Genetec Guides Utility Companies on Security System Support for NERC CIP Compliance

How to select a security system that supports compliance with NERC CIP

Genetec has published a guide for utility companies on how to select a security system that supports compliance with the Critical Infrastructure Protection plan (CIP) of the North American Electric Reliability Corporation (NERC). The 12 published NERC standards are aimed at regulating, enforcing, monitoring and managing the security of the Bulk Electric System (BES) in North America. A subset of the full guidance follows.

CIP-002-5.1a: Cybersecurity – management controls. The goal is to categorize different BES Cyber Systems based on potential impact levels to understand how to manage vulnerabilities better and protect assets while regularly maintaining and reviewing them. Look for a security system that can provide an up-to-date breakdown of all connected devices and their statuses, to simplify the review process and quickly identify any that require immediate attention.

CIP-005-6: Cybersecurity - electronic security perimeter(s). This standard aims to secure access to BES Cyber Systems by keeping critical assets within a designated electronic security perimeter and closely monitoring them in case of suspicious activity. Organizations should ensure all security systems connected to the network infrastructure require secure authentication, encrypted communications, and users that have role-based permissions to access critical assets. Make sure an activity trail report of access is available to simplify investigations/audits.

CIP-008-6: Cybersecurity – incident reporting and response planning. To comply, put in place procedures to identify, classify, and respond to cybersecurity incidents and keep complete records of the incident and management process to report to the Electricity Information Sharing and Analysis Center (E-ISAC) for forensic analysis. A centralized security system that keeps a complete log of network activity and access, as well as a full history of the asset configuration data, will simplify investigation and recovery when required. Utilities should look for technology partners that can provide emergency support in case of a catastrophic system failure or cyberattacks.

CIP-013-1: Cybersecurity – supply chain risk management. Utilities should aim to develop a plan to identify and assess risk to BES posed by vendor products or services. It is important to ensure all critical vendors that are supporting the smooth functioning of the BES have clear cybersecurity guidelines in place that will not put the BES at risk. Ensure system providers do not have access to your system by default without consent, particularly in system-to-system remote access. Here are six questions to ask vendors to manage supply chain risk better.

Featured

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.