home/dictionary/framework/NERC CIP-003-6 (Security Management Controls) v6

Dictionary · NERC CIP-003-6 (Security Management Controls) v6

L2 — definitions grouped by regulatory framework.

Sort
Filtercosmetic affordance — live filters Phase 2
72 senses under NERC CIP-003-6 (Security Management Controls) v6

Verbs

16 senses
address

To deal with an issue.

approve

To officially accept as satisfactory.

document

To record something in detail through photography, writing, or other form.

retain

To keep in possession.

provide

To supply or make something available for use.

obtain

To gain, secure, or acquire something, usually by planned action or effort.

review

To examine or evaluate formally with the intent of making changes if necessary.

respond

To answer or say something in reply.

have

To experience or go through.

change

The act or process of making or becoming different; altering.

update

To modernize or bring up to date.

identify

To establish, indicate, or verify who or what someone or something is.

declare

To formally announce.

control

To manage the operation, function, or behavior of a person or thing.

keep

To have or maintain possession of something.

implement

To put a new system into effect.

Nouns

56 senses
Vulnerability Assessment

The purpose of this task is to systematically examine an information system or product to determine the adequacy of security measures, identify security deficiencies, provide data from which to predict the effectiveness of proposed security measures, and confirm the adequacy of such measures after implementation.

management authorization

Official permission or approval given by the senior executives of an organization.

need to know

An administrative action officially declaring a particular individual requires access to specified sensitive or classified information in order to perform their assigned duties.

name

The word or phrase by which an individual, family, organization, or thing is known or referred to.

non-compliance information

Information regarding a failure to act in accordance with applicable standards and regulations.

notification

The act of giving notice of or reporting something formally or officially.

physical access

The ability of people to physically gain access to a computer system or facility.

personnel

People who are employed by and work directly within an organization.

physical security control

Devices that relies on the proper application of physical barriers and deterrents to control behavior. It's through the use of physical controls that an organization controls physical access to facilities and systems. They also assist in maintaining the operating environments necessary to continue information processing and delivery activities.

reinforce

Strengthen or support, especially with additional personnel or material.

reportable cyber incident

A Cyber Security Incident that has compromised or disrupted one or more reliability tasks of a functional entity.

responsible entity

Any group or even individual with an organization that has been given a particular responsibility for a particular process.

response

An action taken that addresses an incident and assesses the level of containment and control activity required.

system security

The protection of Bulk Electronic System (BES) Cyber Systems against compromise that could lead to misoperation or instability in the Bulk Electronic System (BES).

test

To ascertain the performance, reliability, or quality of something.

train

The purpose of this task is to teach a person or animal a skill or behavior.

access

The ability and means to communicate with or otherwise interact with a system, to use system resources to handle information, to gain knowledge of the information the system contains, or to control system components and functions.

asset

In Information Technology: the combination of logical and physical components and resources and are grouped into the specific classes (information, systems, software, hardware, people).

asset physical security

The protection of assets from theft, vandalism, natural disasters, and accidental damage.

audit record

An individual entry in an audit log related to an audited event.

Authentication

The verification of the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.

Bulk Electric System Cyber System

One or more Bulk Electric System (BES) Cyber Assets logically grouped by a responsible entity to perform one or more reliability tasks for a functional entity.

CIP exceptional circumstance

A situation that involves or threatens to involve one or more of the following, or similar, conditions that impact safety or Bulk Electric System (BES) reliability: a risk of injury or death; a natural disaster; civil unrest; an imminent or existing hardware, software, or equipment failure; a Cyber Security Incident requiring emergency assistance; a response by emergency services; the enactment of a mutual assistance agreement; or an impediment of large scale workforce availability.

