agenda standards committee conference call highlights and minutes/sc … · 1. appoint candidates 1...

255
Agenda Standards Committee Conference Call October 19, 2016 | 1:00 p.m. to 4:00 p.m. Eastern Dial-in: 1-866-740-1260 | Access Code: 5153394 | Security/Passcode: 101916 Click here for: Webinar Access Introduction and Chair’s Remarks NERC Antitrust Compliance Guidelines and Public Announcement* Agenda Items 1. Review Agenda (Approve) (B. Murphy) (1 minute) 2. Consent Agenda (Approve) (B. Murphy) (1 minute) a. September 14, 2016, Standards Committee Meeting Minutes* (Approve) b. Project 2013-03 Geomagnetic Disturbance Mitigation Additional Standards Drafting Team Nomination Solicitation* (Authorize) c. Project 2016-02 Standards Drafting Team Chair* (Appoint) 3. Upcoming Standards Projects or Issues(Update) a. Three-Month Outlook* (S. Noess; B. Murphy) (10 minutes) 4. Projects Under Development (Review) a. Project Tracking Spreadsheet (B. Hampton; S. Noess) (15 minutes) b. Projected Posting Schedule (S. Noess) (5 minutes) 5. Project 2016-03 Standards Authorization Request Cyber Security Supply Chain Management* (Authorize) (M. Olson) (10 minutes) 6. Project 2016-02 Modifications to CIP Standards – TCA* (Authorize) (S. Cavote) (10 minutes) 7. Request for Interpretation of PRC-002-2 Requirement R5 for Hydro Quebec* (Reject) (S. Noess) (10 minutes) 8. Request for Interpretation of PRC-002-2 Requirement R10 for Hydro Quebec* (Reject) (S. Noess) (10 minutes) 9. Drafting Team Reference Manual* (Approve) (P. Heidrich) (5 minutes)

Upload: others

Post on 11-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Agenda Standards Committee Conference Call October 19, 2016 | 1:00 p.m. to 4:00 p.m. Eastern Dial-in: 1-866-740-1260 | Access Code: 5153394 | Security/Passcode: 101916 Click here for: Webinar Access Introduction and Chair’s Remarks NERC Antitrust Compliance Guidelines and Public Announcement* Agenda Items

1. Review Agenda ― (Approve) (B. Murphy) (1 minute)

2. Consent Agenda ― (Approve) (B. Murphy) (1 minute)

a. September 14, 2016, Standards Committee Meeting Minutes* ― (Approve)

b. Project 2013-03 Geomagnetic Disturbance Mitigation Additional Standards Drafting Team Nomination Solicitation* ― (Authorize)

c. Project 2016-02 Standards Drafting Team Chair* ― (Appoint) 3. Upcoming Standards Projects or Issues― (Update)

a. Three-Month Outlook* (S. Noess; B. Murphy) (10 minutes)

4. Projects Under Development ― (Review)

a. Project Tracking Spreadsheet (B. Hampton; S. Noess) (15 minutes)

b. Projected Posting Schedule (S. Noess) (5 minutes)

5. Project 2016-03 Standards Authorization Request Cyber Security Supply Chain Management* ― (Authorize) (M. Olson) (10 minutes)

6. Project 2016-02 Modifications to CIP Standards – TCA* ― (Authorize) (S. Cavote) (10 minutes)

7. Request for Interpretation of PRC-002-2 Requirement R5 for Hydro Quebec* ― (Reject) (S. Noess) (10 minutes)

8. Request for Interpretation of PRC-002-2 Requirement R10 for Hydro Quebec* ― (Reject) (S. Noess) (10 minutes)

9. Drafting Team Reference Manual* ― (Approve) (P. Heidrich) (5 minutes)

Page 2: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Agenda - Standards Committee Meeting | October 19, 2016 2

10. NERC Guidelines and Technical Basis Section of a Standard* ― (Information) (S. Noess) (5 minutes)

11. Subcommittee Reports and Updates

a. Project Management and Oversight Subcommittee ― (Update) (B. Hampton) (10 minutes)

b. Process Subcommittee* ― (Update) (P. Heidrich) (5 minutes)

c. Functional Model Advisory Group* ― (Endorse) (P. Heidrich) (5 minutes)

12. Legal Update

a. Upcoming Standards Filings* ― (Review) (L. Perotti) (5 minutes)

13. Informational Items ― (Enclosed)

a. Directive to Change Violation Risk Factors (VRFs) in IRO-018-1 and TOP-001-1*

b. Standards Committee Expectations*

c. 2016 Meeting Dates and Locations*

d. 2016 Standards Committee Roster*

e. Highlights of Parliamentary Procedure*

14. Adjourn

*Background materials included.

Page 3: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Antitrust Compliance Guidelines I. General It is NERC’s policy and practice to obey the antitrust laws and to avoid all conduct that unreasonably restrains competition. This policy requires the avoidance of any conduct that violates, or that might appear to violate, the antitrust laws. Among other things, the antitrust laws forbid any agreement between or among competitors regarding prices, availability of service, product design, terms of sale, division of markets, allocation of customers or any other activity that unreasonably restrains competition. It is the responsibility of every NERC participant and employee who may in any way affect NERC’s compliance with the antitrust laws to carry out this commitment. Antitrust laws are complex and subject to court interpretation that can vary over time and from one court to another. The purpose of these guidelines is to alert NERC participants and employees to potential antitrust problems and to set forth policies to be followed with respect to activities that may involve antitrust considerations. In some instances, the NERC policy contained in these guidelines is stricter than the applicable antitrust laws. Any NERC participant or employee who is uncertain about the legal ramifications of a particular course of conduct or who has doubts or concerns about whether NERC’s antitrust compliance policy is implicated in any situation should consult NERC’s General Counsel immediately. II. Prohibited Activities Participants in NERC activities (including those of its committees and subgroups) should refrain from the following when acting in their capacity as participants in NERC activities (e.g., at NERC meetings, conference calls and in informal discussions):

• Discussions involving pricing information, especially margin (profit) and internal cost information and participants’ expectations as to their future prices or internal costs.

• Discussions of a participant’s marketing strategies.

• Discussions regarding how customers and geographical areas are to be divided among competitors.

• Discussions concerning the exclusion of competitors from markets.

• Discussions concerning boycotting or group refusals to deal with competitors, vendors or suppliers.

Page 4: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

NERC Antitrust Compliance Guidelines 2

• Any other matters that do not clearly fall within these guidelines should be reviewed with NERC’s General Counsel before being discussed.

III. Activities That Are Permitted From time to time decisions or actions of NERC (including those of its committees and subgroups) may have a negative impact on particular entities and thus in that sense adversely impact competition. Decisions and actions by NERC (including its committees and subgroups) should only be undertaken for the purpose of promoting and maintaining the reliability and adequacy of the bulk power system. If you do not have a legitimate purpose consistent with this objective for discussing a matter, please refrain from discussing the matter during NERC meetings and in other NERC-related communications. You should also ensure that NERC procedures, including those set forth in NERC’s Certificate of Incorporation, Bylaws, and Rules of Procedure are followed in conducting NERC business. In addition, all discussions in NERC meetings and other NERC-related communications should be within the scope of the mandate for or assignment to the particular NERC committee or subgroup, as well as within the scope of the published agenda for the meeting. No decisions should be made nor any actions taken in NERC activities for the purpose of giving an industry participant or group of participants a competitive advantage over other participants. In particular, decisions with respect to setting, revising, or assessing compliance with NERC reliability standards should not be influenced by anti-competitive motivations. Subject to the foregoing restrictions, participants in NERC activities may discuss:

• Reliability matters relating to the bulk power system, including operation and planning matters such as establishing or revising reliability standards, special operating procedures, operating transfer capabilities, and plans for new facilities.

• Matters relating to the impact of reliability standards for the bulk power system on electricity markets, and the impact of electricity market operations on the reliability of the bulk power system.

• Proposed filings or other communications with state or federal regulatory authorities or other governmental entities.

Matters relating to the internal governance, management and operation of NERC, such as nominations for vacant committee positions, budgeting and assessments, and employment matters; and procedural matters such as planning and scheduling meetings.

Page 5: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Public Announcements

Conference call: Participants are reminded that this conference call is public. The access number was posted on the NERC website and widely distributed. Speakers on the call should keep in mind that the listening audience may include members of the press and representatives of various governmental authorities, in addition to the expected participation by industry stakeholders.

Page 6: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Meeting Minutes Standards Committee Meeting September 14, 2016 | 8:00 a.m. to 2:00 p.m. Pacific Brian Murphy, chair, called to order a duly noticed meeting of the Standards Committee (SC or the Committee) on September 14, 2016, at 8:00 a.m. Pacific, and a quorum was declared present. The SC member attendance and proxy sheet is attached hereto as Attachment 1. NERC Antitrust Compliance Guidelines and Public Announcement Committee Secretary Jordan Mallory called attention to the NERC Antitrust Compliance Guidelines and the public meeting notice. Any questions will be directed to NERC’s General Counsel, Charles Berardesco. Introduction and Chair’s Remarks B. Murphy welcomed the Committee and thanked PG&E for hosting the SC meeting at their facilities. B. Murphy welcomed the committee’s newest member Alexander Vedvik of Public Service Commission of Wisconsin and also welcomed NERC Board of Trustees (Board) member David Goulding. Steve Noess announced that Ryan Stewart and Stephen Crutchfield have transferred to another department and named the following staff changes to the Standards department, which is effective Friday, September 16, 2016:

• Soo Jin Kim, Manager of Standards Development

• Mat Bunch, Standards Developer D. Goulding congratulated the SC on how far the committee has come. D. Goulding spoke about the importance on understanding culture and that standards are a vehicle for moving people into a culture that promotes reliability. D. Goulding also expressed how training the next generation is important, and having the right culture prepares one to deal with anything on the system. Review Agenda The Committee approved the agenda by unanimous consent.

Consent Agenda The Committee approved the July 20, 2016, Standards Committee Meeting Minutes by unanimous consent.

Agenda Item 2a Standards Committee October 19, 2016

Page 7: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Minutes - Standards Committee Meeting | September 14, 2016 2

Upcoming Standards Projects or Issues Three-Month Outlook S. Noess reviewed the Three-Month Outlook. Projects Under Development Project Tracking Spreadsheet B. Hampton reviewed the Project Tracking Spreadsheet and informed the Committee that the NERC standards developers will be working with the respective Project Management and Oversight Subcommittee (PMOS) representative to update the annual project schedules accordingly. B. Hampton noted that COM-001 will be removed from the spreadsheet due to passing final ballot. Guy Zito thanked PMOS for taking the time to update the project tracking spreadsheet to make reviewing the spreadsheet easier for the Committee.

Projected Posting Schedule S. Noess reviewed the Projected Posting Schedule. Project 2016-03 Cyber Security Supply Chain Management B. Hampton made the motion to accept the action item as written; Frank McElvain seconded. The motion was as follows:

Appoint a drafting team for Project 2016-03 Cyber Security Supply Chain Management (Supply Chain standard drafting team (SDT)) to draft the Standards Authorization Request and new or revised standard(s), as follows:

1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT

2. Appoint candidate 10 and candidate 8 on the attached recommendation to serve as chair and vice-chair, respectively

B. Hampton spoke briefly in support of the motion, noting the recommended SDT covers the Regions and appropriate functional entities needed for this project. Chris Gowder made a friendly amendment to add Candidate Number Eight and expressed that there are many large entities represented and the addition of this small entity would provide value to the team. B. Hampton accepted the friendly amendment; however, F. McElvain rejected the friendly amendment. Barry Lawson, then moved to amend the motion; C. Gowder seconded. The amended was as follows: Add Candidate Number Eight to the Supply Chain SDT.

Discussion was held around the lack of biography information regarding Candidate Number Eight provided. B. Murphy brought the amended motion to a vote.

Page 8: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Minutes - Standards Committee Meeting | September 14, 2016 3

The Committee rejected the amendment with Robert Blohm abstaining and the following members voting no: S. Bodkin, L. Lee, B. Li, S. Miller, C. Norrish, W. Sipperly, B. Hampton, F. McElvain, D. Kiguel, R. Blohm, M. Harris, S. Rueckert, G. Zito, and Alexander Vedvik.

C. Yeung noted that Candidate Number four should have Southwest Power Pool (SPP) as a part of his/her Region. B. Murphy brought the original motion to a vote.

The Committee approved the motion to appoint the following SDT members with no objections or abstentions:

• Christina Alston, Georgia Transmission Corp.

• James W. Chuber, Duke Energy

• Norm Dang, IESO of Ontario

• Chris Evans, Southwest Power Pool

• Brian Gatus, Southern California Edison Company

• David Bryan Gayle, Dominion Resources Services, Inc.

• Thruston J. Griffin, CPS Energy

• JoAnn Murphy, PJM Interconnection, L.L.C.

• Skip Peeples, Salt River Project

• Corey Sellers, Southern Company

• Jason Witt, East Kentucky Power Cooperative

Project 2015-10 Single Points of Failure S. Rueckert made the motion to accept the action item as written; G. Zito seconded. The motion was as follows:

Appoint a standard drafting team (SDT) for Project 2015-10 Single Points of Failure as follows:

1. Appoint candidates 1 through 10 on the attached recommendation to form the SDT; and

2. Appoint candidate 9 and candidate 2 on the attached recommendation to serve as chair and vice chair, respectively.

Page 9: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Minutes - Standards Committee Meeting | September 14, 2016 4

S. Rueckert spoke briefly in support of the motion, noting the recommended SDT are all qualified for this project. B. Murphy brought the motion to a vote.

The Committee approved the motion with no objections or abstentions.

• Jonathan Hayes, SPP

• Delyn Kilpack, Louisville Gas Electric & Kentucky Utilities

• Chris Colson, Western Area Power Administration

• Bill Harm, PJM

• Baj Agrawal, Arizona Public Service Company

• Liqin Jiang, Duke Energy

• Rich Kowalski, ISO New England

• Prabhu Gnanam, ERCOT

• Manuela Dobrescu Dobritoiu, Hydro-Quebec

• Ruth Kloecher, ITC Holdings

Project 2016-04 Modifications to PRC-025 B. Li made the motion to accept the action item as written; B. Hampton seconded. The motion was as follows:

Authorize posting the Standards Authorization Request (SAR) for a 30-day formal comment period and authorize solicitation of nominations to form a 2016-04 Modifications to Reliability Standard PRC-025-1 SAR drafting team, which will be no less than 20 days.

B. Li spoke briefly in support of the motion. However, questioned the purpose of the North American Generator Forum endorsement. Scott Barfield-McGinnis explained that the endorsement is regarding the content of the SAR. G. Zito mentioned that the SAR supports addressing an issue that has been identified in instances of generators with long lead lines. B. Lawson inquired whether the potential changes could impact obligations under PRC-025 for other entities not affected by the issue G. Zito noted. S. Noess indicated the SAR is addressing a specific issue and does not foresee it impacting beyond those affected by the issue.

Page 10: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Minutes - Standards Committee Meeting | September 14, 2016 5

B. Murphy brought the motion to a vote.

The Committee approved the motion with no objections or abstentions. 2017-2019 Reliability Standards Development Plan and Grading G. Zito provided an overview of the grading process and explained which standards are currently eligible. S. Noess explained that the standards grading information will be used as a starting point for the Enhanced Periodic Review (EPR) teams. The first standards to move forward in 2016 for the EPR are VAR and PER. A question was asked regarding the attachment located in the Reliability Standards Development Plan (RSDP). It was explained that the RSDP is more of a summary format instead of detailed information, and the attachment contains a link to the more detailed information on the grading project. B. Murphy noted that the group is working on bringing the grading enhancements and recommended changes before the SC for approval. B. Murphy also thanked M. Bunch for all his work on the project and appreciated that he turned the documents into something the group could easily work with. Additional input was provided that the survey created a lot of work for some entities and to be mindful with the types of survey questions posed in the future. The motion was as follows:

Endorse the 2017-2019 RSDP with an additional statement added to the RSDP that the grades provided by the standing review team and industry stakeholders will be a consideration when determining the prioritization of the Enhanced Periodic Reviews.

G. Zito accepted the motion and B. Li seconded. G. Zito briefly spoke in support of the motion. B. Murphy brought the motion to a vote.

The Committee approved the motion with no objections or abstentions.

Standards Committee Charter Revision D. Kiguel made the motion; McElvain seconded. The motion was as follows:

Approve the Standards Committee (SC) Charter edits to Section 4.

Page 11: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Minutes - Standards Committee Meeting | September 14, 2016 6

The intent with these updates is to begin to more fully include Mexico in standards activities. The revised charter will be presented to the NERC Board at the same time as a series of corresponding changes to the Rules of Procedure (ROP). D. Kiguel briefly spoke to the motion, noting that it will be good to have Mexican presence at the SC meetings. Concern was raised of possible conflict of the changes with the current ROP, and it was explained that this should not become an issue because of the coordination to present both changes to the NERC Board at the same time, with recommendation that the charter changes will not become effective until the corresponding ROP changes are effective. Additionally, there was discussion questioning why the Canadian and Mexican terms were limited to one year each. It was explained that this term is specified in Appendix 3B to the ROP, Procedures for the Election of Members of the Standards Committee. It was explained that a one-year term was chosen so as to not interfere with the regular annual election of SC members. B. Murphy brought the amended motion to a vote:

The Committee approved the motion with no objections or abstentions.

Standards Committee Annual Accomplishments B. Li made the motion to accept the action item as written; G. Zito seconded. The motion was as follows: Endorse the following:

1. The Standards Committee Executive Committee (SCEC) using the following metrics and self-evaluation process to assess the SC’s 2016 accomplishments:

• Was a project schedule presented? (task 1) – yes/no

• Did the PMOS and NERC staff work together to present for SC endorsement a prioritization and timing of 2016 EPRs? (task 2) – yes/no

• With the assistance of NERC staff, the leadership of the Operating Committee, Planning Committee, and the Critical Infrastructure Protection Committee, did the SC develop a Standard metric approach for the NERC Board endorsement? (task 3) – yes/no

• Did the NERC staff and the Standards Committee Process Subcommittee consider revisions to the NERC Standard Processes Manual section 11 consistent with the Compliance Guidance Policy Paper? (task 4) – yes/no

Page 12: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Minutes - Standards Committee Meeting | September 14, 2016 7

• Did the SC conduct a review of its 2016-2018 Strategic Work Plan? (task 5) – yes/no

• Did the SCEC evaluate the need for additional reforms or enhancements to the SC Charter? (task 5) – yes/no; and

2. The SCEC plans on presenting the results of answers to the above questions to the SC in its December 2016 meeting for the SC’s endorsement.

B. Li spoke briefly in support of the motion, noting that the action page does not list those bullets as being in the 2016 strategic plan and suggested that be added. B. Murphy brought the motion to a vote.

The Committee approved the motion with no objections or abstentions. 2017 Standards Committee Meeting Dates and Locations Discussion was held weighing the pros and cons for Option 1 (hold PMOS meeting the morning of and prior to the SC meeting) and Option 2 (same as 2016 schedule). B. Li made the motion to adopt Option 1; L. Lee seconded. B. Li briefly spoke in support of his motion, noting that this will allow more time for the two subcommittees to meet separately and possibly attend the other. B. Li also requested that once the meeting dates are set to provide the Committee members with the information as soon as possible. L. Lee mentioned that she liked Option 1 so SC members have the option to attend the PMOS meetings. Clarity was provided that the March 15, 2017 and September 7, 2017, SC meeting will be held during local time zone based on the meeting location. B. Murphy brought the motion to a vote.

The Committee approved the motion with F. McElvain voting no and there were no abstentions.

Request for Interpretation of CIP-006 for Cleco Corporation S. Noess provided an overview and explained that this Request for Interpretation (RFI) focuses on compliance approaches and that there are different mechanisms to address this concern like pursuing the compliance guidance process endorsed by the NERC Board. F. McElvain moved the motion as written; G. Zito seconded. The action item was as follows: Reject the RFI of CIP-006-6 Requirement R1 submitted by Cleco

Corporation (Cleco).

Page 13: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Minutes - Standards Committee Meeting | September 14, 2016 8

Discussion was held on whether the RFI was regarding compliance or applicability. B. Murphy brought the motion to a vote.

The Committee approved the motion with no objections and B. Lawson, A. Vedvik and S. Miller abstained.

Request for Interpretation of BAL-001-2 for Orlando Utilities Commission (OUC) C. Gowder made the motion to accept the RFI of BAL-001-2; S. Bodkin seconded. The action item was as follows:

Accept the RFI of BAL-001-2 submitted by OUC.

C. Gowder spoke in support of the motion, noting that the standard needs to be reopened for calculation corrections. S. Noess explained that if the standard needs to be reopened for corrections then an RFI is not the correct avenue, as an RFI cannot change a requirement. Discussion was held regarding the process from when an RFI is submitted to be rejected/accepted and the timeliness of RFI turn around once it is submitted. B. Murphy brought the motion to a vote:

The Committee rejected the motion with the following abstaining: B. Lawson, A. Vedvik, and S. Miller.

S. Rueckert accepted the motion as written; G. Zito seconded. The action item was as follows:

Reject the Request for Interpretation (RFI) of BAL-001-2 submitted by Orlando Utilities Commission (OUC).

S. Bodkin made a friendly amendment to reject the Request for Interpretation (RFI) of BAL-001-2 submitted by OUC including a statement that a SAR may be the appropriate method in addressing the issues proposed in the RFI. S. Rueckert and G. Zito accepted the friendly amendment. Conversation was held concerning the rejection reasoning of the standard being plain on its face and the issue already being addressed in the record, and if this was the correct rationale for rejection.

Page 14: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Minutes - Standards Committee Meeting | September 14, 2016 9

B. Lawson made a friendly amendment to reject the RFI of BAL-001-2 submitted by OUC, on the basis that the issue presented in the RFI has been addressed in the record, and to include a statement in the rejection that a SAR may be the appropriate method in addressing the issues proposed in the RFI. S. Rueckert and G. Zito accepted the friendly amendment. B. Li calls the question. S. Bodkin withdraws his friendly amendment. A. Vedvik states S. Bodkin’s friendly amendment. S. Rueckert and G. Zito accepted the friendly amendment. B. Murphy brought the motion to a vote:

The Committee approved the motion with F. McElvain, S. Miller, and A. Gallo voting no and there were no abstentions.

Revisions to the NERC Standard Processes Manual Section 6 B. Li made the motion to adopt the action item as written; G. Zito seconded. The motion was as follows:

Endorse the Standards Committee Process Subcommittee’s (SCPS) proposed revisions to Section 6 Process for Conducting Field Tests of the Standard Processes Manual (SPM).

B. Li briefly spoke to the motion. It was noted that additional redlines appeared in the definition of Reliability Standard in section 2.0, and that these changes were proposed by NERC Legal staff to reflect the currently-in-effect ROP definition of Reliability Standard. It was clarified that section 6 is the only section being voted on for the purpose of this motion.

It was noted that there was extensive outreach completed with the technical committees and those committees are assisting from the technical aspect whereas the SC can focus on the process. B. Murphy brought the motion to a vote.

The Committee approved the motion with A. Gallo and S. Miller voting no, and F. McElvain, A. Vedvik, and M. Harris abstaining.

Project 2015-04 Alignment of Terms B. Hampton made the motion to accept the action item as written; F. McElvain seconded. The motion was as follows:

Page 15: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Minutes - Standards Committee Meeting | September 14, 2016 10

Endorse (1) the SCEC reviewing the Phase II Recommendations of the Alignment of Terms drafting team and the comments of the PMOS liaisons on those recommendations, and (2) after the review, presenting a proposal by the SCEC to the SC on how to proceed with the recommendations by the December 2016 SC meeting.

B. Murphy brought the motion to a vote.

The Committee approved the motion with no objections or abstentions.

Subcommittee Reports and Updates

Project Management and Oversight Subcommittee B. Hampton provided the PMOS update and explained that there will no longer be an annual calendar moving forward. B. Hampton let the Committee know that each PMOS liaison will be working with the respective NERC Standards Developers to ensure timelines for each project are accurate and up to date. Process Subcommittee P. Heidrich provided the update for SCPS by reviewing the work plan. A couple of highlights are that the group is diligently working on Sections 7 and 11 of the SPM and the SAR submittal form is moving along nicely. The goal is to have these documents submitted for endorsement fourth quarter 2016. Additionally, there were four sets of comments received for the drafting team reference manual, which will require some substantial edits to the document. Functional Model Advisory Group P. Heidrich provided the update for the Functional Model Advisory Group. A 45-day comment period concluded on September 7, 2016 for the Reliability Functional Model and Reliability Functional Model Technical Document and there will be a three day meeting (when and where) scheduled to review and respond to comments. There was discussion around if the SC needs to be more involved with reviewing the comments. It was mentioned that G. Zito and B. Li are involved and happy to cover as SC representatives. In addition, B. Murphy and M. D’Antuono will work closely with G. Zito and B. Li to propose a process for SC review of the Functional Model Advisory Group workproduct. Further discussion was held around the purpose of the Functional Model and that is to provide guidance on process, not technical content.

Legal Update L. Perotti provided an overview on past and upcoming legal filings. No discussion was held.

Page 16: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Minutes - Standards Committee Meeting | September 14, 2016 11

Informational Items No discussion was had on the informational items.

Adjourn B. Murphy thanked the Committee members and adjourned the meeting at 12:12 p.m. Pacific time.

Page 17: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Attachment I

Segment and Term Representative Organization Proxy Present (Member or

Proxy)

Chair 2016‐17

Brian Murphy Senior Attorney

NextEra Energy, Inc. Yes

Vice‐Chair 2016‐17

Michelle D’Antuono Manager, Energy

Occidental Energy Ventures, LLC

Yes

Segment 1‐2015‐16 Lou Oberski Managing Director, NERC Compliance Policy

Dominion Resources Services, Inc.

Sean Bodkin

Yes

Segment 1‐2016‐17 Laura Lee Manager of ERO Support and Event Analysis, System Operations

Duke Energy Yes

Segment 2‐2015‐16 Charles Yeung Executive Director Interregional Affairs

Southwest Power Pool Yes

Segment 2‐2016‐17 Ben Li Consultant

Independent Electric System Operator

Yes

Segment 3‐2015‐16 John Bussman

Manager, Reliability Compliance Associated Electric Cooperative, Inc.

Yes

Segment 3‐2016‐17 Scott Miller

Manager Regulatory Policy MEAG Power

Yes

Segment 4‐2015‐16 Barry Lawson Associate Director, Power Delivery and Reliability

National Rural Electric Cooperative Association

Yes

Segment 4‐2016‐17 Chris Gowder Regulatory Compliance Specialist

Florida Municipal Power Agency

Yes

Segment 5‐2015‐16 Colt Norrish

Compliance Director PacifiCorp

Yes

Segment 5‐2016‐17 Randy Crissman Vice President – Technical Compliance

New York Power Authority Wayne Sipperly

Yes

Standards Committee Attendance – September 14, 2016

Page 18: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Segment and Term Representative Organization Proxy Present (Member or

Proxy)

Segment 6‐2015‐16 Brenda Hampton Director, NERC& TREAffairs

Energy Future Holdings – Luminant Energy Company LLC

Yes

Segment 6‐2016‐17 Andrew Gallo Director, Reliability Compliance

City of Austin dba Austin Energy

Yes

Segment 7‐2015‐16 Marion Lucas APGI Chief Compliance Officer, President & Director

Alcoa Power Marketing LLC Yes

Segment 7‐2016‐17 Frank McElvain Senior Manager, Consulting

Siemens Power Technologies International

Yes

Segment 8‐2015‐16 David Kiguel Independent Yes

Segment 8‐2016‐17 Robert Blohm, Managing Director

Keen Resources Ltd. Yes

Segment 9‐2015‐16 Mark Harris Electrical Engineer

Public Utilities Commission of Nevada

Yes

Segment 9‐2016‐17 Alexander Vedvik Public Service Commission of Wisconsin

Yes

Segment 10‐2015‐16 Steven Rueckert Director of Standards

Western Electricity Coordinating Council

Yes

Segment 10‐2016‐17 Guy Zito Assistant Vice President of Standards

Northeast Power Coordinating Council

Yes

Standards Committee Attendance – September 14, 2016

Page 19: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Agenda Item 2b Standards Committee October 19, 2016

Project 2013-03 Geomagnetic Disturbance Mitigation Additional Drafting Team

Nominations Actions Authorize posting to solicit nominations for additional standard drafting team (SDT) members to respond to directives from Federal Energy Regulatory Commission (FERC) Order No. 830.

Background On September 22, 2016, FERC issued Order No. 830 approving Reliability Standard TPL-007-1 − Transmission System Planned Performance for Geomagnetic Disturbance Events. In the order, FERC directed NERC to develop certain modifications to the Standard, including:

• Modify the benchmark GMD event definition used for GMD Vulnerability Assessments;

• Make related modifications to requirements pertaining to transformer thermal impact assessments;

• Require collection of GMD-related data, and for NERC to make it publicly available; and

• Require deadlines for Corrective Action Plans (CAPs) and GMD mitigating actions. FERC established a deadline of 18 months from the effective date of Order No. 830 for completing the revisions, which is May 2018. The appointed SDT members of the Project 2013-03 SDT (roster attached) are all well qualified to continue participating in the development of revisions. However, two SDT members, Randy Horton and Ken Fleischer, are no longer with their registered entities, and their situations may not allow them to continue participating fully as SDT members. Additionally, Emanuel Bernabeu is now employed at the same entity as the SDT chair. NERC staff requests authorization to solicit nominations for additional SDT members in order to maintain a diverse and well qualified team.

Page 20: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Standard Drafting Team Roster Project 2013-03 Geomagnetic Disturbance Mitigation

Name Entity

Chair Frank Koza PJM Interconnection

Vice Chair Randy Horton Electric Power Research Institute

Members Donald Atkinson Georgia Transmission Corporation

Emanuel Bernabeu PJM Interconnection

Kenneth Fleischer Fleischer Consultants, LLC

Luis Marti Hydro One Networks

Antti Pulkkinen NASA Goddard Space Flight Center

Qun Qiu American Electric Power

NERC Staff Mark Olson – Senior Standards Developer

North American Electric Reliability Corporation

Page 21: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Agenda Item 2c Standards Committee October 19, 2016

Project 2016-02 Modifications to CIP Standards

Action Appoint Christine Hasha and David Revill as standard drafting team (SDT) co-chairs for the Project 2016-02 Modifications to CIP Standards. Background Due to a recent job change, Chair Margaret Powell has resigned as a member of the SDT effective November 30, 2016. As a result, the current vice chairs have agreed to serve as SDT co-chairs. Neither SDT leadership nor NERC staff see a need to solicit for an additional SDT member(s) at this time.

Page 22: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Three-Month Outlook

Brian Murphy, SC Chair, NextEra Energy Resources, LLCSteven Noess, Director of Standards Development, NERCStandards Committee October 6, 2016

Agenda Item 3aStandards CommitteeOctober 19, 2016

Page 23: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

RELIABILITY | ACCOUNTABILITY2

• October Project 2013-03 Geomagnetic Disturbance Mitigation

• November None

• December None

Authorize Nomination Solicitations

Page 24: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

RELIABILITY | ACCOUNTABILITY3

• October None

• November None

• December Project 2013-03 Geomagnetic Disturbance Mitigation SAR for Modifications to PRC-025-1 (Project 2016-04)

Authorize Team Appointments

Page 25: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

RELIABILITY | ACCOUNTABILITY4

• October Project 2016-03 Cyber Security Supply Chain Management

• November None

• December Project 2013-03 Geomagnetic Disturbance Mitigation

Authorize SAR Postings

Page 26: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

RELIABILITY | ACCOUNTABILITY5

• October None

• November None

• December Project 2015-10 Single Points of Failure (TPL-001-4) Project 2015-09 System Operating Limits (FAC-010, FAC-011, FAC-014) Project 2016-02 Modifications to CIP Standards (CIP-003-7(i))

Authorize Initial Postings

Page 27: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

RELIABILITY | ACCOUNTABILITY6

• September Order Approving Reliability Standards IRO-018-1 and TOP-010-1 Order No. 830 Approving Reliability Standard TPL-007-1 Notice of Proposed Rulemaking to Approve Reliability Standards BAL-005-1

and FAC-001-3

• October None

FERC Orders and NOPRs

Page 28: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

RELIABILITY | ACCOUNTABILITY7

Page 29: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Agenda Item 5 Standards Committee October 19, 2016

Project 2016-03 Cyber Security Supply Chain Management

Standards Authorization Request (SAR) Actions Authorize posting the SAR developed by the Project 2016-03 SAR and standards drafting team (SDT) to meet the directives from Federal Energy Regulatory Commission (FERC) Order No. 829 for 30-day informal comment period.

Background On July 21, 2016, FERC issued Order No. 829 directing NERC to develop a new or modified Reliability Standard that addresses supply chain risk management for industrial control system hardware, software, and computing and networking services associated with Bulk Electric System (BES) operations as follows:

"[The Commission directs] NERC to develop a forward-looking, objective-based Reliability Standard to require each affected entity to develop and implement a plan that includes security controls for supply chain management for industrial control system hardware, software, and services associated with bulk electric system operations. The new or modified Reliability Standard should address the following security objectives, [discussed in detail in the Order]: (1) software integrity and authenticity; (2) vendor remote access; (3) information system planning; and (4) vendor risk management and procurement controls."

The Commission established a filing deadline of one year from the effective date of Order No. 829, which is September 27, 2017. The SDT developed the attached SAR to specifically address the directives in Order No. 829 and is requesting to post for 30-day informal comment period as specified in the Standard Processes Manual. The SDT will review all comments and consider whether changes to the SAR are needed to address the directives in Order No. 829. The SDT anticipates completing this review prior to the Standards Committee's December meeting, at which time the SAR will be provided to the Standards Committee for acceptance.

Page 30: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Standards Authorization Request Form NERC welcomes suggestions to improve the reliability of the bulk power system through improved Reliability Standards. Please use this form to submit your request to propose a new or a revision to a NERC’s Reliability Standard.

Request to propose a new or a revision to a Reliability Standard

Title of Proposed Standard(s): Cyber Security - Supply Chain Controls

Date Submitted: September 28, 2016

SAR Requester Information

Name: Corey Sellers

Organization: Southern Company / Chair, SAR and Standards Drafting Team

Telephone: 205-257-7531 E-mail: [email protected]

SAR Type (Check as many as applicable)

New Standard

Revision to existing Standard

Withdrawal of existing Standard

Urgent Action

SAR Information

Purpose (Describe what the Standard action will achieve in support of Bulk Electric System reliability.):

The goal of this project is to establish forward-looking, objective-driven new or modified Reliability Standard(s) requiring entities to develop and implement a plan that includes security controls for supply chain management for industrial control system hardware, software, and computing and networking services that impact Bulk Electric System (BES) operations. The project will address the Federal Energy Regulatory Commission (FERC) directives contained in Order No. 829. Industry Need (What is the industry problem this request is trying to solve?):

On July 21, 2016, FERC issued Order No. 829 directing NERC to develop a forward-looking, objective-driven new or modified Reliability Standard(s) that addresses supply chain risk management for industrial control system hardware, software, and computing and networking services associated with BES operations. The supply chains for information and communications technology and industrial control systems present risks to the BES by providing potential opportunities for the introduction of

When completed, email this form to:

[email protected]

Agenda Item 5a Standards Committee October 19, 2016

Page 31: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Project 2016-03 Cyber Security Supply Chain Management September 28, 2016 2

SAR Information

cybersecurity vulnerabilities. The new or modified Reliability Standard(s) is intended to reduce the risk of a cybersecurity incident affecting the reliable operation of the bulk power system. Brief Description (Provide a paragraph that describes the scope of this Standard action.)

The standards drafting team (SDT) shall develop new or modified Critical Infrastructure Protection (CIP) Standard(s) to require applicable entities to develop and implement a plan that includes security controls for supply chain management of industrial control system hardware, software, and computing and networking services that impact BES operations as described in Order No. 829. The work will include development of an Implementation Plan, Violation Risk Factors, Violation Severity Levels, and supporting documents, within the 12-month deadline established by FERC in Order No. 829. Detailed Description (Provide a description of the proposed project with sufficient details for the standard drafting team to execute the SAR. Also provide a justification for the development or revision of the Standard, including an assessment of the reliability and market interface impacts of implementing or not implementing the Standard action.)

The SDT shall address each of the Order No. 829 directives. The Reliability Standard(s) developed or revised in the project will require applicable entities to develop and implement a plan that addresses, at a minimum, the following four specific objectives as they relate to supply chain cybersecurity of the BES (Order No. 829 at P 45):

1. Software integrity and authenticity;

2. Vendor remote access;

3. Information system planning; and

4. Vendor risk management and procurement controls.

The plan may apply different controls based on the criticality of different assets (Order No. 829 at P 44). Requirements developed by the SDT will be aimed at the protection of aspects of the supply chain that are within the control of responsible entities (Order No. 829 at P 10). The new or modified Reliability Standard will also require periodic reassessment of the applicable entity’s selected controls by the applicable entity's CIP Senior Manager at least every 15 months (Order No. 829 at P 46). In addressing Objective 1 (Software integrity and authenticity), the SDT shall develop requirement(s) for applicable entities to address verification of: (1) the identity of the software publisher for all software and patches that are intended for use on BES Cyber Systems; and (2) the integrity of the software and patches before they are installed in the BES Cyber System. (Order No. 829 at P 48) In addressing Objective 2 (Vendor remote access), the SDT shall develop requirement(s) for applicable entities to address logging and controlling all third-party (i.e., vendor) initiated remote access sessions.

Page 32: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Project 2016-03 Cyber Security Supply Chain Management September 28, 2016 3

SAR Information

The objective covers both user-initiated and machine-to-machine vendor remote access. Additionally, applicable entities' controls must provide for rapidly disabling remote access sessions to mitigate a security event, if necessary. (Order No. 829 at P 51 and 52) In addressing Objective 3 (Information system planning), the SDT shall develop requirement(s) that address the applicable entities' CIP Senior Manager (or delegate) identification and documentation of risks for consideration by the applicable entity in proposed information system planning. (Order No. 829 at P 56) In addressing Objective 4 (Vendor risk management and procurement controls), the SDT shall develop requirement(s) for applicable entities to address the provision and verification of the following security concepts, at a minimum, in future contracts for industrial control system hardware, software, and computing and networking services associated with BES operations. (Order No. 829 at P 59)

• Vendor security event notification processes;

• Vendor personnel termination notification for employees with access to remote and onsite systems;

• Product/services vulnerability disclosures, such as accounts that are able to bypass authentication or the presence of hardcoded passwords;

• Coordinated incident response activities; and

• Other related aspects of procurement that the SDT determines should be addressed for supply chain cyber security risk management as stated in Order No. 829.

The SDT may, as an alternative, propose an equally efficient and effective means to meet the objectives in Order No. 829.

Reliability Functions

The Standard will Apply to the Following Functions (Check each one that applies.)

Regional Reliability Organization

Conducts the regional activities related to planning and operations, and coordinates activities of Responsible Entities to secure the reliability of the Bulk Electric System within the region and adjacent regions.

Reliability Coordinator Responsible for the real-time operating reliability of its Reliability Coordinator Area in coordination with its neighboring Reliability Coordinator’s wide area view.

Page 33: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Project 2016-03 Cyber Security Supply Chain Management September 28, 2016 4

Reliability Functions

Balancing Authority Integrates resource plans ahead of time, and maintains load-interchange-resource balance within a Balancing Authority Area and supports Interconnection frequency in real time.

Interchange Authority Ensures communication of interchange transactions for reliability evaluation purposes and coordinates implementation of valid and balanced interchange schedules between Balancing Authority Areas.

Planning Coordinator Assesses the longer-term reliability of its Planning Coordinator Area.

Resource Planner Develops a >one year plan for the resource adequacy of its specific loads within a Planning Coordinator area.

Transmission Planner Develops a >one year plan for the reliability of the interconnected Bulk Electric System within its portion of the Planning Coordinator area.

Transmission Service Provider

Administers the transmission tariff and provides transmission services under applicable transmission service agreements (e.g., the pro forma tariff).

Transmission Owner Owns and maintains transmission facilities.

Transmission Operator

Ensures the real-time operating reliability of the transmission assets within a Transmission Operator Area.

Distribution Provider Delivers electrical energy to the End-use customer.

Generator Owner Owns and maintains generation facilities.

Generator Operator Operates generation unit(s) to provide real and Reactive Power.

Purchasing-Selling Entity

Purchases or sells energy, capacity, and necessary reliability-related services as required.

Market Operator Interface point for reliability functions with commercial functions.

Load-Serving Entity Secures energy and transmission service (and reliability-related services) to serve the End-use Customer.

Page 34: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Project 2016-03 Cyber Security Supply Chain Management September 28, 2016 5

Reliability and Market Interface Principles

Applicable Reliability Principles (Check all that apply).

1. Interconnected bulk power systems shall be planned and operated in a coordinated manner to perform reliably under normal and abnormal conditions as defined in the NERC Standards.

2. The frequency and voltage of interconnected bulk power systems shall be controlled within defined limits through the balancing of real and Reactive Power supply and demand.

3. Information necessary for the planning and operation of interconnected bulk power systems

shall be made available to those entities responsible for planning and operating the systems reliably.

4. Plans for emergency operation and system restoration of interconnected bulk power systems shall be developed, coordinated, maintained and implemented.

5. Facilities for communication, monitoring and control shall be provided, used and maintained for the reliability of interconnected bulk power systems.

6. Personnel responsible for planning and operating interconnected bulk power systems shall be trained, qualified, and have the responsibility and authority to implement actions.

7. The security of the interconnected bulk power systems shall be assessed, monitored and maintained on a wide area basis.

8. Bulk power systems shall be protected from malicious physical or cyber attacks.

Does the proposed Standard comply with all of the following Market Interface Principles?

Enter

(yes/no)

1. A Reliability Standard shall not give any market participant an unfair competitive advantage.

YES

2. A Reliability Standard shall neither mandate nor prohibit any specific market structure.

YES

3. A Reliability Standard shall not preclude market solutions to achieving compliance with that Standard.

YES

4. A Reliability Standard shall not require the public disclosure of commercially sensitive information. All market participants shall have equal opportunity to access commercially non-sensitive information that is required for compliance with Reliability Standards.

YES

Related Standards

Standard No. Explanation

CIP-002-5 Cyber Security - BES Cyber System Categorization. Specifies categorization of BES Cyber Systems and BES Cyber Assets to support appropriate protection against compromises that could lead to misoperation or instability in the BES.

Page 35: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Project 2016-03 Cyber Security Supply Chain Management September 28, 2016 6

Related Standards

CIP-003-6 Cyber Security - Security Management Controls. Establishes responsibility and accountability to protect BES Cyber Systems against compromise that could lead to misoperation or instability in BES

CIP-004-6 Cyber Security - Personnel & Training

CIP-005-5 Cyber Security - Electronic Security Perimeter(s)

CIP-007-6 Cyber Security - System Security Management

CIP-010-2 Cyber Security - Configuration Change Management and Vulnerability Assessments

CIP-011-2 Cyber Security - Information Protection

Related SARs

SAR ID Explanation

Regional Variances

Region Explanation

FRCC

MRO

NPCC

RF

SERC

SPP RE

Texas RE

WECC

Page 36: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Agenda Item 6 Standards Committee October 19, 2016

Project 2016-02 Modifications to CIP Standards Action Authorize the initial posting of (1) proposed Reliability Standard CIP-003-7(i), (2) the proposed revised definition of Transient Cyber Asset (TCA) to be incorporated into the NERC Glossary of Terms Used in NERC Reliability Standards (NERC Glossary), (3) the Violation Risk Factors (VRFs) and Violation Severity Levels (VSLs), and (4) the associated Implementation Plan for a 45-day formal comment period with initial ballots and nonbinding polls during the last 10 days of the comment period. The existing CIP-003-7 ballot pool will be used, with notice to stakeholders that anyone not currently in the pool may join during the first 30 days of the 45-day formal comment period. Background On January 21, 2016, the Federal Energy Regulatory Commission (FERC or Commission) issued Order No. 822, approving revisions to the cybersecurity Critical Infrastructure Protection (CIP) standards and directing NERC to develop certain modifications to requirements in the CIP standards and the definition of Low Impact External Routable Connectivity (LERC). Specifically, the Commission directed the following:

• Develop modifications to the CIP Reliability Standards to provide mandatory protection for transient devices used at Low Impact BES Cyber Systems based on the risk posed to bulk electric system reliability.

• Develop modifications to the CIP Reliability Standards to require responsible entities to implement controls to protect, at a minimum, communication links and sensitive bulk electric system data communicated between bulk electric system Control Centers in a manner that is appropriately tailored to address the risks posed to the bulk electric system by the assets being protected (i.e., high, medium, or low impact).

• Develop a modification to provide the needed clarity, within one year of the effective date of this Final Rule, to the LERC definition consistent with the commentary in the Guidelines and Technical Basis section of CIP-003-6.

On March 9, 2016, the NERC Standards Committee (SC) authorized the Standards Authorization Request (SAR) to be posted for a 30-day informal comment period from March 23 – April 21, 2016. Based on the comments received, the 2016-02 Modifications to CIP standards drafting team (SDT) made minor revisions to the SAR which was posted for an additional 30-day informal comment period June 1-30, 2016. The SC accepted the SAR on July 20, 2016. The SC authorized the initial posting of CIP-003-7 to address LERC on the July 2016 SC call. In response to the directive to provide mandatory protection for transient devices used at Low Impact BES Cyber Systems, the SDT is proposing additional revisions to Attachment 1 of CIP-003-6 to mitigate the risk of malware propagation to the Bulk Electric System (BES) through low impact BES Cyber Systems. Attachment 1 contains and outlines the required sections of a

Page 37: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Agenda Item 6 Standards Committee October 19, 2016

Responsible Entity’s cyber security plan(s) for its low impact BES Cyber Systems per Requirement R2. Under CIP-003-6, cyber security plan(s) are required to address four subject matter areas: (1) cyber security awareness; (2) physical security controls; (3) electronic access controls; and (4) Cyber Security Incident response. The SDT is proposing to expand Attachment 1 to include a fifth area: “Transient Cyber Asset and Removable Media Malicious Code Mitigation Plan(s)”. Requiring the Responsible Entity to develop and implement these plans will provide higher assurance against the propagation of malware from transient devices. As proposed, Section 5 of Attachment 1 of CIP-003-7(i) mandates that entities have malware protection on TCAs (both entity and vendor-managed) and for Removable Media. The SDT asserts that it is necessary to distinguish between the specific protections for: (i) TCAs managed by the Responsible Entity, (ii) TCAs managed by a party other than the Responsible Entity (e.g. vendors or contractors), and (iii) Removable Media. Additionally, the SDT revised the definition of a TCA to ensure the applicability of security controls and provide additional clarity. Posting approach/Redlines included Both CIP-003-7 (LERC) and CIP-003-7(i) (LERC and TCA) will be posted for comment and ballot concurrently. Thus, stakeholders will be asked to vote twice, once for CIP-003-7 and once for CIP-003-7(i). The primary purpose of posting and balloting concurrently is to ensure that NERC can meet its March 31, 2017 deadline for addressing the LERC directive. There is no deadline for the TCA directive. The language the SC is authorizing for posting is only the TCA language, as the SC previously authorized the initial posting of CIP-003-7 to address LERC on the July 2016 SC call. As stated in the action item, the ballot pool will be opened for stakeholders to opt in, so that those stakeholders that did not have an interest in LERC, but do for TCA, will have the ability to vote on TCA. Without this approach, there would need to be a new ballot pool formed for only CIP-007(i), which would likely be confusing and inefficient. Quality Review The Quality Review (QR) for this posting was performed October 9 - 11, 2016 by Brian Murphy (NextEra Energy Resources), Michelle D’Antuono (Occidental Energy Ventures), Margaret Powell, David Revill, and Christine Hasha (SDT leadership), Howard Gugel, Darrel Richardson, and Monica Bales (NERC Standards staff), Shamai Elstein (NERC Legal staff), and Scott Mix (NERC Compliance staff). The QR team reviewed the documents and provided feedback to the SDT. The SDT considered the feedback, made appropriate modifications to the draft documents, and approved submitting the final documents to the SC for authorization to post.

