Dictionary · NERC CIP-006-6 (Physical Security of BES Cyber Systems) v6
L2 — definitions grouped by regulatory framework.
Verbs
10 senses- alert
A warning that something has changed, a threshold has been reached, or a failure has occurred.
- escort
To accompany someone or something somewhere, especially for protection, guidance, or as a mark of rank.
- utilize
To put into use or make use of.
- authorize
To give official permission or approval for an undertaking; sanction; empower.
- restrict
To confine or put a limit on; keep under control; restrain.
- define
To state or describe exactly the nature, scope, or meaning of something.
- retain
To keep in possession.
- conduct
To manage, control, or organize and carry out.
- keep
To have or maintain possession of something.
- implement
To put a plan, policy, decision, agreement, etc. into action or effect.
Nouns
54 senses- year
The time during which someone's life continues.
- two
The cardinal number that is the sum of one and one or a numeral representing this number.
- unescorted access
Not having to be escorted to gain access to a facility, area, or system.
- unauthorized access is detected
This Triggering Event takes place when a person, legitimate or unauthorized, accesses a resource that the person is not permitted to use or enters a facility or area the person is not permitted to enter
- unauthorized access
Occurs when a user, legitimate or unauthorized, accesses a resource that the user is not permitted to use.
- unauthorized physical access
Access to a building, room, site, etc that is not permitted.
- visitor access
The processes and mechanisms of ensuring visitors are allowed in specific areas and with specific permissions. Mechanisms such as guarded entries, logged entry, badges, and escorting of visitors are common.
- visitor control program
A documented listing of procedures, schedules, roles and responsibilities, and plans to be performed to identify, control, and reduce or eliminate the risks inherent to visitors.
- visitor log
A paper or electronic record of any non-employee entering a facility, construction site, structure or website.
- visitor's name
The given name of an individual who is visiting.
- alarm
A warning of danger.
- allow
Let someone have or do something.
- audit record
An individual entry in an audit log related to an audited event.
- cable
A wire or group of wires covered in a protective casing used for transmitting electricity or telecommunication signals.
- Compliance
The state of being in accordance with laws, regulations, industry codes, organizational standards, or contractual arrangements.
- Compliance Enforcement Authority
The North American Electric Reliability Corporation (NERC) or the Regional Entity in their respective roles of monitoring and enforcing compliance with the NERC Reliability Standards.
- cyber asset
Programmable electronic devices and communication networks including hardware, software and data.
- cyber incident response plan
The series of actions and processes associated with a security event associated with 'cyberspace' (i.e. the Internet, corporate networks, etc.).
- data
A subset of information in an electronic format that allows it to be retrieved or transmitted. (CNSSI-4009)
- date and time
The combination of both the date and the time that something occurred.
- day
A period of time that consists of twenty-four hours.
- detection
The identifying the existence of malicious content (by signature or heuristic).
- Electronic Security Perimeter
The logical border surrounding a network to which Critical Cyber Assets are connected and for which access is controlled.
- entrance of a visitor
This Triggering Event takes place when a visitor enters the organization's facility.
- entry
A reference to an item in a list, register, or catalog.
- entry point
An entry point is a memory address, corresponding to a point in the code of a computer program which is intended as destination of a long jump, be it internal or external.
- Evidence
Information used to establish facts.
- exit
A way out.
- individual
A human being.
- information
Any communication or representation of knowledge such as facts, data, or opinions in any medium or form, including textual, numerical, graphic, cartographic, narrative, or audiovisual.
- issue
To give or send out; distribute; supply.
- locally mounted hardware
Hardware installed inside the perimeter of a defined location. This includes but is not limited to motion sensors, electronic lock control mechanisms, and badge readers.
- log
To record an event or transaction in an organized record-keeping system, usually sequenced in the order they occurred.
- maintenance
The process of making repairs and keeping components of an asset in good condition so that the asset may remain in operating condition and last its entire useful life.
- monitor
To watch and check the progress or quality of something over a period of time; keep under regular surveillance.
- name
The word or phrase by which an individual, family, organization, or thing is known or referred to.
- ninety
The cardinal number that is the product of ten and nine.
- non-compliance
The failure to achieve performance criteria of a regulation or authority.
- non-programmable communication component
An element of a communication system that is not programmable.
- operational control
The day-to-day security procedures and mechanisms to protect operational systems. The operational controls consist of the physical, environmental and personnel security controls. These controls deal with the everyday operation of a company or organization to ensure all objectives are achieved.
- physical access
The ability of people to physically gain access to a computer system or facility.
- physical access control
A mechanism, system, or barrier that prevents unauthorized physical access to an area or a facility.
- physical security plan
A formal document that provides an overview of the security requirements for a physical security program and describes the security controls in place or planned for meeting those requirements.
- physical access control system
Physical access control enables an authority to control admission to areas and resources in a physical facility. A physical access control system may restrict access via swipe cards, Personal Identity Verification (PIV) 'Smart' cards, and biometric (i.e. fingerprint) readers. Physical access control systems are generally seen as the second layer in the security of a physical facility after fences, doors and barriers.
- Physical Access Control system maintenance and testing program
A documented listing of procedures, schedules, roles and responsibilities, and plans to be performed to ensure continued maintenance and testing of the Physical Access Control System.
- physical access log
A record of who has accessed something.
- physical security perimeter
A type of gate, door, wall, or fence system that is intended to restrict and control the physical access or egress of personnel.
- Point Of Contact
This role is focused on being a representative of a group who facilitates communications between two or more groups, organizations, etc. on certain issues. Any individual who coordinates communications between groups, organizations, etc. on certain issues that they work on should be assigned to this role.
- requirement
A formal statement of a necessary condition; something needed.
- responsible entity
Any group or even individual with an organization that has been given a particular responsibility for a particular process.
- show
To demonstrate or prove.
- security incident response plan
The steps taken during an incident. An incident response plan brings together and organizes the resources for dealing with any event that harms or threatens the security of information assets. Such an event may be a malicious code attack, an unauthorized access to information or systems, the unauthorized use of services, a denial of service attack, or a hoax.
- test
The purpose of this task is to determine if and how well something works.
- three
The Roman numeral of the cardinal number three.