Examples of Cyber Asset in a sentence
Examples may include, but are not limited to, firewalls, authentication servers, and log monitoring and alerting systems.• Physical Access Control Systems (PACS) – Applies to each Physical Access Control System associated with a referenced high impact BES Cyber System or medium impact BES Cyber System with External Routable Connectivity.• Protected Cyber Assets (PCA) – Applies to each Protected Cyber Asset associated with a referenced high impact BES Cyber System or medium impact BES Cyber System.
Use one or a combination of the following methods to achieve the objective of mitigating the risk of vulnerabilities posed by unpatched software on the Transient Cyber Asset (per Transient Cyber Asset capability):• Review of installed security patch(es);• Review of security patching process used by the party;• Review of other vulnerability mitigation performed by the party; or• Other method(s) to mitigate software vulnerabilities.
Critical Cyber Asset Identification — Using the list of Critical Assets developed pursuant to Requirement R2, the Responsible Entity shall develop a list of associated Critical Cyber Assets essential to the operation of the Critical Asset.
Use one or a combination of the following methods to achieve the objective of mitigating malicious code (per Transient Cyber Asset capability):• Review of antivirus update level;• Review of antivirus update process used by the party;• Review of application whitelisting used by the party;• Review use of live operating system and software executable only from read- only media;• Review of system hardening used by the party; or• Other method(s) to mitigate malicious code.
Answer: To the extent a vendor is escorted to physically access a Critical Cyber Asset for purposes other than direct cyber access (e.g., replacing parts on the Critical Cyber Asset), supervision is acceptable (within the context of escorted physical access).
Rationale for Requirement R2:The intent of the BES Cyber Asset reuse and disposal process is to prevent the unauthorized dissemination of BES Cyber System Information upon reuse or disposal.
However, the requirement language does not support the notion of physically escorting a vendor or other individual to a Critical Cyber Asset for the vendor or other individual to perform cyber access, even if supervised.
In its simplest form, protectionism can be referred to as the resistance to the free movement of goods, services, capital or people(Cooper, 2007).
The definition of BES Cyber Asset provides the basis for this scoping.Real-time OperationsOne characteristic of the BES Cyber Asset is a real-time scoping characteristic.
In this case, the CIP compliance implementation program from the predecessor Registered Entity with the previously identified Critical Cyber Asset would be expected to be implemented as the CIP compliance implementation program for the merged Registered Entity, and would be expected to apply to any Critical Cyber Assets identified after the effective date of the merger.