SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Abidance Consulting Compliance Presentation NERC Compliance Program (CIP Compliance)
Executive Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],©Copyright 2008-2009 Abidance Consulting All Rights Reserved.
©Copyright 2008 -2009 Abidance Consulting  All Rights Reserved.  CIP Program - Framework Prioritize Protective  Effectiveness  Metrics State Federal Local Program Management Office Feedback for continuous improvement Design Monitoring Audit Assessment FERC Order NERC CIP Compliance Integrated Security Business Continuity  Planning Abidance Consulting – NERC CIP Program
©Copyright 2008 Abidance Consulting  All Rights Reserved.  Design Monitoring Assessment CIP Program - Process ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Audit Feedback for continuous improvement Abidance Consulting - NERC CIP Program
Program Management - Summary ,[object Object],©Copyright 2008 Abidance Consulting  All Rights Reserved.  Understand Compliance  Requirements Execute Compliance  Monitor Compliance Report & Communicate Results - Identify all  requirements  and reporting  obligations Identify gaps  & risks - Develop plans to  close gaps and risks - Identify measurable metrics - Identify emerging  requirements - Assign internal owner - Evaluate NERC CIP  Program potential  impacts of emerging  requirements - Develop and  implement plans to  influence emerging  requirements - Coordinate internal  representation with  external resources & Regulatory agencies - Establish  mechanisms to monitor  performance  & schedule - Develop mechanism  to self-report  violations  (as required) - Incorporate  compliance into  goals & performance  reviews - Conduct periodic  assessments of  risks & improvement  Opportunities - Set tone at the top - Define specific roles  & responsibilities - Establish written  Procedures &  guidelines - Execute plans to  meet requirements,  close gaps, & risk - Identify training  needs  and develop  programs to meet  those needs Document Compliance - Compliance  procedures - Quality assurance  process - Compliance  calendar - Performance  management  system - Training programs - Issue management  plans - Department  management
Program Management - Goals & Responsibilities ©Copyright 2008 Abidance Consulting  All Rights Reserved.  ,[object Object],[object Object],[object Object],Executive Level Oversight Level Program Managers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Sponsor ,[object Object],[object Object],[object Object],Owner ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],©Copyright 2008 Abidance Consulting  All Rights Reserved.  NERC 693 Project – Scope of Work
Summary - Compliance Success ,[object Object],©Copyright 2008 Abidance Consulting  All Rights Reserved.  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],©Copyright 2008 Abidance Consulting  All Rights Reserved.  NERC CIP Security Standards
©Copyright 2008 Abidance Consulting  All Rights Reserved.  Begin Work (BW), Substantially Compliant (SC), Compliant (C), and Auditably Compliant (AC) NERC Implementation Timeline - CIP Requirement Dec 31, 2007 Dec 31, 2008 Dec 31, 2009 Dec 31, 2010 CIP-002-1 Critical Cyber Assets BW SC C AC CIP-003-1  Security Management Controls BW SC C AC CIP-004-1 Personnel & Training BW SC C AC CIP-005-1 Electronic Security BW SC C AC CIP-006-1 Physical Security BW SC C AC CIP-007-1 Systems Security Management BW SC C AC CIP-008-1 Incident Reporting and Response Planning BW SC C AC CIP-009-1 Recovery Plans BW SC C AC
©Copyright 2008 Abidance Consulting  All Rights Reserved.  CRITICAL  CYBER  ASSETS SECURITY  MANAGEMENT  CONTROLS PERSONNEL  & TRAINING ELECTRONIC  SECURITY PHYSICAL  SECURITY SYSTEMS  SECURITY  MANAGEMENT INCIDENT  REPORTING & RESPONSE  PLANNING RECOVERY  PLANS CIP-002 CIP-003 CIP-004 CIP-005 CIP-006 CIP-007 CIP-008 CIP-009 - PLAN - PHYSICAL  ACCESS  CONTROLS - MONITORING  PHYSICAL  ACCESS - LOGGING  PHYSICAL  ACCESS - ACCESS LOG  RETENTION  - MAINTENANCE & TESTING - TEST  PROCEDURES - PORTS  & SERVICES - SECURITY PATCH  MANAGEMENT - MALICIOUS  SOFTWARE  PREVENTION - ACCOUNT  MANAGEMENT - SECURITY  STATUS  MONITORING - DISPOSAL OR  REDEPLOYMENT - CYBER ASSESS - DOCUMENTATION - CYBER  SECURITY  INCIDENT  RESPONSE  PLAN DOCUMENTATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],- CRITICAL  ASSETS - CRITICAL  CYBER  ASSETS - ANNUAL  REVIEW - ANNUAL  APPROVAL -ELECTRONIC  SECURITY  PERIMETER -ELECTRONIC  ACCESS  CONTROLS -MONITORING  ELECTRONIC  ACCESS -CYBER  VULNERABILITY  ASSESSMENT DOCUMENTATION - AWARENESS TRAINING - PERSONNEL  - RISK  ASSESSMENT - ACCESS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Eight Standards / 41 Requirements NERC CIP Standards Overview
©Copyright 2008 Abidance Consulting  All Rights Reserved.  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],- CREATE SECURITY  POLICY  (PHYSICAL & CYBER) - PLAN PHYSICAL  & CYBER MONITORING - DEVELOP TEST  PROCEDURES - DEVELOP INCIDENT  RESPONSE TEAM  & DOCUMENTATION - DEVELOP RECOVERY  PLAN ,[object Object],[object Object],[object Object],[object Object],[object Object],- DRAFT REPORTING  STRUCTURE  - SELF ASSESSMENT  (CURRENT STATE) - MANAGEMENT  SPONSORSHIP - VUNERABILITY  ASSESSMENT - IT SECUIRTY  ASSESSMENT  - PHYSICAL PLANT  INSPECTIONS - SUPPLY CHAIN  IMPACT - IDENTIFY CRITICAL  INTER-DEPENDENCIES - GAP ANALYSIS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],- IDENTIFY CROSS  FUNCTIONAL TEAMS - EDUCATE TEAMS - DETERMINE ROLE  & RESPONSIBILITES - REVIEW EXISTING  DOCUMENTATION  & PROCEDURES - ESTABLISH PROJECT  FRAMEWORK  & REPORTING  STRUCTURE Abidance Consulting - Process for CIP Compliance
Abidance Consulting - High Level Overview / To-Do’s Per CIP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],©Copyright 2008 Abidance Consulting  All Rights Reserved.
Abidance Consulting - Functional Framework for CIP Access  Control Document Control Information Classification & Handling Testing & QA Asset Inventory Incident Response Systems Management Recovery Operations Network Management Vulnerability Assessment Training Physical Security Governance Risk Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Change Control ©Copyright 2008 Abidance Consulting  All Rights Reserved.
Abidance Consulting - Functional Responsibility by Team  Corporate IS PMO IT Compliance CIP Compliance Framework ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],©Copyright 2008 Abidance Consulting  All Rights Reserved.  Commercial Operations Regulatory / Legal

