Genetec Guides Utility Companies on Security System Support for NERC CIP Compliance

How to select a security system that supports compliance with NERC CIP

Genetec has published a guide for utility companies on how to select a security system that supports compliance with the Critical Infrastructure Protection plan (CIP) of the North American Electric Reliability Corporation (NERC). The 12 published NERC standards are aimed at regulating, enforcing, monitoring and managing the security of the Bulk Electric System (BES) in North America. A subset of the full guidance follows.

CIP-002-5.1a: Cybersecurity – management controls. The goal is to categorize different BES Cyber Systems based on potential impact levels to understand how to manage vulnerabilities better and protect assets while regularly maintaining and reviewing them. Look for a security system that can provide an up-to-date breakdown of all connected devices and their statuses, to simplify the review process and quickly identify any that require immediate attention.

CIP-005-6: Cybersecurity - electronic security perimeter(s). This standard aims to secure access to BES Cyber Systems by keeping critical assets within a designated electronic security perimeter and closely monitoring them in case of suspicious activity. Organizations should ensure all security systems connected to the network infrastructure require secure authentication, encrypted communications, and users that have role-based permissions to access critical assets. Make sure an activity trail report of access is available to simplify investigations/audits.

CIP-008-6: Cybersecurity – incident reporting and response planning. To comply, put in place procedures to identify, classify, and respond to cybersecurity incidents and keep complete records of the incident and management process to report to the Electricity Information Sharing and Analysis Center (E-ISAC) for forensic analysis. A centralized security system that keeps a complete log of network activity and access, as well as a full history of the asset configuration data, will simplify investigation and recovery when required. Utilities should look for technology partners that can provide emergency support in case of a catastrophic system failure or cyberattacks.

CIP-013-1: Cybersecurity – supply chain risk management. Utilities should aim to develop a plan to identify and assess risk to BES posed by vendor products or services. It is important to ensure all critical vendors that are supporting the smooth functioning of the BES have clear cybersecurity guidelines in place that will not put the BES at risk. Ensure system providers do not have access to your system by default without consent, particularly in system-to-system remote access. Here are six questions to ask vendors to manage supply chain risk better.

Featured

Featured Cybersecurity

Webinars

New Products

  • HID Signo Readers

    HID Signo Readers

    HID Global has announced its HID® Signo™ Biometric Reader 25B that is designed to capture and read fingerprints in real-world applications and conditions. 3

  • Kangaroo Home Security System

    Kangaroo Home Security System

    Kangaroo is the affordable, easy-to-install home security system designed for anyone who wants an added layer of peace of mind and protection. It has several products, ranging from the fan-favorite Doorbell Camera + Chime, to the more comprehensive Front Door Security Kit with Professional Monitoring. Regardless of the level of desired security, Kangaroo’s designed to move with consumers - wherever that next chapter may be. Motion sensors, keypads and additional features can be part of the package to any Kangaroo system in place, anytime. Additionally, Kangaroo offers scalable protection plans with a variety of benefits ranging from 24/7 professional monitoring to expanded cloud storage, coverage for damage and theft. 3

  • XS4 Original+

    XS4 Original+

    The SALTO XS4 Original+ design is based on the same proven housing and mechanical mechanisms of the XS4 Original. The XS4 Original+, however, is embedded with SALTO’s BLUEnet real-time functionality and SVN-Flex capability that enables SALTO stand-alone smart XS4 Original+ locks to update user credentials directly at the door. Compatible with the array of SALTO platform solutions including SALTO Space data-on-card, SALTO KS Keys as a Service cloud-based access solution, and SALTO’s JustIn Mobile technology for digital keys. The XS4 Original+ also includes RFID Mifare DESFire, Bluetooth LE and NFC technology functionality. 3