Reliability Standard Audit Worksheet CIP-010-AB-1 Cyber Security - Configuration Change Management

advertisement
Reliability Standard Audit Worksheet
CIP-010-AB-1
Cyber Security - Configuration Change Management
and Vulnerability Assessments
Audit Summary
Registered Entity:
[Registered Entity name as it appears in the AESO ARS Registry]
Functional Entity:
[Functional entities for which the Registered Entity above was registered
throughout the audit period]
Audit Period:
From: [Audit start date or standard effective date, whichever comes
later]
To:
[Audit end date or standard withdrawal/supersede date,
whichever comes first]
Audit:
[Scheduled (YYYY-QX) or Spot Check YYYY-MM-DD]
Compliance Monitoring
Entity:
Alberta Electric System Operator (AESO)
Suspected Non-Compliance
to the standard?
Date of Completion:
No
Yes
[If Yes, list the requirements with suspected contravention
findings e.g. R1, R2, R7]
[Use YYYY-MM-DD format]
Assessment Commentary
[Information (if any) relevant to audit findings below]
Findings
R1
[Summary of Findings]
R2
[Summary of Findings]
R3
[Summary of Findings]
Document1
Page 1 of 18
Version 1.0 – 2015-12-01
CIP-010-AB-1
Cyber Security – Configuration Change Management
and Vulnerability Assessments
Contact Information
Audited Entity
Compliance Primary
[Name]
[Title]
[Phone]
[Email]
Subject Matter Expert [Name]
[Title]
[Phone]
[Email]
AESO Team
Lead Auditor
Sign-off
[Name]
[Title]
[Phone]
[Email]
Date:
[Name]
[Title]
[Phone]
[Email]
Date:
Compliance Manager [Name]
[Title]
[Phone]
[Email]
Date:
Standard Owner
Date:
Auditor
Document1
Signature:
Signature:
Signature:
[Name]
[Title]
[Phone]
[Email]
Signature:
Page 2 of 18
Version 1.0 – 2015-12-01
CIP-010-AB-1
Cyber Security – Configuration Change Management
and Vulnerability Assessments
Applicability
4.1. For the purpose of the requirements contained herein, the following list of entities will be collectively
referred to as “Responsible Entities”. For requirements in this reliability standard where a specific entity or
subset of entities are the applicable entity or entities, the entity or entities are specified explicitly.
4.1.1. [Intentionally left blank.]
4.1.2. a legal owner of an electric distribution system that owns one or more of the following
facilities, systems, and equipment for the protection or restoration of the bulk electric system:
4.1.2.1. each underfrequency load shedding or under voltage load shed system that:
4.1.2.1.1. is part of a load shedding program that is subject to one or more
requirements in a reliability standard; and
4.1.2.1.2. performs automatic load shedding under a common control system owned
by the entity in subsection 4.1.2., without human operator initiation, of 300 MW or
more;
4.1.2.2. each remedial action scheme where the remedial action scheme is subject to one
or more requirements in a reliability standard;
4.1.2.3. each protection system (excluding underfrequency load shedding and under
voltage load shed) that applies to transmission where the protection system is subject to
one or more requirements in a reliability standard; and
4.1.2.4. each cranking path and group of elements meeting the initial switching
requirements from a contracted blackstart resource up to and including the first point of
supply and/or point of delivery of the next generating unit or aggregated generating
facility to be started;
4.1.3. the operator of a generating unit and the operator of an aggregated generating facility;
4.1.4. the legal owner of a generating unit and the legal owner of an aggregated generating
facility;
4.1.5. [Intentionally left blank.]
4.1.6. [Intentionally left blank.]
4.1.7. the operator of a transmission facility;
4.1.8. the legal owner of a transmission facility; and
4.1.9. the ISO.
4.2. For the purpose of the requirements contained herein, the following facilities, systems, and equipment
owned by each Responsible Entity in subsection 4.1 above are those to which these requirements are
applicable. For requirements in this reliability standard where a specific type of facilities, system, or
equipment or subset of facilities, systems, and equipment are applicable, these are specified explicitly.
Document1
Page 3 of 18
