PDF4PRO ⚡AMP

Modern search engine that looking for books and documents around the web

Example: biology

A. Introduction - NERC

CIP-010-2 Cyber Security Configuration Change management and vulnerability Assessments Page 1 of 44 A. Introduction 1. Title: Cyber Security Configuration Change management and vulnerability Assessments 2. Number: CIP-010-2 3. Purpose: To prevent and detect unauthorized changes to BES Cyber Systems by specifying configuration change management and vulnerability assessment requirements in support of protecting BES Cyber Systems from compromise that could lead to misoperation or instability in the Bulk Electric System (BES). 4. Applicability: Functional Entities: For the purpose of the requirements contained herein, the following list of functional entities will be collectively referred to as Responsible Entities.

CIP-010-2 — Cyber Security — Configuration Change Management and Vulnerability Assessments Page 3 of 44 4.2.3.4 For Distribution Providers, the systems and equipment that are not included in section 4.2.1 above. 4.2.3.5 Responsible Entities that identify that they have no BES Cyber Systems categorized as high impact or medium impact according to the CIP-002-5.1

Tags:

  Management, Vulnerability

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Spam in document Broken preview Other abuse

Transcription of A. Introduction - NERC

Related search queries