorized
unescorted physical
access but did not include
the required checks
described in 3.2.1 and
3.2.2 for one individual.
(3.2 & 3.4)
Moderate VSL
Personnel Risk
Assessments (PRAs)
for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized
unescorted physical
access but did not
confirm identity for
two individuals. (3.1
& 3.4)
OR
The Responsible
Entity has a process
to perform sevenyear criminal history
record checks for
individuals, including
contractors and
service vendors, with
OR
authorized electronic
The Responsible Entity did or authorized
conduct Personnel Risk
unescorted physical
Assessments (PRAs) for
access but did not
individuals, including
include the required
contractors and service
checks described in
Final Draft
June 2021
High VSL
including contractors
and service vendors,
with authorized
electronic or authorized
unescorted physical
access but did not
confirm identity for
three individuals. (3.1 &
3.4)
OR
The Responsible Entity
has a process to
perform seven-year
criminal history record
checks for individuals,
including contractors
and service vendors,
with authorized
electronic or authorized
unescorted physical
access but did not
include the required
checks described in
3.2.1 and 3.2.2 for three
individuals. (3.2 & 3.4)
OR
Severe VSL
conducting Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, but did not
conduct the PRA as a
condition of granting
authorized electronic or
authorized unescorted
physical access for four
or more individuals. (R3)
OR
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with authorized
electronic or authorized
unescorted physical
access but did not
confirm identity for four
or more individuals. (3.1
& 3.4)
OR
The Responsible Entity
has a process to perform
Page 28 of 46
CIP-004-X6 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-X6)
Lower VSL
vendors, with authorized
electronic or authorized
unescorted physical
access but did not
evaluate criminal history
records check for access
authorization for one
individual. (3.3 & 3.4)
Moderate VSL
3.2.1 and 3.2.2 for
two individuals. (3.2
& 3.4)
OR
The Responsible
Entity did conduct
Personnel Risk
Assessments (PRAs)
OR
for individuals,
The Responsible Entity did including contractors
not conduct Personnel
and service vendors,
Risk Assessments (PRAs)
with authorized
for one individual with
electronic or
authorized electronic or
authorized
authorized unescorted
unescorted physical
physical access within 7
access but did not
calendar years of the
evaluate criminal
previous PRA completion history records check
for access
date. (3.5)
authorization for two
individuals. (3.3 &
3.4)
OR
The Responsible
Entity did not
conduct Personnel
Risk Assessments
Final Draft
June 2021
High VSL
Severe VSL
seven-year criminal
The Responsible Entity
history record checks for
did conduct Personnel
Risk Assessments (PRAs) individuals, including
contractors and service
for individuals,
vendors, with authorized
including contractors
electronic or authorized
and service vendors,
unescorted physical
with authorized
electronic or authorized access but did not
include the required
unescorted physical
checks described in 3.2.1
access but did not
and 3.2.2 for four or
evaluate criminal
more individuals. (3.2 &
history records check
for access authorization 3.4)
for three individuals.
OR
(3.3 & 3.4)
The Responsible Entity
OR
did conduct Personnel
Risk Assessments (PRAs)
The Responsible Entity
for individuals, including
did not conduct
contractors and service
Personnel Risk
Assessments (PRAs) for vendors, with authorized
electronic or authorized
three individuals with
authorized electronic or unescorted physical
access but did not
authorized unescorted
physical access within 7 evaluate criminal history
records check for access
calendar years of the
authorization for four or
previous PRA
more individuals. (3.3 &
completion date. (3.5)
3.4)
Page 29 of 46
CIP-004-X6 — Cyber Security – Personnel & Training
R#
R4
Time
Horizon
Operations
Planning
and Same
Day
Operations
VRF
Violation Severity Levels (CIP-004-X6)
Lower VSL
Medium
The Responsible Entity did
not verify that individuals
with active electronic or
active unescorted physical
access have authorization
records during a calendar
quarter but did so less
than 10 calendar days
after the start of a
subsequent calendar
quarter. (4.2)
OR
Final Draft
June 2021
Moderate VSL
(PRAs) for two
individuals with
authorized electronic
or authorized
unescorted physical
access within 7
calendar years of the
previous PRA
completion date.
(3.5)
The Responsible
Entity did not verify
that individuals with
active electronic or
active unescorted
physical access have
authorization records
during a calendar
quarter but did so
between 10 and 20
calendar days after
the start of a
subsequent calendar
quarter. (4.2)
High VSL
Severe VSL
OR
The Responsible Entity
did not verify that
individuals with active
electronic or active
unescorted physical
access have
authorization records
during a calendar
quarter but did so
between 20 and 30
calendar days after the
start of a subsequent
calendar quarter. (4.2)
OR
The Responsible Entity
did not conduct
Personnel Risk
Assessments (PRAs) for
four or more individuals
with authorized
electronic or authorized
unescorted physical
access within 7 calendar
years of the previous
PRA completion date.
(3.5)
The Responsible Entity
did not implement any
documented program(s)
for access management.
(R4)
OR
The Responsible Entity
has did not
implemented one or
more documented
program(s) for access
management that
includes a process to
Page 30 of 46
CIP-004-X6 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-X6)
Lower VSL
The Responsible Entity
has implemented
processes to verify that
user accounts, user
account groups, or user
role categories, and their
specific, associated
privileges are correct and
necessary within 15
calendar months of the
previous verification but
for 5% or less of its BES
Cyber Systems, privileges
were incorrect or
unnecessary. (4.3)
OR
The Responsible Entity
has implemented
processes to verify that
access to the designated
storage locations for BES
Cyber System Information
is correct and necessary
within 15 calendar
months of the previous
verification but for 5% or
less of its BES Cyber
System Information
Final Draft
June 2021
OR
Moderate VSL
The Responsible
Entity has
implemented
processes to verify
that user accounts,
user account groups,
or user role
categories, and their
specific, associated
privileges are correct
and necessary within
15 calendar months
of the previous
verification but for
more than 5% but
less than (or equal
to) 10% of its BES
Cyber Systems,
privileges were
incorrect or
unnecessary. (4.3)
OR
The Responsible
Entity has
implemented
High VSL
The Responsible Entity
has implemented
processes to verify that
user accounts, user
account groups, or user
role categories, and
their specific,
associated privileges
are correct and
necessary within 15
calendar months of the
previous verification
but for more than 10%
but less than (or equal
to) 15% of its BES Cyber
Systems, privileges
were incorrect or
unnecessary. (4.3)
OR
The Responsible Entity
has implemented
processes to verify that
access to the
designated storage
locations for BES Cyber
System Information is
Severe VSL
authorize electronic
access, or unescorted
physical access, or
access to the designated
storage locations where
BES Cyber System
Information is located.
(4.1)
OR
The Responsible Entity
did not verify that
individuals with active
electronic or active
unescorted physical
access have
authorization records for
at least two consecutive
calendar quarters. (4.2)
OR
The Responsible Entity
has implemented
processes to verify that
user accounts, user
account groups, or user
role categories, and their
Page 31 of 46
CIP-004-X6 — Cyber Security – Personnel & Training
R#
Final Draft
June 2021
Time
Horizon
VRF
Violation Severity Levels (CIP-004-X6)
Lower VSL
storage locations,
privileges were incorrect
or unnecessary. (4.4)
Moderate VSL
processes to verify
that access to the
designated storage
locations for BES
Cyber System
Information is
correct and
necessary within 15
calendar months of
the previous
verification but for
more than 5% but
less than (or equal
to) 10% of its BES
Cyber System
Information storage
locations, privileges
were incorrect or
unnecessary. (4.4)
High VSL
correct and necessary
within 15 calendar
months of the previous
verification but for
more than 10% but less
than (or equal to) 15%
of its BES Cyber System
Information storage
locations, privileges
were incorrect or
unnecessary. (4.4)
Severe VSL
specific, associated
privileges are correct
and necessary within 15
calendar months of the
previous verification but
for more than 15% of its
BES Cyber Systems,
privileges were incorrect
or unnecessary. (4.3)
OR
The Responsible Entity
has implemented
processes to verify that
access to the designated
storage locations for BES
Cyber System
Information is correct
and necessary within 15
calendar months of the
previous verification but
for more than 15% of its
BES Cyber System
Information storage
locations, privileges
were incorrect or
unnecessary. (4.4)
Page 32 of 46
CIP-004-X6 — Cyber Security – Personnel & Training
R#
R5
Time
Horizon
VRF
Same Day
Operations
and
Operations
Planning
Medium
Violation Severity Levels (CIP-004-X6)
Lower VSL
The Responsible Entity
has implemented one or
more process(es) to
revoke the individual’s
access to the designated
storage locations for BES
Cyber System Information
but, for one individual,
did not do so by the end
of the next calendar day
following the effective
date and time of the
termination action. (5.3)
OR
The Responsible Entity
has implemented one or
more process(es) to
revoke the individual’s
user accounts upon
termination action but did
not do so for within 30
calendar days of the date
of termination action for
one or more individuals.
(5.43)
OR
The Responsible Entity
has implemented one or
Final Draft
June 2021
Moderate VSL
The Responsible
Entity has
implemented one or
more process(es) to
remove the ability
for unescorted
physical access and
Interactive Remote
Access upon a
termination action or
complete the
removal within 24
hours of the
termination action
but did not initiate
those removals for
one individual. (5.1)
OR
The Responsible
Entity has
implemented one or
more process(es) to
determine that an
individual no longer
requires retention of
access following
High VSL
The Responsible Entity
has implemented one
or more process(es) to
remove the ability for
unescorted physical
access and Interactive
Remote Access upon a
termination action or
complete the removal
within 24 hours of the
termination action but
did not initiate those
removals for two
individuals. (5.1)
OR
The Responsible Entity
has implemented one
or more process(es) to
determine that an
individual no longer
requires retention of
access following
reassignments or
transfers but, for two
individuals, did not
revoke the authorized
Severe VSL
The Responsible Entity
has not implemented
any documented
program(s) for access
revocation for electronic
access, or unescorted
physical access, or BES
Cyber System
Information storage
locations. (R5)
OR
The Responsible Entity
has implemented one or
more process(es) to
remove the ability for
unescorted physical
access and Interactive
Remote Access upon a
termination action or
complete the removal
within 24 hours of the
termination action but
did not initiate those
removals for three or
more individuals. (5.1)
OR
Page 33 of 46
CIP-004-X6 — Cyber Security – Personnel & Training
R#
Final Draft
June 2021
Time
Horizon
VRF
Violation Severity Levels (CIP-004-X6)
Lower VSL
more process(es) to
change passwords for
shared accounts known to
the user upon termination
action, reassignment, or
transfer, but did not do so
for within 30 calendar
days of the date of
termination action,
reassignment, or transfer
for one or more
individuals. (5.45)
Moderate VSL
reassignments or
transfers but, for one
individual, did not
revoke the
authorized electronic
access to individual
accounts and
authorized
unescorted physical
access by the end of
the next calendar day
following the
predetermined date.
OR
(5.2)
The Responsible Entity
OR
has implemented one or
The Responsible
more process(es) to
Entity has
determine and document implemented one or
extenuating operating
more process(es) to
circumstances following a revoke the
termination action,
individual’s access to
reassignment, or transfer, the designated
but did not change one or storage locations for
more passwords for
BES Cyber System
shared accounts known to Information but, for
the user within 10
two individuals, did
calendar days following
not do so by the end
the end of the
of the next calendar
High VSL
electronic access to
individual accounts and
authorized unescorted
physical access by the
end of the next
calendar day following
the predetermined
date. (5.2)
OR
The Responsible Entity
has implemented one
or more process(es) to
revoke the individual’s
access to the
designated storage
locations for BES Cyber
System Information but,
for three or more
individuals, did not do
so by the end of the
next calendar day
following the effective
date and time of the
termination action.
(5.3)
Severe VSL
The Responsible Entity
has implemented one or
more process(es) to
determine that an
individual no longer
requires retention of
access following
reassignments or
transfers but, for three
or more individuals, did
not revoke the
authorized electronic
access to individual
accounts and authorized
unescorted physical
access by the end of the
next calendar day
following the
predetermined date.
(5.2)
Page 34 of 46
CIP-004-X6 — Cyber Security – Personnel & Training
R#
R6
Time
Horizon
VRF
Same Day
Operations
and
Operations
Planning
Medium
Violation Severity Levels (CIP-004-X6)
Lower VSL
extenuating operating
circumstances. (5.54)
Moderate VSL
day following the
effective date and
time of the
termination action.
(5.3)
The Responsible Entity
has implemented one or
more program(s) as
required by Requirement
R6 Part 6.1 but, for one
individual, did not
authorize provisioned
electronic access to
electronic BCSI or
provisioned physical
access to physical BCSI.
(6.1)
The Responsible
Entity has
implemented one or
more program(s) as
required by
Requirement R6 Part
6.1 but, for two
individuals, did not
authorize
provisioned
electronic access to
electronic BCSI or
provisioned physical
access to physical
BCSI. (6.1)
OR
The Responsible Entity
performed the
verification required by
Requirement R6 Part 6.2
more than 15 calendar
months but less than or
equal to 16 calendar
months of the previous
verification. (6.2)
Final Draft
June 2021
OR
The Responsible
Entity performed the
verification required
by Requirement R6
Part 6.2 more than
16 calendar months
High VSL
The Responsible Entity
has implemented one
or more program(s) as
required by
Requirement R6 Part
6.1 but, for three
individuals, did not
authorize provisioned
electronic access to
electronic BCSI or
provisioned physical
access to physical BCSI.
(6.1)
OR
The Responsible Entity
performed the
verification required by
Requirement R6 Part
6.2 more than 17
calendar months but
less than or equal to 18
calendar months of the
Severe VSL
The Responsible Entity
did not implement one
or more documented
access management
program(s) for BCSI.
(R6)
OR
The Responsible Entity
has implemented one or
more program(s) as
required by
Requirement R6 Part 6.1
but, for four or more
individuals, did not
authorize provisioned
electronic access to
electronic BCSI or
provisioned physical
access to physical BCSI.
(6.1)
OR
Page 35 of 46
CIP-004-X6 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-X6)
Lower VSL
OR
The Responsible Entity
has implemented one or
more program(s) to
remove the individual’s
ability to use provisioned
access to BCSI but, for
one individual, did not do
so by the timeframe
required in Requirement
R6, Part 6.3.
Final Draft
June 2021
Moderate VSL
but less than or equal
to 17 calendar
months of the
previous verification.
(6.2)
OR
The Responsible
Entity has
implemented one or
more program(s) to
remove the
individual’s ability to
use provisioned
access to BCSI but,
for two individuals,
did not do so by the
timeframe required
in Requirement R6,
Part 6.3.
High VSL
previous verification.
(6.2)
OR
The Responsible Entity
has implemented one
or more program(s) to
remove the individual’s
ability to use
provisioned access to
BCSI but, for three
individuals, did not do
so by the timeframe
required in
Requirement R6, Part
6.3.
Severe VSL
The Responsible Entity
performed the
verification required by
Requirement R6 Part 6.2
more than 18 calendar
months of the previous
verification. (6.2)
OR
The Responsible Entity
has implemented one or
more program(s) to
remove the individual’s
ability to use
provisioned access to
BCSI but, for four or
more individuals, did not
do so by the timeframe
required in Requirement
R6, Part 6.3.
Page 36 of 46
Guidelines and Technical Basis
D. Regional Variances
None.
E. Interpretations
None.
F. Associated Documents
None.
Version History
Version
Date
Action
1
1/16/06
R3.2 — Change “Control Center” to
“control center.”
2
9/30/09
Modifications to clarify the
requirements and to bring the
compliance elements into conformance
with the latest guidelines for developing
compliance elements of standards.
Change Tracking
3/24/06
Removal of reasonable business
judgment.
Replaced the RRO with the RE as a
responsible entity.
Rewording of Effective Date.
Changed compliance monitor to
Compliance Enforcement Authority.
3
12/16/09
Updated Version Number from -2 to -3
In Requirement 1.6, deleted the
sentence pertaining to removing
component or system from service in
order to perform testing, in response to
FERC order issued September 30, 2009.
Final Draft
June 2021
3
12/16/09
3
3/31/10
4
1/24/11
Approved by the NERC Board of
Trustees.
Approved by FERC.
Approved by the NERC Board of
Trustees.
Page 37 of 46
Guidelines and Technical Basis
Version
Date
5
11/26/12
Adopted by the NERC Board of
Trustees.
5
11/22/13
FERC Order issued approving CIP-004-5.
5.1
9/30/13
Modified two VSLs in R4
Errata
6
11/13/14
Adopted by the NERC Board of
Trustees.
Addressed two
FERC directives
from Order No.
791 related to
identify, assess,
and correct
language and
communication
networks.
6
2/12/15
Adopted by the NERC Board of
Trustees.
Replaces the
version adopted
by the Board on
11/13/2014.
Revised version
addresses
remaining
directives from
Order No. 791
related to
transient devices
and low impact
BES Cyber
Systems.
6
1/21/16
7
TBD
FERC order issued approving CIP-004-6.
Docket No. RM15-14-000
Adopted by the NERC Board of Trustees
Final Draft
June 2021
Action
Change Tracking
Modified to
coordinate with
other CIP
standards and to
revise format to
use RBS
Template.
Revised to
enhance BES
reliability for
entities to
manage their
BCSI.
Page 38 of 46
Guidelines and Technical Basis
Guidelines and Technical Basis
Section 4 – Scope of Applicability of the CIP Cyber Security Standards
Section “4. Applicability” of the standards provides important information for Responsible
Entities to determine the scope of the applicability of the CIP Cyber Security Requirements.
Section “4.1. Functional Entities” is a list of NERC functional entities to which the standard
applies. If the entity is registered as one or more of the functional entities listed in Section
4.1, then the NERC CIP Cyber Security Standards apply. Note that there is a qualification in
Section 4.1 that restricts the applicability in the case of Distribution Providers to only those
that own certain types of systems and equipment listed in 4.2.
Section “4.2. Facilities” defines the scope of the Facilities, systems, and equipment owned by
the Responsible Entity, as qualified in Section 4.1, that is subject to the requirements of the
standard. As specified in the exemption section 4.2.3.5, this standard does not apply to
Responsible Entities that do not have High Impact or Medium Impact BES Cyber Systems
under CIP-002-5.1’s categorization. In addition to the set of BES Facilities, Control Centers,
and other systems and equipment, the list includes the set of systems and equipment owned
by Distribution Providers. While the NERC Glossary term “Facilities” already includes the BES
characteristic, the additional use of the term BES here is meant to reinforce the scope of
applicability of these Facilities where it is used, especially in this applicability scoping section.
This in effect sets the scope of Facilities, systems, and equipment that is subject to the
standards.
Requirement R1:
The security awareness program is intended to be an informational program, not a formal
training program. It should reinforce security practices to ensure that personnel maintain
awareness of best practices for both physical and electronic security to protect its BES Cyber
Systems. The Responsible Entity is not required to provide records that show that each
individual received or understood the information, but they must maintain documentation of
the program materials utilized in the form of posters, memos, and/or presentations.
Examples of possible mechanisms and evidence, when dated, which can be used are:
Direct communications (e.g., emails, memos, computer based training, etc.);
Indirect communications (e.g., posters, intranet, brochures, etc.);
Management support and reinforcement (e.g., presentations, meetings, etc.).
Requirement R2:
Final Draft
June 2021
Page 39 of 46
Guidelines and Technical Basis
Training shall cover the policies, access controls, and procedures as developed for the BES
Cyber Systems and include, at a minimum, the required items appropriate to personnel roles
and responsibilities from Table R2. The Responsible Entity has the flexibility to define the
training program and it may consist of multiple modules and multiple delivery mechanisms,
but a single training program for all individuals needing to be trained is acceptable. The
training can focus on functions, roles or responsibilities at the discretion of the Responsible
Entity.
One new element in the training content is intended to encompass networking hardware and
software and other issues of electronic interconnectivity supporting the operation and
control of BES Cyber Systems as per FERC Order No. 706, Paragraph 434. Additionally,
training should address the risk posed when connecting and using Transient Cyber Assets and
Removable Media with BES Cyber Systems or within an Electronic Security Perimeter. As
noted in FERC Order No. 791, Paragraph 135, Transient Cyber Assets and Removable Media
have been the source of incidents where malware was introduced into electric generation
industrial control systems in real-world situations. Training on their use is a key element in
protecting BES Cyber Systems. This is not intended to provide technical training to individuals
supporting networking hardware and software, but educating system users of the cyber
security risks associated with the interconnectedness of these systems. The users, based on
their function, role, or responsibility, should have a basic understanding of which systems can
be accessed from other systems and how the actions they take can affect cyber security.
Each Responsible Entity shall ensure all personnel who are granted authorized electronic
access and/or authorized unescorted physical access to its BES Cyber Systems, including
contractors and service vendors, complete cyber security training prior to their being granted
authorized access, except for CIP Exceptional Circumstances. To retain the authorized
accesses, individuals must complete the training at least one every 15 months.
Requirement R3:
Each Responsible Entity shall ensure a personnel risk assessment is performed for all
personnel who are granted authorized electronic access and/or authorized unescorted
physical access to its BES Cyber Systems, including contractors and service vendors, prior to
their being granted authorized access, except for program specified exceptional
circumstances that are approved by the single senior management official or their delegate
and impact the reliability of the BES or emergency response. Identity should be confirmed in
accordance with federal, state, provincial, and local laws, and subject to existing collective
bargaining unit agreements. Identity only needs to be confirmed prior to initially granting
access and only requires periodic confirmation according to the entity’s process during the
tenure of employment, which may or may not be the same as the initial verification action.
A seven year criminal history check should be performed for those locations where the
individual has resided for at least six consecutive months. This check should also be
performed in accordance with federal, state, provincial, and local laws, and subject to existing
collective bargaining unit agreements. When it is not possible to perform a full seven year
criminal history check, documentation must be made of what criminal history check was
performed, and the reasons a full seven-year check could not be performed. Examples of this
Final Draft
June 2021
Page 40 of 46
Guidelines and Technical Basis
could include individuals under the age of 25 where a juvenile criminal history may be
protected by law, individuals who may have resided in locations from where it is not possible
to obtain a criminal history records check, violates the law or is not allowed under the
existing collective bargaining agreement. The Responsible Entity should consider the absence
of information for the full seven years when assessing the risk of granting access during the
process to evaluate the criminal history check. There needs to be a personnel risk assessment
that has been completed within the last seven years for each individual with access. A new
criminal history records check must be performed as part of the new PRA. Individuals who
have been granted access under a previous version of these standards need a new PRA within
seven years of the date of their last PRA. The clarifications around the seven year criminal
history check in this version do not require a new PRA be performed by the implementation
date.
Requirement R4:
Authorization for electronic and unescorted physical access and access to BES Cyber System
Information must be on the basis of necessity in the individual performing a work function.
Documentation showing the authorization should have some justification of the business
need included. To ensure proper segregation of duties, access authorization and provisioning
should not be performed by the same person where possible.
This requirement specifies both quarterly reviews and reviews at least once every 15 calendar
months. Quarterly reviews are to perform a validation that only authorized users have been
granted access to BES Cyber Systems. This is achieved by comparing individuals actually
provisioned to a BES Cyber System against records of individuals authorized to the BES Cyber
System. The focus of this requirement is on the integrity of provisioning access rather than
individual accounts on all BES Cyber Assets. The list of provisioned individuals can be an
automatically generated account listing. However, in a BES Cyber System with several
account databases, the list of provisioned individuals may come from other records such as
provisioning workflow or a user account database where provisioning typically initiates.
Final Draft
June 2021
Page 41 of 46
Guidelines and Technical Basis
The privilege review at least once every 15 calendar months is more detailed to ensure an
individual’s associated privileges are the minimum necessary to perform their work function
(i.e., least privilege). Entities can more efficiently perform this review by implementing rolebased access. This involves determining the specific roles on the system (e.g., system
operator, technician, report viewer, administrator, etc.) then grouping access privileges to the
role and assigning users to the role. Role-based access does not assume any specific software
and can be implemented by defining specific provisioning processes for each role where
access group assignments cannot be performed. Role-based access permissions eliminate the
1/1
1) Quarterly access review
2) privilege review (at least once every
15 calendar months)
3) BES Cyber
System Information
review (at least once every
4/1
15 calendar months)
Quarterly access review
2/1
3/1
4/1
7/1
Quarterly access review
5/1
6/1
7/1
1/1
1) Quarterly access review
2) privilege review
(at least once every
15 calendar months)
3) BES Cyber System
Information review
(at least once every
15 calendar months)
10/1
Quarterly access review
8/1
9/1
10/1
11/1
12/1
1/1
1/1
need to perform the privilege review on individual accounts. An example timeline of all the
reviews in Requirement R4 is included below.
Separation of duties should be considered when performing the reviews in Requirement R4.
The person reviewing should be different than the person provisioning access.
If the results of quarterly or at least once every 15 calendar months account reviews indicate
an administrative or clerical error in which access was not actually provisioned, then the SDT
intends that this error should not be considered a violation of this requirement.
For BES Cyber Systems that do not have user accounts defined, the controls listed in
Requirement R4 are not applicable. However, the Responsible Entity should document such
configurations.
Requirement R5:
The requirement to revoke access at the time of the termination action includes procedures
showing revocation of access concurrent with the termination action. This requirement
recognizes that the timing of the termination action may vary depending on the
circumstance. Some common scenarios and possible processes on when the termination
action occurs are provided in the following table. These scenarios are not an exhaustive list of
all scenarios, but are representative of several routine business practices.
Final Draft
June 2021
Page 42 of 46
Guidelines and Technical Basis
Scenario
Possible Process
Immediate involuntary
termination
Human resources or corporate security escorts the
individual off site and the supervisor or human resources
personnel notify the appropriate personnel to begin the
revocation process.
Scheduled involuntary
termination
Human resources personnel are notified of the termination
and work with appropriate personnel to schedule the
revocation of access at the time of termination.
Voluntary termination
Human resources personnel are notified of the termination
and work with appropriate personnel to schedule the
revocation of access at the time of termination.
Retirement where the last
working day is several weeks
prior to the termination date
Human resources personnel coordinate with manager to
determine the final date access is no longer needed and
schedule the revocation of access on the determined day.
Death
Human resources personnel are notified of the death and
work with appropriate personnel to begin the revocation
process.
Revocation of electronic access should be understood to mean a process with the end result
that electronic access to BES Cyber Systems is no longer possible using credentials assigned to
or known by the individual(s) whose access privileges are being revoked. Steps taken to
accomplish this outcome may include deletion or deactivation of accounts used by the
individual(s), but no specific actions are prescribed. Entities should consider the ramifications
of deleting an account may include incomplete event log entries due to an unrecognized
account or system services using the account to log on.
The initial revocation required in Requirement R5.1 includes unescorted physical access and
Interactive Remote Access. These two actions should prevent any further access by the
individual after termination. If an individual still has local access accounts (i.e., accounts on
the Cyber Asset itself) on BES Cyber Assets, then the Responsible Entity has 30 days to
complete the revocation process for those accounts. However, nothing prevents a
Responsible Entity from performing all of the access revocation at the time of termination.
For transferred or reassigned individuals, a review of access privileges should be performed.
This review could entail a simple listing of all authorizations for an individual and working
with the respective managers to determine which access will still be needed in the new
position. For instances in which the individual still needs to retain access as part of a
transitory period, the entity should schedule a time to review these access privileges or
include the privileges in the quarterly account review or annual privilege review.
Final Draft
June 2021
Page 43 of 46
Guidelines and Technical Basis
Revocation of access to shared accounts is called out separately to prevent the situation
where passwords on substation and generation devices are constantly changed due to staff
turnover.
Requirement 5.5 specified that passwords for shared account are to the changed within 30
calendar days of the termination action or when the Responsible Entity determines an
individual no longer requires access to the account as a result of a reassignment or transfer.
The 30 days applies under normal operating conditions. However, circumstances may occur
where this is not possible. Some systems may require an outage or reboot of the system in
order to complete the password change. In periods of extreme heat or cold, many
Responsible Entities may prohibit system outages and reboots in order to maintain reliability
of the BES. When these circumstances occur, the Responsible Entity must document these
circumstances and prepare to change the password within 10 calendar days following the end
of the operating circumstances. Records of activities must be retained to show that the
Responsible Entity followed the plan they created.
Rationale:
During development of this standard, text boxes were embedded within the standard to
explain the rationale for various parts of the standard. Upon BOT approval, the text from the
rationale text boxes was moved to this section.
Rationale for Requirement R1:
Ensures that Responsible Entities with personnel who have authorized electronic or
authorized unescorted physical access to BES Cyber Assets take action so that those
personnel with such authorized electronic or authorized unescorted physical access maintain
awareness of the Responsible Entity’s security practices.
Rationale for Requirement R2:
To ensure that the Responsible Entity’s training program for personnel who need authorized
electronic access and/or authorized unescorted physical access to BES Cyber Systems covers
the proper policies, access controls, and procedures to protect BES Cyber Systems and are
trained before access is authorized.
Rationale for Requirement R3:
To ensure that individuals who need authorized electronic or authorized unescorted physical
access to BES Cyber Systems have been assessed for risk. Whether initial access or
maintaining access, those with access must have had a personnel risk assessment completed
within the last 7 years.
Rationale for Requirement R4:
Final Draft
June 2021
Page 44 of 46
Guidelines and Technical Basis
To ensure that individuals with access to BES Cyber Systems and the physical and electronic
locations where BES Cyber System Information is stored by the Responsible Entity have been
properly authorized for such access. “Authorization” should be considered to be a grant of
permission by a person or persons empowered by the Responsible Entity to perform such
grants and included in the delegations referenced in CIP-003-6. “Provisioning” should be
considered the actions to provide access to an individual.
Access is physical, logical, and remote permissions granted to Cyber Assets composing the
BES Cyber System or allowing access to the BES Cyber System. When granting, reviewing, or
revoking access, the Responsible Entity must address the Cyber Asset specifically as well as
the systems used to enable such access (i.e., physical access control system, remote access
system, directory services).
CIP Exceptional Circumstances are defined in a Responsible Entity’s policy from CIP-003-6 and
allow an exception to the requirement for authorization to BES Cyber Systems and BES Cyber
System Information.
Quarterly reviews in Part 4.5 are to perform a validation that only authorized users have been
granted access to BES Cyber Systems. This is achieved by comparing individuals actually
provisioned to a BES Cyber System against records of individuals authorized to access the BES
Cyber System. The focus of this requirement is on the integrity of provisioning access rather
than individual accounts on all BES Cyber Assets. The list of provisioned individuals can be an
automatically generated account listing. However, in a BES Cyber System with several
account databases, the list of provisioned individuals may come from other records such as
provisioning workflow or a user account database where provisioning typically initiates.
If the results of quarterly or annual account reviews indicate an administrative or clerical
error in which access was not actually provisioned, then the SDT intends that the error should
not be considered a violation of this requirement.
For BES Cyber Systems that do not have user accounts defined, the controls listed in
Requirement R4 are not applicable. However, the Responsible Entity should document such
configurations.
Rationale for Requirement R5:
The timely revocation of electronic access to BES Cyber Systems is an essential element of an
access management regime. When an individual no longer requires access to a BES Cyber
System to perform his or her assigned functions, that access should be revoked. This is of
particular importance in situations where a change of assignment or employment is
involuntary, as there is a risk the individual(s) involved will react in a hostile or destructive
manner.
In considering how to address directives in FERC Order No. 706 directing “immediate”
revocation of access for involuntary separation, the SDT chose not to specify hourly time
parameters in the requirement (e.g., revoking access within 1 hour). The point in time at
which an organization terminates a person cannot generally be determined down to the
Final Draft
June 2021
Page 45 of 46
Guidelines and Technical Basis
hour. However, most organizations have formal termination processes, and the timeliest
revocation of access occurs in concurrence with the initial processes of termination.
Access is physical, logical, and remote permissions granted to Cyber Assets composing the
BES Cyber System or allowing access to the BES Cyber System. When granting, reviewing, or
revoking access, the Responsible Entity must address the Cyber Asset specifically as well as
the systems used to enable such access (e.g., physical access control system, remote access
system, directory services).
Final Draft
June 2021
Page 46 of 46
CIP-004-7 — Cyber Security – Personnel & Training
Standard Development Timeline
This section is maintained by the drafting team during the development of the standard and will be
removed when the standard is adopted by the NERC Board of Trustees (Board).
Description of Current Draft
Completed Actions
Standards Committee approved Standard Authorization
Request (SAR) for posting
Date
March 22, 2019
SAR posted for comment
March 28, 2019 – April 26, 2019
45-day formal comment period with ballot
December 20, 2019 – February
3, 2020
45-day formal comment period with ballot
August 6 – September 21, 2020
45-day formal comment period with ballot
March 25 – May 10, 2021
10-day final ballot
June 2 – 11, 2021
Anticipated Actions
Board adoption
Final Draft
June 2021
Date
November 2021
Page 1 of 32
CIP-004-7 — Cyber Security – Personnel & Training
A. Introduction
1. Title:
Cyber Security — Personnel & Training
2. Number:
CIP-004-7
3. Purpose: To minimize the risk against compromise that could lead to misoperation or
instability in the Bulk Electric System (BES) from individuals accessing BES Cyber Systems by
requiring an appropriate level of personnel risk assessment, training, security awareness,
and access management in support of protecting BES Cyber Systems.
4. Applicability:
4.1.
Functional Entities: For the purpose of the requirements contained herein, the
following list of functional entities will be collectively referred to as “Responsible
Entities.” For requirements in this standard where a specific functional entity or
subset of functional entities are the applicable entity or entities, the functional
entity or entities are specified explicitly.
4.1.1. Balancing Authority
4.1.2. Distribution Provider that owns one or more of the following Facilities,
systems, and equipment for the protection or restoration of the BES:
4.1.2.1. Each underfrequency Load shedding (UFLS) or undervoltage Load
shedding (UVLS) system that:
4.1.2.1.1. is part of a Load shedding program that is subject to one
or more requirements in a NERC or Regional Reliability
Standard; and
4.1.2.1.2. performs automatic Load shedding under a common
control system owned by the Responsible Entity, without
human operator initiation, of 300 MW or more.
4.1.2.2. Each Remedial Action Scheme (RAS) where the RAS is subject to one
or more requirements in a NERC or Regional Reliability Standard.
4.1.2.3. Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.1.2.4. Each Cranking Path and group of Elements meeting the initial
switching requirements from a Blackstart Resource up to and
including the first interconnection point of the starting station
service of the next generation unit(s) to be started.
4.1.3. Generator Operator
4.1.4. Generator Owner
4.1.5. Reliability Coordinator
4.1.6. Transmission Operator
Final Draft
June 2021
Page 2 of 32
CIP-004-7 — Cyber Security – Personnel & Training
4.1.7. Transmission Owner
4.2.
Facilities: For the purpose of the requirements contained herein, the following
Facilities, systems, and equipment owned by each Responsible Entity in 4.1 above
are those to which these requirements are applicable. For requirements in this
standard where a specific type of Facilities, system, or equipment or subset of
Facilities, systems, and equipment are applicable, these are specified explicitly.
4.2.1. Distribution Provider: One or more of the following Facilities, systems and
equipment owned by the Distribution Provider for the protection or
restoration of the BES:
4.2.1.1. Each UFLS or UVLS System that:
4.2.1.1.1. is part of a Load shedding program that is subject to one
or more requirements in a NERC or Regional Reliability
Standard; and
4.2.1.1.2. performs automatic Load shedding under a common
control system owned by the Responsible Entity, without
human operator initiation, of 300 MW or more.
4.2.1.2. Each RAS where the RAS is subject to one or more requirements in a
NERC or Regional Reliability Standard.
4.2.1.3. Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.2.1.4. Each Cranking Path and group of Elements meeting the initial
switching requirements from a Blackstart Resource up to and
including the first interconnection point of the starting station
service of the next generation unit(s) to be started.
4.2.2. Responsible Entities listed in 4.1 other than Distribution Providers: All BES
Facilities.
4.2.3. Exemptions: The following are exempt from Standard CIP-004-7:
4.2.3.1. Cyber Assets at Facilities regulated by the Canadian Nuclear Safety
Commission.
4.2.3.2. Cyber Assets associated with communication networks and data
communication links between discrete Electronic Security
Perimeters.
4.2.3.3. The systems, structures, and components that are regulated by the
Nuclear Regulatory Commission under a cyber security plan pursuant
to 10 C.F.R. Section 73.54.
4.2.3.4. For Distribution Providers, the systems and equipment that are not
included in section 4.2.1 above.
Final Draft
June 2021
Page 3 of 32
CIP-004-7 — Cyber Security – Personnel & Training
4.2.3.5. Responsible Entities that identify that they have no BES Cyber
Systems categorized as high impact or medium impact according to
the CIP-002-5.1a identification and categorization processes.
5. Effective Dates: See Implementation Plan for CIP-004-7.
6. Background: Standard CIP-004 exists as part of a suite of CIP Standards related to cyber
security, which require the initial identification and categorization of BES Cyber Systems and
require a minimum level of organizational, operational, and procedural controls to mitigate
risk to BES Cyber Systems.
Most requirements open with, “Each Responsible Entity shall implement one or more
documented [processes, plan, etc.] that include the applicable items in [Table Reference].”
The referenced table requires the applicable items in the procedures for the common
subject matter of the requirements.
The term documented processes refers to a set of required instructions specific to the
Responsible Entity and to achieve a specific outcome. This term does not imply any
particular naming or approval structure beyond what is stated in the requirements. An
entity should include as much as it believes necessary in its documented processes, but it
must address the applicable requirements in the table.
The terms program and plan are sometimes used in place of documented processes where it
makes sense and is commonly understood. For example, documented processes describing
a response are typically referred to as plans (i.e., incident response plans and recovery
plans). Likewise, a security plan can describe an approach involving multiple procedures to
address a broad subject matter.
Similarly, the term program may refer to the organization’s overall implementation of its
policies, plans and procedures involving a subject matter. Examples in the standards
include the personnel risk assessment program and the personnel training program. The
full implementation of the CIP Cyber Security Standards could also be referred to as a
program. However, the terms program and plan do not imply any additional requirements
beyond what is stated in the standards.
Responsible Entities can implement common controls that meet requirements for multiple
high and medium impact BES Cyber Systems. For example, a single training program could
meet the requirements for training personnel across multiple BES Cyber Systems.
Measures for the initial requirement are simply the documented processes themselves.
Measures in the table rows provide examples of evidence to show documentation and
implementation of applicable items in the documented processes. These measures serve to
provide guidance to entities in acceptable records of compliance and should not be viewed
as an all-inclusive list.
Final Draft
June 2021
Page 4 of 32
CIP-004-7 — Cyber Security – Personnel & Training
Throughout the standards, unless otherwise stated, bulleted items in the requirements and
measures are items that are linked with an “or,” and numbered items are items that are
linked with an “and.”
Many references in the Applicability section use a threshold of 300 MW for UFLS and UVLS.
This particular threshold of 300 MW for UVLS and UFLS was provided in Version 1 of the CIP
Cyber Security Standards. The threshold remains at 300 MW since it is specifically
addressing UVLS and UFLS, which are last ditch efforts to save the BES. A review of UFLS
tolerances defined within regional reliability standards for UFLS program requirements to
date indicates that the historical value of 300 MW represents an adequate and reasonable
threshold value for allowable UFLS operational tolerances.
“Applicable Systems” Columns in Tables:
Each table has an “Applicable Systems” column to further define the scope of systems to
which a specific requirement row applies. The CSO706 SDT adapted this concept from the
National Institute of Standards and Technology (“NIST”) Risk Management Framework as a
way of applying requirements more appropriately based on impact and connectivity
characteristics. The following conventions are used in the “Applicable Systems” column as
described.
•
High Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as high
impact according to the CIP-002-5.1a identification and categorization processes.
•
Medium Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as
medium impact according to the CIP-002-5.1a identification and categorization
processes.
•
Medium Impact BES Cyber Systems with External Routable Connectivity – Only applies
to medium impact BES Cyber Systems with External Routable Connectivity. This also
excludes Cyber Assets in the BES Cyber System that cannot be directly accessed through
External Routable Connectivity.
•
Electronic Access Control or Monitoring Systems (EACMS) – Applies to each Electronic
Access Control or Monitoring System associated with a referenced high impact BES
Cyber System or medium impact BES Cyber System. Examples may include, but are not
limited to, firewalls, authentication servers, and log monitoring and alerting systems.
•
Physical Access Control Systems (PACS) – Applies to each Physical Access Control
System associated with a referenced high impact BES Cyber System or medium impact
BES Cyber System with External Routable Connectivity.
Final Draft
June 2021
Page 5 of 32
CIP-004-7 — Cyber Security – Personnel & Training
B. Requirements and Measures
R1. Each Responsible Entity shall implement one or more documented processes that collectively include each of the
applicable requirement parts in CIP-004-7 Table R1 – Security Awareness Program. [Violation Risk Factor: Lower] [Time
Horizon: Operations Planning]
M1. Evidence must include each of the applicable documented processes that collectively include each of the applicable
requirement parts in CIP-004-7 Table R1 – Security Awareness Program and additional evidence to demonstrate
implementation as described in the Measures column of the table.
CIP-004-7 Table R1 – Security Awareness Program
Part
1.1
Applicable Systems
High Impact BES Cyber Systems
Medium Impact BES Cyber Systems
Requirements
Security awareness that, at least once
each calendar quarter, reinforces cyber
security practices (which may include
associated physical security practices)
for the Responsible Entity’s personnel
who have authorized electronic or
authorized unescorted physical access
to BES Cyber Systems.
Measures
An example of evidence may include,
but is not limited to, documentation
that the quarterly reinforcement has
been provided. Examples of evidence
of reinforcement may include, but are
not limited to, dated copies of
information used to reinforce security
awareness, as well as evidence of
distribution, such as:
•
•
•
Final Draft
June 2021
direct communications (for
example, e-mails, memos,
computer-based training); or
indirect communications (for
example, posters, intranet, or
brochures); or
management support and
reinforcement (for example,
presentations or meetings).
Page 6 of 32
CIP-004-7 — Cyber Security – Personnel & Training
R2. Each Responsible Entity shall implement one or more cyber security training program(s) appropriate to individual roles,
functions, or responsibilities that collectively includes each of the applicable requirement parts in CIP-004-7 Table R2 –
Cyber Security Training Program. [Violation Risk Factor: Lower] [Time Horizon: Operations Planning]
M2. Evidence must include the training program that includes each of the applicable requirement parts in CIP-004-7 Table R2 –
Cyber Security Training Program and additional evidence to demonstrate implementation of the program(s).
CIP-004-7 Table R2 – Cyber Security Training Program
Part
2.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Requirements
Training content on:
2.1.1. Cyber security policies;
2.1.2. Physical access controls;
2.1.3. Electronic access controls;
Measures
Examples of evidence may include, but
are not limited to, training material such
as power point presentations, instructor
notes, student notes, handouts, or other
training materials.
2.1.4. The visitor control program;
2.1.5. Handling of BES Cyber System
Information and its storage;
2.1.6. Identification of a Cyber
Security Incident and initial
notifications in accordance with
the entity’s incident response
plan;
2.1.7. Recovery plans for BES Cyber
Systems;
2.1.8. Response to Cyber Security
Incidents; and
2.1.9. Cyber security risks associated
with a BES Cyber System’s
electronic interconnectivity and
interoperability with other
Final Draft
June 2021
Page 7 of 32
CIP-004-7 — Cyber Security – Personnel & Training
CIP-004-7 Table R2 – Cyber Security Training Program
Part
Applicable Systems
Requirements
Measures
Cyber Assets, including
Transient Cyber Assets, and
with Removable Media.
2.2
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
Require completion of the training
specified in Part 2.1 prior to granting
authorized electronic access and
authorized unescorted physical access
to applicable Cyber Assets, except
during CIP Exceptional Circumstances.
Examples of evidence may include, but
are not limited to, training records and
documentation of when CIP Exceptional
Circumstances were invoked.
Require completion of the training
specified in Part 2.1 at least once every
15 calendar months.
Examples of evidence may include, but
are not limited to, dated individual
training records.
1. EACMS; and
2. PACS
2.3
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Final Draft
June 2021
Page 8 of 32
CIP-004-7 — Cyber Security – Personnel & Training
R3. Each Responsible Entity shall implement one or more documented personnel risk assessment program(s) to attain and
retain authorized electronic or authorized unescorted physical access to BES Cyber Systems that collectively include each of
the applicable requirement parts in CIP-004-7 Table R3 – Personnel Risk Assessment Program. [Violation Risk Factor:
Medium] [Time Horizon: Operations Planning].
M3. Evidence must include the documented personnel risk assessment programs that collectively include each of the applicable
requirement parts in CIP-004-7 Table R3 – Personnel Risk Assessment Program and additional evidence to demonstrate
implementation of the program(s).
CIP-004-7 Table R2 – Cyber Security Training Program
Part
3.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
Requirements
Measures
Process to confirm identity.
An example of evidence may include,
but is not limited to, documentation of
the Responsible Entity’s process to
confirm identity.
Process to perform a seven year
criminal history records check as part of
each personnel risk assessment that
includes:
An example of evidence may include,
but is not limited to, documentation of
the Responsible Entity’s process to
perform a seven year criminal history
records check.
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and
their associated:
1. EACMS; and
2. PACS
3.2
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and
their associated:
1. EACMS; and
Final Draft
June 2021
3.2.1. current residence, regardless of
duration; and
3.2.2. other locations where, during
the seven years immediately prior to
the date of the criminal history
Page 9 of 32
CIP-004-7 — Cyber Security – Personnel & Training
CIP-004-7 Table R2 – Cyber Security Training Program
Part
Applicable Systems
2. PACS
Requirements
Measures
records check, the subject has resided
for six consecutive months or more.
If it is not possible to perform a full
seven year criminal history records
check, conduct as much of the seven
year criminal history records check as
possible and document the reason the
full seven year criminal history records
check could not be performed.
3.3
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
Criteria or process to evaluate criminal
history records checks for authorizing
access.
An example of evidence may include,
but is not limited to, documentation of
the Responsible Entity’s process to
evaluate criminal history records
checks.
Criteria or process for verifying that
personnel risk assessments performed
for contractors or service vendors are
conducted according to Parts 3.1
through 3.3.
An example of evidence may include,
but is not limited to, documentation of
the Responsible Entity’s criteria or
process for verifying contractors or
service vendors personnel risk
assessments.
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and
their associated:
1. EACMS; and
2. PACS
3.4
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and
Final Draft
June 2021
Page 10 of 32
CIP-004-7 — Cyber Security – Personnel & Training
CIP-004-7 Table R2 – Cyber Security Training Program
Part
Applicable Systems
Requirements
Measures
their associated:
1. EACMS; and
2. PACS
3.5
High Impact BES Cyber Systems and
their associated:
Process to ensure that individuals with
authorized electronic or authorized
unescorted physical access have had a
1. EACMS; and
personnel risk assessment completed
2. PACS
according to Parts 3.1 to 3.4 within the
Medium Impact BES Cyber Systems with last seven years.
External Routable Connectivity and
their associated:
An example of evidence may include,
but is not limited to, documentation of
the Responsible Entity’s process for
ensuring that individuals with
authorized electronic or authorized
unescorted physical access have had a
personnel risk assessment completed
within the last seven years.
1. EACMS; and
2. PACS
Final Draft
June 2021
Page 11 of 32
CIP-004-7 — Cyber Security – Personnel & Training
R4. Each Responsible Entity shall implement one or more documented access management program(s) that collectively
include each of the applicable requirement parts in CIP-004-7 Table R4 – Access Management Program. [Violation Risk
Factor: Medium] [Time Horizon: Operations Planning and Same Day Operations].
M4. Evidence must include the documented processes that collectively include each of the applicable requirement parts in CIP004-7 Table R4 – Access Management Program and additional evidence to demonstrate that the access management
program was implemented as described in the Measures column of the table.
CIP-004-7 Table R2 – Cyber Security Training Program
Part
4.1
Applicable Systems
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
Requirements
Process to authorize based on need,
as determined by the Responsible
Entity, except for CIP Exceptional
Circumstances:
4.1.1. Electronic access; and
4.1.2. Unescorted physical access
into a Physical Security
Perimeter
Measures
An example of evidence may include,
but is not limited to, dated
documentation of the process to
authorize electronic access, and
unescorted physical access in a
Physical Security Perimeter.
2. PACS
4.2
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
Final Draft
June 2021
Verify at least once each calendar
quarter that individuals with active
electronic access or unescorted
physical access have authorization
records.
Examples of evidence may include,
but are not limited to:
•
Dated documentation of the
verification between the system
generated list of individuals who
have been authorized for access
(i.e., workflow database) and a
system generated list of
personnel who have access (i.e.,
user account listing), or
Page 12 of 32
CIP-004-7 — Cyber Security – Personnel & Training
CIP-004-7 Table R2 – Cyber Security Training Program
Part
Applicable Systems
Requirements
2. PACS
4.3
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Measures
Dated documentation of the
verification between a list of
individuals who have been
authorized for access (i.e.,
authorization forms) and a list of
individuals provisioned for access
(i.e., provisioning forms or shared
account listing).
For electronic access, verify at least
once every 15 calendar months that
all user accounts, user account
groups, or user role categories, and
their specific, associated privileges are
correct and are those that the
Responsible Entity determines are
necessary.
An example of evidence may include,
but is not limited to, documentation
of the review that includes all of the
following:
1. A dated listing of all
accounts/account groups or
roles within the system;
2. A summary description of
privileges associated with
each group or role;
3. Accounts assigned to the
group or role; and
Dated evidence showing verification
of the privileges for the group are
authorized and appropriate to the
work function performed by people
assigned to each account.
Final Draft
June 2021
Page 13 of 32
CIP-004-7 — Cyber Security – Personnel & Training
R5. Each Responsible Entity shall implement one or more documented access revocation program(s) that collectively include
each of the applicable requirement parts in CIP-004-7 Table R5 – Access Revocation. [Violation Risk Factor: Medium] [Time
Horizon: Same Day Operations and Operations Planning].
M5. Evidence must include each of the applicable documented programs that collectively include each of the applicable
requirement parts in CIP-004-7 Table R5 – Access Revocation and additional evidence to demonstrate implementation as
described in the Measures column of the table.
CIP-004-7 Table R2 – Cyber Security Training Program
Part
5.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
Requirements
A process to initiate removal of an
individual’s ability for unescorted
physical access and Interactive Remote
Access upon a termination action, and
complete the removals within 24 hours
of the termination action (Removal of
the ability for access may be different
than deletion, disabling, revocation, or
removal of all access rights).
An example of evidence may include,
but is not limited to, documentation of
all of the following:
For reassignments or transfers, revoke
the individual’s authorized electronic
access to individual accounts and
authorized unescorted physical access
that the Responsible Entity determines
are not necessary by the end of the
next calendar day following the date
that the Responsible Entity determines
that the individual no longer requires
retention of that access.
An example of evidence may include,
but is not limited to, documentation of
all of the following:
For termination actions, revoke the
An example of evidence may include,
2. PACS
5.2
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
5.3
High Impact BES Cyber Systems and their
Final Draft
June 2021
Measures
1. Dated workflow or sign-off form
verifying access removal
associated with the termination
action; and
Logs or other demonstration showing
such persons no longer have access.
1. Dated workflow or sign-off form
showing a review of logical and
physical access; and
Logs or other demonstration showing
such persons no longer have access
that the Responsible Entity determines
is not necessary.
Page 14 of 32
CIP-004-7 — Cyber Security – Personnel & Training
CIP-004-7 Table R2 – Cyber Security Training Program
Part
Applicable Systems
associated:
•
5.4
EACMS
High Impact BES Cyber Systems and their
associated:
•
EACMS
Requirements
Measures
individual’s non-shared user accounts
(unless already revoked according to
Part 5.1) within 30 calendar days of
the effective date of the termination
action.
but is not limited to, workflow or signoff form showing access removal for
any individual BES Cyber Assets and
software applications as determined
necessary to completing the
revocation of access and dated within
thirty calendar days of the termination
actions.
For termination actions, change
passwords for shared account(s)
known to the user within 30 calendar
days of the termination action. For
reassignments or transfers, change
passwords for shared account(s)
known to the user within 30 calendar
days following the date that the
Responsible Entity determines that
the individual no longer requires
retention of that access.
Examples of evidence may include, but
are not limited to:
If the Responsible Entity determines
and documents that extenuating
operating circumstances require a
longer time period, change the
password(s) within 10 calendar days
following the end of the operating
circumstances.
Final Draft
June 2021
•
Workflow or sign-off form
showing password reset within
30 calendar days of the
termination;
•
Workflow or sign-off form
showing password reset within
30 calendar days of the
reassignments or transfers; or
Documentation of the extenuating
operating circumstance and workflow
or sign-off form showing password
reset within 10 calendar days following
the end of the operating circumstance.
Page 15 of 32
CIP-004-7 — Cyber Security – Personnel & Training
R6. Each Responsible Entity shall implement one or more documented access management program(s) to authorize, verify,
and revoke provisioned access to BCSI pertaining to the “Applicable Systems” identified in CIP-004-7 Table R6 – Access
Management for BES Cyber System Information that collectively include each of the applicable requirement parts in CIP‐
004‐X Table R6 – Access Management for BES Cyber System Information. To be considered access to BCSI in the context of
this requirement, an individual has both the ability to obtain and use BCSI. Provisioned access is to be considered the
result of the specific actions taken to provide an individual(s) the means to access BCSI (e.g., may include physical keys or
access cards, user accounts and associated rights and privileges, encryption keys). [Violation Risk Factor: Medium] [Time
Horizon: Same Day Operations and Operations Planning].
M6. Evidence must include each of the applicable documented programs that collectively include the applicable requirement
parts in CIP-004-7Table R6 – Access Management for BES Cyber System Information and additional evidence to
demonstrate implementation as described in the Measures column of the table.
CIP-004-7 Table R6 – Access Management for BES Cyber System Information
Part
6.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
Requirements
Measures
Prior to provisioning, authorize (unless
already authorized according to Part
4.1.) based on need, as determined by
the Responsible Entity, except for CIP
Exceptional Circumstances:
Examples of evidence may include, but
are not limited to, individual records or
lists that include who is authorized, the
date of the authorization, and the
justification of business need for the
provisioned access.
6.1.1. Provisioned electronic access to
electronic BCSI; and
6.1.2. Provisioned physical access to
physical BCSI.
2. PACS
Final Draft
June 2021
Page 16 of 32
CIP-004-7 — Cyber Security – Personnel & Training
CIP-004-7 Table R6 – Access Management for BES Cyber System Information
Part
6.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
Requirements
Verify at least once every 15 calendar
months that all individuals with
provisioned access to BCSI:
6.2.1. have an authorization record;
and
6.2.2. still need the provisioned access
to perform their current work
functions, as determined by the
Responsible Entity.
Measures
Examples of evidence may include, but
are not limited to, the documentation
of the review that includes all of the
following:
•
List of authorized individuals;
•
List of individuals who have been
provisioned access;
•
Verification that provisioned
access is appropriate based on
need; and
•
Documented reconciliation
actions, if any.
2. PACS
6.3
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
For termination actions, remove the
individual’s ability to use provisioned
access to BCSI (unless already revoked
according to Part 5.1) by the end of the
next calendar day following the
effective date of the termination
action.
Examples of dated evidence may
include, but are not limited to, access
revocation records associated with the
terminations and dated within the next
calendar day of the termination action.
1. EACMS; and
2. PACS
Final Draft
June 2021
Page 17 of 32
CIP-004-7 — Cyber Security – Personnel & Training
C. Compliance
1. Compliance Monitoring Process:
1.1. Compliance Enforcement Authority: “Compliance Enforcement Authority” (CEA)
means NERC or the Regional Entity, or any entity as otherwise designated by an
Applicable Governmental Authority, in their respective roles of monitoring and/or
enforcing compliance with mandatory and enforceable Reliability Standards in
their respective jurisdictions.
1.2. Evidence Retention: The following evidence retention periods identify the period
of time an entity is required to retain specific evidence to demonstrate
compliance. For instances where the evidence retention period specified below is
shorter than the time since the last audit, the CEA may ask an entity to provide
other evidence to show that it was compliant for the full time period since the last
audit.
The applicable entity shall keep data or evidence to show compliance as identified
below unless directed by its CEA to retain specific evidence for a longer period of
time as part of an investigation:
•
The applicable entity shall retain evidence of each requirement in this standard
for three calendar years.
•
The applicable entity is found non-compliant, it shall keep information related
to the non-compliance until mitigation is complete and approved or for the
time specified above, whichever is longer.
•
The CEA shall keep the last audit records and all requested and submitted
subsequent audit records.
1.3. Compliance Monitoring and Enforcement Program: As defined in the NERC Rules
of Procedure, “Compliance Monitoring and Enforcement Program” refers to the
identification of the processes that will be used to evaluate data or information for
the purpose of assessing performance or outcomes with the associated Reliability
Standard.
Final Draft
June 2021
Page 18 of 32
CIP-004-7 — Cyber Security – Personnel & Training
2. Table of Compliance Elements
R#
R1
R2
Final Draft
June 2021
Time Horizon
Operations
Planning
Operations
Planning
VRF
Lower
Lower
Violation Severity Levels (CIP-004-7)
Lower VSL
Moderate VSL
High VSL
Severe VSL
The Responsible Entity
did not reinforce
cyber security
practices during a
calendar quarter but
did so less than 10
calendar days after
the start of a
subsequent calendar
quarter. (1.1)
The Responsible Entity
did not reinforce
cyber security
practices during a
calendar quarter but
did so between 10 and
30 calendar days after
the start of a
subsequent calendar
quarter. (1.1)
The Responsible Entity
did not reinforce
cyber security
practices during a
calendar quarter but
did so within the
subsequent quarter
but beyond 30
calendar days after
the start of that
calendar quarter. (1.1)
The Responsible Entity
did not document or
implement any
security awareness
process(es) to
reinforce cyber
security practices. (R1)
The Responsible Entity
implemented a cyber
security training
program but failed to
include one of the
training content topics
in Requirement Parts
The Responsible Entity
implemented a cyber
security training
program but failed to
include two of the
training content topics
in Requirement Parts
The Responsible Entity
implemented a cyber
security training
program but failed to
include three of the
training content topics
in Requirement Parts
OR
The Responsible Entity
did not reinforce
cyber security
practices and
associated physical
security practices for
at least two
consecutive calendar
quarters. (1.1)
The Responsible Entity
did not implement a
cyber security training
program appropriate
to individual roles,
functions, or
responsibilities. (R2)
Page 19 of 32
CIP-004-7 — Cyber Security – Personnel & Training
R#
Time Horizon
Violation Severity Levels (CIP-004-7)
VRF
Lower VSL
Moderate VSL
High VSL
2.1.1 through 2.1.9.
(2.1)
2.1.1 through 2.1.9.
(2.1)
2.1.1 through 2.1.9.
(2.1)
OR
OR
OR
Severe VSL
OR
The Responsible Entity
implemented a cyber
The Responsible Entity The Responsible Entity The Responsible Entity security training
implemented a cyber implemented a cyber
implemented a cyber program but failed to
include four or more
security training
security training
security training
program but failed to program but failed to program but failed to of the training content
train one individual
train two individuals
train three individuals topics in Requirement
(with the exception of (with the exception of (with the exception of Parts 2.1.1 through
2.1.9. (2.1)
CIP Exceptional
CIP Exceptional
CIP Exceptional
Circumstances) prior
Circumstances) prior
Circumstances) prior
OR
to their being granted to their being granted to their being granted
authorized electronic authorized electronic authorized electronic The Responsible Entity
implemented a cyber
and authorized
and authorized
and authorized
security training
unescorted physical
unescorted physical
unescorted physical
program but failed to
access. (2.2)
access. (2.2)
access. (2.2)
train four or more
OR
OR
OR
individuals (with the
The Responsible Entity The Responsible Entity The Responsible Entity exception of CIP
implemented a cyber implemented a cyber
implemented a cyber Exceptional
Circumstances) prior
security training
security training
security training
program but failed to program but failed to program but failed to to their being granted
train one individual
train two individuals
train three individuals authorized electronic
and authorized
with authorized
with authorized
with authorized
unescorted physical
electronic or
electronic or
electronic or
authorized unescorted authorized unescorted authorized unescorted access. (2.2)
physical access within physical access within physical access within OR
Final Draft
June 2021
Page 20 of 32
CIP-004-7 — Cyber Security – Personnel & Training
R#
R3
Final Draft
June 2021
Time Horizon
Operations
Planning
VRF
Medium
Violation Severity Levels (CIP-004-7)
Lower VSL
Moderate VSL
High VSL
Severe VSL
15 calendar months of
the previous training
completion date. (2.3)
15 calendar months of
the previous training
completion date. (2.3)
15 calendar months of
the previous training
completion date. (2.3)
The Responsible Entity
implemented a cyber
security training
program but failed to
train four or more
individuals with
authorized electronic
or authorized
unescorted physical
access within 15
calendar months of
the previous training
completion date. (2.3)
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
but did not conduct
the PRA as a condition
of granting authorized
electronic or
authorized unescorted
physical access for
one individual. (R3)
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
but did not conduct
the PRA as a condition
of granting authorized
electronic or
authorized unescorted
physical access for
two individuals. (R3)
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
but did not conduct
the PRA as a condition
of granting authorized
electronic or
authorized unescorted
physical access for
three individuals. (R3)
The Responsible Entity
did not have all of the
required elements as
described by 3.1
through 3.4 included
within documented
program(s) for
implementing
Personnel Risk
Assessments (PRAs),
for individuals,
including contractors
and service vendors,
for obtaining and
Page 21 of 32
CIP-004-7 — Cyber Security – Personnel & Training
R#
Final Draft
June 2021
Time Horizon
Violation Severity Levels (CIP-004-7)
VRF
Lower VSL
Moderate VSL
OR
OR
The Responsible Entity
did conduct Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
not confirm identity
for one individual. (3.1
& 3.4)
The Responsible Entity
did conduct Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
not confirm identity
for two individuals.
(3.1 & 3.4)
OR
OR
The Responsible Entity
has a process to
perform seven-year
criminal history record
checks for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
The Responsible Entity
has a process to
perform seven-year
criminal history record
checks for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
High VSL
Severe VSL
retaining authorized
cyber or authorized
The Responsible Entity unescorted physical
did conduct Personnel access. (R3)
Risk Assessments
(PRAs) for individuals, OR
including contractors
The Responsible Entity
and service vendors,
has a program for
with authorized
conducting Personnel
electronic or
Risk Assessments
authorized unescorted (PRAs) for individuals,
physical access but did including contractors
not confirm identity
and service vendors,
for three individuals.
but did not conduct
(3.1 & 3.4)
the PRA as a condition
of granting authorized
OR
electronic or
The Responsible Entity authorized unescorted
has a process to
physical access for
perform seven-year
four or more
criminal history record individuals. (R3)
checks for individuals,
OR
including contractors
and service vendors,
The Responsible Entity
with authorized
did conduct Personnel
electronic or
Risk Assessments
authorized unescorted (PRAs) for individuals,
physical access but did including contractors
OR
Page 22 of 32
CIP-004-7 — Cyber Security – Personnel & Training
R#
Final Draft
June 2021
Time Horizon
Violation Severity Levels (CIP-004-7)
VRF
Lower VSL
Moderate VSL
High VSL
not include the
required checks
described in 3.2.1 and
3.2.2 for one
individual. (3.2 & 3.4)
not include the
required checks
described in 3.2.1 and
3.2.2 for two
individuals. (3.2 & 3.4)
not include the
required checks
described in 3.2.1 and
3.2.2 for three
individuals. (3.2 & 3.4)
OR
OR
The Responsible Entity
did conduct Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
not evaluate criminal
history records check
for access
authorization for one
individual. (3.3 & 3.4)
The Responsible Entity
did conduct Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
not evaluate criminal
history records check
for access
authorization for two
individuals. (3.3 & 3.4)
OR
OR
The Responsible Entity
did not conduct
Personnel Risk
Assessments (PRAs)
The Responsible Entity
did not conduct
Personnel Risk
Assessments (PRAs)
Severe VSL
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
not confirm identity
OR
for four or more
The Responsible Entity individuals. (3.1 & 3.4)
did conduct Personnel
OR
Risk Assessments
(PRAs) for individuals, The Responsible Entity
including contractors
has a process to
and service vendors,
perform seven-year
with authorized
criminal history record
electronic or
checks for individuals,
authorized unescorted including contractors
physical access but did and service vendors,
not evaluate criminal
with authorized
history records check electronic or
for access
authorized unescorted
authorization for
physical access but did
three individuals. (3.3 not include the
& 3.4)
required checks
described in 3.2.1 and
OR
3.2.2 for four or more
The Responsible Entity individuals. (3.2 & 3.4)
did not conduct
OR
Personnel Risk
Page 23 of 32
CIP-004-7 — Cyber Security – Personnel & Training
R#
Time Horizon
VRF
Violation Severity Levels (CIP-004-7)
Lower VSL
Moderate VSL
High VSL
Severe VSL
for one individual with
authorized electronic
or authorized
unescorted physical
access within 7
calendar years of the
previous PRA
completion date. (3.5)
for two individuals
with authorized
electronic or
authorized unescorted
physical access within
7 calendar years of
the previous PRA
completion date. (3.5)
Assessments (PRAs)
for three individuals
with authorized
electronic or
authorized unescorted
physical access within
7 calendar years of
the previous PRA
completion date. (3.5)
The Responsible Entity
did conduct Personnel
Risk Assessments
(PRAs) for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized unescorted
physical access but did
not evaluate criminal
history records check
for access
authorization for four
or more individuals.
(3.3 & 3.4)
OR
The Responsible Entity
did not conduct
Personnel Risk
Assessments (PRAs)
for four or more
individuals with
authorized electronic
or authorized
unescorted physical
access within 7
Final Draft
June 2021
Page 24 of 32
CIP-004-7 — Cyber Security – Personnel & Training
R#
R4
Final Draft
June 2021
Time Horizon
Operations
Planning and
Same Day
Operations
VRF
Medium
Violation Severity Levels (CIP-004-7)
Lower VSL
Moderate VSL
High VSL
Severe VSL
calendar years of the
previous PRA
completion date. (3.5)
The Responsible Entity The Responsible Entity The Responsible Entity The Responsible Entity
did not verify that
did not verify that
did not verify that
did not implement any
individuals with active individuals with active individuals with active documented
electronic or active
electronic or active
electronic or active
program(s) for access
unescorted physical
unescorted physical
unescorted physical
management. (R4)
access have
access have
access have
OR
authorization records authorization records authorization records
The Responsible Entity
during a calendar
during a calendar
during a calendar
did not implement
quarter but did so less quarter but did so
quarter but did so
one or more
than 10 calendar days between 10 and 20
between 20 and 30
documented
after the start of a
calendar days after
calendar days after
program(s) for access
subsequent calendar
the start of a
the start of a
management that
quarter. (4.2)
subsequent calendar
subsequent calendar
includes a process to
quarter. (4.2)
quarter. (4.2)
OR
authorize electronic
OR
OR
The Responsible Entity
access or unescorted
has implemented
The Responsible Entity The Responsible Entity physical access. (4.1)
processes to verify
has implemented
has implemented
OR
that user accounts,
processes to verify
processes to verify
The Responsible Entity
that user accounts,
that user accounts,
user account groups,
did not verify that
or user role
user account groups,
user account groups,
individuals with active
categories, and their
or user role
or user role
electronic or active
specific, associated
categories, and their
categories, and their
unescorted physical
privileges are correct
specific, associated
specific, associated
access have
and necessary within
privileges are correct
privileges are correct
Page 25 of 32
CIP-004-7 — Cyber Security – Personnel & Training
R#
R5
Final Draft
June 2021
Time Horizon
Same Day
Operations
VRF
Medium
Violation Severity Levels (CIP-004-7)
Lower VSL
Moderate VSL
High VSL
Severe VSL
15 calendar months of
the previous
verification but for 5%
or less of its BES Cyber
Systems, privileges
were incorrect or
unnecessary. (4.3)
and necessary within
15 calendar months of
the previous
verification but for
more than 5% but less
than (or equal to) 10%
of its BES Cyber
Systems, privileges
were incorrect or
unnecessary. (4.3)
and necessary within
15 calendar months of
the previous
verification but for
more than 10% but
less than (or equal to)
15% of its BES Cyber
Systems, privileges
were incorrect or
unnecessary. (4.3)
authorization records
for at least two
consecutive calendar
quarters. (4.2)
The Responsible Entity
has implemented one
or more process(es) to
revoke the individual’s
The Responsible Entity
has implemented one
or more process(es) to
remove the ability for
The Responsible Entity
has implemented one
or more process(es) to
remove the ability for
The Responsible Entity
has not implemented
any documented
program(s) for access
OR
The Responsible Entity
has implemented
processes to verify
that user accounts,
user account groups,
or user role
categories, and their
specific, associated
privileges are correct
and necessary within
15 calendar months of
the previous
verification but for
more than 15% of its
BES Cyber Systems,
privileges were
incorrect or
unnecessary. (4.3)
Page 26 of 32
CIP-004-7 — Cyber Security – Personnel & Training
R#
Time Horizon
and Operations
Planning
VRF
Violation Severity Levels (CIP-004-7)
Lower VSL
Moderate VSL
High VSL
user accounts upon
termination action but
did not do so for
within 30 calendar
days of the date of
termination action for
one or more
individuals. (5.3)
unescorted physical
access and Interactive
Remote Access upon a
termination action or
complete the removal
within 24 hours of the
termination action but
did not initiate those
removals for one
individual. (5.1)
unescorted physical
access and Interactive
Remote Access upon a
termination action or
complete the removal
within 24 hours of the
termination action but
did not initiate those
removals for two
individuals. (5.1)
Severe VSL
revocation for
electronic access or
unescorted physical
access. (R5)
OR
The Responsible Entity
has implemented one
or more process(es) to
OR
remove the ability for
The Responsible Entity
unescorted physical
OR
OR
access and Interactive
has implemented one
or more process(es) to The Responsible Entity The Responsible Entity Remote Access upon a
change passwords for has implemented one has implemented one termination action or
shared accounts
or more process(es) to or more process(es) to complete the removal
known to the user
determine that an
determine that an
within 24 hours of the
individual no longer
individual no longer
upon termination
termination action but
requires retention of
action, reassignment, requires retention of
did not initiate those
access following
access following
or transfer, but did
removals for three or
reassignments or
reassignments or
more individuals. (5.1)
not do so for within
transfers but, for one transfers but, for two OR
30 calendar days of
individual, did not
individuals, did not
the date of
revoke the authorized revoke the authorized The Responsible Entity
termination action,
has implemented one
electronic access to
electronic access to
reassignment, or
or more process(es) to
individual accounts
individual accounts
transfer for one or
determine that an
and authorized
more individuals. (5.4) and authorized
individual no longer
unescorted physical
unescorted physical
OR
requires retention of
access by the end of
access by the end of
Final Draft
June 2021
Page 27 of 32
CIP-004-7 — Cyber Security – Personnel & Training
R#
R6
Final Draft
June 2021
Time Horizon
VRF
Same Day
Medium
Operations and
Operations
Planning
Violation Severity Levels (CIP-004-7)
Lower VSL
Moderate VSL
High VSL
Severe VSL
The Responsible Entity
has implemented one
or more process(es) to
determine and
document extenuating
operating
circumstances
following a
termination action,
reassignment, or
transfer, but did not
change one or more
passwords for shared
accounts known to
the user within 10
calendar days
following the end of
the extenuating
operating
circumstances. (5.4)
the next calendar day
following the
predetermined date.
(5.2)
the next calendar day
following the
predetermined date.
(5.2)
access following
reassignments or
transfers but, for
three or more
individuals, did not
revoke the authorized
electronic access to
individual accounts
and authorized
unescorted physical
access by the end of
the next calendar day
following the
predetermined date.
(5.2)
The Responsible Entity
has implemented one
or more program(s) as
required by
Requirement R6 Part
6.1 but, for one
individual, did not
The Responsible Entity
has implemented one
or more program(s) as
required by
Requirement R6 Part
6.1 but, for two
individuals, did not
The Responsible Entity
has implemented one
or more program(s) as
required by
Requirement R6 Part
6.1 but, for three
individuals, did not
The Responsible Entity
did not implement
one or more
documented access
management
program(s) for BCSI.
(R6)
Page 28 of 32
CIP-004-7 — Cyber Security – Personnel & Training
R#
Time Horizon
VRF
Violation Severity Levels (CIP-004-7)
Lower VSL
Moderate VSL
High VSL
authorize provisioned
electronic access to
electronic BCSI or
provisioned physical
access to physical
BCSI. (6.1)
authorize provisioned
electronic access to
electronic BCSI or
provisioned physical
access to physical
BCSI. (6.1)
authorize provisioned
electronic access to
electronic BCSI or
provisioned physical
access to physical
BCSI. (6.1)
Severe VSL
OR
The Responsible Entity
has implemented one
or more program(s) as
required by
Requirement R6 Part
OR
OR
OR
6.1 but, for four or
The Responsible Entity The Responsible Entity The Responsible Entity more individuals, did
performed the
performed the
performed the
not authorize
provisioned electronic
verification required
verification required
verification required
by Requirement R6
by Requirement R6
by Requirement R6
access to electronic
Part 6.2 more than 15 Part 6.2 more than 16 Part 6.2 more than 17 BCSI or provisioned
calendar months but
calendar months but
calendar months but
physical access to
physical BCSI. (6.1)
less than or equal to
less than or equal to
less than or equal to
16 calendar months of 17 calendar months of 18 calendar months of OR
the previous
the previous
the previous
The Responsible Entity
verification. (6.2)
verification. (6.2)
verification. (6.2)
performed the
OR
OR
OR
verification required
The
Responsible
Entity
The Responsible Entity The Responsible Entity
by Requirement R6
has implemented one has implemented one has implemented one Part 6.2 more than 18
or more program(s) to or more program(s) to or more program(s) to calendar months of
remove the
remove the
remove the
the previous
individual’s ability to
verification. (6.2)
individual’s ability to
individual’s ability to
use provisioned
use provisioned
use provisioned
OR
access to BCSI but, for access to BCSI but, for access to BCSI but, for
one individual, did not two individuals, did
three individuals, did
Final Draft
June 2021
Page 29 of 32
CIP-004-7 — Cyber Security – Personnel & Training
R#
Final Draft
June 2021
Time Horizon
VRF
Violation Severity Levels (CIP-004-7)
Lower VSL
Moderate VSL
High VSL
Severe VSL
do so by the
timeframe required in
Requirement R6, Part
6.3.
not do so by the
timeframe required in
Requirement R6, Part
6.3.
not do so by the
timeframe required in
Requirement R6, Part
6.3.
The Responsible Entity
has implemented one
or more program(s) to
remove the
individual’s ability to
use provisioned
access to BCSI but, for
four or more
individuals, did not do
so by the timeframe
required in
Requirement R6, Part
6.3.
Page 30 of 32
CIP-004-7 — Cyber Security – Personnel & Training
D. Regional Variances
None.
E. Interpretations
None.
F. Associated Documents
None.
Version History
Version
Date
1
1/16/06
Action
R3.2 — Change “Control Center” to
“control center.”
Change Tracking
3/24/06
Modifications to clarify the requirements
and to bring the compliance elements
into conformance with the latest
guidelines for developing compliance
elements of standards.
2
9/30/09
Removal of reasonable business
judgment.
Replaced the RRO with the RE as a
responsible entity.
Rewording of Effective Date.
Changed compliance monitor to
Compliance Enforcement Authority.
Updated Version Number from -2 to -3
In Requirement 1.6, deleted the
sentence pertaining to removing
component or system from service in
order to perform testing, in response to
FERC order issued September 30, 2009.
3
12/16/09
3
12/16/09
Approved by the NERC Board of
Trustees.
3
3/31/10
Approved by FERC.
4
1/24/11
Approved by the NERC Board of
Trustees.
Final Draft
June 2021
Page 31 of 32
CIP-004-7 — Cyber Security – Personnel & Training
Version
Date
Action
Change Tracking
Modified to coordinate
with other CIP
standards and to revise
format to use RBS
Template.
5
11/26/12
Adopted by the NERC Board of Trustees.
5
11/22/13
FERC Order issued approving CIP-004-5.
5.1
9/30/13
Modified two VSLs in R4
Errata
Adopted by the NERC Board of Trustees.
Addressed two FERC
directives from Order No.
791 related to identify,
assess, and correct
language and
communication
networks.
Replaces the version
adopted by the Board on
11/13/2014. Revised
version addresses
remaining directives
from Order No. 791
related to transient
devices and low impact
BES Cyber Systems.
6
11/13/14
6
2/12/15
Adopted by the NERC Board of Trustees.
6
1/21/16
FERC order issued approving CIP-004-6.
Docket No. RM15-14-000
7
TBD
Final Draft
June 2021
Adopted by the NERC Board of Trustees
Revised to enhance BES
reliability for entities to
manage their BCSI.
Page 32 of 32
CIP-004-76 — Cyber Security – Personnel & Training
Standard Development Timeline
This section is maintained by the drafting team during the development of the standard and will be
removed when the standard is adopted by the NERC Board of Trustees (Board).
Description of Current Draft
Completed Actions
Standards Committee approved Standard Authorization Request
(SAR) for posting
SAR posted for comment
Date
March 22, 2019
March 28, 2019 –
April 26, 2019
45-day formal comment period with ballot
December 20, 2019
– February 3, 2020
45-day formal comment period with ballot
August 6 –
September 21, 2020
45-day formal comment period with ballot
March 25 – May 10,
2021
10-day final ballot
June 2-11, 2021
Anticipated Actions
Board adoption
Final Draft
June 2021
Date
November 2021
Page 1 of 46
CIP-004-76 — Cyber Security – Personnel & Training
A. Introduction
1. Title:
Cyber Security — Personnel & Training
2. Number:
CIP-004-76
3. Purpose:
To minimize the risk against compromise that could lead to misoperation or
instability in the Bulk Electric System (BES) from individuals accessing BES Cyber
Systems by requiring an appropriate level of personnel risk assessment, training,
and security awareness, and access management in support of protecting BES
Cyber Systems.
4. Applicability:
4.1.
Functional Entities: For the purpose of the requirements contained herein, the following
list of functional entities will be collectively referred to as “Responsible Entities.” For
requirements in this standard where a specific functional entity or subset of functional
entities are the applicable entity or entities, the functional entity or entities are specified
explicitly.
4.1.1. Balancing Authority
4.1.2. Distribution Provider that owns one or more of the following Facilities, systems, and
equipment for the protection or restoration of the BES:
4.1.2.1. Each underfrequency Load shedding (UFLS) or undervoltage Load shedding
(UVLS) system that:
4.1.2.1.1. is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.1.2.1.2. performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation, of
300 MW or more.
4.1.2.2. Each Special Protection System (SPS) or Remedial Action Scheme (RAS) where
the SPS or RAS is subject to one or more requirements in a NERC or Regional
Reliability Standard.
4.1.2.3. Each Protection System (excluding UFLS and UVLS) that applies to Transmission
where the Protection System is subject to one or more requirements in a NERC
or Regional Reliability Standard.
4.1.2.4. Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.1.3. Generator Operator
4.1.4. Generator Owner
4.1.5. Interchange Coordinator or Interchange Authority
Final Draft
June 2021
Page 2 of 46
CIP-004-76 — Cyber Security – Personnel & Training
4.1.6.4.1.5.
Reliability Coordinator
4.1.7.4.1.6.
Transmission Operator
4.1.8.4.1.7.
Transmission Owner
4.2.
Facilities: For the purpose of the requirements contained herein, the following
Facilities, systems, and equipment owned by each Responsible Entity in 4.1 above are
those to which these requirements are applicable. For requirements in this standard
where a specific type of Facilities, system, or equipment or subset of Facilities, systems,
and equipment are applicable, these are specified explicitly.
4.2.1. Distribution Provider: One or more of the following Facilities, systems and
equipment owned by the Distribution Provider for the protection or restoration of
the BES:
4.2.1.1. Each UFLS or UVLS System that:
4.2.1.1.1. is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.2.1.1.2. performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation, of
300 MW or more.
4.2.1.2. Each SPS or RAS where the SPS or RAS is subject to one or more requirements in
a NERC or Regional Reliability Standard.
4.2.1.3. Each Protection System (excluding UFLS and UVLS) that applies to Transmission
where the Protection System is subject to one or more requirements in a NERC
or Regional Reliability Standard.
4.2.1.4. Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.2.2. Responsible Entities listed in 4.1 other than Distribution Providers:
All BES Facilities.
4.2.3. Exemptions: The following are exempt from Standard CIP-004-76:
4.2.3.1. Cyber Assets at Facilities regulated by the Canadian Nuclear Safety Commission.
4.2.3.2. Cyber Assets associated with communication networks and data
communication links between discrete Electronic Security Perimeters.
4.2.3.3. The systems, structures, and components that are regulated by the Nuclear
Regulatory Commission under a cyber security plan pursuant to 10 C.F.R.
Section 73.54.
4.2.3.4. For Distribution Providers, the systems and equipment that are not included in
section 4.2.1 above.
Final Draft
June 2021
Page 3 of 46
CIP-004-76 — Cyber Security – Personnel & Training
4.2.3.5. Responsible Entities that identify that they have no BES Cyber Systems
categorized as high impact or medium impact according to the CIP-002-5.1a
identification and categorization processes.
5. Effective Dates: See Implementation Plan for CIP-004-76.
6. Background:
Standard CIP-004 exists as part of a suite of CIP Standards related to cyber security, which
require the initial identification and categorization of BES Cyber Systems and require a
minimum level of organizational, operational, and procedural controls to mitigate risk to BES
Cyber Systems.
Most requirements open with, “Each Responsible Entity shall implement one or more
documented [processes, plan, etc.] that include the applicable items in [Table Reference].” The
referenced table requires the applicable items in the procedures for the common subject
matter of the requirements.
The term documented processes refers to a set of required instructions specific to the
Responsible Entity and to achieve a specific outcome. This term does not imply any particular
naming or approval structure beyond what is stated in the requirements. An entity should
include as much as it believes necessary in its documented processes, but it must address the
applicable requirements in the table.
The terms program and plan are sometimes used in place of documented processes where it
makes sense and is commonly understood. For example, documented processes describing a
response are typically referred to as plans (i.e., incident response plans and recovery plans).
Likewise, a security plan can describe an approach involving multiple procedures to address a
broad subject matter.
Similarly, the term program may refer to the organization’s overall implementation of its
policies, plans and procedures involving a subject matter. Examples in the standards include
the personnel risk assessment program and the personnel training program. The full
implementation of the CIP Cyber Security Standards could also be referred to as a program.
However, the terms program and plan do not imply any additional requirements beyond what
is stated in the standards.
Responsible Entities can implement common controls that meet requirements for multiple high
and medium impact BES Cyber Systems. For example, a single training program could meet the
requirements for training personnel across multiple BES Cyber Systems.
Measures for the initial requirement are simply the documented processes themselves.
Measures in the table rows provide examples of evidence to show documentation and
implementation of applicable items in the documented processes. These measures serve to
provide guidance to entities in acceptable records of compliance and should not be viewed as
an all-inclusive list.
Throughout the standards, unless otherwise stated, bulleted items in the requirements and
measures are items that are linked with an “or,” and numbered items are items that are linked
with an “and.”
Final Draft
June 2021
Page 4 of 46
CIP-004-76 — Cyber Security – Personnel & Training
Many references in the Applicability section use a threshold of 300 MW for UFLS and UVLS.
This particular threshold of 300 MW for UVLS and UFLS was provided in Version 1 of the CIP
Cyber Security Standards. The threshold remains at 300 MW since it is specifically addressing
UVLS and UFLS, which are last ditch efforts to save the BES. A review of UFLS tolerances defined
within regional reliability standards for UFLS program requirements to date indicates that the
historical value of 300 MW represents an adequate and reasonable threshold value for
allowable UFLS operational tolerances.
“Applicable Systems” Columns in Tables:
Each table has an “Applicable Systems” column to further define the scope of systems to which
a specific requirement row applies. The CSO706 SDT adapted this concept from the National
Institute of Standards and Technology (“NIST”) Risk Management Framework as a way of
applying requirements more appropriately based on impact and connectivity characteristics.
The following conventions are used in the “Applicable Systems” column as described.
• High Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as high impact
according to the CIP-002-5.1a identification and categorization processes.
• Medium Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as medium
impact according to the CIP-002-5.1a identification and categorization processes.
• Medium Impact BES Cyber Systems with External Routable Connectivity – Only applies to
medium impact BES Cyber Systems with External Routable Connectivity. This also excludes
Cyber Assets in the BES Cyber System that cannot be directly accessed through External
Routable Connectivity.
• Electronic Access Control or Monitoring Systems (EACMS) – Applies to each Electronic
Access Control or Monitoring System associated with a referenced high impact BES Cyber
System or medium impact BES Cyber System. Examples may include, but are not limited to,
firewalls, authentication servers, and log monitoring and alerting systems.
• Physical Access Control Systems (PACS) – Applies to each Physical Access Control System
associated with a referenced high impact BES Cyber System or medium impact BES Cyber
System with External Routable Connectivity.
Final Draft
June 2021
Page 5 of 46
CIP-004-76 — Cyber Security – Personnel & Training
B. Requirements and Measures
R1.
Each Responsible Entity shall implement one or more documented processes that collectively include each of the
applicable requirement parts in CIP-004-76 Table R1 – Security Awareness Program. [Violation Risk Factor: Lower] [Time
Horizon: Operations Planning]
M1. Evidence must include each of the applicable documented processes that collectively include each of the applicable
requirement parts in CIP-004-76 Table R1 – Security Awareness Program and additional evidence to demonstrate
implementation as described in the Measures column of the table.
CIP-004-76 Table R1 – Security Awareness Program
Part
1.1
Applicable Systems
High Impact BES Cyber Systems
Medium Impact BES Cyber Systems
Requirements
Measures
Security awareness that, at least once
each calendar quarter, reinforces cyber
security practices (which may include
associated physical security practices)
for the Responsible Entity’s personnel
who have authorized electronic or
authorized unescorted physical access
to BES Cyber Systems.
An example of evidence may include,
but is not limited to, documentation
that the quarterly reinforcement has
been provided. Examples of evidence
of reinforcement may include, but are
not limited to, dated copies of
information used to reinforce security
awareness, as well as evidence of
distribution, such as:
•
•
•
Final Draft
June 2021
Page 6 of 46
direct communications (for
example, e-mails, memos,
computer-based training); or
indirect communications (for
example, posters, intranet, or
brochures); or
management support and
reinforcement (for example,
presentations or meetings).
CIP-004-76 — Cyber Security – Personnel & Training
R2. Each Responsible Entity shall implement one or more cyber security training program(s) appropriate to individual roles,
functions, or responsibilities that collectively includes each of the applicable requirement parts in CIP-004-76 Table R2 –
Cyber Security Training Program. [Violation Risk Factor: Lower] [Time Horizon: Operations Planning]
M2. Evidence must include the training program that includes each of the applicable requirement parts in CIP-004-76 Table R2 –
Cyber Security Training Program and additional evidence to demonstrate implementation of the program(s).
Final Draft
June 2021
Page 7 of 46
CIP-004-76 — Cyber Security – Personnel & Training
CIP-004-76 Table R2 – Cyber Security Training Program
Part
2.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Requirements
Measures
Training content on:
2.1.1. Cyber security policies;
2.1.2. Physical access controls;
2.1.3. Electronic access controls;
2.1.4. The visitor control program;
2.1.5. Handling of BES Cyber System
Information and its storage;
2.1.6. Identification of a Cyber
Security Incident and initial
notifications in accordance
with the entity’s incident
response plan;
2.1.7. Recovery plans for BES Cyber
Systems;
2.1.8. Response to Cyber Security
Incidents; and
2.1.9. Cyber security risks associated
with a BES Cyber System’s
electronic interconnectivity
and interoperability with
other Cyber Assets, including
Transient Cyber Assets, and
with Removable Media.
Final Draft
June 2021
Page 8 of 46
Examples of evidence may include,
but are not limited to, training
material such as power point
presentations, instructor notes,
student notes, handouts, or other
training materials.
CIP-004-76 — Cyber Security – Personnel & Training
CIP-004-76 Table R2 – Cyber Security Training Program
Part
2.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
Requirements
Measures
Require completion of the training
specified in Part 2.1 prior to granting
authorized electronic access and
authorized unescorted physical access
to applicable Cyber Assets, except
during CIP Exceptional Circumstances.
Examples of evidence may include,
but are not limited to, training
records and documentation of when
CIP Exceptional Circumstances were
invoked.
Require completion of the training
specified in Part 2.1 at least once
every 15 calendar months.
Examples of evidence may include,
but are not limited to, dated
individual training records.
1. EACMS; and
2. PACS
2.3
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Final Draft
June 2021
Page 9 of 46
CIP-004-76 — Cyber Security – Personnel & Training
R3.
Each Responsible Entity shall implement one or more documented personnel risk assessment program(s) to attain and
retain authorized electronic or authorized unescorted physical access to BES Cyber Systems that collectively include each of
the applicable requirement parts in CIP-004-76 Table R3 – Personnel Risk Assessment Program. [Violation Risk Factor:
Medium] [Time Horizon: Operations Planning].
M3. Evidence must include the documented personnel risk assessment programs that collectively include each of the applicable
requirement parts in CIP-004-76 Table R3 – Personnel Risk Assessment Program and additional evidence to demonstrate
implementation of the program(s).
CIP-004-76 Table R3 – Personnel Risk Assessment Program
Part
Applicable Systems
3.1
High Impact BES Cyber Systems and their
associated:
Requirements
Measures
Process to confirm identity.
An example of evidence may
include, but is not limited to,
documentation of the Responsible
Entity’s process to confirm identity.
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Final Draft
June 2021
Page 10 of 46
CIP-004-76 — Cyber Security – Personnel & Training
CIP-004-76 Table R3 – Personnel Risk Assessment Program
Part
3.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Requirements
Measures
Process to perform a seven year
criminal history records check as part of
each personnel risk assessment that
includes:
An example of evidence may include,
but is not limited to, documentation of
the Responsible Entity’s process to
perform a seven year criminal history
records check.
3.2.1. current residence, regardless of
duration; and
3.2.2. other locations where, during
the seven years immediately prior to
the date of the criminal history
records check, the subject has resided
for six consecutive months or more.
If it is not possible to perform a full
seven year criminal history records
check, conduct as much of the seven
year criminal history records check as
possible and document the reason the
full seven year criminal history records
check could not be performed.
Final Draft
June 2021
Page 11 of 46
CIP-004-76 — Cyber Security – Personnel & Training
CIP-004-76 Table R3 – Personnel Risk Assessment Program
Part
3.3
Applicable Systems
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
Requirements
Measures
Criteria or process to evaluate criminal
history records checks for authorizing
access.
An example of evidence may
include, but is not limited to,
documentation of the
Responsible Entity’s process to
evaluate criminal history records
checks.
Criteria or process for verifying that
personnel risk assessments performed for
contractors or service vendors are
conducted according to Parts 3.1 through
3.3.
An example of evidence may
include, but is not limited to,
documentation of the
Responsible Entity’s criteria or
process for verifying contractors
or service vendors personnel risk
assessments.
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
3.4
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Final Draft
June 2021
Page 12 of 46
CIP-004-76 — Cyber Security – Personnel & Training
CIP-004-76 Table R3 – Personnel Risk Assessment Program
Part
3.5
Applicable Systems
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
Requirements
Measures
Process to ensure that individuals with
authorized electronic or authorized
unescorted physical access have had a
personnel risk assessment completed
according to Parts 3.1 to 3.4 within the last
seven years.
An example of evidence may
include, but is not limited to,
documentation of the
Responsible Entity’s process for
ensuring that individuals with
authorized electronic or
authorized unescorted physical
access have had a personnel risk
assessment completed within the
last seven years.
1. EACMS; and
2. PACS
Final Draft
June 2021
Page 13 of 46
CIP-004-76 — Cyber Security – Personnel & Training
R4. Each Responsible Entity shall implement one or more documented access management program(s) that collectively include
each of the applicable requirement parts in CIP-004-76 Table R4 – Access Management Program. [Violation Risk Factor:
Medium] [Time Horizon: Operations Planning and Same Day Operations].
M4. Evidence must include the documented processes that collectively include each of the applicable requirement parts in CIP004-76 Table R4 – Access Management Program and additional evidence to demonstrate that the access management
program was implemented as described in the Measures column of the table.
CIP-004-76 Table R4 – Access Management Program
Part
Applicable Systems
4.1
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Final Draft
June 2021
Requirements
Measures
Process to authorize based on need, as
determined by the Responsible Entity,
except for CIP Exceptional
Circumstances:
4.1.1. Electronic access; and
4.1.2. Unescorted physical access into a
Physical Security Perimeter; and
4.1.3. Access to designated storage
locations, whether physical or
electronic, for BES Cyber System
Information.
Page 14 of 46
An example of evidence may
include, but is not limited to, dated
documentation of the process to
authorize electronic access and
unescorted physical access in a
Physical Security Perimeter, and
access to designated storage
locations, whether physical or
electronic, for BES Cyber System
Information.
CIP-004-76 — Cyber Security – Personnel & Training
CIP-004-76 Table R4 – Access Management Program
Part
Applicable Systems
4.2
High Impact BES Cyber Systems and their
associated:
1. EACMS; and
2. PACS
Requirements
Measures
Verify at least once each calendar
quarter that individuals with active
electronic access or unescorted physical
access have authorization records.
Examples of evidence may include,
but are not limited to:
•
Dated documentation of the
verification between the system
generated list of individuals who
have been authorized for access
(i.e., workflow database) and a
system generated list of
personnel who have access (i.e.,
user account listing), or
•
Dated documentation of the
verification between a list of
individuals who have been
authorized for access (i.e.,
authorization forms) and a list
of individuals provisioned for
access (i.e., provisioning forms
or shared account listing).
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
1. EACMS; and
2. PACS
Final Draft
June 2021
Page 15 of 46
CIP-004-76 — Cyber Security – Personnel & Training
CIP-004-76 Table R4 – Access Management Program
Part
Applicable Systems
Requirements
4.3
High Impact BES Cyber Systems and their
associated:
For electronic access, verify at least once
every 15 calendar months that all user
accounts, user account groups, or user
role categories, and their specific,
associated privileges are correct and are
those that the Responsible Entity
determines are necessary.
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
Measures
An example of evidence may
include, but is not limited to,
documentation of the review that
includes all of the following:
1. A dated listing of all
accounts/account groups or
roles within the system;
2. A summary description of
privileges associated with
each group or role;
1. EACMS; and
2. PACS
3. Accounts assigned to the
group or role; and
4. Dated evidence showing
verification of the privileges
for the group are authorized
and appropriate to the work
function performed by
people assigned to each
account.
Final Draft
June 2021
Page 16 of 46
CIP-004-76 — Cyber Security – Personnel & Training
CIP-004-6 Table R4 – Access Management Program
Part
Applicable Systems
Requirements
4.4
High Impact BES Cyber Systems and their
associated:
Verify at least once every 15 calendar
months that access to the designated
storage locations for BES Cyber System
Information, whether physical or
electronic, are correct and are those that
the Responsible Entity determines are
necessary for performing assigned work
functions.
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems with
External Routable Connectivity and their
associated:
Measures
1. EACMS; and
2. PACS
Final Draft
June 2021
An example of evidence may
include, but is not limited to, the
documentation of the review that
includes all of the following:
1. A dated listing of
authorizations for BES Cyber
System information;
2. Any privileges associated
with the authorizations; and
3. Dated evidence showing a
verification of the
authorizations and any
privileges were confirmed
correct and the minimum
necessary for performing
assigned work functions.
Page 17 of 46
CIP-004-76 — Cyber Security – Personnel & Training
R5. Each Responsible Entity shall implement one or more documented access revocation program(s) that collectively include
each of the applicable requirement parts in CIP-004-76 Table R5 – Access Revocation. [Violation Risk Factor: Medium] [Time
Horizon: Same Day Operations and Operations Planning].
M5. Evidence must include each of the applicable documented programs that collectively include each of the applicable
requirement parts in CIP-004-76 Table R5 – Access Revocation and additional evidence to demonstrate implementation as
described in the Measures column of the table.
CIP-004-76 Table R5 – Access Revocation
Part
5.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
Requirements
Measures
A process to initiate removal of an
individual’s ability for unescorted
physical access and Interactive Remote
Access upon a termination action, and
complete the removals within 24 hours
of the termination action (Removal of
the ability for access may be different
than deletion, disabling, revocation, or
removal of all access rights).
An example of evidence may include,
but is not limited to, documentation of
all of the following:
2. PACS
Final Draft
June 2021
Page 18 of 46
1. Dated workflow or sign-off form
verifying access removal
associated with the termination
action; and
2. Logs or other demonstration
showing such persons no longer
have access.
CIP-004-76 — Cyber Security – Personnel & Training
CIP-004-76 Table R5 – Access Revocation
Part
5.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
2. PACS
Final Draft
June 2021
Requirements
Measures
For reassignments or transfers, revoke
the individual’s authorized electronic
access to individual accounts and
authorized unescorted physical access
that the Responsible Entity determines
are not necessary by the end of the
next calendar day following the date
that the Responsible Entity determines
that the individual no longer requires
retention of that access.
An example of evidence may include,
but is not limited to, documentation of
all of the following:
Page 19 of 46
1. Dated workflow or sign-off form
showing a review of logical and
physical access; and
2. Logs or other demonstration
showing such persons no longer
have access that the
Responsible Entity determines
is not necessary.
CIP-004-76 — Cyber Security – Personnel & Training
CIP-004-76 Table R5 – Access Revocation
Part
5.3
Applicable Systems
High Impact BES Cyber Systems and
their associated:
EACMS; and
PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
EACMS; and
Requirements
Measures
For termination actions, revoke the
individual’s access to the designated
storage locations for BES Cyber System
Information, whether physical or
electronic (unless already revoked
according to Requirement R5.1), by the
end of the next calendar day following
the effective date of the termination
action.
An example of evidence may include,
but is not limited to, workflow or signoff form verifying access removal to
designated physical areas or cyber
systems containing BES Cyber System
Information associated with the
terminations and dated within the next
calendar day of the termination action.
For termination actions, revoke the
individual’s non-shared user accounts
(unless already revoked according to
Parts 5.1 or 5.3) within 30 calendar
days of the effective date of the
termination action.
An example of evidence may include,
but is not limited to, workflow or signoff form showing access removal for
any individual BES Cyber Assets and
software applications as determined
necessary to completing the revocation
of access and dated within thirty
calendar days of the termination
actions.
PACS
5.34
High Impact BES Cyber Systems and
their associated:
•
Final Draft
June 2021
EACMS
Page 20 of 46
CIP-004-76 — Cyber Security – Personnel & Training
CIP-004-76 Table R5 – Access Revocation
Part
Applicable Systems
5.45 High Impact BES Cyber Systems and
their associated:
•
EACMS
Requirements
Measures
For termination actions, change
Examples of evidence may include, but
passwords for shared account(s) known are not limited to:
to the user within 30 calendar days of
• Workflow or sign-off form
the termination action. For
showing password reset within
reassignments or transfers, change
30 calendar days of the
passwords for shared account(s) known
termination;
to the user within 30 calendar days
• Workflow or sign-off form
following the date that the Responsible
showing password reset within
Entity determines that the individual no
30 calendar days of the
longer requires retention of that
reassignments or transfers; or
access.
If the Responsible Entity determines
and documents that extenuating
operating circumstances require a
longer time period, change the
password(s) within 10 calendar days
following the end of the operating
circumstances.
Final Draft
June 2021
Page 21 of 46
•
Documentation of the
extenuating operating
circumstance and workflow or
sign-off form showing password
reset within 10 calendar days
following the end of the
operating circumstance.
CIP-004-76 — Cyber Security – Personnel & Training
R6. Each Responsible Entity shall implement one or more documented access management program(s) to authorize, verify, and
revoke provisioned access to BCSI pertaining to the “Applicable Systems” identified in CIP-004-7 Table R6 – Access
Management for BES Cyber System Information that collectively include each of the applicable requirement parts in CIP‐
004‐7 Table R6 – Access Management for BES Cyber System Information. To be considered access to BCSI in the context of
this requirement, an individual has both the ability to obtain and use BCSI. Provisioned access is to be considered the result
of the specific actions taken to provide an individual(s) the means to access BCSI (e.g., may include physical keys or access
cards, user accounts and associated rights and privileges, encryption keys). [Violation Risk Factor: Medium] [Time Horizon:
Same Day Operations and Operations Planning].
M6. Evidence must include each of the applicable documented programs that collectively include the applicable requirement
parts in CIP-004-7 Table R6 – Access Management for BES Cyber System Information and additional evidence to
demonstrate implementation as described in the Measures column of the table.
CIP-004-7 Table R6 – Access Management for BES Cyber System Information
Part
6.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
Requirements
Measures
Prior to provisioning, authorize (unless
already authorized according to Part
4.1.) based on need, as determined by
the Responsible Entity, except for CIP
Exceptional Circumstances:
Examples of evidence may include, but
are not limited to, individual records or
lists that include who is authorized, the
date of the authorization, and the
justification of business need for the
provisioned access.
6.1.1. Provisioned electronic access to
electronic BCSI; and
6.1.2. Provisioned physical access to
physical BCSI.
2. PACS
Final Draft
June 2021
Page 22 of 46
CIP-004-76 — Cyber Security – Personnel & Training
CIP-004-7 Table R6 – Access Management for BES Cyber System Information
Part
6.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
1. EACMS; and
Requirements
Measures
Verify at least once every 15 calendar
months that all individuals with
provisioned access to BCSI:
6.2.1. have an authorization record;
and
6.2.2. still need the provisioned access
to perform their current work
functions, as determined by the
Responsible Entity.
Examples of evidence may include, but
are not limited to, the documentation
of the review that includes all of the
following:
•
List of authorized individuals;
•
List of individuals who have been
provisioned access;
•
Verification that provisioned
access is appropriate based on
need; and
•
Documented reconciliation
actions, if any.
2. PACS
6.3
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
with External Routable Connectivity
and their associated:
For termination actions, remove the
individual’s ability to use provisioned
access to BCSI (unless already revoked
according to Part 5.1) by the end of the
next calendar day following the
effective date of the termination
action.
1. EACMS; and
2. PACS
Final Draft
June 2021
Page 23 of 46
Examples of dated evidence may
include, but are not limited to, access
revocation records associated with the
terminations and dated within the next
calendar day of the termination action.
CIP-004-76 — Cyber Security – Personnel & Training
C. Compliance
1. Compliance Monitoring Process:
1.1. Compliance Enforcement Authority:
As defined in the NERC Rules of Procedure, “Compliance Enforcement Authority” (CEA)
means NERC or the Regional Entity, or any entity as otherwise designated by an
Applicable Governmental Authority, in their respective roles of monitoring and/or
enforcing compliance with mandatory and enforceable the NERC Reliability Standards
in their respective jurisdictions.
1.2. Evidence Retention:
The following evidence retention periods identify the period of time an entity is
required to retain specific evidence to demonstrate compliance. For instances where
the evidence retention period specified below is shorter than the time since the last
audit, the CEA may ask an entity to provide other evidence to show that it was
compliant for the full time period since the last audit.
The Responsible Eapplicable entity shall keep data or evidence to show compliance as
identified below unless directed by its CEA to retain specific evidence for a longer
period of time as part of an investigation:
•
Each Responsible EThe applicable entity shall retain evidence of each requirement in
this standard for three calendar years.
•
If a Responsible EThe applicable entity is found non-compliant, it shall keep information
related to the non-compliance until mitigation is complete and approved or for the
time specified above, whichever is longer.
•
The CEA shall keep the last audit records and all requested and submitted subsequent
audit records.
1.3. Compliance Monitoring and EnforceAssessment Programcesses:
As defined in the NERC Rules of Procedure, “Compliance Monitoring and Enforcement
Program” refers to the identification of the processes that will be used to evaluate data
or information for the purpose of assessing performance or outcomes with the
associated Reliability Standard.
Compliance Audits
Self-Certifications
Spot Checking
Compliance Violation Investigations
Self-Reporting
Complaints
1.4. Additional Compliance Information:
None
Final Draft
June
2021
Page 24 of 46
CIP-004-76 — Cyber Security – Personnel & Training
2. Table of Compliance Elements
R#
R1
R2
Time
Horizon
VRF
Operations
Planning
Lower
Operations
Planning
Violation Severity Levels (CIP-004-76)
Lower VSL
Lower
Moderate VSL
Severe VSL
The Responsible Entity did
not reinforce cyber
security practices during a
calendar quarter but did
so less than 10 calendar
days after the start of a
subsequent calendar
quarter. (1.1)
The Responsible
Entity did not
reinforce cyber
security practices
during a calendar
quarter but did so
between 10 and 30
calendar days after
the start of a
subsequent calendar
quarter. (1.1)
The Responsible Entity
did not reinforce cyber
security practices
during a calendar
quarter but did so
within the subsequent
quarter but beyond 30
calendar days after the
start of that calendar
quarter. (1.1)
The Responsible Entity
did not document or
implement any security
awareness process(es)
to reinforce cyber
security practices. (R1)
The Responsible Entity
implemented a cyber
security training program
but failed to include one
of the training content
topics in Requirement
Parts 2.1.1 through 2.1.9.
(2.1)
The Responsible
Entity implemented a
cyber security
training program but
failed to include two
of the training
content topics in
Requirement Parts
2.1.1 through 2.1.9.
(2.1)
The Responsible Entity
implemented a cyber
security training
program but failed to
include three of the
training content topics
in Requirement Parts
2.1.1 through 2.1.9.
(2.1)
The Responsible Entity
did not implement a
cyber security training
program appropriate to
individual roles,
functions, or
responsibilities. (R2)
OR
OR
Final Draft
June 2021
High VSL
OR
OR
The Responsible Entity
did not reinforce cyber
security practices and
associated physical
security practices for at
least two consecutive
calendar quarters. (1.1)
OR
The Responsible Entity
implemented a cyber
Page 25 of 46
CIP-004-76 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-76)
Lower VSL
The Responsible Entity
implemented a cyber
security training program
but failed to train one
individual (with the
exception of CIP
Exceptional
Circumstances) prior to
their being granted
authorized electronic and
authorized unescorted
physical access. (2.2)
OR
The Responsible Entity
implemented a cyber
security training program
but failed to train one
individual with authorized
electronic or authorized
unescorted physical
access within 15 calendar
months of the previous
training completion date.
(2.3)
Final Draft
June 2021
Moderate VSL
The Responsible
Entity implemented a
cyber security
training program but
failed to train two
individuals (with the
exception of CIP
Exceptional
Circumstances) prior
to their being
granted authorized
electronic and
authorized
unescorted physical
access. (2.2)
High VSL
The Responsible Entity
implemented a cyber
security training
program but failed to
train three individuals
(with the exception of
CIP Exceptional
Circumstances) prior to
their being granted
authorized electronic
and authorized
unescorted physical
access. (2.2)
OR
The Responsible Entity
implemented a cyber
security training
program but failed to
The Responsible
Entity implemented a train three individuals
with authorized
cyber security
training program but electronic or authorized
unescorted physical
failed to train two
access within 15
individuals with
authorized electronic calendar months of the
previous training
or authorized
completion date. (2.3)
unescorted physical
access within 15
OR
Severe VSL
security training
program but failed to
include four or more of
the training content
topics in Requirement
Parts 2.1.1 through
2.1.9. (2.1)
OR
The Responsible Entity
implemented a cyber
security training
program but failed to
train four or more
individuals (with the
exception of CIP
Exceptional
Circumstances) prior to
their being granted
authorized electronic
and authorized
unescorted physical
access. (2.2)
OR
The Responsible Entity
implemented a cyber
security training
program but failed to
Page 26 of 46
CIP-004-76 — Cyber Security – Personnel & Training
R#
R3
Final Draft
June 2021
Time
Horizon
VRF
Operations
Planning
Medium
Violation Severity Levels (CIP-004-76)
Lower VSL
The Responsible Entity
has a program for
conducting Personnel Risk
Assessments (PRAs) for
individuals, including
contractors and service
vendors, but did not
conduct the PRA as a
condition of granting
authorized electronic or
authorized unescorted
physical access for one
individual. (R3)
Moderate VSL
calendar months of
the previous training
completion date.
(2.3)
The Responsible
Entity has a program
for conducting
Personnel Risk
Assessments (PRAs)
for individuals,
including contractors
and service vendors,
but did not conduct
the PRA as a
condition of granting
authorized electronic
or authorized
unescorted physical
OR
access for two
The Responsible Entity did individuals. (R3)
conduct Personnel Risk
OR
Assessments (PRAs) for
individuals, including
The Responsible
contractors and service
Entity did conduct
High VSL
The Responsible Entity
has a program for
conducting Personnel
Risk Assessments (PRAs)
for individuals,
including contractors
and service vendors,
but did not conduct the
PRA as a condition of
granting authorized
electronic or authorized
unescorted physical
access for three
individuals. (R3)
OR
Severe VSL
train four or more
individuals with
authorized electronic or
authorized unescorted
physical access within 15
calendar months of the
previous training
completion date. (2.3)
The Responsible Entity
did not have all of the
required elements as
described by 3.1 through
3.4 included within
documented program(s)
for implementing
Personnel Risk
Assessments (PRAs), for
individuals, including
contractors and service
vendors, for obtaining
and retaining authorized
cyber or authorized
unescorted physical
access. (R3)
The Responsible Entity
OR
did conduct Personnel
Risk Assessments (PRAs) The Responsible Entity
for individuals,
has a program for
Page 27 of 46
CIP-004-76 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-76)
Lower VSL
vendors, with authorized
electronic or authorized
unescorted physical
access but did not confirm
identity for one
individual. (3.1 & 3.4)
OR
The Responsible Entity
has a process to perform
seven-year criminal
history record checks for
individuals, including
contractors and service
vendors, with authorized
electronic or authorized
unescorted physical
access but did not include
the required checks
described in 3.2.1 and
3.2.2 for one individual.
(3.2 & 3.4)
Moderate VSL
Personnel Risk
Assessments (PRAs)
for individuals,
including contractors
and service vendors,
with authorized
electronic or
authorized
unescorted physical
access but did not
confirm identity for
two individuals. (3.1
& 3.4)
OR
The Responsible
Entity has a process
to perform sevenyear criminal history
record checks for
individuals, including
contractors and
service vendors, with
OR
authorized electronic
The Responsible Entity did or authorized
conduct Personnel Risk
unescorted physical
Assessments (PRAs) for
access but did not
individuals, including
include the required
contractors and service
checks described in
Final Draft
June 2021
High VSL
including contractors
and service vendors,
with authorized
electronic or authorized
unescorted physical
access but did not
confirm identity for
three individuals. (3.1 &
3.4)
OR
The Responsible Entity
has a process to
perform seven-year
criminal history record
checks for individuals,
including contractors
and service vendors,
with authorized
electronic or authorized
unescorted physical
access but did not
include the required
checks described in
3.2.1 and 3.2.2 for three
individuals. (3.2 & 3.4)
OR
Severe VSL
conducting Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, but did not
conduct the PRA as a
condition of granting
authorized electronic or
authorized unescorted
physical access for four
or more individuals. (R3)
OR
The Responsible Entity
did conduct Personnel
Risk Assessments (PRAs)
for individuals, including
contractors and service
vendors, with authorized
electronic or authorized
unescorted physical
access but did not
confirm identity for four
or more individuals. (3.1
& 3.4)
OR
The Responsible Entity
has a process to perform
Page 28 of 46
CIP-004-76 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-76)
Lower VSL
vendors, with authorized
electronic or authorized
unescorted physical
access but did not
evaluate criminal history
records check for access
authorization for one
individual. (3.3 & 3.4)
Moderate VSL
3.2.1 and 3.2.2 for
two individuals. (3.2
& 3.4)
OR
The Responsible
Entity did conduct
Personnel Risk
Assessments (PRAs)
OR
for individuals,
The Responsible Entity did including contractors
not conduct Personnel
and service vendors,
Risk Assessments (PRAs)
with authorized
for one individual with
electronic or
authorized electronic or
authorized
authorized unescorted
unescorted physical
physical access within 7
access but did not
calendar years of the
evaluate criminal
previous PRA completion history records check
date. (3.5)
for access
authorization for two
individuals. (3.3 &
3.4)
OR
The Responsible
Entity did not
conduct Personnel
Risk Assessments
Final Draft
June 2021
High VSL
Severe VSL
seven-year criminal
The Responsible Entity
history record checks for
did conduct Personnel
Risk Assessments (PRAs) individuals, including
contractors and service
for individuals,
vendors, with authorized
including contractors
electronic or authorized
and service vendors,
unescorted physical
with authorized
electronic or authorized access but did not
include the required
unescorted physical
checks described in 3.2.1
access but did not
and 3.2.2 for four or
evaluate criminal
more individuals. (3.2 &
history records check
for access authorization 3.4)
for three individuals.
OR
(3.3 & 3.4)
The Responsible Entity
OR
did conduct Personnel
Risk Assessments (PRAs)
The Responsible Entity
for individuals, including
did not conduct
contractors and service
Personnel Risk
Assessments (PRAs) for vendors, with authorized
electronic or authorized
three individuals with
authorized electronic or unescorted physical
access but did not
authorized unescorted
physical access within 7 evaluate criminal history
records check for access
calendar years of the
authorization for four or
previous PRA
more individuals. (3.3 &
completion date. (3.5)
3.4)
Page 29 of 46
CIP-004-76 — Cyber Security – Personnel & Training
R#
R4
Time
Horizon
Operations
Planning
and Same
Day
Operations
VRF
Violation Severity Levels (CIP-004-76)
Lower VSL
Medium
The Responsible Entity did
not verify that individuals
with active electronic or
active unescorted physical
access have authorization
records during a calendar
quarter but did so less
than 10 calendar days
after the start of a
subsequent calendar
quarter. (4.2)
OR
Final Draft
June 2021
Moderate VSL
(PRAs) for two
individuals with
authorized electronic
or authorized
unescorted physical
access within 7
calendar years of the
previous PRA
completion date.
(3.5)
The Responsible
Entity did not verify
that individuals with
active electronic or
active unescorted
physical access have
authorization records
during a calendar
quarter but did so
between 10 and 20
calendar days after
the start of a
subsequent calendar
quarter. (4.2)
High VSL
Severe VSL
OR
The Responsible Entity
did not verify that
individuals with active
electronic or active
unescorted physical
access have
authorization records
during a calendar
quarter but did so
between 20 and 30
calendar days after the
start of a subsequent
calendar quarter. (4.2)
OR
The Responsible Entity
did not conduct
Personnel Risk
Assessments (PRAs) for
four or more individuals
with authorized
electronic or authorized
unescorted physical
access within 7 calendar
years of the previous
PRA completion date.
(3.5)
The Responsible Entity
did not implement any
documented program(s)
for access management.
(R4)
OR
The Responsible Entity
has did not
implemented one or
more documented
program(s) for access
management that
includes a process to
Page 30 of 46
CIP-004-76 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-76)
Lower VSL
The Responsible Entity
has implemented
processes to verify that
user accounts, user
account groups, or user
role categories, and their
specific, associated
privileges are correct and
necessary within 15
calendar months of the
previous verification but
for 5% or less of its BES
Cyber Systems, privileges
were incorrect or
unnecessary. (4.3)
OR
The Responsible Entity
has implemented
processes to verify that
access to the designated
storage locations for BES
Cyber System Information
is correct and necessary
within 15 calendar
months of the previous
verification but for 5% or
less of its BES Cyber
System Information
Final Draft
June 2021
OR
Moderate VSL
The Responsible
Entity has
implemented
processes to verify
that user accounts,
user account groups,
or user role
categories, and their
specific, associated
privileges are correct
and necessary within
15 calendar months
of the previous
verification but for
more than 5% but
less than (or equal
to) 10% of its BES
Cyber Systems,
privileges were
incorrect or
unnecessary. (4.3)
OR
The Responsible
Entity has
implemented
High VSL
The Responsible Entity
has implemented
processes to verify that
user accounts, user
account groups, or user
role categories, and
their specific,
associated privileges
are correct and
necessary within 15
calendar months of the
previous verification
but for more than 10%
but less than (or equal
to) 15% of its BES Cyber
Systems, privileges
were incorrect or
unnecessary. (4.3)
OR
The Responsible Entity
has implemented
processes to verify that
access to the
designated storage
locations for BES Cyber
System Information is
Severe VSL
authorize electronic
access, or unescorted
physical access, or
access to the designated
storage locations where
BES Cyber System
Information is located.
(4.1)
OR
The Responsible Entity
did not verify that
individuals with active
electronic or active
unescorted physical
access have
authorization records for
at least two consecutive
calendar quarters. (4.2)
OR
The Responsible Entity
has implemented
processes to verify that
user accounts, user
account groups, or user
role categories, and their
Page 31 of 46
CIP-004-76 — Cyber Security – Personnel & Training
R#
Final Draft
June 2021
Time
Horizon
VRF
Violation Severity Levels (CIP-004-76)
Lower VSL
storage locations,
privileges were incorrect
or unnecessary. (4.4)
Moderate VSL
processes to verify
that access to the
designated storage
locations for BES
Cyber System
Information is
correct and
necessary within 15
calendar months of
the previous
verification but for
more than 5% but
less than (or equal
to) 10% of its BES
Cyber System
Information storage
locations, privileges
were incorrect or
unnecessary. (4.4)
High VSL
correct and necessary
within 15 calendar
months of the previous
verification but for
more than 10% but less
than (or equal to) 15%
of its BES Cyber System
Information storage
locations, privileges
were incorrect or
unnecessary. (4.4)
Severe VSL
specific, associated
privileges are correct
and necessary within 15
calendar months of the
previous verification but
for more than 15% of its
BES Cyber Systems,
privileges were incorrect
or unnecessary. (4.3)
OR
The Responsible Entity
has implemented
processes to verify that
access to the designated
storage locations for BES
Cyber System
Information is correct
and necessary within 15
calendar months of the
previous verification but
for more than 15% of its
BES Cyber System
Information storage
locations, privileges
were incorrect or
unnecessary. (4.4)
Page 32 of 46
CIP-004-76 — Cyber Security – Personnel & Training
R#
R5
Time
Horizon
Same Day
Operations
and
Operations
Planning
VRF
Medium
Violation Severity Levels (CIP-004-76)
Lower VSL
The Responsible Entity
has implemented one or
more process(es) to
revoke the individual’s
access to the designated
storage locations for BES
Cyber System Information
but, for one individual,
did not do so by the end
of the next calendar day
following the effective
date and time of the
termination action. (5.3)
OR
The Responsible Entity
has implemented one or
more process(es) to
revoke the individual’s
user accounts upon
termination action but did
not do so for within 30
calendar days of the date
of termination action for
one or more individuals.
(5.43)
OR
The Responsible Entity
has implemented one or
Final Draft
June 2021
Moderate VSL
The Responsible
Entity has
implemented one or
more process(es) to
remove the ability
for unescorted
physical access and
Interactive Remote
Access upon a
termination action or
complete the
removal within 24
hours of the
termination action
but did not initiate
those removals for
one individual. (5.1)
OR
The Responsible
Entity has
implemented one or
more process(es) to
determine that an
individual no longer
requires retention of
access following
High VSL
The Responsible Entity
has implemented one
or more process(es) to
remove the ability for
unescorted physical
access and Interactive
Remote Access upon a
termination action or
complete the removal
within 24 hours of the
termination action but
did not initiate those
removals for two
individuals. (5.1)
OR
The Responsible Entity
has implemented one
or more process(es) to
determine that an
individual no longer
requires retention of
access following
reassignments or
transfers but, for two
individuals, did not
revoke the authorized
Severe VSL
The Responsible Entity
has not implemented
any documented
program(s) for access
revocation for electronic
access, or unescorted
physical access, or BES
Cyber System
Information storage
locations. (R5)
OR
The Responsible Entity
has implemented one or
more process(es) to
remove the ability for
unescorted physical
access and Interactive
Remote Access upon a
termination action or
complete the removal
within 24 hours of the
termination action but
did not initiate those
removals for three or
more individuals. (5.1)
OR
Page 33 of 46
CIP-004-76 — Cyber Security – Personnel & Training
R#
Final Draft
June 2021
Time
Horizon
VRF
Violation Severity Levels (CIP-004-76)
Lower VSL
more process(es) to
change passwords for
shared accounts known to
the user upon termination
action, reassignment, or
transfer, but did not do so
for within 30 calendar
days of the date of
termination action,
reassignment, or transfer
for one or more
individuals. (5.45)
Moderate VSL
reassignments or
transfers but, for one
individual, did not
revoke the
authorized electronic
access to individual
accounts and
authorized
unescorted physical
access by the end of
the next calendar day
following the
predetermined date.
OR
(5.2)
The Responsible Entity
OR
has implemented one or
The Responsible
more process(es) to
Entity has
determine and document implemented one or
extenuating operating
more process(es) to
circumstances following a revoke the
termination action,
individual’s access to
reassignment, or transfer, the designated
but did not change one or storage locations for
more passwords for
BES Cyber System
shared accounts known to Information but, for
the user within 10
two individuals, did
calendar days following
not do so by the end
the end of the
of the next calendar
High VSL
electronic access to
individual accounts and
authorized unescorted
physical access by the
end of the next
calendar day following
the predetermined
date. (5.2)
OR
The Responsible Entity
has implemented one
or more process(es) to
revoke the individual’s
access to the
designated storage
locations for BES Cyber
System Information but,
for three or more
individuals, did not do
so by the end of the
next calendar day
following the effective
date and time of the
termination action.
(5.3)
Severe VSL
The Responsible Entity
has implemented one or
more process(es) to
determine that an
individual no longer
requires retention of
access following
reassignments or
transfers but, for three
or more individuals, did
not revoke the
authorized electronic
access to individual
accounts and authorized
unescorted physical
access by the end of the
next calendar day
following the
predetermined date.
(5.2)
Page 34 of 46
CIP-004-76 — Cyber Security – Personnel & Training
R#
R6
Time
Horizon
VRF
Same Day
Operations
and
Operations
Planning
Medium
Violation Severity Levels (CIP-004-76)
Lower VSL
extenuating operating
circumstances. (5.54)
Moderate VSL
day following the
effective date and
time of the
termination action.
(5.3)
The Responsible Entity
has implemented one or
more program(s) as
required by Requirement
R6 Part 6.1 but, for one
individual, did not
authorize provisioned
electronic access to
electronic BCSI or
provisioned physical
access to physical BCSI.
(6.1)
The Responsible
Entity has
implemented one or
more program(s) as
required by
Requirement R6 Part
6.1 but, for two
individuals, did not
authorize
provisioned
electronic access to
electronic BCSI or
provisioned physical
access to physical
BCSI. (6.1)
OR
The Responsible Entity
performed the
verification required by
Requirement R6 Part 6.2
more than 15 calendar
months but less than or
equal to 16 calendar
months of the previous
verification. (6.2)
Final Draft
June 2021
OR
The Responsible
Entity performed the
verification required
by Requirement R6
Part 6.2 more than
16 calendar months
High VSL
The Responsible Entity
has implemented one
or more program(s) as
required by
Requirement R6 Part
6.1 but, for three
individuals, did not
authorize provisioned
electronic access to
electronic BCSI or
provisioned physical
access to physical BCSI.
(6.1)
OR
The Responsible Entity
performed the
verification required by
Requirement R6 Part
6.2 more than 17
calendar months but
less than or equal to 18
calendar months of the
Severe VSL
The Responsible Entity
did not implement one
or more documented
access management
program(s) for BCSI.
(R6)
OR
The Responsible Entity
has implemented one or
more program(s) as
required by
Requirement R6 Part 6.1
but, for four or more
individuals, did not
authorize provisioned
electronic access to
electronic BCSI or
provisioned physical
access to physical BCSI.
(6.1)
OR
Page 35 of 46
CIP-004-76 — Cyber Security – Personnel & Training
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-004-76)
Lower VSL
OR
The Responsible Entity
has implemented one or
more program(s) to
remove the individual’s
ability to use provisioned
access to BCSI but, for
one individual, did not do
so by the timeframe
required in Requirement
R6, Part 6.3.
Final Draft
June 2021
Moderate VSL
but less than or equal
to 17 calendar
months of the
previous verification.
(6.2)
OR
The Responsible
Entity has
implemented one or
more program(s) to
remove the
individual’s ability to
use provisioned
access to BCSI but,
for two individuals,
did not do so by the
timeframe required
in Requirement R6,
Part 6.3.
High VSL
previous verification.
(6.2)
OR
The Responsible Entity
has implemented one
or more program(s) to
remove the individual’s
ability to use
provisioned access to
BCSI but, for three
individuals, did not do
so by the timeframe
required in
Requirement R6, Part
6.3.
Severe VSL
The Responsible Entity
performed the
verification required by
Requirement R6 Part 6.2
more than 18 calendar
months of the previous
verification. (6.2)
OR
The Responsible Entity
has implemented one or
more program(s) to
remove the individual’s
ability to use
provisioned access to
BCSI but, for four or
more individuals, did not
do so by the timeframe
required in Requirement
R6, Part 6.3.
Page 36 of 46
Guidelines and Technical Basis
D. Regional Variances
None.
E. Interpretations
None.
F. Associated Documents
None.
Version History
Version
Date
Action
1
1/16/06
R3.2 — Change “Control Center” to
“control center.”
2
9/30/09
Modifications to clarify the
requirements and to bring the
compliance elements into conformance
with the latest guidelines for developing
compliance elements of standards.
Change Tracking
3/24/06
Removal of reasonable business
judgment.
Replaced the RRO with the RE as a
responsible entity.
Rewording of Effective Date.
Changed compliance monitor to
Compliance Enforcement Authority.
3
12/16/09
Updated Version Number from -2 to -3
In Requirement 1.6, deleted the
sentence pertaining to removing
component or system from service in
order to perform testing, in response to
FERC order issued September 30, 2009.
Final Draft
June 2021
3
12/16/09
3
3/31/10
4
1/24/11
Approved by the NERC Board of
Trustees.
Approved by FERC.
Approved by the NERC Board of
Trustees.
Page 37 of 46
Guidelines and Technical Basis
Version
Date
5
11/26/12
Adopted by the NERC Board of
Trustees.
5
11/22/13
FERC Order issued approving CIP-004-5.
5.1
9/30/13
Modified two VSLs in R4
Errata
6
11/13/14
Adopted by the NERC Board of
Trustees.
Addressed two
FERC directives
from Order No.
791 related to
identify, assess,
and correct
language and
communication
networks.
6
2/12/15
Adopted by the NERC Board of
Trustees.
Replaces the
version adopted
by the Board on
11/13/2014.
Revised version
addresses
remaining
directives from
Order No. 791
related to
transient devices
and low impact
BES Cyber
Systems.
6
1/21/16
7
TBD
FERC order issued approving CIP-004-6.
Docket No. RM15-14-000
Adopted by the NERC Board of Trustees
Final Draft
June 2021
Action
Change Tracking
Modified to
coordinate with
other CIP
standards and to
revise format to
use RBS
Template.
Revised to
enhance BES
reliability for
entities to
manage their
BCSI.
Page 38 of 46
Guidelines and Technical Basis
Guidelines and Technical Basis
Section 4 – Scope of Applicability of the CIP Cyber Security Standards
Section “4. Applicability” of the standards provides important information for Responsible
Entities to determine the scope of the applicability of the CIP Cyber Security Requirements.
Section “4.1. Functional Entities” is a list of NERC functional entities to which the standard
applies. If the entity is registered as one or more of the functional entities listed in Section
4.1, then the NERC CIP Cyber Security Standards apply. Note that there is a qualification in
Section 4.1 that restricts the applicability in the case of Distribution Providers to only those
that own certain types of systems and equipment listed in 4.2.
Section “4.2. Facilities” defines the scope of the Facilities, systems, and equipment owned by
the Responsible Entity, as qualified in Section 4.1, that is subject to the requirements of the
standard. As specified in the exemption section 4.2.3.5, this standard does not apply to
Responsible Entities that do not have High Impact or Medium Impact BES Cyber Systems
under CIP-002-5.1’s categorization. In addition to the set of BES Facilities, Control Centers,
and other systems and equipment, the list includes the set of systems and equipment owned
by Distribution Providers. While the NERC Glossary term “Facilities” already includes the BES
characteristic, the additional use of the term BES here is meant to reinforce the scope of
applicability of these Facilities where it is used, especially in this applicability scoping section.
This in effect sets the scope of Facilities, systems, and equipment that is subject to the
standards.
Requirement R1:
The security awareness program is intended to be an informational program, not a formal
training program. It should reinforce security practices to ensure that personnel maintain
awareness of best practices for both physical and electronic security to protect its BES Cyber
Systems. The Responsible Entity is not required to provide records that show that each
individual received or understood the information, but they must maintain documentation of
the program materials utilized in the form of posters, memos, and/or presentations.
Examples of possible mechanisms and evidence, when dated, which can be used are:
Direct communications (e.g., emails, memos, computer based training, etc.);
Indirect communications (e.g., posters, intranet, brochures, etc.);
Management support and reinforcement (e.g., presentations, meetings, etc.).
Requirement R2:
Final Draft
June 2021
Page 39 of 46
Guidelines and Technical Basis
Training shall cover the policies, access controls, and procedures as developed for the BES
Cyber Systems and include, at a minimum, the required items appropriate to personnel roles
and responsibilities from Table R2. The Responsible Entity has the flexibility to define the
training program and it may consist of multiple modules and multiple delivery mechanisms,
but a single training program for all individuals needing to be trained is acceptable. The
training can focus on functions, roles or responsibilities at the discretion of the Responsible
Entity.
One new element in the training content is intended to encompass networking hardware and
software and other issues of electronic interconnectivity supporting the operation and
control of BES Cyber Systems as per FERC Order No. 706, Paragraph 434. Additionally,
training should address the risk posed when connecting and using Transient Cyber Assets and
Removable Media with BES Cyber Systems or within an Electronic Security Perimeter. As
noted in FERC Order No. 791, Paragraph 135, Transient Cyber Assets and Removable Media
have been the source of incidents where malware was introduced into electric generation
industrial control systems in real-world situations. Training on their use is a key element in
protecting BES Cyber Systems. This is not intended to provide technical training to individuals
supporting networking hardware and software, but educating system users of the cyber
security risks associated with the interconnectedness of these systems. The users, based on
their function, role, or responsibility, should have a basic understanding of which systems can
be accessed from other systems and how the actions they take can affect cyber security.
Each Responsible Entity shall ensure all personnel who are granted authorized electronic
access and/or authorized unescorted physical access to its BES Cyber Systems, including
contractors and service vendors, complete cyber security training prior to their being granted
authorized access, except for CIP Exceptional Circumstances. To retain the authorized
accesses, individuals must complete the training at least one every 15 months.
Requirement R3:
Each Responsible Entity shall ensure a personnel risk assessment is performed for all
personnel who are granted authorized electronic access and/or authorized unescorted
physical access to its BES Cyber Systems, including contractors and service vendors, prior to
their being granted authorized access, except for program specified exceptional
circumstances that are approved by the single senior management official or their delegate
and impact the reliability of the BES or emergency response. Identity should be confirmed in
accordance with federal, state, provincial, and local laws, and subject to existing collective
bargaining unit agreements. Identity only needs to be confirmed prior to initially granting
access and only requires periodic confirmation according to the entity’s process during the
tenure of employment, which may or may not be the same as the initial verification action.
A seven year criminal history check should be performed for those locations where the
individual has resided for at least six consecutive months. This check should also be
performed in accordance with federal, state, provincial, and local laws, and subject to existing
collective bargaining unit agreements. When it is not possible to perform a full seven year
criminal history check, documentation must be made of what criminal history check was
performed, and the reasons a full seven-year check could not be performed. Examples of this
Final Draft
June 2021
Page 40 of 46
Guidelines and Technical Basis
could include individuals under the age of 25 where a juvenile criminal history may be
protected by law, individuals who may have resided in locations from where it is not possible
to obtain a criminal history records check, violates the law or is not allowed under the
existing collective bargaining agreement. The Responsible Entity should consider the absence
of information for the full seven years when assessing the risk of granting access during the
process to evaluate the criminal history check. There needs to be a personnel risk assessment
that has been completed within the last seven years for each individual with access. A new
criminal history records check must be performed as part of the new PRA. Individuals who
have been granted access under a previous version of these standards need a new PRA within
seven years of the date of their last PRA. The clarifications around the seven year criminal
history check in this version do not require a new PRA be performed by the implementation
date.
Requirement R4:
Authorization for electronic and unescorted physical access and access to BES Cyber System
Information must be on the basis of necessity in the individual performing a work function.
Documentation showing the authorization should have some justification of the business
need included. To ensure proper segregation of duties, access authorization and provisioning
should not be performed by the same person where possible.
This requirement specifies both quarterly reviews and reviews at least once every 15 calendar
months. Quarterly reviews are to perform a validation that only authorized users have been
granted access to BES Cyber Systems. This is achieved by comparing individuals actually
provisioned to a BES Cyber System against records of individuals authorized to the BES Cyber
System. The focus of this requirement is on the integrity of provisioning access rather than
individual accounts on all BES Cyber Assets. The list of provisioned individuals can be an
automatically generated account listing. However, in a BES Cyber System with several
account databases, the list of provisioned individuals may come from other records such as
provisioning workflow or a user account database where provisioning typically initiates.
Final Draft
June 2021
Page 41 of 46
Guidelines and Technical Basis
The privilege review at least once every 15 calendar months is more detailed to ensure an
individual’s associated privileges are the minimum necessary to perform their work function
(i.e., least privilege). Entities can more efficiently perform this review by implementing rolebased access. This involves determining the specific roles on the system (e.g., system
operator, technician, report viewer, administrator, etc.) then grouping access privileges to the
role and assigning users to the role. Role-based access does not assume any specific software
and can be implemented by defining specific provisioning processes for each role where
access group assignments cannot be performed. Role-based access permissions eliminate the
1/1
1) Quarterly access review
2) privilege review (at least once every
15 calendar months)
3) BES Cyber
System Information
review (at least once every
4/1
15 calendar months)
Quarterly access review
2/1
3/1
4/1
7/1
Quarterly access review
5/1
6/1
7/1
1/1
1) Quarterly access review
2) privilege review
(at least once every
15 calendar months)
3) BES Cyber System
Information review
(at least once every
15 calendar months)
10/1
Quarterly access review
8/1
9/1
10/1
11/1
12/1
1/1
1/1
need to perform the privilege review on individual accounts. An example timeline of all the
reviews in Requirement R4 is included below.
Separation of duties should be considered when performing the reviews in Requirement R4.
The person reviewing should be different than the person provisioning access.
If the results of quarterly or at least once every 15 calendar months account reviews indicate
an administrative or clerical error in which access was not actually provisioned, then the SDT
intends that this error should not be considered a violation of this requirement.
For BES Cyber Systems that do not have user accounts defined, the controls listed in
Requirement R4 are not applicable. However, the Responsible Entity should document such
configurations.
Requirement R5:
The requirement to revoke access at the time of the termination action includes procedures
showing revocation of access concurrent with the termination action. This requirement
recognizes that the timing of the termination action may vary depending on the
circumstance. Some common scenarios and possible processes on when the termination
action occurs are provided in the following table. These scenarios are not an exhaustive list of
all scenarios, but are representative of several routine business practices.
Final Draft
June 2021
Page 42 of 46
Guidelines and Technical Basis
Scenario
Possible Process
Immediate involuntary
termination
Human resources or corporate security escorts the
individual off site and the supervisor or human resources
personnel notify the appropriate personnel to begin the
revocation process.
Scheduled involuntary
termination
Human resources personnel are notified of the termination
and work with appropriate personnel to schedule the
revocation of access at the time of termination.
Voluntary termination
Human resources personnel are notified of the termination
and work with appropriate personnel to schedule the
revocation of access at the time of termination.
Retirement where the last
working day is several weeks
prior to the termination date
Human resources personnel coordinate with manager to
determine the final date access is no longer needed and
schedule the revocation of access on the determined day.
Death
Human resources personnel are notified of the death and
work with appropriate personnel to begin the revocation
process.
Revocation of electronic access should be understood to mean a process with the end result
that electronic access to BES Cyber Systems is no longer possible using credentials assigned to
or known by the individual(s) whose access privileges are being revoked. Steps taken to
accomplish this outcome may include deletion or deactivation of accounts used by the
individual(s), but no specific actions are prescribed. Entities should consider the ramifications
of deleting an account may include incomplete event log entries due to an unrecognized
account or system services using the account to log on.
The initial revocation required in Requirement R5.1 includes unescorted physical access and
Interactive Remote Access. These two actions should prevent any further access by the
individual after termination. If an individual still has local access accounts (i.e., accounts on
the Cyber Asset itself) on BES Cyber Assets, then the Responsible Entity has 30 days to
complete the revocation process for those accounts. However, nothing prevents a
Responsible Entity from performing all of the access revocation at the time of termination.
For transferred or reassigned individuals, a review of access privileges should be performed.
This review could entail a simple listing of all authorizations for an individual and working
with the respective managers to determine which access will still be needed in the new
position. For instances in which the individual still needs to retain access as part of a
transitory period, the entity should schedule a time to review these access privileges or
include the privileges in the quarterly account review or annual privilege review.
Final Draft
June 2021
Page 43 of 46
Guidelines and Technical Basis
Revocation of access to shared accounts is called out separately to prevent the situation
where passwords on substation and generation devices are constantly changed due to staff
turnover.
Requirement 5.5 specified that passwords for shared account are to the changed within 30
calendar days of the termination action or when the Responsible Entity determines an
individual no longer requires access to the account as a result of a reassignment or transfer.
The 30 days applies under normal operating conditions. However, circumstances may occur
where this is not possible. Some systems may require an outage or reboot of the system in
order to complete the password change. In periods of extreme heat or cold, many
Responsible Entities may prohibit system outages and reboots in order to maintain reliability
of the BES. When these circumstances occur, the Responsible Entity must document these
circumstances and prepare to change the password within 10 calendar days following the end
of the operating circumstances. Records of activities must be retained to show that the
Responsible Entity followed the plan they created.
Rationale:
During development of this standard, text boxes were embedded within the standard to
explain the rationale for various parts of the standard. Upon BOT approval, the text from the
rationale text boxes was moved to this section.
Rationale for Requirement R1:
Ensures that Responsible Entities with personnel who have authorized electronic or
authorized unescorted physical access to BES Cyber Assets take action so that those
personnel with such authorized electronic or authorized unescorted physical access maintain
awareness of the Responsible Entity’s security practices.
Rationale for Requirement R2:
To ensure that the Responsible Entity’s training program for personnel who need authorized
electronic access and/or authorized unescorted physical access to BES Cyber Systems covers
the proper policies, access controls, and procedures to protect BES Cyber Systems and are
trained before access is authorized.
Rationale for Requirement R3:
To ensure that individuals who need authorized electronic or authorized unescorted physical
access to BES Cyber Systems have been assessed for risk. Whether initial access or
maintaining access, those with access must have had a personnel risk assessment completed
within the last 7 years.
Rationale for Requirement R4:
Final Draft
June 2021
Page 44 of 46
Guidelines and Technical Basis
To ensure that individuals with access to BES Cyber Systems and the physical and electronic
locations where BES Cyber System Information is stored by the Responsible Entity have been
properly authorized for such access. “Authorization” should be considered to be a grant of
permission by a person or persons empowered by the Responsible Entity to perform such
grants and included in the delegations referenced in CIP-003-6. “Provisioning” should be
considered the actions to provide access to an individual.
Access is physical, logical, and remote permissions granted to Cyber Assets composing the
BES Cyber System or allowing access to the BES Cyber System. When granting, reviewing, or
revoking access, the Responsible Entity must address the Cyber Asset specifically as well as
the systems used to enable such access (i.e., physical access control system, remote access
system, directory services).
CIP Exceptional Circumstances are defined in a Responsible Entity’s policy from CIP-003-6 and
allow an exception to the requirement for authorization to BES Cyber Systems and BES Cyber
System Information.
Quarterly reviews in Part 4.5 are to perform a validation that only authorized users have been
granted access to BES Cyber Systems. This is achieved by comparing individuals actually
provisioned to a BES Cyber System against records of individuals authorized to access the BES
Cyber System. The focus of this requirement is on the integrity of provisioning access rather
than individual accounts on all BES Cyber Assets. The list of provisioned individuals can be an
automatically generated account listing. However, in a BES Cyber System with several
account databases, the list of provisioned individuals may come from other records such as
provisioning workflow or a user account database where provisioning typically initiates.
If the results of quarterly or annual account reviews indicate an administrative or clerical
error in which access was not actually provisioned, then the SDT intends that the error should
not be considered a violation of this requirement.
For BES Cyber Systems that do not have user accounts defined, the controls listed in
Requirement R4 are not applicable. However, the Responsible Entity should document such
configurations.
Rationale for Requirement R5:
The timely revocation of electronic access to BES Cyber Systems is an essential element of an
access management regime. When an individual no longer requires access to a BES Cyber
System to perform his or her assigned functions, that access should be revoked. This is of
particular importance in situations where a change of assignment or employment is
involuntary, as there is a risk the individual(s) involved will react in a hostile or destructive
manner.
In considering how to address directives in FERC Order No. 706 directing “immediate”
revocation of access for involuntary separation, the SDT chose not to specify hourly time
parameters in the requirement (e.g., revoking access within 1 hour). The point in time at
which an organization terminates a person cannot generally be determined down to the
Final Draft
June 2021
Page 45 of 46
Guidelines and Technical Basis
hour. However, most organizations have formal termination processes, and the timeliest
revocation of access occurs in concurrence with the initial processes of termination.
Access is physical, logical, and remote permissions granted to Cyber Assets composing the
BES Cyber System or allowing access to the BES Cyber System. When granting, reviewing, or
revoking access, the Responsible Entity must address the Cyber Asset specifically as well as
the systems used to enable such access (e.g., physical access control system, remote access
system, directory services).
Final Draft
June 2021
Page 46 of 46
CIP-011-X — Cyber Security — Information Protection
Standard Development Timeline
This section is maintained by the drafting team during the development of the standard and will
be removed when the standard is adopted by the NERC Board of Trustees (Board).
Description of Current Draft
Completed Actions
Standards Committee approved Standard Authorization
Request (SAR) for posting
Date
March 22, 2019
SAR posted for comment
March 28, 2019 – April 26, 2019
45-day formal comment period with ballot
December 20, 2019 – February
3, 2020
45-day formal comment period with ballot
August 6– September 21, 2020
45-day formal comment period with ballot
March 25 – May 10, 2021
10-day final ballot
Anticipated Actions
Board adoption
Final Draft
June 21, 2021
June 2 – 11, 2021
Date
November 2021
Page 1 of 14
CIP-011-X — Cyber Security — Information Protection
A. Introduction
1. Title:
Cyber Security — Information Protection
2. Number: CIP-011-X
3. Purpose: To prevent unauthorized access to BES Cyber System Information (BCSI) by
specifying information protection requirements in support of protecting BES Cyber
Systems against compromise that could lead to misoperation or instability in the Bulk
Electric System (BES).
4. Applicability:
4.1. Functional Entities: For the purpose of the requirements contained herein, the
following list of functional entities will be collectively referred to as “Responsible
Entities.” For requirements in this standard where a specific functional entity or
subset of functional entities are the applicable entity or entities, the functional
entity or entities are specified explicitly.
4.1.1 Balancing Authority
4.1.2 Distribution Provider that owns one or more of the following Facilities,
systems, and equipment for the protection or restoration of the BES:
4.1.2.1 Each underfrequency Load shedding (UFLS) or undervoltage Load
shedding (UVLS) system that:
4.1.2.1.1 is part of a Load shedding program that is subject to
one or more requirements in a NERC or Regional
Reliability Standard; and
4.1.2.1.2 performs automatic Load shedding under a common
control system owned by the Responsible Entity,
without human operator initiation, of 300 MW or more.
4.1.2.2 Each Remedial Action Scheme (RAS) where the RAS is subject to
one or more requirements in a NERC or Regional Reliability
Standard.
4.1.2.3 Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or
more requirements in a NERC or Regional Reliability Standard.
4.1.2.4 Each Cranking Path and group of Elements meeting the initial
switching requirements from a Blackstart Resource up to and
including the first interconnection point of the starting station
service of the next generation unit(s) to be started.
4.1.3 Generator Operator
4.1.4 Generator Owner
4.1.5 Reliability Coordinator
Final Draft
June 21, 2021
Page 2 of 14
CIP-011-X — Cyber Security — Information Protection
4.1.6 Transmission Operator
4.1.7 Transmission Owner
4.2. Facilities: For the purpose of the requirements contained herein, the following
Facilities, systems, and equipment owned by each Responsible Entity in 4.1 above
are those to which these requirements are applicable. For requirements in this
standard where a specific type of Facilities, system, or equipment or subset of
Facilities, systems, and equipment are applicable, these are specified explicitly.
4.2.1 Distribution Provider: One or more of the following Facilities, systems and
equipment owned by the Distribution Provider for the protection or
restoration of the BES:
4.2.1.1 Each UFLS or UVLS System that:
4.2.1.1.1 is part of a Load shedding program that is subject to
one or more requirements in a NERC or Regional
Reliability Standard; and
4.2.1.1.2 performs automatic Load shedding under a common
control system owned by the Responsible Entity,
without human operator initiation, of 300 MW or more.
4.2.1.2 Each RAS where the RAS is subject to one or more requirements in
a NERC or Regional Reliability Standard.
4.2.1.3 Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or
more requirements in a NERC or Regional Reliability Standard.
4.2.1.4 Each Cranking Path and group of Elements meeting the initial
switching requirements from a Blackstart Resource up to and
including the first interconnection point of the starting station
service of the next generation unit(s) to be started.
4.2.2 Responsible Entities listed in 4.1 other than Distribution Providers:
All BES Facilities.
4.2.3 Exemptions: The following are exempt from Standard CIP-011-X:
4.2.3.1 Cyber Assets at Facilities regulated by the Canadian Nuclear Safety
Commission.
4.2.3.2 Cyber Assets associated with communication networks and data
communication links between discrete Electronic Security
Perimeters.
4.2.3.3 The systems, structures, and components that are regulated by the
Nuclear Regulatory Commission under a cyber security plan
pursuant to 10 C.F.R. Section 73.54.
Final Draft
June 21, 2021
Page 3 of 14
CIP-011-X — Cyber Security — Information Protection
4.2.3.4 For Distribution Providers, the systems and equipment that are not
included in section 4.2.1 above.
4.2.3.5 Responsible Entities that identify that they have no BES Cyber
Systems categorized as high impact or medium impact according to
the CIP-002-5.1a identification and categorization processes.
5. Effective Dates: See Implementation Plan for CIP-011-X.
6. Background: Standard CIP-011 exists as part of a suite of CIP Standards related to cyber
security, which require the initial identification and categorization of BES Cyber Systems
and require a minimum level of organizational, operational, and procedural controls to
mitigate risk to BES Cyber Systems.
Most requirements open with, “Each Responsible Entity shall implement one or more
documented [processes, plan, etc.] that include the applicable items in [Table
Reference].” The referenced table requires the applicable items in the procedures for
the requirement’s common subject matter.
The term documented processes refers to a set of required instructions specific to the
Responsible Entity and to achieve a specific outcome. This term does not imply any
particular naming or approval structure beyond what is stated in the requirements. An
entity should include as much as it believes necessary in its documented processes, but
it must address the applicable requirements in the table.
The terms program and plan are sometimes used in place of documented processes
where it makes sense and is commonly understood. For example, documented
processes describing a response are typically referred to as plans (i.e., incident response
plans and recovery plans). Likewise, a security plan can describe an approach involving
multiple procedures to address a broad subject matter.
Similarly, the term program may refer to the organization’s overall implementation of
its policies, plans and procedures involving a subject matter. Examples in the standards
include the personnel risk assessment program and the personnel training program.
The full implementation of the CIP Cyber Security Standards could also be referred to as
a program. However, the terms program and plan do not imply any additional
requirements beyond what is stated in the standards.
Responsible Entities can implement common controls that meet requirements for
multiple high and medium impact BES Cyber Systems. For example, a single training
program could meet the requirements for training personnel across multiple BES Cyber
Systems.
Measures for the initial requirement are simply the documented processes themselves.
Measures in the table rows provide examples of evidence to show documentation and
Final Draft
June 21, 2021
Page 4 of 14
CIP-011-X — Cyber Security — Information Protection
implementation of applicable items in the documented processes. These measures
serve to provide guidance to entities in acceptable records of compliance and should
not be viewed as an all-inclusive list.
Throughout the standards, unless otherwise stated, bulleted items in the requirements
and measures are items that are linked with an “or,” and numbered items are items that
are linked with an “and.”
Many references in the Applicability section use a threshold of 300 MW for UFLS and
UVLS. This particular threshold of 300 MW for UVLS and UFLS was provided in Version 1
of the CIP Cyber Security Standards. The threshold remains at 300 MW since it is
specifically addressing UVLS and UFLS, which are last ditch efforts to save the BES. A
review of UFLS tolerances defined within regional reliability standards for UFLS program
requirements to date indicates that the historical value of 300 MW represents an
adequate and reasonable threshold value for allowable UFLS operational tolerances.
“Applicable Systems” Columns in Tables:
Each table has an “Applicable Systems” column to further define the scope of systems
to which a specific requirement row applies. The CSO706 SDT adapted this concept
from the National Institute of Standards and Technology (“NIST”) Risk Management
Framework as a way of applying requirements more appropriately based on impact and
connectivity characteristics. The following conventions are used in the “Applicable
Systems” column as described.
•
High Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as
high impact according to the CIP-002-5.1a identification and categorization
processes.
•
Medium Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as
medium impact according to the CIP-002-5.1a identification and categorization
processes.
•
Electronic Access Control or Monitoring Systems (EACMS) – Applies to each
Electronic Access Control or Monitoring System associated with a referenced high
impact BES Cyber System or medium impact BES Cyber System. Examples may
include, but are not limited to, firewalls, authentication servers, and log
monitoring and alerting systems.
•
Physical Access Control Systems (PACS) – Applies to each Physical Access Control
System associated with a referenced high impact BES Cyber System or medium
impact BES Cyber System with External Routable Connectivity.
•
Protected Cyber Assets (PCA) – Applies to each Protected Cyber Asset associated
with a referenced high impact BES Cyber System or medium impact BES Cyber
System.
Final Draft
June 21, 2021
Page 5 of 14
CIP-011-X — Cyber Security — Information Protection
B. Requirements and Measures
R1. Each Responsible Entity shall implement one or more documented information protection program(s) for BES Cyber System
Information (BCSI) pertaining to “Applicable Systems” identified in CIP-011-X Table R1 – Information Protection Program
that collectively includes each of the applicable requirement parts in CIP-011-X Table R1 – Information Protection Program.
[Violation Risk Factor: Medium] [Time Horizon: Operations Planning].
M1. Evidence for the information protection program must include the applicable requirement parts in CIP-011-X Table R1 –
Information Protection Program and additional evidence to demonstrate implementation as described in the Measures
column of the table.
CIP-011-X Table R1 – Information Protection Program
Part
1.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
and their associated:
1. EACMS; and
Requirements
Method(s) to identify BCSI.
Measures
Examples of acceptable evidence may
include, but are not limited to, the
following:
•
Documented method(s) to identify
BCSI from the entity’s information
protection program; or
•
Indications on information (e.g.,
labels or classification) that identify
BCSI as designated in the entity’s
information protection program; or
•
Training materials that provide
personnel with sufficient
knowledge to identify BCSI; or
•
Storage locations identified for
housing BCSI in the entity’s
information protection program.
2. PACS
Final Draft
June 2021
Page 6 of 14
CIP-011-X — Cyber Security — Information Protection
CIP-011-X Table R1 – Information Protection Program
Part
1.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Requirements
Method(s) to protect and securely
handle BCSI to mitigate risks of
compromising confidentiality.
Measures
Examples of evidence for on-premise
BCSI may include, but are not limited
to, the following:
•
Medium Impact BES Cyber Systems
and their associated:
1. EACMS; and
2. PACS
•
Procedures for protecting and
securely handling, which
include topics such as storage,
security during transit, and use
of BCSI; or
Records indicating that BCSI is
handled in a manner consistent
with the entity’s documented
procedure(s).
Examples of evidence for off-premise
BCSI may include, but are not limited
to, the following:
Final Draft
June 2021
•
Implementation of electronic
technical method(s) to protect
electronic BCSI (e.g., data
masking, encryption, hashing,
tokenization, cipher, electronic
key management); or
•
Implementation of physical
technical method(s) to protect
physical BCSI (e.g., physical lock
and key management, physical
badge management,
biometrics, alarm system); or
Page 7 of 14
CIP-011-X — Cyber Security — Information Protection
CIP-011-X Table R1 – Information Protection Program
Part
Applicable Systems
Requirements
Measures
•
Final Draft
June 2021
Implementation of
administrative method(s) to
protect BCSI (e.g., vendor
service risk assessments,
business agreements).
Page 8 of 14
CIP-011-X — Cyber Security — Information Protection
R2.
Each Responsible Entity shall implement one or more documented process(es) that collectively include the applicable
requirement parts in CIP-011-X Table R2 – BES Cyber Asset Reuse and Disposal. [Violation Risk Factor: Lower] [Time Horizon:
Operations Planning].
M2. Evidence must include each of the applicable documented processes that collectively include each of the applicable
requirement parts in CIP-011-X Table R2 – BES Cyber Asset Reuse and Disposal and additional evidence to demonstrate
implementation as described in the Measures column of the table.
CIP-011-X Table R2 – BES Cyber Asset Reuse and Disposal
Part
2.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS;
2. PACS; and
3. PCA
Medium Impact BES Cyber Systems
and their associated:
1. EACMS;
2. PACS; and
3. PCA
Final Draft
June 2021
Requirements
Prior to the release for reuse of
applicable Cyber Assets that contain
BCSI (except for reuse within other
systems identified in the “Applicable
Systems” column), the Responsible
Entity shall take action to prevent the
unauthorized retrieval of BCSI from
the Cyber Asset data storage media.
Measures
Examples of acceptable evidence may
include, but are not limited to, the
following:
•
Records tracking sanitization actions
taken to prevent unauthorized
retrieval of BCSI such as clearing,
purging, or destroying; or
•
Records tracking actions such as
encrypting, retaining in the Physical
Security Perimeter or other methods
used to prevent unauthorized
retrieval of BCSI.
Page 9 of 14
CIP-011-X — Cyber Security — Information Protection
CIP-011-X Table R2 – BES Cyber Asset Reuse and Disposal
Part
2.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS;
2. PACS; and
3. PCA
Medium Impact BES Cyber Systems
and their associated:
1. EACMS;
2. PACS; and
Requirements
Measures
Prior to the disposal of applicable
Examples of acceptable evidence may
Cyber Assets that contain BCSI, the
include, but are not limited to, the
Responsible Entity shall take action to following:
prevent the unauthorized retrieval of
• Records that indicate that data
BCSI from the Cyber Asset or destroy
storage media was destroyed
the data storage media.
prior to the disposal of an
applicable Cyber Asset; or
•
Records of actions taken to
prevent unauthorized retrieval of
BCSI prior to the disposal of an
applicable Cyber Asset.
3. PCA
Final Draft
June 2021
Page 10 of 14
CIP-011-X — Cyber Security — Information Protection
B. Compliance
1.
Compliance Monitoring Process:
1.1. Compliance Enforcement Authority: “Compliance Enforcement Authority” (CEA)
means NERC or the Regional Entity, or any entity as otherwise designated by an
Applicable Governmental Authority, in their respective roles of monitoring and/or
enforcing compliance with mandatory and enforceable Reliability Standards in
their respective jurisdictions.
1.2. Evidence Retention: The following evidence retention period(s) identify the period
of time an entity is required to retain specific evidence to demonstrate
compliance. For instances where the evidence retention period specified below is
shorter than the time since the last audit, the CEA may ask an entity to provide
other evidence to show that it was compliant for the full time period since the last
audit.
The applicable entity shall keep data or evidence to show compliance as identified
below unless directed by its CEA to retain specific evidence for a longer period of
time as part of an investigation:
•
The applicable entity shall retain evidence of each requirement in this standard
for three calendar years.
•
If an applicable entity is found non-compliant, it shall keep information related
to the non-compliance until mitigation is complete and approved or for the
time specified above, whichever is longer.
•
The CEA shall keep the last audit records and all requested and submitted
subsequent audit records.
1.3. Compliance Monitoring and Enforcement Program: As defined in the NERC Rules
of Procedure, “Compliance Monitoring and Enforcement Program” refers to the
identification of the processes that will be used to evaluate data or information for
the purpose of assessing performance or outcomes with the associated Reliability
Standard.
Final Draft
June 2021
Page 11 of 14
CIP-011-X — Cyber Security — Information Protection
Violation Severity Levels
R#
R1
Time
Horizon
Operations
Planning
Violation Severity Levels (CIP-011-X)
VRF
Medium
Lower VSL
N/A
Moderate VSL
N/A
High VSL
Severe VSL
The Responsible
Entity documented,
but did not,
implement one or
more BCSI protection
program(s). (R1)
The Responsible
Entity neither
documented nor
implemented one or
more BCSI protection
program(s). (R1)
OR
The Responsible
Entity documented
but did not
implement at least
one method to
identify BCSI. (1.1)
OR
The Responsible
Entity documented
but did not
implement at least
one method to
protect and securely
handle BCSI. (1.2)
R2
Final Draft
June 2021
Operations
Planning
Lower
N/A
The Responsible
Entity implemented
one or more
documented
The Responsible
Entity implemented
one or more
documented
The Responsible
Entity has not
documented or
implemented any
Page 12 of 14
CIP-011-X — Cyber Security — Information Protection
R#
Final Draft
June 2021
Time
Horizon
VRF
Violation Severity Levels (CIP-011-X)
Lower VSL
Moderate VSL
High VSL
Severe VSL
processes but did
not include
processes for reuse
as to prevent the
unauthorized
retrieval of BCSI
from the BES Cyber
Asset. (2.1)
processes but did
not include disposal
or media destruction
processes to prevent
the unauthorized
retrieval of BCSI
from the BES Cyber
Asset. (2.2)
processes for
applicable
requirement parts in
CIP-011-X Table R3 –
BES Cyber Asset
Reuse and Disposal.
(R2)
Page 13 of 14
CIP-011-X — Cyber Security — Information Protection
C. Regional Variances
None.
D. Interpretations
None.
E. Associated Documents
Version History
Version
Date
1
11/26/12
Adopted by the NERC Board of
Trustees.
1
11/22/13
FERC Order issued approving CIP011-1. (Order becomes effective
on 2/3/14.)
2
11/13/14
Adopted by the NERC Board of
Trustees.
Addressed two FERC directives
from Order No. 791 related to
identify, assess, and correct
language and communication
networks.
2
2/12/15
Adopted by the NERC Board of
Trustees.
Replaces the version adopted
by the Board on 11/13/2014.
Revised version addresses
remaining directives from
Order No. 791 related to
transient devices and low
impact BES Cyber Systems.
2
1/21/16
FERC Order issued approving CIP011-2. Docket No. RM15-14-000
3
TBD
Final Draft
June 2021
Action
Adopted by the NERC Board of
Trustees
Change Tracking
Developed to define the
information protection
requirements in coordination
with other CIP standards and
to address the balance of the
FERC directives in its Order
706.
Revised to enhance BES
reliability for entities to
manage their BCSI.
Page 14 of 14
CIP-011-X — Cyber Security — Information Protection
Standard Development Timeline
This section is maintained by the drafting team during the development of the standard and will
be removed when the standard is adopted by the NERC Board of Trustees (Board).
Description of Current Draft
Completed Actions
Standards Committee approved Standard Authorization
Request (SAR) for posting
Date
March 22, 2019
SAR posted for comment
March 28, 2019 – April 26, 2019
45-day formal comment period with ballot
December 20, 2019 – February
3, 2020
45-day formal comment period with ballot
August 6– September 21, 2020
45-day formal comment period with ballot
March 25 – May 10, 2021
10-day final ballot
Anticipated Actions
10-day final ballot
Board adoption
Final Draft 3
March June 2021
June 2 – 11, 2021
Date
May 2021
November 2021
Page 1 of 14
CIP-011-X — Cyber Security — Information Protection
A. Introduction
1. Title:
Cyber Security — Information Protection
2. Number: CIP-011-X
3. Purpose: To prevent unauthorized access to BES Cyber System Information (BCSI) by
specifying information protection requirements in support of protecting BES Cyber
Systems against compromise that could lead to misoperation or instability in the Bulk
Electric System (BES).
4. Applicability:
4.1. Functional Entities: For the purpose of the requirements contained herein, the
following list of functional entities will be collectively referred to as “Responsible
Entities.” For requirements in this standard where a specific functional entity or
subset of functional entities are the applicable entity or entities, the functional
entity or entities are specified explicitly.
4.1.1 Balancing Authority
4.1.2 Distribution Provider that owns one or more of the following Facilities,
systems, and equipment for the protection or restoration of the BES:
4.1.2.1 Each underfrequency Load shedding (UFLS) or undervoltage Load
shedding (UVLS) system that:
4.1.2.1.1 is part of a Load shedding program that is subject to
one or more requirements in a NERC or Regional
Reliability Standard; and
4.1.2.1.2 performs automatic Load shedding under a common
control system owned by the Responsible Entity,
without human operator initiation, of 300 MW or more.
4.1.2.2 Each Remedial Action Scheme (RAS) where the RAS is subject to
one or more requirements in a NERC or Regional Reliability
Standard.
4.1.2.3 Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or
more requirements in a NERC or Regional Reliability Standard.
4.1.2.4 Each Cranking Path and group of Elements meeting the initial
switching requirements from a Blackstart Resource up to and
including the first interconnection point of the starting station
service of the next generation unit(s) to be started.
4.1.3 Generator Operator
4.1.4 Generator Owner
4.1.5 Reliability Coordinator
Final Draft 3
March June 2021
Page 2 of 14
CIP-011-X — Cyber Security — Information Protection
4.1.6 Transmission Operator
4.1.7 Transmission Owner
4.2. Facilities: For the purpose of the requirements contained herein, the following
Facilities, systems, and equipment owned by each Responsible Entity in 4.1 above
are those to which these requirements are applicable. For requirements in this
standard where a specific type of Facilities, system, or equipment or subset of
Facilities, systems, and equipment are applicable, these are specified explicitly.
4.2.1 Distribution Provider: One or more of the following Facilities, systems and
equipment owned by the Distribution Provider for the protection or
restoration of the BES:
4.2.1.1 Each UFLS or UVLS System that:
4.2.1.1.1 is part of a Load shedding program that is subject to
one or more requirements in a NERC or Regional
Reliability Standard; and
4.2.1.1.2 performs automatic Load shedding under a common
control system owned by the Responsible Entity,
without human operator initiation, of 300 MW or more.
4.2.1.2 Each RAS where the RAS is subject to one or more requirements in
a NERC or Regional Reliability Standard.
4.2.1.3 Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or
more requirements in a NERC or Regional Reliability Standard.
4.2.1.4 Each Cranking Path and group of Elements meeting the initial
switching requirements from a Blackstart Resource up to and
including the first interconnection point of the starting station
service of the next generation unit(s) to be started.
4.2.2 Responsible Entities listed in 4.1 other than Distribution Providers:
All BES Facilities.
4.2.3 Exemptions: The following are exempt from Standard CIP-011-X:
4.2.3.1 Cyber Assets at Facilities regulated by the Canadian Nuclear Safety
Commission.
4.2.3.2 Cyber Assets associated with communication networks and data
communication links between discrete Electronic Security
Perimeters.
4.2.3.3 The systems, structures, and components that are regulated by the
Nuclear Regulatory Commission under a cyber security plan
pursuant to 10 C.F.R. Section 73.54.
Final Draft 3
March June 2021
Page 3 of 14
CIP-011-X — Cyber Security — Information Protection
4.2.3.4 For Distribution Providers, the systems and equipment that are not
included in section 4.2.1 above.
4.2.3.5 Responsible Entities that identify that they have no BES Cyber
Systems categorized as high impact or medium impact according to
the CIP-002-5.1a identification and categorization processes.
5. Effective Dates: See Implementation Plan for CIP-011-X.
6. Background: Standard CIP-011 exists as part of a suite of CIP Standards related to cyber
security, which require the initial identification and categorization of BES Cyber Systems
and require a minimum level of organizational, operational, and procedural controls to
mitigate risk to BES Cyber Systems.
Most requirements open with, “Each Responsible Entity shall implement one or more
documented [processes, plan, etc.] that include the applicable items in [Table
Reference].” The referenced table requires the applicable items in the procedures for
the requirement’s common subject matter.