Version 1.0 – 2015-12-01
CIP-010-AB-1
Cyber Security – Configuration Change Management
and Vulnerability Assessments
4.2.1. One or more of the following facilities, systems and equipment that operate at, or control
elements that operate at, a nominal voltage of 25 kV or less and are owned by a legal owner of an
electric distribution system or a legal owner of a transmission facility for the protection or
restoration of the bulk electric system:
4.2.1.1. each underfrequency load shedding or under voltage load shed system that:
4.2.1.1.1. is part of a load shedding program that is subject to one or more
requirements in a reliability standard; and
4.2.1.1.2. performs automatic load shedding under a common control system owned
by one or more of the entities in subsection 4.2.1, without human operator initiation,
of 300 MW or more;
4.2.1.2. each remedial action scheme where the remedial action scheme is subject to one
or more requirements in a reliability standard;
4.2.1.3. each protection system (excluding underfrequency load shedding and under
voltage load shed) that applies to transmission where the protection system is subject to
one or more requirements in a reliability standard; and
4.2.1.4. each cranking path and group of elements meeting the initial switching
requirements from a contracted blackstart resource up to and including the first point of
supply and/or point of delivery of the next generating unit or aggregated generating
facility to be started;
4.2.2. Responsible Entities listed in subsection 4.1 other than a legal owner of an electric
distribution system are responsible for:
4.2.2.1. each transmission facility that is part of the bulk electric system except each
transmission facility that:
4.2.2.1.1. is a transformer with fewer than 2 windings at 100 kV or higher and does
not connect a contracted blackstart resource;
4.2.2.1.2. radially connects only to load;
4.2.2.1.3. radially connects only to one or more generating units or aggregated
generating facilities with a combined maximum authorized real power of less
than or equal to 67.5 MW and does not connect a contracted blackstart resource;
or
4.2.2.1.4. radially connects to load and one or more generating units or aggregated
generating facilities that have a combined maximum authorized real power of
less than or equal to 67.5 MW and does not connect a contracted blackstart
resource;
Document1
Page 4 of 18
Version 1.0 – 2015-12-01
CIP-010-AB-1
Cyber Security – Configuration Change Management
and Vulnerability Assessments
4.2.2.2. a reactive power resource that is dedicated to supplying or absorbing reactive
power that is connected at 100 kV or higher, or through a dedicated transformer with a highside voltage of 100 kV or higher, except those reactive power resources operated by an
end-use customer for its own use;
4.2.2.3. a generating unit that is:
4.2.2.3.1. directly connected to the bulk electric system and has a maximum
authorized real power rating greater than 18 MW unless the generating unit is part
of an industrial complex;
4.2.2.3.2. within a power plant which:
4.2.2.3.2.1. is not part of an aggregated generating facility;
4.2.2.3.2.2. is directly connected to the bulk electric system; and
4.2.2.3.2.3. has a combined maximum authorized real power rating greater
than 67.5 MW unless the power plant is part of an industrial complex;
4.2.2.3.3. within an industrial complex with supply transmission service
greater than 67.5 MW; or
4.2.2.3.4. a contracted blackstart resource;
4.2.2.4. an aggregated generating facility that is:
4.2.2.4.1. directly connected to the bulk electric system and has a maximum
authorized real power rating greater than 67.5 MW unless the aggregated
generating facility is part of an industrial complex;
4.2.2.4.2. within an industrial complex with supply transmission service greater
than 67.5 MW; or
4.2.2.4.3. a contracted blackstart resource;
and
4.2.2.5. control centres and backup control centres.
4.2.3. The following are exempt from this reliability standard:
4.2.3.1. [Intentionally left blank.]
4.2.3.2. cyber assets associated with communication networks and data communication
links between discrete electronic security perimeters.
