NERC CIP-002 through CIP-014 Revision 6_CIP-014-2 R5

NERC CIP-002 through CIP-014 Revision 6

Physical Security

CIP-014-2 R5

R5. Each Transmission Owner that identified a Transmission station Transmission substation or primary control center in Requirement R1 and verified according to Requirement R2 and each Transmission Operator notified by a Transmission Owner according to Requirement R3 shall develop and implement a documented physical security plan(s) that covers their respective Transmission station(s) Transmission substation(s) and primary control center(s). The physical security plan(s) shall be developed within 120 calendar days following the completion of Requirement R2 and executed according to the timeline specified in the physical security plan(s). The physical security plan(s) shall include the following attributes: [VRF: High; Time-Horizon: Long-term Planning]

M5. Examples of evidence may include but are not limited to dated written or electronic documentation of its physical security plan(s) that covers their respective identified and verified Transmission station(s) Transmission substation(s) and primary control center(s) as specified in Requirement R5 and additional evidence demonstrating execution of the physical security plan according to the timeline specified in the physical security plan.

 

Click here to Start your FREE trial today!

Explainer video

 

What is a Cybersecurity Compliance Framework?

You don’t need to clutter your security and privacy programs with an ever-increasing number of tools as they become more sophisticated. The Lionfish platform offers a one-stop solution to track progress and monitor any framework, from custom-built ones to highly-specialized and in-demand top security and privacy frameworks and certifications.

With the Lionfish platform, every framework is supported with guided scoping, policies, controls, automated evidence collection, and continuous monitoring, ensuring efficient preparation for audits or attestation in minimal time.

The Lionfish platform is compatible with a wide range of security and privacy frameworks, including:

Click here to Start your FREE trial today!

Explainer video