Weitere ähnliche Inhalte

Was ist angesagt?

Your project selected_for_audit_sip18_project_auditors
Your project selected_for_audit_sip18_project_auditorsYour project selected_for_audit_sip18_project_auditors
Your project selected_for_audit_sip18_project_auditorsJoy Gumz
 
Regulatory Considerations for use of Cloud Computing and SaaS Environments
Regulatory Considerations for use of Cloud Computing and SaaS EnvironmentsRegulatory Considerations for use of Cloud Computing and SaaS Environments
Regulatory Considerations for use of Cloud Computing and SaaS EnvironmentsInstitute of Validation Technology
 
Is it Necessary to Document the BCMS plan?
Is it Necessary to Document the BCMS plan?Is it Necessary to Document the BCMS plan?
Is it Necessary to Document the BCMS plan?PECB
 
19600 compliance management system guidelines
19600   compliance management system guidelines19600   compliance management system guidelines
19600 compliance management system guidelinesNimonik
 
MCGlobalTech Cyber Capability Statement
MCGlobalTech Cyber Capability Statement MCGlobalTech Cyber Capability Statement
MCGlobalTech Cyber Capability Statement William McBorrough
 
6 Tools for Improving IT Operations in ICS Environments
6 Tools for Improving IT Operations in ICS Environments6 Tools for Improving IT Operations in ICS Environments
6 Tools for Improving IT Operations in ICS EnvironmentsEnergySec
 
NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010Donald E. Hester
 
Understanding Industrial Hygiene: Does Your Workplace Need a Program?
Understanding Industrial Hygiene: Does Your Workplace Need a Program?Understanding Industrial Hygiene: Does Your Workplace Need a Program?
Understanding Industrial Hygiene: Does Your Workplace Need a Program?Triumvirate Environmental
 
CompTIA Security+ Training and Certification in deltails
CompTIA Security+ Training and Certification in deltailsCompTIA Security+ Training and Certification in deltails
CompTIA Security+ Training and Certification in deltailsCRAW CYBER SECURITY PVT LTD
 
Best Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and TestingBest Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and TestingAxcient
 
Use of the COBIT Security Baseline
Use of the COBIT Security BaselineUse of the COBIT Security Baseline
Use of the COBIT Security BaselineBarry Caplin
 
FDA/EC/WHO Expectations for Computer System Validation
FDA/EC/WHO Expectations for Computer System Validation FDA/EC/WHO Expectations for Computer System Validation
FDA/EC/WHO Expectations for Computer System Validation Muhammad Luqman Ikram
 
SOC Certification Runbook Template
SOC Certification Runbook TemplateSOC Certification Runbook Template
SOC Certification Runbook TemplateMark S. Mahre
 
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security ControlsSOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security ControlsMark S. Mahre
 
MCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_FinalMCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_FinalWilliam McBorrough
 
Understanding and Managing Risks in Management Systems Auditing
Understanding and Managing Risks in Management Systems AuditingUnderstanding and Managing Risks in Management Systems Auditing
Understanding and Managing Risks in Management Systems AuditingPECB
 
Process Area Site Assessments techniques for the Management
Process Area Site Assessments techniques for the ManagementProcess Area Site Assessments techniques for the Management
Process Area Site Assessments techniques for the ManagementNimonik
 
Computer System Validation
Computer System ValidationComputer System Validation
Computer System ValidationEric Silva
 

Was ist angesagt? (20)

CISA Training - Chapter 1 - 2016
CISA Training - Chapter 1 - 2016CISA Training - Chapter 1 - 2016
CISA Training - Chapter 1 - 2016
 
Your project selected_for_audit_sip18_project_auditors
Your project selected_for_audit_sip18_project_auditorsYour project selected_for_audit_sip18_project_auditors
Your project selected_for_audit_sip18_project_auditors
 
Regulatory Considerations for use of Cloud Computing and SaaS Environments
Regulatory Considerations for use of Cloud Computing and SaaS EnvironmentsRegulatory Considerations for use of Cloud Computing and SaaS Environments
Regulatory Considerations for use of Cloud Computing and SaaS Environments
 
Is it Necessary to Document the BCMS plan?
Is it Necessary to Document the BCMS plan?Is it Necessary to Document the BCMS plan?
Is it Necessary to Document the BCMS plan?
 
19600 compliance management system guidelines
19600   compliance management system guidelines19600   compliance management system guidelines
19600 compliance management system guidelines
 
MCGlobalTech Cyber Capability Statement
MCGlobalTech Cyber Capability Statement MCGlobalTech Cyber Capability Statement
MCGlobalTech Cyber Capability Statement
 
6 Tools for Improving IT Operations in ICS Environments
6 Tools for Improving IT Operations in ICS Environments6 Tools for Improving IT Operations in ICS Environments
6 Tools for Improving IT Operations in ICS Environments
 
NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010
 
Understanding Industrial Hygiene: Does Your Workplace Need a Program?
Understanding Industrial Hygiene: Does Your Workplace Need a Program?Understanding Industrial Hygiene: Does Your Workplace Need a Program?
Understanding Industrial Hygiene: Does Your Workplace Need a Program?
 
