NERC CIP-Konformitätslösungen
Die Standards der North American Electric Reliability Corporation (NERC) sind eine Reihe verbindlicher Cybersicherheitsstandards zum Schutz der kritischen Infrastruktur des Stromnetzes. NERC legt Standards für den Schutz kritischer Infrastrukturen (Critical Infrastructure Protection, CIP) fest und spielt eine entscheidende Rolle bei der Überwachung der Einhaltung dieser Standards, damit die Sicherheit und Zuverlässigkeit der nordamerikanischen Stromversorgungssysteme (Bulk Electric System, BES) gewährleistet sind. Die wichtigsten Aspekte der NERC CIP-Standards sind:
- Umfang: Die Standards gelten für Versorgungsunternehmen und andere Einrichtungen, die am Betrieb des nordamerikanischen Stromnetzes beteiligt sind.
- Anforderungen: Die NERC CIP-Standards decken verschiedene Aspekte der Cybersicherheit ab, darunter physische Sicherheit, elektronische Sicherheit und Personalschulung.
- Spektrum der Standards: Die Standards sind mit CIP-001 bis CIP-009 nummeriert und betreffen jeweils verschiedene Bereiche des Infrastrukturschutzes.
- Einhaltung: Um die Zuverlässigkeit und Sicherheit des Stromnetzes zu gewährleisten, müssen die Unternehmen diese Standards einhalten. Die Nichteinhaltung kann erhebliche Strafen nach sich ziehen.
Diese Standards und ähnliche Rahmenwerke, wie EPCIP in Europa und NCIP in Australien, sind für die Aufrechterhaltung der Integrität und Sicherheit der Stromnetze von entscheidender Bedeutung, da sie diese sowohl vor physischen als auch vor Cyberbedrohungen schützen. Für das Erreichen der NERC CIP-Konformität werden nicht nur die richtigen Produkte benötigt, es muss auch die gesamte Organisation eingebunden werden sowie eine robuste Infrastruktur eingerichtet sein.
Perle bietet zahlreiche Produkte mit Funktionen und Konfigurationsoptionen, die die Sicherung kritischer Infrastrukturen vereinfachen und dazu beitragen, dass Ihre kritischen Infrastrukturen den NERC CIP-Standards entsprechen. Die Nutzung der PerleVIEW Central Management Platform zusammen mit ausgewählten Perle-Hardwareprodukten vereinfacht den Prozess ebenfalls.
Details zur NERC CIP-Konformität von Perle-Produkten:
NERC CIP Requirement | IOLAN SCR Console Server Features |
CIP-002: Identification and documentation of the Critical Cyber Assets associated with the Critical Assets that support the reliable operation of the BES |
|
CIP-003: Responsible entities must have minimum security management controls in place to protect Critical Cyber Assets |
|
CIP-005: Identification and protection of the Electronic Security Perimeters inside which all Critical Cyber Assets reside, as well as all access points on the perimeter |
|
CIP-007: Responsible entities must define methods, processes, and procedures for securing those systems determined to be Critical Cyber Assets, as well as the other (non-critical) Cyber Assets within the Electronic Security Perimeters |
|
CIP-008: Identification, classification, response, and reporting of cybersecurity incidents related to Critical Cyber Assets |
|
CIP-009: Recovery plans are put in place for Critical Cyber Assets, and these plans follow established business continuity and disaster recovery techniques and practices |
|
NERC CIP Requirement | IOLAN SCG Console Server Features |
CIP-002: Identification and documentation of the Critical Cyber Assets associated with the Critical Assets that support the reliable operation of the BES |
|
CIP-003: Responsible entities must have minimum security management controls in place to protect Critical Cyber Assets |
|
CIP-005: Identification and protection of the Electronic Security Perimeters inside which all Critical Cyber Assets reside, as well as all access points on the perimeter |
|
CIP-007: Responsible entities must define methods, processes, and procedures for securing those systems determined to be Critical Cyber Assets, as well as the other (non-critical) Cyber Assets within the Electronic Security Perimeters |
|
CIP-008: Identification, classification, response, and reporting of cybersecurity incidents related to Critical Cyber Assets |
|
CIP-009: Recovery plans are put in place for Critical Cyber Assets, and these plans follow established business continuity and disaster recovery techniques and practices |
|
NERC CIP Requirement | IOLAN SDSC HV/LDC Terminal Server Features |
CIP-002: Identification and documentation of the Critical Cyber Assets associated with the Critical Assets that support the reliable operation of the BES |
|
CIP-003: Responsible entities must have minimum security management controls in place to protect Critical Cyber Assets |
|
CIP-005: Identification and protection of the Electronic Security Perimeters inside which all Critical Cyber Assets reside, as well as all access points on the perimeter |