Page 38: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 1 of 53

Standard Development Timeline

This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Description of Current Draft This draft of CIP-003-7 is addressing the directive issued by the Federal Energy Regulatory Commission (Commission) in paragraph 73 of Order No. 822 which reads:

[T]he Commission concludes that a modification to the Low Impact External Routable Connectivity definition to reflect the commentary in the Guidelines and Technical Basis section of CIP-003-6 is necessary to provide needed clarity to the definition and eliminate ambiguity surrounding the term “direct” as it is used in the proposed definition. Therefore, pursuant to section 215(d)(5) of the FPA, we direct NERC to develop a modification to provide the needed clarity, within one year of the effective date of this Final Rule approving revisions to the cybersecurity Critical Infrastructure Protection (CIP) standards.

Previously, the Guidelines and Technical Basis had approximately 10 pages of explanation and numerous reference models to describe different forms of direct vs. indirect access that could be used to determine whether Low Impact External Routable Connectivity existed and thus whether a Low Impact BES Cyber System Electronic Access Point (LEAP) was required. In this revision, the term Low Impact External Routable Connectivity has been changed to Low Impact External Routable Communication (LERC) and simplified so that it is an attribute of a BES asset concerning whether there is routable protocol communications across the asset boundary without regard to 'direct vs. indirect' access that may occur. This greatly simplifies and clarifies the definition of LERC. It removes the dependency between the electronic access controls that may be in place and having those controls determine whether LERC exists or not. For those BES assets that have LERC, the standard drafting team (SDT) changed the requirement from requiring a LEAP to requiring electronic access controls to “permit only necessary electronic access to low impact BES Cyber Systems” (revised Attachment 1, Section 3.1) within the BES asset and expanded the Guidelines and Technical Basis with numerous examples of electronic access controls. Given the modified definition of LERC and the proposed modifications in Reliability CIP-003-7, there is no longer a need for the NERC Glossary term Low Impact BES Cyber System Electronic Access Point (LEAP). Consequently, NERC is proposing that term for retirement.

In summary, the CIP SDT revised CIP-003-7, Attachments 1 and 2, Sections 2 and 3 and the associated High VSL for Requirement R2. Non-substantive errata changes were also made within the standard, including changing “ES-ISAC” to “E-ISAC”.

Agenda Item 6a Standards Committee October 19, 2016

Page 39: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 2 of 53

Completed Actions Date

Standard Authorization Request (SAR) approved July 20, 2016

Draft 1 of CIP-003-7 posted for formal comment and initial ballot July 21 – September 6, 2016

Anticipated Actions Date

10-day final ballot October, 2016

NERC Board of Trustees (Board) adoption November, 2016

Page 40: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 3 of 53

A. Introduction 1. Title: Cyber Security — Security Management Controls

2. Number: CIP-003-7(i)

3. Purpose: To specify consistent and sustainable security management controls that establish responsibility and accountability to protect BES Cyber Systems against compromise that could lead to misoperation or instability in the Bulk Electric System (BES).

4. Applicability:

4.1. Functional Entities: For the purpose of the requirements contained herein, the following list of functional entities will be collectively referred to as “Responsible Entities.” For requirements in this standard where a specific functional entity or subset of functional entities are the applicable entity or entities, the functional entity or entities are specified explicitly.

4.1.1 Balancing Authority

4.1.2 Distribution Provider that owns one or more of the following Facilities, systems, and equipment for the protection or restoration of the BES:

4.1.2.1 Each underfrequency Load shedding (UFLS) or undervoltage Load shedding (UVLS) system that:

4.1.2.1.1 is part of a Load shedding program that is subject to one or more requirements in a NERC or Regional Reliability Standard; and

4.1.2.1.2 performs automatic Load shedding under a common control system owned by the Responsible Entity, without human operator initiation, of 300 MW or more.

4.1.2.2 Each Special Protection System (SPS) or Remedial Action Scheme (RAS) where the SPS or RAS is subject to one or more requirements in a NERC or Regional Reliability Standard.

4.1.2.3 Each Protection System (excluding UFLS and UVLS) that applies to Transmission where the Protection System is subject to one or more requirements in a NERC or Regional Reliability Standard.

4.1.2.4 Each Cranking Path and group of Elements meeting the initial switching requirements from a Blackstart Resource up to and including the first interconnection point of the starting station service of the next generation unit(s) to be started.

4.1.3 Generator Operator

4.1.4 Generator Owner

Page 41: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 4 of 53

4.1.5 Interchange Coordinator or Interchange Authority

4.1.6 Reliability Coordinator

4.1.7 Transmission Operator

4.1.8 Transmission Owner

4.2. Facilities: For the purpose of the requirements contained herein, the following Facilities, systems, and equipment owned by each Responsible Entity in 4.1 above are those to which these requirements are applicable. For requirements in this standard where a specific type of Facilities, system, or equipment or subset of Facilities, systems, and equipment are applicable, these are specified explicitly.

4.2.1 Distribution Provider: One or more of the following Facilities, systems and equipment owned by the Distribution Provider for the protection or restoration of the BES:

4.2.1.1 Each UFLS or UVLS System that:

4.2.1.1.1 is part of a Load shedding program that is subject to one or more requirements in a NERC or Regional Reliability Standard; and

4.2.1.1.2 performs automatic Load shedding under a common control system owned by the Responsible Entity, without human operator initiation, of 300 MW or more.

4.2.1.2 Each SPS or RAS where the SPS or RAS is subject to one or more requirements in a NERC or Regional Reliability Standard.

4.2.1.3 Each Protection System (excluding UFLS and UVLS) that applies to Transmission where the Protection System is subject to one or more requirements in a NERC or Regional Reliability Standard.

4.2.1.4 Each Cranking Path and group of Elements meeting the initial switching requirements from a Blackstart Resource up to and including the first interconnection point of the starting station service of the next generation unit(s) to be started.

4.2.2 Responsible Entities listed in 4.1 other than Distribution Providers:

All BES Facilities.

4.2.3 Exemptions: The following are exempt from Standard CIP-003-7(i):

4.2.3.1 Cyber Assets at Facilities regulated by the Canadian Nuclear Safety Commission.

Page 42: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 5 of 53

4.2.3.2 Cyber Assets associated with communication networks and data communication links between discrete Electronic Security Perimeters (ESPs).

4.2.3.3 The systems, structures, and components that are regulated by the Nuclear Regulatory Commission under a cyber security plan pursuant to 10 C.F.R. Section 73.54.

4.2.3.4 For Distribution Providers, the systems and equipment that are not included in section 4.2.1 above.

5. Effective Dates:

See Implementation Plan for CIP-003-7(i).

6. Background:

Standard CIP-003 exists as part of a suite of CIP Standards related to cyber security, which require the initial identification and categorization of BES Cyber Systems and require organizational, operational, and procedural controls to mitigate risk to BES Cyber Systems.

The term policy refers to one or a collection of written documents that are used to communicate the Responsible Entities’ management goals, objectives and expectations for how the Responsible Entity will protect its BES Cyber Systems. The use of policies also establishes an overall governance foundation for creating a culture of security and compliance with laws, regulations, and standards.

The term documented processes refers to a set of required instructions specific to the Responsible Entity and to achieve a specific outcome. This term does not imply any naming or approval structure beyond what is stated in the requirements. An entity should include as much as it believes necessary in its documented processes, but it must address the applicable requirements.

The terms program and plan are sometimes used in place of documented processes where it makes sense and is commonly understood. For example, documented processes describing a response are typically referred to as plans (i.e., incident response plans and recovery plans). Likewise, a security plan can describe an approach involving multiple procedures to address a broad subject matter.

Similarly, the term program may refer to the organization’s overall implementation of its policies, plans, and procedures involving a subject matter. Examples in the standards include the personnel risk assessment program and the personnel training program. The full implementation of the CIP Cyber Security Reliability Standards could also be referred to as a program. However, the terms program and plan do not imply any additional requirements beyond what is stated in the standards.

Responsible Entities can implement common controls that meet requirements for multiple high, medium, and low impact BES Cyber Systems. For example, a single

Page 43: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 6 of 53

cyber security awareness program could meet the requirements across multiple BES Cyber Systems.

Measures provide examples of evidence to show documentation and implementation of the requirement. These measures serve to provide guidance to entities in acceptable records of compliance and should not be viewed as an all-inclusive list.

Throughout the standards, unless otherwise stated, bulleted items in the requirements and measures are items that are linked with an “or,” and numbered items are items that are linked with an “and.”

Many references in the Applicability section use a threshold of 300 MW for UFLS and UVLS. This particular threshold of 300 MW for UVLS and UFLS was provided in Version 1 of the CIP Cyber Security Standards. The threshold remains at 300 MW since it is specifically addressing UVLS and UFLS, which are last ditch efforts to save the BES. A review of UFLS tolerances defined within Regional Reliability Standards for UFLS program requirements to date indicates that the historical value of 300 MW represents an adequate and reasonable threshold value for allowable UFLS operational tolerances.

Page 44: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 7 of 53

B. Requirements and Measures R1. Each Responsible Entity shall review and obtain CIP Senior Manager approval at least

once every 15 calendar months for one or more documented cyber security policies that collectively address the following topics: [Violation Risk Factor: Medium] [Time Horizon: Operations Planning]

1.1 For its high impact and medium impact BES Cyber Systems, if any:

1.1.1. Personnel and training (CIP-004);

1.1.2. Electronic Security Perimeters (CIP-005) including Interactive Remote Access;

1.1.3. Physical security of BES Cyber Systems (CIP-006);

1.1.4. System security management (CIP-007);

1.1.5. Incident reporting and response planning (CIP-008);

1.1.6. Recovery plans for BES Cyber Systems (CIP-009);

1.1.7. Configuration change management and vulnerability assessments (CIP-010);

1.1.8. Information protection (CIP-011); and

1.1.9. Declaring and responding to CIP Exceptional Circumstances.

1.2 For its assets identified in CIP-002 containing low impact BES Cyber Systems, if any:

1.2.1. Cyber security awareness;

1.2.2. Physical security controls;

1.2.3. Electronic access controls for Low Impact External Routable Communication (LERC) and Dial-up Connectivity; and

1.2.4. Cyber Security Incident response

M1. Examples of evidence may include, but are not limited to, policy documents; revision history, records of review, or workflow evidence from a document management system that indicate review of each cyber security policy at least once every 15 calendar months; and documented approval by the CIP Senior Manager for each cyber security policy.

R2. Each Responsible Entity with at least one asset identified in CIP-002 containing low impact BES Cyber Systems shall implement one or more documented cyber security plan(s) for its low impact BES Cyber Systems that include the sections in Attachment 1. [Violation Risk Factor: Lower] [Time Horizon: Operations Planning]

Note: An inventory, list, or discrete identification of low impact BES Cyber Systems or their BES Cyber Assets is not required. Lists of authorized users are not required.

Page 45: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 8 of 53

M2. Evidence shall include each of the documented cyber security plan(s) that collectively include each of the sections in Attachment 1 and additional evidence to demonstrate implementation of the cyber security plan(s). Additional examples of evidence per section are located in Attachment 2.

R3. Each Responsible Entity shall identify a CIP Senior Manager by name and document any change within 30 calendar days of the change. [Violation Risk Factor: Medium] [Time Horizon: Operations Planning]

M3. An example of evidence may include, but is not limited to, a dated and approved document from a high level official designating the name of the individual identified as the CIP Senior Manager.

R4. The Responsible Entity shall implement a documented process to delegate authority, unless no delegations are used. Where allowed by the CIP Standards, the CIP Senior Manager may delegate authority for specific actions to a delegate or delegates. These delegations shall be documented, including the name or title of the delegate, the specific actions delegated, and the date of the delegation; approved by the CIP Senior Manager; and updated within 30 days of any change to the delegation. Delegation changes do not need to be reinstated with a change to the delegator. [Violation Risk Factor: Lower] [Time Horizon: Operations Planning]

M4. An example of evidence may include, but is not limited to, a dated document, approved by the CIP Senior Manager, listing individuals (by name or title) who are delegated the authority to approve or authorize specifically identified items.

Page 46: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 9 of 53

C. Compliance 1. Compliance Monitoring Process

1.1. Compliance Enforcement Authority: As defined in the NERC Rules of Procedure, “Compliance Enforcement Authority” (CEA) means NERC or the Regional Entity in their respective roles of monitoring and enforcing compliance with the NERC Reliability Standards.

1.2. Evidence Retention: The following evidence retention periods identify the period of time an entity is required to retain specific evidence to demonstrate compliance. For instances where the evidence retention period specified below is shorter than the time since the last audit, the CEA may ask an entity to provide other evidence to show that it was compliant for the full time period since the last audit.

The Responsible Entity shall keep data or evidence to show compliance as identified below unless directed by its CEA to retain specific evidence for a longer period of time as part of an investigation:

• Each Responsible Entity shall retain evidence of each requirement in this standard for three calendar years.

• If a Responsible Entity is found non-compliant, it shall keep information related to the non-compliance until mitigation is complete and approved or for the time specified above, whichever is longer.

• The CEA shall keep the last audit records and all requested and submitted subsequent audit records.

1.3. Compliance Monitoring and Assessment Processes:

Compliance Audits

Self-Certifications

Spot Checking

Compliance Investigations

Self-Reporting

Complaints

1.4. Additional Compliance Information: None.

Page 47: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 10 of 53

2. Table of Compliance Elements

R # Time Horizon VRF

Violation Severity Levels (CIP-003-7)

Lower VSL Moderate VSL High VSL Severe VSL

R1 Operations Planning

Medium The Responsible Entity documented and implemented one or more cyber security policies for its high impact and medium impact BES Cyber Systems, but did not address one of the nine topics required by R1. (R1.1)

OR

The Responsible Entity did not complete its review of the one or more documented cyber security policies for its high impact and medium impact BES Cyber Systems as required by R1 within 15 calendar months but did

The Responsible Entity documented and implemented one or more cyber security policies for its high impact and medium impact BES Cyber Systems, but did not address two of the nine topics required by R1. (R1.1)

OR

The Responsible Entity did not complete its review of the one or more documented cyber security policies for its high impact and medium impact BES Cyber Systems as required by R1 within 16 calendar months but did

The Responsible Entity documented and implemented one or more cyber security policies for its high impact and medium impact BES Cyber Systems, but did not address three of the nine topics required by R1. (R1.1)

OR

The Responsible Entity did not complete its review of the one or more documented cyber security policies for its high impact and medium impact BES Cyber Systems as required by R1 within 17 calendar months but did complete this review in less than or equal to 18

The Responsible Entity documented and implemented one or more cyber security policies for its high impact and medium impact BES Cyber Systems, but did not address four or more of the nine topics required by R1. (R1.1)

OR

The Responsible Entity did not have any documented cyber security policies for its high impact and medium impact BES Cyber Systems as required by R1. (R1.1)

OR

Page 48: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 11 of 53

R # Time Horizon VRF

Violation Severity Levels (CIP-003-7)

Lower VSL Moderate VSL High VSL Severe VSL

complete this review in less than or equal to 16 calendar months of the previous review. (R1.1)

OR

The Responsible Entity did not complete its approval of the one or more documented cyber security policies for its high impact and medium impact BES Cyber Systems as required by R1 by the CIP Senior Manager within 15 calendar months but did complete this approval in less than or equal to 16 calendar months of the previous approval. (R1.1)

complete this review in less than or equal to 17 calendar months of the previous review. (R1.1)

OR

The Responsible Entity did not complete its approval of the one or more documented cyber security policies for its high impact and medium impact BES Cyber Systems as required by R1 by the CIP Senior Manager within 16 calendar months but did complete this approval in less than or equal to 17 calendar months of the previous approval. (R1.1)

calendar months of the previous review. (R1.1)

OR

The Responsible Entity did not complete its approval of the one or more documented cyber security policies for its high impact and medium impact BES Cyber Systems as required by R1 by the CIP Senior Manager within 17 calendar months but did complete this approval in less than or equal to 18 calendar months of the previous approval. (R1)

OR

The Responsible Entity documented one or more cyber security policies for its assets identified in CIP-002 containing low impact

The Responsible Entity did not complete its review of the one or more documented cyber security policies as required by R1 within 18 calendar months of the previous review. (R1)

OR

The Responsible Entity did not complete its approval of the one or more documented cyber security policies for its high impact and medium impact BES Cyber Systems as required by R1 by the CIP Senior Manager within 18 calendar months of the previous approval. (R1.1)

Page 49: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 12 of 53

R # Time Horizon VRF

Violation Severity Levels (CIP-003-7)

Lower VSL Moderate VSL High VSL Severe VSL

OR

The Responsible Entity documented one or more cyber security policies for its assets identified in CIP-002 containing low impact BES Cyber Systems, but did not address one of the four topics required by R1. (R1.2)

OR

The Responsible Entity did not complete its review of the one or more documented cyber security policies for its assets identified in CIP-002 containing low impact BES Cyber Systems as required by Requirement R1 within 15 calendar

OR

The Responsible Entity documented one or more cyber security policies for its assets identified in CIP-002 containing low impact BES Cyber Systems, but did not address two of the four topics required by R1. (R1.2)

OR

The Responsible Entity did not complete its review of the one or more documented cyber security policies for its assets identified in CIP-002 containing low impact BES Cyber Systems as required by Requirement R1 within 16 calendar

BES Cyber Systems, but did not address three of the four topics required by R1. (R1.2)

OR

The Responsible Entity did not complete its review of the one or more documented cyber security policies for its assets identified in CIP-002 containing low impact BES Cyber Systems as required by R1 within 17 calendar months but did complete this review in less than or equal to 18 calendar months of the previous review. (R1.2)

OR

The Responsible Entity did not complete its approval of the one or more documented cyber security policies for its

OR

The Responsible Entity documented one or more cyber security policies for its assets identified in CIP-002 containing low impact BES Cyber Systems, but did not address any of the four topics required by R1. (R1.2)

OR

The Responsible Entity did not have any documented cyber security policies for its assets identified in CIP-002 containing low impact BES Cyber Systems as required by R1. (R1.2)

OR

Page 50: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 13 of 53

R # Time Horizon VRF

Violation Severity Levels (CIP-003-7)

Lower VSL Moderate VSL High VSL Severe VSL

months but did complete this review in less than or equal to 16 calendar months of the previous review. (R1.2)

OR

The Responsible Entity did not complete its approval of the one or more documented cyber security policies for its assets identified in CIP-002 containing low impact BES Cyber Systems as required by Requirement R1 by the CIP Senior Manager within 15 calendar months but did complete this approval in less than or equal to 16 calendar months of

months but did complete this review in less than or equal to 17 calendar months of the previous review. (R1.2)

OR

The Responsible Entity did not complete its approval of the one or more documented cyber security policies for its assets identified in CIP-002 containing low impact BES Cyber Systems as required by Requirement R1 by the CIP Senior Manager within 16 calendar months but did complete this approval in less than or equal to 17

assets identified in CIP-002 containing low impact BES Cyber Systems as required by Requirement R1 by the CIP Senior Manager within 17 calendar months but did complete this approval in less than or equal to 18 calendar months of the previous approval. (R1.2)

The Responsible Entity did not complete its approval of the one or more documented cyber security policies for its assets identified in CIP-002 containing low impact BES Cyber Systems as required by Requirement R1 by the CIP Senior Manager within 18 calendar months of the previous approval. (R1.2)

Page 51: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 14 of 53

R # Time Horizon VRF

Violation Severity Levels (CIP-003-7)

Lower VSL Moderate VSL High VSL Severe VSL

the previous approval. (R1.2)

calendar months of the previous approval. (R1.2)

R2 Operations Planning

Lower The Responsible Entity documented its cyber security plan(s) for its assets containing low impact BES Cyber Systems, but failed to document cyber security awareness according to Requirement R2, Attachment 1, Section 1. (R2)

OR

The Responsible Entity documented its cyber security plan(s) for its assets containing low impact BES Cyber Systems, but failed to document one or more Cyber Security

The Responsible Entity documented its cyber security plan(s) for its assets containing low impact BES Cyber Systems, but failed to reinforce cyber security practices at least once every 15 calendar months according to Requirement R2, Attachment 1, Section 1. (R2)

OR

The Responsible Entity documented one or more incident response plans within its cyber security plan(s) for its assets containing

The Responsible Entity documented one or more Cyber Security Incident response plans within its cyber security plan(s) for its assets containing low impact BES Cyber Systems, but failed to test each Cyber Security Incident response plan(s) at least once every 36 calendar months according to Requirement R2, Attachment 1, Section 4. (R2)

OR

The Responsible Entity documented the determination of whether an identified Cyber Security Incident is a Reportable Cyber

The Responsible Entity failed to document and implement one or more cyber security plan(s) for its assets containing low impact BES Cyber Systems according to Requirement R2, Attachment 1. (R2).

Page 52: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 15 of 53

R # Time Horizon VRF

Violation Severity Levels (CIP-003-7)

Lower VSL Moderate VSL High VSL Severe VSL

Incident response plans according to Requirement R2, Attachment 1, Section 4. (R2)

OR

The Responsible Entity documented one or more Cyber Security Incident response plans within its cyber security plan(s) for its assets containing low impact BES Cyber Systems, but failed to update each Cyber Security Incident response plan(s) within 180 days according to Requirement R2, Attachment 1, Section 4. (R2)

OR

low impact BES Cyber Systems, but failed to include the process for identification, classification, and response to Cyber Security Incidents according to Requirement R2, Attachment 1, Section 4. (R2)

OR

The Responsible Entity documented its cyber security plan(s) for its assets containing low impact BES Cyber Systems, but failed to document the determination of whether an identified Cyber Security Incident is a Reportable Cyber Security Incident and

Security Incident, but failed to notify the Electricity Information Sharing and Analysis Center (E-ISAC) according to Requirement R2, Attachment 1, Section 4. (R2)

OR

The Responsible Entity documented electronic access controls for its assets containing low impact BES Cyber Systems, but failed to implement the electronic access controls according to Requirement R2, Attachment 1, Section 3. (R2)

OR

The Responsible Entity documented the physical access controls for its

Page 53: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 16 of 53

R # Time Horizon VRF

Violation Severity Levels (CIP-003-7)

Lower VSL Moderate VSL High VSL Severe VSL

The Responsible Entity documented its plan(s) for Transient Cyber Assets and Removable Media, but failed to manage its Transient Cyber Asset(s) according to Requirement R2, Attachment 1, Section 5.1. (R2)

OR

The Responsible Entity documented its plan(s) for Transient Cyber Assets and Removable Media, but failed to document the Removable Media sections according to Requirement R2, Attachment 1, Section 5.3. (R2)

subsequent notification to the Electricity Information Sharing and Analysis Center (E-ISAC) according to Requirement R2, Attachment 1, Section 4. (R2)

OR

The Responsible Entity documented its cyber security plan(s) for its assets containing low impact BES Cyber Systems, but failed to document physical security controls according to Requirement R2, Attachment 1, Section 2. (R2)

OR

The Responsible Entity documented

assets containing low impact BES Cyber Systems, but failed to implement the physical security controls according to Requirement R2, Attachment 1, Section 2. (R2)

OR

The Responsible Entity documented its plan(s) for Transient Cyber Assets and Removable Media, but failed to implement mitigation for the introduction of malicious code for Transient Cyber Assets managed by the Responsible Entity according to Requirement R2, Attachment 1, Section 5.1. (R2)

OR

Page 54: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 17 of 53

R # Time Horizon VRF

Violation Severity Levels (CIP-003-7)

Lower VSL Moderate VSL High VSL Severe VSL

its cyber security plan(s) for its assets containing low impact BES Cyber Systems, but failed to document electronic access controls according to Requirement R2, Attachment 1, Section 3. (R2)

OR

The Responsible Entity documented its plan(s) for Transient Cyber Assets and Removable Media plan, but failed to document mitigation for the introduction of malicious code for Transient Cyber Assets managed by the Responsible Entity according to Requirement R2,

The Responsible Entity documented its plan(s) for Transient Cyber Assets and Removable Media, but failed to implement mitigation for the introduction of malicious code for Transient Cyber Assets managed by a party other than the Responsible Entity according to Requirement R2, Attachment 1, Section 5.2. (R2)

OR

The Responsible Entity documented its plan(s) for Transient Cyber Assets and Removable Media, but failed to implement mitigation for threat of detected malicious code on the Removable Media prior to connecting

Page 55: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 18 of 53

R # Time Horizon VRF

Violation Severity Levels (CIP-003-7)

Lower VSL Moderate VSL High VSL Severe VSL

Attachment 1, Sections 5.1 and 5.3. (R2)

OR

The Responsible Entity documented its plan(s) for Transient Cyber Assets and Removable Media, but failed to document mitigation for the introduction of malicious code for Transient Cyber Assets managed by a party other than the Responsible Entity according to Requirement R2, Attachment 1, Section 5.2. (R2)

OR

The Responsible Entity documented its plan(s) for

Removable Media to a low impact BES Cyber System according to Requirement R2, Attachment 1, Section 5.3. (R2)

Page 56: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 19 of 53

R # Time Horizon VRF

Violation Severity Levels (CIP-003-7)

Lower VSL Moderate VSL High VSL Severe VSL

Transient Cyber Assets and Removable Media, but failed to implement the Removable Media section(s) according to Requirement R2, Attachment 1, Section 5.3. (R2)

R3 Operations Planning

Medium The Responsible Entity has identified by name a CIP Senior Manager, but did not document changes to the CIP Senior Manager within 30 calendar days but did document this change in less than 40 calendar days of the change. (R3)

The Responsible Entity has identified by name a CIP Senior Manager, but did not document changes to the CIP Senior Manager within 40 calendar days but did document this change in less than 50 calendar days of the change. (R3)

The Responsible Entity has identified by name a CIP Senior Manager, but did not document changes to the CIP Senior Manager within 50 calendar days but did document this change in less than 60 calendar days of the change. (R3)

The Responsible Entity has not identified, by name, a CIP Senior Manager.

OR

The Responsible Entity has identified by name a CIP Senior Manager, but did not document changes to the CIP Senior Manager within 60 calendar days of the change. (R3)

Page 57: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 20 of 53

R # Time Horizon VRF

Violation Severity Levels (CIP-003-7)

Lower VSL Moderate VSL High VSL Severe VSL

R4 Operations Planning

Lower The Responsible Entity has identified a delegate by name, title, date of delegation, and specific actions delegated, but did not document changes to the delegate within 30 calendar days but did document this change in less than 40 calendar days of the change. (R4)

The Responsible Entity has identified a delegate by name, title, date of delegation, and specific actions delegated, but did not document changes to the delegate within 40 calendar days but did document this change in less than 50 calendar days of the change. (R4)

The Responsible Entity has identified a delegate by name, title, date of delegation, and specific actions delegated, but did not document changes to the delegate within 50 calendar days but did document this change in less than 60 calendar days of the change. (R4)

The Responsible Entity has used delegated authority for actions where allowed by the CIP Standards, but does not have a process to delegate actions from the CIP Senior Manager. (R4)

OR

The Responsible Entity has identified a delegate by name, title, date of delegation, and specific actions delegated, but did not document changes to the delegate within 60 calendar days of the change. (R4)

Page 58: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 21 of 53

D. Regional Variances None.

E. Interpretations None.

F. Associated Documents None.

Page 59: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 22 of 53

Version History

Version Date Action Change Tracking

1 1/16/06 R3.2 — Change “Control Center” to “control center.” 3/24/06

2 9/30/09 Modifications to clarify the requirements and to bring the compliance elements into conformance with the latest guidelines for developing compliance elements of standards.

Removal of reasonable business judgment.

Replaced the RRO with the RE as a responsible entity.

Rewording of Effective Date.

Changed compliance monitor to Compliance Enforcement Authority.

3 12/16/09 Updated Version Number from -2 to -3

In Requirement 1.6, deleted the sentence pertaining to removing component or system from service in order to perform testing, in response to FERC order issued September 30, 2009.

3 12/16/09 Approved by the NERC Board of Trustees.

3 3/31/10 Approved by FERC.

4 1/24/11 Approved by the NERC Board of Trustees.

5 11/26/12 Adopted by the NERC Board of Trustees. Modified to coordinate with other CIP standards and to revise format to use RBS Template.

Page 60: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 23 of 53

Version Date Action Change Tracking

5 11/22/13 FERC Order issued approving CIP-003-5.

6 11/13/14 Adopted by the NERC Board of Trustees. Addressed two FERC directives from Order No. 791 related to identify, assess, and correct language and communication networks.

6 2/12/15 Adopted by the NERC Board of Trustees. Replaces the version adopted by the Board on 11/13/2014. Revised version addresses remaining directives from Order No. 791 related to transient devices and low impact BES Cyber Systems.

6 1/21/16 FERC Order issued approving CIP-003-6. Docket No. RM15-14-000

7 TBD Adopted by the NERC Board of Trustees. Revised to address FERC Order 822 directive regarding definition of LERC

Page 61: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 24 of 53

Attachment 1

Required Sections for Cyber Security Plan(s) for Assets Containing Low Impact BES Cyber Systems

Responsible Entities shall include each of the sections provided below in the cyber security plan(s) required under Requirement R2. Responsible Entities with multiple-impact BES Cyber Systems ratings can utilize policies, procedures, and processes for their high or medium impact BES Cyber Systems to fulfill the sections for the development of low impact cyber security plan(s). Each Responsible Entity can develop a cyber security plan(s) either by individual asset or groups of assets. Section 1. Cyber Security Awareness: Each Responsible Entity shall reinforce, at least once

every 15 calendar months, cyber security practices (which may include associated physical security practices).

Section 2. Physical Security Controls: Each Responsible Entity shall control physical access, based on need as determined by the Responsible Entity, to (1) the asset or the locations of the low impact BES Cyber Systems within the asset, and (2) the Cyber Asset(s), as specified by the Responsible Entity, that provide electronic access control(s) implemented for Section 3.1, if any.

Section 3. Electronic Access Controls: Each Responsible Entity shall:

3.1 Implement electronic access control(s) for LERC, if any, to permit only necessary electronic access to low impact BES Cyber System(s).

3.2 Implement authentication for all Dial-up Connectivity, if any, that provides access to low impact BES Cyber Systems, per Cyber Asset capability.

Section 4. Cyber Security Incident Response: Each Responsible Entity shall have one or more Cyber Security Incident response plan(s), either by asset or group of assets, which shall include:

4.1 Identification, classification, and response to Cyber Security Incidents;

4.2 Determination of whether an identified Cyber Security Incident is a Reportable Cyber Security Incident and subsequent notification to the Electricity Information Sharing and Analysis Center (E-ISAC), unless prohibited by law;

4.3 Identification of the roles and responsibilities for Cyber Security Incident response by groups or individuals;

4.4 Incident handling for Cyber Security Incidents;

4.5 Testing the Cyber Security Incident response plan(s) at least once every 36 calendar months by: (1) responding to an actual Reportable Cyber Security Incident; (2) using a drill or tabletop exercise of a Reportable Cyber Security

Page 62: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 25 of 53

Incident; or (3) using an operational exercise of a Reportable Cyber Security Incident; and

4.6 Updating the Cyber Security Incident response plan(s), if needed, within 180 calendar days after completion of a Cyber Security Incident response plan(s) test or actual Reportable Cyber Security Incident.

Rationale for Section 5 of Attachment 1 (Requirement R2):

Requirement R2 mandates that entities develop and implement one or more cyber security plan(s) to meet specific security control objectives for assets containing low impact BES Cyber System(s). In Paragraph 32 of FERC Order No. 822, the Commission directed NERC to “…provide mandatory protection for transient devices used at Low Impact BES Cyber Systems based on the risk posed to bulk electric system reliability.” Transient devices are potential vehicles for introducing malicious code into a facility and subsequently into low impact BES Cyber Systems. Section 5 of Attachment 1 is intended to mitigate the risk of malware propagation to the BES through low impact BES Cyber Systems by requiring entities to develop and implement one or more Transient Cyber Asset and Removable Media Malicious Code Mitigation plan(s). The cyber security plan(s) along with the cyber security policies required under Requirement R1, Part 1.2, provide a framework for operational, procedural, and technical safeguards for low impact BES Cyber Systems.

Section 5. Transient Cyber Asset and Removable Media Malicious Code Mitigation Plan(s): Each Responsible Entity shall implement one or more plan(s) to achieve the objective of mitigating the introduction of malicious code to low impact BES Cyber Systems through the use of Transient Cyber Assets or Removable Media, which shall include:

5.1 For Transient Cyber Asset(s) managed by the Responsible Entity, if any, use of one or a combination of the following methods in an ongoing or on-demand manner (per Transient Cyber Asset capability):

• Antivirus software, including manual or managed updates of signatures or patterns;

• Application whitelisting; or

• Other method(s) to mitigate the introduction of malicious code.

5.2 For Transient Cyber Asset(s) managed by a party other than the Responsible Entity, if any, use of one or a combination of the following methods prior to connecting the Transient Cyber Asset to a low impact BES Cyber System (per Transient Cyber Asset capability):

• Review of antivirus update level;

Page 63: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 26 of 53

• Review of antivirus update process used by the party;

• Review of application whitelisting used by the party;

• Review use of live operating system and software executable only from read-only media;

• Review of system hardening used by the party; or

• Other method(s) to mitigate the introduction of malicious code.

5.3 For Removable Media, perform each of the following:

5.3.1 Use of method(s) to detect malicious code on Removable Media using a Cyber Asset other than a BES Cyber System; and

5.3.2 Mitigation of the threat of detected malicious code on the Removable Media prior to connecting Removable Media to a low impact BES Cyber System.

Page 64: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 27 of 53

Attachment 2

Examples of Evidence for Cyber Security Plan(s) for Assets Containing Low Impact BES Cyber Systems

Section 1. Cyber Security Awareness: An example of evidence for Section 1 may include, but is not limited to, documentation that the reinforcement of cyber security practices occurred at least once every 15 calendar months. The evidence could be documentation through one or more of the following methods:

• Direct communications (for example, emails, memos, or computer-based training);

• Indirect communications (for example, posters, intranet, or brochures); or

• Management support and reinforcement (for example, presentations or meetings).

Section 2. Physical Security Controls: Examples of evidence for Section 2 may include, but are not limited to:

• Documentation of the selected access control(s) (e.g., card key, locks, perimeter controls), monitoring controls (e.g., alarm systems, human observation), or other operational, procedural, or technical physical security controls that control physical access to both:

a. The asset, if any, or the locations of the low impact BES Cyber Systems within the asset; and

b. The Cyber Asset specified by the Responsible Entity that provides electronic access controls implemented for Section 3.1, if any.

Section 3. Electronic Access Controls: Examples of evidence for Section 3 may include, but are not limited to:

1. Documentation, such as representative diagrams or lists of implemented electronic access controls (e.g., restricting IP addresses, ports, or services; authenticating users; air-gapping networks; terminating routable protocol sessions on a non-BES Cyber Asset; implementing unidirectional gateways) showing that for LERC at each asset or group of assets containing low impact BES Cyber Systems, is confined only to that access the Responsible Entity deems necessary; and

2. Documentation of authentication for Dial-up Connectivity (e.g., dial out only to a preprogrammed number to deliver data, dial-back modems, modems that must be remotely controlled by the control center or control room, or access control on the BES Cyber System).

Section 4. Cyber Security Incident Response: An example of evidence for Section 4 may include, but is not limited to, dated documentation, such as policies, procedures, or process

Page 65: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 28 of 53

documents of one or more Cyber Security Incident response plan(s) developed either by asset or group of assets that include the following processes:

1. to identify, classify, and respond to Cyber Security Incidents; to determine whether an identified Cyber Security Incident is a Reportable Cyber Security Incident and for notifying the Electricity Information Sharing and Analysis Center (E-ISAC);

2. to identify and document the roles and responsibilities for Cyber Security Incident response by groups or individuals (e.g., initiating, documenting, monitoring, reporting, etc.);

3. for incident handling of a Cyber Security Incident (e.g., containment, eradication, or recovery/incident resolution);

4. for testing the plan(s) along with the dated documentation that a test has been completed at least once every 36 calendar months; and

5. to update, as needed, Cyber Security Incident response plan(s) within 180 calendar days after completion of a test or actual Reportable Cyber Security Incident.

Section 5. Transient Cyber Asset and Removable Media Malicious Code Mitigation Plan(s):

1. Examples of evidence for Section 5.1 may include, but are not limited to, documentation of the method(s) used to mitigate the introduction of malicious code such as antivirus software and processes for managing signature or pattern updates, application whitelisting practices, processes to restrict communication, or other method(s) to mitigate the introduction of malicious code. If a Transient Cyber Asset does not have the capability to use method(s) that mitigate the introduction of malicious code, evidence may include documentation by the vendor or Responsible Entity that identifies that the Transient Cyber Asset does not have the capability.

2. Examples of evidence for Section 5.2 may include, but are not limited to, documentation from change management systems, electronic mail or procedures that document a review of the installed antivirus update level; memoranda, electronic mail, system documentation, policies or contracts from the party other than the Responsible Entity that identify the antivirus update process, the use of application whitelisting, use of live operating systems or system hardening performed by the party other than the Responsible Entity; evidence from change management systems, electronic mail or contracts that identifies the Responsible Entity’s acceptance that the practices of the party other than the Responsible Entity are acceptable; or documentation of other method(s) to mitigate malicious code for Transient Cyber Asset(s) managed by a party other than the Responsible Entity. If a Transient Cyber Asset does not have the capability to use method(s) that mitigate the introduction of malicious code, evidence may include documentation by the Responsible Entity or the party

Page 66: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 29 of 53

other than the Responsible Entity that identifies that the Transient Cyber Asset does not have the capability

3. Examples of evidence for Section 5.3.1 may include, but are not limited to, documented process(es) of the method(s) used to mitigate malicious code such as results of scan settings for Removable Media, or implementation of on-demand scanning. Examples of evidence for Section 5.3.2 may include, but are not limited to, documented process(es) for the method(s) used for mitigating the threat of detected malicious code on Removable Media, such as logs from the method(s) used to detect malicious code that show the results of scanning and the mitigation of detected malicious code on Removable Media or documented confirmation by the entity that the Removable Media was deemed to be free of malicious code.

Page 67: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 30 of 53

Guidelines and Technical Basis Section 4 – Scope of Applicability of the CIP Cyber Security Standards Section “4. Applicability” of the standards provides important information for Responsible Entities to determine the scope of the applicability of the CIP Cyber Security Requirements.

Section “4.1. Functional Entities” is a list of NERC functional entities to which the standard applies. If the entity is registered as one or more of the functional entities listed in Section 4.1, then the NERC CIP Cyber Security Standards apply. Note that there is a qualification in Section 4.1 that restricts the applicability in the case of Distribution Providers to only those that own certain types of systems and equipment listed in 4.2.

Section “4.2. Facilities” defines the scope of the Facilities, systems, and equipment owned by the Responsible Entity, as qualified in Section 4.1, that is subject to the requirements of the standard. In addition to the set of BES Facilities, Control Centers, and other systems and equipment, the list includes the set of systems and equipment owned by Distribution Providers. While the NERC Glossary term “Facilities” already includes the BES characteristic, the additional use of the term BES here is meant to reinforce the scope of applicability of these Facilities where it is used, especially in this applicability scoping section. This in effect sets the scope of Facilities, systems, and equipment that is subject to the standards. Requirement R1: In developing policies in compliance with Requirement R1, the number of policies and their content should be guided by a Responsible Entity's management structure and operating conditions. Policies might be included as part of a general information security program for the entire organization, or as components of specific programs. The Responsible Entity has the flexibility to develop a single comprehensive cyber security policy covering the required topics, or it may choose to develop a single high-level umbrella policy and provide additional policy detail in lower level documents in its documentation hierarchy. In the case of a high-level umbrella policy, the Responsible Entity would be expected to provide the high-level policy as well as the additional documentation in order to demonstrate compliance with CIP-003-7, Requirement R1.

If a Responsible Entity has any high or medium impact BES Cyber Systems, the one or more cyber security policies must cover the nine subject matter areas required by CIP-003-7, Requirement R1, Part 1.1. If a Responsible Entity has identified from CIP-002 any assets containing low impact BES Cyber Systems, also referred to herein as BES assets, the one or more cyber security policies must cover the four subject matter areas required by Requirement R1, Part 1.2.

Responsible Entities that have multiple-impact rated BES Cyber Systems are not required to create separate cyber security policies for high, medium, or low impact BES Cyber Systems. The Responsible Entities have the flexibility to develop policies that cover all three impact ratings.

Implementation of the cyber security policy is not specifically included in CIP-003-7, Requirement R1 as it is envisioned that the implementation of this policy is evidenced through successful implementation of CIP-003 through CIP-011. However, Responsible Entities are

Page 68: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 31 of 53

encouraged not to limit the scope of their cyber security policies to only those requirements in NERC cyber security Reliability Standards, but to develop a holistic cyber security policy appropriate for its organization. Elements of a policy that extend beyond the scope of NERC’s cyber security Reliability Standards will not be considered candidates for potential violations although they will help demonstrate the organization’s internal culture of compliance and posture towards cyber security.

For Part 1.1, the Responsible Entity should consider the following for each of the required topics in its one or more cyber security policies for medium and high impact BES Cyber Systems, if any:

1.1.1 Personnel and training (CIP-004)

• Organization position on acceptable background investigations

• Identification of possible disciplinary action for violating this policy

• Account management

1.1.2 Electronic Security Perimeters (CIP-005) including Interactive Remote Access

• Organization stance on use of wireless networks

• Identification of acceptable authentication methods

• Identification of trusted and untrusted resources

• Monitoring and logging of ingress and egress at Electronic Access Points

• Maintaining up-to-date anti-malware software before initiating Interactive Remote Access

• Maintaining up-to-date patch levels for operating systems and applications used to initiate Interactive Remote Access

• Disabling VPN “split-tunneling” or “dual-homed” workstations before initiating Interactive Remote Access

• For vendors, contractors, or consultants: include language in contracts that requires adherence to the Responsible Entity’s Interactive Remote Access controls

1.1.3 Physical security of BES Cyber Systems (CIP-006)

• Strategy for protecting Cyber Assets from unauthorized physical access

• Acceptable physical access control methods

• Monitoring and logging of physical ingress

1.1.4 System security management (CIP-007)

• Strategies for system hardening

• Acceptable methods of authentication and access control

Page 69: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 32 of 53

• Password policies including length, complexity, enforcement, prevention of brute force attempts

• Monitoring and logging of BES Cyber Systems

1.1.5 Incident reporting and response planning (CIP-008)

• Recognition of Cyber Security Incidents

• Appropriate notifications upon discovery of an incident

• Obligations to report Cyber Security Incidents

1.1.6 Recovery plans for BES Cyber Systems (CIP-009)

• Availability of spare components

• Availability of system backups

1.1.7 Configuration change management and vulnerability assessments (CIP-010)

• Initiation of change requests

• Approval of changes

• Break-fix processes

1.1.8 Information protection (CIP-011)

• Information access control methods

• Notification of unauthorized information disclosure

• Information access on a need-to-know basis

1.1.9 Declaring and responding to CIP Exceptional Circumstances

• Processes to invoke special procedures in the event of a CIP Exceptional Circumstance

• Processes to allow for exceptions to policy that do not violate CIP requirements

Requirements relating to exceptions to a Responsible Entity’s security policies were removed because it is a general management issue that is not within the scope of a reliability requirement. It is an internal policy requirement and not a reliability requirement. However, Responsible Entities are encouraged to continue this practice as a component of their cyber security policies.

In this and all subsequent required approvals in the NERC CIP Reliability Standards, the Responsible Entity may elect to use hardcopy or electronic approvals to the extent that there is sufficient evidence to ensure the authenticity of the approving party. Requirement R2: Using the list of assets containing low impact BES Cyber Systems from CIP-002, the intent of the requirement is for each Responsible Entity to create, document, and implement one or more cyber security plan(s) that addresses objective criteria for the protection of low impact BES

Page 70: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 33 of 53

Cyber Systems. The protections required by Requirement R2 reflect the level of risk that misuse or the unavailability of low impact BES Cyber Systems poses to the BES. The intent is that the required protections are part of a program that covers the low impact BES Cyber Systems collectively either at an asset or site level (assets containing low impact BES Cyber Systems), but not at an individual device or system level.

There are four subject matter areas, as identified in Attachment 1, that must be covered by the cyber security plan: (1) cyber security awareness, (2) physical security controls, (3) electronic access controls for LERC and Dial-up Connectivity, and (4) Cyber Security Incident response. Requirement R2, Attachment 1 As noted, Attachment 1 contains the sections that must be in the cyber security plan(s). The intent is to allow entities that have a combination of high, medium, and low impact BES Cyber Systems the flexibility to choose, if desired, to cover their low impact BES Cyber Systems (or any subset) under their programs used for the high or medium impact BES Cyber Systems rather than maintain two separate programs. Guidance for each of the four subject matter areas of Attachment 1 is provided below. Requirement R2, Attachment 1, Section 1 – Cyber Security Awareness The intent of the cyber security awareness program is for entities to reinforce good cyber security practices with their personnel at least once every 15 calendar months. The entity has the discretion to determine the topics to be addressed and the manner in which it will communicate these topics. As evidence of compliance, the Responsible Entity should be able to produce the awareness material that was delivered according to the delivery method(s) (e.g., posters, emails, or topics at staff meetings, etc.). The Responsible Entity is not required to maintain lists of recipients and track the reception of the awareness material by personnel.

