NERC CIP-002 through CIP-014 Revision 6_CIP-007-6 1.1

NERC CIP-002 through CIP-014 Revision 6

Ports and Services

CIP-007-6 1.1

1.1 Where technically feasible enable only logical network accessible ports that have been determined to be needed by the Responsible Entity including port ranges or services where needed to handle dynamic ports. If a device has no provision for disabling or restricting logical ports on the device then those ports that are open are deemed needed.

M1. Evidence must include the documented processes that collectively include each of the applicable requirement parts in CIP-007-6 Table R1– Ports and Services and additional evidence to demonstrate implementation as described in the Measures column of the table.CIP-007-6 Table R1– Ports and Services Part Applicable Systems Requirements Measures 1.1 High Impact BES Cyber Systems and their associated: EACMS;PACS; andPCAMedium Impact BES Cyber Systems with External Routable Connectivity and their associated: EACMS;PACS; andPCAWhere technically feasible enable only logical network accessible ports that have been determined to be needed by the Responsible Entity including port ranges or services where needed to handle dynamic ports. If a device has no provision for disabling or restricting logical ports on the device then those ports that are open are deemed needed. Examples of evidence may include but are not limited to: Documentation of the need for all enabled ports on all applicable Cyber Assets and Electronic Access Points individually or by group.Listings of the listening ports on the Cyber Assets individually or by group from either the device configuration files command output (such as netstat) or network scans of open ports; orConfiguration files of hostbased firewalls or other device level mechanisms that only allow needed ports and deny all others.CIP-007-6 Table R1– Ports and Services Part Applicable Systems Requirements Measures 1.2 High Impact BES Cyber Systems and their associated: PCA; andNonprogrammable communication components located inside both a PSP and an ESP.Medium Impact BES Cyber Systems at Control Centers and their associated: PCA; andNonprogrammable communication components located inside both a PSP and an ESP.Protect against the use of unnecessary physical input/output ports used for network connectivity console commands or Removable Media. An example of evidence may include but is not limited to documentation showing types of protection of physical input/output ports either logically through system configuration or physically using a port lock or signage.

 

Click here to Start your FREE trial today!

Explainer video

 

What is a Cybersecurity Compliance Framework?

You don’t need to clutter your security and privacy programs with an ever-increasing number of tools as they become more sophisticated. The Lionfish platform offers a one-stop solution to track progress and monitor any framework, from custom-built ones to highly-specialized and in-demand top security and privacy frameworks and certifications.

With the Lionfish platform, every framework is supported with guided scoping, policies, controls, automated evidence collection, and continuous monitoring, ensuring efficient preparation for audits or attestation in minimal time.

The Lionfish platform is compatible with a wide range of security and privacy frameworks, including:

Click here to Start your FREE trial today!

Explainer video