Solutions de conformité aux normes NERC CIP
Les normes de la North American Electric Reliability Corporation (NERC) sont un ensemble de normes de cybersécurité obligatoires destinées à protéger les infrastructures critiques du réseau électrique. La NERC établit et joue un rôle crucial dans le contrôle du respect des normes de protection des infrastructures critiques (CIP) afin de garantir la sécurité et la fiabilité du Bulk Electric System (BES), le système de production et de transport d’électricité d’Amérique du Nord. Les principaux aspects des normes CIP de la NERC sont les suivants :
- Champ d’application: Les normes s’appliquent aux entreprises de services publics et aux autres entités impliquées dans l’exploitation du réseau électrique nord-américain.
- Exigences: Les normes CIP de la NERC couvrent divers aspects de la cybersécurité, y compris la sécurité physique, la sécurité électronique et la formation du personnel.
- Éventail des normes: Les normes sont numérotées de CIP-001 à CIP-009, chacune traitant de différents domaines de la protection des infrastructures.
- Conformité: Les entités doivent se conformer à ces normes pour garantir la fiabilité et la sécurité du réseau électrique. La non-conformité peut entraîner des sanctions importantes.
Ces normes, ainsi que des cadres similaires tels que l’EPCIP en Europe et le NCIP en Australie, sont essentiels pour maintenir l’intégrité et la sécurité des réseaux électriques en les protégeant à la fois contre les menaces physiques et cybernétiques. La mise en conformité avec les normes CIP de la NERC nécessite non seulement les bons produits, mais aussi l’engagement total de l’ensemble de l’organisation, ainsi que des infrastructures solides.
Perle propose de nombreux produits dotés de fonctionnalités et d’options de configuration qui simplifient la sécurisation des actifs des infrastructures critiques et contribuent à garantir la conformité de ces dernières aux normes CIP de la NERC. Le déploiement de la Plate-forme de gestion centrale PerleVIEW avec des produits matériels Perle sélectionnés simplifiera également le processus.
Informations de Conformité NERC CIP des produits Perle:
NERC CIP Requirement | IOLAN SCR Console Server Features |
CIP-002: Identification and documentation of the Critical Cyber Assets associated with the Critical Assets that support the reliable operation of the BES |
|
CIP-003: Responsible entities must have minimum security management controls in place to protect Critical Cyber Assets |
|
CIP-005: Identification and protection of the Electronic Security Perimeters inside which all Critical Cyber Assets reside, as well as all access points on the perimeter |
|
CIP-007: Responsible entities must define methods, processes, and procedures for securing those systems determined to be Critical Cyber Assets, as well as the other (non-critical) Cyber Assets within the Electronic Security Perimeters |
|
CIP-008: Identification, classification, response, and reporting of cybersecurity incidents related to Critical Cyber Assets |
|
CIP-009: Recovery plans are put in place for Critical Cyber Assets, and these plans follow established business continuity and disaster recovery techniques and practices |
|
NERC CIP Requirement | IOLAN SCG Console Server Features |
CIP-002: Identification and documentation of the Critical Cyber Assets associated with the Critical Assets that support the reliable operation of the BES |
|
CIP-003: Responsible entities must have minimum security management controls in place to protect Critical Cyber Assets |
|
CIP-005: Identification and protection of the Electronic Security Perimeters inside which all Critical Cyber Assets reside, as well as all access points on the perimeter |
|
CIP-007: Responsible entities must define methods, processes, and procedures for securing those systems determined to be Critical Cyber Assets, as well as the other (non-critical) Cyber Assets within the Electronic Security Perimeters |
|
CIP-008: Identification, classification, response, and reporting of cybersecurity incidents related to Critical Cyber Assets |
|
CIP-009: Recovery plans are put in place for Critical Cyber Assets, and these plans follow established business continuity and disaster recovery techniques and practices |
|
NERC CIP Requirement | IOLAN SDSC HV/LDC Terminal Server Features |
CIP-002: Identification and documentation of the Critical Cyber Assets associated with the Critical Assets that support the reliable operation of the BES |
|
CIP-003: Responsible entities must have minimum security management controls in place to protect Critical Cyber Assets |
|
CIP-005: Identification and protection of the Electronic Security Perimeters inside which all Critical Cyber Assets reside, as well as all access points on the perimeter |
|
CIP-007: Responsible entities must define methods, processes, and procedures for securing those systems determined to be Critical Cyber Assets, as well as the other (non-critical) Cyber Assets within the Electronic Security Perimeters |
|
CIP-008: Identification, classification, response, and reporting of cybersecurity incidents related to Critical Cyber Assets |
|
CIP-009: Recovery plans are put in place for Critical Cyber Assets, and these plans follow established business continuity and disaster recovery techniques and practices |
|
NERC CIP Requirement | IRG Cellular Router Features |
CIP-002: Identification and documentation of the Critical Cyber Assets associated with the Critical Assets that support the reliable operation of the BES |
|
CIP-003: Responsible entities must have minimum security management controls in place to protect Critical Cyber Assets |
|
CIP-005: Identification and protection of the Electronic Security Perimeters inside which all Critical Cyber Assets reside, as well as all access points on the perimeter |
|
CIP-007: Responsible entities must define methods, processes, and procedures for securing those systems determined to be Critical Cyber Assets, as well as the other (non-critical) Cyber Assets within the Electronic Security Perimeters |
|
CIP-008: Identification, classification, response, and reporting of cybersecurity incidents related to Critical Cyber Assets |
|
CIP-009: Recovery plans are put in place for Critical Cyber Assets, and these plans follow established business continuity and disaster recovery techniques and practices |
|
NERC CIP Requirement | IDS-710 Switch Features |
CIP-002: Identification and documentation of the Critical Cyber Assets associated with the Critical Assets that support the reliable operation of the BES |
|
CIP-003: Responsible entities must have minimum security management controls in place to protect Critical Cyber Assets |
|
CIP-005: Identification and protection of the Electronic Security Perimeters inside which all Critical Cyber Assets reside, as well as all access points on the perimeter |
|
CIP-007: Responsible entities must define methods, processes, and procedures for securing those systems determined to be Critical Cyber Assets, as well as the other (non-critical) Cyber Assets within the Electronic Security Perimeters |
|
CIP-008: Identification, classification, response, and reporting of cybersecurity incidents related to Critical Cyber Assets |
|
CIP-009: Recovery plans are put in place for Critical Cyber Assets, and these plans follow established business continuity and disaster recovery techniques and practices |
|
NERC CIP Requirement | Fiber Media Converter Features |
CIP-002: Identification and documentation of the Critical Cyber Assets associated with the Critical Assets that support the reliable operation of the BES |
|
CIP-003: Responsible entities must have minimum security management controls in place to protect Critical Cyber Assets |
|
CIP-005: Identification and protection of the Electronic Security Perimeters inside which all Critical Cyber Assets reside, as well as all access points on the perimeter |
|
CIP-007: Responsible entities must define methods, processes, and procedures for securing those systems determined to be Critical Cyber Assets, as well as the other (non-critical) Cyber Assets within the Electronic Security Perimeters |
|
CIP-008: Identification, classification, response, and reporting of cybersecurity incidents related to Critical Cyber Assets |
|
CIP-009: Recovery plans are put in place for Critical Cyber Assets, and these plans follow established business continuity and disaster recovery techniques and practices |
|
NERC CIP Requirement | Ethernet Extender Features |
CIP-002: Identification and documentation of the Critical Cyber Assets associated with the Critical Assets that support the reliable operation of the BES |
|
CIP-003: Responsible entities must have minimum security management controls in place to protect Critical Cyber Assets |
|
CIP-005: Identification and protection of the Electronic Security Perimeters inside which all Critical Cyber Assets reside, as well as all access points on the perimeter |
|
CIP-007: Responsible entities must define methods, processes, and procedures for securing those systems determined to be Critical Cyber Assets, as well as the other (non-critical) Cyber Assets within the Electronic Security Perimeters |
|
CIP-008: Identification, classification, response, and reporting of cybersecurity incidents related to Critical Cyber Assets |
|
CIP-009: Recovery plans are put in place for Critical Cyber Assets, and these plans follow established business continuity and disaster recovery techniques and practices |
|