Lesson Learned CIP Version 5 Transition Program

Lesson Learned CIP Version 5 Transition
Program
CIP-002-5: Programmable Electronic Device
Version: January 9, 2015
Purpose
The purpose of this Lesson Learned is to provide guidance on the identification of programmable electronic
devices. As discussed below, identifying “programmable electronic devices” is central to determining which
assets are in scope of the CIP Version 5 Reliability Standards. This document clarifies when the ERO will deem
a device to be “programmable” and subject to categorization as a Cyber Asset.
Guidance
The first step in determining whether a device is subject to the CIP Version 5 Reliability Standards as a BES
Cyber Asset or a Protected Cyber Asset (PCA) is to determine whether it is a “programmable electronic
device.” Specifically, for a device to be a BES Cyber Asset or a PCA, the device first must be a Cyber Asset. As
defined in the NERC Glossary of Terms Used in NERC Reliability Standards (NERC Glossary), Cyber Assets are
“programmable electronic devices, including the hardware, software, and data in those devices.”
In applying the definition of Cyber Asset and determining whether a device is programmable, the ERO will
look at whether the device has a microprocessor and field-updatable firmware or software. The ERO will not
focus on those devices that are merely configurable, as described below. The following highlights the differences
between a device the ERO will deem programmable and those it will deem to be configurable.
Programmable Electronic Device
As noted above, in determining whether a device is programmable, the ERO will look at whether the device has a
microprocessor and field-updateable firmware or software.
• “Field-Updatable” would include devices that have a management port, web interface, socketed chipset, or
any external interface that would allow the introduction of a firmware, software or logic update.
• If the device’s case is sealed in such a way that would require it to be damaged to gain access to the chipset
or internal ports then the device in to be considered to be not Field-Updatable.
Examples of such devices include, but are not limited to, the following:
• Digital Relays
• Phasor Measurement Units (PMUs)
• Phasor Data Concentrators (PDCs)
• Programmable Automation Controllers
3353 Peachtree Road NE
Suite 600, North Tower
Atlanta, GA 30326
404-446-2560 | www.nerc.com
•
Communications Processors
•
Routers, switches, firewalls
Configurable Device
A configurable device is a device that will not allow user changes to its internal programming, but otherwise allows
the user to change between pre-defined operational parameters or change hardware options.
• If a parameter allows for the entry of formulas, functions and/or any other series of logic steps then this
would constitute “programming” and would make the device a programmable electronic device.
Examples of configurable devices include the following types of devices:
• A solid state relay that allows the user to set when the relay will operate but not how the relay
operates.
• A HART compatible smart pressure transmitter
• A HART compatible smart actuator for a final control element, such as a control valve or damper
• A handheld HART configurator
• Output only/sealed devices
• A media converter (i.e., Copper to fiber converter)
Background Information
The following are definitions from the NERC Glossary relevant to this Lesson Learned.
BES Cyber Asset – A Cyber Asset that if rendered unavailable, degraded, or misused would, within 15 minutes of its
required operation, misoperation, or non-operation, adversely impact one or more Facilities, systems, or equipment,
which, if destroyed, degraded, or otherwise rendered unavailable when needed, would affect the reliable operation
of the Bulk Electric System. Redundancy of affected Facilities, systems, and equipment shall not be considered when
determining adverse impact. Each BES Cyber Asset is included in one or more BES Cyber Systems. (A Cyber Asset is
not a BES Cyber Asset if, for 30 consecutive calendar days or less, it is directly connected to a network within an ESP,
A Cyber Asset within an ESP, or to a BES Cyber Asset, and it is used for data transfer, vulnerability assessment,
maintenance, or troubleshooting purposes.)
BES Cyber System – One or more BES Cyber Assets logically grouped by a Responsible Entity to perform one or
more reliability tasks for a functional entity.
Cyber Assets – Programmable electronic devices, including the hardware, software, and data in those devices.
Protected Cyber Asset – One or more Cyber Assets connected using a routable protocol within or on an Electronic
Security Perimeter that is not part of the highest impact BES Cyber System within the same Electronic Security
Perimeter. The impact rating of Protected Cyber Assets is equal to the highest rated BES Cyber System in the same
ESP. A Cyber Asset is not a Protected Cyber Asset if, for 30 consecutive calendar days or less, it is connected either to
a Cyber Asset within the ESP or to the network within the ESP, and it is used for data transfer, vulnerability
assessment, maintenance, or troubleshooting purposes.