NERC CIP-002 through CIP-014 Revision 6_CIP-002-5.1a R2

NERC CIP-002 through CIP-014 Revision 6

BES Cyber System Categorization

CIP-002-5.1a R2

R2. The Responsible Entity shall: [Violation Risk Factor: Lower] [Time Horizon: Operations Planning]2.1 Review the identifications in Requirement R1 and its parts (and update them if there are changes identified) at least once every 15 calendar months even if it has no identified items in Requirement R12.2 Have its CIP Senior Manager or delegate approve the identifications required by Requirement R1 at least once every 15 calendar months even if it has no identified items in Requirement R1.

M2. Acceptable evidence includes but is not limited to electronic or physical dated records to demonstrate that the Responsible Entity has reviewed and updated where necessary the identifications required in Requirement R1 and its parts and has had its CIP Senior Manager or delegate approve the identifications required in Requirement R1 and its parts at least once every 15 calendar months even if it has none identified in Requirement R1 and its parts as required by Requirement R2.

 

Click here to Start your FREE trial today!

Explainer video

 

What is a Cybersecurity Compliance Framework?

You don’t need to clutter your security and privacy programs with an ever-increasing number of tools as they become more sophisticated. The Lionfish platform offers a one-stop solution to track progress and monitor any framework, from custom-built ones to highly-specialized and in-demand top security and privacy frameworks and certifications.

With the Lionfish platform, every framework is supported with guided scoping, policies, controls, automated evidence collection, and continuous monitoring, ensuring efficient preparation for audits or attestation in minimal time.

The Lionfish platform is compatible with a wide range of security and privacy frameworks, including:

Click here to Start your FREE trial today!

Explainer video