NERC CIP-002 through CIP-014 Revision 6_CIP-007-6 3.1

NERC CIP-002 through CIP-014 Revision 6

Malicious Code Prevention

CIP-007-6 3.1

3.1 Deploy method(s) to deter detect or prevent malicious code.

M3. Evidence must include each of the documented processes that collectively include each of the applicable requirement parts in CIP-007-6 Table R3– Malicious Code Prevention and additional evidence to demonstrate implementation as described in the Measures column of the table.CIP-007-6 Table R3– Malicious Code Prevention Part Applicable Systems Requirements Measures 3.1 High Impact BES Cyber Systems and their associated: EACMS;PACS; andPCAMedium Impact BES Cyber Systems and their associated: EACMS;PACS; andPCADeploy method(s) to deter detect or prevent malicious code. An example of evidence may include but is not limited to records of the Responsible Entitys performance of these processes (e.g. through traditional antivirus system hardening policies etc.). CIP-007-6 Table R3– Malicious Code Prevention Part Applicable Systems Requirements Measures 3.2 High Impact BES Cyber Systems and their associated: EACMS;PACS; andPCAMedium Impact BES Cyber Systems and their associated: EACMS;PACS; andPCAMitigate the threat of detected malicious code. Examples of evidence may include but are not limited to: Records of response processes for malicious code detectionRecords of the performance of these processes when malicious code is detected.3.3 High Impact BES Cyber Systems and their associated: EACMS;PACS; andPCAMedium Impact BES Cyber Systems and their associated: EACMS;PACS; andPCAFor those methods identified in Part 3.1 that use signatures or patterns have a process for the update of the signatures or patterns. The process must address testing and installing the signatures or patterns. An example of evidence may include but is not limited to documentation showing the process used for the update of signatures or patterns.

 

Click here to Start your FREE trial today!

Explainer video

 

What is a Cybersecurity Compliance Framework?

You don’t need to clutter your security and privacy programs with an ever-increasing number of tools as they become more sophisticated. The Lionfish platform offers a one-stop solution to track progress and monitor any framework, from custom-built ones to highly-specialized and in-demand top security and privacy frameworks and certifications.

With the Lionfish platform, every framework is supported with guided scoping, policies, controls, automated evidence collection, and continuous monitoring, ensuring efficient preparation for audits or attestation in minimal time.

The Lionfish platform is compatible with a wide range of security and privacy frameworks, including:

Click here to Start your FREE trial today!

Explainer video