Additionally, standard CIP-005 notes that cyber assets involved in the access control, such as active directory domain controllers, and monitoring, such as intrusion detection systems (IDS), are bound to the applicable controls of the following CIP standards: Noncritical cyber assets that exist within electronic security perimeters are considered in scope for the requirements of standard CIP-005. Included within the access points to the electronic security perimeters are any external communication end points, such as dial-up modems, which terminate within the electronic security perimeter. These perimeters, and their associated access points, must be identified and documented. ![]() ![]() Specifically, standard CIP-005 requires entities to ensure that all critical cyber assets are housed within an electronic security perimeter.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |