Perle NERC CIP Compliance Solutions
The North American Electric Reliability Corporation (NERC) standards are a set of mandatory cybersecurity standards designed to protect the critical infrastructure of the power grid. NERC establishes and plays a crucial role in overseeing compliance with Critical Infrastructure Protection (CIP) standards to ensure the security and reliability of the North America Bulk Electric System (BES) systems. The key aspects of the NERC CIP standards are:
- Scope: The standards apply to utility companies and other entities involved in the operation of the North American power grid.
- Requirements: NERC CIP standards cover various aspects of cybersecurity, including physical security, electronic security, and personnel training.
- Standards Range: The standards are numbered CIP-001 through CIP-009, each addressing different areas of infrastructure protection.
- Compliance: Entities must comply with these standards to ensure the reliability and security of the power grid. Non-compliance can result in significant penalties.
These standards, and similar frameworks like EPCIP in Europe and NCIP in Australia, are essential for maintaining the integrity and security of the power grids by safeguarding it against both physical and cyber threats. Achieving NERC CIP compliance requires not only the right products but also the full commitment of the entire organization in conjunction with a robust infrastructure setup.
Perle offers numerous products with features and configuration options to simplify securing critical infrastructure assets and help ensure your critical infrastructure complies with NERC CIP standards. Deploying the PerleVIEW Central Management Platform along with selected Perle hardware products will also simplify the process.
Perle product NERC CIP compliance details:
NERC CIP Requirement | IOLAN SCR Console Server Features |
CIP-002: Identification and documentation of the Critical Cyber Assets associated with the Critical Assets that support the reliable operation of the BES |
|
CIP-003: Responsible entities must have minimum security management controls in place to protect Critical Cyber Assets |
|
CIP-005: Identification and protection of the Electronic Security Perimeters inside which all Critical Cyber Assets reside, as well as all access points on the perimeter |
|
CIP-007: Responsible entities must define methods, processes, and procedures for securing those systems determined to be Critical Cyber Assets, as well as the other (non-critical) Cyber Assets within the Electronic Security Perimeters |
|
CIP-008: Identification, classification, response, and reporting of cybersecurity incidents related to Critical Cyber Assets |
|
CIP-009: Recovery plans are put in place for Critical Cyber Assets, and these plans follow established business continuity and disaster recovery techniques and practices |
|
NERC CIP Requirement | IOLAN SCG Console Server Features |
CIP-002: Identification and documentation of the Critical Cyber Assets associated with the Critical Assets that support the reliable operation of the BES |
|
CIP-003: Responsible entities must have minimum security management controls in place to protect Critical Cyber Assets |
|
CIP-005: Identification and protection of the Electronic Security Perimeters inside which all Critical Cyber Assets reside, as well as all access points on the perimeter |
|
CIP-007: Responsible entities must define methods, processes, and procedures for securing those systems determined to be Critical Cyber Assets, as well as the other (non-critical) Cyber Assets within the Electronic Security Perimeters |
|
CIP-008: Identification, classification, response, and reporting of cybersecurity incidents related to Critical Cyber Assets |
|
CIP-009: Recovery plans are put in place for Critical Cyber Assets, and these plans follow established business continuity and disaster recovery techniques and practices |
|
NERC CIP Requirement | IOLAN SDSC HV/LDC Terminal Server Features |
CIP-002: Identification and documentation of the Critical Cyber Assets associated with the Critical Assets that support the reliable operation of the BES |
|
CIP-003: Responsible entities must have minimum security management controls in place to protect Critical Cyber Assets |
|
CIP-005: Identification and protection of the Electronic Security Perimeters inside which all Critical Cyber Assets reside, as well as all access points on the perimeter |
|
CIP-007: Responsible entities must define methods, processes, and procedures for securing those systems determined to be Critical Cyber Assets, as well as the other (non-critical) Cyber Assets within the Electronic Security Perimeters |
|
CIP-008: Identification, classification, response, and reporting of cybersecurity incidents related to Critical Cyber Assets |
|
CIP-009: Recovery plans are put in place for Critical Cyber Assets, and these plans follow established business continuity and disaster recovery techniques and practices |
|
NERC CIP Requirement | IRG Cellular Router Features |
CIP-002: Identification and documentation of the Critical Cyber Assets associated with the Critical Assets that support the reliable operation of the BES |
|
CIP-003: Responsible entities must have minimum security management controls in place to protect Critical Cyber Assets |
|
CIP-005: Identification and protection of the Electronic Security Perimeters inside which all Critical Cyber Assets reside, as well as all access points on the perimeter |
|
CIP-007: Responsible entities must define methods, processes, and procedures for securing those systems determined to be Critical Cyber Assets, as well as the other (non-critical) Cyber Assets within the Electronic Security Perimeters |
|
CIP-008: Identification, classification, response, and reporting of cybersecurity incidents related to Critical Cyber Assets |
|
CIP-009: Recovery plans are put in place for Critical Cyber Assets, and these plans follow established business continuity and disaster recovery techniques and practices |
|
NERC CIP Requirement | IDS-710 Switch Features |
CIP-002: Identification and documentation of the Critical Cyber Assets associated with the Critical Assets that support the reliable operation of the BES |
|
CIP-003: Responsible entities must have minimum security management controls in place to protect Critical Cyber Assets |
|
CIP-005: Identification and protection of the Electronic Security Perimeters inside which all Critical Cyber Assets reside, as well as all access points on the perimeter |
|
CIP-007: Responsible entities must define methods, processes, and procedures for securing those systems determined to be Critical Cyber Assets, as well as the other (non-critical) Cyber Assets within the Electronic Security Perimeters |
|
CIP-008: Identification, classification, response, and reporting of cybersecurity incidents related to Critical Cyber Assets |
|
CIP-009: Recovery plans are put in place for Critical Cyber Assets, and these plans follow established business continuity and disaster recovery techniques and practices |
|
NERC CIP Requirement | Fiber Media Converter Features |
CIP-002: Identification and documentation of the Critical Cyber Assets associated with the Critical Assets that support the reliable operation of the BES |
|
CIP-003: Responsible entities must have minimum security management controls in place to protect Critical Cyber Assets |
|
CIP-005: Identification and protection of the Electronic Security Perimeters inside which all Critical Cyber Assets reside, as well as all access points on the perimeter |
|
CIP-007: Responsible entities must define methods, processes, and procedures for securing those systems determined to be Critical Cyber Assets, as well as the other (non-critical) Cyber Assets within the Electronic Security Perimeters |
|
CIP-008: Identification, classification, response, and reporting of cybersecurity incidents related to Critical Cyber Assets |
|
CIP-009: Recovery plans are put in place for Critical Cyber Assets, and these plans follow established business continuity and disaster recovery techniques and practices |
|
NERC CIP Requirement | Ethernet Extender Features |
CIP-002: Identification and documentation of the Critical Cyber Assets associated with the Critical Assets that support the reliable operation of the BES |
|
CIP-003: Responsible entities must have minimum security management controls in place to protect Critical Cyber Assets |
|
CIP-005: Identification and protection of the Electronic Security Perimeters inside which all Critical Cyber Assets reside, as well as all access points on the perimeter |
|
CIP-007: Responsible entities must define methods, processes, and procedures for securing those systems determined to be Critical Cyber Assets, as well as the other (non-critical) Cyber Assets within the Electronic Security Perimeters |
|
CIP-008: Identification, classification, response, and reporting of cybersecurity incidents related to Critical Cyber Assets |
|
CIP-009: Recovery plans are put in place for Critical Cyber Assets, and these plans follow established business continuity and disaster recovery techniques and practices |
|