The term documented processes refers to a set of required instructions specific to the
Responsible Entity and to achieve a specific outcome. This term does not imply any
particular naming or approval structure beyond what is stated in the requirements. An
entity should include as much as it believes necessary in its documented processes, but
it must address the applicable requirements in the table.
The terms program and plan are sometimes used in place of documented processes
where it makes sense and is commonly understood. For example, documented
processes describing a response are typically referred to as plans (i.e., incident response
plans and recovery plans). Likewise, a security plan can describe an approach involving
multiple procedures to address a broad subject matter.
Similarly, the term program may refer to the organization’s overall implementation of
its policies, plans and procedures involving a subject matter. Examples in the standards
include the personnel risk assessment program and the personnel training program.
The full implementation of the CIP Cyber Security Standards could also be referred to as
a program. However, the terms program and plan do not imply any additional
requirements beyond what is stated in the standards.
Responsible Entities can implement common controls that meet requirements for
multiple high and medium impact BES Cyber Systems. For example, a single training
program could meet the requirements for training personnel across multiple BES Cyber
Systems.
Measures for the initial requirement are simply the documented processes themselves.
Measures in the table rows provide examples of evidence to show documentation and
Final Draft 3
March June 2021
Page 4 of 14
CIP-011-X — Cyber Security — Information Protection
implementation of applicable items in the documented processes. These measures
serve to provide guidance to entities in acceptable records of compliance and should
not be viewed as an all-inclusive list.
Throughout the standards, unless otherwise stated, bulleted items in the requirements
and measures are items that are linked with an “or,” and numbered items are items that
are linked with an “and.”
Many references in the Applicability section use a threshold of 300 MW for UFLS and
UVLS. This particular threshold of 300 MW for UVLS and UFLS was provided in Version 1
of the CIP Cyber Security Standards. The threshold remains at 300 MW since it is
specifically addressing UVLS and UFLS, which are last ditch efforts to save the BES. A
review of UFLS tolerances defined within regional reliability standards for UFLS program
requirements to date indicates that the historical value of 300 MW represents an
adequate and reasonable threshold value for allowable UFLS operational tolerances.
“Applicable Systems” Columns in Tables:
Each table has an “Applicable Systems” column to further define the scope of systems
to which a specific requirement row applies. The CSO706 SDT adapted this concept
from the National Institute of Standards and Technology (“NIST”) Risk Management
Framework as a way of applying requirements more appropriately based on impact and
connectivity characteristics. The following conventions are used in the “Applicable
Systems” column as described.
•
High Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as
high impact according to the CIP-002-5.1a identification and categorization
processes.
•
Medium Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as
medium impact according to the CIP-002-5.1a identification and categorization
processes.
•
Electronic Access Control or Monitoring Systems (EACMS) – Applies to each
Electronic Access Control or Monitoring System associated with a referenced high
impact BES Cyber System or medium impact BES Cyber System. Examples may
include, but are not limited to, firewalls, authentication servers, and log
monitoring and alerting systems.
•
Physical Access Control Systems (PACS) – Applies to each Physical Access Control
System associated with a referenced high impact BES Cyber System or medium
impact BES Cyber System with External Routable Connectivity.
•
Protected Cyber Assets (PCA) – Applies to each Protected Cyber Asset associated
with a referenced high impact BES Cyber System or medium impact BES Cyber
System.
Final Draft 3
March June 2021
Page 5 of 14
CIP-011-X — Cyber Security — Information Protection
B. Requirements and Measures
R1. Each Responsible Entity shall implement one or more documented information protection program(s) for BES Cyber System
Information (BCSI) pertaining to “Applicable Systems” identified in CIP-011-X Table R1 – Information Protection Program
that collectively includes each of the applicable requirement parts in CIP-011-X Table R1 – Information Protection Program.
[Violation Risk Factor: Medium] [Time Horizon: Operations Planning].
M1. Evidence for the information protection program must include the applicable requirement parts in CIP-011-X Table R1 –
Information Protection Program and additional evidence to demonstrate implementation as described in the Measures
column of the table.
CIP-011-X Table R1 – Information Protection Program
Part
1.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
and their associated:
1. EACMS; and
Requirements
Method(s) to identify BCSI.
Measures
Examples of acceptable evidence may
include, but are not limited to, the
following:
•
Documented method(s) to identify
BCSI from the entity’s information
protection program; or
•
Indications on information (e.g.,
labels or classification) that identify
BCSI as designated in the entity’s
information protection program; or
•
Training materials that provide
personnel with sufficient
knowledge to identify BCSI; or
•
Storage locations identified for
housing BCSI in the entity’s
information protection program.
2. PACS
Final Draft 3
March June 2021
Page 6 of 14
CIP-011-X — Cyber Security — Information Protection
CIP-011-X Table R1 – Information Protection Program
Part
1.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Requirements
Method(s) to protect and securely
handle BCSI to mitigate risks of
compromising confidentiality.
Measures
Examples of evidence for on-premise
BCSI may include, but are not limited
to, the following:
•
Medium Impact BES Cyber Systems
and their associated:
1. EACMS; and
2. PACS
•
Procedures for protecting and
securely handling, which
include topics such as storage,
security during transit, and use
of BCSI; or
Records indicating that BCSI is
handled in a manner consistent
with the entity’s documented
procedure(s).
Examples of evidence for off-premise
BCSI may include, but are not limited
to, the following:
Final Draft 3
March June 2021
•
Implementation of electronic
technical method(s) to protect
electronic BCSI (e.g., data
masking, encryption, hashing,
tokenization, cipher, electronic
key management); or
•
Implementation of physical
technical method(s) to protect
physical BCSI (e.g., physical lock
and key management, physical
badge management,
biometrics, alarm system); or
Page 7 of 14
CIP-011-X — Cyber Security — Information Protection
CIP-011-X Table R1 – Information Protection Program
Part
Applicable Systems
Requirements
Measures
•
Final Draft 3
March June 2021
Implementation of
administrative method(s) to
protect BCSI (e.g., vendor
service risk assessments,
business agreements).
Page 8 of 14
CIP-011-X — Cyber Security — Information Protection
R2.
Each Responsible Entity shall implement one or more documented process(es) that collectively include the applicable
requirement parts in CIP-011-X Table R2 – BES Cyber Asset Reuse and Disposal. [Violation Risk Factor: Lower] [Time Horizon:
Operations Planning].
M2. Evidence must include each of the applicable documented processes that collectively include each of the applicable
requirement parts in CIP-011-X Table R2 – BES Cyber Asset Reuse and Disposal and additional evidence to demonstrate
implementation as described in the Measures column of the table.
CIP-011-X Table R2 – BES Cyber Asset Reuse and Disposal
Part
2.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS;
2. PACS; and
3. PCA
Medium Impact BES Cyber Systems
and their associated:
1. EACMS;
2. PACS; and
3. PCA
Final Draft 3
March June 2021
Requirements
Prior to the release for reuse of
applicable Cyber Assets that contain
BCSI (except for reuse within other
systems identified in the “Applicable
Systems” column), the Responsible
Entity shall take action to prevent the
unauthorized retrieval of BCSI from
the Cyber Asset data storage media.
Measures
Examples of acceptable evidence may
include, but are not limited to, the
following:
•
Records tracking sanitization actions
taken to prevent unauthorized
retrieval of BCSI such as clearing,
purging, or destroying; or
•
Records tracking actions such as
encrypting, retaining in the Physical
Security Perimeter or other methods
used to prevent unauthorized
retrieval of BCSI.
Page 9 of 14
CIP-011-X — Cyber Security — Information Protection
CIP-011-X Table R2 – BES Cyber Asset Reuse and Disposal
Part
2.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS;
2. PACS; and
3. PCA
Medium Impact BES Cyber Systems
and their associated:
1. EACMS;
2. PACS; and
Requirements
Measures
Prior to the disposal of applicable
Examples of acceptable evidence may
Cyber Assets that contain BCSI, the
include, but are not limited to, the
Responsible Entity shall take action to following:
prevent the unauthorized retrieval of
• Records that indicate that data
BCSI from the Cyber Asset or destroy
storage media was destroyed
the data storage media.
prior to the disposal of an
applicable Cyber Asset; or
•
Records of actions taken to
prevent unauthorized retrieval of
BCSI prior to the disposal of an
applicable Cyber Asset.
3. PCA
Final Draft 3
March June 2021
Page 10 of 14
CIP-011-X — Cyber Security — Information Protection
B. Compliance
1.
Compliance Monitoring Process:
1.1. Compliance Enforcement Authority: “Compliance Enforcement Authority” (CEA)
means NERC or the Regional Entity, or any entity as otherwise designated by an
Applicable Governmental Authority, in their respective roles of monitoring and/or
enforcing compliance with mandatory and enforceable Reliability Standards in
their respective jurisdictions.
1.2. Evidence Retention: The following evidence retention period(s) identify the period
of time an entity is required to retain specific evidence to demonstrate
compliance. For instances where the evidence retention period specified below is
shorter than the time since the last audit, the CEA may ask an entity to provide
other evidence to show that it was compliant for the full time period since the last
audit.
The applicable entity shall keep data or evidence to show compliance as identified
below unless directed by its CEA to retain specific evidence for a longer period of
time as part of an investigation:
•
The applicable entity shall retain evidence of each requirement in this standard
for three calendar years.
•
If an applicable entity is found non-compliant, it shall keep information related
to the non-compliance until mitigation is complete and approved or for the
time specified above, whichever is longer.
•
The CEA shall keep the last audit records and all requested and submitted
subsequent audit records.
1.3. Compliance Monitoring and Enforcement Program: As defined in the NERC Rules
of Procedure, “Compliance Monitoring and Enforcement Program” refers to the
identification of the processes that will be used to evaluate data or information for
the purpose of assessing performance or outcomes with the associated Reliability
Standard.
Final Draft 3
March June 2021
Page 11 of 14
CIP-011-X — Cyber Security — Information Protection
Violation Severity Levels
R#
R1
Time
Horizon
Operations
Planning
Violation Severity Levels (CIP-011-X)
VRF
Medium
Lower VSL
N/A
Moderate VSL
N/A
High VSL
Severe VSL
The Responsible
Entity documented,
but did not,
implement one or
more BCSI protection
program(s). (R1)
The Responsible
Entity neither
documented nor
implemented one or
more BCSI protection
program(s). (R1)
OR
The Responsible
Entity documented
but did not
implement at least
one method to
identify BCSI. (1.1)
OR
The Responsible
Entity documented
but did not
implement at least
one method to
protect and securely
handle BCSI. (1.2)
R2
Operations
Planning
Final Draft 3
March June 2021
Lower
N/A
The Responsible
Entity implemented
one or more
documented
The Responsible
Entity implemented
one or more
documented
The Responsible
Entity has not
documented or
implemented any
Page 12 of 14
CIP-011-X — Cyber Security — Information Protection
R#
Time
Horizon
Final Draft 3
March June 2021
VRF
Violation Severity Levels (CIP-011-X)
Lower VSL
Moderate VSL
High VSL
Severe VSL
processes but did
not include
processes for reuse
as to prevent the
unauthorized
retrieval of BCSI
from the BES Cyber
Asset. (2.1)
processes but did
not include disposal
or media destruction
processes to prevent
the unauthorized
retrieval of BCSI
from the BES Cyber
Asset. (2.2)
processes for
applicable
requirement parts in
CIP-011-X Table R3 –
BES Cyber Asset
Reuse and Disposal.
(R2)
Page 13 of 14
CIP-011-X — Cyber Security — Information Protection
C. Regional Variances
None.
D. Interpretations
None.
E. Associated Documents
Version History
Version
Date
1
11/26/12
Adopted by the NERC Board of
Trustees.
1
11/22/13
FERC Order issued approving CIP011-1. (Order becomes effective
on 2/3/14.)
2
11/13/14
Adopted by the NERC Board of
Trustees.
Addressed two FERC directives
from Order No. 791 related to
identify, assess, and correct
language and communication
networks.
2
2/12/15
Adopted by the NERC Board of
Trustees.
Replaces the version adopted
by the Board on 11/13/2014.
Revised version addresses
remaining directives from
Order No. 791 related to
transient devices and low
impact BES Cyber Systems.
2
1/21/16
FERC Order issued approving CIP011-2. Docket No. RM15-14-000
3
TBD
Final Draft 3
March June 2021
Action
Adopted by the NERC Board of
Trustees
Change Tracking
Developed to define the
information protection
requirements in coordination
with other CIP standards and
to address the balance of the
FERC directives in its Order
706.
Revised to enhance BES
reliability for entities to
manage their BCSI.
Page 14 of 14
CIP-011-2X — Cyber Security — Information Protection
Standard Development Timeline
This section is maintained by the drafting team during the development of the standard and will
be removed when the standard is adopted by the NERC Board of Trustees (Board).
Description of Current Draft
Completed Actions
Standards Committee approved Standard Authorization Request
(SAR) for posting
SAR posted for comment
Date
March 22, 2019
March 28, 2019 –
April 26, 2019
45-day formal comment period with ballot
December 20, 2019
– February 3, 2020
45-day formal comment period with ballot
August 6–
September 21, 2020
45-day formal comment period with ballot
March 25 – May 10,
2021
10-day final ballot
June 2-11,2021
Anticipated Actions
Board adoption
Draft 3
March 2021
Date
November 2021
Page 1 of 20
CIP-011-2X — Cyber Security — Information Protection
A. Introduction
1.
Title:
Cyber Security — Information Protection
2.
Number:
CIP-011-X2
3.
Purpose:
To prevent unauthorized access to BES Cyber System Information (BCSI)
by specifying information protection requirements in support of
protecting BES Cyber Systems against compromise that could lead to
misoperation or instability in the Bulk Electric System (BES).
4.
Applicability:
4.1. Functional Entities: For the purpose of the requirements contained herein, the
following list of functional entities will be collectively referred to as “Responsible
Entities.” For requirements in this standard where a specific functional entity or
subset of functional entities are the applicable entity or entities, the functional entity
or entities are specified explicitly.
4.1.1 Balancing Authority
4.1.2 Distribution Provider that owns one or more of the following Facilities, systems,
and equipment for the protection or restoration of the BES:
4.1.2.1 Each underfrequency Load shedding (UFLS) or undervoltage Load shedding
(UVLS) system that:
4.1.2.1.1 is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.1.2.1.2 performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation,
of 300 MW or more.
4.1.2.2 Each Special Protection System (SPS) or Remedial Action Scheme (RAS)
where the SPS or RAS is subject to one or more requirements in a NERC or
Regional Reliability Standard.
4.1.2.3 Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.1.2.4 Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.1.3 Generator Operator
4.1.4 Generator Owner
4.1.5 Interchange Coordinator or Interchange Authority
4.1.64.1.5
Draft 3
March 2021
Reliability Coordinator
Page 2 of 20
CIP-011-2X — Cyber Security — Information Protection
4.1.74.1.6
Transmission Operator
4.1.84.1.7
Transmission Owner
4.2.
Facilities: For the purpose of the requirements contained herein, the following
Facilities, systems, and equipment owned by each Responsible Entity in 4.1 above
are those to which these requirements are applicable. For requirements in this
standard where a specific type of Facilities, system, or equipment or subset of
Facilities, systems, and equipment are applicable, these are specified explicitly.
4.2.1 Distribution Provider: One or more of the following Facilities, systems and
equipment owned by the Distribution Provider for the protection or restoration
of the BES:
4.2.1.1 Each UFLS or UVLS System that:
4.2.1.1.1 is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.2.1.1.2 performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation,
of 300 MW or more.
4.2.1.2 Each SPS or RAS where the SPS or RAS is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.2.1.3 Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.2.1.4 Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.2.2 Responsible Entities listed in 4.1 other than Distribution Providers:
All BES Facilities.
4.2.3 Exemptions: The following are exempt from Standard CIP-011-X2:
4.2.3.1 Cyber Assets at Facilities regulated by the Canadian Nuclear Safety
Commission.
4.2.3.2 Cyber Assets associated with communication networks and data
communication links between discrete Electronic Security Perimeters.
4.2.3.3 The systems, structures, and components that are regulated by the Nuclear
Regulatory Commission under a cyber security plan pursuant to 10 C.F.R.
Section 73.54.
4.2.3.4 For Distribution Providers, the systems and equipment that are not included
in section 4.2.1 above.
Draft 3
March 2021
Page 3 of 20
CIP-011-2X — Cyber Security — Information Protection
4.2.3.5 Responsible Entities that identify that they have no BES Cyber Systems
categorized as high impact or medium impact according to the CIP-002-5.1a
identification and categorization processes.
5.
Effective Dates: See Implementation Plan for CIP-011-X2.
6.
Background:
Standard CIP-011 exists as part of a suite of CIP Standards related to cyber security,
which require the initial identification and categorization of BES Cyber Systems and
require a minimum level of organizational, operational, and procedural controls to
mitigate risk to BES Cyber Systems.
Most requirements open with, “Each Responsible Entity shall implement one or more
documented [processes, plan, etc.] that include the applicable items in [Table
Reference].” The referenced table requires the applicable items in the procedures for
the requirement’s common subject matter.
The term documented processes refers to a set of required instructions specific to the
Responsible Entity and to achieve a specific outcome. This term does not imply any
particular naming or approval structure beyond what is stated in the requirements.
An entity should include as much as it believes necessary in its documented processes,
but it must address the applicable requirements in the table.
The terms program and plan are sometimes used in place of documented processes
where it makes sense and is commonly understood. For example, documented
processes describing a response are typically referred to as plans (i.e., incident
response plans and recovery plans). Likewise, a security plan can describe an
approach involving multiple procedures to address a broad subject matter.
Similarly, the term program may refer to the organization’s overall implementation of
its policies, plans and procedures involving a subject matter. Examples in the
standards include the personnel risk assessment program and the personnel training
program. The full implementation of the CIP Cyber Security Standards could also be
referred to as a program. However, the terms program and plan do not imply any
additional requirements beyond what is stated in the standards.
Responsible Entities can implement common controls that meet requirements for
multiple high and medium impact BES Cyber Systems. For example, a single training
program could meet the requirements for training personnel across multiple BES
Cyber Systems.
Measures for the initial requirement are simply the documented processes
themselves. Measures in the table rows provide examples of evidence to show
documentation and implementation of applicable items in the documented processes.
These measures serve to provide guidance to entities in acceptable records of
compliance and should not be viewed as an all-inclusive list.
Draft 3
March 2021
Page 4 of 20
CIP-011-2X — Cyber Security — Information Protection
Throughout the standards, unless otherwise stated, bulleted items in the
requirements and measures are items that are linked with an “or,” and numbered
items are items that are linked with an “and.”
Many references in the Applicability section use a threshold of 300 MW for UFLS and
UVLS. This particular threshold of 300 MW for UVLS and UFLS was provided in Version
1 of the CIP Cyber Security Standards. The threshold remains at 300 MW since it is
specifically addressing UVLS and UFLS, which are last ditch efforts to save the BES. A
review of UFLS tolerances defined within regional reliability standards for UFLS
program requirements to date indicates that the historical value of 300 MW
represents an adequate and reasonable threshold value for allowable UFLS
operational tolerances.
“Applicable Systems” Columns in Tables:
Each table has an “Applicable Systems” column to further define the scope of systems
to which a specific requirement row applies. The CSO706 SDT adapted this concept
from the National Institute of Standards and Technology (“NIST”) Risk Management
Framework as a way of applying requirements more appropriately based on impact
and connectivity characteristics. The following conventions are used in the
“Applicable Systems” column as described.
Draft 3
March 2021
•
High Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as
high impact according to the CIP-002-5.1a identification and categorization
processes.
•
Medium Impact BES Cyber Systems – Applies to BES Cyber Systems categorized
as medium impact according to the CIP-002-5.1a identification and
categorization processes.
•
Electronic Access Control or Monitoring Systems (EACMS) – Applies to each
Electronic Access Control or Monitoring System associated with a referenced
high impact BES Cyber System or medium impact BES Cyber System. Examples
may include, but are not limited to, firewalls, authentication servers, and log
monitoring and alerting systems.
•
Physical Access Control Systems (PACS) – Applies to each Physical Access
Control System associated with a referenced high impact BES Cyber System or
medium impact BES Cyber System with External Routable Connectivity.
•
Protected Cyber Assets (PCA) – Applies to each Protected Cyber Asset
associated with a referenced high impact BES Cyber System or medium impact
BES Cyber System.
Page 5 of 20
CIP-011-2X — Cyber Security — Information Protection
B. Requirements and Measures
R1. Each Responsible Entity shall implement one or more documented information protection program(s) for BES Cyber System
Information (BCSI) pertaining to “Applicable Systems” identified in CIP-011-X Table R1 – Information Protection Program
that collectively includes each of the applicable requirement parts in CIP-011-X2 Table R1 – Information Protection
Program. [Violation Risk Factor: Medium] [Time Horizon: Operations Planning].
M1. Evidence for the information protection program must include the applicable requirement parts in CIP-011-X2 Table R1 –
Information Protection Program and additional evidence to demonstrate implementation as described in the Measures
column of the table.
Final Draft
June 2021
Page 6 of 20
CIP-011-2X — Cyber Security — Information Protection
CIP-011-X2 Table R1 – Information Protection Program
Part
1.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
and their associated:
1. EACMS; and
Requirements
Method(s) to identify information that
meets the definition of BES Cyber
sytem Information BCSI.
Measures
Examples of acceptable evidence may
include, but are not limited to, the
following:
•
Documented method(s) to identify
BES Cyber System Information BCSI
from the entity’s information
protection program; or
•
Indications on information (e.g.,
labels or classification) that identify
BES Cyber System Information BCSI
as designated in the entity’s
information protection program; or
•
Training materials that provide
personnel with sufficient
knowledge to identify BES Cyber
System Information BCSI; or
•
Repository or electronic and
physical location designated for
housing BES Cyber System
Information in the entity’s
information protection program.
•
Storage locations identified for
housing BCSI in the entity’s
information protection program.
2. PACS
Final Draft
June 2021
Page 7 of 20
CIP-011-2X — Cyber Security — Information Protection
CIP-011-X2 Table R1 – Information Protection Program
Part
1.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Requirements
Procedure(s) for protecting
andMethod(s) to protect and
securely handleing BES Cyber System
InformationBCSI, including storage,
transit, and useto mitigate risks of
compromising confidentiality.
Measures
Examples of acceptable evidence for
on-premise BCSI may include, but are
not limited to, the following:
•
Medium Impact BES Cyber Systems
and their associated:
1. EACMS; and
2. PACS
•
Procedures for protecting and
securely handling BCSI, which
include topics such as storage,
security during transit, and use
of BES Cyber System
information; or
Records indicating that BES
Cyber System Information BCSI
is handled in a manner
consistent with the entity’s
documented procedure(s).
Examples of evidence for off-premise
BCSI may include, but are not limited
to, the following:
Final Draft
June 2021
•
Implementation of electronic
technical method(s) to protect
electronic BCSI (e.g., data
masking, encryption, hashing,
tokenization, cipher, electronic
key management); or
•
Implementation of physical
technical method(s) to protect
physical BCSI (e.g., physical lock
and key management, physical
Page 8 of 20
CIP-011-2X — Cyber Security — Information Protection
CIP-011-X2 Table R1 – Information Protection Program
Part
Applicable Systems
Requirements
Measures
badge management,
biometrics, alarm system); or
•
Final Draft
June 2021
Implementation of
administrative method(s) to
protect BCSI (e.g., vendor
service risk assessments,
business agreements).
Page 9 of 20
CIP-011-2X — Cyber Security — Information Protection
R2.
Each Responsible Entity shall implement one or more documented process(es) that collectively include the applicable
requirement parts in CIP-011-X2 Table R2 – BES Cyber Asset Reuse and Disposal. [Violation Risk Factor: Lower] [Time Horizon:
Operations Planning].
M2. Evidence must include each of the applicable documented processes that collectively include each of the applicable
requirement parts in CIP-011-X2 Table R2 – BES Cyber Asset Reuse and Disposal and additional evidence to demonstrate
implementation as described in the Measures column of the table.
CIP-011-X2 Table R2 – BES Cyber Asset Reuse and Disposal
Part
2.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS;
2. PACS; and
3. PCA
Medium Impact BES Cyber Systems
and their associated:
1. EACMS;
2. PACS; and
3. PCA
Final Draft
June 2021
Requirements
Measures
Prior to the release for reuse of
applicable Cyber Assets that contain
BES Cyber System Information BCSI
(except for reuse within other
systems identified in the “Applicable
Systems” column), the Responsible
Entity shall take action to prevent the
unauthorized retrieval of BES Cyber
System InformationBCSI from the
Cyber Asset data storage media.
Examples of acceptable evidence may
include, but are not limited to, the
following:
•
Records tracking sanitization
actions taken to prevent
unauthorized retrieval of BES
Cyebr System Information BCSI
such as clearing, purging, or
destroying; or
•
Records tracking actions such as
encrypting, retaining in the
Physical Security Perimeter or
other methods used to prevent
unauthorized retrieval of BES
Cyber System InformationBCSI.
Page 10 of 20
CIP-011-2X — Cyber Security — Information Protection
CIP-011-X2 Table R2 – BES Cyber Asset Reuse and Disposal
Part
2.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS;
2. PACS; and
3. PCA
Medium Impact BES Cyber Systems
and their associated:
1. EACMS;
2. PACS; and
3. PCA
Final Draft
June 2021
Requirements
Measures
Prior to the disposal of applicable
Cyber Assets that contain BES Cyber
System InformationBCSI, the
Responsible Entity shall take action to
prevent the unauthorized retrieval of
BES Cyber System Information BCSI
from the Cyber Asset or destroy the
data storage media.
Examples of acceptable evidence may
include, but are not limited to, the
following:
•
Records that indicate that
data storage media was
destroyed prior to the
disposal of an applicable
Cyber Asset; or
•
Records of actions taken to
prevent unauthorized
retrieval of BES Cyber System
Information BCSI prior to the
disposal of an applicable
Cyber Asset.
Page 11 of 20
CIP-011-2X — Cyber Security — Information Protection
B. Compliance
1.
Compliance Monitoring Process:
1.1. Compliance Enforcement Authority:
As defined in the NERC Rules of Procedure, “Compliance Enforcement Authority” (CEA) means
NERC or the Regional Entity, or any entity as otherwise designated by an Applicable
Governmental Authority, in their respective roles of monitoring and/or enforcing compliance
with mandatory and enforceable the NERC Reliability Standards in their respective jurisdictions.
1.2. Evidence Retention: The following evidence retention period(s) identify the period of time an
entity is required to retain specific evidence to demonstrate compliance. For instances where
the evidence retention period specified below is shorter than the time since the last audit, the
CEA may ask an entity to provide other evidence to show that it was compliant for the full time
period since the last audit.
The applicable entity shall keep data or evidence to show compliance as identified below unless
directed by its CEA to retain specific evidence for a longer period of time as part of an
investigation.:
The Responsible Entity shall keep data or evidence to show compliance as identified below
unless directed by its CEA to retain specific evidence for a longer period of time as part of an
investigation:
•
Each Responsible The applicable Eentity shall retain evidence of each requirement in this
standard for three calendar years.
•
If a Responsible applicable Eentity is found non-compliant, it shall keep information related
to the noncompliance until mitigation is complete and approved or for the time specified
above, whichever is longer.
•
The CEA shall keep the last audit records and all requested and submitted subsequent audit
records.
1.3. Compliance Monitoring and Assessment Process Enforcement Program: As defined in the
NERC Rules of Procedure, “Compliance Monitoring and Enforcement Program” refers to the
identification of the processes that will be used to evaluate data or information for the purpose
of assessing performance or outcomes with the associated Reliability Standard.
• Compliance Audits
• Self-Certifications
• Spot Checking
• Compliance Violation Investigations
• Self-Reporting
• Complaints
1.4. Additional Compliance Information:
None
Final Draft
June 2021
Page 12 of 20
CIP-011-2X — Cyber Security — Information Protection
Violation Severity Levels
R#
R1
Time
Horizon
VRF
Operations
Planning
Medium
Violation Severity Levels (CIP-011-X2)
Lower VSL
N/A
Moderate VSL
N/A
High VSL
The Responsible Entity
documented, but did
not, implement one or
more BCSI protection
program(s). (R1)
OR
The Responsible Entity
documented but did
not implement at least
one method to identify
BCSI. (1.1)
Severe VSL
The Responsible
Entity has not
neither documented
nor implemented a
one or more BES
Cyber System
Information BCSI
protection
program(s). (R1)
OR
The Responsible Entity
documented but did
not implement at least
one method to protect
and securely handle
BCSI. (1.2)
N/A
R2
Final Draft
June 2021
Operations
Planning
Lower
N/A
The Responsible
Entity implemented
one or more
documented
The Responsible Entity
implemented one or
more documented
processes but did not
Page 13 of 20
The Responsible
Entity has not
documented or
implemented any
CIP-011-2X — Cyber Security — Information Protection
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-011-X2)
Lower VSL
Moderate VSL
processes but did not
include processes for
reuse as to prevent
the unauthorized
retrieval of BES Cyber
System Information
BCSI from the BES
Cyber Asset. (2.1)
Final Draft
June 2021
High VSL
include disposal or
media destruction
processes to prevent
the unauthorized
retrieval of BES Cyber
System Information
BCSI from the BES
Cyber Asset. (2.2)
Page 14 of 20
Severe VSL
processes for
applicable
requirement parts
in CIP-011-X2 Table
R3 – BES Cyber
Asset Reuse and
Disposal. (R2)
CIP-011-2X — Cyber Security — Information Protection
C. Regional Variances
None.
D. Interpretations
None.
E. Associated Documents
Version History
Version
Date
1
11/26/12
Adopted by the NERC Board of
Trustees.
1
11/22/13
2
11/13/14
FERC Order issued approving CIP011-1. (Order becomes effective
on 2/3/14.)
Adopted by the NERC Board of
Trustees.
2
2/12/15
Adopted by the NERC Board of
Trustees.
2
1/21/16
FERC Order issued approving CIP011-2. Docket No. RM15-14-000
Final Draft
June 2021
Action
Change Tracking
Developed to define
the information
protection
requirements in
coordination with other
CIP standards and to
address the balance of
the FERC directives in
its Order 706.
Addressed two FERC
directives from Order
No. 791 related to
identify, assess, and
correct language and
communication
networks.
Replaces the version
adopted by the Board
on 11/13/2014. Revised
version addresses
remaining directives
from Order No. 791
related to transient
devices and low impact
BES Cyber Systems.
Page 15 of 20
CIP-011-2X — Cyber Security — Information Protection
3
Final Draft
June 2021
TBD
Adopted by the NERC Board of
Trustees
Revised to enhance BES
reliability for entities to
manage their BCSI.
Page 16 of 20
CIP-011-2X — Cyber Security — Information Protection
Guidelines and Technical Basis
Section 4 – Scope of Applicability of the CIP Cyber Security Standards
Section “4. Applicability” of the standards provides important information for Responsible
Entities to determine the scope of the applicability of the CIP Cyber Security Requirements.
Section “4.1. Functional Entities” is a list of NERC functional entities to which the standard
applies. If the entity is registered as one or more of the functional entities listed in Section 4.1,
then the NERC CIP Cyber Security Standards apply. Note that there is a qualification in Section
4.1 that restricts the applicability in the case of Distribution Providers to only those that own
certain types of systems and equipment listed in 4.2.
Section “4.2. Facilities” defines the scope of the Facilities, systems, and equipment owned by
the Responsible Entity, as qualified in Section 4.1, that is subject to the requirements of the
standard. As specified in the exemption section 4.2.3.5, this standard does not apply to
Responsible Entities that do not have High Impact or Medium Impact BES Cyber Systems under
CIP-002-5.1’s categorization. In addition to the set of BES Facilities, Control Centers, and other
systems and equipment, the list includes the set of systems and equipment owned by
Distribution Providers. While the NERC Glossary term “Facilities” already includes the BES
characteristic, the additional use of the term BES here is meant to reinforce the scope of
applicability of these Facilities where it is used, especially in this applicability scoping section.
This in effect sets the scope of Facilities, systems, and equipment that is subject to the
standards.
Requirement R1:
Responsible Entities are free to utilize existing change management and asset management
systems. However, the information contained within those systems must be evaluated, as the
information protection requirements still apply.
The justification for this requirement is pre-existing from previous versions of CIP and is also
documented in FERC Order No. 706 and its associated Notice of Proposed Rulemaking.
This requirement mandates that BES Cyber System Information be identified. The Responsible
Entity has flexibility in determining how to implement the requirement. The Responsible Entity
should explain the method for identifying the BES Cyber System Information in their
information protection program. For example, the Responsible Entity may decide to mark or
label the documents. Identifying separate classifications of BES Cyber System Information is
not specifically required. However, a Responsible Entity maintains the flexibility to do so if they
desire. As long as the Responsible Entity’s information protection program includes all
applicable items, additional classification levels (e.g., confidential, public, internal use only, etc.)
can be created that go above and beyond the requirements. If the entity chooses to use
classifications, then the types of classifications used by the entity and any associated labeling
should be documented in the entity’s BES Cyber System Information Program.
Final Draft
June 2021
Page 17 of 20
CIP-011-2X — Cyber Security — Information Protection
The Responsible Entity may store all of the information about BES Cyber Systems in a separate
repository or location (physical and/or electronic) with access control implemented. For
example, the Responsible Entity’s program could document that all information stored in an
identified repository is considered BES Cyber System Information, the program may state that
all information contained in an identified section of a specific repository is considered BES
Cyber System Information, or the program may document that all hard copies of information
are stored in a secured area of the building. Additional methods for implementing the
requirement are suggested in the measures section. However, the methods listed in measures
are not meant to be an exhaustive list of methods that the entity may choose to utilize for the
identification of BES Cyber System Information.
The SDT does not intend that this requirement cover publicly available information, such as
vendor manuals that are available via public websites or information that is deemed to be
publicly releasable.
Information protection pertains to both digital and hardcopy information. R1.2 requires one or
more procedures for the protection and secure handling BES Cyber System Information,
including storage, transit, and use. This includes information that may be stored on Transient
Cyber Assets or Removable Media.
The entity’s written Information Protection Program should explain how the entity handles
aspects of information protection including specifying how BES Cyber System Information is to
be securely handled during transit in order to protect against unauthorized access, misuse, or
corruption and to protect confidentiality of the communicated BES Cyber System Information.
For example, the use of a third-party communication service provider instead of organizationowned infrastructure may warrant the use of encryption to prevent unauthorized disclosure of
information during transmission. The entity may choose to establish a trusted communications
path for transit of BES Cyber System Information. The trusted communications path would
utilize a logon or other security measures to provide secure handling during transit. The entity
may employ alternative physical protective measures, such as the use of a courier or locked
container for transmission of information. It is not the intent of this standard to mandate the
use of one particular format for secure handling during transit.
A good Information Protection Program will document the circumstances under which BES
Cyber System Information can be shared with or used by third parties. The organization should
distribute or share information on a need-to-know basis. For example, the entity may specify
that a confidentiality agreement, non-disclosure arrangement, contract, or written agreement
of some kind concerning the handling of information must be in place between the entity and
the third party. The entity’s Information Protection Program should specify circumstances for
sharing of BES Cyber System Information with and use by third parties, for example, use of a
non-disclosure agreement. The entity should then follow their documented program. These
requirements do not mandate one specific type of arrangement.
Requirement R2:
Final Draft
June 2021
Page 18 of 20
CIP-011-2X — Cyber Security — Information Protection
This requirement allows for BES Cyber Systems to be removed from service and analyzed with
their media intact, as that should not constitute a release for reuse. However, following the
analysis, if the media is to be reused outside of a BES Cyber System or disposed of, the entity
must take action to prevent the unauthorized retrieval of BES Cyber System Information from
the media.
The justification for this requirement is pre-existing from previous versions of CIP and is also
documented in FERC Order No. 706 and its associated Notice of Proposed Rulemaking.
If an applicable Cyber Asset is removed from the Physical Security Perimeter prior to action
taken to prevent the unauthorized retrieval of BES Cyber System Information or destroying the
data storage media, the Responsible Entity should maintain documentation that identifies the
custodian for the data storage media while the data storage media is outside of the Physical
Security Perimeter prior to actions taken by the entity as required in R2.
Media sanitization is the process used to remove information from system media such that
reasonable assurance exists that the information cannot be retrieved or reconstructed. Media
sanitization is generally classified into four categories: Disposal, clearing, purging, and
destroying. For the purposes of this requirement, disposal by itself, with the exception of
certain special circumstances, such as the use of strong encryption on a drive used in a SAN or
other media, should never be considered acceptable. The use of clearing techniques may
provide a suitable method of sanitization for media that is to be reused, whereas purging
techniques may be more appropriate for media that is ready for disposal.
The following information from NIST SP800-88 provides additional guidance concerning the
types of actions that an entity might take to prevent the unauthorized retrieval of BES Cyber
System Information from the Cyber Asset data storage media:
Clear: One method to sanitize media is to use software or hardware products to
overwrite storage space on the media with non-sensitive data. This process may include
overwriting not only the logical storage location of a file(s) (e.g., file allocation table) but
also may include all addressable locations. The security goal of the overwriting process
is to replace written data with random data. Overwriting cannot be used for media that
are damaged or not rewriteable. The media type and size may also influence whether
overwriting is a suitable sanitization method [SP 800-36].
Purge: Degaussing and executing the firmware Secure Erase command (for ATA drives
only) are acceptable methods for purging. Degaussing is exposing the magnetic media to
a strong magnetic field in order to disrupt the recorded magnetic domains. A degausser
is a device that generates a magnetic field used to sanitize magnetic media. Degaussers
are rated based on the type (i.e., low energy or high energy) of magnetic media they can
purge. Degaussers operate using either a strong permanent magnet or an
electromagnetic coil. Degaussing can be an effective method for purging damaged or
inoperative media, for purging media with exceptionally large storage capacities, or for
Final Draft
June 2021
Page 19 of 20
CIP-011-2X — Cyber Security — Information Protection
quickly purging diskettes. [SP 800-36] Executing the firmware Secure Erase command
(for ATA drives only) and degaussing are examples of acceptable methods for purging.
Degaussing of any hard drive assembly usually destroys the drive as the firmware that
manages the device is also destroyed.
Destroy: There are many different types, techniques, and procedures for media
destruction. Disintegration, Pulverization, Melting, and Incineration are sanitization
methods designed to completely destroy the media. They are typically carried out at an
outsourced metal destruction or licensed incineration facility with the specific
capabilities to perform these activities effectively, securely, and safely. Optical mass
storage media, including compact disks (CD, CD-RW, CD-R, CD-ROM), optical disks
(DVD), and MO disks, must be destroyed by pulverizing, crosscut shredding or burning.
In some cases such as networking equipment, it may be necessary to contact the
manufacturer for proper sanitization procedure.
It is critical that an organization maintain a record of its sanitization actions to prevent
unauthorized retrieval of BES Cyber System Information. Entities are strongly encouraged to
review NIST SP800-88 for guidance on how to develop acceptable media sanitization processes.
Rationale:
During development of this standard, text boxes were embedded within the standard to explain
the rationale for various parts of the standard. Upon BOT approval, the text from the rationale
text boxes was moved to this section.
Rationale for Requirement R1:
The SDT’s intent of the information protection program is to prevent unauthorized access to
BES Cyber System Information.
Rationale for Requirement R2:
The intent of the BES Cyber Asset reuse and disposal process is to prevent the unauthorized
dissemination of BES Cyber System Information upon reuse or disposal.
Final Draft
June 2021
Page 20 of 20
CIP-011-3 — Cyber Security — Information Protection
Standard Development Timeline
This section is maintained by the drafting team during the development of the standard and will
be removed when the standard is adopted by the NERC Board of Trustees (Board).
Description of Current Draft
Completed Actions
Standards Committee approved Standard Authorization
Request (SAR) for posting
Date
March 22, 2019
SAR posted for comment
March 28, 2019 – April 26, 2019
45-day formal comment period with ballot
December 20, 2019 – February
3, 2020
45-day formal comment period with ballot
August 6– September 21, 2020
45-day formal comment period with ballot
March 25 – May 10, 2021
10-day final ballot
Anticipated Actions
Board adoption
Final Draft
June 21, 2021
June 2 – 11, 2021
Date
November 2021
Page 1 of 14
CIP-011-3 — Cyber Security — Information Protection
A. Introduction
1. Title:
Cyber Security — Information Protection
2. Number: CIP-011-3
3. Purpose: To prevent unauthorized access to BES Cyber System Information (BCSI) by
specifying information protection requirements in support of protecting BES Cyber
Systems against compromise that could lead to misoperation or instability in the Bulk
Electric System (BES).
4. Applicability:
4.1. Functional Entities: For the purpose of the requirements contained herein, the
following list of functional entities will be collectively referred to as “Responsible
Entities.” For requirements in this standard where a specific functional entity or
subset of functional entities are the applicable entity or entities, the functional
entity or entities are specified explicitly.
4.1.1 Balancing Authority
4.1.2 Distribution Provider that owns one or more of the following Facilities,
systems, and equipment for the protection or restoration of the BES:
4.1.2.1 Each underfrequency Load shedding (UFLS) or undervoltage Load
shedding (UVLS) system that:
4.1.2.1.1 is part of a Load shedding program that is subject to
one or more requirements in a NERC or Regional
Reliability Standard; and
4.1.2.1.2 performs automatic Load shedding under a common
control system owned by the Responsible Entity,
without human operator initiation, of 300 MW or more.
4.1.2.2 Each Remedial Action Scheme (RAS) where the RAS is subject to
one or more requirements in a NERC or Regional Reliability
Standard.
4.1.2.3 Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or
more requirements in a NERC or Regional Reliability Standard.
4.1.2.4 Each Cranking Path and group of Elements meeting the initial
switching requirements from a Blackstart Resource up to and
including the first interconnection point of the starting station
service of the next generation unit(s) to be started.
4.1.3 Generator Operator
4.1.4 Generator Owner
4.1.5 Reliability Coordinator
Final Draft
June 21, 2021
Page 2 of 14
CIP-011-3 — Cyber Security — Information Protection
4.1.6 Transmission Operator
4.1.7 Transmission Owner
4.2. Facilities: For the purpose of the requirements contained herein, the following
Facilities, systems, and equipment owned by each Responsible Entity in 4.1 above
are those to which these requirements are applicable. For requirements in this
standard where a specific type of Facilities, system, or equipment or subset of
Facilities, systems, and equipment are applicable, these are specified explicitly.
4.2.1 Distribution Provider: One or more of the following Facilities, systems and
equipment owned by the Distribution Provider for the protection or
restoration of the BES:
4.2.1.1 Each UFLS or UVLS System that:
4.2.1.1.1 is part of a Load shedding program that is subject to
one or more requirements in a NERC or Regional
Reliability Standard; and
4.2.1.1.2 performs automatic Load shedding under a common
control system owned by the Responsible Entity,
without human operator initiation, of 300 MW or more.
4.2.1.2 Each RAS where the RAS is subject to one or more requirements in
a NERC or Regional Reliability Standard.
4.2.1.3 Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or
more requirements in a NERC or Regional Reliability Standard.
4.2.1.4 Each Cranking Path and group of Elements meeting the initial
switching requirements from a Blackstart Resource up to and
including the first interconnection point of the starting station
service of the next generation unit(s) to be started.
4.2.2 Responsible Entities listed in 4.1 other than Distribution Providers:
All BES Facilities.
4.2.3 Exemptions: The following are exempt from Standard CIP-011-3:
4.2.3.1 Cyber Assets at Facilities regulated by the Canadian Nuclear Safety
Commission.
4.2.3.2 Cyber Assets associated with communication networks and data
communication links between discrete Electronic Security
Perimeters.
4.2.3.3 The systems, structures, and components that are regulated by the
Nuclear Regulatory Commission under a cyber security plan
pursuant to 10 C.F.R. Section 73.54.
Final Draft
June 21, 2021
Page 3 of 14
CIP-011-3 — Cyber Security — Information Protection
4.2.3.4 For Distribution Providers, the systems and equipment that are not
included in section 4.2.1 above.
4.2.3.5 Responsible Entities that identify that they have no BES Cyber
Systems categorized as high impact or medium impact according to
the CIP-002-5.1a identification and categorization processes.
5. Effective Dates: See Implementation Plan for CIP-011-3.
6. Background: Standard CIP-011 exists as part of a suite of CIP Standards related to cyber
security, which require the initial identification and categorization of BES Cyber Systems
and require a minimum level of organizational, operational, and procedural controls to
mitigate risk to BES Cyber Systems.
Most requirements open with, “Each Responsible Entity shall implement one or more
documented [processes, plan, etc.] that include the applicable items in [Table
Reference].” The referenced table requires the applicable items in the procedures for
the requirement’s common subject matter.
The term documented processes refers to a set of required instructions specific to the
Responsible Entity and to achieve a specific outcome. This term does not imply any
particular naming or approval structure beyond what is stated in the requirements. An
entity should include as much as it believes necessary in its documented processes, but
it must address the applicable requirements in the table.
The terms program and plan are sometimes used in place of documented processes
where it makes sense and is commonly understood. For example, documented
processes describing a response are typically referred to as plans (i.e., incident response
plans and recovery plans). Likewise, a security plan can describe an approach involving
multiple procedures to address a broad subject matter.
Similarly, the term program may refer to the organization’s overall implementation of
its policies, plans and procedures involving a subject matter. Examples in the standards
include the personnel risk assessment program and the personnel training program.
The full implementation of the CIP Cyber Security Standards could also be referred to as
a program. However, the terms program and plan do not imply any additional
requirements beyond what is stated in the standards.
Responsible Entities can implement common controls that meet requirements for
multiple high and medium impact BES Cyber Systems. For example, a single training
program could meet the requirements for training personnel across multiple BES Cyber
Systems.
Measures for the initial requirement are simply the documented processes themselves.
Measures in the table rows provide examples of evidence to show documentation and
Final Draft
June 21, 2021
Page 4 of 14
CIP-011-3 — Cyber Security — Information Protection
implementation of applicable items in the documented processes. These measures
serve to provide guidance to entities in acceptable records of compliance and should
not be viewed as an all-inclusive list.
Throughout the standards, unless otherwise stated, bulleted items in the requirements
and measures are items that are linked with an “or,” and numbered items are items that
are linked with an “and.”
Many references in the Applicability section use a threshold of 300 MW for UFLS and
UVLS. This particular threshold of 300 MW for UVLS and UFLS was provided in Version 1
of the CIP Cyber Security Standards. The threshold remains at 300 MW since it is
specifically addressing UVLS and UFLS, which are last ditch efforts to save the BES. A
review of UFLS tolerances defined within regional reliability standards for UFLS program
requirements to date indicates that the historical value of 300 MW represents an
adequate and reasonable threshold value for allowable UFLS operational tolerances.
“Applicable Systems” Columns in Tables:
Each table has an “Applicable Systems” column to further define the scope of systems
to which a specific requirement row applies. The CSO706 SDT adapted this concept
from the National Institute of Standards and Technology (“NIST”) Risk Management
Framework as a way of applying requirements more appropriately based on impact and
connectivity characteristics. The following conventions are used in the “Applicable
Systems” column as described.
•
High Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as
high impact according to the CIP-002-5.1a identification and categorization
processes.
•
Medium Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as
medium impact according to the CIP-002-5.1a identification and categorization
processes.
•
Electronic Access Control or Monitoring Systems (EACMS) – Applies to each
Electronic Access Control or Monitoring System associated with a referenced high
impact BES Cyber System or medium impact BES Cyber System. Examples may
include, but are not limited to, firewalls, authentication servers, and log
monitoring and alerting systems.
•
Physical Access Control Systems (PACS) – Applies to each Physical Access Control
System associated with a referenced high impact BES Cyber System or medium
impact BES Cyber System with External Routable Connectivity.
•
Protected Cyber Assets (PCA) – Applies to each Protected Cyber Asset associated
with a referenced high impact BES Cyber System or medium impact BES Cyber
System.
Final Draft
June 21, 2021
Page 5 of 14
CIP-011-3 — Cyber Security — Information Protection
B. Requirements and Measures
R1. Each Responsible Entity shall implement one or more documented information protection program(s) for BES Cyber System
Information (BCSI) pertaining to “Applicable Systems” identified in CIP-011-3 Table R1 – Information Protection Program
that collectively includes each of the applicable requirement parts in CIP-011-3 Table R1 – Information Protection Program.
[Violation Risk Factor: Medium] [Time Horizon: Operations Planning].
M1. Evidence for the information protection program must include the applicable requirement parts in CIP-011-3 Table R1 –
Information Protection Program and additional evidence to demonstrate implementation as described in the Measures
column of the table.
CIP-011-3 Table R1 – Information Protection Program
Part
1.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
and their associated:
1. EACMS; and
Requirements
Method(s) to identify BCSI.
Measures
Examples of acceptable evidence may
include, but are not limited to, the
following:
•
Documented method(s) to identify
BCSI from the entity’s information
protection program; or
•
Indications on information (e.g.,
labels or classification) that identify
BCSI as designated in the entity’s
information protection program; or
•
Training materials that provide
personnel with sufficient
knowledge to identify BCSI; or
•
Storage locations identified for
housing BCSI in the entity’s
information protection program.
2. PACS
Final Draft
June 2021
Page 6 of 14
CIP-011-3 — Cyber Security — Information Protection
CIP-011-3 Table R1 – Information Protection Program
Part
1.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Requirements
Method(s) to protect and securely
handle BCSI to mitigate risks of
compromising confidentiality.
Measures
Examples of evidence for on-premise
BCSI may include, but are not limited
to, the following:
•
Medium Impact BES Cyber Systems
and their associated:
1. EACMS; and
2. PACS
•
Procedures for protecting and
securely handling, which
include topics such as storage,
security during transit, and use
of BCSI; or
Records indicating that BCSI is
handled in a manner consistent
with the entity’s documented
procedure(s).
Examples of evidence for off-premise
BCSI may include, but are not limited
to, the following:
Final Draft
June 2021
•
Implementation of electronic
technical method(s) to protect
electronic BCSI (e.g., data
masking, encryption, hashing,
tokenization, cipher, electronic
key management); or
•
Implementation of physical
technical method(s) to protect
physical BCSI (e.g., physical lock
and key management, physical
badge management,
biometrics, alarm system); or
Page 7 of 14
CIP-011-3 — Cyber Security — Information Protection
CIP-011-3 Table R1 – Information Protection Program
Part
Applicable Systems
Requirements
Measures
•
Final Draft
June 2021
Implementation of
administrative method(s) to
protect BCSI (e.g., vendor
service risk assessments,
business agreements).
Page 8 of 14
CIP-011-3 — Cyber Security — Information Protection
R2.
Each Responsible Entity shall implement one or more documented process(es) that collectively include the applicable
requirement parts in CIP-011-3 Table R2 – BES Cyber Asset Reuse and Disposal. [Violation Risk Factor: Lower] [Time Horizon:
Operations Planning].
M2. Evidence must include each of the applicable documented processes that collectively include each of the applicable
requirement parts in CIP-011-3 Table R2 – BES Cyber Asset Reuse and Disposal and additional evidence to demonstrate
implementation as described in the Measures column of the table.
CIP-011-3 Table R2 – BES Cyber Asset Reuse and Disposal
Part
2.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS;
2. PACS; and
3. PCA
Medium Impact BES Cyber Systems
and their associated:
1. EACMS;
2. PACS; and
3. PCA
Final Draft
June 2021
Requirements
Prior to the release for reuse of
applicable Cyber Assets that contain
BCSI (except for reuse within other
systems identified in the “Applicable
Systems” column), the Responsible
Entity shall take action to prevent the
unauthorized retrieval of BCSI from
the Cyber Asset data storage media.
Measures
Examples of acceptable evidence may
include, but are not limited to, the
following:
•
Records tracking sanitization actions
taken to prevent unauthorized
retrieval of BCSI such as clearing,
purging, or destroying; or
•
Records tracking actions such as
encrypting, retaining in the Physical
Security Perimeter or other methods
used to prevent unauthorized
retrieval of BCSI.
Page 9 of 14
CIP-011-3 — Cyber Security — Information Protection
CIP-011-3 Table R2 – BES Cyber Asset Reuse and Disposal
Part
2.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS;
2. PACS; and
3. PCA
Medium Impact BES Cyber Systems
and their associated:
1. EACMS;
2. PACS; and
Requirements
Prior to the disposal of applicable
Cyber Assets that contain BCSI, the
Responsible Entity shall take action to
prevent the unauthorized retrieval of
BCSI from the Cyber Asset or destroy
the data storage media.
Measures
Examples of acceptable evidence may
include, but are not limited to, the
following:
•
Records that indicate that data
storage media was destroyed
prior to the disposal of an
applicable Cyber Asset; or
•
Records of actions taken to
prevent unauthorized retrieval of
BCSI prior to the disposal of an
applicable Cyber Asset.
3. PCA
Final Draft
June 2021
Page 10 of 14
CIP-011-3 — Cyber Security — Information Protection
B. Compliance
1.
Compliance Monitoring Process:
1.1. Compliance Enforcement Authority: “Compliance Enforcement Authority” (CEA)
means NERC or the Regional Entity, or any entity as otherwise designated by an
Applicable Governmental Authority, in their respective roles of monitoring and/or
enforcing compliance with mandatory and enforceable Reliability Standards in
their respective jurisdictions.
1.2. Evidence Retention: The following evidence retention period(s) identify the period
of time an entity is required to retain specific evidence to demonstrate
compliance. For instances where the evidence retention period specified below is
shorter than the time since the last audit, the CEA may ask an entity to provide
other evidence to show that it was compliant for the full time period since the last
audit.
The applicable entity shall keep data or evidence to show compliance as identified
below unless directed by its CEA to retain specific evidence for a longer period of
time as part of an investigation:
•
The applicable entity shall retain evidence of each requirement in this standard
for three calendar years.
•
If an applicable entity is found non-compliant, it shall keep information related
to the non-compliance until mitigation is complete and approved or for the
time specified above, whichever is longer.
•
The CEA shall keep the last audit records and all requested and submitted
subsequent audit records.
1.3. Compliance Monitoring and Enforcement Program: As defined in the NERC Rules
of Procedure, “Compliance Monitoring and Enforcement Program” refers to the
identification of the processes that will be used to evaluate data or information for
the purpose of assessing performance or outcomes with the associated Reliability
Standard.