4.2.3.3. [Intentionally left blank.]
4.2.3.4. for the legal owner of an electric distribution system, the systems and equipment
that are not included in subsection 4.2.1 above.
Document1
Page 5 of 18
Version 1.0 – 2015-12-01
CIP-010-AB-1
Cyber Security – Configuration Change Management
and Vulnerability Assessments
4.2.3.5. Responsible Entities that identify that they have no BES cyber systems categorized
as High Impact or Medium Impact according to the CIP‐002-AB‐5.1 identification and
categorization processes.
4.2.2.3.2.2. is directly connected to the bulk electric system; and
4.2.2.3.2.3. has a combined maximum authorized real power rating greater
than 67.5 MW unless the power plant is part of an industrial complex;
4.2.2.3.3. within an industrial complex with supply transmission service greater
than 67.5 MW; or
4.2.2.3.4. a contracted blackstart resource;
4.2.2.4. an aggregated generating facility that is:
4.2.2.4.1. directly connected to the bulk electric system and has a maximum
authorized real power rating greater than 67.5 MW unless the aggregated
generating facility is part of an industrial complex;
4.2.2.4.2. within an industrial complex with supply transmission service greater
than 67.5 MW; or
4.2.2.4.3. a contracted blackstart resource;
and
4.2.2.5. control centres and backup control centres.
4.2.3. The following are exempt from this reliability standard:
4.2.3.1. [Intentionally left blank.]
4.2.3.2. cyber assets associated with communication networks and data communication
links between discrete electronic security perimeters.
4.2.3.3. [Intentionally left blank.]
4.2.3.4. for the legal owner of an electric distribution system, the systems and equipment
that are not included in subsection 4.2.1 above.
4.2.3.5. Responsible Entities that identify that they have no BES cyber systems categorized
as High Impact or Medium Impact according to the CIP‐002-AB‐5.1 identification and
categorization processes.
Document1
Page 6 of 18
Version 1.0 – 2015-12-01
CIP-010-AB-1
Cyber Security – Configuration Change Management and Vulnerability Assessments
Compliance Assessment
R1
Requirement & Measure
Evidence Submission
Evidence Description
Evidence
Assessment Approach
Auditor Notes
R1. Each Responsible Entity shall implement, in a
manner that identifies, assesses, and corrects
deficiencies, one or more documented processes that
collectively include each of the applicable requirement
parts in CIP‐010-AB‐1 Table R1 – Configuration Change
Management.
M1. Evidence must include each of the applicable
documented processes that collectively include each of
the applicable requirement parts in CIP‐010-AB‐1 Table
R1 – Configuration Change Management and additional
evidence to demonstrate implementation as described in
the Measures column of the table.
Part 1.1 in Table R1 – Configuration Change
Management
AR1 Part 1.1 Please
provide:
Applicable Systems
High Impact BES cyber systems and their associated:
1. electronic access control or monitoring systems;
2. physical access control systems; and
3. protected cyber assets
(i) One or more
documented processes
pertaining to
requirement R1 Part
1.1.
[Click and edit to enter description for AR1 [Click and edit to embed file or link to
Part 1.1 (i) submitted evidence]
evidence]
Medium Impact BES cyber systems and their
associated:
1. electronic access control or monitoring systems;
2. physical access control systems; and
3. protected cyber assets
Requirements
Develop a baseline configuration, individually or by group,
(ii) Evidence that the
[Click and edit to enter description for AR1 [Click and edit to embed file or link to
which shall include the following items:
processes pertaining to Part 1.1 (ii) submitted evidence]
evidence]
1.1.1. operating system(s) (including version) or firmware
requirement R1 Part 1.1
where no independent operating system exists;
1.1.2. any commercially available or open‐source
have been
implemented.
application software (including version) intentionally
installed;
1.1.3. any custom software installed;
1.1.4. any logical network accessible ports; and
1.1.5. any security patches applied.
Measures
Examples of evidence may include, but are not limited to:

a spreadsheet identifying the required items of
the baseline configuration for each cyber asset,
individually or by group; or

a record in an asset management system that
identifies the required items of the baseline
configuration for each cyber asset, individually
or by group.
Document1
Page 7 of 18
Verify that the Responsible Entity has documented [For AESO use only]
one or more processes that include the
development of a baseline configuration for each
Applicable System.
For each Applicable System, verify the above
documented process(es) collectively include all of
the following:

operating system(s) (including version) or
firmware where no independent operating
system exists;

any commercially available or opensource application software (including
version) intentionally installed;

any custom software installed;

any logical network accessible ports; and

any security patches applied.
Verify the Responsible Entity has a baseline
[For AESO use only]
configuration for each Applicable System,
individually or by group, which includes:

operating system(s) (including version) or
firmware where no independent operating
system exists;

any commercially available or opensource application software (including
version) intentionally installed;

any custom software installed;

any logical network accessible ports; and

any security patches applied.
Version 1.0 – 2015-12-01
CIP-010-AB-1
Cyber Security – Configuration Change Management and Vulnerability Assessments
Requirement & Measure
Evidence Submission
Part 1.2 in Table R1 – Configuration Change
Management
AR1 Part 1.2 Please
provide:
Applicable Systems
High Impact BES cyber systems and their associated:
1. electronic access control or monitoring systems;
2. physical access control systems; and
3. protected cyber assets
(i) One or more
documented processes
pertaining to
requirement R1 Part
1.2.
Evidence Description
Evidence
[Click and edit to enter description for AR1 [Click and edit to embed file or link to
Part 1.2 (i) submitted evidence]
evidence]
Assessment Approach
Auditor Notes
Verify the Responsible Entity documented one or
more processes to authorize and document
changes that deviate from the existing baseline
configuration.
[For AESO use only]
For each Applicable System, verify the
Responsible Entity authorized and documented
changes that deviate from the existing baseline
configuration.
[For AESO use only]
Medium Impact BES cyber systems and their
associated:
1. electronic access control or monitoring systems;
2. physical access control systems; and
3. protected cyber assets
Requirements
Authorize and document changes that deviate from the
existing baseline configuration.
Measures
Examples of evidence may include, but are not limited to:

a change request record and associated
electronic authorization (performed by the
individual or group with the authority to authorize
the change) in a change management system
for each change; or

documentation that the change was performed in
accordance with the requirement.
[Click and edit to enter description for AR1 [Click and edit to embed file or link to
(ii) Evidence that the
Part 1.2 (ii) submitted evidence]
evidence]
processes pertaining to
requirement R1 Part 1.2
have been
implemented; including
a list of authorized
changes that deviate
from the existing
baseline configuration
that occurred during the
audit period.
Document1
Page 8 of 18
Version 1.0 – 2015-12-01
CIP-010-AB-1
Cyber Security – Configuration Change Management and Vulnerability Assessments
Requirement & Measure
Evidence Submission
Part 1.3 in Table R1 – Configuration Change
Management
AR1 Part 1.3 Please
provide:
Applicable Systems
High Impact BES cyber systems and their associated:
1. electronic access control or monitoring systems;
2. physical access control systems; and
3. protected cyber assets
(i) One or more
documented processes
pertaining to
requirement R1 Part
1.3.
Evidence Description
Evidence
[Click and edit to enter description for AR1 [Click and edit to embed file or link to
Part 1.3 ( (i) submitted evidence]
evidence]
Assessment Approach
Auditor Notes
For a change that deviates from the existing
baseline configuration, verify the Responsible
Entity documented one or more processes for
updating the baseline configuration as necessary
within 30 days of completing the change.
[For AESO use only]
For each Applicable System, for a change that
deviates from the existing baseline configuration,
verify the Responsible Entity updated the baseline
configuration as necessary within 30 days of
completing the change.
[For AESO use only]
Medium Impact BES cyber systems and their
associated:
1. electronic access control or monitoring systems;
2. physical access control systems; and
3. protected cyber assets
Requirements
For a change that deviates from the existing baseline
configuration, update the baseline configuration as
necessary within 30 days of completing the change.
Measures
An example of evidence may include, but is not limited to,
updated baseline documentation with a date that is within
30 days of the date of the completion of the change.
(ii) Evidence that the
[Click and edit to enter description for AR1 [Click and edit to embed file or link to
processes pertaining to Part 1.3 (ii) submitted evidence]
evidence]
requirement R1 Part 1.3
have been
implemented; including
the date when each
change in requirement
R1 Part 1.2 was
completed and the
corresponding date
when the baseline
configuration was
updated.
Document1
Page 9 of 18
Version 1.0 – 2015-12-01
CIP-010-AB-1
Cyber Security – Configuration Change Management and Vulnerability Assessments
Requirement & Measure
Evidence Submission
Part 1.4 in Table R1 – Configuration Change
Management
AR1 Part 1.4 Please
provide:
Applicable Systems
High Impact BES cyber systems and their associated:
1. electronic access control or monitoring systems;
2. physical access control systems; and
3. protected cyber assets
(i) One or more
documented processes
pertaining to
requirement R1 Part
1.4.
Evidence Description
Evidence
[Click and edit to enter description for AR1 [Click and edit to embed file or link to
Part 1.4 ( (i) submitted evidence]
evidence]
Medium Impact BES cyber systems and their
associated:
1. electronic access control or monitoring systems;
2. physical access control systems; and
3. protected cyber assets
Requirements
For a change that deviates from the existing baseline
configuration:
1.4.1. prior to the change, determine required cyber
security controls in CIP‐005 and CIP‐007 that could be
impacted by the change;
1.4.2. following the change, verify that required cyber
security controls determined in 1.4.1 are not adversely
affected; and
1.4.3. document the results of the verification.
(ii) Evidence that the
[Click and edit to enter description for AR1 [Click and edit to embed file or link to
processes pertaining to Part 1.4 (ii) submitted evidence]
evidence]
requirement R1 Part 1.4
have been
implemented.
Measures
An example of evidence may include, but is not limited to,
a list of cyber security controls verified or tested along
with the dated test results.
Document1
Page 10 of 18
Assessment Approach
Auditor Notes
For a change that deviates from the existing
[For AESO use only]
baseline configuration, verify the Responsible
Entity documented one or more processes to:

determine, prior to the change, required
cyber security controls in CIP-005 and
CIP-007 that could be impacted by the
change;

verify, following the change, that required
cyber security controls determined in Part
1.4.1 are not adversely affected; and

document the results of the verification.
For each change that deviates from the existing
baseline configuration, for each Applicable
System, verify that:

prior to the change, the Responsible
Entity has determined the required
security controls in CIP-005 and CIP-007
that could be impacted by the change;

following the change, the Responsible
Entity has verified that the required cyber
security controls determined in 1, above,
are not adversely affected; and

the Responsible Entity has documented
the results of the verification required by
2, above.
[For AESO use only]
Version 1.0 – 2015-12-01
CIP-010-AB-1
Cyber Security – Configuration Change Management and Vulnerability Assessments
Requirement & Measure
Evidence Submission
Part 1.5 in Table R1 – Configuration Change
Management
AR1. Part 1.5 Please
provide:
Applicable Systems
High Impact BES cyber systems
(i) One or more
documented processes
pertaining to
requirement R1 Part
1.5.
Requirements
Where technically feasible, for each change that deviates
from the existing baseline configuration:
Evidence Description
Evidence
[Click and edit to enter description for AR1 [Click and edit to embed file or link to
Part 1.5 (i) submitted evidence]
evidence]
1.5.1. prior to implementing any change in the production
environment, test the changes in a test environment or
test the changes in a production environment where the
test is performed in a manner that minimizes adverse
effects, that models the baseline configuration to ensure
that required cyber security controls in CIP‐005 and CIP‐
007 are not adversely affected; and
1.5.2. document the results of the testing and, if a test
environment was used, the differences between the test
environment and the production environment, including a
description of the measures used to account for any
differences in operation between the test and production
environments.
Assessment Approach
Auditor Notes
For changes that deviate from the existing
[For AESO use only]
baseline configuration, verify the Responsible
Entity documented one or more processes that
include:

prior to implementing any change in the
production environment, test the changes
in a test environment or test the changes
in a production environment where the
test is performed in a manner that
minimizes adverse effects, that models
the baseline configuration to ensure that
required cyber security controls in CIP005 and CIP-007 are not adversely
affected; and

document the results of the testing and, if
a test environment was used, the
differences between the test environment
and the production environment,
including a description of the measures
used to account for any differences in
operation between the test and
production environments.
Measures
An example of evidence may include, but is not limited to
a list of cyber security controls tested along with
successful test results and a list of differences between
the production and test environments with descriptions of
how any differences were accounted for, including the
date of the test.
Document1
Page 11 of 18
Version 1.0 – 2015-12-01
CIP-010-AB-1
Cyber Security – Configuration Change Management and Vulnerability Assessments
Requirement & Measure
Evidence Submission
Evidence Description
Evidence
(ii) Evidence that the
[Click and edit to enter description for AR1 [Click and edit to embed file or link to
processes pertaining to Part 1.5 (ii) submitted evidence]
evidence]
requirement R1 Part 1.5
have been
implemented.
Assessment Approach
Verify that, for each Applicable System, for each
change that deviates from the existing baseline
configuration, prior to implementing any change in
the production environment:

the Responsible Entity tested the
changes in a test environment; or

the Responsible Entity tested the
changes in a production environment
where the test is performed in a manner
that minimizes adverse effects, that
models the baseline configuration to
ensure that required cyber security
controls in CIP-005 and CIP-007 are not
adversely affected; or

an approved Technical Feasibility
Exception covers this circumstance.
Auditor Notes
[For AESO use only]
Verify that, for each Applicable System, where
technically feasible, for each change that deviates
from the existing baseline configuration, verify:

the Responsible Entity documented the
results of the testing; and

if a test environment was used, the
Responsible Entity documented the
differences between the test environment
and the production environment,
including a description of the measures
used to account for any differences in
operation between the test and
production environments.
If an approved Technical Feasibility Exception is
applicable to this Part, verify the compensating
measures identified by the approved Technical
Feasibility Exception are implemented.
Findings
[For AESO use only]
Document1
Page 12 of 18
Version 1.0 – 2015-12-01
CIP-010-AB-1
Cyber Security – Configuration Change Management and Vulnerability Assessments
R2
Requirement & Measure
Evidence Submission
Evidence Description
Evidence
Assessment Approach
Auditor Notes
R2. Each Responsible Entity shall implement, in a
manner that identifies, assesses, and corrects
deficiencies, one or more documented processes that
collectively include each of the applicable requirement
parts in CIP‐010-AB‐1 Table R2 – Configuration
Monitoring.
M2. Evidence must include each of the applicable
documented processes that collectively include each of
the applicable requirement parts in CIP‐010-AB‐1 Table
R2 – Configuration Monitoring and additional evidence to
demonstrate implementation as described in the
Measures column of the table.
Part 2.1 in Table R2 – Configuration Monitoring
Applicable Systems
High Impact BES cyber systems and their associated:
1. electronic access control or monitoring
systems; and
2. protected cyber assets
AR2 Part 2.1 Please
provide:
[Click and edit to enter description for AR2
Part 2.1 (i) submitted evidence]
[Click and edit to embed file or link to
evidence]
(i) One or more
documented processes
pertaining to
requirement R2 Part
2.1.
Verify the Responsible Entity documented one or
more processes to monitor at least once every 35
days for changes to the baseline configuration (as
described in Requirement R1, Part 1.1).

[For AESO use only]
Verify the Responsible Entity documented one or
more processes to document and investigate
detected unauthorized changes.
Requirements
Monitor at least once every 35 days for changes to the
baseline configuration (as described in requirement R1,
Part 1.1). Document and investigate detected
unauthorized changes.
Measures
An example of evidence may include, but is not limited
to, logs from a system that is monitoring the
configuration along with records of investigation for any
unauthorized changes that were detected.
(ii) Evidence that the
[Click and edit to enter description for AR2
processes pertaining to Part 2.1 (ii) submitted evidence]
requirement R2 Part
2.1 have been
implemented.
[Click and edit to embed file or link to
evidence]
For each Applicable System, verify the
Responsible Entity monitored at least once every
35 days for changes to the baseline configuration
(as described in Requirement R1, Part 1.1).
[For AESO use only]
For each Applicable System, verify all detected
unauthorized changes were documented and
investigated.
Findings
[For AESO use only]
Document1
Page 13 of 18
Version 1.0 – 2015-12-01
CIP-010-AB-1
Cyber Security – Configuration Change Management and Vulnerability Assessments
R3
Requirement & Measure
Evidence Submission
Evidence Description
Evidence
Assessment Approach
Auditor Notes
R3. Each Responsible Entity shall implement one or
more documented processes that collectively include
each of the applicable requirement parts in CIP‐010-AB‐
1 Table R3– Vulnerability Assessments.
M3. Evidence must include each of the applicable
documented processes that collectively include each of
the applicable requirement parts in CIP‐010-AB‐1 Table
R3 – Vulnerability Assessments and additional evidence
to demonstrate implementation as described in the
Measures column of the table.
Part 3.1 in Table R3 – Vulnerability Assessments
Applicable Systems
High Impact BES cyber systems and their associated:
1. electronic access control or monitoring
systems;
2. physical access control systems; and
3. protected cyber assets
AR3 Part 3.1 Please
provide:
[Click and edit to enter description for AR3 [Click and edit to embed file or link to
Part 3.1 (i) submitted evidence]
evidence]
(i) One or more
documented processes
pertaining to
requirement R3 Part
3.1.
Verify the Responsible Entity documented one or
more processes for conducting a paper or active
vulnerability assessment at least once every 15
months.
[For AESO use only]
For each Applicable System, verify the
Responsible Entity conducted a paper or active
vulnerability assessment at least once every 15
months.
[For AESO use only]
Medium Impact BES cyber systems and their
associated:
1. electronic access control or monitoring
systems;
2. physical access control systems; and
3. protected cyber assets
Requirements
At least once every 15 months, conduct a paper or
active vulnerability assessment.
Measures
Examples of evidence may include, but are not limited
to:

a document listing the date of the assessment
(performed at least once every 15 months), the
controls assessed for each BES cyber system
along with the method of assessment; or

a document listing the date of the assessment
and the output of any tools used to perform the
assessment.
Document1
(ii) Evidence that the
[Click and edit to enter description for AR3 [Click and edit to embed file or link to
processes pertaining to Part 3.1 (ii) submitted evidence]
evidence]
requirement R3 Part
3.1 have been
implemented.
Page 14 of 18
Version 1.0 – 2015-12-01
CIP-010-AB-1
Cyber Security – Configuration Change Management and Vulnerability Assessments
Requirement & Measure
Part 3.2 in Table R3 – Vulnerability Assessments
Applicable Systems
High Impact BES cyber systems
Requirements
Where technically feasible, at least once every 36
months:
Evidence Submission
AR3 Part 3.2 Please
provide:
Evidence Description
Evidence
[Click and edit to enter description for AR3 [Click and edit to embed file or link to
Part 3.2 (i) submitted evidence]
evidence]
(i) One or more
documented processes
pertaining to
requirement R3 Part
3.2.
3.2.1 perform an active vulnerability assessment in a test
environment, or perform an active vulnerability
assessment in a production environment where the test
is performed in a manner that minimizes adverse effects,
that models the baseline configuration of the BES cyber
system in a production environment; and
3.2.2 document the results of the testing and, if a test
environment was used, the differences between the test
environment and the production environment, including a
description of the measures used to account for any
differences in operation between the test and production
environments.
Assessment Approach
Verify the Responsible Entity documented one or
more processes to:

perform an active vulnerability
assessment in a test environment, or
perform an active vulnerability
assessment in a production environment
where the test is performed in a manner
that minimizes adverse effects, that
models the baseline configuration of the
BES cyber system in a production
environment; and

Measures
An example of evidence may include, but is not limited
to, a document listing the date of the assessment
(ii) Evidence that the
[Click and edit to enter description for AR3 [Click and edit to embed file or link to
(performed at least once every 36 months), the output
processes pertaining to Part 3.2 (ii) submitted evidence]
evidence]
of the tools used to perform the assessment, and a list of
requirement R3 Part
differences between the production and test
3.2 have been
environments with descriptions of how any differences
implemented.
were accounted for in conducting the assessment.

Document1
Page 15 of 18
[For AESO use only]
document the results of the testing and, if
a test environment was used, the
differences between the test environment
and the production environment,
including a description of the measures
used to account for any differences in
operation between the test and
production environments.
For each Applicable System, was an active
vulnerability assessment technically feasible?