Although the focus of the awareness is cyber security, it does not mean that only technology-related topics can be included in the program. Appropriate physical security topics (e.g., tailgating awareness and protection of badges for physical security, or “If you see something, say something” campaigns, etc.) are valid for cyber security awareness. The intent is to cover topics concerning any aspect of the protection of BES Cyber Systems. Requirement R2, Attachment 1, Section 2 – Physical Security Controls The Responsible Entity must document and implement methods to control physical access to (1) the asset or the locations of low impact BES Cyber Systems within the asset, and (2) Cyber Assets that implement the electronic access control(s) specified by the Responsible Entity in Section 3, if any. If these Cyber Assets are located within the BES asset and inherit the same controls outlined in Section 2, this can be noted by the Responsible Entity in either its policies or cyber security plan(s) to avoid duplicate documentation of the same controls.

The Responsible Entity has the flexibility in the selection of the methods used to meet the objective to control physical access to the asset(s) containing low impact BES Cyber System(s) or the low impact BES Cyber Systems themselves, as well as physical protection of the electronic access control Cyber Assets specified by the Responsible Entity, if any. The Responsible Entity may use one or a combination of access controls, monitoring controls, or

Page 71: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 34 of 53

other operational, procedural, or technical physical security controls. Entities may use perimeter controls (e.g., fences with locked gates, guards, or site access policies, etc.) or more granular areas of physical access control in areas where low impact BES Cyber Systems are located, such as control rooms or control houses. User authorization programs and lists of authorized users for physical access are not required although they are an option to meet the security objective.

The objective is to control the physical access based on need as determined by the Responsible Entity. The need can be documented at the policy level for access to the site or systems. The requirement does not obligate an entity to specify a need for each access or authorization of a user for access.

Monitoring as a physical security control can be used as a complement or an alternative to access control. Examples of monitoring controls include, but are not limited to: (1) alarm systems to detect motion or entry into a controlled area, or (2) human observation of a controlled area. Monitoring does not necessarily require logging and maintaining logs but could include monitoring that physical access has occurred or been attempted (e.g., door alarm, or human observation, etc.). The monitoring does not need to be per low impact BES Cyber System but should be at the appropriate level to meet the security objective. Requirement R2, Attachment 1, Section 3 – Electronic Access Controls Section 3 requires the establishment of electronic access controls for assets containing low impact BES Cyber Systems, also referred to herein as BES assets when external routable protocol communication (LERC) or Dial-up Connectivity is present to or from the asset containing the low impact BES Cyber System(s). The establishment of electronic access controls is intended to reduce the risks associated with uncontrolled communication using routable protocols or Dial-up Connectivity. In the case where there is no LERC or Dial-up Connectivity, the Responsible Entity can document the absence of such communication in its low impact cyber security plan(s).

When identifying electronic access controls, Responsible Entities are provided flexibility in the selection of the controls that meet their operational needs while meeting the security objective of allowing only necessary electronic access to low impact BES Cyber Systems.

In essence, Responsible Entities are to determine LERC or Dial-up Connectivity for their BES assets and then, if present, document and implement electronic access control(s). Determining LERC The defined term Low Impact External Routable Communication (LERC) is used to avoid confusion with the term External Routable Connectivity (ERC) used for high and medium impact BES Cyber Systems as these terms are different concepts. The input to this requirement from CIP-002 is a list of assets containing low impact BES Cyber Systems, therefore LERC is an attribute of a BES asset and involves routable protocol communications to or from the BES asset (crossing the asset boundary) without regard to connectivity to Cyber Assets within the BES asset. ERC on the other hand is an attribute of an individual high or medium impact BES Cyber System and is relative to an Electronic Security Perimeter (ESP).

Page 72: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 35 of 53

With LERC being a BES asset level attribute, it is used as a higher level filter to exclude from further consideration those assets containing low impact BES Cyber Systems that have no routable protocol communications to them from outside the BES asset. Responsible Entities can then concentrate their electronic access control efforts on those BES assets that do have LERC. However, this also means that LERC can exist for a BES asset even if there is no routable protocol connectivity to any low impact BES Cyber System within the BES asset. In order to avoid future technology issues, the LERC definition specifically excludes communications between intelligent electronic devices that use routable communication protocols for time-sensitive protection or control functions between non-Control Center BES assets containing low impact BES Cyber Systems, such as IEC 61850 messaging. This does not exclude Control Center to field communication but rather excludes the communication between the intelligent electronic devices (e.g. relays) in the field. A Responsible Entity using this technology is not expected to implement the electronic access controls noted herein. This exception was included so as not to inhibit the functionality of the time-sensitive requirements related to this technology nor to preclude the use of such time-sensitive reliability enhancing functions if they use a routable protocol in the future. Determining Asset Boundary As LERC is a BES asset level attribute, it involves a determination by the Responsible Entity of a BES asset boundary for their assets containing low impact BES Cyber Systems. This boundary will vary by BES asset type (Control Center, substation, generation resource) and the specific configuration of the BES asset. The intent is for the Responsible Entity to define the BES asset boundary such that the low impact BES Cyber System(s) that are located at the BES asset are contained within the BES asset boundary. This is strictly for determining what constitutes the BES “asset” and for determining which routable protocol communications and networks are internal or inside or local to the BES asset and which are external to or outside the BES asset. This is not an Electronic Security Perimeter or Physical Security Perimeter as defined for medium and high impact BES Cyber Systems. For the asset containing low impact BES Cyber System(s), the BES asset boundary is synonymous to the concept of a “logical border” demarcation where routable protocol communication (e.g. LERC) enters and exits the BES asset containing the low impact BES Cyber System. Some examples of ways a Responsible Entity may determine BES asset boundaries are:

• For Control Centers

o Designated areas (room(s) or floor(s)) if the Control Center is located within a larger building.

o A building if in a dedicated building on a shared campus.

o The property/fence line if the Control Center is a dedicated facility on dedicated property.

• For substations, this could be the property/fence line or the control house.

Page 73: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 36 of 53

• For generation resources:

o Fossil/hydro generating facilities: This could be the property/fence line. If pumps or wells or other equipment that are part of the plant asset are outside the property line, then the BES asset boundary could expand to accommodate all that is considered part of the plant.

o Solar farms: This could be the property line(s) or fence(s) surrounding all solar panels and interconnection facilities.

o Wind farms: This could be the collection of individual turbines plus the equipment needed for interconnection.

o Cogeneration facilities: This could be the identified portion of the larger plant that performs generation.

Determining Electronic Access Controls Once a Responsible Entity has determined that LERC exists at the BES asset boundary, the Responsible Entity documents and implements its chosen electronic access control(s). The control(s) must allow only “necessary” access as determined by the Responsible Entity and they need to be able to explain the reasons for the electronic access permitted with their electronic access controls. The reasoning for the “necessary” access controls can be documented within the Responsible Entity’s cyber security plan(s) or other policies or procedures associated with the electronic access controls. Concept Diagrams The diagrams on the following pages are provided as examples to illustrate various electronic access controls at a conceptual level. Regardless of the concepts or configurations chosen by the Responsible Entity, the security objective of permitting only necessary access to low impact BES Cyber Systems must be met when there is LERC to a BES asset. NOTE:

• This is not an exhaustive list of applicable concepts.

• LERC is present in each diagram.

• The same legend is used in each diagram; however, the diagram may not contain all of the articles represented in the legend.

• The term “BES Asset Boundary” is capitalized in the diagrams but it is not a defined term.

Page 74: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 37 of 53

LERC Reference Model 1 – Physical Isolation The Responsible Entity may choose to physically isolate the low impact BES Cyber System(s) from the LERC. This control is commonly referred to as an ‘air gap’. The serial non-routable protocol connection and the routable protocol LERC are completely isolated from each other. There is no equipment shared with the low impact BES Cyber System(s).

BES Asset Boundary

SerialNon-routable

Protocol

Non-BES Cyber Asset

Non-BES Cyber Asset

RoutableProtocol

Air Gap

LERC

Low impactBES Cyber

System

Low impactBES Cyber

System

Non-BES Cyber Asset

Routable Protocol Routable ProtocolData FlowNon-routable Protocol

Reference Model 1

Page 75: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 38 of 53

LERC Reference Model 2 – Logical Isolation The Responsible Entity may choose to logically isolate the low impact BES Cyber System(s) from the LERC. The low impact BES Cyber System(s) is on an isolated network segment with logical controls preventing routable protocol communication into or out of the network containing the low impact BES Cyber System(s).

BES Asset Boundary

RoutableProtocol

LERC

Network Devicewith logical network segmentation

Low impactBES Cyber

System

Non-BES Cyber Asset

Non-BES Cyber Asset

Low impactBES Cyber

System

Control Network Segment Non-Control Network Segment

`

Routable Protocol Routable ProtocolData FlowNon-routable Protocol

Reference Model 2

Page 76: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 39 of 53

LERC Reference Model 3 – Host-based Inbound & Outbound Access Permissions The Responsible Entity may choose to utilize a host-based firewall technology on the low impact BES Cyber System(s) that manages electronic access permission so that only necessary inbound and outbound routable protocol access is allowed to the low impact BES Cyber System(s).

BES Asset Boundary

RoutableProtocol

LERC

Low impactBES Cyber

System

Routable Protocol Routable ProtocolData FlowNon-routable Protocol

Reference Model 3

Page 77: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 40 of 53

LERC Reference Model 4 – Network-based Inbound & Outbound Access Permissions The Responsible Entity may choose to utilize a security device that permits only necessary access to the low impact BES Cyber System(s) within the BES asset. In this example, two low impact BES Cyber Systems are accessed over the LERC as the IP/Serial converter is continuing the same communications session from device(s) outside the BES asset boundary to the low impact BES Cyber Systems. The security device provides the electronic access controls to permit only necessary inbound and outbound routable protocol access to the low impact BES Cyber Systems.

BES Asset Boundary

LERC

SerialNon-Routable

Protocol

Low impactBES Cyber

System

Network

Low impactBES Cyber

System

IP/SerialConverter

RoutableProtocol

Routable Protocol Routable ProtocolData FlowNon-routable Protocol

Reference Model 4

Page 78: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 41 of 53

LERC Reference Model 5 – Centralized Network-based Inbound & Outbound Access Permissions The Responsible Entity may choose to utilize a security device at a centralized location that may or may not be another BES asset. The electronic access control(s) do not necessarily have to reside inside the asset containing the low impact BES Cyber System(s). A security device is in place at “Location X” to act as the electronic access control and permit only necessary inbound and outbound routable protocol access to the low impact BES Cyber System(s). Care should be taken that electronic access to or between each BES asset is through the electronic access controls at the centralized location.

Reference Model 5

Location X

BES Asset Boundary BES Asset Boundary

LERCLERC

`

Firewall, Router Access Control List,Gateway or Other Security Device

RoutableProtocol

RoutableProtocol

Network Network

Non BES CyberSystsem

Low impactBES Cyber

SystemNon BES Cyber

System

Low impactBES Cyber

System

RoutableProtocol

Routable Protocol Routable ProtocolData FlowNon-routable Protocol

Page 79: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 42 of 53

LERC Reference Model 6 – Uni-directional Gateway The Responsible Entity may choose to utilize a uni-directional gateway as the electronic access control. The low impact BES Cyber System(s) is not accessible (data cannot flow into the low impact BES Cyber System) from the LERC due to the implementation of a “one-way” (uni-directional) path for data to flow across the BES asset boundary.

BES Asset Boundary

RoutableProtocol

LERC

Low impactBES Cyber

System

Uni-directionalGateway

Routable Protocol Routable ProtocolData FlowNon-routable Protocol

Reference Model 6

Page 80: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 43 of 53

LERC Reference Model 7 – User Authentication The Responsible Entity may choose to utilize a non-BES Cyber Asset between the network outside the BES asset boundary and the low impact BES Cyber System to perform user authentication for interactive access. The non-BES Cyber Asset would require authentication before establishing a new connection to the low impact BES Cyber System. The electronic access control depicted in this reference model may not meet the security objective for controlling device-to-device communication across the LERC depending on the specific system configuration in place.

BES Asset Boundary

RoutableProtocol

LERC

Low impactBES Cyber

System

Non-BES Cyber AssetPerforming Authentication

Routable Protocol Routable ProtocolData FlowNon-routable Protocol

Reference Model 7

Page 81: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 44 of 53

LERC Reference Model 8 – Session Termination The Responsible Entity may choose to terminate routable protocol application sessions at a non-BES Cyber Asset inside the asset containing the low impact BES Cyber System(s) such that a separate application session is established to the low impact BES Cyber System(s) from the non-BES Cyber Asset (the routable session from outside the BES asset). The Responsible Entity may choose to authenticate access at a non-BES Cyber Asset either outside BES asset boundary or inside the asset containing the low impact BES Cyber System(s) such that unauthenticated access to the low impact BES Cyber System(s) is prohibited. The non-BES Cyber Asset sits on a demilitarized zone (DMZ) between the network outside the BES asset boundary and the low impact BES Cyber System(s). The non-BES Cyber Asset in the DMZ terminates the routable protocol session and establishes a new session to the low impact BES Cyber System(s). Additionally, a security device permits traffic from the network outside the BES asset boundary to flow only to and from the non-BES Cyber Asset in the DMZ (the routable session to the low impact BES Cyber System).

Reference Model 8

BES Asset Boundary

Network

Low impactBES Cyber

System

DMZ

Non-BES Cyber Asset(Separate routable protocolsessions for each data flow)

RoutableProtocol

Firewall, Router Access Control List,Gateway or Other Security Device

LERC

Routable Protocol Routable ProtocolData FlowNon-routable Protocol

Page 82: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 45 of 53

LERC Reference Model 9 – LERC and ERC There is both LERC and ERC present in this reference model because there is at least one medium impact BES Cyber System and one low impact BES Cyber System within the BES asset. The Responsible Entity may choose to leverage an interface on the medium impact Electronic Access Control or Monitoring Systems (EACMS) device to provide electronic access controls for the LERC. The EACMS is therefore performing multiple functions – as a medium impact EACMS and as implementing low impact electronic access controls.

BES Asset Boundary

Firewall, Router Access Control List,Gateway or Other Security Device

Network

Non BES CyberSystem

Low impactBES Cyber

System

RoutableProtocol

Network

Medium impactBES Cyber

System with ERC

EAP Interface

ESP

LERC

ERC

Routable Protocol Routable ProtocolData FlowNon-routable Protocol

Reference Model 9

Page 83: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 46 of 53

Dial-up Connectivity Dial-up Connectivity to a low impact BES Cyber System is set to dial out only (no auto-answer) to a preprogrammed number to deliver data. Incoming Dial-up Connectivity is to a dialback modem, a modem that must be remotely controlled by the control center or control room, has some form of access control, or the low impact BES Cyber System has access control. Insufficient Access Controls Some examples of situations that would lack sufficient access controls to meet the intent of this requirement include:

• An asset has Dial-up Connectivity and a low impact BES Cyber System is reachable via an auto-answer modem that connects any caller to the Cyber Asset that has a default password. There is no practical access control in this instance.

• An asset has LERC due to a BES Cyber System within it having a wireless card on a public carrier that allows the BES Cyber System to be reachable via a public IP address. In essence, low impact BES Cyber Systems should not be accessible from the Internet and search engines such as Shodan.

• Dual-homing or multiple-network interface cards without disabling IP forwarding in the non-BES Cyber Asset within the DMZ to provide separation between the low impact BES Cyber System(s) and the external network would not meet the intent of “controlling” inbound and outbound electronic access assuming there was no other host-based firewall or other security devices on the non-BES Cyber Asset.

Requirement R2, Attachment 1, Section 4 – Cyber Security Incident Response The entity should have one or more documented Cyber Security Incident response plan(s) that include each of the topics listed in Section 4. If, in the normal course of business, suspicious activities are noted at an asset containing low impact BES Cyber System(s), the intent is for the entity to implement a Cyber Security Incident response plan that will guide the entity in responding to the incident and reporting the incident if it rises to the level of a Reportable Cyber Security Incident.

Entities are provided the flexibility to develop their Attachment 1, Section 4 Cyber Security Incident response plan(s) by asset or group of assets. The plans do not need to be on a per asset site or per low impact BES Cyber System basis. Entities can choose to use a single enterprise-wide plan to fulfill the obligations for low impact BES Cyber Systems.

The plan(s) must be tested once every 36 months. This is not an exercise per low impact BES Cyber Asset or per type of BES Cyber Asset but rather is an exercise of each incident response plan the entity created to meet this requirement. An actual Reportable Cyber Security Incident counts as an exercise as do other forms of tabletop exercises or drills. NERC-led exercises such as GridEx participation would also count as an exercise provided the entity’s response plan is followed. The intent of the requirement is for entities to keep the Cyber Security Incident response plan(s) current, which includes updating the plan(s), if needed, within 180 days following a test or an actual incident.

Page 84: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 47 of 53

For low impact BES Cyber Systems, the only portion of the definition of Cyber Security Incident that would apply is‚ “A malicious act or suspicious event that disrupts, or was an attempt to disrupt, the operation of a BES Cyber System.” The other portion of that definition is not to be used to require ESPs and PSPs for low impact BES Cyber Systems. Requirement R2, Attachment 1, Section 5 – Transient Cyber Assets and Removable Media Malicious Code Mitigation Plan(s) Most BES Cyber Assets and BES Cyber Systems are isolated from external public or untrusted networks, and therefore require Transient Cyber Assets and Removable Media to transport files to and from secure areas to maintain, monitor, or troubleshoot critical systems. Transient Cyber Assets and Removable Media are a potential means for cyber-attack. To protect the BES Cyber Assets and BES Cyber Systems, CIP-003, R2 Attachment 1, Section 5 requires entities to document and implement a plan for how they will mitigate the risk of malicious code introduction to BES Cyber Systems from Transient Cyber Assets and Removable Media. The approach of defining a plan allows the Responsible Entity to document processes that are supportable within its organization and in alignment with its change management processes.

Transient Cyber Assets can be one of many types of devices from a specially-designed device for maintaining equipment in support of the BES to a platform such as a laptop, desktop, or tablet that may interface with or run applications that support BES Cyber Systems and is capable of transmitting executable code to the BES Cyber Asset(s) or BES Cyber System(s). Removable Media in scope of this requirement can be in the form of floppy disks, compact disks, USB flash drives, external hard drives, and other flash memory cards/drives that contain nonvolatile memory.

Examples of these temporarily connected devices include, but are not limited to:

• Diagnostic test equipment;

• Equipment used for BES Cyber System maintenance; or

• Equipment used for BES Cyber System configuration.

The attachment was created to specify the capabilities and possible security methods available to Responsible Entities based upon asset type and ownership.

With the list of options provided in Attachment 1 for each control area, the entity has the discretion to use the option(s) that is most appropriate. This includes documenting its approach for how and when the entity reviews the Transient Cyber Asset under its control or under the control of parties other than the Responsible Entity. The entity should avoid implementing a security function that jeopardizes reliability by taking actions that would negatively impact the performance or support of the Transient Cyber Asset or BES Cyber Asset.

Page 85: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 48 of 53

Vulnerability Mitigation The terms “mitigate”, “mitigating”, and “mitigation” are used in the sections in Attachment 1 to address the risks posed by malicious code when connecting Transient Cyber Assets and Removable Media to BES Cyber Systems. Mitigation in this context does not require that each vulnerability be individually addressed or remediated, as many may be unknown or not have an impact on the system to which the Transient Cyber Asset or Removable Media is connected. Mitigation is meant to reduce security risks presented by connecting the Transient Cyber Asset.

Per Transient Cyber Asset Capability As with other CIP standards, the requirements are intended for an entity to use the method(s) that the system is capable of performing. The use of “per Transient Cyber Asset capability” is to eliminate the need for a Technical Feasibility Exception when it is understood that the device cannot use a method(s). For example, for malicious code, many types of appliances are not capable of implementing antivirus software; therefore, because it is not a capability of those types of devices, implementation of the antivirus software would not be required for those devices.

Requirement R2, Attachment 1, Section 5.1 - Transient Cyber Asset(s) Managed by the Responsible Entity For Transient Cyber Assets and Removable Media that are connected to both low impact and medium/high impact BES Cyber Systems, entities must be aware of the differing levels of requirements and should consider managing these assets under the program that matches the highest impact level to which they will connect.

Section 5.1: Entities are to document and implement their process(es) to mitigate malicious code through the use of one or more of the protective measures listed. This needs to be applied based on the capability of the Transient Cyber Asset. When addressing malicious code protection, the Responsible Entity should address methods deployed to mitigate the introduction of malicious code. The Responsible Entity has the flexibility to apply the selected method(s) to meet the objective of mitigating the introductions of malicious code either in an on-going or in an on-demand manner. An example of a managed device in an on-going manner is one that has an antivirus solution that is managed as part of an end-point security solution with current signature or pattern updates, regularly scheduled systems scans, etc. An example of managing a device in an on-demand manner may be for devices that are used infrequently whereas the signatures or patterns are not kept current which requires an update to the signatures or patterns and a scan of the device before the device is connected to ensure that it is free of malicious code. Selecting management in an on-going or on-demand manner is not intended to imply that the control has to be verified at every single connection. For example, if the device is managed in an on-demand manner, but will be used to perform maintenance on several BES Cyber Asset(s), the Responsible Entity may choose to document that the Transient Cyber Asset has been updated before being connected as a Transient Cyber Asset for the first use of that maintenance work. If malicious code is discovered, it must be removed or mitigated to prevent it from being introduced into the BES Cyber Asset or BES Cyber System. Entities should also consider whether the detected malicious code is a Cyber Security Incident.

Page 86: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 49 of 53

• Antivirus software, including manual or managed updates of signatures or patterns, provides flexibility to manage Transient Cyber Asset(s) by deploying antivirus or endpoint security tools that maintain a scheduled update of the signatures or patterns. Also, for devices that do not regularly connect to receive scheduled updates, entities may choose to update the signatures or patterns and scan the Transient Cyber Asset prior to connection to ensure no malicious software is present.

• Application whitelisting is a method of authorizing only the applications and processes that are necessary on the Transient Cyber Asset. This reduces the risk that malicious software could execute on the Transient Cyber Asset and impact the BES Cyber Asset or BES Cyber System.

• When selecting to use other methods that mitigate the introduction of malicious code to those listed, entities need to have documentation that identifies how the other method(s) meet the mitigation of the introduction of malicious code objective.

Requirement R4, Attachment 1, Section 5.2 - Transient Cyber Asset(s) Managed by a Party Other than the Responsible Entity The attachment also recognizes the lack of control for Transient Cyber Assets that are managed by parties other than the Responsible Entity. However, this does not obviate the Responsible Entity’s responsibility to ensure that methods have been deployed to mitigate the introduction of malicious code on Transient Cyber Assets it does not manage. The requirements listed herein allow entities the ability to review the assets to the best of their capability and to meet their obligations. The use of “prior to connecting the Transient Cyber Assets” is intended to ensure that the Responsible Entity conducts the review before the first connection of the Transient Cyber Asset to ensure that the Transient Cyber Asset is meeting the objective to mitigate the introduction of malicious code. It is not intended that a Responsible Entity conduct a review for every single connection of that Transient Cyber Asset once the Responsible Entity has established the Transient Cyber Asset is meeting the security objective.

To facilitate these controls, Responsible Entities may choose to execute agreements with other parties to provide support services to BES Cyber Systems and BES Cyber Assets that may involve the use of Transient Cyber Assets. Entities may consider using the Department of Energy Cybersecurity Procurement Language for Energy Delivery dated April 2014.1 Procurement language may unify the other party and entity actions supporting the BES Cyber Systems and BES Cyber Assets. CIP program attributes may be considered including roles and responsibilities, access controls, monitoring, logging, vulnerability, and patch management along with incident response and back up recovery may be part of the other party’s support. Entities should consider the “General Cybersecurity Procurement Language” and “The Supplier’s Life Cycle Security Program” when drafting Master Service Agreements, Contracts, and the CIP program processes and controls.

1

Page 87: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 50 of 53

Section 5.2: Entities are to document and implement their process(es) to mitigate the introduction of malicious code through the use of one or more of the protective measures listed.

• Review the use of antivirus software and signature or pattern levels to ensure that the level is adequate to the Responsible Entity to mitigate the risk of malicious software being introduced to an applicable system.

• Review the antivirus or endpoint security processes of the other party to ensure that their processes are adequate to the Responsible Entity to mitigate the risk of introducing malicious software to an applicable system.

• Review the use of application whitelisting used by the other party to mitigate the risk of introducing malicious software to an applicable system.

• Review the use of live operating systems or software executable only from read-only media to ensure that the media is free from malicious software itself. Entities should review the processes to build the read-only media as well as the media itself.

• Review system hardening practices used by the other party to ensure that unnecessary ports, services, applications, etc. have been disabled or removed. This will reduce the attack surface on the Transient Cyber Asset and reduce the avenues by which malicious software could be introduced.

Requirement R4, Attachment 1, Section 5.3 - Removable Media Entities have a high level of control for Removable Media that are going to be connected to their BES Cyber Assets.

Section 5.3: Entities are to document and implement their process(es) to mitigate the introduction of malicious code through the use of one or more method(s) to detect malicious code on the Removable Media before it is connected to a BES Cyber Asset. When using the method(s) to detect malicious code, it is expected to occur from a system that is not part of the BES Cyber System to reduce the risk of propagating malicious code into the BES Cyber System network or onto one of the BES Cyber Assets. If malicious code is discovered, it must be removed or mitigated to prevent it from being introduced into the BES Cyber Asset or BES Cyber System. Entities should also consider whether the detected malicious code is a Cyber Security Incident. Frequency and timing of the methods used to detect malicious code were intentionally excluded from the requirement because there are multiple timing scenarios that can be incorporated into a plan to mitigate the risk of malicious code.

As a method to detect malicious code, entities may choose to use Removable Media with on-board malicious code detection tools. For these tools, the Removable Media are still used in conjunction with a Cyber Asset to perform the detection. For Section 5.3.1, the Cyber Asset used to perform the malicious code detection must be outside of the BES Cyber System.

Page 88: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 51 of 53

Requirement R3: The intent of CIP-003-7, Requirement R3 is effectively unchanged since prior versions of the standard. The specific description of the CIP Senior Manager has now been included as a defined term rather than clarified in the Reliability Standard itself to prevent any unnecessary cross-reference to this standard. It is expected that the CIP Senior Manager will play a key role in ensuring proper strategic planning, executive/board-level awareness, and overall program governance. Requirement R4: As indicated in the rationale for CIP-003-7, Requirement R4, this requirement is intended to demonstrate a clear line of authority and ownership for security matters. The intent of the SDT was not to impose any particular organizational structure, but, rather, the intent is to afford the Responsible Entity significant flexibility to adapt this requirement to its existing organizational structure. A Responsible Entity may satisfy this requirement through a single delegation document or through multiple delegation documents. The Responsible Entity can make use of the delegation of the delegation authority itself to increase the flexibility in how this applies to its organization. In such a case, delegations may exist in numerous documentation records as long as the collection of these documentation records shows a clear line of authority back to the CIP Senior Manager. In addition, the CIP Senior Manager could also choose not to delegate any authority and meet this requirement without such delegation documentation.

The Responsible Entity must keep its documentation of the CIP Senior Manager and any delegations up-to-date. This is to ensure that individuals do not assume any undocumented authority. However, delegations do not have to be re-instated if the individual who delegated the task changes roles or the individual is replaced. For instance, assume that John Doe is named the CIP Senior Manager and he delegates a specific task to the Substation Maintenance Manager. If John Doe is replaced as the CIP Senior Manager, the CIP Senior Manager documentation must be updated within the specified timeframe, but the existing delegation to the Substation Maintenance Manager remains in effect as approved by the previous CIP Senior Manager, John Doe. Rationale: During development of this standard, text boxes were embedded within the standard to explain the rationale for various parts of the standard. Upon Board approval, the text from the rationale text boxes was moved to this section. Rationale for Requirement R1: One or more security policies enable effective implementation of the requirements of the cyber security Reliability Standards. The purpose of policies is to provide a management and governance foundation for all requirements that apply to a Responsible Entity’s BES Cyber Systems. The Responsible Entity can demonstrate through its policies that its management supports the accountability and responsibility necessary for effective implementation of the requirements.

Page 89: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 52 of 53

Annual review and approval of the cyber security policies ensures that the policies are kept-up-to-date and periodically reaffirms management’s commitment to the protection of its BES Cyber Systems. Rationale for Requirement R2: In response to FERC Order No. 791, Requirement R2 requires entities to develop and implement cyber security plans to meet specific security control objectives for assets containing low impact BES Cyber System(s). The cyber security plan(s) covers four subject matter areas: (1) cyber security awareness; (2) physical security controls; (3) electronic access controls; and (4) Cyber Security Incident response. This plan(s), along with the cyber security policies required under Requirement R1, Part 1.2, provides a framework for operational, procedural, and technical safeguards for low impact BES Cyber Systems.

Considering the varied types of low impact BES Cyber Systems across the BES, Attachment 1 provides Responsible Entities flexibility on how to apply the security controls to meet the security objectives. Additionally, because many Responsible Entities have multiple-impact rated BES Cyber Systems, nothing in the requirement prohibits entities from using their high and medium impact BES Cyber System policies, procedures, and processes to implement security controls required for low impact BES Cyber Systems, as detailed in Requirement R2, Attachment 1.

Responsible Entities will use their identified assets containing low impact BES Cyber System(s) (developed pursuant to CIP-002) to substantiate the sites or locations associated with low impact BES Cyber System(s). However, there is no requirement or compliance expectation for Responsible Entities to maintain a list(s) of individual low impact BES Cyber System(s) and their associated cyber assets or to maintain a list of authorized users. Rationale for Requirement R3: The identification and documentation of the single CIP Senior Manager ensures that there is clear authority and ownership for the CIP program within an organization, as called for in Blackout Report Recommendation 43. The language that identifies CIP Senior Manager responsibilities is included in the Glossary of Terms used in NERC Reliability Standards so that it may be used across the body of CIP standards without an explicit cross-reference.

FERC Order No. 706, Paragraph 296, requests consideration of whether the single senior manager should be a corporate officer or equivalent. As implicated through the defined term, the senior manager has “the overall authority and responsibility for leading and managing implementation of the requirements within this set of standards” which ensures that the senior manager is of sufficient position in the Responsible Entity to ensure that cyber security receives the prominence that is necessary. In addition, given the range of business models for responsible entities, from municipal, cooperative, federal agencies, investor owned utilities, privately owned utilities, and everything in between, the SDT believes that requiring the CIP Senior Manager to be a “corporate officer or equivalent” would be extremely difficult to interpret and enforce on a consistent basis.

Page 90: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 53 of 53

Rationale for Requirement R4: The intent of the requirement is to ensure clear accountability within an organization for certain security matters. It also ensures that delegations are kept up-to-date and that individuals do not assume undocumented authority.

In FERC Order No. 706, Paragraphs 379 and 381, the Commission notes that Recommendation 43 of the 2003 Blackout Report calls for “clear lines of authority and ownership for security matters.” With this in mind, the Standard Drafting Team has sought to provide clarity in the requirement for delegations so that this line of authority is clear and apparent from the documented delegations.

Page 91: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 1 of 53

Standard Development Timeline

This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Description of Current Draft This draft of CIP-003-7 is addressing the directive issued by the Federal Energy Regulatory Commission (Commission) in paragraph 73 of Order No. 822 which reads:

[T]he Commission concludes that a modification to the Low Impact External Routable Connectivity definition to reflect the commentary in the Guidelines and Technical Basis section of CIP-003-6 is necessary to provide needed clarity to the definition and eliminate ambiguity surrounding the term “direct” as it is used in the proposed definition. Therefore, pursuant to section 215(d)(5) of the FPA, we direct NERC to develop a modification to provide the needed clarity, within one year of the effective date of this Final Rule approving revisions to the cybersecurity Critical Infrastructure Protection (CIP) standards.

Previously, the Guidelines and Technical Basis had approximately 10 pages of explanation and numerous reference models to describe different forms of direct vs. indirect access that could be used to determine whether Low Impact External Routable Connectivity existed and thus whether a Low Impact BES Cyber System Electronic Access Point (LEAP) was required. In this revision, the term Low Impact External Routable Connectivity has been changed to Low Impact External Routable Communication (LERC) and simplified so that it is an attribute of a BES asset concerning whether there is routable protocol communications across the asset boundary without regard to 'direct vs. indirect' access that may occur. This greatly simplifies and clarifies the definition of LERC. It removes the dependency between the electronic access controls that may be in place and having those controls determine whether LERC exists or not. For those BES assets that have LERC, the SDT changed the requirement from requiring a LEAP to requiring electronic access controls to “permit only necessary electronic access to low impact BES Cyber Systems” (revised Attachment 1, Section 3.1) within the BES asset and expanded the Guidelines and Technical Basis with numerous examples of electronic access controls. Given the modified definition of LERC and the proposed modifications in Reliability CIP-003-7, there is no longer a need for the NERC Glossary term Low Impact BES Cyber System Electronic Access Point (LEAP). Consequently, NERC is proposing that term for retirement.

In summary, the CIP Standard Drafting Team revised CIP-003-7, Attachments 1 and 2, Sections 2 and 3 and the associated High VSL for Requirement R2. Non-substantive errata changes were also made within the standard, including changing “ES-ISAC” to “E-ISAC”.

Agenda Item 6b Standards Committee October 19, 2016

Page 92: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 2 of 53

Completed Actions Date

Standard Authorization Request (SAR) approved July 20, 2016

Draft 1 of CIP-003-7 posted for formal comment and initial ballot July 21 – September 6, 2016

Anticipated Actions Date

10-day final ballot October, 2016

NERC Board of Trustees (BOT) adoption November, 2016

Page 93: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 3 of 53

A. Introduction 1. Title: Cyber Security — Security Management Controls

2. Number: CIP-003-7(i)

3. Purpose: To specify consistent and sustainable security management controls that establish responsibility and accountability to protect BES Cyber Systems against compromise that could lead to misoperation or instability in the Bulk Electric System (BES).

4. Applicability:

4.1. Functional Entities: For the purpose of the requirements contained herein, the following list of functional entities will be collectively referred to as “Responsible Entities.” For requirements in this standard where a specific functional entity or subset of functional entities are the applicable entity or entities, the functional entity or entities are specified explicitly.

4.1.1 Balancing Authority

4.1.2 Distribution Provider that owns one or more of the following Facilities, systems, and equipment for the protection or restoration of the BES:

4.1.2.1 Each underfrequency Load shedding (UFLS) or undervoltage Load shedding (UVLS) system that:

4.1.2.1.1 is part of a Load shedding program that is subject to one or more requirements in a NERC or Regional Reliability Standard; and

4.1.2.1.2 performs automatic Load shedding under a common control system owned by the Responsible Entity, without human operator initiation, of 300 MW or more.

4.1.2.2 Each Special Protection System (SPS) or Remedial Action Scheme (RAS) where the SPS or RAS is subject to one or more requirements in a NERC or Regional Reliability Standard.

4.1.2.3 Each Protection System (excluding UFLS and UVLS) that applies to Transmission where the Protection System is subject to one or more requirements in a NERC or Regional Reliability Standard.

4.1.2.4 Each Cranking Path and group of Elements meeting the initial switching requirements from a Blackstart Resource up to and including the first interconnection point of the starting station service of the next generation unit(s) to be started.

4.1.3 Generator Operator

4.1.4 Generator Owner

Page 94: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 4 of 53

4.1.5 Interchange Coordinator or Interchange Authority

4.1.6 Reliability Coordinator

4.1.7 Transmission Operator

4.1.8 Transmission Owner

4.2. Facilities: For the purpose of the requirements contained herein, the following Facilities, systems, and equipment owned by each Responsible Entity in 4.1 above are those to which these requirements are applicable. For requirements in this standard where a specific type of Facilities, system, or equipment or subset of Facilities, systems, and equipment are applicable, these are specified explicitly.

4.2.1 Distribution Provider: One or more of the following Facilities, systems and equipment owned by the Distribution Provider for the protection or restoration of the BES:

4.2.1.1 Each UFLS or UVLS System that:

4.2.1.1.1 is part of a Load shedding program that is subject to one or more requirements in a NERC or Regional Reliability Standard; and

4.2.1.1.2 performs automatic Load shedding under a common control system owned by the Responsible Entity, without human operator initiation, of 300 MW or more.

4.2.1.2 Each SPS or RAS where the SPS or RAS is subject to one or more requirements in a NERC or Regional Reliability Standard.

4.2.1.3 Each Protection System (excluding UFLS and UVLS) that applies to Transmission where the Protection System is subject to one or more requirements in a NERC or Regional Reliability Standard.

4.2.1.4 Each Cranking Path and group of Elements meeting the initial switching requirements from a Blackstart Resource up to and including the first interconnection point of the starting station service of the next generation unit(s) to be started.

4.2.2 Responsible Entities listed in 4.1 other than Distribution Providers:

All BES Facilities.

4.2.3 Exemptions: The following are exempt from Standard CIP-003-7(i):

4.2.3.1 Cyber Assets at Facilities regulated by the Canadian Nuclear Safety Commission.

Page 95: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 5 of 53

4.2.3.2 Cyber Assets associated with communication networks and data communication links between discrete Electronic Security Perimeters (ESPs).

4.2.3.3 The systems, structures, and components that are regulated by the Nuclear Regulatory Commission under a cyber security plan pursuant to 10 C.F.R. Section 73.54.

4.2.3.4 For Distribution Providers, the systems and equipment that are not included in section 4.2.1 above.

5. Effective Dates:

See Implementation Plan for CIP-003-7(i).

6. Background:

Standard CIP-003 exists as part of a suite of CIP Standards related to cyber security, which require the initial identification and categorization of BES Cyber Systems and require organizational, operational, and procedural controls to mitigate risk to BES Cyber Systems.

The term policy refers to one or a collection of written documents that are used to communicate the Responsible Entities’ management goals, objectives and expectations for how the Responsible Entity will protect its BES Cyber Systems. The use of policies also establishes an overall governance foundation for creating a culture of security and compliance with laws, regulations, and standards.

The term documented processes refers to a set of required instructions specific to the Responsible Entity and to achieve a specific outcome. This term does not imply any naming or approval structure beyond what is stated in the requirements. An entity should include as much as it believes necessary in its documented processes, but it must address the applicable requirements.

The terms program and plan are sometimes used in place of documented processes where it makes sense and is commonly understood. For example, documented processes describing a response are typically referred to as plans (i.e., incident response plans and recovery plans). Likewise, a security plan can describe an approach involving multiple procedures to address a broad subject matter.

Similarly, the term program may refer to the organization’s overall implementation of its policies, plans, and procedures involving a subject matter. Examples in the standards include the personnel risk assessment program and the personnel training program. The full implementation of the CIP Cyber Security Reliability Standards could also be referred to as a program. However, the terms program and plan do not imply any additional requirements beyond what is stated in the standards.

Responsible Entities can implement common controls that meet requirements for multiple high, medium, and low impact BES Cyber Systems. For example, a single

Page 96: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 6 of 53

cyber security awareness program could meet the requirements across multiple BES Cyber Systems.

Measures provide examples of evidence to show documentation and implementation of the requirement. These measures serve to provide guidance to entities in acceptable records of compliance and should not be viewed as an all-inclusive list.

Throughout the standards, unless otherwise stated, bulleted items in the requirements and measures are items that are linked with an “or,” and numbered items are items that are linked with an “and.”

Many references in the Applicability section use a threshold of 300 MW for UFLS and UVLS. This particular threshold of 300 MW for UVLS and UFLS was provided in Version 1 of the CIP Cyber Security Standards. The threshold remains at 300 MW since it is specifically addressing UVLS and UFLS, which are last ditch efforts to save the BES. A review of UFLS tolerances defined within Regional Reliability Standards for UFLS program requirements to date indicates that the historical value of 300 MW represents an adequate and reasonable threshold value for allowable UFLS operational tolerances.

Page 97: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 7 of 53

B. Requirements and Measures R1. Each Responsible Entity shall review and obtain CIP Senior Manager approval at least

once every 15 calendar months for one or more documented cyber security policies that collectively address the following topics: [Violation Risk Factor: Medium] [Time Horizon: Operations Planning]

1.1 For its high impact and medium impact BES Cyber Systems, if any:

1.1.1. Personnel and training (CIP-004);

1.1.2. Electronic Security Perimeters (CIP-005) including Interactive Remote Access;

1.1.3. Physical security of BES Cyber Systems (CIP-006);

1.1.4. System security management (CIP-007);

1.1.5. Incident reporting and response planning (CIP-008);

1.1.6. Recovery plans for BES Cyber Systems (CIP-009);

1.1.7. Configuration change management and vulnerability assessments (CIP-010);

1.1.8. Information protection (CIP-011); and

1.1.9. Declaring and responding to CIP Exceptional Circumstances.

1.2 For its assets identified in CIP-002 containing low impact BES Cyber Systems, if any:

1.2.1. Cyber security awareness;

1.2.2. Physical security controls;

1.2.3. Electronic access controls for Low Impact External Routable Communication (LERC) and Dial-up Connectivity; and

1.2.4. Cyber Security Incident response

M1. Examples of evidence may include, but are not limited to, policy documents; revision history, records of review, or workflow evidence from a document management system that indicate review of each cyber security policy at least once every 15 calendar months; and documented approval by the CIP Senior Manager for each cyber security policy.

R2. Each Responsible Entity with at least one asset identified in CIP-002 containing low impact BES Cyber Systems shall implement one or more documented cyber security plan(s) for its low impact BES Cyber Systems that include the sections in Attachment 1. [Violation Risk Factor: Lower] [Time Horizon: Operations Planning]

Note: An inventory, list, or discrete identification of low impact BES Cyber Systems or their BES Cyber Assets is not required. Lists of authorized users are not required.

Page 98: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 8 of 53

M2. Evidence shall include each of the documented cyber security plan(s) that collectively include each of the sections in Attachment 1 and additional evidence to demonstrate implementation of the cyber security plan(s). Additional examples of evidence per section are located in Attachment 2.

R3. Each Responsible Entity shall identify a CIP Senior Manager by name and document any change within 30 calendar days of the change. [Violation Risk Factor: Medium] [Time Horizon: Operations Planning]

M3. An example of evidence may include, but is not limited to, a dated and approved document from a high level official designating the name of the individual identified as the CIP Senior Manager.

R4. The Responsible Entity shall implement a documented process to delegate authority, unless no delegations are used. Where allowed by the CIP Standards, the CIP Senior Manager may delegate authority for specific actions to a delegate or delegates. These delegations shall be documented, including the name or title of the delegate, the specific actions delegated, and the date of the delegation; approved by the CIP Senior Manager; and updated within 30 days of any change to the delegation. Delegation changes do not need to be reinstated with a change to the delegator. [Violation Risk Factor: Lower] [Time Horizon: Operations Planning]

M4. An example of evidence may include, but is not limited to, a dated document, approved by the CIP Senior Manager, listing individuals (by name or title) who are delegated the authority to approve or authorize specifically identified items.

Page 99: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 9 of 53

C. Compliance 1. Compliance Monitoring Process

1.1. Compliance Enforcement Authority: As defined in the NERC Rules of Procedure, “Compliance Enforcement Authority” (CEA) means NERC or the Regional Entity in their respective roles of monitoring and enforcing compliance with the NERC Reliability Standards.

1.2. Evidence Retention: The following evidence retention periods identify the period of time an entity is required to retain specific evidence to demonstrate compliance. For instances where the evidence retention period specified below is shorter than the time since the last audit, the CEA may ask an entity to provide other evidence to show that it was compliant for the full time period since the last audit.

The Responsible Entity shall keep data or evidence to show compliance as identified below unless directed by its CEA to retain specific evidence for a longer period of time as part of an investigation:

• Each Responsible Entity shall retain evidence of each requirement in this standard for three calendar years.

• If a Responsible Entity is found non-compliant, it shall keep information related to the non-compliance until mitigation is complete and approved or for the time specified above, whichever is longer.

• The CEA shall keep the last audit records and all requested and submitted subsequent audit records.