|
CIP-007: Responsible entities must define methods, processes, and procedures for securing those systems determined to be Critical Cyber Assets, as well as the other (non-critical) Cyber Assets within the Electronic Security Perimeters |
|
CIP-008: Identification, classification, response, and reporting of cybersecurity incidents related to Critical Cyber Assets |
|
CIP-009: Recovery plans are put in place for Critical Cyber Assets, and these plans follow established business continuity and disaster recovery techniques and practices |
|
NERC CIP Requirement | IRG Cellular Router Features |
CIP-002: Identification and documentation of the Critical Cyber Assets associated with the Critical Assets that support the reliable operation of the BES |
|
CIP-003: Responsible entities must have minimum security management controls in place to protect Critical Cyber Assets |
|
CIP-005: Identification and protection of the Electronic Security Perimeters inside which all Critical Cyber Assets reside, as well as all access points on the perimeter |
|
CIP-007: Responsible entities must define methods, processes, and procedures for securing those systems determined to be Critical Cyber Assets, as well as the other (non-critical) Cyber Assets within the Electronic Security Perimeters |
|
CIP-008: Identification, classification, response, and reporting of cybersecurity incidents related to Critical Cyber Assets |
|
CIP-009: Recovery plans are put in place for Critical Cyber Assets, and these plans follow established business continuity and disaster recovery techniques and practices |
|
NERC CIP Requirement | IDS-710 Switch Features |
CIP-002: Identification and documentation of the Critical Cyber Assets associated with the Critical Assets that support the reliable operation of the BES |
|
CIP-003: Responsible entities must have minimum security management controls in place to protect Critical Cyber Assets |
|
CIP-005: Identification and protection of the Electronic Security Perimeters inside which all Critical Cyber Assets reside, as well as all access points on the perimeter |
|
CIP-007: Responsible entities must define methods, processes, and procedures for securing those systems determined to be Critical Cyber Assets, as well as the other (non-critical) Cyber Assets within the Electronic Security Perimeters |
|
CIP-008: Identification, classification, response, and reporting of cybersecurity incidents related to Critical Cyber Assets |
|
CIP-009: Recovery plans are put in place for Critical Cyber Assets, and these plans follow established business continuity and disaster recovery techniques and practices |
|
NERC CIP Requirement | Fiber Media Converter Features |
CIP-002: Identification and documentation of the Critical Cyber Assets associated with the Critical Assets that support the reliable operation of the BES |
|
CIP-003: Responsible entities must have minimum security management controls in place to protect Critical Cyber Assets |
|
CIP-005: Identification and protection of the Electronic Security Perimeters inside which all Critical Cyber Assets reside, as well as all access points on the perimeter |
|
CIP-007: Responsible entities must define methods, processes, and procedures for securing those systems determined to be Critical Cyber Assets, as well as the other (non-critical) Cyber Assets within the Electronic Security Perimeters |
|
CIP-008: Identification, classification, response, and reporting of cybersecurity incidents related to Critical Cyber Assets |
|
CIP-009: Recovery plans are put in place for Critical Cyber Assets, and these plans follow established business continuity and disaster recovery techniques and practices |
|
NERC CIP Requirement | Ethernet Extender Features |
CIP-002: Identification and documentation of the Critical Cyber Assets associated with the Critical Assets that support the reliable operation of the BES |
|
CIP-003: Responsible entities must have minimum security management controls in place to protect Critical Cyber Assets |
|
CIP-005: Identification and protection of the Electronic Security Perimeters inside which all Critical Cyber Assets reside, as well as all access points on the perimeter |
|
CIP-007: Responsible entities must define methods, processes, and procedures for securing those systems determined to be Critical Cyber Assets, as well as the other (non-critical) Cyber Assets within the Electronic Security Perimeters |
|
CIP-008: Identification, classification, response, and reporting of cybersecurity incidents related to Critical Cyber Assets |
|
CIP-009: Recovery plans are put in place for Critical Cyber Assets, and these plans follow established business continuity and disaster recovery techniques and practices |
|