Transcription of A. Introduction - NERC
{{id}} {{{paragraph}}}
CIP-010-2 Cyber Security Configuration Change management and vulnerability Assessments Page 1 of 44 A. Introduction 1. Title: Cyber Security Configuration Change management and vulnerability Assessments 2. Number: CIP-010-2 3. Purpose: To prevent and detect unauthorized changes to BES Cyber Systems by specifying configuration change management and vulnerability assessment requirements in support of protecting BES Cyber Systems from compromise that could lead to misoperation or instability in the Bulk Electric System (BES). 4. Applicability: Functional Entities: For the purpose of the requirements contained herein, the following list of functional entities will be collectively referred to as Responsible Entities.
CIP-010-2 — Cyber Security — Configuration Change Management and Vulnerability Assessments Page 3 of 44 4.2.3.4 For Distribution Providers, the systems and equipment that are not included in section 4.2.1 above. 4.2.3.5 Responsible Entities that identify that they have no BES Cyber Systems categorized as high impact or medium impact according to the CIP-002-5.1
Domain:
Source:
Link to this page:
Please notify us if you found a problem with this document:
{{id}} {{{paragraph}}}
Management, Value, Elements of Flood Disaster Management, DISASTER MANAGEMENT CYCLE – A THEORETICAL, DISASTER MANAGEMENT CYCLE – A THEORETICAL APPROACH, NATIONAL POLICY FOR DISASTER MANAGEMENT, Information Security Effectiveness Metrics: What, Risk Assessment in Predictive Outage, Risk Assessment in Predictive Outage and Asset Management