Final Draft
June 2021
Page 11 of 14
CIP-011-3 — Cyber Security — Information Protection
Violation Severity Levels
R#
R1
Time
Horizon
Operations
Planning
Violation Severity Levels (CIP-011-3)
VRF
Medium
Lower VSL
N/A
Moderate VSL
N/A
High VSL
Severe VSL
The Responsible
Entity documented,
but did not,
implement one or
more BCSI protection
program(s). (R1)
The Responsible
Entity neither
documented nor
implemented one or
more BCSI protection
program(s). (R1)
OR
The Responsible
Entity documented
but did not
implement at least
one method to
identify BCSI. (1.1)
OR
The Responsible
Entity documented
but did not
implement at least
one method to
protect and securely
handle BCSI. (1.2)
R2
Final Draft
June 2021
Operations
Planning
Lower
N/A
The Responsible
Entity implemented
one or more
documented
The Responsible
Entity implemented
one or more
documented
The Responsible
Entity has not
documented or
implemented any
Page 12 of 14
CIP-011-3 — Cyber Security — Information Protection
R#
Final Draft
June 2021
Time
Horizon
VRF
Violation Severity Levels (CIP-011-3)
Lower VSL
Moderate VSL
High VSL
Severe VSL
processes but did
not include
processes for reuse
as to prevent the
unauthorized
retrieval of BCSI
from the BES Cyber
Asset. (2.1)
processes but did
not include disposal
or media destruction
processes to prevent
the unauthorized
retrieval of BCSI
from the BES Cyber
Asset. (2.2)
processes for
applicable
requirement parts in
CIP-011-3 Table R3 –
BES Cyber Asset
Reuse and Disposal.
(R2)
Page 13 of 14
CIP-011-3 — Cyber Security — Information Protection
C. Regional Variances
None.
D. Interpretations
None.
E. Associated Documents
Version History
Version
Date
1
11/26/12
Adopted by the NERC Board of
Trustees.
1
11/22/13
FERC Order issued approving CIP011-1. (Order becomes effective
on 2/3/14.)
2
11/13/14
Adopted by the NERC Board of
Trustees.
Addressed two FERC directives
from Order No. 791 related to
identify, assess, and correct
language and communication
networks.
2
2/12/15
Adopted by the NERC Board of
Trustees.
Replaces the version adopted
by the Board on 11/13/2014.
Revised version addresses
remaining directives from
Order No. 791 related to
transient devices and low
impact BES Cyber Systems.
2
1/21/16
FERC Order issued approving CIP011-2. Docket No. RM15-14-000
3
TBD
Final Draft
June 2021
Action
Adopted by the NERC Board of
Trustees
Change Tracking
Developed to define the
information protection
requirements in coordination
with other CIP standards and
to address the balance of the
FERC directives in its Order
706.
Revised to enhance BES
reliability for entities to
manage their BCSI.
Page 14 of 14
CIP-011-23 — Cyber Security — Information Protection
Standard Development Timeline
This section is maintained by the drafting team during the development of the standard and will
be removed when the standard is adopted by the NERC Board of Trustees (Board).
Description of Current Draft
Completed Actions
Standards Committee approved Standard Authorization Request
(SAR) for posting
SAR posted for comment
Date
March 22, 2019
March 28, 2019 –
April 26, 2019
45-day formal comment period with ballot
December 20, 2019
– February 3, 2020
45-day formal comment period with ballot
August 6–
September 21, 2020
45-day formal comment period with ballot
March 25 – May 10,
2021
10-day final ballot
June 2-11,2021
Anticipated Actions
Board adoption
Draft 3
March 2021
Date
November 2021
Page 1 of 20
CIP-011-23 — Cyber Security — Information Protection
A. Introduction
1.
Title:
Cyber Security — Information Protection
2.
Number:
CIP-011-32
3.
Purpose:
To prevent unauthorized access to BES Cyber System Information (BCSI)
by specifying information protection requirements in support of
protecting BES Cyber Systems against compromise that could lead to
misoperation or instability in the Bulk Electric System (BES).
4.
Applicability:
4.1. Functional Entities: For the purpose of the requirements contained herein, the
following list of functional entities will be collectively referred to as “Responsible
Entities.” For requirements in this standard where a specific functional entity or
subset of functional entities are the applicable entity or entities, the functional entity
or entities are specified explicitly.
4.1.1 Balancing Authority
4.1.2 Distribution Provider that owns one or more of the following Facilities, systems,
and equipment for the protection or restoration of the BES:
4.1.2.1 Each underfrequency Load shedding (UFLS) or undervoltage Load shedding
(UVLS) system that:
4.1.2.1.1 is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.1.2.1.2 performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation,
of 300 MW or more.
4.1.2.2 Each Special Protection System (SPS) or Remedial Action Scheme (RAS)
where the SPS or RAS is subject to one or more requirements in a NERC or
Regional Reliability Standard.
4.1.2.3 Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.1.2.4 Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.1.3 Generator Operator
4.1.4 Generator Owner
4.1.5 Interchange Coordinator or Interchange Authority
4.1.64.1.5
Draft 3
March 2021
Reliability Coordinator
Page 2 of 20
CIP-011-23 — Cyber Security — Information Protection
4.1.74.1.6
Transmission Operator
4.1.84.1.7
Transmission Owner
4.2.
Facilities: For the purpose of the requirements contained herein, the following
Facilities, systems, and equipment owned by each Responsible Entity in 4.1 above
are those to which these requirements are applicable. For requirements in this
standard where a specific type of Facilities, system, or equipment or subset of
Facilities, systems, and equipment are applicable, these are specified explicitly.
4.2.1 Distribution Provider: One or more of the following Facilities, systems and
equipment owned by the Distribution Provider for the protection or restoration
of the BES:
4.2.1.1 Each UFLS or UVLS System that:
4.2.1.1.1 is part of a Load shedding program that is subject to one or more
requirements in a NERC or Regional Reliability Standard; and
4.2.1.1.2 performs automatic Load shedding under a common control system
owned by the Responsible Entity, without human operator initiation,
of 300 MW or more.
4.2.1.2 Each SPS or RAS where the SPS or RAS is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.2.1.3 Each Protection System (excluding UFLS and UVLS) that applies to
Transmission where the Protection System is subject to one or more
requirements in a NERC or Regional Reliability Standard.
4.2.1.4 Each Cranking Path and group of Elements meeting the initial switching
requirements from a Blackstart Resource up to and including the first
interconnection point of the starting station service of the next generation
unit(s) to be started.
4.2.2 Responsible Entities listed in 4.1 other than Distribution Providers:
All BES Facilities.
4.2.3 Exemptions: The following are exempt from Standard CIP-011-32:
4.2.3.1 Cyber Assets at Facilities regulated by the Canadian Nuclear Safety
Commission.
4.2.3.2 Cyber Assets associated with communication networks and data
communication links between discrete Electronic Security Perimeters.
4.2.3.3 The systems, structures, and components that are regulated by the Nuclear
Regulatory Commission under a cyber security plan pursuant to 10 C.F.R.
Section 73.54.
4.2.3.4 For Distribution Providers, the systems and equipment that are not included
in section 4.2.1 above.
Draft 3
March 2021
Page 3 of 20
CIP-011-23 — Cyber Security — Information Protection
4.2.3.5 Responsible Entities that identify that they have no BES Cyber Systems
categorized as high impact or medium impact according to the CIP-002-5.1a
identification and categorization processes.
5.
Effective Dates: See Implementation Plan for CIP-011-32.
6.
Background:
Standard CIP-011 exists as part of a suite of CIP Standards related to cyber security,
which require the initial identification and categorization of BES Cyber Systems and
require a minimum level of organizational, operational, and procedural controls to
mitigate risk to BES Cyber Systems.
Most requirements open with, “Each Responsible Entity shall implement one or more
documented [processes, plan, etc.] that include the applicable items in [Table
Reference].” The referenced table requires the applicable items in the procedures for
the requirement’s common subject matter.
The term documented processes refers to a set of required instructions specific to the
Responsible Entity and to achieve a specific outcome. This term does not imply any
particular naming or approval structure beyond what is stated in the requirements.
An entity should include as much as it believes necessary in its documented processes,
but it must address the applicable requirements in the table.
The terms program and plan are sometimes used in place of documented processes
where it makes sense and is commonly understood. For example, documented
processes describing a response are typically referred to as plans (i.e., incident
response plans and recovery plans). Likewise, a security plan can describe an
approach involving multiple procedures to address a broad subject matter.
Similarly, the term program may refer to the organization’s overall implementation of
its policies, plans and procedures involving a subject matter. Examples in the
standards include the personnel risk assessment program and the personnel training
program. The full implementation of the CIP Cyber Security Standards could also be
referred to as a program. However, the terms program and plan do not imply any
additional requirements beyond what is stated in the standards.
Responsible Entities can implement common controls that meet requirements for
multiple high and medium impact BES Cyber Systems. For example, a single training
program could meet the requirements for training personnel across multiple BES
Cyber Systems.
Measures for the initial requirement are simply the documented processes
themselves. Measures in the table rows provide examples of evidence to show
documentation and implementation of applicable items in the documented processes.
These measures serve to provide guidance to entities in acceptable records of
compliance and should not be viewed as an all-inclusive list.
Draft 3
March 2021
Page 4 of 20
CIP-011-23 — Cyber Security — Information Protection
Throughout the standards, unless otherwise stated, bulleted items in the
requirements and measures are items that are linked with an “or,” and numbered
items are items that are linked with an “and.”
Many references in the Applicability section use a threshold of 300 MW for UFLS and
UVLS. This particular threshold of 300 MW for UVLS and UFLS was provided in Version
1 of the CIP Cyber Security Standards. The threshold remains at 300 MW since it is
specifically addressing UVLS and UFLS, which are last ditch efforts to save the BES. A
review of UFLS tolerances defined within regional reliability standards for UFLS
program requirements to date indicates that the historical value of 300 MW
represents an adequate and reasonable threshold value for allowable UFLS
operational tolerances.
“Applicable Systems” Columns in Tables:
Each table has an “Applicable Systems” column to further define the scope of systems
to which a specific requirement row applies. The CSO706 SDT adapted this concept
from the National Institute of Standards and Technology (“NIST”) Risk Management
Framework as a way of applying requirements more appropriately based on impact
and connectivity characteristics. The following conventions are used in the
“Applicable Systems” column as described.
Draft 3
March 2021
•
High Impact BES Cyber Systems – Applies to BES Cyber Systems categorized as
high impact according to the CIP-002-5.1a identification and categorization
processes.
•
Medium Impact BES Cyber Systems – Applies to BES Cyber Systems categorized
as medium impact according to the CIP-002-5.1a identification and
categorization processes.
•
Electronic Access Control or Monitoring Systems (EACMS) – Applies to each
Electronic Access Control or Monitoring System associated with a referenced
high impact BES Cyber System or medium impact BES Cyber System. Examples
may include, but are not limited to, firewalls, authentication servers, and log
monitoring and alerting systems.
•
Physical Access Control Systems (PACS) – Applies to each Physical Access
Control System associated with a referenced high impact BES Cyber System or
medium impact BES Cyber System with External Routable Connectivity.
•
Protected Cyber Assets (PCA) – Applies to each Protected Cyber Asset
associated with a referenced high impact BES Cyber System or medium impact
BES Cyber System.
Page 5 of 20
CIP-011-23 — Cyber Security — Information Protection
B. Requirements and Measures
R1. Each Responsible Entity shall implement one or more documented information protection program(s) for BES Cyber System
Information (BCSI) pertaining to “Applicable Systems” identified in CIP-011-3 Table R1 – Information Protection Program
that collectively includes each of the applicable requirement parts in CIP-011-32 Table R1 – Information Protection
Program. [Violation Risk Factor: Medium] [Time Horizon: Operations Planning].
M1. Evidence for the information protection program must include the applicable requirement parts in CIP-011-32 Table R1 –
Information Protection Program and additional evidence to demonstrate implementation as described in the Measures
column of the table.
Final Draft
June 2021
Page 6 of 20
CIP-011-23 — Cyber Security — Information Protection
CIP-011-32 Table R1 – Information Protection Program
Part
1.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Medium Impact BES Cyber Systems
and their associated:
1. EACMS; and
Requirements
Method(s) to identify information that
meets the definition of BES Cyber
sytem Information BCSI.
Measures
Examples of acceptable evidence may
include, but are not limited to, the
following:
•
Documented method(s) to identify
BES Cyber System Information BCSI
from the entity’s information
protection program; or
•
Indications on information (e.g.,
labels or classification) that identify
BES Cyber System Information BCSI
as designated in the entity’s
information protection program; or
•
Training materials that provide
personnel with sufficient
knowledge to identify BES Cyber
System Information BCSI; or
•
Repository or electronic and
physical location designated for
housing BES Cyber System
Information in the entity’s
information protection program.
•
Storage locations identified for
housing BCSI in the entity’s
information protection program.
2. PACS
Final Draft
June 2021
Page 7 of 20
CIP-011-23 — Cyber Security — Information Protection
CIP-011-32 Table R1 – Information Protection Program
Part
1.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS; and
2. PACS
Requirements
Procedure(s) for protecting
andMethod(s) to protect and
securely handleing BES Cyber System
InformationBCSI, including storage,
transit, and useto mitigate risks of
compromising confidentiality.
Measures
Examples of acceptable evidence for
on-premise BCSI may include, but are
not limited to, the following:
•
Medium Impact BES Cyber Systems
and their associated:
1. EACMS; and
2. PACS
•
Procedures for protecting and
securely handling BCSI, which
include topics such as storage,
security during transit, and use
of BES Cyber System
information; or
Records indicating that BES
Cyber System Information BCSI
is handled in a manner
consistent with the entity’s
documented procedure(s).
Examples of evidence for off-premise
BCSI may include, but are not limited
to, the following:
Final Draft
June 2021
•
Implementation of electronic
technical method(s) to protect
electronic BCSI (e.g., data
masking, encryption, hashing,
tokenization, cipher, electronic
key management); or
•
Implementation of physical
technical method(s) to protect
physical BCSI (e.g., physical lock
and key management, physical
Page 8 of 20
CIP-011-23 — Cyber Security — Information Protection
CIP-011-32 Table R1 – Information Protection Program
Part
Applicable Systems
Requirements
Measures
badge management,
biometrics, alarm system); or
•
Final Draft
June 2021
Implementation of
administrative method(s) to
protect BCSI (e.g., vendor
service risk assessments,
business agreements).
Page 9 of 20
CIP-011-23 — Cyber Security — Information Protection
R2.
Each Responsible Entity shall implement one or more documented process(es) that collectively include the applicable
requirement parts in CIP-011-32 Table R2 – BES Cyber Asset Reuse and Disposal. [Violation Risk Factor: Lower] [Time Horizon:
Operations Planning].
M2. Evidence must include each of the applicable documented processes that collectively include each of the applicable
requirement parts in CIP-011-32 Table R2 – BES Cyber Asset Reuse and Disposal and additional evidence to demonstrate
implementation as described in the Measures column of the table.
CIP-011-32 Table R2 – BES Cyber Asset Reuse and Disposal
Part
2.1
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS;
2. PACS; and
3. PCA
Medium Impact BES Cyber Systems
and their associated:
1. EACMS;
2. PACS; and
3. PCA
Final Draft
June 2021
Requirements
Measures
Prior to the release for reuse of
applicable Cyber Assets that contain
BES Cyber System Information BCSI
(except for reuse within other
systems identified in the “Applicable
Systems” column), the Responsible
Entity shall take action to prevent the
unauthorized retrieval of BES Cyber
System InformationBCSI from the
Cyber Asset data storage media.
Examples of acceptable evidence may
include, but are not limited to, the
following:
•
Records tracking sanitization
actions taken to prevent
unauthorized retrieval of BES
Cyebr System Information BCSI
such as clearing, purging, or
destroying; or
•
Records tracking actions such as
encrypting, retaining in the
Physical Security Perimeter or
other methods used to prevent
unauthorized retrieval of BES
Cyber System InformationBCSI.
Page 10 of 20
CIP-011-23 — Cyber Security — Information Protection
CIP-011-32 Table R2 – BES Cyber Asset Reuse and Disposal
Part
2.2
Applicable Systems
High Impact BES Cyber Systems and
their associated:
1. EACMS;
2. PACS; and
3. PCA
Medium Impact BES Cyber Systems
and their associated:
1. EACMS;
2. PACS; and
3. PCA
Final Draft
June 2021
Requirements
Measures
Prior to the disposal of applicable
Cyber Assets that contain BES Cyber
System InformationBCSI, the
Responsible Entity shall take action to
prevent the unauthorized retrieval of
BES Cyber System Information BCSI
from the Cyber Asset or destroy the
data storage media.
Examples of acceptable evidence may
include, but are not limited to, the
following:
•
Records that indicate that
data storage media was
destroyed prior to the
disposal of an applicable
Cyber Asset; or
•
Records of actions taken to
prevent unauthorized
retrieval of BES Cyber System
Information BCSI prior to the
disposal of an applicable
Cyber Asset.
Page 11 of 20
CIP-011-23 — Cyber Security — Information Protection
B. Compliance
1.
Compliance Monitoring Process:
1.1. Compliance Enforcement Authority:
As defined in the NERC Rules of Procedure, “Compliance Enforcement Authority” (CEA) means
NERC or the Regional Entity, or any entity as otherwise designated by an Applicable
Governmental Authority, in their respective roles of monitoring and/or enforcing compliance
with mandatory and enforceable the NERC Reliability Standards in their respective jurisdictions.
1.2. Evidence Retention: The following evidence retention period(s) identify the period of time an
entity is required to retain specific evidence to demonstrate compliance. For instances where
the evidence retention period specified below is shorter than the time since the last audit, the
CEA may ask an entity to provide other evidence to show that it was compliant for the full time
period since the last audit.
The applicable entity shall keep data or evidence to show compliance as identified below unless
directed by its CEA to retain specific evidence for a longer period of time as part of an
investigation.:
The Responsible Entity shall keep data or evidence to show compliance as identified below
unless directed by its CEA to retain specific evidence for a longer period of time as part of an
investigation:
•
Each Responsible The applicable Eentity shall retain evidence of each requirement in this
standard for three calendar years.
•
If a Responsible applicable Eentity is found non-compliant, it shall keep information related
to the noncompliance until mitigation is complete and approved or for the time specified
above, whichever is longer.
•
The CEA shall keep the last audit records and all requested and submitted subsequent audit
records.
1.3. Compliance Monitoring and Assessment Process Enforcement Program: As defined in the
NERC Rules of Procedure, “Compliance Monitoring and Enforcement Program” refers to the
identification of the processes that will be used to evaluate data or information for the purpose
of assessing performance or outcomes with the associated Reliability Standard.
• Compliance Audits
• Self-Certifications
• Spot Checking
• Compliance Violation Investigations
• Self-Reporting
• Complaints
1.4. Additional Compliance Information:
None
Final Draft
June 2021
Page 12 of 20
CIP-011-23 — Cyber Security — Information Protection
Violation Severity Levels
R#
R1
Time
Horizon
VRF
Operations
Planning
Medium
Violation Severity Levels (CIP-011-32)
Lower VSL
N/A
Moderate VSL
N/A
High VSL
The Responsible Entity
documented, but did
not, implement one or
more BCSI protection
program(s). (R1)
OR
The Responsible Entity
documented but did
not implement at least
one method to identify
BCSI. (1.1)
Severe VSL
The Responsible
Entity has not
neither documented
nor implemented a
one or more BES
Cyber System
Information BCSI
protection
program(s). (R1)
OR
The Responsible Entity
documented but did
not implement at least
one method to protect
and securely handle
BCSI. (1.2)
N/A
R2
Final Draft
June 2021
Operations
Planning
Lower
N/A
The Responsible
Entity implemented
one or more
documented
The Responsible Entity
implemented one or
more documented
processes but did not
Page 13 of 20
The Responsible
Entity has not
documented or
implemented any
CIP-011-23 — Cyber Security — Information Protection
R#
Time
Horizon
VRF
Violation Severity Levels (CIP-011-32)
Lower VSL
Moderate VSL
processes but did not
include processes for
reuse as to prevent
the unauthorized
retrieval of BES Cyber
System Information
BCSI from the BES
Cyber Asset. (2.1)
Final Draft
June 2021
High VSL
include disposal or
media destruction
processes to prevent
the unauthorized
retrieval of BES Cyber
System Information
BCSI from the BES
Cyber Asset. (2.2)
Page 14 of 20
Severe VSL
processes for
applicable
requirement parts
in CIP-011-32 Table
R3 – BES Cyber
Asset Reuse and
Disposal. (R2)
CIP-011-2X — Cyber Security — Information Protection
C. Regional Variances
None.
D. Interpretations
None.
E. Associated Documents
Version History
Version
Date
1
11/26/12
Adopted by the NERC Board of
Trustees.
1
11/22/13
2
11/13/14
FERC Order issued approving CIP011-1. (Order becomes effective
on 2/3/14.)
Adopted by the NERC Board of
Trustees.
2
2/12/15
Adopted by the NERC Board of
Trustees.
2
1/21/16
FERC Order issued approving CIP011-2. Docket No. RM15-14-000
Final Draft
June 2021
Action
Change Tracking
Developed to define
the information
protection
requirements in
coordination with other
CIP standards and to
address the balance of
the FERC directives in
its Order 706.
Addressed two FERC
directives from Order
No. 791 related to
identify, assess, and
correct language and
communication
networks.
Replaces the version
adopted by the Board
on 11/13/2014. Revised
version addresses
remaining directives
from Order No. 791
related to transient
devices and low impact
BES Cyber Systems.
Page 15 of 20
CIP-011-2X — Cyber Security — Information Protection
3
Final Draft
June 2021
TBD
Adopted by the NERC Board of
Trustees
Revised to enhance BES
reliability for entities to
manage their BCSI.
Page 16 of 20
CIP-011-2X — Cyber Security — Information Protection
Guidelines and Technical Basis
Section 4 – Scope of Applicability of the CIP Cyber Security Standards
Section “4. Applicability” of the standards provides important information for Responsible
Entities to determine the scope of the applicability of the CIP Cyber Security Requirements.
Section “4.1. Functional Entities” is a list of NERC functional entities to which the standard
applies. If the entity is registered as one or more of the functional entities listed in Section 4.1,
then the NERC CIP Cyber Security Standards apply. Note that there is a qualification in Section
4.1 that restricts the applicability in the case of Distribution Providers to only those that own
certain types of systems and equipment listed in 4.2.
Section “4.2. Facilities” defines the scope of the Facilities, systems, and equipment owned by
the Responsible Entity, as qualified in Section 4.1, that is subject to the requirements of the
standard. As specified in the exemption section 4.2.3.5, this standard does not apply to
Responsible Entities that do not have High Impact or Medium Impact BES Cyber Systems under
CIP-002-5.1’s categorization. In addition to the set of BES Facilities, Control Centers, and other
systems and equipment, the list includes the set of systems and equipment owned by
Distribution Providers. While the NERC Glossary term “Facilities” already includes the BES
characteristic, the additional use of the term BES here is meant to reinforce the scope of
applicability of these Facilities where it is used, especially in this applicability scoping section.
This in effect sets the scope of Facilities, systems, and equipment that is subject to the
standards.
Requirement R1:
Responsible Entities are free to utilize existing change management and asset management
systems. However, the information contained within those systems must be evaluated, as the
information protection requirements still apply.
The justification for this requirement is pre-existing from previous versions of CIP and is also
documented in FERC Order No. 706 and its associated Notice of Proposed Rulemaking.
This requirement mandates that BES Cyber System Information be identified. The Responsible
Entity has flexibility in determining how to implement the requirement. The Responsible Entity
should explain the method for identifying the BES Cyber System Information in their
information protection program. For example, the Responsible Entity may decide to mark or
label the documents. Identifying separate classifications of BES Cyber System Information is
not specifically required. However, a Responsible Entity maintains the flexibility to do so if they
desire. As long as the Responsible Entity’s information protection program includes all
applicable items, additional classification levels (e.g., confidential, public, internal use only, etc.)
can be created that go above and beyond the requirements. If the entity chooses to use
classifications, then the types of classifications used by the entity and any associated labeling
should be documented in the entity’s BES Cyber System Information Program.
Final Draft
June 2021
Page 17 of 20
CIP-011-2X — Cyber Security — Information Protection
The Responsible Entity may store all of the information about BES Cyber Systems in a separate
repository or location (physical and/or electronic) with access control implemented. For
example, the Responsible Entity’s program could document that all information stored in an
identified repository is considered BES Cyber System Information, the program may state that
all information contained in an identified section of a specific repository is considered BES
Cyber System Information, or the program may document that all hard copies of information
are stored in a secured area of the building. Additional methods for implementing the
requirement are suggested in the measures section. However, the methods listed in measures
are not meant to be an exhaustive list of methods that the entity may choose to utilize for the
identification of BES Cyber System Information.
The SDT does not intend that this requirement cover publicly available information, such as
vendor manuals that are available via public websites or information that is deemed to be
publicly releasable.
Information protection pertains to both digital and hardcopy information. R1.2 requires one or
more procedures for the protection and secure handling BES Cyber System Information,
including storage, transit, and use. This includes information that may be stored on Transient
Cyber Assets or Removable Media.
The entity’s written Information Protection Program should explain how the entity handles
aspects of information protection including specifying how BES Cyber System Information is to
be securely handled during transit in order to protect against unauthorized access, misuse, or
corruption and to protect confidentiality of the communicated BES Cyber System Information.
For example, the use of a third-party communication service provider instead of organizationowned infrastructure may warrant the use of encryption to prevent unauthorized disclosure of
information during transmission. The entity may choose to establish a trusted communications
path for transit of BES Cyber System Information. The trusted communications path would
utilize a logon or other security measures to provide secure handling during transit. The entity
may employ alternative physical protective measures, such as the use of a courier or locked
container for transmission of information. It is not the intent of this standard to mandate the
use of one particular format for secure handling during transit.
A good Information Protection Program will document the circumstances under which BES
Cyber System Information can be shared with or used by third parties. The organization should
distribute or share information on a need-to-know basis. For example, the entity may specify
that a confidentiality agreement, non-disclosure arrangement, contract, or written agreement
of some kind concerning the handling of information must be in place between the entity and
the third party. The entity’s Information Protection Program should specify circumstances for
sharing of BES Cyber System Information with and use by third parties, for example, use of a
non-disclosure agreement. The entity should then follow their documented program. These
requirements do not mandate one specific type of arrangement.
Requirement R2:
Final Draft
June 2021
Page 18 of 20
CIP-011-2X — Cyber Security — Information Protection
This requirement allows for BES Cyber Systems to be removed from service and analyzed with
their media intact, as that should not constitute a release for reuse. However, following the
analysis, if the media is to be reused outside of a BES Cyber System or disposed of, the entity
must take action to prevent the unauthorized retrieval of BES Cyber System Information from
the media.
The justification for this requirement is pre-existing from previous versions of CIP and is also
documented in FERC Order No. 706 and its associated Notice of Proposed Rulemaking.
If an applicable Cyber Asset is removed from the Physical Security Perimeter prior to action
taken to prevent the unauthorized retrieval of BES Cyber System Information or destroying the
data storage media, the Responsible Entity should maintain documentation that identifies the
custodian for the data storage media while the data storage media is outside of the Physical
Security Perimeter prior to actions taken by the entity as required in R2.
Media sanitization is the process used to remove information from system media such that
reasonable assurance exists that the information cannot be retrieved or reconstructed. Media
sanitization is generally classified into four categories: Disposal, clearing, purging, and
destroying. For the purposes of this requirement, disposal by itself, with the exception of
certain special circumstances, such as the use of strong encryption on a drive used in a SAN or
other media, should never be considered acceptable. The use of clearing techniques may
provide a suitable method of sanitization for media that is to be reused, whereas purging
techniques may be more appropriate for media that is ready for disposal.
The following information from NIST SP800-88 provides additional guidance concerning the
types of actions that an entity might take to prevent the unauthorized retrieval of BES Cyber
System Information from the Cyber Asset data storage media:
Clear: One method to sanitize media is to use software or hardware products to
overwrite storage space on the media with non-sensitive data. This process may include
overwriting not only the logical storage location of a file(s) (e.g., file allocation table) but
also may include all addressable locations. The security goal of the overwriting process
is to replace written data with random data. Overwriting cannot be used for media that
are damaged or not rewriteable. The media type and size may also influence whether
overwriting is a suitable sanitization method [SP 800-36].
Purge: Degaussing and executing the firmware Secure Erase command (for ATA drives
only) are acceptable methods for purging. Degaussing is exposing the magnetic media to
a strong magnetic field in order to disrupt the recorded magnetic domains. A degausser
is a device that generates a magnetic field used to sanitize magnetic media. Degaussers
are rated based on the type (i.e., low energy or high energy) of magnetic media they can
purge. Degaussers operate using either a strong permanent magnet or an
electromagnetic coil. Degaussing can be an effective method for purging damaged or
inoperative media, for purging media with exceptionally large storage capacities, or for
Final Draft
June 2021
Page 19 of 20
CIP-011-2X — Cyber Security — Information Protection
quickly purging diskettes. [SP 800-36] Executing the firmware Secure Erase command
(for ATA drives only) and degaussing are examples of acceptable methods for purging.
Degaussing of any hard drive assembly usually destroys the drive as the firmware that
manages the device is also destroyed.
Destroy: There are many different types, techniques, and procedures for media
destruction. Disintegration, Pulverization, Melting, and Incineration are sanitization
methods designed to completely destroy the media. They are typically carried out at an
outsourced metal destruction or licensed incineration facility with the specific
capabilities to perform these activities effectively, securely, and safely. Optical mass
storage media, including compact disks (CD, CD-RW, CD-R, CD-ROM), optical disks
(DVD), and MO disks, must be destroyed by pulverizing, crosscut shredding or burning.
In some cases such as networking equipment, it may be necessary to contact the
manufacturer for proper sanitization procedure.
It is critical that an organization maintain a record of its sanitization actions to prevent
unauthorized retrieval of BES Cyber System Information. Entities are strongly encouraged to
review NIST SP800-88 for guidance on how to develop acceptable media sanitization processes.
Rationale:
During development of this standard, text boxes were embedded within the standard to explain
the rationale for various parts of the standard. Upon BOT approval, the text from the rationale
text boxes was moved to this section.
Rationale for Requirement R1:
The SDT’s intent of the information protection program is to prevent unauthorized access to
BES Cyber System Information.
Rationale for Requirement R2:
The intent of the BES Cyber Asset reuse and disposal process is to prevent the unauthorized
dissemination of BES Cyber System Information upon reuse or disposal.
Final Draft
June 2021
Page 20 of 20
Implementation Plan
Project 2019-02 BES Cyber System Information Access Management
Reliability Standard CIP-004 and CIP-011
Applicable Standard(s)
•
CIP-004-X – Cyber Security - Personnel & Training
•
CIP-011-X – Cyber Security - Information Protection
Requested Retirement(s)
•
CIP-004-6 – Cyber Security - Personnel & Training
•
CIP-011-2 – Cyber Security - Information Protection
Prerequisite Standard(s)
•
None
Applicable Entities
•
Balancing Authority
•
Distribution Provider 1
•
Generator Operator
•
Reliability Coordinator
•
Transmission Operator
•
Transmission Owner
Background
The purpose of Project 2019-02 BES Cyber System Information (BCSI) Access Management is to
clarify the CIP requirements related to both managing access and securing BCSI. This project
proposes revisions to Reliability Standards CIP-004-6 and CIP-011-2.
The proposed revisions enhance BES reliability by creating increased choice, greater flexibility,
higher availability, and reduced-cost options for entities to manage their BCSI. In addition, the
proposed revisions clarify the protections expected when utilizing third-party solutions (e.g., cloud
services).
1
See subject standards for additional information on Distribution Providers subject to the standards.
RELIABILITY | RESILIENCE | SECURITY
General Considerations
The 24-month period provides Responsible Entities with sufficient time to come into compliance
with new and revised Requirements, including taking steps to:
•
Implement electronic technical mechanisms to mitigate the risk of unauthorized access to
BCSI when Responsible Entities elect to use vendor services;
•
Establish and/or modify vendor relationships to ensure compliance with the updated CIP-004
and CIP-011; and
•
Administrative overhead to review their program.
The 24-month implementation period will allow budgetary cycles for Responsible Entities to allocate
the proper amount of resources to support implementation of the updated CIP-004 and CIP-011. In
addition, the implementation period will provide Electric Reliability Organization (ERO) and
Responsible Entities flexibility in case of unforeseen circumstances or events and afford the
opportunity for feedback to be provided to the ERO and Responsible Entities through various
communication vehicles within industry (e.g., NERC Reliability Standards Technical Committee,
North American Transmission Form), which will encourage more ownership and commitment by
Responsible Entities to adhere to the updated CIP-004 and CIP-011.
Effective Date
CIP-004-X – Cyber Security - Personnel & Training
Where approval by an applicable governmental authority is required, the standard shall become
effective on the first day of the first calendar quarter that is twenty-four (24) months after the
effective date of the applicable governmental authority’s order approving the standard, or as
otherwise provided for by the applicable governmental authority.
Where approval by an applicable governmental authority is not required, the standard shall become
effective on the first day of the first calendar quarter that is twenty-four (24) months after the date
the standard is adopted by the NERC Board of Trustees, or as otherwise provided for in that
jurisdiction.
CIP-011-X – Cyber Security - Information Protection
Where approval by an applicable governmental authority is required, the standard shall become
effective on the first day of the first calendar quarter that is twenty-four (24) months after the
effective date of the applicable governmental authority’s order approving the standard, or as
otherwise provided for by the applicable governmental authority.
Where approval by an applicable governmental authority is not required, the standard shall become
effective on the first day of the first calendar quarter that is twenty-four (24) months after the date
the standard is adopted by the NERC Board of Trustees, or as otherwise provided for in that
jurisdiction.
Implementation Plan | June 2021
Project 2019-02 BES Cyber System Information Access Management
2
Initial Performance of Periodic Requirements
Responsible Entities shall initially comply with the periodic requirements in the CIP-004-X and CIP011-X within the periodic timeframes of their last performance under the CIP-004-6 and CIP-011-2.
Compliance Dates for Early Adoption of Revised CIP Standards
A Responsible Entity may elect to comply with the requirements in CIP-004-X and CIP-011-X
following their approval by the applicable governmental authority, but prior to their Effective Date.
In such a case, the Responsible Entity shall notify the applicable Regional Entities of the date of
compliance with the CIP-004-X and CIP-011-X Reliability Standards. Responsible Entities must
comply with CIP-004-6 and CIP-011-2 until that date.
Retirement Date
CIP-004-6 – Cyber Security - Personnel & Training
Reliability Standard CIP-004-6 shall be retired immediately prior to the effective date of CIP-004-X in
the particular jurisdiction in which the revised standard is becoming effective.
CIP-011-2 – Cyber Security - Information Protection
Reliability Standard CIP-011-2 shall be retired immediately prior to the effective date of CIP-011-X in
the particular jurisdiction in which the revised standard is becoming effective.
Implementation Plan | June 2021
Project 2019-02 BES Cyber System Information Access Management
3
Implementation Plan
Project 2019-02 BES Cyber System Information Access Management
Reliability Standard CIP-004 and CIP-011
Applicable Standard(s)
•
CIP-004-7 – Cyber Security - Personnel & Training
•
CIP-011-3 – Cyber Security - Information Protection
Requested Retirement(s)
•
CIP-004-6 – Cyber Security - Personnel & Training
•
CIP-011-2 – Cyber Security - Information Protection
Prerequisite Standard(s)
•
None
Applicable Entities
•
Balancing Authority
•
Distribution Provider 1
•
Generator Operator
•
Reliability Coordinator
•
Transmission Operator
•
Transmission Owner
Background
The purpose of Project 2019-02 BES Cyber System Information (BCSI) Access Management is to
clarify the CIP requirements related to both managing access and securing BCSI. This project
proposes revisions to Reliability Standards CIP-004-6 and CIP-011-2.
The proposed revisions enhance BES reliability by creating increased choice, greater flexibility,
higher availability, and reduced-cost options for entities to manage their BCSI. In addition, the
proposed revisions clarify the protections expected when utilizing third-party solutions (e.g., cloud
services).
1
See subject standards for additional information on Distribution Providers subject to the standards.
RELIABILITY | RESILIENCE | SECURITY
General Considerations
The 24-month period provides Responsible Entities with sufficient time to come into compliance
with new and revised Requirements, including taking steps to:
•
Implement electronic technical mechanisms to mitigate the risk of unauthorized access to
BCSI when Responsible Entities elect to use vendor services;
•
Establish and/or modify vendor relationships to ensure compliance with the updated CIP-004
and CIP-011; and
•
Administrative overhead to review their program.
The 24-month implementation period will allow budgetary cycles for Responsible Entities to allocate
the proper amount of resources to support implementation of the updated CIP-004 and CIP-011. In
addition, the implementation period will provide Electric Reliability Organization (ERO) and
Responsible Entities flexibility in case of unforeseen circumstances or events and afford the
opportunity for feedback to be provided to the ERO and Responsible Entities through various
communication vehicles within industry (e.g., NERC Reliability Standards Technical Committee,
North American Transmission Form), which will encourage more ownership and commitment by
Responsible Entities to adhere to the updated CIP-004 and CIP-011.
Effective Date
CIP-004-7 – Cyber Security - Personnel & Training
Where approval by an applicable governmental authority is required, the standard shall become
effective on the first day of the first calendar quarter that is twenty-four (24) months after the
effective date of the applicable governmental authority’s order approving the standard, or as
otherwise provided for by the applicable governmental authority.
Where approval by an applicable governmental authority is not required, the standard shall become
effective on the first day of the first calendar quarter that is twenty-four (24) months after the date
the standard is adopted by the NERC Board of Trustees, or as otherwise provided for in that
jurisdiction.
CIP-011-3 – Cyber Security - Information Protection
Where approval by an applicable governmental authority is required, the standard shall become
effective on the first day of the first calendar quarter that is twenty-four (24) months after the
effective date of the applicable governmental authority’s order approving the standard, or as
otherwise provided for by the applicable governmental authority.
Where approval by an applicable governmental authority is not required, the standard shall become
effective on the first day of the first calendar quarter that is twenty-four (24) months after the date
the standard is adopted by the NERC Board of Trustees, or as otherwise provided for in that
jurisdiction.
Implementation Plan | June 2021
Project 2019-02 BES Cyber System Information Access Management
2
Initial Performance of Periodic Requirements
Responsible Entities shall initially comply with the periodic requirements in the CIP-004-7 and CIP011-3 within the periodic timeframes of their last performance under the CIP-004-6 and CIP-011-2.
Compliance Dates for Early Adoption of Revised CIP Standards
A Responsible Entity may elect to comply with the requirements in CIP-004-7 and CIP-011-3
following their approval by the applicable governmental authority, but prior to their Effective Date.
In such a case, the Responsible Entity shall notify the applicable Regional Entities of the date of
compliance with the CIP-004-7 and CIP-011-3 Reliability Standards. Responsible Entities must
comply with CIP-004-6 and CIP-011-2 until that date.
Retirement Date
CIP-004-6 – Cyber Security - Personnel & Training
Reliability Standard CIP-004-6 shall be retired immediately prior to the effective date of CIP-004-7 in
the particular jurisdiction in which the revised standard is becoming effective.
CIP-011-2 – Cyber Security - Information Protection
Reliability Standard CIP-011-2 shall be retired immediately prior to the effective date of CIP-011-3 in
the particular jurisdiction in which the revised standard is becoming effective.
Implementation Plan | June 2021
Project 2019-02 BES Cyber System Information Access Management
3
Cyber Security —
Personnel & Training
Technical Rationale and Justification for
Reliability Standard CIP-004-X
March 2021
RELIABILITY | RESILIENCE | SECURITY
NERC | Report Title | Report Date
I
Table of Contents
Preface ........................................................................................................................................................................... iii
Introduction ................................................................................................................................................................... iv
Requirement R1 .............................................................................................................................................................. 1
General Considerations for Requirement R1........................................................................................................... 1
Rationale for Requirement R1 ................................................................................................................................. 1
Requirement R2 .............................................................................................................................................................. 2
General Considerations for Requirement R2........................................................................................................... 2
Rationale for Requirement R2 ................................................................................................................................. 2
Requirement R3 .............................................................................................................................................................. 3
General Considerations for Requirement R3........................................................................................................... 3
Rationale for Requirement R3 ................................................................................................................................. 3
Requirement R4 .............................................................................................................................................................. 4
General Considerations for Requirement R4........................................................................................................... 4
Rationale for Requirement R4 ................................................................................................................................. 4
Requirement R5 .............................................................................................................................................................. 5
General Considerations for Requirement R5........................................................................................................... 5
Rationale for Requirement R5 ................................................................................................................................. 5
Requirement R6 .............................................................................................................................................................. 0
General Considerations for Requirement R6........................................................................................................... 0
Rationale for Requirement R6 ................................................................................................................................. 0
Attachment 1: Technical Rationale for Reliability Standard CIP-004-6 .......................................................................... 0
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-7 | March 2021
ii
Preface
Electricity is a key component of the fabric of modern society and the Electric Reliability Organization (ERO) Enterprise
serves to strengthen that fabric. The vision for the ERO Enterprise, which is comprised of the North American Electric
Reliability Corporation (NERC) and the six Regional Entities (REs), is a highly reliable and secure North American bulk
power system (BPS). Our mission is to assure the effective and efficient reduction of risks to the reliability and security
of the grid.
Reliability | Resilience | Security
Because nearly 400 million citizens in North America are counting on us
The North American BPS is divided into six RE boundaries as shown in the map and corresponding table below. The
multicolored area denotes overlap as some load-serving entities participate in one Region while associated
Transmission Owners/Operators participate in another.
MRO
Midwest Reliability Organization
NPCC
Northeast Power Coordinating Council
RF
ReliabilityFirst
SERC
SERC Reliability Corporation
Texas RE
Texas Reliability Entity
WECC
Western Electricity Coordinating Council
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-7 | March 2021
iii
Introduction
This document explains the technical rationale and justification for the proposed Reliability Standard CIP-004-X. It
provides stakeholders and the ERO Enterprise with an understanding of the technology and technical requirements
in the Reliability Standard. It also contains information on the intent of the Standard Drafting Team (SDT) in drafting
the requirements. This Technical Rationale and Justification for CIP-004-X is not a Reliability Standard and should not
be considered mandatory and enforceable.
On July 24, 2019, the North American Electric Reliability Corporation (NERC) Standards Committee accepted a
Standard Authorization Request (SAR) approving and initiative to enhance BES reliability by creating increased choice,
greater flexibility, higher availability, and reduced‐cost options for entities to manage their BES Cyber System
Information, by providing a secure path towards utilization of modern third‐party data storage and analysis systems.
In addition, the project intended to clarify the protections expected when utilizing third‐party solutions (e.g., cloud
services).
In response to this SAR, the Project 2019-02 SDT modified Reliability Standard CIP-004-X to require Responsible
Entities to implement specific controls in Requirement R6 to authorize, verify, and revoke provisioned access to BES
Cyber System Information (BCSI).
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-7 | March 2021
iv
Requirement R1
General Considerations for Requirement R1
None
Rationale for Requirement R1
The security awareness program is intended to be an informational program, not a formal training program. It should
reinforce security practices to ensure that personnel maintain awareness of best practices for both physical and
electronic security to protect its BES Cyber Systems. The Responsible Entity is not required to provide records that
show each individual received or understood the information, but they must maintain documentation of the program
materials utilized in the form of posters, memos, and/or presentations.
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-X | March 2021
1
Requirement R2
General Considerations for Requirement R2
None
Rationale for Requirement R2
Training shall cover the policies, access controls, and procedures as developed for the BES Cyber Systems and include,
at a minimum, the required items appropriate to personnel roles and responsibilities from Table Requirement R2.
One new element in the training content is intended to encompass networking hardware and software and other
issues of electronic interconnectivity supporting the operation and control of BES Cyber Systems as per FERC Order
No. 706, Paragraph 434. Additionally, training should address the risk posed when connecting and using Transient
Cyber Assets (TCA) and Removable Media with BES Cyber Systems or within an Electronic Security Perimeter. As
noted in FERC Order No. 791, Paragraph 135, TCA and Removable Media have been the source of incidents where
malware was introduced into electric generation industrial control systems in real-world situations. Training on their
use is a key element in protecting BES Cyber Systems. This is not intended to provide technical training to individuals
supporting networking hardware and software, but educating system users of the cyber security risks associated with
the interconnectedness of these systems. The users, based on their function, role, or responsibility, should have a
basic understanding of which systems can be accessed from other systems and how the actions they take can affect
cyber security.
Each Responsible Entity shall ensure all personnel who are granted authorized electronic access and/or authorized
unescorted physical access to its BES Cyber Systems, including contractors and service vendors, complete cyber
security training prior to their being granted authorized access, except for CIP Exceptional Circumstances. To retain
the authorized accesses, individuals must complete the training at least one every 15 months.
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-X | March 2021
2
Requirement R3
General Considerations for Requirement R3
None
Rationale for Requirement R3
Each Responsible Entity shall ensure a personnel risk assessment is performed for all personnel who are granted
authorized electronic access and/or authorized unescorted physical access to its BES Cyber Systems, including
contractors and service vendors, prior to their being granted authorized access, except for program specified
exceptional circumstances that are approved by the single senior management official or their delegate and impact
the reliability of the BES or emergency response. Identity should be confirmed in accordance with federal, state,
provincial, and local laws, and subject to existing collective bargaining unit agreements. Identity only needs to be
confirmed prior to initially granting access and only requires periodic confirmation according to the entity’s process
during the tenure of employment, which may or may not be the same as the initial verification action.
A seven year criminal history check should be performed for those locations where the individual has resided for at
least six consecutive months. This check should also be performed in accordance with federal, state, provincial, and
local laws, and subject to existing collective bargaining unit agreements. When it is not possible to perform a full
seven year criminal history check, documentation must be made of what criminal history check was performed, and
the reasons a full seven-year check could not be performed. Examples of this could include individuals under the age
of 25 where a juvenile criminal history may be protected by law, individuals who may have resided in locations from
where it is not possible to obtain a criminal history records check, violates the law or is not allowed under the existing
collective bargaining agreement. The Responsible Entity should consider the absence of information for the full seven
years when assessing the risk of granting access during the process to evaluate the criminal history check. There
needs to be a personnel risk assessment that has been completed within the last seven years for each individual with
access. A new criminal history records check must be performed as part of the new personnel risk assessment (PRA).
Individuals who have been granted access under a previous version of these standards need a new PRA within seven
years of the date of their last PRA. The clarifications around the seven year criminal history check in this version do
not require a new PRA be performed by the implementation date.
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-X | March 2021
3
Requirement R4
General Considerations for Requirement R4
None
Rationale for Requirement R4
Authorization for electronic and unescorted physical access must be on the basis of necessity in the individual
performing a work function. Documentation showing the authorization should have some justification of the business
need included.
This requirement specifies both quarterly reviews and reviews at least once every 15 calendar months. Quarterly
reviews are to perform a validation that only authorized users have been granted access to BES Cyber Systems. The
focus of this requirement is on the integrity of provisioning access rather than individual accounts on all BES Cyber
Assets.
The privilege review at least once every 15 calendar months is more detailed to ensure an individual’s associated
privileges are the minimum necessary to perform their work function.
If the results of quarterly or at least once every 15 calendar months account reviews indicate an administrative or
clerical error in which access was not actually provisioned, then the SDT intends that this error should not be
considered a violation of this requirement.
For BES Cyber Systems that do not have user accounts defined, the controls listed in Requirement R4 are not
applicable. However, the Responsible Entity should document such configurations.
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-X | March 2021
4
Requirement R5
General Considerations for Requirement R5
None
Rationale for Requirement R5
Revocation of electronic access should be understood to mean a process with the end result that electronic access
to BES Cyber Systems is no longer possible using credentials assigned to or known by the individual(s) whose access
privileges are being revoked.
The initial revocation required in Requirement R5 Part 5.1 includes unescorted physical access and Interactive
Remote Access. These two actions should prevent any further access by the individual after termination. If an
individual still has local access accounts (i.e., accounts on the Cyber Asset itself) on BES Cyber Assets, then the
Responsible Entity has 30 days to complete the revocation process for those accounts. However, nothing prevents a
Responsible Entity from performing all of the access revocation at the time of termination.
Revocation of access to shared accounts is called out separately to prevent the situation where passwords on
substation and generation devices are constantly changed due to staff turnover.
Requirement R5 Part 5.5 specified that passwords for shared account are to be changed within 30 calendar days of
the termination action or when the Responsible Entity determines an individual no longer requires access to the
account as a result of a reassignment or transfer. The 30 days applies under normal operating conditions. However,
circumstances may occur where this is not possible. Some systems may require an outage or reboot of the system in
order to complete the password change. In periods of extreme heat or cold, many Responsible Entities may prohibit
system outages and reboots in order to maintain reliability of the Bulk Electric System. When these circumstances
occur, the Responsible Entity must document these circumstances and prepare to change the password within 10
calendar days following the end of the operating circumstances. Records of activities must be retained to show that
the Responsible Entity followed the plan they created.
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-X | March 2021
5
Requirement R6
General Considerations for Requirement R6
None
Rationale for Requirement R6
Requirement R6 requires Responsible Entities to implement a BES Cyber System Information (BCSI) access
management program to ensure that provisioned access to BCSI is authorized, verified, and promptly revoked.
Authorization ensures only individuals who have a need are authorized for provisioned access to BCSI. Prompt
revocation of terminated individuals’ ability to access BCSI helps prevent inappropriate disclosure or use of BCSI.
Periodic verification ensures that what is currently provisioned is authorized and still required, and allows the
Responsible Entity the opportunity to correct any errors in provisioning.
The change to “provisioned access” instead of “designated storage locations” enables the use of third-party solutions
(e.g., cloud services) for BCSI. The concept of “designated storage locations” is too prescriptive and limiting for
entities that want to implement file-level rights and permissions (i.e., policy based credentials or encryption keys that
follow the file and the provisioned individual), which provide BCSI access controls regardless of storage location. The
concept of provisioned access provides the needed flexibility for entities to use other technologies and approaches
instead of or in addition to storage locations as a way to meet the access management requirements for BCSI,
especially that which is stored in third-party cloud solutions or is protected at the information/file level no matter
where it is located.
According to Requirement R6, Part 6.1, the Responsible Entity must authorize individuals to be given provisioned
access to BCSI. First, the Responsible Entity determines who needs the ability to obtain and use BCSI for performing
legitimate work functions. Next, a person empowered by the Responsible Entity to do so authorizes—gives
permission or approval for—those individuals to be given provisioned access to BCSI. Only then would the
Responsible Entity provision access to BCSI as authorized.
Provisioned access is to be considered the result of specific actions taken to provide an individual the means to access
BCSI (e.g., physical keys or access cards, user accounts and associated rights and privileges, encryption keys, etc.). In
the context of this requirement, an individual is considered to have been provisioned access if they concurrently have
the means to both obtain and use the BCSI. To illustrate, an individual who can obtain encrypted BCSI but does not
have the encryption keys to be able to use the BCSI has not been provisioned access to the BCSI.
For BCSI in physical format, physical access is provisioned to a physical storage location designated for BCSI and for
which access can be provisioned, such as a lockable file cabinet. For BCSI in electronic format, electronic access is
provisioned to an electronic system or its contents, or to individual files. Provisioned physical access alone to a
physical location housing hardware that contains electronic BCSI is not considered to be provisioned access to the
electronic BCSI. Take, for instance, storing BCSI with a cloud service provider. In this case, the cloud service provider’s
personnel with physical access to the data center is not, by itself, considered provisioned access to the electronic
BCSI stored on servers in that data center, as the personnel would also need to be provisioned electronic access to
the servers or system. In scenarios like this, the Responsible Entity should implement appropriate information
protection controls to help prevent unauthorized access to BCSI per its information protection program, as required
in CIP-011-X. The subparts in Requirement R6, Part 6.1 were written to reinforce this concept and clarify access
management requirements.
The periodic verification required by Requirement R6 Part 6.2 is to ensure that only authorized individuals have been
provisioned access to BCSI and that what is provisioned is what each individual currently needs to perform work
functions. For example, by performing the verification, the Responsible Entity might identify individuals who have
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-7 | August 2020
0
Requirement R6
changed jobs and no longer have a need for provisioned access to BCSI, and would therefore revoke provisioned
access.
For Requirement R6 Part 6.3, removal of an individual’s ability to use provisioned access to BCSI is considered to
mean a process with the result that electronic access to electronic BCSI and physical access to physical BCSI is no
longer possible from that point in time onwards using the means the individual had been given to obtain and use
BCSI in those circumstances. Either what was specifically provisioned to give an individual access to BCSI (e.g., keys,
local user or database accounts and associated privileges, etc.) is taken away, deleted, disabled, revoked, etc. (also
known as “deprovisioning”), or some primary access is removed which prevents the individual from using the
specifically provisioned means. Requirement R6 Part 6.3 acknowledges that where removing unescorted physical
access and Interactive Remote Access, such as is required in Requirement R5 Part 5.1, prevents any further access to
BCSI by the individual after termination, then this would constitute removal of an individual’s ability to use
provisioned access to BCSI. Access can only be revoked or removed where access has been provisioned. The intent is
not to have to retrieve individual pieces of BCSI (e.g., documents) that might be in someone’s possession (although
you should if you can, but the individual cannot un-see what they have already seen).
Where no specific mechanisms are available or feasible for provisioning access to BCSI, these requirements are not
applicable. For example, there is no available or feasible mechanism to provision access in instances when an
individual is merely given, views, or might see BCSI, such as when the individual is handed a piece of paper during a
meeting or sees a whiteboard in a conference room. Likewise, these requirements are not applicable where
provisioned electronic or physical access is not specifically intended to provide an individual the means to obtain and
use BCSI. There will likely be no specific provisioning of access to BCSI on work stations, laptops, flash drives, portable
equipment, offices, vehicles, etc., especially when BCSI is only temporarily or incidentally located or stored there.
Another example is the provisioning of access to a substation, the intent of which is to enable an individual to gain
access to the substation to perform substation-related work tasks, not to access BCSI that may be located there.
However, BCSI in these locations and situations still needs to be protected against unauthorized access per the
Responsible Entity’s information protection program as required by CIP-011-X.
The change to “provisioned access” to BCSI is backwards compatible with the previous “designated storage locations”
concept. Entities have likely designated only those storage locations to which access can be provisioned, rather than
any location where BCSI might be found. Both concepts intend to exclude those locations where BCSI is temporarily
stored, as explained in the previous paragraph. Provisioned access, like designated storage locations, maintains the
scope to a finite and discrete object that is manageable and auditable, rather than trying to manage access to
individual pieces of information. The removal of the term “designated storage location” does not preclude an entity
from defining storage locations for the entity’s access management program for authorization, verification, and
revocation of access to BCSI.
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-X | March 2021
1
Attachment 1: Technical Rationale for Reliability Standard CIP-004-6
This section contains a “cut and paste” of the Technical Rationale components of the former Guidelines and Technical
Basis (GTB) as-is of from CIP-004-6 standard to preserve any historical references. Similarly, former GTB content
providing compliance guidance can be found in a separate Implementation Guidance document for this standard.
Section 4 – Scope of Applicability of the CIP Cyber Security Standards
Section “4. Applicability” of the standards provides important information for Responsible Entities to determine the
scope of the applicability of the CIP Cyber Security Requirements.
Section “4.1. Functional Entities” is a list of NERC functional entities to which the standard applies. If the entity is
registered as one or more of the functional entities listed in Section 4.1, then the NERC CIP Cyber Security Standards
apply. Note that there is a qualification in Section 4.1 that restricts the applicability in the case of Distribution
Providers to only those that own certain types of systems and equipment listed in 4.2.
