Dictionary · NERC CIP-003-6 (Security Management Controls) v6
L2 — definitions grouped by regulatory framework.
Verbs
16 senses- address
To deal with an issue.
- approve
To officially accept as satisfactory.
- document
To record something in detail through photography, writing, or other form.
- retain
To keep in possession.
- provide
To supply or make something available for use.
- obtain
To gain, secure, or acquire something, usually by planned action or effort.
- review
To examine or evaluate formally with the intent of making changes if necessary.
- respond
To answer or say something in reply.
- have
To experience or go through.
- change
The act or process of making or becoming different; altering.
- update
To modernize or bring up to date.
- identify
To establish, indicate, or verify who or what someone or something is.
- declare
To formally announce.
- control
To manage the operation, function, or behavior of a person or thing.
- keep
To have or maintain possession of something.
- implement
To put a new system into effect.
Nouns
56 senses- Vulnerability Assessment
The purpose of this task is to systematically examine an information system or product to determine the adequacy of security measures, identify security deficiencies, provide data from which to predict the effectiveness of proposed security measures, and confirm the adequacy of such measures after implementation.
- management authorization
Official permission or approval given by the senior executives of an organization.
- need to know
An administrative action officially declaring a particular individual requires access to specified sensitive or classified information in order to perform their assigned duties.
- name
The word or phrase by which an individual, family, organization, or thing is known or referred to.
- non-compliance information
Information regarding a failure to act in accordance with applicable standards and regulations.
- notification
The act of giving notice of or reporting something formally or officially.
- physical access
The ability of people to physically gain access to a computer system or facility.
- personnel
People who are employed by and work directly within an organization.
- physical security control
Devices that relies on the proper application of physical barriers and deterrents to control behavior. It's through the use of physical controls that an organization controls physical access to facilities and systems. They also assist in maintaining the operating environments necessary to continue information processing and delivery activities.
- reinforce
Strengthen or support, especially with additional personnel or material.
- reportable cyber incident
A Cyber Security Incident that has compromised or disrupted one or more reliability tasks of a functional entity.
- responsible entity
Any group or even individual with an organization that has been given a particular responsibility for a particular process.
- response
An action taken that addresses an incident and assesses the level of containment and control activity required.
- system security
The protection of Bulk Electronic System (BES) Cyber Systems against compromise that could lead to misoperation or instability in the Bulk Electronic System (BES).
- test
To ascertain the performance, reliability, or quality of something.
- train
The purpose of this task is to teach a person or animal a skill or behavior.
- access
The ability and means to communicate with or otherwise interact with a system, to use system resources to handle information, to gain knowledge of the information the system contains, or to control system components and functions.
- asset
In Information Technology: the combination of logical and physical components and resources and are grouped into the specific classes (information, systems, software, hardware, people).
- asset physical security
The protection of assets from theft, vandalism, natural disasters, and accidental damage.
- audit record
An individual entry in an audit log related to an audited event.
- Authentication
The verification of the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
- Bulk Electric System Cyber System
One or more Bulk Electric System (BES) Cyber Assets logically grouped by a responsible entity to perform one or more reliability tasks for a functional entity.
- CIP exceptional circumstance
A situation that involves or threatens to involve one or more of the following, or similar, conditions that impact safety or Bulk Electric System (BES) reliability: a risk of injury or death; a natural disaster; civil unrest; an imminent or existing hardware, software, or equipment failure; a Cyber Security Incident requiring emergency assistance; a response by emergency services; the enactment of a mutual assistance agreement; or an impediment of large scale workforce availability.
- CIP Senior Manager
A single senior management official with overall authority and responsibility for leading and managing implementation of and continuing adherence to the requirements within the NERC CIP Standards, CIP-002 through CIP-011.
- classification
The act of distributing things into classes or categories of the same type.
- compliance violation is detected
This Triggering Event takes place when the condition of someone or something does not conform to the documented policies and standards has been discovered.
- configuration change management
A process for managing configuration changes and variances in configurations.
- cyber system recovery plan
A step-by-step outline of the processes and procedures to be performed to bring a cyber system back to working order after an incident has occurred.