1.3. Compliance Monitoring and Assessment Processes:

Compliance Audits

Self-Certifications

Spot Checking

Compliance Investigations

Self-Reporting

Complaints

1.4. Additional Compliance Information: None.

Page 100: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 10 of 53

2. Table of Compliance Elements

R # Time Horizon VRF

Violation Severity Levels (CIP-003-7)

Lower VSL Moderate VSL High VSL Severe VSL

R1 Operations Planning

Medium The Responsible Entity documented and implemented one or more cyber security policies for its high impact and medium impact BES Cyber Systems, but did not address one of the nine topics required by R1. (R1.1)

OR

The Responsible Entity did not complete its review of the one or more documented cyber security policies for its high impact and medium impact BES Cyber Systems as required by R1 within 15 calendar months but did

The Responsible Entity documented and implemented one or more cyber security policies for its high impact and medium impact BES Cyber Systems, but did not address two of the nine topics required by R1. (R1.1)

OR

The Responsible Entity did not complete its review of the one or more documented cyber security policies for its high impact and medium impact BES Cyber Systems as required by R1 within 16 calendar months but did

The Responsible Entity documented and implemented one or more cyber security policies for its high impact and medium impact BES Cyber Systems, but did not address three of the nine topics required by R1. (R1.1)

OR

The Responsible Entity did not complete its review of the one or more documented cyber security policies for its high impact and medium impact BES Cyber Systems as required by R1 within 17 calendar months but did complete this review in less than or equal to 18

The Responsible Entity documented and implemented one or more cyber security policies for its high impact and medium impact BES Cyber Systems, but did not address four or more of the nine topics required by R1. (R1.1)

OR

The Responsible Entity did not have any documented cyber security policies for its high impact and medium impact BES Cyber Systems as required by R1. (R1.1)

OR

Page 101: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 11 of 53

R # Time Horizon VRF

Violation Severity Levels (CIP-003-7)

Lower VSL Moderate VSL High VSL Severe VSL

complete this review in less than or equal to 16 calendar months of the previous review. (R1.1)

OR

The Responsible Entity did not complete its approval of the one or more documented cyber security policies for its high impact and medium impact BES Cyber Systems as required by R1 by the CIP Senior Manager within 15 calendar months but did complete this approval in less than or equal to 16 calendar months of the previous approval. (R1.1)

complete this review in less than or equal to 17 calendar months of the previous review. (R1.1)

OR

The Responsible Entity did not complete its approval of the one or more documented cyber security policies for its high impact and medium impact BES Cyber Systems as required by R1 by the CIP Senior Manager within 16 calendar months but did complete this approval in less than or equal to 17 calendar months of the previous approval. (R1.1)

calendar months of the previous review. (R1.1)

OR

The Responsible Entity did not complete its approval of the one or more documented cyber security policies for its high impact and medium impact BES Cyber Systems as required by R1 by the CIP Senior Manager within 17 calendar months but did complete this approval in less than or equal to 18 calendar months of the previous approval. (R1)

OR

The Responsible Entity documented one or more cyber security policies for its assets identified in CIP-002 containing low impact

The Responsible Entity did not complete its review of the one or more documented cyber security policies as required by R1 within 18 calendar months of the previous review. (R1)

OR

The Responsible Entity did not complete its approval of the one or more documented cyber security policies for its high impact and medium impact BES Cyber Systems as required by R1 by the CIP Senior Manager within 18 calendar months of the previous approval. (R1.1)

Page 102: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 12 of 53

R # Time Horizon VRF

Violation Severity Levels (CIP-003-7)

Lower VSL Moderate VSL High VSL Severe VSL

OR

The Responsible Entity documented one or more cyber security policies for its assets identified in CIP-002 containing low impact BES Cyber Systems, but did not address one of the four topics required by R1. (R1.2)

OR

The Responsible Entity did not complete its review of the one or more documented cyber security policies for its assets identified in CIP-002 containing low impact BES Cyber Systems as required by Requirement R1 within 15 calendar

OR

The Responsible Entity documented one or more cyber security policies for its assets identified in CIP-002 containing low impact BES Cyber Systems, but did not address two of the four topics required by R1. (R1.2)

OR

The Responsible Entity did not complete its review of the one or more documented cyber security policies for its assets identified in CIP-002 containing low impact BES Cyber Systems as required by Requirement R1 within 16 calendar

BES Cyber Systems, but did not address three of the four topics required by R1. (R1.2)

OR

The Responsible Entity did not complete its review of the one or more documented cyber security policies for its assets identified in CIP-002 containing low impact BES Cyber Systems as required by R1 within 17 calendar months but did complete this review in less than or equal to 18 calendar months of the previous review. (R1.2)

OR

The Responsible Entity did not complete its approval of the one or more documented cyber security policies for its

OR

The Responsible Entity documented one or more cyber security policies for its assets identified in CIP-002 containing low impact BES Cyber Systems, but did not address any of the four topics required by R1. (R1.2)

OR

The Responsible Entity did not have any documented cyber security policies for its assets identified in CIP-002 containing low impact BES Cyber Systems as required by R1. (R1.2)

OR

Page 103: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 13 of 53

R # Time Horizon VRF

Violation Severity Levels (CIP-003-7)

Lower VSL Moderate VSL High VSL Severe VSL

months but did complete this review in less than or equal to 16 calendar months of the previous review. (R1.2)

OR

The Responsible Entity did not complete its approval of the one or more documented cyber security policies for its assets identified in CIP-002 containing low impact BES Cyber Systems as required by Requirement R1 by the CIP Senior Manager within 15 calendar months but did complete this approval in less than or equal to 16 calendar months of

months but did complete this review in less than or equal to 17 calendar months of the previous review. (R1.2)

OR

The Responsible Entity did not complete its approval of the one or more documented cyber security policies for its assets identified in CIP-002 containing low impact BES Cyber Systems as required by Requirement R1 by the CIP Senior Manager within 16 calendar months but did complete this approval in less than or equal to 17

assets identified in CIP-002 containing low impact BES Cyber Systems as required by Requirement R1 by the CIP Senior Manager within 17 calendar months but did complete this approval in less than or equal to 18 calendar months of the previous approval. (R1.2)

The Responsible Entity did not complete its approval of the one or more documented cyber security policies for its assets identified in CIP-002 containing low impact BES Cyber Systems as required by Requirement R1 by the CIP Senior Manager within 18 calendar months of the previous approval. (R1.2)

Page 104: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 14 of 53

R # Time Horizon VRF

Violation Severity Levels (CIP-003-7)

Lower VSL Moderate VSL High VSL Severe VSL

the previous approval. (R1.2)

calendar months of the previous approval. (R1.2)

R2 Operations Planning

Lower The Responsible Entity documented its cyber security plan(s) for its assets containing low impact BES Cyber Systems, but failed to document cyber security awareness according to Requirement R2, Attachment 1, Section 1. (R2)

OR

The Responsible Entity documented its cyber security plan(s) for its assets containing low impact BES Cyber Systems, but failed to document one or more Cyber Security

The Responsible Entity documented its cyber security plan(s) for its assets containing low impact BES Cyber Systems, but failed to reinforce cyber security practices at least once every 15 calendar months according to Requirement R2, Attachment 1, Section 1. (R2)

OR

The Responsible Entity documented one or more incident response plans within its cyber security plan(s) for its assets containing

The Responsible Entity documented one or more Cyber Security Incident response plans within its cyber security plan(s) for its assets containing low impact BES Cyber Systems, but failed to test each Cyber Security Incident response plan(s) at least once every 36 calendar months according to Requirement R2, Attachment 1, Section 4. (R2)

OR

The Responsible Entity documented the determination of whether an identified Cyber Security Incident is a Reportable Cyber

The Responsible Entity failed to document or and implement one or more cyber security plan(s) for its assets containing low impact BES Cyber Systems according to Requirement R2, Attachment 1. (R2).

Page 105: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 15 of 53

R # Time Horizon VRF

Violation Severity Levels (CIP-003-7)

Lower VSL Moderate VSL High VSL Severe VSL

Incident response plans according to Requirement R2, Attachment 1, Section 4. (R2)

OR

The Responsible Entity documented one or more Cyber Security Incident response plans within its cyber security plan(s) for its assets containing low impact BES Cyber Systems, but failed to update each Cyber Security Incident response plan(s) within 180 days according to Requirement R2, Attachment 1, Section 4. (R2)

OR

low impact BES Cyber Systems, but failed to include the process for identification, classification, and response to Cyber Security Incidents according to Requirement R2, Attachment 1, Section 4. (R2)

OR

The Responsible Entity documented its cyber security plan(s) for its assets containing low impact BES Cyber Systems, but failed to document the determination of whether an identified Cyber Security Incident is a Reportable Cyber Security Incident and

Security Incident, but failed to notify the Electricity Information Sharing and Analysis Center (E-ISAC) according to Requirement R2, Attachment 1, Section 4. (R2)

OR

The Responsible Entity documented electronic access controls for its assets containing low impact BES Cyber Systems, but failed to implement the electronic access controls according to Requirement R2, Attachment 1, Section 3. (R2)

OR

The Responsible Entity documented the physical access controls for its

Page 106: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 16 of 53

R # Time Horizon VRF

Violation Severity Levels (CIP-003-7)

Lower VSL Moderate VSL High VSL Severe VSL

The Responsible Entity documented its plan(s) for Transient Cyber Assets and Removable Media, but failed to manage its Transient Cyber Asset(s) according to Requirement R2, Attachment 1, Section 5.1. (R2)

OR

The Responsible Entity documented its plan(s) for Transient Cyber Assets and Removable Media, but failed to document the Removable Media sections according to Requirement R2, Attachment 1, Section 5.3. (R2)

subsequent notification to the Electricity Information Sharing and Analysis Center (E-ISAC) according to Requirement R2, Attachment 1, Section 4. (R2)

OR

The Responsible Entity documented its cyber security plan(s) for its assets containing low impact BES Cyber Systems, but failed to document physical security controls according to Requirement R2, Attachment 1, Section 2. (R2)

OR

The Responsible Entity documented

assets containing low impact BES Cyber Systems, but failed to implement the physical security controls according to Requirement R2, Attachment 1, Section 2. (R2)

OR

The Responsible Entity documented its plan(s) for Transient Cyber Assets and Removable Media, but failed to implement mitigation for the introduction of malicious code for Transient Cyber Assets managed by the Responsible Entity according to Requirement R2, Attachment 1, Section 5.1. (R2)

OR

Page 107: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 17 of 53

R # Time Horizon VRF

Violation Severity Levels (CIP-003-7)

Lower VSL Moderate VSL High VSL Severe VSL

its cyber security plan(s) for its assets containing low impact BES Cyber Systems, but failed to document electronic access controls according to Requirement R2, Attachment 1, Section 3. (R2)

OR

The Responsible Entity documented its plan(s) for Transient Cyber Assets and Removable Media plan, but failed to document mitigation for the introduction of malicious code for Transient Cyber Assets managed by the Responsible Entity according to Requirement R2,

The Responsible Entity documented its plan(s) for Transient Cyber Assets and Removable Media, but failed to implement mitigation for the introduction of malicious code for Transient Cyber Assets managed by a party other than the Responsible Entity according to Requirement R2, Attachment 1, Section 5.2. (R2)

OR

The Responsible Entity documented its plan(s) for Transient Cyber Assets and Removable Media, but failed to implement mitigation for threat of detected malicious code on the Removable Media prior to connecting

Page 108: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 18 of 53

R # Time Horizon VRF

Violation Severity Levels (CIP-003-7)

Lower VSL Moderate VSL High VSL Severe VSL

Attachment 1, Sections 5.1 and 5.3. (R2)

OR

The Responsible Entity documented its plan(s) for Transient Cyber Assets and Removable Media, but failed to document mitigation for the introduction of malicious code for Transient Cyber Assets managed by a party other than the Responsible Entity according to Requirement R2, Attachment 1, Section 5.2. (R2)

OR

The Responsible Entity documented its plan(s) for

Removable Media to a low impact BES Cyber System according to Requirement R2, Attachment 1, Section 5.3. (R2)

Page 109: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 19 of 53

R # Time Horizon VRF

Violation Severity Levels (CIP-003-7)

Lower VSL Moderate VSL High VSL Severe VSL

Transient Cyber Assets and Removable Media, but failed to implement the Removable Media section(s) according to Requirement R2, Attachment 1, Section 5.3. (R2)

R3 Operations Planning

Medium The Responsible Entity has identified by name a CIP Senior Manager, but did not document changes to the CIP Senior Manager within 30 calendar days but did document this change in less than 40 calendar days of the change. (R3)

The Responsible Entity has identified by name a CIP Senior Manager, but did not document changes to the CIP Senior Manager within 40 calendar days but did document this change in less than 50 calendar days of the change. (R3)

The Responsible Entity has identified by name a CIP Senior Manager, but did not document changes to the CIP Senior Manager within 50 calendar days but did document this change in less than 60 calendar days of the change. (R3)

The Responsible Entity has not identified, by name, a CIP Senior Manager.

OR

The Responsible Entity has identified by name a CIP Senior Manager, but did not document changes to the CIP Senior Manager within 60 calendar days of the change. (R3)

Page 110: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 20 of 53

R # Time Horizon VRF

Violation Severity Levels (CIP-003-7)

Lower VSL Moderate VSL High VSL Severe VSL

R4 Operations Planning

Lower The Responsible Entity has identified a delegate by name, title, date of delegation, and specific actions delegated, but did not document changes to the delegate within 30 calendar days but did document this change in less than 40 calendar days of the change. (R4)

The Responsible Entity has identified a delegate by name, title, date of delegation, and specific actions delegated, but did not document changes to the delegate within 40 calendar days but did document this change in less than 50 calendar days of the change. (R4)

The Responsible Entity has identified a delegate by name, title, date of delegation, and specific actions delegated, but did not document changes to the delegate within 50 calendar days but did document this change in less than 60 calendar days of the change. (R4)

The Responsible Entity has used delegated authority for actions where allowed by the CIP Standards, but does not have a process to delegate actions from the CIP Senior Manager. (R4)

OR

The Responsible Entity has identified a delegate by name, title, date of delegation, and specific actions delegated, but did not document changes to the delegate within 60 calendar days of the change. (R4)

Page 111: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 21 of 53

D. Regional Variances None.

E. Interpretations None.

F. Associated Documents None.

Page 112: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 22 of 53

Version History

Version Date Action Change Tracking

1 1/16/06 R3.2 — Change “Control Center” to “control center.” 3/24/06

2 9/30/09 Modifications to clarify the requirements and to bring the compliance elements into conformance with the latest guidelines for developing compliance elements of standards.

Removal of reasonable business judgment.

Replaced the RRO with the RE as a responsible entity.

Rewording of Effective Date.

Changed compliance monitor to Compliance Enforcement Authority.

3 12/16/09 Updated Version Number from -2 to -3

In Requirement 1.6, deleted the sentence pertaining to removing component or system from service in order to perform testing, in response to FERC order issued September 30, 2009.

3 12/16/09 Approved by the NERC Board of Trustees.

3 3/31/10 Approved by FERC.

4 1/24/11 Approved by the NERC Board of Trustees.

5 11/26/12 Adopted by the NERC Board of Trustees. Modified to coordinate with other CIP standards and to revise format to use RBS Template.

Page 113: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 23 of 53

Version Date Action Change Tracking

5 11/22/13 FERC Order issued approving CIP-003-5.

6 11/13/14 Adopted by the NERC Board of Trustees. Addressed two FERC directives from Order No. 791 related to identify, assess, and correct language and communication networks.

6 2/12/15 Adopted by the NERC Board of Trustees. Replaces the version adopted by the Board on 11/13/2014. Revised version addresses remaining directives from Order No. 791 related to transient devices and low impact BES Cyber Systems.

6 1/21/16 FERC Order issued approving CIP-003-6. Docket No. RM15-14-000

7 TBD Adopted by the NERC Board of Trustees. Revised to address FERC Order 822 directive regarding definition of LERC

Page 114: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 24 of 53

Attachment 1

Required Sections for Cyber Security Plan(s) for Assets Containing Low Impact BES Cyber Systems

Responsible Entities shall include each of the sections provided below in the cyber security plan(s) required under Requirement R2. Responsible Entities with multiple-impact BES Cyber Systems ratings can utilize policies, procedures, and processes for their high or medium impact BES Cyber Systems to fulfill the sections for the development of low impact cyber security plan(s). Each Responsible Entity can develop a cyber security plan(s) either by individual asset or groups of assets. Section 1. Cyber Security Awareness: Each Responsible Entity shall reinforce, at least once

every 15 calendar months, cyber security practices (which may include associated physical security practices).

Section 2. Physical Security Controls: Each Responsible Entity shall control physical access, based on need as determined by the Responsible Entity, to (1) the asset or the locations of the low impact BES Cyber Systems within the asset, and (2) the Cyber Asset(s), as specified by the Responsible Entity, that provide electronic access control(s) implemented for Section 3.1, if any.

Section 3. Electronic Access Controls: Each Responsible Entity shall:

3.1 Implement electronic access control(s) for LERC, if any, to permit only necessary electronic access to low impact BES Cyber System(s).

3.2 Implement authentication for all Dial-up Connectivity, if any, that provides access to low impact BES Cyber Systems, per Cyber Asset capability.

Section 4. Cyber Security Incident Response: Each Responsible Entity shall have one or more Cyber Security Incident response plan(s), either by asset or group of assets, which shall include:

4.1 Identification, classification, and response to Cyber Security Incidents;

4.2 Determination of whether an identified Cyber Security Incident is a Reportable Cyber Security Incident and subsequent notification to the Electricity Information Sharing and Analysis Center (E-ISAC), unless prohibited by law;

4.3 Identification of the roles and responsibilities for Cyber Security Incident response by groups or individuals;

4.4 Incident handling for Cyber Security Incidents;

4.5 Testing the Cyber Security Incident response plan(s) at least once every 36 calendar months by: (1) responding to an actual Reportable Cyber Security Incident; (2) using a drill or tabletop exercise of a Reportable Cyber Security

Page 115: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 25 of 53

Incident; or (3) using an operational exercise of a Reportable Cyber Security Incident; and

4.6 Updating the Cyber Security Incident response plan(s), if needed, within 180 calendar days after completion of a Cyber Security Incident response plan(s) test or actual Reportable Cyber Security Incident.

Rationale for Section 5 of Attachment 1 (Requirement R2):

Requirement R2 mandates that entities develop and implement one or more cyber security plan(s) to meet specific security control objectives for assets containing low impact BES Cyber System(s). In Paragraph 32 of FERC Order No. 822, the Commission directed NERC to “…provide mandatory protection for transient devices used at Low Impact BES Cyber Systems based on the risk posed to bulk electric system reliability.” Transient devices are potential vehicles for introducing malicious code into a facility and subsequently into low impact BES Cyber Systems. Section 5 of Attachment 1 is intended to mitigate the risk of malware propagation to the BES through low impact BES Cyber Systems by requiring entities to develop and implement one or more Transient Cyber Asset and Removable Media Malicious Code Mitigation plan(s). The cyber security plan(s) along with the cyber security policies required under Requirement R1, Part 1.2, provide a framework for operational, procedural, and technical safeguards for low impact BES Cyber Systems.

Section 5. Transient Cyber Asset and Removable Media Malicious Code Mitigation Plan(s): Each Responsible Entity shall implement one or more plan(s) to achieve the objective of mitigating the introduction of malicious code to low impact BES Cyber Systems through the use of Transient Cyber Assets or Removable Media, which shall include:

5.1 For Transient Cyber Asset(s) managed by the Responsible Entity, if any, use of one or a combination of the following methods in an ongoing or on-demand manner (per Transient Cyber Asset capability):

• Antivirus software, including manual or managed updates of signatures or patterns;

• Application whitelisting; or

• Other method(s) to mitigate the introduction of malicious code.

5.2 For Transient Cyber Asset(s) managed by a party other than the Responsible Entity, if any, use of one or a combination of the following methods prior to connecting the Transient Cyber Asset to a low impact BES Cyber System (per Transient Cyber Asset capability):

• Review of antivirus update level;

Page 116: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 26 of 53

• Review of antivirus update process used by the party;

• Review of application whitelisting used by the party;

• Review use of live operating system and software executable only from read-only media;

• Review of system hardening used by the party; or

• Other method(s) to mitigate the introduction of malicious code.

5.3 For Removable Media, perform each of the following:

5.3.1 Use of method(s) to detect malicious code on Removable Media using a Cyber Asset other than a BES Cyber System; and

5.3.2 Mitigation of the threat of detected malicious code on the Removable Media prior to connecting Removable Media to a low impact BES Cyber System.

Page 117: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 27 of 53

Attachment 2

Examples of Evidence for Cyber Security Plan(s) for Assets Containing Low Impact BES Cyber Systems

Section 1. Cyber Security Awareness: An example of evidence for Section 1 may include, but is not limited to, documentation that the reinforcement of cyber security practices occurred at least once every 15 calendar months. The evidence could be documentation through one or more of the following methods:

• Direct communications (for example, e-mails, memos, or computer-based training);

• Indirect communications (for example, posters, intranet, or brochures); or

• Management support and reinforcement (for example, presentations or meetings).

Section 2. Physical Security Controls: Examples of evidence for Section 2 may include, but are not limited to:

• Documentation of the selected access control(s) (e.g., card key, locks, perimeter controls), monitoring controls (e.g., alarm systems, human observation), or other operational, procedural, or technical physical security controls that control physical access to both:

a. The asset, if any, or the locations of the low impact BES Cyber Systems within the asset; and

b. The Cyber Asset specified by the Responsible Entity that provides electronic access controls implemented for Section 3.1, if any.

Section 3. Electronic Access Controls: Examples of evidence for Section 3 may include, but are not limited to:

1. Documentation, such as representative diagrams or lists of implemented electronic access controls (e.g., restricting IP addresses, ports, or services; authenticating users; air-gapping networks; terminating routable protocol sessions on a non-BES Cyber Asset; implementing unidirectional gateways) showing that for LERC at each asset or group of assets containing low impact BES Cyber Systems, is confined only to that access the Responsible Entity deems necessary; and

2. Documentation of authentication for Dial-up Connectivity (e.g., dial out only to a preprogrammed number to deliver data, dial-back modems, modems that must be remotely controlled by the control center or control room, or access control on the BES Cyber System).

Section 4. Cyber Security Incident Response: An example of evidence for Section 4 may include, but is not limited to, dated documentation, such as policies, procedures, or process

Page 118: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 28 of 53

documents of one or more Cyber Security Incident response plan(s) developed either by asset or group of assets that include the following processes:

1. to identify, classify, and respond to Cyber Security Incidents; to determine whether an identified Cyber Security Incident is a Reportable Cyber Security Incident and for notifying the Electricity Information Sharing and Analysis Center (E-ISAC);

2. to identify and document the roles and responsibilities for Cyber Security Incident response by groups or individuals (e.g., initiating, documenting, monitoring, reporting, etc.);

3. for incident handling of a Cyber Security Incident (e.g., containment, eradication, or recovery/incident resolution);

4. for testing the plan(s) along with the dated documentation that a test has been completed at least once every 36 calendar months; and

5. to update, as needed, Cyber Security Incident response plan(s) within 180 calendar days after completion of a test or actual Reportable Cyber Security Incident.

Section 5. Transient Cyber Asset and Removable Media Malicious Code Mitigation Plan(s):

1. Examples of evidence for Section 5.1 may include, but are not limited to, documentation of the method(s) used to mitigate the introduction of malicious code such as antivirus software and processes for managing signature or pattern updates, application whitelisting practices, processes to restrict communication, or other method(s) to mitigate the introduction of malicious code. If a Transient Cyber Asset does not have the capability to use method(s) that mitigate the introduction of malicious code, evidence may include documentation by the vendor or Responsible Entity that identifies that the Transient Cyber Asset does not have the capability.

2. Examples of evidence for Section 5.2 may include, but are not limited to, documentation from change management systems, electronic mail or procedures that document a review of the installed antivirus update level; memoranda, electronic mail, system documentation, policies or contracts from the party other than the Responsible Entity that identify the antivirus update process, the use of application whitelisting, use of live operating systems or system hardening performed by the party other than the Responsible Entity; evidence from change management systems, electronic mail or contracts that identifies the Responsible Entity’s acceptance that the practices of the party other than the Responsible Entity are acceptable; or documentation of other method(s) to mitigate malicious code for Transient Cyber Asset(s) managed by a party other than the Responsible Entity. If a Transient Cyber Asset does not have the capability to use method(s) that mitigate the introduction of malicious code, evidence may include documentation by the Responsible Entity or the party

Page 119: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7(i) - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7(i) July 2016 Page 29 of 53

other than the Responsible Entity that identifies that the Transient Cyber Asset does not have the capability

3. Examples of evidence for Section 5.3.1 may include, but are not limited to, documented process(es) of the method(s) used to mitigate malicious code such as results of scan settings for Removable Media, or implementation of on-demand scanning. Examples of evidence for Section 5.3.2 may include, but are not limited to, documented process(es) for the method(s) used for mitigating the threat of detected malicious code on Removable Media, such as logs from the method(s) used to detect malicious code that show the results of scanning and the mitigation of detected malicious code on Removable Media or documented confirmation by the entity that the Removable Media was deemed to be free of malicious code.

Page 120: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 30 of 53

Guidelines and Technical Basis Section 4 – Scope of Applicability of the CIP Cyber Security Standards Section “4. Applicability” of the standards provides important information for Responsible Entities to determine the scope of the applicability of the CIP Cyber Security Requirements.

Section “4.1. Functional Entities” is a list of NERC functional entities to which the standard applies. If the entity is registered as one or more of the functional entities listed in Section 4.1, then the NERC CIP Cyber Security Standards apply. Note that there is a qualification in Section 4.1 that restricts the applicability in the case of Distribution Providers to only those that own certain types of systems and equipment listed in 4.2.

Section “4.2. Facilities” defines the scope of the Facilities, systems, and equipment owned by the Responsible Entity, as qualified in Section 4.1, that is subject to the requirements of the standard. In addition to the set of BES Facilities, Control Centers, and other systems and equipment, the list includes the set of systems and equipment owned by Distribution Providers. While the NERC Glossary term “Facilities” already includes the BES characteristic, the additional use of the term BES here is meant to reinforce the scope of applicability of these Facilities where it is used, especially in this applicability scoping section. This in effect sets the scope of Facilities, systems, and equipment that is subject to the standards. Requirement R1: In developing policies in compliance with Requirement R1, the number of policies and their content should be guided by a Responsible Entity's management structure and operating conditions. Policies might be included as part of a general information security program for the entire organization, or as components of specific programs. The Responsible Entity has the flexibility to develop a single comprehensive cyber security policy covering the required topics, or it may choose to develop a single high-level umbrella policy and provide additional policy detail in lower level documents in its documentation hierarchy. In the case of a high-level umbrella policy, the Responsible Entity would be expected to provide the high-level policy as well as the additional documentation in order to demonstrate compliance with CIP-003-7, Requirement R1.

If a Responsible Entity has any high or medium impact BES Cyber Systems, the one or more cyber security policies must cover the nine subject matter areas required by CIP-003-7, Requirement R1, Part 1.1. If a Responsible Entity has identified from CIP-002 any assets containing low impact BES Cyber Systems, also referred to herein as BES assets, the one or more cyber security policies must cover the four subject matter areas required by Requirement R1, Part 1.2.

Responsible Entities that have multiple-impact rated BES Cyber Systems are not required to create separate cyber security policies for high, medium, or low impact BES Cyber Systems. The Responsible Entities have the flexibility to develop policies that cover all three impact ratings.

Implementation of the cyber security policy is not specifically included in CIP-003-7, Requirement R1 as it is envisioned that the implementation of this policy is evidenced through successful implementation of CIP-003 through CIP-011. However, Responsible Entities are

Page 121: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 31 of 53

encouraged not to limit the scope of their cyber security policies to only those requirements in NERC cyber security Reliability Standards, but to develop a holistic cyber security policy appropriate for its organization. Elements of a policy that extend beyond the scope of NERC’s cyber security Reliability Standards will not be considered candidates for potential violations although they will help demonstrate the organization’s internal culture of compliance and posture towards cyber security.

For Part 1.1, the Responsible Entity should consider the following for each of the required topics in its one or more cyber security policies for medium and high impact BES Cyber Systems, if any:

1.1.1 Personnel and training (CIP-004)

• Organization position on acceptable background investigations

• Identification of possible disciplinary action for violating this policy

• Account management

1.1.2 Electronic Security Perimeters (CIP-005) including Interactive Remote Access

• Organization stance on use of wireless networks

• Identification of acceptable authentication methods

• Identification of trusted and untrusted resources

• Monitoring and logging of ingress and egress at Electronic Access Points

• Maintaining up-to-date anti-malware software before initiating Interactive Remote Access

• Maintaining up-to-date patch levels for operating systems and applications used to initiate Interactive Remote Access

• Disabling VPN “split-tunneling” or “dual-homed” workstations before initiating Interactive Remote Access

• For vendors, contractors, or consultants: include language in contracts that requires adherence to the Responsible Entity’s Interactive Remote Access controls

1.1.3 Physical security of BES Cyber Systems (CIP-006)

• Strategy for protecting Cyber Assets from unauthorized physical access

• Acceptable physical access control methods

• Monitoring and logging of physical ingress

1.1.4 System security management (CIP-007)

• Strategies for system hardening

• Acceptable methods of authentication and access control

Page 122: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 32 of 53

• Password policies including length, complexity, enforcement, prevention of brute force attempts

• Monitoring and logging of BES Cyber Systems

1.1.5 Incident reporting and response planning (CIP-008)

• Recognition of Cyber Security Incidents

• Appropriate notifications upon discovery of an incident

• Obligations to report Cyber Security Incidents

1.1.6 Recovery plans for BES Cyber Systems (CIP-009)

• Availability of spare components

• Availability of system backups

1.1.7 Configuration change management and vulnerability assessments (CIP-010)

• Initiation of change requests

• Approval of changes

• Break-fix processes

1.1.8 Information protection (CIP-011)

• Information access control methods

• Notification of unauthorized information disclosure

• Information access on a need-to-know basis

1.1.9 Declaring and responding to CIP Exceptional Circumstances

• Processes to invoke special procedures in the event of a CIP Exceptional Circumstance

• Processes to allow for exceptions to policy that do not violate CIP requirements

Requirements relating to exceptions to a Responsible Entity’s security policies were removed because it is a general management issue that is not within the scope of a reliability requirement. It is an internal policy requirement and not a reliability requirement. However, Responsible Entities are encouraged to continue this practice as a component of their cyber security policies.

In this and all subsequent required approvals in the NERC CIP Reliability Standards, the Responsible Entity may elect to use hardcopy or electronic approvals to the extent that there is sufficient evidence to ensure the authenticity of the approving party. Requirement R2: Using the list of assets containing low impact BES Cyber Systems from CIP-002, the intent of the requirement is for each Responsible Entity to create, document, and implement one or more cyber security plan(s) that addresses objective criteria for the protection of low impact BES

Page 123: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 33 of 53

Cyber Systems. The protections required by Requirement R2 reflect the level of risk that misuse or the unavailability of low impact BES Cyber Systems poses to the BES. The intent is that the required protections are part of a program that covers the low impact BES Cyber Systems collectively either at an asset or site level (assets containing low impact BES Cyber Systems), but not at an individual device or system level.

There are four subject matter areas, as identified in Attachment 1, that must be covered by the cyber security plan: (1) cyber security awareness, (2) physical security controls, (3) electronic access controls for LERC and Dial-up Connectivity, and (4) Cyber Security Incident response. Requirement R2, Attachment 1 As noted, Attachment 1 contains the sections that must be in the cyber security plan(s). The intent is to allow entities that have a combination of high, medium, and low impact BES Cyber Systems the flexibility to choose, if desired, to cover their low impact BES Cyber Systems (or any subset) under their programs used for the high or medium impact BES Cyber Systems rather than maintain two separate programs. Guidance for each of the four subject matter areas of Attachment 1 is provided below. Requirement R2, Attachment 1, Section 1 – Cyber Security Awareness The intent of the cyber security awareness program is for entities to reinforce good cyber security practices with their personnel at least once every 15 calendar months. The entity has the discretion to determine the topics to be addressed and the manner in which it will communicate these topics. As evidence of compliance, the Responsible Entity should be able to produce the awareness material that was delivered according to the delivery method(s) (e.g., posters, emails, or topics at staff meetings, etc.). The Responsible Entity is not required to maintain lists of recipients and track the reception of the awareness material by personnel.

Although the focus of the awareness is cyber security, it does not mean that only technology-related topics can be included in the program. Appropriate physical security topics (e.g., tailgating awareness and protection of badges for physical security, or “If you see something, say something” campaigns, etc.) are valid for cyber security awareness. The intent is to cover topics concerning any aspect of the protection of BES Cyber Systems. Requirement R2, Attachment 1, Section 2 – Physical Security Controls The Responsible Entity must document and implement methods to control physical access to (1) the asset or the locations of low impact BES Cyber Systems within the asset, and (2) Cyber Assets that implement the electronic access control(s) specified by the Responsible Entity in Section 3, if any. If these Cyber Assets are located within the BES asset and inherit the same controls outlined in Section 2, this can be noted by the Responsible Entity in either its policies or cyber security plan(s) to avoid duplicate documentation of the same controls.

The Responsible Entity has the flexibility in the selection of the methods used to meet the objective to control physical access to the asset(s) containing low impact BES Cyber System(s) or the low impact BES Cyber Systems themselves, as well as physical protection of the electronic access control Cyber Assets specified by the Responsible Entity, if any. The Responsible Entity may use one or a combination of access controls, monitoring controls, or

Page 124: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 34 of 53

other operational, procedural, or technical physical security controls. Entities may use perimeter controls (e.g., fences with locked gates, guards, or site access policies, etc.) or more granular areas of physical access control in areas where low impact BES Cyber Systems are located, such as control rooms or control houses. User authorization programs and lists of authorized users for physical access are not required although they are an option to meet the security objective.

The objective is to control the physical access based on need as determined by the Responsible Entity. The need can be documented at the policy level for access to the site or systems. The requirement does not obligate an entity to specify a need for each access or authorization of a user for access.

Monitoring as a physical security control can be used as a complement or an alternative to access control. Examples of monitoring controls include, but are not limited to: (1) alarm systems to detect motion or entry into a controlled area, or (2) human observation of a controlled area. Monitoring does not necessarily require logging and maintaining logs but could include monitoring that physical access has occurred or been attempted (e.g., door alarm, or human observation, etc.). The monitoring does not need to be per low impact BES Cyber System but should be at the appropriate level to meet the security objective. Requirement R2, Attachment 1, Section 3 – Electronic Access Controls Section 3 requires the establishment of electronic access controls for assets containing low impact BES Cyber Systems, also referred to herein as BES assets when external routable protocol communication (LERC) or Dial-up Connectivity is present to or from the asset containing the low impact BES Cyber System(s). The establishment of electronic access controls is intended to reduce the risks associated with uncontrolled communication using routable protocols or Dial-up Connectivity. In the case where there is no LERC or Dial-up Connectivity, the Responsible Entity can document the absence of such communication in its low impact cyber security plan(s).

When identifying electronic access controls, Responsible Entities are provided flexibility in the selection of the controls that meet their operational needs while meeting the security objective of allowing only necessary electronic access to low impact BES Cyber Systems.

In essence, Responsible Entities are to determine LERC or Dial-up Connectivity for their BES assets and then, if present, document and implement electronic access control(s). Determining LERC The defined term Low Impact External Routable Communication (LERC) is used to avoid confusion with the term External Routable Connectivity (ERC) used for high and medium impact BES Cyber Systems as these terms are different concepts. The input to this requirement from CIP-002 is a list of assets containing low impact BES Cyber Systems, therefore LERC is an attribute of a BES asset and involves routable protocol communications to or from the BES asset (crossing the asset boundary) without regard to connectivity to Cyber Assets within the BES asset. ERC on the other hand is an attribute of an individual high or medium impact BES Cyber System and is relative to an Electronic Security Perimeter (ESP).

Page 125: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 35 of 53

With LERC being a BES asset level attribute, it is used as a higher level filter to exclude from further consideration those assets containing low impact BES Cyber Systems that have no routable protocol communications to them from outside the BES asset. Responsible Entities can then concentrate their electronic access control efforts on those BES assets that do have LERC. However, this also means that LERC can exist for a BES asset even if there is no routable protocol connectivity to any low impact BES Cyber System within the BES asset. In order to avoid future technology issues, the LERC definition specifically excludes communications between intelligent electronic devices that use routable communication protocols for time-sensitive protection or control functions between non-Control Center BES assets containing low impact BES Cyber Systems, such as IEC 61850 messaging. This does not exclude Control Center to field communication but rather excludes the communication between the intelligent electronic devices (e.g. relays) in the field. A Responsible Entity using this technology is not expected to implement the electronic access controls noted herein. This exception was included so as not to inhibit the functionality of the time-sensitive requirements related to this technology nor to preclude the use of such time-sensitive reliability enhancing functions if they use a routable protocol in the future. Determining Asset Boundary As LERC is a BES asset level attribute, it involves a determination by the Responsible Entity of a BES asset boundary for their assets containing low impact BES Cyber Systems. This boundary will vary by BES asset type (Control Center, substation, generation resource) and the specific configuration of the BES asset. The intent is for the Responsible Entity to define the BES asset boundary such that the low impact BES Cyber System(s) that are located at the BES asset are contained within the BES asset boundary. This is strictly for determining what constitutes the BES “asset” and for determining which routable protocol communications and networks are internal or inside or local to the BES asset and which are external to or outside the BES asset. This is not an Electronic Security Perimeter or Physical Security Perimeter as defined for medium and high impact BES Cyber Systems. For the asset containing low impact BES Cyber System(s), the BES asset boundary is synonymous to the concept of a “logical border” demarcation where routable protocol communication (e.g. LERC) enters and exits the BES asset containing the low impact BES Cyber System. Some examples of ways a Responsible Entity may determine BES asset boundaries are:

• For Control Centers

o Designated areas (room(s) or floor(s)) if the Control Center is located within a larger building.

o A building if in a dedicated building on a shared campus.

o The property/fence line if the Control Center is a dedicated facility on dedicated property.

• For substations, this could be the property/fence line or the control house.

Page 126: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 36 of 53

• For generation resources:

o Fossil/hydro generating facilities: This could be the property/fence line. If pumps or wells or other equipment that are part of the plant asset are outside the property line, then the BES asset boundary could expand to accommodate all that is considered part of the plant.

o Solar farms: This could be the property line(s) or fence(s) surrounding all solar panels and interconnection facilities.

o Wind farms: This could be the collection of individual turbines plus the equipment needed for interconnection.

o Cogeneration facilities: This could be the identified portion of the larger plant that performs generation.

Determining Electronic Access Controls Once a Responsible Entity has determined that LERC exists at the BES asset boundary, the Responsible Entity documents and implements its chosen electronic access control(s). The control(s) must allow only “necessary” access as determined by the Responsible Entity and they need to be able to explain the reasons for the electronic access permitted with their electronic access controls. The reasoning for the “necessary” access controls can be documented within the Responsible Entity’s cyber security plan(s) or other policies or procedures associated with the electronic access controls. Concept Diagrams The diagrams on the following pages are provided as examples to illustrate various electronic access controls at a conceptual level. Regardless of the concepts or configurations chosen by the Responsible Entity, the security objective of permitting only necessary access to low impact BES Cyber Systems must be met when there is LERC to a BES asset. NOTE:

• This is not an exhaustive list of applicable concepts.

• LERC is present in each diagram.

• The same legend is used in each diagram; however, the diagram may not contain all of the articles represented in the legend.

• The term “BES Asset Boundary” is capitalized in the diagrams but it is not a defined term.

Page 127: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 37 of 53

LERC Reference Model 1 – Physical Isolation The Responsible Entity may choose to physically isolate the low impact BES Cyber System(s) from the LERC. This control is commonly referred to as an ‘air gap’. The serial non-routable protocol connection and the routable protocol LERC are completely isolated from each other. There is no equipment shared with the low impact BES Cyber System(s).

BES Asset Boundary

SerialNon-routable

Protocol

Non-BES Cyber Asset

Non-BES Cyber Asset

RoutableProtocol

Air Gap

LERC

Low impactBES Cyber

System

Low impactBES Cyber

System

Non-BES Cyber Asset

Routable Protocol Routable ProtocolData FlowNon-routable Protocol

Reference Model 1

Page 128: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 38 of 53

LERC Reference Model 2 – Logical Isolation The Responsible Entity may choose to logically isolate the low impact BES Cyber System(s) from the LERC. The low impact BES Cyber System(s) is on an isolated network segment with logical controls preventing routable protocol communication into or out of the network containing the low impact BES Cyber System(s).

BES Asset Boundary

RoutableProtocol

LERC

Network Devicewith logical network segmentation

Low impactBES Cyber

System

Non-BES Cyber Asset

Non-BES Cyber Asset

Low impactBES Cyber

System

Control Network Segment Non-Control Network Segment

`

Routable Protocol Routable ProtocolData FlowNon-routable Protocol

Reference Model 2

Page 129: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 39 of 53

LERC Reference Model 3 – Host-based Inbound & Outbound Access Permissions The Responsible Entity may choose to utilize a host-based firewall technology on the low impact BES Cyber System(s) that manages electronic access permission so that only necessary inbound and outbound routable protocol access is allowed to the low impact BES Cyber System(s).

BES Asset Boundary

RoutableProtocol

LERC

Low impactBES Cyber

System

Routable Protocol Routable ProtocolData FlowNon-routable Protocol

Reference Model 3

Page 130: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 40 of 53

LERC Reference Model 4 – Network-based Inbound & Outbound Access Permissions The Responsible Entity may choose to utilize a security device that permits only necessary access to the low impact BES Cyber System(s) within the BES asset. In this example, two low impact BES Cyber Systems are accessed over the LERC as the IP/Serial converter is continuing the same communications session from device(s) outside the BES asset boundary to the low impact BES Cyber Systems. The security device provides the electronic access controls to permit only necessary inbound and outbound routable protocol access to the low impact BES Cyber Systems.

BES Asset Boundary

LERC

SerialNon-Routable

Protocol

Low impactBES Cyber

System

Network

Low impactBES Cyber

System

IP/SerialConverter

RoutableProtocol

Routable Protocol Routable ProtocolData FlowNon-routable Protocol

Reference Model 4

Page 131: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 41 of 53

LERC Reference Model 5 – Centralized Network-based Inbound & Outbound Access Permissions The Responsible Entity may choose to utilize a security device at a centralized location that may or may not be another BES asset. The electronic access control(s) do not necessarily have to reside inside the asset containing the low impact BES Cyber System(s). A security device is in place at “Location X” to act as the electronic access control and permit only necessary inbound and outbound routable protocol access to the low impact BES Cyber System(s). Care should be taken that electronic access to or between each BES asset is through the electronic access controls at the centralized location.

Reference Model 5

Location X

BES Asset Boundary BES Asset Boundary

LERCLERC

`

Firewall, Router Access Control List,Gateway or Other Security Device

RoutableProtocol

RoutableProtocol

Network Network

Non BES CyberSystsem

Low impactBES Cyber

SystemNon BES Cyber

System

Low impactBES Cyber

System

RoutableProtocol

Routable Protocol Routable ProtocolData FlowNon-routable Protocol

Page 132: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 42 of 53

LERC Reference Model 6 – Uni-directional Gateway The Responsible Entity may choose to utilize a uni-directional gateway as the electronic access control. The low impact BES Cyber System(s) is not accessible (data cannot flow into the low impact BES Cyber System) from the LERC due to the implementation of a “one-way” (uni-directional) path for data to flow across the BES asset boundary.

BES Asset Boundary

RoutableProtocol

LERC

Low impactBES Cyber

System

Uni-directionalGateway

Routable Protocol Routable ProtocolData FlowNon-routable Protocol

Reference Model 6

Page 133: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 43 of 53

LERC Reference Model 7 – User Authentication The Responsible Entity may choose to utilize a non-BES Cyber Asset between the network outside the BES asset boundary and the low impact BES Cyber System to perform user authentication for interactive access. The non-BES Cyber Asset would require authentication before establishing a new connection to the low impact BES Cyber System. The electronic access control depicted in this reference model may not meet the security objective for controlling device-to-device communication across the LERC depending on the specific system configuration in place.

BES Asset Boundary

RoutableProtocol

LERC

Low impactBES Cyber

System

Non-BES Cyber AssetPerforming Authentication

Routable Protocol Routable ProtocolData FlowNon-routable Protocol

Reference Model 7

Page 134: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 44 of 53

LERC Reference Model 8 – Session Termination The Responsible Entity may choose to terminate routable protocol application sessions at a non-BES Cyber Asset inside the asset containing the low impact BES Cyber System(s) such that a separate application session is established to the low impact BES Cyber System(s) from the non-BES Cyber Asset (the routable session from outside the BES asset). The Responsible Entity may choose to authenticate access at a non-BES Cyber Asset either outside BES asset boundary or inside the asset containing the low impact BES Cyber System(s) such that unauthenticated access to the low impact BES Cyber System(s) is prohibited. The non-BES Cyber Asset sits on a demilitarized zone (DMZ) between the network outside the BES asset boundary and the low impact BES Cyber System(s). The non-BES Cyber Asset in the DMZ terminates the routable protocol session and establishes a new session to the low impact BES Cyber System(s). Additionally, a security device permits traffic from the network outside the BES asset boundary to flow only to and from the non-BES Cyber Asset in the DMZ (the routable session to the low impact BES Cyber System).

Reference Model 8

BES Asset Boundary

Network

Low impactBES Cyber

System

DMZ

Non-BES Cyber Asset(Separate routable protocolsessions for each data flow)

RoutableProtocol

Firewall, Router Access Control List,Gateway or Other Security Device

LERC

Routable Protocol Routable ProtocolData FlowNon-routable Protocol

Page 135: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 45 of 53

LERC Reference Model 9 – LERC and ERC There is both LERC and ERC present in this reference model because there is at least one medium impact BES Cyber System and one low impact BES Cyber System within the BES asset. The Responsible Entity may choose to leverage an interface on the medium impact Electronic Access Control or Monitoring Systems (EACMS) device to provide electronic access controls for the LERC. The EACMS is therefore performing multiple functions – as a medium impact EACMS and as implementing low impact electronic access controls.

BES Asset Boundary

Firewall, Router Access Control List,Gateway or Other Security Device

Network

Non BES CyberSystem

Low impactBES Cyber

System

RoutableProtocol

Network

Medium impactBES Cyber

System with ERC

EAP Interface

ESP

LERC

ERC

Routable Protocol Routable ProtocolData FlowNon-routable Protocol

Reference Model 9

Page 136: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 46 of 53

Dial-up Connectivity Dial-up Connectivity to a low impact BES Cyber System is set to dial out only (no auto-answer) to a preprogrammed number to deliver data. Incoming Dial-up Connectivity is to a dialback modem, a modem that must be remotely controlled by the control center or control room, has some form of access control, or the low impact BES Cyber System has access control. Insufficient Access Controls Some examples of situations that would lack sufficient access controls to meet the intent of this requirement include:

• An asset has Dial-up Connectivity and a low impact BES Cyber System is reachable via an auto-answer modem that connects any caller to the Cyber Asset that has a default password. There is no practical access control in this instance.

• An asset has LERC due to a BES Cyber System within it having a wireless card on a public carrier that allows the BES Cyber System to be reachable via a public IP address. In essence, low impact BES Cyber Systems should not be accessible from the Internet and search engines such as Shodan.

• Dual-homing or multiple-network interface cards without disabling IP forwarding in the non-BES Cyber Asset within the DMZ to provide separation between the low impact BES Cyber System(s) and the external network would not meet the intent of “controlling” inbound and outbound electronic access assuming there was no other host-based firewall or other security devices on the non-BES Cyber Asset.

Requirement R2, Attachment 1, Section 4 – Cyber Security Incident Response The entity should have one or more documented Cyber Security Incident response plan(s) that include each of the topics listed in Section 4. If, in the normal course of business, suspicious activities are noted at an asset containing low impact BES Cyber System(s), the intent is for the entity to implement a Cyber Security Incident response plan that will guide the entity in responding to the incident and reporting the incident if it rises to the level of a Reportable Cyber Security Incident.

Entities are provided the flexibility to develop their Attachment 1, Section 4 Cyber Security Incident response plan(s) by asset or group of assets. The plans do not need to be on a per asset site or per low impact BES Cyber System basis. Entities can choose to use a single enterprise-wide plan to fulfill the obligations for low impact BES Cyber Systems.

The plan(s) must be tested once every 36 months. This is not an exercise per low impact BES Cyber Asset or per type of BES Cyber Asset but rather is an exercise of each incident response plan the entity created to meet this requirement. An actual Reportable Cyber Security Incident counts as an exercise as do other forms of tabletop exercises or drills. NERC-led exercises such as GridEx participation would also count as an exercise provided the entity’s response plan is followed. The intent of the requirement is for entities to keep the Cyber Security Incident response plan(s) current, which includes updating the plan(s), if needed, within 180 days following a test or an actual incident.