CompTIA Security+ Training and Certification in deltails
CompTIA Security+ Training and Certification in deltailsCompTIA Security+ Training and Certification in deltails
CompTIA Security+ Training and Certification in deltails
 
Best Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and TestingBest Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and Testing
 
Use of the COBIT Security Baseline
Use of the COBIT Security BaselineUse of the COBIT Security Baseline
Use of the COBIT Security Baseline
 
FDA/EC/WHO Expectations for Computer System Validation
FDA/EC/WHO Expectations for Computer System Validation FDA/EC/WHO Expectations for Computer System Validation
FDA/EC/WHO Expectations for Computer System Validation
 
SOC Certification Runbook Template
SOC Certification Runbook TemplateSOC Certification Runbook Template
SOC Certification Runbook Template
 
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security ControlsSOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
 
MCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_FinalMCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_Final
 
Cisa domain 1
Cisa domain 1 Cisa domain 1
Cisa domain 1
 
Understanding and Managing Risks in Management Systems Auditing
Understanding and Managing Risks in Management Systems AuditingUnderstanding and Managing Risks in Management Systems Auditing
Understanding and Managing Risks in Management Systems Auditing
 
Process Area Site Assessments techniques for the Management
Process Area Site Assessments techniques for the ManagementProcess Area Site Assessments techniques for the Management
Process Area Site Assessments techniques for the Management
 
Computer System Validation
Computer System ValidationComputer System Validation
Computer System Validation
 

Andere mochten auch

Practical DNP3, 60870.5 & Modern SCADA Communication System
Practical DNP3, 60870.5 & Modern SCADA Communication SystemPractical DNP3, 60870.5 & Modern SCADA Communication System
Practical DNP3, 60870.5 & Modern SCADA Communication SystemLiving Online
 
Developing io t applications in the fog a distributed dataflow approach
Developing io t applications in the fog  a distributed dataflow approachDeveloping io t applications in the fog  a distributed dataflow approach
Developing io t applications in the fog a distributed dataflow approachNam Giang
 
Internet of things applications covering industrial domain
Internet of things applications covering industrial domainInternet of things applications covering industrial domain
Internet of things applications covering industrial domainDev Bhattacharya
 
How to Build the Connectivity Architecture for the Industrial Internet of Thi...
How to Build the Connectivity Architecture for the Industrial Internet of Thi...How to Build the Connectivity Architecture for the Industrial Internet of Thi...
How to Build the Connectivity Architecture for the Industrial Internet of Thi...Real-Time Innovations (RTI)
 
Excel 2016 top features
Excel 2016 top featuresExcel 2016 top features
Excel 2016 top featuresCraig Dickson
 

Andere mochten auch (8)

#SoMeT13US
#SoMeT13US#SoMeT13US
#SoMeT13US
 
Practical DNP3, 60870.5 & Modern SCADA Communication System
Practical DNP3, 60870.5 & Modern SCADA Communication SystemPractical DNP3, 60870.5 & Modern SCADA Communication System
Practical DNP3, 60870.5 & Modern SCADA Communication System
 
Developing io t applications in the fog a distributed dataflow approach
Developing io t applications in the fog  a distributed dataflow approachDeveloping io t applications in the fog  a distributed dataflow approach
Developing io t applications in the fog a distributed dataflow approach
 
Internet of things applications covering industrial domain
Internet of things applications covering industrial domainInternet of things applications covering industrial domain
Internet of things applications covering industrial domain
 
Understanding the Internet of Things Protocols
Understanding the Internet of Things ProtocolsUnderstanding the Internet of Things Protocols
Understanding the Internet of Things Protocols
 
How to Build the Connectivity Architecture for the Industrial Internet of Thi...
How to Build the Connectivity Architecture for the Industrial Internet of Thi...How to Build the Connectivity Architecture for the Industrial Internet of Thi...
How to Build the Connectivity Architecture for the Industrial Internet of Thi...
 
Excel 2016 top features
Excel 2016 top featuresExcel 2016 top features
Excel 2016 top features
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
 

Ähnlich wie Abidance Cip Presentation

Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99 Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99 Tripwire
 
EUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIPEUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIPScott Baron
 
Explore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsExplore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsEnergySec
 
Webinar | Asset Management Health Check
Webinar | Asset Management Health CheckWebinar | Asset Management Health Check
Webinar | Asset Management Health CheckStork
 
Notional cam interview questions (update)
Notional cam interview questions (update)Notional cam interview questions (update)
Notional cam interview questions (update)Glen Alleman
 
What is the UK Cyber Essentials scheme?
What is the  UK Cyber Essentials scheme?What is the  UK Cyber Essentials scheme?
What is the UK Cyber Essentials scheme?IT Governance Ltd
 
Introduction of Secure Software Development Lifecycle
Introduction of Secure Software Development LifecycleIntroduction of Secure Software Development Lifecycle
Introduction of Secure Software Development LifecycleRishi Kant
 