- cybersecurity plan
Formal document that provides an overview of the cybersecurity requirements for an Information Technology and industrial control system and describes the cybersecurity controls in place or planned for meeting those requirements.
- cybersecurity incident response
The process of managing and resolving cybersecurity events that disrupt the organization's operations and restoring services.
- cyber incident
Actions taken through the use of computer networks that result in an actual or potentially adverse effect on an information system and/or the information residing therein.
- cyber incident response plan
The series of actions and processes associated with a security event associated with 'cyberspace' (i.e. the Internet, corporate networks, etc.).
- cyber incident response roles and responsibilities
The functions and duties of personnel who are responsible for triaging, and resolving events regarding cybersecurity events that disrupt operations and alerting interested personnel and affected parties in conformance with pertinent standards.
- cybersecurity awareness
The extent to which individuals of an organization or those who have access to an organizations information understand their individual responsibilities regarding cybersecurity risks and the need to identify, assess, and mitigate these risks in light of the increasing volume and sophistication of cyber threats.
- cybersecurity policy
A set of criteria for the provision of security services.
- cybersecurity procedure
A detailed description of the steps necessary to implement cybersecurity in conformance with applicable standards.
- delegation
Authorizing subordinates to make certain decisions.
- delegation procedure
A detailed description of the steps necessary to assign a task or responsibility to another role in conformance with applicable standards.
- dial-up connectivity
The state of being connect through standard phone line and analog modem to access the Internet at data transfer rates (DTR) of up to 56 Kbps.
- determination
The process of making or arriving at a decision.
- Electricity Sector Information Sharing and Analysis Center
The Electricity Sector Information Sharing and Analysis Center (ES-ISAC) shares critical information with industry participants about infrastructure protection. The ES-ISAC serves the electricity sector by facilitating communications between electricity sector participants, federal governments, and other critical infrastructures. It is the job of the ES-ISAC to promptly disseminate threat indications, vulnerabilities, analyses, and warnings, together with interpretations, to help electricity sector participants take protective actions.
- Electronic Security Perimeter
The logical border surrounding a network to which Critical Cyber Assets are connected and for which access is controlled.
- electronic access control
A cyber asset that performs electronic access control of the Electronic Security Perimeter(s) or BES Cyber Systems.
- Evidence
Information used to establish facts.
- group
A term referring to a grouping of users.
- Identification
The process or act of establishing who or what someone or something is.
- incident reporting
The purpose of this task is to use hotlines and emergency contacts to alert the appropriate individuals to the occurrence of a security event.
- include
Make part of a whole or set.
- incident management
The direction and supervision of activities undertaken to restore service and operations after a disruption.
- individual
A human being.
- incident response planning
The process of creating incident response plans.
- Information Security
The measures taken so that information and information systems are protected from unauthorized access, use, disclosure, disruption, modification, or destruction.
- interactive remote access
User-initiated access by a person employing a remote access client or other remote access technology using a routable protocol. Remote access originates from a Cyber Asset that is not an Intermediate System and not located within any of the Responsible Entity’s Electronic Security Perimeter(s) or at a defined Electronic Access Point (EAP). Remote access may be initiated from: 1) Cyber Assets used or owned by the Responsible Entity, 2) Cyber Assets used or owned by employees, and 3) Cyber Assets used or owned by vendors, contractors, or consultants. Interactive remote access does not include system-to-system process communications.
- location
A particular point or position in space.
- Low Impact External Routable Connectivity
Direct user-initiated interactive access or a direct device-to-device connection to a low impact BES Cyber System(s) from a Cyber Asset outside the asset containing those low impact BES Cyber System(s) via a bi-directional routable protocol connection. Point-to-point communications between intelligent electronic devices that use routable communication protocols for time-sensitive protection or control functions between Transmission station or substation assets containing low impact BES Cyber Systems are excluded from this definition (examples of this communication include, but are not limited to, IEC 61850 GOOSE or vendor proprietary protocols).
- Low Impact Bulk Electric System Cyber System Electronic Access Point
A Cyber Asset interface that controls Low Impact External Routable Connectivity. The Cyber Asset containing the LEAP may reside at a location external to the asset or assets containing low impact Bulk Electric System (BES) Cyber Systems.