Auditor Notes
[For AESO use only]
If yes, verify:
o
An active vulnerability
assessment was conducted at
least once every 36 months, in
accordance with 3.2.1; and
o
results of testing are
documented, in accordance with
3.2.2.
If no, verify the compensating measures
identified by the approved Technical
Feasibility Exception are implemented.
Version 1.0 – 2015-12-01
CIP-010-AB-1
Cyber Security – Configuration Change Management and Vulnerability Assessments
Requirement & Measure
Part 3.3 in Table R3 – Vulnerability Assessments
Applicable Systems
High Impact BES cyber systems and their associated:
1. electronic access control or monitoring
systems;
2. protected cyber assets
Evidence Submission
AR3 Part 3.3 Please
provide:
Evidence Description
Evidence
Assessment Approach
Auditor Notes
[Click and edit to enter description for AR3 [Click and edit to embed file or link to
Part 3.3 (i) submitted evidence]
evidence]
Verify the Responsible Entity documented one or
more processes for performing an active
vulnerability assessment, prior to adding a new
applicable cyber asset to a production
environment, of the new cyber asset, except for
CIP exceptional circumstances and like
replacements of the same type of cyber asset
with a baseline configuration that models an
existing baseline configuration of the previous or
other existing cyber asset.
[For AESO use only]
(ii) Evidence that the
[Click and edit to enter description for AR3 [Click and edit to embed file or link to
processes pertaining to Part 3.3 (ii) submitted evidence]
evidence]
requirement R3 Part
3.3 have been
implemented.
For each Applicable System, was a new
applicable cyber asset added to a production
environment? If yes, verify that an active
vulnerability assessment of the new cyber asset
was performed prior to adding it to a production
environment, except for CIP exceptional
circumstances and like replacements of the
same type of cyber asset with a baseline
configuration that models an existing baseline
configuration of the previous or other existing
cyber asset.
[For AESO use only]
(i) One or more
documented processes
pertaining to
requirement R3 Part
3.3.
Requirements
Prior to adding a new applicable cyber asset to a
production environment, perform an active vulnerability
assessment of the new cyber asset, except for CIP
exceptional circumstances and like replacements of
the same type of cyber asset with a baseline
configuration that models an existing baseline
configuration of the previous or other existing cyber
asset.
Measures
An example of evidence may include, but is not limited
to, a document listing the date of the assessment
(performed prior to the commissioning of the new cyber
asset) and the output of any tools used to perform the
assessment.
If the Responsible Entity has experienced an
exception for CIP exceptional circumstances,
verify the Responsible Entity has adhered to any
applicable cyber security policies.
Document1
Page 16 of 18
Version 1.0 – 2015-12-01
CIP-010-AB-1
Cyber Security – Configuration Change Management and Vulnerability Assessments
Requirement & Measure
Part 3.4 in Table R3 – Vulnerability Assessments
Applicable Systems
High Impact BES cyber systems and their associated:
1. electronic access control or monitoring
systems;
2. physical access control systems; and
3. protected cyber assets
Evidence Submission
AR3 Part 3.4 Please
provide:
Evidence Description
Evidence
[Click and edit to enter description for AR3 [Click and edit to embed file or link to
Part 3.4 (i) submitted evidence]
evidence]
(i) One or more
documented processes
pertaining to
requirement R3 Part
3.4.
Assessment Approach
Verify the Responsible Entity documented one or
more processes to document the results of the
assessments conducted according to Parts 3.1,
3.2, and 3.3 and the action plan to remediate or
mitigate vulnerabilities identified in the
assessments including the planned date of
completing the action plan and the execution
status of any remediation or mitigation action
items.
Auditor Notes
[For AESO use only]
Medium Impact BES cyber systems and their
associated:
1. electronic access control or monitoring
systems;
2. physical access control systems; and
3. protected cyber assets
Requirements
Document the results of the assessments conducted
according to Parts 3.1, 3.2, and 3.3 and the action plan
to remediate or mitigate vulnerabilities identified in the
assessments including the planned date of completing
the action plan and the execution status of any
remediation or mitigation action items.
Measures
An example of evidence may include, but is not limited
to, a document listing the results or the review or
assessment, a list of action items, documented proposed
dates of completion for the action plan, and records of
the status of the action items (such as minutes of a
status meeting, updates in a work order system, or a
spreadsheet tracking the action items).
(ii) Evidence that the
[Click and edit to enter description for AR3 [Click and edit to embed file or link to
processes pertaining to Part 3.4 (ii) submitted evidence]
evidence]
requirement R3 Part
3.4 have been
implemented.
For each Applicable System, for each assessment [For AESO use only]
conducted according to Parts 3.1, 3.2, and 3.3,
verify the results of the assessment were
documented.
For each Applicable System, for each assessment
conducted according to Parts 3.1, 3.2, and 3.3,
were there vulnerabilities identified?
If yes, verify:

an action plan to remediate or mitigate
the identified vulnerabilities was created
or modified;

the action plan includes a planned date
of completion;
the action plan includes the execution
status of any remediation or mitigation
action items;
the status of the action plan, if the
planned date of completion has been
exceeded; and



the completion of the action plan, if the
action plan status is complete.
Findings
[For AESO use only]
Document1
Page 17 of 18
Version 1.0 – 2015-12-01
CIP-010-AB-1
Cyber Security – Configuration Change Management
and Vulnerability Assessments
General Notes
The AESO developed this Reliability Standard Audit Worksheet (RSAW) to add clarity and consistency to the
audit team’s assessment of compliance with this reliability standard, including the approach elected to assess
requirements.
Additionally, the RSAW provides a non-exclusive list of examples of the types of evidence a market
participant may produce or may be asked to produce to demonstrate compliance with this reliability standard.
A market participant’s adherence to the examples contained within this RSAW does not constitute compliance
with the reliability standard.
This document is not an AESO authoritative document and revisions to it may be made from time to time by
the AESO. Market participants are notified of revisions through the stakeholder update process.
Notes to File
[For AESO use only: any observations, remarks or action items for future audits]
Revision History
Version
1.0
Document1
Issue Date
Description
December 1, 2015
Initial version of Worksheet
Page 18 of 18
Version 1.0 – 2015-12-01
Download