Annual Cyber Security Training New Hire PDF
Annual Cyber Security Training New Hire PDF
Annual Cyber Security Training New Hire PDF
Recently the Department of Homeland Security directed government agencies to remove and
discontinue use of all Kaspersky-branded software products or services on all federal systems. In
addition, DOE Chief Information Officer Max Everett issued a memorandum directing DOE
entities to enforce blocking of Kaspersky-related network addresses and to take steps to remove
or limit Kaspersky-branded products and services from internal WAPA networks.
In order to comply with these directives, WAPA’s Office of the Chief Information Officer is
implementing the following requirements and rules of behavior effective immediately:
Department Records should not be stored on non-official electronic storage media (e.g.
personal devices, portable hard drives, or memory sticks) or non-official information
services such as unauthorized cloud services or other file storage.
===
Agency requirements for privacy: (per OMB Circular A-130)
• Establish rules of behavior, including consequences for violating rules of behavior, for
employees and contractors that have access to Federal information or information
systems, including those that create, collect, use, process, store, maintain,
disseminate, disclose, or dispose of PII; and
• Ensure that employees and contractors have read and agreed to abide by the rules of
behavior for the Federal information and information systems for which they require
access prior to being granted access.
Users who routinely handle PII must agree to Privacy Rules of Behavior, including:
1. Limit the creation, collection, use, processing, storage, maintenance, dissemination
and disclosure of PII to that which is legally authorized, relevant and reasonably
deemed necessary for the proper performance of agency functions.
Refer to the link at the end of the training for WAPA policies.
• Bulk Electric System (BES): As defined by the Regional Reliability Organization, the
electrical generation resources, transmission lines, interconnections with neighboring
systems, and associated equipment, generally operated at voltages of 100 kV or higher.
Radial transmission facilities serving only load with one transmission source are
generally not included in this definition.
• BES Cyber System: One or more BES Cyber Assets logically grouped by a responsible
entity to perform one or more reliability tasks for a functional entity.
• BES Cyber Assets: A Cyber Asset that if rendered unavailable, degraded, or misused
would, within 15 minutes of its required operation, mis-operation, or non‐operation,
adversely impact one or more Facilities, systems, or equipment, which, if destroyed,
degraded, or otherwise rendered unavailable when needed, would affect the reliable
operation of the Bulk Electric System. Redundancy of affected Facilities, systems, and
equipment shall not be considered when determining adverse impact. Each BES Cyber
Asset is included in one or more BES Cyber Systems
More information and additional terms may be referenced on the NERC web site. A link is
provided in the Addendum: Resources and Links, located at the end of this training.
• The BES Cyber System is located within a locked building when not attended.
• The BES Cyber System is located within a Building with doors which are alarmed
through a PACS system.
• The BES Cyber System is located within a Building with doors which are alarmed
through a SCADA system.
Laptops may connect to the WAPA GSS network for updates to anti-virus, Operating System, Applications,
or other approved changes and then connect to CIP Low, Medium and High impact sites.
NOTE: CIP area Visitor Logs and DARs are collected and reviewed quarterly.
Users will not attempt to access any BCSI or programs contained on any
system for which they do not have authorization or explicit consent of the
owner of the system.
Before sharing BSCI, verify that those you share with have access
authorization to that information.
Incident identification and detection is described in WAPA’s Cyber Security Incident Response
Plan (CSIRP):
*Refer to the Cyber Security Points of Contact addendum supplied with this
training
Changes to existing BES Cyber System connections must be formally reviewed and
approved by Cyber Security personnel and/or managers of those systems via the
appropriate Change Control and Configuration Management Processes .
In plain English terms, transient cyber assets includes such things as USB sticks,
portable hard drives, CD/DVD media, or devices such as laptops and mobile
phones. These devices have the capability to store and transfer files from one
area to another, and thereby pose risks that must be mitigated.
<vacant>
UGP
• WAPA Directives/Orders/Policies:
https://my.wapa.int/programs/directives/Pages/directives.aspx