Section “4.2. Facilities” defines the scope of the Facilities, systems, and equipment owned by the Responsible Entity,
as qualified in Section 4.1, that is subject to the requirements of the standard. As specified in the exemption section
4.2.3.5, this standard does not apply to Responsible Entities that do not have High Impact or Medium Impact BES
Cyber Systems under CIP-002-5.1’s categorization. In addition to the set of BES Facilities, Control Centers, and other
systems and equipment, the list includes the set of systems and equipment owned by Distribution Providers. While
the NERC Glossary term “Facilities” already includes the BES characteristic, the additional use of the term BES here is
meant to reinforce the scope of applicability of these Facilities where it is used, especially in this applicability scoping
section. This in effect sets the scope of Facilities, systems, and equipment that is subject to the standards.
Requirement R1:
The security awareness program is intended to be an informational program, not a formal training program. It
should reinforce security practices to ensure that personnel maintain awareness of best practices for both physical
and electronic security to protect its BES Cyber Systems. The Responsible Entity is not required to provide records
that show that each individual received or understood the information, but they must maintain documentation of
the program materials utilized in the form of posters, memos, and/or presentations.
Requirement R2:
Training shall cover the policies, access controls, and procedures as developed for the BES Cyber Systems and
include, at a minimum, the required items appropriate to personnel roles and responsibilities from Table R2.
One new element in the training content is intended to encompass networking hardware and software and other
issues of electronic interconnectivity supporting the operation and control of BES Cyber Systems as per FERC Order
No. 706, Paragraph 434. Additionally, training should address the risk posed when connecting and using Transient
Cyber Assets and Removable Media with BES Cyber Systems or within an Electronic Security Perimeter. As noted in
FERC Order No. 791, Paragraph 135, Transient Cyber Assets and Removable Media have been the source of
incidents where malware was introduced into electric generation industrial control systems in real-world situations.
Training on their use is a key element in protecting BES Cyber Systems. This is not intended to provide technical
training to individuals supporting networking hardware and software, but educating system users of the cyber
security risks associated with the interconnectedness of these systems. The users, based on their function, role, or
responsibility, should have a basic understanding of which systems can be accessed from other systems and how
the actions they take can affect cyber security.
Each Responsible Entity shall ensure all personnel who are granted authorized electronic access and/or authorized
unescorted physical access to its BES Cyber Systems, including contractors and service vendors, complete cyber
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-7 | August 2020
0
Attachment 1: Technical Rationale for Reliability Standard CIP-004-6
security training prior to their being granted authorized access, except for CIP Exceptional Circumstances. To retain
the authorized accesses, individuals must complete the training at least one every 15 months.
Requirement R3:
Each Responsible Entity shall ensure a personnel risk assessment is performed for all personnel who are granted
authorized electronic access and/or authorized unescorted physical access to its BES Cyber Systems, including
contractors and service vendors, prior to their being granted authorized access, except for program specified
exceptional circumstances that are approved by the single senior management official or their delegate and impact
the reliability of the BES or emergency response.
Identity only needs to be confirmed prior to initially granting access and only requires periodic confirmation
according to the entity’s process during the tenure of employment, which may or may not be the same as the initial
verification action.
A seven year criminal history check should be performed for those locations where the individual has resided for at
least six consecutive months. This check should also be performed in accordance with federal, state, provincial, and
local laws, and subject to existing collective bargaining unit agreements. When it is not possible to perform a full
seven year criminal history check, documentation must be made of what criminal history check was performed, and
the reasons a full seven-year check could not be performed.
There needs to be a personnel risk assessment that has been completed within the last seven years for each
individual with access. A new criminal history records check must be performed as part of the new PRA. Individuals
who have been granted access under a previous version of these standards need a new PRA within seven years of
the date of their last PRA. The clarifications around the seven year criminal history check in this version do not
require a new PRA be performed by the implementation date.
Requirement R4:
Authorization for electronic and unescorted physical access and access to BES Cyber System Information must be
on the basis of necessity in the individual performing a work function. Documentation showing the authorization
should have some justification of the business need included. To ensure proper segregation of duties, access
authorization and provisioning should not be performed by the same person where possible.
This requirement specifies both quarterly reviews and reviews at least once every 15 calendar months. Quarterly
reviews are to perform a validation that only authorized users have been granted access to BES Cyber Systems. The
focus of this requirement is on the integrity of provisioning access rather than individual accounts on all BES Cyber
Assets.
The privilege review at least once every 15 calendar months is more detailed to ensure an individual’s associated
privileges are the minimum necessary to perform their work function.
An example timeline of all the reviews in Requirement R4 is included below.
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-X | March 2021
1
Attachment 1: Technical Rationale for Reliability Standard CIP-004-6
1/1
1) Quarterly access review
2) privilege review (at least once every
15 calendar months)
3) BES Cyber
System Information
review (at least once every
4/1
15 calendar months)
Quarterly access review
2/1
3/1
4/1
7/1
Quarterly access review
5/1
6/1
7/1
1/1
1) Quarterly access review
2) privilege review
(at least once every
15 calendar months)
3) BES Cyber System
Information review
(at least once every
15 calendar months)
10/1
Quarterly access review
8/1
9/1
10/1
11/1
12/1
1/1
1/1
If the results of quarterly or at least once every 15 calendar months account reviews indicate an administrative or
clerical error in which access was not actually provisioned, then the SDT intends that this error should not be
considered a violation of this requirement.
For BES Cyber Systems that do not have user accounts defined, the controls listed in Requirement R4 are not
applicable. However, the Responsible Entity should document such configurations.
Requirement R5:
The requirement to revoke access at the time of the termination action includes procedures showing revocation of
access concurrent with the termination action. This requirement recognizes that the timing of the termination action
may vary depending on the circumstance.
Revocation of electronic access should be understood to mean a process with the end result that electronic access
to BES Cyber Systems is no longer possible using credentials assigned to or known by the individual(s) whose access
privileges are being revoked.
The initial revocation required in Requirement R5.1 includes unescorted physical access and Interactive Remote
Access. These two actions should prevent any further access by the individual after termination. If an individual still
has local access accounts (i.e., accounts on the Cyber Asset itself) on BES Cyber Assets, then the Responsible Entity
has 30 days to complete the revocation process for those accounts.
Revocation of access to shared accounts is called out separately to prevent the situation where passwords on
substation and generation devices are constantly changed due to staff turnover.
Requirement 5.5 specified that passwords for shared account are to the changed within 30 calendar days of the
termination action or when the Responsible Entity determines an individual no longer requires access to the account
as a result of a reassignment or transfer. The 30 days applies under normal operating conditions. However,
circumstances may occur where this is not possible. Some systems may require an outage or reboot of the system in
order to complete the password change. In periods of extreme heat or cold, many Responsible Entities may prohibit
system outages and reboots in order to maintain reliability of the BES. When these circumstances occur, the
Responsible Entity must document these circumstances and prepare to change the password within 10 calendar days
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-X | March 2021
2
Attachment 1: Technical Rationale for Reliability Standard CIP-004-6
following the end of the operating circumstances. Records of activities must be retained to show that the Responsible
Entity followed the plan they created.
Rationale:
During development of this standard, text boxes were embedded within the standard to explain the rationale for
various parts of the standard. Upon BOT approval, the text from the rationale text boxes was moved to this section.
Rationale for Requirement R1:
Ensures that Responsible Entities with personnel who have authorized electronic or authorized unescorted physical
access to BES Cyber Assets take action so that those personnel with such authorized electronic or authorized
unescorted physical access maintain awareness of the Responsible Entity’s security practices.
Rationale for Requirement R2:
To ensure that the Responsible Entity’s training program for personnel who need authorized electronic access and/or
authorized unescorted physical access to BES Cyber Systems covers the proper policies, access controls, and
procedures to protect BES Cyber Systems and are trained before access is authorized.
Rationale for Requirement R3:
To ensure that individuals who need authorized electronic or authorized unescorted physical access to BES Cyber
Systems have been assessed for risk. Whether initial access or maintaining access, those with access must have had
a personnel risk assessment completed within the last 7 years.
Rationale for Requirement R4:
To ensure that individuals with access to BES Cyber Systems and the physical and electronic locations where BES
Cyber System Information is stored by the Responsible Entity have been properly authorized for such access.
“Authorization” should be considered to be a grant of permission by a person or persons empowered by the
Responsible Entity to perform such grants and included in the delegations referenced in CIP-003-6. “Provisioning”
should be considered the actions to provide access to an individual.
Access is physical, logical, and remote permissions granted to Cyber Assets composing the BES Cyber System or
allowing access to the BES Cyber System. When granting, reviewing, or revoking access, the Responsible Entity must
address the Cyber Asset specifically as well as the systems used to enable such access (i.e., physical access control
system, remote access system, directory services).
CIP Exceptional Circumstances are defined in a Responsible Entity’s policy from CIP-003-6 and allow an exception to
the requirement for authorization to BES Cyber Systems and BES Cyber System Information.
Quarterly reviews in Part 4.5 are to perform a validation that only authorized users have been granted access to BES
Cyber Systems. This is achieved by comparing individuals actually provisioned to a BES Cyber System against records
of individuals authorized to access the BES Cyber System. The focus of this requirement is on the integrity of
provisioning access rather than individual accounts on all BES Cyber Assets.
If the results of quarterly or annual account reviews indicate an administrative or clerical error in which access was
not actually provisioned, then the SDT intends that the error should not be considered a violation of this requirement.
For BES Cyber Systems that do not have user accounts defined, the controls listed in Requirement R4 are not
applicable. However, the Responsible Entity should document such configurations.
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-X | March 2021
3
Attachment 1: Technical Rationale for Reliability Standard CIP-004-6
Rationale for Requirement R5:
The timely revocation of electronic access to BES Cyber Systems is an essential element of an access management
regime. When an individual no longer requires access to a BES Cyber System to perform his or her assigned functions,
that access should be revoked. This is of particular importance in situations where a change of assignment or
employment is involuntary, as there is a risk the individual(s) involved will react in a hostile or destructive manner.
In considering how to address directives in FERC Order No. 706 directing “immediate” revocation of access for
involuntary separation, the SDT chose not to specify hourly time parameters in the requirement (e.g., revoking access
within 1 hour). The point in time at which an organization terminates a person cannot generally be determined down
to the hour. However, most organizations have formal termination processes, and the timeliest revocation of access
occurs in concurrence with the initial processes of termination.
Access is physical, logical, and remote permissions granted to Cyber Assets composing the BES Cyber System or
allowing access to the BES Cyber System. When granting, reviewing, or revoking access, the Responsible Entity must
address the Cyber Asset specifically as well as the systems used to enable such access (e.g., physical access control
system, remote access system, directory services).
NERC | Technical Rationale and Justification for Reliability Standard CIP-004-X | March 2021
4
Cyber Security —
Information Protection
Technical Rationale and Justification for
Reliability Standard CIP-011-X
March 2021
RELIABILITY | RESILIENCE | SECURITY
NERC | Report Title | Report Date
I
Table of Contents
Preface ........................................................................................................................................................................... iii
Introduction ................................................................................................................................................................... iv
Background................................................................................................................................................................. iv
Requirement R1 .............................................................................................................................................................. 5
General Considerations for Requirement R1 .............................................................................................................. 5
Rationale for Modifications to Requirement R1:..................................................................................................... 5
Requirement R2 .............................................................................................................................................................. 6
General Considerations for Requirement R2 .............................................................................................................. 6
Rationale for Requirement R2: ................................................................................................................................ 6
Attachment 1: Technical Rationale for Reliability Standard CIP-011-2 .......................................................................... 7
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-X | March 2021
ii
Preface
Electricity is a key component of the fabric of modern society and the Electric Reliability Organization (ERO) Enterprise
serves to strengthen that fabric. The vision for the ERO Enterprise, which is comprised of the North American Electric
Reliability Corporation (NERC) and the six Regional Entities (REs), is a highly reliable and secure North American bulk
power system (BPS). Our mission is to assure the effective and efficient reduction of risks to the reliability and security
of the grid.
Reliability | Resilience | Security
Because nearly 400 million citizens in North America are counting on us
The North American BPS is divided into six RE boundaries as shown in the map and corresponding table below. The
multicolored area denotes overlap as some load-serving entities participate in one Region while associated
Transmission Owners/Operators participate in another.
MRO
Midwest Reliability Organization
NPCC
Northeast Power Coordinating Council
RF
ReliabilityFirst
SERC
SERC Reliability Corporation
Texas RE
Texas Reliability Entity
WECC
Western Electricity Coordinating Council
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-X | March 2021
iii
Introduction
Background
This document explains the technical rationale and justification for the proposed Reliability Standard CIP-011-X. It
provides stakeholders and the ERO Enterprise with an understanding of the technology and technical requirements
in the Reliability Standard. It also contains information on the standard drafting team’s (SDT’s) intent in drafting the
requirements. This Technical Rationale and Justification for CIP-011-X is not a Reliability Standard and should not be
considered mandatory and enforceable.
On July 24, 2019, the North American Electric Reliability Corporation (NERC) Standards Committee accepted a
Standard Authorization Request (SAR) approving an initiative to enhance BES reliability by creating increased
choice, greater flexibility, higher availability, and reduced‐cost options for entities to manage their BES Cyber
System Information (BCSI), by providing a secure path towards utilization of modern third‐party data storage and
analysis systems. In addition, the project intended to clarify the protections expected when utilizing third‐party
solutions (e.g., cloud services).
In response to this SAR, the Project 2019-02 SDT drafted Reliability Standard CIP-011-X to require Responsible Entities
to implement specific methods in Requirement R1 for administrative, technical, and physical controls related to BCSI
during storage, handling and use including when utilizing vendor provided cloud services such as Software as a Service
(SaaS), Infrastructure as a Service (IaaS), or Platform as a Service (PaaS).
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-X | March 2021
iv
Requirement R1
General Considerations for Requirement R1
None
Rationale for Modifications to Requirement R1:
Requirement R1 still specifies the need to implement one or more documented information protection program(s).
The SDT does not intend that this requirement cover publicly available information, such as vendor manuals or
information that is deemed to be publicly releasable. Information protection pertains to both digital and hardcopy
information.
The SDT clarified the intent of protecting BCSI as opposed to protecting the BES Cyber System(s) and associated
applicable systems which may contain BCSI. This was achieved by modifying the parent CIP-011-X R1 requirement
language to include “for BES Cyber System Information (BCSI) pertaining to Applicable Systems”.
Rationale for Modifications to Requirement R1, Part 1.1
Requirement R1, Part 1.1, is an objective level requirement focused on identifying BES Cyber System Information
(BCSI). The intent of the SDT was to simplify the requirement language from CIP-011-2 Part 1.1.
Rationale for Modifications to Requirement R1, Part 1.2
Requirement R1, Part 1.2, is an objective level requirement focused on protecting and securely handling
BES Cyber System Information (BCSI) in order to mitigate risks of compromising confidentiality. The
reference to different states of information such as “transit” or “storage” or “use” was removed. The
intent is to reduce confusion of Responsible Entities attempting to interpret controls specific to different
states of information, limiting controls to said states, overlapping controls between states, and reduce
confusion from an enforcement perspective. By removing this language, methods to protect BCSI
becomes explicitly comprehensive.
Requirement language revisions reflect consistency with other CIP requirements.
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-X | March 2021
5
Requirement R2
General Considerations for Requirement R2
None
Rationale for Requirement R2:
The intent of the BES Cyber Asset reuse and disposal process is to prevent the unauthorized dissemination of BCSI
upon reuse or disposal.
This requirement allows for BES Cyber Systems to be removed from service and analyzed with their media intact, as
that should not constitute a release for reuse.
The justification for this requirement is pre-existing from previous versions of CIP and is also documented in FERC
Order No. 706 and its associated Notice of Proposed Rulemaking.
Requirement 2 has remained unchanged. The requirements are focused more on the reuse and disposal of BCS rather
than BCSI. While acknowledging that such BCS and other applicable systems may have BCSI residing on them, the
original intent of the requirement is broader than addressing BCSI. This is a lifecycle issue concerning the applicable
systems. CIP-002 focuses on the beginning of the BCS lifecycle but not an end. The potential end of the applicable
systems lifecycle is absent from CIP-011 to reduce confusion with reuse and disposal of BCSI. The 2019 BCSI Access
Management project did not include modification of CIP-002 in the scope of the SAR. This concern has been
communicated for future evaluation.
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-X | March 2021
6
Attachment 1: Technical Rationale for Reliability Standard CIP-011-2
This section contains a “cut and paste” of the Technical Rationale components of the former Guidelines and Technical
Basis (GTB) as-is of from CIP-011-2 standard to preserve any historical references. Similarly, former GTB content
providing compliance guidance can be found in a separate Implementation Guidance document for this standard.
Section 4 – Scope of Applicability of the CIP Cyber Security Standards
Section “4. Applicability” of the standards provides important information for Responsible Entities to determine the
scope of the applicability of the CIP Cyber Security Requirements.
Section “4.1. Functional Entities” is a list of NERC functional entities to which the standard applies. If the entity is
registered as one or more of the functional entities listed in Section 4.1, then the NERC CIP Cyber Security Standards
apply. Note that there is a qualification in Section 4.1 that restricts the applicability in the case of Distribution
Providers to only those that own certain types of systems and equipment listed in 4.2.
Section “4.2. Facilities” defines the scope of the Facilities, systems, and equipment owned by the Responsible Entity,
as qualified in Section 4.1, that is subject to the requirements of the standard. As specified in the exemption section
4.2.3.5, this standard does not apply to Responsible Entities that do not have High Impact or Medium Impact BES
Cyber Systems under CIP-002-5.1’s categorization. In addition to the set of BES Facilities, Control Centers, and other
systems and equipment, the list includes the set of systems and equipment owned by Distribution Providers. While
the NERC Glossary term “Facilities” already includes the BES characteristic, the additional use of the term BES here is
meant to reinforce the scope of applicability of these Facilities where it is used, especially in this applicability scoping
section. This in effect sets the scope of Facilities, systems, and equipment that is subject to the standards.
Requirement R1:
Responsible Entities are free to utilize existing change management and asset management systems.
However, the information contained within those systems must be evaluated, as the information protection
requirements still apply.
The justification for this requirement is pre-existing from previous versions of CIP and is also documented in FERC
Order No. 706 and its associated Notice of Proposed Rulemaking.
This requirement mandates that BES Cyber System Information be identified. The Responsible Entity has flexibility in
determining how to implement the requirement. The Responsible Entity should explain the method for identifying
the BES Cyber System Information in their information protection program. For example, the Responsible Entity may
decide to mark or label the documents. Identifying separate classifications of BES Cyber System Information is not
specifically required. However, a Responsible Entity maintains the flexibility to do so if they desire. As long as the
Responsible Entity’s information protection program includes all applicable items, additional classification levels (e.g.,
confidential, public, internal use only, etc.) can be created that go above and beyond the requirements. If the entity
chooses to use classifications, then the types of classifications used by the entity and any associated labeling should
be documented in the entity’s BES Cyber System Information Program.
The Responsible Entity may store all of the information about BES Cyber Systems in a separate repository or location
(physical and/or electronic) with access control implemented. For example, the Responsible Entity’s program could
document that all information stored in an identified repository is considered BES Cyber System Information, the
program may state that all information contained in an identified section of a specific repository is considered BES
Cyber System Information, or the program may document that all hard copies of information are stored in a secured
area of the building. Additional methods for implementing the requirement are suggested in the measures section.
However, the methods listed in measures are not meant to be an exhaustive list of methods that the entity may
choose to utilize for the identification of BES Cyber System Information.
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-X | March 2021
7
The SDT does not intend that this requirement cover publicly available information, such as vendor manuals that are
available via public websites or information that is deemed to be publicly releasable. Information protection pertains
to both digital and hardcopy information. Requirement R1 Part 1.2 requires one or more procedures for the
protection and secure handling BES Cyber System Information, including storage, transit, and use. This includes
information that may be stored on Transient Cyber Assets or Removable Media.
The entity’s written Information Protection Program should explain how the entity handles aspects of information
protection including specifying how BES Cyber System Information is to be securely handled during transit in order
to protect against unauthorized access, misuse, or corruption and to protect confidentiality of the communicated BES
Cyber System Information. For example, the use of a third-party communication service provider instead of
organization-owned infrastructure may warrant the use of encryption to prevent unauthorized disclosure of
information during transmission. The entity may choose to establish a trusted communications path for transit of BES
Cyber System Information. The trusted communications path would utilize a logon or other security measures to
provide secure handling during transit. The entity may employ alternative physical protective measures, such as the
use of a courier or locked container for transmission of information. It is not the intent of this standard to mandate
the use of one particular format for secure handling during transit.
A good Information Protection Program will document the circumstances under which BES Cyber System
Information can be shared with or used by third parties. The organization should distribute or share information on
a need-to-know basis. For example, the entity may specify that a confidentiality agreement, non-disclosure
arrangement, contract, or written agreement of some kind concerning the handling of information must be in place
between the entity and the third party. The entity’s Information Protection Program should specify circumstances for
sharing of BES Cyber System Information with and use by third parties, for example, use of a non-disclosure
agreement. The entity should then follow their documented program. These requirements do not mandate one
specific type of arrangement.
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-X | March 2021
8
Technical Rationale for Reliability Standard CIP-011-2
Requirement R2:
This requirement allows for BES Cyber Systems to be removed from service and analyzed with their media intact, as
that should not constitute a release for reuse. However, following the analysis, if the media is to be reused outside
of a BES Cyber System or disposed of, the entity must take action to prevent the unauthorized retrieval of BES Cyber
System Information from the media.
The justification for this requirement is pre-existing from previous versions of CIP and is also documented in FERC
Order No. 706 and its associated Notice of Proposed Rulemaking.
If an applicable Cyber Asset is removed from the Physical Security Perimeter prior to action taken to prevent the
unauthorized retrieval of BES Cyber System Information or destroying the data storage media, the Responsible Entity
should maintain documentation that identifies the custodian for the data storage media while the data storage media
is outside of the Physical Security Perimeter prior to actions taken by the entity as required in Requirement R2.
Media sanitization is the process used to remove information from system media such that reasonable assurance
exists that the information cannot be retrieved or reconstructed. Media sanitization is generally classified into four
categories: Disposal, clearing, purging, and destroying. For the purposes of this requirement, disposal by itself, with
the exception of certain special circumstances, such as the use of strong encryption on a drive used in a SAN or other
media, should never be considered acceptable. The use of clearing techniques may provide a suitable method of
sanitization for media that is to be reused, whereas purging techniques may be more appropriate for media that is
ready for disposal. The following information from NIST SP800-88 provides additional guidance concerning the types
of actions that an entity might take to prevent the unauthorized retrieval of BES Cyber System Information from the
Cyber Asset data storage media:
Clear: One method to sanitize media is to use software or hardware products to overwrite storage space on
the media with non-sensitive data. This process may include overwriting not only the logical storage location
of a file(s) (e.g., file allocation table) but also may include all addressable locations. The security goal of the
overwriting process is to replace written data with random data. Overwriting cannot be used for media that
are damaged or not rewriteable. The media type and size may also influence whether overwriting is a suitable
sanitization method [SP 800-36].
Purge: Degaussing and executing the firmware Secure Erase command (for ATA drives only) are acceptable
methods for purging. Degaussing is exposing the magnetic media to a strong magnetic field in order to disrupt
the recorded magnetic domains. A degausser is a device that generates a magnetic field used to sanitize
magnetic media. Degaussers are rated based on the type (i.e., low energy or high energy) of magnetic media
they can purge. Degaussers operate using either a strong permanent magnet or an electromagnetic coil.
Degaussing can be an effective method for purging damaged or inoperative media, for purging media with
exceptionally large storage capacities, or for quickly purging diskettes. [SP 800-36] Executing the firmware
Secure Erase command (for ATA drives only) and degaussing are examples of acceptable methods for purging.
Degaussing of any hard drive assembly usually destroys the drive as the firmware that manages the device is
also destroyed.
Destroy: There are many different types, techniques, and procedures for media destruction. Disintegration,
Pulverization, Melting, and Incineration are sanitization methods designed to completely destroy the media.
They are typically carried out at an outsourced metal destruction or licensed incineration facility with the
specific capabilities to perform these activities effectively, securely, and safely. Optical mass storage media,
including compact disks (CD, CDRW, CD-R, CD-ROM), optical disks (DVD), and MO disks, must be destroyed
by pulverizing, crosscut shredding or burning. In some cases such as networking equipment, it may be
necessary to contact the manufacturer for proper sanitization procedure.
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-X | March 2021
9
It is critical that an organization maintain a record of its sanitization actions to prevent unauthorized retrieval of BES
Cyber System Information. Entities are strongly encouraged to review NIST SP800-88 for guidance on how to develop
acceptable media sanitization processes.
Rationale:
During development of this standard, text boxes were embedded within the standard to explain the rationale for
various parts of the standard. Upon Board of Trustees approval, the text from the rationale text boxes was moved
to this section.
Rationale for Requirement R1:
The SDT’s intent of the information protection program is to prevent unauthorized access to BES Cyber System
Information.
Rationale for Requirement R2:
The intent of the BES Cyber Asset reuse and disposal process is to prevent the unauthorized dissemination of BES
Cyber System Information upon reuse or disposal.
NERC | Technical Rationale and Justification for Reliability Standard CIP-011-X | March 2021
10
DRAFT
Cyber Security —
Personnel & Training
Implementation Guidance for Reliability Standard
CIP-004-X
March 2021
RELIABILITY | RESILIENCE | SECURITY
NERC | Report Title | Report Date
I
Table of Contents
Preface ........................................................................................................................................................................... iii
Introduction ................................................................................................................................................................... iv
Requirement R1 .............................................................................................................................................................. 1
General Considerations for Requirement R1 .............................................................................................................. 1
Implementation Guidance for R1 ................................................................................................................................ 1
Requirement R2 .............................................................................................................................................................. 2
General Considerations for Requirement R2 .............................................................................................................. 2
Implementation Guidance for R2 ................................................................................................................................ 2
Requirement R3 .............................................................................................................................................................. 3
General Considerations for Requirement R3 .............................................................................................................. 3
Implementation Guidance for R3 ................................................................................................................................ 3
Requirement R4 .............................................................................................................................................................. 4
General Considerations for Requirement R4 .............................................................................................................. 4
Implementation Guidance for R4 ................................................................................................................................ 4
Requirement R5 .............................................................................................................................................................. 5
General Considerations for Requirement R5 .............................................................................................................. 5
Implementation Guidance for R5 ................................................................................................................................ 5
Requirement R6 .............................................................................................................................................................. 0
General Considerations for Requirement R6 .............................................................................................................. 0
Implementation Guidance for R6 ................................................................................................................................ 0
Apendix 1: Implementation Guidance for CIP-004-6 ...................................................................................................... 2
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
ii
Preface
Electricity is a key component of the fabric of modern society and the Electric Reliability Organization (ERO) Enterprise
serves to strengthen that fabric. The vision for the ERO Enterprise, which is comprised of the North American Electric
Reliability Corporation (NERC) and the six Regional Entities (REs), is a highly reliable and secure North American bulk
power system (BPS). Our mission is to assure the effective and efficient reduction of risks to the reliability and security
of the grid.
Reliability | Resilience | Security
Because nearly 400 million citizens in North America are counting on us
The North American BPS is divided into six RE boundaries as shown in the map and corresponding table below. The
multicolored area denotes overlap as some load-serving entities participate in one Region while associated
Transmission Owners/Operators participate in another.
MRO
Midwest Reliability Organization
NPCC
Northeast Power Coordinating Council
RF
ReliabilityFirst
SERC
SERC Reliability Corporation
Texas RE
Texas Reliability Entity
WECC
Western Electricity Coordinating Council
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
iii
Introduction
This Implementation Guidance was prepared to provide example approaches for compliance with CIP-004-X.
Implementation Guidance does not prescribe the only approach but highlights one or more approaches that could be
effective in achieving compliance with the standard. Because Implementation Guidance only provides examples,
entities may choose alternative approaches that better fit their individual situations. 1 This Implementation Guidance
for CIP-004-X is not a Reliability Standard and should not be considered mandatory and enforceable.
Responsible entities may find it useful to consider this Implementation Guidance document along with the
additional context and background provided in the SDT developed Technical Rationale and Justification for the
modifications to CIP-004-X.
1
NERC’s Compliance Guidance Policy
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
iv
Requirement R1
General Considerations for Requirement R1
None
Implementation Guidance for R1
None
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
1
Requirement R2
General Considerations for Requirement R2
None
Implementation Guidance for R2
The Responsible Entity has the flexibility to define the training program, and it may consist of multiple modules and
multiple delivery mechanisms, but a single training program for all individuals needing to be trained is acceptable.
The training can focus on functions, roles, or responsibilities at the discretion of the Responsible Entity.
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
2
Requirement R3
General Considerations for Requirement R3
None
Implementation Guidance for R3
None
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
3
Requirement R4
General Considerations for Requirement R4
None
Implementation Guidance for R4
Consider including the person or persons empowered by the Responsible Entity to authorize access in the delegations
referenced in CIP-003-8.
To ensure proper segregation of duties, access authorization and provisioning should not be performed by the same
person where possible. Separation of duties should also be considered when performing the reviews in Requirement
R4. The person reviewing should be different than the person provisioning access.
Quarterly reviews can be achieved by comparing individuals actually provisioned access against records of individuals
authorized for provisioned access. The list of provisioned individuals can be an automatically generated account
listing. However, in a BES Cyber System with several account databases, the list of provisioned individuals may come
from other records such as provisioning workflow or a user account database where provisioning typically initiates.
Entities can more efficiently perform the 15-calendar-month review by implementing role-based access. This involves
determining the specific roles on the system (e.g., system operator, technician, report viewer, administrator, etc.)
then grouping access privileges to the role and assigning users to the role. Role-based access does not assume any
specific software and can be implemented by defining specific provisioning processes for each role where access
group assignments cannot be performed.
An example timeline of all the reviews in Requirements R4 and R6 is included below.
1/1
1) Quarterly access review
2) privilege review (at least once every
15 calendar months)
3) BES Cyber
System Information
review (at least once every
4/1
15 calendar months)
Quarterly access review
2/1
3/1
4/1
7/1
Quarterly access review
5/1
6/1
7/1
1/1
1) Quarterly access review
2) privilege review
(at least once every
15 calendar months)
3) BES Cyber System
Information review
(at least once every
15 calendar months)
10/1
Quarterly access review
8/1
9/1
10/1
11/1
1/1
12/1
1/1
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
4
Requirement R5
General Considerations for Requirement R5
None
Implementation Guidance for R5
The requirement to revoke access at the time of the termination action includes procedures showing revocation of
access concurrent with the termination action. This requirement recognizes that the timing of the termination action
may vary depending on the circumstance. Some common scenarios and possible processes on when the termination
action occurs are provided in the following table. These scenarios are not an exhaustive list of all scenarios, but are
representative of several routine business practices.
Scenario
Possible Process
Immediate involuntary termination
Human resources or corporate security escorts the individual off site
and the supervisor or human resources personnel notify the
appropriate personnel to begin the revocation process.
Scheduled involuntary termination
Human resources personnel are notified of the termination and work
with appropriate personnel to schedule the revocation of access at the
time of termination.
Voluntary termination
Human resources personnel are notified of the termination and work
with appropriate personnel to schedule the revocation of access at the
time of termination.
Retirement where the last working
day is several weeks prior to the
termination date
Human resources personnel coordinate with manager to determine the
final date access is no longer needed and schedule the revocation of
access on the determined day.
Death
Human resources personnel are notified of the death and work with
appropriate personnel to begin the revocation process.
Steps taken to accomplish revocation of access may include deletion or deactivation of accounts used by the
individual(s). Entities should consider the ramifications of deleting an account may include incomplete event log
entries due to an unrecognized account or system services using the account to log on.
For transferred or reassigned individuals, a review of access privileges should be performed. This review could entail
a simple listing of all authorizations for an individual and working with the respective managers to determine which
access will still be needed in the new position. For instances in which the individual still needs to retain access as part
of a transitory period, the entity should schedule a time to review these access privileges or include the privileges in
the quarterly account review or annual privilege review.
If an entity considers transitioning a contracted individual to a direct hire, an entity should consider how they will
meet the evidentiary requirements for Requirements R1 through R4. If evidence for compliance with Requirements
R1 through R4 cannot be provided, the entity should consider invoking the applicable sub-requirements in
Requirement R5 for this administrative transfer scenario. Entities should also consider including this scenario in their
access management program, including a higher-level approval to minimize the instances to which this scenario
would apply.
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
5
Requirement R6
General Considerations for Requirement R6
None
Implementation Guidance for R6
This requirement recognizes that the timing of the termination action may vary depending on the circumstance. Some
common scenarios and possible processes on when the termination action occurs are provided in the following table.
These scenarios are not an exhaustive list of all scenarios, but are representative of several routine business practices.
Scenario
Possible Process
Immediate involuntary termination
Human resources or corporate security escorts the individual off site
and the supervisor or human resources personnel notify the
appropriate personnel to begin the revocation process.
Scheduled involuntary termination
Human resources personnel are notified of the termination and work
with appropriate personnel to schedule the revocation of access at the
time of termination.
Voluntary termination
Human resources personnel are notified of the termination and work
with appropriate personnel to schedule the revocation of access at the
time of termination.
Retirement where the last working
day is several weeks prior to the
termination date
Human resources personnel coordinate with manager to determine the
final date access is no longer needed and schedule the revocation of
access on the determined day.
Death
Human resources personnel are notified of the death and work with
appropriate personnel to begin the revocation process.
Steps taken to accomplish revocation of access may include deletion or deactivation of accounts used by the
individual(s). Entities should consider the ramifications of deleting an account may include incomplete event log
entries due to an unrecognized account or system services using the account to log on.
To ensure proper segregation of duties, access authorization and provisioning should not be performed by the same
person where possible. Separation of duties should also be considered when performing the 15-calendar-month
verification in Requirement R6. The person reviewing should be different than the person provisioning access.
Entities may choose not to provision access, or provision temporary rather than persistent access, for authorized
users. In other words, an authorized individual does not have to have any access provisioned, but all provisioned
access must be authorized.
An entity can choose to give an authorization to access any BCSI, or they can have authorizations for specific storage
locations or types of BCSI, if they so choose.
While Part 6.1 only requires authorization for provisioned access to BCSI, entities may also choose to have a process
to authorize individuals (that is, grant them permission or make them eligible) to receive, see, or use BCSI that is
disclosed to them, much like a security clearance. This can be helpful from an information protection standpoint
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
0
Requirement R6
where individuals can be instructed to only share BCSI with others who are authorized to see it, and entities could
implement this as part of their CIP-011 Information Protection Program. In this case, the review required in
Requirement R6 Part 6.2 should still be performed, and the revocation required in Requirement R6 Part 6.3 could
consist of removing the individual’s name from the authorized list at the time of termination or upon review when it
is determined the individual no longer has a need.
Entities can more efficiently perform the 15-calendar-month BCSI review by implementing role-based access. This
involves determining the specific roles on the system (e.g., system operator, technician, report viewer, administrator)
then grouping access privileges to the role and assigning users to the role. Role-based access does not assume any
specific software and can be implemented by defining specific provisioning processes for each role where access
group assignments cannot be performed. For an example timeline to perform the 15-calendar-month BCSI review,
refer to the graphic in the Implementation Guidance for R4 section.
An example where a termination action in Requirement R5 Part 5.1, satisfies Requirement R6 Part 6.3, would be the
Responsible Entity revoking an individual’s means of unescorted physical access and Interactive Remote Access (e.g.,
physical access card, virtual private network, Active Directory user account). By revoking both physical and electronic
access, the individual could ultimately not have access to BES Cyber System Information. The Responsible Entity
should still revoke access that is manually provisioned (e.g., local user account, relay, site area network server, cloud
based BCSI that is not tied to an active directory account).
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
1
Appendix 1: Implementation Guidance for CIP-004-6
This section contains a “cut and paste” of the Implementation Guidance components of the former Guidelines and
Technical Basis (GTB) as-is of from CIP-004-6 standard to preserve any historical references. Similarly, former GTB
content providing SDT intent and technical rationale sencan be found in a separate Technical Rational document for
this standard.
Section 4 – Scope of Applicability of the CIP Cyber Security Standards
Requirement R1:
Examples of possible mechanisms and evidence, when dated, which can be used are:
•
Direct communications (e.g., emails, memos, computer based training, etc.);
•
Indirect communications (e.g., posters, intranet, brochures, etc.);
•
Management support and reinforcement (e.g., presentations, meetings, etc.).
Requirement R2:
The Responsible Entity has the flexibility to define the training program and it may consist of multiple modules and
multiple delivery mechanisms, but a single training program for all individuals needing to be trained is acceptable.
The training can focus on functions, roles or responsibilities at the discretion of the Responsible Entity.
Requirement R3:
Identity should be confirmed in accordance with federal, state, provincial, and local laws, and subject to existing
collective bargaining unit agreements.
Examples of this could include individuals under the age of 25 where a juvenile criminal history may be protected
by law, individuals who may have resided in locations from where it is not possible to obtain a criminal history
records check, violates the law or is not allowed under the existing collective bargaining agreement. The
Responsible Entity should consider the absence of information for the full seven years when assessing the risk of
granting access during the process to evaluate the criminal history check.
Requirement R4:
To ensure proper segregation of duties, access authorization and provisioning should not be performed by the
same person where possible.
This is achieved by comparing individuals actually provisioned to a BES Cyber System against records of individuals
authorized to the BES Cyber System. The list of provisioned individuals can be an automatically generated account
listing. However, in a BES Cyber System with several account databases, the list of provisioned individuals may come
from other records such as provisioning workflow or a user account database where provisioning typically initiates.
(i.e., least privilege). Entities can more efficiently perform this review by implementing role-based access. This
involves determining the specific roles on the system (e.g., system operator, technician, report viewer, administrator,
etc.) then grouping access privileges to the role and assigning users to the role. Role-based access does not assume
any specific software and can be implemented by defining specific provisioning processes for each role where access
group assignments cannot be performed. Role-based access permissions eliminate the need to perform the privilege
review on individual accounts.
This is achieved by comparing individuals actually provisioned to a BES Cyber System against records of individuals
authorized to access the BES Cyber System. The list of provisioned individuals can be an automatically generated
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
2
Appendix 1: Implementation Guidance for CIP-004-6
account listing. However, in a BES Cyber System with several account databases, the list of provisioned individuals
may come from other records such as provisioning workflow or a user account database where provisioning typically
initiates.
Separation of duties should be considered when performing the reviews in Requirement R4. The person reviewing
should be different than the person provisioning access.
Requirement R5:
Some common scenarios and possible processes on when the termination action occurs are provided in the
following table. These scenarios are not an exhaustive list of all scenarios, but are representative of several routine
business practices.
Scenario
Possible Process
Immediate involuntary
termination
Human resources or corporate security escorts the individual off site and
the supervisor or human resources personnel notify the appropriate
personnel to begin the revocation process.
Scheduled involuntary
termination
Human resources personnel are notified of the termination and work with
appropriate personnel to schedule the revocation of access at the time of
termination.
Voluntary termination
Human resources personnel are notified of the termination and work with
appropriate personnel to schedule the revocation of access at the time of
termination.
Retirement where the last
working day is several weeks
prior to the termination date
Human resources personnel coordinate with manager to determine the
final date access is no longer needed and schedule the revocation of
access on the determined day.
Death
Human resources personnel are notified of the death and work with
appropriate personnel to begin the revocation process.
Steps taken to accomplish this outcome may include deletion or deactivation of accounts used by the individual(s),
but no specific actions are prescribed. Entities should consider the ramifications of deleting an account may include
incomplete event log entries due to an unrecognized account or system services using the account to log on.
However, nothing prevents a Responsible Entity from performing all of the access revocation at the time of
termination.
For transferred or reassigned individuals, a review of access privileges should be performed. This review could
entail a simple listing of all authorizations for an individual and working with the respective managers to determine
which access will still be needed in the new position. For instances in which the individual still needs to retain
access as part of a transitory period, the entity should schedule a time to review these access privileges or include
the privileges in the quarterly account review or annual privilege review.
NERC | Implementation Guidance for Reliability Standard CIP-004-X | March 2021
3
Violation Risk Factor and Violation Severity Level
Justifications
Project 2019-02 BES Cyber System Information Access Management
This document provides the standard drafting team’s (SDT’s) justification for assignment of violation risk factors (VRFs) and violation severity
levels (VSLs) for each requirement in Project 2019-02 BES Cyber System Information Access Management CIP-004-X. Each requirement is
assigned a VRF and a VSL. These elements support the determination of an initial value range for the Base Penalty Amount regarding
violations of requirements in FERC-approved Reliability Standards, as defined in the Electric Reliability Organizations (ERO) Sanction
Guidelines. The SDT applied the following NERC criteria and FERC Guidelines when developing the VRFs and VSLs for the requirements.
NERC Criteria for Violation Risk Factors
High Risk Requirement
A requirement that, if violated, could directly cause or contribute to Bulk Electric System instability, separation, or a cascading sequence of
failures, or could place the Bulk Electric System at an unacceptable risk of instability, separation, or cascading failures; or, a requirement in a
planning time frame that, if violated, could, under emergency, abnormal, or restorative conditions anticipated by the preparations, directly
cause or contribute to Bulk Electric System instability, separation, or a cascading sequence of failures, or could place the Bulk Electric System
at an unacceptable risk of instability, separation, or cascading failures, or could hinder restoration to a normal condition.
Medium Risk Requirement
A requirement that, if violated, could directly affect the electrical state or the capability of the Bulk Electric System, or the ability to effectively
monitor and control the Bulk Electric System. However, violation of a medium risk requirement is unlikely to lead to Bulk Electric System
instability, separation, or cascading failures; or, a requirement in a planning time frame that, if violated, could, under emergency, abnormal,
or restorative conditions anticipated by the preparations, directly and adversely affect the electrical state or capability of the Bulk Electric
System, or the ability to effectively monitor, control, or restore the Bulk Electric System. However, violation of a medium risk requirement is
unlikely, under emergency, abnormal, or restoration conditions anticipated by the preparations, to lead to Bulk Electric System instability,
separation, or cascading failures, nor to hinder restoration to a normal condition.
RELIABILITY | RESILIENCE | SECURITY
Lower Risk Requirement
A requirement that is administrative in nature and a requirement that, if violated, would not be expected to adversely affect the electrical
state or capability of the Bulk Electric System, or the ability to effectively monitor and control the Bulk Electric System; or, a requirement that
is administrative in nature and a requirement in a planning time frame that, if violated, would not, under the emergency, abnormal, or
restorative conditions anticipated by the preparations, be expected to adversely affect the electrical state or capability of the Bulk Electric
System, or the ability to effectively monitor, control, or restore the Bulk Electric System.
FERC Guidelines for Violation Risk Factors
Guideline (1) – Consistency with the Conclusions of the Final Blackout Report
FERC seeks to ensure that VRFs assigned to Requirements of Reliability Standards in these identified areas appropriately reflect their historical
critical impact on the reliability of the Bulk-Power System. In the VSL Order, FERC listed critical areas (from the Final Blackout Report) where
violations could severely affect the reliability of the Bulk-Power System:
•
Emergency operations
•
Vegetation management
•
Operator personnel training
•
Protection systems and their coordination
•
Operating tools and backup facilities
•
Reactive power and voltage control
•
System modeling and data exchange
•
Communication protocol and facilities
•
Requirements to determine equipment ratings
•
Synchronized data recorders
•
Clearer criteria for operationally critical facilities
•
Appropriate use of transmission loading relief.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | June 2021
2
Guideline (2) – Consistency within a Reliability Standard
FERC expects a rational connection between the sub-Requirement VRF assignments and the main Requirement VRF assignment.
Guideline (3) – Consistency among Reliability Standards
FERC expects the assignment of VRFs corresponding to Requirements that address similar reliability goals in different Reliability Standards
would be treated comparably.
Guideline (4) – Consistency with NERC’s Definition of the Violation Risk Factor Level
Guideline (4) was developed to evaluate whether the assignment of a particular VRF level conforms to NERC’s definition of that risk level.
Guideline (5) – Treatment of Requirements that Co-mingle More Than One Obligation
Where a single Requirement co-mingles a higher risk reliability objective and a lesser risk reliability objective, the VRF assignment for such
Requirements must not be watered down to reflect the lower risk level associated with the less important objective of the Reliability
Standard.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | June 2021
3
NERC Criteria for Violation Severity Levels
VSLs define the degree to which compliance with a requirement was not achieved. Each requirement must have at least one VSL. While it is
preferable to have four VSLs for each requirement, some requirements do not have multiple “degrees” of noncompliant performance and
may have only one, two, or three VSLs.
VSLs should be based on NERC’s overarching criteria shown in the table below:
Lower VSL
Moderate VSL
The performance or product
measured almost meets the full
intent of the requirement.
The performance or product
measured meets the majority of
the intent of the requirement.
High VSL
The performance or product
measured does not meet the
majority of the intent of the
requirement, but does meet
some of the intent.
Severe VSL
The performance or product
measured does not
substantively meet the intent of
the requirement.
FERC Order of Violation Severity Levels
The FERC VSL guidelines are presented below, followed by an analysis of whether the VSLs proposed for each requirement in the standard
meet the FERC Guidelines for assessing VSLs:
Guideline (1) – Violation Severity Level Assignments Should Not Have the Unintended Consequence of Lowering the Current
Level of Compliance
Compare the VSLs to any prior levels of non-compliance and avoid significant changes that may encourage a lower level of compliance than
was required when levels of non-compliance were used.
Guideline (2) – Violation Severity Level Assignments Should Ensure Uniformity and Consistency in the Determination of
Penalties
A violation of a “binary” type requirement must be a “Severe” VSL.
Do not use ambiguous terms such as “minor” and “significant” to describe noncompliant performance.
Guideline (3) – Violation Severity Level Assignment Should Be Consistent with the Corresponding Requirement
VSLs should not expand on what is required in the requirement.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | June 2021
4
Guideline (4) – Violation Severity Level Assignment Should Be Based on a Single Violation, Not on a Cumulative Number of
Violations
Unless otherwise stated in the requirement, each instance of non-compliance with a requirement is a separate violation. Section 4 of the
Sanction Guidelines states that assessing penalties on a per violation per day basis is the “default” for penalty calculations.
VRF Justification for CIP-004-X, Requirement R1
The VRF did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VSL Justification for CIP-004-X, Requirement R1
The VSL did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VRF Justification for CIP-004-X, Requirement R2
The VRF did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VSL Justification for CIP-004-X, Requirement R2
The VSL did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VRF Justification for CIP-004-X, Requirement R3
The VRF did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VSL Justification for CIP-004-X, Requirement R3
The VSL did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VRF Justification for CIP-004-X, Requirement R4
The VRF did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VSL Justification for CIP-004-X, Requirement R4
The VSL has been revised to reflect the removal of Part 4.4 (moved to CIP-004-X, Requirement R6, Part 6.2) and a portion of Part 4.1 (moved
to CIP-004-X, Requirement R6, Part 6.1). The VSL did not otherwise change from the previously FERC approved CIP-004-6 Reliability Standard.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | June 2021
5
VRF Justification for CIP-004-X, Requirement R5
The VRF did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VSL Justification for CIP-004-X, Requirement R5
The VSL has been revised to reflect the removal of Part 5.3 (moved to CIP-004-X, Requirement R6, Part 6.3). The VSL did not otherwise
change from the previously FERC approved CIP-004-6 Reliability Standard.
VRF Justifications for CIP-004-X R6
Proposed VRF
Medium
NERC VRF Discussion
Requirement R6 is a Requirement in the Same Day Operations and Operations Planning time horizons to
implement one or more documented access management program(s) to authorize, verify, and revoke
provisioned access to BCSI pertaining to the “Applicable System” identified in CIP-004-X Table R6 – Access
Management for BCSI that collectively include each of the applicable requirement parts in CIP-004-X Table
R6 – Access Management for BES Cyber System Information. To be considered access to BCSI in the
context of this requirement, an individual has both the ability to obtain and use BCSI. If violated, it could
directly affect the electrical state or the capability of the bulk electric system, or the ability to effectively
monitor and control the bulk electric system. However, violation of the requirement is unlikely to lead to
bulk electric system instability, separation, or cascading failures.
FERC VRF G1 Discussion
Guideline 1- Consistency w/ Blackout Report
Guideline 1- Consistency
with Blackout Report
This requirement does not address any of the critical areas identified in the Final Blackout Report.
FERC VRF G2 Discussion
Guideline 2- Consistency within a Reliability Standard
Guideline 2- Consistency
within a Reliability Standard
The proposed VRF is consistent among other FERC approved VRFs within the standard, specifically
Requirements R4 and R5 from which Requirement R6 is modified.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | June 2021
6
VRF Justifications for CIP-004-X R6
Proposed VRF
Medium
FERC VRF G3 Discussion
Guideline 3- Consistency among Reliability Standards
Guideline 3- Consistency
among Reliability Standards
This is a new requirement addressing specific reliability goals. The VRF assignment is consistent with
similar Requirements in the CIP Reliability Standards.
FERC VRF G4 Discussion
Guideline 4- Consistency with NERC Definitions of VRFs
Guideline 4- Consistency
with NERC Definitions of
VRFs
A VRF of Medium is consistent with the NERC VRF definition.
FERC VRF G5 Discussion
Guideline 5- Treatment of Requirements that Co-mingle More than One Obligation
Guideline 5- Treatment of
Requirements that Comingle More than One
Obligation
Requirement R6 contains only one objective, which is to implement one or more documented access
management program(s) to authorize, verify, and revoke provisioned access to BCSI pertaining to the
“Applicable System” identified in CIP-004-X Table R6 – Access Management for BCSI that collectively
include each of the applicable requirement parts in CIP-004-X Table R6 – Access Management for BES
Cyber System Information. To be considered access to BCSI in the context of this requirement, an
individual has both the ability to obtain and use BCSI. Since the requirement has only one objective, only
one VRF was assigned.
VSLs for CIP-004-X R6
Lower
Moderate
High
The Responsible Entity has
implemented one or more
program(s) as required by
Requirement R6 Part 6.1 but, for
one individual, did not authorize
The Responsible Entity has
implemented one or more
program(s) as required by
Requirement R6 Part 6.1 but, for
two individuals, did not
The Responsible Entity has
implemented one or more
program(s) as required by
Requirement R6 Part 6.1 but, for
three individuals, did not
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | June 2021
Severe
The Responsible Entity did not
implement one or more
documented access
management program(s) for
BCSI. (R6)
7
provisioned electronic access to
electronic BCSI or provisioned
physical access to physical BCSI.
(6.1)
authorize provisioned electronic
access to electronic BCSI or
provisioned physical access to
physical BCSI. (6.1)
authorize provisioned electronic
access to electronic BCSI or
provisioned physical access to
physical BCSI. (6.1)
OR
OR
OR
The Responsible Entity
performed the verification
required by Requirement R6
Part 6.2 more than 15 calendar
months but less than or equal to
16 calendar months of the
previous verification. (6.2)
The Responsible Entity
performed the verification
required by Requirement R6
Part 6.2 more than 16 calendar
months but less than or equal to
17 calendar months of the
previous verification. (6.2)
The Responsible Entity
performed the verification
required by Requirement R6
Part 6.2 more than 17 calendar
months but less than or equal to
18 calendar months of the
previous verification. (6.2)
OR
The Responsible Entity has
implemented one or more
program(s) to remove the
individual’s ability to use
provisioned access to BCSI but,
for one individual, did not do so
by the timeframe required in
Requirement R6, Part 6.3.
OR
OR
The Responsible Entity has
The Responsible Entity has
implemented one or more
implemented one or more
program(s) to remove the
program(s) to remove the
individual’s ability to use
individual’s ability to use
provisioned access to BCSI but,
provisioned access to BCSI but,
for two individuals, did not do so for three individuals, did not do
by the timeframe required in
so by the timeframe required in
Requirement R6, Part 6.3.
Requirement R6, Part 6.3.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | June 2021
OR
The Responsible Entity has
implemented one or more
program(s) as required by
Requirement R6 Part 6.1 but, for
four or more individuals, did not
authorize provisioned electronic
access to electronic BCSI or
provisioned physical access to
physical BCSI. (6.1)
OR
The Responsible Entity
performed the verification
required by Requirement R6
Part 6.2 more than 18 calendar
months of the previous
verification. (6.2)
OR
The Responsible Entity has
implemented one or more
program(s) to remove the
individual’s ability to use
provisioned access to BCSI but,
for four or more individuals, did
not do so by the timeframe
required in Requirement R6,
Part 6.3.
8
VSL Justifications for CIP-004-X R6
FERC VSL G1
There is no prior compliance obligation related to the subject of this requirement.
Violation Severity Level
Assignments Should Not
Have the Unintended
Consequence of Lowering
the Current Level of
Compliance
FERC VSL G2
Violation Severity Level
Assignments Should Ensure
Uniformity and Consistency
in the Determination of
Penalties
The proposed VSLs are not binary and do not use any ambiguous terminology, thereby supporting
uniformity and consistency in the determination of similar penalties for similar violations.
Guideline 2a: The Single
Violation Severity Level
Assignment Category for
"Binary" Requirements Is
Not Consistent
Guideline 2b: Violation
Severity Level Assignments
that Contain Ambiguous
Language
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | June 2021
9
FERC VSL G3
Violation Severity Level
Assignment Should Be
Consistent with the
Corresponding Requirement
FERC VSL G4
The proposed VSL uses similar terminology to that used in the associated requirement and is therefore
consistent with the requirement.
Proposed VSLs are based on a single violation and not cumulative violations.
Violation Severity Level
Assignment Should Be Based
on A Single Violation, Not on
A Cumulative Number of
Violations
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | June 2021
10
Violation Risk Factor and Violation Severity Level
Justifications
Project 2019-02 BES Cyber System Information Access Management
This document provides the standard drafting team’s (SDT’s) justification for assignment of violation risk factors (VRFs) and violation severity
levels (VSLs) for each requirement in Project 2019-02 BES Cyber System Information Access Management CIP-011-X. Each requirement is
assigned a VRF and a VSL. These elements support the determination of an initial value range for the Base Penalty Amount regarding
violations of requirements in FERC-approved Reliability Standards, as defined in the Electric Reliability Organizations (ERO) Sanction
Guidelines. The SDT applied the following NERC criteria and FERC Guidelines when developing the VRFs and VSLs for the requirements.
NERC Criteria for Violation Risk Factors
High Risk Requirement
A requirement that, if violated, could directly cause or contribute to Bulk Electric System instability, separation, or a cascading sequence of
failures, or could place the Bulk Electric System at an unacceptable risk of instability, separation, or cascading failures; or, a requirement in a
planning time frame that, if violated, could, under emergency, abnormal, or restorative conditions anticipated by the preparations, directly
cause or contribute to Bulk Electric System instability, separation, or a cascading sequence of failures, or could place the Bulk Electric System
at an unacceptable risk of instability, separation, or cascading failures, or could hinder restoration to a normal condition.