Secure SDLC Framework
Secure SDLC FrameworkSecure SDLC Framework
Secure SDLC FrameworkRishi Kant
 
Business Continuity and Information Security- An Excellent Fit!
Business Continuity and Information Security- An Excellent Fit!Business Continuity and Information Security- An Excellent Fit!
Business Continuity and Information Security- An Excellent Fit!Continuity and Resilience
 
Increasing the probability of project success using Earned Value Management
Increasing the probability of project success using Earned Value ManagementIncreasing the probability of project success using Earned Value Management
Increasing the probability of project success using Earned Value ManagementGlen Alleman
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001PECB
 
Con8154 controlling for multiple erp systems with oracle advanced controls
Con8154 controlling for multiple erp systems with oracle advanced controlsCon8154 controlling for multiple erp systems with oracle advanced controls
Con8154 controlling for multiple erp systems with oracle advanced controlsOracle
 

Ähnlich wie Abidance Cip Presentation (20)

Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99 Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
 
EUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIPEUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIP
 
CAPA.pdf
CAPA.pdfCAPA.pdf
CAPA.pdf
 
Explore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsExplore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWs
 
QM & PM in TT
QM & PM in TTQM & PM in TT
QM & PM in TT
 
Webinar | Asset Management Health Check
Webinar | Asset Management Health CheckWebinar | Asset Management Health Check
Webinar | Asset Management Health Check
 
Enterprise governance risk_compliance_fcm slides
Enterprise governance risk_compliance_fcm slidesEnterprise governance risk_compliance_fcm slides
Enterprise governance risk_compliance_fcm slides
 
Notional cam interview questions (update)
Notional cam interview questions (update)Notional cam interview questions (update)
Notional cam interview questions (update)
 
What is the UK Cyber Essentials scheme?
What is the  UK Cyber Essentials scheme?What is the  UK Cyber Essentials scheme?
What is the UK Cyber Essentials scheme?
 
Introduction of Secure Software Development Lifecycle
Introduction of Secure Software Development LifecycleIntroduction of Secure Software Development Lifecycle
Introduction of Secure Software Development Lifecycle
 
Ali Ababneh-CV.pdf
Ali Ababneh-CV.pdfAli Ababneh-CV.pdf
Ali Ababneh-CV.pdf
 
Diskusi buku: Securing an IT Organization through Governance, Risk Management...
Diskusi buku: Securing an IT Organization through Governance, Risk Management...Diskusi buku: Securing an IT Organization through Governance, Risk Management...
Diskusi buku: Securing an IT Organization through Governance, Risk Management...
 
SOC for Cybersecurity Overview
SOC for Cybersecurity OverviewSOC for Cybersecurity Overview
SOC for Cybersecurity Overview
 
Secure SDLC Framework
Secure SDLC FrameworkSecure SDLC Framework
Secure SDLC Framework
 
Business Continuity and Information Security- An Excellent Fit!
Business Continuity and Information Security- An Excellent Fit!Business Continuity and Information Security- An Excellent Fit!
Business Continuity and Information Security- An Excellent Fit!
 
Increasing the probability of project success using Earned Value Management
Increasing the probability of project success using Earned Value ManagementIncreasing the probability of project success using Earned Value Management
Increasing the probability of project success using Earned Value Management
 
It12015
It12015It12015
It12015
 
Cybersecurity-Audit-A-Case-Study-for-SME.pdf
Cybersecurity-Audit-A-Case-Study-for-SME.pdfCybersecurity-Audit-A-Case-Study-for-SME.pdf
Cybersecurity-Audit-A-Case-Study-for-SME.pdf
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001
 
Con8154 controlling for multiple erp systems with oracle advanced controls
Con8154 controlling for multiple erp systems with oracle advanced controlsCon8154 controlling for multiple erp systems with oracle advanced controls
Con8154 controlling for multiple erp systems with oracle advanced controls
 