Page 137: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 47 of 53

For low impact BES Cyber Systems, the only portion of the definition of Cyber Security Incident that would apply is‚ “A malicious act or suspicious event that disrupts, or was an attempt to disrupt, the operation of a BES Cyber System.” The other portion of that definition is not to be used to require ESPs and PSPs for low impact BES Cyber Systems. Requirement R2, Attachment 1, Section 5 – Transient Cyber Assets and Removable Media Malicious Code Mitigation Plan(s) Most BES Cyber Assets and BES Cyber Systems are isolated from external public or untrusted networks, and therefore require Transient Cyber Assets and Removable Media to transport files to and from secure areas to maintain, monitor, or troubleshoot critical systems. Transient Cyber Assets and Removable Media are a potential means for cyber-attack. To protect the BES Cyber Assets and BES Cyber Systems, CIP-003, R2 Attachment 1, Section 5 requires entities to document and implement a plan for how they will mitigate the risk of malicious code introduction to BES Cyber Systems from Transient Cyber Assets and Removable Media. The approach of defining a plan allows the Responsible Entity to document processes that are supportable within its organization and in alignment with its change management processes.

Transient Cyber Assets can be one of many types of devices from a specially-designed device for maintaining equipment in support of the BES to a platform such as a laptop, desktop, or tablet that may interface with or run applications that support BES Cyber Systems and is capable of transmitting executable code to the BES Cyber Asset(s) or BES Cyber System(s). Removable Media in scope of this requirement can be in the form of floppy disks, compact disks, USB flash drives, external hard drives, and other flash memory cards/drives that contain nonvolatile memory.

Examples of these temporarily connected devices include, but are not limited to:

• Diagnostic test equipment;

• Equipment used for BES Cyber System maintenance; or

• Equipment used for BES Cyber System configuration.

The attachment was created to specify the capabilities and possible security methods available to Responsible Entities based upon asset type and ownership.

With the list of options provided in Attachment 1 for each control area, the entity has the discretion to use the option(s) that is most appropriate. This includes documenting its approach for how and when the entity reviews the Transient Cyber Asset under its control or under the control of parties other than the Responsible Entity. The entity should avoid implementing a security function that jeopardizes reliability by taking actions that would negatively impact the performance or support of the Transient Cyber Asset or BES Cyber Asset.

Page 138: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 48 of 53

Vulnerability Mitigation The terms “mitigate”, “mitigating”, and “mitigation” are used in the sections in Attachment 1 to address the risks posed by malicious code when connecting Transient Cyber Assets and Removable Media to BES Cyber Systems. Mitigation in this context does not require that each vulnerability be individually addressed or remediated, as many may be unknown or not have an impact on the system to which the Transient Cyber Asset or Removable Media is connected. Mitigation is meant to reduce security risks presented by connecting the Transient Cyber Asset.

Per Transient Cyber Asset Capability As with other CIP standards, the requirements are intended for an entity to use the method(s) that the system is capable of performing. The use of “per Transient Cyber Asset capability” is to eliminate the need for a Technical Feasibility Exception when it is understood that the device cannot use a method(s). For example, for malicious code, many types of appliances are not capable of implementing antivirus software; therefore, because it is not a capability of those types of devices, implementation of the antivirus software would not be required for those devices.

Requirement R2, Attachment 1, Section 5.1 - Transient Cyber Asset(s) Managed by the Responsible Entity For Transient Cyber Assets and Removable Media that are connected to both low impact and medium/high impact BES Cyber Systems, entities must be aware of the differing levels of requirements and should consider managing these assets under the program that matches the highest impact level to which they will connect.

Section 5.1: Entities are to document and implement their process(es) to mitigate malicious code through the use of one or more of the protective measures listed. This needs to be applied based on the capability of the Transient Cyber Asset. When addressing malicious code protection, the Responsible Entity should address methods deployed to mitigate the introduction of malicious code. The Responsible Entity has the flexibility to apply the selected method(s) to meet the objective of mitigating the introductions of malicious code either in an on-going or in an on-demand manner. An example of a managed device in an on-going manner is one that has an antivirus solution that is managed as part of an end-point security solution with current signature or pattern updates, regularly scheduled systems scans, etc. An example of managing a device in an on-demand manner may be for devices that are used infrequently whereas the signatures or patterns are not kept current which requires an update to the signatures or patterns and a scan of the device before the device is connected to ensure that it is free of malicious code. Selecting management in an on-going or on-demand manner is not intended to imply that the control has to be verified at every single connection. For example, if the device is managed in an on-demand manner, but will be used to perform maintenance on several BES Cyber Asset(s), the Responsible Entity may choose to document that the Transient Cyber Asset has been updated before being connected as a Transient Cyber Asset for the first use of that maintenance work. If malicious code is discovered, it must be removed or mitigated to prevent it from being introduced into the BES Cyber Asset or BES Cyber System. Entities should also consider whether the detected malicious code is a Cyber Security Incident.

Page 139: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 49 of 53

• Antivirus software, including manual or managed updates of signatures or patterns, provides flexibility to manage Transient Cyber Asset(s) by deploying antivirus or endpoint security tools that maintain a scheduled update of the signatures or patterns. Also, for devices that do not regularly connect to receive scheduled updates, entities may choose to update the signatures or patterns and scan the Transient Cyber Asset prior to connection to ensure no malicious software is present.

• Application whitelisting is a method of authorizing only the applications and processes that are necessary on the Transient Cyber Asset. This reduces the risk that malicious software could execute on the Transient Cyber Asset and impact the BES Cyber Asset or BES Cyber System.

• When selecting to use other methods that mitigate the introduction of malicious code to those listed, entities need to have documentation that identifies how the other method(s) meet the mitigation of the introduction of malicious code objective.

Requirement R4, Attachment 1, Section 5.2 - Transient Cyber Asset(s) Managed by a Party Other than the Responsible Entity The attachment also recognizes the lack of control for Transient Cyber Assets that are managed by parties other than the Responsible Entity. However, this does not obviate the Responsible Entity’s responsibility to ensure that methods have been deployed to mitigate the introduction of malicious code on Transient Cyber Assets it does not manage. The requirements listed herein allow entities the ability to review the assets to the best of their capability and to meet their obligations. The use of “prior to connecting the Transient Cyber Assets” is intended to ensure that the Responsible Entity conducts the review before the first connection of the Transient Cyber Asset to ensure that the Transient Cyber Asset is meeting the objective to mitigate the introduction of malicious code. It is not intended that a Responsible Entity conduct a review for every single connection of that Transient Cyber Asset once the Responsible Entity has established the Transient Cyber Asset is meeting the security objective.

To facilitate these controls, Responsible Entities may choose to execute agreements with other parties to provide support services to BES Cyber Systems and BES Cyber Assets that may involve the use of Transient Cyber Assets. Entities may consider using the Department of Energy Cybersecurity Procurement Language for Energy Delivery dated April 2014.1 Procurement language may unify the other party and entity actions supporting the BES Cyber Systems and BES Cyber Assets. CIP program attributes may be considered including roles and responsibilities, access controls, monitoring, logging, vulnerability, and patch management along with incident response and back up recovery may be part of the other party’s support. Entities should consider the “General Cybersecurity Procurement Language” and “The Supplier’s Life Cycle Security Program” when drafting Master Service Agreements, Contracts, and the CIP program processes and controls.

1 http://www.energy.gov/oe/downloads/cybersecurity-procurement-language-energy-delivery-april-2014

Page 140: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 50 of 53

Section 5.2: Entities are to document and implement their process(es) to mitigate the introduction of malicious code through the use of one or more of the protective measures listed.

• Review the use of antivirus software and signature or pattern levels to ensure that the level is adequate to the Responsible Entity to mitigate the risk of malicious software being introduced to an applicable system.

• Review the antivirus or endpoint security processes of the other party to ensure that their processes are adequate to the Responsible Entity to mitigate the risk of introducing malicious software to an applicable system.

• Review the use of application whitelisting used by the other party to mitigate the risk of introducing malicious software to an applicable system.

• Review the use of live operating systems or software executable only from read-only media to ensure that the media is free from malicious software itself. Entities should review the processes to build the read-only media as well as the media itself.

• Review system hardening practices used by the other party to ensure that unnecessary ports, services, applications, etc. have been disabled or removed. This will reduce the attack surface on the Transient Cyber Asset and reduce the avenues by which malicious software could be introduced.

Requirement R4, Attachment 1, Section 5.3 - Removable Media Entities have a high level of control for Removable Media that are going to be connected to their BES Cyber Assets.

Section 5.3: Entities are to document and implement their process(es) to mitigate the introduction of malicious code through the use of one or more method(s) to detect malicious code on the Removable Media before it is connected to a BES Cyber Asset. When using the method(s) to detect malicious code, it is expected to occur from a system that is not part of the BES Cyber System to reduce the risk of propagating malicious code into the BES Cyber System network or onto one of the BES Cyber Assets. If malicious code is discovered, it must be removed or mitigated to prevent it from being introduced into the BES Cyber Asset or BES Cyber System. Entities should also consider whether the detected malicious code is a Cyber Security Incident. Frequency and timing of the methods used to detect malicious code were intentionally excluded from the requirement because there are multiple timing scenarios that can be incorporated into a plan to mitigate the risk of malicious code.

As a method to detect malicious code, entities may choose to use Removable Media with on-board malicious code detection tools. For these tools, the Removable Media are still used in conjunction with a Cyber Asset to perform the detection. For Section 5.3.1, the Cyber Asset used to perform the malicious code detection must be outside of the BES Cyber System.

Page 141: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 51 of 53

Requirement R3: The intent of CIP-003-7, Requirement R3 is effectively unchanged since prior versions of the standard. The specific description of the CIP Senior Manager has now been included as a defined term rather than clarified in the Reliability Standard itself to prevent any unnecessary cross-reference to this standard. It is expected that the CIP Senior Manager will play a key role in ensuring proper strategic planning, executive/board-level awareness, and overall program governance. Requirement R4: As indicated in the rationale for CIP-003-7, Requirement R4, this requirement is intended to demonstrate a clear line of authority and ownership for security matters. The intent of the SDT was not to impose any particular organizational structure, but, rather, the intent is to afford the Responsible Entity significant flexibility to adapt this requirement to its existing organizational structure. A Responsible Entity may satisfy this requirement through a single delegation document or through multiple delegation documents. The Responsible Entity can make use of the delegation of the delegation authority itself to increase the flexibility in how this applies to its organization. In such a case, delegations may exist in numerous documentation records as long as the collection of these documentation records shows a clear line of authority back to the CIP Senior Manager. In addition, the CIP Senior Manager could also choose not to delegate any authority and meet this requirement without such delegation documentation.

The Responsible Entity must keep its documentation of the CIP Senior Manager and any delegations up-to-date. This is to ensure that individuals do not assume any undocumented authority. However, delegations do not have to be re-instated if the individual who delegated the task changes roles or the individual is replaced. For instance, assume that John Doe is named the CIP Senior Manager and he delegates a specific task to the Substation Maintenance Manager. If John Doe is replaced as the CIP Senior Manager, the CIP Senior Manager documentation must be updated within the specified timeframe, but the existing delegation to the Substation Maintenance Manager remains in effect as approved by the previous CIP Senior Manager, John Doe. Rationale: During development of this standard, text boxes were embedded within the standard to explain the rationale for various parts of the standard. Upon BOT approval, the text from the rationale text boxes was moved to this section. Rationale for Requirement R1: One or more security policies enable effective implementation of the requirements of the cyber security Reliability Standards. The purpose of policies is to provide a management and governance foundation for all requirements that apply to a Responsible Entity’s BES Cyber Systems. The Responsible Entity can demonstrate through its policies that its management supports the accountability and responsibility necessary for effective implementation of the requirements.

Page 142: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 52 of 53

Annual review and approval of the cyber security policies ensures that the policies are kept-up-to-date and periodically reaffirms management’s commitment to the protection of its BES Cyber Systems. Rationale for Requirement R2: In response to FERC Order No. 791, Requirement R2 requires entities to develop and implement cyber security plans to meet specific security control objectives for assets containing low impact BES Cyber System(s). The cyber security plan(s) covers four subject matter areas: (1) cyber security awareness; (2) physical security controls; (3) electronic access controls; and (4) Cyber Security Incident response. This plan(s), along with the cyber security policies required under Requirement R1, Part 1.2, provides a framework for operational, procedural, and technical safeguards for low impact BES Cyber Systems.

Considering the varied types of low impact BES Cyber Systems across the BES, Attachment 1 provides Responsible Entities flexibility on how to apply the security controls to meet the security objectives. Additionally, because many Responsible Entities have multiple-impact rated BES Cyber Systems, nothing in the requirement prohibits entities from using their high and medium impact BES Cyber System policies, procedures, and processes to implement security controls required for low impact BES Cyber Systems, as detailed in Requirement R2, Attachment 1.

Responsible Entities will use their identified assets containing low impact BES Cyber System(s) (developed pursuant to CIP-002) to substantiate the sites or locations associated with low impact BES Cyber System(s). However, there is no requirement or compliance expectation for Responsible Entities to maintain a list(s) of individual low impact BES Cyber System(s) and their associated cyber assets or to maintain a list of authorized users. Rationale for Requirement R3: The identification and documentation of the single CIP Senior Manager ensures that there is clear authority and ownership for the CIP program within an organization, as called for in Blackout Report Recommendation 43. The language that identifies CIP Senior Manager responsibilities is included in the Glossary of Terms used in NERC Reliability Standards so that it may be used across the body of CIP standards without an explicit cross-reference.

FERC Order No. 706, Paragraph 296, requests consideration of whether the single senior manager should be a corporate officer or equivalent. As implicated through the defined term, the senior manager has “the overall authority and responsibility for leading and managing implementation of the requirements within this set of standards” which ensures that the senior manager is of sufficient position in the Responsible Entity to ensure that cyber security receives the prominence that is necessary. In addition, given the range of business models for responsible entities, from municipal, cooperative, federal agencies, investor owned utilities, privately owned utilities, and everything in between, the SDT believes that requiring the CIP Senior Manager to be a “corporate officer or equivalent” would be extremely difficult to interpret and enforce on a consistent basis.

Page 143: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7(i) July 2016 Page 53 of 53

Rationale for Requirement R4: The intent of the requirement is to ensure clear accountability within an organization for certain security matters. It also ensures that delegations are kept up-to-date and that individuals do not assume undocumented authority.

In FERC Order No. 706, Paragraphs 379 and 381, the Commission notes that Recommendation 43 of the 2003 Blackout Report calls for “clear lines of authority and ownership for security matters.” With this in mind, the Standard Drafting Team has sought to provide clarity in the requirement for delegations so that this line of authority is clear and apparent from the documented delegations.

Page 144: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7 July 2016 Page 1 of 45

Standard Development Timeline

This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Description of Current Draft This draft of CIP-003-7 is addressing the directive issued by the Federal Energy Regulatory Commission (Commission) in paragraph 73 of Order No. 822 which reads:

[T]he Commission concludes that a modification to the Low Impact External Routable Connectivity definition to reflect the commentary in the Guidelines and Technical Basis section of CIP-003-6 is necessary to provide needed clarity to the definition and eliminate ambiguity surrounding the term “direct” as it is used in the proposed definition. Therefore, pursuant to section 215(d)(5) of the FPA, we direct NERC to develop a modification to provide the needed clarity, within one year of the effective date of this Final Rule approving revisions to the cybersecurity Critical Infrastructure Protection (CIP) standards.

Previously, the Guidelines and Technical Basis had approximately 10 pages of explanation and numerous reference models to describe different forms of direct vs. indirect access that could be used to determine whether Low Impact External Routable Connectivity existed and thus whether a Low Impact BES Cyber System Electronic Access Point (LEAP) was required. In this revision, the term Low Impact External Routable Connectivity has been changed to Low Impact External Routable Communication (LERC) and simplified so that it is an attribute of a BES asset concerning whether there is routable protocol communications across the asset boundary without regard to 'direct vs. indirect' access that may occur. This greatly simplifies and clarifies the definition of LERC. It removes the dependency between the electronic access controls that may be in place and having those controls determine whether LERC exists or not. For those BES assets that have LERC, the standard drafting team (SDT) changed the requirement from requiring a LEAP to requiring electronic access controls to “permit only necessary electronic access to low impact BES Cyber Systems” (revised Attachment 1, Section 3.1) within the BES asset and expanded the Guidelines and Technical Basis with numerous examples of electronic access controls. Given the modified definition of LERC and the proposed modifications in Reliability CIP-003-7, there is no longer a need for the NERC Glossary term Low Impact BES Cyber System Electronic Access Point (LEAP). Consequently, NERC is proposing that term for retirement.

In summary, the CIP SDT revised CIP-003-7, Attachments 1 and 2, Sections 2 and 3 and the associated High VSL for Requirement R2. Non-substantive errata changes were also made within the standard, including changing “ES-ISAC” to “E-ISAC”.

Agenda Item 6c Standards Committee October 19, 2016

Page 145: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7 July 2016 Page 2 of 45

Completed Actions Date

Standard Authorization Request (SAR) approved July 20, 2016

Draft 1 of CIP-003-7 posted for formal comment and initial ballot July 21 – September 6, 2016

Anticipated Actions Date

10-day final ballot October, 2016

NERC Board of Trustees (Board) adoption November, 2016

Page 146: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7 July 2016 Page 3 of 45

A. Introduction 1. Title: Cyber Security — Security Management Controls

2. Number: CIP-003-7

3. Purpose: To specify consistent and sustainable security management controls that establish responsibility and accountability to protect BES Cyber Systems against compromise that could lead to misoperation or instability in the Bulk Electric System (BES).

4. Applicability:

4.1. Functional Entities: For the purpose of the requirements contained herein, the following list of functional entities will be collectively referred to as “Responsible Entities.” For requirements in this standard where a specific functional entity or subset of functional entities are the applicable entity or entities, the functional entity or entities are specified explicitly.

4.1.1 Balancing Authority

4.1.2 Distribution Provider that owns one or more of the following Facilities, systems, and equipment for the protection or restoration of the BES:

4.1.2.1 Each underfrequency Load shedding (UFLS) or undervoltage Load shedding (UVLS) system that:

4.1.2.1.1 is part of a Load shedding program that is subject to one or more requirements in a NERC or Regional Reliability Standard; and

4.1.2.1.2 performs automatic Load shedding under a common control system owned by the Responsible Entity, without human operator initiation, of 300 MW or more.

4.1.2.2 Each Special Protection System (SPS) or Remedial Action Scheme (RAS) where the SPS or RAS is subject to one or more requirements in a NERC or Regional Reliability Standard.

4.1.2.3 Each Protection System (excluding UFLS and UVLS) that applies to Transmission where the Protection System is subject to one or more requirements in a NERC or Regional Reliability Standard.

4.1.2.4 Each Cranking Path and group of Elements meeting the initial switching requirements from a Blackstart Resource up to and including the first interconnection point of the starting station service of the next generation unit(s) to be started.

4.1.3 Generator Operator

4.1.4 Generator Owner

Page 147: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7 July 2016 Page 4 of 45

4.1.5 Interchange Coordinator or Interchange Authority

4.1.6 Reliability Coordinator

4.1.7 Transmission Operator

4.1.8 Transmission Owner

4.2. Facilities: For the purpose of the requirements contained herein, the following Facilities, systems, and equipment owned by each Responsible Entity in 4.1 above are those to which these requirements are applicable. For requirements in this standard where a specific type of Facilities, system, or equipment or subset of Facilities, systems, and equipment are applicable, these are specified explicitly.

4.2.1 Distribution Provider: One or more of the following Facilities, systems and equipment owned by the Distribution Provider for the protection or restoration of the BES:

4.2.1.1 Each UFLS or UVLS System that:

4.2.1.1.1 is part of a Load shedding program that is subject to one or more requirements in a NERC or Regional Reliability Standard; and

4.2.1.1.2 performs automatic Load shedding under a common control system owned by the Responsible Entity, without human operator initiation, of 300 MW or more.

4.2.1.2 Each SPS or RAS where the SPS or RAS is subject to one or more requirements in a NERC or Regional Reliability Standard.

4.2.1.3 Each Protection System (excluding UFLS and UVLS) that applies to Transmission where the Protection System is subject to one or more requirements in a NERC or Regional Reliability Standard.

4.2.1.4 Each Cranking Path and group of Elements meeting the initial switching requirements from a Blackstart Resource up to and including the first interconnection point of the starting station service of the next generation unit(s) to be started.

4.2.2 Responsible Entities listed in 4.1 other than Distribution Providers:

All BES Facilities.

4.2.3 Exemptions: The following are exempt from Standard CIP-003-7:

4.2.3.1 Cyber Assets at Facilities regulated by the Canadian Nuclear Safety Commission.

Page 148: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7 July 2016 Page 5 of 45

4.2.3.2 Cyber Assets associated with communication networks and data communication links between discrete Electronic Security Perimeters (ESPs).

4.2.3.3 The systems, structures, and components that are regulated by the Nuclear Regulatory Commission under a cyber security plan pursuant to 10 C.F.R. Section 73.54.

4.2.3.4 For Distribution Providers, the systems and equipment that are not included in section 4.2.1 above.

5. Effective Dates:

See Implementation Plan for CIP-003-7.

6. Background:

Standard CIP-003 exists as part of a suite of CIP Standards related to cyber security, which require the initial identification and categorization of BES Cyber Systems and require organizational, operational, and procedural controls to mitigate risk to BES Cyber Systems.

The term policy refers to one or a collection of written documents that are used to communicate the Responsible Entities’ management goals, objectives and expectations for how the Responsible Entity will protect its BES Cyber Systems. The use of policies also establishes an overall governance foundation for creating a culture of security and compliance with laws, regulations, and standards.

The term documented processes refers to a set of required instructions specific to the Responsible Entity and to achieve a specific outcome. This term does not imply any naming or approval structure beyond what is stated in the requirements. An entity should include as much as it believes necessary in its documented processes, but it must address the applicable requirements.

The terms program and plan are sometimes used in place of documented processes where it makes sense and is commonly understood. For example, documented processes describing a response are typically referred to as plans (i.e., incident response plans and recovery plans). Likewise, a security plan can describe an approach involving multiple procedures to address a broad subject matter.

Similarly, the term program may refer to the organization’s overall implementation of its policies, plans, and procedures involving a subject matter. Examples in the standards include the personnel risk assessment program and the personnel training program. The full implementation of the CIP Cyber Security Reliability Standards could also be referred to as a program. However, the terms program and plan do not imply any additional requirements beyond what is stated in the standards.

Responsible Entities can implement common controls that meet requirements for multiple high, medium, and low impact BES Cyber Systems. For example, a single

Page 149: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7 July 2016 Page 6 of 45

cyber security awareness program could meet the requirements across multiple BES Cyber Systems.

Measures provide examples of evidence to show documentation and implementation of the requirement. These measures serve to provide guidance to entities in acceptable records of compliance and should not be viewed as an all-inclusive list.

Throughout the standards, unless otherwise stated, bulleted items in the requirements and measures are items that are linked with an “or,” and numbered items are items that are linked with an “and.”

Many references in the Applicability section use a threshold of 300 MW for UFLS and UVLS. This particular threshold of 300 MW for UVLS and UFLS was provided in Version 1 of the CIP Cyber Security Standards. The threshold remains at 300 MW since it is specifically addressing UVLS and UFLS, which are last ditch efforts to save the BES. A review of UFLS tolerances defined within Regional Reliability Standards for UFLS program requirements to date indicates that the historical value of 300 MW represents an adequate and reasonable threshold value for allowable UFLS operational tolerances.

Page 150: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7 July 2016 Page 7 of 45

B. Requirements and Measures R1. Each Responsible Entity shall review and obtain CIP Senior Manager approval at least

once every 15 calendar months for one or more documented cyber security policies that collectively address the following topics: [Violation Risk Factor: Medium] [Time Horizon: Operations Planning]

1.1 For its high impact and medium impact BES Cyber Systems, if any:

1.1.1. Personnel and training (CIP-004);

1.1.2. Electronic Security Perimeters (CIP-005) including Interactive Remote Access;

1.1.3. Physical security of BES Cyber Systems (CIP-006);

1.1.4. System security management (CIP-007);

1.1.5. Incident reporting and response planning (CIP-008);

1.1.6. Recovery plans for BES Cyber Systems (CIP-009);

1.1.7. Configuration change management and vulnerability assessments (CIP-010);

1.1.8. Information protection (CIP-011); and

1.1.9. Declaring and responding to CIP Exceptional Circumstances.

1.2 For its assets identified in CIP-002 containing low impact BES Cyber Systems, if any:

1.2.1. Cyber security awareness;

1.2.2. Physical security controls;

1.2.3. Electronic access controls for Low Impact External Routable Communication (LERC) and Dial-up Connectivity; and

1.2.4. Cyber Security Incident response

M1. Examples of evidence may include, but are not limited to, policy documents; revision history, records of review, or workflow evidence from a document management system that indicate review of each cyber security policy at least once every 15 calendar months; and documented approval by the CIP Senior Manager for each cyber security policy.

R2. Each Responsible Entity with at least one asset identified in CIP-002 containing low impact BES Cyber Systems shall implement one or more documented cyber security plan(s) for its low impact BES Cyber Systems that include the sections in Attachment 1. [Violation Risk Factor: Lower] [Time Horizon: Operations Planning]

Note: An inventory, list, or discrete identification of low impact BES Cyber Systems or their BES Cyber Assets is not required. Lists of authorized users are not required.

Page 151: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7 July 2016 Page 8 of 45

M2. Evidence shall include each of the documented cyber security plan(s) that collectively include each of the sections in Attachment 1 and additional evidence to demonstrate implementation of the cyber security plan(s). Additional examples of evidence per section are located in Attachment 2.

R3. Each Responsible Entity shall identify a CIP Senior Manager by name and document any change within 30 calendar days of the change. [Violation Risk Factor: Medium] [Time Horizon: Operations Planning]

M3. An example of evidence may include, but is not limited to, a dated and approved document from a high level official designating the name of the individual identified as the CIP Senior Manager.

R4. The Responsible Entity shall implement a documented process to delegate authority, unless no delegations are used. Where allowed by the CIP Standards, the CIP Senior Manager may delegate authority for specific actions to a delegate or delegates. These delegations shall be documented, including the name or title of the delegate, the specific actions delegated, and the date of the delegation; approved by the CIP Senior Manager; and updated within 30 days of any change to the delegation. Delegation changes do not need to be reinstated with a change to the delegator. [Violation Risk Factor: Lower] [Time Horizon: Operations Planning]

M4. An example of evidence may include, but is not limited to, a dated document, approved by the CIP Senior Manager, listing individuals (by name or title) who are delegated the authority to approve or authorize specifically identified items.

Page 152: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7 July 2016 Page 9 of 45

C. Compliance 1. Compliance Monitoring Process

1.1. Compliance Enforcement Authority: As defined in the NERC Rules of Procedure, “Compliance Enforcement Authority” (CEA) means NERC or the Regional Entity in their respective roles of monitoring and enforcing compliance with the NERC Reliability Standards.

1.2. Evidence Retention: The following evidence retention periods identify the period of time an entity is required to retain specific evidence to demonstrate compliance. For instances where the evidence retention period specified below is shorter than the time since the last audit, the CEA may ask an entity to provide other evidence to show that it was compliant for the full time period since the last audit.

The Responsible Entity shall keep data or evidence to show compliance as identified below unless directed by its CEA to retain specific evidence for a longer period of time as part of an investigation:

• Each Responsible Entity shall retain evidence of each requirement in this standard for three calendar years.

• If a Responsible Entity is found non-compliant, it shall keep information related to the non-compliance until mitigation is complete and approved or for the time specified above, whichever is longer.

• The CEA shall keep the last audit records and all requested and submitted subsequent audit records.

1.3. Compliance Monitoring and Assessment Processes:

Compliance Audits

Self-Certifications

Spot Checking

Compliance Investigations

Self-Reporting

Complaints

1.4. Additional Compliance Information: None.

Page 153: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7 July 2016 Page 10 of 45

2. Table of Compliance Elements

R # Time Horizon VRF

Violation Severity Levels (CIP-003-7)

Lower VSL Moderate VSL High VSL Severe VSL

R1 Operations Planning

Medium The Responsible Entity documented and implemented one or more cyber security policies for its high impact and medium impact BES Cyber Systems, but did not address one of the nine topics required by R1. (R1.1)

OR

The Responsible Entity did not complete its review of the one or more documented cyber security policies for its high impact and medium impact BES Cyber Systems as required by R1 within 15 calendar months but did

The Responsible Entity documented and implemented one or more cyber security policies for its high impact and medium impact BES Cyber Systems, but did not address two of the nine topics required by R1. (R1.1)

OR

The Responsible Entity did not complete its review of the one or more documented cyber security policies for its high impact and medium impact BES Cyber Systems as required by R1 within 16 calendar months but did

The Responsible Entity documented and implemented one or more cyber security policies for its high impact and medium impact BES Cyber Systems, but did not address three of the nine topics required by R1. (R1.1)

OR

The Responsible Entity did not complete its review of the one or more documented cyber security policies for its high impact and medium impact BES Cyber Systems as required by R1 within 17 calendar months but did complete this review in less than or equal to 18

The Responsible Entity documented and implemented one or more cyber security policies for its high impact and medium impact BES Cyber Systems, but did not address four or more of the nine topics required by R1. (R1.1)

OR

The Responsible Entity did not have any documented cyber security policies for its high impact and medium impact BES Cyber Systems as required by R1. (R1.1)

OR

Page 154: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7 July 2016 Page 11 of 45

R # Time Horizon VRF

Violation Severity Levels (CIP-003-7)

Lower VSL Moderate VSL High VSL Severe VSL

complete this review in less than or equal to 16 calendar months of the previous review. (R1.1)

OR

The Responsible Entity did not complete its approval of the one or more documented cyber security policies for its high impact and medium impact BES Cyber Systems as required by R1 by the CIP Senior Manager within 15 calendar months but did complete this approval in less than or equal to 16 calendar months of the previous approval. (R1.1)

complete this review in less than or equal to 17 calendar months of the previous review. (R1.1)

OR

The Responsible Entity did not complete its approval of the one or more documented cyber security policies for its high impact and medium impact BES Cyber Systems as required by R1 by the CIP Senior Manager within 16 calendar months but did complete this approval in less than or equal to 17 calendar months of the previous approval. (R1.1)

calendar months of the previous review. (R1.1)

OR

The Responsible Entity did not complete its approval of the one or more documented cyber security policies for its high impact and medium impact BES Cyber Systems as required by R1 by the CIP Senior Manager within 17 calendar months but did complete this approval in less than or equal to 18 calendar months of the previous approval. (R1)

OR

The Responsible Entity documented one or more cyber security policies for its assets identified in CIP-002 containing low impact

The Responsible Entity did not complete its review of the one or more documented cyber security policies as required by R1 within 18 calendar months of the previous review. (R1)

OR

The Responsible Entity did not complete its approval of the one or more documented cyber security policies for its high impact and medium impact BES Cyber Systems as required by R1 by the CIP Senior Manager within 18 calendar months of the previous approval. (R1.1)

Page 155: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7 July 2016 Page 12 of 45

R # Time Horizon VRF

Violation Severity Levels (CIP-003-7)

Lower VSL Moderate VSL High VSL Severe VSL

OR

The Responsible Entity documented one or more cyber security policies for its assets identified in CIP-002 containing low impact BES Cyber Systems, but did not address one of the four topics required by R1. (R1.2)

OR

The Responsible Entity did not complete its review of the one or more documented cyber security policies for its assets identified in CIP-002 containing low impact BES Cyber Systems as required by Requirement R1 within 15 calendar

OR

The Responsible Entity documented one or more cyber security policies for its assets identified in CIP-002 containing low impact BES Cyber Systems, but did not address two of the four topics required by R1. (R1.2)

OR

The Responsible Entity did not complete its review of the one or more documented cyber security policies for its assets identified in CIP-002 containing low impact BES Cyber Systems as required by Requirement R1 within 16 calendar

BES Cyber Systems, but did not address three of the four topics required by R1. (R1.2)

OR

The Responsible Entity did not complete its review of the one or more documented cyber security policies for its assets identified in CIP-002 containing low impact BES Cyber Systems as required by R1 within 17 calendar months but did complete this review in less than or equal to 18 calendar months of the previous review. (R1.2)

OR

The Responsible Entity did not complete its approval of the one or more documented cyber security policies for its

OR

The Responsible Entity documented one or more cyber security policies for its assets identified in CIP-002 containing low impact BES Cyber Systems, but did not address any of the four topics required by R1. (R1.2)

OR

The Responsible Entity did not have any documented cyber security policies for its assets identified in CIP-002 containing low impact BES Cyber Systems as required by R1. (R1.2)

OR

Page 156: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7 July 2016 Page 13 of 45

R # Time Horizon VRF

Violation Severity Levels (CIP-003-7)

Lower VSL Moderate VSL High VSL Severe VSL

months but did complete this review in less than or equal to 16 calendar months of the previous review. (R1.2)

OR

The Responsible Entity did not complete its approval of the one or more documented cyber security policies for its assets identified in CIP-002 containing low impact BES Cyber Systems as required by Requirement R1 by the CIP Senior Manager within 15 calendar months but did complete this approval in less than or equal to 16 calendar months of

months but did complete this review in less than or equal to 17 calendar months of the previous review. (R1.2)

OR

The Responsible Entity did not complete its approval of the one or more documented cyber security policies for its assets identified in CIP-002 containing low impact BES Cyber Systems as required by Requirement R1 by the CIP Senior Manager within 16 calendar months but did complete this approval in less than or equal to 17

assets identified in CIP-002 containing low impact BES Cyber Systems as required by Requirement R1 by the CIP Senior Manager within 17 calendar months but did complete this approval in less than or equal to 18 calendar months of the previous approval. (R1.2)

The Responsible Entity did not complete its approval of the one or more documented cyber security policies for its assets identified in CIP-002 containing low impact BES Cyber Systems as required by Requirement R1 by the CIP Senior Manager within 18 calendar months of the previous approval. (R1.2)

Page 157: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7 July 2016 Page 14 of 45

R # Time Horizon VRF

Violation Severity Levels (CIP-003-7)

Lower VSL Moderate VSL High VSL Severe VSL

the previous approval. (R1.2)

calendar months of the previous approval. (R1.2)

R2 Operations Planning

Lower The Responsible Entity documented its cyber security plan(s) for its assets containing low impact BES Cyber Systems, but failed to document cyber security awareness according to Requirement R2, Attachment 1, Section 1. (R2)

OR

The Responsible Entity documented its cyber security plan(s) for its assets containing low impact BES Cyber Systems, but failed to document one or more Cyber Security

The Responsible Entity documented its cyber security plan(s) for its assets containing low impact BES Cyber Systems, but failed to reinforce cyber security practices at least once every 15 calendar months according to Requirement R2, Attachment 1, Section 1. (R2)

OR

The Responsible Entity documented one or more incident response plans within its cyber security plan(s) for its assets containing

The Responsible Entity documented one or more Cyber Security Incident response plans within its cyber security plan(s) for its assets containing low impact BES Cyber Systems, but failed to test each Cyber Security Incident response plan(s) at least once every 36 calendar months according to Requirement R2, Attachment 1, Section 4. (R2)

OR

The Responsible Entity documented the determination of whether an identified Cyber Security Incident is a Reportable Cyber

The Responsible Entity failed to document or implement one or more cyber security plan(s) for its assets containing low impact BES Cyber Systems according to Requirement R2, Attachment 1. (R2).

Page 158: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7 July 2016 Page 15 of 45

R # Time Horizon VRF

Violation Severity Levels (CIP-003-7)

Lower VSL Moderate VSL High VSL Severe VSL

Incident response plans according to Requirement R2, Attachment 1, Section 4. (R2)

OR

The Responsible Entity documented one or more Cyber Security Incident response plans within its cyber security plan(s) for its assets containing low impact BES Cyber Systems, but failed to update each Cyber Security Incident response plan(s) within 180 days according to Requirement R2, Attachment 1, Section 4. (R2)

low impact BES Cyber Systems, but failed to include the process for identification, classification, and response to Cyber Security Incidents according to Requirement R2, Attachment 1, Section 4. (R2)

OR

The Responsible Entity documented its cyber security plan(s) for its assets containing low impact BES Cyber Systems, but failed to document the determination of whether an identified Cyber Security Incident is a Reportable Cyber Security Incident and

Security Incident, but failed to notify the Electricity Information Sharing and Analysis Center (E-ISAC) according to Requirement R2, Attachment 1, Section 4. (R2)

OR

The Responsible Entity documented electronic access controls for its assets containing low impact BES Cyber Systems, but failed to implement the electronic access controls according to Requirement R2, Attachment 1, Section 3. (R2)

OR

The Responsible Entity documented the physical access controls for its

Page 159: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7 July 2016 Page 16 of 45

R # Time Horizon VRF

Violation Severity Levels (CIP-003-7)

Lower VSL Moderate VSL High VSL Severe VSL

subsequent notification to the Electricity Information Sharing and Analysis Center (E-ISAC) according to Requirement R2, Attachment 1, Section 4. (R2)

OR

The Responsible Entity documented its cyber security plan(s) for its assets containing low impact BES Cyber Systems, but failed to document physical security controls according to Requirement R2, Attachment 1, Section 2. (R2)

OR

The Responsible Entity documented

assets containing low impact BES Cyber Systems, but failed to implement the physical security controls according to Requirement R2, Attachment 1, Section 2. (R2)

Page 160: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7 July 2016 Page 17 of 45

R # Time Horizon VRF

Violation Severity Levels (CIP-003-7)

Lower VSL Moderate VSL High VSL Severe VSL

its cyber security plan(s) for its assets containing low impact BES Cyber Systems, but failed to document electronic access controls according to Requirement R2, Attachment 1, Section 3. (R2)

R3 Operations Planning

Medium The Responsible Entity has identified by name a CIP Senior Manager, but did not document changes to the CIP Senior Manager within 30 calendar days but did document this change in less than 40 calendar days of the change. (R3)

The Responsible Entity has identified by name a CIP Senior Manager, but did not document changes to the CIP Senior Manager within 40 calendar days but did document this change in less than 50 calendar days of the change. (R3)

The Responsible Entity has identified by name a CIP Senior Manager, but did not document changes to the CIP Senior Manager within 50 calendar days but did document this change in less than 60 calendar days of the change. (R3)

The Responsible Entity has not identified, by name, a CIP Senior Manager.

OR

The Responsible Entity has identified by name a CIP Senior Manager, but did not document changes to the CIP Senior Manager within 60 calendar

Page 161: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7 July 2016 Page 18 of 45

R # Time Horizon VRF

Violation Severity Levels (CIP-003-7)

Lower VSL Moderate VSL High VSL Severe VSL

days of the change. (R3)

R4 Operations Planning

Lower The Responsible Entity has identified a delegate by name, title, date of delegation, and specific actions delegated, but did not document changes to the delegate within 30 calendar days but did document this change in less than 40 calendar days of the change. (R4)

The Responsible Entity has identified a delegate by name, title, date of delegation, and specific actions delegated, but did not document changes to the delegate within 40 calendar days but did document this change in less than 50 calendar days of the change. (R4)

The Responsible Entity has identified a delegate by name, title, date of delegation, and specific actions delegated, but did not document changes to the delegate within 50 calendar days but did document this change in less than 60 calendar days of the change. (R4)

The Responsible Entity has used delegated authority for actions where allowed by the CIP Standards, but does not have a process to delegate actions from the CIP Senior Manager. (R4)

OR

The Responsible Entity has identified a delegate by name, title, date of delegation, and specific actions delegated, but did not document changes to the delegate within 60 calendar days of the change. (R4)

Page 162: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7 July 2016 Page 19 of 45

D. Regional Variances None.

E. Interpretations None.

F. Associated Documents None.

Page 163: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7 July 2016 Page 20 of 45

Version History

Version Date Action Change Tracking

1 1/16/06 R3.2 — Change “Control Center” to “control center.” 3/24/06

2 9/30/09 Modifications to clarify the requirements and to bring the compliance elements into conformance with the latest guidelines for developing compliance elements of standards.

Removal of reasonable business judgment.

Replaced the RRO with the RE as a responsible entity.

Rewording of Effective Date.

Changed compliance monitor to Compliance Enforcement Authority.

3 12/16/09 Updated Version Number from -2 to -3

In Requirement 1.6, deleted the sentence pertaining to removing component or system from service in order to perform testing, in response to FERC order issued September 30, 2009.

3 12/16/09 Approved by the NERC Board of Trustees.

3 3/31/10 Approved by FERC.

4 1/24/11 Approved by the NERC Board of Trustees.

5 11/26/12 Adopted by the NERC Board of Trustees. Modified to coordinate with other CIP standards and to revise format to use RBS Template.

Page 164: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7 July 2016 Page 21 of 45

Version Date Action Change Tracking

5 11/22/13 FERC Order issued approving CIP-003-5.

6 11/13/14 Adopted by the NERC Board of Trustees. Addressed two FERC directives from Order No. 791 related to identify, assess, and correct language and communication networks.

6 2/12/15 Adopted by the NERC Board of Trustees. Replaces the version adopted by the Board on 11/13/2014. Revised version addresses remaining directives from Order No. 791 related to transient devices and low impact BES Cyber Systems.

6 1/21/16 FERC Order issued approving CIP-003-6. Docket No. RM15-14-000

7 TBD Adopted by the NERC Board of Trustees. Revised to address FERC Order 822 directive regarding definition of LERC

Page 165: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7 July 2016 Page 22 of 45

Attachment 1

Required Sections for Cyber Security Plan(s) for Assets Containing Low Impact BES Cyber Systems

Responsible Entities shall include each of the sections provided below in the cyber security plan(s) required under Requirement R2. Responsible Entities with multiple-impact BES Cyber Systems ratings can utilize policies, procedures, and processes for their high or medium impact BES Cyber Systems to fulfill the sections for the development of low impact cyber security plan(s). Each Responsible Entity can develop a cyber security plan(s) either by individual asset or groups of assets. Section 1. Cyber Security Awareness: Each Responsible Entity shall reinforce, at least once

every 15 calendar months, cyber security practices (which may include associated physical security practices).

Section 2. Physical Security Controls: Each Responsible Entity shall control physical access, based on need as determined by the Responsible Entity, to (1) the asset or the locations of the low impact BES Cyber Systems within the asset, and (2) the Cyber Asset(s), as specified by the Responsible Entity, that provide electronic access control(s) implemented for Section 3.1, if any.

Section 3. Electronic Access Controls: Each Responsible Entity shall:

3.1 Implement electronic access control(s) for LERC, if any, to permit only necessary electronic access to low impact BES Cyber System(s).

3.2 Implement authentication for all Dial-up Connectivity, if any, that provides access to low impact BES Cyber Systems, per Cyber Asset capability.

Section 4. Cyber Security Incident Response: Each Responsible Entity shall have one or more Cyber Security Incident response plan(s), either by asset or group of assets, which shall include:

4.1 Identification, classification, and response to Cyber Security Incidents;

4.2 Determination of whether an identified Cyber Security Incident is a Reportable Cyber Security Incident and subsequent notification to the Electricity Information Sharing and Analysis Center (E-ISAC), unless prohibited by law;

4.3 Identification of the roles and responsibilities for Cyber Security Incident response by groups or individuals;

4.4 Incident handling for Cyber Security Incidents;

4.5 Testing the Cyber Security Incident response plan(s) at least once every 36 calendar months by: (1) responding to an actual Reportable Cyber Security Incident; (2) using a drill or tabletop exercise of a Reportable Cyber Security

Page 166: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7 July 2016 Page 23 of 45

Incident; or (3) using an operational exercise of a Reportable Cyber Security Incident; and

4.6 Updating the Cyber Security Incident response plan(s), if needed, within 180 calendar days after completion of a Cyber Security Incident response plan(s) test or actual Reportable Cyber Security Incident.

Page 167: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7 July 2016 Page 24 of 45

Attachment 2

Examples of Evidence for Cyber Security Plan(s) for Assets Containing Low Impact BES Cyber Systems

Section 1. Cyber Security Awareness: An example of evidence for Section 1 may include, but is not limited to, documentation that the reinforcement of cyber security practices occurred at least once every 15 calendar months. The evidence could be documentation through one or more of the following methods:

• Direct communications (for example, e-mails, memos, or computer-based training);

• Indirect communications (for example, posters, intranet, or brochures); or

• Management support and reinforcement (for example, presentations or meetings).

Section 2. Physical Security Controls: Examples of evidence for Section 2 may include, but are not limited to:

• Documentation of the selected access control(s) (e.g., card key, locks, perimeter controls), monitoring controls (e.g., alarm systems, human observation), or other operational, procedural, or technical physical security controls that control physical access to both:

a. The asset, if any, or the locations of the low impact BES Cyber Systems within the asset; and

b. The Cyber Asset specified by the Responsible Entity that provides electronic access controls implemented for Section 3.1, if any.

Section 3. Electronic Access Controls: Examples of evidence for Section 3 may include, but are not limited to:

1. Documentation, such as representative diagrams or lists of implemented electronic access controls (e.g., restricting IP addresses, ports, or services; authenticating users; air-gapping networks; terminating routable protocol sessions on a non-BES Cyber Asset; implementing unidirectional gateways) showing that for LERC at each asset or group of assets containing low impact BES Cyber Systems, is confined only to that access the Responsible Entity deems necessary; and

2. Documentation of authentication for Dial-up Connectivity (e.g., dial out only to a preprogrammed number to deliver data, dial-back modems, modems that must be remotely controlled by the control center or control room, or access control on the BES Cyber System).

Section 4. Cyber Security Incident Response: An example of evidence for Section 4 may include, but is not limited to, dated documentation, such as policies, procedures, or process

Page 168: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Cyber Security — Security Management Controls

Draft 1 of CIP-003-7 July 2016 Page 25 of 45

documents of one or more Cyber Security Incident response plan(s) developed either by asset or group of assets that include the following processes:

1. to identify, classify, and respond to Cyber Security Incidents; to determine whether an identified Cyber Security Incident is a Reportable Cyber Security Incident and for notifying the Electricity Information Sharing and Analysis Center (E-ISAC);

2. to identify and document the roles and responsibilities for Cyber Security Incident response by groups or individuals (e.g., initiating, documenting, monitoring, reporting, etc.);

3. for incident handling of a Cyber Security Incident (e.g., containment, eradication, or recovery/incident resolution);

4. for testing the plan(s) along with the dated documentation that a test has been completed at least once every 36 calendar months; and

5. to update, as needed, Cyber Security Incident response plan(s) within 180 calendar days after completion of a test or actual Reportable Cyber Security Incident.

