The North American Electric Reliability Corporation (NERC) develops and enforces CIP (Critical Infrastructure Protection) Reliability Standards corresponding to the Bulk Power System (BPS). Users, owners, and operators of the BPS under NERC jurisdiction serve more than 334 million people in the US, Canada, and northern Baja California, Mexico with their electricity.
The NERC Security Guideline for the Electricity Sector addresses risks that can arise in the daily business of electricity organizations and practices to help mitigate these risks. An information security policy is recommended as an integral part of these organizations’ policies. Certain entities under NERC jurisdiction are required to have training and awareness programs to further the mitigation process.1
One of the main concerns that electricity sector organizations expressed was that sensitive information could be used “to damage critical facilities, disrupt electric operations, or harm individuals” if the information was put into the wrong hands. 1 This concern has also been featured on 60 minutes in 2009, and in the Wall Street Journal just last month:
“The U.S. could suffer a coast-to-coast blackout if saboteurs knocked out just nine of the country’s 55,000 electric-transmission substations on a scorching summer day…” 2
The amount of electronic sensitive data keeps rising in time. Therefore, it is crucial to have a process in place to identify, classify, label, secure, and properly share the sensitive information to protect both the electricity organizations and consumers.
This is where our Sensitive Data Discovery tools come into play. STEALTHbits is able to aligns with the Security Guidelines for NERC CIP compliance by:
Are STEALTHbits solutions the end-all, be-all to solve all your DLP woes? No. Rather, our software solutions were designed to address a particularly difficult set of requirements that even the big DLP vendors fall short of fulfilling – Unstructured Data that is hiding in virtually every corner of your network. We employ a very logical workflow to:
1 Security Guideline for the Electricity Sector: Protecting Sensitive Information
2 https://online.wsj.com/news/articles/SB10001424052702304020104579433670284061220
Proper data security begins with a strong foundation. Find out what you're standing on with a free deep-dive into the security of your Structured and Unstructured Data, Active Directory, and Windows infrastructure.
Read more© 2022 Stealthbits Technologies, Inc.
Leave a Reply