Frost & Sullivan Research Service   Published: 3 Oct 2018
Understanding the NERC-CIP Regulations for Critical Infrastructure Organizations, 2018
  SERVICE HOMEPAGE
FURTHER INFORMATION
  Table Of Contents
  1 | UNDERSTANDING THE NERC-CIP REGULATIONS FOR CRITICAL INFRASTRUCTURE ORGANIZATIONS, 2018
   Executive Summary
      1. Key Findings

  Definitions
      1. Definitions

  Evolution of NERC-CIP Requirements
      1. The New Cyber Threat—Critical Infrastructure Sites
      2. Critical Infrastructure Sites Already Targeted
      3. Critical Infrastructure Sites Already Targeted (continued)
      4. Standardizing the Regulatory Environment
      5. Revised Standards to Meet Changing Technology Needs

  Drivers and Restraints
      1. Market Drivers
      2. Drivers Explained
      3. Market Restraints
      4. Restraints Explained

  Regulatory Breakdown
      1. Introduction to NERC-CIP Regulations
      2. CIP-002: Classification of BES Systems
      3. CIP-002: Classification of BES Systems (continued)
      4. CIP-003: Security Management Controls
      5. CIP-003: Security Management Controls (continued)
      6. CIP-003: Security Management Controls (continued)
      7. CIP-004.1: Personnel and Training
      8. CIP-004.2: Personnel and Training
      9. CIP-004.3: Personnel and Training
      10. CIP-004, 4.1–4.2: Personnel and Training
      11. CIP-004, 4.3–4.4: Personnel and Training
      12. CIP-004, 5.1–5.3: Personnel and Training
      13. CIP-004, 5.4–5.5: Personnel and Training
      14. CIP-005, 1.1–1.5: Electronic Security Perimeters
      15. CIP-005, 2.1–2.3: Electronic Security Perimeters
      16. CIP-006, 1.1–1.3: Physical Security of BES Cyber Systems
      17. CIP-006, 1.4–1.7: Physical Security of BES Cyber Systems
      18. CIP-006, 1.8–1.10: Physical Security of BES Cyber Systems
      19. CIP-006, 2.1–2.3: Physical Security of BES Cyber Systems
      20. CIP-006, 3.1: Physical Security of BES Cyber Systems
      21. CIP-007, 1.1–1.2: Cybersecurity Systems Management
      22. CIP-007, 2.1–2.2: Cybersecurity Systems Management
      23. CIP-007, 2.3–2.4: Cybersecurity Systems Management
      24. CIP-007, 3.1–3.3: Cybersecurity Systems Management
      25. CIP-007, 4.1–4.4: Cybersecurity Systems Management
      26. CIP-007, 5.1–5.4: Cybersecurity Systems Management
      27. CIP-007, 5.5–5.7: Cybersecurity Systems Management
      28. CIP-008, 1.1–1.4: Cybersecurity Incident Reporting and Response Planning
      29. CIP-008, 2.1–2.3: Cybersecurity Incident Reporting and Response Planning
      30. CIP-008, 3.1–3.2: Cybersecurity Incident Reporting and Response Planning
      31. CIP-009, 1.1–1.5: Recovery Plans for BES Cyber Systems
      32. CIP-009, 2.1–2.3: Recovery Plans for BES Cyber Systems
      33. CIP-009, 3.1–3.2: Recovery Plans for BES Cyber Systems
      34. CIP-010, 1.1–1.2: Configuration Change Management and Vulnerability Assessments
      35. CIP-010, 1.3–1.5: Configuration Change Management and Vulnerability Assessments
      36. CIP-010, 2.1: Configuration Change Management and Vulnerability Assessments
      37. CIP-010, 3.1–3.2: Configuration Change Management and Vulnerability Assessments
      38. CIP-010, 3.3–3.4: Configuration Change Management and Vulnerability Assessments
      39. CIP-010, 4.1: Configuration Change Management and Vulnerability Assessments
      40. CIP-011, 1.1–1.2: Cybersecurity Information Protection
      41. CIP-011, 2.1–2.2: Cybersecurity Information Protection
      42. CIP-014, 1.1–1.2: Physical Security
      43. CIP-014, 2.1–2.4: Physical Security
      44. CIP-014, 3.1: Physical Security
      45. CIP-014, 5.1–5.4: Physical Security
      46. CIP-014, 6.1–6.4: Physical Security

  Key Vendors
      1. Vendor Landscape per Regulation
      2. Solution Providers or Consultancies

  Growth Opportunities
      1. Growth Opportunity 1—Consultancy Services
      2. Growth Opportunity 2—Industrial-Specific Cyber Solutions
      3. Growth Opportunity 3—Ongoing Security Convergence
      4. Growth Opportunity 4—Partner Networks for Full Compliance
      5. Strategic Imperatives for Success and Growth

  The Last Word
      1. The Last Word—3 Big Predictions
      2. Legal Disclaimer

  Appendix
      1. List of Exhibits

  The Frost & Sullivan Story
      1. The Frost & Sullivan Story
      2. Value Proposition—Future of Your Company & Career
      3. Global Perspective
      4. Industry Convergence
      5. 360º Research Perspective
      6. Implementation Excellence
      7. Our Blue Ocean Strategy

Conseq