NERC-CIP Compliance

What is NERC-CIP Compliance?

The Critical Infrastructure Protection standards developed by North American Electric Reliability Corporation (NERC) include critical aspects of both operational and physical security controls as well as incident response and recovery.

How Does Cygilant Help?

Cygilant’s SOCVue Security Monitoring service helps organizations address NERC CIP by providing 24/7/365 security monitoring and reporting on system events and critical security controls, as required by CIP-007-5 R4.

Cygilant’s offers the SOCVue Vulnerability Management service provides vulnerability detection and remediation guidance designed to help address the NERC v5 requirements CIP-007-5 and CIP-010-5.

With the Security Monitoring on-premise deployment option, Cygilant’s SOC team can also proactively assess several additional security controls, which are based on the SANS/CIS Critical Security Controls, in order to reduce your compliance risk. The security controls are directly mapped to relevant sections of NERC CIPv5.

Our SOC team will work with your organization to enable the reporting you need to help meet your compliance objectives with ease.

Critical Security Control


How SOCVue Security Monitoring Addresses

How SOCVue Vulnerability Management Addresses

Critical Security Control #1: Inventory of Authorized and Unauthorized Devices

CIP-002-5 R1

CIP-002-5 R2

Monitor DHCP event logs to track the identity of devices connecting to the network and   detect unauthorized devices.

Conduct vulnerability scans in order to build an inventory of authorized and unauthorized devices.

Critical Security Control #4: Continuous Vulnerability Assessment and Remediation

CIP-007-5 R2

CIP-010-5 R3

Correlate data from a wide variety of commercial vulnerability scanners with real-time security event data for enhanced alerting and reporting.

Vulnerability scanning to assess, prioritize and remediate vulnerabilities.

Critical Security Control #6: Maintenance, Monitoring, and Analysis of Audit Logs

CIP-007-5 R4

Collect, monitor, and analyze audit logs to detect, analyze and prevent advanced threats.

Critical Security Control #9: Limitation and Control of Network Ports

CIP-007-5 R1

Establish a whitelist/blacklist of ports and protocols to detect   unauthorized ports, protocols, and services    

Vulnerability scanning to detect vulnerable ports and protocols

Talk to an Expert

Learn how Cygilant can reduce your security vulnerabilities, improve your security workflow, and help you meet compliance mandates.

Please complete all required fields.

<script type="text/javascript"> adroll_adv_id = "P33PAU36EBCHVG7C4W3MX3"; adroll_pix_id = "63MYA75NGFDHJC2LKBWBV7"; (function () { var _onload = function(){ if (document.readyState && !/loaded|complete/.test(document.readyState)){setTimeout(_onload, 10);return} if (!window.__adroll_loaded){__adroll_loaded=true;setTimeout(_onload, 50);return} var scr = document.createElement("script"); var host = (("https:" == document.location.protocol) ? "" : ""); scr.setAttribute('async', 'true'); scr.type = "text/javascript"; scr.src = host + "/j/roundtrip.js"; ((document.getElementsByTagName('head') || [null])[0] || document.getElementsByTagName('script')[0].parentNode).appendChild(scr); }; if (window.addEventListener) {window.addEventListener('load', _onload, false);} else {window.attachEvent('onload', _onload)} }()); </script>