home/dictionary/framework/NERC CIP-004-6 (Personnel & Training) v6

Dictionary · NERC CIP-004-6 (Personnel & Training) v6

L2 — definitions grouped by regulatory framework.

Sort
Filtercosmetic affordance — live filters Phase 2
87 senses under NERC CIP-004-6 (Personnel & Training) v6

Verbs

15 senses
authorize

To give official permission or approval for an undertaking; sanction; empower.

retain

To keep in possession.

verify

To make certain or prove that something is true or accurate; confirm; substantiate.

implement

To put a new system into effect.

change

To make, or become different; alter.

document

To record something in detail through photography, writing, or other form.

perform

To carry out an action, task, or function.

keep

To have or maintain possession of something.

evaluate

To assess or form an idea of the nature, quality, ability, amount, number, or value of something.

conduct

To manage, control, or organize and carry out.

ensure

To make certain that something shall occur or be the case.

revoke

To officially cancel or put an end something, such as a decree, decision, promise, operation, or validity.

grant

To give what is requested; approve; allow.

require

To specify as compulsory or obligatory.

initiate

To cause or facilitate the beginning of a process or action.

Nouns

72 senses
visitor control program

A documented listing of procedures, schedules, roles and responsibilities, and plans to be performed to identify, control, and reduce or eliminate the risks inherent to visitors.

Access Control program

A documented listing of procedures, schedules, roles and responsibilities, and plans or instructions to be performed to implement access control.

access revocation program

A documented listing of procedures, schedules, roles and responsibilities, and plans to be performed to revoke access privileges.

accord

Give or grant someone (power, status, or recognition).

audit record

An individual entry in an audit log related to an audited event.

authorization record

A document or identifier which provides evidence of authorization.

responsible entity

Any group or even individual with an organization that has been given a particular responsibility for a particular process.

response

An action taken that addresses an incident and assesses the level of containment and control activity required.

Security Awareness program

The documented plan and documented activities to create well-informed interest in being free from danger or threat.

security awareness training

The process of educating personnel on critical business processes.

security practice

The actions an organization takes to initiate, implement, and maintain organizational security.

shared account

A single local account created for a group, with one user name and one password.

storage location

A place where things are held for a period of time.

storage

The action or method of keeping something for future use.

termination action

Any action which terminates or brings something to an end.

transient cyber asset

A Cyber Asset that (i) is capable of transmitting or transferring executable code, (ii) is not included in a BES Cyber System, (iii) is not a Protected Cyber Asset (PCA), and (iv) is directly connected (e.g., using Ethernet, serial, Universal Serial Bus, or wireless, including near field or Bluetooth communication) for 30 consecutive calendar days or less to a BES Cyber Asset, a network within an ESP, or a PCA. Examples include, but are not limited to, Cyber Assets used for data transfer, vulnerability assessment, maintenance, or troubleshooting purposes.

training

Organized activity aimed at imparting information and/or instructions to improve the recipient's performance or to help him or her attain a required level of knowledge or skill.

training material

Printed or recorded information used in a training program.

unescorted access

Not having to be escorted to gain access to a facility, area, or system.

user account

Information that tells a computer which files and folders to access for a specific user, which personal preferences to have in place, and what can be accessed by the user.

access

The ability, right, or permission to approach, enter, speak with someone, or use something.

criterion

A principle or standard by which something may be judged or decided.

Bulk Electric System Cyber System Information

Information about the BES Cyber System that could be used to gain unauthorized access or pose a security threat to the BES Cyber System. BES Cyber System Information does not include individual pieces of information that by themselves do not pose a threat or could not be used to allow unauthorized access to BES Cyber Systems, such as, but not limited to, device names, individual IP addresses without context, ESP names, or policy statements. Examples of BES Cyber System Information may include, but are not limited to, security procedures or security information about BES Cyber Systems, Physical Access Control Systems, and Electronic Access Control or Monitoring Systems that is not publicly available and could be used to allow unauthorized access or unauthorized distribution; collections of network addresses; and network topology of the BES Cyber System.

Bulk Electric System Cyber System

One or more Bulk Electric System (BES) Cyber Assets logically grouped by a responsible entity to perform one or more reliability tasks for a functional entity.

criminal records check

The purpose of this task is to determine if a person has been convicted of a crime.

Compliance

The state of being in accordance with laws, regulations, industry codes, organizational standards, or contractual arrangements.

completion

The action or process of completing or finishing something.

