NERC CIP-002 through CIP-014 Revision 6_CIP-004-6 3.4

NERC CIP-002 through CIP-014 Revision 6

Personnel Risk Assessment Program

CIP-004-6 3.4

3.4 Criteria or process for verifying that personnel risk assessments performed for contractors or service vendors are conducted according to Parts 3.1 through 3.3.

M3. Evidence must include the documented personnel risk assessment programs that collectively include each of the applicable requirement parts in CIP-004-6 Table R3– Personnel Risk Assessment Program and additional evidence to demonstrate implementation of the program(s).CIP-004-6 Table R3– Personnel Risk Assessment Program Part Applicable Systems Requirements Measures 3.1 High Impact BES Cyber Systems and their associated: EACMS; andPACSMedium Impact BES Cyber Systems with External Routable Connectivity and their associated: EACMS; andPACSProcess to confirm identity. An example of evidence may include but is not limited to documentation of the Responsible Entity?s process to confirm identity. CIP-004-6 Table R3– Personnel Risk Assessment Program Part Applicable SystemsRequirements Measures 3.2 High Impact BES Cyber Systems and their associated: EACMS; andPACSMedium Impact BES Cyber Systems with External Routable Connectivity and their associated: EACMS; andPACSProcess to perform a seven year criminal history records check as part of each personnel risk assessment that includes: 3.2.1. current residence regardless of duration; and 3.2.2. other locations where during the seven years immediately prior to the date of the criminal history records check the subject has resided for six consecutive months or more. If it is not possible to perform a full seven year criminal history records check conduct as much of the seven year criminal history records check as possible and document the reason the full seven year criminal history records check could not be performed. An example of evidence may include but is not limited to documentation of the Responsible Entity?s process to perform a seven year criminal history records check. CIP-004-6 Table R3– Personnel Risk Assessment Program Part Applicable SystemsRequirements Measures 3.3 High Impact BES Cyber Systems and their associated: EACMS; andPACSMedium Impact BES Cyber Systems with External Routable Connectivity and their associated: EACMS; andPACSCriteria or process to evaluate criminal history records checks for authorizing access. An example of evidence may include but is not limited to documentation of the Responsible Entity?s process to evaluate criminal history records checks. 3.4 High Impact BES Cyber Systems and their associated: EACMS; andPACSMedium Impact BES Cyber Systems with External Routable Connectivity and their associated: EACMS; andPACSCriteria or process for verifying that personnel risk assessments performed for contractors or service vendors are conducted according to Parts 3.1 through 3.3. An example of evidence may include but is not limited to documentation of the Responsible Entity?s criteria or process for verifying contractors or service vendors personnel risk assessments. CIP-004-6 Table R3– Personnel Risk Assessment Program Part Applicable SystemsRequirements Measures 3.5 High Impact BES Cyber Systems and their associated: EACMS; andPACSMedium Impact BES Cyber Systems with External Routable Connectivity and their associated: EACMS; andPACSProcess to ensure that individuals with authorized electronic or authorized unescorted physical access have had a personnel risk assessment completed according to Parts 3.1 to 3.4 within the last seven years. An example of evidence may include but is not limited to documentation of the Responsible Entity?s process for ensuring that individuals with authorized electronic or authorized unescorted physical access have had a personnel risk assessment completed within the last seven years.

 

Click here to Start your FREE trial today!

Explainer video

 

What is a Cybersecurity Compliance Framework?

You don’t need to clutter your security and privacy programs with an ever-increasing number of tools as they become more sophisticated. The Lionfish platform offers a one-stop solution to track progress and monitor any framework, from custom-built ones to highly-specialized and in-demand top security and privacy frameworks and certifications.

With the Lionfish platform, every framework is supported with guided scoping, policies, controls, automated evidence collection, and continuous monitoring, ensuring efficient preparation for audits or attestation in minimal time.

The Lionfish platform is compatible with a wide range of security and privacy frameworks, including:

Click here to Start your FREE trial today!

Explainer video