Critical Infrastructure Protection - CIP - Training

377-01 CIP Personnel Responsibilities

Upon completion of this course, you should understand Critical Infrastructure Protection (CIP) training and planning requirements, and the applicable NERC CIP standards as they apply to maintaining the stability of the BES.

  • Name the responsible entities and facilities affected by CIP-004-5.1 and CIP-008-5
  • List the five classes of applicable systems
  • Describe the relationship between documented processes, programs, and plans
  • Explain the required documented processes associated with security awareness programs
  • Identify the content required for training programs listed in CIP-004-5.1 R1 through R5
  • Identify the content and frequency of implementation required for a Cyber Security Incident response plan
  • Identify reporting requirements associated with the Cyber Security Incident response plan

377-02 CIP Perimeters and Configurations

Upon completion of this course, you should understand the safeguards for BES Cyber Systems as outlined in CIP-005-5 and CIP-010-1.

  • Identify and define important CIP terminology
  • Identify the applicable systems regarding ESPs and EAPs
  • Describe how dial-up connectivity is managed to maintain cyber security
  • Describe what interactive remote access management means and what requirements are defined in CIP-005
  • Identify the components of a baseline configuration and the change management requirements
  • Summarize how to perform configuration monitoring and vulnerability assessments in accordance with CIP-010

377-03 CIP Controls and Management

When you complete this lesson, you will be able to adhere to NERC compliance measures, identify specific information required by NERC CIP standards, and ensure the protection of critical cyber assets and devices.

  • Describe the purpose of security management control policies
  • Identify topics and strategies of policy implementation
  • Identify management and compliance controls
  • Identify roles responsible for administrative control
  • Describe the process of authority delegation
  • Describe the process of identifying critical cyber assets
  • Identify critical control measures of CIP V5
  • Identify concerns associated with compliance to high and medium impact requirements
  • Identify audit recommendations and assistance tips for compliance with high and medium impact requirements
  • Describe concerns associated with low impact assets

377-04 CIP Related BES Recovery Plans

Upon completion of this lesson, you will be able to categorize BES Cyber Systems according to CIP-002-5 requirements and implement a Recovery Plan meeting the requirements of CIP-009-5.

  • Define BES Cyber System Categorization
  • Recall the requirements of CIP-002-5
  • Identify the criteria used to label a high impact BES Cyber System
  • Identify the criteria used to label a medium impact BES Cyber System
  • Identify the criteria used to label a low impact BES Cyber System
  • Describe the applicability of BES System Categorization
  • Define what a Recovery Plan is as outlined in
    CIP-009-5
  • Recall the specifications for developed recovery plans
  • Relate how to effectively implement and test a recovery plan
  • Summarize how to communicate the development of and changes to a recovery plan

377-05 CIP Physical Security

When you complete this lesson, you will be able to comply with the requirements of NERC standards regarding CIP Physical Security measures.

  • Identify the Functional Entities tasked with physical security
  • Describe the purpose of CIP-006-5 and CIP-014-2
  • Describe how aggregate weighted value is determined
  • Describe the goal of the BCS Physical Security Program
  • Identify the difference between PACS and EACMS
  • Identify three categories of physical access control
  • Identify BCS physical security areas of concern
  • Identify common physical threats to transmission assets
  • Describe applicability and security components of CIP-014-2
  • Identify evidence that supports technical studies and analysis
  • Identify considerations of Transmission asset physical security