Compliance Enforcement Authority

The North American Electric Reliability Corporation (NERC) or the Regional Entity in their respective roles of monitoring and enforcing compliance with the NERC Reliability Standards.

confirm

Establish the truth or correctness of something previously believed to be the case.

contractor

A person or firm that undertakes a contract to provide materials or labor to perform a service or do a job.

show

To demonstrate or prove.

cyber asset

Programmable electronic devices and communication networks including hardware, software and data.

cyber incident

Actions taken through the use of computer networks that result in an actual or potentially adverse effect on an information system and/or the information residing therein.

cybersecurity risk

A risk to organizational operations, (including mission, functions, image, and reputation), resources, and other organizations due to the potential for unauthorized access, use, disclosure, disruption, modification, or destruction of information, Information Technology, and/or Operations Technology.

cybersecurity policy

A set of criteria for the provision of security services.

data

A subset of information in an electronic format that allows it to be retrieved or transmitted. (CNSSI-4009)

electronic access

The right or opportunity to use or retrieve something or enter a place through electronic means.

electronic access control

A cyber asset that performs electronic access control of the Electronic Security Perimeter(s) or BES Cyber Systems.

Evidence

Information used to establish facts.

handle

Managed a situation or problem; controlled.

identity

The set of attribute values (i.e., characteristics) by which an entity is recognizable and that, within the scope of an identity manager's responsibility, is sufficient to distinguish that entity from any other entity.

Identification

The process or act of establishing who or what someone or something is.

include

Make part of a whole or set.

individual account

An account which only has one individual is assigned to it.

Incident response plan

The documentation of a predetermined set of instructions or procedures to detect, respond to, and limit consequences of a malicious cyber attacks against an organization's IT systems(s).

information

Any communication or representation of knowledge such as facts, data, or opinions in any medium or form, including textual, numerical, graphic, cartographic, narrative, or audiovisual.

interactive remote access

User-initiated access by a person employing a remote access client or other remote access technology using a routable protocol. Remote access originates from a Cyber Asset that is not an Intermediate System and not located within any of the Responsible Entity’s Electronic Security Perimeter(s) or at a defined Electronic Access Point (EAP). Remote access may be initiated from: 1) Cyber Assets used or owned by the Responsible Entity, 2) Cyber Assets used or owned by employees, and 3) Cyber Assets used or owned by vendors, contractors, or consultants. Interactive remote access does not include system-to-system process communications.

interoperability

The ability of Information Technology (IT) systems to provide services to and accept services from other IT systems and to use the services so exchanged to enable them to operate effectively together.

interconnectivity

The state or quality of being connected together. The interaction of a financial institution’s internal and external systems and applications and the entities with which they are linked.

non-compliance

The failure to achieve performance criteria of a regulation or authority.

non-shared user account

A user account that is only used by one person or entity.

not be necessary

The condition of something not being necessary.

not possible

Not being able to do something.

notification

The act of giving notice of or reporting something formally or officially.

password

A string of characters that allows access to a computer, interface, or system.

physical access control

A mechanism, system, or barrier that prevents unauthorized physical access to an area or a facility.

physical security perimeter

A type of gate, door, wall, or fence system that is intended to restrict and control the physical access or egress of personnel.

personnel risk assessment

The purpose of this task is to determine the risk that personnel pose to the organization.

personnel risk assessment program

A documented listing of procedures and instructions to be performed to complete a personnel risk assessment.

process

A particular series of actions or steps to bring about a certain outcome; series of procedures.

possible

Something that can be done.

Privilege

Set of access rights permitted by the access control system.

previous residence

A location where someone was living before where that person is currently living.

prior to

This limits a Control or Mandate's secondary verb to be put into play before the event takes place.

reason

A cause, explanation, or justification for an action or event.

reassignment

Assignment to a different duty.

recovery plan

The written expression of a recovery process which consists of defining rules, processes, and disciplines to ensure that the critical business processes will continue to function if there is a failure of one or more of the information processing or telecommunications resources upon which their operations depends. The following are key elements to a disaster recovery plan: 1) Establish a planning group, 2) Perform risk assessment and audits, 3) Establish priorities for applications and networks, 4) Develop recovery strategies, 5) Prepare inventory and documentation of the plan, 6) Develop verification criteria and procedures, 5) Implement the plan.

reinforce

Strengthen and support with rewards.

removable storage media

Portable electronic storage media such as magnetic, optical, and solid-state devices, which can be inserted into and removed from a computing device, and that is used to store text, video, audio, and image information. Such devices have no independent processing capabilities. Examples include hard disks, floppy disks, zip drives, compact disks (CDs), thumb drives, pen drives, and similar USB storage devices.

residence

A person’s home; the place where someone lives.

removal

Dismissal from office.

requirement

A formal statement of a necessary condition; something needed.