Page 169: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7 July 2016 Page 26 of 45

Guidelines and Technical Basis Section 4 – Scope of Applicability of the CIP Cyber Security Standards Section “4. Applicability” of the standards provides important information for Responsible Entities to determine the scope of the applicability of the CIP Cyber Security Requirements.

Section “4.1. Functional Entities” is a list of NERC functional entities to which the standard applies. If the entity is registered as one or more of the functional entities listed in Section 4.1, then the NERC CIP Cyber Security Standards apply. Note that there is a qualification in Section 4.1 that restricts the applicability in the case of Distribution Providers to only those that own certain types of systems and equipment listed in 4.2.

Section “4.2. Facilities” defines the scope of the Facilities, systems, and equipment owned by the Responsible Entity, as qualified in Section 4.1, that is subject to the requirements of the standard. In addition to the set of BES Facilities, Control Centers, and other systems and equipment, the list includes the set of systems and equipment owned by Distribution Providers. While the NERC Glossary term “Facilities” already includes the BES characteristic, the additional use of the term BES here is meant to reinforce the scope of applicability of these Facilities where it is used, especially in this applicability scoping section. This in effect sets the scope of Facilities, systems, and equipment that is subject to the standards. Requirement R1: In developing policies in compliance with Requirement R1, the number of policies and their content should be guided by a Responsible Entity's management structure and operating conditions. Policies might be included as part of a general information security program for the entire organization, or as components of specific programs. The Responsible Entity has the flexibility to develop a single comprehensive cyber security policy covering the required topics, or it may choose to develop a single high-level umbrella policy and provide additional policy detail in lower level documents in its documentation hierarchy. In the case of a high-level umbrella policy, the Responsible Entity would be expected to provide the high-level policy as well as the additional documentation in order to demonstrate compliance with CIP-003-7, Requirement R1.

If a Responsible Entity has any high or medium impact BES Cyber Systems, the one or more cyber security policies must cover the nine subject matter areas required by CIP-003-7, Requirement R1, Part 1.1. If a Responsible Entity has identified from CIP-002 any assets containing low impact BES Cyber Systems, also referred to herein as BES assets, the one or more cyber security policies must cover the four subject matter areas required by Requirement R1, Part 1.2.

Responsible Entities that have multiple-impact rated BES Cyber Systems are not required to create separate cyber security policies for high, medium, or low impact BES Cyber Systems. The Responsible Entities have the flexibility to develop policies that cover all three impact ratings.

Implementation of the cyber security policy is not specifically included in CIP-003-7, Requirement R1 as it is envisioned that the implementation of this policy is evidenced through successful implementation of CIP-003 through CIP-011. However, Responsible Entities are

Page 170: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7 July 2016 Page 27 of 45

encouraged not to limit the scope of their cyber security policies to only those requirements in NERC cyber security Reliability Standards, but to develop a holistic cyber security policy appropriate for its organization. Elements of a policy that extend beyond the scope of NERC’s cyber security Reliability Standards will not be considered candidates for potential violations although they will help demonstrate the organization’s internal culture of compliance and posture towards cyber security.

For Part 1.1, the Responsible Entity should consider the following for each of the required topics in its one or more cyber security policies for medium and high impact BES Cyber Systems, if any:

1.1.1 Personnel and training (CIP-004)

• Organization position on acceptable background investigations

• Identification of possible disciplinary action for violating this policy

• Account management

1.1.2 Electronic Security Perimeters (CIP-005) including Interactive Remote Access

• Organization stance on use of wireless networks

• Identification of acceptable authentication methods

• Identification of trusted and untrusted resources

• Monitoring and logging of ingress and egress at Electronic Access Points

• Maintaining up-to-date anti-malware software before initiating Interactive Remote Access

• Maintaining up-to-date patch levels for operating systems and applications used to initiate Interactive Remote Access

• Disabling VPN “split-tunneling” or “dual-homed” workstations before initiating Interactive Remote Access

• For vendors, contractors, or consultants: include language in contracts that requires adherence to the Responsible Entity’s Interactive Remote Access controls

1.1.3 Physical security of BES Cyber Systems (CIP-006)

• Strategy for protecting Cyber Assets from unauthorized physical access

• Acceptable physical access control methods

• Monitoring and logging of physical ingress

1.1.4 System security management (CIP-007)

• Strategies for system hardening

• Acceptable methods of authentication and access control

Page 171: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7 July 2016 Page 28 of 45

• Password policies including length, complexity, enforcement, prevention of brute force attempts

• Monitoring and logging of BES Cyber Systems

1.1.5 Incident reporting and response planning (CIP-008)

• Recognition of Cyber Security Incidents

• Appropriate notifications upon discovery of an incident

• Obligations to report Cyber Security Incidents

1.1.6 Recovery plans for BES Cyber Systems (CIP-009)

• Availability of spare components

• Availability of system backups

1.1.7 Configuration change management and vulnerability assessments (CIP-010)

• Initiation of change requests

• Approval of changes

• Break-fix processes

1.1.8 Information protection (CIP-011)

• Information access control methods

• Notification of unauthorized information disclosure

• Information access on a need-to-know basis

1.1.9 Declaring and responding to CIP Exceptional Circumstances

• Processes to invoke special procedures in the event of a CIP Exceptional Circumstance

• Processes to allow for exceptions to policy that do not violate CIP requirements

Requirements relating to exceptions to a Responsible Entity’s security policies were removed because it is a general management issue that is not within the scope of a reliability requirement. It is an internal policy requirement and not a reliability requirement. However, Responsible Entities are encouraged to continue this practice as a component of their cyber security policies.

In this and all subsequent required approvals in the NERC CIP Reliability Standards, the Responsible Entity may elect to use hardcopy or electronic approvals to the extent that there is sufficient evidence to ensure the authenticity of the approving party. Requirement R2: Using the list of assets containing low impact BES Cyber Systems from CIP-002, the intent of the requirement is for each Responsible Entity to create, document, and implement one or more cyber security plan(s) that addresses objective criteria for the protection of low impact BES

Page 172: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7 July 2016 Page 29 of 45

Cyber Systems. The protections required by Requirement R2 reflect the level of risk that misuse or the unavailability of low impact BES Cyber Systems poses to the BES. The intent is that the required protections are part of a program that covers the low impact BES Cyber Systems collectively either at an asset or site level (assets containing low impact BES Cyber Systems), but not at an individual device or system level.

There are four subject matter areas, as identified in Attachment 1, that must be covered by the cyber security plan: (1) cyber security awareness, (2) physical security controls, (3) electronic access controls for LERC and Dial-up Connectivity, and (4) Cyber Security Incident response. Requirement R2, Attachment 1 As noted, Attachment 1 contains the sections that must be in the cyber security plan(s). The intent is to allow entities that have a combination of high, medium, and low impact BES Cyber Systems the flexibility to choose, if desired, to cover their low impact BES Cyber Systems (or any subset) under their programs used for the high or medium impact BES Cyber Systems rather than maintain two separate programs. Guidance for each of the four subject matter areas of Attachment 1 is provided below. Requirement R2, Attachment 1, Section 1 – Cyber Security Awareness The intent of the cyber security awareness program is for entities to reinforce good cyber security practices with their personnel at least once every 15 calendar months. The entity has the discretion to determine the topics to be addressed and the manner in which it will communicate these topics. As evidence of compliance, the Responsible Entity should be able to produce the awareness material that was delivered according to the delivery method(s) (e.g., posters, emails, or topics at staff meetings, etc.). The Responsible Entity is not required to maintain lists of recipients and track the reception of the awareness material by personnel.

Although the focus of the awareness is cyber security, it does not mean that only technology-related topics can be included in the program. Appropriate physical security topics (e.g., tailgating awareness and protection of badges for physical security, or “If you see something, say something” campaigns, etc.) are valid for cyber security awareness. The intent is to cover topics concerning any aspect of the protection of BES Cyber Systems. Requirement R2, Attachment 1, Section 2 – Physical Security Controls The Responsible Entity must document and implement methods to control physical access to (1) the asset or the locations of low impact BES Cyber Systems within the asset, and (2) Cyber Assets that implement the electronic access control(s) specified by the Responsible Entity in Section 3, if any. If these Cyber Assets are located within the BES asset and inherit the same controls outlined in Section 2, this can be noted by the Responsible Entity in either its policies or cyber security plan(s) to avoid duplicate documentation of the same controls.

The Responsible Entity has the flexibility in the selection of the methods used to meet the objective to control physical access to the asset(s) containing low impact BES Cyber System(s) or the low impact BES Cyber Systems themselves, as well as physical protection of the electronic access control Cyber Assets specified by the Responsible Entity, if any. The Responsible Entity may use one or a combination of access controls, monitoring controls, or

Page 173: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7 July 2016 Page 30 of 45

other operational, procedural, or technical physical security controls. Entities may use perimeter controls (e.g., fences with locked gates, guards, or site access policies, etc.) or more granular areas of physical access control in areas where low impact BES Cyber Systems are located, such as control rooms or control houses. User authorization programs and lists of authorized users for physical access are not required although they are an option to meet the security objective.

The objective is to control the physical access based on need as determined by the Responsible Entity. The need can be documented at the policy level for access to the site or systems. The requirement does not obligate an entity to specify a need for each access or authorization of a user for access.

Monitoring as a physical security control can be used as a complement or an alternative to access control. Examples of monitoring controls include, but are not limited to: (1) alarm systems to detect motion or entry into a controlled area, or (2) human observation of a controlled area. Monitoring does not necessarily require logging and maintaining logs but could include monitoring that physical access has occurred or been attempted (e.g., door alarm, or human observation, etc.). The monitoring does not need to be per low impact BES Cyber System but should be at the appropriate level to meet the security objective. Requirement R2, Attachment 1, Section 3 – Electronic Access Controls Section 3 requires the establishment of electronic access controls for assets containing low impact BES Cyber Systems, also referred to herein as BES assets when external routable protocol communication (LERC) or Dial-up Connectivity is present to or from the asset containing the low impact BES Cyber System(s). The establishment of electronic access controls is intended to reduce the risks associated with uncontrolled communication using routable protocols or Dial-up Connectivity. In the case where there is no LERC or Dial-up Connectivity, the Responsible Entity can document the absence of such communication in its low impact cyber security plan(s).

When identifying electronic access controls, Responsible Entities are provided flexibility in the selection of the controls that meet their operational needs while meeting the security objective of allowing only necessary electronic access to low impact BES Cyber Systems.

In essence, Responsible Entities are to determine LERC or Dial-up Connectivity for their BES assets and then, if present, document and implement electronic access control(s). Determining LERC The defined term Low Impact External Routable Communication (LERC) is used to avoid confusion with the term External Routable Connectivity (ERC) used for high and medium impact BES Cyber Systems as these terms are different concepts. The input to this requirement from CIP-002 is a list of assets containing low impact BES Cyber Systems, therefore LERC is an attribute of a BES asset and involves routable protocol communications to or from the BES asset (crossing the asset boundary) without regard to connectivity to Cyber Assets within the BES asset. ERC on the other hand is an attribute of an individual high or medium impact BES Cyber System and is relative to an Electronic Security Perimeter (ESP).

Page 174: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7 July 2016 Page 31 of 45

With LERC being a BES asset level attribute, it is used as a higher level filter to exclude from further consideration those assets containing low impact BES Cyber Systems that have no routable protocol communications to them from outside the BES asset. Responsible Entities can then concentrate their electronic access control efforts on those BES assets that do have LERC. However, this also means that LERC can exist for a BES asset even if there is no routable protocol connectivity to any low impact BES Cyber System within the BES asset. In order to avoid future technology issues, the LERC definition specifically excludes communications between intelligent electronic devices that use routable communication protocols for time-sensitive protection or control functions between non-Control Center BES assets containing low impact BES Cyber Systems, such as IEC 61850 messaging. This does not exclude Control Center to field communication but rather excludes the communication between the intelligent electronic devices (e.g. relays) in the field. A Responsible Entity using this technology is not expected to implement the electronic access controls noted herein. This exception was included so as not to inhibit the functionality of the time-sensitive requirements related to this technology nor to preclude the use of such time-sensitive reliability enhancing functions if they use a routable protocol in the future. Determining Asset Boundary As LERC is a BES asset level attribute, it involves a determination by the Responsible Entity of a BES asset boundary for their assets containing low impact BES Cyber Systems. This boundary will vary by BES asset type (Control Center, substation, generation resource) and the specific configuration of the BES asset. The intent is for the Responsible Entity to define the BES asset boundary such that the low impact BES Cyber System(s) that are located at the BES asset are contained within the BES asset boundary. This is strictly for determining what constitutes the BES “asset” and for determining which routable protocol communications and networks are internal or inside or local to the BES asset and which are external to or outside the BES asset. This is not an Electronic Security Perimeter or Physical Security Perimeter as defined for medium and high impact BES Cyber Systems. For the asset containing low impact BES Cyber System(s), the BES asset boundary is synonymous to the concept of a “logical border” demarcation where routable protocol communication (e.g. LERC) enters and exits the BES asset containing the low impact BES Cyber System. Some examples of ways a Responsible Entity may determine BES asset boundaries are:

• For Control Centers

o Designated areas (room(s) or floor(s)) if the Control Center is located within a larger building.

o A building if in a dedicated building on a shared campus.

o The property/fence line if the Control Center is a dedicated facility on dedicated property.

• For substations, this could be the property/fence line or the control house.

Page 175: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7 July 2016 Page 32 of 45

• For generation resources:

o Fossil/hydro generating facilities: This could be the property/fence line. If pumps or wells or other equipment that are part of the plant asset are outside the property line, then the BES asset boundary could expand to accommodate all that is considered part of the plant.

o Solar farms: This could be the property line(s) or fence(s) surrounding all solar panels and interconnection facilities.

o Wind farms: This could be the collection of individual turbines plus the equipment needed for interconnection.

o Cogeneration facilities: This could be the identified portion of the larger plant that performs generation.

Determining Electronic Access Controls Once a Responsible Entity has determined that LERC exists at the BES asset boundary, the Responsible Entity documents and implements its chosen electronic access control(s). The control(s) must allow only “necessary” access as determined by the Responsible Entity and they need to be able to explain the reasons for the electronic access permitted with their electronic access controls. The reasoning for the “necessary” access controls can be documented within the Responsible Entity’s cyber security plan(s) or other policies or procedures associated with the electronic access controls. Concept Diagrams The diagrams on the following pages are provided as examples to illustrate various electronic access controls at a conceptual level. Regardless of the concepts or configurations chosen by the Responsible Entity, the security objective of permitting only necessary access to low impact BES Cyber Systems must be met when there is LERC to a BES asset. NOTE:

• This is not an exhaustive list of applicable concepts.

• LERC is present in each diagram.

• The same legend is used in each diagram; however, the diagram may not contain all of the articles represented in the legend.

• The term “BES Asset Boundary” is capitalized in the diagrams but it is not a defined term.

Page 176: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7 July 2016 Page 33 of 45

LERC Reference Model 1 – Physical Isolation The Responsible Entity may choose to physically isolate the low impact BES Cyber System(s) from the LERC. This control is commonly referred to as an ‘air gap’. The serial non-routable protocol connection and the routable protocol LERC are completely isolated from each other. There is no equipment shared with the low impact BES Cyber System(s).

BES Asset Boundary

SerialNon-routable

Protocol

Non-BES Cyber Asset

Non-BES Cyber Asset

RoutableProtocol

Air Gap

LERC

Low impactBES Cyber

System

Low impactBES Cyber

System

Non-BES Cyber Asset

Routable Protocol Routable ProtocolData FlowNon-routable Protocol

Reference Model 1

Page 177: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7 July 2016 Page 34 of 45

LERC Reference Model 2 – Logical Isolation The Responsible Entity may choose to logically isolate the low impact BES Cyber System(s) from the LERC. The low impact BES Cyber System(s) is on an isolated network segment with logical controls preventing routable protocol communication into or out of the network containing the low impact BES Cyber System(s).

BES Asset Boundary

RoutableProtocol

LERC

Network Devicewith logical network segmentation

Low impactBES Cyber

System

Non-BES Cyber Asset

Non-BES Cyber Asset

Low impactBES Cyber

System

Control Network Segment Non-Control Network Segment

`

Routable Protocol Routable ProtocolData FlowNon-routable Protocol

Reference Model 2

Page 178: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7 July 2016 Page 35 of 45

LERC Reference Model 3 – Host-based Inbound & Outbound Access Permissions The Responsible Entity may choose to utilize a host-based firewall technology on the low impact BES Cyber System(s) that manages electronic access permission so that only necessary inbound and outbound routable protocol access is allowed to the low impact BES Cyber System(s).

BES Asset Boundary

RoutableProtocol

LERC

Low impactBES Cyber

System

Routable Protocol Routable ProtocolData FlowNon-routable Protocol

Reference Model 3

Page 179: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7 July 2016 Page 36 of 45

LERC Reference Model 4 – Network-based Inbound & Outbound Access Permissions The Responsible Entity may choose to utilize a security device that permits only necessary access to the low impact BES Cyber System(s) within the BES asset. In this example, two low impact BES Cyber Systems are accessed over the LERC as the IP/Serial converter is continuing the same communications session from device(s) outside the BES asset boundary to the low impact BES Cyber Systems. The security device provides the electronic access controls to permit only necessary inbound and outbound routable protocol access to the low impact BES Cyber Systems.

BES Asset Boundary

LERC

SerialNon-Routable

Protocol

Low impactBES Cyber

System

Network

Low impactBES Cyber

System

IP/SerialConverter

RoutableProtocol

Routable Protocol Routable ProtocolData FlowNon-routable Protocol

Reference Model 4

Page 180: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7 July 2016 Page 37 of 45

LERC Reference Model 5 – Centralized Network-based Inbound & Outbound Access Permissions The Responsible Entity may choose to utilize a security device at a centralized location that may or may not be another BES asset. The electronic access control(s) do not necessarily have to reside inside the asset containing the low impact BES Cyber System(s). A security device is in place at “Location X” to act as the electronic access control and permit only necessary inbound and outbound routable protocol access to the low impact BES Cyber System(s). Care should be taken that electronic access to or between each BES asset is through the electronic access controls at the centralized location.

Reference Model 5

Location X

BES Asset Boundary BES Asset Boundary

LERCLERC

`

Firewall, Router Access Control List,Gateway or Other Security Device

RoutableProtocol

RoutableProtocol

Network Network

Non BES CyberSystsem

Low impactBES Cyber

SystemNon BES Cyber

System

Low impactBES Cyber

System

RoutableProtocol

Routable Protocol Routable ProtocolData FlowNon-routable Protocol

Page 181: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7 July 2016 Page 38 of 45

LERC Reference Model 6 – Uni-directional Gateway The Responsible Entity may choose to utilize a uni-directional gateway as the electronic access control. The low impact BES Cyber System(s) is not accessible (data cannot flow into the low impact BES Cyber System) from the LERC due to the implementation of a “one-way” (uni-directional) path for data to flow across the BES asset boundary.

BES Asset Boundary

RoutableProtocol

LERC

Low impactBES Cyber

System

Uni-directionalGateway

Routable Protocol Routable ProtocolData FlowNon-routable Protocol

Reference Model 6

Page 182: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7 July 2016 Page 39 of 45

LERC Reference Model 7 – User Authentication The Responsible Entity may choose to utilize a non-BES Cyber Asset between the network outside the BES asset boundary and the low impact BES Cyber System to perform user authentication for interactive access. The non-BES Cyber Asset would require authentication before establishing a new connection to the low impact BES Cyber System. The electronic access control depicted in this reference model may not meet the security objective for controlling device-to-device communication across the LERC depending on the specific system configuration in place.

BES Asset Boundary

RoutableProtocol

LERC

Low impactBES Cyber

System

Non-BES Cyber AssetPerforming Authentication

Routable Protocol Routable ProtocolData FlowNon-routable Protocol

Reference Model 7

Page 183: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7 July 2016 Page 40 of 45

LERC Reference Model 8 – Session Termination The Responsible Entity may choose to terminate routable protocol application sessions at a non-BES Cyber Asset inside the asset containing the low impact BES Cyber System(s) such that a separate application session is established to the low impact BES Cyber System(s) from the non-BES Cyber Asset (the routable session from outside the BES asset). The Responsible Entity may choose to authenticate access at a non-BES Cyber Asset either outside BES asset boundary or inside the asset containing the low impact BES Cyber System(s) such that unauthenticated access to the low impact BES Cyber System(s) is prohibited. The non-BES Cyber Asset sits on a demilitarized zone (DMZ) between the network outside the BES asset boundary and the low impact BES Cyber System(s). The non-BES Cyber Asset in the DMZ terminates the routable protocol session and establishes a new session to the low impact BES Cyber System(s). Additionally, a security device permits traffic from the network outside the BES asset boundary to flow only to and from the non-BES Cyber Asset in the DMZ (the routable session to the low impact BES Cyber System).

Reference Model 8

BES Asset Boundary

Network

Low impactBES Cyber

System

DMZ

Non-BES Cyber Asset(Separate routable protocolsessions for each data flow)

RoutableProtocol

Firewall, Router Access Control List,Gateway or Other Security Device

LERC

Routable Protocol Routable ProtocolData FlowNon-routable Protocol

Page 184: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7 July 2016 Page 41 of 45

LERC Reference Model 9 – LERC and ERC There is both LERC and ERC present in this reference model because there is at least one medium impact BES Cyber System and one low impact BES Cyber System within the BES asset. The Responsible Entity may choose to leverage an interface on the medium impact Electronic Access Control or Monitoring Systems (EACMS) device to provide electronic access controls for the LERC. The EACMS is therefore performing multiple functions – as a medium impact EACMS and as implementing low impact electronic access controls.

BES Asset Boundary

Firewall, Router Access Control List,Gateway or Other Security Device

Network

Non BES CyberSystem

Low impactBES Cyber

System

RoutableProtocol

Network

Medium impactBES Cyber

System with ERC

EAP Interface

ESP

LERC

ERC

Routable Protocol Routable ProtocolData FlowNon-routable Protocol

Reference Model 9

Page 185: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7 July 2016 Page 42 of 45

Dial-up Connectivity Dial-up Connectivity to a low impact BES Cyber System is set to dial out only (no auto-answer) to a preprogrammed number to deliver data. Incoming Dial-up Connectivity is to a dialback modem, a modem that must be remotely controlled by the control center or control room, has some form of access control, or the low impact BES Cyber System has access control. Insufficient Access Controls Some examples of situations that would lack sufficient access controls to meet the intent of this requirement include:

• An asset has Dial-up Connectivity and a low impact BES Cyber System is reachable via an auto-answer modem that connects any caller to the Cyber Asset that has a default password. There is no practical access control in this instance.

• An asset has LERC due to a BES Cyber System within it having a wireless card on a public carrier that allows the BES Cyber System to be reachable via a public IP address. In essence, low impact BES Cyber Systems should not be accessible from the Internet and search engines such as Shodan.

• Dual-homing or multiple-network interface cards without disabling IP forwarding in the non-BES Cyber Asset within the DMZ to provide separation between the low impact BES Cyber System(s) and the external network would not meet the intent of “controlling” inbound and outbound electronic access assuming there was no other host-based firewall or other security devices on the non-BES Cyber Asset.

Requirement R2, Attachment 1, Section 4 – Cyber Security Incident Response The entity should have one or more documented Cyber Security Incident response plan(s) that include each of the topics listed in Section 4. If, in the normal course of business, suspicious activities are noted at an asset containing low impact BES Cyber System(s), the intent is for the entity to implement a Cyber Security Incident response plan that will guide the entity in responding to the incident and reporting the incident if it rises to the level of a Reportable Cyber Security Incident.

Entities are provided the flexibility to develop their Attachment 1, Section 4 Cyber Security Incident response plan(s) by asset or group of assets. The plans do not need to be on a per asset site or per low impact BES Cyber System basis. Entities can choose to use a single enterprise-wide plan to fulfill the obligations for low impact BES Cyber Systems.

The plan(s) must be tested once every 36 months. This is not an exercise per low impact BES Cyber Asset or per type of BES Cyber Asset but rather is an exercise of each incident response plan the entity created to meet this requirement. An actual Reportable Cyber Security Incident counts as an exercise as do other forms of tabletop exercises or drills. NERC-led exercises such as GridEx participation would also count as an exercise provided the entity’s response plan is followed. The intent of the requirement is for entities to keep the Cyber Security Incident response plan(s) current, which includes updating the plan(s), if needed, within 180 days following a test or an actual incident.

Page 186: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7 July 2016 Page 43 of 45

For low impact BES Cyber Systems, the only portion of the definition of Cyber Security Incident that would apply is‚ “A malicious act or suspicious event that disrupts, or was an attempt to disrupt, the operation of a BES Cyber System.” The other portion of that definition is not to be used to require ESPs and PSPs for low impact BES Cyber Systems. Requirement R3: The intent of CIP-003-7, Requirement R3 is effectively unchanged since prior versions of the standard. The specific description of the CIP Senior Manager has now been included as a defined term rather than clarified in the Reliability Standard itself to prevent any unnecessary cross-reference to this standard. It is expected that the CIP Senior Manager will play a key role in ensuring proper strategic planning, executive/board-level awareness, and overall program governance. Requirement R4: As indicated in the rationale for CIP-003-7, Requirement R4, this requirement is intended to demonstrate a clear line of authority and ownership for security matters. The intent of the SDT was not to impose any particular organizational structure, but, rather, the intent is to afford the Responsible Entity significant flexibility to adapt this requirement to its existing organizational structure. A Responsible Entity may satisfy this requirement through a single delegation document or through multiple delegation documents. The Responsible Entity can make use of the delegation of the delegation authority itself to increase the flexibility in how this applies to its organization. In such a case, delegations may exist in numerous documentation records as long as the collection of these documentation records shows a clear line of authority back to the CIP Senior Manager. In addition, the CIP Senior Manager could also choose not to delegate any authority and meet this requirement without such delegation documentation.

The Responsible Entity must keep its documentation of the CIP Senior Manager and any delegations up-to-date. This is to ensure that individuals do not assume any undocumented authority. However, delegations do not have to be re-instated if the individual who delegated the task changes roles or the individual is replaced. For instance, assume that John Doe is named the CIP Senior Manager and he delegates a specific task to the Substation Maintenance Manager. If John Doe is replaced as the CIP Senior Manager, the CIP Senior Manager documentation must be updated within the specified timeframe, but the existing delegation to the Substation Maintenance Manager remains in effect as approved by the previous CIP Senior Manager, John Doe. Rationale: During development of this standard, text boxes were embedded within the standard to explain the rationale for various parts of the standard. Upon Board approval, the text from the rationale text boxes was moved to this section. Rationale for Requirement R1: One or more security policies enable effective implementation of the requirements of the cyber security Reliability Standards. The purpose of policies is to provide a management and governance foundation for all requirements that apply to a Responsible Entity’s BES Cyber

Page 187: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7 July 2016 Page 44 of 45

Systems. The Responsible Entity can demonstrate through its policies that its management supports the accountability and responsibility necessary for effective implementation of the requirements.

Annual review and approval of the cyber security policies ensures that the policies are kept-up-to-date and periodically reaffirms management’s commitment to the protection of its BES Cyber Systems. Rationale for Requirement R2: In response to FERC Order No. 791, Requirement R2 requires entities to develop and implement cyber security plans to meet specific security control objectives for assets containing low impact BES Cyber System(s). The cyber security plan(s) covers four subject matter areas: (1) cyber security awareness; (2) physical security controls; (3) electronic access controls; and (4) Cyber Security Incident response. This plan(s), along with the cyber security policies required under Requirement R1, Part 1.2, provides a framework for operational, procedural, and technical safeguards for low impact BES Cyber Systems.

Considering the varied types of low impact BES Cyber Systems across the BES, Attachment 1 provides Responsible Entities flexibility on how to apply the security controls to meet the security objectives. Additionally, because many Responsible Entities have multiple-impact rated BES Cyber Systems, nothing in the requirement prohibits entities from using their high and medium impact BES Cyber System policies, procedures, and processes to implement security controls required for low impact BES Cyber Systems, as detailed in Requirement R2, Attachment 1.

Responsible Entities will use their identified assets containing low impact BES Cyber System(s) (developed pursuant to CIP-002) to substantiate the sites or locations associated with low impact BES Cyber System(s). However, there is no requirement or compliance expectation for Responsible Entities to maintain a list(s) of individual low impact BES Cyber System(s) and their associated cyber assets or to maintain a list of authorized users. Rationale for Requirement R3: The identification and documentation of the single CIP Senior Manager ensures that there is clear authority and ownership for the CIP program within an organization, as called for in Blackout Report Recommendation 43. The language that identifies CIP Senior Manager responsibilities is included in the Glossary of Terms used in NERC Reliability Standards so that it may be used across the body of CIP standards without an explicit cross-reference.

FERC Order No. 706, Paragraph 296, requests consideration of whether the single senior manager should be a corporate officer or equivalent. As implicated through the defined term, the senior manager has “the overall authority and responsibility for leading and managing implementation of the requirements within this set of standards” which ensures that the senior manager is of sufficient position in the Responsible Entity to ensure that cyber security receives the prominence that is necessary. In addition, given the range of business models for responsible entities, from municipal, cooperative, federal agencies, investor owned utilities, privately owned utilities, and everything in between, the SDT believes that requiring the CIP

Page 188: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

CIP-003-7 - Supplemental Material

Draft 1 of CIP-003-7 July 2016 Page 45 of 45

Senior Manager to be a “corporate officer or equivalent” would be extremely difficult to interpret and enforce on a consistent basis. Rationale for Requirement R4: The intent of the requirement is to ensure clear accountability within an organization for certain security matters. It also ensures that delegations are kept up-to-date and that individuals do not assume undocumented authority.

In FERC Order No. 706, Paragraphs 379 and 381, the Commission notes that Recommendation 43 of the 2003 Blackout Report calls for “clear lines of authority and ownership for security matters.” With this in mind, the Standard Drafting Team has sought to provide clarity in the requirement for delegations so that this line of authority is clear and apparent from the documented delegations.

Page 189: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Proposed Revised Term: “Transient Cyber Asset” (TCA) Term: “Transient Cyber Asset” (TCA)

Revised Definition: A Cyber Asset that is: 1. capable of transmitting or transferring executable code; 2. not included in a BES Cyber System; 3. not a Protected Cyber Asset (PCA) associated with high or medium impact BES Cyber Systems; and 4. directly connected (e.g., using Ethernet, serial, Universal Serial Bus, or wireless including near field or

Bluetooth communication) for 30 consecutive calendar days or less to a:

• BES Cyber Asset,

• network within an Electronic Security Perimeter containing high or medium impact BES Cyber Systems, or

• PCA associated with high or medium impact BES Cyber Systems.

Examples of Transient Cyber Assets include, but are not limited to, Cyber Assets used for data transfer, vulnerability assessment, maintenance, or troubleshooting purposes.

Redline Definition: A Cyber Asset that is: 1. capable of transmitting or transferring executable code; 2. not included in a BES Cyber System; 3. not a Protected Cyber Asset (PCA) associated with high or medium impact BES Cyber Systems; and 4. directly connected (e.g., using Ethernet, serial, Universal Serial Bus, or wireless including near field or

Bluetooth communication) for 30 consecutive calendar days or less to a:

• BES Cyber Asset,

• network within an Electronic Security Perimeter containing high or medium impact BES Cyber Systems, or

• PCA associated with high or medium impact BES Cyber Systems.

Examples of Transient Cyber Assets include, but are not limited to, Cyber Assets used for data transfer, vulnerability assessment, maintenance, or troubleshooting purposes.

Currently Approved Definition of “Transient Cyber Asset” (TCA): A Cyber Asset that (i) is capable of transmitting or transferring executable code, (ii) is not included in a BES Cyber System, (iii) is not a Protected Cyber Asset (PCA), and (iv) is directly connected (e.g., using Ethernet, serial, Universal Serial Bus, or wireless, including near field or Bluetooth communication) for 30

Agenda Item 6d Standards Committee October 19, 2016

Page 190: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Proposed Revised Term: “Transient Cyber Asset” 2

consecutive calendar days or less to a BES Cyber Asset, a network within an ESP, or a PCA. Examples include, but are not limited to, Cyber Assets used for data transfer, vulnerability assessment, maintenance, or troubleshooting purposes.

Page 191: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Implementation Plan Project 2016-02 Modifications to CIP Standards Reliability Standard CIP-003-7(i) Security Management Controls (Low Impact External Routable Connectivity and Transient Cyber Assets Used at low impact BES Cyber Systems) Requested Approvals

• Reliability Standard CIP-003-7(i) - Cyber Security – Security Management Controls

• Definition of Transient Cyber Asset (TCA) Requested Retirements • Reliability Standard CIP-003-6 - Cyber Security – Security Management Controls

• Definition of Transient Cyber Asset (TCA)

• Definition of Low Impact External Routable Connectivity (LERC)

• Definition of Low Impact BES Cyber System Electronic Access Point (LEAP) Applicable Entities • Balancing Authority

• Distribution Provider

• Generator Operator

• Generator Owner

• Interchange Coordinator or Interchange Authority

• Reliability Coordinator

• Transmission Operator

• Transmission Owner Background On January 21, 2016, the Federal Energy Regulatory Commission (Commission) issued Order No. 822, Revised Critical Infrastructure Protection Reliability Standards, approving seven Critical Infrastructure Protection (CIP) Reliability Standards and new or modified definitions. In addition to approving the seven CIP Reliability Standards, the Commission, among other things, directed NERC to: (1) “…develop modifications to the CIP Reliability Standards to provide mandatory protection for transient devices used at Low Impact BES Cyber Systems…”, and (2) modify the definition of LERC.

Agenda Item 6e Standards Committee October 19, 2016

Page 192: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Implementation Plan Project 2016-02 Modifications to CIP Standards | October 2016 2

As to the directive related to transient devices, the Commission stated:

32. After consideration of the comments received on this issue, we conclude that the adoption of controls for transient devices used at Low Impact BES Cyber Systems, including Low Impact Control Centers, will provide an important enhancement to the security posture of the bulk electric system by reinforcing the defense-in-depth nature of the CIP Reliability Standards at all impact levels. Accordingly, we direct that NERC, pursuant to section 215(d)(5) of the FPA, develop modifications to the CIP Reliability Standards to provide mandatory protection for transient devices used at Low Impact BES Cyber Systems based on the risk posed to bulk electric system reliability. While NERC has flexibility in the manner in which it addresses the Commission’s concerns, the proposed modifications should be designed to effectively address the risks posed by transient devices to Low Impact BES Cyber Systems in a manner that is consistent with the risk-based approach reflected in the CIP version 5 Standards.

For the LERC directive, the Commission stated:

73. Based on the comments received in response to the NOPR, the Commission concludes that a modification to the Low Impact External Routable Connectivity definition to reflect the commentary in the Guidelines and Technical Basis section of CIP-003-6 is necessary to provide needed clarity to the definition and eliminate ambiguity surrounding the term “direct” as it is used in the proposed definition. Therefore, pursuant to section 215(d)(5) of the FPA, we direct NERC to develop a modification to provide the needed clarity, within one year of the effective date of this Final Rule. We agree with NERC and other commenters that a suitable means to address our concern is to modify the Low Impact External Routable Connectivity definition consistent with the commentary in the Guidelines and Technical Basis section of CIP-003-6.

In response to these directives, NERC modified Reliability Standard CIP-003. Given the proposed modifications in Reliability CIP-003-7(i), there is no longer a need for the NERC Glossary terms of Low Impact External Routable Connectivity (LERC) and Low Impact BES Cyber System Electronic Access Point (LEAP). Consequently, NERC is proposing to retire those terms. Further, in responding to the transient devices directive, NERC is proposing modifications to the definition of TCA. The revised definition of TCA ensures the applicability of security controls, provides clarity, and accommodates the use of the term for all impact levels: high, medium and low. The revised definition will allow entities to deploy one program to manage TCAs across multiple impact levels. General Considerations This Implementation Plan does not modify the effective date for CIP-003-6 in the Implementation Plan associated with CIP-003-6 nor any of the phased-in compliance dates included therein.

Page 193: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Implementation Plan Project 2016-02 Modifications to CIP Standards | October 2016 3

Effective Date The effective date for the proposed Reliability Standard and NERC Glossary term is provided below: Where approval by an applicable governmental authority is required, Reliability Standard CIP-003-7(i) and the NERC Glossary term Transient Cyber Asset (TCA) shall become effective on the latter of September 1, 2018 or the first day of the first calendar quarter that is twelve (12) calendar months after the effective date of the applicable governmental authority’s order approving the standard and NERC Glossary term, or as otherwise provided for by the applicable governmental authority. Where approval by an applicable governmental authority is not required, Reliability Standard CIP-003-7(i) and the NERC Glossary term Transient Cyber Asset (TCA) shall become effective on the first day of the first calendar quarter that is twelve (12) calendar months after the date the standard is adopted by the NERC Board of Trustees, or as otherwise provided for in that jurisdiction. Planned or Unplanned Changes Planned or Unplanned Changes Resulting in a Higher Categorization – This implementation Plan incorporates by reference the section in the Implementation Plan associated with CIP-003-5 titled Planned or Unplanned Changes Resulting in a Higher Categorization.1

Unplanned Changes Resulting in Low Impact Categorization – This implementation Plan incorporates by reference the section in the Implementation Plan associated with CIP-003-6 titled Unplanned Changes Resulting in Low Impact Categorization. That section provides:

For unplanned changes resulting in a low impact categorization where previously the asset containing BES Cyber Systems had no categorization, the Responsible Entity shall comply with all Requirements applicable to low impact BES Cyber Systems within 12 calendar months following the identification and categorization of the affected BES Cyber System.

Retirement Date Reliability Standard CIP-003-6 Reliability Standard CIP-003-6 shall be retired immediately prior to the effective date of Reliability Standard CIP-003-7(i) in the particular jurisdiction in which the revised standard is becoming effective. Current NERC Glossary of Terms of TCA, LERC and LEAP The current definitions of TCA, LERC and LEAP shall be retired from the NERC Glossary of Terms immediately prior to the effective date of Reliability Standard CIP-003-7(i) in the particular jurisdiction in which the revised standard is becoming effective.

1 Due to the length of that section, it is not reproduced herein.

Page 194: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Reliability Standard Quality Review Form Project Name: Project 2016-02 Modifications to CIP Standards Standard: CIP-003-7(i) Date of Review: October 11, 2016 The standard drafting team (SDT) conducted a quality review in accordance with the NERC Guideline for Quality Review of NERC Reliability Standards Project Documents and recommends that the Standards Committee (SC) authorize the proposed documents for formal posting and balloting. Background The NERC Standard Processes Manual (SPM) Section 4.6 requires NERC staff to coordinate a Quality Review1 (QR) of the Reliability Standard, Implementation Plan, Violation Risk Factors (VRFs) and Violation Severity Levels (VSLs), in parallel with the development of the Reliability Standard and Implementation Plan to assess whether:

(1) the documents proposed for posting are within the scope of the associated Standard Authorization Request (SAR);

(2) the Reliability Standard is clear and enforceable as written; and

(3) the Reliability Standard meets the criteria specified in:

• NERC’s Benchmarks for Excellent Standards2 and

• criteria for governmental approval of Reliability Standards.3 Quality Review Summary for Project 2016-02 Modifications to CIP Standards The Quality Review (QR) for this posting was performed October 9 - 11, 2016 by Brian Murphy (NextEra Energy Resources), Michelle D’Antuono (Occidental Energy Ventures), Margaret Powell, David Revill, and Christine Hasha (SDT leadership), Howard Gugel, Darrel Richardson, and Monica Bales (NERC Standards staff), Shamai Elstein (NERC Legal staff), and Scott Mix (NERC Compliance staff). The QR team reviewed the documents and provided feedback to the SDT. The SDT considered the feedback, made appropriate modifications to the draft documents, and approved submitting the final documents to the SC for authorization to post for a 45-day comment and ballot period. There were no deviations from the SPM.

1 The SPM’s Quality Review requirements also apply to new or revised definitions and Reliability Standard interpretations. 2 http://www.nerc.com/files/10_Benchmarks_of_Excellent_Reliability_Standards.pdf. 3 See FERC Order No. 672.

Agenda Item 6f Standards Committee October 19, 2016

Page 195: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Quality Review of NERC Reliability Standards Project 2016-02 Modifications to CIP Standards Documents 2

The SDT hereby recommends that the SC authorize this project for initial comment and ballot period. /s/ Al McMeekin 10/11/16 Al McMeekin, NERC Senior Standard Developer Date /s/ Margaret Powell 10/11/16 Margaret Powell, Drafting Team Chair Date

Page 196: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Agenda Item 7 Standards Committee October 19, 2016

Hydro Quebec Request for Interpretation of

PRC-002-2 Requirement R5 Action Reject the Request for Interpretation (RFI) of PRC-002-2 Requirement R5 submitted by Hydro Quebec (HQ). Background Pursuant to Section 7.0 of the Standard Processes Manual (SPM), NERC staff recommends that the Standards Committee (SC) reject the RFI of PRC-002-2 Requirement R5 submitted by HQ. Section 7.0 of the SPM states, in part,

The entity requesting the Interpretation shall submit a Request for Interpretation form to the NERC Reliability Standards Staff explaining the clarification required, the specific circumstances surrounding the request, and the impact of not having the Interpretation provided. The NERC Reliability Standards and Legal Staffs shall review the request for interpretation to determine whether it meets the requirements for a valid interpretation. Based on this review, the NERC Standards and Legal Staffs shall make a recommendation to the Standards Committee whether to accept the request for Interpretation and move forward in responding to the Interpretation request.

Section 7.0 provides a number of examples of the grounds for which the SC is authorized to reject a RFI. For example, an RFI may be rejected “where a question has already been addressed in the record” and “where the meaning of a Reliability Standard is plain on its face. “1 The RFI submitted by HQ requests clarification of PRC-002-2 Requirement R5, which provides as follows:

R5. Each Responsible Entity shall:

5.1 Identify BES Elements for which dynamic Disturbance recording (DDR) data is required, including the following:

5.1.1 Generating resource(s) with:

5.1.1.1 Gross individual nameplate rating greater than or equal to 500 MVA.

5.1.1.2 Gross individual nameplate rating greater than or equal to 300 MVA where the gross plant/facility aggregate nameplate rating is greater than or equal to 1,000 MVA.

1See, NERC Rules of Procedure, Appendix 3A: Standard Processes Manual, p.31.

Page 197: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Agenda Item 7 Standards Committee October 19, 2016

HQ requests clarification regarding the application of Part 5.1.1.2. Specifically, whether Part 5.1.1.2 applies to DDR data for individual generator response or multiple unit facility interconnection point. HQ notes that it is attempting to clarify the scope of the standard and whether it would be acceptable to have DDR data taken on the high-side of the step-up transformer. Both the standard and the record are clear that Requirement R5 Part 5.1.1.2 requires DDR data for individual generating resources. Under Requirement R5, an entity must identify BES Elements for which DDR data is required, including generating resource(s) with “[g]ross individual nameplate rating greater than or equal to 300 MVA where the gross plant/facility aggregate nameplate rating is greater than or equal to 1,000 MVA.” The Guidelines and Technical Basis states that, “For generating plants, each individual generator at the plant/facility with a gross nameplate rating greater than or equal to 300 MVA must have DDR where the gross nameplate rating of the plant/facility is greater than or equal to 1,000 MVA (emphasis added).” As explained therein, “Having data regarding generator dynamic response to Disturbances greatly improves understanding of why an event occurs rather than what occurred.” The record is also instructive. In October 2014, the PRC-002-2 standard drafting team considered a comment from Bonneville Power Administration (BPA) regarding the Requirement R5.1.1 thresholds. In response, the drafting team stated: “For slowly evolving system disturbances, it is important to monitor individual generator response which would not be achieved from DDR at a multiple unit facility interconnection point.” See October 28, 2014 Consideration of Comments at p. 17-18 (emphasis added). The second part of HQ’s RFI is addressed by Requirement R7. Requirement R7 provides that the Generator Owner shall have DDR data to determine certain electrical quantities “for each BES Element it owns for which it received notification as identified in Requirement R5.” 2 Requirement R7.1 allows flexibility for voltage measurements at either the high-side or low-side of the generator step up transformer. However, this flexibility does not negate the clear language of the standard that requires the entity to have DDR data to determine electrical quantities “for each BES Element it owns.” Under the configuration presented in HQ’s RFI, where the responsible entity would be collecting data in the aggregate from two or more generating units, it may not be possible for the entity to have DDR data to derive the specified electrical quantities for “each BES Element it owns.” 2 Requirement R7 provides:

R7. Each Generator Owner shall have DDR data to determine the following electrical quantities for each BES Element it owns for which it received notification as identified in Requirement R5:

7.1 One phase-to-neutral, phase-to-phase, or positive sequence voltage at either the generator step-up transformer (GSU) high-side or low-side voltage level.

7.2 The phase current for the same phase at the same voltage corresponding to the voltage in Requirement R7, Part 7.1, phase current(s) for any phase-to-phase voltages, or positive sequence current.

7.3 Real Power and Reactive Power flows expressed on a three phase basis corresponding to all circuits where current measurements are required.

7.4 Frequency of at least one of the voltages in Requirement R7, Part 7.1.

Page 198: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Agenda Item 7 Standards Committee October 19, 2016

The NERC staff standards developer and leadership of PRC-002-2 standard drafting team have also reviewed the RFI and agrees with the explanations stated above. Under Section 7.0, if the SC rejects the RFI, the committee shall provide a written explanation for rejection to the entity submitting the RFI within 10 business days of the decision to reject. If the SC accepts the RFI request, the NERC standards staff shall (i) form a ballot pool and (ii) assemble an Interpretation drafting team with the relevant expertise to address the interpretation for approval by the SC.

Page 199: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Note: an Interpretation cannot be used to change a standard.

Interpretation 2010-xx: Request for an Interpretation of PRC-002-2, Requirement R5, for Hydro-Quebec TransEnergie

Date submitted:

Contact information for person requesting the interpretation:

Name: Mathilde Champagne

Organization: Hydro-Québec TransÉnergie

Telephone: (514) 879-4100 ext. 3615

Email: [email protected]

Identify the standard that needs clarification:

Standard Number (include version number): PRC-002-2

Standard Title: Disturbance Monitoring and Reporting Requirements

Identify specifically what requirement needs clarification:

Requirement Number and Text of Requirement: R5 Each Responsible Entity shall: [Violation Risk Factor: Lower] [Time Horizon: Long-term Planning] 5.1 Identify BES Elements for which dynamic Disturbance recording (DDR) data is required, including the following: 5.1.1 Generating resource(s) with: 5.1.1.1 Gross individual nameplate rating greater than or equal to 500 MVA. 5.1.1.2 Gross individual nameplate rating greater than or equal to 300 MVA where the gross plant/facility aggregate nameplate rating is greater than or equal to 1,000 MVA. Clarification needed: Does requirement 5.1.1.2 applies to DDR data for individual generator response or multiple unit facility interconnection point (see line diagram below where A1 and A2 are generators)? In this example, would it be acceptable to have DDR data taken on the high-side of the step-up transformer?

When completed, email this form to: [email protected]

Agenda Item 7a Standards Committee October 19, 2016

Page 200: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Document Title 2

A1 A2

Identify the material impact associated with this interpretation:

Identify the material impact to your organization or others caused by the lack of clarity or an incorrect interpretation of this standard.

HQT is implementing the PRC-002-2 standard and needs to clarify the scope of the standard. REF 7.1

If requirement 5.1.1.2 does apply to each generator, HQT will have to install twice as much devices to obtain DDR data for each generator unit (DDR at low-side of step-up transformer). This could involve the purchase of more DDR equipment and would require more interventions in transmission substation without providing a gain in reliability considering the fact that having DDR data on the high side is sufficient for large area event analysis.

Version History Version Date Owner Change Tracking

1 April 22, 2011

1 May 27, 2014 Standards Information Staff Updated template and email address for submittal.

DDR data at high-side of step-up transformer.

Page 201: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Agenda Item 8 Standards Committee October 19, 2016

Hydro Quebec Request for Interpretation of

PRC-002-2 Requirement R10 Action Pursuant to Section 7.0 of the Standard Processes Manual (SPM), NERC staff recommends that that Standards Committee (SC) reject the Request for Interpretation (RFI) of PRC-002-2 Requirement R10 submitted by Hydro Quebec (HQ). The RFI should be rejected on the grounds that the meaning of the Reliability Standard language at issue is plain on its face.

Background Section 7.0 of the SPM, in part,

The entity requesting the Interpretation shall submit a Request for Interpretation form to the NERC Reliability Standards Staff explaining the clarification required, the specific circumstances surrounding the request, and the impact of not having the Interpretation provided. The NERC Reliability Standards and Legal Staffs shall review the request for interpretation to determine whether it meets the requirements for a valid interpretation. Based on this review, the NERC Standards and Legal Staffs shall make a recommendation to the Standards Committee whether to accept the request for Interpretation and move forward in responding to the Interpretation request.

Section 7 provides a number of examples of the grounds for which the SC is authorized to reject a RFI. One basis for rejecting a RFI is, “[w]here the meaning of a Reliability Standard is plain on its face.”1 The RFI at issue requests clarification of PRC-002-2 Requirement R10, which provides as follows:

R10. Each Transmission Owner and Generator Owner shall time synchronize all SER and FR data for the BES buses identified in Requirement R1 and DDR data for the BES Elements identified in Requirement R5 to meet the following:

10.1 Synchronization to Coordinated Universal Time (UTC) with or without a local time offset.

10.2 Synchronized device clock accuracy within ± 2 milliseconds of UTC.

HQ seeks clarification regarding what must be time-synchronized within +2 milliseconds: the Sequence of Events Recording (SER) and Fault Response (FR) data or the device clock. Also, HQ seeks clarification regarding whether the entity must time-synchronize all SER and FR data for the Bulk Electric System (BES) buses continuously, or if the time-synchronization is only 1 Id.

Page 202: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Agenda Item 8 Standards Committee October 19, 2016

required upon request of a “Responsible Entity, Regional Entity or NERC” (pursuant to Requirement R112). The RFI should be rejected because the language of the standard is clear on its face. With regard to the question of what must be time-synchronized, the language of Requirement R10 is clear that the synchronized device clock accuracy must be within + 2 milliseconds. While the device accuracy must be within the allowed parameter, how the entity obtains its time (e.g., GPS) is irrelevant. Assuming the entity is able to demonstrate the required accuracy, then it would synchronize the time to UTC. With regard to the question of whether the entity must continuously time-synchronize or only upon request, the language is clear that under Requirement R10, the device clock accuracy must be synchronized to UTC, within the allowable parameters, for certain BES buses (identified in Requirement R1) and BES Elements (identified in Requirement R5). Requirement R11 clearly states that the owner is only required to provide the SER, FR and DDR data (that was properly synchronized under Requirement R10), “upon request” of the “Responsible Entity, Regional Entity, or NERC.” 3 The NERC staff standards developer and leadership of PRC-002-2 standard drafting team have also reviewed the RFI and agrees with the explanations stated above. Under Section 7, if the SC rejects the RFI, the committee shall provide a written explanation for rejection to the entity submitting the RFI within 10 business days of the decision to reject. If the SC accepts the RFI request, the NERC standards staff shall (i) form a ballot pool and (ii) assemble an interpretation drafting team with the relevant expertise to address the interpretation for approval by the SC.

2 R11. Each Transmission Owner and Generator Owner shall provide, upon request, all SER and FR data for the BES buses

identified in Requirement R1 and DDR data for the BES Elements identified in Requirement R5 to the Responsible Entity, Regional Entity, or NERC in accordance with the following: 11.1 Data will be retrievable for the period of 10-calendar days, inclusive of the day the data was recorded. 11.2 Data subject to Part 11.1 will be provided within 30-calendar days of a request unless an extension is granted by

the requestor. 11.3 SER data will be provided in ASCII Comma Separated Value (CSV) format following Attachment 2. 11.4 FR and DDR data will be provided in electronic files that are formatted in conformance with C37.111, (IEEE

Standard for Common Format for Transient Data Exchange (COMTRADE), revision C37.111-1999 or later. 11.5 Data files will be named in conformance with C37.232, IEEE Standard for Common Format for Naming Time Sequence Data Files (COMNAME), revision C37.232-2011 or later. (emphasis added)

3 Id.

Page 203: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Note: an Interpretation cannot be used to change a standard.

Interpretation 2010-xx: Request for an Interpretation of PRC-002-2, Requirement R10, for Hydro-Quebec TransEnergie

Date submitted:

Contact information for person requesting the interpretation:

Name: Mathilde Champagne

Organization: Hydro-Québec TransÉnergie

Telephone: (514) 879-4100 ext. 3615

Email: [email protected]

Identify the standard that needs clarification:

Standard Number (include version number): PRC-002-2

Standard Title: Disturbance Monitoring and Reporting Requirements

Identify specifically what requirement needs clarification:

Requirement Number and Text of Requirement: R10. Each Transmission Owner and Generator Owner shall time synchronize all SER and FR data for the BES buses identified in Requirement R1 and DDR data for the BES Elements identified in Requirement R5 to meet the following: [Violation Risk Factor: Lower] [Time Horizon: Long-term Planning] 10.1 Synchronization to Coordinated Universal Time (UTC) with or without a local time offset.

10.2 Synchronized device clock accuracy within ± 2 milliseconds of UTC.

Clarification needed: Please clarify what the entity should time synchronize: SER and FR Data or the device clock within ± 2 milliseconds of UTC. Please clarify if each Transmission Owner and Generator Owner shall time synchronize all SER and FR data for the BES buses only upon request of Responsible Entity, Regional Entity or NERC as mentioned in R11.

Identify the material impact associated with this interpretation:

Identify the material impact to your organization or others caused by the lack of clarity or an incorrect interpretation of this standard.

When completed, email this form to: [email protected]

Agenda Item 8a Standards Committee October 19, 2016

Page 204: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Document Title 2

Time is distributed through Hydro Quebec TransÉnergie’s (HQT) extended network using IRIG-B signal which reaches stations and substations with delays. Since these delays are known precisely, HQT is able to synchronize all SER and FR data. Consequently, the synchronized local device clock is not required.

If the interpretation of the synchronization of the local device clock is required, HQT would have to install new slave(s) clock(s) in the stations and substations. This could involve the purchase of a significant number of clocks and installation requiring numerous interventions in transmission substations without providing any gain in reliability for the Quebec Interconnexion (or its customers), considering the fact that HQT has the capability to time synchronize all SER and FR data.

Version History Version Date Owner Change Tracking

1 April 22, 2011

1 May 27, 2014 Standards Information Staff Updated template and email address for submittal.

Page 205: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Agenda Item 9 Standards Committee October 19, 2016

Standards Committee Process Subcommittee - Standards Resource Document

Project Drafting Team Reference Manual

Action Approve the revisions to the Drafting Team Reference Manual. Background At the July 20, 2016 Standards Committee (SC) meeting the Standards Committee Process Subcommittee (SCPS) requested the SC review and provide comments on the SCPS revisions to the Drafting Team Reference Manual. The SCPS received four sets of comments and after review has addressed all of the identified concerns and recommendations. Provided in the agenda package is a clean and a redline (to the version provided for SC comments) version of the Drafting Team Reference Manual for your consideration. As reported previously, the proposed changes within the overall revision correct grammatical inconsistencies, provide additional clarification, and incorporate consistent terminology. Below is a summary of what the SCPS would consider to be the major changes. For ease of review, what is identified in bold is the title of the section within the document that is being modified.

• Added additional requirements for the Interpretation Drafting Team (IDT). These are around specific of how to handle a request for interpretation.

• Under the DT Member section added a paragraph associated with the Project Management and Oversight Subcommittee being involved with project schedule and management

• Under the Standards Balloting System added language to clarify the requirements of the new balloting system. This includes the changes associated with the format of the consideration of comments.

• Added clarity to the Obligation to Respond to Comments section. This provides the DT with more specificity on when comments are required to be responded to and when they are not.

• Within the DT Develops an Implementation Plan (IP) section there was additional clarity around when the IP shall be posted.

• Under DT Develops Supporting Document(s) (if necessary) added definition for Guideline.

• Within the DT Develops of a Draft Standard numerous changes were made to meet the requirements of the current template.

• Under the Effective date within DT Develops a Draft Standard section clarifications were made to provide better samples of when the effective date of a particular standard/requirement would take place.

Page 206: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Agenda Item 9 Standards Committee October 19, 2016

• Under Section C – Compliance added language to meet the requirements of the current template.

In conclusion, the SCPS recommends that the SC approve the revised Drafting Team Reference Manual. NERC staff has agreed to post the document on the NERC website (Standards/Resource) as a Reference Document.

Page 207: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

NERC | Report Title | Report Date I

Drafting Team Reference Manual Version 3 Reviewed by the Standards Committee October 19, 2016

Agenda Item 9a Standards Committee October 19, 2016

Page 208: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

NERC | DRAFT 2017–2019 Reliability Standards Development Plan | June 15, 2016 ii

Table of Contents

Introduction ............................................................................................................................................................... iv

Principles Supporting the NERC Standards Development Process ......................................................................... v

Results-based Requirements .............................................................................................................................. v

Adequate Level of Reliability (ALR) ........................................................................................................................ vi

Reliability Principles ........................................................................................................................................... vi

Market Principles ............................................................................................................................................... vi

Ten Benchmarks of an Excellent Reliability Standard ........................................................................................ vi

DT Member Roles .................................................................................................................................................. vi

Standards Developer .......................................................................................................................................... vi

DT Chair and Vice Chair ...................................................................................................................................... vi

DT Members ...................................................................................................................................................... vii

Compliance, Legal, and Technical Support ....................................................................................................... vii

Informal Development ...............................................................................................................................................1

Development Project Workflows ...............................................................................................................................2

Stakeholder Comments .......................................................................................................................................4

Table of Commenters ..........................................................................................................................................4

Standards Balloting System (SBS) Comment Report. ..........................................................................................4

Comments and Responses ..................................................................................................................................5

Evaluation of Comments as an Indication of Potential Ballot Results ................................................................5

Obligation to Respond to Comments ..................................................................................................................5

Assessing Technical Merit of Comments ............................................................................................................6

Practical Tips for Addressing Comments .............................................................................................................6

Additional DT Guidance ..........................................................................................................................................6

Submission of Final Work Product for Approval .................................................................................................6

Quality Review ....................................................................................................................................................7

FERC Directives ....................................................................................................................................................7

DT Reviews Directives with FERC Staff ................................................................................................................7

DT Develops Proposed New or Revised Defined Term(s) (if necessary) .............................................................7

DT Develops a Supplemental SAR (if needed).....................................................................................................8

DT Develops an Implementation Plan .................................................................................................................8

Supporting Document(s) (if necessary) ...............................................................................................................8

Parts of the Results-Based Standard ..........................................................................................................................9

Page 209: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Table of Contents

NERC | DRAFT 2017–2019 Reliability Standards Development Plan | June 15, 2016 iii

Section A – Introduction .....................................................................................................................................9

Section B – Requirements and Measures ........................................................................................................ 11

Section C – Compliance .................................................................................................................................... 13

Section D – Regional Variances ........................................................................................................................ 14

Section E – Associated Documents .................................................................................................................. 14

Section F – References ..................................................................................................................................... 14

Version History ................................................................................................................................................. 15

Supplemental Material ..................................................................................................................................... 15

Rationale .......................................................................................................................................................... 15

Attachment A — Verbs Used in Reliability Standards ......................................................................................... 16

Version History..................................................................................................................................................... 20

Page 210: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

NERC | DRAFT 2017–2019 Reliability Standards Development Plan | June 15, 2016 iv

Introduction

Note: All documents referenced in this manual are located on the NERC Standards Resource web page unless otherwise noted.

Drafting teams (DT) are the foundation of the NERC standard development process. The DT Reference Manual is a tool that can be used by DTs to assist in drafting quality Reliability Standards. DT members are encouraged to refer to this document to assist in the development process.

This document does not supersede the NERC Rules of Procedure (ROP)1 or any standard process or guidelines approved by the Federal Energy Regulatory Commission (FERC) or applicable regulatory authorities.

This document provides information on informal development, standard authorization requests, and the roles and responsibilities of standard and interpretation DTs, with guidance on how to implement Appendix 3A of the NERC Rules of Procedure and the Standard Processes Manual (SPM)2. The DT Reference Manual outlines the roles and responsibilities of DT members throughout the Reliability Standards development process.

The SPM contemplates several types of development teams who perform the standards-related activities including:

• Standard Authorization Request (SAR) DT — A SAR DT may be appointed by the Standards Committee (SC) to work with the SAR submitter. The SAR DT helps the requester achieve stakeholder consensus on whether a standard is needed to address a reliability-related need, and on the scope of the project to address the identified need. The role of the SAR DT will be to evaluate and respond to industry comments on the technical justification, background information, potential for industry consensus, and associated cost impact analysis information to determine the level of support and scope of a standard. The SAR and a recommendation by the SAR DT will be presented to the SC; the SC determines whether a standard development project should be pursued.

• Standard Drafting Team (SDT) — SDTs are formed to develop new or modified Reliability Standards or definitions. Responsibilities of the team include, but are not limited to:

Developing a project schedule and timeline. This may be in collaboration with the Project Management and Oversight (PMOS) Subcommittee.

Draft a Reliability Standard or definition within the scope of the SAR.

Develop an implementation plan to identify any factors for consideration when approving the proposed effective date or dates for the associated Reliability Standard(s) or definitions.

Develop a set of Violation Risk Factors (VRFs) and Violation Severity Levels (VSLs) that meet the latest criteria established by NERC and Applicable Governmental Authorities.

Collect informal stakeholder feedback on preliminary drafts of its documents, including the use of informal comment periods, webinars, industry meetings, workshops, or other mechanisms.

Consider the results of the quality review (QR), decide upon appropriate changes, and recommend to the SC whether the documents are ready for formal posting and balloting.

1 The Rules of Procedure is located here: http://www.nerc.com/AboutNERC/Pages/Rules-of-Procedure.aspx 2 The Standard Processes Manual is located here: http://www.nerc.com/pa/Stand/Documents/Appendix_3A_StandardsProcessesManual.pdf

Page 211: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Introduction

NERC | DRAFT 2017–2019 Reliability Standards Development Plan | June 15, 2016 v

Consider stakeholder comments that will improve the quality, clarity, or enforceability of that Reliability Standard and make appropriate revisions to the proposed Reliability Standard.

The DT is encouraged to consult the developmental history of the standards under revision on the Archived Reliability Standards Under Development3 web page.

• Interpretation Drafting Team (IDT) — A team may be formed to develop an Interpretation as outlined in Section 7.0 of the SPM. An Interpretation may only clarify or interpret the Requirements of an approved Reliability Standard, including, if applicable, any attachment referenced in the Requirement being clarified. An approved Interpretation will be appended to the existing approved standard to which it applies until the Interpretation can be incorporated into a future revision of the Reliability Standard or the Interpretation is retired due to a future modification of the applicable Requirement. IDTs will respond to a request for interpretation following the guidance provided in Guideline for Interpretation Drafting Teams. In general, Interpretations may not change the standard, address a weakness or gap in the standard, address any element of a Reliability Standard other than a Requirement or an attachment referenced in a Requirement, or provide an opinion on whether a particular approach would achieve compliance with the standard.

IDTs are encouraged to review past history of the standard’s development by assessing the full record including, but not limited to, past comments and responses. Also, if a potential reliability issue or gap exists or is determined during the interpretation process, the team should document suggested revisions, develop a SAR to revise the standard accordingly, and submit the SAR to NERC staff.

Principles Supporting the NERC Standards Development Process The work of DTs is guided by the most recent FERC-approved version of the NERC Standard Processes Manual with additional guidance from the following documents:

• Standard Drafting Team Scope which is applicable to both SAR and standard DTs

• Roles and Responsibilities: Standards Drafting Team Activities

• Standards Development Process Participant Conduct Policy The following attributes serve as a foundation for development of high quality, technically sound, results-based standards.

Results-based Requirements The body of reliability requirements collectively supports a defense-in-depth strategy supporting an Adequate Level of Reliability (ALR)4 of the bulk power system (BPS). Each requirement of a Reliability Standard should identify what Functional Entities shall do and under what conditions, to achieve a specific reliability objective; but not how that objective is achieved. There are categories of requirements, each with a different approach for measurement, as specified in Section 2.4 of the SPM.

a) Performance-based Requirements define a specific reliability objective or outcome achieved by one or more entities that has a direct, observable effect on the reliability of the BPS, i.e. an effect that can be measured using power system data or trends. In its simplest form, a performance-based requirement has

3 http://www.nerc.com/pa/Stand/Pages/Archived-Projects.aspx 4 NERC filed its definition for “Adequate Level of Reliability” with the Commission on May 10, 2013. Informational Filing on the Definition

of “Adequate Level of Reliability , available at: http://www.nerc.com/FilingsOrders/us/NERC%20Filings%20to%20FERC%20DL/Informational_Filing_Definition_Adequate_Level_Reliability_20130510.pdf.

Page 212: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Introduction

NERC | DRAFT 2017–2019 Reliability Standards Development Plan | June 15, 2016 vi

four components: who, under what conditions (if any), shall perform what action, to achieve what particular result or outcome.

b) Risk-based Requirements define actions by one or more entities that reduce a stated risk to the reliability of the BPS and can be measured by evaluating a particular product or outcome resulting from the required actions. A risk-based reliability requirement should be framed as: who, under what conditions (if any), shall perform what action, to achieve what particular result or outcome that reduces a stated risk to the reliability of the BPS.

c) Capability-based Requirements define capabilities needed by one or more entities to perform reliability functions that can be measured by demonstrating that the capability exists as required. A capability-based reliability requirement should be framed as: who, under what conditions (if any), shall have what capability, to achieve what particular result or outcome to perform an action to achieve a result or outcome or to reduce a risk to the reliability of the BPS.

Adequate Level of Reliability (ALR) The intent of the set of NERC Reliability Standards is to deliver an ALR. As defined by NERC, “ALR is the state that the design, planning, and operation of the Bulk Electric System (BES) will achieve when the listed Reliability Performance Objectives are met. Further, Reliability Assessment Objectives included in the definition must be evaluated to assess reliability risk in support of an adequate level of reliability.” Reliability Principles NERC Reliability Standards are based on reliability principles that define the foundation of reliability for the North American BPS. Each Reliability Standard should enable or support one or more of the reliability principles ensuring both that the standards support reliability of the North American BPS and avoid reducing reliability through an unintended consequence. Market Principles Recognizing that BPS reliability and electricity markets are inseparable and mutually interdependent, all Reliability Standards shall be written such that they achieve their reliability objective without causing undue restrictions or adverse impacts on competitive electricity markets. Ten Benchmarks of an Excellent Reliability Standard NERC Reliability Standards are developed to meet the Ten Benchmarks of an Excellent Reliability Standard. DT Member Roles Standards Developer

The NERC Standards Developer is a NERC Standards staff member assigned to facilitate and assist DTs to ensure consistency and quality in the development of standard products. The Standards Developer keeps the project on track and informs the SC of progress.

DT Chair and Vice Chair The DT chair and vice chair have the following additional responsibilities beyond that of DT members, to:

a) lead the DT in the effective dispatch of its standards development obligations;

b) facilitate DT discussions and outreach to attain industry consensus on proposed standard(s) that will achieve the project objectives;

Page 213: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Introduction

NERC | DRAFT 2017–2019 Reliability Standards Development Plan | June 15, 2016 vii

c) coordinate with NERC staff in representing the DT before the SC reporting on team progress in implementing the scope of the project objective, the schedule for completion, and the need to address any regulatory directives;

d) coordinate, as necessary, with other DTs to ensure that there are no reliability gaps;

e) represent the DT in discussions with governmental authorities on the content of the standard(s) and how the proposed standard(s) address any applicable regulatory directives;

f) ensure project milestones are met and coordinate with the Project Management and Oversight Subcommittee; and

g) work with the NERC Standards Developer to support regulatory approval of the proposed standard(s), including assisting with providing technical input for:

i. regulatory filings for approval of the proposed standard(s);

ii. responses to a notice of proposed rule-making(s); and

iii. request(s) for clarification or rehearing following the issuance of the rule or order addressing the proposed standard filed for approval.

DT Members DTs, following NERC’s standard development process and based on agreed upon milestones, are responsible for developing and providing to stakeholders for approval, excellent, technically correct (steady-state) standards that provide for an ALR. A DT may modify existing standards to address both specific regulatory authority directives and reliability issues not directed by regulatory authorities or develop new standards that may or may not be associated with regulatory directives. DT members may perform outreach to stakeholders throughout the development process to build consensus. The DT shall develop a project schedule. The drafting team shall report progress to the PMOS (or PMOS liaison) and the SC, against the initial project schedule and any revised schedule as requested by the SC. Where project milestones cannot be completed on a timely basis, modifications to the project schedule must be presented to the SC for consideration along with proposed steps to minimize unplanned project delays. Compliance, Legal, and Technical Support Individuals with specific expertise may participate in the development process on an as needed basis to provide input in their areas of expertise. While not formal team members, they may participate in discussions.

Page 214: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

NERC | DRAFT 2017–2019 Reliability Standards Development Plan | June 15, 2016 1

Informal Development

This section describes activities outside the formal standard development process that assist the team. The informal development activities are meant to identify issues associated with the project and determine whether there is a solution that consensus could be built upon, thereby reducing the time needed during the formal standards development process outlined in the SPM. The informal development activity does not circumvent the formal standards development process. Rather, its use is meant solely to raise issues and build consensus outside of formal standards development.

Informal consensus building activities include, but are not restricted to the following tools to advance industry awareness and build support for the standard as opportunities to educate and inform stakeholders:

• Conducting

webinars

industry surveys

in-person workshops

in-person meetings open to the stakeholders

straw polls

• Publishing announcements

• Leveraging existing venues such as Compliance Workshops

• Leveraging existing and historical technical committee work

• Using any applicable NERC communication plans

• FERC outreach

Page 215: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

NERC | DRAFT 2017–2019 Reliability Standards Development Plan | June 15, 2016 2

Development Project Workflows Figure 1 below shows the typical first steps of NERC’s formal standards development process, the SAR development.

Figure 1 and the discussion on the following pages assume that stakeholders support the SAR and the SAR is progressing normally. If stakeholders support a SAR and there is a demonstrable need to move the SAR forward expeditiously, then the SC may allow concurrent work on the SAR and standard, with some of the steps outlined in the SPM occurring in parallel rather than sequentially.

In Figure 1 below, the SAR DT’s activities are shown in the yellow boxes.

Figure 1: SAR Development (See Sections 4.1 and 4.2 in the SPM for detailed information)

Edit: Format, Grammar, Spelling

Submit SAR Authorize Posting

Post Request for Volunteers

Post SAR for Comment

Submit Self-Nomination

Form

Appoint SAR DT

Submit Comments

Assemble Comments for

SAR DT

Consider Comments & Revise SAR

Edit: Format, Grammar, Spelling

Post Revised SAR &

Responses

Submit Comments

Assemble Comments for

SAR DT

Consider Comments & Revise SAR

Edit: Format, Grammar, Spelling

Authorize Developing the Standard

Post Final SAR &

Responses

Page 216: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Development Project Workflows

NERC | DRAFT 2017–2019 Reliability Standards Development Plan | June 15, 2016 3

Figure 2 illustrates the typical steps in the standards development process beginning with solicitation of DT nominations.

Figure 2 and the associated discussion on the following pages is a simplified representation of a standard that is progressing normally and with minimal comment/ballot periods. The DT focuses its work on drafting a standard and then considering comments submitted by stakeholders and revising the standard until there is enough stakeholder consensus to achieve approval of the standard or project. To obtain consensus and approval, additional comment/ballot periods can be completed, as necessary.

In Figure 2 below, the DT’s activities are shown in the yellow boxes.

Figure 2: From SAR to Standard (See sections 4.3-4.7 of the SPM for further details)

Post Request for Volunteers

Submit Self-Nomination

FormAppoint SDT

Edit: Format, Grammar, Spelling

Post Draft Standard

Submit Comments

Assemble Comments for

SDT

Consider Comments,

Revise Std. & Develop Imp.

Plan

Edit: Format, Grammar, Spelling

Draft Strandard

Post Draft Standard

Submit Comments

Assemble Comments for

SDT

Consider Comments,

Revise Std. & Imp. Plan

Edit: Format, Grammar, Spelling

Request Review for Field test

Authorize Field Test or

Ballot

Post Final Standard

Responses & Imp. Plan

Conduct 1st Ballot

Assemble Comments for

SDT

Consider Comments

Edit: Format, Grammar, Spelling

Conduct Final Ballot Post for BOT

Adoption

Submit toGovernmental

Authorities

Page 217: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Development Project Workflows

NERC | DRAFT 2017–2019 Reliability Standards Development Plan | June 15, 2016 4

At the first meeting of the DT, the Standards Developer or another NERC Standards staff member will provide a brief orientation and training session on the standards. The Standards Developer will communicate information regarding SDT training modules to all drafting team members. The goals of the orientation are to:

• Ensure the team understands NERC policies and procedures applicable to DTs, including NERC’s Antitrust Compliance Guidelines.

• Ensure that all team members understand the roles and responsibilities of all involved by reviewing the Roles and Responsibilities: Standards DT Activities and Standards Development Process - Participant Conduct Policy.

• Review the SAR to ensure that everyone on the team understands the scope of the proposed standard and any FERC Orders/directives that may apply to this proposed new or revised Reliability Standard. Develop a consensus of the DT as to how to respond to stakeholder comments with the intent of revising work products to reflect the consensus view of stakeholders.

• Review and understand how quality review for the DT’s work will be undertaken as required under Section 4.6 of the SPM, i.e. what will be reviewed prior to the posting for ballot. The QR will evaluate whether the documents are within the scope of the associated SAR, whether the Reliability Standard is clear and enforceable as written, and whether the Reliability Standard meets the criteria specified in NERC’s Ten Benchmarks of an Excellent Reliability Standard and criteria for governmental approval of Reliability Standards.

• Develop a project schedule and list of activities for completing standards drafting activities in accordance with SC expectations or Reliability Standards Development Plan (RSDP) requirements.

• Provide the project schedule to the SC or its designee for review and approval.

• Discuss the organization structure of NERC and its committees.

• Understand the function and role of the PMOS liaison assigned to the DT.

• Review the current cost effectiveness process and understand how it relates to the project.

Stakeholder Comments NERC staff will provide DTs with a report containing all of the comments submitted during the comment period. The report consists of the following information:

Table of Commenters The Table of Commenters is a list of stakeholders who complete comment forms. It is organized to show the industry segments represented by each commenter. Standards Balloting System (SBS) Comment Report Drafting team members will receive a comment report containing all comments received from responses to the individual questions and the interactive comments including thumbs up/thumbs down selections. It is the drafting team member’s responsibility to review all comments received.

Page 218: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Development Project Workflows

NERC | DRAFT 2017–2019 Reliability Standards Development Plan | June 15, 2016 5

Comments and Responses The format of the Consideration of Comments report includes each submitter’s name, company, segment, answer(s) to question(s), comments submitted in response to the associated question, and the appeals process statement. As comments are reviewed, the DT develops responses as discussed in Section 4.12 of the SPM. The comments and responses are assembled in the Consideration of Comments report and posted on the associated project page. Evaluation of Comments as an Indication of Potential Ballot Results Because industry stakeholders are not required to comment, a DT may not receive the full range of concerns in the submitted comments that represent the entire body of stakeholder opinions. DTs are encouraged to evaluate whether the set of comments is representative of the industry or a subset of the industry and to consider the sources of the comments when determining what revisions may be necessary to gain industry support for the standard. From the comment form, the DT can determine if the comments represent: 1) an individual in a single industry segment; 2) an individual representing several industry segments; 3) an individual representing a group in a region or industry segment; 4) a group representing several entities; 5) a group on behalf of a single entity; 6) a group representing a region; and 7) a group from a technical committee with members across regions and industry segments. One way of interpreting the comments is to determine how many ballots are represented by each comment and consider the following:

• A single commenter from an entity that is registered to vote in one industry segment may be considered to represent a single potential ballot.

• A single commenter from an entity that is registered to vote in three industry segments may be considered to represent three potential ballots.

• Six commenters from an entity that is registered to vote in one industry segment may be considered to represent a single potential ballot.

• Six commenters, each from different entities with each of these entities registered to vote in one industry segment, may be considered to represent six potential ballots or, if in multiple industry segments, may result in an even greater number of ballot positions.

Obligation to Respond to Comments Proposed new or modified Reliability Standards require a formal comment period. The intent of the formal comment period is to solicit feedback on the final draft of the Reliability Standard and associated documents. A drafting team must respond in writing to every stakeholder written comment submitted in response to a ballot prior to conducting a Final Ballot. These responses may be provided in summary form, but all comments and objections must be responded to by the drafting team. All comments received and all responses shall be publicly posted. If a stakeholder or balloter proposes a significant revision to a Reliability Standard during a formal comment period or concurrent ballot that will improve the quality, clarity, or enforceability of that Reliability Standard, then the drafting team may choose to make such revisions and post the Revised Reliability Standard for another formal comment period and ballot. Prior to posting a revised Reliability Standard for an additional comment period, the DT must communicate to stakeholders that significant revisions to the Reliability Standard are necessary. This communication should note that the DT is not required to respond in writing to comments from the previous ballot.

Page 219: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Development Project Workflows

NERC | DRAFT 2017–2019 Reliability Standards Development Plan | June 15, 2016 6

There is no formal comment period concurrent with the Final Ballot, and no obligation for the drafting team to respond to any comments submitted during the Final Ballot. There is no requirement for a drafting team to respond in writing to comments submitted through an informal comment period.

Assessing Technical Merit of Comments When reviewing the comments, the DT should first determine whether the comment has technical merit, and then determine whether the suggestion is likely to receive widespread support from the stakeholder community, with the understanding that 100 percent agreement is likely unachievable. In some cases, but not all, a DT may feel that additional comment periods are necessary to reach industry consensus.

Any relevant cost evaluation document is meant to identify potential egregious costs associated with a new standard. If a cost evaluation was conducted, results should be used only in the context of providing further information along with the SAR and should be provided to the SC.

Practical Tips for Addressing Comments One approach to completing the Consideration of Comments report is for the DT to review all the comments submitted in response to a particular question and then have a discussion. Some DTs find it useful to craft responses together, developing a draft response to each unique comment during the meeting. Other DTs prefer to divide the comments among team members allowing the assigned team member to prepare an initial draft response for team discussion at its meeting. In either case, review and discussion should support the DT’s efforts to reach a stakeholder consensus. Additional DT Guidance Submission of Final Work Product for Approval When the balloting process indicates sufficient industry consensus, the DT provides a recommendation to the SC that may include the following:

• For a SAR: a statement indicating the SAR DT believes there is stakeholder consensus on the following: a reliability-related need for the proposed standard action and the appropriate scope of the requirements;

• For a Reliability Standard or Definition: a summary listing of the work of the DT to achieve stakeholder consensus including: 1. dates each draft of the standard product was posted for comment;

2. link to the associated Standards Development web page; and

3. link to redline version of the final standard product to show changes from the last version of the standard product posted for comment;

• An analysis of the diversity of stakeholder participation in the comment periods;

• Identification of any strong minority views that were not satisfied during the revisions made to the standard product and pertinent cost impact information that may have been collected during the comment period(s).

Page 220: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Development Project Workflows

NERC | DRAFT 2017–2019 Reliability Standards Development Plan | June 15, 2016 7

Quality Review Quality reviews are conducted during standard development and are required by Section 4.6 of the SPM prior to the initial ballot and formal comment period. The DT Chair may, at any time, ask the NERC Standards Developer to initiate the necessary requests for a QR5 and it may be conducted depending on available resources. The QR will evaluate whether the documents are within the scope of the associated SAR, whether the Reliability Standard is clear and enforceable as written, and whether the Reliability Standard meets the criteria specified in NERC’s Ten Benchmarks of an Excellent Reliability Standard and criteria for governmental approval of Reliability Standards. The DT may consider the results of the QR, decide upon appropriate changes, and recommend to the SC whether the documents are ready for formal posting and balloting. FERC Directives FERC may occasionally issue a directive to the Electric Reliability Organization (ERO)to address specific issues or concerns. Even if some stakeholders indicate they don’t support the directive, the ERO has an obligation to address the directive. A complete discussion on addressing FERC and other governmental authorities’ directives can be found at Roles and Responsibilities: Standards Drafting Team Activities. A DT may either make the conforming modification proposed by FERC or propose an alternative method of achieving the same reliability objective to address the Order that is equally efficient and effective. The DT can ask stakeholders for feedback. Comments provided by stakeholders can be cited as justification for an alternate equally efficient and effective approach to addressing the reliability issue identified by FERC, but cannot constitute the sole basis for the approach.

DT Reviews Directives with FERC Staff FERC may assign one or more staff to work as an observer with each DT and to communicate FERC staff views and concerns to the team. Each team may seek FERC staff input regarding whether the work of the DT addresses the intent of any FERC directives. If FERC staff offers advice on issues outside the scope of the directives, the DT should consider this advice in the same manner that it considers advice from any other source. A full description of FERC staff involvement in DT activities, and in consideration of the advice of FERC staff can be found in the Roles and Responsibilities: Standards Drafting Team Activities.

DT Develops Proposed New or Revised Defined Term(s) (if necessary) Section 5.0 of the SPM addresses the process for developing a definition of terms used in one or more NERC Reliability Standards. The following considerations should be made when considering proposals for new or revised definitions:

• Some NERC Regional Entities have defined terms that have been approved for use in Regional Reliability Standards, and where the drafting team agrees with a term already defined by a Regional Entity, the same definition should be adopted if needed to support a NERC Reliability Standard.

• If a term is used in a Reliability Standard according to its common meaning (as found in a collegiate dictionary), the term shall not be proposed for addition to the Glossary of Terms.

• If a term has already been defined (in the NERC Glossary of Terms), any proposal to modify or delete that term shall consider all uses of the definition in approved Reliability Standards, with a goal of determining whether the proposed modification is acceptable, and whether the proposed modification would change the scope or intent of any approved Reliability Standards.

5 The Reliability Standard Quality Review Form is located on the Standards Resources web page.

Page 221: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Development Project Workflows

NERC | DRAFT 2017–2019 Reliability Standards Development Plan | June 15, 2016 8

• When practical, where North American Energy Standards Board has a definition for a term, the drafting team shall use the same definition to support a NERC Reliability Standard.

Each new or revised defined term must be balloted in the same manner as a Reliability Standard.

DT Develops a Supplemental SAR (if needed) If stakeholder comments indicate the existing scope of the approved SAR should be expanded, the DT may consider, and if necessary, submit a request to expand the scope of the SAR to the SC. If approved for posting, the DT can continue to work on the proposed standard while it collects stakeholder’s support on the expanded scope of the project. Consideration should be made to avoid concurrent drafts of a proposed standard by consolidating the drafting to a single project incorporating any subsequent related SARs. DT Develops an Implementation Plan Each DT must develop an implementation plan that informs responsible entities of the actions (compliance obligations) required once the standard becomes effective. Section 4.4.3 of the SPM provides that implementation plans shall at a minimum include the following:

• The proposed effective date (the date entities shall be compliant) for the Requirements.

• Identification of any new or modified definitions that are proposed for approval with the associated Reliability Standard.

• Whether there are any prerequisite actions that need to be accomplished before entities are held responsible for compliance with one or more of the Requirements.

• Whether approval of the proposed Reliability Standard will necessitate any conforming changes to any already approved Reliability Standards – and identification of those Reliability Standards and Requirements.

• The Functional Entities that will be required to comply with one or more Requirements in the proposed Reliability Standard.

A single implementation plan may be used for more than one Reliability Standard. The Implementation Plan is posted with the associated Reliability Standard or Standards during the formal comment period and is balloted with the associated Reliability Standard or Standards.

Supporting Document(s) (if necessary) Section 11 of the SPM describes the types of supporting documents that may be developed to enhance stakeholder understanding and implementation of a Reliability Standard but do not themselves contain mandatory Requirements subject to compliance review. Please refer to section 11 for additional information regarding development and posting of such documents.

Page 222: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

NERC | DRAFT 2017–2019 Reliability Standards Development Plan | June 15, 2016 9

Parts of the Results-Based Standard This section describes the parts of the results-based NERC Reliability Standard. Section A – Introduction Section A of the standard includes introductory information as shown in the example of a typical standard provided in Figure 3 below.

Figure 3: Example Introduction Section of Standard

Title: The title should be a brief descriptive phrase that identifies, in a clear and concise manner, the subject addressed by the standard. The title should answer the following questions:

• What reliability-related topic does the title address?

• How should the topic be described, limited, or specified?

The title should not start with the word “to,” include the word “standard,” or be excessively wordy or vague. Standard titles should not be complete sentences.

Number: The standard number for a new standard is assigned by NERC staff. The numbering convention has three parts:

1. A three-letter acronym denoting the general topical area of the standard

2. The standard number within that topical area, beginning with 1 and increasing sequentially

3. The version of that standard

A. Introduction

1. Title: Reliability Coordinator Actions to Operate Within IROLs

2. Number: IRO-009-2

3. Purpose: To prevent instability, uncontrolled separation, or cascading outages that adversely impact the reliability of the interconnection by ensuring prompt action to

prevent or mitigate instances of exceeding Interconnection Reliability Operating Limits (IROLs).

4. Applicability:

4.1 Functional Entities:

4.1.1 Reliability Coordinator.

5. Effective Date: See the Implementation Plan for IRO-009-2.

Page 223: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Parts of the Results-Based Standard

NERC | DRAFT 2017–2019 Reliability Standards Development Plan | June 15, 2016 10

If a standard is being proposed for revision, the standard is given a new ‘version number. If a new standard is developed, the new standard is given the next unused number in the topical sequence. A detailed explanation is available in the NERC Standards Numbering System.

A sample standard number is: PRC-012-1.

Purpose: A clear statement that describes how the standard contributes to the reliability of the BPS. The purpose of a specific standard will not necessarily be the same as the purpose on a SAR as some SARs have a purpose statement that addresses modification of a set of standards.

Applicability: NERC’s Reliability Standards apply to users, owners, and operators of the facilities that make up the BPS. The applicability section of a standard should use entities found in the Statement of Compliance Registry Criteria (codified as Appendix 5B of the NERC Rules of Procedure) which is the FERC-approved vehicle by which NERC and the Regional Entities identify the entities responsible for compliance with NERC and Regional Reliability Standards. The criteria are based on the facilities an entity owns or operates and represent a FERC-approved and jointly accepted policy decision among NERC and industry stakeholder groups on how to apply both NERC's continent-wide and Regional Reliability Standards. The NERC Functional Model can be used to assist the DT in determining applicable entities. In a small number of cases, when a number of requirements are being developed that will apply to a large number of functional entities, the DT may work with NERC staff to define a term that is used within a particular standard or group of standards to refer to that group of functional entities collectively.

In some cases, the DT will identify the need to limit the applicability of one or more requirements in a standard to a subset of entities or facilities so that the applicability aligns with the reliability risk. In most cases, these limitations should be identified in the applicability section of the standard, rather than embedded in the requirements. For example, a standard may limit applicability to certain facilities based on electric characteristics, such as transmission facilities energized at 200 kilovolts or greater. If no functional entity limitations are identified, the default is that the standard applies to all identified listed functional entities – so that if the applicability identifies, “Transmission Operators”, then the standard applies to all Transmission Operators that have registered in NERC’s Compliance Registry.

Effective Date: The effective date section in the standard refers to an associated implementation plan. The implementation plan sets forth the date or pre-conditions for determining when each Requirement becomes effective in each jurisdiction.

Page 224: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Parts of the Results-Based Standard

NERC | DRAFT 2017–2019 Reliability Standards Development Plan | June 15, 2016 11

Section B – Requirements and Measures Section B of the standard includes requirements and associated measures, violation risk factors (See Section C), and time horizons as shown in Figure 4, below.

Figure 4: Example Requirements Section of Standard

Requirements: An explicit statement that identifies the Functional Entity responsible, the action or outcome that must be achieved, any conditions achieving the action or outcome, and the reliability-related benefit of the action or outcome. Each Requirement shall be a statement for which compliance is mandatory. Some requirements may have “parts.” (Parts were previously called sub-requirements, but in response to FERC orders that would have required separate VRFs and VSLs for each sub-requirement, the approach was changed and any component of a requirement is called a part. Parts of a requirement are numbered by using the number of the requirement, followed by a decimal number (e.g., Requirement R4 could have parts 4.1, 4.2, and 4.3).

Each requirement should:

• Include the name of the responsible functional entity or entities.

• Include the word ‘shall.’

• Be written in

‘Active’ voice rather than the ‘passive’ voice.

Concise, clear, measurable language. (Requirements that are not measurable or are subject to multiple interpretations are unacceptable.)

• Avoid use of ambiguous adjectives such as ‘sufficient’ or ‘adequate’ as these cannot be measured objectively. When a range of acceptable performance is acceptable, the range needs to be qualified and bounded by measurable conditions/parameters.

• Achieve one objective. If a requirement achieves two objectives, such as developing a document and distributing that document, then each objective should be addressed in its own requirement.

• Contribute to one or more reliability principles and the specific objective of the standard. All parts of a requirement must contribute to the objective of the main requirement. If there is only one part that contributes to the objective of the main requirement, there should only be one main requirement and no parts.

B. Requirements and Measures R1. Each Responsible Entity shall have an event reporting Operating Plan in accordance with EOP-004-2 Attachment 1 that includes the protocol(s) for reporting to the Electric Reliability Organization and other organizations (e.g., the Regional Entity, company personnel, the Responsible Entity’s Reliability Coordinator, law enforcement, or governmental authority). [Violation Risk Factor: Lower] [Time Horizon: Operations Planning] M1. Each Responsible Entity will have a dated event reporting Operating Plan that includes, but is not limited to the protocol(s) and each organization identified to receive an event report for event types specified in EOP-004-2 Attachment 1 and in accordance with the entity responsible for reporting.

Page 225: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Parts of the Results-Based Standard

NERC | DRAFT 2017–2019 Reliability Standards Development Plan | June 15, 2016 12

• Avoid more than one level of parts as it may reduce clarity.

Where practical, requirements should use language that is already familiar to the end users of NERC’s standards. To that end, a list of ‘verbs’ already used in NERC standards can be referred to in Attachment A. In general, the language of a requirement should follow the format of: [Entity X] shall perform [specific action] by [a specific time or frequency]. Consider adding some time frame for measuring the required performance, as FERC has determined that unless the requirement includes a time period, each incidence of noncompliant performance must be assessed as a separate act of noncompliance, subject to an individual penalty or sanction. In addition, if performance results can be practically measured quantitatively, metrics should be provided within the requirement. Measures: Each requirement must have at least one measure. A single measure can be used for more than one requirement. A Measure provides identification of the evidence or types of evidence that may demonstrate compliance with the associated requirement.

Page 226: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Parts of the Results-Based Standard

NERC | DRAFT 2017–2019 Reliability Standards Development Plan | June 15, 2016 13

Section C – Compliance Section C of the standard includes the compliance information as shown in Figure 5 below.

Figure 5: Compliance Monitoring Process

Violation Severity Levels (VSLs): VSLs are included in section C of the standard in a table format. The VSLs provide guidance on the way that NERC will enforce the Requirements of the proposed Reliability Standard. To assist the DT in the development of VSLs, refer to the Violation Severity Level Guidelines. These guidelines outline the criteria and attributes for developing VSLs.

Violation Risk Factors (VRFs): Each requirement must also have a Violation Risk Factor associated with it. The risk factor is one of several elements used to determine an appropriate sanction when the associated requirement is violated. The VRF assesses the impact to reliability of violating a specific requirement and shall be categorized as a high, medium or low risk. The criteria for categorizing a VRF, which has been filed with FERC as part of the ERO’s Sanction Guidelines (codified as Appendix 4B of the NERC Rules of Procedure), along with the five guidelines that FERC uses to determine whether to approve the VRFs submitted for approval6 are documented in VRFs.

6 In its May 18, 2007 Order on Violation Risk Factors, FERC identified five “guidelines” it uses to determine whether to approve

the VRFs submitted for approval.

C. Compliance 1. Compliance Monitoring Process

1.1. Compliance Enforcement Authority: “Compliance Enforcement Authority” means NERC or the Regional Entity, or any entity as otherwise designated by an Applicable Governmental Authority, in their respective roles of monitoring and/or enforcing compliance with mandatory and enforceable Reliability Standards in their respective jurisdictions. 1.2. Evidence Retention: The following evidence retention period(s) identify the period of time an entity is required to retain specific evidence to demonstrate compliance. For instances where the evidence retention period specified below is shorter than the time since the last audit, the Compliance Enforcement Authority may ask an entity to provide other evidence to show that it was compliant for the full-time period since the last audit. The applicable entity shall keep data or evidence to show compliance as identified below unless directed by its Compliance Enforcement Authority to retain specific evidence for a longer period of time as part of an investigation.

• The [applicable entity(ies)] shall keep data or evidence of Requirement X for X calendar days/months/years. (Add requirements as appropriate for this standard. This section is only for those requirements that do not have the default data retention.)

1.3. Compliance Monitoring and Enforcement Program: As defined in the NERC Rules of Procedure, “Compliance Monitoring and Enforcement Program” refers to the identification of the processes that will be used to evaluate data or information for the purpose of assessing performance or outcomes with the associated Reliability Standard.

