NERC CIP-002 through CIP-014 Revision 6_CIP-004-6 4.1

NERC CIP-002 through CIP-014 Revision 6

Access Management Program

CIP-004-6 4.1

4.1 Process to authorize based on need as determined by the Responsible Entity except for CIP Exceptional Circumstances: 4.1.1. Electronic access;4.1.2. Unescorted physical access into a Physical Security Perimeter; and4.1.3. Access to designated storage locations whether physical or electronic for BES Cyber System Information.

M4. Evidence must include the documented processes that collectively include each of the applicable requirement parts in CIP-004-6 Table R4– Access Management Program and additional evidence to demonstrate that the access management program was implemented as described in the Measures column of the table.CIP-004-6 Table R4– Access Management Program Part Applicable Systems Requirements Measures 4.1 High Impact BES Cyber Systems and their associated: EACMS; andPACSMedium Impact BES Cyber Systems with External Routable Connectivity and their associated: EACMS; andPACSProcess to authorize based on need as determined by the Responsible Entity except for CIP Exceptional Circumstances: 4.1.1. Electronic access; 4.1.2. Unescorted physical access into a Physical Security Perimeter; and 4.1.3. Access to designated storage locations whether physical or electronic for BES Cyber System Information. An example of evidence may include but is not limited to dated documentation of the process to authorize electronic access unescorted physical access in a Physical Security Perimeter and access to designated storage locations whether physical or electronic for BES Cyber System Information. CIP-004-6 Table R4– Access Management Program Part Applicable Systems Requirements Measures 4.2 High Impact BES Cyber Systems and their associated: EACMS; andPACSMedium Impact BES Cyber Systems with External Routable Connectivity and their associated: EACMS; andPACSVerify at least once each calendar quarter that individuals with active electronic access or unescorted physical access have authorization records. Examples of evidence may include but are not limited to: Dated documentation of the verification between the system generated list of individuals who have been authorized for access (i.e. workflow database) and a system generated list of personnel who have access (i.e. user account listing) orDated documentation of the verification between a list of individuals who have been authorized for access (i.e. authorization forms) and a list of individuals provisioned for access (i.e. provisioning forms or shared account listing).CIP-004-6 Table R4– Access Management Program Part Applicable Systems Requirements Measures 4.3 High Impact BES Cyber Systems and their associated: EACMS; andPACSMedium Impact BES Cyber Systems with External Routable Connectivity and their associated: EACMS; andPACSFor electronic access verify at least once every 15 calendar months that all user accounts user account groups or user role categories and their specific associated privileges are correct and are those that the Responsible Entity determines are necessary. An example of evidence may include but is not limited to documentation of the review that includes all of the following: A dated listing of all accounts/account groups or roles within the system;A summary description of privileges associated with each group or role;Accounts assigned to the group or role; andDated evidence showingverification of the privileges for the group are authorized and appropriate to the work function performed by people assigned to each account.CIP-004-6 Table R4– Access Management Program Part Applicable Systems Requirements Measures 4.4 High Impact BES Cyber Systems and their associated: EACMS; andPACSMedium Impact BES Cyber Systems with External Routable Connectivity and their associated: EACMS; andPACSVerify at least once every 15 calendar months that access to the designated storage locations for BES Cyber System Information whether physical or electronic are correct and are those that the Responsible Entity determines are necessary for performing assigned work functions. An example of evidence may include but is not limited to the documentation of the review that includes all of the following: A dated listing of authorizations for BES Cyber System information;Any privileges associated with the authorizations; andDated evidence showing a verification of the authorizations and any privileges were confirmed correct and the minimum necessary for performing assigned work functions.

 

Click here to Start your FREE trial today!

Explainer video

 

What is a Cybersecurity Compliance Framework?

You don’t need to clutter your security and privacy programs with an ever-increasing number of tools as they become more sophisticated. The Lionfish platform offers a one-stop solution to track progress and monitor any framework, from custom-built ones to highly-specialized and in-demand top security and privacy frameworks and certifications.

With the Lionfish platform, every framework is supported with guided scoping, policies, controls, automated evidence collection, and continuous monitoring, ensuring efficient preparation for audits or attestation in minimal time.

The Lionfish platform is compatible with a wide range of security and privacy frameworks, including:

Click here to Start your FREE trial today!

Explainer video