Medium Risk Requirement
A requirement that, if violated, could directly affect the electrical state or the capability of the Bulk Electric System, or the ability to effectively
monitor and control the Bulk Electric System. However, violation of a medium risk requirement is unlikely to lead to Bulk Electric System
instability, separation, or cascading failures; or, a requirement in a planning time frame that, if violated, could, under emergency, abnormal,
or restorative conditions anticipated by the preparations, directly and adversely affect the electrical state or capability of the Bulk Electric
System, or the ability to effectively monitor, control, or restore the Bulk Electric System. However, violation of a medium risk requirement is
unlikely, under emergency, abnormal, or restoration conditions anticipated by the preparations, to lead to Bulk Electric System instability,
separation, or cascading failures, nor to hinder restoration to a normal condition.
RELIABILITY | RESILIENCE | SECURITY
Lower Risk Requirement
A requirement that is administrative in nature and a requirement that, if violated, would not be expected to adversely affect the electrical
state or capability of the Bulk Electric System, or the ability to effectively monitor and control the Bulk Electric System; or, a requirement that
is administrative in nature and a requirement in a planning time frame that, if violated, would not, under the emergency, abnormal, or
restorative conditions anticipated by the preparations, be expected to adversely affect the electrical state or capability of the Bulk Electric
System, or the ability to effectively monitor, control, or restore the Bulk Electric System.
FERC Guidelines for Violation Risk Factors
Guideline (1) – Consistency with the Conclusions of the Final Blackout Report
FERC seeks to ensure that VRFs assigned to Requirements of Reliability Standards in these identified areas appropriately reflect their historical
critical impact on the reliability of the Bulk-Power System. In the VSL Order, FERC listed critical areas (from the Final Blackout Report) where
violations could severely affect the reliability of the Bulk-Power System:
•
Emergency operations
•
Vegetation management
•
Operator personnel training
•
Protection systems and their coordination
•
Operating tools and backup facilities
•
Reactive power and voltage control
•
System modeling and data exchange
•
Communication protocol and facilities
•
Requirements to determine equipment ratings
•
Synchronized data recorders
•
Clearer criteria for operationally critical facilities
•
Appropriate use of transmission loading relief.
VRF and VSL Justifications | June 2021
Project 2019-02 BES Cyber System Information Access Management
2
Guideline (2) – Consistency within a Reliability Standard
FERC expects a rational connection between the sub-Requirement VRF assignments and the main Requirement VRF assignment.
Guideline (3) – Consistency among Reliability Standards
FERC expects the assignment of VRFs corresponding to Requirements that address similar reliability goals in different Reliability Standards
would be treated comparably.
Guideline (4) – Consistency with NERC’s Definition of the Violation Risk Factor Level
Guideline (4) was developed to evaluate whether the assignment of a particular VRF level conforms to NERC’s definition of that risk level.
Guideline (5) – Treatment of Requirements that Co-mingle More Than One Obligation
Where a single Requirement co-mingles a higher risk reliability objective and a lesser risk reliability objective, the VRF assignment for such
Requirements must not be watered down to reflect the lower risk level associated with the less important objective of the Reliability
Standard.
VRF and VSL Justifications | June 2021
Project 2019-02 BES Cyber System Information Access Management
3
NERC Criteria for Violation Severity Levels
VSLs define the degree to which compliance with a requirement was not achieved. Each requirement must have at least one VSL. While it is
preferable to have four VSLs for each requirement, some requirements do not have multiple “degrees” of noncompliant performance and
may have only one, two, or three VSLs.
VSLs should be based on NERC’s overarching criteria shown in the table below:
Lower VSL
Moderate VSL
The performance or product
measured almost meets the full
intent of the requirement.
The performance or product
measured meets the majority of
the intent of the requirement.
High VSL
The performance or product
measured does not meet the
majority of the intent of the
requirement, but does meet
some of the intent.
Severe VSL
The performance or product
measured does not
substantively meet the intent of
the requirement.
FERC Order of Violation Severity Levels
The FERC VSL guidelines are presented below, followed by an analysis of whether the VSLs proposed for each requirement in the standard
meet the FERC Guidelines for assessing VSLs:
Guideline (1) – Violation Severity Level Assignments Should Not Have the Unintended Consequence of Lowering the Current
Level of Compliance
Compare the VSLs to any prior levels of non-compliance and avoid significant changes that may encourage a lower level of compliance than
was required when levels of non-compliance were used.
Guideline (2) – Violation Severity Level Assignments Should Ensure Uniformity and Consistency in the Determination of
Penalties
A violation of a “binary” type requirement must be a “Severe” VSL.
Do not use ambiguous terms such as “minor” and “significant” to describe noncompliant performance.
Guideline (3) – Violation Severity Level Assignment Should Be Consistent with the Corresponding Requirement
VSLs should not expand on what is required in the requirement.
VRF and VSL Justifications | June 2021
Project 2019-02 BES Cyber System Information Access Management
4
Guideline (4) – Violation Severity Level Assignment Should Be Based on a Single Violation, Not on a Cumulative Number of
Violations
Unless otherwise stated in the requirement, each instance of non-compliance with a requirement is a separate violation. Section 4 of the
Sanction Guidelines states that assessing penalties on a per violation per day basis is the “default” for penalty calculations.
VRF Justification for CIP-011-X, Requirement R1
The VRF did not change from the previously FERC approved CIP-011-2 Reliability Standard.
VSL Justification for CIP-011-X, Requirement R1
The VSL justification is below.
VSLs for CIP-011-X, R1
Lower
N/A
Moderate
N/A
High
The Responsible Entity
documented, but did not,
implement one or more BCSI
protection program(s). (R1)
Severe
The Responsible Entity neither
documented nor implemented
one or more BCSI protection
program(s). (R1)
OR
The Responsible Entity
documented but did not
implement at least one method
to identify BCSI. (1.1)
OR
The Responsible Entity
documented but did not
implement at least one method
to protect and securely handle
BCSI. (1.2)
VRF and VSL Justifications | June 2021
Project 2019-02 BES Cyber System Information Access Management
5
VSL Justifications for CIP-011-X, R1
FERC VSL G1
The proposed revisions do not lower the current level of compliance.
Violation Severity Level
Assignments Should Not
Have the Unintended
Consequence of Lowering
the Current Level of
Compliance
FERC VSL G2
Violation Severity Level
Assignments Should Ensure
Uniformity and Consistency
in the Determination of
Penalties
Guideline 2a:
The VSLs are not binary.
Guideline 2b:
The proposed VSL does not use ambiguous terms, supporting uniformity and consistency in the
determination of similar penalties for similar violations.
Guideline 2a: The Single
Violation Severity Level
Assignment Category for
"Binary" Requirements Is
Not Consistent
Guideline 2b: Violation
Severity Level Assignments
that Contain Ambiguous
Language
FERC VSL G3
Violation Severity Level
Assignment Should Be
Consistent with the
Corresponding Requirement
The proposed VSL uses similar terminology to that used in the associated requirement, and is therefore
consistent with the requirement.
VRF and VSL Justifications | June 2021
Project 2019-02 BES Cyber System Information Access Management
6
FERC VSL G4
Violation Severity Level
Assignment Should Be Based
on A Single Violation, Not on
A Cumulative Number of
Violations
Proposed VSLs are based on a single violation and not a cumulative violation methodology. The VSL is
assigned for a single instance of failing to implement one or more documented information protection
program(s) that collectively include the applicable requirement parts in CIP-011-X Table R1 – Information
Protection Program.
VRF Justification for CIP-011-X Requirement R2
The VRF did not change from the previously FERC approved CIP-011-2 Reliability Standard.
VSL Justification for CIP-011-X Requirement R2
The VSL did not change from the previously FERC approved CIP-011-2 Reliability Standard.
VRF and VSL Justifications | June 2021
Project 2019-02 BES Cyber System Information Access Management
7
Violation Risk Factor and Violation Severity Level
Justifications
Project 2019-02 BES Cyber System Information Access Management
This document provides the standard drafting team’s (SDT’s) justification for assignment of violation risk factors (VRFs) and violation severity
levels (VSLs) for each requirement in Project 2019-02 BES Cyber System Information Access Management CIP-004-7. Each requirement is
assigned a VRF and a VSL. These elements support the determination of an initial value range for the Base Penalty Amount regarding
violations of requirements in FERC-approved Reliability Standards, as defined in the Electric Reliability Organizations (ERO) Sanction
Guidelines. The SDT applied the following NERC criteria and FERC Guidelines when developing the VRFs and VSLs for the requirements.
NERC Criteria for Violation Risk Factors
High Risk Requirement
A requirement that, if violated, could directly cause or contribute to Bulk Electric System instability, separation, or a cascading sequence of
failures, or could place the Bulk Electric System at an unacceptable risk of instability, separation, or cascading failures; or, a requirement in a
planning time frame that, if violated, could, under emergency, abnormal, or restorative conditions anticipated by the preparations, directly
cause or contribute to Bulk Electric System instability, separation, or a cascading sequence of failures, or could place the Bulk Electric System
at an unacceptable risk of instability, separation, or cascading failures, or could hinder restoration to a normal condition.
Medium Risk Requirement
A requirement that, if violated, could directly affect the electrical state or the capability of the Bulk Electric System, or the ability to effectively
monitor and control the Bulk Electric System. However, violation of a medium risk requirement is unlikely to lead to Bulk Electric System
instability, separation, or cascading failures; or, a requirement in a planning time frame that, if violated, could, under emergency, abnormal,
or restorative conditions anticipated by the preparations, directly and adversely affect the electrical state or capability of the Bulk Electric
System, or the ability to effectively monitor, control, or restore the Bulk Electric System. However, violation of a medium risk requirement is
unlikely, under emergency, abnormal, or restoration conditions anticipated by the preparations, to lead to Bulk Electric System instability,
separation, or cascading failures, nor to hinder restoration to a normal condition.
RELIABILITY | RESILIENCE | SECURITY
Lower Risk Requirement
A requirement that is administrative in nature and a requirement that, if violated, would not be expected to adversely affect the electrical
state or capability of the Bulk Electric System, or the ability to effectively monitor and control the Bulk Electric System; or, a requirement that
is administrative in nature and a requirement in a planning time frame that, if violated, would not, under the emergency, abnormal, or
restorative conditions anticipated by the preparations, be expected to adversely affect the electrical state or capability of the Bulk Electric
System, or the ability to effectively monitor, control, or restore the Bulk Electric System.
FERC Guidelines for Violation Risk Factors
Guideline (1) – Consistency with the Conclusions of the Final Blackout Report
FERC seeks to ensure that VRFs assigned to Requirements of Reliability Standards in these identified areas appropriately reflect their historical
critical impact on the reliability of the Bulk-Power System. In the VSL Order, FERC listed critical areas (from the Final Blackout Report) where
violations could severely affect the reliability of the Bulk-Power System:
•
Emergency operations
•
Vegetation management
•
Operator personnel training
•
Protection systems and their coordination
•
Operating tools and backup facilities
•
Reactive power and voltage control
•
System modeling and data exchange
•
Communication protocol and facilities
•
Requirements to determine equipment ratings
•
Synchronized data recorders
•
Clearer criteria for operationally critical facilities
•
Appropriate use of transmission loading relief.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | June 2021
2
Guideline (2) – Consistency within a Reliability Standard
FERC expects a rational connection between the sub-Requirement VRF assignments and the main Requirement VRF assignment.
Guideline (3) – Consistency among Reliability Standards
FERC expects the assignment of VRFs corresponding to Requirements that address similar reliability goals in different Reliability Standards
would be treated comparably.
Guideline (4) – Consistency with NERC’s Definition of the Violation Risk Factor Level
Guideline (4) was developed to evaluate whether the assignment of a particular VRF level conforms to NERC’s definition of that risk level.
Guideline (5) – Treatment of Requirements that Co-mingle More Than One Obligation
Where a single Requirement co-mingles a higher risk reliability objective and a lesser risk reliability objective, the VRF assignment for such
Requirements must not be watered down to reflect the lower risk level associated with the less important objective of the Reliability
Standard.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | June 2021
3
NERC Criteria for Violation Severity Levels
VSLs define the degree to which compliance with a requirement was not achieved. Each requirement must have at least one VSL. While it is
preferable to have four VSLs for each requirement, some requirements do not have multiple “degrees” of noncompliant performance and
may have only one, two, or three VSLs.
VSLs should be based on NERC’s overarching criteria shown in the table below:
Lower VSL
Moderate VSL
The performance or product
measured almost meets the full
intent of the requirement.
The performance or product
measured meets the majority of
the intent of the requirement.
High VSL
The performance or product
measured does not meet the
majority of the intent of the
requirement, but does meet
some of the intent.
Severe VSL
The performance or product
measured does not
substantively meet the intent of
the requirement.
FERC Order of Violation Severity Levels
The FERC VSL guidelines are presented below, followed by an analysis of whether the VSLs proposed for each requirement in the standard
meet the FERC Guidelines for assessing VSLs:
Guideline (1) – Violation Severity Level Assignments Should Not Have the Unintended Consequence of Lowering the Current
Level of Compliance
Compare the VSLs to any prior levels of non-compliance and avoid significant changes that may encourage a lower level of compliance than
was required when levels of non-compliance were used.
Guideline (2) – Violation Severity Level Assignments Should Ensure Uniformity and Consistency in the Determination of
Penalties
A violation of a “binary” type requirement must be a “Severe” VSL.
Do not use ambiguous terms such as “minor” and “significant” to describe noncompliant performance.
Guideline (3) – Violation Severity Level Assignment Should Be Consistent with the Corresponding Requirement
VSLs should not expand on what is required in the requirement.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | June 2021
4
Guideline (4) – Violation Severity Level Assignment Should Be Based on a Single Violation, Not on a Cumulative Number of
Violations
Unless otherwise stated in the requirement, each instance of non-compliance with a requirement is a separate violation. Section 4 of the
Sanction Guidelines states that assessing penalties on a per violation per day basis is the “default” for penalty calculations.
VRF Justification for CIP-004-7, Requirement R1
The VRF did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VSL Justification for CIP-004-7, Requirement R1
The VSL did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VRF Justification for CIP-004-7, Requirement R2
The VRF did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VSL Justification for CIP-004-7, Requirement R2
The VSL did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VRF Justification for CIP-004-7, Requirement R3
The VRF did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VSL Justification for CIP-004-7, Requirement R3
The VSL did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VRF Justification for CIP-004-7, Requirement R4
The VRF did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VSL Justification for CIP-004-7, Requirement R4
The VSL has been revised to reflect the removal of Part 4.4 (moved to CIP-004-7, Requirement R6, Part 6.2) and a portion of Part 4.1 (moved
to CIP-004-7, Requirement R6, Part 6.1). The VSL did not otherwise change from the previously FERC approved CIP-004-6 Reliability Standard.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | June 2021
5
VRF Justification for CIP-004-7, Requirement R5
The VRF did not change from the previously FERC approved CIP-004-6 Reliability Standard.
VSL Justification for CIP-004-7, Requirement R5
The VSL has been revised to reflect the removal of Part 5.3 (moved to CIP-004-7, Requirement R6, Part 6.3). The VSL did not otherwise
change from the previously FERC approved CIP-004-6 Reliability Standard.
VRF Justifications for CIP-004-7 R6
Proposed VRF
Medium
NERC VRF Discussion
Requirement R6 is a Requirement in the Same Day Operations and Operations Planning time horizons to
implement one or more documented access management program(s) to authorize, verify, and revoke
provisioned access to BCSI pertaining to the “Applicable System” identified in CIP-004-7 Table R6 – Access
Management for BCSI that collectively include each of the applicable requirement parts in CIP-004-7 Table
R6 – Access Management for BES Cyber System Information. To be considered access to BCSI in the
context of this requirement, an individual has both the ability to obtain and use BCSI. If violated, it could
directly affect the electrical state or the capability of the bulk electric system, or the ability to effectively
monitor and control the bulk electric system. However, violation of the requirement is unlikely to lead to
bulk electric system instability, separation, or cascading failures.
FERC VRF G1 Discussion
Guideline 1- Consistency w/ Blackout Report
Guideline 1- Consistency
with Blackout Report
This requirement does not address any of the critical areas identified in the Final Blackout Report.
FERC VRF G2 Discussion
Guideline 2- Consistency within a Reliability Standard
Guideline 2- Consistency
within a Reliability Standard
The proposed VRF is consistent among other FERC approved VRFs within the standard, specifically
Requirements R4 and R5 from which Requirement R6 is modified.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | June 2021
6
VRF Justifications for CIP-004-7 R6
Proposed VRF
Medium
FERC VRF G3 Discussion
Guideline 3- Consistency among Reliability Standards
Guideline 3- Consistency
among Reliability Standards
This is a new requirement addressing specific reliability goals. The VRF assignment is consistent with
similar Requirements in the CIP Reliability Standards.
FERC VRF G4 Discussion
Guideline 4- Consistency with NERC Definitions of VRFs
Guideline 4- Consistency
with NERC Definitions of
VRFs
A VRF of Medium is consistent with the NERC VRF definition.
FERC VRF G5 Discussion
Guideline 5- Treatment of Requirements that Co-mingle More than One Obligation
Guideline 5- Treatment of
Requirements that Comingle More than One
Obligation
Requirement R6 contains only one objective, which is to implement one or more documented access
management program(s) to authorize, verify, and revoke provisioned access to BCSI pertaining to the
“Applicable System” identified in CIP-004-7 Table R6 – Access Management for BCSI that collectively
include each of the applicable requirement parts in CIP-004-7 Table R6 – Access Management for BES
Cyber System Information. To be considered access to BCSI in the context of this requirement, an
individual has both the ability to obtain and use BCSI. Since the requirement has only one objective, only
one VRF was assigned.
VSLs for CIP-004-7 R6
Lower
Moderate
High
The Responsible Entity has
implemented one or more
program(s) as required by
Requirement R6 Part 6.1 but, for
one individual, did not authorize
The Responsible Entity has
implemented one or more
program(s) as required by
Requirement R6 Part 6.1 but, for
two individuals, did not
The Responsible Entity has
implemented one or more
program(s) as required by
Requirement R6 Part 6.1 but, for
three individuals, did not
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | June 2021
Severe
The Responsible Entity did not
implement one or more
documented access
management program(s) for
BCSI. (R6)
7
provisioned electronic access to
electronic BCSI or provisioned
physical access to physical BCSI.
(6.1)
authorize provisioned electronic
access to electronic BCSI or
provisioned physical access to
physical BCSI. (6.1)
authorize provisioned electronic
access to electronic BCSI or
provisioned physical access to
physical BCSI. (6.1)
OR
OR
OR
The Responsible Entity
performed the verification
required by Requirement R6
Part 6.2 more than 15 calendar
months but less than or equal to
16 calendar months of the
previous verification. (6.2)
The Responsible Entity
performed the verification
required by Requirement R6
Part 6.2 more than 16 calendar
months but less than or equal to
17 calendar months of the
previous verification. (6.2)
The Responsible Entity
performed the verification
required by Requirement R6
Part 6.2 more than 17 calendar
months but less than or equal to
18 calendar months of the
previous verification. (6.2)
OR
The Responsible Entity has
implemented one or more
program(s) to remove the
individual’s ability to use
provisioned access to BCSI but,
for one individual, did not do so
by the timeframe required in
Requirement R6, Part 6.3.
OR
OR
The Responsible Entity has
The Responsible Entity has
implemented one or more
implemented one or more
program(s) to remove the
program(s) to remove the
individual’s ability to use
individual’s ability to use
provisioned access to BCSI but,
provisioned access to BCSI but,
for two individuals, did not do so for three individuals, did not do
by the timeframe required in
so by the timeframe required in
Requirement R6, Part 6.3.
Requirement R6, Part 6.3.
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | June 2021
OR
The Responsible Entity has
implemented one or more
program(s) as required by
Requirement R6 Part 6.1 but, for
four or more individuals, did not
authorize provisioned electronic
access to electronic BCSI or
provisioned physical access to
physical BCSI. (6.1)
OR
The Responsible Entity
performed the verification
required by Requirement R6
Part 6.2 more than 18 calendar
months of the previous
verification. (6.2)
OR
The Responsible Entity has
implemented one or more
program(s) to remove the
individual’s ability to use
provisioned access to BCSI but,
for four or more individuals, did
not do so by the timeframe
required in Requirement R6,
Part 6.3.
8
VSL Justifications for CIP-004-7 R6
FERC VSL G1
There is no prior compliance obligation related to the subject of this requirement.
Violation Severity Level
Assignments Should Not
Have the Unintended
Consequence of Lowering
the Current Level of
Compliance
FERC VSL G2
Violation Severity Level
Assignments Should Ensure
Uniformity and Consistency
in the Determination of
Penalties
The proposed VSLs are not binary and do not use any ambiguous terminology, thereby supporting
uniformity and consistency in the determination of similar penalties for similar violations.
Guideline 2a: The Single
Violation Severity Level
Assignment Category for
"Binary" Requirements Is
Not Consistent
Guideline 2b: Violation
Severity Level Assignments
that Contain Ambiguous
Language
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | June 2021
9
FERC VSL G3
Violation Severity Level
Assignment Should Be
Consistent with the
Corresponding Requirement
FERC VSL G4
The proposed VSL uses similar terminology to that used in the associated requirement and is therefore
consistent with the requirement.
Proposed VSLs are based on a single violation and not cumulative violations.
Violation Severity Level
Assignment Should Be Based
on A Single Violation, Not on
A Cumulative Number of
Violations
VRF and VSL Justifications
Project 2019-02 BES Cyber System Information Access Management | June 2021
10
Violation Risk Factor and Violation Severity Level
Justifications
Project 2019-02 BES Cyber System Information Access Management
This document provides the standard drafting team’s (SDT’s) justification for assignment of violation risk factors (VRFs) and violation severity
levels (VSLs) for each requirement in Project 2019-02 BES Cyber System Information Access Management CIP-011-3. Each requirement is
assigned a VRF and a VSL. These elements support the determination of an initial value range for the Base Penalty Amount regarding
violations of requirements in FERC-approved Reliability Standards, as defined in the Electric Reliability Organizations (ERO) Sanction
Guidelines. The SDT applied the following NERC criteria and FERC Guidelines when developing the VRFs and VSLs for the requirements.
NERC Criteria for Violation Risk Factors
High Risk Requirement
A requirement that, if violated, could directly cause or contribute to Bulk Electric System instability, separation, or a cascading sequence of
failures, or could place the Bulk Electric System at an unacceptable risk of instability, separation, or cascading failures; or, a requirement in a
planning time frame that, if violated, could, under emergency, abnormal, or restorative conditions anticipated by the preparations, directly
cause or contribute to Bulk Electric System instability, separation, or a cascading sequence of failures, or could place the Bulk Electric System
at an unacceptable risk of instability, separation, or cascading failures, or could hinder restoration to a normal condition.
Medium Risk Requirement
A requirement that, if violated, could directly affect the electrical state or the capability of the Bulk Electric System, or the ability to effectively
monitor and control the Bulk Electric System. However, violation of a medium risk requirement is unlikely to lead to Bulk Electric System
instability, separation, or cascading failures; or, a requirement in a planning time frame that, if violated, could, under emergency, abnormal,
or restorative conditions anticipated by the preparations, directly and adversely affect the electrical state or capability of the Bulk Electric
System, or the ability to effectively monitor, control, or restore the Bulk Electric System. However, violation of a medium risk requirement is
unlikely, under emergency, abnormal, or restoration conditions anticipated by the preparations, to lead to Bulk Electric System instability,
separation, or cascading failures, nor to hinder restoration to a normal condition.
RELIABILITY | RESILIENCE | SECURITY
Lower Risk Requirement
A requirement that is administrative in nature and a requirement that, if violated, would not be expected to adversely affect the electrical
state or capability of the Bulk Electric System, or the ability to effectively monitor and control the Bulk Electric System; or, a requirement that
is administrative in nature and a requirement in a planning time frame that, if violated, would not, under the emergency, abnormal, or
restorative conditions anticipated by the preparations, be expected to adversely affect the electrical state or capability of the Bulk Electric
System, or the ability to effectively monitor, control, or restore the Bulk Electric System.
FERC Guidelines for Violation Risk Factors
Guideline (1) – Consistency with the Conclusions of the Final Blackout Report
FERC seeks to ensure that VRFs assigned to Requirements of Reliability Standards in these identified areas appropriately reflect their historical
critical impact on the reliability of the Bulk-Power System. In the VSL Order, FERC listed critical areas (from the Final Blackout Report) where
violations could severely affect the reliability of the Bulk-Power System:
•
Emergency operations
•
Vegetation management
•
Operator personnel training
•
Protection systems and their coordination
•
Operating tools and backup facilities
•
Reactive power and voltage control
•
System modeling and data exchange
•
Communication protocol and facilities
•
Requirements to determine equipment ratings
•
Synchronized data recorders
•
Clearer criteria for operationally critical facilities
•
Appropriate use of transmission loading relief.
VRF and VSL Justifications | March 2021
Project 2019-02 BES Cyber System Information Access Management
2
Guideline (2) – Consistency within a Reliability Standard
FERC expects a rational connection between the sub-Requirement VRF assignments and the main Requirement VRF assignment.
Guideline (3) – Consistency among Reliability Standards
FERC expects the assignment of VRFs corresponding to Requirements that address similar reliability goals in different Reliability Standards
would be treated comparably.
Guideline (4) – Consistency with NERC’s Definition of the Violation Risk Factor Level
Guideline (4) was developed to evaluate whether the assignment of a particular VRF level conforms to NERC’s definition of that risk level.
Guideline (5) – Treatment of Requirements that Co-mingle More Than One Obligation
Where a single Requirement co-mingles a higher risk reliability objective and a lesser risk reliability objective, the VRF assignment for such
Requirements must not be watered down to reflect the lower risk level associated with the less important objective of the Reliability
Standard.
VRF and VSL Justifications | March 2021
Project 2019-02 BES Cyber System Information Access Management
3
NERC Criteria for Violation Severity Levels
VSLs define the degree to which compliance with a requirement was not achieved. Each requirement must have at least one VSL. While it is
preferable to have four VSLs for each requirement, some requirements do not have multiple “degrees” of noncompliant performance and
may have only one, two, or three VSLs.
VSLs should be based on NERC’s overarching criteria shown in the table below:
Lower VSL
Moderate VSL
The performance or product
measured almost meets the full
intent of the requirement.
The performance or product
measured meets the majority of
the intent of the requirement.
High VSL
The performance or product
measured does not meet the
majority of the intent of the
requirement, but does meet
some of the intent.
Severe VSL
The performance or product
measured does not
substantively meet the intent of
the requirement.
FERC Order of Violation Severity Levels
The FERC VSL guidelines are presented below, followed by an analysis of whether the VSLs proposed for each requirement in the standard
meet the FERC Guidelines for assessing VSLs:
Guideline (1) – Violation Severity Level Assignments Should Not Have the Unintended Consequence of Lowering the Current
Level of Compliance
Compare the VSLs to any prior levels of non-compliance and avoid significant changes that may encourage a lower level of compliance than
was required when levels of non-compliance were used.
Guideline (2) – Violation Severity Level Assignments Should Ensure Uniformity and Consistency in the Determination of
Penalties
A violation of a “binary” type requirement must be a “Severe” VSL.
Do not use ambiguous terms such as “minor” and “significant” to describe noncompliant performance.
Guideline (3) – Violation Severity Level Assignment Should Be Consistent with the Corresponding Requirement
VSLs should not expand on what is required in the requirement.
VRF and VSL Justifications | March 2021
Project 2019-02 BES Cyber System Information Access Management
4
Guideline (4) – Violation Severity Level Assignment Should Be Based on a Single Violation, Not on a Cumulative Number of
Violations
Unless otherwise stated in the requirement, each instance of non-compliance with a requirement is a separate violation. Section 4 of the
Sanction Guidelines states that assessing penalties on a per violation per day basis is the “default” for penalty calculations.
VRF Justification for CIP-011-3, Requirement R1
The VRF did not change from the previously FERC approved CIP-011-2 Reliability Standard.
VSL Justification for CIP-011-3, Requirement R1
The VSL justification is below.
VSLs for CIP-011-3, R1
Lower
N/A
Moderate
N/A
High
The Responsible Entity
documented, but did not,
implement one or more BCSI
protection program(s). (R1)
Severe
The Responsible Entity neither
documented nor implemented
one or more BCSI protection
program(s). (R1)
OR
The Responsible Entity
documented but did not
implement at least one method
to identify BCSI. (1.1)
OR
The Responsible Entity
documented but did not
implement at least one method
to protect and securely handle
BCSI. (1.2)
VRF and VSL Justifications | March 2021
Project 2019-02 BES Cyber System Information Access Management
5
VSL Justifications for CIP-011-3, R1
FERC VSL G1
The proposed revisions do not lower the current level of compliance.
Violation Severity Level
Assignments Should Not
Have the Unintended
Consequence of Lowering
the Current Level of
Compliance
FERC VSL G2
Violation Severity Level
Assignments Should Ensure
Uniformity and Consistency
in the Determination of
Penalties
Guideline 2a:
The VSLs are not binary.
Guideline 2b:
The proposed VSL does not use ambiguous terms, supporting uniformity and consistency in the
determination of similar penalties for similar violations.
Guideline 2a: The Single
Violation Severity Level
Assignment Category for
"Binary" Requirements Is
Not Consistent
Guideline 2b: Violation
Severity Level Assignments
that Contain Ambiguous
Language
FERC VSL G3
Violation Severity Level
Assignment Should Be
Consistent with the
Corresponding Requirement
The proposed VSL uses similar terminology to that used in the associated requirement, and is therefore
consistent with the requirement.
VRF and VSL Justifications | March 2021
Project 2019-02 BES Cyber System Information Access Management
6
FERC VSL G4
Violation Severity Level
Assignment Should Be Based
on A Single Violation, Not on
A Cumulative Number of
Violations
Proposed VSLs are based on a single violation and not a cumulative violation methodology. The VSL is
assigned for a single instance of failing to implement one or more documented information protection
program(s) that collectively include the applicable requirement parts in CIP-011-3 Table R1 – Information
Protection Program.
VRF Justification for CIP-011-3 Requirement R2
The VRF did not change from the previously FERC approved CIP-011-2 Reliability Standard.
VSL Justification for CIP-011-3 Requirement R2
The VSL did not change from the previously FERC approved CIP-011-2 Reliability Standard.
VRF and VSL Justifications | March 2021
Project 2019-02 BES Cyber System Information Access Management
7
Mapping Document
Project 2019-02 BES Cyber System Information Access Management
Mapping of CIP-004-6 R4 and R5 to CIP-004-X R6
Access Management Program control requirements as applied to BES Cyber System Information (BCSI) designated storage locations were
moved to CIP-004 Requirement R6.
Standard: CIP-004-6
Requirement in Approved Standard
Translation to New Standard or Other Action
CIP-004-X, Requirement R6. Each Responsible
Entity shall implement one or more documented
access management program(s) to authorize,
verify, and revoke provisioned access to BCSI
pertaining to the “Applicable Systems” identified
in CIP-004-X Table R6 – Access Management for
BES Cyber System Information that collectively
include each of the applicable requirement parts
in CIP‐004‐X Table R6 – Access Management for
BES Cyber System Information. To be considered
access to BCSI in the context of this requirement,
an individual has both the ability to obtain and
use BCSI. Provisioned access is to be considered
the result of the specific actions taken to provide
an individual(s) the means to access BCSI (e.g.,
may include physical keys or access cards, user
accounts and associated rights and privileges,
encryption keys). [Violation Risk Factor: Medium]
Description and Change Justification
Requirement R6 was created to house all BCSI
related access management requirements,
which include the current CIP-004-6 R4.1.3,
R4.4, and R5.3 in a single requirement (R6).
The modified requirement language includes
clarification on the specific elements within an
access management program that need to be
implemented. In addition, a definition of what
constitutes BCSI access was included in the
parent R6 requirement language.
RELIABILITY | RESILIENCE | SECURITY
Standard: CIP-004-6
Requirement in Approved Standard
Translation to New Standard or Other Action
Description and Change Justification
[Time Horizon: Same Day Operations and
Operations Planning].
CIP-004-6, Requirement R4, Part 4.1.3
CIP-004-X, Requirement R6, Part 6.1, 6.1.1, and
6.1.2
Process to authorize based on need, as
determined by the Responsible Entity, except for Prior to provisioning, authorize (unless already
authorized according to Part 4.1.) based on need,
CIP Exceptional Circumstances:
as determined by the Responsible Entity, except
Access to designated storage locations, whether
for CIP Exceptional Circumstances:
physical or electronic, for BES Cyber System
Information.
6.1.1. Provisioned electronic access to electronic
BCSI; and
The modified requirement language includes a
shift from authorizing access to designated
storage locations, to authorizing the provisioned
access to BCSI.
The Note was included to specify the type of
access to be authorized (6.1), verified (6.2) and
revoked (6.3).
6.1.2. Provisioned physical access to physical
BCSI.
CIP-004-6, Requirement R4, Part 4.4
Verify at least once every 15 calendar months
that access to the designated storage locations
for BES Cyber System Information, whether
physical or electronic, are correct and are those
that the Responsible Entity determines are
necessary for performing assigned work
functions.
CIP-004-X, Requirement R6, Part 6.2, 6.2.1, and
6.2.2.
Verify at least once every 15 calendar months
that all individuals with provisioned access to
BCSI:
6.2.1. have an authorization record; and
The modified requirement language includes a
two-part separation of the current CIP-004-6
R4.4 requirement and that the Responsible
Entity 1) Verifies provisioned access to BCSI is
authorized, and 2) Verifies the provisioned
access is still needed.
6.2.2. still need the provisioned access to perform
their current work functions, as
determined by the Responsible Entity.
Mapping Document | March 2021
Project 2019-02 BES Cyber System Information Access Management
2
Standard: CIP-004-6
Requirement in Approved Standard
Translation to New Standard or Other Action
CIP-004-6, Requirement R5, Part 5.3
CIP-004-X, Requirement R6, Part 6.3
For termination actions, revoke the individual’s
current access to the designated storage
locations for BES Cyber System Information,
whether physical or electronic (unless already
revoked according to Requirement R5.1), by the
end of the next calendar day following the
effective date of the termination action.
For termination actions, remove the individual’s
ability to use provisioned access to BCSI (unless
already revoked according to Part 5.1) by the end
of the next calendar day following the effective
date of the termination action.
CIP-004-6, Requirement R5, Part 5.4
CIP-004-6, Requirement R5, Part 5.3
For termination actions, revoke the individual’s
non-shared user accounts (unless already
revoked according to Parts 5.1 or 5.3) within 30
calendar days of the effective date of the
termination action.
For termination actions, revoke the individual’s
non-shared user accounts (unless already revoked
according to Part 5.1) within 30 calendar days of
the effective date of the termination action.
CIP-004-6, Requirement R5, Part 5.5
CIP-004-6, Requirement R5, Part 5.4
For termination actions, change passwords for
shared account(s) known to the user within 30
calendar days of the termination action. For
reassignments or transfers, change passwords
for shared account(s) known to the user within
30 calendar days following the date that the
Responsible Entity determines that the
For termination actions, change passwords for
shared account(s) known to the user within 30
calendar days of the termination action. For
reassignments or transfers, change passwords for
shared account(s) known to the user within 30
calendar days following the date that the
Responsible Entity determines that the individual
no longer requires retention of that access.
Description and Change Justification
The change in requirement language focuses on
revoking the ability to use provisioned access to
BCSI instead of revoking access to the
designated storage locations for BCSI.
This Part was renumbed from 5.4 to 5.3 after
Part 5.3 was removed and incorporated into the
new R6 Part 6.3.
The reference within the Part was changed to
just Part 5.1.
This Part was renumbed from 5.5 to 5.4 after
Part 5.3 was removed and incorporated into the
new R6 Part 6.3. This is a renumbering change
only, no changes were made to the Part’s
requirement language.
If the Responsible Entity determines and
documents that extenuating operating
Mapping Document | March 2021
Project 2019-02 BES Cyber System Information Access Management
3
Standard: CIP-004-6
Requirement in Approved Standard
individual no longer requires retention of that
access.
If the Responsible Entity determines and
documents that extenuating operating
circumstances require a longer time period,
change the password(s) within 10 calendar days
following the end of the operating
circumstances.
Translation to New Standard or Other Action
Description and Change Justification
circumstances require a longer time period,
change the password(s) within 10 calendar days
following the end of the operating circumstances.
Mapping Document | March 2021
Project 2019-02 BES Cyber System Information Access Management
4
Mapping Document
Project 2019-02 BES Cyber System Information Access Management
Mapping of CIP-004-6 R4 and R5 to CIP-004-X R6
Access Management Program control requirements as applied to BES Cyber System Information (BCSI) designated storage locations were
moved to CIP-004 Requirement R6.
Standard: CIP-004-6
Requirement in Approved Standard
Translation to New Standard or Other Action
CIP-004-X, Requirement R6. Each Responsible
Entity shall implement one or more documented
access management program(s) to authorize,
verify, and revoke provisioned access to BCSI
pertaining to the “Applicable Systems” identified
in CIP-004-X Table R6 – Access Management for
BES Cyber System Information that collectively
include each of the applicable requirement parts
in CIP‐004‐X Table R6 – Access Management for
BES Cyber System Information. To be considered
access to BCSI in the context of this requirement,
an individual has both the ability to obtain and
use BCSI. Provisioned access is to be considered
the result of the specific actions taken to provide
an individual(s) the means to access BCSI (e.g.,
may include physical keys or access cards, user
accounts and associated rights and privileges,
encryption keys). [Violation Risk Factor: Medium]
Description and Change Justification
Requirement R6 was created to house all BCSI
related access management requirements,
which include the current CIP-004-6 R4.1.3,
R4.4, and R5.3 in a single requirement (R6).
The modified requirement language includes
clarification on the specific elements within an
access management program that need to be
implemented. In addition, a definition of what
constitutes BCSI access was included in the
parent R6 requirement language.
RELIABILITY | RESILIENCE | SECURITY
Standard: CIP-004-6
Requirement in Approved Standard
Translation to New Standard or Other Action
Description and Change Justification
[Time Horizon: Same Day Operations and
Operations Planning].
CIP-004-6, Requirement R4, Part 4.1.3
CIP-004-X, Requirement R6, Part 6.1, 6.1.1, and
6.1.2
Process to authorize based on need, as
determined by the Responsible Entity, except for Prior to provisioning, authorize (unless already
authorized according to Part 4.1.) based on need,
CIP Exceptional Circumstances:
as determined by the Responsible Entity, except
Access to designated storage locations, whether
for CIP Exceptional Circumstances:
physical or electronic, for BES Cyber System
Information.
6.1.1. Provisioned electronic access to electronic
BCSI; and
The modified requirement language includes a
shift from authorizing access to designated
storage locations, to authorizing the provisioned
access to BCSI.
The Note was included to specify the type of
access to be authorized (6.1), verified (6.2) and
revoked (6.3).
6.1.2. Provisioned physical access to physical
BCSI.
Note: Provisioned access is to be considered the
result of the specific actions taken to provide an
individual(s) the means to access BCSI (e.g., may
include physical keys or access cards, user
accounts and associated rights and privileges,
encryption keys).
CIP-004-6, Requirement R4, Part 4.4
Verify at least once every 15 calendar months
that access to the designated storage locations
for BES Cyber System Information, whether
physical or electronic, are correct and are those
that the Responsible Entity determines are
CIP-004-X, Requirement R6, Part 6.2, 6.2.1, and
6.2.2.
Verify at least once every 15 calendar months
that all individuals with provisioned access to
BCSI:
6.2.1. have an authorization record; and
Mapping Document | March 2021
Project 2019-02 BES Cyber System Information Access Management
The modified requirement language includes a
two-part separation of the current CIP-004-6
R4.4 requirement and that the Responsible
Entity 1) Verifies provisioned access to BCSI is
authorized, and 2) Verifies the provisioned
access is still needed.
2
Standard: CIP-004-6
Requirement in Approved Standard
necessary for performing assigned work
functions.
Translation to New Standard or Other Action
Description and Change Justification
6.2.2. still need the provisioned access to perform
their current work functions, as
determined by the Responsible Entity.
CIP-004-6, Requirement R5, Part 5.3
CIP-004-X, Requirement R6, Part 6.3
For termination actions, revoke the individual’s
current access to the designated storage
locations for BES Cyber System Information,
whether physical or electronic (unless already
revoked according to Requirement R5.1), by the
end of the next calendar day following the
effective date of the termination action.
For termination actions, remove the individual’s
ability to use provisioned access to BCSI (unless
already revoked according to Part 5.1) by the end
of the next calendar day following the effective
date of the termination action.
CIP-004-6, Requirement R5, Part 5.4
CIP-004-6, Requirement R5, Part 5.3
For termination actions, revoke the individual’s
non-shared user accounts (unless already
revoked according to Parts 5.1 or 5.3) within 30
calendar days of the effective date of the
termination action.
For termination actions, revoke the individual’s
non-shared user accounts (unless already revoked
according to Part 5.1) within 30 calendar days of
the effective date of the termination action.
CIP-004-6, Requirement R5, Part 5.5
CIP-004-6, Requirement R5, Part 5.4
For termination actions, change passwords for
shared account(s) known to the user within 30
calendar days of the termination action. For
reassignments or transfers, change passwords
for shared account(s) known to the user within
30 calendar days following the date that the
For termination actions, change passwords for
shared account(s) known to the user within 30
calendar days of the termination action. For
reassignments or transfers, change passwords for
shared account(s) known to the user within 30
calendar days following the date that the
Mapping Document | March 2021
Project 2019-02 BES Cyber System Information Access Management
The change in requirement language focuses on
revoking the ability to use provisioned access to
BCSI instead of revoking access to the
designated storage locations for BCSI.
This Part was renumbed from 5.4 to 5.3 after
Part 5.3 was removed and incorporated into the
new R6 Part 6.3.
The reference within the Part was changed to
just Part 5.1.
This Part was renumbed from 5.5 to 5.4 after
Part 5.3 was removed and incorporated into the
new R6 Part 6.3. This is a renumbering change
only, no changes were made to the Part’s
requirement language.
3
Standard: CIP-004-6
Requirement in Approved Standard
Responsible Entity determines that the
individual no longer requires retention of that
access.
If the Responsible Entity determines and
documents that extenuating operating
circumstances require a longer time period,
change the password(s) within 10 calendar days
following the end of the operating
circumstances.
Translation to New Standard or Other Action
Description and Change Justification
Responsible Entity determines that the individual
no longer requires retention of that access.
If the Responsible Entity determines and
documents that extenuating operating
circumstances require a longer time period,
change the password(s) within 10 calendar days
following the end of the operating circumstances.
Mapping Document | March 2021
Project 2019-02 BES Cyber System Information Access Management
4
Mapping Document
Project 2019-02 BES Cyber System Information Access Management
Modifications to CIP-011-X
The modifications made to requirements within CIP-011-X are intended to focus on preventing unauthorized access to BES Cyber System
Information (BCSI) regardless of state (storage, transit, use).
Standard: CIP-011-X
Requirement in Approved Standard
Translation to New Standard or Other
Action
CIP-011-2, Requirement R1.
CIP-011-X, Requirement R1.
Each Responsible Entity shall implement one
or more documented information protection
program(s) that collectively includes each of
the applicable requirement parts in CIP-011-2
Table R1 – Information Protection Program.
Each Responsible Entity shall implement
one or more documented information
protection program(s) for BES Cyber
System Information (BCSI) pertaining to
Applicable Systems that collectively
includes each of the applicable
requirement parts in CIP-011-X Table R1 –
Information Protection Program.
CIP-011-2, Requirement R1, Part 1.1
CIP-011-X, Requirement R1, Part 1.1
Method(s) to identify information that meets
the definition of BES Cyber System
Information.
Method(s) to identify BCSI.
Description and Change Justification
Parent CIP-011-X Requirement R1 language
modified to sharpen focus on protecting
BCSI as opposed to protecting the BES Cyber
System(s) and associated applicable
systems, which may contain BCSI.
Requirement language simplified.
RELIABILITY | RESILIENCE | SECURITY
Standard: CIP-011-X
Requirement in Approved Standard
Translation to New Standard or Other
Action
CIP-011-2, Requirement R1, Part 1.2
CIP-011-X, Requirement R1, Part 1.2
Procedure(s) for protecting and securely
handling BES Cyber System Information,
including storage, transit, and use.
Method(s) to protect and securely handle
BCSI to mitigate the risks of compromising
confidentiality.
Mapping Document | June 2021
Project 2019-02 BES Cyber System Information Access Management
Description and Change Justification
Requirement revised to broaden the focus
around the implementation of controls that
mitigate the risks of compromising
confidentiality in any state, not just storage,
transit, and use.
2
Standards Announcement
Project 2019-02 BES Cyber System Information Access
Management
Final Ballots Open through June 11, 2021
Now Available
Final ballots are open through 8 p.m. Eastern, Tuesday, June 11, 2021 for the following:
•
CIP-004-X – Cyber Security - Personnel & Training
•
CIP-011-X – Cyber Security - Information Protection
•
Implementation Plan
Due to projects 2019-02 BES Cyber System Information Access Management (BCSI) and 2016-02
Modification to CIP Standards (2016-02) both modifying CIP-004 and CIP-011, an “-X” has been added in
place of the version numbers for BCSI and a “-Y” for the 2016-02 standards. Once both projects are
completed, they will be combined together with one version, prior to submission to the NERC Board.
Balloting
In the final ballot, votes are counted by exception. Votes from the previous ballot are automatically
carried over in the final ballot. Only members of the applicable ballot pools can cast a vote. Ballot pool
members who previously voted have the option to change their vote in the final ballot. Ballot pool
members who did not cast a vote during the previous ballot can vote in the final ballot.
Members of the ballot pool(s) associated with this project can log into the Standards Balloting and
Commenting System (SBS) and submit votes here.
•
Contact NERC IT support directly at https://support.nerc.net/ (Monday – Friday, 8 a.m. - 5 p.m.
Eastern) for problems regarding accessing the SBS due to a forgotten password, incorrect
credential error messages, or system lock-out.
•
Passwords expire every 6 months and must be reset.
•
The SBS is not supported for use on mobile devices.
•
Please be mindful of ballot and comment period closing dates. We ask to allow at least 48 hours
for NERC support staff to assist with inquiries. Therefore, it is recommended that users try logging
into their SBS accounts prior to the last day of a comment/ballot period.
Next Steps
The voting results will be posted and announced after the ballots close. If approved, the standards will
RELIABILITY | RESILIENCE | SECURITY
be submitted to the Board of Trustees for adoption and then filed with the appropriate regulatory
authorities.
For more information on the Standards Development Process, refer to the Standard Processes Manual.
For more information or assistance, contact Senior Standards Developer, Jordan Mallory (via email) or at
(404) 446-2589.
North American Electric Reliability Corporation
3353 Peachtree Rd, NE
Suite 600, North Tower
Atlanta, GA 30326
404-446-2560 | www.nerc.com
Standards Announcement
Project 2019-02 BCSI | June 2, 2021
2
NERC Balloting Tool
Dashboard
Users
Registered Ballot Body
Proxy Ballot Body
My User Profile
Ballots
Ballot Events
Ballot Results
Comment Forms
View Comment Forms
Login / Register
Ballot Results
Ballot Name:
2019-02 BES Cyber System Information Access Management CIP-004-7 FN 4 ST
Voting Start Date:
6/2/2021 12:32:01 PM
Voting End Date:
6/11/2021 8:00:00 PM
Ballot Type:
ST
Ballot Activity:
FN
Ballot Series:
4
Total # Votes:
237
Total Ballot Pool:
274
Quorum:
86.5
Quorum Established Date:
6/2/2021 12:47:34 PM
Weighted Segment Value:
85.8
Actions
Actions
Segment
Negative
Fraction w/
Comment
Ballot Segment Affirmative Affirmative Negative Votes
Pool Weight
Votes
Fraction w/ Comment
Segment:
77
1
Segment:
2
2
Segment:
60
3
Segment:
17
4
Segment:
67
5
Segment:
44
6
Segment:
0
7
Segment:
1
8
Negative Votes
No
Abstain
w/o Comment
Vote
1
46
0.807
11
0.193
0
7
13
0.2
1
0.1
1
0.1
0
0
0
1
45
0.882
6
0.118
0
3
6
1
11
1
0
0
0
2
4
1
46
0.852
8
0.148
0
6
7
1
25
0.735
9
0.265
0
3
7
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
Segment:
0
9
Segment:
6
10
Totals: 274
0
0
0
0
0
0
0
0
0.6
6
0.6
0
0
0
0
0
5.8
180
4.977
35
0.823
0
22
37
Ballot Pool Members
Segment
Organization
3
6
Con Ed - Consolidated Edison Co. of New York
Con Ed - Consolidated Edison Co. of New York
5
Ontario Power Generation Inc.
4
Utility Services, Inc.
3
3
Ameren - Ameren Services
WEC Energy Group, Inc.
Edison International - Southern California Edison
Company
MEAG Power
Con Ed - Consolidated Edison Co. of New York
MEAG Power
IDACORP - Idaho Power Company
Seminole Electric Cooperative, Inc.
Con Ed - Consolidated Edison Co. of New York
WEC Energy Group, Inc.
Independent Electricity System Operator
Massachusetts Municipal Wholesale Electric
Company
Sempra - San Diego Gas and Electric
Basin Electric Power Cooperative
Edison International - Southern California Edison
Company
NRG - NRG Energy, Inc.
National Grid USA
Western Area Power Administration
Edison International - Southern California Edison
Company
Ameren - Ameren Services
Ameren - Ameren Services
Black Hills Corporation
National Grid USA
Ameren - Ameren Missouri
Balancing Authority of Northern California
Sacramento Municipal Utility District
5
3
5
1
1
4
1
6
2
5
3
3
3
5
1
1
1
1
6
6
3
5
1
6
Voter
Designated
Proxy
NERC
Memo
Affirmative N/A
Affirmative N/A
Ballot
Peter Yost
Cristhian Godoy
Constantin
Chitescu
Brian EvansMongeon
David Jendras
Thomas Breene
Affirmative N/A
Affirmative N/A
Selene Willis
Affirmative N/A
Roger Brand
Scott Miller
Haizhen Wang
David Weekley
Scott Miller
Mike Marshall
Jonathan Robbins
Dermot Smyth
David Hathaway
Leonard Kula
Abstain
N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Anthony Stevens
Affirmative N/A
Bridget Silvia
Jeremy Voll
Affirmative N/A
Negative N/A
Romel Aquino
Affirmative N/A
Patricia Lynch
Michael Jones
sean erickson
Barry Jones
Jose Avendano
Mora
Tamara Evey
Robert Quinlivan
Brooke Voorhees
Brian Shanahan
Sam Dwyer
Kevin Smith
Joe Tarantino
Jamie Cutlip
Joe Tarantino
Affirmative N/A
Affirmative N/A
Negative N/A
Affirmative N/A
None
N/A
Affirmative N/A
None
N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
5
4
1
3
6
3
6
3
3
4
5
6
5
3
1
1
Sacramento Municipal Utility District
Sacramento Municipal Utility District
Sacramento Municipal Utility District
Sacramento Municipal Utility District
International Transmission Company Holdings
Corporation
Seattle City Light
Puget Sound Energy, Inc.
PPL - Louisville Gas and Electric Co.
PPL - Louisville Gas and Electric Co.
APS - Arizona Public Service Co.
Seattle City Light
Puget Sound Energy, Inc.
Western Area Power Administration
Sempra - San Diego Gas and Electric
Tennessee Valley Authority
Tennessee Valley Authority
Nebraska Public Power District
10
New York State Reliability Council
1
4
5
City Utilities of Springfield, Missouri
City Utilities of Springfield, Missouri
Avista - Avista Corporation
1
SaskPower
1
Allete - Minnesota Power, Inc.
1
APS - Arizona Public Service Co.
10
Midwest Reliability Organization
5
APS - Arizona Public Service Co.
1
6
6
5
1
3
3
6
5
1
4
5
Public Utility District No. 2 of Grant County,
Washington
APS - Arizona Public Service Co.
Public Utility District No. 2 of Grant County,
Washington
Dairyland Power Cooperative
Berkshire Hathaway Energy - MidAmerican Energy
Co.
Tacoma Public Utilities (Tacoma, WA)
Tennessee Valley Authority
Austin Energy
Puget Sound Energy, Inc.
WEC Energy Group, Inc.
Platte River Power Authority
Nicole Goi
Beth Tincher
Arthur Starkovich
Nicole Looney
Joe Tarantino
Joe Tarantino
Joe Tarantino
Joe Tarantino
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Michael Moltane
Gail Elliott
Affirmative N/A
Brian Belger
Justin Rathburn
Linn Oelker
James Frank
Jessica Lopez
Hao Li
Lynn Murphy
Erin Green
Jennifer Wright
Ian Grant
Gabe Kurtz
Jamison Cawley
ALAN
ADAMSON
Michael Bowman
John Allen
Glen Farmer
Wayne
Guttormson
Jamie Monette
Daniela
Atanasovski
William Steiner
Michelle
Amarantos
Abstain
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
Negative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
LeRoy Patterson
Affirmative N/A
Marcus Bortman
Affirmative N/A
Amy Jones
Affirmative N/A
Steve Ritscher
Abstain
Darnez Gresham
Affirmative N/A
Marc Donaldson Jennie Wike
Marjorie Parsons
Michael Dillard
Chelsey Neil
Matthew Beilfuss
Tyson Archie
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
N/A
1
Glencoe Light and Power Commission
Terry Volkmann
1
Network and Security Technologies
Nicholas Lauriat
1
1
1
6
Public Utility District No. 1 of Pend Oreille County
Seattle City Light
Eversource Energy
Basin Electric Power Cooperative
Kevin Conway
Michael Jang
Quintin Lee
Jerry Horner
1
Minnkota Power Cooperative Inc.
Theresa Allard
3
3
6
1
3
1
5
3
3
3
1
5
4
3
Associated Electric Cooperative, Inc.
Platte River Power Authority
Associated Electric Cooperative, Inc.
Central Electric Power Cooperative (Missouri)
M and A Electric Power Cooperative
KAMO Electric Cooperative
Associated Electric Cooperative, Inc.
Northeast Missouri Electric Power Cooperative
KAMO Electric Cooperative
Sho-Me Power Electric Cooperative
Sho-Me Power Electric Cooperative
Florida Municipal Power Agency
Florida Municipal Power Agency
Florida Municipal Power Agency
6
Florida Municipal Power Agency
1
1
3
Northeast Missouri Electric Power Cooperative
N.W. Electric Power Cooperative, Inc.
NW Electric Power Cooperative, Inc.
1
Hydro One Networks, Inc.
6
5
1
5
5
3
3
1
1
5
3
3
1
5
4
Platte River Power Authority
Los Angeles Department of Water and Power
Tacoma Public Utilities (Tacoma, WA)
Brazos Electric Power Cooperative, Inc.
