Electronic Security Perimeter definition

Electronic Security Perimeter means the logical border surrounding a network to which BES Cyber Systems are connected using a routable protocol.**
Electronic Security Perimeter means the logical border surrounding a network to which BES Cyber Systems are connected using a routable protocol.
Electronic Security Perimeter means the logical border surrounding a network to which the Cyber Systems of Power Supply System are connected using a routable protocol.

Examples of Electronic Security Perimeter in a sentence

  • Physical Security Plan — The Responsible Entity shall create and maintain a physical security plan, approved by a senior manager or delegate(s) that shall address, at a minimum, the following:R1.1. Processes to ensure and document that all Cyber Assets within an Electronic Security Perimeter also reside within an identified Physical Security Perimeter.

  • Network Discovery - A review of network connectivity to identify all Electronic Access Points to the Electronic Security Perimeter.

  • Electronic Security Perimeter — The Responsible Entity shall ensure that every Critical Cyber Asset resides within an Electronic Security Perimeter.

  • Test Procedures — The Responsible Entity shall ensure that new Cyber Assets and significant changes to existing Cyber Assets within the Electronic Security Perimeter do not adversely affect existing cyber security controls.

  • R1.3. Communication links connecting discrete Electronic Security Perimeters shall not be considered part of the Electronic Security Perimeter.

  • Physical Security Plan — The Responsible Entity shall create and maintain a physical security plan, approved by a senior manager or delegate(s) that shall address, at a minimum, the following: R1.1. Processes to ensure and document that all Cyber Assets within an Electronic Security Perimeter also reside within an identified Physical Security Perimeter.

  • Note that the phrase ‘Cyber Asset becomes subject to the NERC Reliability Standards CIP-003 through CIP-009’ as used above applies to all Critical Cyber Assets, as well as other (non- critical) Cyber Assets within an Electronic Security Perimeter that must comply with the applicable requirements of NERC Reliability Standards CIP-003 through CIP-009.

  • R1.2. For a dial-up accessible Critical Cyber Asset that uses a non-routable protocol, the Responsible Entity shall define an Electronic Security Perimeter for that single access point at the dial-up device.

  • For the purpose of Standard CIP-002, Critical Cyber Assets are further qualified to be those having at least one of the following characteristics: R3.1. The Cyber Asset uses a routable protocol to communicate outside the Electronic Security Perimeter; or, R3.2. The Cyber Asset uses a routable protocol within a control center; or, R3.3. The Cyber Asset is dial-up accessible.

  • Security Status Monitoring — The Responsible Entity shall ensure that all Cyber Assets within the Electronic Security Perimeter, as technically feasible, implement automated tools or organizational process controls to monitor system events that are related to cyber security.

Related to Electronic Security Perimeter

  • Electronic service means the electronic service provided by the Comptroller under section 8A(1);

  • Electronic act means the creation or transmission originated on or off the schoolsite, by means of an electronic device, including, but not limited to, a telephone, wireless telephone, or other wireless communication device, computer, or pager, of a communication, including, but not limited to, any of the following:

  • Electronic Record and “Electronic Signature” shall have the meanings assigned to them, respectively, by 15 USC §7006, as it may be amended from time to time.