Project 2023-04 Modifications to CIP-003

​​​​​​​​​​​​Related Files​

Status

The formal comment period and additional ballots for draft two of CIP-003-A – Cyber Security – Security Management Controls concluded 8 p.m. Eastern, Thursday, March 14, 2024. The comments received and ballot results can be accessed via the links below. The drafting team will review all comments and determine the next steps of the project.​​​

​Background
In light of cybersecurity events and the evolving threat landscape, the NERC Board took action at its February 4, 2021 meeting to direct NERC staff, working with stakeholders, to expeditiously complete its broader review and analysis on facilities that house low impact Bulk Electric System (BES) Cyber Assets. Specifically, the degrees of risk presented by various facilities that house the low impact BES Cyber Assets and report on whether the low impact criteria should be modified. To assist in this evaluation, NERC staff assembled a team of cybersecurity experts and compliance experts representative of a cross section of industry, called the Low Impact Criteria Review Team (LICRT). The LICRT's primary purpose was to discuss the potential threat and risk posed by a coordinated cyber attack on low impact BES Cyber Systems. In its report, the LICRT documented the results of the review and analysis of degrees of risk presented by various facilities that meet the criteria that define low impact cyber facilities and recommends actions to address those risks. The Board accepted the LICRT's report at its November 2022 meeting and asked that the recommendations in the report be initiated. The Standards Committee accepted the SAR at its March 22, 2023 meeting.

Standard Affected: CIP-003-9

Purpose/Industry Need
The LICRT report recognized that low impact BES Cyber Systems may introduce BES reliability risks of a higher impact where distributed low impact BES Cyber Systems are used for a coordinated attack. The team recommended enhancing the existing low impact category to further mitigate the coordinated attack risk. The proposed project will revise CIP-003-9 to add controls to authenticate remote users, protect the authentication information in transit, and detect malicious communications assets containing low impact BES Cyber Systems with external routable connectivity. ​

Subscribe to this project's observer mailing list 
Select "NERC Email Distribution Lists" from the "Service" drop-down menu and specify “Project 2023-04 Modifications to CIP-003 Observer List” in the Description Box.


DraftActionsDatesResultsConsideration of Comments
Draft 2

CIP-003-A
Clean | Redline to Last Posted | Redline to Last Approved​

Implementation Plan


Supporting Materials


Technical Rationale​

Unofficial Comment Form​

VRF/VSL Justifications

Additional Ballot

Ballot Open Reminder​

Info

Vote




3/5/24 - 3/14/24

​​

Ballot Results

 CIP-003-A

 Implementation Plan​

 Non-binding Poll Results










​Comment Period

Info​

Submit Comments​


​1/30/24 - 3/14/24


​​Comments Received​

Draft 1

CIP-003-A
Clean | Redline to Last Approved

Implementation Plan​

 

Supporting Materials

Technical Rationale​​

Unofficial Comment Form

VRF/VSL Justifications

    



   Supplemental Drafting Team Nominations​


​Initial Ballot

Ballot Open Reminder​

Info

Vote​​



11/28/23 - 12/07/23




Ballot Results


































Join Ballot Pools​​


10/24/23 - 11/27/23
​​
​​






​​​​​Comments Received​

​Comment Period

Info

Sub​mit Comments​


10/24/23 - 12/07/23​
Supplemental Nomination Period

Info​

Submit Nominations​​

10/24/23 - 12/07/23
​​
​​Standard Authorization Request
Clean | Redline​
​​Accepted by the Standards Committee
​7/27/2023

Standard Authorization Request

Low Impact Criteria Review Team Report​​

Supporting Materials

Unofficial Com​ment Form (Word)

Comment Period

Info

Submit Comments





3/31/2023 - 5/15/2023







Drafting Team Nominations

Supporting Materials

Unofficial Nomination Form (Word) 

Nomination Period

Info​

Submit Nominations​​


3/31/2023 - 5/15/2023