A. Introduction - NERC
CIP-010-2 Cyber Security Configuration Change management and vulnerability Assessments Page 1 of 44 A. Introduction 1. Title: Cyber Security Configuration Change management and vulnerability Assessments 2. Number: CIP-010-2 3. Purpose: To prevent and detect unauthorized changes to BES Cyber Systems by specifying configuration change management and vulnerability assessment requirements in support of protecting BES Cyber Systems from compromise that could lead to misoperation or instability in the Bulk Electric System (BES). 4. Applicability: Functional Entities: For the purpose of the requirements contained herein, the following list of functional entities will be collectively referred to as Responsible Entities.
CIP-010-2 — Cyber Security — Configuration Change Management and Vulnerability Assessments Page 3 of 44 4.2.3.4 For Distribution Providers, the systems and equipment that are not included in section 4.2.1 above. 4.2.3.5 Responsible Entities that identify that they have no BES Cyber Systems categorized as high impact or medium impact according to the CIP-002-5.1
Download A. Introduction - NERC
Information
Domain:
Source:
Link to this page:
Please notify us if you found a problem with this document:
Related search queries
DISASTER MANAGEMENT CYCLE – A THEORETICAL, DISASTER MANAGEMENT CYCLE – A THEORETICAL APPROACH, Risk Assessment in Predictive Outage, Risk Assessment in Predictive Outage and Asset Management, NATIONAL POLICY FOR DISASTER MANAGEMENT, Management, Information Security Effectiveness Metrics: What, Elements of Flood Disaster Management, Value