Page 227: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Parts of the Results-Based Standard

NERC | DRAFT 2017–2019 Reliability Standards Development Plan | June 15, 2016 14

If a requirement has parts, and some of the parts are much more critical to reliability than others, then the DT should consider subdividing the requirement into separate requirements and assigning a VRF to each of the individual requirements.

Time Horizons: Each standard requirement must also have an associated time horizon to differentiate requirements that involve shorter and narrower time frames (e.g., real-time operations) from those that involve longer and broader time frames (e.g., long-term planning).

Section D – Regional Variances Most standards can be written so that they apply on a continent-wide basis without the need for a variance. FERC accepts that a variance may be needed under the following conditions (Order No. 6727):

As a general matter, we will accept the following two types of regional differences, provided they are otherwise just, reasonable, not unduly discriminatory or preferential and in the public interest, as required under the statute: (1) a regional difference that is more stringent than the continent-wide reliability standard, including a regional difference that addresses matters that the continent-wide reliability standard does not; and

(2) a Regional Reliability Standard that is necessitated by a physical difference in the Bulk-Power System.

Regional variances are generally identified during the SAR stage, but may be identified later in the process. They are specified and requested by the Region that wants the variance. While both the DT and Regions must ask stakeholders if they see a need for a regional variance, the DTs do not have primary responsibility for writing these variances — writing a variance is the primary responsibility of the entity that requests the variance, or their designee. If a DT receives a variance as it is developing a standard, the team will post the variance for comment along with the proposed standard, and will ask stakeholders if they support the variance.

If stakeholders do not support the variance as proposed, the entity that wants the variance may modify the variance and post it again for another comment period, or the entity may withdraw its request for the variance. The entity requesting the variance is responsible for working with the DT to respond to each comment submitted in response to the proposed variance.

Section E – Associated Documents This section should include a link to the Implementation Plan and other important associated documents.

Section F – References The DT may need to develop a form or other document to support the implementation of a standard. Use this section for attachments or other documents that are referenced in the standard as part of the requirements. These should appear at the end of the standard and before the Supplemental Material. If there are none, delete this section.

7 Order No. 672, Rules Concerning Certification of the Electric Reliability Organization; and Procedures for the Establishment,

Approval and Enforcement of Electric Reliability Standards, FERC Stats. & Regs. ¶ 31,204, at P 291.

Page 228: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Parts of the Results-Based Standard

NERC | DRAFT 2017–2019 Reliability Standards Development Plan | June 15, 2016 15

Version History Update the version history of the standard as appropriate. All version history content should be carried over to the subsequent version. The ‘Action’ column should include the project number followed by the action completed. The ‘Change Tracking’ column should include: New, Errata, Revisions, Addition, Interpretation, etc. Supplemental Material Documents that should appear in this section are as follows: Application Guidelines, Guidelines and Technical Basis, Training Material, Reference Material, and/or other Supplemental Material. The header should remain “Supplemental Material.” Rationale During development of this standard, text boxes are embedded to explain the rationale for various parts of the standard. Upon NERC Board of Trustees adoption, the text from the rationale text boxes are moved to the end of the standard under a ‘Rationale’ header and the boxes are removed from the standard.

Page 229: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

NERC | DRAFT 2017–2019 Reliability Standards Development Plan | June 15, 2016 16

Attachment A — Verbs Used in Reliability Standards When developing a new or revised standard, DTs should try to use terms that have already been defined or terms that are already used in other Reliability Standards to achieve a high degree of consistency between standards. To that end, the Standards staff, working with key DT members, put together the following list of verbs and their associated definitions. These verbs are all used in requirements in existing Reliability Standards. This verb list and its definitions are not in the Glossary of Terms used in NERC Reliability Standards but these verbs and their definitions should serve as a reference for DTs who are trying to minimize the introduction of new terms into Reliability Standards.

Verb List Definitions

Acquire — To obtain something new, such as a trait, ability or characteristic; to get as one's own; to locate and hold.

Activate — To make active; to start development of

Address — To communicate directly, spoken, written or otherwise; to direct one's attention to

Adhere — To give support or bind oneself to observance

Agree — To concur in, as an opinion; to settle on by comment consent

Alert — To give warning or notice, or to call to a state of readiness; to make clearly aware of

Analyze — To review elements and critically examine

Apply — To make use or put to use

Appoint — To fix a place or time; to place in office or post

Approve — To give one’s consent to

Arrange — To put in a proper order, sequence, or relationship; to prepare for; to bring about an agreement or understanding

Assemble — To put together all relevant pieces

Assess — To make a determination, evaluation, or estimate; to critic and judge

Begin — To do or initiate the first part of an action or process

Calculate — To make a mathematical computation; to solve or probe the meaning of; to design or adapt for a purpose

Calibrate — To determine, rectify or mark the graduations of; to standardize by determining the deviation from the standard; to adjust precisely for a particular function

Check — To test, compare or examine to determine if something is as it should be

Collect — To gather information from multiple sources

Communicate — To receive or distribute, to convey or make known information via personal, written or electronic methods

Comply — To execute, conform, adapt, or complete

Compute — To determine, often mathematically, an answer or sum

Conduct — To act as a leader, supervisor or to director as leader the performance or action

Confirm — To prove the truth, validity or authenticity of something

Consider — To give intelligent thought to a situation

Contact — To reach someone through a communication device (telephone, radio, etc.)

Control — To exercise restraining or directing influence over

Cooperate — To work together or among others; to act in compliance; to associate with other(s) for mutual benefit

Coordinate — To mediate the exchange of data between at least two people

Correct — To alter or adjust so as to meet some standard or required condition

Page 230: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Attachment A— Verbs Used in Reliability Standards

NERC | DRAFT 2017–2019 Reliability Standards Development Plan | June 15, 2016 17

Cover — To treat or include information with; to guard, protect, prevent observation or knowledge of

Create — To produce or bring into existence

Curtail — To cause an action to stop

Define — To mark the limits of with clarity and authority; to specify instruction and interpretation

Demonstrate — To point out, show clearly the existence of; illustrate or explain

Describe — To give an account or represent in words, figure, model or picture

Destroy — To ruin the structure, condition or existence

Detect — To discover or determine the existence, fact or presence

Determine — To analyze

Develop — To set forth or make clear by degrees or in detail; to work out the possibilities

Direct — To use an authoritative voice to tell another individual to perform an action

Disable — To make incapable or ineffective; to deprive a right, qualification, capacity

Disconnect — To sever or terminate a connection of or between

Discuss — To investigate or talk about using reason or argument; to present in detail for consideration or examination

Disperse — To cause to break up or become spread widely, to distribute

Display — To exhibit or make evident for viewing

Disseminate — To spread broadly

Distribute — To divide among several or many; to give out or deliver

Document — To make a printed record of something

Enable — To make possible or able by providing means or opportunity; to give legal power, capacity or sanction

Ensure — To make sure, certain or safe

Enter — To depress keys on a keyboard so as to have information sent to a computer system

Establish — To institute permanently by enactment or agreement; to make firm, stable

Evaluate — To appraise the worth of; to determine or fix the value, significance, condition or worth of

Exchange — To part with, give or transfer while receiving something as an equivalent; to part with for a substitute; to give and receive reciprocally

Execute — To put into effect; to carry out what is required

Exercise — To perform a function or carrying out the terms of an agreement; regular or repeated use or practice in order to develop, improve or display specific capabilities or skills

Explain — To make known, plain, or understandable; to give a reason for a cause

Flag — To signal, mark or identify

Focus — To direct toward a particular point or purpose

Follow — To go, proceed, or come after; to be or act in accordance with; to pursue in an effort; to seek or attain

Give — To administer, guide or direct; to execute or deliver; to offer or furnish; to perform

Have — To hold, maintain or possess something or a privilege; to stand in a certain relationship to

Hold — To have possession or ownership; to have as a privilege or position of responsibility

Identify — To recognize, establish the identity of, ascertain the origin, nature, or definitive characteristics of

Implement — To carry out or fulfill

Include — To make a part of a whole, group, or class

Page 231: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Attachment A— Verbs Used in Reliability Standards

NERC | DRAFT 2017–2019 Reliability Standards Development Plan | June 15, 2016 18

Increase — To make greater, larger in size, amount, number or intensity

Indicate — To point out, state or express briefly, to serve as a sign

Inform — To provide information or make aware

Initiate — To cause or facilitate the start of

Install — To establish in an indicated place, to set prepare, or position for use

Issue — To distribute, put forth, or make available

Keep — To take notice of by appropriate conduct; to retain possession of; to store

Know — To have direct cognition of; to have experience; to be acquainted or familiar with

Limit — To restrict, curtail or reduce in quantity or extent

List — To make a list of, itemize

Maintain — To control to specified limits

Make — To cause to exist or happen; to institute or establish; to put together from components

Manage — To handle, direct, control or conduct with a degree of skill, to

Meet — To conform with or fulfill

Modify — To make an adjustment

Monitor — To actively scan various information sources

Notify — To inform someone of some activity

Offset — To serve as a counterbalance

Open — To perform actions that will cause a device to physically separate from the electric system

Operate — To cause to function or work

Participate — To take part or share in something

Pay — (Attention) — To give, offer

Perform — To carry out an action

Place — To put in a particular position; to direct to a desired spot

Plan — To arrange or formulate information for a specific intention

Post — To publish, announce or advertise

Prepare — To make ready in advance

Protect — To cover or shield from exposure, injury, damage or destruction

Provide — To furnish or supply, make available

Publish — To prepare and issue printed information for public distribution or access

Record — To enter

Re-evaluate — To revise or renew

Reference — To supply or cite a source or make a notation

Release — To relinquish control over a piece of equipment

Render — To cause to be or become

Repeat — To perform one or more actions another time

Report — To give a formal or informal account

Request — To ask permission from someone of higher authority

Require — To impose a compulsion or command, to demand as necessary

Resolve — To deal with successfully, to clear up, to reach a firm decision about

Respect — To consider worthy of high regard, to have reference to; to refrain from interfering with

Respond — To provide a reply to some request for information

Restore — To return equipment to a specified state

Resynchronize — To re-establish synchronicity

Retain — To keep possession of, to hold secure or intact

Return — To go back or come back to a practice or condition or specified measure

Review — To look at available data

Page 232: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Attachment A— Verbs Used in Reliability Standards

NERC | DRAFT 2017–2019 Reliability Standards Development Plan | June 15, 2016 19

Sample — To test or example by a sample

Serve — To meet requirements, to work, prepare, provide

Share — To participate in, use or experience jointly or in turns

Shed — To repel without allowing penetration

Sign — To place a signature on a document

Specify — To state explicitly or in detail

Staff — To provide a staff of workers or assistants

Stipulate - To specify or make conditions or requirements for an agreement

Submit — To yield authority; to present or put forward an opinion, information, or idea

Take — To possess and hold

Terminate — To end

Test — To use a procedure to measure or determine something

Track — To follow, pursue, or plot a moving path

Train — To instruct, drill or shape by discipline or precept

Update — To bring up to date

Use — To put into service, employ; to practice

Utilize — To find or make a practical use for

Verify — To prove to be correct by investigation or comparison with a standard or reference

Wait — To curtail actions until some criteria is reached

Work — To physically or mentally make effort or activity toward production or accomplishment

Page 233: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

NERC | DRAFT 2017–2019 Reliability Standards Development Plan | June 15, 2016 20

Version History

Version Date Change Tracking

1 October 29, 2013 New Revision to SDT Guidelines – changed to DT Reference Manual.

Updated entire content.

2 January 7, 2014 Corrected Errata to SC Reviewed version 1.

2.1 May 19, 2014 Updated by Standards Information Staff to Coordinate with NERC Drafting Team Resources posting.

3 September 14, 2016 Periodic review by Standards Committee Process Subcommittee and associated changes incorporated.

Page 234: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Agenda Item 10 Standards Committee

October 19, 2016

Guidelines and Technical Basis Disclaimer Action Information Background Some standard drafting teams (SDT), in an effort to provide further information and guidance surrounding their intent in developing or modifying Reliability Standards, provide additional, non-requirement language information in an accompanying Guidelines and Technical Basis (G&TB) section of the Reliability Standard document. The addition of the G&TB section began several years ago as the Reliability Standard template shifted to a results-based format. Consistent with the NERC Standard Processes Manual, such G&TB sections, when used, are informational and are not endorsed or approved by the Electric Reliability Organization Enterprise. Early uses of G&TB included useful explanations of the informational nature and purpose of the section; subsequent template changes to NERC Reliability Standards did not include the useful disclaimer. For example, the G&TB section of FAC-003-3—Transmission Vegetation Management includes the following information as part of the Reliability Standard’s Introduction:

The “Guideline and Technical Basis” section, the Background section and text boxes with “Examples” and “Rationale” are provided for informational purposes. They are designed to convey guidance from NERC’s various activities. The “Guideline and Technical Basis” section and text boxes with “Examples” and “Rationale” are not intended to establish new Requirements under NERC’s Reliability Standards or to modify the Requirements in any existing NERC Reliability Standard. Implementation of the “Guideline and Technical Basis” section, the Background section and text boxes with “Examples” and “Rationale” is not a substitute for compliance with Requirements in NERC’s Reliability Standards.

Further, with the development of NERC’s Compliance Guidance policy, as approved by the NERC Board of Trustees in November 2015, some SDTs have inquired about the relevance of information in the G&TB section in contrast to implementation guidance that may be ERO-endorsed through the compliance guidance policy. In order to reduce confusion and to confirm that G&TB sections reflect the intent of the SDT and are developed by SDTs in an effort to (i) explain the technical basis for a new or modified standard/requirement, and (ii) provide SDT guidance to support implementation of the associated standard/requirement, disclaimer language similar to what has been used in the past will be added to the NERC Reliability Standards template at the beginning of the G&TB section. Further, the ERO Enterprise views that information in the G&TB may be important and highly informative when assessing compliance. The following language will be added to the NERC Reliability Standards template for projects that develop G&TB going forward:

The following Supplemental Materials, including the “Guidelines and Technical Basis” and “Rationale” sections, are included for informational purposes only. The Supplemental Material reflect the intent of the standard drafting team (SDT) and was developed by the

Page 235: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Agenda Item 10 Standards Committee

October 19, 2016

SDT in an effort to (i) explain the SDT’s technical basis for the associated Reliability Standard and Requirements therein, and (ii) provide the SDT’s guidance to support implementation of the associated Reliability Standard. The ERO neither endorses nor approves the Supplemental Material as part of the Reliability Standards development process. As the Compliance Enforcement Authority, however, the ERO considers statements in the Supplemental Material during compliance and enforcement activities, and the content of the Supplemental Material is informative while assessing compliance. The ERO continues to assess compliance based on the language of the Reliability Standard and the facts and circumstances presented. Solely implementing the “Guideline and Technical Basis” section of a Reliability Standard is not a substitute for compliance with Requirements in NERC’s Reliability Standards, which is driven by the facts and circumstances for each entity. NERC’s Compliance Guidance Policy outlines a process by which Registered Entities may request ERO endorsement of Implementation Guidance.

In addition, should an SDT or other industry stakeholders seek to submit the content of the G&TB for ERO endorsement as Implementation Guidance, the SDT or stakeholders may do so in accordance with the NERC Board of Trustees-approved process, which permits the SDT, working through the Project Management and Oversight Subcommittee, to submit such guidance for ERO endorsement.

Page 236: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Agenda Item 11b Standards Committee October 19, 2016

Standards Committee Process Subcommittee Update Action For information only.

• The Standards Committee Process Subcommittee (SCPS) Work Plan is included in the agenda package for your information. Significant progress has been made on several projects and this has been noted on the Work Plan and is identified below:

Revisions to NERC Standard Processes Manual (SPM) (Lead: Peter Heidrich)

o Section 6: Processes for Conducting Field Tests and Collecting and Analyzing Data

• Standards Committee (SC) endorsed (September 14, 2016) the SCPS proposed revisions to Section 6 Processes for Conducting Field Tests of the SPM.

o Section 11: Process for Approving Supporting Documents

• SCPS will continue to seek resolution of fundamental issues surrounding the intent and use of Section 11 for the development of supporting documents.

o Section 7: Process for Developing an Interpretation

• SCPS subgroup provided a proposal to the SCPS, SC Leadership, and NERC staff for comment. Currently reviewing comments and making associated revisions to the proposal for consideration. SCPS subgroup meeting/call will be scheduled to discuss the revised proposal.

Cost of Risk Reduction Analysis (CRRA) (Lead: TBD)

o Project is ‘on hold’ pending the results of the Cost Effectiveness Pilot project and a determination is made on the future role of the SCPS concerning ‘pilot’ results analysis and process development.

Standard Authorization Request Submittal Form/Standard Authorization Request Comment Form (Common Question Development) (Lead: Ben Li)

o Project has begun formal development and the SCPS intends to present a final recommendation to the SC at the December meeting.

Drafting Team Reference Manual (DTRM) (Lead: Lin Oelker)

o DTRM is being presented to the SC for approval under a separate agenda item.

• Resource Document Continuing Project (Lead: Linn Oelker)

Resource Document spreadsheet is included in the agenda package for review.

The SCPS and NERC Legal are currently reviewing the following documents:

o Guidance Document for Management of Remanded Interpretations (NERC Legal)

o Standard Drafting Team Scope (SCPS Subgroup)

o Acceptance Criteria of a Reliability Standard (NERC Legal)

Page 237: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Agenda Item 11b Standards Committee October 19, 2016

The SCPS has targeted the December 14, 2016 SC meeting for presentation of each of the revised documents, at which time the SCPS will be seeking SC’s approval. The SC is the document owner for each of the documents being reviewed by the SCPS.

• Standard Balloting System (SBS) Enhancements (Lead: Wendy Muller, NERC)

The enhancement selections are finalized and the project is in the development stage.

The enhancements are expected to be rolled out early 2017.

• Registered Ballot Body (RBB) Annual Self-Selection Process Update (Lead: Mat Bunch, NERC)

NERC has received attestations/self-selections from nearly all RBB members and continues to reach out to those who have not submitted;

Additional requests continue to result in case-by-case education/outreach and ballot pool clean-up.

• SCPS Membership/Roster Evaluation (Leads: Peter Heidrich & Ben Li)

The SCPS Leadership has conducted a review of the SCPS membership, taking into consideration the following:

o current and anticipated work plan activities,

o the expiration of terms, and

o retirements

As such, it has determined that the SCPS has sufficient resources to fulfill all responsibilities. Therefore, the SCPS will not be seeking additional personnel to supplement the membership in 2017.

Page 238: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

SCPS Work Plan Activities Document—September 30, 2016

Agenda Item 11b(i) Standards Committee October 19, 2016

Standards Committee Process Subcommittee Work Plan (SC Endorsed Project Scopes)

Task

General Scope of Task

Task Initiated

Target Completion

Status/Remarks

1. Cost of Risk Reduction Analysis (CRRA)

Team Lead: TBD

Pete Heidrich

Randy Crissman

Steven Rueckert

Guy Zito (consulting)

To conduct CEAP pilots via:

a. Conducting the CEA portion of the CEAP on the second project of the pilot. The Team will develop a report for the SC and the Industry.

b. Proposing a list of standards development projects to conduct the CEAP on along with potential criteria for choosing projects for 2014 and beyond and bring these to the SC for endorsement

c. Revise the current CEAP guideline document into a second generation document to reflect lessons learned during the pilot and to address potential “benefits” of standard projects and bring to the SC for endorsement.

Task was initiated prior to use of scope documents

April 2012

a) March 2014 SC Meeting

b) August 2014 SC Meeting

c) September 2015 SC Meeting

a) Completed b) Complete (note: proposal submitted to NERC staff in lieu of SC)

c) On hold pending Cost Effectiveness Pilot project and results.

In progress

Scope of the project was revised to reflect a Cost of Risk Reduction Analysis (CRRA) approach. Endorsed at September 23, 2015 SC meeting.

SCPS continue working with Standards Leadership to evaluate this item and determine next steps.

A draft document has been presented to H. Gugel for review. The MRC may need to review some of the issues

Page 239: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

SCPS Work Plan Activities Document—September 30, 2016

Standards Committee Process Subcommittee Work Plan (SC Endorsed Project Scopes)

Task

General Scope of Task

Task Initiated

Target Completion

Status/Remarks

contained within the document. H. Gugel stated that the NERC Board and others may request input from the MRC, and that NERC staff is currently working to determine the mechanism by which this should occur.

UPDATE: Michelle D’Antuono has assumed the role of Project Liaison to coordinate efforts between NERC staff and the SCPS.

Project is ‘on hold’ pending the results of the Cost Effectiveness Pilot project and a determination is made on the future role of the SCPS concerning ‘pilot’ results analysis and process development.

Page 240: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

SCPS Work Plan Activities Document—September 30, 2016

Standards Committee Process Subcommittee Work Plan (SC Endorsed Project Scopes)

Task

General Scope of Task

Task Initiated

Target Completion

Status/Remarks

2. Revisions to NERC Standard Processes Manual (SPM)

a. Section 6: Processes for Conducting Field Tests and Collecting and Analyzing Data

b. Section 7: Process for Developing an Interpretation

c. Section 11.0: Process for Approving Supporting Documents

Team Lead: Pete Heidrich

John Bussman

Ben Li

Jennifer Flandermeyer

Andy Pusztai

Steve Rueckert

Jason Smith

Chris Gowder

Sean Bodkin

Guy Zito (consulting)

Andrew Wills (NERC Legal)

a. Develop and propose recommendations to the SC for revisions and/or modifications to the SC Charter Section 10 and Section 6 of the StandardProcesses Manual (SPM), which will address the coordination and oversight involvements of the NERC technical committees.

b. Develop and propose recommendations to the SC for revisions and/or modifications to the Interpretation Process in Section 7 of the SPM which will improve the effectiveness and efficiency of (i) validation of a request for Interpretation (RFI), and (ii) development of an interpretation of an approved Reliability Standard or individual Requirement(s) within an approved Reliability Standard.

c. Develop and propose recommendations to the SC for revisions and/or modifications to the Technical Document Approval Process in Section 11 of the SPM.

July, 2015

Feb., 2017

UPDATE:

Section 6: Processes for Conducting Field Tests and Collecting and Analyzing Data • SC Endorsed (09.14.2016)

the SCPS proposed revisions to Section 6 Process for Conducting Field Tests of the Standard Processes Manual (SPM).

Section 11: Process for Approving Supporting Documents • SCPS subgroup meeting

with NERC staff and SC Leadership to discuss revision approach on September 7, 2016. (Two (2) separate proposals (one (1) developed by the SCPS Subgroup and one (1) developed by NERC staff have been developed.)

Page 241: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

SCPS Work Plan Activities Document—September 30, 2016

Standards Committee Process Subcommittee Work Plan (SC Endorsed Project Scopes)

Task

General Scope of Task

Task Initiated

Target Completion

Status/Remarks

Lauren Perotti (NERC Legal)

Ryan Stewart (NERC Standards)

Sean Cavote (NERC)

Steve Crutchfield (NERC)

Section 7: Process Developing an interpretation • SCPS Subgroup provided a

proposal for comment to the SCPS, SC Leadership and NERC staff. Currently reviewing comments and making associated revisions to the proposal for consideration. SCPS Subgroup meeting/call will be scheduled to discuss the revised proposal.

Page 242: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Standards Committee Process Subcommittee Work Plan (SC Endorsed Project Scopes)

Task

General Scope of Task

Task Initiated

Target Completion

Status/Remarks

3. SAR Submittal Form/SAR Comment Form (Common Question Development)

Team Lead: Ben Li

Chris Gowder

Andy Pusztai

Ron Sporseen

Sean Bodkin

The objective of this project is to review the SAR and related comment form, and propose recommendations to the Standards Committee on:

a. Revisions and/or modifications to the

SAR Form, b. Explore the merit of developing

certain common questions for the comment form for SAR posting.

July 2016

TBD

Project has begun formal development and the SCPS intends to present a final recommendation to the Standards Committee at the December meeting.

Standards Committee Process Subcommittee 2014 Work Plan (Conceptual Project Stage-No Scope or Endorsement)

Proposed Task

General Scope of Task

Presented to SC for Project

Initiation

Scope, Development

Initiated

SC Approval of Scope *

Status/Remarks

*Upon approval of project Scope, the project will be moved to the “Standards Committee Process Subcommittee Work Plan (SC Endorsed Project Scopes) section.

Page 243: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Resources for StandardsToday is: September 30, 2016

Approved by SC December 9, 2015

DT Ref Manual? DOCUMENT TITLE DOCUMENT OWNER Document Last RevisedAge of Document (in

Months)

Periodic review frequency (months):

Party responsible for periodic review and proposed updates:

Overdue by (months): Notes / Comments

Y SC Procedure ‐ Processing Requests for an InterpretationSTANDARDS COMMITTEE (SC) December 9, 2014 22 24 SCPS CURRENT

YStandards Committee Procedure ‐ Approving the Posting of Reliability Standard Supporting References

STANDARDS COMMITTEE (SC) December 9, 2014 22 24 SCPS CURRENT

N Approving Errata in an Approved Reliability StandardSTANDARDS COMMITTEE (SC) December 9, 2014 22 24 SCPS CURRENT

NStandards Committee Procedure ‐ NERC Glossary of Terms Used in Reliability Standards Definition Development Procedure

STANDARDS COMMITTEE (SC) December 9, 2014 22 24 SCPS CURRENT

N Standards Committee CharterSTANDARDS COMMITTEE (SC) December 9, 2014 22 24 SCPS CURRENT

Document had been approved by SC 12/9/2014.SCPS reviewing as discussed in 3/8/16 SCPS meeting

N Reliability Standard Quality Review Form STANDARDS COMMITTEE (SC) September 23, 2015 12 24 SCPS CURRENT Endorsed by the SC 9/23/2015

YStandards Committee Guideline ‐ Approving a Field Test Associated with a Reliability Standard

STANDARDS COMMITTEE (SC) March 10, 2008 103 24 SCPS 79

Document not finalized during phase I due to objection by the Operating Committee.3/8/16 SCPS ‐ This document will be retired after SPM changes and will require SC approval to retire.

Y Reliability Functional Model Function Definitions and Functional EntitiesSTANDARDS COMMITTEE (SC) November 30, 2009 82 24 FMAG 58 Being reviewed by FMAG as noted in 3/8/16 SCPS meeting

Y Guidelines for Interpretation Drafting TeamsSTANDARDS COMMITTEE (SC) September 19, 2013 36 24 SCPS 12 3/8/16 SCPS meeting ‐ this document being reviewed with SPM revisions project.

N Drafting Team Reference ManualSTANDARDS COMMITTEE (SC) January 7, 2014 33 24 SCPS 9

Presenting to SCPS on 9/13/16 with plan to send to SC in October 2016SCPS reviewing as discussed in 3/8/16 SCPS meetingPosted version indicates updated May 19, 2014 by NERC Staff to Coordinate with NERC Drafting Team Resources posting.

N Guidance Document for Management of Remanded InterpretationsSTANDARDS COMMITTEE (SC) April 9, 2014 30 24 SCPS 6 SCPS reviewing as discussed in 9/13/16 SCPS meeting.

Y Standard Drafting Team ScopeSTANDARDS COMMITTEE (SC) May 16, 2014 29 24 SCPS 5 SCPS reviewing as discussed in 9/13/16 SCPS meeting.

Y Acceptance Criteria of a Reliability StandardSTANDARDS COMMITTEE (SC) May 16, 2014 29 24 SCPS 5 SCPS reviewing as discussed in 9/13/16 SCPS meeting.

Y1

NERC Drafting Team Resources ‐ Companion Document to DT Reference Manual (POSTED 2/2/2015) Standards Staff December 9, 2014 22 N/A Standards Staff N/A

This document is a conglomoration of individual documents with individual review periods and in of itself does not need a periodic review.

Y Violation Severity Level Guidelines Standards Staff NONE UNKNOWN 24 Standards Staff N/AN Weighted Segment Voting Examples Standards Staff November 4, 2009 83 24 Standards Staff 59Y Time Horizons Standards Staff 1/28/2010 80 24 Standards Staff 56Y Violation Risk Factors Standards Staff 1/28/2010 80 24 Standards Staff 56Y Ten Benchmarks of an Excellent Reliability Standard Standards Staff 3/16/2010 79 24 Standards Staff 55Y Market Principles Standards Staff March 18, 2010 79 24 Standards Staff 55Y Reliability Principles Standards Staff March 18, 2010 79 24 Standards Staff 55N Results‐Based Reliability Standard Development Guidance Standards Staff June 7, 2010 76 24 Standards Staff 52N Request for Interpretation Form Standards Staff April 22, 2011 65 24 Standards Staff 41N Reliability Standards Suggestions and Comments Form Standards Staff June 1, 2011 64 24 Standards Staff 40N Request to Develop a Definition Form Standards Staff July 13, 2011 63 24 Standards Staff 39Y Standards Development Process ‐ Participant Conduct Policy Standards Staff May 20, 2013 41 24 Standards Staff 17N Standards Authorization Request Form  Standards Staff June 3, 2013 40 24 Standards Staff 16Y Nomination Form Standard Drafting Team Standards Staff January 28, 2014 32 24 NERC STAFF? 8

N Standards Drafting Team Nomination Form Standards Staff January 28, 2014 32 24 NERC STAFF? 8 Also listed as a DT Reference manual resource as Nomination Form Standard Drafting TeamY FERCs Criteria for Approving Reliability Standards from Order 672 Standards Staff May 16, 2014 29 24 Standards Staff 5N SAR Form Identifying the Need for a Variance Standards Staff September 10, 2014 25 24 Standards Staff 1Y NERC Standards Numbering System Standards Staff September 30, 2014 24 24 Standards Staff 0N NERC Standards Numbering System ‐ NEW Standards Staff September 30, 2014 24 24 Standards Staff 0

Agenda Item 11b(ii) Standards Committee October 19, 2016

Page 244: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Agenda Item 11c Standards Committee October 19, 2016

Functional Model Advisory Group Update

Action Endorse one of the following options:

• Functional Model (FM) Process

• Direct the Functional Model Advisory Group (FMAG) to discontinue further modification to the FM and Functional Model Technical Document (FMTD) after completing revisions in response to industry comments at its October 25-27, 2016 meeting, until otherwise instructed by the Standards Committee (SC).

Background At the September SC meeting there was considerable discussion of the FM process, with some SC members expressing concern with whether the process was sufficiently transparent and understood. The chair and vice chair of the SC committed to work with the representatives of the FMAG and those SC members concerned about the process to determine if there was a process they all could agree on. The efforts to reach agreement were compressed due to time constraints, and an agreement was not reached. Thus, the SC is presented with two options; to endorse the FM process developed by the FMAG (option) or to direct the FMAG, after its next set of October meetings, not to move forward until otherwise directed by the SC. The FMAG Scope document, approved by the SC at the June 15, 2016 meeting, is included for reference.

Page 245: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Functional Model Advisory Group (FMAG)Functional Model and Function Model Technical Document Revision Development Process

FMAG Establishes

Project Scope

Conduct Informal Consensus Building

Activities

(Can and should be utilized throughout

the development process)

FMAG Develops Revisions to the

Functional Model and its associated

Technical Document

NERC Standards Committee

(SC) Endorses the Project Scope

Submit Proposed Revisions to the

Functional Model and its associated

Technical Document to the SC for

Authorization to Post for an Industry

Comment Period.

Conduct Industry Comment Period

(Duration determined by the scope of the

revisions.)

FMAG Addresses Comments and Develops

Additional Revisions (if necessary) to the

Functional Model and its associated

Technical Document

Substantive

Revisions Made

No Revisions

Required or Only

Non-Substantive

Revisions Made

Present Revisions to the Functional Model

and its associated Technical Document to

the NERC CIPC, OC, and PC to for

Endorsement of the Technical Content.

NERC CIPC, OC,

and PC

Recommend

Revisions

NERC CIPC, OC,

and PC

Endorsement

Received

Present Draft Revisions to the Functional

Model and its associated Technical

Document to the NERC CIPC, OC, and PC

to Establish Consensus on the Technical

Content.

Present Revisions to the Functional Model

and its associated Technical Document to

the SC for Endorsement (based on meeting

the development process obligations) and

approval to post the documents as

Reference Documents following NERC

BOT Approval.

Present Revisions to the Functional Model

and its associated Technical Document to

the NERC BOT for Approval and

Authorization to File with the Appropriate

Regulatory Authority for Informational

Purposes.

AgendaItem 11c(i)Standards CommitteeOctober 19, 2016

Page 246: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Agenda Item 12a Standards Committee October 19, 2016

NERC Legal and Regulatory Update August 20, 2016 – September 26, 2016

NERC FILINGS TO FERC SUBMITTED SINCE LAST SC UPDATE

FERC Docket

No. Filing Description FERC Submittal Date

RM16-22-000

Petition of NERC for Approval of Proposed Reliability Standards PRC-027-1 and PER-006-1 and Retirement of PRC-001-1.1(ii) NERC submits a petition for approval of Reliability Standards PRC-027-1 (Coordination of Protection Systems for Performance During Faults), PER-006-1 (Specific Training for Personnel) and Retirement of PRC-001-1.1(ii) (System Protection Coordination).

9/2/2016

RM16-18-000

Comments of NERC on Notice of Inquiry NERC submits comments in response to the Commission's notice of inquiry seeking comment on possible modifications to the Critical Infrastructure Protection Reliability Standards regarding the cybersecurity of control centers used to monitor and control the bulk electric system in real time.

9/26/2016

FERC ISSUANCES SINCE LAST SC UPDATE (any standard development related directives or proposed directives are noted in the summary)

FERC Docket No. Issuance Description FERC Issuance

Date

RD16-6-000

Order Approving Reliability Standards IRO-018-1 and TOP-010-1 FERC issues an order approving Reliability Standards IRO-018-1 (Reliability Coordinator Real-time Reliability Monitoring and Analysis Capabilities) and TOP-010-1 (Real-time Reliability Monitoring and Analysis Capabilities) and directing modifications to the violation risk factors for three requirements.

9/22/2016

RM16-13-000

Notice of Proposed Rulemaking to Approve Reliability Standards BAL-005-1 and FAC-001-3 FERC issues a Notice of Proposed Rulemaking (NOPR) proposing to approve Reliability Standards BAL-005-1 (Balancing Authority Control) and FAC-001-3 (Facility Interconnection Requirements).

9/22/2016

RM15-11-000

Order No. 830 on GMD Reliability Standard TPL-007-1 FERC issues a final rule approving Reliability Standard TPL-007-1 Transmission System Planned Performance for Geomagnetic Disturbance (GMD) Events and directing NERC to modify the

9/22/2016

Page 247: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

2

UPCOMING FILING DATES

FERC Docket No. Filing Description Projected Filing

Date

RM13-13-000

NERC will submit an informational filing after the first two years of implementation of regional Reliability Standard BAL-002-WECC-02 (Contingency Reserve) that addresses the adequacy of contingency reserve in the Western Interconnection, in accordance with FERC Order No. 789.

10/3/2016

RD16-6-000 NERC will submit a compliance filing to modify VRFs of Reliability Standards IRO-018-1 and TOP-010-1. 11/21/2016

NERC will submit a quarterly filing in Nova Scotia of FERC-approved Reliability Standards. 11/30/2016

standard within 18 months of the effective date of the final rule as follows:

• modify the benchmark GMD event set forth in Attachment 1 to the standard so as to not rely solely on spatially averaged data;

• require the collection of necessary GMD related data and to make such data publically available; and

• include deadlines for the development and completion of corrective action plans required by the standard.

In addition, FERC directed NERC to:

• submit a GMD work plan within six months and subsequently, one or more informational filings that address specific GMD-related research areas; and

• pursuant to Section 1600 of the NERC Rules of Procedure, collect GMD-related data from registered entities for the period beginning May 2013 and to make the information publicly available.

Page 248: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Agenda Item 13a Standards Committee October 19, 2016

Compliance Filing in Response to FERC Directive to Change VRFs of IRO-018-1 and TOP-010-1 to High

Action For information only. NERC is required to submit a compliance filing in response to a Federal Energy Regulatory Commission (FERC) directive to revise the Violation Risk Factor (VRF) designations of Reliability Standard IRO-018-1 Requirement R1 and Reliability Standard TOP-010-1 Requirements R1 and R2 from “medium” to “high.” NERC staff will recommend approval of the directed VRF revisions to the NERC Board of Trustees at its November meeting.

Background On September 22, 2016, FERC issued an order approving Reliability Standard IRO-018-1 (Reliability Coordinator Real-time Reliability Monitoring and Analysis Capabilities) and Reliability Standard TOP-010-1 (Real-time Reliability Monitoring and Analysis Capabilities) and requiring a compliance filing to address VRF designations. In that order, FERC concluded that the “medium” VRFs assigned to Requirement R1 of Reliability Standard IRO-018-1 and Requirements R1 and R2 of Reliability Standard TOP-010-1 are not: (i) consistent with FERC’s guidelines; or (ii) in alignment with NERC’s definitions of high, medium, and low VRF levels. FERC directed NERC to revise the VRF designations for these three Reliability Standard Requirements from a VRF of “medium” to “high” and to submit a compliance filing within 60 days (i.e., by November 21, 2016). See, N. Am. Elec. Reliability Corp., 156 FERC ¶ 61,207 (2016).

Page 249: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Standards Committee Expectations Approved by Standards Committee January 12, 2012

Background Standards Committee (SC) members are elected by members of their segment of the Registered Ballot Body, to help the SC fulfill its purpose. According to the Standards Committee Charter, the SC’s purpose is:

In compliance with the NERC Reliability Standards Development Procedure, the Standards Committee manages the NERC standards development process for the North American-wide reliability standards with the support of the NERC staff to achieve broad bulk power system reliability goals for the industry. The Standards Committee protects the integrity and credibility of the standards development process.

The purpose of this document is to outline the key considerations that each member of the SC must make in fulfilling his or her duties. Each member is accountable to the members of the Segment that elected them, other members of the SC, and the NERC Board of Trustees for carrying out their responsibilities in accordance with this document.

Expectations of Standards Committee Members

1. SC Members represent their segment, not their organization or personal views. Each member isexpected to identify and use mechanisms for being in contact with members of the segment inorder to maintain a current perspective of the views, concerns, and input from that segment. NERCcan provide mechanisms to support communications if an SC member requests such assistance.

2. SC Members base their decisions on what is best for reliability and must consider not only what isbest for their segment, but also what is in the best interest of the broader industry and reliability.

3. SC Members should make every effort to attend scheduled meetings, and when not available arerequired to identify and brief a proxy from the same segment. Standards Committee businesscannot be conducted in the absence of a quorum, and it is essential that each Standards Committeemake a commitment to being present.

4. SC Members should not leverage or attempt to leverage their position on the SC to influence theoutcome of standards projects.

5. The role of the Standards Committee is to manage the standards process and the quality of theoutput, not the technical content of standards.

Agenda Item 13b Standards Committee October 19, 2016

Page 250: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Standards Committee Meeting Dates and Locations for 2016

The time for face-to-face meetings is based on the ‘local’ time zone. The time specified for all conference calls is based on Eastern Time.

January 21, 2016 – Conference Call | 1:00-4:00 p.m.

March 9, 2016 – Atlanta, GA (NERC) 8:00 a.m.-2:00 p.m.

April 20, 2016 – Conference Call | 1:00-4:00 p.m.

June 15, 2016 – St. Louis, MO (Ameren) | 8:00 a.m.-2:00 p.m.

July 20, 2016 – Conference Call | 1:00-4:00 p.m.

September 14, 2016 – San Francisco, CA (PG&E) | 8:00 a.m.-2:00 p.m.

October 19, 2016 – Conference Call | 1:00-4:00 p.m.

December 14, 2016 – Atlanta, GA (NERC) 8:00 a.m.-2:00 p.m.

This schedule was designed so that the SC subcommittee face-to-face meetings could occur either the afternoon (day) before or the afternoon of the SC face-to-face meetings. Scheduling of subcommittee face-to-face meetings is handled by the chairs of the subcommittees in consultation with the subcommittees’ members and NERC staff.

Agenda Item 13c Standards Committee October 19, 2016

Page 251: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Standards Committee 2016 Segment Representatives

Segment and Term Representative Organization

Chair 2016‐17

Brian Murphy Senior Attorney

NextEra Energy, Inc.

Vice‐Chair 2016‐17

Michelle D’Antuono Manager, Energy

Occidental Energy Ventures, LLC

Segment 1‐2015‐16 Lou Oberski Managing Director, NERC Compliance Policy

Dominion Resources Services, Inc.

Segment 1‐2016‐17 Laura Lee Manager of ERO Support and Event Analysis, System Operations

Duke Energy

Segment 2‐2015‐16 Charles Yeung Executive Director Interregional Affairs

Southwest Power Pool

Segment 2‐2016‐17 Ben Li Consultant

Independent Electric System Operator

Segment 3‐2015‐16 John Bussman Manager, Reliability Compliance

Associated Electric Cooperative, Inc.

Segment 3‐2016‐17 Scott Miller Manager Regulatory Policy

MEAG Power

Segment 4‐2015‐16 Barry Lawson Associate Director, Power Delivery and Reliability

National Rural Electric Cooperative Association

Segment 4‐2016‐17 Chris Gowder Regulatory Compliance Specialist

Florida Municipal Power Agency

Segment 5‐2015‐16 Colt Norrish Compliance Director

PacifiCorp

Segment 5‐2016‐17 Randy Crissman Vice President – Technical Compliance

New York Power Authority

Page 252: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Segment 6‐2015‐16 Brenda Hampton Regulatory Policy

Energy Future Holdings – Luminant Energy Company LLC

Segment 6‐2016‐17 Andrew Gallo Director, Reliability Compliance

City of Austin dba Austin Energy

Segment 7‐2015‐16 Marion Lucas APGI Chief Compliance Officer, President & Director

Alcoa Power Marketing LLC

Segment 7‐2016‐17 Frank McElvain Senior Manager, Consulting

Siemens Power Technologies International

Segment 8‐2015‐16 David Kiguel Independent

Segment 8‐2016‐17 Robert Blohm, Managing Director

Keen Resources Ltd.

Segment 9‐2015‐16 Mark Harris Electrical Engineer

Public Utilities Commission of Nevada

Segment 9‐2016‐17 Alexander Vedvik Senior Electrical Engineer

Public Service Commission of Wisconsin

Segment 10‐2015‐16 Steve Rueckert Director of Standards

Western Electricity Coordinating Council

Segment 10‐2016‐17 Guy Zito Assistant Vice President of Standards

Northeast Power Coordinating Council

Standards Committee 2016 Roster 2

Page 253: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Parliamentary Procedures

Agenda Item 13e Standards Committee October 19, 2016

Based on Robert’s Rules of Order, Newly Revised, 11th Edition, plus “Organization and Procedures Manual for the NERC Standing Committees”

Motions Unless noted otherwise, all procedures require a “second” to enable discussion.

When you want to… Procedure Debatable Comments Raise an issue for discussion

Move Yes The main action that begins a debate.

Revise a Motion currently under discussion

Amend Yes Takes precedence over discussion of main motion. Motions to amend an amendment are allowed, but not any further. The amendment must be germane to the main motion, and cannot reverse the intent of the main motion.

Reconsider a Motion already approved

Reconsider Yes Allowed only by member who voted on the prevailing side of the original motion.

End debate Call for the Question or End Debate

No If the Chair senses that the committee is ready to vote, he may say “if there are no objections, we will now vote on the Motion.” The vote is subject to a 2/3 majority approval. Also, any member may call the question. This motion is not debatable. The vote is subject to a 2/3 vote.

Record each member’s vote on a Motion

Request a Roll Call Vote

No Takes precedence over main motion. No debate allowed, but the members must approve by 2/3 majority.

Postpone discussion until later in the meeting

Lay on the Table Yes Takes precedence over main motion. Used only to postpone discussion until later in the meeting.

Postpone discussion until a future date

Postpone until Yes Takes precedence over main motion. Debatable only regarding the date (and time) at which to bring the Motion back for further discussion.

Remove the motion for any further consideration

Postpone indefinitely

Yes Takes precedence over main motion. Debate can extend to the discussion of the main motion. If approved, it effectively “kills” the motion. Useful for disposing of a badly chosen motion that can not be adopted or rejected without undesirable consequences.

Request a review of procedure

Point of order No Second not required. The Chair or secretary shall review the parliamentary procedure used during the discussion of the Motion.

- 1 -

Page 254: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Notes on Motions Seconds. A Motion must have a second to ensure that at least two members wish to discuss the issue. The “seconder” is not recorded in the minutes. Neither are motions that do not receive a second.

Announcement by the Chair. The Chair should announce the Motion before debate begins. This ensures that the wording is understood by the membership. Once the Motion is announced and seconded, the Committee “owns” the motion, and must deal with it according to parliamentary procedure.

- 2 -

Page 255: Agenda Standards Committee Conference Call Highlights and Minutes/SC … · 1. Appoint candidates 1 through 11 on the attached recommendation to form the SDT 2. Appoint candidate

Voting Voting Method When Used How Recorded in Minutes Unanimous Consent The standard practice.

When the Chair senses that the Committee is substantially in agreement, and the Motion needed little or no debate. No actual vote is taken.

The minutes show “by unanimous consent.”

Vote by Voice The standard practice. The minutes show Approved or Not Approved (or Failed).

Vote by Show of Hands (tally)

To record the number of votes on each side when an issue has engendered substantial debate or appears to be divisive. Also used when a Voice Vote is inconclusive. (The Chair should ask for a Vote by Show of Hands when requested by a member).

The minutes show both vote totals, and then Approved or Not Approved (or Failed).

Vote by Roll Call To record each member’s vote. Each member is called upon by the Secretary, and the member indicates either “Yes,” “No,” or “Present” if abstaining.

The minutes will include the list of members, how each voted or abstained, and the vote totals. Those members for which a “Yes,” “No,” or “Present” is not shown are considered absent for the vote.

Notes on Voting (Recommendations from DMB, not necessarily Mr. Robert)

Abstentions. When a member abstains, he is not voting on the Motion, and his abstention is not counted in determining the results of the vote. The Chair should not ask for a tally of those who abstained.

Determining the results. The results of the vote (other than Unanimous Consent) are determined by dividing the votes in favor by the total votes cast. Abstentions are not counted in the vote and shall not be assumed to be on either side.

“Unanimous Approval.” Can only be determined by a Roll Call vote because the other methods do not determine whether every member attending the meeting was actually present when the vote was taken, or whether there were abstentions.

Majorities. Robert’s Rules use a simple majority (one more than half) as the default for most motions. NERC uses 2/3 majority for all motions.

- 3 -