Herb Schrayshuen
Lakeland Electric
Georgia System Operations Corporation
Manitoba Hydro
Long Island Power Authority
Manitoba Hydro
Manitoba Hydro
Los Angeles Department of Water and Power
Tri-State G and T Association, Inc.
Tri-State G and T Association, Inc.
FirstEnergy - FirstEnergy Corporation
Todd Bennett
Wade Kiess
Brian Ackermann
Michael Bax
Stephen Pogue
Micah Breedlove
Brad Haralson
Skyler Wiegmann
Tony Gott
Jarrod Murdaugh
Peter Dawson
Chris Gowder
Dan O'Hagan
Carl Turner
Richard
Montgomery
Kevin White
Mark Ramsey
John Stickley
Payam
Farahbakhsh
Sabrina Martz
Glenn Barry
John Merrell
Shari Heino
Herb Schrayshuen
Steve Marshall
Scott McGough
Bruce Reimer
Isidoro Behar
Yuguang Xiao
Mike Smith
Tony Skourtas
Donna Wood
Ryan Walter
Mark Garza
Roger
Fradenburgh
Negative
N/A
Negative
N/A
Abstain
N/A
Abstain
N/A
Affirmative N/A
Negative N/A
Andy
Fuhrman
Affirmative N/A
Truong Le
Truong Le
Truong Le
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
None
N/A
None
N/A
None
N/A
Truong Le
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Mark Ciufo
Jennie Wike
Affirmative N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Negative N/A
None
N/A
Negative N/A
None
N/A
None
N/A
Affirmative N/A
None
N/A
Affirmative N/A
3
5
1
5
6
3
1
5
1
1
5
1
6
3
6
6
1
1
3
3
6
3
3
6
5
6
5
3
1
3
6
3
5
3
5
4
1
1
5
Janelle Marriott
Gill
Talen Generation, LLC
Donald Lock
Lakeland Electric
Larry Watt
Lakeland Electric
Becky Rinier
OGE Energy - Oklahoma Gas and Electric Co.
Sing Tay
Christopher
Eversource Energy
McKinnon
Tallahassee Electric (City of Tallahassee, FL)
Scott Langston
Oglethorpe Power Corporation
Donna Johnson
Los Angeles Department of Water and Power
faranak sarbaz
Black Hills Corporation
Seth Nelson
Black Hills Corporation
Derek Silbaugh
Seminole Electric Cooperative, Inc.
Bret Galbraith
NiSource - Northern Indiana Public Service Co.
Joe O'Brien
NiSource - Northern Indiana Public Service Co.
Steven Taddeucci
New York Power Authority
Erick Barrios
Jennifer
Talen Energy Marketing, LLC
Hohenshilt
FirstEnergy - FirstEnergy Corporation
Julie Severino
M and A Electric Power Cooperative
William Price
Dominion - Dominion Resources, Inc.
Connie Schroeder
Muscatine Power and Water
Seth Shoemaker
Muscatine Power and Water
Nick Burns
OGE Energy - Oklahoma Gas and Electric Co.
Donald Hargrove
Westar Energy
Bryan Taggart
Westar Energy
Grant Wilkerson
Southern Company - Southern Company Generation James Howell
Simon TanapatManitoba Hydro
Andre
Tennessee Valley Authority
M Lee Thomas
Aaron
FirstEnergy - FirstEnergy Corporation
Ghodooshim
OGE Energy - Oklahoma Gas and Electric Co.
Terri Pyle
Black Hills Corporation
Don Stahl
PSEG - PSEG Energy Resources and Trade LLC
Joseph Neglia
Nebraska Public Power District
Tony Eddleman
Northern California Power Agency
Jeremy Lawson
CMS Energy - Consumers Energy Company
Karl Blaszkowski
CMS Energy - Consumers Energy Company
David Greyerbiehl
Georgia System Operations Corporation
Benjamin Winslett
Salvatore
New York Power Authority
Spagnolo
OTP - Otter Tail Power Company
Charles Wicklund
PSEG - PSEG Fossil LLC
Tim Kucey
Tri-State G and T Association, Inc.
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
None
N/A
Affirmative N/A
Affirmative N/A
Negative N/A
Negative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Negative N/A
Abstain
N/A
Abstain
N/A
Affirmative N/A
None
N/A
None
N/A
Affirmative N/A
Negative
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Negative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
5
3
3
4
5
OTP - Otter Tail Power Company
OTP - Otter Tail Power Company
Owensboro Municipal Utilities
MGE Energy - Madison Gas and Electric Co.
Entergy - Entergy Services, Inc.
Brett Jacobs
Wendi Olson
Thomas Lyons
Joseph DePoorter
Gail Golden
6
Portland General Electric Co.
Daniel Mason
1
3
1
1
5
3
6
1
10
1
5
2
6
Muscatine Power and Water
New York Power Authority
BC Hydro and Power Authority
NiSource - Northern Indiana Public Service Co.
NiSource - Northern Indiana Public Service Co.
BC Hydro and Power Authority
Los Angeles Department of Water and Power
Omaha Public Power District
SERC Reliability Corporation
Platte River Power Authority
JEA
Electric Reliability Council of Texas, Inc.
Seminole Electric Cooperative, Inc.
Andy Kurriger
David Rivera
Adrian Andreoiu
Steve Toosevich
Kathryn Tackett
Hootan Jarollahi
Anton Vu
Doug Peterchuck
Dave Krueger
Matt Thompson
John Babik
Brandon Gleason
David Reinecke
5
Imperial Irrigation District
Tino Zaragoza
1
Sunflower Electric Power Corporation
Paul Mehlhaff
6
Imperial Irrigation District
Diana Torres
1
5
Public Utility District No. 1 of Chelan County
Public Utility District No. 1 of Chelan County
1
Imperial Irrigation District
3
Public Utility District No. 1 of Chelan County
5
BC Hydro and Power Authority
Diane Landry
Meaghan Connell
Jesus Sammy
Denise
Alcaraz
Sanchez
Joyce Gundry
Helen Hamilton
Harding
5
5
PNM Resources - Public Service Company of New
Mexico
NB Power Corporation
Dairyland Power Cooperative
Berkshire Hathaway Energy - MidAmerican Energy
Co.
Hydro-Qu?bec Production
Tacoma Public Utilities (Tacoma, WA)
3
Imperial Irrigation District
Glen Allegranza
5
3
Portland General Electric Co.
Portland General Electric Co.
5
PPL - Louisville Gas and Electric Co.
Ryan Olson
Dan Zollner
JULIE
HOSTRANDER
1
1
5
1
None
N/A
None
N/A
Abstain
N/A
Abstain
N/A
Affirmative N/A
Stefanie
Burke
Affirmative N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Negative N/A
Negative N/A
Affirmative N/A
Abstain
N/A
Negative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Negative N/A
Affirmative N/A
Denise
Sanchez
Affirmative N/A
Negative
Denise
Sanchez
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Aidan Gallegos
Affirmative N/A
Nurul Abser
Tommy Drea
Affirmative N/A
Abstain
N/A
Terry Harbour
Affirmative N/A
Carl Pineault
Ozan Ferrin
Affirmative N/A
Affirmative N/A
Jennie Wike
Denise
Sanchez
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
5
Berkshire Hathaway - NV Energy
Kevin Salsbury
3
Pacific Gas and Electric Company
Sandra Ellis
1
Pacific Gas and Electric Company
Marco Rios
1
6
3
5
5
6
1
1
Santee Cooper
Santee Cooper
Santee Cooper
Santee Cooper
WEC Energy Group, Inc.
Dominion - Dominion Resources, Inc.
PPL Electric Utilities Corporation
Gainesville Regional Utilities
5
Lincoln Electric System
4
6
1
Tacoma Public Utilities (Tacoma, WA)
Northern California Power Agency
Portland General Electric Co.
Chris Wagner
Marty Watson
James Poston
Tommy Curtis
Clarice Zellmer
Sean Bodkin
Michelle Longo
David Owens
Kayleigh
Wilkerson
Hien Ho
Dennis Sismaet
Brooke Jockin
5
Pacific Gas and Electric Company
Ed Hanson
6
6
1
Tacoma Public Utilities (Tacoma, WA)
Great River Energy
NextEra Energy - Florida Power and Light Co.
Southern Company - Southern Company Services,
Inc.
Choctaw Generation Limited Partnership, LLLP
Seminole Electric Cooperative, Inc.
Dominion - Dominion Resources, Inc.
Nebraska Public Power District
Northeast Power Coordinating Council
Berkshire Hathaway - PacifiCorp
Powerex Corporation
American Transmission Company, LLC
Alliant Energy Corporation Services, Inc.
New York Power Authority
Public Utility District No. 2 of Grant County,
Washington
Exelon
Exelon
Exelon
Exelon
Entergy - Entergy Services, Inc.
City Utilities of Springfield, Missouri
Enel Green Power
Xcel Energy, Inc.
Terry Gifford
Donna Stephenson
Mike ONeil
1
5
3
5
5
10
6
6
1
4
5
4
1
3
5
6
1
3
5
6
Affirmative N/A
Michael
Johnson
Michael
Johnson
Truong Le
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Negative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Jennie Wike
Michael
Johnson
Jennie Wike
Affirmative N/A
Negative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Matt Carden
Affirmative N/A
Rob Watson
Jeremy Lorigan
Rachel Snead
Ronald Bender
Gerry Dunbar
Lindsay Wickizer
Raj Hundal
LaTroy Brumfield
Larry Heckert
Zahid Qayyum
None
N/A
Affirmative N/A
Negative N/A
Affirmative N/A
Affirmative N/A
Negative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Karla Weaver
Affirmative N/A
Daniel Gacek
Kinte Whitehead
Cynthia Lee
Becky Webb
Oliver Burke
Duan Gavel
Mat Bunch
Carrie Dixon
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
5
1
4
1
Xcel Energy, Inc.
Xcel Energy, Inc.
CMS Energy - Consumers Energy Company
Memphis Light, Gas and Water Division
1
Bonneville Power Administration
6
3
5
5
1
3
3
4
5
6
1
5
1
1
6
10
Bonneville Power Administration
Bonneville Power Administration
Bonneville Power Administration
Great River Energy
Georgia Transmission Corporation
Xcel Energy, Inc.
Snohomish County PUD No. 1
Public Utility District No. 1 of Snohomish County
Public Utility District No. 1 of Snohomish County
Snohomish County PUD No. 1
Public Utility District No. 1 of Snohomish County
AEP
AEP - AEP Service Corporation
Oncor Electric Delivery
AEP
ReliabilityFirst
3
Austin Energy
5
5
5
Cogentrix Energy Power Management, LLC
Seminole Electric Cooperative, Inc.
Cowlitz County PUD
Florida Reliability Coordinating Council – Member
Services Division
AEP
Lakeland Electric
Texas Reliability Entity, Inc.
Duke Energy
Duke Energy
Duke Energy
National Rural Electric Cooperative Association
Arkansas Electric Cooperative Corporation
Arkansas Electric Cooperative Corporation
Arkansas Electric Cooperative Corporation
Arkansas Electric Cooperative Corporation
Arkansas Electric Cooperative Corporation
East Kentucky Power Cooperative
East Kentucky Power Cooperative
Duke Energy
Arizona Electric Power Cooperative, Inc.
8
3
6
10
6
5
3
4
4
1
6
3
5
1
3
1
1
Gerry Huitt
Dean Schiro
Aric Root
Allan Long
Kammy RogersHolliday
Andrew Meyers
Ken Lanehome
Scott Winner
Jacalynn Bentz
Greg Davis
Nicholas Friebel
Holly Chaney
John Martinsen
Sam Nietfeld
John Liang
Alyssia Rhoads
Thomas Foltz
Dennis Sauriol
Lee Maurer
Byron Booker
JT Kuehne
Anthony Jablonski
W. Dwayne
Preston
Gerry Adamski
Trena Haynes
Deanna Carlson
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Vince Ordax
Abstain
Kent Feliks
Paul Shipps
Rachel Coyne
Greg Cecil
Dale Goodwine
Lee Schuster
Paul McCurley
Alice Wright
Jennifer Loiacano
Bruce Walkup
Mark Gann
Adrian Harris
Amber Skillern
Patrick Woods
Laura Lee
Jennifer Bray
Negative N/A
Affirmative N/A
Affirmative N/A
Negative N/A
Negative N/A
Negative N/A
None
N/A
None
N/A
None
N/A
None
N/A
None
N/A
None
N/A
Negative N/A
Negative N/A
Negative N/A
Negative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Negative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Negative N/A
Negative N/A
Affirmative N/A
Negative N/A
Affirmative N/A
Affirmative N/A
N/A
5
3
5
6
1
3
5
5
6
East Kentucky Power Cooperative
Wabash Valley Power Association
SunPower
Evergy
Evergy
Evergy
Evergy
FirstEnergy - FirstEnergy Corporation
FirstEnergy - FirstEnergy Corporation
David Meade
Susan Sosbe
Bradley Collard
Thomas ROBBEN
Allen Klassen
Marcus Moor
Derek Brown
Robert Loy
Ann Carey
© 2021 - NERC Ver 4.3.0.0
Machine Name: ERODVSBSWB02
Negative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
NERC Balloting Tool
Dashboard
Users
Registered Ballot Body
Proxy Ballot Body
My User Profile
Ballots
Ballot Events
Ballot Results
Comment Forms
View Comment Forms
Login / Register
Ballot Results
Ballot Name:
2019-02 BES Cyber System Information Access Management CIP-011-3 FN 4 ST
Voting Start Date:
6/2/2021 12:32:45 PM
Voting End Date:
6/11/2021 8:00:00 PM
Ballot Type:
ST
Ballot Activity:
FN
Ballot Series:
4
Total # Votes:
237
Total Ballot Pool:
273
Quorum:
86.81
Quorum Established Date:
6/2/2021 2:18:07 PM
Weighted Segment Value:
83
Actions
Actions
Segment
Negative
Fraction w/
Comment
Ballot Segment Affirmative Affirmative Negative Votes
Pool Weight
Votes
Fraction w/ Comment
Segment:
77
1
Segment:
2
2
Segment:
59
3
Segment:
17
4
Segment:
67
5
Segment:
44
6
Segment:
0
7
Segment:
1
8
Negative Votes
No
Abstain
w/o Comment
Vote
1
43
0.796
11
0.204
0
10
13
0.2
2
0.2
0
0
0
0
0
1
42
0.857
7
0.143
0
4
6
1
10
1
0
0
0
3
4
1
45
0.833
9
0.167
0
7
6
1
24
0.727
9
0.273
0
4
7
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
Segment:
0
9
Segment:
6
10
Totals: 273
0
0
0
0
0
0
0
0
0.6
4
0.4
2
0.2
0
0
0
5.8
170
4.814
38
0.986
0
29
36
Ballot Pool Members
Segment
Organization
3
6
Con Ed - Consolidated Edison Co. of New York
Con Ed - Consolidated Edison Co. of New York
4
Utility Services, Inc.
3
3
Ameren - Ameren Services
WEC Energy Group, Inc.
5
Ontario Power Generation Inc.
5
3
5
1
1
4
1
6
2
5
3
3
3
5
1
1
1
1
6
6
3
5
1
6
Edison International - Southern California Edison
Company
MEAG Power
Con Ed - Consolidated Edison Co. of New York
MEAG Power
IDACORP - Idaho Power Company
Seminole Electric Cooperative, Inc.
Con Ed - Consolidated Edison Co. of New York
WEC Energy Group, Inc.
Independent Electricity System Operator
Massachusetts Municipal Wholesale Electric
Company
Sempra - San Diego Gas and Electric
Basin Electric Power Cooperative
Edison International - Southern California Edison
Company
NRG - NRG Energy, Inc.
National Grid USA
Western Area Power Administration
Edison International - Southern California Edison
Company
Ameren - Ameren Services
Ameren - Ameren Services
Black Hills Corporation
National Grid USA
Ameren - Ameren Missouri
Balancing Authority of Northern California
Sacramento Municipal Utility District
Voter
Designated
Proxy
Peter Yost
Cristhian Godoy
Brian EvansMongeon
David Jendras
Thomas Breene
Constantin
Chitescu
NERC
Memo
Affirmative N/A
Affirmative N/A
Ballot
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Selene Willis
Affirmative N/A
Roger Brand
Scott Miller
Haizhen Wang
David Weekley
Scott Miller
Mike Marshall
Jonathan Robbins
Dermot Smyth
David Hathaway
Leonard Kula
Abstain
N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Anthony Stevens
Affirmative N/A
Bridget Silvia
Jeremy Voll
Affirmative N/A
Negative N/A
Romel Aquino
Affirmative N/A
Patricia Lynch
Michael Jones
sean erickson
Barry Jones
Jose Avendano
Mora
Tamara Evey
Robert Quinlivan
Brooke Voorhees
Brian Shanahan
Sam Dwyer
Kevin Smith
Joe Tarantino
Jamie Cutlip
Joe Tarantino
Affirmative N/A
Affirmative N/A
Negative N/A
Affirmative N/A
None
N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
5
4
1
3
6
3
6
3
3
4
5
6
5
3
1
1
Sacramento Municipal Utility District
Sacramento Municipal Utility District
Sacramento Municipal Utility District
Sacramento Municipal Utility District
International Transmission Company Holdings
Corporation
Seattle City Light
Puget Sound Energy, Inc.
PPL - Louisville Gas and Electric Co.
PPL - Louisville Gas and Electric Co.
APS - Arizona Public Service Co.
Seattle City Light
Puget Sound Energy, Inc.
Western Area Power Administration
Sempra - San Diego Gas and Electric
Tennessee Valley Authority
Tennessee Valley Authority
Nebraska Public Power District
10
New York State Reliability Council
1
4
5
City Utilities of Springfield, Missouri
City Utilities of Springfield, Missouri
Avista - Avista Corporation
1
SaskPower
1
Allete - Minnesota Power, Inc.
1
APS - Arizona Public Service Co.
10
Midwest Reliability Organization
5
APS - Arizona Public Service Co.
1
6
6
5
1
3
3
6
5
1
5
4
Public Utility District No. 2 of Grant County,
Washington
APS - Arizona Public Service Co.
Public Utility District No. 2 of Grant County,
Washington
Dairyland Power Cooperative
Berkshire Hathaway Energy - MidAmerican Energy
Co.
Tacoma Public Utilities (Tacoma, WA)
Tennessee Valley Authority
Austin Energy
Puget Sound Energy, Inc.
San Miguel Electric Cooperative, Inc.
WEC Energy Group, Inc.
Nicole Goi
Beth Tincher
Arthur Starkovich
Nicole Looney
Joe Tarantino
Joe Tarantino
Joe Tarantino
Joe Tarantino
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Michael Moltane
Gail Elliott
Abstain
Brian Belger
Justin Rathburn
Linn Oelker
James Frank
Jessica Lopez
Hao Li
Lynn Murphy
Erin Green
Jennifer Wright
Ian Grant
Gabe Kurtz
Jamison Cawley
ALAN
ADAMSON
Michael Bowman
John Allen
Glen Farmer
Wayne
Guttormson
Jamie Monette
Daniela
Atanasovski
William Steiner
Michelle
Amarantos
N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
Negative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
None
N/A
Affirmative N/A
Negative
N/A
Affirmative N/A
LeRoy Patterson
Affirmative N/A
Marcus Bortman
Affirmative N/A
Amy Jones
Affirmative N/A
Steve Ritscher
Abstain
N/A
Darnez Gresham
Negative
N/A
Marc Donaldson Jennie Wike
Marjorie Parsons
Michael Dillard
Chelsey Neil
Lana Smith
Matthew Beilfuss
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
5
1
Platte River Power Authority
Glencoe Light and Power Commission
Tyson Archie
Terry Volkmann
1
Network and Security Technologies
Nicholas Lauriat
1
1
1
6
Public Utility District No. 1 of Pend Oreille County
Seattle City Light
Eversource Energy
Basin Electric Power Cooperative
Kevin Conway
Michael Jang
Quintin Lee
Jerry Horner
1
Minnkota Power Cooperative Inc.
Theresa Allard
3
3
6
1
3
1
5
3
3
3
1
5
4
3
Associated Electric Cooperative, Inc.
Platte River Power Authority
Associated Electric Cooperative, Inc.
Central Electric Power Cooperative (Missouri)
M and A Electric Power Cooperative
KAMO Electric Cooperative
Associated Electric Cooperative, Inc.
Northeast Missouri Electric Power Cooperative
KAMO Electric Cooperative
Sho-Me Power Electric Cooperative
Sho-Me Power Electric Cooperative
Florida Municipal Power Agency
Florida Municipal Power Agency
Florida Municipal Power Agency
6
Florida Municipal Power Agency
1
1
3
Northeast Missouri Electric Power Cooperative
N.W. Electric Power Cooperative, Inc.
NW Electric Power Cooperative, Inc.
1
Hydro One Networks, Inc.
6
5
1
5
5
3
3
1
1
5
3
3
1
4
Platte River Power Authority
Los Angeles Department of Water and Power
Tacoma Public Utilities (Tacoma, WA)
Brazos Electric Power Cooperative, Inc.
Herb Schrayshuen
Lakeland Electric
Georgia System Operations Corporation
Manitoba Hydro
Long Island Power Authority
Manitoba Hydro
Manitoba Hydro
Los Angeles Department of Water and Power
Tri-State G and T Association, Inc.
FirstEnergy - FirstEnergy Corporation
Todd Bennett
Wade Kiess
Brian Ackermann
Michael Bax
Stephen Pogue
Micah Breedlove
Brad Haralson
Skyler Wiegmann
Tony Gott
Jarrod Murdaugh
Peter Dawson
Chris Gowder
Dan O'Hagan
Carl Turner
Richard
Montgomery
Kevin White
Mark Ramsey
John Stickley
Payam
Farahbakhsh
Sabrina Martz
Glenn Barry
John Merrell
Shari Heino
Herb Schrayshuen
Steve Marshall
Scott McGough
Bruce Reimer
Isidoro Behar
Yuguang Xiao
Mike Smith
Tony Skourtas
Donna Wood
Mark Garza
Affirmative N/A
Negative N/A
Roger
Fradenburgh
Negative
N/A
Abstain
N/A
Abstain
N/A
Affirmative N/A
Negative N/A
Andy
Fuhrman
Affirmative N/A
Truong Le
Truong Le
Truong Le
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
None
N/A
None
N/A
None
N/A
Truong Le
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Mark Ciufo
Jennie Wike
Affirmative N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Negative N/A
None
N/A
Negative N/A
None
N/A
None
N/A
Affirmative N/A
Affirmative N/A
3
5
1
5
6
3
1
5
1
1
5
1
6
3
6
6
1
1
3
3
6
3
3
6
5
6
5
3
1
3
6
3
5
3
5
4
1
1
5
Janelle Marriott
Gill
Talen Generation, LLC
Donald Lock
Lakeland Electric
Larry Watt
Lakeland Electric
Becky Rinier
OGE Energy - Oklahoma Gas and Electric Co.
Sing Tay
Christopher
Eversource Energy
McKinnon
Tallahassee Electric (City of Tallahassee, FL)
Scott Langston
Oglethorpe Power Corporation
Donna Johnson
Los Angeles Department of Water and Power
faranak sarbaz
Black Hills Corporation
Seth Nelson
Black Hills Corporation
Derek Silbaugh
Seminole Electric Cooperative, Inc.
Bret Galbraith
NiSource - Northern Indiana Public Service Co.
Joe O'Brien
NiSource - Northern Indiana Public Service Co.
Steven Taddeucci
New York Power Authority
Erick Barrios
Jennifer
Talen Energy Marketing, LLC
Hohenshilt
FirstEnergy - FirstEnergy Corporation
Julie Severino
M and A Electric Power Cooperative
William Price
Dominion - Dominion Resources, Inc.
Connie Schroeder
Muscatine Power and Water
Seth Shoemaker
Muscatine Power and Water
Nick Burns
OGE Energy - Oklahoma Gas and Electric Co.
Donald Hargrove
Westar Energy
Bryan Taggart
Westar Energy
Grant Wilkerson
Southern Company - Southern Company Generation James Howell
Simon TanapatManitoba Hydro
Andre
Tennessee Valley Authority
M Lee Thomas
Aaron
FirstEnergy - FirstEnergy Corporation
Ghodooshim
OGE Energy - Oklahoma Gas and Electric Co.
Terri Pyle
Black Hills Corporation
Don Stahl
PSEG - PSEG Energy Resources and Trade LLC
Joseph Neglia
Nebraska Public Power District
Tony Eddleman
Northern California Power Agency
Jeremy Lawson
CMS Energy - Consumers Energy Company
Karl Blaszkowski
CMS Energy - Consumers Energy Company
David Greyerbiehl
Georgia System Operations Corporation
Benjamin Winslett
Salvatore
New York Power Authority
Spagnolo
OTP - Otter Tail Power Company
Charles Wicklund
PSEG - PSEG Fossil LLC
Tim Kucey
Tri-State G and T Association, Inc.
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
None
N/A
None
N/A
Affirmative N/A
Abstain
N/A
Negative N/A
Negative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Negative N/A
Abstain
N/A
Abstain
N/A
Affirmative N/A
None
N/A
None
N/A
Affirmative N/A
Negative
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Negative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
5
3
3
4
5
6
1
3
1
1
5
3
6
1
10
1
5
2
6
OTP - Otter Tail Power Company
OTP - Otter Tail Power Company
Owensboro Municipal Utilities
MGE Energy - Madison Gas and Electric Co.
Entergy - Entergy Services, Inc.
Portland General Electric Co.
Muscatine Power and Water
New York Power Authority
BC Hydro and Power Authority
NiSource - Northern Indiana Public Service Co.
NiSource - Northern Indiana Public Service Co.
BC Hydro and Power Authority
Los Angeles Department of Water and Power
Omaha Public Power District
SERC Reliability Corporation
Platte River Power Authority
JEA
Electric Reliability Council of Texas, Inc.
Seminole Electric Cooperative, Inc.
Brett Jacobs
Wendi Olson
Thomas Lyons
Joseph DePoorter
Gail Golden
Daniel Mason
Andy Kurriger
David Rivera
Adrian Andreoiu
Steve Toosevich
Kathryn Tackett
Hootan Jarollahi
Anton Vu
Doug Peterchuck
Dave Krueger
Matt Thompson
John Babik
Brandon Gleason
David Reinecke
5
Imperial Irrigation District
Tino Zaragoza
1
Sunflower Electric Power Corporation
Paul Mehlhaff
6
Imperial Irrigation District
Diana Torres
1
5
Public Utility District No. 1 of Chelan County
Public Utility District No. 1 of Chelan County
1
Imperial Irrigation District
3
Public Utility District No. 1 of Chelan County
5
BC Hydro and Power Authority
Diane Landry
Meaghan Connell
Jesus Sammy
Denise
Alcaraz
Sanchez
Joyce Gundry
Helen Hamilton
Harding
5
5
PNM Resources - Public Service Company of New
Mexico
NB Power Corporation
Dairyland Power Cooperative
Berkshire Hathaway Energy - MidAmerican Energy
Co.
Hydro-Qu?bec Production
Tacoma Public Utilities (Tacoma, WA)
3
Imperial Irrigation District
Glen Allegranza
5
3
Portland General Electric Co.
Portland General Electric Co.
5
PPL - Louisville Gas and Electric Co.
Ryan Olson
Dan Zollner
JULIE
HOSTRANDER
1
1
5
1
None
N/A
None
N/A
Abstain
N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Negative N/A
Negative N/A
Affirmative N/A
Abstain
N/A
Negative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Abstain
N/A
Denise
Sanchez
Affirmative N/A
Negative
Denise
Sanchez
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Aidan Gallegos
Affirmative N/A
Nurul Abser
Tommy Drea
Affirmative N/A
Abstain
N/A
Terry Harbour
Negative
Carl Pineault
Ozan Ferrin
Affirmative N/A
Affirmative N/A
Jennie Wike
Denise
Sanchez
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
5
Berkshire Hathaway - NV Energy
Kevin Salsbury
3
Pacific Gas and Electric Company
Sandra Ellis
1
Pacific Gas and Electric Company
Marco Rios
1
6
3
5
5
6
1
1
Santee Cooper
Santee Cooper
Santee Cooper
Santee Cooper
WEC Energy Group, Inc.
Dominion - Dominion Resources, Inc.
PPL Electric Utilities Corporation
Gainesville Regional Utilities
5
Lincoln Electric System
4
6
1
Tacoma Public Utilities (Tacoma, WA)
Northern California Power Agency
Portland General Electric Co.
Chris Wagner
Marty Watson
James Poston
Tommy Curtis
Clarice Zellmer
Sean Bodkin
Michelle Longo
David Owens
Kayleigh
Wilkerson
Hien Ho
Dennis Sismaet
Brooke Jockin
5
Pacific Gas and Electric Company
Ed Hanson
6
6
1
Tacoma Public Utilities (Tacoma, WA)
Great River Energy
NextEra Energy - Florida Power and Light Co.
Southern Company - Southern Company Services,
Inc.
Choctaw Generation Limited Partnership, LLLP
Seminole Electric Cooperative, Inc.
Dominion - Dominion Resources, Inc.
Nebraska Public Power District
Northeast Power Coordinating Council
Berkshire Hathaway - PacifiCorp
Powerex Corporation
American Transmission Company, LLC
Alliant Energy Corporation Services, Inc.
New York Power Authority
Public Utility District No. 2 of Grant County,
Washington
Exelon
Exelon
Exelon
Exelon
Entergy - Entergy Services, Inc.
City Utilities of Springfield, Missouri
Enel Green Power
Xcel Energy, Inc.
Terry Gifford
Donna Stephenson
Mike ONeil
1
5
3
5
5
10
6
6
1
4
5
4
1
3
5
6
1
3
5
6
Negative
Michael
Johnson
Michael
Johnson
Truong Le
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Negative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Jennie Wike
Michael
Johnson
Jennie Wike
Affirmative N/A
Negative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Matt Carden
Affirmative N/A
Rob Watson
Jeremy Lorigan
Rachel Snead
Ronald Bender
Gerry Dunbar
Lindsay Wickizer
Raj Hundal
LaTroy Brumfield
Larry Heckert
Zahid Qayyum
None
N/A
Abstain
N/A
Negative N/A
Affirmative N/A
Affirmative N/A
Negative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Karla Weaver
Affirmative N/A
Daniel Gacek
Kinte Whitehead
Cynthia Lee
Becky Webb
Oliver Burke
Duan Gavel
Mat Bunch
Carrie Dixon
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
5
1
4
1
Xcel Energy, Inc.
Xcel Energy, Inc.
CMS Energy - Consumers Energy Company
Memphis Light, Gas and Water Division
1
Bonneville Power Administration
6
3
5
5
1
3
4
5
6
1
5
1
1
6
10
Bonneville Power Administration
Bonneville Power Administration
Bonneville Power Administration
Great River Energy
Georgia Transmission Corporation
Snohomish County PUD No. 1
Public Utility District No. 1 of Snohomish County
Public Utility District No. 1 of Snohomish County
Snohomish County PUD No. 1
Public Utility District No. 1 of Snohomish County
AEP
AEP - AEP Service Corporation
Oncor Electric Delivery
AEP
ReliabilityFirst
3
Austin Energy
5
5
5
Cogentrix Energy Power Management, LLC
Seminole Electric Cooperative, Inc.
Cowlitz County PUD
Florida Reliability Coordinating Council – Member
Services Division
AEP
Lakeland Electric
Texas Reliability Entity, Inc.
Duke Energy
Duke Energy
Duke Energy
National Rural Electric Cooperative Association
Arkansas Electric Cooperative Corporation
Arkansas Electric Cooperative Corporation
Arkansas Electric Cooperative Corporation
Arkansas Electric Cooperative Corporation
Arkansas Electric Cooperative Corporation
East Kentucky Power Cooperative
East Kentucky Power Cooperative
Duke Energy
Arizona Electric Power Cooperative, Inc.
East Kentucky Power Cooperative
8
3
6
10
6
5
3
4
4
1
6
3
5
1
3
1
1
5
Gerry Huitt
Dean Schiro
Aric Root
Allan Long
Kammy RogersHolliday
Andrew Meyers
Ken Lanehome
Scott Winner
Jacalynn Bentz
Greg Davis
Holly Chaney
John Martinsen
Sam Nietfeld
John Liang
Alyssia Rhoads
Thomas Foltz
Dennis Sauriol
Lee Maurer
Byron Booker
JT Kuehne
Anthony Jablonski
W. Dwayne
Preston
Gerry Adamski
Trena Haynes
Deanna Carlson
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
Vince Ordax
Abstain
Kent Feliks
Paul Shipps
Rachel Coyne
Greg Cecil
Dale Goodwine
Lee Schuster
Paul McCurley
Alice Wright
Jennifer Loiacano
Bruce Walkup
Mark Gann
Adrian Harris
Amber Skillern
Patrick Woods
Laura Lee
Jennifer Bray
David Meade
Negative N/A
Affirmative N/A
Negative N/A
Negative N/A
Negative N/A
Negative N/A
None
N/A
None
N/A
None
N/A
None
N/A
None
N/A
None
N/A
Negative N/A
Negative N/A
Negative N/A
Affirmative N/A
Negative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Negative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Negative N/A
Negative N/A
Affirmative N/A
Negative N/A
Affirmative N/A
Affirmative N/A
N/A
3
5
6
1
3
5
5
6
Wabash Valley Power Association
SunPower
Evergy
Evergy
Evergy
Evergy
FirstEnergy - FirstEnergy Corporation
FirstEnergy - FirstEnergy Corporation
Susan Sosbe
Bradley Collard
Thomas ROBBEN
Allen Klassen
Marcus Moor
Derek Brown
Robert Loy
Ann Carey
© 2021 - NERC Ver 4.3.0.0
Machine Name: ERODVSBSWB02
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
NERC Balloting Tool
Dashboard
Users
Registered Ballot Body
Proxy Ballot Body
My User Profile
Ballots
Ballot Events
Ballot Results
Comment Forms
View Comment Forms
Login / Register
Ballot Results
Ballot Name:
2019-02 BES Cyber System Information Access Management Implementation Plan FN 4 OT
Voting Start Date:
6/2/2021 12:33:47 PM
Voting End Date:
6/11/2021 8:00:00 PM
Ballot Type:
OT
Ballot Activity:
FN
Ballot Series:
4
Total # Votes:
231
Total Ballot Pool:
269
Quorum:
85.87
Quorum Established Date:
6/2/2021 2:18:16 PM
Weighted Segment Value:
94.17
Actions
Actions
Segment
Negative
Fraction w/
Comment
Ballot Segment Affirmative Affirmative Negative Votes
Pool Weight
Votes
Fraction w/ Comment
Segment:
76
1
Segment:
2
2
Segment:
58
3
Segment:
17
4
Segment:
65
5
Segment:
44
6
Segment:
0
7
Segment:
1
8
Negative Votes
No
Abstain
w/o Comment
Vote
1
48
0.923
4
0.077
0
11
13
0.2
2
0.2
0
0
0
0
0
1
45
0.918
4
0.082
0
4
5
1
10
1
0
0
0
3
4
1
46
0.92
4
0.08
0
8
7
1
29
0.906
3
0.094
0
3
9
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
Segment:
0
9
Segment:
6
10
Totals: 269
0
0
0
0
0
0
0
0
0.5
5
0.5
0
0
0
1
0
5.7
185
5.368
15
0.332
0
31
38
Ballot Pool Members
Segment
Organization
3
6
Con Ed - Consolidated Edison Co. of New York
Con Ed - Consolidated Edison Co. of New York
4
Utility Services, Inc.
3
3
Ameren - Ameren Services
WEC Energy Group, Inc.
5
Ontario Power Generation Inc.
5
3
5
1
1
4
1
6
2
5
3
3
3
5
1
1
1
1
6
6
3
5
1
6
Edison International - Southern California Edison
Company
MEAG Power
Con Ed - Consolidated Edison Co. of New York
MEAG Power
IDACORP - Idaho Power Company
Seminole Electric Cooperative, Inc.
Con Ed - Consolidated Edison Co. of New York
WEC Energy Group, Inc.
Independent Electricity System Operator
Massachusetts Municipal Wholesale Electric
Company
Sempra - San Diego Gas and Electric
Basin Electric Power Cooperative
Edison International - Southern California Edison
Company
NRG - NRG Energy, Inc.
National Grid USA
Western Area Power Administration
Edison International - Southern California Edison
Company
Ameren - Ameren Services
Ameren - Ameren Services
Black Hills Corporation
National Grid USA
Ameren - Ameren Missouri
Balancing Authority of Northern California
Sacramento Municipal Utility District
Voter
Designated
Proxy
Peter Yost
Cristhian Godoy
Brian EvansMongeon
David Jendras
Thomas Breene
Constantin
Chitescu
NERC
Memo
Affirmative N/A
Affirmative N/A
Ballot
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Selene Willis
Affirmative N/A
Roger Brand
Scott Miller
Haizhen Wang
David Weekley
Scott Miller
Mike Marshall
Jonathan Robbins
Dermot Smyth
David Hathaway
Leonard Kula
Abstain
N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Anthony Stevens
Affirmative N/A
Bridget Silvia
Jeremy Voll
Affirmative N/A
Negative N/A
Romel Aquino
Affirmative N/A
Patricia Lynch
Michael Jones
sean erickson
Barry Jones
Jose Avendano
Mora
Tamara Evey
Robert Quinlivan
Brooke Voorhees
Brian Shanahan
Sam Dwyer
Kevin Smith
Joe Tarantino
Jamie Cutlip
Joe Tarantino
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
5
4
1
3
6
3
6
3
3
4
5
6
5
3
1
1
Sacramento Municipal Utility District
Sacramento Municipal Utility District
Sacramento Municipal Utility District
Sacramento Municipal Utility District
International Transmission Company Holdings
Corporation
Seattle City Light
Puget Sound Energy, Inc.
PPL - Louisville Gas and Electric Co.
PPL - Louisville Gas and Electric Co.
APS - Arizona Public Service Co.
Seattle City Light
Puget Sound Energy, Inc.
Western Area Power Administration
Sempra - San Diego Gas and Electric
Tennessee Valley Authority
Tennessee Valley Authority
Nebraska Public Power District
10
New York State Reliability Council
1
4
5
City Utilities of Springfield, Missouri
City Utilities of Springfield, Missouri
Avista - Avista Corporation
1
SaskPower
1
Allete - Minnesota Power, Inc.
1
APS - Arizona Public Service Co.
10
Midwest Reliability Organization
5
APS - Arizona Public Service Co.
1
6
6
5
1
3
3
6
5
1
4
5
Public Utility District No. 2 of Grant County,
Washington
APS - Arizona Public Service Co.
Public Utility District No. 2 of Grant County,
Washington
Dairyland Power Cooperative
Berkshire Hathaway Energy - MidAmerican Energy
Co.
Tacoma Public Utilities (Tacoma, WA)
Tennessee Valley Authority
Austin Energy
Puget Sound Energy, Inc.
WEC Energy Group, Inc.
Platte River Power Authority
Nicole Goi
Beth Tincher
Arthur Starkovich
Nicole Looney
Joe Tarantino
Joe Tarantino
Joe Tarantino
Joe Tarantino
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Michael Moltane
Gail Elliott
Affirmative N/A
Brian Belger
Justin Rathburn
Linn Oelker
James Frank
Jessica Lopez
Hao Li
Lynn Murphy
Erin Green
Jennifer Wright
Ian Grant
Gabe Kurtz
Jamison Cawley
ALAN
ADAMSON
Michael Bowman
John Allen
Glen Farmer
Wayne
Guttormson
Jamie Monette
Daniela
Atanasovski
William Steiner
Michelle
Amarantos
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
LeRoy Patterson
Affirmative N/A
Marcus Bortman
Affirmative N/A
Amy Jones
Affirmative N/A
Steve Ritscher
Abstain
Darnez Gresham
Affirmative N/A
Marc Donaldson Jennie Wike
Marjorie Parsons
Michael Dillard
Chelsey Neil
Matthew Beilfuss
Tyson Archie
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
N/A
1
Glencoe Light and Power Commission
Terry Volkmann
1
Network and Security Technologies
Nicholas Lauriat
1
1
1
6
Public Utility District No. 1 of Pend Oreille County
Seattle City Light
Eversource Energy
Basin Electric Power Cooperative
Kevin Conway
Michael Jang
Quintin Lee
Jerry Horner
1
Minnkota Power Cooperative Inc.
Theresa Allard
3
3
6
1
3
1
5
3
3
3
1
5
4
3
Associated Electric Cooperative, Inc.
Platte River Power Authority
Associated Electric Cooperative, Inc.
Central Electric Power Cooperative (Missouri)
M and A Electric Power Cooperative
KAMO Electric Cooperative
Associated Electric Cooperative, Inc.
Northeast Missouri Electric Power Cooperative
KAMO Electric Cooperative
Sho-Me Power Electric Cooperative
Sho-Me Power Electric Cooperative
Florida Municipal Power Agency
Florida Municipal Power Agency
Florida Municipal Power Agency
6
Florida Municipal Power Agency
1
1
3
Northeast Missouri Electric Power Cooperative
N.W. Electric Power Cooperative, Inc.
NW Electric Power Cooperative, Inc.
1
Hydro One Networks, Inc.
6
5
1
5
5
3
3
1
3
1
4
Platte River Power Authority
Los Angeles Department of Water and Power
Tacoma Public Utilities (Tacoma, WA)
Brazos Electric Power Cooperative, Inc.
Herb Schrayshuen
Lakeland Electric
Georgia System Operations Corporation
Long Island Power Authority
Los Angeles Department of Water and Power
Tri-State G and T Association, Inc.
FirstEnergy - FirstEnergy Corporation
3
Tri-State G and T Association, Inc.
5
1
Talen Generation, LLC
Lakeland Electric
Todd Bennett
Wade Kiess
Brian Ackermann
Michael Bax
Stephen Pogue
Micah Breedlove
Brad Haralson
Skyler Wiegmann
Tony Gott
Jarrod Murdaugh
Peter Dawson
Chris Gowder
Dan O'Hagan
Carl Turner
Richard
Montgomery
Kevin White
Mark Ramsey
John Stickley
Payam
Farahbakhsh
Sabrina Martz
Glenn Barry
John Merrell
Shari Heino
Herb Schrayshuen
Steve Marshall
Scott McGough
Isidoro Behar
Tony Skourtas
Donna Wood
Mark Garza
Janelle Marriott
Gill
Donald Lock
Larry Watt
Abstain
Roger
Fradenburgh
N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
Affirmative N/A
Negative N/A
Andy
Fuhrman
Affirmative N/A
Truong Le
Truong Le
Truong Le
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
None
N/A
None
N/A
None
N/A
Truong Le
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Mark Ciufo
Jennie Wike
Affirmative N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
5
6
3
1
5
1
1
5
1
6
3
6
6
1
1
3
3
6
3
3
6
5
6
5
3
1
3
6
3
5
3
5
4
1
1
5
3
4
5
5
Lakeland Electric
OGE Energy - Oklahoma Gas and Electric Co.
Becky Rinier
Sing Tay
Christopher
Eversource Energy
McKinnon
Tallahassee Electric (City of Tallahassee, FL)
Scott Langston
Oglethorpe Power Corporation
Donna Johnson
Los Angeles Department of Water and Power
faranak sarbaz
Black Hills Corporation
Seth Nelson
Black Hills Corporation
Derek Silbaugh
Seminole Electric Cooperative, Inc.
Bret Galbraith
NiSource - Northern Indiana Public Service Co.
Joe O'Brien
NiSource - Northern Indiana Public Service Co.
Steven Taddeucci
New York Power Authority
Erick Barrios
Jennifer
Talen Energy Marketing, LLC
Hohenshilt
FirstEnergy - FirstEnergy Corporation
Julie Severino
M and A Electric Power Cooperative
William Price
Dominion - Dominion Resources, Inc.
Connie Schroeder
Muscatine Power and Water
Seth Shoemaker
Muscatine Power and Water
Nick Burns
OGE Energy - Oklahoma Gas and Electric Co.
Donald Hargrove
Westar Energy
Bryan Taggart
Westar Energy
Grant Wilkerson
Southern Company - Southern Company Generation James Howell
Simon TanapatManitoba Hydro
Andre
Tennessee Valley Authority
M Lee Thomas
Aaron
FirstEnergy - FirstEnergy Corporation
Ghodooshim
OGE Energy - Oklahoma Gas and Electric Co.
Terri Pyle
Black Hills Corporation
Don Stahl
PSEG - PSEG Energy Resources and Trade LLC
Joseph Neglia
Nebraska Public Power District
Tony Eddleman
Northern California Power Agency
Jeremy Lawson
CMS Energy - Consumers Energy Company
Karl Blaszkowski
CMS Energy - Consumers Energy Company
David Greyerbiehl
Georgia System Operations Corporation
Benjamin Winslett
Salvatore
New York Power Authority
Spagnolo
OTP - Otter Tail Power Company
Charles Wicklund
PSEG - PSEG Fossil LLC
Tim Kucey
Owensboro Municipal Utilities
Thomas Lyons
MGE Energy - Madison Gas and Electric Co.
Joseph DePoorter
Entergy - Entergy Services, Inc.
Gail Golden
OTP - Otter Tail Power Company
Brett Jacobs
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
None
N/A
None
N/A
Affirmative N/A
Abstain
N/A
Negative N/A
Negative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Negative N/A
Abstain
N/A
Abstain
N/A
Affirmative N/A
None
N/A
None
N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Negative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Abstain
N/A
Abstain
N/A
Affirmative N/A
None
N/A
3
6
1
3
1
1
5
3
6
1
10
1
5
2
6
OTP - Otter Tail Power Company
Portland General Electric Co.
Muscatine Power and Water
New York Power Authority
BC Hydro and Power Authority
NiSource - Northern Indiana Public Service Co.
NiSource - Northern Indiana Public Service Co.
BC Hydro and Power Authority
Los Angeles Department of Water and Power
Omaha Public Power District
SERC Reliability Corporation
Platte River Power Authority
JEA
Electric Reliability Council of Texas, Inc.
Seminole Electric Cooperative, Inc.
Wendi Olson
Daniel Mason
Andy Kurriger
David Rivera
Adrian Andreoiu
Steve Toosevich
Kathryn Tackett
Hootan Jarollahi
Anton Vu
Doug Peterchuck
Dave Krueger
Matt Thompson
John Babik
Brandon Gleason
David Reinecke
5
Imperial Irrigation District
Tino Zaragoza
1
Sunflower Electric Power Corporation
Paul Mehlhaff
6
Imperial Irrigation District
Diana Torres
1
5
Public Utility District No. 1 of Chelan County
Public Utility District No. 1 of Chelan County
1
Imperial Irrigation District
3
Public Utility District No. 1 of Chelan County
5
BC Hydro and Power Authority
Diane Landry
Meaghan Connell
Jesus Sammy
Denise
Alcaraz
Sanchez
Joyce Gundry
Helen Hamilton
Harding
5
5
PNM Resources - Public Service Company of New
Mexico
NB Power Corporation
Dairyland Power Cooperative
Berkshire Hathaway Energy - MidAmerican Energy
Co.
Hydro-Qu?bec Production
Tacoma Public Utilities (Tacoma, WA)
3
Imperial Irrigation District
Glen Allegranza
5
3
Portland General Electric Co.
Portland General Electric Co.
5
PPL - Louisville Gas and Electric Co.
5
Berkshire Hathaway - NV Energy
Ryan Olson
Dan Zollner
JULIE
HOSTRANDER
Kevin Salsbury
3
Pacific Gas and Electric Company
Sandra Ellis
1
Pacific Gas and Electric Company
Marco Rios
1
1
5
1
None
N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Negative N/A
Negative N/A
Affirmative N/A
Abstain
N/A
Negative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Abstain
N/A
Denise
Sanchez
Affirmative N/A
Negative
Denise
Sanchez
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Aidan Gallegos
Affirmative N/A
Nurul Abser
Tommy Drea
Affirmative N/A
Abstain
N/A
Terry Harbour
Affirmative N/A
Carl Pineault
Ozan Ferrin
Affirmative N/A
Affirmative N/A
Jennie Wike
Denise
Sanchez
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Michael
Johnson
Michael
Johnson
Affirmative N/A
Affirmative N/A
1
6
3
5
5
6
1
1
Santee Cooper
Santee Cooper
Santee Cooper
Santee Cooper
WEC Energy Group, Inc.
Dominion - Dominion Resources, Inc.
PPL Electric Utilities Corporation
Gainesville Regional Utilities
5
Lincoln Electric System
4
6
1
Tacoma Public Utilities (Tacoma, WA)
Northern California Power Agency
Portland General Electric Co.
Chris Wagner
Marty Watson
James Poston
Tommy Curtis
Clarice Zellmer
Sean Bodkin
Michelle Longo
David Owens
Kayleigh
Wilkerson
Hien Ho
Dennis Sismaet
Brooke Jockin
5
Pacific Gas and Electric Company
Ed Hanson
6
6
1
Tacoma Public Utilities (Tacoma, WA)
Great River Energy
NextEra Energy - Florida Power and Light Co.
Southern Company - Southern Company Services,
Inc.
Choctaw Generation Limited Partnership, LLLP
Seminole Electric Cooperative, Inc.
Dominion - Dominion Resources, Inc.
Nebraska Public Power District
Northeast Power Coordinating Council
Berkshire Hathaway - PacifiCorp
Powerex Corporation
American Transmission Company, LLC
Alliant Energy Corporation Services, Inc.
New York Power Authority
Public Utility District No. 2 of Grant County,
Washington
Exelon
Exelon
Exelon
Exelon
Entergy - Entergy Services, Inc.
City Utilities of Springfield, Missouri
Enel Green Power
Xcel Energy, Inc.
Xcel Energy, Inc.
Xcel Energy, Inc.
CMS Energy - Consumers Energy Company
Memphis Light, Gas and Water Division
Terry Gifford
Donna Stephenson
Mike ONeil
1
5
3
5
5
10
6
6
1
4
5
4
1
3
5
6
1
3
5
6
1
5
4
1
Truong Le
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Abstain
Jennie Wike
Michael
Johnson
Jennie Wike
N/A
Affirmative N/A
Negative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Matt Carden
Affirmative N/A
Rob Watson
Jeremy Lorigan
Rachel Snead
Ronald Bender
Gerry Dunbar
Lindsay Wickizer
Raj Hundal
LaTroy Brumfield
Larry Heckert
Zahid Qayyum
None
N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Karla Weaver
Affirmative N/A
Daniel Gacek
Kinte Whitehead
Cynthia Lee
Becky Webb
Oliver Burke
Duan Gavel
Mat Bunch
Carrie Dixon
Dean Schiro
Gerry Huitt
Aric Root
Allan Long
Kammy Rogers-
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
1
Bonneville Power Administration
6
3
5
5
1
3
4
5
6
1
5
1
1
6
10
Bonneville Power Administration
Bonneville Power Administration
Bonneville Power Administration
Great River Energy
Georgia Transmission Corporation
Snohomish County PUD No. 1
Public Utility District No. 1 of Snohomish County
Public Utility District No. 1 of Snohomish County
Snohomish County PUD No. 1
Public Utility District No. 1 of Snohomish County
AEP
AEP - AEP Service Corporation
Oncor Electric Delivery
AEP
ReliabilityFirst
3
Austin Energy
5
5
5
Cogentrix Energy Power Management, LLC
Seminole Electric Cooperative, Inc.
Cowlitz County PUD
Florida Reliability Coordinating Council – Member
Services Division
AEP
Lakeland Electric
Texas Reliability Entity, Inc.
Duke Energy
Duke Energy
Duke Energy
National Rural Electric Cooperative Association
Arkansas Electric Cooperative Corporation
Arkansas Electric Cooperative Corporation
Arkansas Electric Cooperative Corporation
Arkansas Electric Cooperative Corporation
Arkansas Electric Cooperative Corporation
East Kentucky Power Cooperative
East Kentucky Power Cooperative
Duke Energy
Arizona Electric Power Cooperative, Inc.
East Kentucky Power Cooperative
Wabash Valley Power Association
SunPower
Evergy
Evergy
8
3
6
10
6
5
3
4
4
1
6
3
5
1
3
1
1
5
3
5
6
1
Affirmative N/A
Holliday
Andrew Meyers
Ken Lanehome
Scott Winner
Jacalynn Bentz
Greg Davis
Holly Chaney
John Martinsen
Sam Nietfeld
John Liang
Alyssia Rhoads
Thomas Foltz
Dennis Sauriol
Lee Maurer
Byron Booker
JT Kuehne
Anthony Jablonski
W. Dwayne
Preston
Gerry Adamski
Trena Haynes
Deanna Carlson
Affirmative N/A
Abstain
N/A
Abstain
N/A
Vince Ordax
Abstain
Kent Feliks
Paul Shipps
Rachel Coyne
Greg Cecil
Dale Goodwine
Lee Schuster
Paul McCurley
Alice Wright
Jennifer Loiacano
Bruce Walkup
Mark Gann
Adrian Harris
Amber Skillern
Patrick Woods
Laura Lee
Jennifer Bray
David Meade
Susan Sosbe
Bradley Collard
Thomas ROBBEN
Allen Klassen
Affirmative N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
None
N/A
None
N/A
None
N/A
None
N/A
None
N/A
None
N/A
Negative N/A
Negative N/A
Affirmative N/A
Affirmative N/A
Negative N/A
Affirmative N/A
None
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Negative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Abstain
N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
N/A
3
5
5
6
Evergy
Evergy
FirstEnergy - FirstEnergy Corporation
FirstEnergy - FirstEnergy Corporation
Marcus Moor
Derek Brown
Robert Loy
Ann Carey
© 2021 - NERC Ver 4.3.0.0
Machine Name: ERODVSBSWB02
Affirmative N/A
Affirmative N/A
Affirmative N/A
Affirmative N/A
Exhibit I
Standard Drafting Team Roster
RELIABILITY | RESILIENCE | SECURITY
Standard Drafting Team Roster
Project 2019-02 BES Cyber System Information Access Management
Name
Entity
Chair
John Hansen
Exelon
Vice Chair
Josh Powers
Southwest Power Pool, Inc. (SPP)
Members
Victoria Bethley
Duke Energy
Andrew Camargo
San Diego Gas & Electric
Sharon Koller
American Transmission Company, LLC
Michael Lewis
Southern California Edison
Conor Martin
Arizona Public Service
Yoel Piney
PSEG
Regan Plain
Minnkota Power Cooperative
Joshua Roper
Westar and KCP&L, Evergy Companies
Clay Walker
Cleco Corporate Holdings LLC
William Vesely
Consolidated Edison Company of New York, Inc.
Colby Bellville
Cooperative Energy
Kirk Rosener
CPS Energy
Latrice Harkness – Senior
Standards Developer
North American Electric Reliability
Corporation
Marisa Hecht – Legal
North American Electric Reliability
Corporation
Lauren Perotti – Legal
North American Electric Reliability
Corporation
PMOS
Liaison(s)
NERC Staff
RELIABILITY | RESILIENCE | SECURITY
File Type | application/pdf |
Author | Phillip Yoffe |
File Modified | 2021-09-14 |
File Created | 2021-09-14 |