Examples of Protected Cyber Asset in a sentence
Examples may include, but are not limited to, firewalls, authentication servers, and log monitoring and alerting systems.• Physical Access Control Systems (PACS) – Applies to each Physical Access Control System associated with a referenced high impact BES Cyber System or medium impact BES Cyber System with External Routable Connectivity.• Protected Cyber Assets (PCA) – Applies to each Protected Cyber Asset associated with a referenced high impact BES Cyber System or medium impact BES Cyber System.
This also excludes Cyber Assets in the BES Cyber System that cannot be directly accessed through External Routable Connectivity.• Protected Cyber Assets (PCA) – Applies to each Protected Cyber Asset associated with a referenced high impact BES Cyber System or medium impact BES Cyber System.• Electronic Access Points (EAP) – Applies at Electronic Access Points associated with a referenced high impact BES Cyber System or medium impact BES Cyber System.
Examplesmay include, but are not limited to, firewalls, authentication servers, and log monitoring and alerting systems.• Physical Access Control Systems (PACS) – Applies to each Physical Access Control System associated with a referenced high impact BES Cyber System or medium impact BES Cyber System with External Routable Connectivity.• Protected Cyber Assets (PCA) – Applies to each Protected Cyber Asset associated with a referenced high impact BES Cyber System or medium impact BES Cyber System.
Examples may include, but are not limited to, firewalls, authentication servers, and log monitoring and alerting systems. Physical Access Control Systems (PACS) – Applies to each Physical Access Control System associated with a referenced high impact BES Cyber System or medium impact BES Cyber System with External Routable Connectivity. Protected Cyber Assets (PCA) – Applies to each Protected Cyber Asset associated with a referenced high impact BES Cyber System or medium impact BES Cyber System.
There are few requirement differences between those for a BES Cyber Asset and a Protected Cyber Asset.
Examples may include, but are not limited to, firewalls, authentication servers, and log monitoring and alerting systems.• Physical Access Control Systems (PACS) – Applies to each Physical Access Control System associated with a referenced high impact BES Cyber System or medium impact BES Cyber System.• Protected Cyber Assets (PCA) – Applies to each Protected Cyber Asset associated with a referenced high impact BES Cyber System or medium impact BES Cyber System.
If the PDC at the Control Center is on the same network (i.e., inside of the ESP) containing other medium impact BES Cyber Assets (such as an EMS or SCADA system), it is considered a Protected Cyber Asset, and is subject to essentially the same set of requirements as a medium impact BES Cyber Asset at a Control Center, regardless of the use of the PDC or PMU data that it contains.
NERC’s proposed implementation plan also includes effective dates for the new and modified definitions associated with: (1) transient devices (i.e., BES Cyber Asset, Protected Cyber Asset, Removable Media, and Transient Cyber Asset); and (2) Low Impact controls (i.e., Low Impact Electronic Access Point and Low Impact External Routable Connectivity).
If a PMU or PDC is not a BES Cyber Asset (or is not a Protected Cyber Asset on the same network as an other BES Cyber Asset), it is not assessed by these criteria.
However, in this scenario, the PMU or PDC is co-located on the same LAN as BES Cyber Assets, and is therefore characterized as a Protected Cyber Asset, see Figure 11.