CIP Senior Manager

A single senior management official with overall authority and responsibility for leading and managing implementation of and continuing adherence to the requirements within the NERC CIP Standards, CIP-002 through CIP-011.

classification

The act of distributing things into classes or categories of the same type.

compliance violation is detected

This Triggering Event takes place when the condition of someone or something does not conform to the documented policies and standards has been discovered.

configuration change management

A process for managing configuration changes and variances in configurations.

cyber system recovery plan

A step-by-step outline of the processes and procedures to be performed to bring a cyber system back to working order after an incident has occurred.

cybersecurity plan

Formal document that provides an overview of the cybersecurity requirements for an Information Technology and industrial control system and describes the cybersecurity controls in place or planned for meeting those requirements.

cybersecurity incident response

The process of managing and resolving cybersecurity events that disrupt the organization's operations and restoring services.

cyber incident

Actions taken through the use of computer networks that result in an actual or potentially adverse effect on an information system and/or the information residing therein.

cyber incident response plan

The series of actions and processes associated with a security event associated with 'cyberspace' (i.e. the Internet, corporate networks, etc.).

cyber incident response roles and responsibilities

The functions and duties of personnel who are responsible for triaging, and resolving events regarding cybersecurity events that disrupt operations and alerting interested personnel and affected parties in conformance with pertinent standards.

cybersecurity awareness

The extent to which individuals of an organization or those who have access to an organizations information understand their individual responsibilities regarding cybersecurity risks and the need to identify, assess, and mitigate these risks in light of the increasing volume and sophistication of cyber threats.

cybersecurity policy

A set of criteria for the provision of security services.

cybersecurity procedure

A detailed description of the steps necessary to implement cybersecurity in conformance with applicable standards.

delegation

Authorizing subordinates to make certain decisions.

delegation procedure

A detailed description of the steps necessary to assign a task or responsibility to another role in conformance with applicable standards.

dial-up connectivity

The state of being connect through standard phone line and analog modem to access the Internet at data transfer rates (DTR) of up to 56 Kbps.

determination

The process of making or arriving at a decision.

Electricity Sector Information Sharing and Analysis Center

The Electricity Sector Information Sharing and Analysis Center (ES-ISAC) shares critical information with industry participants about infrastructure protection. The ES-ISAC serves the electricity sector by facilitating communications between electricity sector participants, federal governments, and other critical infrastructures. It is the job of the ES-ISAC to promptly disseminate threat indications, vulnerabilities, analyses, and warnings, together with interpretations, to help electricity sector participants take protective actions.

Electronic Security Perimeter

The logical border surrounding a network to which Critical Cyber Assets are connected and for which access is controlled.

electronic access control

A cyber asset that performs electronic access control of the Electronic Security Perimeter(s) or BES Cyber Systems.

Evidence

Information used to establish facts.

group

A term referring to a grouping of users.

Identification

The process or act of establishing who or what someone or something is.

incident reporting

The purpose of this task is to use hotlines and emergency contacts to alert the appropriate individuals to the occurrence of a security event.

include

Make part of a whole or set.

incident management

The direction and supervision of activities undertaken to restore service and operations after a disruption.

individual

A human being.

incident response planning

The process of creating incident response plans.

Information Security

The measures taken so that information and information systems are protected from unauthorized access, use, disclosure, disruption, modification, or destruction.

interactive remote access

User-initiated access by a person employing a remote access client or other remote access technology using a routable protocol. Remote access originates from a Cyber Asset that is not an Intermediate System and not located within any of the Responsible Entity’s Electronic Security Perimeter(s) or at a defined Electronic Access Point (EAP). Remote access may be initiated from: 1) Cyber Assets used or owned by the Responsible Entity, 2) Cyber Assets used or owned by employees, and 3) Cyber Assets used or owned by vendors, contractors, or consultants. Interactive remote access does not include system-to-system process communications.

location

A particular point or position in space.

Low Impact External Routable Connectivity

Direct user-initiated interactive access or a direct device-to-device connection to a low impact BES Cyber System(s) from a Cyber Asset outside the asset containing those low impact BES Cyber System(s) via a bi-directional routable protocol connection. Point-to-point communications between intelligent electronic devices that use routable communication protocols for time-sensitive protection or control functions between Transmission station or substation assets containing low impact BES Cyber Systems are excluded from this definition (examples of this communication include, but are not limited to, IEC 61850 GOOSE or vendor proprietary protocols).

Low Impact Bulk Electric System Cyber System Electronic Access Point

A Cyber Asset interface that controls Low Impact External Routable Connectivity. The Cyber Asset containing the LEAP may reside at a location external to the asset or assets containing low impact Bulk Electric System (BES) Cyber Systems.