Abidance Cip Presentation

  • 1. Abidance Consulting Compliance Presentation NERC Compliance Program (CIP Compliance)
  • 2.
  • 3. ©Copyright 2008 -2009 Abidance Consulting All Rights Reserved. CIP Program - Framework Prioritize Protective Effectiveness Metrics State Federal Local Program Management Office Feedback for continuous improvement Design Monitoring Audit Assessment FERC Order NERC CIP Compliance Integrated Security Business Continuity Planning Abidance Consulting – NERC CIP Program
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. ©Copyright 2008 Abidance Consulting All Rights Reserved. Begin Work (BW), Substantially Compliant (SC), Compliant (C), and Auditably Compliant (AC) NERC Implementation Timeline - CIP Requirement Dec 31, 2007 Dec 31, 2008 Dec 31, 2009 Dec 31, 2010 CIP-002-1 Critical Cyber Assets BW SC C AC CIP-003-1 Security Management Controls BW SC C AC CIP-004-1 Personnel & Training BW SC C AC CIP-005-1 Electronic Security BW SC C AC CIP-006-1 Physical Security BW SC C AC CIP-007-1 Systems Security Management BW SC C AC CIP-008-1 Incident Reporting and Response Planning BW SC C AC CIP-009-1 Recovery Plans BW SC C AC
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.

Hinweis der Redaktion

  1. Critical (Physical) Assets: Electric generation, transmission and local distribution facilities; Natural gas wells, collection systems, gas processing plants, inter- and intra-state pipelines and storage; and Petroleum production, refining, inter- and intra-state pipelines plus over-the-road delivery systems and storage. Threat environment: Deliberate attacks caused by people (e.g. terrorists, criminals, hackers, delinquents, employees). 2. Natural attacks caused by nature (e.g., hurricanes, tornadoes, floods, wildfires, earthquake). 3. Accidental attacks caused by technological failure (e.g., pipeline rupture, chemical spills, nuclear, or biological contamination). Systemic threats caused by physical inability of energy delivery system to meet demand. 3. Policies and Procedures: Refining policies, understanding and practicing procedures are all traditional components of comprehensive energy preparedness planning. All viable energy emergency plans should be updated regularly to assure that contemporary policies are included and that all responders are acquainted with how response and mitigation systems are designed to work. 4. Physical security: Government has existing natural gas pipeline safety rules. Continuing to work with the industry to assure that these rules are followed increases energy assurance. Government has extensive rules pertaining to the reliable delivery of electricity. Energy emergency planning can include general descriptions of existing physical security measures as well as illustrative descriptions of the steps energy companies take to restore power or supply. This information will help planners respond to a disruption efficiently and assist officials with their explanation to the public. The infrastructure of the unregulated petroleum market is often understood in general terms only. However, the more a state knows about the location of pipelines, storage, loading terminals, preferred highway delivery routes and the nature and location of retail outlets, the more it can do to assist in a shortage. Knowledge of regional refining facilities and competing finished product markets are other pieces of the physical structure with potential security issues affecting vulnerability. 5. Operations Security: State program developers are unlikely to need extensive knowledge of energy company operations security. It is good to know that this security is in place and that energy companies train personnel in its implementation. The role of government regarding operational security might best be to ask questions and insist on site specific security measures. Public Utility Commissions (PUC) may include operational security requirements in a Certificate of Convenience and Necessity, or other rules, for energy entities regulated by the state. Industry can assist state emergency responders by explaining their operations security process and practice. This will help public officials to plan and respond accordingly during a shortage. States may wish to have their own information technology specialists work with the energy industry and the Federal Government to improve such systems, thus increasing energy assurance. 7. Consequence analysis means understanding downstream effects of an energy disruption. Some consequences are impacts on related energy systems; others are societal impacts such as people displaced from their homes, costs to state and local government and loss of business income. 8. Up-to-date energy emergency plans often contain a vulnerability analysis associating state energy infrastructure with demographics. Risk is also associated with operating any type of energy power or delivery system and better understanding of this will allow planners to pre-determine the magnitude of possible damage for any given geographical area of impact. Most states already prioritize energy user risk through utility outage and restoration rules or through a critical user list contained in a state petroleum set-aside. It is suggested that planners re-examine existing priorities and make them current. 9. Since a major purpose of such a plan is to organize these items in a meaningful way for efficient response, it may be prudent to keep some response information general rather than specific. It may be better to keep secure information stored outside of the plan for use by authorized individuals only. 10. Some potential positive effects of efficiency and alternatives are: Providing time for responders to repair or backup energy. Protecting critical systems that no longer have primary energy. Reducing the impact of consequential system effects.