Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1
• Documentation of the need for all enabled ports on all applicable
Cyber Assets and Electronic Access Points, individually or by
group.
• Listings of the listening ports on the Cyber Assets, individually or
by group, from either the device configuration files, command
output (such as netstat), or network scans of open ports.
• Configuration files of host-based firewalls or other device level
mechanisms that only allow needed ports and deny all others.
39
93
126
141
213
216
226
457
0 50 100 150 200 250 300 350 400 450 500
CIP-009 Recovery Plans for BES Cyber Systems
CIP-008 Incident Reporting and Recovery Planning
CIP-003 Security Management Controls
CIP-002 BES Cyber System Identification & Categorization
CIP-006 Physical Security of BES Cyber Systems
CIP-005 Electronic Security Perimiter
CIP-004 Training and Personnel Security
CIP-007 Systems Security Management
Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1
Additional Whitelist Capable Data
Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1
Continuous Compliance with Tripwire
Marc A. Child
Great River Energy
Security Program Manager


•
•

•
•
•

•

•

•
•

•
Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1
* Command Output Capture Rule
Automating for NERC CIP-007-5-R1





•
•
Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1
Services.CSV
ports.CSV
Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1
Wonder if they
bought all that…?
tripwire.com | @TripwireInc

More Related Content

Automating for NERC CIP-007-5-R1

Editor's Notes

  1. Horror stories from the compliance audit findings - Passwords 4 years old & default, passwords changed once in 2+ years, admin passwords still set to default, people’s accounts not closed after they left employment, employees and contractors remained untrained on security policies after 90 days, lax physical security, nearly 800 “reliability” incidents (where service was interrupted) for which the cause was undetermined